R3303-HP 6600/HSR6600 Routers Security Configuration Guide

576
Configuring the online user handshake function,92
Configuring the quiet timer,95
C
onfiguring the redirect URL,107
C
onfiguring unresolvable IP attack protection,512
C
onfiguring URPF on an interface,535
C
onfiguring Web filtering,471
C
onnection limit configuration example,465
C
onnection limit configuration task list,464
Co
ntacting HP,572
C
ontrolled/uncontrolled port and port authorization
status,74
C
ontrolling access of portal users,132
Co
nventions,573
Cr
eating a connection limit policy,464
Cr
eating a local asymmetric key pair,217
Cr
eating a user profile,198
D
D
estroying a local asymmetric key pair,219
De
stroying the local RSA key pair,238
Disa
bling next payload field checking,305
Displa
ying and maintaining 802.1X,99
Dis
playing and maintaining AAA,54
Displa
ying and maintaining attack detection and
protection,492
Displa
ying and maintaining connection limiting,465
Displa
ying and maintaining EAD fast deployment,107
Displa
ying and maintaining FIPS,539
Displa
ying and maintaining IKE,305
Displa
ying and maintaining IP source guard,505
Displa
ying and maintaining IPsec,278
Displa
ying and maintaining MAC authentication,115
Displa
ying and maintaining password control,207
Displa
ying and maintaining PKI,239
Displa
ying and maintaining port security,186
Displa
ying and maintaining portal,14 4
Displa
ying and maintaining session management,462
Displa
ying and maintaining SSH,332
Displa
ying and maintaining SSL,356
Displa
ying and maintaining TCP attack protection,501
Displa
ying and maintaining user profile,199
Displa
ying and maintaining Web filtering,473
Displa
ying and recording the host public key
information,218
Displa
ying or exporting the local host public key,217
Displa
ying public keys,221
Displa
ying the host public key in a specific format and
saving it to a file,218
Dy
namic IPv4 source guard by DHCP relay
configuration example,509
Dy
namic IPv4 source guard by DHCP snooping
configuration example,508
E
E
AD fast deployment configuration example,108
Ena
bling 802.1X,88
Ena
bling a user profile,199
Ena
bling ALG,453
Ena
bling EAP relay or EAP termination,89
Ena
bling FIPS mode,539
Ena
bling Layer 3 portal authentication,131
Ena
bling password control,203
Ena
bling port security,180
Ena
bling protection against Naptha attacks,501
Ena
bling source MAC consistency check for ND
packets,531
E
nabling the periodic online user re-authentication
function,95
Ena
bling the proxy detection function,93
Ena
bling the SYN Cookie feature,500
Ena
bling traffic statistics on an interface,492
Expor
ting an RSA key pair,219
Expor
ting an RSA key pair
To copy a local RSA key pair to another device, you
must export the RSA key pair on the local device and
then import it to the target router. For information about
importing an RSA key pair, see "Importing an RSA key
pair."
To export an RSA key pair:
Step
Command
Remarks
Enter system view.
system-view
N/A
Export an RSA key pair in PEM format.
public-key local export rsa name key-name pem
{ 3des-cbc | aes-cbc-128 | aes-cbc-192 | aes-cbc-256
| des-cbc } password