Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 2513
    							76 
     system-view 
    [SwitchB] radius-server user aaa 
    # Configure plaintext password aabbcc for user aaa.  
    [SwitchB-rdsuser-aaa] password simple aabbcc 
    [SwitchB-rdsuser-aaa] quit 
    # Specify the IP address of the RADIUS client  as 10.1.1.1 and the plaintext shared key as abc.  
    [SwitchB] radius-server client-ip 10.1.1.1 key simple abc 
    4. Verify the configuration: 
    After entering username aaa@bbb or aaa and password  aabbcc, user aaa can telnet to Switch A. 
    Use the  display connection  command to view the connection  information on Switch A.  
     display connection 
     
    Index=1   ,Username=aaa@bbb 
    IP=192.168.1.2 
    IPv6=N/A 
     Total 1 connection(s) matched. 
    Troubleshooting AAA 
    Troubleshooting RADIUS 
    Symptom 1 
    User authentication/authorization always fails.  
    Analysis 
    1. A communication failure exists between the NAS and the RADIUS server. 
    2. The username is not in the format of  userid@isp-name  or the ISP domain for the user authentication 
    is not correctly configured on the NAS. 
    3.  The user is not configured on the RADIUS server. 
    4. The password entered by the user is incorrect. 
    5. The RADIUS server and the NAS are configured with different shared key. 
    Solution 
    Check that: 
    1. The NAS and the RADIUS server can ping each other. 
    2. The username is in the  userid@isp-name  format and the ISP domain for the user authentication is 
    correctly configured on the NAS.  
    3.  The user is configured on the RADIUS server. 
    4. The correct password is entered. 
    5. The same shared key is configured on both the RADIUS server and the NAS. 
    Symptom 2 
    RADIUS packets cannot reach the RADIUS server.   
    						
    							77 
    Analysis 
    1. The NAS and the RADIUS server cannot communicate with each other. 
    2. The NAS is not configured with the IP address of the RADIUS server. 
    3. The UDP ports for authentication/authoriza tion and accounting are not correct. 
    4. The port numbers of the RADIUS server for authen tication, authorization and accounting are being 
    used by other applications. 
    Solution 
    Check that: 
    1.  The communication links between the NAS and the RADIUS server work well at both physical and 
    link layers. 
    2. The IP address of the RADIUS server is  correctly configured on the NAS. 
    3. UDP ports for authentication/aut horization/accounting configured on the NAS are the same as 
    those configured on the RADIUS server. 
    4.  The port numbers of the RADIUS server for au thentication, authorization and accounting are 
    available.  
    Symptom 3 
    A user is authenticated and authorized, but accounting for the user is not normal. 
    Analysis 
    1.  The accounting port number is not correct.  
    2. Configuration of the authentication /authorization server and the accounting server are not correct 
    on the NAS. For example, one server is configur ed on the NAS to provide all the services of 
    authentication/authorization and accounting, but in  fact the services are provided by different 
    servers. 
    Solution 
    Check that: 
    1.  The accounting port numb er is correctly set.  
    2. The authentication/authorization server and the ac counting server are correctly configured on the 
    NAS. 
    Troubleshooting HWTACACS 
    Similar to RADIUS troubleshooting. See  Trou b l es ho o t i n g  R A D I US.  
    						
    							 78 
    802.1X fundamentals 
    802.1X is a port-based network access control protocol initially proposed by the IEEE 802 LAN/WAN 
    committee for securing wireless LANs (WLANs), and it has also been widely used on Ethernet networks 
    for access control.  
    802.1X controls network access by authenticating  the devices connected to 802.1X-enabled LAN ports. 
    802.1X architecture 
    802.1X operates in the client/server model. It comprises three entities: the client (the supplicant), the 
    network access device (the authenticator), and the authentication server. 
    Figure 34 802.1X architecture 
     
     
    •  The client — A  u s e r  t e r m i n a l  s e e k i n g  a c c e s s  t o  t h e  L A N .  I t  m u s t  h a ve  8 02.1 X  s o f t w a re  t o  a u t h e n t i c a t e  
    to the network access device.  
    •   The network access device —Authenticates the client to control access to the LAN. In a typical 
    802.1X environment, the network access device uses an authentication server to perform 
    authentication.  
    •   The authentication server —Provides authentication services for the network access device. It 
    authenticates 802.1X clients by using the data sent  from the network access device, and returns the 
    authentication results for the network access device to make access decisions. The authentication 
    server is typically a Remote Authentication Dial-i n User Service (RADIUS) server. In a small LAN, 
    you can also use the network access device as the authentication server.  
    Controlled/uncontrolled port and port 
    authorization status 
    802.1X defines two logical ports for the network access  port: controlled port and uncontrolled port. Any 
    packet arriving at the network access port is visible to both logical ports. 
    •   Controlled port —Allows incoming and outgoing traffic to pass through when it is in the authorized 
    state, and denies incoming and outgoing traffic wh en it is in the unauthorized state, as shown 
    in  Figure 35 . T
    he controlled port is set in the authorized state if the client has passed authentication, 
    and in the unauthorized state, if the client has failed authentication.  
    •   Uncontrolled port—Is always open to receive and transmit EAPOL frames.  
    						
    							 79 
    Figure 35 Authorization state of a controlled port 
     
     
    In the unauthorized state, a controlled port controls traffic in one of the following ways: 
    •  Performs bidirectional traffic control to  deny traffic to and from the client. 
    •   Performs unidirectional traffic control to deny traffic from the client. 
    The HP devices support only unidirectional traffic control. 
    802.1X-related protocols 
    802.1X uses the Extensible Authentication Protocol (EAP) to transport authentication information for the 
    client, the network access device, and the authentication server. EAP is an authentication framework that 
    uses the client/server model. It supports a variety of authentication methods, including MD5-Challenge, 
    EAP-Transport Layer Security (EAP-TLS), and Protected EAP (PEAP).  
    802.1X defines EAP over LAN (EAPOL) for passing EAP packets between the client and the network 
    access device over a wired or wireless LAN. Betwee n the network access device and the authentication 
    server, 802.1X delivers authentication information in one of the following methods:  
    •   Encapsulates EAP packets in RADIUS by using EAP over RADIUS (EAPOR), as described in  EAP 
    re
    
    lay . 
    •   Extracts authentication information from the EAP packets and encapsulates the information in 
    standard RADIUS packets, as described in  EAP termination.
      
    Controlled port Uncontrolled portAuthenticator system 1
    LAN
    Controlled port Uncontrolled portAuthenticator system 2
    LAN
    Port unauthorized
    Port authorized 
    						
    							 80 
    Packet formats 
    EAP packet format 
    Figure 36 shows the EAP packet format.  
    Figure 36  EAP packet format 
     
     
    •  Code —Type of the EAP packet. Options include Request (1), Response (2), Success (3), or Failure 
    (4) . 
    •   Identifier —Used for matching Responses with Requests. 
    •   Length —Length (in bytes) of the EAP packet. The EAP packet length is the sum of the Code, Identifier, 
    Length, and Data fields. 
    •   Data —Content of the EAP packet. This field appears only in a Request or Response EAP packet. The 
    field comprises the request type (or the response type) and the type data. Type 1 (Identify) and type 
    4 (MD5-challenge) are two examples for the type field.  
    EAPOL packet format 
    Figure 37  shows the EAPOL packet format. 
    Figure 37  EAPOL packet format 
     
     
    •  PAE Ethernet type —Protocol type. It takes the value 0x888E for EAPOL. 
    •   Protocol version —The EAPOL protocol version used by the EAPOL packet sender. 
    •   Ty p e —Type of the EAPOL packet.  Tabl e  5 lists the t
     ypes of EAPOL packets supported by HP 
    implementation of 802.1X. 
    Table 5  EAPOL packet types 
    Value Type  Description 
    0x00 EAP-Packet  The client and the network access device uses 
    EAP-Packets to transport auth
    entication information.  
    0x01 EAPOL-Start  The client sends an EAPOL-Start message to initiate 
    802.1X authentication to the network access device.   
    						
    							 81 
    Value Type  Description 
    0x02 EAPOL-Logoff The client sends an EAPOL-Logoff message to tell the 
    network access device that it is logging off.  
     
    •
      Length —Data length in bytes, or length of the Pa cket body. If packet type is EAPOL-Start or 
    EAPOL-Logoff, this field is set to 0, and no Packet body field follows. 
    •   Pac ke t body —Content of the packet. When the EAPOL packet type is EAP-Packet, the Packet body 
    field contains an EAP packet.  
    EAP over RADIUS 
    RADIUS adds two attributes, EAP-Message and  Message-Authenticator, for supporting EAP 
    authentication. For the RADIUS packet format, see  Configuring AAA. 
    EAP-Message 
    RADIUS encapsulates EAP packets in the EAP-Message attribute, as shown in  Figure 38. The Type field 
    takes 79, and the Value field can be up to 253 bytes. If an EAP packet is longer than 253 bytes, RADIUS 
    encapsulates it in multiple EAP-Message attributes. 
    Figure 38  EAP-Message attribute format 
     
     
    Message-Authenticator 
    RADIUS includes the Message-Authenticator attribute in all packets that have an EAP-Message attribute 
    to check their integrity. The packet receiver drops the packet if the calculated packet integrity checksum 
    is different than the Message-Authenticator attribute value. The Message-Authenticator prevents EAP 
    authentication packets from being tampered with during EAP authentication.  
    Figure 39  Message-Authenticator  attribute format 
     
     
    Initiating 802.1X authentication 
    Both the 802.1X client and the access device can initiate 802.1X authentication.  
    802.1X client as the initiator 
    The client sends an EAPOL-Start packet to the access device to initiate 802.1X authentication. The 
    destination MAC address of the packet is the IEEE 802.1X specified multicast address 
    01-80-C2-00-00-03 or the broadcast MAC address. If any intermediate device between the client and 
     01 5
    Type=79Value
    7Length
    N
    EAP packets
      
    						
    							 82 
    the authentication server does not support the multicast address, you must use an 802.1X client, the HP 
    iNode 802.1X client for example, that can send broadcast EAPOL-Start packets. 
    Access device as the initiator 
    The access device initiates authentication, if a client, the 802.1X client available with Windows XP for 
    example, cannot send EAPOL-Start packets. 
    The access device supports the following modes:  
    •   Multicast trigger mode —The access device multicasts Identi ty EAP-Request packets periodically 
    (every 30 seconds by default) to initiate 802.1X authentication.  
    •   Unicast trigger mode —Upon receiving a frame with the source MAC address not in the MAC 
    address table, the access device sends an Identity EAP-Request packet out of the receiving port to 
    the unknown MAC address. It retransmits the packet if no response has been received within a 
    certain time interval. 
    802.1X authentication procedures 
    802.1X authentication has two approaches: EAP relay and EAP termination. You choose either mode 
    depending on the support of the RADIUS server fo r EAP packets and EAP authentication methods.  
    •   EAP relay mode 
    EAP relay is defined in IEEE 802.1X. In this mode,  the network device uses EAPoR packets to send 
    authentication information to the RADIUS server, as shown in  Figure 40.  
    In EAP relay mode, the cli
    
    ent must use the same  authentication method as the RADIUS server. On 
    the network access device, you only need to execute the  dot1x authentication-method eap 
    command to enable EAP relay. 
    Figure 40  EAP relay 
     
     
    •  EAP termination mode 
    In EAP termination mode, the netw ork access device terminates the EAP packets received from the 
    client, encapsulates the client authentication  information in standard RADIUS packets, and uses 
    (Password Authentication Protocol) PAP or (Password Authentication Protocol) CHAP to 
    authenticate to the RADIUS server, as shown in  Figure 41. 
    Figure 41  EAP termination 
     
     
     
      
    						
    							 83 
    A comparison of EAP relay and EAP termination  
    Packet exchange method  Benefits Limitations 
    EAP relay 
    • Supports various EAP 
    authentication methods. 
    • The configuration and processing is 
    simple on the network access 
    device  The RADIUS server must support the 
    EAP-Message and 
    Message-Authenticator attributes, 
    and the EAP authentication method 
    used by the client. 
    EAP termination 
    Works with any RADIUS server that 
    supports PAP or CHAP authentication. 
    •
     Supports only MD5-Challenge 
    EAP authentication and the 
    username + password EAP 
    authentication initiated by an HP 
    iNode 802.1X client. 
    • The processing is complex on the 
    network access device.  
     
    EAP relay 
    Figure 42  shows the basic 802.1X authentication procedure in EAP relay mode, assuming that EAP-MD5 
    is used.   
    						
    							 84 
    Figure 42 802.1X authentication procedure in EAP relay mode 
     
     
    1. When a user launches the 802.1X client software  and enters a registered username and password, 
    the 802.1X client software sends an EAPOL- Start packet to the network access device.  
    2. The network access device responds with an Id entity EAP-Request packet to ask for the client 
    username. 
    3.  In response to the Identity EAP-Request packet,  the client sends the username in an Identity 
    EAP-Response packet to th e network access device.  
    4. The network access device relays the Identity  EAP-Response packet in a RADIUS Access-Request 
    packet to the authentication server. 
    5.  The authentication server uses the identity inform ation in the RADIUS Access-Request to search its 
    user database. If a matching entry is found, th e server uses a randomly generated challenge 
    (EAP-Request/MD5 challenge) to encrypt the passw ord in the entry, and sends the challenge in a 
    RADIUS Access-Challenge packet to the network access device.  
    6.  The network access device relays the EAP- Request/MD5 Challenge packet in a RADIUS 
    Access-Request packet to the client. 
    7.  The client uses the received challenge to encr ypt the password, and sends the encrypted password 
    in an EAP-Response/MD5 Challenge pac ket to the network access device.  
    8. The network access device relays the EAP- Response/MD5 Challenge packet in a RADIUS 
    Access-Request packet to th e authentication server. 
      
    						
    							 85 
    9.
     
    The authentication server compares the received  encrypted password with the one it generated at 
    step 5. If the two are identical,  the authentication server considers the client valid and sends a 
    RADIUS Access-Accept packet to  the network access device. 
    10. Upon receiving the RADIUS Access-Accept pac ket, the network access device sends an 
    EAP-Success packet to the client, an d sets the controlled port in the authorized state so the client 
    can access the network.  
    11.  After the client comes online, the network access  device periodically sends handshake requests to 
    check whether the client is still online. By defaul t, if two consecutive handshake attempts fail, the 
    device logs off the client.  
    12.  Upon receiving a handshake request, the client retu rns a response. If the client fails to return a 
    response after a certain number of consecutive ha ndshake attempts (two by default), the network 
    access device logs off the client . This handshake mechanism enables timely release of the network 
    resources used by 802.1X users that  have abnormally gone offline. 
    13. The client can also send an EAPOL-Logoff packet  to ask the network access device for a logoff. 
    Then 
    14.  In response to the EAPOL-Logoff packet, the ne twork access device changes the status of the 
    controlled port from authorized to unauthorized  and sends an EAP-Failure packet to the client. 
      
    						
    All HP manuals Comments (0)

    Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide