Aruba AOS-CX 10.12 Security User guide

Type
User guide
AOS-CX 10.12 Security Guide
8100, 8360 Switch Series
Published: August 2023
Edition: 2
|2
Copyright Information
© Copyright 2023 Hewlett Packard Enterprise Development LP.
This product includes code licensed under certain open source licenses which require source
compliance. The corresponding source for these components is available upon request. This offer is
valid to anyone in receipt of this information and shall expire three years following the date of the final
distribution of this product version by Hewlett Packard Enterprise Company. To obtain such source
code, please check if the code is available in the HPE Software Center at
https://myenterpriselicense.hpe.com/cwp-ui/software but, if not, send a written request for specific
software version and product for which you want the open source code. Along with the request, please
send a check or money order in the amount of US $10.00 to:
Hewlett Packard Enterprise Company
Attn: General Counsel
WW Corporate Headquarters
1701 E Mossy Oaks Rd Spring, TX 77389
United States of America.
Notices
The information contained herein is subject to change without notice. The only warranties for Hewlett
Packard Enterprise products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an
additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or
omissions contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession,
use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer
Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government
under vendor's standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard
Enterprise has no control over and is not responsible for information outside the Hewlett Packard
Enterprise website.
Contents
Contents
Contents 3
About this document 15
Applicable products 15
Latest version available online 15
Command syntax notation conventions 15
About the examples 16
Identifying switch ports and interfaces 16
About security 18
About Authentication, Authorization, and Accounting (AAA) 18
Managing users and groups 19
Default user admin 19
Example of first login with password setting 19
Built-in user groups and their privileges 19
User-defined user groups 20
User name requirements 20
Password requirements 21
Per-user management interface enablement 21
Local per-user management interface enablement 21
Remote (TACACS+ or RADIUS) per-user management interface enablement 22
User and user group management tasks 23
Resetting the switch admin password using the Service OS console 24
Resetting the admin password by reverting the switch to factory defaults 25
User and group commands 26
password complexity 26
service export-password 30
show password-complexity 31
show user-group 31
show user-list 32
show user-list management-interface 34
show user information 35
user 36
user-group 39
user management-interface 43
user password 44
SSH server 46
SSH defaults 46
SSH server tasks 46
SSH server commands 47
show ssh host-key 47
show ssh server 48
show ssh server sessions 51
ssh ciphers 53
ssh host-key 54
ssh host-key-algorithms 55
AOS-CX 10.12 Security Guide | (8100, 8360 Switch Series) 3
Contents |4
ssh key-exchange-algorithms 56
ssh known-host remove 58
ssh macs 58
ssh maximum-auth-attempts 59
ssh public-key-algorithms 60
ssh server allow-list 61
ssh server port 63
ssh server vrf 64
SSH client 65
SSH client commands 65
ssh (client login) 65
Local AAA 67
Local AAA defaults and limits 67
Supported platforms and standards 67
Scale 67
Local authentication 68
Password-based local authentication 68
SSH public key-based local authentication 68
Local authentication tasks 68
Local authorization 70
Local authorization tasks 70
Local accounting 71
Local accounting tasks 71
Local AAA commands 72
aaa accounting all-mgmt 72
aaa authentication console-login-attempts 73
aaa authentication limit-login-attempts 75
aaa authentication login 76
aaa authentication minimum-password-length 77
aaa authorization commands (local) 78
show aaa accounting 80
show aaa authentication 81
show aaa authorization 82
show authentication locked-out-users 84
show ssh authentication-method 84
show user 85
ssh password-authentication 86
ssh public-key-authentication 87
user authorized-key 87
Remote AAA with TACACS+ 90
Parameters for TACACS+ server 90
Default server groups 91
Supported platforms and standards 91
About global versus per-TACACS+ server passkeys (shared secrets) 92
Remote AAA TACACS+ server configuration requirements 92
User role assignment using TACACS+ attributes 93
TACACS+ server redundancy and access sequence 93
Single source IP address for consistent source identification to AAA servers 93
TACACS+ general tasks 94
TACACS+ authentication 94
About authentication fail-through 95
TACACS+ authentication tasks 95
TACACS+ authorization 96
Using local authorization as fallback from TACACS+ authorization 96
About authentication fail-through and authorization 96
TACACS+ authorization tasks 96
TACACS+ accounting 97
Sample accounting information on a TACACS+ server 97
Sample REST accounting information on a TACACS+ server 98
TACACS+ accounting tasks 98
Example: Configuring the switch for Remote AAA with TACACS+ 99
Remote AAA with RADIUS 102
Parameters for RADIUS server 102
Default server groups 103
Supported platforms and standards 104
About global versus per-RADIUS server passkeys (shared secrets) 104
Remote AAA RADIUS server configuration requirements 105
User role assignment using RADIUS attributes 105
RADIUS server redundancy and access sequence 106
Configuration task list 106
Single source IP address for consistent source identification to AAA servers 107
RADIUS general tasks 108
Per-port RADIUS server group configuration 108
RADIUS authentication 109
About authentication fail-through 109
RADIUS authentication tasks 110
Two-factor authentication 111
Configuring two-factor authentication (for local users) 111
Configuring two-factor authentication with SSH (for remote-only users) 112
Configuring two-factor authentication with HTTPS server and REST (for remote-only
users) 115
Two-factor authentication commands 118
aaa authorization radius 118
https-server authentication certificate 119
ssh certificate-as-authorized-key 120
ssh two-factor-authentication 121
RADIUS accounting 122
Sample general accounting information 123
RADIUS accounting tasks 124
Example: Configuring the switch for Remote AAA with RADIUS 125
Remote AAA (TACACS+, RADIUS) commands 128
aaa accounting allow-fail-through 128
aaa accounting all-mgmt 128
aaa authentication allow-fail-through 131
aaa authentication login 131
aaa authorization allow-fail-through 134
aaa authorization commands 136
aaa group server 139
radius-server auth-type 140
radius-server host 141
radius-server host secure ipsec 144
radius-server host tls port-access 149
radius-server host tls tracking-method 150
radius-server key 152
radius-server retries 153
radius-server status-server interval 154
AOS-CX 10.12 Security Guide | (8100, 8360 Switch Series) 5
Contents |6
radius-server timeout 154
radius-server tracking 155
server 157
show aaa accounting 159
show aaa authentication 161
show aaa authorization 164
show aaa server-groups 165
show accounting log 167
show radius-server 170
show radius-server secure ipsec 175
show radius-server authentication statistics 177
show radius-server authentication statistics host 177
show tacacs-server 179
show tacacs-server statistics 181
show tech aaa 182
tacacs-server auth-type 188
tacacs-server host 189
tacacs-server key 191
tacacs-server timeout 192
tacacs-server tracking 193
RADIUS dynamic authorization 196
Requirements and tips 196
RADIUS dynamic authorization commands 196
radius dyn-authorization enable 196
radius dyn-authorization client 197
radius dyn-authorization port 198
show radius dyn-authorization 199
show radius dyn-authorization client 201
IP Flow Information Export 203
Flow monitoring commands 203
flow record 203
flow exporter 205
flow monitor 207
ipv4|ipv6 flow monitor 208
show flow record 209
show flow exporter 210
show flow monitor 212
show tech ipfix 213
diag-dump ipfix basic 214
Traffic Insight 216
Protocol and feature details 216
Supported Platforms 216
Caveats for Traffic Insight 216
Configuring Traffic Insight 217
Traffic insight commands 218
diag-dump traffic-insight basic 218
show capacities traffic-insight 219
show debug buffer module trafficinsight 219
show events traffic-insightd 220
show running-config traffic-insight 221
show tech traffic-insight 222
show traffic-insight monitor-type 222
traffic insight 223
Client Insight 226
Supported Platforms 227
Prerequisites 227
Points to Note 227
Limitations 227
Feature Interoperability 228
Troubleshooting Client Insight 228
Client Insight Commands 228
client-insight enable 228
client-insight on-boarding event logs 229
diag-dump client-insight basic 230
show capacities client-insight-client-limit 232
show capacities-status client-insight-client-limit 233
show events -c client-insight 233
show tech client-insight 236
PKI 239
PKI concepts 239
Digital certificate 239
Certificate authority 239
Root certificate 240
Leaf certificate 240
Intermediate certificate 240
Trust anchor 240
OCSP 240
PKI on the switch 240
Trust anchor profiles 240
Leaf certificates 241
Mandatory matching of peer device hostname 241
PKI EST 241
EST usage overview 241
Prerequisites for using EST for certificate enrollment 242
EST profile configuration 242
Certificate enrollment 242
Certificate re-enrollment 242
Checking EST profile and certificate configuration 243
EST best practices 243
Example using EST for certificate enrollment 243
Example including the use of an intermediate certificate 249
Installing a self-signed leaf certificate (created inside the switch) 251
Installing a self-signed leaf certificate (created outside the switch) 252
Installing a certificate of a root CA 253
Installing a downloadable user role certificate 254
Installing a CA-signed leaf certificate (initiated in the switch) 255
Installing a CA-signed leaf certificate (created outside the switch) 256
PKI commands 257
crypto pki application 257
crypto pki certificate 258
crypto pki ta-profile 259
enroll self-signed 260
enroll terminal 261
import (CA-signed leaf certificate) 262
import (self-signed leaf certificate) 264
key-type 266
ocsp disable-nonce 267
ocsp enforcement-level 268
AOS-CX 10.12 Security Guide | (8100, 8360 Switch Series) 7
Contents |8
ocsp url 269
ocsp vrf 270
revocation-check ocsp 270
show crypto pki application 271
show crypto pki certificate 272
show crypto pki ta-profile 274
ta-certificate 275
subject 277
PKI EST commands 278
arbitrary-label 278
arbitrary-label-enrollment 279
arbitrary-label-reenrollment 280
crypto pki est-profile 281
enroll est-profile 282
reenrollment-lead-time 283
retry-count 284
retry-interval 285
show crypto pki est-profile 286
url 287
username 288
vrf 290
MACsec 291
MACsec in AOS-CX 291
MACsec use cases 292
MACsec configuration (using 802.1X EAP TLS) 294
Configure the authenticator 294
Configure the supplicant 295
MACsec configuration (using pre-shared keys) 296
MACsec best practices 297
MACsec troubleshooting 298
MACsec commands 299
apply macsec policy 299
cipher-suite 301
clear macsec statistics 302
confidentiality 302
include-sci-tag 303
macsec policy 304
macsec selftest 305
replay-protection 306
secure-mode 307
show macsec policy 308
show macsec selftest 309
show macsec statistics 310
show macsec status 313
MKA commands (MACsec) 315
apply mka policy 315
clear mka statistics 316
data-delay-protection 317
key-server-priority 318
mka policy 319
pre-shared-key 320
show mka policy 321
show mka statistics 322
show mka status 323
transmit-interval 325
Port access 326
Port access 802.1X authentication 326
Port access MAC authentication 327
How MAC authentication works 328
How RADIUS server is used in MAC authentication 328
Supported platforms and standards 329
Scale 329
Supported RFCs and standards 329
Port access configuration task list 329
Port access 802.1X and MAC authentication configuration example 329
Use cases 331
Use case 1: Faster onboarding of MAC authentication clients using concurrent
onboarding 331
Use case 2: PXE clients that download the supplicant 332
Port access 802.1X authentication commands 332
aaa authentication port-access dot1x authenticator 332
aaa authentication port-access dot1x authenticator auth-method 333
aaa authentication port-access dot1x authenticator cached-reauth 334
aaa authentication port-access dot1x authenticator cached-reauth-period 334
aaa authentication port-access dot1x authenticator discovery-period 335
aaa authentication port-access dot1x authenticator eap-tls-fragment 336
aaa authentication port-access dot1x authenticator eapol-timeout 337
aaa authentication port-access dot1x authenticator initial-auth-response-timeout 338
aaa authentication port-access dot1x authenticator macsec 339
aaa authentication port-access dot1x authenticator max-eapol-requests 340
aaa authentication port-access dot1x authenticator mka cak-length 340
aaa authentication port-access dot1x authenticator max-retries 341
aaa authentication port-access dot1x authenticator quiet-period 342
aaa authentication port-access dot1x authenticator radius server-group 343
aaa authentication port-access dot1x authenticator reauth 344
aaa authentication port-access dot1x authenticator reauth-period 345
clear dot1x authenticator statistics interface 346
show aaa authentication port-access dot1x authenticator interface client-status 346
show aaa authentication port-access dot1x authenticator interface port-statistics 348
Port access MAC authentication commands 349
aaa authentication port-access mac-auth 349
aaa authentication port-access mac-auth addr-format 350
aaa authentication port-access mac-auth auth-method 351
aaa authentication port-access mac-auth cached-reauth 352
aaa authentication port-access mac-auth cached-reauth-period 353
aaa authentication port-access mac-auth password 353
aaa authentication port-access mac-auth quiet-period 354
aaa authentication port-access mac-auth radius server-group 355
aaa authentication port-access mac-auth reauth 356
aaa authentication port-access mac-auth reauth-period 357
clear mac-auth statistics 358
show aaa authentication port-access mac-auth interface client-status 358
show aaa authentication port-access mac-auth interface port-statistics 360
Port access general commands 361
aaa authentication port-access allow-lldp-auth 361
aaa authentication port-access allow-cdp-auth 362
aaa authentication port-access auth-mode 362
aaa authentication port-access auth-precedence 364
aaa authentication port-access auth-priority 364
aaa authentication port-access auth-role 366
aaa authentication port-access client-auto-log-off final-authentication-failure 367
AOS-CX 10.12 Security Guide | (8100, 8360 Switch Series) 9
Contents |10
aaa authentication port-access client-limit 367
aaa authentication port-access client-limit multi-domain 368
aaa authentication port-access radius-override 369
port-access allow-flood-traffic 370
port-access auto-vlan 371
port-access client-move 371
port-access event-log client 372
port-access fallback-role 373
port-access log-off client 374
port-access onboarding-method precedence 375
port-access onboarding-method concurrent 376
port-access reauthenticate interface 377
show aaa authentication port-access interface client-status 378
show port-access clients 380
show port-access clients detail 385
show port-access clients onboarding-method 393
Port access debugging and troubleshooting 395
Radius server reachability debugging and troubleshooting 395
Port access MAC authentication debugging and troubleshooting 396
Using show commands 396
Using debug commands 397
Port access 802.1X authentication debugging and troubleshooting 398
Using show commands 398
Using other commands 400
Port access FAQ 401
References 401
Multidomain authentication 401
Multidomain authentication requirements 402
Scenarios with Aruba-Port-Auth-Mode and Aruba-Device-Traffic-Class VSAs 402
Scenarios with device-traffic-class configuration in role 403
Port access security violation 403
Port access security violation commands 404
port-access security violation action 404
port-access security violation action shutdown auto-recovery 405
port-access security violation action shutdown recovery-timer 406
show interface 406
show port-access aaa violation interface 407
show port-access port-security violation client-limit-exceeded interface 408
Port access policy 409
Classes and actions supported by port access policies 410
Port access policy commands 410
port-access policy 410
port-access policy copy 414
port-access policy resequence 415
port-access policy reset 416
clear port-access policy hitcounts 418
show port-access policy 420
show port-access policy hitcounts 422
Port access role 423
Operational notes 424
Downloadable user roles 425
Mixed roles 425
Limitations 426
Supported RADIUS attributes in mixed roles 426
Cached-critical role 426
Cached-critical role tasks 427
Restrictions 429
Troubleshooting 429
Special roles 430
Critical role 430
Reject role 430
Pre-authentication role 430
Auth-role 431
Fallback role 431
Port access role commands 432
associate macsec-policy 432
associate policy 433
auth-mode 433
cached-reauth-period 434
client-inactivity timeout 435
device-traffic-class 436
description 437
mtu 438
poe-priority 438
port-access role 439
reauth-period 440
session timeout 440
show aaa authentication port-access interface client-status 441
show port-access role 442
stp-admin-edge-port 446
trust-mode 446
vlan 447
Port access cached-critical role commands 449
aaa authentication port-access cached-critical-role (global) 449
aaa authentication port-access cached-critical-role (per interface) 451
port-access clear cached-client 452
show port-access cached-clients 453
show port-access cached-critical-role info 455
Port access VLAN groups 456
VLAN grouping limitations 456
VLAN group load balancing 457
Port access VLAN group commands 458
associate-vlan 458
port-access vlan-group 458
show running-config port-access vlan-group 459
Port access 802.1X supplicant authentication 461
Feature details 461
Sub-features 462
Supported platforms 463
802.1X supplicant policy configuration and considerations 463
Recommended configuration 464
Port access 802.1X supplicant commands 464
aaa authentication port-access dot1x supplicant(global) 464
aaa authentication port-access dot1x supplicant(port) 465
associate policy 466
canned-eap-success 467
clear dot1x supplicant statistics 468
discovery-timeout 469
eap-identity 470
eapol-force-multicast 472
eapol-method 473
AOS-CX 10.12 Security Guide | (8100, 8360 Switch Series) 11
Contents |12
eapol-protocol-version 474
eapol-source-mac 475
eapol-timeout 476
enable 477
enable 478
fail-mode 479
held-period 480
macsec 481
macsec-policy 482
max-retries 483
mka cak-length 484
policy (supplicant) 485
port-access dot1x supplicant restart 486
show aaa authentication port-access dot1x supplicant policy 487
show aaa authentication port-access dot1x supplicant statistics 489
show aaa authentication port-access dot1x supplicant status 491
start-mode 493
Troubleshooting 494
Prerequisites 494
Packet capture 495
FAQ 496
Configurable RADIUS attributes (port access) 497
Configurable RADIUS attribute commands 497
aaa radius-attribute group 497
nas-id request-type 498
nas-id value 499
nas-ip-addr request-type authentication 500
nas-ip-addr service-type user-management 501
tunnel-private-group-id request-type 502
tunnel-private-group-id value 503
Supported RADIUS attributes 505
Attributes supported in 802.1X authentication 505
Attributes supported in MAC authentication 505
Attributes supported in dynamic authorization 506
Session authorization attributes supported in 802.1X and MAC authentication, and CoA 506
Standard session attributes supported 506
Vendor-Specific Attributes supported in session authorization 507
Description of VSAs 507
Attributes supported in RADIUS network accounting 508
Attributes supported in RADIUS server tracking 509
Port security 510
Port-security sticky MAC 510
Basic operation 510
Default port security operation 510
Intruder protection 511
General operation for port security 511
Blocking unauthorized traffic 511
Trunk group exclusion 512
Port security commands 512
port-access port-security 512
port-access port-security client-limit 513
port-access port-security mac-address 514
show port-access port-security interface client-status 515
show port-access port-security interface port-statistics 516
sticky-learn enable 517
sticky-learn mac 518
show port-access security violation sticky-mac-client-move interface 519
Fault Monitor 521
Fault monitoring conditions 521
Excessive broadcasts 521
Excessive multicasts 521
Excessive link flaps 521
Excessive oversize packets 521
Excessive jabbers 521
Excessive fragments 521
Excessive CRC errors 522
Excessive TX drops 522
Fault monitor commands 522
(Fault enabling/disabling) 522
action 523
apply fault-monitor profile 526
fault-monitor profile 526
show fault-monitor profile 527
show interface fault-monitor profile 529
show interface fault-monitor status 530
show running-config 531
threshold 532
vsx-sync (fault monitor) 534
Group based policy (GBP) 535
GBP scenarios 535
Group Policy ID-based segmentation in the wired network 536
Group Policy ID-based segmentation between wired and wireless clients 537
Group Policy ID-based segmentation for multicast traffic 538
Multicast traffic limitations 539
GBP limitations 540
Group based policy commands 540
gbp enable 540
gbp role 541
gbp role infra 541
class gbp-ip 542
class gbp-ipv6 545
class gbp-mac 549
port-access gbp 551
port-access role associate gbp 553
clear port-access gbp hitcounts 554
show gbp role-mapping 554
show class 555
show port-access gbp 556
show port-access gbp hitcounts 557
Configuring enhanced security 559
Configuring enhanced security 559
Configuring remote logging using SSH reverse tunnel 560
CLI user session management commands 561
cli-session 561
Auditors and auditing tasks 564
AOS-CX 10.12 Security Guide | (8100, 8360 Switch Series) 13
Contents |14
Auditing tasks (CLI) 564
Auditing tasks (Web UI) 564
REST requests and accounting logs 565
Support and Other Resources 566
Accessing Aruba Support 566
Accessing Updates 567
Aruba Support Portal 567
My Networking 567
Warranty Information 567
Regulatory Information 567
Documentation Feedback 568
Chapter 1
About this document
About this document
This document describes features of the AOS-CX network operating system. It is intended for
administrators responsible for installing, configuring, and managing Aruba switches on a network.
Applicable products
This document applies to the following products:
nAruba 8100 Switch Series (R9W94A, R9W95A, R9W96A, R9W97A)
nAruba 8360 Switch Series (JL700A, JL701A, JL702A, JL703A, JL706A, JL707A, JL708A, JL709A, JL710A,
JL711A, JL700C, JL701C, JL702C, JL703C, JL706C, JL707C, JL708C, JL709C, JL710C, JL711C, JL704C, JL705C,
JL719C, JL718C, JL717C, JL720C, JL722C, JL721C )
Latest version available online
Updates to this document can occur after initial publication. For the latest versions of product
documentation, see the links provided in Support and Other Resources.
Command syntax notation conventions
Convention Usage
example-text Identifies commands and their options and operands, code examples,
filenames, pathnames, and output displayed in a command window. Items
that appear like the example text in the previous column are to be entered
exactly as shown and are required unless enclosed in brackets ([ ]).
example-text In code and screen examples, indicates text entered by a user.
Any of the following:
n<example-text>
n<example-text>
nexample-text
nexample-text
Identifies a placeholder—such as a parameter or a variable—that you must
substitute with an actual value in a command or in code:
nFor output formats where italic text cannot be displayed, variables
are enclosed in angle brackets (< >). Substitute the text—including
the enclosing angle brackets—with an actual value.
nFor output formats where italic text can be displayed, variables
might or might not be enclosed in angle brackets. Substitute the
text including the enclosing angle brackets, if any, with an actual
value.
|Vertical bar. A logical OR that separates multiple items from which you can
choose only one.
Any spaces that are on either side of the vertical bar are included for
readability and are not a required part of the command syntax.
AOS-CX 10.12 Security Guide | (8100, 8360 Switch Series) 15
About this document |16
Convention Usage
{ } Braces. Indicates that at least one of the enclosed items is required.
[ ] Brackets. Indicates that the enclosed item or items are optional.
…or
...
Ellipsis:
nIn code and screen examples, a vertical or horizontal ellipsis indicates an
omission of information.
nIn syntax using brackets and braces, an ellipsis indicates items that can be
repeated. When an item followed by ellipses is enclosed in brackets, zero
or more items can be specified.
About the examples
Examples in this document are representative and might not match your particular switch or
environment.
The slot and port numbers in this document are for illustration only and might be unavailable on your
switch.
Understanding the CLI prompts
When illustrating the prompts in the command line interface (CLI), this document uses the generic term
switch, instead of the host name of the switch. For example:
switch>
The CLI prompt indicates the current command context. For example:
switch>
Indicates the operator command context.
switch#
Indicates the manager command context.
switch(CONTEXT-NAME)#
Indicates the configuration context for a feature. For example:
switch(config-if)#
Identifies the interface context.
Variable information in CLI prompts
In certain configuration contexts, the prompt may include variable information. For example, when in
the VLAN configuration context, a VLAN number appears in the prompt:
switch(config-vlan-100)#
When referring to this context, this document uses the syntax:
switch(config-vlan-<VLAN-ID>)#
Where <VLAN-ID> is a variable representing the VLAN number.
Identifying switch ports and interfaces
Physical ports on the switch and their corresponding logical software interfaces are identified using the
format:
member/slot/port
On the 83xx, 9300, and 10000 Switch Series
nmember: Always 1. VSF is not supported on this switch.
nslot: Always 1. This is not a modular switch, so there are no slots.
nport: Physical number of a port on the switch.
For example, the logical interface 1/1/4 in software is associated with physical port 4 on the switch.
If using breakout cables, the port designation changes to x:y, where x is the physical port and y is the lane when
split to 4 x 10G or 4 x 25G. For example, the logical interface 1/1/4:2 in software is associated with lane 2 on
physical port 4 in slot 1 on member 1.
AOS-CX 10.12 Security Guide | (8100, 8360 Switch Series) 17
Chapter 2
About security
About security
This AOS-CX Switch provides the following security features:
nLocal user and group management.
nAuthentication, Authorization, and Accounting (AAA), either local (password or SSH public key-based),
or remote password-based TACACS+ or RADIUS.
nSSH server. SSH is a cryptographic protocol that encrypts all communication between devices.
nAbility to use enhanced security as described in Configuring enhanced security .
nMaking sensitive switch configuration information available for secure export/import between
switches. For information, see service export-password.
About Authentication, Authorization, and Accounting (AAA)
nAuthentication: identifies users, validates their credentials, and grants switch access.
nAuthorization: controls authenticated users command execution and switch interaction privileges.
nAccounting: collects and manages user session activity logs for auditing and reporting purposes.
Local AAA on your Aruba switch provides:
nAuthentication using local password or SSH public key.
nAuthorization using role-based access control (RBAC), and optionally, using user-defined local user
groups with command authorization rules defined per group.
nAccounting of user activity on the switch using accounting logs.
Remote AAA provides the following for your Aruba switch:
nAuthentication using remote AAA servers with either TACACS+ or RADIUS.
nAuthorization using remote AAA servers with TACACS+ fine-grained command authorization. Local
RBAC or local rule-based authorization is also possible.
nTransmission of locally collected accounting information to remote TACACS+ and RADIUS servers.
TACACS+ (Terminal Access Controller Access-Control System Plus) and RADIUS (Remote Authentication Dial-In
User Service) server software is readily available as either open source or from various vendors.
For switches that support multiple management modules such as the Aruba 8400, all AAA functionality discussed
only applies to the active management module. See also AAA on switches with multiple management modules in the
High Availability Guide.
AOS-CX 10.12 Security Guide | (8100, 8360 Switch Series) 18
Chapter 3
Managing users and groups
Managing users and groups
Default user admin
A factory-default switch comes with a single user named admin.
The admin user:
nHas an empty password. Press Enter in response to the admin password prompt. At initial boot, you
are prompted to define a password for the admin user. Although empty (blank) passwords are
allowed, it is recommended that you use strong passwords for all production switches.
nIs a member of the administrators group.
nCannot be removed from the switch.
The switch admin user is distinct from the Service OS admin user. The Service OS acts as the bootloader and
recovery operating system. The Service OS has its own CLI.
Example of first login with password setting
switch login: admin
Password:
Please configure the 'admin' user account password.
Enter new password: ********
Confirm new password: ********
switch#
Built-in user groups and their privileges
The switch provides the following built-in user groups with corresponding roles. Each of these roles
comes with a set of privileges.
Group/Role Privileges
administrators Administrators have full privileges, including:
nFull CLI access.
nPerforming firmware upgrades.
nViewing switch configuration information, including sensitive information such as
passwords which are displayed as ciphertext.
nPerforming switch configuration.
nAdding/removing user accounts.
nConfiguring users accounts, including passwords. Once set, a password cannot be
deleted or set to empty.
AOS-CX 10.12 Security Guide | (8100, 8360 Switch Series) 19
Managing users and groups |20
Group/Role Privileges
nREST API: All methods (GET, PUT, POST, DELETE) and switch resources are available.
The privilege level for administrators is 15.
operators Operators have no switch configuration privileges. Operators are restricted to:
nBasic display-only CLI access.
nViewing of nonsensitive switch configuration information.
nREST API: Other than the \login and \logout resources, only the GET method is
available.
The privilege level for operators is 1.
auditors Auditors are restricted to functions related to auditing only:
nCLI: Access to commands in the auditor context (auditor>) only.
nWeb UI: Access to the System > Log page only.
nREST API: POST method available for the \login and \logout resources. GET
method available for the following resources only:
oAudit log: /logs/audit
oEvent log: /logs/event
The privilege level for auditors is 19.
User-defined user groups
The switch enables you to create up to 29 user-defined local user groups, for the purpose of configuring
local authorization. Each of the 29 user-defined groups support up to 1024 CLI command authorization
rules that define what CLI commands can be executed by members of the group.
The local user groups with their command execution rules are useful for the following:
nProviding authorization for use with RADIUS servers.
nProviding fallback authorization for use with TACACS+ servers.
nProviding authorization when neither RADIUS or TACACS+ servers are used.
User name requirements
Specifies the user name. Requirements:
nMust start with a lowercase letter.
nCan contain numbers and lowercase letters.
nCan include only these three special characters: hyphens ( - ), dots ( . ), and underscores ( _ ).
nCan have a maximum of 32 characters.
nCannot be empty.
nCannot contain uppercase letters.
nCannot be: admin, root, or remote_user.
nCannot be Linux reserved names such as:
daemon,bin,sys,sync,proxy,www-data,backup,list,irc,gnats,nobody,systemd-bus-proxy,
sshd,messagebus,rpc,systemd-journal-gateway,systemd-journal-remote,systemd-journal-
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335
  • Page 336 336
  • Page 337 337
  • Page 338 338
  • Page 339 339
  • Page 340 340
  • Page 341 341
  • Page 342 342
  • Page 343 343
  • Page 344 344
  • Page 345 345
  • Page 346 346
  • Page 347 347
  • Page 348 348
  • Page 349 349
  • Page 350 350
  • Page 351 351
  • Page 352 352
  • Page 353 353
  • Page 354 354
  • Page 355 355
  • Page 356 356
  • Page 357 357
  • Page 358 358
  • Page 359 359
  • Page 360 360
  • Page 361 361
  • Page 362 362
  • Page 363 363
  • Page 364 364
  • Page 365 365
  • Page 366 366
  • Page 367 367
  • Page 368 368
  • Page 369 369
  • Page 370 370
  • Page 371 371
  • Page 372 372
  • Page 373 373
  • Page 374 374
  • Page 375 375
  • Page 376 376
  • Page 377 377
  • Page 378 378
  • Page 379 379
  • Page 380 380
  • Page 381 381
  • Page 382 382
  • Page 383 383
  • Page 384 384
  • Page 385 385
  • Page 386 386
  • Page 387 387
  • Page 388 388
  • Page 389 389
  • Page 390 390
  • Page 391 391
  • Page 392 392
  • Page 393 393
  • Page 394 394
  • Page 395 395
  • Page 396 396
  • Page 397 397
  • Page 398 398
  • Page 399 399
  • Page 400 400
  • Page 401 401
  • Page 402 402
  • Page 403 403
  • Page 404 404
  • Page 405 405
  • Page 406 406
  • Page 407 407
  • Page 408 408
  • Page 409 409
  • Page 410 410
  • Page 411 411
  • Page 412 412
  • Page 413 413
  • Page 414 414
  • Page 415 415
  • Page 416 416
  • Page 417 417
  • Page 418 418
  • Page 419 419
  • Page 420 420
  • Page 421 421
  • Page 422 422
  • Page 423 423
  • Page 424 424
  • Page 425 425
  • Page 426 426
  • Page 427 427
  • Page 428 428
  • Page 429 429
  • Page 430 430
  • Page 431 431
  • Page 432 432
  • Page 433 433
  • Page 434 434
  • Page 435 435
  • Page 436 436
  • Page 437 437
  • Page 438 438
  • Page 439 439
  • Page 440 440
  • Page 441 441
  • Page 442 442
  • Page 443 443
  • Page 444 444
  • Page 445 445
  • Page 446 446
  • Page 447 447
  • Page 448 448
  • Page 449 449
  • Page 450 450
  • Page 451 451
  • Page 452 452
  • Page 453 453
  • Page 454 454
  • Page 455 455
  • Page 456 456
  • Page 457 457
  • Page 458 458
  • Page 459 459
  • Page 460 460
  • Page 461 461
  • Page 462 462
  • Page 463 463
  • Page 464 464
  • Page 465 465
  • Page 466 466
  • Page 467 467
  • Page 468 468
  • Page 469 469
  • Page 470 470
  • Page 471 471
  • Page 472 472
  • Page 473 473
  • Page 474 474
  • Page 475 475
  • Page 476 476
  • Page 477 477
  • Page 478 478
  • Page 479 479
  • Page 480 480
  • Page 481 481
  • Page 482 482
  • Page 483 483
  • Page 484 484
  • Page 485 485
  • Page 486 486
  • Page 487 487
  • Page 488 488
  • Page 489 489
  • Page 490 490
  • Page 491 491
  • Page 492 492
  • Page 493 493
  • Page 494 494
  • Page 495 495
  • Page 496 496
  • Page 497 497
  • Page 498 498
  • Page 499 499
  • Page 500 500
  • Page 501 501
  • Page 502 502
  • Page 503 503
  • Page 504 504
  • Page 505 505
  • Page 506 506
  • Page 507 507
  • Page 508 508
  • Page 509 509
  • Page 510 510
  • Page 511 511
  • Page 512 512
  • Page 513 513
  • Page 514 514
  • Page 515 515
  • Page 516 516
  • Page 517 517
  • Page 518 518
  • Page 519 519
  • Page 520 520
  • Page 521 521
  • Page 522 522
  • Page 523 523
  • Page 524 524
  • Page 525 525
  • Page 526 526
  • Page 527 527
  • Page 528 528
  • Page 529 529
  • Page 530 530
  • Page 531 531
  • Page 532 532
  • Page 533 533
  • Page 534 534
  • Page 535 535
  • Page 536 536
  • Page 537 537
  • Page 538 538
  • Page 539 539
  • Page 540 540
  • Page 541 541
  • Page 542 542
  • Page 543 543
  • Page 544 544
  • Page 545 545
  • Page 546 546
  • Page 547 547
  • Page 548 548
  • Page 549 549
  • Page 550 550
  • Page 551 551
  • Page 552 552
  • Page 553 553
  • Page 554 554
  • Page 555 555
  • Page 556 556
  • Page 557 557
  • Page 558 558
  • Page 559 559
  • Page 560 560
  • Page 561 561
  • Page 562 562
  • Page 563 563
  • Page 564 564
  • Page 565 565
  • Page 566 566
  • Page 567 567
  • Page 568 568

Aruba AOS-CX 10.12 Security User guide

Type
User guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI