ProCurve 3400cl Technical Information Page 1

Browse online or download Technical Information for Network switches ProCurve 3400cl. ProCurve 3400cl System information User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 314
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - Series 3400cl Switches

Access Security Guide www.hp.com/go/hpprocurve HP ProCurve Series 5300xl Switches Series 3400cl Switches

Page 2

Contents 9 Configuring Port-Based Access Control (802.1x) Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 3 - HP Procurve

TACACS+ Authentication Operating Notes When TACACS+ is not enabled on the switch—or when the switch’s only designated TACACS+ servers are not acces

Page 4

5 RADIUS Authentication and Accounting Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 5

RADIUS Authentication and Accounting Overview Overview Feature Default Menu CLI Web Configuring RADIUS Authentication None n/a 5-6 n/a Configu

Page 6

RADIUS Authentication and Accounting Terminology Terminology CHAP (Challenge-Handshake Authentication Protocol): A challenge-response authentication p

Page 7 - 4 TACACS+ Authentication

RADIUS Authentication and Accounting Switch Operating Rules for RADIUS Switch Operating Rules for RADIUS You must have at least one RADIUS server a

Page 8

RADIUS Authentication and Accounting General RADIUS Setup Procedure General RADIUS Setup Procedure Preparation: 1. Configure one to three RADIUS serv

Page 9 - 8 Traffic/Security Filters

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication Configuring the Switch for RADIUS Authentication RADIUS Authenti

Page 10 - Contents

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication Note This step assumes you have already configured the RADIUS s

Page 11

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication 1. Configure Authentication for the Access Methods You Want RADI

Page 12 - 12 Key Management System

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication For example, suppose you have already configured local passwords

Page 13 - Getting Started

Contents 10 Configuring and Monitoring Port Security Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 14 - Introduction

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication 2. Configure the Switch To Access a RADIUS Server This section d

Page 15

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication For example, suppose you have configured the switch as shown in

Page 16 - Guideline

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication 3. Configure the Switch’s Global RADIUS Parameters You can confi

Page 17 - Command Syntax Conventions

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication dead-time < 1 - 1440 > Optional. Specifies the time in min

Page 18 - Simulating Display Output

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication Figure 5-5. Example of Global Configuration Exercise for RADIUS

Page 19 - Related Publications

RADIUS Authentication and Accounting Local Authentication Process Local Authentication Process When the switch is configured to use RADIUS, it reverts

Page 20

RADIUS Authentication and Accounting Controlling Web Browser Interface Access When Using RADIUS Authentication Controlling Web Browser Interface Acces

Page 21

RADIUS Authentication and Accounting Configuring RADIUS Accounting Note This section assumes you have already: Configured RADIUS authentication on

Page 22 - Sources for More Information

RADIUS Authentication and Accounting Configuring RADIUS Accounting The switch forwards the accounting information it collects to the designated RADIUS

Page 23 - Network

RADIUS Authentication and Accounting Configuring RADIUS Accounting – Optional—if you are also configuring the switch for RADIUS authentication, and n

Page 24

Contents Overview of IP Mask Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-4 Menu: Viewing and Configuring IP Authorized

Page 25

RADIUS Authentication and Accounting Configuring RADIUS Accounting Syntax: [no] radius-server host < ip-address > Adds a server to the RADIUS c

Page 26

RADIUS Authentication and Accounting Configuring RADIUS Accounting Because the radius-server command includes an acct-port element with a non-default

Page 27

RADIUS Authentication and Accounting Configuring RADIUS Accounting Start-Stop: • Send a start record accounting notice at the beginning of the acc

Page 28

RADIUS Authentication and Accounting Configuring RADIUS Accounting 3. (Optional) Configure Session Blocking and Interim Updating Options These optiona

Page 29 - Menu: Setting Passwords

RADIUS Authentication and Accounting Viewing RADIUS Statistics Viewing RADIUS Statistics General RADIUS Statistics Syntax: show radius [host < ip-

Page 30

RADIUS Authentication and Accounting Viewing RADIUS Statistics Term Definition Round Trip Time The time interval between the most recent Accounting-

Page 31

RADIUS Authentication and Accounting Viewing RADIUS Statistics RADIUS Authentication Statistics Syntax: show authentication Displays the primary and

Page 32 - Front-Panel Security

RADIUS Authentication and Accounting Viewing RADIUS Statistics RADIUS Accounting Statistics Syntax: show accounting Lists configured accounting inter

Page 33 - When Security Is Important

RADIUS Authentication and Accounting Changing RADIUS-Server Access Order Figure 5-16. Example Listing of Active RADIUS Accounting Sessions on the Swit

Page 34 - Front-Panel Button Functions

RADIUS Authentication and Accounting Changing RADIUS-Server Access Order To exchange the positions of the addresses so that the server at 10.10.10.003

Page 35 - Reset Button

Getting Started Contents 1 Getting Started Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 36

RADIUS Authentication and Accounting Messages Related to RADIUS Operation Messages Related to RADIUS Operation Message Meaning Can’t reach RADIUS ser

Page 37

6 Configuring Secure Shell (SSH) Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 38

Configuring Secure Shell (SSH) Overview Overview Feature Default Menu CLI Web Generating a public/private key pair on the switch No n/a page 6-

Page 39

Configuring Secure Shell (SSH) Terminology Note SSH in HP Procurve switches is based on the OpenSSH software toolkit. For more information on OpenSSH

Page 40

Configuring Secure Shell (SSH) Terminology PEM (Privacy Enhanced Mode): Refers to an ASCII-formatted client public-key that has been encoded for po

Page 41

Configuring Secure Shell (SSH) Prerequisite for Using SSH Prerequisite for Using SSH Before using the switch as an SSH server, you must install a publ

Page 42 - Password Recovery

Configuring Secure Shell (SSH) Steps for Configuring and Using SSH for Switch and Client Authentication Steps for Configuring and Using SSH for Switch

Page 43 - [N] (for “No”)

Configuring Secure Shell (SSH) Steps for Configuring and Using SSH for Switch and Client Authentication B. Switch Preparation 1. Assign a login (Oper

Page 44 - Password Recovery Process

Configuring Secure Shell (SSH) General Operating Rules and Notes General Operating Rules and Notes Public keys generated on an SSH client must be e

Page 45 - Web and MAC Authentication

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Configuring the Switch for SSH Operation SSH-Related Commands in This Section

Page 46

Getting Started Introduction Introduction This Access Security Guide is intended for use with the following switches: HP ProCurve Switch 5304xl

Page 47 - Client Options

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Figure 6-5. Example of Configuring Local Passwords 2. Generating the Switch’s

Page 48 - General Features

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Notes When you generate a host key pair on the switch, the switch places the

Page 49 - Operate

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation For example, to generate and display a new key: Host Public Key for the Switch

Page 50

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation distribution to clients is to use a direct, serial connection between the swit

Page 51 - MAC-based Authentication

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation 4. Add any data required by your SSH client application. For example Before s

Page 52

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Hexadecimal "Fingerprints" of the Same Switch Phonetic "Hash&qu

Page 53

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation SSH Client Contact Behavior. At the first contact between the switch and an S

Page 54 - Operating Rules and Notes

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation [port < 1-65535 | default >] The TCP port number for SSH connections (de

Page 55

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Caution Protect your private key file from access by anyone other than yourse

Page 56

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Syntax: aaa authentication ssh login < local | tacacs | radius >[< l

Page 57

Getting Started Overview of Access Security Features Port-Based Access Control (802.1x) (page 9-1): On point-to-point connections, enables the swit

Page 58 - RADIUS Server

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Caution To allow SSH access only to clients having the correct public key, yo

Page 59

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Figure 6-13 shows how to check the results of the above commands. Lists the cu

Page 60

Configuring Secure Shell (SSH) Further Information on SSH Client Public-Key Authentication Further Information on SSH Client Public-Key Authentication

Page 61

Configuring Secure Shell (SSH) Further Information on SSH Client Public-Key Authentication 3. If there is not a match, and you have not configured th

Page 62

Configuring Secure Shell (SSH) Further Information on SSH Client Public-Key Authentication Notes Comments in public key files, such as smith@support.

Page 63

Configuring Secure Shell (SSH) Further Information on SSH Client Public-Key Authentication Note on Public The actual content of a public key entry in

Page 64

Configuring Secure Shell (SSH) Further Information on SSH Client Public-Key Authentication Syntax: clear crypto public-key Deletes the client-public-

Page 65

Configuring Secure Shell (SSH) Messages Related to SSH Operation Messages Related to SSH Operation Message Meaning 00000K Peer unreachable. Indicate

Page 66

Configuring Secure Shell (SSH) Messages Related to SSH Operation Message Meaning After you execute the crypto key generate ssh [rsa]Generating new RS

Page 67

7 Configuring Secure Socket Layer (SSL) Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 68

Getting Started General Switch Traffic Security Guideline General Switch Traffic Security Guideline Where the switch is running multiple security opti

Page 69

Configuring Secure Socket Layer (SSL) Overview Overview Feature Default Menu CLI Web Generating a Self Signed Certificate on the switch No n/a

Page 70 - Based Authentication

Configuring Secure Socket Layer (SSL) Terminology HP Switch (SSL Server) SSL Client Browser 1. Switch-to-Client SSL Cert. 2. User-to-Switch (login pas

Page 71

Configuring Secure Socket Layer (SSL) Terminology Root Certificate: A trusted certificate used by certificate authorities to sign certificates (CA-

Page 72

Configuring Secure Socket Layer (SSL) Prerequisite for Using SSL Prerequisite for Using SSL Before using the switch as an SSL server, you must install

Page 73 - Client Status

Configuring Secure Socket Layer (SSL) General Operating Rules and Notes General Operating Rules and Notes Once you generate a certificate on the sw

Page 74

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Configuring the Switch for SSL Operation SSL-Related CLI Commands in Th

Page 75

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Using the web browser interface To Configure Local Passwords. You can

Page 76

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation 2. Generating the Switch’s Server Host Certificate You must generate a

Page 77 - Applications:

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation To Generate or Erase the Switch’s Server Certificate with the CLI Becau

Page 78

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Comments on certificate fields. There are a number arguments used in th

Page 79 - General System Requirements

Getting Started Command Syntax Conventions Note on ACL ACLs can enhance network security by blocking selected IP traffic, and can Security Use serve

Page 80

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Note s “Zeroizing” the switch’s server host certificate or key automat

Page 81 - Caution

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Generate a Self-Signed Host Certificate with the Web browser interface

Page 82 - BeforeYou Begin

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation For example, to generate a new host certificate via the web browsers in

Page 83 - Configuration

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Current SSL Host Certificate Figure 7-6. Web browser Interface showing

Page 84

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation The installation of a CA-signed certificate involves interaction with o

Page 85

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Certificate Request Certificate Request Reply -----BEGIN CERTIFICATE---

Page 86

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Note Before enabling SSL on the switch you must generate the switch’s

Page 87 - Login Primary

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Using the CLI interface to enable SSL Syntax: [no] web-management ssl

Page 88

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Enable SLL and port number Selection Figure 7-8. Using the web browser

Page 89

Configuring Secure Socket Layer (SSL) Common Errors in SSL setup Common Errors in SSL setup Error During Possible Cause Generating host certificate o

Page 90 - Encryption Keys

Getting Started Simulating Display Output Simulating Display Output Commands or command output positioned to simulate displays of switch information i

Page 91

Configuring Secure Socket Layer (SSL) Common Errors in SSL setup — This page is intentionally unused. — 7-22

Page 92 - First-Choice TACACS+ Server

8 Traffic/Security Filters Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 93

Traffic/Security Filters Overview Overview Applicable Switch Models. As of September, 2004, Traffic/Security filters are available on these current H

Page 94 - How Authentication Operates

Traffic/Security Filters Filter Types and Operation Filter Limits The switch accepts up to 101 static filters. These limitations apply: Source-port

Page 95

Traffic/Security Filters Filter Types and Operation Source-Port Filters This filter type enables the switch to forward or drop traffic from all end no

Page 96

Traffic/Security Filters Filter Types and Operation When you create a source port filter, all ports and port trunks (if any) on the switch appear a

Page 97 - Using the Encryption Key

Traffic/Security Filters Filter Types and Operation This list shows the filter created to block (drop) traffic from source port 5 (workstation "X

Page 98 - Access When Using TACACS+

Traffic/Security Filters Filter Types and Operation Table 8-2. Multicast Filter Limits on the 5300xl Switches Max-VLANs Setting Maximum # of Multicas

Page 99 - Messages Related to TACACS+

Traffic/Security Filters Configuring Traffic/Security Filters Protocol Filters (5300xl Only) This filter type enables the switch to forward or drop, o

Page 100 - Operating Notes

Traffic/Security Filters Configuring Traffic/Security Filters Configuring a Source-Port Traffic Filter Syntax: [no] filter [source-port < port-num

Page 101

Getting Started Related Publications Port Numbering Conventions HP ProCurve stackable switches designate individual ports with sequential numbers (1,

Page 102 - Overview

Traffic/Security Filters Configuring Traffic/Security Filters Example of Creating a Source-Port Filter For example, assume that you want to create a s

Page 103 - Terminology

Traffic/Security Filters Configuring Traffic/Security Filters 5, then create a trunk with ports 5 and 6, and display the results, you would see the fo

Page 104

Traffic/Security Filters Configuring Traffic/Security Filters Figure 8-5. Assigning Additional Destination Ports to an Existing Filter Configuring a M

Page 105

Traffic/Security Filters Configuring Traffic/Security Filters For example, suppose you wanted to configure the filters in table 8-3 on a 5300xl switch

Page 106 - Authentication

Traffic/Security Filters Configuring Traffic/Security Filters Displaying Traffic/Security Filters This command displays a listing of all filters by in

Page 107

Traffic/Security Filters Configuring Traffic/Security Filters Filter Index Numbers (Automatically Assigned) Lists all filters configured in the switch

Page 108 - Want RADIUS To Protect

Traffic/Security Filters Configuring Traffic/Security Filters — This page is intentionally unused. — 8-16

Page 109 - SSH authentication

9 Configuring Port-Based Access Control (802.1x) Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 110

Configuring Port-Based Access Control (802.1x) Overview Overview Feature Default Menu CLI Web Configuring Switch Ports as 802.1x Authenticators D

Page 111

Configuring Port-Based Access Control (802.1x) Overview Local authentication of 802.1x clients using the switch’s local username and password (as a

Page 113

Getting Started Related Publications Management and Configuration Guide. Use the Management and Con-figuration Guide for information on: Using the

Page 114

Configuring Port-Based Access Control (802.1x) Overview Authenticating One Switch to Another. 802.1x authentication also enables the switch to operat

Page 115 - Local Authentication Process

Configuring Port-Based Access Control (802.1x) How 802.1x Operates How 802.1x Operates Authenticator Operation This operation provides security on a d

Page 116 - Access When Using RADIUS

Configuring Port-Based Access Control (802.1x) How 802.1x Operates Switch-Port Supplicant Operation This operation provides security on links between

Page 117

Configuring Port-Based Access Control (802.1x) Terminology • A “failure” response continues the block on port B5 and causes port A1 to wait for the “

Page 118

Configuring Port-Based Access Control (802.1x) Terminology EAP (Extensible Authentication Protocol): EAP enables network access that supports multiple

Page 119

Configuring Port-Based Access Control (802.1x) General Operating Rules and Notes member of that VLAN as long as at least one other port on the switch

Page 120 - ■ IP address: 10.33.18.151

Configuring Port-Based Access Control (802.1x) General Operating Rules and Notes On a port configured for 802.1x with RADIUS authentication, if the

Page 121

Configuring Port-Based Access Control (802.1x) General Setup Procedure for Port-Based Access Control (802.1x) General Setup Procedure for Port-Based A

Page 122 - ■ Stop-Only:

Configuring Port-Based Access Control (802.1x) General Setup Procedure for Port-Based Access Control (802.1x) Overview: Configuring 802.1x Authenticat

Page 123

Configuring Port-Based Access Control (802.1x) General Setup Procedure for Port-Based Access Control (802.1x) 7. If you are using Port Security on th

Page 124 - Viewing RADIUS Statistics

Getting Started Getting Documentation From the Web Getting Documentation From the Web 1. Go to the HP Procurve website at http://www.hp.com/go/hpproc

Page 125

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports as 802.1x Authenticators Configuring Switch Ports as 802.1x Authenticators 802

Page 126

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports as 802.1x Authenticators Syntax: aaa port-access authenticator < port-list

Page 127 - RADIUS Accounting Statistics

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports as 802.1x Authenticators aaa port-access authenticator < port-list > (Sy

Page 128

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports as 802.1x Authenticators aaa port-access authenticator < port-list > (Sy

Page 129

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports as 802.1x Authenticators 3. Configure the 802.1x Authentication Method This ta

Page 130

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports as 802.1x Authenticators 4. Enter the RADIUS Host IP Address(es) If you select

Page 131

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode 802.1x Open VLAN Mode 802.1x Authentication Commands page 9-14 802.1x Supplicant

Page 132

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode 1. 1st Priority: The port joins a VLAN to which it has been assigned by a RADIUS

Page 133

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode Table 9-2. 802.1x Open VLAN Mode Options 802.1x Per-Port Configuration Port Res

Page 134

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode 802.1x Per-Port Configuration Port Response Open VLAN Mode with Only an Unauthor

Page 135 - Public Key Formats

Getting Started Sources for More Information Sources for More Information  If you need information on specific parameters in the menu interface, ref

Page 136

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode Operating Rules for Authorized-Client and Unauthorized-Client VLANs Condition Ru

Page 137

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode Condition Rule Effect of Authorized-Client VLAN • When a client becomes authen

Page 138

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode Setting Up and Configuring 802.1x Open VLAN Mode Preparation. This section assume

Page 139 - Operation

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode Note that as an alternative, you can configure the switch to use local password a

Page 140

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode 3. If you selected either eap-radius or chap-radius for step 2, use the radius h

Page 141

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode Configuring 802.1x Open VLAN Mode. Use these commands to actually configure Open

Page 142 - Key for the

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode Inspecting 802.1x Open VLAN Mode Operation. For information and an example on vi

Page 143 - Modulus <n>

Configuring Port-Based Access Control (802.1x) Option For Authenticator Ports: Configure Port-Security To Allow Only 802.1x Devices Option For Authent

Page 144

Configuring Port-Based Access Control (802.1x) Option For Authenticator Ports: Configure Port-Security To Allow Only 802.1x Devices Note on If the po

Page 145 - Client Contact Behavior

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports To Operate As Supplicants for 802.1x Connections to Other Switches Configuring

Page 146 - ■ Execute no ip ssh

Getting Started Need Only a Quick Start? Need Only a Quick Start? IP Addressing. If you just want to give the switch an IP address so that it can com

Page 147

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports To Operate As Supplicants for 802.1x Connections to Other Switches 1. When po

Page 148

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports To Operate As Supplicants for 802.1x Connections to Other Switches Configuring

Page 149

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports To Operate As Supplicants for 802.1x Connections to Other Switches aaa port-ac

Page 150

Configuring Port-Based Access Control (802.1x) Displaying 802.1x Configuration, Statistics, and Counters Displaying 802.1x Configuration, Statistics,

Page 151

Configuring Port-Based Access Control (802.1x) Displaying 802.1x Configuration, Statistics, and Counters show port-access authenticator (Syntax Contin

Page 152 - Public-Key Authentication

Configuring Port-Based Access Control (802.1x) Displaying 802.1x Configuration, Statistics, and Counters Viewing 802.1x Open VLAN Mode Status You can

Page 153 - Comment

Configuring Port-Based Access Control (802.1x) Displaying 802.1x Configuration, Statistics, and Counters When the Unauth VLAN ID is configured and

Page 154

Configuring Port-Based Access Control (802.1x) Displaying 802.1x Configuration, Statistics, and Counters Status Indicator Meaning Unauthorized VLAN I

Page 155 - Key Index Number

Configuring Port-Based Access Control (802.1x) Displaying 802.1x Configuration, Statistics, and Counters Show Commands for Port-Access Supplicant Synt

Page 156

Configuring Port-Based Access Control (802.1x) How RADIUS/802.1x Authentication Affects VLAN Operation supplicant port to another without clearing the

Page 157

Getting Started To Set Up and Install the Switch in Your Network — This page is intentionally unused. — 1-12

Page 158

Configuring Port-Based Access Control (802.1x) How RADIUS/802.1x Authentication Affects VLAN Operation For example, suppose that a RADIUS-authenticate

Page 159

Configuring Port-Based Access Control (802.1x) How RADIUS/802.1x Authentication Affects VLAN Operation This entry shows that port A2 is temporarily un

Page 160

Configuring Port-Based Access Control (802.1x) How RADIUS/802.1x Authentication Affects VLAN Operation When the 802.1x client’s session on port A2 end

Page 161

Configuring Port-Based Access Control (802.1x) Messages Related to 802.1x Operation Messages Related to 802.1x Operation Table 9-4. 802.1x Operating

Page 162

Configuring Port-Based Access Control (802.1x) Messages Related to 802.1x Operation — This page is intentionally unused. — 9-48

Page 163 - Prerequisite for Using SSL

10 Configuring and Monitoring Port Security Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 164

Configuring and Monitoring Port Security Overview Overview Feature Default Menu CLI Web Displaying Current Port Security n/a — page 10-7 page

Page 165

Configuring and Monitoring Port Security Port Security Port Security Basic Operation Default Port Security Operation. The default port security settin

Page 166 - Security Tab

Configuring and Monitoring Port Security Port Security • Limited-Continuous: Sets a finite limit ( 1 - 32 ) to the number of learned addresses allowe

Page 167

Configuring and Monitoring Port Security Port Security Blocking Unauthorized Traffic Unless you configure the switch to disable a port on which a secu

Page 168

2 Configuring Username and Password Security Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 169 - Generate New Certificate

Configuring and Monitoring Port Security Port Security Planning Port Security 1. Plan your port security configuration and monitoring according to th

Page 170

Configuring and Monitoring Port Security Port Security Port Security Command Options and Operation Port Security Commands Used in This Section show po

Page 171

Configuring and Monitoring Port Security Port Security Figure 10-2. Example Port Security Listing (Ports A7 and A8 Show the Default Setting) With por

Page 172 - [SSL] button

Configuring and Monitoring Port Security Port Security Listing Authorized and Detected MAC Addresses. Syntax: show mac-address [ port-list | mac-addre

Page 173 - Current SSL Host Certificate

Configuring and Monitoring Port Security Port Security Configuring Port Security Using the CLI, you can: Configure port security and edit security

Page 174

Configuring and Monitoring Port Security Port Security Syntax: port-security (Continued) learn-mode < continuous | static | port-access | configu

Page 175 - Browser Contact Behavior

Configuring and Monitoring Port Security Port Security Syntax: port-security (Continued) learn-mode < continuous | static | port-access | configu

Page 176

Configuring and Monitoring Port Security Port Security Syntax: port-security (Continued) learn-mode < continuous | static | port-access | configu

Page 177

Configuring and Monitoring Port Security Port Security Syntax: port-security (Continued) action < none | send-alarm | send-disable > Specifies

Page 178 - Enable SLL

Configuring and Monitoring Port Security Port Security Retention of Static Addresses Static MAC addresses do not age-out. MAC addresses learned by usi

Page 179 - Common Errors in SSL setup

Configuring Username and Password Security Overview Overview Feature Default Menu CLI Web Set Usernames none — — page 2-8 Set a Password none

Page 180

Configuring and Monitoring Port Security Port Security Specifying Authorized Devices and Intrusion Responses. This example configures port A1 to autom

Page 181 - Traffic/Security Filters

Configuring and Monitoring Port Security Port Security Adding an Authorized Device to a Port. To simply add a device (MAC address) to a port’s existin

Page 182

Configuring and Monitoring Port Security Port Security (The message Inconsistent value appears if the new MAC address exceeds the current Address Limi

Page 183 - Filter Types and Operation

Configuring and Monitoring Port Security Port Security Removing a Device From the “Authorized” List for a Port. This command option removes unwanted d

Page 184 - Source-Port Filters

Configuring and Monitoring Port Security MAC Lockdown The following command serves this purpose by removing 0c0090-123456 and reducing the Address Lim

Page 185 - Example

Configuring and Monitoring Port Security MAC Lockdown You will need to enter a separate command for each MAC/VLAN pair you wish to lock down. If you d

Page 186

Configuring and Monitoring Port Security MAC Lockdown Other Useful Information. Once you lock down a MAC address/VLAN pair on one port that pair canno

Page 187

Configuring and Monitoring Port Security MAC Lockdown MAC Lockdown Operating Notes Limits. There is a limit of 500 MAC Lockdowns that you can safely

Page 188

Configuring and Monitoring Port Security MAC Lockdown Deploying MAC Lockdown When you deploy MAC Lockdown you need to consider how you use it within y

Page 189 - Forward action. (Default:

Configuring and Monitoring Port Security MAC Lockdown 3400cl or 5300xl Switch 3400cl or 5300xl Switch 3400cl or 5300xl Switch 3400cl or 5300xl Switch

Page 190

Configuring Username and Password Security Overview Level Actions Permitted Manager: Access to all console interface areas. This is the default level

Page 191 - Editing a Source-Port Filter

Configuring and Monitoring Port Security MAC Lockdown The key points for this Model Topology are: • The Core Network is separated from the edge by th

Page 192 - (5300xl Switches Only)

Configuring and Monitoring Port Security MAC Lockdown M i x e d U s e r s Internal Network External Network Switch 1 Server A Server A is locked dow

Page 193 - Filter Indexing

Configuring and Monitoring Port Security MAC Lockout MAC Lockout MAC Lockout involves configuring a MAC address on all ports and VLANs for a switch so

Page 194

Configuring and Monitoring Port Security MAC Lockout MAC Lockout overrides MAC Lockdown, port security, and 802.1x authenti-cation. You cannot use MAC

Page 195

Configuring and Monitoring Port Security MAC Lockout Port Security and MAC Lockout MAC Lockout is independent of port-security and in fact will overri

Page 196

Configuring and Monitoring Port Security Web: Displaying and Configuring Port Security Features Web: Displaying and Configuring Port Security Features

Page 197 - (802.1x)

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags The switch enables notification of the intrusion throug

Page 198

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags The log shows the most recent intrusion at the top of the

Page 199

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags Menu: Checking for Intrusions, Listing Intrusion Alerts, a

Page 200

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags • Because the Port Status screen (figure 10-13 on page 10

Page 201 - How 802.1x Operates

Configuring Username and Password Security Overview Note The manager and operator passwords and (optional) usernames control access to the menu inter

Page 202

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags Clear intrusion flags on all ports. port-security [e] <

Page 203

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags To clear the intrusion from port A1 and enable the switch

Page 204 - 802.1x standard

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags Log Listing with Security Violation Detected Log Listing w

Page 205

Configuring and Monitoring Port Security Operating Notes for Port Security Operating Notes for Port Security Identifying the IP Address of an Intruder

Page 206

Configuring and Monitoring Port Security Operating Notes for Port Security HPswitch(config)# port-security e a17 learn-mode static address-limit 2 LA

Page 207 - Access Control (802.1x)

11 Using Authorized IP Managers Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 208

Using Authorized IP Managers Overview Overview Authorized IP Manager Features Feature Default Menu CLI Web Listing (Showing) Authorized Managers n

Page 209

Using Authorized IP Managers Options Options You can configure: Up to 10 authorized manager addresses, where each address applies to either a singl

Page 210 - Authenticators

Using Authorized IP Managers Defining Authorized Management Stations Defining Authorized Management Stations Authorizing Single Stations: The table

Page 211

Using Authorized IP Managers Defining Authorized Management Stations rized Manager IP address to authorize four IP addresses for management station ac

Page 212

Configuring Username and Password Security Configuring Local Password Security Configuring Local Password Security Menu: Setting Passwords As noted ea

Page 213

Using Authorized IP Managers Defining Authorized Management Stations 2. Enter an Authorized Manager IP address here. 5. Press [Enter], then [S] (for

Page 214

Using Authorized IP Managers Defining Authorized Management Stations The above example shows an Authorized IP Manager List that allows stations to acc

Page 215

Using Authorized IP Managers Web: Configuring IP Authorized Managers To Edit an Existing Manager Access Entry. To change the mask or access level for

Page 216 - 802.1x Open VLAN Mode

Using Authorized IP Managers Building IP Masks Building IP Masks The IP Mask parameter controls how the switch uses an Authorized Manager IP value to

Page 217

Using Authorized IP Managers Building IP Masks Configuring Multiple Stations Per Authorized Manager IP Entry The mask determines whether the IP addres

Page 218

Using Authorized IP Managers Building IP Masks Figure 11-6. Analysis of IP Mask for Multiple-Station Entries 1st Octet 2nd Octet 3rd Octet 4th Octet

Page 219

Using Authorized IP Managers Operating Notes Additional Examples for Authorizing Multiple Stations Entries for Authorized Manager List Results IP Mask

Page 220 - Unauthorized-Client VLANs

Using Authorized IP Managers Operating Notes • If you don’t need proxy server access at all on the authorized station, then just disable the proxy se

Page 221

Using Authorized IP Managers Operating Notes — This page is intentionally unused. — 11-14

Page 222

12 Key Management System Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

Page 223

HP Procurve Series 5300xl Switches Series 3400cl Switches Access Security Guide September 2004

Page 224

Configuring Username and Password Security Configuring Local Password Security To Delete Password Protection (Including Recovery from a Lost Password)

Page 225

Key Management System Overview Overview The HP Procurve switches covered in this guide provide support for advanced routing capabilities. Security tur

Page 226

Key Management System Configuring Key Chain Management Configuring Key Chain Management KMS-Related CLI Commands in This Section Page show key-chain

Page 227 - 802.1x Devices

Key Management System Configuring Key Chain Management Add new key chain Entry “Procurve1”. Display key chain entries. Figure 12-1. Adding a New Key C

Page 228 - Non-802.1x

Key Management System Configuring Key Chain Management Adds a new Time-Independent key to the “Procurve1” chain. Displays keys in the key chain entry.

Page 229 - Other Switches

Key Management System Configuring Key Chain Management duration < mm/dd/yy [ yy ] hh:mm:ss | seconds > Specifies the time period during which th

Page 230

Key Management System Configuring Key Chain Management Note Given transmission delays and the variations in the time value from switch to switch, it

Page 231

Key Management System Configuring Key Chain Management The “Procurve1” key chain entry is a time-independent key and will not expire. “Procurve2” uses

Page 232

Index Numerics 3DES … 6-3, 7-3 802.1x See port-based access control. A aaa authentication … 4-8 aaa port-access See Web or MAC Authentication. access

Page 233 - Statistics, and Counters

G - I GVRP, static VLAN not advertised … 9-46 IGMP effect on filters … 8-7 IP multicast address range … 8-7 inconsistent value, message … 10-18 intrus

Page 234

P password browser/console access … 2-4 case-sensitive … 2-5 caution … 2-4 delete … 2-6 deleting with the Clear button … 2-6 if you lose the password

Page 235

Configuring Username and Password Security Configuring Local Password Security CLI: Setting Passwords and Usernames Commands Used in This Section pass

Page 236

prior to … 10-35, 10-36, 10-39 Privacy Enhanced Mode (PEM) See SSH. protocol filters … 8-8 proxy web server … 10-39 Q - R quick start … 1-11 RADIUS ac

Page 237

keys, zeroing … 6-11 key-size … 6-17 known-host file … 6-13, 6-15 man-in-the-middle spoofing … 6-16 messages, operating … 6-27 OpenSSH … 6-3 operating

Page 238 - ■ The switch reboots

messages … 4-25 NAS … 4-3 overview … 1-2 precautions … 4-5 preparing to configure … 4-8 preventing switch lockout … 4-15 privilege level code … 4-7 se

Page 240

Technical information in this document is subject to change without notice. ©Copyright 2000, 2004. Hewlett-Packard Development Company, L.P. Reproduct

Page 241

Configuring Username and Password Security Front-Panel Security Web: Setting Passwords and Usernames In the web browser interface you can enter passwo

Page 242 - After the 802.1x session

Configuring Username and Password Security Front-Panel Security When Security Is Important Some customers require a high level of security for informa

Page 243 - < port-number >:

Configuring Username and Password Security Front-Panel Security Front-Panel Button Functions The front panel of the switch includes the Reset button a

Page 244

Configuring Username and Password Security Front-Panel Security Reset Button Pressing the Reset button alone for one second causes the switch to reboo

Page 245

Configuring Username and Password Security Front-Panel Security 3. Release the Reset button and wait for about one second for the Self-Test LED to st

Page 246

Configuring Username and Password Security Front-Panel Security Configuring Front-Panel Security Using the front-panel-security command from the globa

Page 247 - Port Security

Configuring Username and Password Security Front-Panel Security Password Recovery: Shows whether the switch is configured with the ability to recover

Page 248

Configuring Username and Password Security Front-Panel Security Indicates the command has disabled the Clear button on the switch’s front panel. In th

Page 249 - Trunk Group Exclusion

© Copyright 2000-2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change with-out notice. All Rights Rese

Page 250 - Planning Port Security

Configuring Username and Password Security Front-Panel Security Re-Enabling the Clear Button on the Switch’s Front Panel and Setting or Changing the “

Page 251

Configuring Username and Password Security Front-Panel Security Shows password-clear disabled. Enables password-clear, with reset-on-clear disabled by

Page 252

Configuring Username and Password Security Front-Panel Security The command to disable the factory-reset operation produces this caution. To complete

Page 253

Configuring Username and Password Security Front-Panel Security Syntax: [no] front-panel-security password-recovery Enables or (using the “no” form o

Page 254 - Configuring Port Security

Configuring Username and Password Security Front-Panel Security Figure 2-12. Example of the Steps for Disabling Password-Recovery Password Recovery Pr

Page 255

3 Web and MAC Authentication Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 256

Web and MAC Authentication Overview Overview Feature Default Menu CLI Web Configure Web Authentication n/a — 3-17 — Configure MAC Authenticati

Page 257

Web and MAC Authentication Overview password, and grants or denies network access in the same way that it does for clients capable of interactive logo

Page 258

Web and MAC Authentication Overview General Features Web and MAC Authentication on the Series 5300XL switches include the following: On a port conf

Page 259

Web and MAC Authentication How Web and MAC Authentication Operate How Web and MAC Authentication Operate Authenticator Operation Before gaining access

Page 260

Contents Contents 1 Getting Started Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 261

Web and MAC Authentication How Web and MAC Authentication Operate Figure 3-2. Progress Message During Authentication If the client is authenticated an

Page 262

Web and MAC Authentication How Web and MAC Authentication Operate moves have not been enabled (client-moves) on the ports, the session ends and the cl

Page 263

Web and MAC Authentication How Web and MAC Authentication Operate 4. If neither 1, 2, or 3, above, apply, then the client session does not have acces

Page 264 - MAC Lockdown

Web and MAC Authentication Terminology Terminology Authorized-Client VLAN: Like the Unauthorized-Client VLAN, this is a conventional, static, untagged

Page 265

Web and MAC Authentication Operating Rules and Notes Operating Rules and Notes You can configure one type of authentication on a port. That is, the

Page 266

Web and MAC Authentication Operating Rules and Notes 2. If there is no RADIUS-assigned VLAN, then, for the duration of the client session, the port b

Page 267 - MAC Lockdown Operating Notes

Web and MAC Authentication General Setup Procedure for Web/MAC Authentication Note on Web/ The switch does not allow Web or MAC Authentication and LA

Page 268 - Deploying MAC Lockdown

Web and MAC Authentication General Setup Procedure for Web/MAC Authentication c. If there is neither a RADIUS-assigned VLAN or an “Authorized VLAN” f

Page 269

Web and MAC Authentication Configuring the Switch To Access a RADIUS Server Configure the client device’s (hexadecimal) MAC address as both usernam

Page 270

Web and MAC Authentication Configuring the Switch To Access a RADIUS Server Syntax: [no] radius-server [host < ip-address >] Adds a server to t

Page 271

Contents Configuring Front-Panel Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13 Disabling the Clear Password Function of th

Page 272 - MAC Lockout

Web and MAC Authentication Configuring the Switch To Access a RADIUS Server Figure 3-4. Example of Configuring a Switch To Access a RADIUS Server 3-16

Page 273

Web and MAC Authentication Configuring Web Authentication on the Switch Configuring Web Authentication on the Switch Overview 1. If you have not alre

Page 274

Web and MAC Authentication Configuring Web Authentication on the Switch Configure the Switch for Web-Based Authentication Command Page Configuration

Page 275 - Alert Flags

Web and MAC Authentication Configuring Web Authentication on the Switch Syntax: [no] aaa port-access web-based [e] < port-list> Enables web-bas

Page 276

Web and MAC Authentication Configuring Web Authentication on the Switch Syntax: aaa port-access web-based [e] < port-list > [logoff-period] <

Page 277 - Send-Disable

Web and MAC Authentication Configuring Web Authentication on the Switch Syntax: aaa port-access web-based [e] < port-list > [redirect-url <u

Page 278 - Resetting Alert Flags

Web and MAC Authentication Configuring MAC Authentication on the Switch Configuring MAC Authentication on the Switch Overview 1. If you have not alre

Page 279

Web and MAC Authentication Configuring MAC Authentication on the Switch Configure the Switch for MAC-Based Authentication Command Page Configuration

Page 280

Web and MAC Authentication Configuring MAC Authentication on the Switch Syntax: aaa port-access mac-based [e] < port-list > [addr-limit <1-3

Page 281

Web and MAC Authentication Configuring MAC Authentication on the Switch Syntax: aaa port-access mac-based [e] < port-list > [quiet-period <1

Page 282

Contents 4 TACACS+ Authentication Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 283

Web and MAC Authentication Show Status and Configuration of Web-Based Authentication Show Status and Configuration of Web-Based Authentication Command

Page 284

Web and MAC Authentication Show Status and Configuration of MAC-Based Authentication Syntax: show port-access [port-list] web-based [config [auth-ser

Page 285 - Using Authorized IP Managers

Web and MAC Authentication Show Status and Configuration of MAC-Based Authentication Syntax: show port-access [port-list] mac-based [clients]] Shows

Page 286

Web and MAC Authentication Client Status Client Status The table below shows the possible client status information that may be reported by a Web-base

Page 287 - Access Levels

Web and MAC Authentication Client Status — This page is intentionally unused. — 3-30

Page 288 - Stations

4 TACACS+ Authentication Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 289 - Managers

TACACS+ Authentication Overview Overview Feature Default Menu CLI Web view the switch’s authentication configuration n/a — page 4-9 — view the

Page 290

TACACS+ Authentication Terminology Used in TACACS Applications: TACACS+ server for authentication services. If the switch fails to connect to any TACA

Page 291

TACACS+ Authentication Terminology Used in TACACS Applications:  Authentication: The process for granting user access to a device through entry of a

Page 292

TACACS+ Authentication General System Requirements General System Requirements To use TACACS+ authentication, you need the following:  A TACACS+ ser

Page 293 - Building IP Masks

Contents Configuring the Switch for RADIUS Authentication . . . . . . . . . . . . . 5-6 Outline of the Steps for Configuring RADIUS Authentication

Page 294 - IP Entry

TACACS+ Authentication General Authentication Setup Procedure other access type (console, in this case) open in case the Telnet access fails due to a

Page 295

TACACS+ Authentication General Authentication Setup Procedure Note on -Privilege Levels-Caution-When a TACACS+ server authenticates an access request

Page 296

TACACS+ Authentication Configuring TACACS+ on the Switch configuration in your TACACS+ server application for mis-configura-tions or missing data that

Page 297

TACACS+ Authentication Configuring TACACS+ on the Switch CLI Commands Described in this Section Command Page show authentication show tacacs aaa auth

Page 298

TACACS+ Authentication Configuring TACACS+ on the Switch Viewing the Switch’s Current TACACS+ Server Contact Configuration This command lists the time

Page 299 - Key Management System

TACACS+ Authentication Configuring TACACS+ on the Switch Configuring the Switch’s Authentication Methods The aaa authentication command configures the

Page 300

TACACS+ Authentication Configuring TACACS+ on the Switch Table 4-1. AAA Authentication Parameters Name Default Range Function console n/a n/a S

Page 301

TACACS+ Authentication Configuring TACACS+ on the Switch Table 4-2. Primary/Secondary Authentication Table Access Method and Privilege Level Authenti

Page 302

TACACS+ Authentication Configuring TACACS+ on the Switch For example, here is a set of access options and the corresponding commands to configure them

Page 303

TACACS+ Authentication Configuring TACACS+ on the Switch Configuring the Switch’s TACACS+ Server Access The tacacs-server command configures these par

Page 304

Contents 7 Configuring Secure Socket Layer (SSL) Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 305

TACACS+ Authentication Configuring TACACS+ on the Switch Note on -Encryption Keys-Syntax: tacacs-server host < ip-addr > [key < key-string &

Page 306

TACACS+ Authentication Configuring TACACS+ on the Switch Name Default Range host <ip-addr> [key <key-string> none n/a Specifies the

Page 307 - Numerics

TACACS+ Authentication Configuring TACACS+ on the Switch Name Default Range key <key-string> none (null) n/a Specifies the optional, global

Page 308 - 2 – Index

TACACS+ Authentication Configuring TACACS+ on the Switch The “10” server is now the “first-choice” TACACS+ authentication device. Figure 4-5. Example

Page 309 - Index – 3

TACACS+ Authentication How Authentication Operates To delete a per-server encryption key in the switch, re-enter the tacacs-server host command withou

Page 310 - 4 – Index

TACACS+ Authentication How Authentication Operates Using figure 4-6, above, after either switch detects an operator’s logon request from a remote or d

Page 311 - Index – 5

TACACS+ Authentication How Authentication Operates Local Authentication Process When the switch is configured to use TACACS+, it reverts to local auth

Page 312 - 6 – Index

TACACS+ Authentication How Authentication Operates Using the Encryption Key General Operation When used, the encryption key (sometimes termed “key”, “

Page 313

TACACS+ Authentication Controlling Web Browser Interface Access When Using TACACS+ Authentication For example, you would use the next command to confi

Page 314 - 5990-6052

TACACS+ Authentication Messages Related to TACACS+ Operation Messages Related to TACACS+ Operation The switch generates the CLI messages listed below.

Comments to this Manuals

No comments