Numerics – HP 2800 User Manual

Page 293

Advertising
background image

Numerics

3DES … 6-3, 7-3
802.1X

See port-based access control. … 8-1

A

aaa authentication … 4-8
aaa port-access

See

Web or MAC Authentication.

access levels, authorized IP managers … 11-3
accounting

See RADIUS.

address

authorized for port security … 9-3

applicable switches … 1-2
authentication

See TACACS.

authorized addresses

for IP management security … 11-4
for port security … 9-3

authorized IP managers

access levels … 11-3
building IP masks … 11-9
configuring in browser interface … 11-7, 11-9
configuring in console … 11-5
definitions of single and multiple … 11-4
effect of duplicate IP addresses … 11-13
IP mask for multiple stations … 11-11
IP mask for single station … 11-9
IP mask operation … 11-4
operating notes … 11-13
overview … 11-1
precedence over other security … 11-2
troubleshooting … 11-13

certificate

CA-signed … 7-4
root … 7-4
self-signed … 7-4

Clear button

to delete password protection … 2-5

configuration

port security … 9-5
RADIUS

See RADIUS.

SSH

See SSH.

connection inactivity time … 2-3
console, for configuring

authorized IP managers … 11-5

D

DES … 6-3, 7-3
disclaimer … 1-ii
duplicate IP address

effect on authorized IP managers … 11-13

E

event log

intrusion alerts … 9-35

F

filter, source-port

applicable models … 10-2
configuring … 10-5
editing … 10-9
filter indexing … 10-8
filter type … 10-7
idx … 10-7,
10-8
index … 10-7, 10-8
multinetted VLAN … 10-3
operating rules … 10-4
operation … 10-2
port-trunk operation … 10-2, 10-6
show … 10-7
value … 10-7
viewing … 10-7

G

GVRP, static VLAN not advertised … 8-47

I

inconsistent value, message … 9-14
intrusion alarms

entries dropped from log … 9-36
event log … 9-35
prior to … 9-36

Intrusion Log

prior to … 9-31, 9-34

Index – 1

C

Advertising
This manual is related to the following products: