HP 2600-PWR, 4100gl, 2650 (J4899A/B), 6108 manual Differences Between MAC Lockdown and Port Security

Page 249

Configuring and Monitoring Port Security

MAC Lockdown

You cannot perform MAC Lockdown and 802.1x authentication on the same port or on the same MAC address. MAC Lockdown and 802.1x authentication are mutually exclusive.

Lockdown is permitted on static trunks (manually configured link aggrega- tions).

Differences Between MAC Lockdown and Port Security

Because port-security relies upon MAC addresses, it is often confused with the MAC Lockdown feature. However, MAC Lockdown is a completely differ- ent feature and is implemented on a different architecture level.

Port security maintains a list of allowed MAC addresses on a per-port basis. An address can exist on multiple ports of a switch. Port security deals with MAC addresses only while MAC Lockdown specifies both a MAC address and a VLAN for lockdown.

MAC Lockdown, on the other hand, is not a “list.” It is a global parameter on the switch that takes precedence over any other security mechanism. The MAC Address will only be allowed to communicate using one specific port on the switch.

MAC Lockdown is a good replacement for port security to create tighter control over MAC addresses and which ports they are allowed to use (only one port per MAC Address on the same switch in the case of MAC Lockdown). (You can still use the port for other MAC addresses, but you cannot use the locked down MAC address on other ports.)

Using only port security the MAC Address could still be used on another port on the same switch. MAC Lockdown, on the other hand, is a clear one-to-one relationship between the MAC Address and the port. Once a MAC address has been locked down to a port it cannot be used on another port on the same switch.

The switch does not allow MAC Lockdown and port security on the same port.

9-19

Image 249
Contents Access Security Guide Page December Access Security GuidePublication Number Contents Contents Overview Client Options General Features Configuring the Switch To Access a Radius ServerTerminology Operating Rules and Notes Configuring the Switch’s TACACS+ Server Access Viewing the Switch’s Current Authentication ConfigurationGeneral Authentication Process Using a TACACS+ Server Messages Related to TACACS+ Operation Operating NotesLocal Authentication Process Configuring Secure Shell SSHGenerate the Switch’s Server Host Certificate Common Errors in SSL SetupVii Viii Configuring and Monitoring Port SecurityContents Access LevelsOperating Notes for Port Security Web Configuring IP Authorized Managers Switch manual set includes the following About Your Switch Manual SetFeature Feature IndexConfiguration Management Guide XiiXiii Product Documentation FeatureTftp XivGetting Started ContentsAccess security features covered in this guide include Overview of Access Security FeaturesIntroduction Getting StartedFabric than if you use only local passwords Management Access Security ProtectionManagement Access Security Protection General Switch Traffic Security GuidelinesFeature Descriptions by Model Command Syntax StatementsConventions Command Prompts Screen SimulationsPort Identity Examples Getting Help in the Menu Interface Sources for More InformationNeed Only a Quick Start? Run SetupIP Addressing Main Menu of the Menu interface, selectInterpreting LED behavior To Set Up and Install the Switch in Your NetworkThis page is intentionally unused Configuring Username and Password Security Web browser interface OverviewT e U t i o n Menu Setting Passwords Configuring Local Password SecurityTo set a new password Console PasswordsCLI Setting Passwords and Usernames Continue Deletion of password protection? NoCommands Used in This Section Web Setting Passwords and Usernames Click on Device PasswordsClick on the Security tab Front-Panel Security When Security Is ImportantResetClear Front-Panel Button FunctionsClear Button Reset Button Restoring the Factory Default ConfigurationPress and hold the Reset button ResetClear Self Test Configuring Front-Panel SecuritySyntax show front-panel-security Default Front-Panel Security Settings Either form of the command enables password-clear Example of Re-Enabling the Clear Button’s Default Operation Changing the Operation of the Reset+Clear CombinationDisabling or Re-Enabling the Password Recovery Process Password RecoveryDefault configuration settings Management access to the switchNo front-panel-security password-recovery Steps for Disabling Password-Recovery11. Example of the Steps for Disabling Password-Recovery Password Recovery ProcessThis page is intentionally unused Overview Client Options General Features Overview Lock a particular device to a specific switch and port Client OptionsRadius server uses the device MAC address as the username General Features How Web and MAC Authentication Operate Authenticator OperationWeb-based Authentication Progress Message During Authentication MAC-based Authentication How Web and MAC Authentication Operate Terminology Management Operating Rules and NotesOperating Rules and Notes Do These Steps Before You Configure Web/MAC Authentication General Setup Procedure for Web/MAC AuthenticationGeneral Setup Procedure for Web/MAC Authentication Aabbcc-ddeeff Aa-bb-cc-dd-ee-ff Aabbccddeeff AddressesRadius Server Configuration Commands Configuring the Switch To Access a Radius ServerExample of Configuring a Switch To Access a Radius Server Overview Configuring Web AuthenticationCommand Configuration Level Configure the Switch for Web-Based AuthenticationSyntax no aaa port-access web-based e port-list Syntax aaa port-access web-based e port-list max-requests Default 30 seconds Configuring MAC Authentication on Switch Configure the Switch for MAC-Based Authentication Syntax Default 30seconds Command Show Status and Configuration Web-Based AuthenticationShow Status and Configuration of MAC-Based Authentication Syntax show port-access port-list mac-based clients Timed out-unauth vlan Show Client StatusThis page is intentionally unused TACACS+ Authentication Example of TACACS+ Operation TACACS+ AuthenticationTerminology Used in Tacacs Applications TACACS+ Authentication General System Requirements General Authentication Setup ProcedureDetermine the following Using the Encryption Key onTACACS+ Authentication Configuring TACACS+ on the Switch Switch offers three command areas for TACACS+ operationBefore You Begin CLI Commands Described in this Section Viewing the Switch’s Current Authentication ConfigurationThis example shows the default authentication configuration Example of the Switch’s TACACS+ Configuration Listing Configuring the Switch’s Authentication Methods Name Default Range Function AAA Authentication ParametersAuthentication for the access being configured is local Method/privilege path. Available only if the primary methodLogin Primary to Local authentication Primary/Secondary Authentication TableProCurve config# aaa authentication num-attempts Switch or your TACACS+ server Configuring the Switch’s TACACS+ Server AccessSyntax tacacs-server host ip-addr key key-string Name Default Range Tacacs-server host ip-addr None Details on Configuring Tacacs Servers and KeysTimeout 1 Name Default Range Key key-string None nullTo configure north01 as a per-server encryption key ProCurveconfig# no tacacs-server hostHow Authentication Operates General Authentication Process Using a TACACS+ ServerChanges without executing write mem TACACS+ Authentication Local Authentication Process AuthenticationTerminal must initiate a new session before trying again Using the Encryption Key Encryption Options in the SwitchGeneral Operation ProCurveconfig# tacacs-server key north40campus Messages Related to TACACS+ Operation Tacacs-server configurationOperating Notes CLI Message MeaningTACACS+ Authentication Radius Authentication and Accounting Radius Authentication and Accounting Web Series 2600, 2600-PWR, and 2800 switches Port-AccessHost See Radius Server Switch Operating Rules for Radius Preparation for Configuring Radius on the Switch General Radius Setup ProcedureRadius Authentication Commands Configuring the Switch for Radius AuthenticationRadius server documentation Outline of the Steps for Configuring Radius AuthenticationRadius Authentication and Accounting Example Configuration for Radius Authentication Configuring Radius Accounting instead of continuing here Configure the Switch To Access a Radius ServerRadius Authentication and Accounting Configure the Switch’s Global Radius Parameters T e Radius Authentication and Accounting Listings of Global Radius Parameters Configured In Figure Local Authentication Process Radius Accounting Commands Configuring Radius AccountingConfigured one or more Radius servers to support the switch Access methodsUnder Port-Based Access Control This section assumes you have alreadyOperating Rules for Radius Accounting Steps for Configuring Radius AccountingConfigure the Switch To Access a Radius Server Key key-string Radius Authentication and Accounting Start-Stop Syntax no aaa accounting update periodic 1 General Radius Statistics Viewing Radius StatisticsTerm Definition Values for Show Radius Host Output FigureSyntax show authentication Radius Authentication StatisticsRadius Accounting Statistics 14. Listing the Accounting Configuration in the Switch17. Search Order for Accessing a Radius Server Changing RADIUS-Server Access Order18. Example of New Radius Server Search Order Message Meaning Messages Related to Radius OperationThis page is intentionally unused Configuring Secure Shell SSH Configuring Secure Shell SSH Client Public Key Authentication ModelUsing these algorithms unless otherwise noted Use a key to authenticate itself to the switchTerminology Public Key Formats Prerequisite for Using SSHAuthentication SSH OptionsPrimary SSH Configuring Secure Shell SSH General Operating Rules and Notes Configuring the Switch for SSH Operation Assign Local Login Operator and Enable Manager PasswordSSH-Related Commands in This Section Example of Configuring Local Passwords Generate the Switch’s Public and Private Key PairTo the switch using the earlier pair CLI kill commandPair automatically disables SSH Provide the Switch’s Public Key to Clients For example, to generate and display a new keyOperation Example of a Public Key Generated by the Switch Inserted Bit Exponent e Modulus n Switch’s Public and Private Key Pair on To enable SSH on the switch 49, 80, 1506, Always 896 bitsU t i o n T e Configure the Switch for SSH AuthenticationOption B Configuring the Switch for Client Public-Key SSH Copies a public key file into the switch Use an SSH Client To Access the Switch Further Information on SSH Client Public-Key AuthenticationConfiguring Secure Shell SSH 14. Example of a Client Public Key Ascii Property Supported Comments ValueDeletes the client-public-key file from the switch U t i o n 00000K Peer unreachable Messages Related to SSH OperationGenerating new RSA host key. If Steps for Configuring and Using SSL for Switch Configuring Secure Socket Layer SSLConfiguring Secure Socket Layer SSL Server Certificate authentication with User Password3DES 168-bit, 112 Effective RC4 40-bit, 128-bitOtherwise noted Configuring Secure Socket Layer SSL Prerequisite for Using SSL General Operating Rules and Notes SSL-Related CLI Commands in This Section Configuring the Switch for SSL OperationSecurity Tab Password Button Particular switch/client session, and then discarded Generate the Switch’s Server Host CertificateVerified unequivocally Earlier certificateCLI To Generate or Erase the Switch’s Server Certificate withCertificate Field Descriptions Comments on Certificate FieldsFor example, to generate a key and a new host certificate Field Name DescriptionFor example, to display the new server host certificate Can resume SSL operationConfiguring Secure Socket Layer SSL Configuring Secure Socket Layer SSL Web browser Interface showing current SSL Host Certificate Configuring Secure Socket Layer SSL Example of a Certificate Request and Reply T e Using the web browser interface to enable SSL Using the CLI interface to enable SSLZeroize the switch’s host certificate or certificate key. Execute no web-management sslEnable SLL Port number Selection Error During Possible Cause Common Errors in SSL SetupThis page is intentionally unused Operating Rules for Authorized-Client Configuring Port-Based Access ControlConfiguring Port-Based Access Control Why Use Port-Based Access Control? Configuring Port-Based Access Control Example of an 802.1X Application How 802.1X Operates Example of Supplicant Operation Switch-Port Supplicant OperationAuthenticator at the same time 802.1X standard General Operating Rules and Notes Configuring Port-Based Access Control Do These Steps Before You Configure 802.1X Operation General Setup Procedure for Port-Based Access ControlAuthenticators operate as expected Overview Configuring 802.1X Authentication on SwitchConfiguring Port-Based Access Control Configuring Switch Ports as 802.1X Authenticators Enable 802.1X Authentication on Selected Ports802.1X Authentication Commands Quiet-period 0 Max-requests 1 Clears authenticator statistics counters Example of 802.1X Port-Access Authentication Configure the 802.1X Authentication MethodEnter the Radius Host IP Addresses Enable 802.1X Authentication on the Switch802.1X Open Vlan Mode 802.1X-Related Show Commands Radius server configurationIntroduction Membership in the Vlan Use Models for 802.1X Open Vlan Modes802.1X Open Vlan Mode 1X Open Vlan Mode Options802.1X Per-Port Configuration Port Response Condition Rule Multiple Authenticator Ports Using Before you configure the 802.1X Open Vlan mode on a port Setting Up and Configuring 802.1X Open Vlan ModeMised by an unauthorized client Activate authentication on the switch Port-Security To Allow Only 802.1X Devices onVlan Operation ProCurveconfig# aaa authentication port-access eap-radius 802.1X Open Vlan Operating Notes ProCurveconfig# aaa port-access authenticator e A10 Enables 802.1X authentication on the port 802.1X Authentication Commands 802.1X Supplicant Commands Default supplicant parameters or any previously configured Enter secret password Repeat secret password Syntax aaa port-access supplicant ethernet port-listMax-start 1 Show Commands for Port-Access Authenticator Displaying 802.1X Configuration Statistics, and CountersShow port-access authenticator Syntax Config e port-list Viewing 802.1X Open Vlan Mode Status 802.1X authentication Open Vlan Mode StatusAccess Control AuthenticatorStatus Indicator Meaning Current Vlan IDNo Pvid The port is not an untagged member of any Vlan Show Commands for Port-Access Supplicant Supplicant port detects a different authenticator deviceSwitch reboots How RADIUS/802.1X Authentication Affects Vlan Operation Example of an Active Vlan Configuration Otherwise, port A2 is not listed Assignment 1X Operating Messages Messages Related to 802.1X OperationConfiguring and Monitoring Port Security Configuring and Monitoring Port Security Basic OperationCast traffic Blocking Unauthorized Traffic Switch B Physical Topology Logical Topology for Access to Switch aSwitch a Switch CPlanning Port Security Port Security Commands Used in This Section Port Security Command Options OperationCommands Acquires and maintains authorized addresses00f031-423fc1 4 b0-880a80 the authorized address 080090-1362f2Address-limit integer Clear-intrusion-flag Retention of Static MAC Addresses Displaying Current Port Security SettingsLearned MAC Addresses Assigned/Authorized MAC AddressesUsing the CLI To Display Port Security Settings Specifying Authorized Devices and Intrusion Responses Configuring Port SecurityAdding a MAC Address to an Existing Port List Example of Adding a Second Authorized Device to a Port Example of Adding an Authorized Device to a PortSee the MAC Address entry in the table on Device’s MAC address. For exampleRemove 0c0090-123456 from the Authorized Address list Address configuration. Refer to the Note onExample of Port A1 After Removing One MAC Address MAC LockdownConfiguring and Monitoring Port Security Differences Between MAC Lockdown and Port Security MAC Lockdown Operating Notes Deploying MAC Lockdown MAC Lockdown Deployed At the Network Edge Provides Security Edge switches Address and stealing dataInside the Core Network as well, not just on the edge External Network X e d U s e r s 11. Listing Locked Down Ports MAC LockoutConfiguring and Monitoring Port Security 12. Listing Locked Out Ports Port Security and MAC LockoutIP lockdown command operates as follows Using the IP Lockdown CommandIP Lockdown Operating Rules for IP LockdownReading Intrusion Alerts and Resetting Alert Flags Web Displaying and Configuring Port Security FeaturesLog command displays the Event Log Click on Port SecurityHow the Intrusion Log Operates Flags Resetting Alert FlagsAs follows It detects15. Example of the Intrusion Log Display Type I Intrusion log to display the Intrusion LogConfiguring and Monitoring Port Security List intrusion log content 18. Example of Port Status Screen After Alert Flags Reset Event Log lists port security intrusions as Using the Event Log To Find Intrusion AlertsOperating Notes for Port Security Configuring and Monitoring Port Security Traffic/Security Filters ProCurve Series 2600/2600-PWR and 2800 Switches10-2 10-3 Filter for the Actions Shown in FigureOperating Rules for Source-Port Filters Using Source-Port Filters10-5 Configuring a Source-Port Filter10-6 ProCurveconfig# filter source-port trk1 drop trk2,10-15Viewing a Source-Port Filter 10-7Source Port Destination Action Ports 10-8 Filter Indexing10-9 Editing a Source-Port FilterDefining and Configuring Named Source-Port Filters Using Named Source-Port FiltersOperating Rules for Named Source-Port Filters 10-1010-11 Sample Configuration for Named Source-Port Filters Viewing a Named Source-Port Filter10-12 Applying Example Named Source-Port Filters Source Port 10-1410-15 10-16 10-17 10-18 Operating Notes 11-1 Using Authorized IP ManagersUsing Authorized IP Managers Authorized IP Manager FeaturesAccess Levels Configuration OptionsYou can configure Defining Authorized Management Stations Overview of IP Mask Operation11-4 Switch Configuration … IP Authorized Managers Menu Viewing and Configuring IP Authorized ManagersFrom the console Main Menu, select 11-5CLI Viewing and Configuring Authorized IP Managers Listing the Switch’s Current Authorized IP ManagersAuthorized IP Managers Commands Used in This Section Configuring IP Authorized Managers for the Switch 11-7IP Mask 11-8 Address of the authorized manager you want to deleteConfiguring One Station Per Authorized Manager IP Entry Web Configuring IP Authorized ManagersBuilding IP Masks Analysis of IP Mask for Single-Station EntriesAny value from 0 to 11-1011-11 Additional Examples for Authorizing Multiple StationsOperating Notes Index IndexSee RADIUS. message See SSH. proxy Web server … Quick start … Show accounting … 5-28 show authentication … See RADIUS. troubleshooting Vlan This page is intentionally unused December
Related manuals
Manual 88 pages 37.5 Kb Manual 228 pages 26.31 Kb