Juniper Networks EX2500 manual End User Access Control

Page 32

EX2500 Ethernet Switch Configuration Guide

When the SSH server is first enabled and applied, the switch automatically generates the RSA host and server keys, which are stored in the Flash memory. To configure RSA host and server keys, enter the following commands to generate them manually:

ex2500(config)# ssh generate-host-key ex2500(config)# ssh generate-server-key

When the switch reboots, it will retrieve the host and server keys from the Flash memory. If these two keys are not available in the flash and if the SSH server feature is enabled, the switch automatically generates them during the system reboot. This process might take several minutes to complete.

The switch can automatically regenerate the RSA server key. To set the interval of

RSA server key autogeneration, use the following command:

ex2500(config)# ssh interval <number of hours (0-24)>

A value of 0 (zero) denotes that RSA server key autogeneration is disabled. When the interval value is greater than 0, the switch will autogenerate the RSA server key every specified interval. However, RSA server key generation is skipped if the switch is busy doing other key or cipher generation when the timer expires.

NOTE: The switch can perform only one session of key or cipher generation at a time. Thus, an SSH client will not be able to log in if the switch is performing key generation at that time, or if another client has logged in immediately prior. Also, key generation will fail if an SSH client is logging in at that time.

SSH Integration with RADIUS and TACACS+ Authentication

SSH is integrated with RADIUS authentication. After the RADIUS server is enabled on the switch, all subsequent SSH authentication requests will be redirected to the specified RADIUS servers for authentication. The redirection is transparent to the SSH clients.

SSH is integrated with TACACS+ authentication. After the TACACS+ server is enabled on the switch, all subsequent SSH authentication requests will be redirected to the specified TACACS+ servers for authentication. The redirection is transparent to the SSH clients.

End User Access Control

The EX2500 switch allows an administrator to define end user accounts that permit end users to perform operation tasks via the switch CLI commands. Once end user accounts are configured and enabled, the switch requires username-password authentication.

For example, an administrator can assign a user, who can then log in to the switch and perform operational commands (effective only until the next switch reboot).

18„ Securing Access to the Switch

Image 32
Contents Configuration Guide North Mathilda Avenue Sunnyvale, CAIi „ Table of Contents Chapter VLANs Chapter Ports and Trunking Rmon Overview Rmon Group 1-Statistics Rmon Group 2-HistoryIndexes Port Mirroring Overview Configuring Port MirroringAppendixes Default Vlan Settings Port-Based Vlan AssignmentPage List of Tables EX2500 Ethernet Switch Configuration Guide „ List of Tables About This Guide ObjectivesAudience Supported PlatformsDocumentation Conventions Icon Meaning DescriptionRequesting Technical Support List of Technical PublicationsDocumentation Feedback Self-Help Online Tools and Resources Opening a Case with JtacEX2500 Ethernet Switch Applications Page Accessing the Switch Configuring the Management InterfaceDynamic Host Configuration Protocol Configure the default gateway. Enable the gatewayUsing Telnet Using the EX2500 Web Device ManagerConfiguring EX2500 Web Device Manager Access via Http Configuring EX2500 Web Device Manager Access via HttpsUsing Snmp SNMPv1, SNMPv2SNMPv3 Default ConfigurationUser Configuration Configuring Snmp Trap Hosts SNMPv1 Trap Host ConfigurationSNMPv2 Trap Host Configuration Configure an entry in the notify tableSecuring Access to the Switch SNMPv3 Trap Host ConfigurationRadius Authentication and Authorization How Radius Authentication WorksConfiguring Radius on the Switch Configure the Radius secretRadius Authentication Features in the EX2500 Switch Switch User Accounts Radius Attributes for EX2500 User PrivilegesTACACS+ Authentication Features in the EX2500 Switch TACACS+ AuthenticationHow TACACS+ Authentication Works „ starttime „ stoptime „ elapsedtime „ disccause Configure the TACACS+ secret and second secret Command Authorization and LoggingConfiguring TACACS+ Authentication on the Switch Configuring SSH Features on the Switch Generating RSA Host and Server Keys for SSH AccessSecure Shell SSH Encryption of Management MessagesEnd User Access Control SSH Integration with Radius and TACACS+ AuthenticationConsiderations for Configuring End User Accounts User Access ControlListing Current Users Logging In to an End User AccountVLANs Vlan Overview„ Port configuration VLANs and Port Vlan ID NumbersVlan Numbers Pvid NumbersIllustrates the default Vlan settings on the switch Vlan TaggingDefault Vlan Settings Port-Based Vlan Assignment Vlan Configuration Rules Vlan Topologies and Design ConsiderationsMultiple VLANs Configuration Example Multiple VLANs example in is described in TableEnable tagging on uplink ports that support multiple VLANs Private VLANs Private Vlan PortsPrivate Vlan Configuration Guidelines Private Vlan Configuration ExampleConfigure a secondary Vlan and map it to the primary Vlan Verify the configurationSpanning Tree Protocol Spanning Tree OverviewBridge Priority Bridge Protocol Data Units BPDUsDetermining the Path for Forwarding BPDUs Spanning Tree Group Configuration Guidelines Changing the Spanning Tree ModePort Priority Port Path CostAdding and Removing Ports from STGs Creating a VlanRules for Vlan Tagged Ports Rapid Spanning Tree Protocol Port State ChangesRstp Configuration Guidelines Rstp Configuration ExamplePort Type and Link Type Edge PortPer Vlan Rapid Spanning Tree Default Spanning Tree ConfigurationWhy Do We Need Multiple Spanning Trees? Pvrst Configuration Guidelines Configuring PvrstMstp Configuration Guidelines Multiple Spanning Tree ProtocolMstp Region Common Internal Spanning TreeMultiple Spanning Tree Groups Configuration Example Implementing Multiple Spanning Tree GroupsFast Uplink Convergence VlanConfiguration Guidelines Configuring Fast Uplink ConvergenceStatistical Load Distribution Ports and TrunkingTrunking Overview Trunk Group Configuration Rules Built-In Fault ToleranceBefore Configuring Static Trunks Port Trunking Configuration Example Port Trunk Group Configuration ExampleFollow these steps on the EX2500 switch Define a trunk group Configurable Trunk Hash Algorithm Link Aggregation Control Protocol„ Destination MAC Dmac „ Destination IP DIP48 „ Link Aggregation Control Protocol Lacp Configuration Guidelines Configuring LacpOptionally Reducing Lacp Timeout Set the Lacp modeEx2500config-if# lacp timeout short ex2500config-if# exit Quality of Service QoS OverviewUsing ACL Filters COSMAC Extended ACLs IP Standard ACLsTo delete a MAC Extended ACL To delete an IP Standard ACLIP Extended ACLs To delete an IP Extended ACLUnderstanding ACL Priority TCP/UDPACL Configuration Examples Assigning ACLs to a PortViewing ACL Statistics ACL Example 1-Blocking Traffic to a HostACL Example 3-Blocking Http Traffic Add the ACL to a portACL Example 4-Blocking All Except Certain Packets Assign the ACLs to a portBroadcast Storms Using Storm Control FiltersConfiguring Storm Control Using Dscp Values to Provide QoS Differentiated Services ConceptsPer Hop Behavior Assured Forwarding Drop Precedence ClassDscp Mapping Use the following command to perform Dscp mappingQoS Levels Using 802.1p Priority to Provide QoS Shows the priority bits in a VLAN-tagged packetQueuing and Scheduling Remote Monitoring Rmon OverviewConfigure the Rmon statistics on a port Rmon Group 1-StatisticsConfiguring Rmon History Configure the Rmon History parameters for a portThis configuration enables Rmon History collection on port Rmon Group 2-HistoryRmon Group 3-Alarms Alarm MIB ObjectsConfiguring Rmon Alarms Configure the Rmon Alarm parameters to track Icmp messagesEx2500config# rmon event 110 type log-only Rmon Group 9-EventsPage Igmp Igmp SnoopingFastLeave Igmp Snooping Configuration Example IGMPv3 SnoopingStatic Multicast Router Ex2500# show ip igmp groupsHigh Availability Through Uplink Failure Detection High Availability OverviewSpanning Tree Protocol with UFD UFD Configuration Guidelines Failure Detection PairUFD Configuration Example Monitoring UFDPage Appendixes EX2500 Ethernet Switch Configuration Guide 80 „ Appendixes „ Port Mirroring Overview on „ Configuring Port Mirroring on Port Mirroring OverviewConfiguring Port Mirroring Indexes „ Index onEX2500 Ethernet Switch Configuration Guide 84 „ Indexes Index NumericsManagement interface, configuring Multi-links between switches, port trunkingPhysical. See switch ports Internet Group Management Protocol. See IgmpQuality of Service. See QoS QoSSecurity Segmentation. See IP subnets Segments. See IP subnetsVirtual Local Area Networks. See VLANs Example showing multiple VLANs