HP A 5120 Manual
Have a look at the manual HP A 5120 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
131 Upon receiving an HTTP packet from a terminal, the access port performs portal authentication on the terminal. If a terminal triggers different types of authentication, the authentications are processed at the same time. A failure of one type of authentication does not affect the others. When a terminal passes one type of authentication, the other types of authentication being performed are terminated. Then, whether the other types of authentication can be triggered varies: If a terminal passes 802.1X authentication or portal authentication, no other types of authentication will be triggered for the terminal. If the terminal passes MAC authentication, no portal authentication can be triggered for the terminal, but 802.1X authentication can be triggered. When the terminal passes 802.1X authentication, the 802.1X authentication information will overwrite the MAC authentication information for the terminal. Using triple authentication with other features A port enabled with the three types of authentication also supports the following extended functions. VLAN assignment After a terminal passes authentication, the authentication server assigns a VLAN to the access port for the access terminal. The terminal can then access the network resources in the server-assigned VLAN. Auth-Fail VLAN or MAC authentication guest VLAN After a terminal fails authentication, the access port: Adds the terminal to an Auth-Fail VLAN, if it uses 802.1X or portal authentication service. Adds the terminal to a MAC authentication guest VLAN, if it uses MAC authentication service. A terminal may undergo all three types of authentication. If it fails to pass all types of authentication, the access port adds the terminal to the 802.1X Auth-Fail VLAN. Detection of online terminals You can enable an online detection timer to detect online portal clients. The timer defaults to 5 minutes, and is not configurable. You can enable the online handshake or periodic online user re-authentication function to detect online 802.1X clients at a configurable interval. You can enable an offline detection timer to detect online MAC authentication terminals at a configurable interval. NOTE: For more information about the extended functions, see the chapters “802.1X configuration,” “MAC authentication configuration,” and “Portal configuration.” Configuring triple authentication Follow these steps to configure triple authentication: To do… Use the command… Remarks Configure 802.1X authentication See the chapter ―802.1X configuration‖ Required
132 To do… Use the command… Remarks Configure MAC authentication See the chapter ―MAC authentication configuration‖ Configure at least one type of authenticationK Configure Layer-2 portal authentication See the chapter ―Portal configuration‖ NOTE: 802.1X authentication must use MAC-based access control. Triple authentication configuration examples Triple authentication basic function configuration example Network requirements As shown in Figure 45, the terminals are connected to a switch to access the IP network. It is required to configure triple authentication on the Layer-2 interface of the switch that connects to the terminals, so that a terminal passing one of the three authentication methods, 802.1X authentication, portal authentication, and MAC authentication, can access the IP network. More specifically, Configure static IP addresses in network 192.168.1.0/24 for the terminals. Use the remote RADIUS server to perform authentication, authorization, and accounting and configure the switch to send usernames carrying no ISP domain names to the RADIUS server. The local portal authentication server on the switch uses listening IP address 4.4.4.4. The switch sends a default authentication page to the web user and forwards authentication data using HTTP. Figure 45 Network diagram for triple authentication basic configuration Configuration procedure IP network RADIUS server Switch 1.1.1.2/24 802.1X client Printer Web user Vlan-int33.3.3.1 Vlan-int8192.168.1.1/24GE1/0/1 Vlan-int11.1.1.1
133 NOTE: Make sure that the terminals, the server, and the switch can reach each other. The host of the web user must have a route to the listening IP address of the local portal server. Complete the configuration on the RADIUS server and make sure the authentication, authorization, and accounting functions work normally. In this example, configure on the RADIUS server an 802.1X user (with username userdot), a portal user (with username userpt), and a MAC authentication user (with a username and password both being the MAC address of the printer 001588f80dd7). 1. Configure portal authentication. # Configure VLANs and IP addresses for the VLAN interfaces, and add ports to specific VLANs. (Details not shown) # Configure the local portal server to support HTTP. system-view [Switch] portal local-server http # Configure the IP address of interface loopback 12 as 4.4.4.4. [Switch] interface loopback 12 [Switch-LoopBack12] ip address 4.4.4.4 32 [Switch-LoopBack12] quit # Specify the listening IP address of the local portal server for Layer-2 portal authentication as 4.4.4.4. [Switch] portal local-server ip 4.4.4.4 # Enable Layer-2 portal authentication on GigabitEthernet 1/0/1. [Switch] interface gigabitethernet 1/0/1 [Switch–GigabitEthernet1/0/1] portal local-server enable [Switch–GigabitEthernet1/0/1] quit 2. Configure 802.1X authentication. # Enable 802.1X authentication globally. [Switch] dot1x # Enable 802.1X authentication (MAC-based access control required) on GigabitEthernet 1/0/1. [Switch] interface gigabitethernet 1/0/1 [Switch–GigabitEthernet1/0/1] dot1x port-method macbased [Switch–GigabitEthernet1/0/1] dot1x [Switch–GigabitEthernet1/0/1] quit 3. Configure MAC authentication. # Enable MAC authentication globally. [Switch] mac-authentication # Enable MAC authentication on GigabitEthernet 1/0/1. [Switch] interface gigabitethernet 1/0/1 [Switch–GigabitEthernet1/0/1] mac-authentication [Switch–GigabitEthernet1/0/1] quit 4. Configure a RADIUS scheme. # Create a RADIUS scheme named rs1. [Switch] radius scheme rs1 # Specify the server type for the RADIUS scheme, which must be extended when the iMC server is used.
134 [Switch-radius-rs1] server-type extended # Specify the primary authentication and accounting servers and keys. [Switch-radius-rs1] primary authentication 1.1.1.2 [Switch-radius-rs1] primary accounting 1.1.1.2 [Switch-radius-rs1] key authentication radius [Switch-radius-rs1] key accounting radius # Specify usernames sent to the RADIUS server to carry no domain names. [Switch-radius-rs1] user-name-format without-domain [Switch-radius-rs1] quit 5. Configure an ISP domain. # Create an ISP domain named triple. [Switch] domain triple # Configure the default AAA methods for all types of users in the domain. [Switch-isp-triple] authentication default radius-scheme rs1 [Switch-isp-triple] authorization default radius-scheme rs1 [Switch-isp-triple] accounting default radius-scheme rs1 [Switch-isp-triple] quit # Configure domain triple as the default domain. If a username input by a user includes no ISP domain name, the authentication scheme of the default domain is used. [Switch] domain default enable triple Verification User userdot uses the 802.1X client to initiate authentication. After inputting the correct username and password, the user can pass 802.1X authentication. Web user userpt uses a web browser to access an external network. The web request is redirected to the authentication page http://4.4.4.4/portal/logon.htm. After inputting the correct username and password, the web user can pass portal authentication. The printer can pass MAC authentication after being connected to the network. Use the display connection command to view online users. [Switch] display connection Slot: 1 Index=30 , Username=userpt@triple IP=192.168.1.2 IPv6=N/A MAC=0015-e9a6-7cfe Index=31 , Username=userdot@triple IP=192.168.1.3 IPv6=N/A MAC=0002-0002-0001 Index=32 , Username=001588f80dd7@triple IP=192.168.1.4 IPv6=N/A MAC=0015-88f8-0dd7 Total 3 connection(s) matched on slot 1. Total 3 connection(s) matched.
135 Triple authentication supporting VLAN assignment and Auth-Fail VLAN configuration example Network requirement As shown in Figure 46, the terminals are connected to a switch to access the IP network. It is required to configure triple authentication on the Layer-2 interface of the switch which connects to the terminals, so that a terminal passing one of the three authentication methods, 802.1X authentication, portal authentication, and MAC authentication, can access the IP network. More specifically, Portal terminals request IP addresses through DHCP. They obtain IP addresses in 192.168.1.0/24 before authentication and in 3.3.3.0/24 after passing authentication. 802.1X terminals use IP addresses in 192.168.1.0/24 before authentication, and request IP addresses in 3.3.3.0/24 through DHCP after passing authentication. If the terminal fails authentication, it uses an IP address in 2.2.2.0/24. After passing authentication, the printer obtains the IP address 3.3.3.111/24 that is bound with its MAC address through DHCP. Use the remote RADIUS server to perform authentication, authorization, and accounting and configure the switch to send usernames carrying no ISP domain names to the RADIUS server. The local portal authentication server on the switch uses listening IP address 4.4.4.4. The switch sends a default authentication page to the web user and forwards authentication data using HTTPS. Configure VLAN 3 as the authorized VLAN on the RADIUS server. Users passing authentication are added to this VLAN. Configure VLAN 2 as the Auth-Fail VLAN on the access device. Users failing authentication are added to this VLAN, and are allowed to access only the Update server. Figure 46 Network diagram for triple authentication supporting VLAN assignment and Auth-Fail VLAN Configuration procedure IP network RADIUS server Switch 1.1.1.2/24 802.1X client Printer Web user Update server2.2.2.2/24 Vlan-int33.3.3.1 Vlan-int8192.168.1.1/24 Vlan-int22.2.2.1/24 GE1/0/1 Vlan-int11.1.1.1
136 NOTE: Make sure that the terminals, the servers, and the switch can reach each other. When using an external DHCP server, ensure that the terminals can get IP addresses from the server before and after authentication. Complete the configuration on the RADIUS server, and make sure the authentication, authorization, and accounting functions work normally. In this example, configure on the RADIUS server an 802.1X user (with username userdot), a portal user (with username userpt), a MAC authentication user (with a username and password both being the MAC address of the printer 001588f80dd7), and an authorized VLAN (VLAN 3). Complete the configuration of PKI domain pkidm and acquire the local and CA certificates. For more information, see the chapter “PKI configuration.” Complete the editing of a self-defined default authentication page file, compress the file to a zip file named defaultfile and save the zip file at the root directory. 1. Configure DHCP. # Configure VLANs and IP addresses for the VLAN interfaces, and add ports to specific VLANs. (Details not shown) # Enable DHCP. system-view [Switch] dhcp enable # Exclude the IP address of the update server from assignment. [Switch] dhcp server forbidden-ip 2.2.2.2 # Configure IP address pool 1, including the address range, lease and gateway address. A short lease is recommended to shorten the time terminals use to re-acquire IP addresses after the terminals passing or failing authentication. [Switch] dhcp server ip-pool 1 [Switch-dhcp-pool-1] network 192.168.1.0 mask 255.255.255.0 [Switch-dhcp-pool-1] expired day 0 hour 0 minute 1 [Switch-dhcp-pool-1] gateway-list 192.168.1.1 [Switch-dhcp-pool-1] quit NOTE: A short lease is recommended to shorten the time that terminals use to re-acquire IP addresses after passing or failing authentication. However, in some applications, a terminal can require a new IP address before the lease duration expires. For example, the iNode 802.1X client automatically renews its IP address after disconnecting from the server. # Configure IP address pool 2, including the address range, lease and gateway address. A short lease is recommended to shorten the time terminals use to re-acquire IP addresses after the terminals pass authentication. [Switch] dhcp server ip-pool 2 [Switch-dhcp-pool-2] network 2.2.2.0 mask 255.255.255.0 [Switch-dhcp-pool-2] expired day 0 hour 0 minute 1 [Switch-dhcp-pool-2] gateway-list 2.2.2.1 [Switch-dhcp-pool-2] quit # Configure IP address pool 3, including the address range, lease and gateway address. A short lease is recommended to shorten the time terminals use to re-acquire IP addresses after the terminals are offline. [Switch] dhcp server ip-pool 3
137 [Switch-dhcp-pool-3] network 3.3.3.0 mask 255.255.255.0 [Switch-dhcp-pool-3] expired day 0 hour 0 minute 1 [Switch-dhcp-pool-3] gateway-list 3.3.3.1 [Switch-dhcp-pool-3] quit # Configure IP address pool 4, and bind the printer MAC address 0015-e9a6-7cfe to the IP address 3.3.3.111/24 in this address pool. [Switch] dhcp server ip-pool 4 [Switch-dhcp-pool-4] static-bind ip-address 3.3.3.111 mask 255.255.255.0 [Switch-dhcp-pool-4] static-bind mac-address 0015-e9a6-7cfe [Switch-dhcp-pool-4] quit 2. Configure portal authentication. # Create SSL server policy sslsvr and specify it to use PKI domain pkidm. [Switch] ssl server-policy sslsvr [Switch-ssl-server-policy-sslsvr] pki pkidm [Switch-ssl-server-policy-sslsvr] quit # Configure the local portal server to support HTTPS and use SSL server policy sslsvr. [Switch] portal local-server https server-policy sslsvr # Configure IP address 4.4.4.4 for interface loopback 12. [Switch] interface loopback 12 [Switch-LoopBack12] ip address 4.4.4.4 32 [Switch-LoopBack12] quit # Specify the listening IP address of the local portal server as 4.4.4.4. [Switch] portal local-server ip 4.4.4.4 # Enable Layer-2 portal authentication on GigabitEthernet 1/0/1 and specify VLAN 2 as the Auth-Fail VLAN, to which terminals failing authentication are added. [Switch] interface gigabitethernet 1/0/1 [Switch–GigabitEthernet1/0/1] port link-type hybrid [Switch–GigabitEthernet1/0/1] mac-vlan enable [Switch–GigabitEthernet1/0/1] portal local-server enable [Switch–GigabitEthernet1/0/1] portal auth-fail vlan 2 [Switch–GigabitEthernet1/0/1] quit 3. Configure 802.1X authentication. # Enable 802.1X authentication globally. [Switch] dot1x # Enable 802.1X authentication (MAC-based access control required) on GigabitEthernet 1/0/1, and specify VLAN 2 as the Auth-Fail VLAN. [Switch] interface gigabitethernet 1/0/1 [Switch–GigabitEthernet1/0/1] dot1x port-method macbased [Switch–GigabitEthernet1/0/1] dot1x [Switch–GigabitEthernet1/0/1] dot1x auth-fail vlan 2 [Switch–GigabitEthernet1/0/1] quit 4. Configure MAC authentication. # Enable MAC authentication globally. [Switch] mac-authentication
138 # Enable MAC authentication on GigabitEthernet 1/0/1, and specify VLAN 2 as the Auth-Fail VLAN [Switch] interface gigabitethernet 1/0/1 [Switch–GigabitEthernet1/0/1] mac-authentication [Switch–GigabitEthernet1/0/1] mac-authentication guest-vlan 2 [Switch–GigabitEthernet1/0/1] quit 5. Configure a RADIUS scheme. # Create a RADIUS scheme named rs1. [Switch] radius scheme rs1 # Specify the server type for the RADIUS scheme, which must be extended when the iMC server is used. [Switch-radius-rs1] server-type extended # Specify the primary authentication and accounting servers and keys. [Switch-radius-rs1] primary authentication 1.1.1.2 [Switch-radius-rs1] primary accounting 1.1.1.2 [Switch-radius-rs1] key authentication radius [Switch-radius-rs1] key accounting radius # Specify usernames sent to the RADIUS server to carry no domain names. [Switch-radius-rs1] user-name-format without-domain [Switch-radius-rs1] quit 6. Configure an ISP domain. # Create an ISP domain named triple. [Switch] domain triple # Configure the default AAA methods for all types of users in the domain. [Switch-isp-triple] authentication default radius-scheme rs1 [Switch-isp-triple] authorization default radius-scheme rs1 [Switch-isp-triple] accounting default radius-scheme rs1 [Switch-isp-triple] quit # Configure domain triple as the default domain. If a username input by a user includes no ISP domain name, the authentication scheme of the default domain is used. [Switch] domain default enable triple Verification User userdot uses the 802.1X client to initiate authentication. After inputting the correct username and password, the user can pass 802.1X authentication. Web user userpt uses a web browser to access an external network. The web request is redirected to the authentication page http://4.4.4.4/portal/logon.htm. After inputting the correct username and password, the web user can pass portal authentication. The printer can pass MAC authentication after being connected to the network. Use the display connection command to view connection information about online users. [Switch] display connection Slot: 1 Index=30 , Username=userpt@triple IP=192.168.1.2 IPv6=N/A MAC=0015-e9a6-7cfe Index=31 , Username=userdot@triple
139 IP=3.3.3.2 IPv6=N/A MAC=0002-0002-0001 Index=32 , Username=001588f80dd7@triple IP=N/A IPv6=N/A MAC=0015-88f8-0dd7 Total 3 connection(s) matched on slot 1. Total 3 connection(s) matched. Use the display mac-vlan all command to view the MAC-VLAN entries of online users. VLAN 3 is the authorized VLAN. [Switch] display mac-vlan all The following MAC VLAN addresses exist: S:Static D:Dynamic MAC ADDR MASK VLAN ID PRIO STATE -------------------------------------------------------- 0015-e9a6-7cfe ffff-ffff-ffff 3 0 D 0002-0002-0001 ffff-ffff-ffff 3 0 D 0015-88f8-0dd7 ffff-ffff-ffff 3 0 D Total MAC VLAN address count:3 Use the display dhcp server ip-in-use command to view the IP addresses assigned to online users. [Switch] display dhcp server ip-in-use all Pool utilization: 0.59% IP address Client-identifier/ Lease expiration Type Hardware address 3.3.3.111 0015-88f8-0dd7 Feb 15 2011 17:40:52 Auto:COMMITTED 3.3.3.2 0002-0002-0001 Feb 15 2011 17:41:02 Auto:COMMITTED 3.3.3.3 0015-e9a6-7cfe Unlimited Manual --- total 3 entry --- When a terminal fails authentication, it is added to VLAN 2. You can also use the display commands to view the MAC-VLAN entry and IP address of the terminal.
140 Port security configuration Port security overview Port security is a MAC address-based security mechanism for network access control. It is an extension to the existing 802.1X authentication and MAC authentication. It prevents access of unauthorized devices to a network by checking the source MAC address of inbound traffic and access to unauthorized devices by checking the destination MAC address of outbound traffic. Port security enables you to control MAC address learning and authentication on ports. This enables the port to learn legal source MAC addresses. With port security enabled, frames whose source MAC addresses cannot be learned by the device in a security mode are considered illegal; the events that users do not pass 802.1X authentication or MAC authentication are considered illegal. Upon detection of illegal frames or events, the device takes the pre-defined action automatically. When enhancing the system security, this also greatly reduces your maintenance burden. NOTE: The security modes of the port security feature provide extended and combined use of 802.1X authentication and MAC authentication. They apply to scenarios that require both 802.1X authentication and MAC authentication. For scenarios that require only 802.1X authentication or MAC authentication, HP recommends you configure 802.1X authentication or MAC authentication rather than port security. For information about 802.1X and MAC authentication, see the chapters “802.1X configuration” and “MAC authentication configuration.” Port security features NTK The need to know (NTK) feature checks the destination MAC addresses in outbound frames and allows frames to be sent to only devices and hosts that have passed authentication or are using MAC addresses on the MAC address list. This prevents illegal devices from intercepting network traffic. Intrusion protection The intrusion protection feature checks the source MAC address in inbound frames for illegal frames and takes a pre-defined action on each detected illegal frame. The action can be disabling the port temporarily, disabling the port permanently, or blocking frames from the illegal MAC address for three minutes (not user configurable). Port security traps You can configure the port security module to send traps for port security events such as login, logoff, and MAC authentication. These traps help you monitor user behaviors. Port security modes Port security supports the following categories of security modes: