Aruba Security Configuration Guide

Category
Software
Type
Configuration Guide
HPE FlexFabric 5940 & 5930 Switch Series
Security Configuration Guide
P
art number: 5200-4882c
Software
version: Release 2609 and later
Document version: 6W103-20200310
© Copyright 2020 Hewlett Packard Enterprise Development LP
The information contained herein is subject to change without notice. The only warranties for Hewlett Packard
Enterprise products and services are set forth in the express warranty statements accompanying such
products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett
Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or
copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s
standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard
Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise
website.
Acknowledgments
Intel®, Itanium®, Pentium®, Intel Inside®, and the Intel Inside logo are trademarks of Intel Corporation in the
United States and other countries.
Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries.
Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated.
Java and Oracle are registered trademarks of Oracle and/or its affiliates.
UNIX® is a registered trademark of The Open Group.
i
Contents
Configuring AAA ···························································································· 1
Overview ···························································································································································· 1
RADIUS ······················································································································································ 2
HWTACACS ··············································································································································· 6
LDAP ·························································································································································· 9
AAA implementation on the device ·········································································································· 12
AAA for MPLS L3VPNs ···························································································································· 14
Protocols and standards ·························································································································· 14
RADIUS attributes ···································································································································· 14
FIPS compliance ·············································································································································· 19
AAA configuration considerations and task list ································································································ 19
Configuring AAA schemes ······························································································································· 20
Configuring local users ····························································································································· 20
Configuring RADIUS schemes ················································································································· 25
Configuring HWTACACS schemes ·········································································································· 37
Configuring LDAP schemes ····················································································································· 43
Configuring AAA methods for ISP domains ····································································································· 47
Configuration prerequisites ······················································································································ 48
Creating an ISP domain ··························································································································· 48
Configuring ISP domain attributes ··········································································································· 49
Configuring authentication methods for an ISP domain ··········································································· 50
Configuring authorization methods for an ISP domain ············································································· 51
Configuring accounting methods for an ISP domain ················································································ 52
Configuring the RADIUS session-control feature ····························································································· 54
Configuring the RADIUS DAS feature·············································································································· 54
Changing the DSCP priority for RADIUS packets ···························································································· 55
Configuring the RADIUS attribute translation feature ······················································································ 55
Setting the maximum number of concurrent login users ·················································································· 57
Configuring a NAS-ID profile ···························································································································· 57
Configuring the device ID ································································································································· 58
Configuring the connection recording policy ···································································································· 58
Displaying and maintaining AAA ······················································································································ 58
AAA configuration examples ···························································································································· 59
AAA for SSH users by an HWTACACS server ························································································ 59
Local authentication, HWTACACS authorization, and RADIUS accounting for SSH users ····················· 60
Authentication and authorization for SSH users by a RADIUS server ····················································· 62
Authentication for SSH users by an LDAP server ···················································································· 65
AAA for 802.1X users by a RADIUS server ····························································································· 68
Troubleshooting RADIUS ································································································································· 73
RADIUS authentication failure ················································································································· 73
RADIUS packet delivery failure ················································································································ 74
RADIUS accounting error ························································································································· 74
Troubleshooting HWTACACS ·························································································································· 74
Troubleshooting LDAP ····································································································································· 75
LDAP authentication failure ······················································································································ 75
802.1X overview ·························································································· 76
802.1X architecture ·········································································································································· 76
Controlled/uncontrolled port and port authorization status ·············································································· 76
802.1X-related protocols ·································································································································· 77
Packet formats ········································································································································· 77
EAP over RADIUS ··································································································································· 78
802.1X authentication initiation ························································································································ 79
802.1X client as the initiator ····················································································································· 79
Access device as the initiator ··················································································································· 79
802.1X authentication procedures ··················································································································· 80
Comparing EAP relay and EAP termination ····························································································· 80
ii
EAP relay ················································································································································· 81
EAP termination ······································································································································· 82
Configuring 802.1X ······················································································ 84
Access control methods ··································································································································· 84
802.1X VLAN manipulation ······························································································································ 84
Authorization VLAN ·································································································································· 84
Guest VLAN ············································································································································· 87
Auth-Fail VLAN ········································································································································ 88
Critical VLAN ············································································································································ 89
Critical voice VLAN ·································································································································· 90
802.1X VSI manipulation·································································································································· 91
802.1X support for VXLANs ····················································································································· 91
Authorization VSI ····································································································································· 91
Guest VSI ················································································································································· 92
Auth-Fail VSI ············································································································································ 92
Critical VSI ··············································································································································· 93
Using 802.1X authentication with other features······························································································ 93
ACL assignment ······································································································································· 93
User profile assignment ··························································································································· 94
EAD assistant ··········································································································································· 94
Redirect URL assignment ························································································································ 94
802.1X configuration restrictions and guidelines······························································································ 95
Configuration prerequisites ······························································································································ 95
802.1X configuration task list ··························································································································· 95
Enabling 802.1X ··············································································································································· 96
Enabling EAP relay or EAP termination ··········································································································· 97
Setting the port authorization state ·················································································································· 97
Specifying an access control method··············································································································· 98
Setting the maximum number of concurrent 802.1X users on a port ······························································· 98
Setting the maximum number of authentication request attempts ··································································· 98
Setting the 802.1X authentication timeout timers ···························································································· 99
Configuring online user handshake·················································································································· 99
Configuration restrictions and guidelines ······························································································· 100
Configuration procedure ························································································································· 100
Configuring the authentication trigger feature ································································································ 100
Configuration restrictions and guidelines ······························································································· 100
Configuration procedure ························································································································· 101
Specifying a mandatory authentication domain on a port ·············································································· 101
Setting the quiet timer ···································································································································· 101
Configuring 802.1X reauthentication ·············································································································· 102
Overview ················································································································································ 102
Configuration restrictions and guidelines ······························································································· 102
Configuring 802.1X periodic reauthentication ························································································ 103
Configuring 802.1X manual reauthentication ························································································· 103
Enabling the keep-online feature ··········································································································· 103
Configuring an 802.1X guest VLAN ··············································································································· 104
Configuration and restrictions and guidelines ························································································ 104
Configuration prerequisites ···················································································································· 104
Configuration procedure ························································································································· 104
Enabling 802.1X guest VLAN assignment delay···························································································· 105
Configuring an 802.1X Auth-Fail VLAN·········································································································· 105
Configuration and restrictions and guidelines ························································································ 105
Configuration prerequisites ···················································································································· 106
Configuration procedure ························································································································· 106
Configuring an 802.1X critical VLAN ·············································································································· 106
Configuration restrictions and guidelines ······························································································· 106
Configuration prerequisites ···················································································································· 107
Configuring the 802.1X critical VLAN on a port······················································································ 107
Sending EAP-Success packets on assignment of users to the 802.1X critical VLAN ··························· 107
Enabling the 802.1X critical voice VLAN ········································································································ 108
Configuration restrictions and guidelines ······························································································· 108
iii
Configuration prerequisites ···················································································································· 108
Configuration procedure ························································································································· 108
Configuring an 802.1X guest VSI ··················································································································· 108
Configuration restrictions and guidelines ······························································································· 108
Configuration prerequisites ···················································································································· 108
Configuration procedure ························································································································· 108
Enabling 802.1X guest VSI assignment delay ······························································································· 109
Overview ················································································································································ 109
Configuration procedure ························································································································· 109
Configuring an 802.1X Auth-Fail VSI ············································································································· 110
Configuration restrictions and guidelines ······························································································· 110
Configuration prerequisites ···················································································································· 110
Configuration procedure ························································································································· 110
Configuring an 802.1X critical VSI ················································································································· 110
Configuration restrictions and guidelines ······························································································· 110
Configuration prerequisites ···················································································································· 110
Configuration procedure ························································································································· 111
Specifying supported domain name delimiters ······························································································ 111
Enabling 802.1X user IP freezing··················································································································· 111
Removing the VLAN tags of 802.1X protocol packets sent out of a port ······················································· 112
Overview ················································································································································ 112
Configuration restrictions and guidelines ······························································································· 112
Configuration prerequisites ···················································································································· 112
Configuration procedure ························································································································· 112
Setting the maximum number of 802.1X authentication attempts for MAC authenticated users ··················· 113
Configuring 802.1X MAC address binding ····································································································· 113
Overview ················································································································································ 113
Configuration restrictions and guidelines ······························································································· 113
Configuration procedure ························································································································· 114
Enabling 802.1X user logging ························································································································ 114
Overview ················································································································································ 114
Configuration restrictions and guidelines ······························································································· 114
Configuration procedure ························································································································· 114
Configuring the EAD assistant feature ··········································································································· 115
Configuration restrictions and guidelines ······························································································· 115
Configuration procedure ························································································································· 115
Displaying and maintaining 802.1X ················································································································ 115
802.1X authentication configuration examples ······························································································ 116
Basic 802.1X authentication configuration example ·············································································· 116
802.1X guest VLAN and authorization VLAN configuration example ···················································· 118
802.1X with ACL assignment configuration example ············································································· 121
802.1X guest VSI and authorization VSI configuration example···························································· 122
802.1X with EAD assistant configuration example (with DHCP relay agent) ········································· 125
802.1X with EAD assistant configuration example (with DHCP server) ················································· 127
Troubleshooting 802.1X ································································································································· 130
EAD assistant URL redirection failure ···································································································· 130
Configuring MAC authentication ································································ 131
Overview ························································································································································ 131
User account policies ····························································································································· 131
Authentication methods ·························································································································· 131
VLAN assignment ·········································································································································· 132
Authorization VLAN ································································································································ 132
Guest VLAN ··········································································································································· 134
Critical VLAN ·········································································································································· 134
Critical voice VLAN ································································································································ 135
VSI manipulation ············································································································································ 136
MAC authentication support for VXLANs ······························································································· 136
Authorization VSI ··································································································································· 136
Guest VSI ··············································································································································· 137
Critical VSI ············································································································································· 137
ACL assignment ············································································································································· 138
iv
User profile assignment ································································································································· 138
Redirect URL assignment ······························································································································ 138
Blackhole MAC attribute assignment ············································································································· 139
Configuration prerequisites ···························································································································· 139
Configuration restrictions and guidelines ······································································································· 139
Configuration task list ····································································································································· 140
Enabling MAC authentication ························································································································· 140
Specifying a MAC authentication domain ······································································································ 141
Configuring the user account format ·············································································································· 141
Configuring MAC authentication timers·········································································································· 142
Setting the maximum number of concurrent MAC authentication users on a port ········································· 142
Enabling MAC authentication multi-VLAN mode on a port ············································································ 143
Configuring MAC authentication delay ··········································································································· 143
Enabling parallel processing of MAC authentication and 802.1X authentication ··········································· 144
Configuration restrictions and guidelines ······························································································· 144
Configuration procedure ························································································································· 144
Configuring a MAC authentication guest VLAN ····························································································· 145
Configuring a MAC authentication critical VLAN ···························································································· 145
Enabling the MAC authentication critical voice VLAN ···················································································· 146
Configuration prerequisites ···················································································································· 146
Configuration procedure ························································································································· 147
Configuring a MAC authentication guest VSI ································································································· 147
Configuration restrictions and guidelines ······························································································· 147
Configuration prerequisites ···················································································································· 147
Configuration procedure ························································································································· 147
Configuring a MAC authentication critical VSI ······························································································· 148
Configuration restrictions and guidelines ······························································································· 148
Configuration prerequisites ···················································································································· 148
Configuration procedure ························································································································· 148
Configuring periodic MAC reauthentication···································································································· 148
Overview ················································································································································ 148
Configuration restrictions and guidelines ······························································································· 149
Configuration procedure ························································································································· 149
Including user IP addresses in MAC authentication requests ········································································ 150
Overview ················································································································································ 150
Configuration restrictions and guidelines ······························································································· 150
Configuration procedure ························································································································· 151
Enabling MAC authentication offline detection ······························································································ 151
Enabling MAC authentication user logging ···································································································· 151
Overview ················································································································································ 151
Configuration restrictions and guidelines ······························································································· 151
Configuration procedure ························································································································· 151
Displaying and maintaining MAC authentication ···························································································· 152
MAC authentication configuration examples ·································································································· 152
Local MAC authentication configuration example ·················································································· 152
RADIUS-based MAC authentication configuration example ·································································· 154
ACL assignment configuration example ································································································· 157
MAC authentication authorization VSI assignment configuration example ············································ 159
Configuring portal authentication ······························································· 162
Overview ························································································································································ 162
Extended portal functions ······················································································································· 162
Portal system components ····················································································································· 162
Portal system using the local portal Web server ···················································································· 164
Interaction between portal system components ····················································································· 164
Portal authentication modes ··················································································································· 165
Portal support for EAP ··························································································································· 165
Portal authentication process ················································································································· 166
Portal filtering rules ································································································································ 168
Configuration restrictions and guidelines ······································································································· 168
Portal configuration task list ··························································································································· 168
Configuration prerequisites ···························································································································· 169
v
Configuring a portal authentication server ····································································································· 170
Configuring a portal Web server ···················································································································· 170
Enabling portal authentication ························································································································ 172
Configuration restrictions and guidelines ······························································································· 172
Configuration procedure ························································································································· 172
Specifying a portal Web server ······················································································································ 173
Controlling portal user access ························································································································ 173
Configuring a portal-free rule ················································································································· 173
Configuring an authentication source subnet ························································································· 174
Configuring an authentication destination subnet ·················································································· 175
Setting the maximum number of portal users ························································································ 176
Specifying a portal authentication domain ····························································································· 176
Specifying a preauthentication domain ·································································································· 177
Specifying a preauthentication IP address pool for portal users ···························································· 178
Configuring support of Web proxy for portal authentication ··································································· 179
Enabling strict-checking on portal authorization information ·································································· 180
Allowing only users with DHCP-assigned IP addresses to pass portal authentication ·························· 180
Configuring portal detection features ············································································································· 180
Configuring online detection of portal users ··························································································· 180
Configuring portal authentication server detection ················································································· 181
Configuring portal Web server detection ································································································ 182
Configuring portal user synchronization ································································································· 183
Configuring the portal fail-permit feature ········································································································ 184
Configuring BAS-IP for portal packets sent to the portal authentication server ············································· 184
Enabling portal roaming ································································································································· 185
Specifying a format for the NAS-Port-Id attribute ··························································································· 186
Specifying the device ID································································································································· 186
Logging out online portal users ······················································································································ 186
Configuring Web redirect ······························································································································· 187
Applying a NAS-ID profile to an interface ······································································································ 187
Configuring the local portal Web server feature ····························································································· 188
Customizing authentication pages ········································································································· 188
Configuring a local portal Web server ···································································································· 190
Disabling the Rule ARP or ND entry feature for portal clients ······································································· 191
Enabling logging for user logins and logouts ································································································· 191
Displaying and maintaining portal ·················································································································· 192
Portal configuration examples ························································································································ 192
Configuring direct portal authentication·································································································· 192
Configuring re-DHCP portal authentication ···························································································· 200
Configuring cross-subnet portal authentication ······················································································ 204
Configuring extended direct portal authentication ·················································································· 207
Configuring extended re-DHCP portal authentication ············································································ 211
Configuring extended cross-subnet portal authentication ······································································ 215
Configuring portal server detection and portal user synchronization ····················································· 218
Configuring cross-subnet portal authentication for MPLS L3VPNs························································ 226
Configuring direct portal authentication with a preauthentication domain ·············································· 228
Configuring re-DHCP portal authentication with a preauthentication domain ········································ 230
Configuring direct portal authentication using local portal Web server ·················································· 232
Troubleshooting portal ··································································································································· 235
No portal authentication page is pushed for users ················································································· 235
Cannot log out portal users on the access device ················································································· 236
Cannot log out portal users on the RADIUS server ··············································································· 236
Users logged out by the access device still exist on the portal authentication server ···························· 236
Re-DHCP portal authenticated users cannot log in successfully ··························································· 237
Configuring Web authentication ································································· 238
About Web authentication ······························································································································ 238
Advantages of Web authentication ········································································································ 238
Web authentication system ···················································································································· 238
Web authentication process ··················································································································· 239
Web authentication support for VLAN assignment ················································································ 239
Web authentication support for authorization ACLs ··············································································· 240
vi
Restrictions and guidelines: Web authentication configuration ······································································ 240
Web authentication task at a glance ·············································································································· 241
Prerequisites for Web authentication ············································································································· 241
Configuring a Web authentication server ······································································································· 242
Enabling Web authentication ························································································································· 242
Specifying a Web authentication domain ······································································································· 243
Setting the redirection wait time ····················································································································· 243
Configuring a Web authentication-free subnet ······························································································· 244
Setting the maximum number of Web authentication users ·········································································· 244
Configuring online Web authentication user detection ··················································································· 245
Configuring an Auth-Fail VLAN ······················································································································ 245
Configuring Web authentication to support Web proxy ·················································································· 246
Display and maintenance commands for Web authentication ······································································· 246
Web authentication configuration examples ·································································································· 247
Example: Configuring Web authentication by using the local authentication method ···························· 247
Example: Configuring Web authentication by using the RADIUS authentication method······················ 248
Troubleshooting Web authentication ············································································································· 250
Failure to come online (local authentication interface using the default ISP domain ····························· 250
Configuring triple authentication ································································ 252
About triple authentication ····························································································································· 252
Typical network of triple authentication ·································································································· 252
Triple authentication mechanism ··········································································································· 252
Triple authentication support for VLAN assignment ··············································································· 253
Triple authentication support for ACL authorization ··············································································· 253
Triple authentication support for online user detection ·········································································· 254
Restrictions and guidelines: Triple authentication ·························································································· 254
Triple authentication tasks at a glance ··········································································································· 254
Triple authentication configuration examples ································································································· 254
Example: Configuring basic triple authentication ··················································································· 254
Example: Configuring triple authentication to support authorization VLAN and authentication failure VLAN
······························································································································································· 258
Configuring port security ············································································ 264
Overview ························································································································································ 264
Port security features ····························································································································· 264
Port security modes ······························································································································· 264
Configuration restrictions and guidelines ······································································································· 267
Configuration task list ····································································································································· 267
Enabling port security····································································································································· 268
Setting port security's limit on the number of secure MAC addresses on a port ············································ 268
Setting the port security mode ······················································································································· 269
Configuring port security features ·················································································································· 270
Configuring NTK ····································································································································· 270
Configuring intrusion protection ············································································································· 271
Configuring secure MAC addresses ·············································································································· 271
Configuration prerequisites ···················································································································· 272
Configuration procedure ························································································································· 272
Ignoring authorization information from the server························································································· 273
Enabling MAC move ······································································································································ 273
Enabling the authorization-fail-offline feature ································································································· 274
Overview ················································································································································ 274
Configuration prerequisites ···················································································································· 274
Configuration procedure ························································································································· 274
Setting port security's limit on the number of MAC addresses for specific VLANs on a port ························· 275
Overview ················································································································································ 275
Configuration restrictions and guidelines ······························································································· 275
Configuration procedure ························································································································· 275
Applying a NAS-ID profile to port security ······································································································ 275
Configuring open authentication mode ·········································································································· 276
Overview ················································································································································ 276
Configuration restrictions and guidelines ······························································································· 276
vii
Configuration procedure ························································································································· 277
Configuring the escape critical VSI feature ···································································································· 277
About the escape critical VSI feature ····································································································· 277
Configuration restrictions and guidelines ······························································································· 277
Configuration prerequisites ···················································································································· 278
Configuration procedure ························································································································· 278
Enabling port security user logging ················································································································ 278
Overview ················································································································································ 278
Configuration restrictions and guidelines ······························································································· 278
Configuration procedure ························································································································· 278
Enabling SNMP notifications for port security ································································································ 279
Displaying and maintaining port security········································································································ 279
Port security configuration examples ············································································································· 279
autoLearn configuration example ··········································································································· 279
userLoginWithOUI configuration example······························································································ 282
macAddressElseUserLoginSecure configuration example ···································································· 284
Troubleshooting port security ························································································································· 288
Cannot set the port security mode ········································································································· 288
Cannot configure secure MAC addresses ····························································································· 289
Configuring user profiles ············································································ 290
Overview ························································································································································ 290
Configuration restrictions and guidelines ······································································································· 290
Configuring a user profile ······························································································································· 290
Displaying and maintaining user profiles········································································································ 290
User profile configuration example ················································································································ 291
Network requirements ···························································································································· 291
Configuration procedure ························································································································· 291
Verifying the configuration ······················································································································ 294
Configuring password control ···································································· 295
Overview ························································································································································ 295
Password setting ···································································································································· 295
Password updating and expiration ········································································································· 296
User login control ··································································································································· 297
Password not displayed in any form ······································································································ 298
Logging ·················································································································································· 298
FIPS compliance ············································································································································ 298
Password control configuration task list ········································································································· 298
Enabling password control ····························································································································· 299
Setting global password control parameters ·································································································· 300
Setting user group password control parameters ·························································································· 302
Setting local user password control parameters ···························································································· 303
Setting super password control parameters··································································································· 304
Displaying and maintaining password control ································································································ 304
Password control configuration example ······································································································· 305
Network requirements ···························································································································· 305
Configuration procedure ························································································································· 305
Verifying the configuration ······················································································································ 306
Configuring keychains ··············································································· 308
Overview ························································································································································ 308
Configuration procedure································································································································· 308
Displaying and maintaining keychain ············································································································· 309
Keychain configuration example ···················································································································· 309
Network requirements ···························································································································· 309
Configuration procedure ························································································································· 309
Verifying the configuration ······················································································································ 311
Managing public keys ················································································ 314
Overview ························································································································································ 314
FIPS compliance ············································································································································ 314
viii
Creating a local key pair································································································································· 314
Distributing a local host public key ················································································································· 316
Exporting a host public key ···················································································································· 316
Displaying a host public key ··················································································································· 316
Destroying a local key pair ····························································································································· 317
Configuring a peer host public key ················································································································· 317
Importing a peer host public key from a public key file ·········································································· 317
Entering a peer host public key ·············································································································· 318
Displaying and maintaining public keys ········································································································· 318
Examples of public key management ············································································································ 318
Example for entering a peer host public key ·························································································· 318
Example for importing a public key from a public key file ······································································ 320
Configuring PKI ························································································· 323
Overview ························································································································································ 323
PKI terminology ······································································································································ 323
PKI architecture ······································································································································ 324
PKI operation ········································································································································· 324
PKI applications ····································································································································· 325
Support for MPLS L3VPN ······················································································································ 325
FIPS compliance ············································································································································ 326
PKI configuration task list ······························································································································· 326
Configuring a PKI entity ································································································································· 326
Configuring a PKI domain ······························································································································ 327
Requesting a certificate·································································································································· 329
Configuration guidelines ························································································································· 329
Configuring automatic certificate request ······························································································· 330
Manually requesting a certificate············································································································ 330
Aborting a certificate request ························································································································· 331
Obtaining certificates······································································································································ 331
Configuration prerequisites ···················································································································· 331
Configuration guidelines ························································································································· 331
Configuration procedure ························································································································· 332
Verifying PKI certificates ································································································································ 332
Verifying certificates with CRL checking ································································································ 333
Verifying certificates without CRL checking ··························································································· 333
Specifying the storage path for the certificates and CRLs ············································································· 334
Exporting certificates ······································································································································ 334
Removing a certificate···································································································································· 335
Configuring a certificate-based access control policy ···················································································· 335
Displaying and maintaining PKI ····················································································································· 336
PKI configuration examples ··························································································································· 336
Requesting a certificate from an RSA Keon CA server·········································································· 337
Requesting a certificate from a Windows Server 2003 CA server ························································· 339
Requesting a certificate from an OpenCA server··················································································· 343
Certificate-based access control policy configuration example······························································ 346
Certificate import and export configuration example ·············································································· 347
Troubleshooting PKI configuration ················································································································· 352
Failed to obtain the CA certificate ·········································································································· 353
Failed to obtain local certificates ············································································································ 353
Failed to request local certificates ·········································································································· 354
Failed to obtain CRLs ····························································································································· 354
Failed to import the CA certificate ·········································································································· 355
Failed to import a local certificate··········································································································· 356
Failed to export certificates ···················································································································· 356
Failed to set the storage path ················································································································· 357
Configuring IPsec ······················································································ 358
Overview ························································································································································ 358
Security protocols and encapsulation modes························································································· 358
Security association ······························································································································· 360
Authentication and encryption ················································································································ 360
ix
IPsec implementation ····························································································································· 361
IPsec RRI ··············································································································································· 362
Protocols and standards ························································································································ 363
FIPS compliance ············································································································································ 363
IPsec tunnel establishment ···························································································································· 363
Implementing ACL-based IPsec····················································································································· 363
Configuring an ACL ································································································································ 364
Configuring an IPsec transform set ········································································································ 365
Configuring a manual IPsec policy ········································································································· 367
Configuring an IKE-based IPsec policy ·································································································· 368
Applying an IPsec policy to an interface ································································································ 372
Enabling ACL checking for de-encapsulated packets ············································································ 372
Configuring IPsec anti-replay ················································································································· 373
Configuring IPsec anti-replay redundancy ····························································································· 373
Binding a source interface to an IPsec policy ························································································ 374
Enabling QoS pre-classify ······················································································································ 375
Enabling logging of IPsec packets ········································································································· 375
Configuring the DF bit of IPsec packets ································································································· 375
Configuring IPsec RRI ···························································································································· 376
Configuring IPsec for IPv6 routing protocols ·································································································· 377
Configuration task list ····························································································································· 377
Configuring a manual IPsec profile ········································································································ 377
Configuring SNMP notifications for IPsec ······································································································ 379
Configuring IPsec fragmentation ···················································································································· 379
Setting the maximum number of IPsec tunnels ····························································································· 380
Displaying and maintaining IPsec ·················································································································· 380
IPsec configuration examples ························································································································ 380
Configuring a manual mode IPsec tunnel for IPv4 packets ··································································· 380
Configuring IPsec for RIPng ··················································································································· 383
Configuring IKE ························································································· 387
Overview ························································································································································ 387
IKE negotiation process ························································································································· 387
IKE security mechanism ························································································································· 388
Protocols and standards ························································································································ 389
FIPS compliance ············································································································································ 389
IKE configuration prerequisites ······················································································································ 389
IKE configuration task list ······························································································································· 389
Configuring an IKE profile ······························································································································ 390
Configuring an IKE proposal ·························································································································· 392
Configuring an IKE keychain ·························································································································· 393
Configuring the global identity information ····································································································· 394
Configuring the IKE keepalive feature ··········································································································· 394
Configuring the IKE NAT keepalive feature ··································································································· 395
Configuring IKE DPD ····································································································································· 395
Enabling invalid SPI recovery ························································································································ 396
Setting the maximum number of IKE SAs ······································································································ 396
Configuring SNMP notifications for IKE ········································································································· 397
Displaying and maintaining IKE ····················································································································· 397
IKE configuration examples ··························································································································· 398
Configuring an IKE-based IPsec tunnel for IPv4 packets ······································································ 398
Main mode IKE with pre-shared key authentication configuration example··········································· 400
Troubleshooting IKE······································································································································· 403
IKE negotiation failed because no matching IKE proposals were found ················································ 403
IKE negotiation failed because no IKE proposals or IKE keychains are specified correctly ·················· 404
IPsec SA negotiation failed because no matching IPsec transform sets were found ···························· 404
IPsec SA negotiation failed due to invalid identity information ······························································· 405
Configuring IKEv2 ······················································································ 408
Overview ························································································································································ 408
IKEv2 negotiation process ····················································································································· 408
New features in IKEv2 ···························································································································· 409
x
Protocols and standards ························································································································ 409
IKEv2 configuration task list ··························································································································· 409
Configuring an IKEv2 profile ·························································································································· 410
Configuring an IKEv2 policy ··························································································································· 413
Configuring an IKEv2 proposal ······················································································································ 413
Configuring an IKEv2 keychain ······················································································································ 415
Configure global IKEv2 parameters ··············································································································· 416
Enabling the cookie challenging feature ································································································ 416
Configuring the IKEv2 DPD feature ······································································································· 416
Configuring the IKEv2 NAT keepalive feature ························································································ 416
Displaying and maintaining IKEv2·················································································································· 417
IKEv2 configuration examples ······················································································································· 417
IKEv2 with pre-shared key authentication configuration example ·························································· 417
IKEv2 with RSA signature authentication configuration example ·························································· 422
IKEv2 with NAT traversal configuration example ··················································································· 430
Troubleshooting IKEv2 ··································································································································· 434
IKEv2 negotiation failed because no matching IKEv2 proposals were found ········································ 434
IPsec SA negotiation failed because no matching IPsec transform sets were found ···························· 435
IPsec tunnel establishment failed ··········································································································· 435
Configuring SSH ························································································ 436
Overview ························································································································································ 436
How SSH works ····································································································································· 436
SSH authentication methods ·················································································································· 437
SSH support for Suite B ························································································································· 438
FIPS compliance ············································································································································ 438
Configuring the device as an SSH server ······································································································ 439
SSH server configuration task list ·········································································································· 439
Generating local key pairs ······················································································································ 439
Specifying the SSH service port ············································································································· 440
Enabling the Stelnet server ···················································································································· 440
Enabling the SFTP server ······················································································································ 441
Enabling the SCP server ························································································································ 441
Enabling NETCONF over SSH ·············································································································· 441
Configuring the user lines for SSH login ································································································ 442
Configuring a client's host public key ····································································································· 442
Configuring an SSH user ······················································································································· 443
Configuring the SSH management parameters ····················································································· 444
Specifying a PKI domain for the SSH server ························································································· 446
Releasing SSH connections ··················································································································· 446
Configuring the device as an Stelnet client ···································································································· 446
Stelnet client configuration task list ········································································································ 446
Generating local key pairs ······················································································································ 447
Specifying the source IP address for SSH packets················································································ 447
Establishing a connection to an Stelnet server ······················································································ 448
Deleting server public keys saved in the public key file on the Stelnet client········································· 450
Establishing a connection to an Stelnet server based on Suite B ·························································· 450
Configuring the device as an SFTP client ······································································································ 450
SFTP client configuration task list ·········································································································· 450
Generating local key pairs ······················································································································ 451
Specifying the source IP address for SFTP packets ·············································································· 451
Establishing a connection to an SFTP server ························································································ 452
Deleting server public keys saved in the public key file on the SFTP client··········································· 454
Establishing a connection to an SFTP server based on Suite B ···························································· 454
Working with SFTP directories ··············································································································· 455
Working with SFTP files ························································································································· 455
Displaying help information ···················································································································· 455
Terminating the connection with the SFTP server ················································································· 456
Configuring the device as an SCP client ········································································································ 456
SCP client configuration task list ············································································································ 456
Generating local key pairs ······················································································································ 456
Specifying the source IP address for SCP packets················································································ 457
xi
Establishing a connection to an SCP server ·························································································· 457
Deleting server public keys saved in the public key file on the SCP client ············································ 459
Establishing a connection to an SCP server based on Suite B······························································ 459
Specifying algorithms for SSH2 ····················································································································· 460
Specifying key exchange algorithms for SSH2 ······················································································ 460
Specifying public key algorithms for SSH2 ···························································································· 461
Specifying encryption algorithms for SSH2 ···························································································· 461
Specifying MAC algorithms for SSH2 ···································································································· 461
Displaying and maintaining SSH ···················································································································· 462
Stelnet configuration examples ······················································································································ 462
Password authentication enabled Stelnet server configuration example ··············································· 462
Publickey authentication enabled Stelnet server configuration example ··············································· 465
Password authentication enabled Stelnet client configuration example ················································ 470
Publickey authentication enabled Stelnet client configuration example ················································· 474
Stelnet configuration example based on 128-bit Suite B algorithms ······················································ 476
SFTP configuration examples ························································································································ 480
Password authentication enabled SFTP server configuration example ················································· 480
Publickey authentication enabled SFTP client configuration example ··················································· 482
SFTP configuration example based on 192-bit Suite B algorithms ························································ 486
SCP configuration examples ·························································································································· 489
SCP configuration example with password authentication ···································································· 490
SCP configuration example based on Suite B algorithms ······································································ 491
NETCONF over SSH configuration example with password authentication ·················································· 498
Network requirements ···························································································································· 498
Configuration procedure ························································································································· 499
Verifying the configuration ······················································································································ 500
Configuring SSL ························································································ 501
Overview ························································································································································ 501
SSL security services ····························································································································· 501
SSL protocol stack ································································································································· 501
FIPS compliance ············································································································································ 502
SSL configuration task list ······························································································································ 502
Configuring an SSL server policy ··················································································································· 502
Configuring an SSL client policy ···················································································································· 504
Displaying and maintaining SSL ···················································································································· 506
Configuring attack detection and prevention ·············································· 507
Overview ························································································································································ 507
Attacks that the device can prevent ··············································································································· 507
Single-packet attacks ····························································································································· 507
Scanning attacks ···································································································································· 508
Flood attacks ·········································································································································· 509
TCP fragment attack ······························································································································ 510
Login dictionary attack ··························································································································· 510
Attack detection and prevention configuration task list ·················································································· 510
Configuring an attack defense policy ············································································································· 511
Creating an attack defense policy ·········································································································· 511
Configuring a single-packet attack defense policy ················································································· 511
Configuring a scanning attack defense policy ························································································ 512
Configuring a flood attack defense policy ······························································································ 513
Configuring attack detection exemption ································································································· 517
Applying an attack defense policy to the device ···················································································· 517
Enabling log non-aggregation for single-packet attack events······························································· 518
Configuring TCP fragment attack prevention ································································································· 518
Enabling the login delay ································································································································· 519
Displaying and maintaining attack detection and prevention ········································································· 519
Attack detection and prevention configuration examples ··············································································· 520
Attack defense policy device application configuration example ··························································· 520
Configuring TCP attack prevention ···························································· 524
Overview ························································································································································ 524
xii
Configuring Naptha attack prevention ············································································································ 524
Configuring IP source guard ······································································ 525
Overview ························································································································································ 525
Static IPSG bindings ······························································································································ 525
Dynamic IPSG bindings ························································································································· 526
IPSG configuration task list ···························································································································· 527
Configuring the IPv4SG feature ····················································································································· 527
Enabling IPv4SG on an interface ··········································································································· 527
Configuring a static IPv4SG binding ······································································································ 527
Configuring the IPv6SG feature ····················································································································· 528
Enabling IPv6SG on an interface ··········································································································· 528
Configuring a static IPv6SG binding ······································································································ 529
Displaying and maintaining IPSG··················································································································· 530
IPSG configuration examples ························································································································ 530
Static IPv4SG configuration example ····································································································· 530
DHCP snooping-based dynamic IPv4SG configuration example ·························································· 532
DHCP relay agent-based dynamic IPv4SG configuration example ······················································· 533
Static IPv6SG configuration example ····································································································· 534
DHCPv6 snooping-based dynamic IPv6SG address binding configuration example ···························· 534
DHCPv6 snooping-based dynamic IPv6SG prefix binding configuration example ································ 535
Dynamic IPv6SG using DHCPv6 relay agent configuration example ···················································· 536
Configuring ARP attack protection ····························································· 538
ARP attack protection configuration task list ·································································································· 538
Configuring unresolvable IP attack protection ······························································································· 538
Configuring ARP source suppression ···································································································· 539
Configuring ARP blackhole routing ········································································································ 539
Displaying and maintaining unresolvable IP attack protection ······························································· 539
Configuration example ··························································································································· 540
Configuring ARP packet rate limit ·················································································································· 540
Configuration guidelines ························································································································· 541
Configuration procedure ························································································································· 541
Configuring source MAC-based ARP attack detection ·················································································· 541
Configuration procedure ························································································································· 542
Displaying and maintaining source MAC-based ARP attack detection ·················································· 542
Configuration example ··························································································································· 543
Configuring ARP packet source MAC consistency check ·············································································· 544
Configuring ARP active acknowledgement ···································································································· 544
Configuring authorized ARP··························································································································· 544
Configuration procedure ························································································································· 545
Configuration example (on a DHCP server)··························································································· 545
Configuration example (on a DHCP relay agent) ··················································································· 546
Configuring ARP attack detection ·················································································································· 547
Configuring user validity check ·············································································································· 548
Configuring ARP packet validity check ·································································································· 549
Configuring ARP restricted forwarding ··································································································· 549
Ignoring ingress ports of ARP packets for user validity check ······························································· 550
Configuring ARP attack detection for a VSI ··························································································· 550
Enabling ARP attack detection logging ·································································································· 552
Displaying and maintaining ARP attack detection·················································································· 552
User validity check configuration example ····························································································· 552
User validity check and ARP packet validity check configuration example ············································ 554
ARP restricted forwarding configuration example ·················································································· 555
Configuring ARP scanning and fixed ARP ····································································································· 557
Configuration restrictions and guidelines ······························································································· 557
Configuration procedure ························································································································· 557
Configuring ARP gateway protection ············································································································· 558
Configuration guidelines ························································································································· 558
Configuration procedure ························································································································· 558
Configuration example ··························································································································· 558
Configuring ARP filtering ································································································································ 559
xiii
Configuration guidelines ························································································································· 559
Configuration procedure ························································································································· 559
Configuration example ··························································································································· 560
Configuring ARP sender IP address checking ······························································································· 561
Configuring ND attack defense ·································································· 562
Overview ························································································································································ 562
ND attack defense configuration task list ······································································································· 562
Enabling source MAC consistency check for ND messages ········································································· 562
Configuring ND attack detection ···················································································································· 563
About ND attack detection ····················································································································· 563
Configuration guidelines ························································································································· 563
Configuration procedure ························································································································· 564
Displaying and maintaining ND attack detection ···················································································· 564
ND attack detection configuration example···························································································· 564
Configuring RA guard····································································································································· 566
About RA guard ······································································································································ 566
Specifying the role of the attached device ····························································································· 566
Configuring an RA guard policy ············································································································· 567
Enabling the RA guard logging feature ·································································································· 567
Displaying and maintaining RA guard ···································································································· 568
RA guard configuration example ············································································································ 568
Configuring uRPF ······················································································ 571
Overview ························································································································································ 571
uRPF check modes ································································································································ 571
uRPF operation ······································································································································ 571
Network application ································································································································ 574
Enabling uRPF ··············································································································································· 574
Displaying and maintaining uRPF ·················································································································· 574
Global uRPF configuration example ·············································································································· 575
Configuring MFF ························································································ 576
Overview ························································································································································ 576
Basic concepts ······································································································································· 577
MFF operation modes ···························································································································· 577
MFF working mechanism ······················································································································· 578
Protocols and standards ························································································································ 578
Configuring MFF ············································································································································ 578
Enabling MFF ········································································································································· 578
Configuring a network port ····················································································································· 578
Enabling periodic gateway probe ··········································································································· 579
Specifying the IP addresses of servers ·································································································· 579
Displaying and maintaining MFF ···················································································································· 580
MFF configuration examples ·························································································································· 580
Manual-mode MFF configuration example in a tree network ································································· 580
Manual-mode MFF configuration example in a ring network ································································· 581
Configuring crypto engines ········································································ 583
Overview ························································································································································ 583
Displaying and maintaining crypto engines ···································································································· 583
Configuring FIPS ······················································································· 584
Overview ························································································································································ 584
Configuration restrictions and guidelines ······································································································· 584
Configuring FIPS mode ·································································································································· 585
Entering FIPS mode ······························································································································· 585
Configuration changes in FIPS mode ···································································································· 586
Exiting FIPS mode ································································································································· 587
FIPS self-tests ················································································································································ 587
Power-up self-tests ································································································································ 588
Conditional self-tests ······························································································································ 588
xiv
Triggering self-tests ································································································································ 589
Displaying and maintaining FIPS ··················································································································· 589
FIPS configuration examples ························································································································· 589
Entering FIPS mode through automatic reboot ······················································································ 589
Entering FIPS mode through manual reboot ·························································································· 590
Exiting FIPS mode through automatic reboot ························································································ 592
Exiting FIPS mode through manual reboot ···························································································· 592
Configuring MACsec ·················································································· 594
Overview ························································································································································ 594
Basic concepts ······································································································································· 594
MACsec services ··································································································································· 594
MACsec applications ······························································································································ 595
MACsec operating mechanism ·············································································································· 595
Protocols and standards ························································································································ 597
Feature and hardware compatibility ··············································································································· 597
MACsec configuration task list ······················································································································· 598
Enabling MKA ················································································································································ 598
Enabling MACsec desire ································································································································ 599
Specifying the cipher suite for MACsec encryption ························································································ 599
Configuring a preshared key ·························································································································· 600
Configuring the MKA key server priority ········································································································ 600
Configuring MACsec protection parameters in interface view ······································································· 601
Configuring the MACsec confidentiality offset························································································ 601
Configuring MACsec replay protection··································································································· 601
Configuring the MACsec validation mode ······························································································ 602
Configuring MACsec protection parameters by MKA policy ·········································································· 602
Configuring an MKA policy ····················································································································· 602
Applying an MKA policy ························································································································· 603
Enabling MKA session logging······················································································································· 603
Overview ················································································································································ 603
Configuration restrictions and guidelines ······························································································· 603
Configuration procedure ························································································································· 604
Displaying and maintaining MACsec·············································································································· 604
MACsec configuration examples···················································································································· 604
Client-oriented MACsec configuration example ····················································································· 604
Device-oriented MACsec configuration example ··················································································· 607
Troubleshooting MACsec ······························································································································· 610
Cannot establish MKA sessions between MACsec devices ·································································· 610
Document conventions and icons ······························································ 612
Conventions ··················································································································································· 612
Network topology icons ·································································································································· 613
Support and other resources ····································································· 614
Accessing Hewlett Packard Enterprise Support····························································································· 614
Accessing updates ········································································································································· 614
Websites ················································································································································ 615
Customer self repair ······························································································································· 615
Remote support ······································································································································ 615
Documentation feedback ······················································································································· 615
Index ·········································································································· 617
1
Configuring AAA
Overview
Authentication, Authorization, and Accounting (AAA) provides a uniform framework for implementing
network access management. This feature specifies the following security functions:
•
Authentication—Identifies users and verifies their validity.
•
Authorization—Grants different users different rights, and controls the users' access to
resources and services. For example, you can permit office users to read and print files and
prevent guests from accessing files on the device.
•
Accounting—Records network usage details of users, including the service type, start time,
and traffic. This function enables time-based and traffic-based charging and user behavior
auditing.
AAA uses a client/server model. The client runs on the access device, or the network access server
(NAS), which authenticates user identities and controls user access. The server maintains user
information centrally. See Figure 1.
Figure 1 AAA network diagram
To access networks or resources beyond the NAS, a user sends its identity information to the NAS.
The NAS transparently passes the user information to AAA servers and waits for the authentication,
authorization, and accounting result. Based on the result, the NAS determines whether to permit or
deny the access request.
AAA has various implementations, including RADIUS, HWTACACS, and LDAP. RADIUS is most
often used.
The network in Figure 1 has one RADIUS server and one HWTACACS server. You can use different
servers to implement different security functions. For example, you can use the HWTACACS server
for authentication and authorization, and use the RADIUS server for accounting.
You can choose the security functions provided by AAA as needed. For example, if your company
wants employees to be authenticated before they access specific resources, you would deploy an
authentication server. If network usage information is needed, you would also configure an
accounting server.
The device performs dynamic password authentication.
Remote user NAS RADIUS server
HWTACACS server
Internet
Network
2
RADIUS
Remote Authentication Dial-In User Service (RADIUS) is a distributed information interaction
protocol that uses a client/server model. The protocol can protect networks against unauthorized
access and is often used in network environments that require both high security and remote user
access.
The RADIUS authorization process is combined with the RADIUS authentication process, and user
authorization information is piggybacked in authentication responses. RADIUS uses UDP port 1812
for authentication and UDP port 1813 for accounting.
RADIUS was originally designed for dial-in user access, and has been extended to support
additional access methods, such as Ethernet and ADSL.
Client/server model
The RADIUS client runs on the NASs located throughout the network. It passes user information to
RADIUS servers and acts on the responses to, for example, reject or accept user access requests.
The RADIUS server runs on the computer or workstation at the network center and maintains
information related to user authentication and network service access.
The RADIUS server operates using the following process:
1. Receives authentication, authorization, and accounting requests from RADIUS clients.
2. Performs user authentication, authorization, or accounting.
3. Returns user access control information (for example, rejecting or accepting the user access
request) to the clients.
The RADIUS server can also act as the client of another RADIUS server to provide authentication
proxy services.
The RADIUS server maintains the following databases:
•
Users—Stores user information, such as the usernames, passwords, applied protocols, and IP
addresses.
•
Clients—Stores information about RADIUS clients, such as shared keys and IP addresses.
•
Dictionary—Stores RADIUS protocol attributes and their values.
Figure 2 RADIUS server databases
Information exchange security mechanism
The RADIUS client and server exchange information between them with the help of shared keys,
which are preconfigured on the client and server. A RADIUS packet has a 16-byte field called
Authenticator. This field includes a signature generated by using the MD5 algorithm, the shared key,
and some other information. The receiver of the packet verifies the signature and accepts the packet
only when the signature is correct. This mechanism ensures the security of information exchanged
between the RADIUS client and server.
The shared keys are also used to encrypt user passwords that are included in RADIUS packets.
User authentication methods
The RADIUS server supports multiple user authentication methods, such as PAP, CHAP, and EAP.
RADIUS servers
Users Clients Dictionary
3
Basic RADIUS packet exchange process
Figure 3 illustrates the interactions between a user host, the RADIUS client, and the RADIUS server.
Figure 3 Basic RADIUS packet exchange process
RADIUS uses in the following workflow:
1. The host sends a connection request that includes the user's username and password to the
RADIUS client.
2. The RADIUS client sends an authentication request (Access-Request) to the RADIUS server.
The request includes the user's password, which has been processed by the MD5 algorithm
and shared key.
3. The RADIUS server authenticates the username and password. If the authentication succeeds,
the server sends back an Access-Accept packet that contains the user's authorization
information. If the authentication fails, the server returns an Access-Reject packet.
4. The RADIUS client permits or denies the user according to the authentication result. If the result
permits the user, the RADIUS client sends a start-accounting request (Accounting-Request)
packet to the RADIUS server.
5. The RADIUS server returns an acknowledgment (Accounting-Response) packet and starts
accounting.
6. The user accesses the network resources.
7. The host requests the RADIUS client to tear down the connection.
8. The RADIUS client sends a stop-accounting request (Accounting-Request) packet to the
RADIUS server.
9. The RADIUS server returns an acknowledgment (Accounting-Response) and stops accounting
for the user.
10. The RADIUS client notifies the user of the termination.
RADIUS packet format
RADIUS uses UDP to transmit packets. The protocol also uses a series of mechanisms to ensure
smooth packet exchange between the RADIUS server and the client. These mechanisms include the
timer mechanism, the retransmission mechanism, and the backup server mechanism.
RADIUS client RADIUS server
1) Username and password
3) Access-Accept/Reject
2) Access-Request
4) Accounting-Request (start)
5) Accounting-Response
8) Accounting-Request (stop)
9) Accounting-Response
10) Notification of termination
Host
6) The host access the resources
7) Teardown request
4
Figure 4 RADIUS packet format
Descriptions of the fields are as follows:
•
The Code field (1 byte long) indicates the type of the RADIUS packet. Table 1 gives the main
values and their meanings.
Table 1 Main values of the Code field
Code
Packet type
Description
1 Access-Request
From the client to the server. A packet of this type includes user
information for the server to authenticate the user. It must contain the
User-Name attribute and can optionally contain the attributes of
NAS-IP-Address, User-Password, and NAS-Port.
2 Access-Accept From the server to the client. If all attribute values included in the
Access-Request are acceptable, the authentication succeeds, and the
server sends an Access-Accept response.
3 Access-Reject From the server to the client. If any attribute value included in the
Access-Request is unacceptable, the authentication fails, and the server
sends an Access-Reject response.
4 Accounting-Request
From the client to the server. A packet of this type includes user
information for the server to start or stop accounting for the user. The
Acct-Status-Type attribute in the packet indicates whether to start or stop
accounting.
5 Accounting-Respons
e
From the server to the client. The server sends a packet of this type to
notify the client that it has received the Accounting-Request and has
successfully recorded the accounting information.
•
The Identifier field (1 byte long) is used to match response packets with request packets and to
detect duplicate request packets. The request and response packets of the same exchange
process for the same purpose (such as authentication or accounting) have the same identifier.
•
The Length field (2 bytes long) indicates the length of the entire packet (in bytes), including the
Code, Identifier, Length, Authenticator, and Attributes fields. Bytes beyond this length are
considered padding and are ignored by the receiver. If the length of a received packet is less
than this length, the packet is dropped.
•
The Authenticator field (16 bytes long) is used to authenticate responses from the RADIUS
server and to encrypt user passwords. There are two types of authenticators: request
authenticator and response authenticator.
•
The Attributes field (variable in length) includes authentication, authorization, and accounting
information. This field can contain multiple attributes, each with the following subfields:
 Type—Type of the attribute.
 Length—Length of the attribute in bytes, including the Type, Length, and Value subfields.
 Value—Value of the attribute. Its format and content depend on the Type subfield.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335
  • Page 336 336
  • Page 337 337
  • Page 338 338
  • Page 339 339
  • Page 340 340
  • Page 341 341
  • Page 342 342
  • Page 343 343
  • Page 344 344
  • Page 345 345
  • Page 346 346
  • Page 347 347
  • Page 348 348
  • Page 349 349
  • Page 350 350
  • Page 351 351
  • Page 352 352
  • Page 353 353
  • Page 354 354
  • Page 355 355
  • Page 356 356
  • Page 357 357
  • Page 358 358
  • Page 359 359
  • Page 360 360
  • Page 361 361
  • Page 362 362
  • Page 363 363
  • Page 364 364
  • Page 365 365
  • Page 366 366
  • Page 367 367
  • Page 368 368
  • Page 369 369
  • Page 370 370
  • Page 371 371
  • Page 372 372
  • Page 373 373
  • Page 374 374
  • Page 375 375
  • Page 376 376
  • Page 377 377
  • Page 378 378
  • Page 379 379
  • Page 380 380
  • Page 381 381
  • Page 382 382
  • Page 383 383
  • Page 384 384
  • Page 385 385
  • Page 386 386
  • Page 387 387
  • Page 388 388
  • Page 389 389
  • Page 390 390
  • Page 391 391
  • Page 392 392
  • Page 393 393
  • Page 394 394
  • Page 395 395
  • Page 396 396
  • Page 397 397
  • Page 398 398
  • Page 399 399
  • Page 400 400
  • Page 401 401
  • Page 402 402
  • Page 403 403
  • Page 404 404
  • Page 405 405
  • Page 406 406
  • Page 407 407
  • Page 408 408
  • Page 409 409
  • Page 410 410
  • Page 411 411
  • Page 412 412
  • Page 413 413
  • Page 414 414
  • Page 415 415
  • Page 416 416
  • Page 417 417
  • Page 418 418
  • Page 419 419
  • Page 420 420
  • Page 421 421
  • Page 422 422
  • Page 423 423
  • Page 424 424
  • Page 425 425
  • Page 426 426
  • Page 427 427
  • Page 428 428
  • Page 429 429
  • Page 430 430
  • Page 431 431
  • Page 432 432
  • Page 433 433
  • Page 434 434
  • Page 435 435
  • Page 436 436
  • Page 437 437
  • Page 438 438
  • Page 439 439
  • Page 440 440
  • Page 441 441
  • Page 442 442
  • Page 443 443
  • Page 444 444
  • Page 445 445
  • Page 446 446
  • Page 447 447
  • Page 448 448
  • Page 449 449
  • Page 450 450
  • Page 451 451
  • Page 452 452
  • Page 453 453
  • Page 454 454
  • Page 455 455
  • Page 456 456
  • Page 457 457
  • Page 458 458
  • Page 459 459
  • Page 460 460
  • Page 461 461
  • Page 462 462
  • Page 463 463
  • Page 464 464
  • Page 465 465
  • Page 466 466
  • Page 467 467
  • Page 468 468
  • Page 469 469
  • Page 470 470
  • Page 471 471
  • Page 472 472
  • Page 473 473
  • Page 474 474
  • Page 475 475
  • Page 476 476
  • Page 477 477
  • Page 478 478
  • Page 479 479
  • Page 480 480
  • Page 481 481
  • Page 482 482
  • Page 483 483
  • Page 484 484
  • Page 485 485
  • Page 486 486
  • Page 487 487
  • Page 488 488
  • Page 489 489
  • Page 490 490
  • Page 491 491
  • Page 492 492
  • Page 493 493
  • Page 494 494
  • Page 495 495
  • Page 496 496
  • Page 497 497
  • Page 498 498
  • Page 499 499
  • Page 500 500
  • Page 501 501
  • Page 502 502
  • Page 503 503
  • Page 504 504
  • Page 505 505
  • Page 506 506
  • Page 507 507
  • Page 508 508
  • Page 509 509
  • Page 510 510
  • Page 511 511
  • Page 512 512
  • Page 513 513
  • Page 514 514
  • Page 515 515
  • Page 516 516
  • Page 517 517
  • Page 518 518
  • Page 519 519
  • Page 520 520
  • Page 521 521
  • Page 522 522
  • Page 523 523
  • Page 524 524
  • Page 525 525
  • Page 526 526
  • Page 527 527
  • Page 528 528
  • Page 529 529
  • Page 530 530
  • Page 531 531
  • Page 532 532
  • Page 533 533
  • Page 534 534
  • Page 535 535
  • Page 536 536
  • Page 537 537
  • Page 538 538
  • Page 539 539
  • Page 540 540
  • Page 541 541
  • Page 542 542
  • Page 543 543
  • Page 544 544
  • Page 545 545
  • Page 546 546
  • Page 547 547
  • Page 548 548
  • Page 549 549
  • Page 550 550
  • Page 551 551
  • Page 552 552
  • Page 553 553
  • Page 554 554
  • Page 555 555
  • Page 556 556
  • Page 557 557
  • Page 558 558
  • Page 559 559
  • Page 560 560
  • Page 561 561
  • Page 562 562
  • Page 563 563
  • Page 564 564
  • Page 565 565
  • Page 566 566
  • Page 567 567
  • Page 568 568
  • Page 569 569
  • Page 570 570
  • Page 571 571
  • Page 572 572
  • Page 573 573
  • Page 574 574
  • Page 575 575
  • Page 576 576
  • Page 577 577
  • Page 578 578
  • Page 579 579
  • Page 580 580
  • Page 581 581
  • Page 582 582
  • Page 583 583
  • Page 584 584
  • Page 585 585
  • Page 586 586
  • Page 587 587
  • Page 588 588
  • Page 589 589
  • Page 590 590
  • Page 591 591
  • Page 592 592
  • Page 593 593
  • Page 594 594
  • Page 595 595
  • Page 596 596
  • Page 597 597
  • Page 598 598
  • Page 599 599
  • Page 600 600
  • Page 601 601
  • Page 602 602
  • Page 603 603
  • Page 604 604
  • Page 605 605
  • Page 606 606
  • Page 607 607
  • Page 608 608
  • Page 609 609
  • Page 610 610
  • Page 611 611
  • Page 612 612
  • Page 613 613
  • Page 614 614
  • Page 615 615
  • Page 616 616
  • Page 617 617
  • Page 618 618
  • Page 619 619
  • Page 620 620
  • Page 621 621
  • Page 622 622
  • Page 623 623
  • Page 624 624
  • Page 625 625
  • Page 626 626
  • Page 627 627
  • Page 628 628
  • Page 629 629
  • Page 630 630
  • Page 631 631
  • Page 632 632
  • Page 633 633
  • Page 634 634
  • Page 635 635
  • Page 636 636
  • Page 637 637
  • Page 638 638
  • Page 639 639
  • Page 640 640
  • Page 641 641
  • Page 642 642
  • Page 643 643
  • Page 644 644
  • Page 645 645
  • Page 646 646
  • Page 647 647
  • Page 648 648
  • Page 649 649
  • Page 650 650
  • Page 651 651
  • Page 652 652
  • Page 653 653
  • Page 654 654
  • Page 655 655
  • Page 656 656
  • Page 657 657
  • Page 658 658
  • Page 659 659
  • Page 660 660
  • Page 661 661
  • Page 662 662
  • Page 663 663
  • Page 664 664
  • Page 665 665
  • Page 666 666
  • Page 667 667
  • Page 668 668
  • Page 669 669
  • Page 670 670
  • Page 671 671
  • Page 672 672
  • Page 673 673
  • Page 674 674
  • Page 675 675
  • Page 676 676
  • Page 677 677
  • Page 678 678
  • Page 679 679
  • Page 680 680
  • Page 681 681
  • Page 682 682
  • Page 683 683
  • Page 684 684
  • Page 685 685
  • Page 686 686
  • Page 687 687
  • Page 688 688
  • Page 689 689
  • Page 690 690
  • Page 691 691
  • Page 692 692
  • Page 693 693
  • Page 694 694
  • Page 695 695

Aruba Security Configuration Guide

Category
Software
Type
Configuration Guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI