Home > HP > Switch > HP A 5120 Manual

HP A 5120 Manual

Here you can view all the pages of manual HP A 5120 Manual. The HP manuals for Switch are available online for free. You can easily download all the documents as PDF.

Page 71

61 
# Configure bbb as the default ISP domain. Then, if a user enters a username without any ISP domain at 
login, the authentication and accounting methods of the default domain will be used for the user. 
[SwitchA] domain default enable bbb 
2. Configure the RADIUS server 
# Create RADIUS user aaa and enter its view. 
 system-view 
[SwitchB] radius-server user aaa 
# Configure simple-text password aabbcc for user aaa.  
[SwitchB-rdsuser-aaa] password simple aabbcc 
[SwitchB-rdsuser-aaa] quit 
# Specify...

Page 72

62 
Symptom 2 
RADIUS packets cannot reach the RADIUS server. 
Analysis 
1. The communication link between the NAS and the RADIUS server is down (at the physical layer 
and data link layer). 
2. The NAS is not configured with the IP address of the RADIUS server. 
3. The UDP ports for authentication/authorization and accounting are not correct. 
4. The port numbers of the RADIUS server for authentication, authorization and accounting are being 
used by other applications. 
Solution 
Check that: 
1. The...

Page 73

 
63 
802.1X fundamentals 
802.1X is a  port-based network access  control  protocol initially proposed  by the IEEE 802 LAN/WAN 
committee  for securing wireless  LANs  (WLANs),  and  it  has  also been widely used  on  Ethernet networks 
for access control.  
802.1X controls network access by authenticating the devices connected to 802.1X-enabled LAN ports. 
802.1X architecture 
802.1X  operates  in  the  client/server  model.  It  comprises  three entities: client (the  supplicant), network 
access...

Page 74

 
64 
Figure 24 Authorization state of a controlled port 
 
 
In the unauthorized state, a controlled port controls traffic in one of the following ways: 
 Performs bidirectional traffic control to deny traffic to and from the client. 
 Performs unidirectional traffic control to deny traffic from the client.  
 NOTE: 
The HP switches support only unidirectional traffic control.  
802.1X-related protocols 
802.1X  uses  the  Extensible  Authentication  Protocol  (EAP)  to  transport  authentication...

Page 75

 
65 
Figure 25 EAP packet format 
 
 Code: Type of the EAP packet. Options include Request (1), Response (2), Success (3), or Failure (4). 
 Identifier: Used for matching Responses with Requests. 
 Length:  Length (in  bytes) of  the  EAP  packet,  which  is  the  sum  of the  Code,  Identifier,  Length,  and 
Data fields. 
 Data: Content  of  the  EAP  packet. This  field appears  only  in  a  Request  or  Response  EAP  packet.  The 
field comprises the request type (or the response type) and the...

Page 76

 
66 
 Packet  body: Content  of  the  packet. When  the  EAPOL  packet  type  is  EAP-Packet,  the  Packet  body 
field contains an EAP packet.  
EAP over RADIUS 
RADIUS adds  two attributes, EAP-Message and Message-Authenticator, for supporting EAP 
authentication. For the RADIUS packet format, see the chapter ―AAA configuration.‖ 
EAP-Message 
RADIUS  encapsulates  EAP  packets  in  the EAP-Message  attribute,  as  shown  in Figure  27.  The  Type  field 
takes 79, and the Value field can be up to...

Page 77

 
67 
 Multicast  trigger  mode—The  access  device  multicasts  EAP-Request/Identify  packets  periodically 
(every 30 seconds by default) to initiate 802.1X authentication.  
 Unicast  trigger  mode—Upon  receiving  a  frame  with  the  source  MAC  address  not  in  the  MAC 
address  table,  the  access  device  sends  an EAP-Request/Identify  packet  out of the  receiving  port  to 
the  unknown  MAC  address. It  retransmits  the  packet  if  no  response  has  been  received  within  a...

Page 78

 
68 
Packet exchange method Benefits Limitations 
EAP termination Works with any RADIUS server that 
supports PAP or CHAP authentication. 
 Supports only MD5-Challenge 
EAP authentication and the 
username + password EAP 
authentication initiated by an 
iNode 802.1X client. 
 The processing is complex on 
the network access device.  
 
EAP relay 
Figure  31 shows  the basic  802.1X  authentication  procedure  in  EAP  relay  mode,  assuming  that EAP-MD5 
is used. 
Figure 31 802.1X authentication...

Page 79

 
69 
3. In response to the Identity EAP-Request packet, the client sends the username in an Identity EAP-
Response packet to the network access device.  
4. The network access device relays the Identity EAP-Response packet in a RADIUS Access-Request 
packet to the authentication server. 
5. The authentication server uses the identity information in the RADIUS Access-Request to search its 
user database. If a matching entry is found, the server uses a randomly generated challenge (EAP-
Request/MD5...

Page 80

 
70 
Figure 32 802.1X authentication procedure in EAP termination mode 
 
 
In EAP termination mode,  it  is  the network  access  device rather  than  the  authentication  server generates 
an MD5 challenge for password encryption (see Step 4). The network access device then sends the MD5 
challenge together  with  the  username  and encrypted password in  a  standard  RADIUS  packet to  the 
RADIUS server.  
  EAPOLRADIUS
(1) EAPOL-Start
(2) EAP-Request / Identity
(3) EAP-Response / Identity
(4)...
Start reading HP A 5120 Manual

Related Manuals for HP A 5120 Manual

All HP manuals