Home > HP > Switch > HP A 5120 Manual

HP A 5120 Manual

    Download as PDF Print this page Share this page

    Have a look at the manual HP A 5120 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							51 
    Figure 15 Configure AAA for 802.1X users by a RADIUS server 
     
     
    Configuration procedure 
     
     NOTE: 
     Configure the interfaces and VLANs as shown in Figure 15. Make sure that the host can get a new IP address 
    manually or automatically and can access resources in the authorized VLAN after passing authentication.  
    1. Configure the RADIUS server (iMC PLAT 5.0)  
     NOTE: 
    This example assumes that the RADIUS server runs iMC PLAT 5.0 (E0101), iMC UAM 5.0 (E0101), and 
    iMC CAMS 5.0 (E0101).  
    # Add an access device. 
    Log in to the iMC management platform, select the Service tab, and select User Access Manager > Access 
    Device from  the  navigation  tree  to  enter  the Access  Device  List page. Then,  click Add to  enter  the Add 
    Access Device page and perform the following configurations: 
     Set the shared key for authentication and accounting to expert 
     Specify the ports for authentication and accounting as 1812 and 1813 respectively 
     Select LAN Access Service as the service type 
     Select HP(A-Series) as the access device type 
     Select the access device from the device list or manually add the device whose IP address is 10.1.1.2 
     Adopt the default settings for other parameters and click OK to finish the operation.  
     NOTE: 
    The IP address of the access device specified above must be the same as the source IP address of the 
    RADIUS packets sent from the device, which is the IP address of the outbound interface by default, or 
    otherwise the IP address specified with the nas-ip or radius nas-ip command on the access device.  Internet
    Switch802.1X user
    RADIUS server
    Vlan-int2
    10.1.1.1/24
    Vlan-int310.1.1.2/24
    Vlan-int4
    GE1/0/1  
    						
    							52 
    Figure 16 Add an access device 
     
     
    # Add a charging policy.  
    Select the Service tab, and select Accounting Manager > Charging Plans from the navigation tree to enter 
    the charging  policy  configuration page. Then,  click Add to  enter  the Add Charging  Plan page  and 
    perform the following configurations: 
     Add a plan named UserAcct  
     Select Flat rate as the charging template 
     In the Basic Plan Settings field, configure to charge the fixed fee of 120 dollars per month 
     In  the Service  Usage  Limit field,  set  the Usage  Threshold to  120  hours,  allowing  the  user  to  access 
    the Internet for up to 120 hours per month 
     Adopt the default settings for other parameters and click OK to finish the operation. 
    Figure 17 Add a charging policy 
     
     
    # Add a service.  
    						
    							53 
    Select  the Service tab,  and  select User  Access  Manager > Service  Configuration from  the  navigation  tree 
    to enter the Service Configuration page. Then, click Add to enter the Add Service Configuration page and 
    perform the following configurations: 
     Add  a service named Dot1x  auth and  set  the Service  Suffix to bbb,  which  indicates the 
    authentication  domain  for  the  802.1X  user.  With  the  service  suffix  configured,  you must  configure 
    usernames to be sent to the RADIUS service to carry the domain name.  
     Specify UserAcct as the Charging Plan.  
     Select Deploy VLAN and set the ID of the VLAN to be assigned to 4.  
     Configure other parameters according to the actual situation. 
     Click OK to finish the operation.  
    Figure 18 Add a service 
     
     
    # Add a user. 
    Select  the User tab,  and  select All  Access  Users from  the  navigation  tree  to  enter  the All  Access  Users 
    page. Then, click Add to enter the Add Access User page and perform the following configurations: 
     Select the user or add a user named test  
     Specify the account name as dot1x and configure the password  
     Select the access service Dot1x auth 
     Configure other parameters accordingly and click OK to finish the operation  
    						
    							54 
    Figure 19 Add an access user account 
      
     
    2. Configure the switch 
     Configure a RADIUS scheme 
    # Create a RADIUS scheme named rad and enter its view. 
     system-view 
    [Switch] radius scheme rad 
    #  Set  the  server  type for  the  RADIUS  scheme.  When  using  the  iMC  server,  set the  server  type to 
    extended. 
    [Switch-radius-rad] server-type extended 
    # Specify the  primary  authentication  server and primary  accounting  server,  and configure the keys  for 
    communication with the servers. 
    [Switch-radius-rad] primary authentication 10.1.1.1 
    [Switch-radius-rad] primary accounting 10.1.1.1 
    [Switch-radius-rad] key authentication expert 
    [Switch-radius-rad] key accounting expert 
    # Configure the scheme to include the domain names in usernames to be sent to the RADIUS server. 
    [Switch-radius-rad] user-name-format with-domain 
    [Switch-radius-rad] quit 
     Configure an authentication domain 
    # Create an ISP domain named bbb and enter its view. 
    [Switch] domain bbb 
    # Configure the ISP domain to use RADIUS scheme rad. 
    [Switch-isp-bbb] authentication lan-access radius-scheme rad 
    [Switch-isp-bbb] authorization lan-access radius-scheme rad 
    [Switch-isp-bbb] accounting lan-access radius-scheme rad 
    [Switch-isp-bbb] quit  
    						
    							55 
    # Configure bbb as the default ISP domain for all users. Then, if a user enters a username without any ISP 
    domain at  login,  the authentication  and  accounting  methods  of  the  default  domain will  be  used for  the 
    user. 
    [Switch] domain default enable bbb 
     Configure 802.1X authentication 
    # Enable 802.1X globally. 
    [Switch] dot1x 
    # Enable 802.1X for port GigabitEthernet 1/0/1.   
    [Switch] interface gigabitethernet 1/0/1 
    [Switch-GigabitEthernet1/0/1] dot1x 
    [Switch-GigabitEthernet1/0/1] quit 
    # Configure the access control method. (Optional. The default setting meets the requirement.) 
    [Switch] dot1x port-method macbased interface gigabitethernet 1/0/1 
    3. Verification  
     NOTE: 
     If the 802.1X client of Windows XP is used, the properties of the 802.1X connection should be specifically 
    configured in the Authentication tab on the Properties page, where you must select the Enable IEEE 802.1X 
    authentication for this network option and specify the EAP type as MD5-Challenge.  
     If the iNode client is used, no advanced authentication options need to be enabled.   
    When using the  iNode  client,  the  user can  pass authentication after entering username dot1x@bbb and 
    the correct password in  the  client  property  page. When  using  the Windows  XP  802.1X  client, the  user 
    can  pass  authentication  after entering  the  correct  username  and  password  in  the  pop-up authentication 
    page. After the user passes authentication, the server assigns the port connecting the client to VLAN 4.  
    Use the display connect command to view the connection information on the switch. 
    [Switch] display connection 
    Slot:  1 
    Index=22  , Username=dot1x@bbb 
     IP=192.168.1.58 
     IPv6=N/A 
     MAC=0015-e9a6-7cfe 
     Total 1 connection(s) matched on slot 1. 
     Total 1 connection(s) matched. 
    # View the information of the specified connection on the switch. 
    [Switch] display connection ucibindex 22 
    Slot:  1 
    Index=22  , Username=dot1x@bbb 
    MAC=0015-e9a6-7cfe 
    IP=192.168.1.58 
    IPv6=N/A 
    Access=8021X   ,AuthMethod=CHAP 
    Port Type=Ethernet,Port Name=GigabitEthernet1/0/1 
    Initial VLAN=2, Authorized VLAN=4 
    ACL Group=Disable 
    User Profile=N/A 
    CAR=Disable  
    						
    							56 
    Priority=Disable 
    Start=2011-04-26 19:41:12 ,Current=2011-04-26 19:41:25 ,Online=00h00m14s 
     Total 1 connection matched.   
    As the Authorized VLAN field in the output shows, VLAN 4 has been assigned to the user.  
    Level switching authentication for Telnet users by an 
    HWTACACS server 
    Network requirements 
    As shown in Figure 20, configure the switch to use local authentication for the Telnet user and assign the 
    privilege level of 0 to the user after the user passes authentication. 
    Configure the  switch  to  use  the  HWTACACS  server for  level  switching  authentication  of  the  Telnet  user, 
    and to use local authentication as the backup method.  
    Figure 20 Configure level switching authentication for Telnet users by an HWTACACS server 
     
     
    Configuration considerations 
    1. Configure the switch to use AAA, particularly, local authentication for Telnet users.  
     Create ISP domain bbb and configure it to use local authentication for Telnet users.  
     Create  a  local  user  account,  configure  the  password,  and  assign  the  privilege  level  for  the  user  to 
    enjoy after login.  
    2. On the switch, configure the authentication method for user privilege level switching. 
     Specify  to  use  HWTACACS  authentication  and,  if  HWTACACS authentication is  not  available,  use 
    local authentication for user level switching authentication. 
     Configure  HWTACACS  scheme hwtac and assign an  IP  address  to  the  HWTACACS  server. Set  the 
    shared keys for message exchange and specify that usernames sent to the HWTACACS server carry 
    no  domain  name.  Configure the  domain to  use  the  HWTACACS  scheme hwtac for user privilege 
    level switching authentication.  
     Configure the password for local privilege level switching authentication.  
    3. On the HWTACACS server, add the username and password for user privilege level switching 
    authentication.  
    Configuration procedure 
    1. Configure the switch 
    # Configure the IP address of VLAN-interface 2, through which the Telnet user accesses the switch.   Internet
    SwitchTelnet user192.168.1.58/24
    HWTACACS server
    10.1.1.1/24
    Vlan-int2192.168.1.70/24
    Vlan-int310.1.1.2/24   
    						
    							57 
     system-view 
    [Switch] interface vlan-interface 2 
    [Switch-Vlan-interface2] ip address 192.168.1.70 255.255.255.0 
    [Switch-Vlan-interface2] quit 
    # Configure the IP address of VLAN-interface 3, through which the switch communicates with the server.  
    [Switch] interface vlan-interface 3 
    [Switch-Vlan-interface3] ip address 10.1.1.2 255.255.255.0 
    [Switch-Vlan-interface3] quit 
    # Enable the switch to provide Telnet service. 
    [Switch] telnet server enable 
    # Configure the switch to use AAA for Telnet users.  
    [Switch] user-interface vty 0 4 
    [Switch-ui-vty0-4] authentication-mode scheme 
    [Switch-ui-vty0-4] quit 
    #  Use  HWTACACS  authentication  for  user  level  switching  authentication  and,  if  HWTACACS 
    authentication is not available, use local authentication.  
    [Switch] super authentication-mode scheme local 
    # Create an HWTACACS scheme named hwtac.  
    [Switch] hwtacacs scheme hwtac 
    #  Specify  the  IP  address  for  the  primary  authentication  server  as  10.1.1.1  and  the  port  for  authentication 
    as 49. 
    [Switch-hwtacacs-hwtac] primary authentication 10.1.1.1 49 
    # Set the shared key for authentication packets to expert. 
    [Switch-hwtacacs-hwtac] key authentication expert 
    # Configure the  scheme  to remove the  domain  names  in usernames before sending  usernames to  the 
    HWTACACS server.  
    [Switch-hwtacacs-hwtac] user-name-format without-domain 
    [Switch-hwtacacs-hwtac] quit 
    # Create ISP domain bbb. 
    [Switch] domain bbb 
    # Configure the ISP domain to use local authentication for Telnet users.  
    [Switch-isp-bbb] authentication login local 
    # Configure to use HWTACACS scheme hwtac for privilege level switching authentication.  
    [Switch-isp-bbb] authentication super hwtacacs-scheme hwtac 
    [Switch-isp-bbb] quit 
    # Create a local Telnet user named test.  
    [Switch] local-user test 
    [Switch-luser-test] service-type telnet 
    [Switch-luser-test] password simple aabbcc 
    # Configure the user level of the Telnet user to 0 after user login.  
    [Switch-luser-test] authorization-attribute level 0 
    [Switch-luser-test] quit 
    # Configure the password for local privilege level switching authentication to 654321.  
    [Switch] super password simple 654321  
    						
    							58 
    [Switch] quit 
    2. Configure the HWTACACS server  
     NOTE: 
    The HWTACACS server in this example runs ACSv4.0.   
    Add  a user  named tester on  the  HWTACACS  server  and  configure  advanced  attributes  for  the  user  as 
    follows and as shown in Figure 21:  
     Select Max  Privilege  for  any  AAA  Client and  set  the  privilege  level  to  level  3.  After these 
    configurations,  the  user  needs  to  use  the  password enabpass when  switching  to  level  1,  level  2,  or 
    level 3.  
     Select Use separate password and specify the password as enabpass.  
    Figure 21 Configure advanced attributes for the Telnet user 
     
     
    3. Verify the configuration 
    After  you  complete  the  configuration,  the  Telnet  user  should  be  able  to  telnet  to  the  switch  and  use 
    username test@bbb and password aabbcc to enter the user interface of the switch, and access all level 0 
    commands. 
     telnet 192.168.1.70 
    Trying 192.168.1.70 ... 
    Press CTRL+K to abort     
    						
    							59 
    Connected to 192.168.1.70 ... 
    ****************************************************************************** 
    * Copyright (c) 2010-2011 Hewlett-Packard Development Company, L.P.          * 
    * Without the owners prior written consent,                                 * 
    * no decompiling or reverse-engineering shall be allowed.                    * 
    ****************************************************************************** 
     
    Login authentication 
     
    Username:test@bbb 
    Password: 
     ? 
    User view commands: 
      cluster  Run cluster command 
      display  Display current system information 
      ping     Ping function 
      quit     Exit from current command view 
      ssh2     Establish a secure shell client connection 
      super    Set the current user priority level 
      telnet   Establish one TELNET connection 
      tracert  Trace route function 
    When  switching  to  user  privilege  level  3,  the  Telnet  user  only  needs  to  enter  password enabpass as 
    prompted.   
     super 3 
     Password: 
    User privilege level is 3, and only those commands can be used 
    whose level is equal or less than this. 
    Privilege note: 0-VISIT, 1-MONITOR, 2-SYSTEM, 3-MANAGE 
    If  the  HWTACACS  server  is  not  available,  the  Telnet  user  needs  to  enter  password 654321 as  prompted 
    for local authentication.  
     super 3 
     Password:  Enter the password for HWTACACS privilege level switch authentication  
     Error: Invalid configuration or no response from the authentication server. 
     Info: Change authentication mode to local. 
     Password:  Enter the password for local privilege level switch authentication 
    User privilege level is 3, and only those commands can be used 
    whose level is equal or less than this. 
    Privilege note: 0-VISIT, 1-MONITOR, 2-SYSTEM, 3-MANAGE 
    RADIUS authentication and authorization for Telnet users by a 
    network device 
    Network requirements 
    As  shown  in Figure  22, configure Switch  B to  act as a RADIUS  server  to provide authentication  and 
    authorization for the Telnet user on port 1645.   
    						
    							60 
    Set  the shared  keys  for  authentication  and  authorization  packets  exchanged  between  the  NAS  and  the 
    RADIUS  server to abc. Configure  the  switch  to remove  the  domain  names  in usernames before sending 
    usernames to the RADIUS server.  
    Figure 22 RADIUS authentication and authorization for Telnet users by a network device 
     
     
    Configuration procedure 
    # Configure an IP address for each interface as shown in Figure 22. The detailed configuration is omitted 
    here.  
    1. Configure the NAS 
    # Enable the Telnet server on Switch A.  
     system-view 
    [SwitchA] telnet server enable 
    # Configure Switch A to use AAA for Telnet users. 
    [SwitchA] user-interface vty 0 4 
    [SwitchA-ui-vty0-4] authentication-mode scheme 
    [SwitchA-ui-vty0-4] quit 
    # Create RADIUS scheme rad. 
    [SwitchA] radius scheme rad 
    #  Specify  the  IP  address  for  the  primary  authentication  server  as  10.1.1.2, the  port  for  authentication  as 
    1645, and the shared key for authentication packets as abc. 
    [SwitchA-radius-rad] primary authentication 10.1.1.2 1645 key abc 
    # Configure the  scheme  to remove  the  domain  names  in usernames before sending  usernames to  the 
    RADIUS server. 
    [SwitchA-radius-rad] user-name-format without-domain 
    # Specify the source IP address for RADIUS packets as 10.1.1.1. 
    [SwitchA-radius-rad] nas-ip 10.1.1.1 
    [SwitchA-radius-rad] quit 
    # Create ISP domain bbb. 
    [SwitchA] domain bbb 
    # Specify the authentication method for Telnet users as rad.  
    [SwitchA-isp-bbb] authentication login radius-scheme rad 
    # Specify the authorization method for Telnet users as rad. 
    [SwitchA-isp-bbb] authorization login radius-scheme rad 
    # Specify the accounting method for Telnet users as none.   
    [SwitchA-isp-bbb] accounting login none 
    # Configure the  RADIUS  server type as standard.  When  a  network  device  is  configured  to  serve  as  a 
    RADIUS server, the server type must be set to standard.  
    [SwitchA-isp-bbb] server-type standard 
    [SwitchA-isp-bbb] quit Telnet user192.168.1.2Switch ASwitch B
    NASRADIUS serverVlan-int210.1.1.1/24Vlan-int210.1.1.2/24Vlan-int3192.168.1.1/24  
    						
    All HP manuals Comments (0)

    Related Manuals for HP A 5120 Manual