Page 2
SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V G, V G, PSPT, XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co., Ltd. All other trademarks that may be mentioned in this manual are the property of their respective owners.
The H3C S9500E documentation set includes 13 configuration guides, which describe the software features for the H3C S9500E Series 10G Core Routing Switches and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply software features to different network scenarios.
Page 4
Convention Description vertical bars, from which you may select multiple choices or none. The argument or keyword and argument combination before the ampersand (&) &<1-n> sign can be entered 1 to n times. A line that starts with a pound (#) sign is comments. GUI conventions Convention Description...
Provides a complete guide to hardware installation Installation guide and hardware specifications. Card manuals Provide the hardware specifications of cards. H3C N68 Cabinet Guides you through installing and remodeling H3C Installation and Remodel N68 cabinets. Hardware specifications Introduction and installation...
Obtaining documentation You can access the most up-to-date H3C product documentation on the World Wide Web at http://www.h3c.com. Click the links on the top navigation bar to obtain different categories of product documentation: [Technical Support & Documents > Technical Documents] –...
Table of Contents Preface ·········································································································································································· 3 Audience ············································································································································································ 3 Conventions ······································································································································································· 3 About the H3C S9500E documentation set ··················································································································· 5 AAA configuration ····················································································································································· 14 Introduction to AAA ······················································································································································· 14 Introduction to RADIUS ·················································································································································· 15 Client/Server model ·············································································································································· 15 Security and authentication mechanisms ············································································································ 16 Basic message exchange process of RADIUS ····································································································...
Page 9
Setting the status of RADIUS servers ···················································································································· 43 Configuring attributes related to data to be sent to the RADIUS server ·························································· 44 Enabling the RADIUS trap function ······················································································································ 45 Specifying the source IP address for RADIUS packets to be sent ····································································· 45 Setting timers regarding RADIUS servers ············································································································...
Page 10
Configuring the online user handshake function ········································································································ 78 Enabling the multicast trigger function ························································································································· 79 Specifying a mandatory authentication domain for a port ······················································································· 79 Enabling the quiet timer················································································································································· 80 Enabling the re-authentication function ························································································································ 80 Configuring a guest VLAN ············································································································································ 80 Configuring an Auth-Fail VLAN ····································································································································...
Page 11
Troubleshooting the portal ·········································································································································· 108 Inconsistent keys on the access device and the portal server ········································································· 108 Incorrect server port number on the access device ·························································································· 108 Public key configuration ········································································································································· 110 Public key algorithm overview ···································································································································· 110 Basic concepts ····················································································································································· 110 Key algorithm types ·············································································································································...
Page 12
Enabling the SFTP server ···································································································································· 143 Configuring the SFTP connection idle timeout period ····················································································· 143 Configuring an SFTP client ·········································································································································· 144 Specifying a source IP address or interface for the SFTP client ······································································ 144 Establishing a connection to the SFTP server ···································································································· 144 Working with the SFTP directories ····················································································································...
Page 13
Access software downloads ········································································································································ 176 Telephone technical support and repair ···················································································································· 176 Contact us ····································································································································································· 176 Appendix A : RADIUS attributes ···························································································································· 177 Commonly used standard RADIUS attributes ············································································································ 177 Proprietary RADIUS sub-attributes of H3C ················································································································ 178 Acronyms ································································································································································· 180 Index ········································································································································································ 195...
AAA configuration The switch operates in IRF mode or standalone, (the default), mode. For more information about the IRF mode, see IRF in the IRF Configuration Guide. Introduction to AAA Authentication, authorization, and accounting (AAA) provide a uniform framework for configuring these three security functions when implementing network security management.
• Accounting: Records all network service usage information of users. This includes the service type, start and end time, and traffic. In this way, accounting can be used for charging and network security surveillance. You can use AAA to provide one or two security functions. For example, if your company only wants employees to be authenticated before they access specific resources, you only need to configure an authentication server.
Figure 2 RADIUS server components • Users: Stores user information such as the username, password, applied protocols, and IP address. • Clients: Stores information about RADIUS clients, such as the shared keys and IP addresses. • Dictionary: Stores information about the meanings of RADIUS protocol attributes and their values.
Figure 3 Basic message exchange process of RADIUS RADIUS operates in the following way: The host initiates a connection request carrying the username and password to the RADIUS client. Having received the username and password, the RADIUS client sends an authentication request (Access-Request) to the RADIUS server, with the user password encrypted by using the Message-Digest 5 (MD5) algorithm and the shared key.
Page 18
mechanism, retransmission mechanism, and slave server mechanism. Figure 4 shows the RADIUS packet format. Figure 4 RADIUS packet format Descriptions of the fields are as follows: The Code field (1-byte long) indicates the type of the RADIUS packet. Table 1 shows potential values and their meanings.
Page 19
The Length field (2-byte long) indicates the length of the entire packet, including the Code, Identifier, Length, Authenticator, and Attribute fields. The value of the field ranges from 20 to 4096. Bytes beyond the length are considered padding and ignored. If the length of a received packet is less than that indicated by the Length field, the packet is dropped.
Vendor-ID (four bytes): Indicates the ID of the vendor. Its most significant byte is 0 and the other three bytes contain a code complying with RFC 1700. The vendor ID of H3C is 201 1. For details about the extended RADIUS attributes, see Proprietary RADIUS sub-attributes of H3C.
Table 3 Primary differences between HWTACACS and RADIUS HWTACACS RADIUS Uses TCP, providing more reliable network Uses UDP, providing higher transport efficiency. transmission. Encrypts the entire packet except for the HWTACACS Encrypts only the user password field in an header. authentication packet.
Page 24
Figure 6 Basic message exchange process of HWTACACS for a Telnet user A Telnet user sends an access request to the NAS. Upon receiving the request, the HWTACACS client sends a start-authentication packet to the HWTACACS server. The HWTACACS server sends back an authentication response requesting the username. Upon receiving the response, the HWTACACS client asks the user for the username.
Upon receipt of the response, the HWTACACS client asks the user for the login password. The user inputs the password. After receiving the login password, the HWTACACS client sends to the HWTACACS server a continue-authentication packet carrying the login password. The HWTACACS server sends back an authentication response indicating that the user has passed authentication.
• LAN users: Users on a LAN who access through, 802.1X authentication or MAC address authentication, for example. • Login users: Users who log in using, SSH, Telnet, FTP, or HyperTerminal, for example. • Portal users: Users who access through a portal. •...
• RFC 2865: Remote Authentication Dial In User Service (RADIUS) • RFC 2866: RADIUS Accounting • RFC 2867: RADIUS Accounting Modifications for Tunnel Protocol Support • RFC 2868: RADIUS Attributes for Tunnel Protocol Support • RFC 2869: RADIUS Extensions • RFC 1492: An Access Control Protocol, Sometimes Called TACACS AAA configuration task list The basic procedure to configure AAA is as follows:...
Figure 9 AAA configuration procedure For login users, you must configure the authentication mode for logging into the user interface as scheme. For more information, see Logging In to the Device in the Fundamentals Configuration Guide. Configuring AAA By configuring AAA, you can provide network access service for legal users, protect the networking devices, and avoid unauthorized access.
Follow these steps to create an ISP domain: To do… Use the command… Remarks Enter system view system-view — Create an ISP domain and domain Isp-name Required enter ISP domain view Return to system view quit — Optional domain default enable Specify the default ISP domain By default, the system has a default ISP Isp-name...
Configuring AAA authentication method for an ISP domain In AAA, authentication, authorization, and accounting are separate processes. Authentication refers to the interactive authentication process of username/password/user information during an access or service request. The authentication process neither sends authorization information to a supplicant nor triggers any accounting.
To do… Use the command… Remarks authentication login { Optional hwtacacs-scheme hwtacacs- Specify the authentication scheme-name [ local ] | local | The default authentication • method for login users none | radius-scheme radius- method is used by default. scheme-name [ local ] } Optional authentication portal { local | Specify the authentication...
Page 32
users are console users who use the console, AUX, asynchronous serial port, Telnet, or SSH to connect to the switch.. The default setting for FTP users is to use the root directory of the switch. Before configuring authorization methods, complete these three tasks: For HWTACACS authorization, configure the HWTACACS scheme to be referenced first.
With the radius-scheme radius-scheme-name local or hwtacacs-scheme hwtacacs-scheme-name [ • local | none ] keyword and argument combination configured, local authorization (local) or no authentication (none) is the backup when the remote server is not available. If the primary authorization method is local or none, the system performs local authorization or does •...
To do… Use the command… Remarks Optional accounting lan-access { local Specify the accounting method | none | radius-scheme radius- The default accounting method is for LAN users scheme-name [ local ] } used by default. accounting login { hwtacacs- Optional scheme hwtacacs-scheme-name [ Specify the accounting method...
Page 35
Follow these steps to configure the attributes for a local user: To do… Use the command… Remarks Enter system view system-view — Optional auto by default, indicating that Set the password display mode local-user password-display- the password must be displayed for all local users mode { auto | cipher-force } in the mode specified during...
To do… Use the command… Remarks Optional By default, a local user account never expires. If some users need to access the Set the expiration time of the network temporarily, you can expiration-date time local user establish a guest account, and specify an expiration time for the account by using this command to control the availability of the...
To do… Use the command… Remarks Enter system view system-view — Create a user group and user-group group-name Required enter user group view authorization-attribute { acl acl-number | Optional callback-number By default, no Configure the authorization callback-number | idle-cut minute | level authorization attribute is attributes for the user group level | user-profile profile-name | vlan vlan-...
Displaying and maintaining AAA To do… Use the command… Remarks Display the configuration information of a specified ISP display domain [ isp-name ] Available in any view domain or all ISP domains Display information about display connection [ domain isp-name | specified or all user ucibindex ucib-index | user-name user- Available in any view...
To do… Use the command… Remarks Enter system view system-view — Required Create a RADIUS scheme and radius scheme radius-scheme- enter RADIUS scheme view name Not defined by default A RADIUS scheme can be referenced by more than one ISP domain at the same time. Specifying the VPN instance After specify...
HP recommends that you specify only the primary RADIUS authentication/authorization server if backup • is not required. If both the primary and secondary authentication/authorization servers are specified, the secondary one • is used when the primary one is unreachable. In practice, you may specify one RADIUS server as the primary authentication/authorization server and •...
If both the primary and secondary accounting servers are specified, the secondary one is used when the • primary one is not reachable. In practice, you may specify one RADIUS server as the primary accounting server, and up to 16 RADIUS •...
Setting the upper limit of RADIUS request retransmission attempts Because RADIUS uses UDP packets to transfer data, the communication process is not reliable. If a NAS receives no response from the RADIUS server before the response timeout timer expires, it can retransmit the RADIUS request.
Setting the status of RADIUS servers By setting the status of RADIUS servers to block or active, you can control which servers the switch will communicate with for authentication, authorization, and accounting or turn to when the current servers are not available any more. In practice, you can specify one primary RADIUS server and multiple secondary RADIUS servers, with the secondary ones as the backup of the primary one.
To do… Use the command… Remarks active for every Set the status of the primary RADIUS state primary accounting { active | server configured accounting server block } with IP address in the Set the status of the secondary state secondary authentication [ ip RADIUS scheme RADIUS authentication/authorization ip-address | ipv6 ipv6-address ] { active...
The unit of data flows sent to the RADIUS server must be consistent with the traffic statistics unit of the • RADIUS server. Otherwise, accounting cannot be performed correctly. Enabling the RADIUS trap function With the RADIUS trap function, a NAS sends a trap message in either of these situations: •...
To do… Use the command… Remarks Required Specify the source IP radius nas-ip { ip-address [ address for RADIUS vpn-instance vpn-instance- By default, the IP address of the outbound packets to be sent name ] | ipv6 ipv6-address } interface is used as the source IP address. Follow these steps to specify a source IP address for a specific RADIUS scheme: To do…...
To do… Use the command… Remarks Optional Set the real-time accounting timer realtime-accounting interval minutes 12 minutes by default The product of the maximum number of retransmission attempts of RADIUS packets and the RADIUS • server response timeout period must be less than 75 and the upper limit of this product is determined by the upper limit of the timeout periods of the access modules.
To do… Use the command… Remarks Optional Specify a security policy security-policy-server ip-address server Not specified by default If more than one interface of the switch is configured with user access authentication functions, the • interfaces may use different security policy servers. You can specify up to eight security policy servers for a RADIUS scheme.
Displaying and maintaining RADIUS To do… Use the command… Remarks Display the configuration information of a specified display radius scheme [ radius-scheme- Available in any view RADIUS scheme or all RADIUS name ] [ slot slot-number ] schemes (standalone mode) Display the configuration display radius scheme [ radius-scheme- information of a specified...
Creating an HWTACACS scheme The HWTACACS protocol is configured on a per scheme basis. Before performing other HWTACACS configurations, follow these steps to create an HWTACACS scheme and enter HWTACACS scheme view: To do… Use the command… Remarks Enter system view system-view —...
It is recommended to specify only the primary HWTACACS authentication server if backup is not • required. If both the primary and secondary authentication servers are specified, the secondary one is used when • the primary one is not reachable. The IP addresses of the primary and secondary authentication servers cannot be the same.
To do… Use the command… Remarks primary accounting ip-address Specify the primary [ port-number | vpn-instance Required HWTACACS accounting server vpn-instance-name ] * Configure at least one of the commands secondary accounting ip- Specify the secondary address [ port-number | vpn- No accounting server by default HWTACACS accounting server instance vpn-instance-name ] *...
Configuring attributes related to the data sent to HWTACACS server Follow these steps to configure the attributes related to the data sent to the HWTACACS server: To do… Use the command… Remarks Enter system view system-view — hwtacacs scheme hwtacacs- Enter HWTACACS scheme view —...
To do… Use the command… Remarks Required Specify the source IP hwtacacs nas-ip ip-address address for HWTACACS [ vpn-instance vpn-instance- By default, the IP address of the outbound packets to be sent name ] interface is used as the source IP address. Follow these steps to specify a source IP address for a specific HWTACACS scheme: To do…...
Displaying and maintaining HWTACACS To do… Use the command… Remarks Display configuration information or statistics of the display hwtacacs [ hwtacacs-server-name [ Available in any view specified or all HWTACACS statistics ] ] [ slot slot-number ] schemes (standalone mode) Display configuration display hwtacacs [ hwtacacs-scheme-name [ information or statistics of the...
Page 56
• Configure the switch to use the HWTACACS server to provide authentication, authorization, and accounting services for Telnet users. The IP address of the server is 10.1.1.1/24. • Set the shared keys for authentication, authorization, and accounting packets exchanged with the HWTACACS server to expert.
[Switch-hwtacacs-hwtac] user-name-format without-domain [Switch-hwtacacs-hwtac] quit Configure the AAA methods for the domain. [Switch] domain bbb [Switch-isp-bbb] authentication login hwtacacs-scheme hwtac [Switch-isp-bbb] authorization login hwtacacs-scheme hwtac [Switch-isp-bbb] accounting login hwtacacs-scheme hwtac [Switch-isp-bbb] quit You can achieve the same purpose by setting AAA methods for all types of users. [Switch] domain bbb [Switch-isp-bbb] authentication default hwtacacs-scheme hwtac [Switch-isp-bbb] authorization default hwtacacs-scheme hwtac...
Page 58
Figure 1 1 Configure AAA by separate servers for Telnet users Configuration procedure Configure the IP addresses of various interfaces (omitted). Enable the Telnet server on the switch. <Switch> system-view [Switch] telnet server enable Configure the switch to use AAA for Telnet users. [Switch] user-interface vty 0 4 [Switch-ui-vty0-4] authentication-mode scheme [Switch-ui-vty0-4] quit...
[Switch-isp-bbb] accounting login radius-scheme rd [Switch-isp-bbb] quit Configure the default AAA methods for all types of users. [Switch] domain bbb [Switch-isp-bbb] authentication default local [Switch-isp-bbb] authorization default hwtacacs-scheme hwtac [Switch-isp-bbb] accounting default radius-scheme rd When telneting into the switch, a user enters username telnet@bbb for authentication using domain bbb.
Page 60
Specify the ports for authentication and accounting as 1812 and 1813 respectively Select Device Management Service as the service type Select H3C as the access device type Select the access device from the device list or manually add the device with the IP address of 10.1.1.2...
Page 61
Figure 14 Add an account for device management Configure the switch Configure the IP address of VLAN interface 2, through which the SSH user accesses the switch. <Switch> system-view [Switch] interface vlan-interface 2 [Switch-Vlan-interface2] ip address 192.168.1.70 255.255.255.0 [Switch-Vlan-interface2] quit Configure the IP address of VLAN-interface 3, through which the switch access the server.
Configure the RADIUS scheme. Create RADIUS scheme rad. [Switch] radius scheme rad Specify the primary authentication server. [Switch-radius-rad] primary authentication 10.1.1.1 1812 Specify the primary accounting server. [Switch-radius-rad] primary accounting 10.1.1.1 1813 Set the shared key for authentication packets to expert. [Switch-radius-rad] key authentication expert Set the shared key for accounting packets to expert.
Page 63
The password of the user is incorrect. The RADIUS server and the NAS are configured with different shared key. Solution: Check that: The NAS and the RADIUS server can ping each other. The username is in the userid@isp-name format and a default ISP domain is specified on the NAS.
802.1X configuration 802.1X overview The 802.1X protocol was proposed by IEEE 802 LAN/WAN committee for security of wireless LANs (WLANs). However, it has been widely used on Ethernet as a common port access control mechanism. As a port-based network access control protocol, 802.1X authenticates devices connected to the 802.1X-enabled LAN ports to control their access to the LAN.
to the RADIUS packets either with the Password Authentication Protocol (PAP) or Challenge Handshake Authentication Protocol (CHAP) attribute, and then transferred to the RADIUS server. Basic concepts of 802.1X These basic concepts are involved in 802.1X: controlled port/uncontrolled port, authorized state/unauthorized state, and control direction.
• auto: Places the port in the unauthorized state initially to allow only EAPOL packets to pass, and turns the port into the authorized state to allow access to the network after the users pass authentication. This is the most common choice. Control direction In the unauthorized state, the controlled port can be set to deny traffic to and from the client or just the traffic from the client.
• Length: Length of the data, that is, length of the Packet body field, in bytes. If the value of this field is 0, no subsequent data field is present. • Packet body: Content of the packet. The format of this field varies with the value of the Type field.
Message-Authenticator Figure 20 shows the encapsulation format of the Message-Authenticator attribute. The Message- Authenticator attribute is used to prevent access requests from being snooped during EAP authentication. It must be included in any packet with the EAP-Message attribute; otherwise, the packet will be considered invalid and get discarded.
Page 71
When receiving the EAP-Request/MD5 Challenge packet, the client uses the offered challenge to encrypt the password part (this process is not reversible), creates an EAP- Response/MD5 Challenge packet, and then sends the packet to the switch. After receiving the EAP-Response/MD5 Challenge packet, the switch relays the packet in a RADIUS Access-Request packet to the authentication server.
RADIUS server for authentication. 802.1X access control method H3C switches not only implement the port-based access control method defined in the 802.1X protocol, but also extend and optimize the protocol by supporting the MAC-based access control method.
• MAC-based access control: With this method configured on a port, all users of the port must be authenticated separately, and when a user logs off, no other users are affected. 802.1X timers This section describes the timers used on an 802.1X switch to guarantee that the client, the switch, and the RADIUS server can interact with each other in a reasonable manner.
Page 74
• If the port link type is Hybrid, the assigned VLAN is allowed to pass the current port without carrying the tag. The default VLAN ID of the port is that of the assigned VLAN. The assigned VLAN neither changes nor affects the configuration of a port. However, as the assigned VLAN has higher priority than the initial VLAN of the port, it is the assigned VLAN that takes effect after a user passes authentication.
Auth-Fail VLAN The Auth-Fail VLAN feature allows users failing authentication to access a specified VLAN, which is called the Auth-Fail VLAN. Note that failing authentication means being denied by the authentication server due to reasons such as wrong password. Authentication failures caused by authentication timeout or network connection problems do not fall into this category.
• For remote RADIUS authentication, the username and password information must be configured on the RADIUS server. • For local authentication, the username and password information must be configured on the switch and the service type must be set to lan-access. For configuration of the RADIUS client, see AAA in the Security Configuration Guide.
To do… Use the command… Remarks Optional The defaults are as follows: 15 seconds for the handshake dot1x timer { handshake- timer, period handshake-period-value | 60 seconds for the quiet timer, quiet-period quiet-period-value | 3600 seconds for the periodic re- reauth-period reauth-period- Set timers authentication timer,...
To do… Use the command… Remarks view dot1x Configuring 802.1X parameters for a port Follow these steps to configure 802.1X parameters for a port: To do… Use the command… Remarks Enter system view system-view — interface interface-type interface- Enter Ethernet interface view —...
To do… Use the command… Remarks Optional Enable the online handshake dot1x handshake function Enabled by default Some 802.1X clients do not support exchanging handshake packets with the switch. In this case, you need to disable the online user handshake function on the switch; otherwise the switch will tear down the connections with such online users for not receiving handshake responses.
Enabling the quiet timer After the quiet timer is enabled on the switch, when a client fails 802.1X authentication, the switch refuses further authentication requests from the client in a period of time, which is specified by the quiet timer (using the dot1x timer quiet-period command). Follow these steps to enable the quiet timer: To do…...
A super VLAN cannot be set as the guest VLAN. Similarly, a guest VLAN cannot be set as the super • VLAN. For information about super VLAN, see VLAN in the Layer 2 – LAN Switching Configuration Guide. Configuration prerequisites •...
Configuration procedure Follow these steps to configure an Auth-Fail VLAN: To do… Use the command… Remarks Enter system view system-view — interface interface-type interface- Enter Ethernet interface view — number Required Configure the Auth-Fail VLAN dot1x auth-fail vlan authfail- By default, a port is configured for the port vlan-id with no Auth-Fail VLAN.
Page 83
• Specify the switch to try up to five times at an interval of 5 seconds in transmitting a packet to the RADIUS server until it receives a response from the server, and to send real time accounting packets to the accounting server every 15 minutes. •...
Page 84
[Device-radius-radius1] secondary accounting 10.1.1.2 Specify the shared key for the switch to exchange packets with the authentication server. [Device-radius-radius1] key authentication name Specify the shared key for the switch to exchange packets with the accounting server. [Device-radius-radius1] key accounting money Set the interval for the switch to retransmit packets to the RADIUS server and the maximum number of transmission attempts.
command to view the connection information of the user. If the user fails the RADIUS authentication, local authentication of the user will be performed. Guest VLAN and VLAN assignment configuration example Network requirements See Figure 24: • A host is connected to port GigabitEthernet 3/0/2 of the switch and must pass 802.1X authentication to access the Internet.
Page 86
Figure 25 Network diagram with the port in the guest VLAN Figure 26 Network diagram after the client passes authentication Update server Authentication server VLAN 10 VLAN 2 GE3/0/1 GE3/0/4 VLAN 5 VLAN 5 GE3/0/2 GE3/0/3 Device Internet VLAN 5 Host Configuration procedure The following configuration procedure covers most AAA/RADIUS configuration commands for the switch,...
Page 87
[Device-radius-2000] key accounting abc [Device-radius-2000] user-name-format without-domain [Device-radius-2000] quit Configure authentication domain system and specify to use RADIUS scheme 2000 for users of the domain. [Device] domain system [Device-isp-system] authentication default radius-scheme 2000 [Device-isp-system] authorization default radius-scheme 2000 [Device-isp-system] accounting default radius-scheme 2000 [Device-isp-system] quit Enable 802.1X globally.
MAC authentication configuration MAC authentication overview MAC authentication provides a way for authenticating users based on ports and MAC addresses. Once detecting a new MAC address, the switch initiates the authentication process. MAC authentication does not require client software to be installed on the hosts, nor any username or password to be entered by users during authentication.
Related concepts MAC authentication timers The following timers function in the process of MAC authentication: • Offline detect timer: At this interval, the switch checks whether there is traffic from a user. If detecting no traffic from a user within two intervals, the switch logs the user out and sends to the RADIUS server a stop accounting request.
To do… Use the command… Remarks Required Enable MAC mac-authentication authentication globally Disabled by default mac-authentication interface interface-list Required Enable MAC interface interface-type interface- authentication for specified Use either approach. number ports Disabled by default mac-authentication quit Optional Specify the ISP domain for mac-authentication domain isp- The default ISP domain is used by MAC authentication...
MAC authentication configuration examples By default, Ethernet, VLAN, and aggregate interfaces are down. To configure these interfaces, use the undo shutdown command to bring them up first. Local MAC authentication configuration Network requirements A supplicant is connected to the device through port GigabitEthernet 3/0/1. See Figure 27. •...
[Device] mac-authentication domain aabbcc.net Set the MAC authentication timers. [Device] mac-authentication timer offline-detect 180 [Device] mac-authentication timer quiet 180 Specify the MAC authentication username format as MAC address, that is, using the MAC address (with hyphens) of a user as the username and password for MAC authentication of the user. [Device] mac-authentication user-name-format mac-address with-hyphen Verify the configuration Display global MAC authentication information.
Page 93
• The username type of fixed username is used for authentication, with the username being aaa and password being 123456. Figure 28 Network diagram for MAC authentication using RADIUS Configuration procedure It is required that the RADIUS server and the device are reachable to each other and the username and password are configured on the server.
[Device] mac-authentication timer quiet 180 Specify to use the username aaa and password 123456 for MAC authentication of all users. [Device] mac-authentication user-name-format fixed account aaa password simple 123456 Verify the configuration Display global MAC authentication information. <Device> display mac-authentication MAC address authentication is enabled.
Portal configuration Introduction to portal Portal authentication, as its name implies, helps control access to the Internet. Portal authentication is also called web authentication and a website implementing portal authentication is called a portal website. With portal authentication, an access device redirects all users to the portal authentication page. All users can access the free services provided on the portal website;...
Page 96
Figure 29 Portal system components Authentication client The client system of a user to be authenticated. It can be a browser using the Hypertext Transfer Protocol (HTTP) or Hypertext Transfer Protocol Secure (HTTPS), or a host running the portal client software.
Currently, only a RADIUS server can serve as the remote authentication/accounting server in a portal • system. Currently, security checking requires the cooperation of the H3C iNode client. • Portal authentication mode Currently, the switch supports Layer 3 portal authentication.
Portal authentication process Figure 30 Layer 3 portal authentication process The Layer 3 authentication process is as follows: A portal user initiates an authentication request through HTTP. When the HTTP packet arrives at the access device, the access device allows it to pass if it is destined for the portal server or a predefined free website, or redirects it to the portal server if it is destined for other websites.
If HTTPS is used, after the portal user initiates an authentication request through HTTPS, the authentication client and the access device will first perform SSL negotiation to establish a secure path that encrypts packets to be transferred. Basic portal configuration Configuration prerequisites The portal feature provides a solution for user authentication and security checking.
To do… Use the command… Remarks Required Enable portal authentication on portal server server-name the interface method layer3 Disabled by default The destination port number that the switch uses for sending packets to the portal server unsolicitedly must • be the same as that the remote portal server actually uses. The portal server and its parameters can be deleted or modified only when the portal server is not •...
Configuring an authentication subnet By configuring authentication subnets, you can allow portal authentication to be triggered by only packets from users on the authentication subnets. If a user does not initiate portal authentication before accessing the external network and the user’s packets are neither matching the portal-free rules nor from authentication subnets, the user packets will be discarded by the access device.
To do… Use the command… Remarks Required Specify an authentication portal domain domain-name By default, no authentication domain is domain for the interface specified for an interface. The switch selects the authentication domain for a portal user on an interface in this order: the ISP domain specified for the interface, the ISP domain carried in the username, and the system default ISP domain.
To do… Use the command… Remarks Required Specify a NAS ID profile for portal nas-id-profile profile- By default, an interface is specified the interface name with no NAS ID profile. Setting the maximum number of online portal users You can use this feature to control the total number of online portal users in the system. Follow these steps to set the maximum number of portal users allowed in the system: To do…...
To do… Use the command… Remarks Display TCP spoofing statistics display portal tcp-cheat statistics Available in any view Display information about display portal user { all | interface portal users on a specified Available in any view interface-type interface-number } interface or all interfaces Clear portal connection reset portal connection statistics {all...
Page 105
You need to configure IP addresses for the host, switches, and servers as shown in Figure 31, and ensure • that they are reachable to each other. Perform configurations on the RADIUS server to ensure that the user authentication and accounting •...
• URL: http://192.168.0.1 1 1/portal. [SwitchA] portal server newpt 192.168.0.111 portal port 50100 http://192.168.0.111/portal Enable portal authentication on the interface connecting Switch B. [SwitchA] interface vlan-interface 4 [SwitchA–Vlan-interface4] portal server newpt method layer3 [SwitchA–Vlan-interface4] quit Configuring Layer 3 portal authentication with extended functions Network requirements •...
Page 107
Create a RADIUS scheme named rs1 and enter its view. <SwitchA> system-view [SwitchA] radius scheme rs1 Set the server type for the RADIUS scheme. When using the CAMS or iMC server, you need set the server type to extended. [SwitchA-radius-rs1] server-type extended Specify the primary authentication server and primary accounting server, and configure the keys for communication with the servers.
• Name: newpt • IP address: 192.168.0.1 1 1 • Key: portal • Port number: 50100 • URL: http://192.168.0.1 1 1/portal. [SwitchA] portal server newpt 192.168.0.111 portal port 50100 http://192.168.0.111/portal Enable portal authentication on the interface connecting Switch B. [SwitchA] interface vlan-interface 4 [SwitchA–Vlan-interface4] portal server newpt method layer3 [SwitchA–Vlan-interface4] quit Troubleshooting the portal...
Page 109
access device is not 50100, the destination port of the REQ_LOGOUT message is not the actual listening port on the server. Thus, the portal server cannot receive the REQ_LOGOUT message. As a result, you cannot force the user to log out the portal server. When the user uses the disconnect attribute on the client to log out, the portal server actively sends a REQ_LOGOUT message to the access device.
Public key configuration Public key algorithm overview Basic concepts • Algorithm: A set of transformation rules for encryption and decryption. • Plain text: Information without being encrypted. • Cipher text: Encrypted information. • Key: A string of characters that controls the transformation between plain text and cipher text. It is used in both encryption and decryption.
Asymmetric key algorithm applications Asymmetric key algorithms can be used for encryption and digital signature: • Encryption: The sender uses the public key of the intended receiver to encrypt the information to be sent. Only the intended receiver, the holder of the paired private key, can decrypt the information.
The length of a DSA key modulus is in the range 512 to 2048 bits. After entering the public-key local • create dsa command, you will be required to specify the modulus length. For security, a modulus of at least 768 bits is recommended. Displaying or exporting the local RSA or DSA host public Display the local RSA or DSA host public key on the screen or export it to a specified file.
• Import it from the public key file: The system automatically converts the public key to a string coded using the PKCS (Public Key Cryptography Standards). Before importing the public key, you must upload the peer's public key file (in binary) to the local host through FTP or TFTP. HP recommends that you configure the public key of the peer by importing it from a public key file.
To do… Use the command… Remarks Display the public keys of the display public-key peer [ peers brief | name publickey-name ] Public key configuration examples By default, Ethernet, VLAN, and aggregate interfaces are in the state of DOWN. To configure such an interface, use the undo shutdown command to bring it up first.
Page 115
Display the public keys of the created RSA key pairs. [DeviceA] display public-key local rsa public ===================================================== Time of Key pair created: 09:50:0613:07:11 2007/08/0710/29 Key name: HOST_KEY Key type: RSA Encryption Key ===================================================== Key code: 30819F300D06092A864886F70D010101050003818D0030818902818100B581FB3DCD8158A0F95E627B4 E79EE 127CD4479EA30EC87B4639DBF248CD4A29EA0490308B7383917729BF9C11FF3620CCCD39BD22EE903CA 6B7F3 1159C728E276A8A02522E329E7273C9583162BDD653DC21A4C0146E194CC8F1A5323E140A05E11EB29E E2E0D ECC63B38807B9EED783AE38920D963A385DC25263825EC67310203010001 =====================================================...
[DeviceB-pkey-key- code]5323E140A05E11EB29EE2E0DECC63B38807B9EED783AE38920D963A385DC25263 825EC6731020301 [DeviceB-pkey-key-code]0001 [DeviceB-pkey-key-code] public-key-code end [DeviceB-pkey-public-key] peer-public-key end Display the host public key of Device A saved on Device B. [DeviceB] display public-key peer name devicea ===================================== Key Name : devicea Key Type : RSA Key Module: 1024 ===================================== Key Code: 30819F300D06092A864886F70D010101050003818D0030818902818100D90003FA95F5A44A2A2CD3F81...
Page 117
The range of public key size is (512 ~ 2048). NOTES: If the key modulus is greater than 512, It will take a few minutes. Press CTRL+C to abort. Input the bits of the modulus[default = 1024]: Generating Keys... ++++++ ++++++ ++++++++ ++++++++...
Page 118
Enable the FTP server function, create an FTP user with the username ftp and password 123. <DeviceB> system-view [DeviceB] ftp server enable [DeviceB] local-user ftp [DeviceB-luser-ftp] password simple passwordtest [DeviceB-luser-ftp] service-type ftp [DeviceB-luser-ftp] authorization-attribute level 3 [DeviceB-luser-ftp] quit Upload the public key file of Device A to Device B FTP the public key file devicea.pub to Device B with the file transfer mode of binary.
SSH2.0 configuration SSH2.0 overview Introduction to SSH2.0 Secure Shell (SSH) offers an approach to securely logging into a remote device. By encryption and strong authentication, it protects devices against attacks such as IP spoofing and plain text password interception. The switch can not only work as an SSH server to support connections with SSH clients, but also work as an SSH client to allow users to establish SSH connections with a remote device acting as the SSH server.
Page 121
protocol version number>-<software version number>”. The primary and secondary protocol version numbers constitute the protocol version number, while the software version number is used for debugging. The client receives and resolves the packet. If the protocol version of the server is lower but supportable, the client uses the protocol version of the server;...
Page 122
• Publickey authentication: The server authenticates the client by the digital signature. During publickey authentication, the client sends to the server a publickey authentication request that contains its username, public key, and publickey algorithm information. The server checks whether the public key is valid. If the public key is invalid, the authentication fails; otherwise, the server authenticates the client by the digital signature.
If the command text exceeds 2000 bytes, you can execute the commands by saving the text as a • configuration file, uploading the configuration file to the server through SFTP, and then using the configuration file to restart the server. Configuring the device as an SSH server To ensure that all SSH clients can log into the SSH server successfully, you are recommended to generate both DSA and RSA key pairs on the SSH server.
If you configure a user interface to support SSH, be sure to configure the authentication method as AAA • by using the authentication-mode scheme command. For a user interface configured to support SSH, you cannot change the authentication mode. To change •...
When inputting or copying the content of the public key, be sure that the content is in H3C public key format, that is, you need to input or copy it exactly as it is displayed by the display public-key local command.
For successful login through SFTP, you must set the user service type to sftp or all. If SFTP service is not • needed, set the user service type to stelnet or all. As SSH1 does not support service type sftp, if the client uses SSH1 to log into the server, you must set •...
To do… Use the command… Remarks Optional Set the maximum number of ssh server authentication- SSH authentication attempts retries times 3 by default Authentication will fail if the number of authentication attempts (including both publickey and password authentication) exceeds that specified in the ssh server authentication-retries command. Configuring the device as an SSH client Specifying a source IP address/interface for the SSH client This configuration task allows you to specify a source IP address or interface for the client to...
To do... Use the command… Remarks Optional Enable the switch to support ssh client first-time enable By default, first-time authentication first-time authentication is supported on a client. Disable first-time authentication For successful authentication of an SSH client not supporting first-time authentication, the server host public key must be configured on the client and the public key name must be specified.
When switch acts as server for password authentication Network requirements • A local SSH connection is established between the host (the SSH client) and the switch (the SSH server) for secure data exchange. See Figure 37. • Password authentication is required. Figure 37 Switch acts as server for password authentication Configuration procedure...
There are many kinds of SSH client software, such as PuTTY, and OpenSSH. The following is an example of configuring SSH client using Putty Version 0.58. Establish a connection with the SSH server Launch PuTTY.exe to enter the following interface. In the Host Name (or IP address) text box, enter the IP address of the server (192.168.1.40).
Page 132
Figure 39 Switch acts as server for publickey authentication SSH client SSH server Vlan-int1 192.168.1.56/24 192.168.1.40/24 Host Switch Configuration procedure Configure the SSH server Generate RSA and DSA key pairs and enable SSH server. <Switch> system-view [Switch] public-key local create rsa [Switch] public-key local create dsa [Switch] ssh server enable Configure an IP address for VLAN interface 1.
Page 133
Figure 40 Generate a client key pair 1) While generating the key pair, you must move the mouse continuously and keep the mouse off the green process bar. See Figure 41. Otherwise, the process bar stops moving and the key pair generating process will be stopped.
Page 134
Figure 41 Generate a client key pair 2) After the key pair is generated, click Save public key and specify the file name as key.pub to save the public key.
Page 135
Figure 42 Generate a client key pair 3) Likewise, to save the private key, click Save private key. A warning window pops up to prompt you whether to save the private key without any protection. Click Yes and enter the name of the file for saving the key (private in this case).
Page 136
Figure 44 SSH client configuration interface 1) Select Connection/SSH/Auth from the navigation tree. The following window appears. Click Browse… to bring up the file selection window, navigate to the private key file and click OK.
Figure 45 SSH client configuration interface 2) Click Open. If the connection is normal, you will be prompted to enter the username. After entering the correct username (client002), you can enter the configuration interface. See Figure SSH client configuration examples By default, Ethernet interfaces, VLAN interfaces, and aggregate interfaces are in the state of DOWN.
Page 138
Figure 46 Switch acts as client for password authentication Configuration procedure Configure the SSH server Create RSA and DSA key pairs and enable the SSH server. <SwitchB> system-view [SwitchB] public-key local create rsa [SwitchB] public-key local create dsa [SwitchB] ssh server enable Create an IP address for VLAN interface 1, which the SSH client will use as the destination for SSH connection.
Page 139
Do you want to save the server public key? [Y/N]:n Enter password: ****************************************************************************** * Copyright (c) 2004-2008 Hangzhou H3C Tech. Co., Ltd. All rights reserved. * Without the owner's prior written consent, * no decompiling or reverse-engineering shall be allowed.
F257523777D033BEE77FC378145F2AD [SwitchA-pkey-key-code]D716D7DB9FCABB4ADBF6FB4FDB0CA25C761B308EF53009F71 01F7C62621216D5A572C379A32AC290 [SwitchA-pkey-key-code]E55B394A217DA38B65B77F0185C8DB8095522D1EF044B465E 8716261214A5A3B493E866991113B2D [SwitchA-pkey-key-code]485348 [SwitchA-pkey-key-code] public-key-code end [SwitchA-pkey-public-key] peer-public-key end # Specify the host public key for the SSH server (10.165.87.136) as key1. [SwitchA] ssh client authentication server 10.165.87.136 assign publickey key1 [SwitchA] quit Establish an SSH connection to server 10.165.87.136. <SwitchA>...
Page 141
[SwitchB] ssh server enable Configure an IP address for VLAN interface 1, which the SSH client will use as the destination for SSH connection. [SwitchB] interface vlan-interface 1 [SwitchB-Vlan-interface1] ip address 10.165.87.136 255.255.255.0 [SwitchB-Vlan-interface1] quit Set the authentication mode for the user interfaces to AAA. [SwitchB] user-interface vty 0 4 [SwitchB-ui-vty0-4] authentication-mode scheme Enable the user interfaces to support SSH.
Page 142
Trying 10.165.87.136 ... Press CTRL+K to abort Connected to 10.165.87.136 ... The Server is not authenticated. Continue? [Y/N]:y Do you want to save the server public key? [Y/N]:n ****************************************************************************** * All rights reserved (2004-2006) * Without the owner's prior written consent, * no decompiling or reverse-engineering shall be allowed.
SFTP service SFTP overview The secure file transfer protocol (SFTP) is a new feature in SSH2.0. SFTP uses the SSH connection to provide secure data transfer. The switch can serve as the SFTP server, allowing a remote user to log into the SFTP server for secure file management and transfer. The switch can also server as an SFTP client, enabling a user to login from the switch to a remote device for secure file transfer.
Follow these steps to configure the SFTP connection idle timeout period: To do… Use the command… Remarks Enter system view system-view — Optional Configure the SFTP connection sftp server idle-timeout time- idle timeout period out-value 10 minutes by default Configuring an SFTP client Specifying a source IP address or interface for the SFTP client You can configure a client to use only a specified source IP address or interface to access the SFTP...
To do… Use the command… Remarks Create a new directory on the mkdir remote-path Optional remote SFTP server Delete a directory from the rmdir remote-path&<1-10> Optional SFTP server Working with SFTP files SFTP file operations include: • Changing the name of a file •...
Displaying help information This configuration task is to display a list of all commands or the help information of an SFTP client command, such as the command format and parameters. Follow these steps to display a list of all commands or the help information of an SFTP client command: To do…...
By default, Ethernet interfaces, VLAN interfaces, and aggregate interfaces are in the state of DOWN. To configure such an interface, use the undo shutdown command to bring it up first. Network requirements An SSH connection is established between Switch A and Switch B. See Figure 48. Switch A, an SFTP client, logs in to Switch B for file management and file transfer.
Page 149
For user client001, set the service type as SFTP, authentication type as publickey, public key as Switch001, and working folder as cfa0:/ [SwitchB] ssh user client001 service-type sftp authentication-type publickey assign publickey Switch001 work-directory cfa0:/ Configure the SFTP client (Switch A) Configure an IP address for VLAN interface 1.
Page 150
File successfully Removed sftp-client> dir -rwxrwxrwx 1 noone nogroup 1759 Aug 23 06:52 config.cfg -rwxrwxrwx 1 noone nogroup 225 Aug 24 08:01 pubkey2 -rwxrwxrwx 1 noone nogroup 283 Aug 24 07:39 pubkey drwxrwxrwx 1 noone nogroup 0 Sep 01 06:22 new -rwxrwxrwx 1 noone nogroup...
-rwxrwxrwx 1 noone nogroup 283 Sep 02 06:36 puk sftp-client> Terminate the connection to the remote SFTP server. sftp-client> quit Connection closed. <SwitchA> SFTP server configuration example By default, Ethernet interfaces, VLAN interfaces, and aggregate interfaces are in the state of DOWN. To configure such an interface, use the undo shutdown command to bring it up first.
Page 152
[Switch-ui-vty0-4] authentication-mode scheme Enable the user interfaces to support SSH. [Switch-ui-vty0-4] protocol inbound ssh [Switch-ui-vty0-4] quit Configure a local user named client002 with the password being aabbcc and the service type being SSH. [Switch] local-user client002 [Switch-luser-client002] password simple aabbcc [Switch-luser-client002] service-type ssh [Switch-luser-client002] quit Configure the user authentication type as password and service type as SFTP.
IP source guard configuration The switch operates in IRF or standalone (the default) mode. For information about the IRF mode, see IRF in the IRF Configuration Guide. IP source guard overview IP source guard is intended to work on a port connecting users. It filters received packets to block illegal access to network resources, improving the network security.
• A dynamic binding is implemented in cooperation with DHCP snooping or DHCP Relay. It is suitable when there are many hosts in a LAN, and DHCP is used to allocate IP addresses to the hosts. Once DHCP allocates an IP address for a user, the IP source guard function will automatically add a binding entry based on the DHCP entry to allow the user to access the network.
Configuring the dynamic IP source guard binding function After the dynamic IP source guard binding function is enabled on a port, IP source guard will obtain binding entries dynamically through cooperation with DHCP protocols. • Cooperating with DHCP snooping, IP source guard will automatically obtain the DHCP snooping entries that are generated during dynamic IP address allocation on an Ethernet port.
IP source guard configuration examples By default, Ethernet, VLAN, and aggregate interfaces are in the state of DOWN. To configure such an interface, use the undo shutdown command to bring it up first. Static IP source guard binding entry configuration example Network requirements As shown in Figure 52, Host A and Host B are connected to ports GigabitEthernet 3/0/2 and GigabitEthernet 3/0/1 of Switch B respectively, Host C is connected to port GigabitEthernet...
Configure port GigabitEthernet 3/0/1 of Switch A to allow only IP packets with the source MAC address of 00-01-02-03-04-06 and the source IP address of 192.168.0.1 to pass. [SwitchA] interface gigabitethernet 3/0/1 [SwitchA-GigabitEthernet3/0/1] user-bind ip-address 192.168.0.1 mac-address 0001- 0203-0406 Configure Switch B Configure the IP addresses of various interfaces (omitted).
Page 158
• On Switch A, create a DHCP snooping entry for Client A. • On port GigabitEthernet 3/0/1 of Switch A, enable dynamic binding function to prevent attackers from using forged IP addresses to attack the server. For detailed configuration of a DHCP server, see DHCP in the Layer 3 – IP Services Configuration Guide. Figure 53 Network diagram for configuring dynamic binding function Configuration procedure...
As you see, port GigabitEthernet 3/0/1 has obtained the dynamic entries generated by DHCP snooping after it is configured with dynamic binding function. Dynamic IP source guard binding function configuration example II Network requirements As shown in Figure 54, Switch A connects to Client A and the DHCP server through VLAN- interface 100 and VLAN-interface 200 respectively.
[SwitchA-Vlan-interface100] dhcp select relay Correlate VLAN-interface 100 with DHCP server group 1. [SwitchA-Vlan-interface100] dhcp relay server-select 1 Verify the configuration Display the dynamic IP source guard binding entries. [SwitchA] display ip check source Total entries found: 1 Vlan Port Status 0001-0203-0406 192.168.0.1 Vlan-interface100...
IP source guard configuration The switch operates in IRF or standalone (the default) mode. For information about the IRF mode, see IRF in the IRF Configuration Guide. IP source guard overview IP source guard is intended to work on a port connecting users. It filters received packets to block illegal access to network resources, improving the network security.
• A dynamic binding is implemented in cooperation with DHCP snooping or DHCP Relay. It is suitable when there are many hosts in a LAN, and DHCP is used to allocate IP addresses to the hosts. Once DHCP allocates an IP address for a user, the IP source guard function will automatically add a binding entry based on the DHCP entry to allow the user to access the network.
Configuring the dynamic IP source guard binding function After the dynamic IP source guard binding function is enabled on a port, IP source guard will obtain binding entries dynamically through cooperation with DHCP protocols. • Cooperating with DHCP snooping, IP source guard will automatically obtain the DHCP snooping entries that are generated during dynamic IP address allocation on an Ethernet port.
IP source guard configuration examples By default, Ethernet, VLAN, and aggregate interfaces are in the state of DOWN. To configure such an interface, use the undo shutdown command to bring it up first. Static IP source guard binding entry configuration example Network requirements As shown in Figure 56, Host A and Host B are connected to ports GigabitEthernet 3/0/2 and GigabitEthernet 3/0/1 of Switch B respectively, Host C is connected to port GigabitEthernet...
Configure port GigabitEthernet 3/0/1 of Switch A to allow only IP packets with the source MAC address of 00-01-02-03-04-06 and the source IP address of 192.168.0.1 to pass. [SwitchA] interface gigabitethernet 3/0/1 [SwitchA-GigabitEthernet3/0/1] user-bind ip-address 192.168.0.1 mac-address 0001- 0203-0406 Configure Switch B Configure the IP addresses of various interfaces (omitted).
Page 166
• On Switch A, create a DHCP snooping entry for Client A. • On port GigabitEthernet 3/0/1 of Switch A, enable dynamic binding function to prevent attackers from using forged IP addresses to attack the server. For detailed configuration of a DHCP server, see DHCP in the Layer 3 – IP Services Configuration Guide. Figure 57 Network diagram for configuring dynamic binding function Configuration procedure...
As you see, port GigabitEthernet 3/0/1 has obtained the dynamic entries generated by DHCP snooping after it is configured with dynamic binding function. Dynamic IP source guard binding function configuration example II Network requirements As shown in Figure 58, Switch A connects to Client A and the DHCP server through VLAN- interface 100 and VLAN-interface 200 respectively.
[SwitchA-Vlan-interface100] dhcp select relay Correlate VLAN-interface 100 with DHCP server group 1. [SwitchA-Vlan-interface100] dhcp relay server-select 1 Verify the configuration Display the dynamic IP source guard binding entries. [SwitchA] display ip check source Total entries found: 1 Vlan Port Status 0001-0203-0406 192.168.0.1 Vlan-interface100...
URPF configuration URPF overview What is URPF Unicast Reverse Path Forwarding (URPF) protects a network against source address spoofing attacks. Attackers launch attacks by creating a series of packets with forged source addresses. For applications using IP-address-based authentication, this type of attacks allows unauthorized users to access the system in the name of authorized users, or even access the system as the administrator.
If the packet has its source IP address found in the FIB table and passes the check, URPF starts the link layer check. • If the link-check keyword is not configured, the packet passes the check and is forwarded normally. •...
URPF configuration example By default, Ethernet, VLAN, and aggregate interfaces are down. Use the undo shutdown command to bring them up before configuring them. Network requirements A client (Switch A) directly connects to the ISP switch (Switch B). Enable strict URPF check on VLAN-interface 10 of Switch B to allow packets whose source addresses match ACL 2010 to pass.
URPF configuration URPF overview What is URPF Unicast Reverse Path Forwarding (URPF) protects a network against source address spoofing attacks. Attackers launch attacks by creating a series of packets with forged source addresses. For applications using IP-address-based authentication, this type of attacks allows unauthorized users to access the system in the name of authorized users, or even access the system as the administrator.
If the packet has its source IP address found in the FIB table and passes the check, URPF starts the link layer check. • If the link-check keyword is not configured, the packet passes the check and is forwarded normally. •...
URPF configuration example By default, Ethernet, VLAN, and aggregate interfaces are down. Use the undo shutdown command to bring them up before configuring them. Network requirements A client (Switch A) directly connects to the ISP switch (Switch B). Enable strict URPF check on VLAN-interface 10 of Switch B to allow packets whose source addresses match ACL 2010 to pass.
Contact your authorized reseller or 3Com for a complete list of the value-added services available in your area. Troubleshoot online You will find support tools posted on the web site at http://www.h3cnetworks.com/ under Support, Knowledgebase. The Knowledgebase helps you troubleshoot H3C products. This query-based interactive tool contains thousands of technical solutions.
Access software downloads Software Updates are the bug fix / maintenance releases for the version of software initially purchased with the product. In order to access these Software Updates you must first register your product on the web site at http://www.h3cnetworks.com, go to Support, Product Registration.
Maximum idle time permitted for the user before termination of the session Identification of the user that the NAS sends to the server. With the LAN access Calling-Station-Id service provided by an H3C device, this attribute carries the MAC address of the user in the format HHHH-HHHH-HHHH. NAS-Identifier...
Access-Requests. This attribute is used when RADIUS supports EAP Authenticator authentication. NAS-Port-Id String for describing the port of the NAS that is authenticating the user Proprietary RADIUS sub-attributes of H3C Sub-attribute Description Input-Peak-Rate Peak rate in the direction from the user to the NAS, in bps.
Page 179
Sub-attribute Description Remaining, available total traffic of the connection, in different units for different Remanent_Volume server types. Operation for the session, used for session control. It can be: 1: Trigger-Request • 2: Terminate-Request • Command 3: SetPolicy • 4: Result •...
Acronyms # A B C D E F G H I K L M N O P Q R S T U V W X Z Acronym Full spelling Return 10GE Ten-GigabitEthernet Return Authentication, Authorization and Accounting Activity Based Costing Area Border Router Alternating Current Acknowledgement...
Page 181
Acronym Full spelling Asynchronous Transfer Mode Auxiliary (port) Active Virtual Forwarder Return Bearer Control Backup Designated Router Best Effort Bidirectional Forwarding Detection Border Gateway Protocol BIMS Branch Intelligent Management System BOOTP Bootstrap Protocol BPDU Bridge Protocol Data Unit Basic Rate Interface Bootstrap Router BitTorrent BSR State...
Page 182
Acronym Full spelling CHAP Challenge Handshake Authentication Protocol CIDR Classless Inter-Domain Routing Committed Information Rate CIST Common and Internal Spanning Tree Command Line Interface Code/Length/Value CLNP Connectionless Network Protocol Customer Premise Equipment CPOS Channelized POS Central Processing Unit Custom Queuing Carriage Return Cyclic Redundancy Check CR-LSP...
Page 183
Acronym Full spelling Downstream on Demand Denial of Service Designated Router DSCP Differentiated Services Code point Priority Digital Signal Processor Data Terminal Equipment Downstream Unsolicited DUID DHCP Unique Identifier DUID-LL DUID based Link Layer address Distance Vector Routing Algorithm DVMRP Distance Vector Multicast Routing Protocol DWDM Dense Wavelength Division Multiplexing...
Page 184
Acronym Full spelling FIFO First In First Out FQDN Full Qualified Domain Name Frame Relay Fast Reroute FRTT Fairness Round Trip Time Finite State Machine Functional Test File Transfer Protocol Return GARP Generic Attribute Registration Protocol Gigabit Ethernet Graceful Restart Generic Routing Encapsulation Generic Traffic Shaping GVRP...
Page 185
Acronym Full spelling ICMP Internet Control Message Protocol ICPIF Calculated Planning Impairment Factor ICMPv6 Internet Control Message Protocol for IPv6 Identification/Identity IEEE Institute of Electrical and Electronics Engineers IETF Internet Engineering Task Force IGMP Internet Group Management Protocol IGMP-Snooping Internet Group Management Protocol Snooping Interior Gateway Protocol Incoming Label Map Internet Locator Service...
Page 186
Acronym Full spelling Key-encrypting key Return L2TP Layer 2 Tunneling Protocol L2VPN Layer 2 Virtual Private Network L3VPN Layer 3 Virtual Private Network LACP Link Aggregation Control Protocol LACPDU Link Aggregation Control Protocol Data Unit Local Area Network Link Control Protocol LDAP Lightweight Directory Access Protocol Label Distribution Protocol...
Page 187
Acronym Full spelling Return Media Access Control Multi-Active Detection Metropolitan Area Network MaxBC Max Bandwidth Constraints MBGP Multicast Border Gateway Protocol Multi-VPN instance Customer Edge Multicast Domain Medium Dependent Interface Message-Digest Algorithm 5 Multicast Distribution Tree Multi-Exit Discriminator MAC Forced Forwarding Management Information Base Multicast Listener Discovery Protocol MLD-Snooping...
Page 188
Acronym Full spelling MTTR Mean Time To Repair Maximum Transmission Unit MVRF Multicast VPN Routing and Forwarding Return NAPT Network Address Port Translation NAPT-PT Network Address Port Translation – Protocol Translation Network Access Server Net Address Translation NBMA Non Broadcast Multi-Access NetBIOS over TCP/IP Network Control Protocol Neighborhood discovery...
Page 189
Acronym Full spelling Operation Administration and Maintenance OAMPDU OAM Protocol Data Units OC-3 OC-3 Object Identifier Optical Line Open Systems Interconnection Outbound Route Filter OSPF Open Shortest Path First Return Provider P2MP Point to MultiPoint Point To Point Password Authentication Protocol Policy-based Route Printed Circuit Board Pulse Code Modulation...
Page 190
Acronym Full spelling Priority Queuing Primary Reference Clock Primary Rate Interface Protection Switching Power Sourcing Equipment PSNP Partial SNP PTMP or P2MP Point-to-Multipoint PTP or P2P Point-to-Point Permanent Virtual Channel Pseudo wires Pre-boot Execution Environment Return QACL QoS/ACL QinQ 802.1Q in 802.1Q Quality of Service QQIC Querier's Query Interval Code...
Page 191
Acronym Full spelling Rendezvous Point Tree RRPP Rapid Ring Protection Protocol Router Solicitation Reservation State Block RSOH Regenerator Section Overhead RSTP Rapid Spanning Tree Protocol RSVP Resource Reservation Protocol RSVP-TE Resource Reservation Protocol – Traffic Engineering Route Target RTCP Real-time Transport Control Protocol Route Table Entry Real-time Transport Protocol Real-time Transport Protocol...
Page 192
Acronym Full spelling Section Overhead SONET Synchronous Optical Network Site-of-Origin Strict Priority Queuing Superstratum PE/Sevice Provider-end PE Shortest Path First Shortest Path Tree SRPT Sub-ring Packet Tunnel Secure Shell Synchronization Status Marker Source-Specific Multicast Shared Tree STM-1 SDH Transport Module -1 STM-16 SDH Transport Module -16 STM-16c...
Page 193
Acronym Full spelling TPID Tag Protocol Identifier TRIP Trigger RIP Traffic Shaping Time to Live True Type Terminal Return Universal/Local User Datagram Protocol Under-layer PE or User-end PE Uniform Resource Locators URPF Unicast Reverse Path Forwarding User-Based Security Model Return Variable Bit Rate Virtual Channel Identifier Virtual Ethernet...
Page 194
Acronym Full spelling Wide Area Network Weighted Fair Queuing WINS Windows Internet Naming Service WLAN wireless local area network WRED Weighted Random Early Detection Weighted Round Robin Wait-to-Restore World Wide Web Return Ten-GigabitEthernet Return Zone Border Router...
Index 802.1X features working together ......73 access control method ........ 72 guest VLAN ..........74 architecture ..........65 maintaining ..........82 authentication mode ........65 mandatory authentication domain for specified port ............. 75 authentication process ........ 69 Message-Authenticator attribute ....69 Auth-Fail VLAN .........
Page 196
(SSH2.0) ..........137 Message-Authenticator (802.1X) ....69 configuring switch for public key authentication (SSH2.0) ..........140 proprietary sub-attributes of H3C (RADIUS) . 178 configuring user interface (SSH2.0) ... 123 RADIUS (AAA) ........177 establishing server connection (SSH2.0) ..128 RADIUS extended (AAA) ......22 specifying IP address/interface (SSH2.0) ...
Page 197
system (portal) ........... 95 local asymmetric pair (public key) ....1 1 1 concept local user attribute (AAA) ......34 802.1X ............. 66 MAC authentication ....... 88, 89, 91 MAC authentication ........89 NAS ID-VLAN binding (AAA) ..... 37 public key ..........1 10 online user handshake function (802.1X) ..
Need help?
Do you have a question about the S9500E Series and is the answer not in the manual?
Questions and answers