Blade ICE G8000 manual 802.1X authentication process, Port Unauthorized

Page 41

RackSwitch G8000 Application Guide

802.1X authentication process

The clients and authenticators communicate using Extensible Authentication Protocol (EAP), which was originally designed to run over PPP, and for which the IEEE 802.1X Standard has defined an encapsulation method over Ethernet frames, called EAP over LAN (EAPOL).

Figure 2-1shows a typical message exchange initiated by the client.

802.1X Client

 

RADIUS

 

 

Server

 

 

 

EAPOL

G8000

RADIUS-EAP

 

 

 

 

 

 

 

 

 

(Authenticator)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Ethernet

(RADIUS Client)

UDP/IP

 

 

 

 

 

 

 

 

 

 

 

 

 

Port Unauthorized

EAPOL-Start

EAP-Request (Identity)

EAP-Response (Identity)

EAP-Request (Credentials)

EAP-Response (Credentials)

EAP-Success

Radius-Access-Request

Radius-Access-Challenge

Radius-Access-Request

Radius-Access-Accept

Port Authorized

Figure 2-1Authenticating a Port Using EAPoL

BMD00041, November 2008

Chapter 2: Port-based Network Access Control „ 41

Image 41
Contents Application Guide RackSwitch G8000 Application Guide Contents Ports and Trunking Quality of Service Appendix a Troubleshooting Figures RackSwitch G8000 Application Guide Tables RackSwitch G8000 Application Guide Who Should Use This Guide PrefaceWhat You’ll Find in This Guide Typographic Conventions Typographic ConventionsHow to Get Help Accessing the Switch Configure the default gateway. Enable the gateway Configuring an IP InterfaceLog on to the switch Enter IP interface mode Using Telnet Configuring BBI access via Https Using the Browser-Based InterfaceConfiguring BBI access via Http RS G8000 config# access https import-certificate Default configuration Using SnmpSnmp v1 SnmpPrivacy-password User configuration22 „ Accessing the Switch SNMPv2 trap host configuration Configuring Snmp Trap HostsConfigure an entry in the notify table SNMPv1 trap hostSNMPv3 trap host configuration Securing Access to the Switch How Radius authentication works Radius Authentication and AuthorizationConfigure the Radius secret and enable the feature Configuring RadiusRadius authentication features in Blade OS Radius Attributes for G8000 user privileges Switch User AccountsHow TACACS+ authentication works TACACS+ AuthenticationAuthorization TACACS+ authentication features in Blade OSAccounting Command authorization and loggingConfigure the TACACS+ secret and second secret Configuring TACACS+ AuthenticationSSH encryption of management messages Configuring SSH features on the switchSecure Shell SSH Integration with RADIUS/TACACS+ Authentication Generating RSA Host and Server Keys for SSH accessUser Access Control End User Access ControlConsiderations for configuring End User Accounts Logging into an End User account Listing current UsersRackSwitch G8000 Application Guide 38 „ Accessing the Switch Port-based Network Access Control Extensible Authentication Protocol over LAN Port Unauthorized 802.1X authentication processEAPoL message exchange „ Unauthorized 802.1X port states„ Authorized „ Force UnauthorizedSupport for Radius Attributes Supported Radius attributesConfiguration guidelines BMD00041, November VLANs Overview Viewing VLANs VLANs and Port Vlan ID NumbersVlan numbers Pvid numbers Viewing and Configuring PVIDsVlan Tagging 1Default Vlan settings 2Port-based Vlan assignment 4802.1Q tag assignment Vlan Topologies and Design Considerations Vlan configuration rulesComponent Description Multiple VLANs with Tagging AdaptersVlan Configure the VLANs and their member ports Vlan configuration exampleEnable tagging on uplink ports that support multiple VLANs Private Vlan ports Private VLANsSelect a Vlan and define the Private Vlan type as primary Configuration exampleVerify the configuration Configure a secondary Vlan and map it to the primary VlanRackSwitch G8000 Application Guide 62 „ VLANs Ports and Trunking Statistical load distribution Built-In fault toleranceStatic trunk group configuration rules Before you configure static trunks66 „ Ports and Trunking Follow these steps on the G8000 Port Trunking ExampleExamine the trunking information on each switch Repeat the process on the other switch„ Source IP SIP + Destination IP DIP Configurable Trunk Hash AlgorithmLink Aggregation Control Protocol Admin keyRS G8000 # show lacp information Set the Lacp mode Lacp configuration guidelinesConfiguring Lacp Spanning Tree 1Ports, Trunk Groups, and VLANs Determining the Path for Forwarding BPDUs Bridge Protocol Data Units BPDUsChanging the Spanning Tree mode Spanning Tree Group configuration guidelinesAssigning a Vlan to a Spanning Tree Group Adding and removing ports from STGs Creating a VlanRules for Vlan Tagged ports RackSwitch G8000 Application Guide Port state changes Rapid Spanning Tree ProtocolPort Type and Link Type Rstp configuration guidelinesEdge Port Link TypeConfigure Rapid Spanning Tree Rstp configuration examplePer Vlan Rapid Spanning Tree Default Spanning Tree configuration1Two VLANs on one Spanning Tree Group Why do we need multiple Spanning Trees?Set the Spanning-tree mode to PVRST+ Pvrst configuration guidelinesConfiguring Pvrst Common Internal Spanning Tree Multiple Spanning Tree ProtocolMstp Region Mstp configuration guidelines Passing Vlan Blocking Vlan Configure Multiple Spanning Tree Protocol Configuring Multiple Spanning Tree Groups90 „ Spanning Tree Fast Uplink Convergence Configuring Fast Uplink ConvergenceRackSwitch G8000 Application Guide 92 „ Spanning Tree Quality of Service COS MAC Extended ACLs Using ACL FiltersIP Extended ACLs IP Standard ACLs1Well-known protocol types Assigning ACLs to a port Understanding ACL priorityViewing ACL statistics Use the following command to view ACL statisticsConfigure an Access Control List ACL configuration examplesExample Assign the ACL to port100.10.1.0 Add the ACL to a port Add the ACL to portConfigure a MAC ACL to deny all other traffic Configure IP ACLs to deny all other trafficAssign the ACLs to a port Broadcast storms Using Storm Control FiltersConfiguring storm control Differentiated Services Concepts Using Dscp Values to Provide QoSRackSwitch G8000 Application Guide Drop Class Precedence Per Hop BehaviorQoS Levels Default QoS Service LevelsDSCP-to-802.1p mapping Use the following command to perform DSCP-to-802.1p mapping3Layer 2 802.1q/802.1p Vlan tagged packet Using 802.1p Priority to Provide QoSQueuing and Scheduling 802.1p configuration exampleConfigure a port’s default 802.1p priority value to Overview Remote MonitoringEnable Rmon on a port Configuring Rmon statisticsConfigure the Rmon statistics on a port Rmon group 1-StatisticsHistory MIB Object ID Rmon group 2-HistoryConfiguring Rmon History Rmon group 3-AlarmsConfigure the Rmon History parameters for a port View Rmon History for the portConfiguring Rmon Alarms Alarm MIB objectsConfigure the Rmon Alarm parameters to track Icmp messages Configure Rmon eventsConfigure the Rmon event parameters Rmon group 9-EventsBasic IP Routing IP Routing Benefits 1The Router Legacy Network Routing Between IP Subnets122 „ Basic IP Routing Example of Subnet Routing 2Switch-Based Routing Topology1Subnet Routing Example IP Address Assignments Using VLANs to segregate Broadcast Domains3Subnet Routing Example Optional Vlan Ports Add the switch ports to their respective VLANsAssign a Vlan to each IP interface Configure the default gateway to the routers’ addressesEnable IP routing Dynamic Host Configuration Protocol RackSwitch G8000 Application Guide 128 „ Basic IP Routing Igmp Igmp Snooping IGMPv3 Snooping FastLeaveConfigure Igmp Snooping Igmp Snooping configuration exampleEnable IGMPv3 Snooping optional Add VLANs to Igmp SnoopingRS G8000# show ip igmp groups View dynamic Igmp informationStatic Multicast Router Configure a Static Multicast RouterHigh Availability 1Uplink Failure Detection example Uplink Failure DetectionFailure Detection Pair Spanning Tree Protocol with UFD Configuration guidelinesTurn on Uplink Failure Detection UFD Configuring UFDMonitoring UFD Troubleshooting Figure A-1Monitoring Ports Monitoring PortsEnable port mirroring Configuring Port MirroringView the current configuration Port Mirroring behaviorBMD00041, November Numerics IndexIgmp TACACS+
Related manuals
Manual 28 pages 31.53 Kb