Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 2513
    							 78 
    Appendix B Packet precedences 
    IP precedence and DSCP values 
    Figure 24 ToS and DS fields 
     
     
    As shown in Figure 24, the ToS field in the IPv4 header contains eight bits, where the first three bits (0 to 
    2) represent IP precedence from 0 to 7; the Traffic  Classes field in the IPv6 header contains eight bits, 
    where the first three bits (0 to 2) represent IP precedence from 0 to 7. According to RFC 2474, the ToS 
    field in the IPv4 header or the Traffic Classes field in  the IPv6 header is redefined as the differentiated 
    services (DS) field, where a DSCP value is represented by the first six bits (0 to 5) and is in the range 0 
    to 63. The remaining two bits (6 and 7) are reserved. 
    Table 8  Description on IP precedence 
    IP 
    precedence (decimal)  IP precedence (binary)  Description 
    0 000 Routine
     
    1 001 priority 
    2 010 immediate 
    3 011 flash 
    4 100 flash-override 
    5 101 critical 
    6 110 internet 
    7 111 network 
     
    Table 9 Description on DSCP values 
    DSCP value (decimal)  DSCP value (binar
    y)  Description 
    46 101110 ef 
    10 001010 af11 
    12 001100 af12 
    14 001110 af13 
    18 010010 af21 
    M
    B
    Z
    RFC 1122
    IP Type of Service (ToS)
    RFC 791 Must
    Be
    Zero
    RFC 1349
    IPv4 ToS  byte 07
    6
    15 432
    Bits:Preced
    ence Type of 
    Service 07
    6DSCP
    Class Selector 
    codepoints
    Differentiated Services 
    Codepoint (DSCP) RFC 2474 Currently
    Unused
    DS-Field(for IPv4,ToS 
    octet,and for  IPv6,Traffic 
    Class octet )
    15 432
    Bits:
    CU 
    						
    							 79 
    DSCP value (decimal) DSCP value (binary)  Description 
    20 010100 af22 
    22 010110 af23 
    26 011010 af31 
    28 011100 af32 
    30 011110 af33 
    34 100010 af41 
    36 100100 af42 
    38 100110 af43 
    8 001000 cs1 
    16 010000 cs2 
    24 011000 cs3 
    32 100000 cs4 
    40 101000 cs5 
    48 110000 cs6 
    56 111000 cs7 
    0 000000 be  (default) 
     
    802.1p priority 
    802.1p priority lies in the Layer 2 header and applies to occasions where Layer 3 header analysis is not 
    needed and QoS must be assured at Layer 2. 
    Figure 25  An Ethernet frame with an 802.1Q tag header 
     
     
    As shown in Figure 25, the  four-byte 802.1Q tag header consists of the tag protocol identifier (TPID, two 
    bytes in length), whose value is 0x8100, and the tag control information (TCI, two bytes in length).  Figure 
    26  sho
    
    ws the format of the 802.1Q tag header. The Priority field in the 802.1Q tag header is called the 
    802.1p priority, because its use is defined in IEEE 802.1p.  Tabl e 10 sh
     ows the values for 802.1p 
    priority.  
    						
    							 80 
    Figure 26 802.1Q tag header 
     
     
    Table 10 Description on 802.1p priority 
    802.1
    p priority (decimal)  802.1p priority (binary)  Description 
    0 000 best-effort
     
    1 001 background 
    2 010 spare 
    3 011 excellent-effort 
    4 100 controlled-load 
    5 101 video 
    6 110 voice 
    7 111 network-management 
     
      
    						
    							 81 
    Index 
    A C D I L M N O P Q R T U  
    A 
    ACL configuration task list,4 
    A
    
    pplying the QoS policy, 22 
    C 
    C
    
    hanging the port priority of an interface,30  
    C
    
    lass-based accounting configuration example, 70 
    C
    
    olor-based priority marking, 60 
    C
    
    onfiguration example of using ACL for device 
    management, 12 
    C
    
    onfiguration guidelines, 29 
    C
    
    onfiguration procedure,69  
    C
    
    onfiguration procedure,65  
    C
    
    onfiguration procedure,58  
    C
    
    onfiguration procedure,61  
    Co
    
    nfiguration restrictions and guidelines, 65 
    C
    
    onfiguring a basic ACL, 5 
    C
    
    onfiguring a port to trust packet priority for priority 
    mapping, 30 
    C
    
    onfiguring a priority mapping table, 29 
    C
    
    onfiguring a time range, 4 
    C
    
    onfiguring an advanced ACL, 6 
    C
    
    onfiguring an Ethernet frame header ACL, 9 
    Co
    
    nfiguring GTS, 40 
    C
    
    onfiguring SP queuing, 48 
    C
    
    onfiguring SP+WFQ queuing, 53 
    Co
    
    nfiguring SP+WRR queuing, 52 
    C
    
    onfiguring the line rate, 40 
    C
    
    onfiguring traffic policing, 39 
    C
    
    onfiguring WFQ queuing, 50 
    C
    
    onfiguring WRR queuing, 49 
    C
    
    ongestion management techniques, 44 
    Co
    
    pying an ACL, 9 
    D 
    D
    
    ata buffer configuration approaches, 73 
    D
    
    efining a class, 19 
    D
    
    efining a policy,22  
    D
    
    efining a traffic behavior, 21  Displa
     ying and maintaining ACLs,
    11 
    Displa
    
    ying and maintaining QoS policies, 25 
    Displa
    
    ying and maintaining traffic accounting, 69 
    Displa
    
    ying and maintaining traffic policing, GTS, and 
    line rate, 41 
    Displa
    
    ying and maintaining WRED, 57 
    Displa
    
    ying priority mappings, 31 
    I 
    In
    
    troduction to WRED configuration, 56 
    I
    
    P precedence and DSCP values, 78 
    I
    
    Pv4 packet filtering configuration example, 13 
    I
    
    Pv6 packet filtering configuration example, 14 
    L 
    L
    
    ocal precedence re-marking configuration 
    example, 62 
    M 
    Man
    
    ually configuring the data buffer setup, 74 
    MQC a
    
    pproach, 18 
    N 
    N
    
    on-MQC approach, 18 
    O 
    Ov
    
    erview, 27 
    Ov
    
    erview, 72 
    Ov
    
    erview, 35 
    Ov
    
    erview, 1 
    Ov
    
    erview, 44 
    Ov
    
    erview, 55 
    Ov
    
    erview, 19 
    P 
    P
    
    acket filtering with ACLs, 10 
    Pr
    
    iority mapping table and priority marking 
    configuration example, 32 
    P
    
    riority trust mode configuration example, 31 
    Q 
    QoS se
    
    rvice models, 16  
    						
    							 82 
    QoS techniques,17 
    R 
    R
    edirect-to-next hop configuration example, 66 
    T 
    T
    
    raffic filtering configuration example, 59 
    T
    
    raffic policing configuration example, 41  U 
    U
    
    ncolored priority mapping tables,
    77 
    U
    
    sing the burst function to configure the data buffer 
    setup, 74 
      
    						
    							i 
    Contents 
    Configuring AAA ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
    ······ 1 
    AAA overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ··················\
    ············· 1 
    RADIUS ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ··················\
    ·········· 2 
    HWTACACS ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ··················\
    ··· 7 
    Domain-based user management ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ······· 9 
    RADIUS server feature  of the switch ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ······· 10 
    AAA for MPLS L3VPNs (availabl e only on the HP 5500 EI) ··················\
    ··················\
    ··················\
    ··················\
     ···· 11 
    Protocols and  standards ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ·············· 11 
    RADIUS attributes ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ··················\
    · 12 
    AAA configuration considerations and task list  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················  15 
    Configuring AAA schemes ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    · 16 
    Configuring local users ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ················ 16 
    Configuring RADIUS schemes ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ········ 21 
    Configuring HWTACACS schemes ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    · 34 
    Configuring AAA methods for ISP domains ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ······· 40 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ············· 41 
    Creating an ISP domain ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ············· 41 
    Configuring ISP domain attributes ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ········ 41 
    Configuring AAA authentication methods for an ISP domain ··················\
    ··················\
    ··················\
    ················ ···· 42 
    Configuring AAA authorization  methods for an ISP domain ··················\
    ··················\
    ··················\
    ················· ···· 44 
    Configuring AAA accounting me thods for an ISP domain ··················\
    ··················\
    ··················\
    ··················\
    ·· ····· 46 
    Tearing down user connections ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ················· 47 
    Configuring a NAS ID-VLAN binding  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············  47 
    Specifying the device ID used in stateful failover mode (available only on the HP 5500 EI) ··················\
    ·············  48 
    Configuring a switch as  a RADIUS server ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ·········· 48 
    RADIUS server functions co nfiguration task list ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    · 48 
    Configuring a RADIUS user  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····  48 
    Specifying a RADIUS client ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ············ 49 
    Displaying and ma intaining AAA ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ·············· 50 
    AAA configuration examples  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········  50 
    AAA for Telnet users by an HWTACACS server ··················\
    ··················\
    ··················\
    ··················\
    ············ ··········· 50 
    AAA for Telnet users by  separate servers ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··· 51 
    Authentication/authorization for SSH/T elnet users by a RADIUS server ··················\
    ··················\
    ··················\
    ··  53 
    AAA for portal users by a RADIUS server ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    · 56 
    AAA for 802.1X users by  a RADIUS server ··················\
    ··················\
    ··················\
    ··················\
    ··············· ················ 65 
    Level switching authentication for Teln et users by an HWTACACS server ··················\
    ··················\
    ·················  71 
    RADIUS authentication and authorization for Telnet users by a switch  ··················\
    ··················\
    ··················\
    ····· 74 
    Troubleshooting AAA ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ··················\
    ····· 76 
    Troubleshooting RADIUS  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········  76 
    Troubleshooting HWTACACS ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
      77 
    802.1X fundamentals ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ··················\
    · 78 
    802.1X architecture ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ··················\
    ········ 78 
    Controlled/uncontrolled port and  port authorization status ··················\
    ··················\
    ··················\
    ·············· ··················\
     78 
    802.1X-related  protocols ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ··················\
    ···· 79 
    Packet formats ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ·······  80 
    EAP over RADIUS ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ················· 81 
    Initiating 802.1X authentication ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ··················\
    · 81 
    802.1X client as the initiator··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ············· 81  
    						
    							ii 
    Access device as the initiator ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ························\
    ············· 82 
    802.1X authentication procedures ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ·············· 82 
    A comparison of EAP rela y and EAP termination ··················\
    ··················\
    ··················\
    ··················\
    ········· ············· 83 
    EAP relay ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··················\
    ······· 83 
    EAP termination ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
    ·· 86 
    Configuring 802.1X ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ··················\
    ·· 87 
    HP implementation of 802.1X ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ················· 87 
    Access control methods ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ·············· 87 
    Using 802.1X authenticati on with other features ··················\
    ··················\
    ··················\
    ··················\
    ······· ··············· 87 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··················\
    ···· 92 
    802.1X configuration task list  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········  92 
    Enabling 802.1X ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ···········  93 
    Configuration guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ·············· 93 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 93 
    Enabling EAP relay or  EAP termination ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ············ 93 
    Setting the port au thorization state ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ··················\
     94 
    Specifying an access control method ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ············· 95 
    Setting the maximum number of concurrent 802.1X users on a port  ··················\
    ··················\
    ··················\
    ················· 95 
    Setting the maximum number of authentication request attempts ··················\
    ··················\
    ··················\
    ··········· ············ 96 
    Setting the 802.1X authenti cation timeout timers ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ······· 96 
    Configuring the online us er handshake function ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ······ 96 
    Configuration guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ·············· 97 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 97 
    Configuring the authentica tion trigger function ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ········· 97 
    Configuration guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ·············· 98 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 98 
    Specifying a mandatory authentication domain on a port  ··················\
    ··················\
    ··················\
    ··················\
    ················ 98 
    Configuring the quiet timer ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··················\
    ···· 99 
    Enabling the periodic online user re-authentication function  ··················\
    ··················\
    ··················\
    ··················\
    ············· 99 
    Configuration guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ·············· 99 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 99 
    Configuring an 802. 1X guest VLAN ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ········· 100 
    Configuration guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ············ 100 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··········· 100 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 101 
    Configuring an Auth-Fail VLAN ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ··············· 101 
    Configuration guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ············ 101 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··········· 102 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 102 
    Configuring an 802.1X  critical VLAN ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ·········· 102 
    Configuration guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ············ 102 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··········· 102 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 102 
    Specifying supported domain name delimiters  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···············  103 
    Displaying and maintaining 802.1X ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ·········· 103 
    802.1X authentication  configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ···· 104 
    Network requirements  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···········  104 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 104 
    Verifying the configuration ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ············ 106 
    802.1X with guest VLAN and VLAN  assignment configuration example ··················\
    ··················\
    ··················\
    ·······  106 
    Network requirements ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···········  106 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 107 
    Verifying the configuration ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ············ 108 
    802.1X with ACL assignment  configuration example ··················\
    ··················\
    ··················\
    ··················\
    ······ ··············· 109  
    						
    							iii 
    Network requirements ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···········  109 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 109 
    Verifying the configuration ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ············ 110 
    Configuring EAD fast deployment ·················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ········ 111 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ····  111 
    Free IP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·····························\
    ··················\
    ········ 111 
    URL redirection ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ····  111 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···························\
    ··················\
    ·· 111 
    Configuring a free IP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ··················\
    ······ 111 
    Configuring the redirect URL ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ··················\
    · 112 
    Setting the EAD rule timer ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ··················\
    ··· 112 
    Displaying and maintaining EAD fast deployment  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········  112 
    EAD fast deployment configuration example ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ····· 113 
    Network requirements  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···········  113 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 114 
    Verifying the configuration ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ············ 114 
    Troubleshooting EAD  fast deployment ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ·········· 115 
    Web browser users cannot be correctly re directed ··················\
    ··················\
    ··················\
    ··················\
    ······ ·········· 115 
    Configuring MAC au thentication ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ········· 116 
    MAC authentication overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··············· 116 
    User account policies ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ··············· 116 
    Authentication approaches ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ········· 116 
    MAC authenticati on timers ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ·········· 117 
    Using MAC authentication  with other features ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ····· 117 
    VLAN assignment ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··············· 117 
    ACL assignment ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ················· 117 
    Guest VLAN ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ··················\
    · 117 
    Critical VLAN ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ··················\
    ·· 118 
    Configuration task list ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ······· 118 
    Basic configuration for MAC authentication ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ······· 118 
    Specifying a MAC authentication domain ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ······ 120 
    Configuring a MAC authentication guest VLAN ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    · 120 
    Configuring a MAC authenti cation critical VLAN ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ·· 121 
    Displaying and maintainin g MAC authentication ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    · 122 
    MAC authentication configuration examples  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
      122 
    Local MAC authentication configuration example··················\
    ··················\
    ··················\
    ··················\
    ········· ·········· 122 
    RADIUS-based MAC authenticati on configuration example··················\
    ··················\
    ··················\
    ··················\
    ·· · 124 
    ACL assignment configuration example··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ················· 126 
    Configuring portal  authentication ·················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ··········· 129 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ····  129 
    Extended portal functions ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ············ 129 
    Portal system components  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·····  129 
    Portal system using the local portal server ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ··· 131 
    Portal authentication modes ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ·········· 132 
    Portal support for EAP (available only on the HP 55 00 EI series) ··················\
    ··················\
    ··················\
    ··········· 133 
    Layer 2 portal authen tication process ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ···· 134 
    Layer 3 portal authentication process (available only on the HP 5500 EI series) ··················\
    ··················\
    ···  135 
    Portal stateful failover (available only on the HP 5500 EI series) ··················\
    ··················\
    ··················\
    ······ ······ 138 
    Portal authentication across VPNs (avail able only on the HP 5500 EI series) ··················\
    ··················\
    ·········  140 
    Portal configuration task list ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ··················\
    ···· 140 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··················\
    ·· 141 
    Specifying the portal server ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ··················\
    ·· 142 
    Specifying the local portal server  for Layer 2 portal authentication ··················\
    ··················\
    ··················\
    ···· ···· 142  
    						
    							iv 
    Specifying a portal server for Layer 3 portal authentication (available only on the HP 5500 EI series) ·· 143 
    Configuring the local portal server ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ··············· 143 
    Customizing authentication pages ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ···· 143 
    Configuring the loca l portal server ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ······· 146 
    Enabling portal authentication  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······  147 
    Enabling Layer 2 portal authentication ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ··· 147 
    Enabling Layer 3 portal authentication (ava ilable only on the HP 5500 EI series) ··················\
    ··················\
    ·  148 
    Controlling access of portal users ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ················ 149 
    Configuring a portal-free rule··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ·········· 149 
    Configuring an authentication source subnet (a vailable only on the HP 5500 EI series) ··················\
    ·········  150 
    Setting the maximum number of online portal users ··················\
    ··················\
    ··················\
    ··················\
    ················  150 
    Specifying an authentication domain for portal users  ··················\
    ··················\
    ··················\
    ··················\
    ············· 151 
    Configuring Layer 2 portal authentication to support web  proxy ·················\
    ··················\
    ··················\
    ············· 151 
    Enabling support for po rtal user moving ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    · 152 
    Specifying an Auth-Fail VLAN for portal auth entication ··················\
    ··················\
    ··················\
    ··················\
     ··················\
     152 
    Configuring RADIUS re lated attributes ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ··········· 153 
    Specifying NAS-Port-Typ e for an interface ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
     153 
    Specifying a NAS ID prof ile for an interface ··················\
    ··················\
    ··················\
    ··················\
    ·········· ················· 154 
    Specifying a source IP address  for outgoing portal packets ··················\
    ··················\
    ··················\
    ·············· ··············· 154 
    Configuring portal stateful failover (ava ilable only on the HP 5500 EI series) ··················\
    ··················\
    ············ ····· 155 
    Specifying an auto redirection UR L for authenticated portal users ··················\
    ··················\
    ··················\
    ······· ············ 156 
    Configuring portal detection functions  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···········  157 
    Configuring online Layer 2 portal user detection ··················\
    ··················\
    ··················\
    ··················\
    ······ ·············· 157 
    Configuring the portal server detection function  (available only on the HP 5500 EI series) ··················\
    ····  157 
    Configuring portal user information synchronizat ion (available only on the HP 5500 EI series) ··············  159 
    Logging off portal users ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ··················\
    ····· 160 
    Displaying and maintaining portal ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ············· 160 
    Portal configuration examples ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ················· 161 
    Configuring direct portal authentication ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··· 161 
    Configuring re-DHCP port al authentication ··················\
    ··················\
    ··················\
    ··················\
    ············· ················· 166 
    Configuring cross-subnet portal authen tication ··················\
    ··················\
    ··················\
    ··················\
    ········ ················ 168 
    Configuring direct portal authenti cation with extended functions··················\
    ··················\
    ··················\
    ········· ··· 170 
    Configuring re-DHCP portal authenti cation with extended functions ··················\
    ··················\
    ··················\
    ······  172 
    Configuring cross-subnet portal authentication with extended functions ··················\
    ··················\
    ··················\
    · 174 
    Configuring portal stateful failover ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ········ 176 
    Configuring portal server detection and  portal user information synchronization ··················\
    ··················\
    ··· 184 
    Configuring Layer 2 portal authentication  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············  189 
    Troubleshooting portal ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··················\
    ····· 193 
    Inconsistent keys on the access  device and the portal server ··················\
    ··················\
    ··················\
    ············ ······· 193 
    Incorrect server port number on the access device  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
      193 
    Configuring triple authentication ·················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ············ 195 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ····  195 
    Triple authentication mechanism ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·······················\
    ······ 195 
    Using triple authentication  with other features ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
     196 
    Configuring triple  authentication ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ················· 196 
    Triple authentication co nfiguration examples ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ······· 197 
    Triple authentication basic fu nction configuration example ··················\
    ··················\
    ··················\
    ·············· ······· 197 
    Triple authentication supporting VLAN assignme nt and Auth-Fail VLAN configuration example ··············  199 
    Configuring port security ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ················· 205 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ····  205 
    Port security features ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ································\
    ················· 205 
    Port security modes ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ················ 205 
    Working with guest VLAN  and Auth-Fail VLAN ··················\
    ··················\
    ··················\
    ··················\
    ············ ·········· 208  
    						
    							v 
    Configuration task list ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ······· 208 
    Enabling port security ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··················\
    ······ 209 
    Setting port securitys limit on the  number of MAC addresses on a port··················\
    ··················\
    ··················\
    ··· ······ 209 
    Setting the port  security mode ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ··················\
     210 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··········· 210 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 210 
    Configuring port se curity features ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ················ 211 
    Configuring NTK ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ················ 211 
    Configuring intrusion protection ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ········ 211 
    Enabling port security traps  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··  212 
    Configuring secure MAC addresses ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ·········· 212 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··········· 213 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 213 
    Ignoring authorization info rmation from the server ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ···· 214 
    Displaying and maintaining port security  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······  214 
    Port security configuration examples ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ············· 215 
    Configuring the au toLearn mode ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ····· 215 
    Configuring the userLo ginWithOUI mode ··················\
    ··················\
    ··················\
    ··················\
    ················· ··············· 217 
    Configuring the macAddress ElseUserLoginSecure mode ··················\
    ··················\
    ··················\
    ··················\
    ········  222 
    Troubleshooting port security ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ··················\
    · 224 
    Cannot set the port security mode ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ······ 224 
    Cannot configure se cure MAC addresses ··················\
    ··················\
    ··················\
    ··················\
    ················· ··············· 225 
    Cannot change port security  mode when a user is online ··················\
    ··················\
    ··················\
    ··················\
    ······  225 
    Configuring a user profile ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ················ 227 
    User profile overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ··················\
    ······ 227 
    User profile configuration task list ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ··················\
     227 
    Creating a user profile ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ····· 227 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··········· 227 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 227 
    Applying a QoS policy ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ··················\
    ·· 228 
    Configuration guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ············ 228 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 228 
    Enabling a user profile ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ····· 228 
    Displaying and maintaining user profiles  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······  229 
    Configuring password control ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··  230 
    Password control overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ··················\
     230 
    Password control configuration task list  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········  232 
    Configuring password control ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ················ 233 
    Enabling password control  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···  233 
    Setting global password control parameters ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········  233 
    Setting user group password control parameters ··················\
    ··················\
    ··················\
    ··················\
    ········ ············ 235 
    Setting local user passw ord control parameters ··················\
    ··················\
    ··················\
    ··················\
    ········ ·············· 235 
    Setting super password  control parameters ··················\
    ··················\
    ··················\
    ··················\
    ············· ················ 236 
    Setting a local user passwor d in interactive mode ··················\
    ··················\
    ··················\
    ··················\
    ····· ············· 236 
    Displaying and maintain ing password control ·················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ···· 236 
    Password control conf iguration example ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ········ 237 
    Configuring HABP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ··················\
    · 240 
    HABP overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ············  240 
    Configuring HABP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ·······  241 
    Configuring the HABP server ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ········ 241 
    Configuring an HABP client ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ········· 241 
    Displaying and maintaining HABP  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·················  242 
    HABP configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········  242  
    						
    All HP manuals Comments (0)

    Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide