Index – 1
Numerics
3DES … 6-3, 7-3
802.1X
See
port-based access control.
… 8-1
802.1X access control
authentication methods … 8-4
authentication, client-based … 8-4
authenticator … 8-17
client-based
access … 8-4
See also
port based
client authentication … 8-4
client limit … 8-3, 8-4, 8-41
client-limit, enable … 8-18
clients use same VLAN … 8-27
convert to port-based … 8-19
enable … 8-18, 8-42
limit … 8-4
tagged VLAN … 8-4
VLAN … 8-33
client-based vs. port-based … 8-14
client-limit, no … 8-19
control all clients … 8-13
convert to port-based … 8-19
displaying 802.1X port configuration … 8-49
multiple clients, same VLAN … 8-4
open port … 8-4
open VLAN
status … 8-49
overview … 8-3
port-based
enable … 8-42
return to … 8-18
See also
client-based.
unauthorized client risk … 8-5
port-security use … 8-5
RADIUS … 8-3
unauthorized-Client VLAN, multiple
clients … 8-33
VLAN
unauthorized-client, best use … 8-33
untagged … 8-27
untagged membership … 8-19
802.1x access control
authenticate users … 8-5
authenticator … 8-18
unblock port … 8-5
authorized-client VLAN, defined … 8-7
auth-vid … 8-22
auto … 8-20
clear-statistics … 8-25
control command … 8-20
EAPOL … 8-8
force authorized … 8-20
force unauthorized … 8-20
guest VLAN … 8-7, 8-8
initialize … 8-25
logoff-period … 8-22
max-requests … 8-21
MD5 … 8-7
port-based
access … 8-4
client without authentication … 8-5
enable … 8-18
latest client, effect … 8-5
multiple client access … 8-5
multiple clients authenticating … 8-5
no client limit … 8-4
open port … 8-4
operation … 8-5
recommended use … 8-5
single client authenticates … 8-5
tagged VLAN membership … 8-5
untagged VLAN membership … 8-5, 8-27
quiet-period … 8-21
reauthenticate … 8-25
reauth-period … 8-22
server-timeout … 8-21
supplicant-timeout … 8-21
terminology … 8-7
tx-period … 8-21
unauthorized … 8-20
unauthorized-client VLAN, defined … 8-8
unauth-vid … 8-22
VLAN
unauthorized-client, on different
ports … 8-34
untagged … 8-27
VLAN use, multiple clients … 8-7
A
aaa authentication … 4-8
privilege-mode … 4-15
privilege-mode defined … 4-12
Index
Содержание ProCurve 2510G Series
Страница 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Страница 12: ...x ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Страница 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Страница 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 318: ...8 Index ...
Страница 319: ......