HP A 5120 Manual
Have a look at the manual HP A 5120 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
61 # Configure bbb as the default ISP domain. Then, if a user enters a username without any ISP domain at login, the authentication and accounting methods of the default domain will be used for the user. [SwitchA] domain default enable bbb 2. Configure the RADIUS server # Create RADIUS user aaa and enter its view. system-view [SwitchB] radius-server user aaa # Configure simple-text password aabbcc for user aaa. [SwitchB-rdsuser-aaa] password simple aabbcc [SwitchB-rdsuser-aaa] quit # Specify the IP address of the RADIUS client as 10.1.1.1 and the shared key as abc. [SwitchB] radius-server client-ip 10.1.1.1 key abc Verification After entering username aaa@bbb or aaa and password aabbcc, user aaa can telnet to Switch A. Use the display connection command to view the connection information on Switch A. display connection Index=1 ,Username=aaa@bbb IP=192.168.1.2 IPv6=N/A Total 1 connection(s) matched. Troubleshooting AAA Troubleshooting RADIUS Symptom 1 User authentication/authorization always fails. Analysis 1. A communication failure exists between the NAS and the RADIUS server. 2. The username is not in the format of userid@isp-name or no default ISP domain is specified for the NAS. 3. The user is not configured on the RADIUS server. 4. The password entered by the user is incorrect. 5. The RADIUS server and the NAS are configured with different shared key. Solution Check that: 1. The NAS and the RADIUS server can ping each other. 2. The username is in the userid@isp-name format and a default ISP domain is specified on the NAS. 3. The user is configured on the RADIUS server. 4. The correct password is entered. 5. The same shared key is configured on both the RADIUS server and the NAS.
62 Symptom 2 RADIUS packets cannot reach the RADIUS server. Analysis 1. The communication link between the NAS and the RADIUS server is down (at the physical layer and data link layer). 2. The NAS is not configured with the IP address of the RADIUS server. 3. The UDP ports for authentication/authorization and accounting are not correct. 4. The port numbers of the RADIUS server for authentication, authorization and accounting are being used by other applications. Solution Check that: 1. The communication links between the NAS and the RADIUS server work well at both physical and link layers. 2. The IP address of the RADIUS server is correctly configured on the NAS. 3. UDP ports for authentication/authorization/accounting configured on the NAS are the same as those configured on the RADIUS server. 4. The port numbers of the RADIUS server for authentication, authorization and accounting are available. Symptom 3 A user is authenticated and authorized, but accounting for the user is not normal. Analysis 1. The accounting port number is not correct. 2. Configuration of the authentication/authorization server and the accounting server are not correct on the NAS. For example, one server is configured on the NAS to provide all the services of authentication/authorization and accounting, but in fact the services are provided by different servers. Solution Check that: 1. The accounting port number is correctly set. 2. The authentication/authorization server and the accounting server are correctly configured on the NAS. Troubleshooting HWTACACS Similar to RADIUS troubleshooting. See ―Troubleshooting RADIUS.―
63 802.1X fundamentals 802.1X is a port-based network access control protocol initially proposed by the IEEE 802 LAN/WAN committee for securing wireless LANs (WLANs), and it has also been widely used on Ethernet networks for access control. 802.1X controls network access by authenticating the devices connected to 802.1X-enabled LAN ports. 802.1X architecture 802.1X operates in the client/server model. It comprises three entities: client (the supplicant), network access device (the authenticator), and the authentication server. Figure 23 802.1X architecture The client is a user terminal seeking access to the LAN. It must have 802.1X software to authenticate to the network access device. The network access device authenticates the client to control access to the LAN. In a typical 802.1X environment, the network access device uses an authentication server to perform authentication. The authentication server is the entity that provides authentication services for the network access device. It authenticates 802.1X clients by using the data sent from the network access device, and returns the authentication results for the network access device to make access decisions. The authentication server is typically a Remote Authentication Dial-in User Service (RADIUS) server. In a small LAN, you can also use the network access device as the authentication server. Controlled/uncontrolled port and pot authorization status 802.1X defines two logical ports for the network access port: controlled port and uncontrolled port. Any packet arriving at the network access port is visible to both logical ports. The controlled port allows incoming and outgoing traffic to pass through when it is in the authorized state, and denies incoming and outgoing traffic when it is in the unauthorized state, as shown in Figure 24. The controlled port is set in the authorized state if the client has passed authentication, and in the unauthorized state, if the client has failed authentication. The uncontrolled port is always open to receive and transmit EAPOL frames. ServerClientDevice EAPOLRADIUS
64 Figure 24 Authorization state of a controlled port In the unauthorized state, a controlled port controls traffic in one of the following ways: Performs bidirectional traffic control to deny traffic to and from the client. Performs unidirectional traffic control to deny traffic from the client. NOTE: The HP switches support only unidirectional traffic control. 802.1X-related protocols 802.1X uses the Extensible Authentication Protocol (EAP) to transport authentication information for the client, the network access device, and the authentication server. EAP is an authentication framework that uses the client/server model. It supports a variety of authentication methods, including MD5-Challenge, EAP-Transport Layer Security (EAP-TLS), and Protected EAP (PEAP). 802.1X defines EAP over LAN (EAPOL) for passing EAP packets between the client and the network access device over a wired or wireless LAN. Between the network access device and the authentication server, 802.1X delivers authentication information in one of the following methods: Encapsulates EAP packets in RADIUS by using EAP over RADIUS (EAPOR), as described in ―EAP relay.‖ Extracts authentication information from the EAP packets and encapsulates the information in standard RADIUS packets, as described in ―EAP termination.‖ Packet format EAP packet format Figure 25 shows the EAP packet format. Controlled portUncontrolled port Authenticator system 1 LAN Controlled portUncontrolled port Authenticator system 2 LAN Port unauthorizedPort authorized
65 Figure 25 EAP packet format Code: Type of the EAP packet. Options include Request (1), Response (2), Success (3), or Failure (4). Identifier: Used for matching Responses with Requests. Length: Length (in bytes) of the EAP packet, which is the sum of the Code, Identifier, Length, and Data fields. Data: Content of the EAP packet. This field appears only in a Request or Response EAP packet. The field comprises the request type (or the response type) and the type data. Type 1 (Identify) and type 4 (MD5-challenge) are two examples for the type field. EAPOL packet format Figure 26 shows the EAPOL packet format. Figure 26 EAPOL packet format PAE Ethernet type: Protocol type. It takes the value 0x888E for EAPOL. Protocol version: The EAPOL protocol version used by the EAPOL packet sender. Type: Type of the EAPOL packet. Table 5 lists the types of EAPOL packets that the HP implementation of 802.1X supports. Table 5 Types of EAPOL packets Value Type Description 0x00 EAP-Packet The client and the network access device uses EAP- Packets to transport authentication information. 0x01 EAPOL-Start The client sends an EAPOL-Start message to initiate 802.1X authentication to the network access device. 0x02 EAPOL-Logoff The client sends an EAPOL-Logoff message to tell the network access device that it is logging off. Length: Data length in bytes, or length of the Packet body. If packet type is EAPOL-Start or EAPOL- Logoff, this field is set to 0, and no Packet body field follows. 015 Code Data Length 7 Identifier2 4 N 015 PAE Ethernet type Packet body TypeProtocol version Length 7 2 4 6 N
66 Packet body: Content of the packet. When the EAPOL packet type is EAP-Packet, the Packet body field contains an EAP packet. EAP over RADIUS RADIUS adds two attributes, EAP-Message and Message-Authenticator, for supporting EAP authentication. For the RADIUS packet format, see the chapter ―AAA configuration.‖ EAP-Message RADIUS encapsulates EAP packets in the EAP-Message attribute, as shown in Figure 27. The Type field takes 79, and the Value field can be up to 253 bytes. If an EAP packet is longer than 253 bytes, RADIUS encapsulates it in multiple EAP-Message attributes. Figure 27 EAP-Message attribute format Message-Authenticator RADIUS includes the Message-Authenticator attribute in all packets that have an EAP-Message attribute to check their integrity. The packet receiver drops the packet if the calculated packet integrity checksum is different than the Message-Authenticator attribute value. The Message-Authenticator prevents EAP authentication packets from being tampered with during EAP authentication. Figure 28 Message-Authenticator attribute format Initiating 802.1X authentication Both the 802.1X client and the access device can initiate 802.1X authentication. 802.1X client as the initiator The client sends an EAPOL-Start packet to the access device to initiate 802.1X authentication. The destination MAC address of the packet can be the IEEE 802.1X specified multicast address 01-80-C2-00- 00-03 or the broadcast MAC address. If any intermediate device between the client and the authentication server does not support this multicast address, you must use an 802.1X client, the iNode 802.1X client for example, that can send broadcast EAPOL_Start packets. Access device as the initiator The access device initiates authentication, if a client, the 802.1X client available with Windows XP for example, cannot send EAPOL-Start packets. The access device supports the following modes: 015 TypeString 7 Length N EAP packets 02 TypeString 1 Length 18 bytes
67 Multicast trigger mode—The access device multicasts EAP-Request/Identify packets periodically (every 30 seconds by default) to initiate 802.1X authentication. Unicast trigger mode—Upon receiving a frame with the source MAC address not in the MAC address table, the access device sends an EAP-Request/Identify packet out of the receiving port to the unknown MAC address. It retransmits the packet if no response has been received within a configured time interval. 802.1X authentication procedures 802.1X authentication has two approaches: EAP relay and EAP termination. You choose either mode depending on the support of the RADIUS server for EAP packets and EAP authentication methods. EAP relay is defined in IEEE 802.1X. In this mode, the network device uses EAPoR packets to send authentication information to the RADIUS server, as shown in Figure 29. Figure 29 EAP relay In EAP termination mode, the network access device terminates the EAP packets received from the client, encapsulates the client authentication information in standard RADIUS packets, and uses (Password Authentication Protocol) PAP or (Password Authentication Protocol) CHAP to authenticate to the RADIUS server, as shown in Figure 30. Figure 30 EAP termination A comparison of EAP relay and EAP termination Packet exchange method Benefits Limitations EAP relay Supports various EAP authentication methods. The configuration and processing is simple on the network access device The RADIUS server must support the EAP-Message and Message- Authenticator attributes, and the EAP authentication method used by the client. RADIUS serverClientDevice EAP packets over LANEAP packets over RADIUS EAP authentication RADIUS serverClientDevice EAP packets over LANRADIUS EAP authentication PAP/CHAP authentication
68 Packet exchange method Benefits Limitations EAP termination Works with any RADIUS server that supports PAP or CHAP authentication. Supports only MD5-Challenge EAP authentication and the username + password EAP authentication initiated by an iNode 802.1X client. The processing is complex on the network access device. EAP relay Figure 31 shows the basic 802.1X authentication procedure in EAP relay mode, assuming that EAP-MD5 is used. Figure 31 802.1X authentication procedure in EAP relay mode 1. When a user launches the 802.1X client software and enters a registered username and password, the 802.1X client software sends an EAPOL-Start packet to the network access device. 2. The network access device responds with an Identity EAP-Request packet to ask for the client username. EAPOLEAPOR (1) EAPOL-Start (2) EAP-Request/Identity (3) EAP-Response/Identity (6) EAP-Request/MD5 challenge (10) EAP-Success (7) EAP-Response/MD5 challenge (4) RADIUS Access-Request(EAP-Response/Identity) (5) RADIUS Access-Challenge(EAP-Request/MD5 challenge) (9) RADIUS Access-Accept(EAP-Success) (8) RADIUS Access-Request(EAP-Response/MD5 challenge) (11) EAP-Request/Identity (12) EAP-Response/Identity (13) EAPOL-Logoff ... ClientDeviceAuthentication server Port authorized Port unauthorized(14) EAP-Failure
69 3. In response to the Identity EAP-Request packet, the client sends the username in an Identity EAP- Response packet to the network access device. 4. The network access device relays the Identity EAP-Response packet in a RADIUS Access-Request packet to the authentication server. 5. The authentication server uses the identity information in the RADIUS Access-Request to search its user database. If a matching entry is found, the server uses a randomly generated challenge (EAP- Request/MD5 challenge) to encrypt the password in the entry, and sends the challenge in a RADIUS Access-Challenge packet to the network access device. 6. The network access device relays the EAP-Request/MD5 Challenge packet in a RADIUS Access- Request packet to the client. 7. The client uses the received challenge to encrypt the password, and sends the encrypted password in an EAP-Response/MD5 Challenge packet to the network access device. 8. The network access device relays the EAP-Response/MD5 Challenge packet in a RADIUS Access- Request packet to the authentication server. 9. The authentication server compares the received encrypted password with the one it generated at step 5. If the two are identical, the authentication server considers the client valid and sends a RADIUS Access-Accept packet to the network access device. 10. Upon receiving the RADIUS Access-Accept packet, the network access device sends an EAP- Success packet to the client, and sets the controlled port in the authorized state so the client can access the network. 11. After the client comes online, the network access device periodically sends handshake requests to check whether the client is still online. By default, if two consecutive handshake attempts fail, the device logs off the client. 12. Upon receiving a handshake request, the client returns a response. If the client fails to return a response after a certain number of consecutive handshake attempts (two by default), the network access device logs off the client. This handshake mechanism enables timely release of the network resources used by 802.1X users that have abnormally gone offline. 13. The client can also send an EAPOL-Logoff packet to ask the network access device for a logoff. 14. In response to the EAPOL-Logoff packet, the network access device changes the status of the controlled port from authorized to unauthorized and sends an EAP-Failure packet to the client. NOTE: In EAP relay mode, the client must use the same authentication method as the RADIUS server. On the network access device, you only need to execute the dot1x authentication-method eap command to enable EAP relay. EAP termination Figure 32 shows the basic 802.1X authentication procedure in EAP termination mode, assuming that CHAP authentication is used.
70 Figure 32 802.1X authentication procedure in EAP termination mode In EAP termination mode, it is the network access device rather than the authentication server generates an MD5 challenge for password encryption (see Step 4). The network access device then sends the MD5 challenge together with the username and encrypted password in a standard RADIUS packet to the RADIUS server. EAPOLRADIUS (1) EAPOL-Start (2) EAP-Request / Identity (3) EAP-Response / Identity (4) EAP-Request / MD5 challenge (8) EAP-Success (5) EAP-Response / MD5 challenge (9) EAP-Request/Identity (10) EAP-Response/Identity (11) EAPOL-Logoff ... ClientDeviceAuthentication server Port authorized Port unauthorized (6) RADIUS Access-Request(CHAP-Response/MD5 challenge) (7) RADIUS Access-Accept(CHAP-Success) (14) EAP-Failure