Home > HP > Switch > HP A 5120 Manual

HP A 5120 Manual

    Download as PDF Print this page Share this page

    Have a look at the manual HP A 5120 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							 
    241 
    SSL configuration 
    SSL overview 
    Secure  Sockets  Layer  (SSL)  is  a  security  protocol that provides secure  connection  services for  TCP-based 
    application  layer  protocols, such  as HTTP.  It  is  widely  used  in  E-business  and  online  banking to ensure 
    secure data transmission over the Internet.  
    SSL security mechanism 
    Secure connections provided by SSL have these features: 
     Confidentiality—SSL uses a symmetric encryption algorithm to encrypt data and uses the asymmetric 
    key  algorithm of Rivest,  Shamir,  and  Adelman (RSA)  to  encrypt the  key to  be  used  by  the symmetric 
    encryption algorithm. 
     Authentication—SSL supports certificate-based  identity authentication of the server  and  client by 
    using  the  digital  signatures. The SSL server  and  client obtain  certificates  from  a  certificate  authority 
    (CA) through the Public Key Infrastructure (PKI). 
     Reliability—SSL  uses the key-based  message  authentication  code  (MAC)  to  verify  message  integrity. 
    A MAC  algorithm transforms a  message of  any  length  to  a  fixed-length  message.  With  the  key,  the 
    sender  uses  the  MAC  algorithm  to  compute  the  MAC  value  of  a  message.  Then,  the  sender  suffixes 
    the  MAC  value  to  the  message  and  sends  the  result  to  the  receiver.  The receiver uses  the  same  key 
    and MAC  algorithm  to  compute  the  MAC  value  of  the  received  message,  and  compares  the  locally 
    computed MAC value with that received. If the two values match, the receiver considers the message 
    intact;  otherwise,  the  receiver  considers that the  message has  been tampered with  in  transit and 
    discards the message. 
    Figure 72 Message integrity verification by a MAC algorithm 
     
     
     NOTE: 
     For more information about symmetric key algorithms, asymmetric key algorithm RSA and digital signature, see 
    the chapter “Public key configuration.“ 
     For more information about PKI, certificate, and CA, see the chapter “PKI configuration.“  Key
    Message
    Sender
    Message
    Send to the receiver
    MAC
    KeyReceiver
    Compare
    MessageCompute the MAC
    Compute the MAC MAC
    MAC  
    						
    							 
    242 
    SSL protocol stack 
    The SSL protocol consists of two layers of protocols: the SSL record protocol at the lower layer and the SSL 
    handshake protocol, change cipher spec protocol, and alert protocol at the upper layer. 
    Figure 73 SSL protocol stack 
     
     
     SSL  record  protocol—Fragments data  to  be  transmitted, computes and  adds MAC  to  the  data,  and 
    encrypts the data before transmitting it to the peer end. 
     SSL  handshake  protocol—A  very  important  part  of  the  SSL  protocol  stack,  responsible  for 
    negotiating the cipher suite to be used for secure communication (including the symmetric encryption 
    algorithm, key  exchange  algorithm,  and  MAC algorithm),  securely  exchanging  the  key  between  the 
    server and client, and implementing identity authentication of the server and client. Through the SSL 
    handshake protocol, a session is established between a client and the server. A session consists of a 
    set of parameters, including the session ID, peer certificate, cipher suite, and master secret. 
     SSL change  cipher  spec  protocol—Used  for  notification  between the client  and  the  server  that  the 
    subsequent  packets  are  to  be  protected  and  transmitted based  on  the  newly  negotiated  cipher  suite 
    and key. 
     SSL alert protocol—Enables the SSL client and server to send alert messages to each other. An alert 
    message contains the alert severity level and a description. 
    SSL configuration task list 
    Complete the following tasks to configure SSL: 
    Task Remarks 
    Configuring an SSL server policy Required 
    Configuring an SSL client policy Optional 
     
    Configuring an SSL server policy 
    An SSL server policy is a set of SSL parameters for a server to use when booting up. An SSL server policy 
    takes effect only after it is associated with an application layer protocol such as HTTP. 
    Configuration prerequisites 
    Configure the PKI  domain for  the SSL  server  policy to  use  to obtain  the  server  side  certificate. For more 
    information about PKI domain configuration, see the chapter ―PKI configuration.― Application layer protocol (e.g. HTTP)
    TCP
    IP
    SSL handshake protocolSSL change cipher spec protocolSSL alert protocol
    SSL record protocol  
    						
    							 
    243 
    Configuration procedure 
    Follow these steps to configure an SSL server policy: 
    To do... Use the command... Remarks 
    Enter system view system-view — 
    Create an SSL server policy and 
    enter its view ssl server-policy policy-name Required 
    Specify a PKI domain for the SSL 
    server policy pki-domain domain-name 
    Required 
    By default, no PKI domain is 
    specified for an SSL server policy. 
    Specify the cipher suite(s) for the 
    SSL server policy to support 
    ciphersuite [ 
    rsa_3des_ede_cbc_sha | 
    rsa_aes_128_cbc_sha | 
    rsa_aes_256_cbc_sha | 
    rsa_des_cbc_sha | 
    rsa_rc4_128_md5 | 
    rsa_rc4_128_sha ] * 
    Optional 
    By default, an SSL server policy 
    supports all cipher suites. 
    Set the handshake timeout time 
    for the SSL server handshake timeout time Optional 
    3,600 seconds by default 
    Set the SSL connection close 
    mode close-mode wait Optional 
    Not wait by default 
    Set the maximum number of 
    cached sessions and the caching 
    timeout time 
    session { cachesize size | timeout 
    time } * 
    Optional 
    The defaults are as follows: 
     500 for the maximum number 
    of cached sessions, 
     3600 seconds for the caching 
    timeout time. 
    Enable certificate-based SSL client 
    authentication client-verify enable Optional 
    Not enabled by default 
     
     NOTE: 
     If you enable client authentication here, you must request a local certificate for the client. 
     SSL mainly comes in these versions: SSL 2.0, SSL 3.0, and TLS 1.0, where TLS 1.0 corresponds to SSL 3.1. When 
    the device acts as an SSL server, it can communicate with clients running SSL 3.0 or TLS 1.0, and can identify 
    Hello packets from clients running SSL 2.0. If a client running SSL 2.0 also supports SSL 3.0 or TLS 1.0 
    (information about supported versions is carried in the packet that the client sends to the server), the server will 
    notify the client to use SSL 3.0 or TLS 1.0 to communicate with the server.  
    SSL server policy configuration example 
    Network requirements 
    As  shown  in Figure  74,  users  can  access  and  control  the  device  through  web  pages.  For  security  of  the 
    device,  users  must  use  HTTPS  (HTTP Secure,  which  uses  SSL)  to  log  in  to  the  web  interface  of  the  device 
    and use SSL for identity authentication to ensure that data will not be eavesdropped or tampered with. 
    To achieve the goal, perform the following configurations:  
    						
    							 
    244 
     Configure Device to work as the HTTPS server and request a certificate for Device. 
     Request a certificate for Host so that Device can authenticate the identity of Host. 
     Configure a CA server to issue certificates to Device and Host.   
     NOTE: 
     In this example, Windows Server works as the CA server and the Simple Certificate Enrollment Protocol (SCEP) 
    plug-in is installed on the CA server.  
     Before performing the following configurations, ensure that the device, the host, and the CA server can reach 
    each other.  
    Figure 74 Network diagram for SSL server policy configuration 
     
     
    Configuration procedure 
    1. Configure the HTTPS server (Device) 
    #  Create  a  PKI  entity  named en, and configure  the  common  name  as http-server1 and the  FQDN  as 
    ssl.security.com. 
     system-view 
    [Device] pki entity en 
    [Device-pki-entity-en] common-name http-server1 
    [Device-pki-entity-en] fqdn ssl.security.com 
    [Device-pki-entity-en] quit 
    #  Create  PKI  domain 1, specify  the trusted CA as ca  server,  the  URL  of  the registration server  as 
    http://10.1.2.2/certsrv/mscep/mscep.dll,  the authority  for certificate  request as  RA, and the entity for 
    certificate request as en. 
    [Device] pki domain 1 
    [Device-pki-domain-1] ca identifier ca server 
    [Device-pki-domain-1] certificate request url http://10.1.2.2/certsrv/mscep/mscep.dll 
    [Device-pki-domain-1] certificate request from ra 
    [Device-pki-domain-1] certificate request entity en 
    [Device-pki-domain-1] quit 
    # Create the local RSA key pairs.  
    [Device] public-key local create rsa 
    # Retrieve the CA certificate.  
    [Device] pki retrieval-certificate ca domain 1 
    # Request a local certificate for Device. 
    [Device] pki request-certificate domain 1     10.1.1.1/2410.1.2.1/24
    HostCA
    10.1.1.2/2410.1.2.2/24
    Device          
    						
    							 
    245 
    # Create an SSL server policy named myssl.  
    [Device] ssl server-policy myssl 
    # Specify the PKI domain for the SSL server policy as 1.  
    [Device-ssl-server-policy-myssl] pki-domain 1 
    # Enable client authentication.  
    [Device-ssl-server-policy-myssl] client-verify enable 
    [Device-ssl-server-policy-myssl] quit 
    # Configure HTTPS service to use SSL server policy myssl. 
    [Device] ip https ssl-server-policy myssl 
    # Enable HTTPS service. 
    [Device] ip https enable 
    # Create a local user named usera, and set the password to 123 and service type to telnet. 
    [Device] local-user usera 
    [Device-luser-usera] password simple 123 
    [Device-luser-usera] service-type telnet 
    2. Configure the HTTPS client (Host) 
    On  Host,  launch  IE,  enter http://10.1.2.2/certsrv in  the address  bar  and  request  a certificate  for  Host as 
    prompted. 
    3. Verify your configuration 
    Launch IE on the host, enter https://10.1.1.1 in the address bar, and select the certificate issued by the CA 
    server. The web interface of the device should appear. After entering username usera and password 123, 
    you should be able to log in to the web interface to access and manage the device.  
     NOTE: 
     For more information about PKI configuration commands and the public-key local create rsa command, see the 
    Security Command Reference.  
     For more information about HTTPS, see the Fundamentals Configuration Guide.  
    Configuring an SSL client policy 
    An  SSL  client  policy  is  a  set  of  SSL  parameters  for  a  client  to  use  when  connecting  to  the  server.  An  SSL 
    client policy takes effect only after it is associated with an application layer protocol. 
    Configuration prerequisites 
    If the SSL server is configured to authenticate the SSL client, you must configure the PKI domain for the SSL 
    client  policy to  use  to  obtain  the  certificate  of  the  client.  For more  information about  PKI  domain 
    configuration, see the chapter ―PKI configuration.― 
    Configuration procedure 
    Follow these steps to configure an SSL client policy: 
    To do… Use the command… Remarks 
    Enter system view system-view —  
    						
    							 
    246 
    To do… Use the command… Remarks 
    Create an SSL client policy and 
    enter its view ssl client-policy policy-name Required 
    Specify a PKI domain for the SSL 
    client policy pki-domain domain-name 
    Optional 
    No PKI domain is configured by 
    default.  
    Specify the preferred cipher suite 
    for the SSL client policy 
    prefer-cipher { 
    rsa_3des_ede_cbc_sha | 
    rsa_aes_128_cbc_sha | 
    rsa_aes_256_cbc_sha | 
    rsa_des_cbc_sha | 
    rsa_rc4_128_md5 | 
    rsa_rc4_128_sha } 
    Optional 
    rsa_rc4_128_md5 by default 
    Specify the SSL protocol version 
    for the SSL client policy version { ssl3.0 | tls1.0 } Optional 
    TLS 1.0 by default 
    Enable certificate-based SSL 
    server authentication server-verify enable Optional 
    Enabled by default 
     
     NOTE: 
    If you enable client authentication on the server, you must request a local certificate for the client.  
    Displaying and maintaining SSL 
    To do… Use the command… Remarks 
    Display SSL server policy 
    information  
    display ssl server-policy { policy-
    name | all } [ | { begin | exclude 
    | include } regular-expression ] Available in any view 
    Display SSL client policy 
    information 
    display ssl client-policy { policy-
    name | all } [ | { begin | exclude 
    | include } regular-expression ]  
     
    Troubleshooting SSL 
    SSL handshake failure 
    Symptom 
    As the SSL server, the device fails to handshake with the SSL client. 
    Analysis 
    SSL handshake failure may result from the following causes: 
     The SSL client is configured to authenticate the SSL server, but the SSL server has no certificate or the 
    certificate is not trusted. 
     The SSL server is configured to authenticate the SSL client, but the SSL client has no certificate or the 
    certificate is not trusted.  
    						
    							 
    247 
     The server and the client have no matching cipher suite. 
    Solution 
    1. Issue the debugging ssl command and view the debugging information to locate the problem: 
     If the  SSL  client  is  configured  to  authenticate  the  SSL  server  but the  SSL  server  has  no  certificate, 
    request one for it. 
     If  the  server’s certificate  cannot  be  trusted,  install the root  certificate of  the  CA that issued the  local 
    certificate  to  the  SSL  server on  the  SSL  client,  or  let  the  server request a  certificate  from  the  CA that 
    the SSL client trusts. 
     If the SSL server  is configured to  authenticate  the  client,  but  the SSL  client  has  no certificate  or the 
    certificate cannot be trusted, request and install a certificate for the client. 
    2. Use the display ssl server-policy command to view the cipher suites that the SSL server policy 
    supports. If the server and the client have no matching cipher suite, use the ciphersuite command to 
    modify the cipher suite configuration of the SSL server. 
      
    						
    							 
    248 
    TCP attack protection configuration 
    TCP attack protection overview 
    An attacker can attack the switch during the process of establishing a TCP connection. To prevent such an 
    attack, the switch provides the SYN Cookie feature. 
    Enabling the SYN cookie feature 
    As a general rule, the establishment of a TCP connection involves the following three handshakes. 
    1. The request originator sends a SYN message to the target server. 
    2. After receiving the SYN message, the target server establishes a TCP connection in the 
    SYN_RECEIVED state, returns a SYN ACK message to the originator, and waits for a response. 
    3. After receiving the SYN ACK message, the originator returns an ACK message, establishing the 
    TCP connection. 
    Attackers may mount SYN Flood attacks during TCP connection establishment. They send a large number 
    of SYN  messages  to  the  server  to establish TCP  connections, but  they  never  make  any  response  to  SYN 
    ACK  messages.  As  a  result,  a  large number of incomplete TCP  connections  are  established,  resulting  in 
    heavy resource consumption and making the server unable to handle services normally. 
    The  SYN  Cookie  feature  can  prevent  SYN  Flood  attacks.  After  receiving  a  TCP  connection  request,  the 
    server  directly  returns  a  SYN  ACK  message,  instead  of  establishing  an  incomplete TCP  connection.  Only 
    after receiving an ACK message from the client can the server establish a connection, and then enter the 
    ESTABLISHED  state.  In  this  way, incomplete TCP  connections  could  be  avoided  to  protect the  server 
    against SYN Flood attacks. 
    Follow these steps to enable the SYN Cookie feature: 
    To do... Use the command... Remarks 
    Enter system view system-view — 
    Enable the SYN Cookie feature tcp syn-cookie enable Required 
    Enabled by default. 
     
     NOTE: 
    With the SYN Cookie feature enabled, only the MSS, is negotiated during TCP connection 
    establishment, instead of the window’s zoom factor and timestamp.  
    Displaying and maintaining TCP attack protection 
    To do… Use the command… Remarks 
    Display current TCP connection state display tcp status [ | { begin | exclude | 
    include } regular-expression ]  Available in any view 
      
    						
    							 
    249 
    IP source guard configuration 
    IP source guard overview 
    Introduction to IP source guard 
    IP source guard is  intended to  work  on  a  port  connecting  users.  It filters received packets to block illegal 
    access  to network  resources,  improving network security. For  example,  it  can  prevent  illegal hosts  from 
    using a legal IP address to access the network. 
    IP source guard can filter packets according to the packet source IP address, and source MAC address. It 
    supports these types of binding entries: 
     IP-port binding entry 
     MAC-port binding entry 
     IP-MAC-port binding entry 
    After  receiving  a  packet, an  IP  source  guard-enabled  port  obtains the  key  attributes  (source IP  address, 
    and source MAC address) of the packet and then looks them up in the binding entries of IP source guard. 
    If  there  is  a  match,  the  port  forwards  the  packet; otherwise,  the  port  discards  the  packet,  as  shown  in 
    Figure 75. IP source guard binding entries are on a per-port basis. After a binding entry is configured on 
    a port, it is effective only on the port. 
    Figure 75 Diagram for the IP source guard function 
     
     
    IP source guard binding 
    An IP source guard binding entry can be static or dynamic. 
    Static IP source guard binding 
    A  static  IP  source  guard  binding entry is  configured  manually.  It  is  suitable  for scenarios where  only  few 
    hosts exist on  a  LAN  and their IP  addresses  are  manually  configured. For  example, you  can configure  a 
    static  binding  entry  on  a  port  that  connects  a  server,  allowing  the  port  to  receive  packets  from  and  send 
    packets to only the server.  
    1. Types of static IP source guard binding entries 
    According to the IP version, a static IP source guard binding entry is an IPv4 or IPv6 entry. IP network
    Illegal host
    Legal host
    Enable the IP source guard function on 
    the port for user access  
    						
    							 
    250 
     A  static  IPv4  source  guard  binding entry  filters IPv4  packets received by  the  port  or  checks the 
    validity of users by cooperating with the ARP detection feature.  
     A  static  IPv6  source  guard  binding entry  filters IPv6  packets  received  by  the  port  or  checks the 
    validity of users by cooperating with the ND detection feature.   
     NOTE: 
     For information about ARP detection, see the chapter “ARP attack protection configuration.”  
     For information about ND detection, see the chapter “ND attack defense configuration.”  
    2. Validity ranges of static IP source guard binding entries 
    According  to the validity  range, a static  IP  source  guard  binding  entry is  a global or  port-based static 
    binding entry: 
     A  global  static  binding  entry  is effective  on  all  ports.  A  port  forwards  a  packet  only  when  the 
    packet’s  IP  address  and  MAC  address  both  matches  those  in  a  global  static  binding  entry or  both 
    do  not  match  those  in any global  static  binding  entry.  If only the  IP  address  or  MAC  address  of  the 
    packet matches  that  of a  global  static  binding  entry,  the  port  discards  the  packet.  Global  static 
    binding  entries  are  used  to  protect  against  host  spoofing  attacks.  They  can  effectively  filter attack 
    packets that exploit the IP address or MAC address of a legal user host.  
     A  port-based  static  binding  entry  is effective  on  only  the specified port.  A  port  forwards  a  packet 
    only  when  the  IP  address, and MAC  address  of  the  packet  all  match  those  in  a  static  binding  entry 
    on  the  port. All  other  packets  will  be  dropped.  Port-based  static  binding  entries  are  used  to  check 
    the validity of users that are trying to access a port.  
     NOTE: 
    Global static IP source guard binding entries take effect on all ports. However, port-based static IP 
    source guard binding entries and dynamic IP source guard binding entries take precedence over global 
    static IP source guard binding entries. If a port is configured with a static binding entry or dynamic 
    binding, the global static binding entries do not take effect on the port.  
    3. Excluded ports of global static binding entries 
    In  some  circumstances,  global  static  binding entries may  result  in  communication  failures on  some  ports. 
    In  such  cases,  specify  the  ports  as  excluded  ports,  so  that  global  static  binding  entries do  not take  effect 
    on these ports. 
    As shown in Figure 77, Device B is an access layer device connected to hosts of different VLANs. Device 
    A works at the distribution layer as a gateway to allow hosts in different VLANs to communicate at Layer 
    3.  When  a  host  in  a  VLAN communicates with a  host  in  another  VLAN, Device  A  forwards IP  packets 
    between the VLANs, changing the source MAC addresses of the IP packets. For example, when Device A 
    receives  an  IP  packet  from Host  A to Host  B, it  changes the  source  MAC  address  of the IP  packet from 
    0001-0203-0406  to  0001-0202-0202,  its  own MAC  address.  If you  configure  a global  static  binding 
    entry with Host A’s IP address and MAC address, Device B will drop the packets because the packets’  IP 
    address  matches  the  entry  but  their  source MAC address  does  not  match  the  entry, preventing hosts  in 
    different VLANs from communicating at Layer 3. 
    To solve the problem, specify the uplink port (GE1/0/1) of Device B as an excluded port for global static 
    binding.  Then,  the  global  static  binding  entry  does  not  take  effect  on  the  uplink  port, and packets 
    forwarded by Device A will be forwarded normally.  
    						
    All HP manuals Comments (0)

    Related Manuals for HP A 5120 Manual