HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 106

userLoginWithOUI configuration example, Network requirements

Page 106 highlights

OUI value: Ten-GigabitEthernet1/1/5 is link-up Port mode: autoLearn NeedToKnow mode: Disabled Intrusion protection mode: DisablePortTemporarily Max number of secure MAC addresses: 64 Current number of secure MAC addresses: 5 Authorization is permitted The output shows that the port security's limit on the number of secure MAC addresses on the port is 64, the port security mode is autoLearn, and the intrusion protection action is disabling the port (DisablePortTemporarily) for 30 seconds. After the configuration takes effect, the port allows for MAC address learning, and you can view the number of learned MAC addresses in the Current number of secure MAC addresses field. To view more information about the learned MAC addresses, use the display this command in interface view. [Device] interface ten-gigabitethernet 1/1/5 [Device-Ten-GigabitEthernet1/1/5] display this # interface Ten-GigabitEthernet1/1/5 port-security max-mac-count 64 port-security port-mode autolearn port-security mac-address security sticky 0002-0000-0015 vlan 1 port-security mac-address security sticky 0002-0000-0014 vlan 1 port-security mac-address security sticky 0002-0000-0013 vlan 1 port-security mac-address security sticky 0002-0000-0012 vlan 1 port-security mac-address security sticky 0002-0000-0011 vlan 1 # Execute the display port-security interface command after the number of MAC addresses learned by the port reaches 64. You can see that the port security mode has changed to secure. When any frame with a new MAC address arrives, intrusion protection is triggered and you see the port has been disabled. The port should be re-enabled 30 seconds later. After the port is re-enabled, delete several secure MAC addresses. You can see that the port security mode of the port changes to autoLearn, and the port can learn MAC addresses again. userLoginWithOUI configuration example Network requirements As shown in Figure 36, a client is connected to the device through port Ten-GigabitEthernet 1/1/5. The device authenticates the client with a RADIUS server. If the authentication succeeds, the client is authorized to access the Internet. • The RADIUS server at 192.168.1.2 functions as the primary authentication server and the secondary accounting server, and the RADIUS server at 192.168.1.3 functions as the secondary authentication server and the primary accounting server. The shared key for authentication is name, and that for accounting is money. • All users use the authentication, authorization, and accounting methods of ISP domain sun. 97

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

97
OUI value:
Ten-GigabitEthernet1/1/5 is link-up
Port mode: autoLearn
NeedToKnow mode: Disabled
Intrusion protection mode: DisablePortTemporarily
Max number of secure MAC addresses: 64
Current number of secure MAC addresses: 5
Authorization is permitted
The output shows that the port security's limit on the number of secure MAC addresses on the port is 64,
the port security mode is autoLearn, and the intrusion protection action is disabling the port
(DisablePortTemporarily) for 30 seconds.
After the configuration takes effect, the port allows for MAC address learning, and you can view the
number of learned MAC addresses in the
Current number of secure MAC addresses
field. To view more
information about the learned MAC addresses, use the
display this
command in interface view.
[Device] interface ten-gigabitethernet 1/1/5
[Device-Ten-GigabitEthernet1/1/5] display this
#
interface Ten-GigabitEthernet1/1/5
port-security max-mac-count 64
port-security port-mode autolearn
port-security mac-address security sticky 0002-0000-0015 vlan 1
port-security mac-address security sticky 0002-0000-0014 vlan 1
port-security mac-address security sticky 0002-0000-0013 vlan 1
port-security mac-address security sticky 0002-0000-0012 vlan 1
port-security mac-address security sticky 0002-0000-0011 vlan 1
#
Execute the
display port-security interface
command after the number of MAC addresses learned by the
port reaches 64. You can see that the port security mode has changed to
secure
.
When any frame with a new MAC address arrives, intrusion protection is triggered and you see the port
has been disabled. The port should be re-enabled 30 seconds later.
After the port is re-enabled, delete several secure MAC addresses. You can see that the port security
mode of the port changes to autoLearn, and the port can learn MAC addresses again.
userLoginWithOUI configuration example
Network requirements
As shown in
Figure 36
, a client is connected to the device through port Ten-GigabitEthernet 1/1/5. The
device authenticates the client with a RADIUS server. If the authentication succeeds, the client is
authorized to access the Internet.
The RADIUS server at 192.168.1.2 functions as the primary authentication server and the secondary
accounting server, and the RADIUS server at 192.168.1.3 functions as the secondary authentication
server and the primary accounting server. The shared key for authentication is
name
, and that for
accounting is
money
.
All users use the authentication, authorization, and accounting methods of ISP domain
sun
.