2 – Index
VLAN, after authentication … 13-33, 13-40,
VLAN, tagged … 13-33, 13-35, 13-40, 13-48,
overview … 13-1
password for port-access … 2-12, 2-21
port, supplicant … 13-15
port-based
access … 13-2
client without authentication … 13-4
effect of Web/MAC auth operation … 13-12
enable … 13-18, 13-50
latest client, effect … 13-3
multiple client access … 13-4
multiple clients authenticating … 13-3
no client limit … 13-2
not recommended … 10-18
open port … 13-2
operation … 13-3
recommended use … 13-3
return to … 13-19
single client authenticates … 13-3
tagged VLAN membership … 13-3
unauthorized client risk … 13-4
untagged VLAN membership … 13-3, 13-33
with Web/MAC authentication … 13-4
user-based.
port-security … 13-46
port-security use … 13-4
port-security, with 802.1X … 13-49
priority of VLAN, per-port … 13-9, 13-33
PVID … 13-66
quiet-period … 13-22
RADIUS … 13-1
effect on VLAN operation … 13-69, 13-70
host IP address … 13-25
VLAN assignment … 13-39
rate-limit override … 13-64
reauthenticate … 13-27
reauth-period … 13-23
rules of operation … 13-11
security credentials saved to configuration
server-timeout … 13-22
show commands … 13-55
show commands, supplicant … 13-68
statistics … 13-55
supplicant
client not using … 13-37
configuring switch port … 13-53
enabling switch port … 13-53
identity option … 13-53
secret … 13-53
switch port operating as … 13-51
supplicant state … 13-68
supplicant statistics, note … 13-68
supplicant, configuring … 13-51
supplicant-timeout … 13-22
terminology … 13-4
traffic flow on unathenticated ports … 13-28
troubleshooting, gvrp … 13-69, 13-70, 13-71
trunked port blocked … 13-12
tx-period … 13-22
unauthenticated port … 13-27
unauthorized … 13-21
unauthorized-Client VLAN … 13-23
unauthorized-client VLAN
unauthorized-Client VLAN, multiple
unauth-period … 13-23
unauth-period command … 13-36
unauth-vid … 13-23
use model, open VLAN mode … 13-33
used with port-security … 13-49
user-based
access … 13-3
authentication … 13-9
client authentication … 13-3
client limit … 13-2, 13-3, 13-50
client-limit, enable … 13-19
clients use same VLAN … 13-32
convert to port-based … 13-20
enable … 13-18, 13-50
limit … 13-2
limit for web auth, MAC auth … 13-19
tagged VLAN … 13-3
VLAN … 13-41, 13-42
Web/MAC authenticated clients … 13-3
port-based.
user-based vs. port-based … 13-15
VLAN
authorized-client … 13-38, 13-39, 13-40
guest … 13-39
RADIUS assigned, effect … 13-41
RADIUS override … 13-38
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......