HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 97

Authentication, Purpose, Security mode, Features that can be, triggered

Page 97 highlights

• Authentication-Security modes in this category implement MAC authentication, 802.1X authentication, or a combination of these two authentication methods. Upon receiving a frame, the port in a security mode searches the MAC address table for the source MAC address. If a match is found, the port forwards the frame. If no match is found, the port learns the MAC address or performs authentication, depending on the security mode. If the frame is illegal, the port takes the predefined NTK or intrusion protection action. By default, outgoing frames of a port are not restricted by port security. Only when they trigger the NTK feature, are they restricted by the predefined NTK action. The maximum number of users a port supports equals the maximum number of secure MAC addresses that port security allows or the maximum number of concurrent users the authentication mode in use allows, whichever is smaller. For example, if 802.1X allows more concurrent users than port security's limit on the number of MAC addresses on the port in userLoginSecureExt mode, port security's limit takes effect. Table 4 describes the port security modes and the security features. Table 4 Port security modes Purpose Turning off the port security feature Controlling MAC address learning Performing 802.1X authentication Performing MAC authentication Performing a combination of MAC authentication and 802.1X authentication Security mode noRestriction (the default mode) In this mode, port security is disabled on the port and access to the port is not restricted. autoLearn secure userLogin userLoginSecure userLoginSecureExt userLoginWithOUI macAddressWithRadius macAddressOrUserLoginSecure Or macAddressOrUserLoginSecureExt macAddressElseUserLoginSecure Else macAddressElseUserLoginSecureExt Features that can be triggered N/A NTK/intrusion protection N/A NTK/intrusion protection NTK/intrusion protection NTK/intrusion protection TIP: • userLogin specifies 802.1X authentication and port-based access control. userLogin with Secure specifies 802.1X authentication and MAC-based access control. Ext indicates allowing multiple 802.1X users to be authenticated and serviced at the same time. A security mode without Ext allows only one user to pass 802.1X authentication. • macAddress specifies MAC authentication. • Else specifies that the authentication method before Else is applied first. If the authentication fails, whether to turn to the authentication method following Else depends on the protocol type of the authentication request. • Typically, in a security mode with Or, the authentication method to be used depends on the protocol type of the authentication request. 88

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

88
Authentication
—Security modes in this category implement MAC authentication, 802.1X
authentication, or a combination of these two authentication methods.
Upon receiving a frame, the port in a security mode searches the MAC address table for the source MAC
address. If a match is found, the port forwards the frame. If no match is found, the port learns the MAC
address or performs authentication, depending on the security mode. If the frame is illegal, the port takes
the predefined NTK or intrusion protection action. By default, outgoing frames of a port are not restricted
by port security. Only when they trigger the NTK feature, are they restricted by the predefined NTK
action.
The maximum number of users a port supports equals the maximum number of secure MAC addresses
that port security allows or the maximum number of concurrent users the authentication mode in use
allows, whichever is smaller. For example, if 802.1X allows more concurrent users than port security's
limit on the number of MAC addresses on the port in userLoginSecureExt mode, port security's limit takes
effect.
Table 4
describes the port security modes and the security features.
Table 4
Port security modes
Purpose
Security mode
Features that can be
triggered
Turning off the port security
feature
noRestriction (the default mode)
In this mode, port security is disabled on the port
and access to the port is not restricted.
N/A
Controlling MAC address
learning
autoLearn
NTK/intrusion
protection
secure
Performing 802.1X
authentication
userLogin
N/A
userLoginSecure
NTK/intrusion
protection
userLoginSecureExt
userLoginWithOUI
Performing MAC authentication
macAddressWithRadius
NTK/intrusion
protection
Performing a combination of
MAC authentication and
802.1X authentication
Or
macAddressOrUserLoginSecure
NTK/intrusion
protection
macAddressOrUserLoginSecureExt
Else
macAddressElseUserLoginSecure
macAddressElseUserLoginSecureExt
TIP:
userLogin
specifies 802.1X authentication and port-based access control.
userLogin
with
Secure
specifies
802.1X authentication and MAC-based access control.
Ext
indicates allowing multiple 802.1X users to be
authenticated and serviced at the same time. A security mode without
Ext
allows only one user to pass 802.1X
authentication.
macAddress
specifies MAC authentication.
Else
specifies that the authentication method before
Else
is applied first. If the authentication fails, whether to turn
to the authentication method following
Else
depends on the protocol type of the authentication request.
Typically, in a security mode with
Or
, the authentication method to be used depends on the protocol type of the
authentication request.