vii
7 Configuring Secure Socket Layer (SSL)
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
Prerequisite for Using SSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5
Steps for Configuring and Using SSL for
Switch and Client Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5
General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6
1. Assign Local Login (Operator) and Enable (Manager) Password . 7-7
2. Generate the Switch’s Server Host Certificate . . . . . . . . . . . . . . . . . 7-9
3. Enable SSL on the Switch and Anticipate SSL
Browser Contact Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-17
Common Errors in SSL Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-21
8 Configuring Port-Based and Client-Based Access Control
(802.1X)
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3
Why Use Port-Based or Client-Based Access Control? . . . . . . . . . . . . 8-3
General Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3
User Authentication Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-7
General 802.1X Authenticator Operation . . . . . . . . . . . . . . . . . . . . . . . . . . 8-10
Example of the Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . 8-10
Switch-Port Supplicant Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-11
General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-12
General Setup Procedure for 802.1X Access Control . . . . . . . . . . . . . . . . 8-14
Do These Steps Before You Configure 802.1X Operation . . . . . . . . . 8-14
Overview: Configuring 802.1X Authentication on the Switch . . . . . . 8-15
Configuring Switch Ports as 802.1X Authenticators . . . . . . . . . . . . . . . . . 8-17
1. Enable 802.1X Authentication on Selected Ports . . . . . . . . . . . . . . 8-17
2. Reconfigure Settings for Port-Access . . . . . . . . . . . . . . . . . . . . . . . . 8-20
3. Configure the 802.1X Authentication Method . . . . . . . . . . . . . . . . . 8-23
4. Enter the RADIUS Host IP Address(es) . . . . . . . . . . . . . . . . . . . . . . 8-24
5. Enable 802.1X Authentication on the Switch . . . . . . . . . . . . . . . . . 8-24
Содержание ProCurve 2510G Series
Страница 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Страница 12: ...x ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Страница 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Страница 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 318: ...8 Index ...
Страница 319: ......