HP 5500 Ei 5500 Si Switch Series Configuration Guide
Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
236 Setting super password control parameters CLI commands fall into four levels: visit, monitor, system, and manage, in ascending order. Accordingly, login users fall into four levels, each corresponding to a command level. A user of a certain level can only use the commands at that level or lower levels. To switch from a lower user level to a higher one, a user needs to enter a password for authentication. This password is called a super password. For more information on super passwords, see Fundamentals Configuration Guide . To set super password control parameters: Step Command Remarks 1. Enter system view. system-view N/A 2. Set the password aging time for super passwords. password-control super aging aging-time Optional 90 days by default 3. Configure the minimum length for super passwords. password-control super length length Optional 10 characters by default 4. Configure the password composition policy for super passwords. password-control super composition type-number type-number [ type-length type-length ] Optional By default, the minimum number of password composition types is 1 and the minimum number of characters of a password composition type is 1 too. Setting a local user password in interactive mode You can set a password for a local user in interactive mode. When doing so, you need to confirm the password. To set a password for a local user in interactive mode: Step Command 1. Enter system view. system-view 2. Create a local user and enter local user view. local-user user-name 3. Set the password for the local user in interactive mode. password Displaying and maintaining password control Task Command Remarks Display password control configuration information. display password-control [ super ] [ | { begin | exclude | include } regular-expression ] Available in any view
237 Task Command Remarks Display information about users in the password control blacklist. display password-control blacklist [ user-name name | ip ipv4-address | ipv6 ipv6-address ] [ | { begin | exclude | include } regular-expression ] Available in any view Delete users from the password control blacklist. reset password-control blacklist [ user-name name ] Available in user view Clear history password records. reset password-control history-record [ user-name name | super [ level level ] ] Available in user view NOTE: The reset password-control history-record command can delete the history password records of a specific user or all users even when the password history function is disabled. Password control configuration example Network requirements Implementing the following global password control policy: • An FTP or VTY user failing to provide the correct password in two successive login attempts is permanently prohibited from logging in. • A user can log in five times within 60 days after the password expires. • The password aging time is 30 days. • The minimum password update interval is 36 hours. • The maximum account idle time is 30 days. • A password cannot contain the username or the reverse of the username. • No character occurs consecutively three or more times in a password. Implementing the following su per password control policy: • A super password must contain at least three types of valid characters, five or more of each type. Implementing the following password control policy for local Telnet user test: • The password must contain at least 12 characters. • The password must consist of at least two types of valid characters, five or more of each type. • The password aging time is 20 days. Configuration procedure # Enable the password control feature globally. system-view [Sysname] password-control enable # Prohibit the user from logging in forever after two successive login failures. [Sysname] password-control login-attempt 2 exceed lock # Set the password aging time to 30 days for all passwords. [Sysname] password-control aging 30
238 # Set the minimum password update interval to 36 hours. [Sysname] password-control password update interval 36 # Specify that a user can log in five times within 60 days after the password expires. [Sysname] password-control expired-user-login delay 60 times 5 # Set the maximum account idle time to 30 days. [Sysname] password-control login idle-time 30 # Refuse any password that contains the username or the reverse of the username. [Sysname] password-control complexity user-name check # Specify that no character of the password can be repeated three or more times consecutively. [Sysname] password-control complexity same-character check # Set the minimum number of composition types for super passwords to 3 and the minimum number of characters of each composition type to 5. [Sysname] password-control super composition type-number 3 type-length 5\ # Configure a super password. [Sysname] super password level 3 simple 12345ABGFTweuix # Create a local user named test. [Sysname] local-user test # Set the service type of the user to Telnet. [Sysname-luser-test] service-type telnet # Set the minimum password length to 12 for the local user. [Sysname-luser-test] password-control length 12 # Set the minimum number of password composition types to 2 and the minimum number of characters of each password composition type to 5 for the local user. [Sysname-luser-test] password-control composition type-number 2 type-len\ gth 5 # Set the password aging time to 20 days for the local user. [Sysname-luser-test] password-control aging 20 # Configure the password of the local user in interactive mode. [Sysname-luser-test] password Password:*********** Confirm :*********** Updating user(s) information, please wait........ [Sysname-luser-test] quit Verifying the configuration # Display the global password control configuration information. display password-control Global password control configurations: Password control: Enabled Password aging: Enabled (30 days) Password length: Enabled (10 characters) Password composition: Enabled (1 types, 1 characters p\ er type) Password history: Enabled (max history record:4) Early notice on password expiration: 7 days User authentication timeout: 60 seconds
239 Maximum failed login attempts: 2 times Login attempt-failed action: Lock Minimum password update time: 36 hours User account idle-time: 30 days Login with aged password: 5 times in 60 day(s) Password complexity: Enabled (username checking) Enabled (repeated characters chec\ king) # Display the password control configuration information for super passwords. display password-control super Super password control configurations: Password aging: Enabled (30 days) Password length: Enabled (10 characters) Password composition: Enabled (3 types, 5 characters p\ er type) # Display the password control configuration information for local user test. display local-user user-name test The contents of local user test: State: Active ServiceType: telnet Access-limit: Disable Current AccessNum: 0 User-group: system Bind attributes: Authorization attributes: Password aging: Enabled (20 days) Password length: Enabled (12 characters) Password composition: Enabled (2 types, 5 characters \ per type) Total 1 local user(s) matched.
240 Configuring HABP HABP overview The HW Authentication Bypass Protocol (HABP) is intended to enable the downstream network devices of an access device to bypass 802.1X authentication and MAC authentication configured on the access device. As shown in Figure 89, 8 02.1X authenticator Switch A has two switches attached to it: Switch B and Switch C. On Switch A, 802.1X authentication is enabled globally and on the ports connecting the downstream network devices. The end-user devices (the supplicants) run the 802.1X client software for 802.1X authentication. For Switch B and Switch D, where the 802.1X client is not supported (which is typical of network devices), the communication between them will fail because they cannot pass 802.1X authentication and their packets will be blocked on Sw itch A. To allow the two switches to communicate, you can use HABP. Figure 89 Network diagram for HABP application HABP is a link layer protocol that works above the MAC layer. It is built on the client-server model. Generally, the HABP server is enabled on the authentication device (which is configured with 802.1X or MAC authentication, such as Switch A in the above example), and the attached switches function as the HABP clients, such as Switch B through Switch E in the example. No device can function as both an HABP server and a client at the same time. Typically, the HABP server sends HABP requests to all its clients periodically to collect their MAC addresses, and the clients respond to the requests. After the server learns the MAC addresses of all the clients, it regi sters the MAC addresses as HABP entries. Then, link layer frames exchanged between the clients can bypass the 802.1X authentication on ports of the server without affecting the normal operation of the whole ne t work. Al l HA BP packets must travel i n a speci fie d VLAN. Communication between the HABP server and HABP clients is implemented through this VLAN. In a cluster, if a member switch with 802.1X authentication or MAC authentication enabled is attached with some other member switches of the cluster, you also need to configure HABP server on this device.
241 Otherwise, the cluster management device will not be able to manage the devices attached to this member switch. For more information about the cluster function, see Network Management and Monitoring Configuration Guide . Configuring HABP Configuring the HABP server An HABP server is usually configured on the authentication device enabled with 802.1X authentication or MAC address authentication. The HABP server sends HABP requests to the attached switches (HABP clients) at a specified interval, collecting their MAC addresses from the responses. HABP packets are transmitted in the VLAN specified on the HABP server. To configure an HABP server: Step Command Remarks 1. Enter system view. system-view N/A 2. Enable HABP. habp enable Optional Enabled by default 3. Configure HABP to work in server mode and specify the VLAN for HABP packets. habp server vlan vlan-id HABP works in client mode by default. The VLAN specified on the HABP server for transmitting HABP packets must be the same as that to which the HABP clients belong. 4. Set the interval to send HABP requests. habp timer interval Optional 20 seconds by default Configuring an HABP client An HABP client is usually configured on each device that is attached to the authentication device. After receiving an HABP request from the HABP server, an HABP client responds to the request, delivering its MAC address to the server, and forwards the HABP re quest to its attached switches. HABP packets are transmitted in the VLAN to which the HABP client belongs. To configure an HABP client: Step Command Remarks 1. Enter system view. system-view N/A 2. Enable HABP. habp enable Optional Enabled by default 3. Configure HABP to work in client mode. undo habp server Optional HABP works in client mode by default.
242 Step Command Remarks 4. Specify the VLAN to which the HABP client belongs. habp client vlan vlan-id Optional By default, an HABP client belongs to VLAN 1. The VLAN to which an HABP client belongs must be the same as that specified on the HABP server for transmitting HABP packets. Displaying and maintaining HABP Task Command Remarks Display HABP configuration information. display habp [ | { begin | exclude | include } regular-expression ] Available in any view Display HABP MAC address table entries. display habp table [ | { begin | exclude | include } regular-expression ] Available in any view Display HABP packet statistics. display habp traffic [ | { begin | exclude | include } regular-expression ] Available in any view HABP configuration example Network requirements As shown in Figure 90 , Switch A is attached with access de vices Switch B and Switch C. 802.1X authentication is configured on Switch A for central authentication and management of users (Host A through Host D). For communication between Switch B and Switch C, enable HABP server on Switch A, enable HABP client on Switch B and Switch C, and specify VLAN 1 for HABP packets. Configure the HABP server to send HABP request packe ts to the HABP clients in VLAN 1 at an interval of 50 seconds.
243 Figure 90 Network diagram Configuration procedure 1. Configure Switch A: # Perform 802.1X related configurations on Switch A (see Configuring 802.1X). # Enable HABP. (HABP is enabled by defaul t. This configuration is optional.) system-view [SwitchA] habp enable # Configure HABP to work in server mode, and specify VLAN 1 for HABP packets. [SwitchA] habp server vlan 1 # Set the interval at which the switch sends HABP request packets to 50 seconds. [SwitchA] habp timer 50 2. Configure Switch B: # Enable HABP. (HABP is enabled by defaul t. This configuration is optional.) system-view [SwitchB] habp enable # Configure HABP to work in client mode. (H ABP works in client mode by default. This configuration is optional.) [SwitchB] undo habp server # Specify the VLAN to which the HABP client be longs as VLAN 1. (An HABP client belongs to VLAN 1 by default. This configuration is optional.) [SwitchB] habp client vlan 1 3. Configure Switch C: Configurations on Switch C are similar to those on Switch B. 4. Verify your configuration: # Display HABP configuration information.
244 display habp Global HABP information: HABP Mode: Server Sending HABP request packets every 50 seconds Bypass VLAN: 1 # Display HABP MAC address table entries. display habp table MAC Holdtime Receive Port 001f-3c00-0030 53 GigabitEthernet1/0/2 001f-3c00-0031 53 GigabitEthernet1/0/1
245 Managing public keys Overview To protect data confidentiality during transmission, the data sender uses an algorithm and a key to encrypt the plain text data before sending the data out, and the receiver uses the same algorithm with the help of a key to decrypt the data, as shown in Figure 91. Figure 91 Encryption an d decryption The keys that participate in the conversion between the plain text and the cipher text can be the same or different, dividing the encryption and decryp tion algorithms into the following types: • Symmetric key algorithm —The keys for encryption and decryption are the same. • Asymmetric key algorithm —The keys for encryption and decryption are different, one is the public key, and the other is the private key. The inform ation encrypted with the public key can only be decrypted with the corresponding private key, and vice versa. The private key is kept secret, and the public key may be distributed widely. The private ke y cannot be practically derived from the public key. Asymmetric key algorithms include the Revest-Shamir-Adleman Algorithm (RSA), and the Digital Signature Algorithm (DSA). Asymmetric key algorithms can be used in two scenarios for two purposes: • To encrypt and decrypt data — T h e s e n d e r u s e s t h e p u b l i c ke y o f t h e i n t e n d e d r e c e i ve r t o e n c r y p t t h e information to be sent. Only the intended receiver, the holder of the paired private key, can decrypt the information. This mechanism guarantees confidentiality. Only RSA can be used for data encryption and decryption. • To authenticate a sender —Also called digital signature. The sender signs the information to be sent by encrypting the information with its own private key. A receiver decrypts the information with the senders public key and, based on whether the information can be decrypted, determines the authenticity of the information. RSA and DSA can be used for digital signature. Asymmetric key algorithms are widely used in various applications. For example, Secure Shell (SSH), Secure Sockets Layer (SSL), and Public Key Infrastructure (PKI) use the algorithms for digital signature. For information about SSH, SSL, and PKI, see Configuring SSH2.0 , Configuring SSL , and 1Configuring PKI . Configuration task list Public key configuration tasks enable you to manage the local asymmetric key pairs, and configure the peer host public keys on the local device. By completing these tasks, the local device is ready to work with applications such as SSH and SSL to implement data encryption/decryption, or digital signature. Complete these tasks to configure public keys: