Aruba 2530 Installation guide

Category
Software manuals
Type
Installation guide

This manual is also suitable for

ArubaOS-Switch Access Security Guide
for YA/YB.16.03
Part Number: 5200-2904b
Published: August 2017
Edition: 3
© Copyright 2017 Hewlett Packard Enterprise Development LP
Notices
The information contained herein is subject to change without notice. The only warranties for Hewlett Packard
Enterprise products and services are set forth in the express warranty statements accompanying such products
and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard
Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or
copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's
standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard Enterprise
has no control over and is not responsible for information outside the Hewlett Packard Enterprise website.
Acknowledgments
Intel®, Itanium®, Pentium®, Intel Inside®, and the Intel Inside logo are trademarks of Intel Corporation in the United
States and other countries.
Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the United
States and/or other countries.
Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated.
Java® and Oracle® are registered trademarks of Oracle and/or its affiliates.
UNIX® is a registered trademark of The Open Group.
Chapter 1 About this document....................................................................15
Chapter 2 Security Overview.........................................................................16
Introduction.............................................................................................................................................. 16
About this guide............................................................................................................................ 16
For more information.....................................................................................................................16
Access security features.......................................................................................................................... 16
Network security features........................................................................................................................ 24
Getting started with access security........................................................................................................ 24
Physical security........................................................................................................................... 24
Using the Management Interface wizard.......................................................................................25
Configuring security settings using the CLI wizard.............................................................25
WebAgent: Management Interface wizard......................................................................... 27
SNMP security guidelines............................................................................................................. 27
General SNMP access to the switch.................................................................................. 27
SNMP access to the authentication configuration MIB...................................................... 27
HPE PCM+ Identity-Driven manager (IDM)............................................................................................. 28
Chapter 3 Configuring Username and Password Security........................ 29
Overview.................................................................................................................................................. 29
Configuring password security...................................................................................................... 29
Configuring local password security........................................................................................................ 30
Setting passwords (Menu)............................................................................................................ 30
Deleting password protection............................................................................................. 30
Recovering from a lost manager password........................................................................31
Setting passwords and usernames (CLI)...................................................................................... 31
Removing password protection.......................................................................................... 31
Setting passwords and usernames (WebAgent)...........................................................................32
Saving security credentials in a config file............................................................................................... 32
Benefits of saving security credentials.......................................................................................... 32
Enabling the storage and display of security credentials.............................................................. 32
Security settings that can be saved.............................................................................................. 33
Local manager and operator passwords.......................................................................................33
Front panel security................................................................................................................................. 34
When security is important............................................................................................................34
Front-panel button functions......................................................................................................... 34
Clear button........................................................................................................................35
Reset button....................................................................................................................... 35
Restoring the factory default configuration.........................................................................35
Configuring front panel security.................................................................................................... 36
Disabling the clear password function of the Clear button................................................. 37
Re-enabling the Clear button and setting or changing the ‘reset-on-clear’ operation........ 38
Changing the operation Reset+Clear combination.............................................................39
Password recovery.................................................................................................................................. 40
Disabling or re-enabling the password recovery process............................................................. 40
Password recovery process.......................................................................................................... 41
Contents
Contents 3
Chapter 4 Web and MAC Authentication......................................................43
Overview.................................................................................................................................................. 43
Web-based authentication.............................................................................................................43
MAC authentication.......................................................................................................................43
Concurrent web-based and MAC authentication.......................................................................... 44
Authorized and unauthorized client VLANs...................................................................................44
RADIUS-based authentication...................................................................................................... 44
Wireless clients............................................................................................................................. 45
How web-based and MAC authentication operate...................................................................................45
Web-based authentication.............................................................................................................45
Order of priority for assigning VLANs.................................................................................46
MAC-based authentication............................................................................................................47
Operating rules and notes........................................................................................................................47
Setup procedure for web-based/MAC authentication.............................................................................. 49
Configuring the RADIUS server to support MAC authentication...................................................50
Configuring the switch to access a RADIUS server...................................................................... 50
Radius service tracking................................................................................................................. 51
radius-server tracking.........................................................................................................51
radius-server tracking user-name.......................................................................................52
Configuring web-based authentication.....................................................................................................52
Overview....................................................................................................................................... 53
Configuration commands for web-based authentication............................................................... 53
Controlled direction............................................................................................................ 53
Disable web-based authentication..................................................................................... 54
Specifying the VLAN.......................................................................................................... 54
Maximum authenticated clients.......................................................................................... 54
Specifies base address...................................................................................................... 55
Specifies lease length........................................................................................................ 55
Allowing client moves between specified ports.................................................................. 55
Specifying the period..........................................................................................................55
Specifying the number of authentication attempts............................................................. 55
Specifying maximum retries............................................................................................... 56
Specifying the time period.................................................................................................. 56
Specifying the re-authentication period.............................................................................. 56
Specifying a forced reauthentication.................................................................................. 56
Specifying the URL.............................................................................................................56
Specifying the timeout........................................................................................................ 57
Enabling or disabling SSL login..........................................................................................57
Configuring MAC authentication.............................................................................................................. 57
Preparation for configuring MAC authentication........................................................................... 57
Configuration commands for MAC authentication.........................................................................57
Configuring a MAC-based address format......................................................................... 57
Configuring other MAC-based commands......................................................................... 58
Show status and configuration of web-based authentication........................................................ 60
Show status and configuration of MAC-based authentication.......................................................61
Client status.................................................................................................................................. 61
Chapter 5 Local MAC Authentication........................................................... 63
Overview.................................................................................................................................................. 63
Concepts....................................................................................................................................... 63
Possible scenarios for deployment.......................................................................................................... 63
Show commands..................................................................................................................................... 64
Configuration commands......................................................................................................................... 65
4ArubaOS-Switch Access Security Guide for YA/YB.16.03
Per-port attributes......................................................................................................................... 66
Configuration examples................................................................................................................ 66
Configuration example 1.................................................................................................... 66
Configuration example 2.................................................................................................... 66
Configuration using mac-groups........................................................................................ 68
Configuration without using mac-groups............................................................................ 68
Chapter 6 Port-based MAC authentication.................................................. 70
Overview.................................................................................................................................................. 70
Operating notes....................................................................................................................................... 70
aaa port-access use-lldp-data..................................................................................................................70
Chapter 7 TACACS+ Authentication.............................................................72
Overview.................................................................................................................................................. 72
General system requirements..................................................................................................................72
General authentication setup procedure..................................................................................................73
Configuring TACACS+ on the switch....................................................................................................... 74
show authentication...................................................................................................................... 75
Viewing the current TACACS+ server contact configuration.........................................................75
Configuring the switch authentication methods.............................................................................76
Using the privilege-mode option for login........................................................................... 76
Authentication parameters................................................................................................. 77
Configuring TACACS+ server....................................................................................................... 79
Configuring the TACACS+ server for single login......................................................................... 80
Configuring the switch TACACS+ server access.......................................................................... 83
TACACS+ authorization and accounting commands......................................................... 84
Device running a TACACS+ server application..................................................................89
Optional, global "encryption key"........................................................................................90
Specifying how long the switch waits for a TACACS+ server to respond to an
authentication request........................................................................................................ 91
Adding, removing, or changing the priority of a TACACS+ server..................................... 91
Configuring an encryption key............................................................................................92
How authentication operates................................................................................................................... 93
General authentication process using a TACACS+ server........................................................... 93
Local authentication process (TACACS+).....................................................................................94
Using the encryption key...............................................................................................................94
General operation...............................................................................................................94
Encryption options in the switch......................................................................................... 95
Controlling WebAgent access when using TACACS+ authentication......................................................95
Messages related to TACACS+ operation............................................................................................... 95
Operating notes....................................................................................................................................... 96
Chapter 8 RADIUS Authentication, Authorization, and Accounting......... 97
Overview.................................................................................................................................................. 97
Authentication Services.................................................................................................................97
Accounting services...................................................................................................................... 97
SNMP access to the switch's authentication configuration MIB....................................................97
Switch operating rules for RADIUS..........................................................................................................97
General RADIUS setup procedure...........................................................................................................98
Configuring the switch for RADIUS authentication.................................................................................. 99
Configuring authentication for the access methods that RADIUS protects...................................99
Enabling manager access privilege (optional)............................................................................ 102
Configuring the switch to access a RADIUS server.................................................................... 102
Contents 5
Configuring the switch global RADIUS parameters.................................................................... 104
Using SNMP to view and configure switch authentication features....................................................... 106
Viewing and changing the SNMP access configuration..............................................................107
Local authentication process (RADIUS)................................................................................................ 109
Controlling WebAgent access................................................................................................................109
Commands authorization....................................................................................................................... 109
Enabling authorization.................................................................................................................110
Viewing authorization information................................................................................................110
Configuring commands authorization on a RADIUS server.........................................................111
Using vendor specific attributes (VSAs)............................................................................111
Example configuration on Cisco secure ACS for MS Windows........................................112
Example configuration using FreeRADIUS.......................................................................114
Additional RADIUS attributes................................................................................................................. 115
MAC-based VLANs................................................................................................................................ 115
Accounting services............................................................................................................................... 116
Accounting service types.............................................................................................................116
Operating rules for RADIUS accounting......................................................................................116
Configuring RADIUS accounting................................................................................................. 117
Steps for configuring RADIUS accounting........................................................................117
Viewing RADIUS statistics..................................................................................................................... 121
General RADIUS statistics.......................................................................................................... 121
RADIUS authentication statistics................................................................................................ 123
RADIUS accounting statistics..................................................................................................... 124
Changing RADIUS-server access order................................................................................................ 125
Chapter 9 RADIUS Services Support on HPE Switches........................... 127
RADIUS client and server requirements................................................................................................ 127
Optional PCM and HPE PMC IDM network management applications................................................. 127
RADIUS server configuration for CoS (802.1p priority) and rate-limiting...............................................128
Applied rates for RADIUS-assigned rate limits........................................................................... 130
Per-port bandwidth override............................................................................................. 131
Viewing the currently active per-port CoS and rate-limiting configuration...................................132
Viewing CLI-configured rate-limiting and port priority for ports.........................................134
Configuring and using dynamic (RADIUS-assigned) access control lists..............................................135
Overview of RADIUS-assigned, dynamic ACLs..........................................................................135
Traffic applications............................................................................................................136
Contrasting RADIUS-assigned and static ACLs......................................................................... 137
How a RADIUS server applies a RADIUS-assigned ACL to a client on a switch port................ 138
Multiple clients sharing the same RADIUS-assigned ACL............................................... 139
Effect of multiple ACL application types on an interface.................................................. 139
General ACL features, planning, and configuration.................................................................... 139
The packet-filtering process........................................................................................................ 140
Operating rules for RADIUS-assigned ACLs.............................................................................. 140
Configuring an ACL in a RADIUS server.................................................................................... 140
Nas-filter-rule options....................................................................................................... 141
ACE syntax in RADIUS servers.................................................................................................. 144
Using the standard attribute in an IPv4 ACL (example)................................................... 147
Using HPE VSA 63 to assign IPv6 and IPv4 ACLs (example)......................................... 149
Using HPE VSA 61 to assign IPv4 ACLs (example)........................................................ 150
Configuration notes.......................................................................................................... 151
Configuring the switch to support RADIUS-assigned ACLs........................................................151
Displaying the current RADIUS-assigned ACL activity on the switch......................................... 152
Event Log messages...................................................................................................................156
Causes of client deauthentication immediately after authenticating........................................... 156
Monitoring shared resources.......................................................................................................156
6ArubaOS-Switch Access Security Guide for YA/YB.16.03
RADIUS filter-id......................................................................................................................................157
Forcing reauthentication..............................................................................................................157
show access-list radius ..................................................................................................158
show access-list (NAS rule) and (filter-id) ..........................................................................158
Log messages.............................................................................................................................159
Chapter 10 Password Complexity.............................................................. 160
Password complexity overview.............................................................................................................. 160
Password expiration periods..................................................................................................................160
Requirements.........................................................................................................................................160
Limitations..............................................................................................................................................161
Configuring Password Complexity......................................................................................................... 161
Viewing the password configuration............................................................................................161
Enable Password Complexity..................................................................................................... 162
Configure the Password Complexity parameters........................................................................162
Configure password minimum length..........................................................................................163
Configure password composition................................................................................................ 163
Configure password complexity checks...................................................................................... 164
password configuration commands....................................................................................................... 164
password configuration-control.............................................................................................................. 165
password configuration.......................................................................................................................... 166
password minimum-length..................................................................................................................... 167
password ...............................................................................................................................................167
aaa authentication local-user................................................................................................................. 168
password complexity..............................................................................................................................169
password composition........................................................................................................................... 169
show password-configuration................................................................................................................ 170
Troubleshooting..................................................................................................................................... 171
Unable to enable Password Complexity..................................................................................... 171
Unable to download the configuration file................................................................................... 171
Validation rules............................................................................................................................171
Display messages....................................................................................................................... 174
Chapter 11 Configuring Secure Shell (SSH).............................................. 176
Overview................................................................................................................................................ 176
Client public-key authentication (login/operator level) with user password authentication
(enable/manager level)............................................................................................................... 176
Switch SSH and user password authentication.......................................................................... 176
Prerequisite for using SSH.....................................................................................................................177
Public key formats..................................................................................................................................177
Steps for configuring and using SSH for switch and client authentication............................................. 177
General operating rules and notes.........................................................................................................178
Configuring the switch for SSH operation.............................................................................................. 178
Generating or erasing the switch public/private host key pair.....................................................179
crypto key generate................................................................................................ 180
show crypto host-public-key............................................................................... 180
zeroize.......................................................................................................................... 181
Displaying the public key.............................................................................................................181
Providing the switch public key to clients.................................................................................... 182
Enabling SSH on the switch and anticipating SSH client contact behavior................................ 183
ip ssh.............................................................................................................................184
Disabling SSH on the switch....................................................................................................... 185
Configuring the switch for SSH authentication............................................................................185
Option A: Configuring SSH access for password-only SSH authentication..................... 186
Contents 7
Option B: Configuring the switch for client Public-Key SSH authentication..................... 186
SSH client contact behavior............................................................................................. 188
Disable username prompt for management interface authentication in the Quick Base system...........189
Switch behavior with Telnet.........................................................................................................189
Switch behavior with SSH........................................................................................................... 191
Switch behavior with WebUI........................................................................................................192
SSH client public-key authentication notes............................................................................................193
Using client public-key authentication......................................................................................... 194
Creating a client public-key text file.............................................................................................194
Replacing or clearing the public-key file......................................................................................196
Enabling client public-key authentication.................................................................................... 197
Messages related to SSH operation...................................................................................................... 197
Logging messages...................................................................................................................... 198
Debug logging............................................................................................................................. 199
Chapter 12 Configuring Secure Socket Layer (SSL).................................200
Overview................................................................................................................................................ 200
Server certificate authentication with user password authentication...........................................200
Prerequisite for using SSL..................................................................................................................... 201
Steps for configuring and using SSL for switch and client authentication..............................................201
General operating rules and notes.........................................................................................................201
Configuring the switch for SSL operation...............................................................................................201
Assigning a local login (operator) and enabling (manager) password........................................ 201
Using the WebAgent to configure local passwords.......................................................... 201
Generating the switch's server host certificate............................................................................202
To generate or erase the switch's server certificate with the CLI..................................... 202
Comments on certificate fields......................................................................................... 203
Generate a self-signed host certificate with the WebAgent..............................................203
Generate a CA-Signed server host certificate with the WebAgent...................................204
Enabling SSL on the switch and anticipating SSL browser contact behavior............................. 205
SSL client contact behavior..............................................................................................205
Using the CLI interface to enable SSL............................................................................. 206
Using the WebAgent to enable SSL.................................................................................206
Common errors in SSL setup.................................................................................................................207
Chapter 13 IPv4 Access Control Lists (ACLs)...........................................208
Options for applying IPv4 ACLs on the switch....................................................................................... 208
Static ACLs................................................................................................................................. 208
Overview................................................................................................................................................ 209
Types of IPv4 ACLs.....................................................................................................................209
Standard ACL...................................................................................................................209
Extended ACL.................................................................................................................. 209
ACL applications......................................................................................................................... 209
VACL applications............................................................................................................ 209
Static port ACL and RADIUS-assigned ACL applications................................................ 210
Multiple ACLs on an interface..................................................................................................... 210
For a packet to be permitted, it must have a match with a "permit" ACE in all
applicable ACLs assigned to an interface.........................................................................211
Exception for connection-rate filtering.............................................................................. 211
Features common to all ACL applications...................................................................................211
General steps for planning and configuring ACLs.......................................................................211
IPv4 static ACL operation...................................................................................................................... 212
Introduction................................................................................................................................. 212
The packet-filtering process........................................................................................................ 213
8ArubaOS-Switch Access Security Guide for YA/YB.16.03
Sequential comparison and action................................................................................... 213
Implicit Deny.....................................................................................................................213
Planning an ACL application..................................................................................................................215
IPv4 traffic management and improved network performance....................................................215
Security....................................................................................................................................... 215
Guidelines for planning the structure of a static ACL.................................................................. 216
IPv4 ACL configuration and operating rules................................................................................216
How an ACE uses a mask to screen packets for matches......................................................... 217
What Is the difference between network (or subnet) masks and the masks used with
ACLs?...............................................................................................................................217
Rules for defining a match between a packet and an ACE.............................................. 218
Configuring and assigning an IPv4 ACL................................................................................................ 222
General steps for implementing ACLs........................................................................................ 222
Options for permit/deny policies..................................................................................................222
ACL configuration structure.........................................................................................................222
Standard ACL structure....................................................................................................223
Extended ACL configuration structure..............................................................................224
ACL configuration factors............................................................................................................226
The sequence of entries in an ACL is significant............................................................. 226
Allowing for the Implied Deny function............................................................................. 228
A configured ACL has no effect until you apply it to an interface..................................... 228
You can assign an ACL name or number to an interface even if the ACL does not
exist in the switch configuration........................................................................................228
Using the CLI to create an ACL.................................................................................................. 228
Inserting or adding an ACE to an ACL............................................................................. 228
Using CIDR notation to enter the IPv4 ACL mask............................................................229
Configuring standard ACLs....................................................................................................................230
Configuring named, standard ACLs............................................................................................ 230
Entering the IPv4 named ACL context............................................................................. 230
Configuring ACEs in a named, standard ACL.................................................................. 231
Creating numbered, standard ACLs.................................................................................232
Configuring extended ACLs................................................................................................................... 234
Configuring named, extended ACLs........................................................................................... 234
Configuring ACEs in named, extended ACLs............................................................................. 235
Including options for TCP and UDP traffic in extended ACLs..................................................... 237
Configuring numbered, extended ACLs...................................................................................... 238
Creating or adding to an extended, numbered ACL.........................................................238
Controlling TCP and UDP traffic flow............................................................................... 241
Adding or removing an ACL assignment on an interface.......................................................................241
Filtering IPv4 traffic inbound on a VLAN..................................................................................... 241
Filtering inbound IPv4 traffic per port.......................................................................................... 242
Deleting an ACL.....................................................................................................................................243
Editing an existing ACL..........................................................................................................................243
Using the CLI to edit ACLs..........................................................................................................244
General editing rules................................................................................................................... 244
Sequence numbering in ACLs.................................................................................................... 244
Inserting an ACE in an existing ACL................................................................................ 245
Deleting an ACE from an existing ACL............................................................................ 246
Resequencing the ACEs in an ACL................................................................................. 247
Attaching a remark to an ACE..........................................................................................248
Operating notes for remarks.............................................................................................250
Viewing ACL configuration data.............................................................................................................251
Viewing an ACL summary...........................................................................................................251
Viewing the content of all ACLs on the switch.............................................................................252
Viewing the VACL assignments for a VLAN................................................................................253
Viewing static port (and trunk) ACL assignments........................................................................254
Viewing specific ACL configuration details..................................................................................254
Contents 9
Viewing all ACLs and their assignments in the routing switch startup-config and running-
config files................................................................................................................................... 258
Creating or editing an ACL offline.......................................................................................................... 258
Enable ACL “deny” or “permit” logging.................................................................................................. 260
Requirements for using ACL logging.......................................................................................... 260
ACL logging operation.................................................................................................................260
Enabling ACL logging on the switch............................................................................................261
Configuring logging timer............................................................................................................ 261
Monitoring static ACL performance.............................................................................................261
IPv6 counter operation with multiple interface assignments............................................ 264
General ACL operating notes................................................................................................................ 265
Chapter 14 Configuring Advanced Threat Protection.............................. 267
Introduction............................................................................................................................................ 267
DHCP snooping..................................................................................................................................... 267
Enabling DHCP snooping........................................................................................................... 268
Enabling DHCP snooping on VLANs.......................................................................................... 269
Configuring DHCP snooping trusted ports.................................................................................. 270
For DHCPv4 servers........................................................................................................ 270
For DHCPv6 servers........................................................................................................ 270
Configuring authorized server addresses................................................................................... 271
Using DHCP snooping with option 82......................................................................................... 271
Changing the remote-id from a MAC to an IP address.................................................... 272
Disabling the MAC address check................................................................................... 272
DHCP binding database..............................................................................................................273
DHCPv4 snooping max-binding.................................................................................................. 274
Enabling debug logging...............................................................................................................275
DHCP operational notes............................................................................................................. 275
Log messages.............................................................................................................................276
IPv6 Network Defense........................................................................................................................... 277
DSNOOPv6 and DIPLDv6.......................................................................................................... 277
Configuring DHCPv6 snooping........................................................................................ 277
Configuring traps for DHCPv6 snooping.......................................................................... 279
Clearing DHCPv6 snooping statistics ..............................................................................279
Enabling debug logging for DHCPv6 snooping................................................................ 279
DHCPv6 show commands............................................................................................... 279
Dynamic ARP protection........................................................................................................................280
Enabling dynamic ARP protection...............................................................................................281
Configuring trusted ports.............................................................................................................281
Adding an IP-to-MAC binding to the DHCP database.................................................................282
Clearing the DHCP snooping binding table......................................................................283
Adding a static binding..................................................................................................... 283
Configuring additional validation checks on ARP packets.......................................................... 283
Verifying the configuration of dynamic ARP protection............................................................... 284
Displaying ARP packet statistics.................................................................................................284
Monitoring dynamic ARP protection............................................................................................285
Dynamic IP lockdown.............................................................................................................................285
Protection against IP source address spoofing...........................................................................285
Prerequisite: DHCP snooping..................................................................................................... 285
Filtering IP and MAC addresses per-port and per-VLAN............................................................ 286
Enabling Dynamic IP Lockdown..................................................................................................287
IPv4.................................................................................................................................. 287
IPv6.................................................................................................................................. 287
Operational notes........................................................................................................................288
Adding an IP-to-MAC binding to the DHCP binding database.................................................... 288
10 ArubaOS-Switch Access Security Guide for YA/YB.16.03
Potential issues with bindings.......................................................................................... 289
Adding a static binding..................................................................................................... 289
Verifying the dynamic IP lockdown configuration........................................................................ 290
For IPv4............................................................................................................................290
For IPv6............................................................................................................................291
Displaying the static configuration of IP-to-MAC bindings.......................................................... 291
For IPv4............................................................................................................................291
For IPv6............................................................................................................................291
Debugging dynamic IP lockdown................................................................................................ 291
Differences between switch platforms.........................................................................................292
Using the instrumentation monitor......................................................................................................... 293
Operating notes...........................................................................................................................295
Configuring instrumentation monitor........................................................................................... 295
Viewing the current instrumentation monitor configuration......................................................... 297
Chapter 15 Traffic/Security Filters and Monitors...................................... 298
Overview................................................................................................................................................ 298
Filter limits................................................................................................................................... 298
Using port trunks with filter..........................................................................................................298
Filter types and operation...................................................................................................................... 298
Source-port filters........................................................................................................................299
Operating rules for source-port filters...............................................................................299
Name source-port filters..............................................................................................................300
Operating rules for named source-port filters...................................................................300
Defining and configuring named source-port filters..........................................................301
Viewing a named source-port filter...................................................................................302
Using named source-port filters....................................................................................... 302
Configuring traffic/security filters............................................................................................................307
Configuring a source-port traffic filter.......................................................................................... 308
Configuring a filter on a port trunk.................................................................................... 308
Editing a source-port filter........................................................................................................... 309
Configuring a multicast filter........................................................................................................310
Filtering index.............................................................................................................................. 311
Displaying traffic/security filters................................................................................................... 311
Chapter 16 Configuring Port and User-Based Access Control (802.1X).313
Overview................................................................................................................................................ 313
Why use port or user-based access control?..............................................................................313
General features......................................................................................................................... 313
User authentication methods...................................................................................................... 313
802.1X user-based access control................................................................................... 313
802.1X port-based access control....................................................................................314
Authenticating users.........................................................................................................314
Providing a path for downloading 802.1X supplicant software.........................................314
Authenticating one switch to another............................................................................... 315
Accounting........................................................................................................................315
General 802.1X authenticator operation................................................................................................ 315
Example of the authentication process....................................................................................... 315
VLAN membership priority.......................................................................................................... 316
General operating rules and notes.........................................................................................................316
General setup procedure for 802.1X access control..............................................................................317
Overview: configuring 802.1X authentication on the switch........................................................318
Configuring switch ports as 802.1X authenticators................................................................................318
Enable 802.1X authentication on selected ports.........................................................................319
Contents 11
Enable the selected ports as authenticators and enable the (default) port-based
authentication................................................................................................................... 319
Specify user-based authentication or return to port-based authentication....................... 319
Reconfigure settings for port-access...........................................................................................320
Configure the 802.1X authentication method..............................................................................322
Enter the RADIUS host IP address(es).......................................................................................323
Enable 802.1X authentication on the switch............................................................................... 324
Reset authenticator operation (optional)..................................................................................... 324
Optional: Configure 802.1X Controlled Direction........................................................................ 324
Wake-on-LAN Traffic...................................................................................................................325
Unauthenticated VLAN access (guest VLAN access).................................................................325
Characteristics of mixed port access mode......................................................................325
Configuring mixed port access mode............................................................................... 326
Configuring RADIUS port speed VSA......................................................................................... 326
Configuring the port.....................................................................................................................326
Viewing the port operation mode.................................................................................................327
802.1X Open VLAN mode..................................................................................................................... 329
Introduction................................................................................................................................. 329
VLAN membership priorities....................................................................................................... 329
Use models for 802.1X Open VLAN modes................................................................................330
Operating rules for authorized and unauthorized-client VLANs.................................................. 333
Setting up and configuring 802.1X Open VLAN mode................................................................337
Configuring general 802.1X operation..............................................................................337
Configuring 802.1X Open VLAN mode............................................................................ 338
Inspecting 802.1X Open VLAN mode operation.............................................................. 339
802.1X Open VLAN operating notes...........................................................................................339
Option for authenticator ports: configure port-security to allow only 802.1X-authenticated devices......340
Port-Security............................................................................................................................... 341
Configure the port access type.........................................................................................341
Configuring switch ports to operate as supplicants for 802.1X connections to other switches..............342
Supplicant port configuration.......................................................................................................342
Enabling a switch port as a supplicant............................................................................. 343
Configuring a supplicant switch port.................................................................................343
Displaying 802.1X configuration, statistics, and counters......................................................................344
Show commands for port-access authenticator.......................................................................... 344
Viewing 802.1X Open VLAN mode status...................................................................................344
Show commands for port-access supplicant...............................................................................347
Note on supplicant statistics.............................................................................................348
How RADIUS/802.1X authentication affects VLAN operation............................................................... 348
VLAN assignment on a port........................................................................................................ 348
Operating notes...........................................................................................................................349
Example of untagged VLAN assignment in a RADIUS-based authentication session............... 350
Enabling the use of GVRP-learned dynamic VLANs in authentication sessions........................ 353
Chapter 17 Configuring and Monitoring Port Security............................. 354
Overview................................................................................................................................................ 354
Port security........................................................................................................................................... 354
Basic operation........................................................................................................................... 354
Eavesdrop Prevention.................................................................................................................355
Blocked unauthorized traffic........................................................................................................355
Trunk group exclusion.................................................................................................................356
Planning port security..................................................................................................................356
Port security command options and operation............................................................................357
Displaying port security settings.......................................................................................357
Configuring port security............................................................................................................. 359
12 ArubaOS-Switch Access Security Guide for YA/YB.16.03
Port security commands...................................................................................................359
Retention of static addresses......................................................................................................361
Learned addresses...........................................................................................................362
Assigned/authorized addresses....................................................................................... 362
Specifying authorized devices and intrusion responses...................................................362
Adding an authorized device to a port..............................................................................363
Removing a device from the “authorized” list for a port....................................................364
MAC Lockdown......................................................................................................................................365
How MAC Lockdown works........................................................................................................ 366
Differences between MAC Lockdown and port security..............................................................366
MAC Lockdown operating notes................................................................................................. 367
Limits................................................................................................................................ 367
Event Log messages........................................................................................................367
Limiting the frequency of log messages........................................................................... 367
Deploying MAC Lockdown.......................................................................................................... 367
Basic MAC Lockdown deployment...................................................................................368
Problems using MAC Lockdown in networks with multiple paths.....................................369
MAC Lockout......................................................................................................................................... 370
How MAC Lockout works............................................................................................................ 370
Port security and MAC Lockout............................................................................................................. 371
Denial of Service packet filtering............................................................................................................371
Reading intrusion alerts and resetting alert flags...................................................................................371
Notice of security violations.........................................................................................................371
How the intrusion log operates....................................................................................................372
Keeping the intrusion log current by resetting alert flags............................................................ 372
Checking for intrusions, listing intrusion alerts, and resetting alert flags (Menu)............. 373
Checking for intrusions, listing intrusion alerts, and resetting alert flags (CLI).................375
Using the Event Log to find intrusion alerts (CLI)........................................................................376
Operating notes for port security............................................................................................................377
Identifying the IP address of an intruder..................................................................................... 377
Proxy Web servers......................................................................................................................377
"Prior to" entries in the Intrusion Log...........................................................................................377
Alert flag status for entries forced off of the Intrusion Log...........................................................378
LACP not available on ports configured for port security............................................................ 378
Chapter 18 Using Authorized IP Managers................................................379
Introduction............................................................................................................................................ 379
Defining authorized management stations.............................................................................................379
Overview of IP mask operation................................................................................................... 380
Viewing and configuring IP Authorized managers (Menu).......................................................... 380
Editing or deleting an Authorized manager entry (Menu).................................................381
Viewing and configuring IP Authorized managers (CLI)..............................................................381
Listing the switch’s current IP Authorized manager(s)..................................................... 381
Configuring IP Authorized managers for the switch (CLI)................................................ 382
Configuring IP Authorized managers (WebAgent).................................................................................383
Web proxy servers...................................................................................................................... 384
How to eliminate the web proxy server....................................................................................... 384
Using a web proxy server to access the WebAgent....................................................................384
Building IP Masks.................................................................................................................................. 385
Configuring one station per Authorized manager IP entry.......................................................... 385
Configuring multiple stations per Authorized manager IP entry.................................................. 385
Operating notes..................................................................................................................................... 388
Chapter 19 Key Management System........................................................ 389
Contents 13
Overview................................................................................................................................................ 389
Configuring key chain management...................................................................................................... 389
Creating and deleting key chain entries...................................................................................... 389
Assigning a time-independent key to a chain..............................................................................390
Assigning time-dependent keys to a chain.......................................................................391
Chapter 20 Secure Mode............................................................................. 394
Configuring secure mode.......................................................................................................................394
Chapter 21 Conformance to Suite-B Cryptography requirements.......... 395
Configuration support.............................................................................................................................395
CRL configuration facts...............................................................................................................395
OCSP configuration facts............................................................................................................396
Configure CRL for revocation check .......................................................................................... 396
Configure OCSP for revocation check ....................................................................................... 397
Retrieve CRL ........................................................................................................................................ 397
Set TA profile to validate CRL and OCSP..............................................................................................398
Clear CRL ............................................................................................................................................. 398
Create a certificate signing request....................................................................................................... 398
Create and enroll a self-signed certificate..............................................................................................399
Configure or remove the minimum levels of security minLos for TLS....................................................400
Install authentication files ......................................................................................................................400
Remove authentication files...................................................................................................................401
Remove the client public keys from configuration..................................................................................402
Show details of TA profile ......................................................................................................................402
Chapter 22 Websites.................................................................................... 404
Chapter 23 Support and other resources.................................................. 405
Accessing Hewlett Packard Enterprise Support.................................................................................... 405
Accessing updates.................................................................................................................................405
Customer self repair...............................................................................................................................405
Remote support..................................................................................................................................... 406
Warranty information..............................................................................................................................406
Regulatory information...........................................................................................................................406
Documentation feedback....................................................................................................................... 407
14 ArubaOS-Switch Access Security Guide for YA/YB.16.03
This switch software guide is intended for network administrators and support personnel, and applies to the switch
models listed on this page unless otherwise noted. This guide does not provide information about upgrading or
replacing switch hardware.
Applicable Products
Aruba 2530 Switch Series (J9772A, J9773A, J9774A, J9775A, J9776A, J9777A, J9778A, J9779A, J9780A,
J9781A, J9782A, J9783A, J9853A, J9854A, J9855A, J9856A, JL070A)
Chapter 1
About this document
Chapter 1 About this document 15
Introduction
This chapter provides an overview of the security features included on your switch. For detailed information on
individual features, see the references provided.
Before you connect your switch to a network, Hewlett Packard Enterprise strongly recommends that you review
the section Getting started with access security on page 24. It outlines potential threats for unauthorized
switch and network access, and provides guidelines on how to prepare the switch for secure network operation.
About this guide
This access security guide describes how to configure security features on your switch.
For an introduction to the standard conventions used in this guide, see “Getting Started” in the basic
operation guide for your switch.
For more information
For IPv6-specific security settings and features, see the IPv6 configuration guide for your switch.
For information on which product manual to consult for a specific software feature, see the Software feature index
– extended.
For the latest version of all HPE switch documentation, including Release Notes covering recently added features
and other software topics, visit the Hewlett Packard Enterprise Networking website at http://www.hpe.com/
support/manuals.
Access security features
This section provides an overview of the switch’s access security features, authentication protocols, and methods.
For more in-depth information, see the references provided (all chapter and page references are to this access
security guide unless a different manual name is indicated).
The Management Interface wizard provides a convenient step-by-step method to prepare the switch
for secure network operation. See Using the Management Interface wizard on page 25 for
details.
Chapter 2
Security Overview
16 ArubaOS-Switch Access Security Guide for YA/YB.16.03
Table 1: Access security and switch authentication features
Feature Default setting Security guidelines More information and
configuration details
Manager password no password Configuring a local
manager password is a
fundamental step in
reducing the possibility of
unauthorized access
through the switch's
WebAgent and console
(CLI and Menu) interfaces.
The manager password
can easily be set by any
one of the following
methods:
CLI: password
manager command, or
Management interface
wizard
WebAgent: the
password options
under the Security tab,
or Management
interface wizard
Menu interface:
Console passwords
option
• SNMP
Configuring local
password security on
page 30
Using the Management
Interface wizard on page
25
Using SNMP to view and
configure switch
authentication features
on page 106
Telnet and Web-browser
access (WebAgent) enabled The default remote
management protocols
enabled on the switch are
plain text protocols, which
transfer passwords in
open or plain text that is
easily captured.
To reduce the chances of
unauthorized users
capturing your passwords,
secure and encrypted
protocols such as SSH
and SSL (see below for
details) should be used for
remote access. This
enables you to employ
increased access security
while still retaining remote
client access.
Also, access security on
the switch is incomplete
Using the Management
Interface wizard on page
25
For more on Telnet and
the WebAgent, see
"Interface Access and
System Information" in the
management and
configuration guide.For
RADIUS accounting, see
RADIUS Authentication,
Authorization, and
Accounting on page 97
Table Continued
Chapter 2 Security Overview 17
Feature Default setting Security guidelines More information and
configuration details
without disabling Telnet
and the standard Web
browser access
(WebAgent). Among the
methods for blocking
unauthorized access
attempts using Telnet or
the WebAgent are the
following two CLI
commands:
no telnet-server
: This command blocks
inbound Telnet access.
no web-management
: This command
prevents use of the
WebAgent through http
(port 80) server
access.
If you choose not to
disable Telnet and the
WebAgent, you may want
to consider using RADIUS
accounting to maintain a
record of password-
protected access to the
switch.
Table Continued
18 ArubaOS-Switch Access Security Guide for YA/YB.16.03
Feature Default setting Security guidelines More information and
configuration details
SSH disabled SSH provides Telnet-like
functions through
encrypted, authenticated
transactions of the
following types:
client public-key
authentication: uses
one or more public
keys (from clients) that
must be stored on the
switch. Only a client
with a private key that
matches a stored
public key can gain
access to the switch.
switch SSH and user
password
authentication: this
option is a subset of
the client public-key
authentication, and is
used if the switch has
SSH enabled without a
login access configured
to authenticate the
client's key. In this
case, the switch
authenticates itself to
clients, and users on
SSH clients then
authenticate
themselves to the
switch by providing
passwords stored on a
RADIUS or TACACS+
server, or locally on the
switch.
secure copy (SC) and
secure FTP (SFTP): By
opening a secure,
encrypted SSH
session, you can take
advantage of SC and
SFTP to provide a
secure alternative to
TFTP for transferring
sensitive switch
information. For more
on SC and SFTP, see
Using the Management
Interface wizard on page
25
Configuring Secure
Shell (SSH) on page 176
Table Continued
Chapter 2 Security Overview 19
Feature Default setting Security guidelines More information and
configuration details
the section titled "Using
Secure Copy and
SFTP" in the "File
Transfers" appendix of
the management and
configuration guide for
your switch.
SSL disabled Secure Socket Layer
(SSL) and Transport Layer
Security (TLS) provide
remote Web browser
access (WebAgent) to the
switch via authenticated
transactions and
encrypted paths between
the switch and
management station
clients capable of
SSL/TLS operation. The
authenticated type
includes server certificate
authentication with user
password authentication.
Using the Management
Interface wizard on page
25
Configuring Secure
Socket Layer (SSL) on
page 200
SNMP public, unrestricted In the default
configuration, the switch is
open to access by
management stations
running SNMP
management applications
capable of viewing and
changing the settings and
status data in the switch
MIB (Management
Information Base). Thus,
controlling SNMP access
to the switch and
preventing unauthorized
SNMP access should be a
key element of your
network security strategy.
SNMP security
guidelines on page 27
Using the Management
Interface wizard on page
25 management and
configuration guide, see
“Using SNMP Tools to
manage the switch”.
Table Continued
20 ArubaOS-Switch Access Security Guide for YA/YB.16.03
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335
  • Page 336 336
  • Page 337 337
  • Page 338 338
  • Page 339 339
  • Page 340 340
  • Page 341 341
  • Page 342 342
  • Page 343 343
  • Page 344 344
  • Page 345 345
  • Page 346 346
  • Page 347 347
  • Page 348 348
  • Page 349 349
  • Page 350 350
  • Page 351 351
  • Page 352 352
  • Page 353 353
  • Page 354 354
  • Page 355 355
  • Page 356 356
  • Page 357 357
  • Page 358 358
  • Page 359 359
  • Page 360 360
  • Page 361 361
  • Page 362 362
  • Page 363 363
  • Page 364 364
  • Page 365 365
  • Page 366 366
  • Page 367 367
  • Page 368 368
  • Page 369 369
  • Page 370 370
  • Page 371 371
  • Page 372 372
  • Page 373 373
  • Page 374 374
  • Page 375 375
  • Page 376 376
  • Page 377 377
  • Page 378 378
  • Page 379 379
  • Page 380 380
  • Page 381 381
  • Page 382 382
  • Page 383 383
  • Page 384 384
  • Page 385 385
  • Page 386 386
  • Page 387 387
  • Page 388 388
  • Page 389 389
  • Page 390 390
  • Page 391 391
  • Page 392 392
  • Page 393 393
  • Page 394 394
  • Page 395 395
  • Page 396 396
  • Page 397 397
  • Page 398 398
  • Page 399 399
  • Page 400 400
  • Page 401 401
  • Page 402 402
  • Page 403 403
  • Page 404 404
  • Page 405 405
  • Page 406 406
  • Page 407 407

Aruba 2530 Installation guide

Category
Software manuals
Type
Installation guide
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI