R211x-HP Flexfabric 11900 Security Configuration Guide
279
client device configuration, 182
security SSH application, 169
sec
urity SSH configuration, 202
sec
urity SSH file transfer with password
authentication, 203
sec
ure shell. Use SSH
sec
urity
802.1X access control method, 71
8
02.1X authentication configuration, 76
8
02.1X authentication request max number
attempts, 72
8
02.1X authentication server timeout timer, 72
8
02.1X authentication trigger function, 73
8
02.1X EAP relay enable, 70
8
02.1X EAP termination enable, 70
8
02.1X enable, 70
8
02.1X mandatory port authentication
domain, 74
8
02.1X online user handshake function, 73
8
02.1X overview, 61
8
02.1X periodic online user
re-authentication, 75
8
02.1X port authorization state, 71
8
02.1X port max number users, 71
AAA co
nfiguration, 1, 17
AAA de
vice implementation, 11
AAA HW
TACACS implementation, 7
AAA HW
TACACS scheme, 32
AAA HW
TACACS scheme configuration, 31
AAA HW
TACACS server SSH user AAA, 46
AAA I
SP domain accounting methods
configuration, 44
AAA I
SP domain attribute configuration, 42
AAA I
SP domain authentication methods
configuration, 42
AAA I
SP domain authorization methods, 43
AAA I
SP domain creation, 41
AAA I
SP domain methods configuration, 41
AAA LD
AP implementation, 9
AAA LD
AP scheme configuration, 38
AAA
LDAP server SSH user authentication, 53
AAA l
ocal user configuration, 18
AAA max co
ncurrent logins, 46
AAA
MPLS L3VPN implementation, 13
AAA R
ADIUS attributes, 14
AAA R
ADIUS implementation, 2
AAA
RADIUS information exchange security
mechanism, 2
AAA
RADIUS scheme configuration, 23
AAA
RADIUS security policy server IP address
configuration, 30
AAA
RADIUS server SSH user
authentication+authorization, 50
AAA
RADIUS session-control feature, 45
AAA s
cheme configuration, 18
AAA S
SH user local authentication+HWTACACS
authorization+RADIUS accounting, 48
A
RP active acknowledgement, 222
AR
P attack protection (unresolvable IP attack), 217
ARP a
utomatic scanning, 229
ARP bla
ckhole routing, 217
AR
P detection configuration, 225
ARP f
iltering, 231, 232
A
RP gateway protection, 230, 231
AR
P packet rate limit configuration, 219
ARP p
acket source MAC consistency check, 222
AR
P packet validity check, 226
AR
P restricted forwarding, 227
AR
P source MAC-based attack detection, 219, 221
A
RP source suppression, 217
AR
P unresolvable IP attack protection, 218
A
RP user validity check configuration, 226
AR
P user/packet validity check, 228
assoc
iation. See SA
a
uthorized ARP (DHCP relay agent), 224
a
uthorized ARP (DHCP server), 223
au
thorized ARP configuration, 222
c
rypto engine configuration, 239
c
rypto engine hardware configuration, 239
displa
ying 802.1X, 75
di
splaying AAA, 46
displa
ying ARP detection, 227
d
isplaying crypto engine, 240
displa
ying IPsec IKE, 16 0
displa
ying MAC authentication, 83
displa
ying password control, 113
displa
ying public key, 122
displa
ying SSH, 183
displa
ying SSH SFTP help information, 181
displa
ying uRPF, 238
e
xpired password login, 107










