HP A 5120 Manual
Have a look at the manual HP A 5120 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
91 EAD fast deployment configuration EAD fast deployment overview Endpoint Admission Defense (EAD) is an HP integrated endpoint access control solution, which enables the security client, security policy server, access device, and third-party server to work together to improve the threat defensive capability of a network. If a terminal device seeks to access a network that deploys EAD, it must have an EAD client, which performs 802.1X authentication. EAD fast deployment enables the access device to redirect a user seeking to access the network to download and install EAD client. This function eliminates the tedious job of the administrator to deploy EAD clients. EAD fast deployment implementation EAD fast deployment is implemented by the following functions: Free IP URL redirection Free IP A free IP is a freely accessible network segment, which has a limited set of network resources such as software and DHCP servers. An unauthenticated user can access only this segment to download EAD client, obtain a dynamic IP address from a DHCP server, or perform some other tasks to be compliant with the network security strategy. URL redirection If an unauthenticated 802.1X user is using a web browser to access the network, the EAD fast deployment function redirects the user to a specified URL, for example, the EAD client software download page. The server that provides the URL must be on the free IP accessible to unauthenticated users. Configuring EAD fast deployment Configuration prerequisites Enable 802.1X globally. Enable 802.1X on the port, and set the port authorization mode to auto. Configuration procedure Configuring a free IP When a free IP is configured, the EAD fast deployment is enabled. To allow a user to obtain a dynamic IP address before passing 802.1X authentication, make sure the DHCP server is on the free IP segment. Follow these steps to configure a free IP:
92 To do… Use the command… Remarks Enter system view system-view — Configure a free Im dot1x free-ip ip-address { mask- address | mask-length } Required By default, no free IP is configured. NOTE: When global MAC authentication, Layer-2 portal authentication, or port security is enabled, the free IP does not take effect. Configuring the redirect URL Follow these steps to configure a redirect URL: To do… Use the command… Remarks Enter system view system-view — Configure the redirect URL dot1x url url-string Required By default, no redirect URL is configured. NOTE: The redirect URL must be on the free IP subnet. Setting the EAD rule timer EAD fast deployment automatically creates an ACL rule, or an EAD rule, to open access to the redirect URL for each redirected user seeking to access the network. The EAD rule timer sets the lifetime of each ACL rule. When the timer expires or the user passes authentication, the rule is removed. If users fail to download EAD client or fail to pass authentication before the timer expires, they must reconnect to the network to access the free IP. To prevent ACL rule resources from being used up, you can shorten the timer when the amount of EAD users is large. Follow these steps to set the EAD rule timer: To do… Use the command… Remarks Enter system view system-view — Set the EAD rule timer dot1x timer ead-timeout ead- timeout-value Optional The default timer is 30 minutes. Displaying and maintaining EAD fast deployment To do… Use the command… Remarks Display 802.1X session information, statistics, or configuration information display dot1x [ sessions | statistics ] [ interface interface-list ] [ | { begin | exclude | include } regular-expression ] Available in any view
93 EAD fast deployment configuration example Network requirements As shown in Figure 36, the hosts at the intranet 192.168.1.0/24 are attached to port GigabitEthernet 1/0/1 of the network access device, and they use DHCP to obtain IP addresses. Deploy EAD solution for the intranet so that all hosts must pass 802.1X authentication to access the network. To allow all intranet users to install and update 802.1X client program from a web server, configure the following: Allow unauthenticated users to access the segment of 192.168.2.0/24, and to obtain IP address on the segment of 192.168.1.0/24 through DHCP. Redirect unauthenticated users to a preconfigured web page when the users use a web browser to access any external network except 192.168.2.0/24. The web page allows users to download the 802.1X client program. Allow authenticated 802.1X users to access the network. Figure 36 Network diagram for EAD fast deployment NOTE: In addition to the configuration on the access device, complete the following tasks: Configure the DHCP server so that the host can obtain an IP address on the segment of 192.168.1.0/24. Configure the web server so that users can log in to the web page to download 802.1X clients. Configure the authentication server to provide authentication, authorization, and accounting services. Configuration procedure 1. Configure DHCP relay. # Enable DHCP. system-view GE1/0/210.1.1.10/24 GE1/0/1 Free IP:Web server192.168.2.3/24 Internet 192.168.1.0/24 Vlan-int 2192.168.1.1/24 192.168.2.0/24GE1/0/3192.168.2.1/24 DHCP server192.168.2.2/24 Authentication server cluster10.1.1.1/10.1.1.2
94 [Device] dhcp enable # Configure a DHCP server for a DHCP server group. [Device] dhcp relay server-group 1 ip 192.168.2.2 # Enable the relay agent VLAN interface 2. [Device] interface vlan-interface 2 [Device-Vlan-interface2] dhcp select relay # Correlate VLAN interface 2 to the DHCP server group. [Device-Vlan-interface2] dhcp relay server-select 1 [Device-Vlan-interface2] quit 2. Configure a RADIUS scheme and an ISP domain. For more information about configuration procedure, see the chapter ―802.1X configuration.‖ 3. Configure 802.1X. # Configure the free IP. system-view [Device] dot1x free-ip 192.168.2.0 24 # Configure the redirect URL for client software download. [Device] dot1x url http://192.168.2.3 # Enable 802.1X globally. [Device] dot1x # Enable 802.1X on the port. [Device] interface gigabitethernet 1/0/1 [Device-GigabitEthernet1/0/1] dot1x Verification Use the display dot1x command to display the 802.1X configuration. After the host obtains an IP address from a DHCP server, use the ping command from the host to ping an IP address on the network segment specified by free IP. C:\>ping 192.168.2.3 Pinging 192.168.2.3 with 32 bytes of data: Reply from 192.168.2.3: bytes=32 time
95 example, 3.3.3.3 or http://3.3.3.3. The external website address should not be on the freely accessible network segment. Troubleshooting EAD fast deployment Web browser users cannot be correctly redirected Symptom Unauthenticated users are not redirected to the specified redirect URL after they enter external website addresses in their web browsers. Analysis Redirection will not happen for one of the following reasons: The address is in the string format. The operating system of the host regards the string as a website name and tries to resolve it. If the resolution fails, the operating system sends an ARP request, but the target address is not in the dotted decimal notation. The redirection function does redirect this kind of ARP request. The address is within a free IP segment. No redirection will take place, even if no host is present with the address. The redirect URL is not in a free IP segment, no server is using the redirect URL, or the server with the URL does not provide web services. Solution Enter a dotted decimal IP address that is not in any free IP segment. Ensure that the network access device and the server are correctly configured.
96 MAC authentication configuration MAC authentication overview MAC authentication controls network access by authenticating source MAC addresses on a port. It does not require client software. A user does not need to input a username and password for network access. The device initiates a MAC authentication process when it detects an unknown source MAC address on a MAC authentication enabled port. If the MAC address passes authentication, the user can access authorized network resources. If the authentication fails, the device marks the MAC address as a silent MAC address, drops the packet, and starts a quiet timer. The device drops all subsequent packets from the MAC address within the quiet time. This quiet mechanism avoids repeated authentication during a short time. NOTE: If the MAC address that has failed authentication is a static MAC address or a MAC address that has passed any security authentication, the device does not mark it as a silent address. User account policies MAC authentication supports the following user account policies: One MAC-based user account for each user. The access device uses the source MAC addresses in packets as the usernames and passwords of users for MAC authentication. This policy is suitable for an insecure environment. One shared user account for all users. You specify one username and password, which are not necessarily a MAC address, for all MAC authentication users on the access device. This policy is suitable for a secure environment. Authentication approaches You can perform MAC authentication on the access device (local authentication) or through a Remote Authentication Dial-In User Service (RADIUS) server. Suppose a source MAC unknown packet arrives at a MAC authentication enabled port. In the local authentication approach: If MAC-based accounts are used, the access device uses the source MAC address of the packet as the username and password to search its local account database for a match. If a shared account is used, the access device uses the shared account username and password to search its local account database for a match. In the RADIUS authentication approach: If MAC-based accounts are used, the access device sends the source MAC address as the username and password to the RADIUS server for authentication. If a shared account is used, the access device sends the shared account username and password to the RADIUS server for authentication.
97 For more information about configuring local authentication and RADIUS authentication, see the chapter ―AAA configuration.‖ MAC authentication timers MAC authentication uses the following timers: Offline detect timer—Sets the interval that the device waits for traffic from a user before it regards the user idle. If a user connection has been idle for two consecutive intervals, the device logs the user out and stops accounting for the user. Quiet timer—Sets the interval that the device must wait before it can perform MAC authentication for a user that has failed MAC authentication. All packets from the MAC address are dropped during the quiet time. This quiet mechanism prevents repeated authentication from affecting system performance. Server timeout timer—Sets the interval that the access device waits for a response from a RADIUS server before it regards the RADIUS server unavailable. If the timer expires during MAC authentication, the user cannot access the network. Using MAC authentication with other features VLAN assignment You can specify a VLAN in the user account for a MAC authentication user to control its access to network resources. After the user passes MAC authentication, the authentication server, either the local access device or a RADIUS server, assigns the VLAN to the port as the default VLAN. After the user logs off, the initial default VLAN, or the default VLAN configured before any VLAN is assigned by the authentication server, restores. If the authentication server assigns no VLAN, the initial default VLAN applies. NOTE: A hybrid port is always assigned to a server-assigned VLAN as an untagged member. After the assignment, do not re-configure the port as a tagged member in the VLAN. If the port is a hybrid port with MAC-based VLAN enabled, the device maps the MAC address of each user to the VLAN assigned by the authentication server. The default VLAN of the port does not change. When a user logs off, the MAC-to-VLAN mapping for the user is removed. ACL assignment You can specify an ACL in the user account for a MAC authentication user to control its access to network resources. After the user passes MAC authentication, the authentication server, either the local access device or a RADIUS server, assigns the ACL to the access port to filter the traffic from this user. You must configure the ACL on the access device for the ACL assignment function. You can change ACL rules when the user is online. Guest VLAN You can configure a guest VLAN to accommodate MAC authentication users that have failed MAC authentication on the port. Users in the MAC authentication guest VLAN can access a limited set of network resources, such as a software server, to download anti-virus software and system patches. If no
98 MAC authentication guest VLAN is configured, the user that fails MAC authentication cannot access any network resources. If a user in the guest VLAN passes MAC authentication, it is removed from the guest VLAN and can access all authorized network resources. If not, the user is still in the MAC authentication guest VLAN. NOTE: A hybrid port is always assigned to a guest VLAN as an untagged member. After the assignment, do not re-configure the port as a tagged member in the VLAN. MAC authentication configuration task list Perform these tasks to configure MAC authentication: Task Remarks Basic configuration for MAC authentication Configuring MAC authentication globally Required Configuring MAC authentication on a port Specifying an authentication domain for MAC authentication users Optional Configuring a MAC authentication guest VLAN Optional Basic configuration for MAC authentication Configuration prerequisites Create and configure an authentication domain, also called an ISP domain. For local authentication, create local user accounts, and specify the lan-access service for the accounts. For RADIUS authentication, check that the device and the RADIUS server can reach each other, and create user accounts on the RADIUS server. NOTE: If you are using MAC-based accounts, ensure that the username and password for each account is the same as the MAC address of the MAC authentication users. Configuration procedure MAC authentication can take effect on a port only when it is configured globally and on the port. Configuring MAC authentication globally Follow these steps to configure MAC authentication globally: To do… Use the command… Remarks Enter system view system-view —
99 To do… Use the command… Remarks Enable MAC authentication globally mac-authentication Required Disabled by default Configure MAC authentication timers mac-authentication timer { offline- detect offline-detect-value | quiet quiet- value | server-timeout server-timeout- value } Optional By default, the offline detect timer is 300 seconds, the quiet timer is 60 seconds, and the server timeout timer is 100 seconds. Configure the properties of MAC authentication user accounts mac-authentication user-name-format { fixed [ account name ] [ password { cipher | simple } password ] | mac- address [ { with-hyphen | without- hyphen } [ lowercase | uppercase ] ] } Optional By default, the username and password for a MAC authentication user account must be a MAC address in lower case, and the MAC address is hyphen separated. Configuring MAC authentication on a port Follow these steps to configure MAC authentication on a port: To do… Use the command… Remarks Enter system view system-view — Enable MAC authentication for specified ports In system view mac-authentication interface interface-list Required Use either approach. Disabled by default In Layer 2 Ethernet interface view interface interface-type interface-number mac-authentication Set the maximum number of concurrent MAC authentication users allowed on a port mac-authentication max-user user-number Optional 256 by default NOTE: You cannot enable MAC authentication on a link aggregation member port. If MAC authentication is enabled on a port, you cannot assign it to a link aggregation. Specifying an authentication domain for MAC authentication users By default, MAC authentication users are in the system default authentication domain. To implement different access policies for users, you can specify authentication domains for MAC authentication users: Specify a global authentication domain in system view. This domain setting applies to all ports. Specify an authentication domain for an individual port in interface view.
100 MAC authentication chooses an authentication domain for users on a port in this order: the port-specific domain, the global domain, and the default domain. For more information about authentication domains, see the chapter ―AAA configuration.‖ Follow these steps to specify an authentication domain for MAC authentication users: To do… Use the command… Remarks Enter system view system-view — Specify an authentication domain for MAC authentication users mac-authentication domain domain- name Required Use either approach By default, no authentication domain is specified and the system default authentication domain is used for MAC authentication users. interface interface-type interface- number mac-authentication domain domain- name Configuring a MAC authentication guest VLAN Configuration prerequisites Before you configure a MAC authentication guest VLAN on a port, complete the following tasks: Enable MAC authentication. Enable MAC-based VLAN on the port. Create the VLAN to be specified as the MAC authentication guest VLAN. Configuration procedure Follow these steps to configure a MAC authentication guest VLAN: To do… Use the command… Remarks Enter system view system-view — Enter Layer 2 Ethernet interface view interface interface-type interface- number — Configure a MAC authentication guest VLAN mac-authentication guest-vlan guest- vlan-id Required By default, no MAC authentication guest VLAN is configured. You can configure only one MAC authentication guest VLAN on a port. Follow the guidelines in Table 8 when configuring a MAC authentication guest VLAN on a port.