HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 3

Contents

Page 3 highlights

Contents Configuring AAA 1 Overview 1 RADIUS 2 HWTACACS 7 LDAP 9 AAA implementation on the device 11 AAA for MPLS L3VPNs 13 Protocols and standards 13 RADIUS attributes 14 FIPS compliance 17 AAA configuration considerations and task list 17 Configuring AAA schemes 18 Configuring local users 18 Configuring RADIUS schemes 22 Configuring HWTACACS schemes 30 Configuring LDAP schemes 37 Configuring AAA methods for ISP domains 40 Configuration prerequisites 40 Creating an ISP domain 40 Configuring ISP domain status 41 Configuring authentication methods for an ISP domain 41 Configuring authorization methods for an ISP domain 42 Configuring accounting methods for an ISP domain 43 Enabling the session-control feature 44 Displaying and maintaining AAA 44 AAA configuration examples 45 AAA for SSH users by an HWTACACS server 45 Local authentication, HWTACACS authorization, and RADIUS accounting for SSH users 46 Authentication and authorization for SSH users by a RADIUS server 48 Authentication for SSH users by an LDAP server 51 Troubleshooting RADIUS 56 RADIUS authentication failure 56 RADIUS packet delivery failure 56 RADIUS accounting error 57 Troubleshooting HWTACACS 57 Troubleshooting LDAP 57 802.1X overview 59 802.1X architecture 59 Controlled/uncontrolled port and port authorization status 59 802.1X-related protocols 60 Packet formats 61 EAP over RADIUS 62 Initiating 802.1X authentication 62 802.1X client as the initiator 62 Access device as the initiator 63 802.1X authentication procedures 63 A comparison of EAP relay and EAP termination 64 EAP relay 64 i

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

i
Contents
Configuring AAA ························································································································································· 1
Overview············································································································································································1
RADIUS ······································································································································································2
HWTACACS ·····························································································································································7
LDAP ··········································································································································································9
AAA implementation on the device····················································································································· 11
AAA for MPLS L3VPNs ········································································································································· 13
Protocols and standards ······································································································································· 13
RADIUS attributes ·················································································································································· 14
FIPS compliance ····························································································································································· 17
AAA configuration considerations and task list ·········································································································· 17
Configuring AAA schemes ············································································································································ 18
Configuring local users ········································································································································· 18
Configuring RADIUS schemes ······························································································································ 22
Configuring HWTACACS schemes ····················································································································· 30
Configuring LDAP schemes ·································································································································· 37
Configuring AAA methods for ISP domains ················································································································ 40
Configuration prerequisites ·································································································································· 40
Creating an ISP domain ······································································································································· 40
Configuring ISP domain status ····························································································································· 41
Configuring authentication methods for an ISP domain ··················································································· 41
Configuring authorization methods for an ISP domain ····················································································· 42
Configuring accounting methods for an ISP domain························································································· 43
Enabling the session-control feature ····························································································································· 44
Displaying and maintaining AAA ································································································································ 44
AAA configuration examples········································································································································ 45
AAA for SSH users by an HWTACACS server ·································································································· 45
Local authentication, HWTACACS authorization, and RADIUS accounting for SSH users ·························· 46
Authentication and authorization for SSH users by a RADIUS server ····························································· 48
Authentication for SSH users by an LDAP server ······························································································· 51
Troubleshooting RADIUS ··············································································································································· 56
RADIUS authentication failure ······························································································································ 56
RADIUS packet delivery failure ···························································································································· 56
RADIUS accounting error ····································································································································· 57
Troubleshooting HWTACACS ······································································································································ 57
Troubleshooting LDAP ···················································································································································· 57
802.1X overview ······················································································································································· 59
802.1X architecture ······················································································································································· 59
Controlled/uncontrolled port and port authorization status ······················································································ 59
802.1X-related protocols ·············································································································································· 60
Packet formats
························································································································································ 61
EAP over RADIUS ·················································································································································· 62
Initiating 802.1X authentication ··································································································································· 62
802.1X client as the initiator································································································································ 62
Access device as the initiator ······························································································································· 63
802.1X authentication procedures ······························································································································ 63
A comparison of EAP relay and EAP termination ······························································································ 64
EAP relay ································································································································································ 64