Blade ICE G8000 manual End User Access Control, Considerations for configuring End User Accounts

Page 36

RackSwitch G8000 Application Guide

End User Access Control

Blade OS allows an administrator to define end user accounts that permit end users to perform operation tasks via the switch CLI commands. Once end user accounts are configured and enabled, the switch requires username/password authentication.

For example, an administrator can assign a user, who can then log into the switch and perform operational commands (effective only until the next switch reboot).

Considerations for configuring End User Accounts

„A maximum of 10 user IDs are supported on the switch.

„Blade OS supports end user support for console, Telnet, BBI, and SSHv1/v2 access to the switch. As a result, only very limited access will be granted to the Primary Administrator under the BBI/SSH1 mode of access.

„If RADIUS authentication is used, the user password on the Radius server will override the user password on the G8000. Also note that the password change command on the switch only modifies the use switch password and has no effect on the user password on the Radius server. Radius authentication and user password cannot be used concurrently to access the switch.

„Passwords for end users can be up to 128 characters in length.

User Access Control

The end user access control commands allow you to configure end user accounts.

Setting up User IDs

Up to 10 user IDs can be configured. Use the following commands to define user names and passwords:

RS G8000 (config)# access user 1 name <1-8 characters>

RS G8000 (config)# access user 1 password

Changing user1 password; validation required:

Enter current admin password: <current administrator password>

Enter new user1 password: <new user password>

Re-enter new user1 password: <new user password>

New user1 password accepted.

36 „ Chapter 1: Accessing the Switch

BMD00041, November 2008

Image 36
Contents Application Guide RackSwitch G8000 Application Guide Contents Ports and Trunking Quality of Service Appendix a Troubleshooting Figures RackSwitch G8000 Application Guide Tables RackSwitch G8000 Application Guide Preface Who Should Use This GuideWhat You’ll Find in This Guide Typographic Conventions Typographic ConventionsHow to Get Help Accessing the Switch Configuring an IP Interface Log on to the switch Enter IP interface modeConfigure the default gateway. Enable the gateway Using Telnet Using the Browser-Based Interface Configuring BBI access via HttpConfiguring BBI access via Https RS G8000 config# access https import-certificate Using Snmp Default configurationSnmp v1 SnmpUser configuration Privacy-password22 „ Accessing the Switch Configuring Snmp Trap Hosts SNMPv2 trap host configurationConfigure an entry in the notify table SNMPv1 trap hostSNMPv3 trap host configuration Securing Access to the Switch Radius Authentication and Authorization How Radius authentication worksConfiguring Radius Configure the Radius secret and enable the featureRadius authentication features in Blade OS Switch User Accounts Radius Attributes for G8000 user privilegesTACACS+ Authentication How TACACS+ authentication worksTACACS+ authentication features in Blade OS AuthorizationCommand authorization and logging AccountingConfiguring TACACS+ Authentication Configure the TACACS+ secret and second secretConfiguring SSH features on the switch Secure ShellSSH encryption of management messages Generating RSA Host and Server Keys for SSH access SSH Integration with RADIUS/TACACS+ AuthenticationEnd User Access Control Considerations for configuring End User AccountsUser Access Control Listing current Users Logging into an End User accountRackSwitch G8000 Application Guide 38 „ Accessing the Switch Port-based Network Access Control Extensible Authentication Protocol over LAN 802.1X authentication process Port UnauthorizedEAPoL message exchange 802.1X port states „ Unauthorized„ Authorized „ Force UnauthorizedSupported Radius attributes Support for Radius AttributesConfiguration guidelines BMD00041, November VLANs Overview VLANs and Port Vlan ID Numbers Vlan numbersViewing VLANs Viewing and Configuring PVIDs Pvid numbersVlan Tagging 1Default Vlan settings 2Port-based Vlan assignment 4802.1Q tag assignment Vlan configuration rules Vlan Topologies and Design ConsiderationsMultiple VLANs with Tagging Adapters Component DescriptionVlan Vlan configuration example Enable tagging on uplink ports that support multiple VLANsConfigure the VLANs and their member ports Private VLANs Private Vlan portsConfiguration example Select a Vlan and define the Private Vlan type as primaryConfigure a secondary Vlan and map it to the primary Vlan Verify the configurationRackSwitch G8000 Application Guide 62 „ VLANs Ports and Trunking Built-In fault tolerance Statistical load distributionBefore you configure static trunks Static trunk group configuration rules66 „ Ports and Trunking Port Trunking Example Follow these steps on the G8000Repeat the process on the other switch Examine the trunking information on each switchConfigurable Trunk Hash Algorithm „ Source IP SIP + Destination IP DIPAdmin key Link Aggregation Control ProtocolRS G8000 # show lacp information Lacp configuration guidelines Configuring LacpSet the Lacp mode Spanning Tree 1Ports, Trunk Groups, and VLANs Bridge Protocol Data Units BPDUs Determining the Path for Forwarding BPDUsSpanning Tree Group configuration guidelines Changing the Spanning Tree modeAssigning a Vlan to a Spanning Tree Group Creating a Vlan Rules for Vlan Tagged portsAdding and removing ports from STGs RackSwitch G8000 Application Guide Rapid Spanning Tree Protocol Port state changesRstp configuration guidelines Port Type and Link TypeEdge Port Link TypeRstp configuration example Configure Rapid Spanning TreeDefault Spanning Tree configuration Per Vlan Rapid Spanning TreeWhy do we need multiple Spanning Trees? 1Two VLANs on one Spanning Tree GroupPvrst configuration guidelines Configuring PvrstSet the Spanning-tree mode to PVRST+ Multiple Spanning Tree Protocol Mstp RegionCommon Internal Spanning Tree Mstp configuration guidelines Passing Vlan Blocking Vlan Configuring Multiple Spanning Tree Groups Configure Multiple Spanning Tree Protocol90 „ Spanning Tree Configuring Fast Uplink Convergence Fast Uplink ConvergenceRackSwitch G8000 Application Guide 92 „ Spanning Tree Quality of Service COS Using ACL Filters MAC Extended ACLsIP Standard ACLs IP Extended ACLs1Well-known protocol types Understanding ACL priority Assigning ACLs to a portUse the following command to view ACL statistics Viewing ACL statisticsACL configuration examples Configure an Access Control ListExample Assign the ACL to port100.10.1.0 Add the ACL to port Add the ACL to a portConfigure IP ACLs to deny all other traffic Configure a MAC ACL to deny all other trafficAssign the ACLs to a port Using Storm Control Filters Configuring storm controlBroadcast storms Using Dscp Values to Provide QoS Differentiated Services ConceptsRackSwitch G8000 Application Guide Per Hop Behavior Drop Class PrecedenceDefault QoS Service Levels QoS LevelsUse the following command to perform DSCP-to-802.1p mapping DSCP-to-802.1p mappingUsing 802.1p Priority to Provide QoS 3Layer 2 802.1q/802.1p Vlan tagged packet802.1p configuration example Configure a port’s default 802.1p priority value toQueuing and Scheduling Remote Monitoring OverviewConfiguring Rmon statistics Enable Rmon on a portConfigure the Rmon statistics on a port Rmon group 1-StatisticsRmon group 2-History History MIB Object IDRmon group 3-Alarms Configuring Rmon HistoryConfigure the Rmon History parameters for a port View Rmon History for the portAlarm MIB objects Configuring Rmon AlarmsConfigure Rmon events Configure the Rmon Alarm parameters to track Icmp messagesConfigure the Rmon event parameters Rmon group 9-EventsBasic IP Routing IP Routing Benefits Routing Between IP Subnets 1The Router Legacy Network122 „ Basic IP Routing 2Switch-Based Routing Topology Example of Subnet RoutingUsing VLANs to segregate Broadcast Domains 1Subnet Routing Example IP Address AssignmentsAdd the switch ports to their respective VLANs 3Subnet Routing Example Optional Vlan PortsConfigure the default gateway to the routers’ addresses Enable IP routingAssign a Vlan to each IP interface Dynamic Host Configuration Protocol RackSwitch G8000 Application Guide 128 „ Basic IP Routing Igmp Igmp Snooping FastLeave IGMPv3 SnoopingIgmp Snooping configuration example Configure Igmp SnoopingEnable IGMPv3 Snooping optional Add VLANs to Igmp SnoopingView dynamic Igmp information RS G8000# show ip igmp groupsConfigure a Static Multicast Router Static Multicast RouterHigh Availability Uplink Failure Detection 1Uplink Failure Detection exampleSpanning Tree Protocol with UFD Configuration guidelines Failure Detection PairConfiguring UFD Monitoring UFDTurn on Uplink Failure Detection UFD Troubleshooting Monitoring Ports Figure A-1Monitoring PortsConfiguring Port Mirroring Enable port mirroringView the current configuration Port Mirroring behaviorBMD00041, November Index NumericsIgmp TACACS+
Related manuals
Manual 28 pages 31.53 Kb