2 – Index
aaa port-access
See
Web or MAC Authentication.
access levels, authorized IP managers … 10-3
accounting
See
RADIUS.
address
authorized for port security … 9-3
authentication
See
TACACS.
authorized addresses
for IP management security … 10-4
for port security … 9-3
authorized IP managers
access levels … 10-3
building IP masks … 10-9
configuring in browser interface … 10-7, 10-9
configuring in console … 10-5
definitions of single and multiple … 10-4
effect of duplicate IP addresses … 10-12
IP mask for multiple stations … 10-10
IP mask for single station … 10-9
IP mask operation … 10-4
operating notes … 10-12
overview … 10-1
precedence over other security … 10-2
troubleshooting … 10-12
C
certificate
CA-signed … 7-4
root … 7-4
self-signed … 7-4
Clear button
to delete password protection … 2-5
configuration
port security … 9-5
RADIUS
See
RADIUS.
SSH
See
SSH.
connection inactivity time … 2-3
console, for configuring
authorized IP managers … 10-5
D
DES … 6-3, 7-3
disclaimer … 1-ii
duplicate IP address
effect on authorized IP managers … 10-12
E
event log
intrusion alerts … 9-34
G
guest VLAN … 8-7, 8-8
GVRP, static VLAN not advertised … 8-57
I
inconsistent value, message … 9-14
intrusion alarms
entries dropped from log … 9-36
event log … 9-34
prior to … 9-36
Intrusion Log
prior to … 9-32, 9-33
IP
authorized IP managers … 10-1
reserved port numbers … 6-17
IP masks
building … 10-9
for multiple authorized manager
stations … 10-10
for single authorized manager station … 10-9
operation … 10-4
K
kill command … 6-11
L
LACP
802.1X not allowed … 8-13, 8-17, 8-58
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......