ProCurve 3500yl Series

HP ProCurve 3500yl Series Access Security Manual

  • Hello! I am an AI chatbot trained to assist you with the HP ProCurve 3500yl Series Access Security Manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
HP Switch Software
3500 switches
3500yl switches
5400zl switches
6200yl switches
6600 switches
8200zl switches
Software version K.15.06
September 2011
Access Security Guide
HP Networking
3500 Switches
3500yl Switches
5400zl Switches
6200yl Switch
6600 Switches
8200zl Switches
Access Security Guide
September 2011
K.15.06
Hewlett-Packard Company
8000 Foothills Boulevard, m/s 5551
Roseville, California 95747-5551
www.hp.com/networking/support
© Copyright 2005–2011 Hewlett-Packard Development Company,
L.P. The information contained herein is subject to change with-
out notice. All Rights Reserved.
This document contains proprietary information, which is
protected by copyright. No part of this document may be
photocopied, reproduced, or translated into another lan-
gauge without the prior written consent of Hewlett-Packard.
Publication Number
5998-2703
September 2011
Applicable Products
HP Switch E3500-24 (J9470A)
HP Switch E3500-48 (J9472A)
HP Switch E3500-24-PoE (J9471A)
HP Switch E3500-48-PoE (J9473A)
HP Switch E3500yl-24G-PWR (J8692A)
HP Switch E3500yl-48G-PWR (J8693A)
HP Switch E5406zl (J8697A)
HP Switch E5406zl-48G-PoE+ (J9447A)
HP Switch E5412zl (J8698A)
HP Switch E5412zl-96G-PoE+ (J9448A)
HP Switch E6200yl-24G (J8992A)
HP Switch E8206zl (J9475A)
HP Switch E8212zl (J8715A/B)
HP Switch E6600-24G (J9263A)
HP Switch E6600-24G-4XG (J9264A)
HP Switch E6600-24G-24XG (J9265A)
HP Switch E6600-48G (J9451A)
HP Switch E6600-48G-4XG (J9452A)
Trademark Credits
Microsoft, Windows, and Microsoft Windows NT are U.S.
registered trademarks of Microsoft Corporation.
Software Credits and Notices
SSH on HP switches is based on the OpenSSH soft- ware
toolkit. This product includes software developed by the
OpenSSH Project for use in the OpenSSH Toolkit. For more
information on OpenSSH, visit www.openssh.com.
SSL on HP switches is based on the OpenSSL software
toolkit. This product includes software developed by the
OpenSSL Project for use in the OpenSSL Toolkit. For more
information on OpenSSL, visit
www.openssl.org.
This product includes cryptographic software written by
Eric Young (eay@cryptsoft.com). This product includes
software written by Tim Hudson ([email protected]).
Portions of the software on HP switches are based on the
lightweight TCP/IP (lwIP) software toolkit by Adam
Dunkels, and are covered by the following notices.
Copyright © 2001-2003 Swedish Institute of Computer
Science. All rights reserved. Redistribution and use in source
and binary forms, with or without modification, are
permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above
copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above
copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials
provided with the distribution.
3. The name of the author may not be used to endorse or
promote products derived from this software without
specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS''
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLU-
DING, BUT NOT LIMITED TO, THE IMPLIED WARRAN-
TIES OF MERCHANTABILITY AND FITNESS FOR A PAR-
TICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, IN-
DIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CON-
SEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIM-
ITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSI-
NESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
This product includes software written by Adam Dunkels
Disclaimer
The information contained in this document is subject to
change without notice.
HEWLETT-PACKARD COMPANY MAKES NO WARRANTY
OF ANY KIND WITH REGARD TO THIS MATERIAL,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not
be liable for errors contained herein or for incidental or
consequential damages in connection with the furnishing,
performance, or use of this material.
The only warranties for HP products and services are set
forth in the express warranty statements accompanying
such products and services. Nothing herein should be
construed as constituting an additional warranty. HP shall
not be liable for technical or editorial errors or omissions
contained herein.
Hewlett-Packard assumes no responsibility for the use or
reliability of its software on equipment that is not furnished
by Hewlett-Packard.
Hewlett-Packard Company
8000 Foothills Boulevard, m/s 5551
Roseville, California 95747-5551
www.hp.com/networking/support
Software End User License Agreement and
Hardware Limited Warranty
For the software end user license agreement and the
hardware limited warranty information for HP Networking
products, visit www.hp.com/networking/support.
iv
v
Contents
Product Documentation
About Your Switch Manual Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv
Electronic Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv
Software Feature Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi
1 Security Overview
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
About This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
For More Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Access Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Network Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6
Getting Started with Access Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9
Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9
Quick Start: Using the Management Interface Wizard . . . . . . . . . . . . 1-10
CLI: Management Interface Wizard . . . . . . . . . . . . . . . . . . . . . . . . 1-11
WebAgent: Management Interface Wizard . . . . . . . . . . . . . . . . . . 1-12
SNMP Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-13
Precedence of Security Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-15
Precedence of Port-Based Security Options . . . . . . . . . . . . . . . . . . . . 1-15
Precedence of Client-Based Authentication:
Dynamic Configuration Arbiter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-15
HP E-Network Immunity Manager . . . . . . . . . . . . . . . . . . . . . . . . . 1-16
Arbitrating Client-Specific Attributes . . . . . . . . . . . . . . . . . . . . . . 1-17
HP PMC Identity Driven Manager (IDM) . . . . . . . . . . . . . . . . . . . . . . 1-20
2 Configuring Username and Password Security
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Configuring Local Password Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
Menu: Setting Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
vi
CLI: Setting Passwords and Usernames . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
Setting an Encrypted Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9
WebAgent: Setting Passwords and Usernames . . . . . . . . . . . . . . . . . . 2-10
Saving Security Credentials in a Config File . . . . . . . . . . . . . . . . . . . 2-11
Benefits of Saving Security Credentials . . . . . . . . . . . . . . . . . . . . . . . . 2-11
Enabling the Storage and Display of Security Credentials . . . . . . . . 2-12
Security Settings that Can Be Saved . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13
Executing Include-Credentials or Include-Credentials
Store-in-Config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13
No Include-credentials store-in-config Option . . . . . . . . . . . . . . . 2-14
Local Manager and Operator Passwords . . . . . . . . . . . . . . . . . . . . . . . 2-15
Password Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-16
SNMP Security Credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-17
802.1X Port-Access Credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-18
TACACS+ Encryption Key Authentication . . . . . . . . . . . . . . . . . . . . . 2-18
RADIUS Shared-Secret Key Authentication . . . . . . . . . . . . . . . . . . . . 2-19
Include-Credentials Radius-Tacacs-Only Option . . . . . . . . . . . . . . . . 2-20
SSH Client Public-Key Authentication . . . . . . . . . . . . . . . . . . . . . . . . . 2-21
Displaying the Status of Include-Credentials on the Switch . . . . . . . 2-24
Storage States When Using Include-Credentials . . . . . . . . . . . . . . . . . 2-25
Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-26
Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-28
Encrypting Credentials in the
Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-29
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-29
Enabling Encrypt-Credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-30
Displaying the State of Encrypt-Credentials . . . . . . . . . . . . . . . . . . . . 2-31
Affected Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-32
Important Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-33
Interaction with Include-Credentials Settings . . . . . . . . . . . . . . . . . . . 2-33
Front-Panel Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-34
When Security Is Important . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-34
Front-Panel Button Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-35
Clear Button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-35
Reset Button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-36
vii
Restoring the Factory Default Configuration . . . . . . . . . . . . . . . . 2-36
Configuring Front-Panel Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-37
Disabling the Clear Password Function of the Clear Button . . . 2-40
Re-Enabling the Clear Button and Setting or
Changing the “Reset-On-Clear” Operation . . . . . . . . . . . . . . . . . . 2-41
Changing the Operation of the Reset+Clear Combination . . . . . 2-42
Password Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-44
Disabling or Re-Enabling the Password Recovery Process . . . . . . . . 2-44
Password Recovery Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-46
3 Virus Throttling (Connection-Rate Filtering)
Overview of Connection-Rate Filtering . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Features and Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
General Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Filtering Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Sensitivity to Connection Rate Detection . . . . . . . . . . . . . . . . . . . . 3-4
Application Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Operating Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Unblocking a Currently Blocked Host . . . . . . . . . . . . . . . . . . . . . . 3-6
General Configuration Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7
For a network that is relatively attack-free: . . . . . . . . . . . . . . . . . . . . . 3-7
For a network that appears to be under significant attack: . . . . . . . . . 3-8
Configuring Connection-Rate Filtering . . . . . . . . . . . . . . . . . . . . . . . . . 3-9
Global and Per-Port Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9
Enabling Connection-Rate Filtering and Configuring
Sensitivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
Configuring the Per-Port Filtering Mode . . . . . . . . . . . . . . . . . . . 3-11
Example of a Basic Connection-Rate Filtering Configuration . . 3-12
Viewing and Managing Connection-Rate Status . . . . . . . . . . . . . . . . . 3-14
Viewing Connection-Rate Configuration . . . . . . . . . . . . . . . . . . . 3-14
Listing Currently-Blocked Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16
Unblocking Currently-Blocked Hosts . . . . . . . . . . . . . . . . . . . . . . 3-16
Configuring and Applying Connection-Rate ACLs . . . . . . . . . . . . . . 3-18
Connection-Rate ACL Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-19
viii
Configuring a Connection-Rate ACL Using
Source IP Address Criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-20
Configuring a Connection-Rate ACL Using UDP/TCP Criteria . . . . . 3-22
Applying Connection-Rate ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-25
Using CIDR Notation To Enter the ACE Mask . . . . . . . . . . . . . . . . . . 3-25
Example of Using an ACL in a Connection-Rate Configuration . . . . 3-26
Connection-Rate ACL Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . 3-28
Connection-Rate Log and Trap Messages . . . . . . . . . . . . . . . . . . . . . . 3-30
4 Web and MAC Authentication
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1
Web Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
MAC Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
Concurrent Web and MAC Authentication . . . . . . . . . . . . . . . . . . . . . . 4-3
Authorized and Unauthorized Client VLANs . . . . . . . . . . . . . . . . . . . . . 4-3
RADIUS-Based Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
Wireless Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
How Web and MAC Authentication Operate . . . . . . . . . . . . . . . . . . . . 4-5
Web-based Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5
MAC-based Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-9
Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10
Setup Procedure for Web/MAC Authentication . . . . . . . . . . . . . . . . . 4-12
Before You Configure Web/MAC Authentication . . . . . . . . . . . . . . . . 4-12
Configuring the RADIUS Server To Support MAC Authentication . . 4-15
Configuring the Switch To Access a RADIUS Server . . . . . . . . . . . . . 4-15
Configuring Web Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18
Configuration Commands for Web Authentication . . . . . . . . . . . . . . 4-19
Show Commands for Web Authentication . . . . . . . . . . . . . . . . . . . . . . 4-26
Customizing Web Authentication HTML Files (Optional) . . . . . . . 4-32
Implementing Customized Web-Auth Pages . . . . . . . . . . . . . . . . . . . . 4-32
Operating Notes and Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-32
Customizing HTML Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-33
ix
Customizable HTML Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-34
Configuring MAC Authentication on the Switch . . . . . . . . . . . . . . . . 4-48
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-48
Configuration Commands for MAC Authentication . . . . . . . . . . . . . . 4-49
Configuring the Global MAC Authentication Password . . . . . . . 4-49
Configuring a MAC-based Address Format . . . . . . . . . . . . . . . . . 4-51
Configuring Custom Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-54
Web Page Display of Access Denied Message . . . . . . . . . . . . . . . 4-56
HTTP Redirect When MAC Address Not Found . . . . . . . . . . . . . . . . . 4-59
How HTTP Redirect Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-60
Diagram of the Registration Process . . . . . . . . . . . . . . . . . . . . . . . 4-62
Using the Restrictive-Filter Option . . . . . . . . . . . . . . . . . . . . . . . . 4-63
Show Command Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-63
Reauthenticating a MAC-Auth Client . . . . . . . . . . . . . . . . . . . . . . . 4-63
Configuring the Registration Server URL . . . . . . . . . . . . . . . . . . . 4-64
Unconfiguring a MAC-Auth Registration Server . . . . . . . . . . . . . 4-64
Operating Notes for HTTP Redirect . . . . . . . . . . . . . . . . . . . . . . . 4-64
Show Commands for MAC-Based Authentication . . . . . . . . . . . . . . . 4-65
Client Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-71
5 TACACS+ Authentication
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
Terminology Used in TACACS Applications: . . . . . . . . . . . . . . . . . . . . 5-2
General System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4
General Authentication Setup Procedure . . . . . . . . . . . . . . . . . . . . . . . 5-4
Configuring TACACS+ on the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-7
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-7
CLI Commands Described in this Section . . . . . . . . . . . . . . . . . . . . . . . 5-8
Viewing the Switch’s Current Authentication Configuration . . . . . . . 5-8
Viewing the Switch’s Current TACACS+
Server Contact Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9
Configuring the Switch’s Authentication Methods . . . . . . . . . . . . . . . 5-10
Using the Privilege-Mode Option for Login . . . . . . . . . . . . . . . . . 5-10
Authentication Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12
x
Configuring the TACACS+ Server for Single Login . . . . . . . . . . . . . . 5-12
Configuring the Switch’s TACACS+ Server Access . . . . . . . . . . . . . . 5-17
How Authentication Operates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-24
General Authentication Process Using a TACACS+ Server . . . . . . . . 5-24
Local Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-25
Using the Encryption Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-26
General Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-26
Encryption Options in the Switch . . . . . . . . . . . . . . . . . . . . . . . . . 5-27
Controlling WebAgent Access When
Using TACACS+ Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-28
Messages Related to TACACS+ Operation . . . . . . . . . . . . . . . . . . . . . 5-29
Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-30
6 RADIUS Authentication, Authorization, and Accounting
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
Authentication Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
Accounting Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2
RADIUS-Administered CoS and Rate-Limiting . . . . . . . . . . . . . . . . . . . 6-2
RADIUS-Administered Commands Authorization . . . . . . . . . . . . . . . . 6-2
SNMP Access to the Switch’s Authentication Configuration MIB . . . 6-3
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-4
Switch Operating Rules for RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-5
General RADIUS Setup Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-6
Configuring the Switch for RADIUS Authentication . . . . . . . . . . . . . 6-7
Outline of the Steps for Configuring RADIUS Authentication . . . . . . 6-8
1. Configure Authentication for the Access Methods
You Want RADIUS To Protect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-10
2. Enable the (Optional) Access Privilege Option . . . . . . . . . . . . . . . . 6-13
3. Configure the Switch To Access a RADIUS Server . . . . . . . . . . . . 6-15
4. Configure the Switch’s Global RADIUS Parameters . . . . . . . . . . . 6-18
Using Multiple RADIUS Server Groups . . . . . . . . . . . . . . . . . . . . . . . . 6-23
Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-23
Enhanced Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-24
Displaying the RADIUS Server Group Information . . . . . . . . . . . 6-26
xi
Cached Reauthentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-28
Timing Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-29
Using SNMP To View and Configure
Switch Authentication Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-32
Changing and Viewing the SNMP Access Configuration . . . . . . . . . . 6-33
Local Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-36
Controlling WebAgent Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-37
Commands Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-38
Enabling Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-39
Displaying Authorization Information . . . . . . . . . . . . . . . . . . . . . . . . . 6-40
Configuring Commands Authorization on a RADIUS Server . . . . . . 6-40
Using Vendor Specific Attributes (VSAs) . . . . . . . . . . . . . . . . . . . 6-40
Example Configuration on Cisco Secure ACS for MS Windows 6-43
Example Configuration Using FreeRADIUS . . . . . . . . . . . . . . . . . 6-46
VLAN Assignment in an Authentication Session . . . . . . . . . . . . . . . . 6-47
Tagged and Untagged VLAN Attributes . . . . . . . . . . . . . . . . . . . . . . . . 6-47
Additional RADIUS Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-48
MAC-Based VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-51
Accounting Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-52
Accounting Service Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-52
Operating Rules for RADIUS Accounting . . . . . . . . . . . . . . . . . . . . . . 6-53
Acct-Session-ID Options in a Management Session . . . . . . . . . . . . . . 6-54
Unique Acct-Session-ID Operation . . . . . . . . . . . . . . . . . . . . . . . . 6-54
Common Acct-Session-ID Operation . . . . . . . . . . . . . . . . . . . . . . . 6-56
Configuring RADIUS Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-57
Steps for Configuring RADIUS Accounting . . . . . . . . . . . . . . . . . . . . . 6-57
1. Configure the Switch To Access a RADIUS Server . . . . . . . . . 6-58
2. (Optional) Reconfigure the Acct-Session-ID Operation . . . . . 6-60
3. Configure Accounting Types and the Controls for Sending
Reports to the RADIUS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-61
4. (Optional) Configure Session Blocking and Interim
Updating Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-66
Viewing RADIUS Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-67
General RADIUS Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-67
xii
RADIUS Authentication Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-69
RADIUS Accounting Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-71
Changing RADIUS-Server Access Order . . . . . . . . . . . . . . . . . . . . . . . 6-72
Creating Local Privilege Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-75
Configuring Groups for Local Authorization . . . . . . . . . . . . . . . . . . . . 6-76
Configuring a Local User for a Group . . . . . . . . . . . . . . . . . . . . . . . . . . 6-77
Displaying Command Authorization Information . . . . . . . . . . . . . . . . 6-79
Dynamic Removal of Authentication
Limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-80
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-80
Configuring the RADIUS VSAs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-80
Displaying the Port-access Information . . . . . . . . . . . . . . . . . . . . . . . . 6-82
Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-83
Messages Related to RADIUS Operation . . . . . . . . . . . . . . . . . . . . . . . 6-84
7 Configuring RADIUS Server Support for Switch Services
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1
RADIUS Client and Server Requirements . . . . . . . . . . . . . . . . . . . . 7-1
Optional HP PCM+ and IDM Network
Management Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
RADIUS Server Configuration for CoS
(802.1p Priority) and Rate-Limiting . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
Applied Rates for RADIUS-Assigned Rate Limits . . . . . . . . . . . . . . . . . 7-5
Viewing the Currently Active Per-Port CoS and Rate-Limiting
Configuration Specified by a RADIUS Server . . . . . . . . . . . . . . . . . . . . 7-7
Configuring and Using Dynamic
(RADIUS-Assigned) Access Control Lists . . . . . . . . . . . . . . . . . . . . . . 7-11
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11
Overview of RADIUS-Assigned, Dynamic ACLs . . . . . . . . . . . . . . . . . 7-15
Traffic Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-15
Contrasting RADIUS-Assigned and Static ACLs . . . . . . . . . . . . . . . . . 7-17
How a RADIUS Server Applies a RADIUS-Assigned ACL
to a Client on a Switch Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-19
General ACL Features, Planning, and Configuration . . . . . . . . . . . . . 7-20
xiii
The Packet-filtering Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-21
Operating Rules for RADIUS-Assigned ACLs . . . . . . . . . . . . . . . . . . . 7-21
Configuring an ACL in a RADIUS Server . . . . . . . . . . . . . . . . . . . . . . . 7-23
Nas-Filter-Rule-Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-24
ACE Syntax in RADIUS Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-26
Example Using the Standard Attribute (92) In an IPv4 ACL . . . 7-28
Example Using HP VSA 63 To Assign IPv6 and/or IPv4 ACLs . . 7-30
Example Using HP VSA 61 To Assign IPv4 ACLs . . . . . . . . . . . . 7-33
Configuration Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-35
Configuring the Switch To Support RADIUS-Assigned
ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-36
Displaying the Current RADIUS-Assigned ACL Activity
on the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-38
Event Log Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-43
Causes of Client Deauthentication Immediately
After Authenticating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-43
Monitoring Shared Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-43
8 Configuring Secure Shell (SSH)
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3
Prerequisite for Using SSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4
Public Key Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4
Steps for Configuring and Using SSH
for Switch and Client Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-5
General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-7
Configuring the Switch for SSH Operation . . . . . . . . . . . . . . . . . . . . . . 8-8
1. Assigning a Local Login (Operator) and
Enable (Manager) Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-9
2. Generating the Switch’s Public and Private Key Pair . . . . . . . . . . . 8-9
Configuring Key Lengths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-12
3. Providing the Switch’s Public Key to Clients . . . . . . . . . . . . . . . . . . 8-13
4. Enabling SSH on the Switch and Anticipating SSH
Client Contact Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-15
5. Configuring the Switch for SSH Authentication . . . . . . . . . . . . . . . 8-20
xiv
6. Use an SSH Client To Access the Switch . . . . . . . . . . . . . . . . . . . . . 8-24
Further Information on SSH Client Public-Key Authentication . 8-25
SSH Client and Secure Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-31
Opening a Secure Session to an HP Switch . . . . . . . . . . . . . . . . . . . . . 8-32
Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-32
Copying Client Key Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-33
Copying the SSH-Client-Known-Hosts File . . . . . . . . . . . . . . . . . . . . . 8-34
Replacing or Appending the SSH-Client-Known-Hosts File . . . . 8-34
Copying the SSH Client Known Hosts File to
Another Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-35
Copying the Host Public Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-36
Removing the SSH Client Key Pair . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-36
Removing the SSH Client Known Hosts File . . . . . . . . . . . . . . . . . . . . 8-37
Displaying Open Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-37
Messages Related to SSH Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-39
Logging Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-40
Debug Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-40
9 Configuring Secure Socket Layer (SSL)
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-1
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-3
Prerequisite for Using SSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4
Steps for Configuring and Using SSL for Switch and Client
Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4
General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-5
Configuring the Switch for SSL Operation . . . . . . . . . . . . . . . . . . . . . . 9-6
1. Assigning a Local Login (Operator) and
Enabling (Manager) Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-6
2. Generating the Switch’s Server Host Certificate . . . . . . . . . . . . . . . 9-6
To Generate or Erase the Switch’s Server Certificate
with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-7
Comments on Certificate Fields. . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-8
Generate a Self-Signed Host Certificate with the WebAgent . . . 9-12
xv
Generate a CA-Signed server host certificate with the
WebAgent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-13
3. Enabling SSL on the Switch and Anticipating SSL
Browser Contact Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-15
Using the CLI Interface to Enable SSL . . . . . . . . . . . . . . . . . . . . . 9-16
Using the WebAgent to Enable SSL . . . . . . . . . . . . . . . . . . . . . . . . 9-16
Common Errors in SSL Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-18
10 IPv4 Access Control Lists (ACLs)
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-1
Overview of Options for Applying IPv4 ACLs on the Switch . . . . . 10-3
Static ACLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-3
RADIUS-Assigned ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-3
Command Summary for Standard IPv4 ACLs . . . . . . . . . . . . . . . . . . . 10-5
Command Summary for IPv4 Extended ACLs . . . . . . . . . . . . . . . . . . 10-6
Command Summary for Enabling, Disabling, and
Displaying ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-7
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-8
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-13
Types of IPv4 ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-13
ACL Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-13
RACL Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-14
VACL Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-16
Static Port ACL and RADIUS-Assigned ACL Applications . . . . 10-16
RADIUS-Assigned (Dynamic) Port ACL Applications . . . . . . . . 10-17
Multiple ACLs on an Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-19
Features Common to All ACL Applications . . . . . . . . . . . . . . . . . . . . 10-22
General Steps for Planning and Configuring ACLs . . . . . . . . . . . . . . 10-23
IPv4 Static ACL Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-25
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-25
The Packet-filtering Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-26
Planning an ACL Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-29
IPv4 Traffic Management and Improved Network Performance . . 10-29
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-31
xvi
Guidelines for Planning the Structure of a Static ACL . . . . . . . . . . . 10-31
IPv4 ACL Configuration and Operating Rules . . . . . . . . . . . . . . . . . . 10-32
How an ACE Uses a Mask To Screen Packets for Matches . . . . . . . 10-35
What Is the Difference Between Network (or Subnet)
Masks and the Masks Used with ACLs? . . . . . . . . . . . . . . . . . . . 10-35
Rules for Defining a Match Between a Packet and an
Access Control Entry (ACE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-36
Configuring and Assigning an IPv4 ACL . . . . . . . . . . . . . . . . . . . . . . 10-40
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-40
General Steps for Implementing ACLs . . . . . . . . . . . . . . . . . . . . 10-40
Options for Permit/Deny Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-41
ACL Configuration Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-41
Standard ACL Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-42
Extended ACL Configuration Structure . . . . . . . . . . . . . . . . . . . 10-43
ACL Configuration Factors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-45
The Sequence of Entries in an ACL Is Significant . . . . . . . . . . . 10-45
Allowing for the Implied Deny Function . . . . . . . . . . . . . . . . . . . 10-47
A Configured ACL Has No Effect Until You Apply It
to an Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-47
You Can Assign an ACL Name or Number to an Interface
Even if the ACL Does Not Exist in the Switch’s Configuration 10-47
Using the CLI To Create an ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-48
General ACE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-48
Using CIDR Notation To Enter the IPv4 ACL Mask . . . . . . . . . 10-49
Configuring Standard ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-50
Command Summary for Standard ACLs . . . . . . . . . . . . . . . . . . . . . . 10-50
Configuring Named, Standard ACLs . . . . . . . . . . . . . . . . . . . . . . 10-52
Creating Numbered, Standard ACLs . . . . . . . . . . . . . . . . . . . . . . 10-55
Configuring Extended ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-59
Command Summary for Extended ACLs . . . . . . . . . . . . . . . . . . . . . . 10-59
Configuring Named, Extended ACLs . . . . . . . . . . . . . . . . . . . . . . 10-61
Configuring Numbered, Extended ACLs . . . . . . . . . . . . . . . . . . . 10-74
Adding or Removing an ACL Assignment On an Interface . . . . . . 10-81
Filtering Routed IPv4 Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-81
Filtering IPv4 Traffic Inbound on a VLAN . . . . . . . . . . . . . . . . . . . . . 10-82
xvii
Filtering Inbound IPv4 Traffic Per Port . . . . . . . . . . . . . . . . . . . . . . . 10-83
Classifier-Based Rate-Limiting with RL-PACLs . . . . . . . . . . . . . . . . . 10-84
Deleting an ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-85
Editing an Existing ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-86
Using the CLI To Edit ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-86
General Editing Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-86
Sequence Numbering in ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-87
Inserting an ACE in an Existing ACL . . . . . . . . . . . . . . . . . . . . . . 10-88
Deleting an ACE from an Existing ACL . . . . . . . . . . . . . . . . . . . 10-90
Resequencing the ACEs in an ACL . . . . . . . . . . . . . . . . . . . . . . . 10-91
Attaching a Remark to an ACE . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-92
Operating Notes for Remarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-95
Displaying ACL Configuration Data . . . . . . . . . . . . . . . . . . . . . . . . . . 10-97
Display an ACL Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-98
Display the Content of All ACLs on the Switch . . . . . . . . . . . . . . . . . 10-99
Display the RACL and VACL Assignments for a VLAN . . . . . . . . . 10-100
Display Static Port (and Trunk) ACL Assignments . . . . . . . . . . . . . 10-101
Displaying the Content of a Specific ACL . . . . . . . . . . . . . . . . . . . . 10-103
Display All ACLs and Their Assignments in the Routing
Switch Startup-Config File and Running-Config File . . . . . . . . . . . 10-106
Creating or Editing ACLs Offline . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-107
Creating or Editing an ACL Offline . . . . . . . . . . . . . . . . . . . . . . . . . . 10-107
The Offline Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-107
Example of Using the Offline Process . . . . . . . . . . . . . . . . . . . . 10-108
Enable ACL “Deny” Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-112
Requirements for Using ACL Logging . . . . . . . . . . . . . . . . . . . . . . . . 10-112
ACL Logging Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-113
Enabling ACL Logging on the Switch . . . . . . . . . . . . . . . . . . . . . . . . 10-114
Configuring the Logging Timer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-116
Monitoring Static ACL Performance . . . . . . . . . . . . . . . . . . . . . . . . . 10-117
Example of ACL Performance Monitoring . . . . . . . . . . . . . . . . 10-119
Example of Resetting ACE Hit Counters to Zero . . . . . . . . . . . 10-121
IPv6 Counter Operation with Multiple Interface
Assignments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-122
xviii
IPv4 Counter Operation with Multiple Interface
Assignments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-124
General ACL Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-128
11 Configuring Advanced Threat Protection
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-1
DHCP Snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-3
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-4
Enabling DHCP Snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-5
Enabling DHCP Snooping on VLANS . . . . . . . . . . . . . . . . . . . . . . . . . . 11-7
Configuring DHCP Snooping Trusted Ports . . . . . . . . . . . . . . . . . . . . 11-7
Configuring Authorized Server Addresses . . . . . . . . . . . . . . . . . . . . . . 11-8
Using DHCP Snooping with Option 82 . . . . . . . . . . . . . . . . . . . . . . . . . 11-9
Changing the Remote-id from a MAC to an IP Address . . . . . . 11-11
Disabling the MAC Address Check . . . . . . . . . . . . . . . . . . . . . . . 11-11
The DHCP Binding Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-12
Operational Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-13
Log Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-14
Dynamic ARP Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-16
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-16
Enabling Dynamic ARP Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-18
Configuring Trusted Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-18
Adding an IP-to-MAC Binding to the DHCP Database . . . . . . . . . . . 11-20
Configuring Additional Validation Checks on ARP Packets . . . . . . 11-21
Verifying the Configuration of Dynamic ARP Protection . . . . . . . . 11-21
Displaying ARP Packet Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-22
Monitoring Dynamic ARP Protection . . . . . . . . . . . . . . . . . . . . . . . . . 11-23
Dynamic IP Lockdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-23
Protection Against IP Source Address Spoofing . . . . . . . . . . . . . . . . 11-24
Prerequisite: DHCP Snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-24
Filtering IP and MAC Addresses Per-Port and Per-VLAN . . . . . . . . 11-25
Enabling Dynamic IP Lockdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-26
Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-26
Adding an IP-to-MAC Binding to the DHCP Binding Database . . . . 11-28
/