Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 2513
    							 206 
    •  MAC learning control —Includes two modes, autoLearn and secure. MAC address learning is 
    permitted on a port in autoLearn mo de and disabled in secure mode.  
    •   Authentication —Security modes in this category implement MAC authentication, 802.1X 
    authentication, or a combination of these two authentication methods. 
    Upon receiving a frame, the port in a security mode searches the MAC address table for the source MAC 
    address. If a match is found, the port forwards the fr ame. If no match is found, the port learns the MAC 
    address or performs authentication, depending on the secu rity mode. If the frame is illegal, the port takes 
    the pre-defined NTK, intrusion protection, or trapping action. 
    The maximum number of users a port supports equals the maximum number of MAC addresses that port 
    security allows or the maximum number of concurrent users the authentication mode in use allows, 
    whichever is smaller. For example, if 802.1X allows more concurrent users than port securitys limit on the 
    number of MAC addresses on the port in userLoginSecureExt mode, port securitys limit takes effect.  
    Tabl e  1 1 de
    scribes the port security modes and the security features. 
    Table 11  Port security modes 
    Purpose Security  mode Features that can be 
    tri
    ggered 
    Turning off the port security 
    feature noRestrictions (the default mode) 
    In this mode, port security is disabled on the port 
    and access to the port is not restricted. 
    N/A 
    Controlling MAC address 
    learning autoLearn 
    NTK/intrusion 
    protection 
    secure 
    Performing 802.1X 
    authentication userLogin N/A userLoginSecure  
    NTK/intrusion 
    protection 
    userLoginSecureExt 
    userLoginWithOUI 
    Performing MAC authentication macAddressWithRadius  NTK/intrusion 
    protection 
    Performing a combination of 
    MAC authentication and 
    802.1X authentication Or 
    macAddressOrUserLoginSecure 
    NTK/intrusion 
    protection macAddressOrUserLoginSecureExt  
    Else macAddressElseUserLoginSecure  macAddressElseUserLoginSecureExt  
     
     
    TIP: 
    •
     
    userLogin specifies 802.1X authentication and port-based access control. 
    • macAddress  specifies MAC authentication. 
    • Else  specifies that the authentication method before  Else is applied first. If the authentication fails, whether to turn 
    to the authentication method following  Else depends on the protocol type of the authentication request. 
    • Typically, in a security mode with  Or, the authentication method to be used depends on the protocol type of the 
    authentication request.  
    • userLogin  with Secure  specifies 802.1X authentication and MAC-based access control. 
    • Ext  indicates allowing multiple 802.1X users to be authenticated and serviced at the same time. A security mode
    without  Ext allows only one user to pass 802.1X authentication. 
      
    						
    							 207 
    Controlling MAC address learning 
    •  autoLearn 
    A port in this mode can learn MAC addresses, an d allows frames from learned or configured 
    MAC addresses to pass. The automatically learned MAC addresses are secure MAC addresses. 
    You can also configure secure  MAC addresses by using the  port-security mac-address security 
    command. A secure MAC address never ages out by default. 
    When the number of secure MAC addresses reaches the upper limit, the port transitions to secure 
    mode. 
    The dynamic MAC address learning function in MAC address management is disabled on ports 
    operating in autoLearn mode, but you ca n configure MAC addresses by using the  mac-address 
    dynamic  and mac-address static  commands. 
    •   secure 
    MAC address learning is disabled  on a port in secure mode. You configure MAC addresses by 
    using the  mac-address static  and mac-address dynamic  commands. For more information about 
    configuring MAC address  table entries, see Layer 2—LAN Switching Configuration Guide . 
    A port in secure mode allows only frames  sourced from secure MAC addresses and manually 
    configured MAC addresses to pass. 
    Performing 802.1X authentication 
    •   userLogin 
    A port in this mode performs 802.1X authentica tion and implements port-based access control. 
    The port can service multiple 802. 1X users. If one 802.1X user passes authentication, all the other 
    802.1X users of the port can access  the network without authentication. 
    •   userLoginSecure 
    A port in this mode performs 802.1X authentica tion and implements MAC-based access control. 
    The port services only one user passing 802.1X authentication. 
    •   userLoginSecureExt 
    This mode is similar to the userLoginSecure mode  except that this mode supports multiple online 
    802.1X users. 
    •   userLoginWithOUI 
    This mode is similar to the userLoginSecure mode.  The difference is that a port in this mode also 
    permits frames from one user whose MAC address  contains a specific organizationally unique 
    identifier (OUI).  
    For wired users, the port performs 802.1X auth entication upon receiving 802.1X frames, and 
    performs OUI check upon receiving non-802.1X frames.  
    Performing MAC authentication 
    macAddressWithRadius: A port in this mode performs  MAC authentication and services multiple users.  
    Performing a combination of MAC authentication and 802.1X authentication 
    •  macAddressOrUserLoginSecure 
    This mode is the combination of the macAddr essWithRadius and userLoginSecure modes.  
    For wired users, the port performs MAC authenti cation upon receiving non-802.1X frames and 
    performs 802.1X authentication upon receiving 802.1X frames. 
    •   macAddressOrUserLoginSecureExt  
    						
    							 208 
    This mode is similar to the macAddressOrUserLoginSecure mode exce pt that a port in this mode 
    supports multiple 802.1X and MAC authentication users. 
    •   macAddressElseUserLoginSecure 
    This mode is the combination of the macAddres sWithRadius and userLoginSecure modes, with 
    MAC authentication having a higher priority as the  Else keyword implies.  
    For non-802.1X frames, a port in this mode perf orms only MAC authentication. For 802.1X frames, 
    it performs MAC authentication and then, if th e authentication fails, 802.1X authentication.  
    •   macAddressElseUserLoginSecureExt 
    This mode is similar to the macAddressElseUserLogin Secure mode except that a port in this mode 
    supports multiple 802.1X and MAC auth entication users as the keyword Ext implies. 
     
      NOTE: 
    An OUI, as defined by the IEEE, is the first 24 bits  of the MAC address, which uniquely identifies a device
    vendor.   
    Working with guest VLAN and Auth-Fail VLAN 
    An 802.1X guest VLAN is the VLAN that a user is in before initiating authentication. An 802.1X Auth-Fail 
    VLAN or a MAC authentication guest VLAN is the VLAN that a user is in after failing authentication. 
    Support for the guest VLAN and Auth-Fail VLAN features varies with security modes. 
    •  You can use the 802.1X guest VLAN and 802.1X Auth-F ail VLAN features together with port security 
    modes that support 802.1X authentication. For more information about the 802.1X guest VLAN and 
    Auth-Fail VLAN on a port that performs MAC-based access control, see  Configuring 802.1X. 
    •   Y
    
    ou can use the MAC authentication VLAN feature together with security modes that support MAC 
    authentication. For more information about the MAC authentication guest VLAN, see  Configuring 
    MA
    
    C authentication . 
    •   If you configure both an 802.1X Auth-Fail VL AN and a MAC authentication guest VLAN on a port 
    that performs MAC-based access control, the 802.1X Auth-Fail VLAN has a higher priority. 
    Configuration task list 
     
    Task Remarks 
    Enabling port security  Required. 
    Setting port securitys limit on the number of MAC addresses on a port  Optional. 
    Setting the port security mode  Required. 
    Configuring port security 
    features Configuring NTK  
    Optional.
      
    Configure one or more features 
    as required. 
    Configuring intrusion protection 
    Enabling port security traps 
    Configuring secure MAC addresses  Optional. 
    Ignoring authorization information from the server Optional. 
      
    						
    							 209 
    Enabling port security 
    Enabling or disabling port security resets the following security settings to the default:  
    •   802.1X access control mode is MAC-based,  and the port authorization state is auto. 
    •   Port security mode is noRestrictions.  
    When port security is enabled, you cannot manually enable 802.1X or MAC authentication, or change 
    the access control mode or port authorization stat e. The port security automatically modifies these 
    settings in different security modes. 
    You cannot disable port security when online users are present.  
    Before enabling port security, disable 802.1X and MAC authentication globally. 
    To enable port security: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.
      Enable port security. 
    port-security enable  By default, the port security is disabled. 
     
    For more information about 802.1X configuration, see  Configuring 802.1X. F or more information 
    about MAC authentication configuration, see  Configuring MAC authentication. 
    Setting port securitys limit on the number of MAC 
    addresses on a port 
    You can set the maximum number of MAC addresses that port security allows on a port for the following 
    purposes: 
    •  Controlling the number of concurrent users on the port. The maximum number of concurrent users on 
    the port equals this limit or the limit of the au thentication mode (802.1X for example) in use, 
    whichever is smaller.  
    •   Controlling the number of secure MAC addresses on the port in autoLearn mode. 
    The port securitys limit on the number of MAC addres ses on a port is independent of the MAC learning 
    limit described in MAC address table configuration  in the  Layer 2—LAN Switching Configuration Guide . 
    To set the maximum number of secure MAC addresses allowed on a port: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Enter Layer 2 Ethernet 
    interface view.  interface
     interface-type  
    interface-number   N/A 
    3.
      Set the limit of port security on 
    the number of MAC 
    addresses.  port-security max-mac-count 
    count-value
      Not limited by default. 
      
    						
    							 210 
    Setting the port security mode 
    After enabling port security, you can change the port security mode of a port only when the port is 
    operating in noRestrictions (the default) mode. To ch ange the port security mode for a port in any other 
    mode, first use the undo port-security port-mode  command to restore the default port security mode. 
    You can specify a port security mode when port securi ty is disabled, but your configuration cannot take 
    effect. 
    You cannot change the port security mode  of a port when online users are present. 
    Configuration prerequisites 
    Before you set a port security mode for a port, complete the following tasks: 
    •   Disable 802.1X and MAC authentication.  
    •   Verify that the port does not belong to any  aggregation group or service loopback group. 
    •   If you are configuring the autoLearn mode, set port security’s limit on the number of MAC addresses. 
    You cannot change the setting when the port is operating in autoLearn mode.  
    Configuration procedure 
    To enable a port security mode:  
    Step Command  Remarks 
    1.  Enter system view. 
    system-view  N/A 
    2.  Set an OUI value for 
    user authentication.  port-security 
    oui oui-value  index 
    index-value   Required for the 
    userlogin-withoui  
    mode. 
    Not configured by default. 
    To set multiple OUI values, repeat this 
    step. 
    3.   Enter Layer 2 Ethernet 
    interface view.  interface
     interface-type 
    interface-number  N/A 
    4.  Set the port security 
    mode.  port-security 
    port-mode { autolearn  | 
    mac-authentication  |  
    mac-else-userlogin-secure  |  
    mac-else-userlogin-secure-ext  | secure  
    |  userlogin |  userlogin-secure  |  
    userlogin-secure-ext  | 
    userlogin-secure-or-mac  |  
    userlogin-secure-or-mac-ext  | 
    userlogin-withoui  }  By default, a port operates in 
    noRestrictions mode. 
      
    						
    							 211 
    Configuring port security features 
    Configuring NTK 
    The NTK feature checks the destination MAC addresses in outbound frames to make sure that frames are 
    forwarded only to authenticated devices. Any unicast frame with an unknown destination MAC address 
    is discarded. Not all port security modes support triggering the NTK feature. For more information, 
    see  Tabl e  1 1. 
    T
    
    he NTK feature supports  the following modes: 
    •   ntkonly —Forwards only unicast frames with authenticated destination MAC addresses.  
    •   ntk-withbroadcasts —Forwards only broadcast frames and unicast frames with authenticated 
    destination MAC addresses.  
    •   ntk-withmulticasts —Forwards only broadcast frames, multicast frames, and unicast frames with 
    authenticated destination MAC addresses. 
    To configure the NTK feature: 
     
    Step Command Remarks 
    1.   Enter system view.  system-view  N/A 
    2.  Enter Layer 2 Ethernet 
    interface view.  interface
     interface-type 
    interface-number   N/A 
    3.
      Configure the NTK feature.  port-security ntk-mode
     
    {  ntk-withbroadcasts  | 
    ntk-withmulticasts  | ntkonly }  By default, NTK is disabled on a 
    port and all frames are allowed to 
    be sent. 
     
    Configuring intrusion protection 
    Intrusion protection enables a device to take one of the following actions in response to illegal frames: 
    •
      blockmac —Adds the source MAC addresses of illegal frames to the blocked MAC addresses list 
    and discards the frames. All subsequent frames sourced from a blocked MAC address will be 
    dropped. A blocked MAC address is restored to normal state after being blocked for three minutes. 
    The interval is fixed and cannot be changed. 
    •   disableport —Disables the port until you bring it up manually. 
    •   disableport-temporarily —Disables the port for a specific period of time. The period can be 
    configured with the  port-security timer disableport  command. 
    On a port operating in either the macAddressElseUserLoginSecure mode or the 
    macAddressElseUserLoginSecureExt mode, intrusion  protection is triggered only after both MAC 
    authentication and 802.1X authentication for the same frame fail. 
    To configure the intrusion protection feature: 
     
    Step Command Remarks 
    1.   Enter system view.  system-view  N/A  
    						
    							 212 
    Step Command Remarks 
    2.  Enter Layer 2 Ethernet 
    interface view.  interface
     interface-type 
    interface-number   N/A 
    3.
      Configure the intrusion 
    protection feature.  port-security intrusion-mode
     
    {  blockmac  | disableport  | 
    disableport-temporarily  } By default, intrusion protection is 
    disabled. 
    4.
      Return to system view. 
    quit  N/A 
    5.  Set the silence timeout period 
    during which a port remains 
    disabled.   port-security timer 
    disableport 
    time-value  Optional. 
    20 seconds by default. 
     
    Enabling port security traps 
    You can configure the port security module to se
    nd traps for the following categories of events: 
    •   addresslearned —Learning of new MAC addresses.  
    •   dot1xlogfailure/dot1xlogon/dot1xlogoff —802.1X authentication failure, success, and 802.1X 
    user logoff. 
    •   ralmlogfailure /ralmlogon/ralmlogoff —MAC authentication failure, MAC authentication user 
    logon, and MAC authentication user logoff. 
    •   intrusion —Detection of illegal frames. 
    To enable port security traps: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Enable port security traps.  port-security trap
     { addresslearned  
    |  dot1xlogfailure  | dot1xlogoff  | 
    dot1xlogon  | intrusion  | 
    ralmlogfailure  | ralmlogoff  | 
    ralmlogon  }  By default, port security traps are 
    disabled. 
     
    Configuring secure MAC addresses 
    Secure MAC addresses are configured or learned in autoLearn mode and can survive link down/up 
    events. You can bind a secure MAC address to only one port in a VLAN.  
     
     
    IMPORTANT: 
    When the maximum number of secure MAC addr
    ess entries is reached, the port changes to secure mode, 
    and no more secure MAC addresses can be added or learned. The port allows only frames sourced from 
    a secure MAC address or a MAC address configured by using the  mac-address dynamic or mac-address 
    static command to pass through.  
    Secure MAC addresses fall into static, sticky and dynamic secure MAC addresses.   
    						
    							 213 
    Table 12 A comparison of static, sticky, and dynamic secure MAC addresses 
    Type  Address sources  Aging mechanism  Can be saved and 
    survive a device 
    reboot? 
    Static Manually added Not available.  
    They never age out unless you manually remove 
    them, change the port security mode, or disable 
    the port security feature. 
    Yes. 
    Sticky Manually added or 
    automatically learned 
    when the dynamic 
    secure MAC function 
    (port-security 
    mac-address 
    dynamic
    ) is disabled.  Sticky MAC addresses by default do not age 
    out, but you can configure an aging timer or use 
    the aging timer together with the inactivity aging 
    function to delete old sticky MAC addresses: 
    •
     If only an aging timer is configured, the 
    aging timer counts up regardless of whether 
    traffic data has been sent from the sticky 
    MAC address. 
    • If both an aging timer and the inactivity 
    aging function are configured, the aging 
    timer restarts once traffic data is detected 
    from the sticky MAC address.  Yes. 
    The secure MAC aging 
    timer restarts at a 
    reboot.  
    Dynamic 
    Converted from sticky 
    MAC addresses or 
    automatically learned 
    after the dynamic 
    secure MAC function 
    is enabled. 
    Same as sticky MAC addresses. 
    No. 
    All dynamic secure 
    MAC addresses are 
    lost at reboot. 
     
    Configuration prerequisites 
    •
      Enable port security. 
    •   Set port security’s limit on the number of MAC addresses on the port. Perform this task before you 
    enable autoLearn mode.  
    •   Set the port security mode to autoLearn. 
    Configuration procedure 
    To configure a secure MAC address:  
    Step Command Remarks 
    1.  Enter system view. 
    system-view  N/A 
    2.  Set the secure MAC aging 
    timer.  port-security timer autolearn aging 
    time-value  Optional. 
    By default, secure MAC addresses 
    do note age out, and you can 
    remove t hem o nly b y p erformi ng the  
    undo port-security mac-address 
    security 
    command, changing the 
    port security mode, or disabling the 
    port security feature.  
    						
    							 214 
    Step Command Remarks 
    3.  Configure a secure MAC 
    address. 
    • Approach 1 (in system view): 
    port-security mac-address 
    security  [ sticky ] mac-address  
    interface interface-type 
    interface-number  vlan vlan-id 
    • Approach 2 (in interface view): 
    a.  interface  interface-type 
    interface-numbe r 
    b.  port-security  mac-address  
    security  [ sticky ] 
    mac-address  vlan  vlan-id  
    c.   quit  Use either approach. 
    No secure MAC address exists by 
    default. 
    4.
      Enter Layer 2 Ethernet 
    interface view.  interface
     interface-type  
    interface-number   N/A 
    5.
      Enable inactivity aging.  port-security mac-address 
    aging-type inactivity  Optional. 
    By default, the inactivity aging 
    function is disabled. 
    6.
      Enable the dynamic secure 
    MAC function.  port-security mac-address dynamic 
    Optional. 
    By default, sticky MAC addresses 
    can be saved to the configuration 
    file, and once saved, can survive a 
    device reboot. 
     
     
    NOTE: 
    You can display dynamic secure  MAC addresses only by using the  display port-security mac-address 
    security command.  
     
    Ignoring authorization information from the server 
    The authorization information is delivered by the RADI US server to the device after an 802.1X user or 
    MAC authenticated user passes RADIUS authentication. You can configure a port to ignore the 
    authorization information from the RADIUS server.  
    To configure a port to ignore the authorization information from the RADIUS server: 
     
    Step Command Remarks 
    1.   Enter system view. system-view  N/A 
    2.  Enter Layer 2 Ethernet 
    interface view.  interface
     interface-type 
    interface-number   N/A 
    3.
      Ignore the authorization 
    information from the RADIUS 
    server.  port-security authorization ignore  By default, a port uses the 
    authorization information from the 
    RADIUS server. 
     
    Displaying and maintaining port security 
      
    						
    							 215 
    Task Command Remarks 
    Display port security configuration 
    information, operation 
    information, and statistics about 
    one or more ports or all ports. display port-security
     [ interface 
    interface-list  ] [ | { begin | exclude  
    |  include  } regular-expression  ]  Available in any view 
    Display information about secure 
    MAC addresses.
      display port-security mac-address 
    security
     [ interface  interface-type 
    interface-number ] [ vlan  vlan-id ] 
    [ count ] [  | { begin  | exclude  | 
    include  } regular-expression ]   Available in any view
     
    Display information about blocked 
    MAC addresses.  display port-security mac-address 
    block [ interface 
    interface-type 
    interface-number ] [ vlan  vlan-id ] 
    [ count ] [  | { begin  | exclude  | 
    include  } regular-expression ]  Available in any view 
     
    Port security configuration examples 
    Configuring the autoLearn mode 
    Network requirements 
    See 
    Figure 87 . C onfigure port GigabitEthernet 1/0/1 on the Device, as follows: 
    •   Accept up to 64 users on the port without authentication.  
    •   Permit the port to learn and add MAC addresses as sticky MAC addresses, and set the sticky MAC 
    aging timer to 30 minutes.  
    •   After the number of secure MAC addresses reaches 64, the port stops learning MAC addresses. If 
    any frame with an unknown MAC address arrives, intrusion protection starts, and the port shuts 
    down and stays silent for 30 seconds.  
    Figure 87  Network diagram 
     
     
    Configuration procedure 
    # Enable port security.  
     system-view 
    [Device] port-security enable 
    # Set the secure MAC aging timer to 30 minutes.  
    [Device] port-security timer autolearn aging 30 
    # Enable intrusion protection traps on port GigabitEthernet 1/0/1.  
    [Device] port-security trap intrusion 
    [Device] interface gigabitethernet 1/0/1  
    						
    All HP manuals Comments (0)

    Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide