Aruba 4100i User guide

Category
Software
Type
User guide

This manual is also suitable for

AOS-CX 10.12 Security Guide
4100i, 6000, 6100 Switch Series
Published: August 2023
Edition: 2
|2
Copyright Information
© Copyright 2023 Hewlett Packard Enterprise Development LP.
This product includes code licensed under certain open source licenses which require source
compliance. The corresponding source for these components is available upon request. This offer is
valid to anyone in receipt of this information and shall expire three years following the date of the final
distribution of this product version by Hewlett Packard Enterprise Company. To obtain such source
code, please check if the code is available in the HPE Software Center at
https://myenterpriselicense.hpe.com/cwp-ui/software but, if not, send a written request for specific
software version and product for which you want the open source code. Along with the request, please
send a check or money order in the amount of US $10.00 to:
Hewlett Packard Enterprise Company
Attn: General Counsel
WW Corporate Headquarters
1701 E Mossy Oaks Rd Spring, TX 77389
United States of America.
Notices
The information contained herein is subject to change without notice. The only warranties for Hewlett
Packard Enterprise products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an
additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or
omissions contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession,
use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer
Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government
under vendor's standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard
Enterprise has no control over and is not responsible for information outside the Hewlett Packard
Enterprise website.
Contents
Contents
Contents 3
About this document 15
Applicable products 15
Latest version available online 15
Command syntax notation conventions 15
About the examples 16
Identifying switch ports and interfaces 16
About security 18
About Authentication, Authorization, and Accounting (AAA) 18
Managing users and groups 19
Default user admin 19
Example of first login with password setting 19
Built-in user groups and their privileges 19
User-defined user groups 20
User name requirements 20
Password requirements 21
Per-user management interface enablement 21
Local per-user management interface enablement 21
Remote (TACACS+ or RADIUS) per-user management interface enablement 22
User and user group management tasks 23
Resetting the switch admin password using the Service OS console 24
Resetting the admin password by reverting the switch to factory defaults 25
User and group commands 26
password complexity 26
service export-password 30
show password-complexity 31
show user-group 31
show user-list 32
show user-list management-interface 33
show user information 34
user 36
user-group 39
user management-interface 42
user password 44
SSH server 46
SSH defaults 46
SSH server tasks 47
SSH server commands 47
show ssh host-key 48
show ssh server 49
show ssh server sessions 50
ssh ciphers 51
ssh host-key 52
ssh host-key-algorithms 53
AOS-CX 10.12 Security Guide | (4100i, 6000, 6100 Switch Series) 3
Contents |4
ssh key-exchange-algorithms 54
ssh known-host remove 55
ssh macs 56
ssh maximum-auth-attempts 57
ssh public-key-algorithms 58
ssh server allow-list 59
ssh server port 61
ssh server vrf 61
SSH client 63
SSH client commands 63
ssh (client login) 63
Local AAA 65
Local AAA defaults and limits 65
Supported platforms and standards 65
Scale 65
Local authentication 66
Password-based local authentication 66
SSH public key-based local authentication 66
Local authentication tasks 66
Local authorization 68
Local authorization tasks 68
Local accounting 69
Local accounting tasks 69
Local AAA commands 70
aaa accounting all-mgmt 70
aaa authentication console-login-attempts 71
aaa authentication limit-login-attempts 73
aaa authentication login 74
aaa authentication minimum-password-length 75
aaa authorization commands (local) 76
show aaa accounting 78
show aaa authentication 79
show aaa authorization 80
show authentication locked-out-users 82
show ssh authentication-method 82
show user 83
ssh password-authentication 84
ssh public-key-authentication 85
user authorized-key 85
Remote AAA with TACACS+ 88
Parameters for TACACS+ server 88
Default server groups 89
Supported platforms and standards 89
About global versus per-TACACS+ server passkeys (shared secrets) 90
Remote AAA TACACS+ server configuration requirements 90
User role assignment using TACACS+ attributes 91
TACACS+ server redundancy and access sequence 91
Single source IP address for consistent source identification to AAA servers 92
TACACS+ general tasks 92
TACACS+ authentication 93
About authentication fail-through 93
TACACS+ authentication tasks 93
TACACS+ authorization 94
Using local authorization as fallback from TACACS+ authorization 94
About authentication fail-through and authorization 94
TACACS+ authorization tasks 94
TACACS+ accounting 95
Sample accounting information on a TACACS+ server 95
Sample REST accounting information on a TACACS+ server 96
TACACS+ accounting tasks 96
Example: Configuring the switch for Remote AAA with TACACS+ 97
Remote AAA with RADIUS 100
Parameters for RADIUS server 100
Default server groups 101
Supported platforms and standards 102
About global versus per-RADIUS server passkeys (shared secrets) 103
Remote AAA RADIUS server configuration requirements 103
User role assignment using RADIUS attributes 103
RADIUS server redundancy and access sequence 104
Configuration task list 104
Single source IP address for consistent source identification to AAA servers 105
RADIUS general tasks 106
Per-port RADIUS server group configuration 107
RADIUS authentication 107
About authentication fail-through 107
RADIUS authentication tasks 108
Two-factor authentication 109
Configuring two-factor authentication (for local users) 109
Configuring two-factor authentication with SSH (for remote-only users) 110
Configuring two-factor authentication with HTTPS server and REST (for remote-only
users) 113
Two-factor authentication commands 116
aaa authorization radius 116
https-server authentication certificate 117
ssh certificate-as-authorized-key 118
ssh two-factor-authentication 119
RADIUS accounting 120
Sample general accounting information 121
RADIUS accounting tasks 122
Example: Configuring the switch for Remote AAA with RADIUS 123
Remote AAA (TACACS+, RADIUS) commands 126
aaa accounting allow-fail-through 126
aaa accounting all-mgmt 126
aaa authentication allow-fail-through 129
aaa authentication login 130
aaa authorization allow-fail-through 132
aaa authorization commands 134
aaa group server 137
radius-server auth-type 138
radius-server host 139
radius-server host (ClearPass) 142
radius-server host secure ipsec 143
radius-server host tls port-access 148
radius-server host tls tracking-method 150
radius-server key 151
radius-server retries 152
AOS-CX 10.12 Security Guide | (4100i, 6000, 6100 Switch Series) 5
Contents |6
radius-server status-server interval 153
radius-server timeout 154
radius-server tracking 155
server 157
show aaa accounting 158
show aaa authentication 160
show aaa authorization 163
show aaa server-groups 164
show accounting log 166
show radius-server 169
show radius-server secure ipsec 174
show tacacs-server 175
show tacacs-server statistics 178
show tech aaa 178
tacacs-server auth-type 184
tacacs-server host 185
tacacs-server key 187
tacacs-server timeout 188
tacacs-server tracking 189
Dynamic Segmentation 192
User-based tunneling 192
Protocol and feature details 193
UBT fallback role 194
Wake-on-LAN VLANs 194
Supported platforms and standards 195
Scale 195
Configuration task list 195
Points to remember 196
Use cases 199
Use case 1: Wired access firewall 200
Use case 2: Wired guest/device segmentation 200
Use case 3: Branch deployment 201
Debugging and troubleshooting 202
Show commands 202
Debug commands 205
FAQs 205
User-based tunneling commands 210
backup-controller ip 210
enable 211
ip source-interface 212
papi-security-key 213
primary-controller ip 214
sac-heartbeat-interval 215
show capacities ubt 216
show ip source-interface ubt 216
show running-config ubt 217
show ubt 218
show ubt information 220
show ubt statistics 222
show ubt state 226
show ubt users 229
uac-keepalive-interval 231
ubt 232
ubt-client-vlan 233
ubt mode vlan-extend 234
wol-enable vlan 235
RADIUS dynamic authorization 238
Requirements and tips 238
RADIUS dynamic authorization commands 238
radius dyn-authorization enable 238
radius dyn-authorization client 239
radius dyn-authorization client tls (RadSec) 241
radius dyn-authorization port 242
show radius dyn-authorization 242
show radius dyn-authorization client 244
show radius dyn-authorization client tls (RadSec) 245
Client Insight 248
Supported Platforms 249
Prerequisites 249
Points to Note 249
Limitations 249
Feature Interoperability 250
Troubleshooting Client Insight 250
Client Insight Commands 250
client-insight enable 250
client-insight on-boarding event logs 251
diag-dump client-insight basic 252
show capacities client-insight-client-limit 254
show capacities-status client-insight-client-limit 255
show events -c client-insight 255
show tech client-insight 258
PKI 261
PKI concepts 261
Digital certificate 261
Certificate authority 262
Root certificate 262
Leaf certificate 262
Intermediate certificate 262
Trust anchor 262
OCSP 262
PKI on the switch 262
Trust anchor profiles 262
Leaf certificates 263
Mandatory matching of peer device hostname 263
PKI EST 263
EST usage overview 263
Prerequisites for using EST for certificate enrollment 264
EST profile configuration 264
Certificate enrollment 264
Certificate re-enrollment 265
Checking EST profile and certificate configuration 265
EST best practices 265
Example using EST for certificate enrollment 265
Example including the use of an intermediate certificate 271
Installing a self-signed leaf certificate (created inside the switch) 273
Installing a self-signed leaf certificate (created outside the switch) 274
Installing a certificate of a root CA 275
Installing a downloadable user role certificate 276
AOS-CX 10.12 Security Guide | (4100i, 6000, 6100 Switch Series) 7
Contents |8
Installing a CA-signed leaf certificate (initiated in the switch) 277
Installing a CA-signed leaf certificate (created outside the switch) 278
PKI commands 279
crypto pki application 279
crypto pki certificate 281
crypto pki ta-profile 282
enroll self-signed 283
enroll terminal 283
import (CA-signed leaf certificate) 284
import (self-signed leaf certificate) 286
key-type 288
ocsp disable-nonce 289
ocsp enforcement-level 290
ocsp url 291
ocsp vrf 292
revocation-check ocsp 293
show crypto pki application 293
show crypto pki certificate 294
show crypto pki ta-profile 296
ta-certificate 298
subject 299
PKI EST commands 301
arbitrary-label 301
arbitrary-label-enrollment 302
arbitrary-label-reenrollment 303
crypto pki est-profile 304
enroll est-profile 305
reenrollment-lead-time 306
retry-count 307
retry-interval 308
show crypto pki est-profile 308
url 309
username 311
vrf 312
Captive portal (RADIUS) 314
Protocol and feature details 314
About captive portal (RADIUS) 315
Supported platforms 316
Configuration task lists 316
Switch configuration 316
ClarPass Policy Manager configuration 317
Profiles 317
Policies 319
Services 320
Guest page configuration 320
LUR(Local User Role) 322
DUR(Downloadable User Role) 322
RADIUSVSA(Vendor-Specific Attribute) 324
IPv4 Captive portal example configuration 324
Policy configuration 324
Captive portal configuration 325
User role configuration 325
IPv6 Captive portal example configuration 325
Considerations and best practices 326
Use cases 326
Captive Portal 326
Private environments 327
Public environments 327
Integration with Aruba ClearPass 327
Captive portal (RADIUS) commands 327
aaa authentication port-access captive-portal-profile 327
show port-access captive-portal-profile 328
url 330
url-hash-key 331
Debugging and troubleshooting 332
Show commands 332
Frequently asked questions 333
Port access 335
Port access 802.1X authentication 335
Port access MAC authentication 336
How MAC authentication works 337
How RADIUS server is used in MAC authentication 337
Supported platforms and standards 338
Scale 338
Supported RFCs and standards 338
Considerations and best practices 338
Port access and Private VLAN interoperability considerations 339
Port access configuration task list 340
Port access 802.1X and MAC authentication configuration example 340
Use cases 342
Use case 1: Faster onboarding of MAC authentication clients using concurrent
onboarding 342
Use case 2: PXE clients that download the supplicant 343
Port access 802.1X authentication commands 343
aaa authentication port-access dot1x authenticator 343
aaa authentication port-access dot1x authenticator auth-method 344
aaa authentication port-access dot1x authenticator cached-reauth 345
aaa authentication port-access dot1x authenticator cached-reauth-period 346
aaa authentication port-access dot1x authenticator discovery-period 346
aaa authentication port-access dot1x authenticator eap-tls-fragment 347
aaa authentication port-access dot1x authenticator eapol-timeout 348
aaa authentication port-access dot1x authenticator initial-auth-response-timeout 349
aaa authentication port-access dot1x authenticator max-eapol-requests 350
aaa authentication port-access dot1x authenticator max-retries 351
aaa authentication port-access dot1x authenticator quiet-period 351
aaa authentication port-access dot1x authenticator radius server-group 352
aaa authentication port-access dot1x authenticator reauth 354
aaa authentication port-access dot1x authenticator reauth-period 354
clear dot1x authenticator statistics interface 355
show aaa authentication port-access dot1x authenticator interface client-status 356
show aaa authentication port-access dot1x authenticator interface port-statistics 357
Port access MAC authentication commands 359
aaa authentication port-access mac-auth 359
aaa authentication port-access mac-auth addr-format 360
aaa authentication port-access mac-auth auth-method 361
aaa authentication port-access mac-auth cached-reauth 361
aaa authentication port-access mac-auth cached-reauth-period 362
aaa authentication port-access mac-auth password 363
aaa authentication port-access mac-auth quiet-period 364
aaa authentication port-access mac-auth radius server-group 364
AOS-CX 10.12 Security Guide | (4100i, 6000, 6100 Switch Series) 9
Contents |10
aaa authentication port-access mac-auth reauth 366
aaa authentication port-access mac-auth reauth-period 366
clear mac-auth statistics 367
show aaa authentication port-access mac-auth interface client-status 368
show aaa authentication port-access mac-auth interface port-statistics 370
Port access general commands 371
aaa authentication port-access allow-lldp-auth 371
aaa authentication port-access allow-cdp-auth 371
aaa authentication port-access auth-mode 372
aaa authentication port-access auth-precedence 373
aaa authentication port-access auth-priority 374
aaa authentication port-access auth-role 375
aaa authentication port-access client-auto-log-off final-authentication-failure 376
aaa authentication port-access client-limit 377
aaa authentication port-access client-limit multi-domain 378
aaa authentication port-access radius-override 378
port-access allow-flood-traffic 380
port-access auto-vlan 381
port-access client-move 381
port-access event-log client 382
port-access fallback-role 383
port-access log-off client 384
port-access onboarding-method precedence 385
port-access onboarding-method concurrent 386
port-access reauthenticate interface 387
show aaa authentication port-access interface client-status 388
show port-access clients 390
show port-access clients detail 395
show port-access clients onboarding-method 403
Port access debugging and troubleshooting 405
Radius server reachability debugging and troubleshooting 405
Port access MAC authentication debugging and troubleshooting 406
Using show commands 406
Using debug commands 407
Port access 802.1X authentication debugging and troubleshooting 408
Using show commands 408
Using other commands 410
Port access FAQ 411
References 411
Multidomain authentication 411
Multidomain authentication requirements 412
Scenarios with Aruba-Port-Auth-Mode and Aruba-Device-Traffic-Class VSAs 412
Scenarios with device-traffic-class configuration in role 413
Port access auto-VLAN 413
Support for voice VLAN 414
Auto-VLAN limitations 414
Port access security violation 415
Port access security violation commands 415
port-access security violation action 415
port-access security violation action shutdown auto-recovery 416
port-access security violation action shutdown recovery-timer 417
show interface 418
show port-access aaa violation interface 418
show port-access port-security violation client-limit-exceeded interface 419
Port access policy 421
Classes and actions supported by port access policies 421
Port access policy commands 421
port-access policy 421
port-access policy copy 425
port-access policy resequence 426
port-access policy reset 427
clear port-access policy hitcounts 429
show port-access policy 431
show port-access policy hitcounts 433
Port access role 434
Operational notes 436
Downloadable user roles 436
Mixed roles 436
Limitations 437
Supported RADIUS attributes in mixed roles 437
Cached-critical role 438
Cached-critical role tasks 439
Restrictions 440
Troubleshooting 441
Special roles 441
Critical role 441
Reject role 442
Pre-authentication role 442
Auth-role 443
Fallback role 443
Port access role commands 443
associate policy 443
auth-mode 444
cached-reauth-period 445
client-inactivity timeout 446
device-traffic-class 447
description 448
mtu 449
poe-allocate-by 449
poe-priority 450
port-access role 451
reauth-period 452
session timeout 452
show aaa authentication port-access interface client-status 453
show port-access role 454
stp-admin-edge-port 458
trust-mode 459
vlan 459
Port access cached-critical role commands 461
aaa authentication port-access cached-critical-role (global) 461
aaa authentication port-access cached-critical-role (per interface) 463
port-access clear cached-client 464
show port-access cached-clients 465
show port-access cached-critical-role info 467
Port access VLAN groups 468
VLAN grouping limitations 469
VLAN group load balancing 469
Port access VLAN group commands 470
associate-vlan 470
port-access vlan-group 471
show running-config port-access vlan-group 472
AOS-CX 10.12 Security Guide | (4100i, 6000, 6100 Switch Series) 11
Contents |12
Port access 802.1X supplicant authentication 473
Feature details 473
Sub-features 474
Supported platforms 475
802.1X supplicant policy configuration and considerations 475
Recommended configuration 476
Port access 802.1X supplicant commands 476
aaa authentication port-access dot1x supplicant(global) 476
aaa authentication port-access dot1x supplicant(port) 477
associate policy 478
canned-eap-success 479
clear dot1x supplicant statistics 480
discovery-timeout 481
eap-identity 482
eapol-force-multicast 484
eapol-method 485
eapol-protocol-version 486
eapol-timeout 487
enable 488
enable 489
fail-mode 490
held-period 491
max-retries 492
policy (supplicant) 493
port-access dot1x supplicant restart 494
show aaa authentication port-access dot1x supplicant policy 495
show aaa authentication port-access dot1x supplicant statistics 497
show aaa authentication port-access dot1x supplicant status 499
start-mode 501
Troubleshooting 502
Prerequisites 502
Packet capture 503
FAQ 504
Configurable RADIUS attributes (port access) 505
Configurable RADIUS attribute commands 505
aaa radius-attribute group 505
nas-id request-type 506
nas-id value 507
nas-ip-addr request-type authentication 508
nas-ip-addr service-type user-management 509
tunnel-private-group-id request-type 510
tunnel-private-group-id value 511
vsa vendor 512
Supported RADIUS attributes 513
Attributes supported in 802.1X authentication 513
Attributes supported in MAC authentication 513
Attributes supported in dynamic authorization 514
Session authorization attributes supported in 802.1X and MAC authentication, and CoA 514
Standard session attributes supported 514
Vendor-Specific Attributes supported in session authorization 515
Description of VSAs 515
Attributes supported in RADIUS network accounting 517
Attributes supported in RADIUS server tracking 517
Port security 518
Port-security sticky MAC 518
Basic operation 518
Default port security operation 518
Intruder protection 519
General operation for port security 519
Blocking unauthorized traffic 519
Trunk group exclusion 520
Port security commands 520
port-access port-security 520
port-access port-security client-limit 521
port-access port-security mac-address 522
show port-access port-security interface client-status 523
show port-access port-security interface port-statistics 524
sticky-learn enable 525
show port-access security violation sticky-mac-client-move interface 526
Fault Monitor 528
Fault monitoring conditions 528
Excessive broadcasts 528
Excessive multicasts 528
Excessive link flaps 528
Excessive oversize packets 528
Excessive jabbers 528
Excessive fragments 528
Excessive CRC errors 529
Excessive late collisions 529
Excessive collisions 529
Excessive TX drops 529
Excessive alignment errors 529
Fault monitor commands 529
(Fault enabling/disabling) 529
action 531
apply fault-monitor profile 533
fault-monitor profile 534
show fault-monitor profile 535
show interface fault-monitor profile 536
show interface fault-monitor status 537
show running-config 538
threshold 540
Device fingerprinting 543
Supported protocols 543
Configuring device fingerprinting 544
Device fingerprinting commands 544
cdp 544
client device-fingerprint apply-profile 545
client device-fingerprint client-limit 546
client device-fingerprint profile 546
dhcp 547
http user-agent 548
lldp (device fingerprinting) 549
show client device-fingerprint 550
show client device-fingerprint active 552
show client device-fingerprint profile 553
AOS-CX 10.12 Security Guide | (4100i, 6000, 6100 Switch Series) 13
Contents |14
Configuring enhanced security 555
Configuring enhanced security 555
Configuring remote logging using SSH reverse tunnel 556
CLI user session management commands 557
cli-session 557
Auditors and auditing tasks 560
Auditing tasks (CLI) 560
Auditing tasks (Web UI) 560
REST requests and accounting logs 561
Support and Other Resources 562
Accessing Aruba Support 562
Accessing Updates 563
Aruba Support Portal 563
My Networking 563
Warranty Information 563
Regulatory Information 563
Documentation Feedback 564
Chapter 1
About this document
About this document
This document describes features of the AOS-CX network operating system. It is intended for
administrators responsible for installing, configuring, and managing Aruba switches on a network.
Applicable products
This document applies to the following products:
nAruba 4100i Switch Series (JL817A, JL818A)
nAruba 6000 Switch Series (R8N85A, R8N86A, R8N87A, R8N88A, R8N89A, R9Y03A)
nAruba 6100 Switch Series (JL675A, JL676A, JL677A, JL678A, JL679A)
Latest version available online
Updates to this document can occur after initial publication. For the latest versions of product
documentation, see the links provided in Support and Other Resources.
Command syntax notation conventions
Convention Usage
example-text Identifies commands and their options and operands, code examples,
filenames, pathnames, and output displayed in a command window. Items
that appear like the example text in the previous column are to be entered
exactly as shown and are required unless enclosed in brackets ([ ]).
example-text In code and screen examples, indicates text entered by a user.
Any of the following:
n<example-text>
n<example-text>
nexample-text
nexample-text
Identifies a placeholder—such as a parameter or a variable—that you must
substitute with an actual value in a command or in code:
nFor output formats where italic text cannot be displayed, variables
are enclosed in angle brackets (< >). Substitute the text—including
the enclosing angle brackets—with an actual value.
nFor output formats where italic text can be displayed, variables
might or might not be enclosed in angle brackets. Substitute the
text including the enclosing angle brackets, if any, with an actual
value.
|Vertical bar. A logical OR that separates multiple items from which you can
choose only one.
Any spaces that are on either side of the vertical bar are included for
readability and are not a required part of the command syntax.
AOS-CX 10.12 Security Guide | (4100i, 6000, 6100 Switch Series) 15
About this document |16
Convention Usage
{ } Braces. Indicates that at least one of the enclosed items is required.
[ ] Brackets. Indicates that the enclosed item or items are optional.
or
...
Ellipsis:
nIn code and screen examples, a vertical or horizontal ellipsis indicates an
omission of information.
nIn syntax using brackets and braces, an ellipsis indicates items that can be
repeated. When an item followed by ellipses is enclosed in brackets, zero
or more items can be specified.
About the examples
Examples in this document are representative and might not match your particular switch or
environment.
The slot and port numbers in this document are for illustration only and might be unavailable on your
switch.
Understanding the CLI prompts
When illustrating the prompts in the command line interface (CLI), this document uses the generic term
switch, instead of the host name of the switch. For example:
switch>
The CLI prompt indicates the current command context. For example:
switch>
Indicates the operator command context.
switch#
Indicates the manager command context.
switch(CONTEXT-NAME)#
Indicates the configuration context for a feature. For example:
switch(config-if)#
Identifies the interface context.
Variable information in CLI prompts
In certain configuration contexts, the prompt may include variable information. For example, when in
the VLAN configuration context, a VLAN number appears in the prompt:
switch(config-vlan-100)#
When referring to this context, this document uses the syntax:
switch(config-vlan-<VLAN-ID>)#
Where <VLAN-ID> is a variable representing the VLAN number.
Identifying switch ports and interfaces
Physical ports on the switch and their corresponding logical software interfaces are identified using the
format:
member/slot/port
On the 4100i Switch Series
nmember: Always 1. VSF is not supported on this switch.
nslot: Always 1. This is not a modular switch, so there are no slots.
nport: Physical number of a port on the switch.
For example, the logical interface 1/1/4 in software is associated with physical port 4 on the switch.
On the 6000 and 6100 Switch Series
nmember: Always 1. VSF is not supported on this switch.
nslot: Always 1. This is not a modular switch, so there are no slots.
nport: Physical number of a port on the switch.
For example, the logical interface 1/1/4 in software is associated with physical port 4 on the switch.
AOS-CX 10.12 Security Guide | (4100i, 6000, 6100 Switch Series) 17
Chapter 2
About security
About security
This AOS-CX Switch provides the following security features:
nLocal user and group management.
nAuthentication, Authorization, and Accounting (AAA), either local (password or SSH public key-based),
or remote password-based TACACS+ or RADIUS.
nSSH server. SSH is a cryptographic protocol that encrypts all communication between devices.
nAbility to use enhanced security as described in Configuring enhanced security .
nMaking sensitive switch configuration information available for secure export/import between
switches. For information, see service export-password.
About Authentication, Authorization, and Accounting (AAA)
nAuthentication: identifies users, validates their credentials, and grants switch access.
nAuthorization: controls authenticated users command execution and switch interaction privileges.
nAccounting: collects and manages user session activity logs for auditing and reporting purposes.
Local AAA on your Aruba switch provides:
nAuthentication using local password or SSH public key.
nAuthorization using role-based access control (RBAC), and optionally, using user-defined local user
groups with command authorization rules defined per group.
nAccounting of user activity on the switch using accounting logs.
Remote AAA provides the following for your Aruba switch:
nAuthentication using remote AAA servers with either TACACS+ or RADIUS.
nAuthorization using remote AAA servers with TACACS+ fine-grained command authorization. Local
RBAC or local rule-based authorization is also possible.
nTransmission of locally collected accounting information to remote TACACS+ and RADIUS servers.
TACACS+ (Terminal Access Controller Access-Control System Plus) and RADIUS (Remote Authentication Dial-In
User Service) server software is readily available as either open source or from various vendors.
For switches that support multiple management modules such as the Aruba 8400, all AAA functionality discussed
only applies to the active management module. See also AAA on switches with multiple management modules in the
High Availability Guide.
AOS-CX 10.12 Security Guide | (4100i, 6000, 6100 Switch Series) 18
Chapter 3
Managing users and groups
Managing users and groups
Default user admin
A factory-default switch comes with a single user named admin.
The admin user:
nHas an empty password. Press Enter in response to the admin password prompt. At initial boot, you
are prompted to define a password for the admin user. Although empty (blank) passwords are
allowed, it is recommended that you use strong passwords for all production switches.
nIs a member of the administrators group.
nCannot be removed from the switch.
The switch admin user is distinct from the Service OS admin user. The Service OS acts as the bootloader and
recovery operating system. The Service OS has its own CLI.
Example of first login with password setting
switch login: admin
Password:
Please configure the 'admin' user account password.
Enter new password: ********
Confirm new password: ********
switch#
Built-in user groups and their privileges
The switch provides the following built-in user groups with corresponding roles. Each of these roles
comes with a set of privileges.
Group/Role Privileges
administrators Administrators have full privileges, including:
nFull CLI access.
nPerforming firmware upgrades.
nViewing switch configuration information, including sensitive information such as
passwords which are displayed as ciphertext.
nPerforming switch configuration.
nAdding/removing user accounts.
nConfiguring users accounts, including passwords. Once set, a password cannot be
deleted or set to empty.
AOS-CX 10.12 Security Guide | (4100i, 6000, 6100 Switch Series) 19
Managing users and groups |20
Group/Role Privileges
nREST API: All methods (GET, PUT, POST, DELETE) and switch resources are available.
The privilege level for administrators is 15.
operators Operators have no switch configuration privileges. Operators are restricted to:
nBasic display-only CLI access.
nViewing of nonsensitive switch configuration information.
nREST API: Other than the \login and \logout resources, only the GET method is
available.
The privilege level for operators is 1.
auditors Auditors are restricted to functions related to auditing only:
nCLI: Access to commands in the auditor context (auditor>) only.
nWeb UI: Access to the System > Log page only.
nREST API: POST method available for the \login and \logout resources. GET
method available for the following resources only:
oAudit log: /logs/audit
oEvent log: /logs/event
The privilege level for auditors is 19.
User-defined user groups
The switch enables you to create up to 29 user-defined local user groups, for the purpose of configuring
local authorization. Each of the 29 user-defined groups support up to 1024 CLI command authorization
rules that define what CLI commands can be executed by members of the group.
The local user groups with their command execution rules are useful for the following:
nProviding authorization for use with RADIUS servers.
nProviding fallback authorization for use with TACACS+ servers.
nProviding authorization when neither RADIUS or TACACS+ servers are used.
User name requirements
Specifies the user name. Requirements:
nMust start with a lowercase letter.
nCan contain numbers and lowercase letters.
nCan include only these three special characters: hyphens ( - ), dots ( . ), and underscores ( _ ).
nCan have a maximum of 32 characters.
nCannot be empty.
nCannot contain uppercase letters.
nCannot be: admin, root, or remote_user.
nCannot be Linux reserved names such as:
daemon,bin,sys,sync,proxy,www-data,backup,list,irc,gnats,nobody,systemd-bus-proxy,
sshd,messagebus,rpc,systemd-journal-gateway,systemd-journal-remote,systemd-journal-
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335
  • Page 336 336
  • Page 337 337
  • Page 338 338
  • Page 339 339
  • Page 340 340
  • Page 341 341
  • Page 342 342
  • Page 343 343
  • Page 344 344
  • Page 345 345
  • Page 346 346
  • Page 347 347
  • Page 348 348
  • Page 349 349
  • Page 350 350
  • Page 351 351
  • Page 352 352
  • Page 353 353
  • Page 354 354
  • Page 355 355
  • Page 356 356
  • Page 357 357
  • Page 358 358
  • Page 359 359
  • Page 360 360
  • Page 361 361
  • Page 362 362
  • Page 363 363
  • Page 364 364
  • Page 365 365
  • Page 366 366
  • Page 367 367
  • Page 368 368
  • Page 369 369
  • Page 370 370
  • Page 371 371
  • Page 372 372
  • Page 373 373
  • Page 374 374
  • Page 375 375
  • Page 376 376
  • Page 377 377
  • Page 378 378
  • Page 379 379
  • Page 380 380
  • Page 381 381
  • Page 382 382
  • Page 383 383
  • Page 384 384
  • Page 385 385
  • Page 386 386
  • Page 387 387
  • Page 388 388
  • Page 389 389
  • Page 390 390
  • Page 391 391
  • Page 392 392
  • Page 393 393
  • Page 394 394
  • Page 395 395
  • Page 396 396
  • Page 397 397
  • Page 398 398
  • Page 399 399
  • Page 400 400
  • Page 401 401
  • Page 402 402
  • Page 403 403
  • Page 404 404
  • Page 405 405
  • Page 406 406
  • Page 407 407
  • Page 408 408
  • Page 409 409
  • Page 410 410
  • Page 411 411
  • Page 412 412
  • Page 413 413
  • Page 414 414
  • Page 415 415
  • Page 416 416
  • Page 417 417
  • Page 418 418
  • Page 419 419
  • Page 420 420
  • Page 421 421
  • Page 422 422
  • Page 423 423
  • Page 424 424
  • Page 425 425
  • Page 426 426
  • Page 427 427
  • Page 428 428
  • Page 429 429
  • Page 430 430
  • Page 431 431
  • Page 432 432
  • Page 433 433
  • Page 434 434
  • Page 435 435
  • Page 436 436
  • Page 437 437
  • Page 438 438
  • Page 439 439
  • Page 440 440
  • Page 441 441
  • Page 442 442
  • Page 443 443
  • Page 444 444
  • Page 445 445
  • Page 446 446
  • Page 447 447
  • Page 448 448
  • Page 449 449
  • Page 450 450
  • Page 451 451
  • Page 452 452
  • Page 453 453
  • Page 454 454
  • Page 455 455
  • Page 456 456
  • Page 457 457
  • Page 458 458
  • Page 459 459
  • Page 460 460
  • Page 461 461
  • Page 462 462
  • Page 463 463
  • Page 464 464
  • Page 465 465
  • Page 466 466
  • Page 467 467
  • Page 468 468
  • Page 469 469
  • Page 470 470
  • Page 471 471
  • Page 472 472
  • Page 473 473
  • Page 474 474
  • Page 475 475
  • Page 476 476
  • Page 477 477
  • Page 478 478
  • Page 479 479
  • Page 480 480
  • Page 481 481
  • Page 482 482
  • Page 483 483
  • Page 484 484
  • Page 485 485
  • Page 486 486
  • Page 487 487
  • Page 488 488
  • Page 489 489
  • Page 490 490
  • Page 491 491
  • Page 492 492
  • Page 493 493
  • Page 494 494
  • Page 495 495
  • Page 496 496
  • Page 497 497
  • Page 498 498
  • Page 499 499
  • Page 500 500
  • Page 501 501
  • Page 502 502
  • Page 503 503
  • Page 504 504
  • Page 505 505
  • Page 506 506
  • Page 507 507
  • Page 508 508
  • Page 509 509
  • Page 510 510
  • Page 511 511
  • Page 512 512
  • Page 513 513
  • Page 514 514
  • Page 515 515
  • Page 516 516
  • Page 517 517
  • Page 518 518
  • Page 519 519
  • Page 520 520
  • Page 521 521
  • Page 522 522
  • Page 523 523
  • Page 524 524
  • Page 525 525
  • Page 526 526
  • Page 527 527
  • Page 528 528
  • Page 529 529
  • Page 530 530
  • Page 531 531
  • Page 532 532
  • Page 533 533
  • Page 534 534
  • Page 535 535
  • Page 536 536
  • Page 537 537
  • Page 538 538
  • Page 539 539
  • Page 540 540
  • Page 541 541
  • Page 542 542
  • Page 543 543
  • Page 544 544
  • Page 545 545
  • Page 546 546
  • Page 547 547
  • Page 548 548
  • Page 549 549
  • Page 550 550
  • Page 551 551
  • Page 552 552
  • Page 553 553
  • Page 554 554
  • Page 555 555
  • Page 556 556
  • Page 557 557
  • Page 558 558
  • Page 559 559
  • Page 560 560
  • Page 561 561
  • Page 562 562
  • Page 563 563
  • Page 564 564

Aruba 4100i User guide

Category
Software
Type
User guide
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI