Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 2513
    							 146 
         
         
         
         
         \
        ... ... 
     
        ... ... 
         
         
     
    Redirecting authenticated users to a specified web page 
    To make the device automatically redirect authenticated users to a specified web page, do the following 
    in logon.htm and logonSuccess.htm: 
    1. In logon.htm, set the targ et attribute of Form to blank. 
    See the contents in gray: 
         
    2.  Add the function for page loading pt_init() to logonSucceess.htm. 
    See the contents in gray: 
         
         
        LogonSuccessed 
         
         
         \
        ... ... 
         
     
    HP recommends using browser IE 6.0 or above on the authentication clients. Make sure the browser of 
    an authentication client permits pop-ups or permits pop-ups from the access device. Otherwise, the user 
    cannot log off by closing the logon success or online page and can only click  Cancel to return back to 
    the logon success or online page. 
    If a user refreshes the logon success or online page, or  jumps to another web site from either of the pages, 
    the device also logs off the user. 
    Only IE, Firefox, and Safari browsers support the device  to log off the user when the user closes the logon 
    success or online page. Other browsers, such as  Chrome and Opera do not support this function. 
    Configuring the local portal server 
    To make the local portal server take effect, specify the protocol to be used for communication between 
    the portal client and local portal server. 
    Configuration prerequisites 
    To configure the local portal server to support HTTPS, complete these configurations at first:  
    						
    							 147 
    •  Configure PKI policies, obtain the CA certificate, and apply for a local certificate. For more 
    information, see 
    1Configuring PKI . 
    •   Configure the SSL server policy, and specify the PKI domain to be used, which is configured in the 
    above step. For more information, see  Configuring SSL. 
    W
    
    hen you specify the protocol for the local portal se rver to support, the local portal server will load the 
    default authentication page file, which is supposed to be saved in the root directory of the device. 
    Therefore, to make sure that the local portal server uses the user-defined default authentication pages, 
    you must edit and save them properly. Otherwise, the system default authentication pages are used. 
    Configuration procedure 
    To configure the local portal server:  
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Configure the protocol type 
    for the local portal server to 
    support and load the default 
    authentication page file.  portal local-server 
    { http  | https 
    server-policy  policy-name }  By default, the local portal server 
    does not support any protocol. 
    3.
      Configure the welcome 
    banner of the default 
    authentication pages of the 
    local portal server.  portal server banner 
    banner-string
     Optional. 
    No welcome banner by default. 
     
    Enabling portal authentication 
    Only after you enable portal authentication on an  access interface, can the access interface perform 
    portal authentication for connected clients. 
    Enabling Layer 2 portal authentication 
    Before enabling Layer 2 portal authentication, make sure that:  
    •   The listening IP address of the local portal server is specified. 
    •   Layer 3 portal authentication is not enabled on any interface. 
    Follow these guidelines when you enable Layer 2 portal authentication: 
    •   To ensure normal operation of portal authentication  on a Layer 2 port, do not enable port security, 
    guest VLAN of 802.1X, or EAD fast deployment of 802.1X on the port. 
    •   To support assignment of authorized VLANs, you must enable the MAC-based VLAN function on 
    the port. 
    To enable Layer 2 portal authentication: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Enter Layer 2 Ethernet port 
    view.  interface
     interface-type  
    interface-number   N/A  
    						
    							 148 
    Step Command Remarks 
    3.  Enable Layer 2 portal 
    authentication on the port.  portal local-server enable 
    Not enabled by default. 
     
    Enabling Layer 3 portal authentication (available only on the 
    HP 5500 EI series) 
    Before enabling Layer 3 portal authentication on an interface, make sure that:  
    •  An IP address is configured for the interface. 
    •   The interface is not added to any port aggregation group. 
    •   Layer 2 portal authentication is not enabled on any ports.  
    Follow these guidelines when you enable Layer 3 portal authentication: 
    •   The destination port number that the device uses fo r sending unsolicited packets to the portal server 
    must be the same as the port number that  the remote portal server actually uses. 
    •   Cross-subnet authentication mode ( portal server  server-name  method layer3 ) does not require 
    Layer 3 forwarding devices between the access device and the authentication clients. However, if 
    Layer 3 forwarding devices exist between the authen tication client and the access device, you must 
    select the cross-subnet portal authentication mode. 
    •   In re-DHCP authentication mode, a client can use a public IP address to send packets before 
    passing portal authentication. However, responses to the packets are restricted. 
    •   An IPv6 portal server does not support  the re-DHCP portal authentication mode. 
    •   You can enable both an IPv4 portal server and an IPv6 portal server for Layer 3 portal 
    authentication on an interface, but you cannot en able two IPv4 or two IPv6 portal servers on the 
    interface. 
    To enable Layer 3 portal authentication: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Enter interface view.  interface
     interface-type  
    interface-number   N/A 
    3.
      Enable Layer 3 portal 
    authentication on the 
    interface.  portal
     server  server-name  method  
    {  direct |  layer3 |  redhcp }  Not enabled by default. 
     
     
    NOTE: 
    The portal server and its parameters can be deleted  or modified only when the portal server is not 
    referenced by any interface. 
      
    						
    							 149 
    Controlling access of portal users 
    Configuring a portal-free rule 
    A portal-free rule allows specified users to access specified external websites without portal 
    authentication.  
    The matching items for a portal-free rule include  the source and destination IP address, source MAC 
    address, inbound interface, and VLAN. Packets matc hing a portal-free rule will not trigger portal 
    authentication, so that users sending the packets ca n directly access the specified external websites. 
    For Layer 2 portal authentication, you can configure only a portal-free rule that is from any source 
    address to any or a specified destination address. If you configure a portal-free rule that is from any 
    source address to a specified destination address, users can access the specified address directly, 
    without being redirected to the portal authenticati on page for portal authentication. Usually, you can 
    configure the IP address of a server that provides certain services (such as software upgrading service) 
    as the destination IP address of a portal-free rule, so that Layer 2 portal authentication users can access 
    the services without portal authentication. 
    Follow these guidelines when you configure a portal-free rule: 
    •   If you specify both a VLAN and an interface in a  portal-free rule, the interface must belong to the 
    VLAN. Otherwise, the rule does not take effect. 
    •   You cannot configure two or more portal-free rules with the same filtering criteria. Otherwise, the 
    system prompts that the rule already exists. 
    •   A Layer 2 interface in an aggregation group cannot be specified as the source interface of a 
    portal-free rule, and the source interface of a po rtal-free rule cannot be added to an aggregation 
    group. 
    To configure a portal-free rule: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Configure a portal-free rule. 
    • To configure an IPv4 portal-free rule: 
    portal free-rule  rule-number 
    {  destination  { any | ip {  ip-address  
    mask  { mask-length  | netmask } | any } } 
    |  source { any  | [ interface  
    interface-type  interface-number  | ip 
    {  ip-address  mask  { mask-length  | mask } 
    |  any  } | mac  mac-address  | vlan  
    vlan-id  ] * } } * 
    • To configure an IPv6 portal-free rule: 
    portal free-rule  rule-number 
    {  destination  { any  | ipv6  { ipv6-address  
    prefix-length  | any  } } |  source  { any | 
    [ interface  interface-type 
    interface-number |  ipv6 { ipv6-address 
    prefix-length  | any } | mac  mac-address  
    |  vlan  vlan-id  ] * } } *  Configure at least one 
    command. 
      
    						
    							 150 
     NOTE: 
    Regardless of whether portal authentication is enabled  or not, you can only add or remove a portal-free
    rule. You cannot modify it. 
     
    Configuring an authentication source subnet (available only on 
    the HP 5500 EI series) 
    Only Layer 3 portal authentication supports this feature. 
    By configuring authentication source subnets, you specify that only HTTP packets from users on the 
    authentication source subnets can trigger portal authentication. If an unauthenticated user is not on any 
    authentication source subnet, the access device disc ards all the users HTTP packets that do not match 
    any portal-free rule. 
    To configure an authentication source subnet: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Enter interface view.  interface
     interface-type 
    interface-number   N/A 
    3.
      Configure an authentication 
    source subnet.  portal auth-network 
    network-address { mask-length
     | 
    mask  }  Optional. 
    By default, the source IPv4 subnet 
    is 0.0.0.0/0, and the source IPv6 
    subnet is ::/0, meaning that users 
    from any IPv4 or IPv6 subnet must 
    pass portal authentication to 
    access network resources. 
    You can configure multiple 
    authentication source subnets by 
    executing the 
    portal auth-network  
    command repeatedly. 
     
      NOTE: 
    Configuration of authentication source subnets applie s to only cross-subnet authentication. In direct 
    authentication mode, the authenticati on source subnet is 0.0.0.0/0. In re-DHCP authentication mode, the
    authentication source subnet of an  interface is the subnet to which the  private IP address of the interface
     
    belongs.  
    Setting the maximum number of online portal users 
    You can use this feature to control the total number of online portal users in the system. 
    If the maximum number of online portal users to be set  is less than that of the current online portal users, 
    the limit can be set successfully and does not impact the  online portal users, but the system does not allow 
    new portal users to log on until the number drops down below the limit. 
    To set the maximum number of online portal users allowed in the system: 
      
    						
    							 151 
    Step Command Remarks 
    1.  Enter system view. 
    system-view  N/A 
    2.  Set the maximum number of 
    online portal users.  portal
     max-user max-number  By default, the maximum number is 
    3000 on the HP 5500 EI series 
    and 1000 on the HP 5500 SI 
    series. 
     
     
    NOTE: 
    The maximum number of online portal users the swit ch actually assigns depends on the ACL resources on
    the switch. 
     
    Specifying an authentication domain for portal users 
    After you specify an authentication domain for portal users on an interface, the device uses the 
    authentication domain for authentication, authorization, and accounting (AAA) of all portal users on the 
    interface, ignoring the domain names carried in the usernames. This allows you to specify different 
    authentication domains for different interfaces as needed. 
    To specify an authentication domain  for portal users on an interface: 
     
    Step Command Remarks 
    1.  Enter system view. 
    system-view  N/A 
    2.  Enter interface view.  interface
     interface-type  
    interface-number   N/A 
    3.
      Specify an authentication 
    domain for portal users on the 
    interface.  portal domain 
    [ ipv6  ] 
    domain-name   By default, no authentication 
    domain is specified for portal 
    users. 
     
    The switch selects the authentication domain for a 
    portal user on an interface in this order: the 
    authentication domain specified for the interface, the authentication domain carried in the username, 
    and the system default authentication domain. For information about the default authentication domain, 
    see  Configuring AAA . 
    Configuring Layer 2 portal authentication to support web proxy 
    By default, proxied HTTP requests cannot trigger Layer 2 portal authentication but are silently dropped. 
    To  a l l o w  s u c h  H T T P  r e q u e s t s  t o  t r i g g e r  p o r t a l  a u t h e n tication, configure the port numbers of the web proxy 
    servers on the switch.  
    If a users browser uses the Web Proxy Auto-Discovery  (WPAD) protocol to discover web proxy servers, 
    add the port numbers of the web proxy servers on the switch, and configure portal-free rules to allow user 
    packets destined for the IP address of the WPAD server to pass without authentication. 
    You must add the port numbers of the web proxy servers on the switch and users must make sure their 
    browsers that use a web proxy server do not use the  proxy server for the listening IP address of the local 
    portal server. Thus, HTTP packets that the portal user sends to the local portal server are not sent to the 
    web proxy server. 
    To configure Layer 2 portal authentication to support a web proxy: 
      
    						
    							 152 
    Step Command Remarks 
    1.  Enter system view. 
    system-view  N/A 
    2.  Add a web proxy server 
    port number.  portal web-proxy port
     port-number By default, no web proxy 
    server port number is 
    configured and proxied HTTP 
    requests cannot trigger portal 
    authentication.  
     
    Enabling support for portal user moving 
    Only Layer 2 portal authentication supports this feature. 
    In scenarios where there are hubs, Layer 2 switches, or APs between users and the access devices, if an 
    authenticated user moves from the current access port to another Layer 2-port
    al-authentication-enabled 
    port of the device without logging off, the user cannot get online when the original port is still up. The 
    reason is that the original port is still maintaining the authentication information of the user and the 
    device does not permit such a user to get online from another port by default.  
    To solve the problem described above, enable support  for portal user moving on the device. Then, when 
    a user moves from a port of the device to another, the device provides services in either of the following 
    ways: 
    •   If the original port is still up and the two ports be long to the same VLAN, the device allows the user 
    to continue to access the network without re-authe ntication, and uses the new port information for 
    user accounting. 
    •   If the original port is down or the two ports be long to different VLANs, the device removes the 
    authentication information of the user from the original port and authenticates the user on the new 
    port. 
    To enable support for portal user moving: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Enable support for portal 
    user moving.  portal move-mode auto 
    Disabled by default 
     
    For a user with authorization information (such as authorized VLAN) configured, after the user moves 
    from a port to another, the switch tries to assign  the authorization information to the new port. If the 
    operation fails, the switch deletes the users information from the original port and re-authenticates the 
    user on the new port. 
    Specifying an Auth-Fail VLAN for portal 
    authentication 
    Only Layer 2 portal authentication supports this feature.  
    						
    							 153 
    This task sets the Auth-Fail VLAN to be assigned to users failing portal authentication. You can specify 
    different Auth-Fail VLANs for portal authentication on different ports. A port can be specified with only 
    one Auth-Fail VLAN for portal authentication. 
    Before specifying an Auth-Fail VLAN, be sure to create the VLAN. 
    To specify an Auth-Fail VLAN for portal authentication: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Enter Layer 2 Ethernet 
    interface view.  interface
     interface-type  
    interface-number   N/A 
    3.
      Specify an Auth-Fail VLAN for 
    portal authentication on the 
    port.  portal auth-fail vlan
     authfail-vlan-id
     Not specified by default 
     
    After you specify an Auth-Fail VLAN for portal authentication on a port, you must also enable the 
    MAC-based VLAN function on the port to make the specified Auth-Fail VLAN take effect. For information 
    about MAC VLAN, see  Layer 2—LAN Switching Configuration Guide . 
    The MAC-VLAN entries generated in response to portal authentication failures do not overwrite the 
    MAC-VLAN entries already generated in other authentication modes. 
    Configuring RADIUS related attributes 
    Only Layer 3 portal authentication supports this feature. 
    Specifying NAS-Port-Type for an interface 
    NAS-Port-Type is a standard RADIUS attribute for indica ting a user access port type. With this attribute 
    specified on an interface, when a portal user logs on from the interface, the device uses the specified 
    N A S - Po r t - Ty p e  v a l u e  a s  t h a t  i n  t h e  R A D I U S  r e q u e s t  t o  b e  s e n t  t o  t h e  R A D I U S  s e r v e r.  I f  N A S - Po r t - Ty p e  i s  n o t  
    specified, the device uses the access port type obtained.  
    If there are multiple network devices between the Broadband Access Server (BAS, the portal 
    authentication access device) and a portal client, th e BAS may not be able to obtain a users correct 
    access port information. For example, for a wireless  client using portal authentication, the access port 
    type obtained by the BAS may be the type of the wired port that authenticates the user. To make sure that 
    the BAS delivers the right access port information to the RADIUS server, specify the NAS-Port-Type 
    according to the practical access environment.  
    To specify the NAS-Port-Type value for an interface: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Enter interface view.  interface
     interface-type  
    interface-number   N/A 
    3.
      Specify the NAS-Port-Type 
    value for the interface.  portal nas-port-type 
    { ethernet  | 
    wireless  }  Not configured by default 
      
    						
    							 154 
    Specifying a NAS ID profile for an interface 
    In some networks, users access points are identified by their access VLANs. Network carriers need to 
    use NAS-identifiers to identify user access points. With a NAS ID profile specified on an interface, when 
    a user logs in from the interface, the access device checks the specified profile to obtain the NAS ID that 
    is bound with the access VLAN. The value of this NAS ID is used as that of the NAS-identifier attribute 
    in the RADIUS packets to be sent to the RADIUS server.  
    A NAS ID profile defines the binding relationship between VLANs and NAS IDs. A NAS ID-VLAN 
    binding is defined by the  nas-id id-value  bind vlan vlan-id  command, which is described in detail in AAA 
    configuration commands  in the  Security Command Reference . 
    If no NAS-ID profile is specified for an interface or  no matching binding is found in the specified profile, 
    the switch uses the device name as the interface NAS ID. 
    To configure a NAS ID profile for an interface: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Create a NAS ID profile and 
    enter NAS ID profile view.  aaa nas-id profile 
    profile-name For more information about the 
    command, see 
    Security Command 
    Reference . 
    3.  Bind a NAS ID with a VLAN.  nas-id 
    nas-identifier  bind vlan 
    vlan-id   For more information about the 
    command, see 
    Security Command 
    Reference . 
    4.  Return to system view. 
    quit  N/A 
    5.  Enter interface view.  interface
     interface-type  
    interface-number   N/A 
    6.
      Specify a NAS ID profile for 
    the interface.  portal nas-id-profile 
    profile-name By default, an interface is specified 
    with no NAS ID profile. 
     
    Specifying a source IP address for outgoing portal 
    packets 
    After you specify a source IP address for outgoing port
    al packets on an interface, the IP address is used 
    as the source IP address of packets that the access device sends to the portal server, and the destination 
    IP address of packets that the portal server sends to the access device. 
    To specify a source IP address for outgoing portal packets to be sent: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Enter interface view.  interface
     interface-type  
    interface-number   N/A  
    						
    							 155 
    Step Command Remarks 
    3.  Specify a source IP address 
    for outgoing portal packets.  portal nas-ip 
    { ipv4-address  | ipv6 
    ipv6-address }   Optional. 
    By default, no source IP address is 
    specified for outgoing portal 
    packets and the IP address of the 
    user logon interface is used as the 
    source IP address of the outgoing 
    portal packets. 
    In NAT environments, HP 
    recommends specifying the 
    interfaces public IP address as the 
    source IP address of outgoing 
    portal packets. 
     
    Configuring portal stateful failover (available only 
    on the HP 5500 EI series) 
    Only Layer 3 portal authentication supports this feature. 
    To implement stateful failover for portal, configure 
    VRRP for traffic switchover, and perform the following 
    configurations for service backup on each of the two devices that back up each other: 
    •   Specify an interface for backing up portal servic es, which is called portal service backup interface 
    in this document, and enable portal on the portal service backup interface. The portal service 
    backup interface is different from the stateful failov er interface. Stateful failover interfaces only 
    forward state negotiation messages and backup data. 
    •   Specify the portal group to which the portal servic e backup interface belongs. Be sure to specify the 
    same portal group for the portal service backup interfaces that back up each other on the two 
    devices. 
    •   Specify the device ID. Make sure that the device ID of the local device is different from that of the 
    peer device. 
    •   Specify the backup source IP address for RADIUS packets to be sent as the source IP address for 
    RADIUS packets that is configured on the peer device, so that the peer device can receive packets 
    from the server. (This configuration is optional.) 
    •   Specify the backup VLAN, and enable stateful failover. For related configuration, see  High 
    Availability Configuration Guide . 
    After the working state of the two devices changes fr om independence to synchronization and the portal 
    group takes effect, the two devices start to back up the data of online portal users for each other. 
    The AAA and portal configuration must be consistent on the two devices that back up each other. For 
    example, you must configure the same portal server on the two devices. 
    To configure stateful failover: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Enter interface view.  interface
     interface-type  
    interface-number   N/A  
    						
    All HP manuals Comments (0)

    Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide