Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 2513
    							6 
    No. Attribute No.  Attribute 
    27 Session-Timeout  74 ARAP-Security-Data 
    28 Idle-Timeout  75  Password-Retry 
    29 Termination-Action 76  Prompt 
    30 Called-Station-Id 77  Connect-Info 
    31 Calling-Station-Id  78  Configuration-Token 
    32 NAS-Identifier  79  EAP-Message 
    33 Proxy-State 80  Message-Authenticator 
    34 Login-LAT-Service  81  Tunnel-Private-Group-id 
    35 Login-LAT-Node  82  Tunnel-Assignment-id 
    36 Login-LAT-Group 83  Tunnel-Preference 
    37 Framed-AppleTalk-Link  84  ARAP-Challenge-Response 
    38 Framed-AppleTalk-Network 85 Acct-Interim-Interval 
    39 Framed-AppleTalk-Zone  86  Acct-Tunnel-Packets-Lost 
    40 Acct-Status-Type 87  NAS-Port-Id 
    41 Acct-Delay-Time  88  Framed-Pool 
    42 Acct-Input-Octets  89  (unassigned) 
    43 Acct-Output-Octets 90  Tunnel-Client-Auth-id 
    44 Acct-Session-Id  91  Tunnel-Server-Auth-id 
     
    Extended RADIUS attributes 
    The RADIUS protocol features excellent extensibility. Attribute 26 (Vendor-Specific), an attribute defined 
    by RFC 2865, allows a vendor to define extended attributes to implement functions that the standard 
    RADIUS protocol does not provide.  
    A vendor can encapsulate multiple sub-attributes in the type-length-value (TLV) format in RADIUS packets 
    for extension of applications. As shown in  Figure 5, a sub-at
     tribute encapsulated  in Attribute 26 consists 
    of the following parts: 
    •   Vendor-I D —Indicates the ID of the vendor. Its most significant byte is 0, and the other three bytes 
    contains a code that is compliant to RFC 1700.  For more information about the proprietary RADIUS 
    sub-attributes of HP, see  HP proprietary RADIUS sub-attributes . 
    •   Ve
    
    ndor-Type —Indicates the type of the sub-attribute.  
    •   Vendor-Length—Indicates the length of the sub-attribute.  
    •   Vendor-Data —Indicates the contents  of the sub-attribute.   
    						
    							7 
    Figure 5 Segment of a RADIUS packet cont aining an extended attribute 
     
     
    HWTACACS 
    HW Terminal Access Controller Access Control System (HWTACACS) is an enhanced security protocol 
    based on TACACS (RFC 1492). Similar to RADIUS, it uses a client/server model for information 
    exchange between the NAS and the HWTACACS server.  
    HWTACACS typically provides AAA services for Point-to -Point Protocol (PPP) users, Virtual Private Dial-up 
    Network (VPDN) users, and terminal users. In a typical HWTACACS scenario, some terminal users log 
    in to the NAS for operations. Working as the HWTACACS client, the NAS sends the usernames and 
    passwords of the users to the HWTACACS sever for authentication. After passing authentication and 
    being authorized, the users log in to the switch and performs operations, and the HWTACACS server 
    records the operations that each user performs. 
    Differences between HWTACACS and RADIUS 
    HWTACACS and RADIUS both provide authentication, authorization, and accounting services. They 
    have many features in common, such as using a client/server model, using shared keys for user 
    information security, and providing flexibility and extensibility. 
    Table 3  Primary differences between HWTACACS and RADIUS 
    HWTACACS RADIUS
     
    Uses TCP, providing more reliable network 
    transmission.  Uses UDP, providing high
    er transport efficiency. 
    Encrypts the entire packet except for the HWTACACS 
    header.  Encrypts only the user password field in an 
    authentication packet. 
    Protocol packets are complicated and authorization is 
    independent of authentication. Authentication and 
    authorization can be deployed on different 
    HWTACACS servers. Protocol packets are simple and the authorization 
    process is combined with the authentication process.
     
    Supports authorization of configuration commands. 
    Which commands a user can use depends on both the 
    user level and the AAA authorization. A user can use 
    only commands that are at, or lower than, the user 
    level and authorized by the HWTACACS server. Does not support authorization of configuration 
    commands. Which commands 
    a user can use solely 
    depends on the level of the user. A user can use all the 
    commands at, or lower than, the user level. 
     
    Basic HWTACACS message exchange process 
    The following example describes how HWTACACS performs user authentication, authorization, and 
    accounting for a Telnet user. 
    TypeLength
    0Vendor-ID
    71
    5 31
    Vendor-ID (continued)Vendor-Type Vendor-Length  
    Vendor-Data
    (Specified attribute value ……) 23
    …… 
    						
    							8 
    Figure 6 Basic HWTACACS message exchange  process for a Telnet user 
     
     
    HWTACACS operates in the following manner: 
    1. A Telnet user sends an access request to the HWTACACS client.  
    2. Upon receiving the request, th e HWTACACS client sends a star t-authentication packet to the 
    HWTACACS server. 
    3.  The HWTACACS server sends back an authentication response to re quest the username.  
    4. Upon receiving the response, the HWTACACS client asks the user for the username. 
    5. The user enters the username. 
    6. After receiving the username from the user, the HWTACACS client sends the server a 
    continue-authentication packet that carries the username.  
    7. The HWTACACS server sends back an authenticati on response, requesting the login password.  
    8. Upon receipt of the response,  the HWTACACS client asks the user for the login password.  
    Host HWTACACS client HWTACACS server
    1) The user logs in 2) Start-authentication packet
    3) Authentication response requesting the username
    4) Request for username
    5) The user inputs the username 6) Authentication continuance packet with the 
    username
    7) Authentication response requesting the login  password
    8) Request for password
    9) The user inputs the password
    11) Authentication response indicating successful authentication
    12) User authorization request packet
    13) Authorization response indicating successful  authorization
    14) The user logs in successfully
    15) Start-accounting request
    16) Accounting response indicating the start of  accounting
    17) The user logs off
    18) Stop-accounting request
    19) Stop-accounting response
    10) Authentication cont
    inuance packet with the 
    login password 
    						
    							9 
    9.
     
    The user enters the password. 
    10.  After receiving the login password, the HWTACACS client sends the HWTACACS server a 
    continue-authentication packet th at carries the login password. 
    11. The HWTACACS server sends back an authenticati on response to indicate that the user has 
    passed authentication. 
    12.  The HWTACACS client sends the user authoriz ation request packet to the HWTACACS server. 
    13. The HWTACACS server sends back the authorizatio n response, indicating that the user is now 
    authorized. 
    14.  Knowing that the user is now authorized, the HWTA CACS client pushes its configuration interface 
    to the user. 
    15.  The HWTACACS client sends a start-accounting request to the HWTACACS server. 
    16. The HWTACACS server sends back an accounting re sponse, indicating that it has received the 
    start-accounting request. 
    17.  The user logs off. 
    18. The HWTACACS client sends a stop-accounting request to the HWTACACS server. 
    19. The HWTACACS server sends back a stop-acc ounting response, indicating that the 
    stop-accounting request has been received. 
    Domain-based user management 
    A NAS manages users based on Internet service provid er (ISP) domains. On a NAS, each user belongs 
    to one ISP domain. A NAS determines the ISP domain  a user belongs to by the username entered by the 
    user at login, as shown in  Figure 7. 
    Figure 7  Det
    
    ermining the ISP domain of a user by the username 
     
     
    The authentication, authorization, and accounting of a user depends on the AAA methods configured for 
    the domain to which the user belongs. If no specific AAA methods are configured for the domain, the 
    default methods are used. By default, a domain uses  local authentication, local authorization, and local 
    accounting. 
    AAA allows you to manage users based on their access types:  
    •   LAN users —Users on a LAN who must pass 802.1X or MAC address authentication to access the 
    network. 
    •   Login users —Users who want to log in to the switch, including SSH users, Telnet users, Web users, 
    FTP users, and terminal users. 
    Username contains  @ domain-name ?A user enters the username in 
    the form of
    userid@ domain-name
     or  useridUse the AAA methods and 
    attributes of domain 
    domain-name  for the user
    Use the AAA methods and attributes 
    of the default domain for the user Yes
    No
    NAS 
    						
    							10 
    •  Po r t a l  u s e r s —Users who must pass portal authentication to access the network. 
    In addition, AAA provides the following services for login users to enhance switch security: 
    •   Command authorization —Enables the NAS to defer to the authorization server to determine 
    whether a command entered by a login user is permitted for the user, making sure that login users 
    execute only commands they are authorized to execute. For more information about command 
    authorization, see  Fundamentals Configuration Guide.   
    •   Command accounting —Allows the accounting server to record all commands executed on the 
    switch or all authorized commands successfully executed. For more information about command 
    accounting, see  Fundamentals Configuration Guide.  
    •   Level switching authentication —Allows the authentication server to authenticate users who perform 
    privilege level switching. As long as passing level switching authentication, users can switch their 
    user privilege levels, without logging out an d disconnecting current connections. For more 
    information about user privilege level switching, see  Fundamentals Configuration Guide. 
    You can configure different authentication, authorizat ion, and accounting methods for different types of 
    users in a domain. See  Configuring AAA methods for ISP domains .
      
    RADIUS server feature of the switch 
    G eneral ly, the R A D I US ser ver  ru ns  on a c omputer  or  workstation, and t he  R A D I US cl ient ru ns  on a NAS. 
    A network device that supports the RADIUS server feature can also serve as the RADIUS server, working 
    with RADIUS clients to implement user authentication, authorization, and accounting. As shown in  Figure 
    8 , the R
    
    ADIUS server and client can reside on the same switch or different switches.  
    Using a network device as the RADIUS server simplifi es networking and reduces deployment costs. This 
    implementation is usually deployed on networks by using the clustering feature. In such a scenario, 
    configure the RADIUS server feature on a management device at the distribution layer, so that the device 
    functions as a RADIUS server to cooperate with clus ter member switches at the access layer to provide 
    user authentication and authorization services. 
    Figure 8  Devices functioning as a RADIUS server 
     
     
    The switch can serve as a RADIUS server to provide the following functions: 
    •  User information management 
    You can create, modify, and delete user informatio n, including the username, password, authority, 
    lifetime, and user  description.  
    •   RADIUS client information management 
    NASRADIUS serverRADIUS server
    NAS/
    IP network
    IP network 
    						
    							11 
    You can create and delete RADIUS clients, which are identified by IP addresses and configured 
    with attributes such as a shared key. With a ma naged client range configured, the RADIUS server 
    processes only the RADIUS packets from the clie nts within the management range. A shared key 
    is used to ensure secure co mmunication between a RADIUS cl ient and the RADIUS server.  
    •   RADIUS authentication and authorization 
    With the RADIUS server enabled, the switch checks whether or not the client of an incoming RADIUS 
    packet is under its management. If yes, it verifies the packet validity by using the shared key, checks 
    whether there is an account with the username, whether the password is correct, and whether the user 
    attributes meet the requirements defined on the RADIUS server (for example, whether the account has 
    expired). Then, the RADIUS server assigns the corresponding authority to the client if the authentication 
    succeeds, or denies the client if the authentication fails.  
     
      NOTE: 
    A RADIUS server running the standar d RADIUS protocol listens on UDP port 1812 for authentication 
    requests, but an HP switch listens on  UDP port 1645 instead when actin
    g as the R ADI U S ser ver . Be su r e to
    specify 1645 as the authentication port number on th e RADIUS client when you use an HP switch as the
     
    RADIUS server.  
    AAA for MPLS L3VPNs (available only on the HP 5500 EI) 
    In an MPLS L3VPN scenario where clients in different VPNs are centrally authenticated, you can deploy 
    AAA across VPNs to enable forwarding RADIUS and HWTACACS packets across MPLS VPNs. With the 
    AAA across VPNs feature, the PE at the left side of the MPLS backbone serves as a NAS and 
    transparently delivers the AAA packets of private users in VPN 1 and VPN 2 to the AAA servers in VPN 
    3 for centralized authentication, as shown in Figure 9. A
    uthentication packets of private users in different 
    VPNs do not affect each other. 
    Figure 9  Network diagram 
     
     
     NOTE: 
    This feature can also help an MCE to implement po rtal authentication for VPNs. For more information 
    about MCE, see 
    Layer 3 - IP Routing Configuration Guide.   
    Protocols and standards 
    The following protocols and  standards are related to AAA, RADIUS, and HWTACACS: 
    P
    MPLS backbone
    PE PE
    CE
    CE CE
    VPN 1
    VPN 2 VPN 3
    RADIUS server
    HWTACACS  server
    NAS
    Host
    Host 
    						
    							12 
    •  RFC 2865,  Remote Authentication Dial In User Service (RADIUS)  
    •   RFC 2866,  RADIUS Accounting  
    •   RFC 2867,  RADIUS Accounting Modifications for Tunnel Protocol Support 
    •   RFC 2868,  RADIUS Attributes for Tunnel Protocol Support  
    •   RFC 2869,  RADIUS Extensions 
    •   RFC 1492,  An Access Control Protocol, Sometimes Called TACACS  
    RADIUS attributes 
    Commonly used standard RADIUS attributes 
     
    No. Attribute  Description 
    1  User-Name  Name of the user to be authenticated. 
    2 User-Password User password for PAP authentication, present only in Access-Request packets in 
    PAP authentication mode. 
    3 CHAP-Password Digest of the user password for CHAP
     authentication, present only in 
    Access-Request packets in CHAP authentication mode. 
    4 NAS-IP-Address  IP address for the server to identify a client. Usually, a client is identified by the IP 
    address of the access interface on the NAS, namely the NAS IP address. This 
    attribute is present in on
    ly Access-Request packets. 
    5  NAS-Port  Physical port of the NAS that the user accesses. 
    6  Service-Type  Type of service that the user has requested or type of service to be provided. 
    7  Framed-Protocol  Encapsulation protocol for framed access. 
    8  Framed-IP-Address  IP address assigned to the user. 
    11  Filter-ID Name of the filter list. 
    12 Framed-MTU  Maximum transmission unit (MTU) for th
    e data link between the user and NAS. 
    For example, with 802.1X EAP authentica tion, NAS uses this attribute to notify 
    the server of the MTU for EAP packets,  so as to avoid oversized EAP packets. 
    14  Login-IP-Host  IP address of the NA S interface that the user accesses. 
    15  Login-Service  Type of the service that the user uses for login. 
    18 Reply-Message Text to be displayed to the user, which ca
    n be used by the server to indicate, for 
    example, the reason of the authentication failure. 
    26 Vendor-Specific  Vendor specific attribute. A packet ca
    n contain one or more such proprietary 
    attributes, each of which can co ntain one or more sub-attributes. 
    27 Session-Timeout Maximum duration of service to be provid
    ed to the user before termination of the 
    session. 
    28  Idle-Timeout  Maximum idle time permitted  for the user before termination of the session. 
    31 Calling-Station-Id User identification that the NAS sends 
    to the server. For the LAN access service 
    provided by an HP device, this attribut e carries the MAC address of the user in 
    the format HHHH-HHHH-HHHH.  
    32 NAS-Identifier  Identification that the NAS uses for indicating itself.  
    						
    							13 
    No. Attribute  Description 
    40 Acct-Status-Type Type of the Accounting-Request packe
    t. Possible values are as follows: 
    • 1 —Start. 
    • 2 —Stop. 
    • 3 —Interim-Update. 
    • 4 —Reset-Charge. 
    • 7 —Accounting-On. (Defined in 3GPP, the 3rd Generation Partnership 
    Project.) 
    •  8 —Accounting-Off. (Defined in 3GPP.) 
    • 9 to 14 —Reserved for tunnel accounting. 
    • 15 —Reserved for failed. 
    45 Acct-Authentic  Authentication method used by the use
    r. Possible values are as follows: • 1 —RADIUS. 
    • 2 —Local. 
    • 3 —Remote. 
    60 CHAP-Challenge  CHAP challenge generated by the NAS for MD5 calculation during CHAP 
    authentication. 
    61 NAS-Port-Type Type of the physical port of the NAS that is authenticating the user. Possible 
    values are as follows: 
    •
     15 —Ethernet. 
    • 16 —Any type of ADSL. 
    • 17 —Cable (with cable for cable TV). 
    • 201—VLAN. 
    • 202—ATM. 
    I f  t h e  p o r t  i s  a n  A T M  o r  E t h e r n e t  o n e   and VLANs are implemented on it, the value 
    of this attribute is 201. 
    79 EAP-Message  Used for encapsulating EAP packets to allow the NAS to authenticate dial-in 
    users via EAP without having to
     understand the EAP protocol. 
    80 Message-Authentic
    ator  Used for authentication and checking of authentication packets to prevent 
    spoofing Access-Requests. This attribut
    e is used when RADIUS supports EAP 
    authentication. 
    87  NAS-Port-Id  String for describing the port  of the NAS that is authenticating the user. 
     
    HP proprietary RADIUS sub-attributes 
     
    No. Sub-attribute Description 
    1  Input-Peak-Rate  Peak rate in the direction from the user to the NAS, in bps. 
    2  Input-Average-Rate  Average rate in the direction from the user to the NAS, in bps. 
    3  Input-Basic-Rate  Basic rate in the direction from the user to the NAS, in bps. 
    4  Output-Peak-Rate Peak rate in the direction from the NAS to the user, in bps. 
    5  Output-Average-Rate  Average rate in the di rection from the NAS to the user, in bps. 
    6  Output-Basic-Rate Basic rate in the direction from the NAS to the user, in bps. 
    15 Remanent_Volume  Remaining, available total traffic of 
    the connection, in different units for 
    different server types.  
    						
    							14 
    No. Sub-attribute Description 
    20 Command  Operation for the session, used for session control. It can be: 
    •
     1 —Trigger-Request. 
    • 2 —Terminate-Request. 
    • 3 —SetPolicy. 
    • 4 —Result. 
    • 5 —PortalClear. 
    24 Control_Identifier  Identification for retransmitted packet
    s. For retransmitted packets of the 
    same session, this attribute must take  the same value. For retransmitted 
    packets of different sessions, this a ttribute may take the same value. The 
    client response of a retransmitted pack et must also carry this attribute and 
    the value of the attribute must be the same. 
    For Accounting-Request packets of  the start, stop, and interim update 
    types, the Control-Identifier attrib ute, if present, makes no sense. 
    25 Result_Code  Result of the Trigger-Request or SetPolicy operation. A value of zero 
    means the operation succeeded. Any other value means the operation 
    failed. 
    26  Connect_ID 
    Index of the user connection. 
    28 Ftp_Directory  Working directory of the FTP user. 
    For an FTP user, when the RADIUS client acts as the FTP server, this 
    attribute is used to set the FTP directory on the RADIUS client. 
    29  Exec_Privilege 
    Priority of the EXEC user. 
    59 NAS_Startup_Timestamp  Startup time of the NAS in seconds,
     which is represented by the time 
    elapsed after 00:00:00 on Jan. 1, 1970 (UTC). 
    60 Ip_Host_Addr  User IP address and MAC address carried in authentication and 
    accounting requests, in the format A.B.C.D hh:hh:hh:hh:hh:hh. A space 
    is required between the IP address and the MAC address. 
    61  User_Notify 
    Information to be sent from the server to the client transparently. 
    62 User_HeartBeat  Hash value assigned after an 802.
    1X user passes authentication, which 
    is a 32-byte string. This attribute is stored in the user list on the device and 
    is used for verifying the handshake me ssages from the 802.1X user. This 
    attribute exists in only Access-Acce pt and Accounting-Request packets. 
     
    140 User_Group  User groups assigned after the SSL
     VPN user passes authentication. A 
    user may belong to more than one user group. In this case, the user 
    groups are delimited by semi-colons. This attribute is used for 
    cooperation with the SSL VPN device. 
    141 Security_Level  Security level assigned after the SSL VPN user passes security 
    authentication. 
    201  Input-Interval-Octets  Bytes input wi
    thin a real-time accounting interval. 
    202 Output-Interval-Octets Bytes output within a real-time accounting interval. 
    203  Input-Interval-Packets  Packets input within an ac counting interval, in the unit set on the device. 
    204  Output-Interval-Packets  Packets output within an accounting interval, in the unit set on the device. 
    205  Input-Interval-Gigawords  Result of bytes input with in an accounting interval divided by 4G bytes.  
    206 Output-Interval-Gigawords  Result of bytes output within an accounting interval divided by 4G bytes.  
    						
    							15 
    No. Sub-attribute Description 
    207 Backup-NAS-IP  Backup source IP address for sending RADIUS packets. 
    255 Product_ID  Product name. 
     
    AAA configuration considerations and task list 
    To configure AAA, you must complete these tasks on the NAS:  
    1. Configure the required AAA schemes. 
    {  Local authentication —Configure local users and the related attributes, including the usernames 
    and passwords of the users to be authenticated.  
    {  Remote authentication—Configure the required R ADIUS and HW TACACS schemes. You must 
    configure user attributes on the servers accordingly. 
    2. Configure AAA methods for the users’ ISP domains. 
    {  Authentication method—No authentication ( none), local authentication ( local), or remote 
    authentication ( scheme) 
    { Authorization method —No authorization (none), local authorization ( local), or remote 
    authorization ( scheme) 
    { Accounting method —No accounting (none), local accounting ( local), or remote accounting 
    (scheme ) 
    Figure 10  AAA configuration diagram 
     
     
    Table 4 AAA configuration task list 
    Task Remarks 
    Configuring AAA 
    schemes  Configuring local users 
    Required. 
    Complete at le
    ast one task. 
    Configuring RADIUS schemes 
    Configure the RADIUS and
    HWTACACS schemes
    Authorization method
    Accounting method
    Configure AAA methods
    Create an ISP domain 
    and enter its view
    local (the default)
         None
    schemeAuthentication method 
    Configure local users and related  attributes
    +
    +
    Local AAA
    Remote AAA
    No AAA
    local(the default)
         None
    scheme
    local (the default)
         None
    scheme 
    						
    All HP manuals Comments (0)

    Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide