. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-3
Operating Rules for Source-Port Filters . . . . . . . . . . . . . . . . . . . . . 9-4
Operating Rules for Named Source-Port Filters . . . . . . . . . . . . . . 9-6
Defining and Configuring Named Source-Port Filters . . . . . . . . . 9-7
Viewing a Named Source-Port Filter . . . . . . . . . . . . . . . . . . . . . . . . 9-8
Using Named Source-Port Filters . . . . . . . . . . . . . . . . . . . . . . . . . . 9-9
Configuring Traffic/Security Filters
. . . . . . . . . . . . . . . . . . . . . . . . . . . 9-17
Configuring a Source-Port Traffic Filter . . . . . . . . . . . . . . . . . . . . . . . 9-18
Example of Creating a Source-Port Filter . . . . . . . . . . . . . . . . . . . 9-19
Configuring a Filter on a Port Trunk . . . . . . . . . . . . . . . . . . . . . . . 9-19
Configuring a Multicast or Protocol Traffic Filter . . . . . . . . . . . . . . . 9-21
Displaying Traffic/Security Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-23
Client-Based Access Control (802.1X)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-1
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-3
Why Use Port-Based or Client-Based Access Control? . . . . . . . . . . . 10-3
User Authentication Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-4
802.1X Client-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . 10-4
802.1X Port-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . 10-5
Alternative To Using a RADIUS Server . . . . . . . . . . . . . . . . . . . . . 10-6
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-6
x
Содержание J8697A
Страница 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Страница 2: ......
Страница 22: ...Product Documentation Feature Index xx ...
Страница 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Страница 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Страница 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Страница 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Страница 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Страница 230: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup This page is intentionally unused 8 22 ...
Страница 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Страница 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Страница 388: ...10 Index ...
Страница 389: ......