HP A 5120 Manual
Have a look at the manual HP A 5120 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
41 Local accounting (local)—Local accounting is implemented on the access device. It is for counting and controlling the number of concurrent users who use the same local user account; it does not provide statistics for charging. The maximum number of concurrent users using the same local user account is set by the access-limit command in local user view. Remote accounting (scheme)—The access device cooperates with a RADIUS server or HWTACACS server for accounting of users. You can configure local or no accounting as the backup method to be used when the remote server is not available. By default, an ISP domain uses the local accounting method. Before configuring accounting methods, complete the following tasks: 1. For RADIUS or HWTACACS accounting, configure the RADIUS or HWTACACS scheme to be referenced first. The local and none authentication methods do not require any scheme. 2. Determine the access mode or service type to be configured. With AAA, you can configure an accounting method for each access mode and service type, limiting the accounting protocols that can be used for access. 3. Determine whether to configure an accounting method for all access modes or service types. Follow these steps to configure AAA accounting methods for an ISP domain: To do… Use the command… Remarks Enter system view system-view — Enter ISP domain view domain isp-name — Enable the accounting optional feature accounting optional Optional Disabled by default Specify the default accounting method for all types of users accounting default { hwtacacs-scheme hwtacacs-scheme-name [ local ] | local | none | radius-scheme radius- scheme-name [ local ] } Optional local by default Specify the command accounting method accounting command hwtacacs- scheme hwtacacs-scheme-name Optional The default accounting method is used by default. Specify the accounting method for LAN users accounting lan-access { local | none | radius-scheme radius-scheme-name [ local | none ] } Optional The default accounting method is used by default. Specify the accounting method for login users accounting login { hwtacacs-scheme hwtacacs-scheme-name [ local ] | local | none | radius-scheme radius- scheme-name [ local ] } Optional The default accounting method is used by default. Specify the accounting method for portal users accounting portal { local | none | radius-scheme radius-scheme-name [ local ] } Optional The default accounting method is used by default.
42 NOTE: With the accounting optional command configured, a user that would be otherwise disconnected can still use the network resources even when no accounting server is available or communication with the current accounting server fails. The local accounting method is not used to implement accounting, but to work together with the access-limit command, which is configured in local user view, to limit the number of local user connections. However, with the accounting optional command configured, the limit on the number of local user connections is not effective. The accounting method specified with the accounting default command is for all types of users and has a priority lower than that for a specific access mode. With the radius-scheme radius-scheme-name local or hwtacacs-scheme hwtacacs-scheme-name local keyword and argument combination configured, local accounting is the backup method and is used only when the remote server is not available. If you specify only the local or none keyword in an accounting method configuration command, the device has no backup accounting method and performs only local accounting or does not perform any accounting. Accounting is not supported for FTP services. Tearing down user connections forcibly Follow these steps to tear down user connections forcibly: To do… Use the command… Remarks Enter system view system-view — Tear down AAA user connections forcibly cut connection { access-type { dot1x | mac- authentication | portal } | all | domain isp-name | interface interface-type interface-number | ip ip-address | mac mac-address | ucibindex ucib- index | user-name user-name | vlan vlan-id } [ slot slot-number ] Required Applicable to only LAN access, and portal user connections. Configuring a network device as a RADIUS server RADIUS server functions configuration task list Task Remarks Configuring a RADIUS user Required Specifying a RADIUS client Required Configuring a RADIUS user This task is to create a RADIUS user and configure a set of attributes for the user on a network device that serves as the RADIUS server. The user attributes include the password, authorization attribute, expiration time, and user description. After completing this task, the specified RADIUS user can use the username and password for RADIUS authentication on the device. Follow these steps to configure a RADIUS user:
43 To do… Use the command… Remarks Enter system view system-view — Create a RADIUS user and enter RADIUS server user view radius-server user user-name Required No RADIUS user exists by default. Configure a password for the RADIUS user password [ cipher | simple ] password Optional By default, no password is specified. Configure the authorization attribute for the RADIUS user authorization-attribute { acl acl-number | vlan vlan-id } * Optional Not configured by default. Configure the expiration time for the RADIUS user expiration-date time Optional By default, no expiration time is configured, and the system does not check users’ expiration time. Configure a description for the RADIUS user description text Optional Not configured by default. NOTE: You can use the authorization-attribute command to specify an authorization ACL and authorized VLAN, which will be assigned by the RADIUS server to the RADIUS client (the NAS) after the RADIUS user passes authentication. The NAS then uses the assigned ACL and VLAN to control user access. If the assigned ACL does not exist on the NAS, ACL assignment will fail and the NAS will log the RADIUS user out forcibly. If the assigned VLAN does not exist on the NAS, the NAS will create the VLAN and add the RADIUS user or the access port to the VLAN. Specifying a RADIUS client This task is to specify the IP address of a client to be managed by the RADIUS server and configure the shared key. The RADIUS server processes only the RADIUS packets sent from the specified clients. Follow these steps to specify a RADIUS client To do… Use the command… Remarks Enter system view system-view — Specify a RADIUS client radius-server client-ip ip-address [ key string ] Required No RADIUS client is specified by default. NOTE: The IP address of a RADIUS client specified on the RADIUS server must be consistent with the source IP address of RADIUS packets configured on the RADIUS client. The shared key configured on the RADIUS server must be consistent with that configured on the RADIUS client.
44 Displaying and maintaining AAA To do… Use the command… Remarks Display the configuration information of ISP domains display domain [ isp-name ] [ | { begin | exclude | include } regular-expression ] Available in any view Display information about user connections display connection [ access-type { dot1x | mac-authentication | portal } | domain isp- name | interface interface-type interface- number | ip ip-address | mac mac-address | ucibindex ucib-index | user-name user-name | vlan vlan-id ] [ slot slot-number ] [ | { begin | exclude | include } regular-expression ] Available in any view AAA configuration examples AAA for Telnet users by an HWTACACS server Network requirements As shown in Figure 10, configure the switch to use the HWTACACS server to provide authentication, authorization, and accounting services for Telnet users. Set the shared keys for authentication, authorization, and accounting packets exchanged with the HWTACACS server to expert. Specify that the switch remove the domain names in usernames before sending usernames to the HWTACACS server. Figure 10 Configure AAA for Telnet users by an HWTACACS server Configuration procedure # Configure the IP addresses of the interfaces (omitted). # Enable the Telnet server on the switch. system-view [Switch] telnet server enable # Configure the switch to use AAA for Telnet users. [Switch] user-interface vty 0 4 [Switch-ui-vty0-4] authentication-mode scheme [Switch-ui-vty0-4] quit # Create HWTACACS scheme hwtac. [Switch] hwtacacs scheme hwtac Internet SwitchTelnet user Authentication/Accounting server10.1.1.1/24
45 # Specify the primary authentication server. [Switch-hwtacacs-hwtac] primary authentication 10.1.1.1 49 # Specify the primary authorization server. [Switch-hwtacacs-hwtac] primary authorization 10.1.1.1 49 # Specify the primary accounting server. [Switch-hwtacacs-hwtac] primary accounting 10.1.1.1 49 # Set the shared key for authentication, authorization, and accounting packets to expert. [Switch-hwtacacs-hwtac] key authentication expert [Switch-hwtacacs-hwtac] key authorization expert [Switch-hwtacacs-hwtac] key accounting expert # Configure the scheme to remove the domain names in usernames before sending usernames to the HWTACACS server. [Switch-hwtacacs-hwtac] user-name-format without-domain [Switch-hwtacacs-hwtac] quit # Configure the AAA methods for the domain, or set default AAA methods for all types of users in the domain. [Switch] domain bbb [Switch-isp-bbb] authentication login hwtacacs-scheme hwtac [Switch-isp-bbb] authorization login hwtacacs-scheme hwtac [Switch-isp-bbb] accounting login hwtacacs-scheme hwtac [Switch-isp-bbb] quit Or [Switch] domain bbb [Switch-isp-bbb] authentication default hwtacacs-scheme hwtac [Switch-isp-bbb] authorization default hwtacacs-scheme hwtac [Switch-isp-bbb] accounting default hwtacacs-scheme hwtac When telnetting to the switch, a user enters username userid@bbb for authentication using domain bbb. AAA for Telnet users by separate servers Network requirements As shown in Figure 11, configure the switch to provide local authentication, HWTACACS authorization, and RADIUS accounting services for Telnet users. The username and the password for Telnet users are both hello. Set the shared keys for packets exchanged with the HWTACACS server and the RADIUS server to expert. Configure the switch to remove the domain names in usernames before sending usernames to the servers. NOTE: Configuration of separate AAA for other types of users is similar to that given in this example. The only difference is in the access type.
46 Figure 11 Configure AAA by separate servers for Telnet users Configuration procedure # Configure the IP addresses of various interfaces (omitted). # Enable the Telnet server on the switch. system-view [Switch] telnet server enable # Configure the switch to use AAA for Telnet users. [Switch] user-interface vty 0 4 [Switch-ui-vty0-4] authentication-mode scheme [Switch-ui-vty0-4] quit # Configure the HWTACACS scheme. [Switch] hwtacacs scheme hwtac [Switch-hwtacacs-hwtac] primary authorization 10.1.1.2 49 [Switch-hwtacacs-hwtac] key authorization expert [Switch-hwtacacs-hwtac] user-name-format without-domain [Switch-hwtacacs-hwtac] quit # Configure the RADIUS scheme. [Switch] radius scheme rd [Switch-radius-rd] primary accounting 10.1.1.1 1813 [Switch-radius-rd] key accounting expert [Switch-radius-rd] server-type extended [Switch-radius-rd] user-name-format without-domain [Switch-radius-rd] quit # Create a local user named hello. [Switch] local-user hello [Switch-luser-hello] service-type telnet [Switch-luser-hello] password simple hello [Switch-luser-hello] quit # Configure the AAA methods for the ISP domain, or set default AAA methods for all types of users in the domain. [Switch] domain bbb [Switch-isp-bbb] authentication login local [Switch-isp-bbb] authorization login hwtacacs-scheme hwtac [Switch-isp-bbb] accounting login radius-scheme rd [Switch-isp-bbb] quit Internet SwitchTelnet user RADIUS accounting server10.1.1.1/24 HWTACACS authorization server10.1.1.2/24
47 Or [Switch] domain bbb [Switch-isp-bbb] authentication default local [Switch-isp-bbb] authorization default hwtacacs-scheme hwtac [Switch-isp-bbb] accounting default radius-scheme rd When telnetting to the switch, a user enters username telnet@bbb for authentication using domain bbb. Authentication/Authorization for SSH/Telnet users by a RADIUS server NOTE: The configuration of authentication and authorization for SSH users is similar to that for Telnet users. The following takes SSH users as an example. Network requirements As shown in Figure 12, configure an iMC server to act as the RADIUS server to provide authentication and authorization services for SSH users. Set both the shared keys for packets exchanged with the RADIUS server to expert, and configure the switch to include the domain names in usernames to be sent to the RADIUS server. Add an account on the RADIUS server, with the username hello@bbb. The SSH user uses the username and the configured password to log in to the switch and is authorized with the privilege level of 3 after login. Figure 12 Configure authentication/authorization for SSH users by a RADIUS server Configuration procedure 1. Configure the RADIUS server (iMC PLAT 5.0) NOTE: This example assumes that the RADIUS server runs iMC PLAT 5.0 (E0101) and iMC UAM 5.0 (E0101). # Add an access device. Log in to the iMC management platform, select the Service tab, and select User Access Manager > Access Device from the navigation tree to enter the Access Device page. Then, click Add to enter the Add Access Device window and perform the following configurations as shown in Figure 13. Set the shared key for authentication and accounting to expert Internet SwitchSSH user RADIUS server10.1.1.1/24 Vlan-int2192.168.1.70/24 Vlan-int310.1.1.2/24
48 Specify the ports for authentication and accounting as 1812 and 1813 respectively Select Device Management Service as the service type Select HP(A-Series) as the access device type Select the access device from the device list or manually add the device with the IP address of 10.1.1.2 Click OK to finish the operation NOTE: The IP address of the access device specified above must be the same as the source IP address of the RADIUS packets sent from the device, which is the IP address of the outbound interface by default, or otherwise the IP address specified with the nas-ip or radius nas-ip command on the device. Figure 13 Add an access device # Add a user for device management Log in to the iMC management platform, select the User tab, and select Device Management User from the navigation tree to enter the Device Management User page. Then, click Add to enter the Add Device Management User window and perform the following configurations as shown in Figure 14. Add a user named hello@bbb and specify the password Select SSH as the service type Set the EXEC privilege level to 3. This value identifies the privilege level of the SSH user after login and defaults to 0. Specify the IP address range of the hosts to be managed as 10.1.1.0 to 10.1.1.255 Click OK to finish the operation
49 Figure 14 Add an account for device management 2. Configure the switch # Configure the IP address of VLAN interface 2, through which the SSH user accesses the switch. system-view [Switch] interface vlan-interface 2 [Switch-Vlan-interface2] ip address 192.168.1.70 255.255.255.0 [Switch-Vlan-interface2] quit # Configure the IP address of VLAN-interface 3, through which the switch access the server. [Switch] interface vlan-interface 3 [Switch-Vlan-interface3] ip address 10.1.1.2 255.255.255.0 [Switch-Vlan-interface3] quit # Generate RSA and DSA key pairs and enable the SSH server. [Switch] public-key local create rsa [Switch] public-key local create dsa [Switch] ssh server enable # Configure the switch to use AAA for SSH users. [Switch] user-interface vty 0 4 [Switch-ui-vty0-4] authentication-mode scheme # Configure the user interfaces to support SSH. [Switch-ui-vty0-4] protocol inbound ssh [Switch-ui-vty0-4] quit # Create RADIUS scheme rad.
50 [Switch] radius scheme rad # Specify the primary authentication server. [Switch-radius-rad] primary authentication 10.1.1.1 1812 # Set the shared key for authentication packets to expert. [Switch-radius-rad] key authentication expert # Configure the scheme to include the domain names in usernames to be sent to the RADIUS server. [Switch-radius-rad] user-name-format with-domain # Specify the service type for the RADIUS server, which must be extended when the RADIUS server runs iMC. [Switch-radius-rad] server-type extended [Switch-radius-rad] quit # Configure the AAA methods for the domain. [Switch] domain bbb [Switch-isp-bbb] authentication login radius-scheme rad [Switch-isp-bbb] authorization login radius-scheme rad [Switch-isp-bbb] quit 3. Verify the configuration After you complete the configuration, the SSH user should be able to use the configured account to access the user interface of the switch and can access the demands of level 0 through level 3. . # Use the display connection command to view the connection information on the switch. [Switch] display connection Index=1 ,Username=hello@bbb IP=192.168.1.58 IPv6=N/A Total 1 connection(s) matched. AAA for 802.1X users by a RADIUS server Network requirements As shown in Figure 15, configure the switch to use the RADIUS server to perform authentication, authorization, and accounting for 802.1X users. Set the shared keys for authentication and authorization packets exchanged between the switch and the RADIUS server to expert and set the ports for authentication/authorization and accounting to 1812 and 1813 respectively. Configure the switch to include the domain names in usernames to be sent to the RADIUS server. Configure MAC-based access control on GigabitEthernet 1/0/1 to authenticate all 802.1X users on the port separately. Configure an account for the user, with the username dot1x@bbb. Configure the authentication server to assign the host to VLAN 4 after the host passes authentication. Register a monthly service that charges 120 dollars for up to 120 hours per month for the user.