Manuals / Brands / Computer Equipment / Switch / HP / Computer Equipment / Switch

HP ProCurve W.14.03 15 Key Management System, Index

1 594
Download 594 pages, 7.94 Mb

Using a Web Proxy Server to Access the Web Browser

Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-9Web-Based Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-9

Building IP Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-10 Configuring One Station Per Authorized Manager IP Entry . . . . . . 14-10 Configuring Multiple Stations Per Authorized Manager IP Entry . . 14-10 Additional Examples for Authorizing Multiple Stations . . . . . . . . . 14-12

Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-13

15 Key Management System

Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-1

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-2

Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-2

Configuring Key Chain Management . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-3 Creating and Deleting Key Chain Entries . . . . . . . . . . . . . . . . . . . . . . . 15-3 Assigning a Time-Independent Key to a Chain . . . . . . . . . . . . . . . . . . 15-4 Assigning Time-Dependent Keys to a Chain . . . . . . . . . . . . . . . . . . . . 15-5

Index

xviii

Contents
ProCurve Switches Page HP ProCurve 2910al Switch Page Product Documentation 1 Security Overview 2 Configuring Username and Password Security 3 Web and MAC Authentication 4 TACACS+ Authentication 5 RADIUS Authentication and Accounting Using SNMP To View and Configure Local Authentication Process Controlling Web Browser Interface Access 6Configuring RADIUS Server Support for Switch Services 7 Configuring Secure Shell (SSH) 8 Configuring Secure Socket Layer (SSL) 9 IPv4 Access Control Lists (ACLs) Page Deleting an ACL 10 Configuring Advanced Threat Protection 11 Traffic/Security Filters and Monitors Page 13 Configuring and Monitoring Port Security 14 Using Authorized IP Managers 15 Key Management System Index Product Documentation Software Feature Index Page Page Page Page Security Overview About This Guide For More Information Access Security Features Table 1-1.Access Security and Switch Authentication Features Page Page Page Network Security Features Table 1-2.Network Security—DefaultSettings and Security Guidelines Page Page Getting Started with Access Security Physical Security Quick Start: Using the Management Interface Wizard setup mgmt-interfaces Figure 1-1.Example of Management Interface Wizard Configuration CTRL-C [n] CLI Wizard: Operating Notes and Restrictions no password Setup Wizard Figure 1-2.Management Interface Wizard: Welcome Window Continue Exit Back Figure 1-3.Management Interface Wizard: Summary Setup Apply Web Wizard: Operating Notes and Restrictions SNMP Security Guidelines A c c e s s t o M I B If SNMP access to the hpSwitchAuth MIB is considered a security risk in your network snmp-servermib hpswitchauthmib excluded Precedence of Security Options Precedence of Port-BasedSecurity Options Precedence of Client-BasedAuthentication: Dynamic Configuration Arbiter Page www.procurve.com/solutions Security Products Page ProCurve Identity-DrivenManager (IDM) Configuring Username and Password Security Page N o t e s Menu Interface: CLI: C a u t i o n Configuring Local Password Security Menu: Setting Passwords 3. Console Passwords Figure 2-1.The Set Password Screen Enter new password again To Delete Password Protection (Including Recovery from a Lost Password): Set Passwords Delete Password Protection Continue Deletion of password protection? No CLI: Setting Passwords and Usernames Configuring Manager and Operator Passwords Figure 2-2.Example of Configuring Manager and Operator Passwords Figure 2-3.Removing a Password and Associated Username from the Switch no password all Web: Setting Passwords and Usernames To Configure (or Remove) Usernames and Passwords in the Web Browser Interface SNMP: Setting Passwords and Usernames Saving Security Credentials in a Config File include- credentials Benefits of Saving Security Credentials Enabling the Storage and Display of Security Credentials running-config write terminal Security Settings that Can Be Saved Local Manager and Operator Passwords Password Command Options manager: operator: port-access: user-name SNMP Security Credentials auth md5 sha priv 802.1X Port-AccessCredentials port-access) password manager password operator TACACS+ Encryption Key Authentication RADIUS Shared-SecretKey Authentication SSH Client Public-KeyAuthentication Page Figure 2-5.Example of SSH Public Keys include-credentials commands copy config config copy config tftp copy tftp config copy config xmodem Restrictions snmpv3 user Page Front-PanelSecurity When Security Is Important Front-PanelButton Functions Figure 2-6. Front-PanelReset and Clear Buttons Figure 2-7.Press the Clear Button for One Second To Reset the Password(s) Figure 2-8.Press and hold the Reset Button for One Second To Reboot the Switch Configuring Front-PanelSecurity front-panel-security Clear Password: Enabled Disabled Password Recovery: CAUTION: Figure 2-9.The Default Front-PanelSecurity Settings Enabled password-clear Figure 2-11.Example of Re-Enablingthe Clear Button’s Default Operation Default: Notes: Figure 2-12.Example of Disabling the Factory Reset Option Password Recovery Note: To disable password-recovery: Steps for Disabling Password-Recovery factory- reset no front-panel-security password-recovery CAUTION Password Recovery Process password Page Page Web and MAC Authentication Web Authentication MAC Authentication Concurrent Web and MAC Authentication Authorized and Unauthorized Client VLANs RADIUS-BasedAuthentication Wireless Clients How Web and MAC Authentication Operate Web-basedAuthentication Figure 3-1.Example of Default User Login Screen Figure 3-2.Progress Message During Authentication redirect-url Figure 3-3.Authentication Completed reauth-period reauthenticate logoff-period MAC-basedAuthentication addr-format addr-limit addr-moves server-timeout max- requests quiet-period Authorized-Client Authentication Server: Authenticator: CHAP: Client: Operating Rules and Notes Page W e b / M A C A u t h e n t i c a t i o n a n d L A C P Setup Procedure for Web/MAC Before You Configure Web/MAC Authentication Figure 3-4.Example of show port-accessconfig Command Output Configuring the RADIUS Server To Support MAC Authentication aabbccddeeff aabbcc-ddeeff aa-bb-cc-dd-ee-ff aa:bb:cc:dd:ee:ff Configuring the Switch To Access a RADIUS Server Figure 3-5.Example of Configuring a Switch To Access a RADIUS Server Configuring Web Authentication ping Configuration Commands for Web Authentication both spanning-tree edge-port Page statis­ tics Page Page Page Show Commands for Web Authentication MACbased clients detailed Figure 3-6.Example of show port-access web-basedCommand Output n/a - IPv6 no info Figure 3-7.Example of show port-access web-basedclients Command Output Figure 3-8.Example of show port-access web-basedclients detailed Command Output No) Figure 3-9.Example of show port-access web-basedconfig Command Output Figure 3-10.Example of show port-access web-basedconfig detail Command Output Page Configuring MAC Authentication on the Switch Configuration Commands for MAC Authentication no-delimiter single-dash multi-dash multi-colon Page Page Show Commands for MAC-BasedAuthentication Figure 3-12.Example of show port-access mac-basedCommand Output Figure 3-13.Example of show port-access mac-basedclients Command Output Figure 3-14.Example of show port-access mac-basedclients detail Command Output Figure 3-15.Example of show port-access mac-basedconfig Command Output Figure 3-16.Example of show port-access mac-basedconfig detail Command Output Page Client Status show... clients’ TACACS+ Authentication A3 or A2 or Figure 4-1.Example of TACACS+ Operation Terminology Used in TACACS Applications: Page Notes General System Requirements General Authentication Setup Procedure Note on Privilege Levels Caution telnet login telnet enable Configuring TACACS+ on the Switch Before You Begin aaa authentication: tacacs-server: CLI Commands Described in this Section Viewing the Switch’s Current Authentication Viewing the Switch’s Current TACACS+ Server Contact Configuration paris-1 show tacacs Figure 4-3.Example of the Switch’s TACACS+ Configuration Listing Configuring the Switch’s Authentication Methods aaa authentication privilege-mode tacacs radius Table 4-1.AAA Authentication Parameters Parameters local Configuring the TACACS+ Server for Single Login Figure 4-4.Advanced TACACS+ Settings Section of the TACACS+ Server User Setup Figure 4-5.The Shell Section of the TACACS+ Server User Setup Table 4-2.Primary/Secondary Authentication Table Console Login (Operator or Read-Only)Access: Primary using TACACS+ server Secondary using Local Telnet Login (Operator or Read-Only)Access: Primary using TACACS+ server Telnet Enable (Manager or Read/Write Access: Primary using TACACS+ server Configuring the Switch’s TACACS+ Server Access The host IP address(es) Page Page Adding, Removing, or Changing the Priority of a TACACS+ Server Figure 4-6.Example of the Switch with Two TACACS+ Server Addresses Configured Figure Configuring an Encryption Key Procurve(config)# tacacs-serverkey <keystring show config running write mem How Authentication Operates General Authentication Process Using a TACACS+ Local Authentication Process Using the Encryption Key Global key: Server-Specific key: Controlling Web Browser Interface Access When Using TACACS+ Messages Related to TACACS+ Operation server tacacs-server configuration Page Page RADIUS Authentication and Accounting Page Authentication Services Accounting Services RADIUS-AdministeredCoS and Rate-Limiting SNMP Access to the Switch’s Authentication Configuration MIB EXEC Session: Host: See RADIUS Server NAS (Network Access Server): RADIUS Client: RADIUS Host: Switch Operating Rules for RADIUS General RADIUS Setup Procedure Preparation: Table 5-1.Preparation for Configuring RADIUS on the Switch Figure 5-1.Example of Possible RADIUS Access Assignments Configuring the Switch for RADIUS Outline of the Steps for Configuring RADIUS Authentication Server Key: Timeout Period: Retransmit Attempts: 1.Configure Authentication for the Access Methods You Want RADIUS To Protect Console: Telnet: Web: peap-mschapv2 Default: chap-radius Page Figure 5-3.Example Configuration for RADIUS Authentication 2. Enable the (Optional) Access Privilege Option Page 3. Configure the Switch To Access a RADIUS Server auth-port acct-port Page 4. Configure the Switch’s Global RADIUS Parameters Server timeout: Server dead time: Retransmit attempts: Figure 5-6.Example of Global Configuration Exercise for RADIUS Authentication Figure 5-7.Listings of Global RADIUS Parameters Configured In Figure Using SNMP To View and Configure Switch Authentication Features S e c u r i t y N o t e s snmp-server mib hpswitchauthmib excluded Changing and Viewing the SNMP Access Configuration excluded: included Excluded MIBs Page Local Authentication Process Controlling Web Browser Interface Access CLI: no web-management 2.Switch Configuration 1. System Information Web Agent Enabled: No Commands Authorization Enabling Authorization radius: Displaying Authorization Information Figure 5-10.Example of Show Authorization Command Configuring Commands Authorization on a RADIUS Page Page Page Page Page Additional RADIUS Attributes Configuring RADIUS Accounting Network accounting: System accounting: Commands accounting: RADIUS accounting with IP attribute: Operating Rules for RADIUS Accounting show radius Steps for Configuring RADIUS Accounting radius-server [key key-string Accounting types: Trigger for sending accounting reports to a RADIUS server: Updating: Page Exec: exec System: system system stop-only Figure 5-12.Example of Configuring Accounting Types Updates: Suppress: Viewing RADIUS Statistics General RADIUS Statistics show radius Figure 5-15.RADIUS Server Information From the Show Radius Host Command RADIUS Authentication Statistics Figure 5-16.Example of Login Attempt and Primary/Secondary Authentication Information from the Show Authentication Command Figure 5-17.Example of RADIUS Authentication Information from a Specific Server RADIUS Accounting Statistics Figure 5-18.Listing the Accounting Configuration in the Switch Figure 5-19.Example of RADIUS Accounting Information for a Specific Server Changing RADIUS-ServerAccess Order Figure 5-21.Search Order for Accessing a RADIUS Server Figure 5-22.Example of New RADIUS Server Search Order Messages Related to RADIUS Operation Configuring RADIUS Server Support for Switch Services Page www.procurve.com Network Management Product manuals page Technical Support RADIUS Server Configuration for Per-PortCoS (802.1p Priority) and Rate Limiting Applied Rates for RADIUS-AssignedRate Limits Table 6-1. RADIUS-Assigned Rate-LimitIncrements Table 6-2.Examples of Assigned and Applied Rate Limits rate-limit all show qos port-priority Page Configuring and Using RADIUS-AssignedAccess Control Lists DA: Deny: Dynamic Port ACL: Inbound Traffic: Outbound Traffic: Static Port ACL: Wildcard: ACL Mask Overview of RADIUS-Assigned,Dynamic ACLs Contrasting Dynamic (RADIUS-Assigned)and Static ACLs Table 6-3.Contrasting Dynamic (RADIUS-Assigned)and Static ACLs RADIUS-assignedACLs Static Port ACLs How a RADIUS Server Applies a RADIUS-AssignedACL to a Switch Port ip deny any any General ACL Features, Planning, and Configuration The Packet-filteringProcess Operating Rules for RADIUS-AssignedACLs Multiple Clients Using the Same Username/Password Pair: Multiple Effect of RADIUS-assignedACLs on Inbound Traffic for Two Cli­ Configuring an ACL in a RADIUS Server Table 6-4. Nas-Filter-RuleAttribute Options Configuring ACE Syntax in RADIUS Servers permit | deny >: in: ip | ip-protocol-value any: Nas-filter-Rule ipv4-addr mask < mask dictionary.rfc4849 clients.conf Figure 6-3.Example of Switch Identity Information for a FreeRADIUS Application Page Page Configuring the Switch To Support RADIUS-AssignedACLs cnt 802.1X Option: MAC Authentication Option: Web Authentication Option: Displaying the Current RADIUS-AssignedACL Activity on the Switch Port: Auth Clients: Unauth Clients: Untagged VLAN: Tagged VLANs ICMP Type Numbers and Keywords icmp-type Table 6-5.ICMP Type Numbers and Keywords Event Log Messages Causes of Client Deauthentication Immediately After Authenticating Monitoring Shared Resources Configuring Secure Shell (SSH) Client Public Key Authentication (Login/Operator Level) with User Figure 7-1.Client Public Key Authentication Model www.openssh.com Figure 7-2.Switch/User Authentication SSH Server: Key Pair: PEM (Privacy Enhanced Mode): Enable Level: Prerequisite for Using SSH Public Key Formats Steps for Configuring and Using SSH for Switch and Client Authentication login public- key erase startup-config Configuring the Switch for SSH 1.Assigning a Local Login (Operator) and Enable (Manager) Password To Configure Local Passwords Syntax: Figure 7-4.Example of Configuring Local Passwords 2. Generating the Switch’s Public and Private Key Pair Page Figure 7-5.Example of Generating a Public/Private Host Key Pair for the Switch Table 7-2.RSA/DSA Values for Various ProCurve Switches 3. Providing the Switch’s Public Key to Clients Figure 7-6.Example of a Public Key Generated by the Switch ord Wrap dit Figure 7-7.Example of a Correctly Formatted Public Key Page 4.Enabling SSH on the Switch and Anticipating SSH Client Contact Behavior To enable SSH on the switch no ip ssh Page Important: manager operator N o t e o n P o r t N u m b e r ip ssh port 5. Configuring the Switch for SSH Authentication Option A: Configuring SSH Access for Password-OnlySSH Authentication Option B: Configuring the Switch for Client Public-KeySSH Page Figure 7-12.SSH Configuration and Client-Public-KeyListing From Figure 6. Use an SSH Client To Access the Switch copy tftp aaa authentication ssh Figure 7-13.Example of a Client Public Key N o t e o n P u b l i c K e y s smith@support.cairns.com append Page Page Messages Related to SSH Operation tftp After you execute the generate ssh [dsa | rsa] Logging Messages Note Debug Logging Configuring Secure Socket Layer (SSL) Server Certificate authentication with User Password Authentication Switch/User Authentication N o t e : SSL Server: Digital Certificate: Self-Signed Root Certificate: Manager Level: Operator Level: SSL Enabled: (web interface or CLI command: crypto key generate cert [key size] Prerequisite for Using SSL Steps for Configuring and Using SSL for Switch and Client Authentication Page Configuring the Switch for SSL 1.Assigning a Local Login (Operator) and Enabling (Manager) Password Figure 8-2.Example of Configuring Local Passwords 2. Generating the Switch’s Server Host Certificate Page CLI commands used to generate a Server Host Certificate crypto key generate cert Table 8-1.CertificateField Descriptions CLI Command to view host certificates Syntax show crypto host­ cert Figure 8-4.Example of show crypto host-certcommand Page Page Figure 8-6.Web browser Interface showing current SSL Host Certificate ii.Select the Create Certificate/Certificate Request radio button iii.Select Create CA Request from the Certificate Type drop-downlist Current RSA Key Size Figure 8-7.Request for Verified Host Certificate Web Browser Interface Screen 3.Enabling SSL on the Switch and Anticipating SSL Browser Contact Behavior Page ■Execute no web-managementssl [Apply Changes] tcp-port Common Errors in SSL setup Page IPv4 Access Control Lists (ACLs) Page Page Application Access Security: Page Overview of Options for Applying IPv4 ACLs on the Switch Static ACLS Dynamic Port ACLs Table 9-1.Command Summary for Standard IPv4 ACLs Page Table 9-2.Command Summary for IPv4 Extended ACLs Note: Table 9-3.Command Summary for Enabling, Disabling, and Displaying ACLs Page ACL Mask: CIDR: NAME-STR identifier ACL-ID Named ACL: An ACL created with the ip access-list< extended | standard Named ACL: seq-# Standard ACL: Types of IPv4 ACLs Extended ACL: ACL Applications Effect of Dynamic Port ACLs When Multiple Clients Are Using the Same Port Figure 9-1.Example of Multiple Clients Authenticating Through a Single Port Multiple ACLs on an Interface Features Common to All ACL Applications deny any deny ip any any General Steps for Planning and Configuring ACLs Page IPv4 Static ACL Operation Example Figure 9-2.Example of Sequential Comparison Figure 9-3.The Packet-FilteringProcess in an ACL with N Entries (ACEs) Figure 9-4.Example of How an ACL Filters Packets Planning an ACL Application IPv4 Traffic Management and Improved Network Security Guidelines for Planning the Structure of a Static ACL IPv4 ACL Configuration and Operating Rules Static Port ACLs: Per Switch ACL Limits for All ACL Types show < qos | > resources How an ACE Uses a Mask To Screen Packets for Matches Page Any IPv4 address fits the matching criteria A group of IPv4 addresses fits the matching criteria Table 9-1.Example of How the Mask Defines a Match Example of Allowing Only One IPv4 Address (“Host” Option). Sup­ Inbound Packet “A” On VLAN Inbound Packet “B” On VLAN Examples Allowing Multiple IPv4 Addresses. Table 9-2 provides exam­ Table 9-2.Example of Using an IPv4 Address and Mask in an Access Control Entry Table CIDR Notation Regarding the Use of IPv4 Source Routing Configuring and Assigning an IPv4 ACL Options for Permit/Deny Policies ACL Configuration Structure standard extended Figure 9-6.Example of the General Structure for a Standard ACL Figure 9-7.Example of a Displayed Standard ACL Configuration with Two ACEs Figure 9-8.Example of General Structure Options for an Extended ACL Figure 9-9.Example of a Displayed Extended ACL Configuration ACL Configuration Factors Table 9-4.Effect of the Above ACL on Inbound IPv4 Traffic in the Assigned VLAN Page Using the CLI To Create an ACL Named IPv4 ACLs: acl-name-str Table 9-5.Examples of CIDR Notation for Masks Configuring Standard ACLs Table 9-6.Command Summary for Standard ACLs Page Page resequence Mask Application: 10.10.10.1/24 logging Figure 9-11.Example of Commands Used To Create an Standard, Named ACL Figure 9-12.Screen Output Listing the “Sample-List”ACL Content Page Example: 10.10.10.1/24 and 10.10.10.1 0.0.0.255 both define Example of Creating and Viewing a Standard ACL. This example cre­ Configuring Extended ACLs Table 9-7.Command Summary for Extended ACLs Page Page Page ip access- list standard (nacl context) ip-in-ip ipv6-in-ipgre esp ospf pim DA Mask Application: Page tcp udp Comparison Operators: tcp/udp-port-nbr < end-port-nbr Port Number or Well-KnownPort Name: Comparison Operators and Well-KnownPort Names — [established] established icmp www.iana.com [icmp-type icmp-code] igmp extended a.Use ip access list extended < 100 - 199 > to open the ACL as a named ACL Page Page Page Page Page Adding or Removing an ACL Assignment On an Interface Filtering Inbound IPv4 Traffic Per Port Figure 9-15.Methods for Enabling and Disabling ACLs Deleting an ACL Editing an Existing ACL Using the CLI To Edit ACLs ■Named ACLs: no Sequence Numbering in ACLs Figure 9-16.Example of the Default Sequential Numbering for ACEs Figure 9-17.Examples of Adding an ACE to the end of Numbered or Named ACLs Figure 9-18.Example of Appending an ACE to an Existing List Figure 9-19.Example of Inserting an ACE in an Existing ACL Figure 9-20.Example of Inserting an ACE into an Existing Sequence Figure 9-21.Example of Deleting an ACE from Any ACL starting-seq-# interval | 1 - 99 | Figure 9-22.Example of Viewing and Resequencing an ACL Page < 1 - 99 | 100 - 199 Figure 9-24.Example of Inserting a Remark Inserting a Remark for an ACE that Already Exists in an ACL. If a list-name Figure 9-25.Example of Overwriting One Remark with Another Displaying ACL Configuration Data Display an ACL Summary Figure 9-26.Example of show access-listCommand Figure 9-27.Example of a Summary Table of Access lists std ext Display the Content of All ACLs on the Switch memory Figure 9-28.Example of an ACL Configured Syntax Listing Display Static Port ACL Assignments Figure 9-29.Example of Listing the ACL Assignments for Ports and Trunks Displaying the Content of a Specific ACL Figure 9-30.Example of a Listing a Standard ACL acl-id Page Monitoring Static ACL Performance Total: Resetting ACE Hit Counters to Zero: Creating or Editing ACLs Offline Copy xmodem usb Creating or Editing an ACL Offline no ip access- list Figure 9-32.Example of an Offline ACL File Designed To Replace An Existing ACL command-file Enable ACL “Deny” Logging logging Requirements for Using ACL Logging ACL Logging Operation Figure 9-33.Content of a Message Generated by an ACL-DenyAction Enabling ACL Logging on the Switch logging facility syslog debug destination logging session General ACL Operating Notes ACLs Do Not Affect Serial Port Access. ACLs do not apply to the ACL Logging Protocol Support Configuring Advanced Threat Protection Page DHCP Snooping Enabling DHCP Snooping authorized server: database: tftp://ip-addr/ascii-string option trust untrusted verify vlan Enabling DHCP Snooping on VLANS Figure 10-3.Example of DCHP Snooping on a VLAN Configuring DHCP Snooping Trusted Ports Figure 10-4.Example of Setting Trusted Ports Configuring Authorized Server Addresses Figure 10-5.Example of Authorized Servers for DHCP Snooping Using DHCP Snooping with Option mac: subnet-ip: subnet-ip untrusted drop: Figure 10-6.Example of DHCP Snooping Option 82 using the VLAN IP Address Figure 10-7.Example Showing the DHCP Snooping Verify MAC Setting The DHCP Binding Database file delay timeout Figure 10-8.Example Showing DHCP Snooping Binding Database Contents Enabling Debug Logging agent event packet Operational Notes Log Messages Server <ip-address>packet received on untrusted port <port-number dropped Client packet destined to untrusted port <port-number Unauthorized server <ip-address>detected on port Client address <mac-address>not equal to source MAC <mac-address detected on port Attempt to release address <ip-address>leased to port <port-number Lease table is full, DHCP lease was not added. The lease table is full Snooping table is full Dynamic ARP Protection Page Enabling Dynamic ARP Protection arp protect vlan vlan-range Configuring Trusted Ports Figure 10-9.Configuring Trusted Ports for Dynamic ARP Protection arp protect trust port-list c1-c3 Adding an IP-to-MACBinding to the DHCP Database ip source binding interface Configuring Additional Validation Checks on ARP Packets arp protect validate src-mac dst-mac Displaying ARP Packet Statistics show arp protect statistics Figure 10-11.Showarp protect statistics Command Monitoring Dynamic ARP Protection Figure 10-12.Exampleof debug arp protect Command Using the Instrumentation Monitor Figure 10-13.Exampleof Event Log Message generated by Instrumentation Monitor Figure 10-14.Exampleof rate limiting when multiple messages are generated Known Limitations: Configuring Instrumentation Monitor enabled [all] see parameter listings below [arp-requests] instrumentation monitor Viewing the Current Instrumentation Monitor Page Traffic/Security Filters and Monitors Applicable Switch Models Filter Limits Using Port Trunks with Filters Filter Types and Operation Table 11-1.Filter Types and Criteria Source-PortFilters Figure 11-1.Example of a Source-PortFilter Application trk1 trk2 trk Figure 11-2.Example of a Filter Blocking Traffic only from Port 5 to Server "A Figure 11-3.The Filter for the Actions Shown in Figure Named Source-PortFilters no filter named-filter <filter-name show filter web-only accounting Filter Name Port List NOT USED Action Figure 11-4.Network Configuration for Named Source-PortFilters Example Figure 11-6.Source Port Filters Applied to Switch Ports Figure 11-7.Example of the show filter Command IDX Value Figure 11-8.Example Showing Traffic Filtered on Specific Ports Figure 11-9.Example of Source Port Filtering with Internet Traffic Action Figure 11-12.Example of Removing a Source Port Filter Figure 11-13.Named Source-PortFilters Managing Traffic Static Multicast Filters max-vlans Table 11-2.Multicast Filter Limits Protocol Filters Configuring Traffic/Security Filters Configuring a Source-PortTraffic Filter Forward Trk1 trk6 Figure 11-14.Example of Switch Response to Adding a Filtered Source Port to a Trunk Editing a Source-PortFilter Figure 11-15.Assigning Additional Destination Ports to an Existing Filter Configuring a Multicast or Protocol Traffic Filter Table 11-3.Filter Example Figure 11-16.Configuring Various Traffic/Security Filters Filter Indexing show filter index Displaying Traffic/Security Filters Figure 11-17.Example of Displaying Filter Data Configuring Port-Basedand User-BasedAccess Control (802.1X) Page Why Use Port-Basedor User-BasedAccess Control General Features User Authentication Methods Page Page CHAP (MD5): User-Based Authentication: Guest VLAN: EAP Supplicant: General 802.1X Authenticator Operation Example of the Authentication Process VLAN Membership Priority Figure 12-1.Priority of VLAN Assignment for an Authenticated Client Page Error configuring port X: LACP and 802.1X cannot be run together Applying Web Authentication or MAC Authentication Concurrently Page General Setup Procedure for 802.1X Access Control Do These Steps Before You Configure 802.1X Operation Figure 12-2.Example of the Password Port-AccessCommand Figure 12-3.Example of show port-accessconfig Command Output Page Overview: Configuring 802.1X Authentication on the Switch auto eap-radius chap-radius Configuring Switch Ports as 802.1X Authenticators Page User-Based802.1X Authentication Port-Based802.1X Authentication authenticator Figure 12-4.Example of Configuring User-Based802.1X Authentication Figure 12-5.Example of Configuring Port-Based802.1X Authentication 2. Reconfigure Settings for Port-Access unauthorized: quiet- period Page Page 3. Configure the 802.1X Authentication Method none or authorized Figure 12-6.Example of 802.1X (Port-Access)Authentication 4. Enter the RADIUS Host IP Address(es) 5. Enable 802.1X Authentication on the Switch 6. Optional: Reset Authenticator Operation aaa port- access authenticator control auto 7. Optional: Configure 802.1X Controlled Directions Prerequisite Page authenticator config Figure 12-7.Example of Configuring 802.1X Controlled Directions 802.1X Open VLAN Mode VLAN Membership Priorities 1st Priority: 2nd Priority: 3rd Priority: Use Models for 802.1X Open VLAN Modes Table 12-1.802.1X Open VLAN Mode Options 802.1X Per-PortConfiguration Port Response Note for a Port Configured To Allow Multiple Client Sessions: If any Page Only Unauthorized-Client Authorized-Client Operating Rules for Authorized-Clientand Unauthorized-ClientVLANs Table 12-2.Operating Rules for Client VLANs Condition Rule Page Page Page Setting Up and Configuring 802.1X Open VLAN Mode Page radius host rad4all 802.1X Open VLAN Operating Notes Option For Authenticator Ports: Configure Port-Security Devices Figure 12-8. Port-AccessSupport for Port-SecurityOperation Port-Security Configure the port access type Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other Switches Example Figure 12-9.Example of Supplicant Operation Page Supplicant Port Configuration (Syntax Continued) Enter secret: < password Repeat secret: < password Displaying 802.1X Configuration, Statistics, and Counters —Continued— Yes or No •Port COS: cos-value Figure 12-10.Example of show port-accessauthenticator Command authenticator Figure 12-11.Example of show port-accessauthenticator config Command Page Figure 12-12.Example of show port-accessauthenticator statistics Command in-progress terminated Figure 12-13.Example of show port-accessauthenticator session-countersCommand authenticator control Figure 12-14.Exampleof show port-accessauthenticator vlan Command n/a - no info Figure 12-15.Example of show port-accessauthenticator clients Command Output Page Viewing 802.1X Open VLAN Mode Status show port- access authenticator vlan Figure 12-17.Example Showing Ports Configured for Open VLAN Mode Auth VLAN ID Current VLAN ID Unauth VLAN ID Table 12-4.Rules of Access Control Table 12-5.Output for Determining Open VLAN Mode Status (Figure 12-18, Lower) %Curr. Rate Limit Inbound Figure 12-18.Example of Showing a VLAN with Ports Configured for Open VLAN Mode Show Commands for Port-AccessSupplicant secret Connecting Authenticated Acquired How RADIUS/802.1X Authentication Affects VLAN Operation VLAN Assignment on a Port Page Example of Untagged VLAN Assignment in a RADIUS- Based Authentication Session Figure 12-19.Example of an Active VLAN Configuration show vlan Page Enabling the Use of GVRP-LearnedDynamic VLANs in Authentication Sessions unknown-vlans Messages Related to 802.1X Operation Table 12-6.802.1X Operating Messages Page Configuring and Monitoring Port Security Page Port Security (Page 4) MAC Lockdown (Page 13-22) MAC Lockout (Page Port Security Basic Operation Default Port Security Operation Intruder Protection Eavesdrop Protection Eavesdrop Protection Blocking Unauthorized Traffic Figure 13-1.Example of How Port Security Controls Access Trunk Group Exclusion Planning Port Security show log Port Security Command Options and Operation Port Security Commands Used in This Section Displaying Port Security Settings Listing Authorized and Detected MAC Addresses mac-address: port list: vlan < vid >: Figure 13-4.Examples of Show Mac-AddressOutputs Configuring Port Security continuous port-security MAC Age Interval show system information static: limited-continuous Page none: Retention of Static Addresses Learned Addresses mac-addr address-list ■Delete it by using no port-security< port-number > mac-address< mac-addr Figure 13-5.Example of Adding an Authorized Device to a Port Figure 13-6.Example of Adding a Second Authorized Device to a Port Figure 13-7.Example of Port Security on Port A1 with an Address Limit of “1” Figure 13-8.Example of Two Authorized Addresses on Port A1 Figure 13-9.Example of Port A1 After Removing One MAC Address MAC Lockdown How It Works Other Useful Information Differences Between MAC Lockdown and Port Security Page Deploying MAC Lockdown Figure 13-10.MAC Lockdown Deployed At the Network Edge Provides Security Page Figure 13-11.Connectivity Problems Using MAC Lockdown with Multiple Paths MAC Lockout Table 13-1.Limits on Lockout MACs Port Security and MAC Lockout Web: Displaying and Configuring Port Security Features Reading Intrusion Alerts and Resetting Alert Flags Notice of Security Violations –The show port-security intrusion-log command displays the Intrusion Log How the Intrusion Log Operates Figure 13-12.Example of Multiple Intrusion Log Entries for the Same Port Note on Send-Disable Operation 1.Status and Counters 4.Port Status Figure 13-13.Example of Port Status Screen with Intrusion Alert on Port A3 Figure 13-14.Example of the Intrusion Log Display prior to show interfaces brief intrusion-log Figure 13-17.Exampleof Port Status Screen After Alert Flags Reset Using the Event Log To Find Intrusion Alerts From the CLI search-text ffi security Web: Checking for Intrusions, Listing Intrusion Alerts, and Resetting Alert Flags Operating Notes for Port Security Page Using Authorized IP Managers Authorized IP Manager Features Options Access Levels Manager: Operator: Defining Authorized Management Stations Overview of IP Mask Operation Menu: Viewing and Configuring IP Authorized Managers 2.Switch Configuration … 6.IP Authorized Managers Figure 14-2.Example of Edit Menu for Authorized IP Managers CLI: Viewing and Configuring Authorized IP Managers show ip authorized-managers Figure 14-3.Example of show authorized-managersCommand Figure 14-4.Example of Configuring IP Authorized Manager To Delete an Authorized Manager Entry. This command uses the IP Web: Configuring IP Authorized Managers 2.Click on the Authorized Addresses button [Add] [Replace] Web-BasedHelp Building IP Masks Configuring One Station Per Authorized Manager IP Entry Table 14-1.Analysis of IP Mask for Single-StationEntries Configuring Multiple Stations Per Authorized Manager IP Entry Table 14-2.Analysis of IP Mask for Multiple-StationEntries Additional Examples for Authorizing Multiple Stations Duplicate IP Addresses: Web Proxy Servers: Page Key Management System Key Chain: Time-Independent Key: Time-Dependent Key Management System (KMS) Enabled Protocol: Configuring Key Chain Management Creating and Deleting Key Chain Entries Figure 15-1.Adding a New Key Chain Entry Assigning a Time-IndependentKey to a Chain send-lifetime infinite: Assigning Time-DependentKeys to a Chain start time period accept-lifetime Figure 15-3.Adding Time-DependentKeys to a Key Chain Entry Figure 15-4.Display of Time-DependentKeys in the Key Chain Entry key-chain Figure 15-5.Status of Keys in Key Chain Entry “Procurve2” Index Numerics