HP A 5120 Manual
Have a look at the manual HP A 5120 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
11 from the clients within the management range. A shared key is used to ensure secure communication between a RADIUS client and the RADIUS server. RADIUS authentication and authorization. RADIUS accounting is not supported. Upon receiving a RADIUS packet, a device working as the RADIUS server checks whether the sending client is under its management. If yes, it verifies the packet validity by using the shared key, checks whether there is an account with the username, whether the password is correct, and whether the user attributes meet the requirements defined on the RADIUS server (for example, whether the account has expired). Then, the RADIUS server assigns the corresponding authority to the client if the authentication succeeds, or denies the client if the authentication fails. NOTE: The UDP port number for RADIUS authentication is 1812 in the standard RADIUS protocol, but is 1645 on HP devices. Specify 1645 as the authentication port number when you use an HP device as a RADIUS client. Protocols and standards The following protocols and standards are related to AAA, RADIUS, and HWTACACS: RFC 2865, Remote Authentication Dial In User Service (RADIUS) RFC 2866, RADIUS Accounting RFC 2867, RADIUS Accounting Modifications for Tunnel Protocol Support RFC 2868, RADIUS Attributes for Tunnel Protocol Support RFC 2869, RADIUS Extensions RFC 1492, An Access Control Protocol, Sometimes Called TACACS RADIUS attributes Commonly used standard RADIUS attributes No. Attribute Description 1 User-Name Name of the user to be authenticated. 2 User-Password User password for PAP authentication, present only in Access-Request packets in PAP authentication mode. 3 CHAP-Password Digest of the user password for CHAP authentication, present only in Access- Request packets in CHAP authentication mode. 4 NAS-IP-Address IP address for the server to identify a client. Usually, a client is identified by the IP address of the access interface on the NAS, namely the NAS IP address. This attribute is present in only Access-Request packets. 5 NAS-Port Physical port of the NAS that the user accesses. 6 Service-Type Type of service that the user has requested or type of service to be provided. 7 Framed-Protocol Encapsulation protocol. 8 Framed-IP-Address IP address to be configured for the user. 11 Filter-ID Name of the filter list.
12 No. Attribute Description 12 Framed-MTU Maximum transmission unit (MTU) for the data link between the user and NAS. For example, with 802.1X EAP authentication, NAS uses this attribute to notify the server of the MTU for EAP packets, so as to avoid oversized EAP packets. 14 Login-IP-Host IP address of the NAS interface that the user accesses. 15 Login-Service Type of the service that the user uses for login. 18 Reply-Message Text to be displayed to the user, which can be used by the server to indicate, for example, the reason of the authentication failure. 26 Vendor-Specific Vendor specific attribute. A packet can contain one or more such proprietary attributes, each of which can contain one or more sub-attributes. 27 Session-Timeout Maximum duration of service to be provided to the user before termination of the session. 28 Idle-Timeout Maximum idle time permitted for the user before termination of the session. 31 Calling-Station-Id User identification that the NAS sends to the server. With the LAN access service provided by an HP device, this attribute carries the MAC address of the user in the format HHHH-HHHH-HHHH. 32 NAS-Identifier Identification that the NAS uses for indicating itself. 40 Acct-Status-Type Type of the Accounting-Request packet. Possible values are as follows: 1—ptart 2—Stop 3—Interium-Update 4—Reset-Charge 7—Accounting-On (Defined in 3GPP, the 3rd Generation Partnership Project) 8—Accounting-Off EDefined in 3GPPF 9 to 14—Reserved for tunnel accounting 15—Reserved for failed 45 Acct-Authentic Authentication method used by the user. Possible values are as follows: 1—RADIUS 2—iocal 3—oemote 60 CHAP-Challenge CHAP challenge generated by the NAS for MD5 calculation during CHAP authenticationK 61 NAp-Port-Type Type of the physical port of the NAS that is authenticating the user. Possible values are as follows: 15—Ethernet 16—Any type of ADSL 17—Cable (with cable for cable TVF 201—VLAN 202—ATM If the port is an ATM or Ethernet one and VLANs are implemented on it, the value of this attribute is 201K 79 EAm-Message Used for encapsulating EAP packets to allow the NAS to authenticate dial-in users via EAP without having to understand the EAP protocolK
13 No. Attribute Description 80 Message- Authenticator Used for authentication and checking of authentication packets to prevent spoofing Access-Requests. This attribute is used when RADIUS supports EAP authentication. 87 NAS-Port-Id String for describing the port of the NAS that is authenticating the user. HP proprietary RADIUS sub-attributes No. Sub-attribute Description 1 Input-Peak-Rate Peak rate in the direction from the user to the NAS, in bps. 2 Input-Average-Rate Average rate in the direction from the user to the NAS, in bps. 3 Input-Basic-Rate Basic rate in the direction from the user to the NAS, in bps. 4 Output-Peak-Rate Peak rate in the direction from the NAS to the user, in bps. 5 Output-Average-Rate Average rate in the direction from the NAS to the user, in bps. 6 Output-Basic-Rate Basic rate in the direction from the NAS to the user, in bps. 15 Remanent_Volume Remaining, available total traffic of the connection, in different units for different server types. 20 Command Operation for the session, used for session control. Possible values are as follows: 1—Trigger-Request 2—Terminate-Request 3—SetPolicy 4—Result 5—PortalClear 24 Control_Identifier Identification for retransmitted packets. For retransmitted packets of the same session, this attribute must take the same value; for retransmitted packets of different sessions, this attribute may take the same value. The client response of a retransmitted packet must also carry this attribute and the value of the attribute must be the same. For Accounting-Request packets of the start, stop, and interim update types, the Control-Identifier attribute, if present, makes no sense. 25 Result_Code Result of the Trigger-Request or SetPolicy operation. A value of zero means the operation succeeded, any other value means the operation failed. 26 Connect_ID Index of the user connection 28 Ftp_Directory Working directory of the FTP user. For an FTP user, when the RADIUS client acts as the FTP server, this attribute is used to set the FTP directory on the RADIUS client. 29 Exec_Privilege Priority of the EXEC user 59 NAS_Startup_Timestam p Startup time of the NAS in seconds, which is represented by the time elapsed after 00:00:00 on Jan. 1, 1970 (UTC). 60 Ip_Host_Addr IP address and MAC address of the user carried in authentication and accounting requests, in the format A.B.C.D hh:hh:hh:hh:hh:hh. A space is required between the IP address and the MAC address. 61 User_Notify Information that needs to be sent from the server to the client transparently
14 No. Sub-attribute Description 62 User_HeartBeat Hash value assigned after an 802.1X user passes authentication, which is a 32-byte string. This attribute is stored in the user list on the device and is used for verifying the handshake messages from the 802.1X user. This attribute exists in only Access-Accept and Accounting-Request packets. 140 User_Group User groups assigned after the SSL VPN user passes authentication. A user may belong to more than one user group. In this case, the user groups are delimited by semi-colons. This attribute is used for cooperation with the SSL VPN device. 141 Security_Level Security level assigned after the SSL VPN user passes security authentication 201 Input-Interval-Octets Bytes input within a real-time accounting interval 202 Output-Interval-Octets Bytes output within a real-time accounting interval 203 Input-Interval-Packets Packets input within an accounting interval, in the unit set on the device 204 Output-Interval-Packets Packets output within an accounting interval, in the unit set on the device 205 Input-Interval- Gigawords Result of bytes input within an accounting interval divided by 4G bytes 206 Output-Interval- Gigawords Result of bytes output within an accounting interval divided by 4G bytes 207 Backup-NAS-IP Backup source IP address for sending RADIUS packets 255 Product_ID Product name AAA configuration considerations and task list To configure AAA, you must complete these tasks on the NAS: 1. Configure the required AAA schemes. Local authentication—Configure local users and the related attributes, including the usernames and passwords of the users to be authenticated. Remote authentication—Configure the required RADIUS and HWTACACS schemes, and configure user attributes on the servers accordingly. 2. Configure AAA methods for the users’ ISP domains. Authentication method—No authentication (none), local authentication (local), or remote authentication (scheme) Authorization method—No authorization (none), local authorization (local), or remote authorization (scheme) Accounting method—No accounting (none), local accounting (local), or remote accounting (scheme)
15 Figure 9 AAA configuration diagram Table 4 AAA configuration task list Task Remarks Configuring AAA schemes Configuring local users Required Complete at least one task. Configuring RADIUS schemes Configuring HWTACACS schemes Configuring AAA methods for ISP domains Creating an ISP domain Required Configuring ISP domain attributes Optional Configuring AAA authentication methods for an ISP domain Required Complete at least one task. Configuring AAA authorization methods for an ISP domain Configuring AAA accounting methods for an ISP domain Tearing down user connections forcibly Optional Configuring a network device as a RADIUS server Optional Displaying and maintaining AAA Optional NOTE: For login users, you must configure the login authentication mode for the user interfaces as scheme before performing the above configurations. For more information, see the Fundamentals Configuration Guide. Configure the RADIUS, HWTACACS schemes to be referenced none/ local/ schemeAuthorization method Accounting method Configure AAA methods Create an ISP domain and enter its view local (default method) none scheme Authentication method Configure local users and related attributes none/ local/ scheme + + Local AAA Remote AAA No AAA
16 Configuring AAA schemes Configuring local users For local authentication, you must create local users and configure user attributes on the device in advance. The local users and attributes are stored in the local user database on the device. A local user is uniquely identified by a username. Configurable local user attributes are as follows: Service type Types of services that the user can use. Local authentication checks the service types of a local user. If none of the service types is available, the user cannot pass authentication. Service types include FTP, LAN access, Portal, SSH, Telnet, and Terminal. User state Indicates whether or not a local user can request network services. There are two user states: active and blocked. A user in the active state can request network services, but a user in the blocked state cannot. Maximum number of users using the same local user account Indicates how many users can use the same local user account for local authentication. Expiration time Indicates the expiration time of a local user account. A user must use a local user account that has not expired to pass local authentication. User group Each local user belongs to a local user group and bears all attributes of the group, such as the password control attributes and authorization attributes. For more information about local user group, see ―Configuring user group attributes.― Password control attributes Password control attributes help you improve the security of local users’ passwords. Password control attributes include password aging time, minimum password length, and password composition policy. You can configure a password control attribute in system view, user group view, or local user view, making the attribute effective for all local users, all local users in a group, or only the local user. A password control attribute with a smaller effective range has a higher priority. For more information about password management and global password configuration, see the chapter ―Password control configuration. ― Binding attributes Binding attributes are used to control the scope of users. Binding attributes are checked during authentication. If the attributes of a user do not match the binding attributes configured for the user on the access device, the user cannot pass authentication. Binding attributes include the ISDN calling number, IP address, access port, MAC address, and native VLAN. For more information about binding attributes, see ―Configuring local user attributes.― Authorization attributes Authorization attributes indicate the rights that a user has after passing local authentication. Authorization attributes include the ACL, PPP callback number, idle cut function, user level, user role, user profile, VLAN, and FTP/SFTP work directory. For more information about authorization attributes, see ―Configuring local user attributes.―
17 You can configure an authorization attribute in user group view or local user view, making the attribute effective for all local users in the group or only for the local user. The setting of an authorization attribute in local user view takes precedence over that in user group view. Local user configuration task list Task Remarks Configuring local user attributes Required Configuring user group attributes Optional Displaying and maintaining local users and local user groups Optional Configuring local user attributes Follow these steps to configure attributes for a local user: To do… Use the command… Remarks Enter system view system-view — Set the password display mode for all local users local-user password-display- mode { auto | cipher-force } Optional auto by default, indicating to display the password of a local user in the way indicated by the password command. Add a local user and enter local user view local-user user-name Required No local user exists by default. Configure a password for the local user password { cipher | simple } password Optional Place the local user to the state of active or blocked state { active | block } Optional When created, a local user is in the active state by default, and the user can request network services. Set the maximum number of users using the local user account access-limit max-user-number Optional By default, there is no limit on the maximum number of users that use the same local user account. This limit is not effective for FTP users. Configure the password control attributes for the local user Set the password aging time password-control aging aging- time Optional By default, the setting for the user group is used. If there is no such setting for the user group, the global setting is used. Set the minimum password length password-control length length Optional By default, the setting for the user group is used. If there is no such setting for the user group, the global setting is used.
18 To do… Use the command… Remarks Configure the password composition policy password-control composition type-number type-number [ type-length type-length ] Optional By default, the setting for the user group is used. If there is no such setting for the user group, the global setting is used. Specify the service types for the local user service-type { ftp | lan-access | { ssh | telnet | terminal } * | portal } Required By default, no service is authorized to a local user. Configure the binding attributes for the local user bind-attribute { call-number call- number [ : subcall-number ] | ip ip-address | location port slot- number subslot-number port- number | mac mac-address | vlan vlan-id } * Optional By default, no binding attribute is configured for a local user. ip, location, mac, and vlan are supported for LAN users. No binding attribute is supported for other types of local users. Configure the authorization attributes for the local user authorization-attribute { acl acl- number | callback-number callback-number | idle-cut minute | level level | user- profile profile-name | user-role security-audit | vlan vlan-id | work-directory directory-name } * Optional By default, no authorization attribute is configured for a local user. For LAN and portal users, only acl, idle-cut, user-profile, and vlan are supported. For SSH and terminal users, only level is supported. For FTP users, only level and work-directory are supported. For Telnet users, only level and user-role is supported. For other types of local users, no binding attribute is supported. Set the expiration time of the local user expiration-date time Optional Not set by default When some users need to access the network temporarily, create a guest account and specify an expiration time for the account. Assign the local user to a user group group group-name Optional By default, a local user belongs to the default user group system.
19 NOTE: For more information about password control attribute commands, see the chapter “Password control configuration.” On a device supporting the password control feature, local user passwords are not displayed, and the local-user password-display-mode command is not effective. With the local-user password-display-mode cipher-force command configured, a local user password is always displayed in cipher text, regardless of the configuration of the password command. In this case, if you use the save command to save the configuration, all existing local user passwords will still be displayed in cipher text after the device restarts, even if you restore the display mode to auto. The access-limit command configured for a local user takes effect only when local accounting is configured. If the user interface authentication mode (set by the authentication-mode command in user interface view) is AAA (scheme), which commands a login user can use after login depends on the privilege level authorized to the user. If the user interface authentication mode is password (password) or no authentication (none), which commands a login user can use after login depends on the level configured for the user interface (set by the user privilege level command in user interface view). For an SSH user using public key authentication, which commands are available depends on the level configured for the user interface. For more information about user interface authentication mode and user interface command level, see the Fundamentals Configuration Guide. Be cautious when deciding which binding attributes should be configured for a local user. Binding attributes are checked upon local authentication of a user. If the checking fails, the user fails the authentication. Every configurable authorization attribute has its definite application environments and purposes. When configuring authorization attributes for a local user, consider what attributes are needed. Configuring user group attributes User groups simplify local user configuration and management. A user group consists of a group of local users and has a set of local user attributes. You can configure local user attributes for a user group to implement centralized user attributes management for the local users in the group. Configurable user attributes include password control attributes and authorization attributes. By default, every newly added local user belongs to the system default user group system and bears all attributes of the group. To change the user group to which a local user belongs, use the user-group command in local user view. Follow these steps to configure attributes for a user group: To do… Use the command… Remarks Enter system view system-view — Create a user group and enter user group view user-group group-name Required Configure password control attributes for the user group Set the password aging time password-control aging aging-time Optional By default, the global setting is used. Set the minimum password length password-control length length Optional By default, the global setting is used. Configure the password composition policy password-control composition type- number type-number [ type-length type-length ] Optional By default, the global setting is used.
20 To do… Use the command… Remarks Configure the authorization attributes for the user group authorization-attribute { acl acl- number | callback-number callback-number | idle-cut minute | level level | user-profile profile-name | vlan vlan-id | work-directory directory-name } * Optional By default, no authorization attribute is configured for a user group. Displaying and maintaining local users and local user groups To do… Use the command… Remarks Display local user information display local-user [ idle-cut { disable | enable } | service-type { ftp | lan- access | portal | ssh | telnet | terminal } | state { active | block } | user-name user-name | vlan vlan-id ] [ slot slot-number ] [ | { begin | exclude | include } regular-expression ] Available in any view Display the user group configuration information display user-group [ group-name ] [ | { begin | exclude | include } regular- expression ] Available in any view Configuring RADIUS schemes A RADIUS scheme specifies the RADIUS servers that the device can cooperate with and defines a set of parameters that the device uses to exchange information with the RADIUS servers. There may be authentication/authorization servers and accounting servers, or primary servers and secondary servers. The parameters mainly include the IP addresses of the servers, the shared keys, and the RADIUS server type. RADIUS scheme configuration task list Task Remarks Creating a RADIUS scheme Required Specifying the RADIUS authentication/authorization servers Required Specifying the RADIUS accounting servers and relevant parameters Optional Setting the shared keys for RADIUS packets Optional Setting the maximum number of RADIUS request transmission attempts Optional Setting the supported RADIUS server type Optional Setting the status of RADIUS servers Optional Setting the username format and traffic statistics units Optional Specifying a source IP address for outgoing RADIUS packets Optional Setting timers for controlling communication with RADIUS servers Optional