HP 5500 Ei 5500 Si Switch Series Configuration Guide
Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
66 Specify the ports for authentication and accounting as 1812 and 1813, respectively. Select LAN Access Service as the service type. Select HP as the access device type. Select the switch from the device list or manu ally add the switch whose IP address is 10.1.1.2. Leave the default settings in other fields. d. Click OK. NOTE: The IP address of the access device sp ecified here must be the same as the source IP address of the RADIUS packets sent from the switch, which is the IP address of the outbound interface by default, or otherwise the IP address specified with the nas-ip or radius nas-ip command on the switch. Figure 27 Adding the switch to IMC as an access device 2. Define a charging policy: a. Click the Service tab, and select Accounting Manager > Charging Plans from the navigation tree. b. Click Add. c. Configure the following parameters: Enter UserAcct as the plan name. Select Flat rate as the charging template. In the Basic Plan Settings field, configure to charge the fi xed fee of 120 dollars per month. In the Service Usage Limit field, set the Usage Threshold to 120 hours, allowing the user to access the Internet for up to 120 hours per month. Leave the default settings in other fields. d. Click OK.
67 Figure 28 Defining a charging policy 3. Add a service: a. Click the Service tab, and select User Access Manager > Service Configuration from the navigation tree. b. Click Add. c. Configure the following parameters: Enter Dot1x auth as the service name and bbb as the service suffix. The service suffix indicates the authentication domain for 802.1X users. When the service suffix is configured, you must configure the switch to keep the domain names of usernames to be sent to the RADIUS server. Enter UserAcct as the Charging Plan . Select Deploy VLAN and set the ID of the VLAN to be assigned to 4. Configure other parameters as needed. d. Click OK.
68 Figure 29 Adding a service 4. Create an account for 802.1X users: a. Click the User tab, and select All Access Users from the navigation tree. b. Click Add. c. Configure the following parameters: Select the user test , or add the user if it does not exist. Enter dot1x as the account name and set the password. Select the access service Dot1x auth. Configure other parameters as needed. d. Click OK.
69 Figure 30 Creating an account for 802.1X users Configuring the switch 1. Configure a RADIUS scheme: # Create a RADIUS scheme named rad and enter its view. system-view [Switch] radius scheme rad # Set the server type for the RADIUS scheme. When you use IMC, set the server type to extended. [Switch-radius-rad] server-type extended # Specify the primary authentication server and pr imary accounting server, and configure the keys for communication with the servers. [Switch-radius-rad] primary authentication 10.1.1.1 [Switch-radius-rad] primary accounting 10.1.1.1 [Switch-radius-rad] key authentication expert [Switch-radius-rad] key accounting expert # Configure the scheme to include the domain names in usernames to be sent to the RADIUS server. [Switch-radius-rad] user-name-format with-domain [Switch-radius-rad] quit 2. Configure an authentication domain: # Create an ISP domain named bbb and enter its view. [Switch] domain bbb # Configure the ISP domain to use RADIUS scheme rad. [Switch-isp-bbb] authentication lan-access radius-scheme rad [Switch-isp-bbb] authorization lan-access radius-scheme rad [Switch-isp-bbb] accounting lan-access radius-scheme rad [Switch-isp-bbb] quit
70 # Configure bbb as the default ISP domain for all users. Then, if a user enters a username without any ISP domain at login, the authentication and a ccounting methods of the default domain is used for the user. [Switch] domain default enable bbb 3. Configure 802.1X authentication: # Enable 802.1X globally. [Switch] dot1x # Enable 802.1X for port GigabitEthernet 1/0/1. [Switch] interface gigabitethernet 1/0/1 [Switch-GigabitEthernet1/0/1] dot1x [Switch-GigabitEthernet1/0/1] quit # Configure the access control method. (Optional. The default setting meets the requirement.) [Switch] dot1x port-method macbased interface gigabitethernet 1/0/1 Verifying the configuration When you use HP iNode client, no advanced authentication options are required, and the user can pass authentication after entering username dot1x@bbb and the correct password in the client property page. I f t h e 802.1 X cl i e n t o f Wi n d ows X P i s us e d, s e l e c t t h e Enable IEEE 802.1X authentication for this network option and select MD5-Challenge as the EAP type on the Authentication tab of the network connection properties window. The user passes authentication after entering the correct username and password in the pop-up authentication page. After the user passes authentication, the server assigns the port connecting the client to VLAN 4. Use the display connect command to view the connection information on the switch. [Switch] display connection Slot: 1 Index=22 , Username=dot1x@bbb IP=192.168.1.58 IPv6=N/A MAC=0015-e9a6-7cfe Total 1 connection(s) matched on slot 1. Total 1 connection(s) matched. # View the information of the specified connection on the switch. [Switch] display connection ucibindex 22 Slot: 1 Index=22 , Username=dot1x@bbb IP=192.168.1.58 IPv6=N/A MAC=0015-e9a6-7cfe Access=8021X ,AuthMethod=CHAP Port Type=Ethernet,Port Name=GigabitEthernet1/0/1 Initial VLAN=2, Authorization VLAN=4 ACL Group=Disable User Profile=N/A CAR=Disable Priority=Disable Start=2011-04-26 19:41:12 ,Current=2011-04-26 19:41:25 ,Online=00h00m14s\
71 Total 1 connection matched. As the Authorized VLAN field in the output shows, VLAN 4 has been assigned to the user. Level switching authentication for Telnet users by an HWTACACS server Network requirements As shown in Figure 31, configure the switch to: • Use local authentication for the Telnet user and assign the privilege level of 0 to the user after the user passes authentication. • Use the HWTACACS server for level switching authentication of the Telnet user, and use local authentication as the backup. Figure 31 Network diagram Configuration considerations 1. Configure the switch to use AAA, particularly, local authentication for Telnet users: { Create ISP domain bbb and configure it to use local authentication for Telnet users. { Create a local user account, configure the password, and assign the user privilege level. 2. On the switch, configure the au thentication method for user privilege level switching: { Specify to use HWTACACS authentication and, if HWTACACS authentication is not available, use local authentication for user level switching authentication. { Configure HWTACACS scheme hwtac and assign an IP address to the HWTACACS server. Set the shared keys for message exchange and specify that usernames sent to the HWTACACS server carry no domain name. Configure the domain to use the HWTACACS scheme hwtac for user privilege level switching authentication. { Configure the password for local privilege level switching authentication. 3. On the HWTACACS server, add the username and password for user privilege level switching authentication. Configuration procedure 1. Configure the switch: # Configure the IP address of VLAN-i nterface 2, through which the Telnet user accesses the switch. system-view [Switch] interface vlan-interface 2
72 [Switch-Vlan-interface2] ip address 192.168.1.70 255.255.255.0 [Switch-Vlan-interface2] quit # Configure the IP address of VLAN-interface 3, through which the switch communicates with the server. [Switch] interface vlan-interface 3 [Switch-Vlan-interface3] ip address 10.1.1.2 255.255.255.0 [Switch-Vlan-interface3] quit # Enable the switch to provide Telnet service. [Switch] telnet server enable # Configure the switch to use AAA for Telnet users. [Switch] user-interface vty 0 4 [Switch-ui-vty0-4] authentication-mode scheme [Switch-ui-vty0-4] quit # Use HWTACACS authentication for user level switching authentication and, if HWTACACS authentication is not availabl e, use local authentication. [Switch] super authentication-mode scheme local # Create an HWTACACS scheme named hwtac. [Switch] hwtacacs scheme hwtac # Specify the IP address for the primary authenti cation server as 10.1.1.1 and the port for authentication as 49. [Switch-hwtacacs-hwtac] primary authentication 10.1.1.1 49 # Set the shared key for secure authentication communication to expert. [Switch-hwtacacs-hwtac] key authentication simple expert # Configure the scheme to remove the domain name from a username before sending the username to the HWTACACS server. [Switch-hwtacacs-hwtac] user-name-format without-domain [Switch-hwtacacs-hwtac] quit # Create ISP domain bbb. [Switch] domain bbb # Configure the ISP domain to use local authentication for Telnet users. [Switch-isp-bbb] authentication login local # Configure to use HWTACACS scheme hwtac for privilege level switching authentication. [Switch-isp-bbb] authentication super hwtacacs-scheme hwtac [Switch-isp-bbb] quit # Create a local Telnet user named test. [Switch] local-user test [Switch-luser-test] service-type telnet [Switch-luser-test] password simple aabbcc # Configure the user level of the Telnet user to 0 after user login. [Switch-luser-test] authorization-attribute level 0 [Switch-luser-test] quit # Configure the password for local privilege level switching authentication to 654321. [Switch] super password simple 654321 [Switch] quit 2. Configure the HWTACACS server:
73 NOTE: The HWTACACS server in this example runs ACSv4.0. Add a user named test on the HWTACACS server and config ure advanced attributes for the user as shown in Figure 32: { Select Max Privilege for any AAA Client and set the privilege level to level 3. After these configurations, the user uses the password enabpass when switching to level 1, level 2, or level 3. { Select Use separate password and specify the password as enabpass. Figure 32 Configuring advanced attributes for the Telnet user 3. Verify the configuration: After you complete the configuration, the Telnet user should be able to telnet to the switch and use username test@bbb and password aabbcc to enter the user interface of the switch, and access all level 0 commands. telnet 192.168.1.70 Trying 192.168.1.70 ... Press CTRL+K to abort Connected to 192.168.1.70 ... ************************************************************************\ ****** * Copyright (c) 2004-2012 Hewlett-Packard Development Company,L.P.. *\ * Without the owners prior written consent, \ * * no decompiling or reverse-engineering shall be allowed. \ * ************************************************************************\ ******
74 Login authentication Username:test@bbb Password: ? User view commands: display Display current system information ping Ping function quit Exit from current command view ssh2 Establish a secure shell client connection super Set the current user priority level telnet Establish one TELNET connection tracert Trace route function When switching to user privilege level 3, the Telnet user only needs to enter password enabpass as prompted. super 3 Password: User privilege level is 3, and only those commands can be used whose level is equal or less than this. Privilege note: 0-VISIT, 1-MONITOR, 2-SYSTEM, 3-MANAGE If the HWTACACS server is not available, the Telnet user needs to enter password 654321 as prompted for local authentication. super 3 Password: Å Enter the password for HWTACACS privilege level switch authentication Error: Invalid configuration or no response from the authentication ser\ ver. Info: Change authentication mode to local. Password: Å Enter the password for local privilege level switch authentication User privilege level is 3, and only those commands can be used whose level is equal or less than this. Privilege note: 0-VISIT, 1-MONITOR, 2-SYSTEM, 3-MANAGE RADIUS authentication and author ization for Telnet users by a switch Network requirements As shown in Figure 33, co nfigure Switch B to act as a RADIUS server to provide authentication and authorization for the Telnet user on port 1645. Configure Switch A to use the RADIUS server for Teln et user authentication and authorization, and to remove the domain name in a username sent to the server. Set the shared keys for secure communication between the NAS and the RADIUS server to abc.
75 Figure 33 Network diagram Configuration procedure 1. Assign an IP address to each interface as shown in Figure 33. (Det ails not shown.) 2. Configure the NAS: # Enable the Telnet server on Switch A. system-view [SwitchA] telnet server enable # Configure Switch A to use AAA for Telnet users. [SwitchA] user-interface vty 0 4 [SwitchA-ui-vty0-4] authentication-mode scheme [SwitchA-ui-vty0-4] quit # Create RADIUS scheme rad. [SwitchA] radius scheme rad # Specify the IP address for the primary authen tication server as 10.1.1.2, the port for authentication as 1645, and the shared key fo r secure authentication communication as abc. [SwitchA-radius-rad] primary authentication 10.1.1.2 1645 key abc # Configure the scheme to remove the domain name from a username before sending the username to the RADIUS server. [SwitchA-radius-rad] user-name-format without-domain # Set the source IP address for RADIUS packets as 10.1.1.1. [SwitchA-radius-rad] nas-ip 10.1.1.1 [SwitchA-radius-rad] quit # Create ISP domain bbb. [SwitchA] domain bbb # Specify the authentication method for Telnet users as rad. [SwitchA-isp-bbb] authentication login radius-scheme rad # Specify the authorization method for Telnet users as rad. [SwitchA-isp-bbb] authorization login radius-scheme rad # Specify the accounting method for Telnet users as none. [SwitchA-isp-bbb] accounting login none # Configure the RADIUS server type as standard. When a switch is configured to serve as a RADIUS server, the server type must be set to standard. [SwitchA-isp-bbb] server-type standard [SwitchA-isp-bbb] quit # Configure bbb as the default ISP domain. Then, if a user enters a username without any ISP domain at login, the authentication and accounting methods of the default domain is used for the user. [SwitchA] domain default enable bbb 3. Configure the RADIUS server: # Create RADIUS user aaa and enter its view. Telnet user192.168.1.2Switch A Switch B NAS RADIUS server Vlan-int2 10.1.1.1/24Vlan-int2 10.1.1.2/24 Vlan-int3 192.168.1.1/24