Home > HP > Switch > HP A 5120 Manual

HP A 5120 Manual

    Download as PDF Print this page Share this page

    Have a look at the manual HP A 5120 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							 
    111 
    Authentication page customization support 
    The  local  portal  server  function  allows  you  to  customize  authentication  pages.  You  can  customize 
    authentication pages by editing the corresponding HTML files and then compress and save the files to the 
    storage  medium  of  the  device.  A  set  of  customized  authentication  pages  consists of  six  authentication 
    pages—the  logon  page,  the  logon  success  page,  the  online  page,  the  logoff  success  page,  the  logon 
    failure  page,  and  the  system  busy  page.  A  local  portal  server  will  push  a  corresponding  authentication 
    page  at  each  authentication  phase.  If  you  do  not  customize  the  authentication  pages, the local  portal 
    server will push the default authentication pages.  
     NOTE: 
    For the rules of customizing authentication pages, see “Customizing authentication pages.”  
    Portal authentication modes 
    Portal  authentication may  work  at Layer  2 or Layer  3 of  the  OSI  model. The A5120  EI Switch Series 
    supports only Layer 2 authentication mode. 
    In Layer  2  authentication  mode,  portal  authentication  is  enabled  on  an  access  device’s  Layer  2  port  that 
    connects authentication clients, and allows only clients whose source MAC addresses pass authentication 
    to  access  the  external  network.  Now,  only  local  portal  authentication  supports  Layer  2  mode,  where  the 
    access device serves as the local portal server to perform web authentication on clients. 
    In addition, Layer 2 authentication allows the authentication server to assign different VLANs according to 
    user authentication  results  so  that access  devices  can  control  user  access  to  resources.  After  a  client 
    passes authentication,  the authentication server  can  assign  an  authorized  VLAN  to  allow  the user  to 
    access  the  resources  in  the  VLAN.  If  a  client fails authentication,  the authentication server  can  assign  an 
    Auth-Fail VLAN.  
    Layer 2 portal authentication process 
    Only  local  portal  authentication supports Layer  2 mode. Figure  42 illustrates  the  process of local Layer-2 
    portal authentication: 
    Figure 42 Local Layer-2 portal authentication process 
     
     
    As shown in Figure 42, the local Layer-2 portal authentication process includes the following steps. 
    1. The portal authentication client sends an HTTP or HTTPS request. Upon receiving the HTTP request, 
    the access device redirects it to the listening IP address of the local portal server, which then pushes 
    a web authentication page to the authentication client. The user types the username and password 
    on web authentication page. The listening IP address of the local portal server is the IP address of a 
    Layer 3 interface on the access device which is routable to the portal client. Usually, it is a 
    loopback interface’s IP address. Authentication/accounting server
    1) Initiate a connection
    2) RADIUS authentication
    3) Notify the user of login success
    Access deviceAuthentication client  
    						
    							 
    112 
    2. The access device and the RADIUS server exchange RADIUS packets to authenticate the user. 
    3. If the user passes RADIUS authentication, the local portal server pushes a logon success page to the 
    authentication client. 
    Authorized VLAN 
    Layer 2 portal authentication supports VLAN assignment by the authentication server. After a user passes 
    portal  authentication, if  the  authentication  server  is  configured  with an authorized  VLAN for  the  user,  the 
    authentication  server  assigns the authorized  VLAN  to  the  access  device,  which  will  then add  the  user  to 
    the authorized VLAN and generate a MAC VLAN entry. If this VLAN does not exist, the access device will 
    first create the VLAN and then add the user to the VLAN. 
    By  deploying  the  authorized  VLAN  assignment function, you  can  control  which  network  resources users 
    passing portal authentication can access. 
    Auth-Fail VLAN 
    The Auth-Fail  VLAN feature allows  users  failing authentication to  access a  VLAN that  accommodates 
    network resources such as the patches server, virus definitions server, client software server, and anti-virus 
    software  server, so  that  the  users  can upgrade their client software or  other  programs.  Such  a  VLAN  is 
    called an ―Auth-Fail VLAN‖. 
    Layer  2  portal  authentication  supports  MAC-based  Auth-Fail  VLAN  (MAFV).  With an  Auth-Fail  VLAN 
    configured  on  a  port,  if  a  user  on  the  port  fails  authentication, the  access  devices  creates  a MAC  VLAN 
    entry based on the MAC address of the user and adds the user to the Auth-Fail VLAN. Then, the user can 
    access the non-HTTP resources in the Auth-Fail VLAN, and all HTTP requests of the user will be redirected 
    to  the  authentication page. If the  user passes  authentication,  the  access  device  adds  the  user  to  the 
    assigned VLAN  or  return  the  user  to the initial VLAN of  the  port,  depending  on whether  the 
    authentication server assigns a VLAN. If the user fails the authentication, the access device keeps the user 
    in  the  Auth-Fail  VLAN. If  an  access  port  receives  no  traffic  from  a  user in  the  Auth-Fail  VLAN  during  a 
    specified  period  of  time (90  seconds  by  default), it removes the user from  the  Auth-Fail  VLAN and  adds 
    the user to the initial VLAN of the port.  
     NOTE: 
    After a user is added to the authorized VLAN or Auth-Fail VLAN, the IP address of the client needs to 
    be automatically or manually updated to ensure that the client can communicate with the hosts in the 
    VLAN.  
    Assignment of authorized ACLs 
    The  device  can  use  ACLs  to  control  user  access  to  network  resources  and  limit  user  access  rights.  With 
    authorized  ACLs  specified  on  the  authentication  server,  when  a user  passes  authentication,  the 
    authentication server assigns an authorized ACL for the user, and the device filters traffic from the user on 
    the  access  port  according  to  the  authorized  ACL.  You  must  configure  the  authorized  ACLs  on  the  access 
    device  if  you  specify  authorized  ACLs  on  the  authentication  server.  To  change  the  access  right  of  a  user, 
    specify  a  different  authorized  ACL  on  the  authentication  server  or  change  the  rules  of  the  corresponding 
    authorized ACL on the device. 
    Portal configuration task list 
    Complete these tasks to configure Layer 2 portal authentication:  
    						
    							 
    113 
    Task Remarks 
    Specifying the local portal server for Layer 2 portal authentication Required 
    Configuring the local portal server Customizing authentication pages Optional 
    Configuring the local portal server Required 
    Controlling access of portal 
    users 
    Configuring a portal-free rule 
    Optional 
    Setting the maximum number of online portal 
    users 
    Specifying an authentication domain for portal 
    users 
    Adding a web proxy server port number 
    Enabling support for portal user moving 
    Specifying the Auth-Fail VLAN for portal authentication Optional 
    Specifying the auto redirection URL for authenticated portal users Optional 
    Logging off portal users Optional 
     
    Configuration prerequisites 
    The  portal  feature  provides  a  solution for  user identity authentication  and security  check.  However,  the 
    portal feature cannot  implement  this  solution by  itself. RADIUS authentication needs  to  be  configured  on 
    the access device to cooperate with the portal feature to complete user authentication.  
    Before you configure portal authentication, complete the following tasks: 
     The  portal  server  and  the  RADIUS  server  have been  installed  and  configured  properly. Local portal 
    authentication requires no independent portal server be installed. 
     The portal client, access device, and servers are routable to each other. 
     With RADIUS authentication,  usernames and  passwords  of  the  users are  configured on  the  RADIUS 
    server,  and  the RADIUS  client configurations  are  performed on  the  access  device.  For information 
    about RADIUS client configuration, see the chapter ―AAA configuration.‖ 
     To implement extended  portal functions,  install  and  configure iMC  EAD, and ensure  that the  ACLs 
    configured on the access device correspond to those specified for resources in the quarantined area 
    and restricted resources  on  the  security  policy  server respectively. For information  about  security 
    policy server configuration on the access device, see the chapter ―AAA configuration.‖  
     NOTE: 
     For installation and configuration about the security policy server, see iMC EAD Security Policy Help. 
     The ACL for resources in the quarantined area and that for restricted resources correspond to isolation ACL and 
    security ACL on the security policy server respectively. 
     You can modify the authorized ACLs on the access device. However, your changes take effect only for portal 
    users logging on after the modification.   
    						
    							 
    114 
    Specifying the local portal server for Layer 2 portal 
    authentication 
    Layer 2 portal authentication uses the local portal server. You need to specify the IP address of a Layer 3 
    interface  on  the  device that is  routable  to  the  portal  client  as  the  listening  IP  address  of  the  local  portal 
    server. HP strongly recommends that you use the IP address of a loopback interface rather than a physical 
    Layer 3 interface, because: 
     The  status  of  a  loopback  interface  is  stable. There  will  be  no authentication  page  access  failures 
    caused by interface failures. 
     A loopback interface does not forward received packets to any network, avoiding impact on system 
    performance when there are many network access requests. 
    Follow these steps to specify the local portal server for Layer 2 portal authentication: 
    To do… Use the command… Remarks 
    Enter system view system-view — 
    Specify the listening IP address of 
    the local portal server for Layer 2 
    portal authentication 
    portal local-server ip ip-address 
    Required 
    By default, no listening IP address 
    is specified. 
     
     NOTE: 
    The specified listening IP address can be changed or deleted only if Layer 2 portal authentication is not 
    enabled on any port.  
    Configuring the local portal server 
    Configuring  a  local  portal  server  is  required  only  for  local  portal  authentication. During  local  portal 
    authentication,  the  local  portal  server  pushes  authentication  pages  to users.  You can define the 
    authentication  pages for users;  otherwise,  the  default  authentication  pages  will  be  used  during  the 
    authentication process. 
    Customizing authentication pages 
    Customized authentication  pages exist in the  form  of HTML  files. You  can compress them and  then  save 
    them in the storage medium of the access device.  
    A set  of  authentication  pages includes six main  authentication pages and their page  elements.  The  six 
    main  authentication pages  are the  logon  page,  the  logon  success  page,  the  logon  failure  page,  the 
    online page, the system busy page, and the logoff success page. The page elements refer to the files that 
    the authentication pages reference, for example, back.jpg for page Logon.htm. Each main authentication 
    page  can  reference  multiple  page  elements.  If  you define only some of  the  main  authentication  pages, 
    the system will use the default authentication pages for the undefined ones. 
    For  the  local  portal  server  to  operate  normally  and  steadily, you  need  to  follow the  following rules  when 
    customizing authentication pages: 
    Rules on file names 
    The  main  authentication  pages have  predefined  file  names,  which  cannot  be  changed.  The  following 
    table lists the names.  
    						
    							 
    115 
    Table 9 Main authentication page file names 
    Main authentication page File name 
    Logon page logon.htm 
    Logon success page logonSuccess.htm 
    Logon failure page logonFail.htm 
    Online page 
    Pushed after the user gets online for online notification online.htm 
    System busy page 
    Pushed when the system is busy or the user is in the logon process busy.htm 
    Logoff success page logoffSuccess.htm 
     
     NOTE: 
    You can define the names of the files other than the main authentication page files. The file names and 
    directory names are case-insensitive.   
    Rules on page requests 
    The local portal server supports only Post and Get requests. 
     Get  requests  are  used  to  get  the  static  files  in  the  authentication  pages  and  allow  no  recursion.  For 
    example, if file  Logon.htm  includes  contents that  perform  Get  action  on file ca.htm, file ca.htm 
    cannot include any reference to file Logon.htm. 
     Post requests are used when users submit username and password pairs, log on the system, and log 
    off the system. 
    Rules on Post request attributes 
    1. Observe the following requirements when editing a form of an authentication page: 
     An  authentication  page  can  have  multiple  forms,  but  there  must  be  one  and  only  one  form  whose 
    action is logon.cgi. Otherwise, user information cannot be sent to the local portal server. 
     The username attribute is fixed as PtUser, and the password attribute is fixed as PtPwd. 
     Attribute PtButton is  required  to indicate the  action  that  the  user  requests,  which  can  be Logon or 
    Logoff. 
     A logon Post request must contain PtUser, PtPwd, and PtButton attributes. 
     A logoff Post request must contain the PtButton attribute. 
    2. Authentication pages logon.htm and logonFail.htm must contain the logon Post request. 
    The following example shows part of the script in page logon.htm. 
     
    User  name: 
    Password  : 
     
     
    3. Authentication pages logonSuccess.htm and online.htm must contain the logoff Post request.  
    						
    							 
    116 
    The following example shows part of the script in page online.htm. 
     
     
     
    Rules on page file compression and saving 
     A  set  of  authentication  page  files  must be compressed into  a  standard  zip  file.  The  name  of  a  zip 
    file  can  contain  only  letters,  numerals,  and  underscores.  The  zip  file  of  the  default  authentication 
    pages must be saved with name defaultfile.zip. 
     The set of authentication pages must be located in the root directory of the zip file. 
     Zip  files  can  be  transferred  to  the  device  through  FTP  or  TFTP,  and  must  be  saved  in  the  specified 
    directory  of  the  device.  The default  authentication  pages  file  must  be  saved  in  the  root  directory  of 
    the  device,  and  other  authentication  files  can  be  saved  in  the  root  directory  or  the portal directory 
    under the root directory of the device. 
    Examples of zip files on the device: 
     dir 
    Directory of flash:/portal/ 
       0     -rw-      1405  Feb 28 2011 15:53:31   ssid2.zip 
       1     -rw-      1405  Feb 28 2011 15:53:20   ssid1.zip 
       2     -rw-      1405  Feb 28 2011 15:53:39   ssid3.zip 
       3     -rw-      1405  Feb 28 2011 15:53:44   ssid4.zip 
    2540 KB total (1319 KB free) 
    Rules on file size and contents 
    For the  system  to  push  customized  authentication  pages smoothly,  you  need  comply  with  the  following 
    size and content requirements on authentication pages. 
     The size of the zip file of each set of authentication pages, including the main authentication pages 
    and the page elements, must be no more than 500 KB.  
     The  size  of  a  single  page,  including  the  main  authentication  page  and  its  page elements, must be 
    no more than 50 KB before being compressed. 
     Page elements can contain only static contents such as HTML, JS, CSS, and pictures. 
    Logging off a user who closes the logon success or online page 
    After a user passes authentication, the system pushes the logon success page named logonSuccess.htm. If 
    the  user  initiates  another  authentication  through  the  logon  page,  the  system  pushes  the  online  page 
    named online.htm. You can configure the device to forcibly log off the user when the user closes either of 
    these two pages. To do so, add the following contents in logonSuccess.htm and online.htm: 
    1. Reference to JS file pt_private.js. 
    2. Function pt_unload(), which is used to trigger page unloading. 
    3. Function pt_submit(), the event handler function for Form. 
    4. Function pt_init(), which is for triggering page loading. 
    The following is a script example with the added contents highlighted in gray: 
         
         
         
          
    						
    							 
    117 
         
        ... ... 
     
        ... ... 
         
         
     
    Redirecting authenticated users to a specified web page 
    To  make  the  device automatically redirect  users  passing authentication to  a  specified  web  page,  do  the 
    following in logon.htm and logonSuccess.htm: 
    1. In logon.htm, set the target attribute of Form to blank. 
    See the contents in gray: 
         
    2. Add the function for page loading pt_init() to logonSucceess.htm. 
    See the contents in gray: 
         
         
        LogonSuccessed 
         
         
         
        ... ... 
         
      
     NOTE: 
     HP recommends that you use browser IE 6.0 or above on the authentication clients. 
     Ensure that the browser of an authentication client permits pop-ups or permits pop-ups from the access device. 
    Otherwise, the user cannot log off by closing the logon success or online page and can only click Cancel to 
    return back to the logon success or online page. 
     If a user refreshes the logon success or online page, or jumps to another web site from either of the pages, the 
    device also logs off the user. 
     If a user is using the Chrome browser, the device cannot log off the user when the user closes the logon success 
    or online page.  
    Configuring the local portal server 
    To make the local portal server take effect, you need to specify the protocol to be used for communication 
    between the portal client and local portal server. 
    Configuration prerequisites 
    Before you configure the local portal server to support HTTPS, complete the following tasks: 
     Configure  PKI  policies,  obtain  the  CA  certificate,  and  apply  for  a  local  certificate.  For more 
    information, see the chapter ―PKI configuration.‖  
    						
    							 
    118 
     Configure  the  SSL  server  policy,  and  specify  the  PKI  domain  to  be  used,  which  is  configured  in  the 
    above step. For more information, see the chapter ―SSL configuration.‖ 
    When  you specify the  protocol  for  the  local  portal  server  to  support,  the  local  portal  server  will  load  the 
    default  authentication  page  file, which is supposed  to  be  saved  in  the  root  directory  of  the  device.  To 
    ensure that  the  local  portal  server  uses  the  user-defined  default  authentication  pages,  you  need  to  edit 
    and save them properly. Otherwise, the system default authentication pages will be used. 
    Configuration procedure 
    Follow these steps to configure the local portal server: 
    To do… Use the command… Remarks 
    Enter system view system-view — 
    Configure the protocol type for 
    the local portal server to support 
    and load the default 
    authentication page file 
    portal local-server { http | https 
    server-policy policy-name } 
    Required 
    By default, the local portal server 
    does not support any protocol. 
    Configure the welcome banner of 
    the default authentication pages 
    of the local portal server 
    portal server banner banner-string Optional 
    No welcome banner by default. 
     
    Enabling Layer 2 portal authentication 
    Only  after  you  enable  portal  authentication  on  an  access  interface  can  the  access interface perform 
    portal authentication on connected clients. 
    Before  enabling  Layer  2  portal  authentication,  make  sure  that the  listening  IP  address of  the  local  portal 
    server is specified. 
    Follow these steps to enable Layer 2 portal authentication: 
    To do… Use the command… Remarks 
    Enter system view system-view — 
    Enter Layer 2 Ethernet interface 
    view 
    interface interface-type interface-
    number — 
    Enable Layer 2 portal 
    authentication on the port portal local-server enable Required 
    Not enabled by default. 
     
     NOTE: 
     To ensure normal operation of portal authentication on a Layer 2 port, HP does not recommend you to enable 
    port security, guest VLAN of 802.1X, or EAD fast deployment of 802.1X on the port. 
     To support assignment of authorized VLANs, you must enable the MAC-based VLAN function on the port.   
    						
    							 
    119 
    Controlling access of portal users 
    Configuring a portal-free rule 
    A portal-free  rule  allows specified users to  access specified external  websites without  portal 
    authentication.  
    For Layer 2 portal authentication, you can configure only a portal-free rule that is from any source address 
    to  any  or  a  specified  destination  address.  If  you  configure  a  portal-free  rule that  is  from  any  source 
    address to a specified destination address, users can access the specified address  directly, without being 
    redirected  to  the  portal  authentication  page  for  portal  authentication.  Usually,  you  can  configure  the  IP 
    address  of  a  server  that  provides  certain  services  (such as  software  upgrading  service)  as  the  destination 
    IP address of a portal-free rule, so that Layer 2 portal authentication users can access the services without 
    portal authentication. 
    Follow these steps to configure a portal-free rule: 
    To do… Use the command… Remarks 
    Enter system view system-view — 
    Configure a portal-free rule portal free-rule rule-number { destination { any | ip { ip-
    address mask { mask-length | netmask } | any } } } * Required 
     
     NOTE: 
     You cannot configure two or more portal-free rules with the same filtering criteria. Otherwise, the system prompts 
    that the rule already exists.  
     No matter whether portal authentication is enabled or not, you can only add or remove a portal-free rule. You 
    cannot modify it.  
    Setting the maximum number of online portal users 
    You can use this feature to control the total number of online portal users in the system. 
    Follow these steps to set the maximum number of online portal users allowed in the system: 
    To do… Use the command… Remarks 
    Enter system view system-view — 
    Set the maximum number of 
    online portal users portal max-user max-number Required 
    1000 by default. 
     
     NOTE: 
     The maximum number of online portal users that is assigned by the switch depends on the ACL resources of the 
    switch. 
     If the maximum number of online portal users specified in the command is less than that of the current online 
    portal users, the command can be executed successfully and will not impact the online portal users, but the 
    system will not allow new portal users to log on until the number drops down below the limit.   
    						
    							 
    120 
    Specifying an authentication domain for portal users 
    After  you  specify an authentication  domain  for  portal  users  on  an  interface, the  device  uses the 
    authentication domain  for authentication,  authorization,  and  accounting  (AAA) of all portal  users  on  the 
    interface,  ignoring  the  domain  names carried  in  the  usernames.  This  allows  you  to  specify  different 
    authentication domains for different interfaces as needed. 
    Follow these steps to specify an authentication domain for portal users on an interface: 
    To do… Use the command… Remarks 
    Enter system view system-view — 
    Enter interface view interface interface-type 
    interface-number — 
    Specify an authentication domain 
    for portal users on the interface portal domain domain-name 
    Required 
    By default, no authentication domain 
    is specified for portal users. 
     
     NOTE: 
    The device selects the authentication domain for a portal user on an interface in this order: the 
    authentication domain specified for the interface, the authentication domain carried in the username, 
    and the system default authentication domain. For information about the default authentication domain, 
    see the chapter “AAA configuration.”  
    Adding a web proxy server port number  
     NOTE: 
    Only Layer 2 portal authentication supports this feature.  
    By  default,  only  HTTP  requests  from  unauthenticated  users  to  port  80  trigger  portal  authentication.  If  an 
    unauthenticated  user  uses  a  web  proxy  server  and  the  port  number  of  the  proxy  server  is  not  80,  the 
    user’s  HTTP  requests  cannot  trigger  portal  authentication  and  will  be  dropped.  To  solve  this  problem, 
    configure the port numbers of the web proxy servers on the device.  
    If  there  are  web  servers  that  use  non-80  port  numbers  on  your  network  and  users  must  pass  portal 
    authentication  before  accessing  the  servers,  you  can  also  add  proxy  web  server  port  numbers  on  the 
    device for the web servers so that HTTP requests to those web servers trigger portal authentication. 
    Follow  these  steps  to  add  a  web  proxy  server  port  number so  that  HTTP  requests destined  for this  port 
    number trigger portal authentication: 
    To do… Use the command… Remarks 
    Enter system view system-view — 
    Add a web proxy server port 
    number portal web-proxy port port-number 
    Required 
    By default, no web proxy server port 
    number is configured, and only HTTP 
    requests to port 80 trigger portal 
    authentication.  
      
    						
    All HP manuals Comments (0)