Index – 1
Numerics
3DES … 6-3, 7-3
802.1X
See
port-based access control.
… 8-1
802.1X access control
authentication methods … 8-4
authentication, client-based … 8-4
authenticator … 8-17
client-based
access … 8-4
See also
port based
client authentication … 8-4
client limit … 8-4, 8-41
client-limit, enable … 8-18
clients use same VLAN … 8-27
convert to port-based … 8-19
enable … 8-18, 8-42
limit … 8-4
tagged VLAN … 8-4
VLAN … 8-33
client-based vs. port-based … 8-14
client-limit, no … 8-19
control all clients … 8-13
convert to port-based … 8-19
displaying 802.1X port configuration … 8-49
multiple clients, same VLAN … 8-4
open port … 8-4
open VLAN
status … 8-49
overview … 8-3
port-based
enable … 8-42
return to … 8-18
See also
client-based.
unauthorized client risk … 8-5
port-security use … 8-5
RADIUS … 8-3
unauthorized-Client VLAN, multiple
clients … 8-33
VLAN
unauthorized-client different ports … 8-34
unauthorized-client, best use … 8-33
untagged … 8-27
untagged membership … 8-19
802.1x access control
authenticate users … 8-5
authenticator … 8-18
unblock port … 8-5
authorized-client VLAN, defined … 8-7
auth-vid … 8-22
auto … 8-20
clear-statistics … 8-25
control command … 8-20
EAPOL … 8-8
force authorized … 8-20
force unauthorized … 8-20
guest VLAN … 8-7, 8-8
initialize … 8-25
logoff-period … 8-22
max-requests … 8-21
MD5 … 8-7
port-based
access … 8-4
client without authentication … 8-5
enable … 8-18
latest client, effect … 8-5
multiple client access … 8-5
multiple clients authenticating … 8-5
no client limit … 8-4
open port … 8-4
operation … 8-5
recommended use … 8-5
single client authenticates … 8-5
tagged VLAN membership … 8-5
untagged VLAN membership … 8-5, 8-27
quiet-period … 8-21
reauthenticate … 8-25
reauth-period … 8-22
server-timeout … 8-21
supplicant-timeout … 8-21
terminology … 8-7
tx-period … 8-21
unauthorized … 8-20
Index
Содержание ProCurve 2510-24
Страница 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Страница 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Страница 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 316: ...8 Index ...
Страница 317: ......