HP (Hewlett-Packard) 2600 Switch User Manual


 
block traffic 8-3
blocking non-802.1X device … 8-33
CHAP … 8-3
chap-radius … 8-19
configuration commands … 8-15
configuration overview … 8-13
configuration, displaying … 8-38
configuring method … 8-19
counters … 8-38
EAP … 8-3
EAPOL … 8-9
eap-radius … 8-19
enabling on ports … 8-15
enabling on switch … 8-20
features … 8-3
general setup … 8-12
GVRP effect … 8-47
LACP not allowed … 8-48
local … 8-19
local username and password … 8-4
MD5…8-8
messages … 8-48
open VLAN
authorized client … 8-22
configuration … 8-28, 8-30
general operation … 8-21
mode … 8-21
operating notes … 8-31
operating rules … 8-25
PVID, no … 8-40
security breach … 8-31
set up … 8-27
status, viewing … 8-40
suspended VLAN … 8-41
unauthorized client … 8-22
use models … 8-22
VLAN, after authentication 8-22, 8-26,
8-31
VLAN, tagged … 8-21, 8-22, 8-23, 8-26, 8-31,
8-42
operation … 8-6
overview … 8-3
port-security, with 802.1X … 8-32
RADIUS … 8-3
RADIUS host IP address … 8-20
rules of operation … 8-10
show commands … 8-38
show commands, supplicant … 8-43
statistics … 8-38
supplicant operation … 8-8
supplicant operation, switch-port … 8-7
supplicant state … 8-43
supplicant statistics, note … 8-43
supplicant, configuring … 8-34
supplicant, configuring switch port … 8-36
supplicant, enabling … 8-35
switch username and password … 8-4
terminology … 8-8
troubleshooting, gvrp … 8-44
used with port-security … 8-32
VLAN operation … 8-44
prior to … 9-31, 9-34, 9-36
Privacy Enhanced Mode (PEM)
See SSH.
proxy
web server … 9-36
Q
quick start … 1-11
R
RADIUS
accounting … 5-2, 5-17
accounting, configuration outline 5-19
accounting, configure server access 5-20
accounting, configure types on switch … 5-22
accounting, exec … 5-18, 5-22
accounting, interim updating … 5-24
accounting, network … 5-22
accounting, operating rules … 5-19
accounting, server failure … 5-19
accounting, session-blocking … 5-24
accounting, start-stop method … 5-23
accounting, statistics terms … 5-26
accounting, stop-only method … 5-23
accounting, system … 5-18, 5-22
authentication options … 5-2
authentication, local … 5-16
authorized IP managers, precedence … 11-2
bypass RADIUS server … 5-9
commands, accounting … 5-17
commands, switch … 5-6
configuration outline … 5-6
configure server access … 5-10
Index – 3