Troubleshooting MSR Series Comware 7
Troubleshooting MSR Series Comware 7
i
Contents
Configuring AAA ··············································································1
Overview ·································································································································· 1
RADIUS ···························································································································· 2
HWTACACS ······················································································································ 7
LDAP ································································································································ 9
AAA implementation on the device ························································································ 12
AAA for MPLS L3VPNs ······································································································ 14
Protocols and standards ····································································································· 14
RADIUS attributes ············································································································· 15
Command and hardware compatibility ·························································································· 18
FIPS compliance······················································································································ 18
AAA configuration considerations and task list ··············································································· 18
Configuring AAA schemes ········································································································· 19
Configuring local users ······································································································· 20
Configuring RADIUS schemes ····························································································· 25
Configuring HWTACACS schemes························································································ 36
Configuring LDAP schemes ································································································· 42
Configuring AAA methods for ISP domains ···················································································· 46
Configuration prerequisites ·································································································· 46
Creating an ISP domain ······································································································ 46
Configuring ISP domain attributes ························································································· 47
Configuring authentication methods for an ISP domain ······························································ 49
Configuring authorization methods for an ISP domain ······························································· 51
Configuring accounting methods for an ISP domain ·································································· 52
Enabling the session-control feature ···························································································· 54
Configuring the RADIUS DAE server feature ················································································· 55
Changing the DSCP priority for RADIUS packets ············································································ 55
Setting the maximum number of concurrent login users···································································· 56
Configuring and applying an ITA policy ························································································· 56
Configuring a NAS-ID profile ······································································································ 57
Configuring the Acct-Session-Id format ························································································· 57
Displaying and maintaining AAA·································································································· 58
AAA configuration examples······································································································· 58
Authentication and authorization for SSH users by a RADIUS server ············································ 58
Local authentication and authorization for SSH users ································································ 62
AAA for SSH users by an HWTACACS server ········································································· 63
Authentication for SSH users by an LDAP server ····································································· 65
Authentication and authorization for SSL VPN users by an LDAP server ······································· 70
AAA for PPP users by an HWTACACS server ········································································· 75
Troubleshooting RADIUS··········································································································· 76
RADIUS authentication failure ······························································································ 76
RADIUS packet delivery failure ···························································································· 77
RADIUS accounting error ···································································································· 77
Troubleshooting HWTACACS ····································································································· 78
Troubleshooting LDAP ·············································································································· 78
802.1X overview ············································································ 79
802.1X architecture ·················································································································· 79
Controlled/uncontrolled port and port authorization status ································································· 79
802.1X-related protocols············································································································ 80
Packet formats·················································································································· 80
EAP over RADIUS ············································································································· 81
802.1X authentication initiation ··································································································· 82
802.1X client as the initiator ································································································· 82
Access device as the initiator ······························································································· 82
802.1X authentication procedures ······························································································· 83
Comparing EAP relay and EAP termination············································································· 84
i
EAP relay ························································································································ 84
EAP termination ················································································································ 86
Configuring 802.1X ········································································· 88
Access control methods ············································································································ 88
802.1X VLAN manipulation ········································································································ 88
Authorization VLAN ··········································································································· 88
Guest VLAN ····················································································································· 90
Auth-Fail VLAN ················································································································· 91
Critical VLAN ···················································································································· 91
Using 802.1X authentication with other features ············································································· 92
ACL assignment················································································································ 92
EAD assistant ··················································································································· 93
SmartOn·························································································································· 93
Compatibility information ··········································································································· 94
Feature and hardware compatibility ······················································································· 94
Command and hardware compatibility ··················································································· 94
Configuration prerequisites ········································································································ 95
802.1X configuration task list ······································································································ 95
Enabling 802.1X ······················································································································ 95
Enabling EAP relay or EAP termination ························································································ 96
Setting the port authorization state······························································································· 96
Specifying an access control method ··························································································· 97
Setting the maximum number of concurrent 802.1X users on a port ···················································· 98
Setting the maximum number of authentication request attempts ······················································· 98
Setting the 802.1X authentication timeout timers ············································································ 98
Configuring the online user handshake feature ··············································································· 99
Configuration guidelines ····································································································· 99
Configuration procedure ····································································································· 99
Configuring the authentication trigger feature ··············································································· 100
Configuration guidelines ··································································································· 100
Configuration procedure ··································································································· 100
Specifying a mandatory authentication domain on a port ································································ 100
Setting the quiet timer ············································································································· 101
Enabling the periodic online user reauthentication feature······························································· 101
Configuring an 802.1X guest VLAN···························································································· 102
Configuration guidelines ··································································································· 102
Configuration procedure ··································································································· 102
Configuring an 802.1X Auth-Fail VLAN ······················································································· 102
Configuration guidelines ··································································································· 102
Configuration procedure ··································································································· 103
Configuring an 802.1X critical VLAN ·························································································· 103
Configuration guidelines ··································································································· 103
Configuration procedure ··································································································· 103
Specifying supported domain name delimiters ·············································································· 103
Configuring the EAD assistant feature ························································································ 104
Configuring 802.1X SmartOn ···································································································· 105
Displaying and maintaining 802.1X ···························································································· 106
802.1X authentication configuration examples ·············································································· 106
Basic 802.1X authentication configuration example ································································ 106
802.1X guest VLAN and authorization VLAN configuration example ··········································· 108
802.1X with ACL assignment configuration example ······························································· 111
802.1X with EAD assistant configuration example (with DHCP relay agent) ································· 112
802.1X with EAD assistant configuration example (with DHCP server) ········································ 115
802.1X SmartOn configuration example ··············································································· 117
Troubleshooting 802.1X ·········································································································· 119
Web browser users cannot be redirected correctly·································································· 119
Configuring MAC authentication ······················································ 120
Overview ······························································································································ 120
User account policies ······································································································· 120
Authentication methods ···································································································· 120
ii
VLAN assignment············································································································ 121
ACL assignment·············································································································· 121
Periodic MAC reauthentication ··························································································· 121
Compatibility information ········································································································· 122
Feature and hardware compatibility ····················································································· 122
Command and hardware compatibility ················································································· 122
Configuration prerequisites ······································································································ 122
Configuration task list·············································································································· 123
Enabling MAC authentication···································································································· 123
Specifying a MAC authentication domain ···················································································· 123
Configuring the user account format··························································································· 124
Configuring MAC authentication timers ······················································································· 124
Setting the maximum number of concurrent MAC authentication users on a port ································· 125
Configuring MAC authentication delay ························································································ 125
Enabling MAC authentication multi-VLAN mode on a port ······························································· 126
Configuring the keep-online feature ··························································································· 126
Displaying and maintaining MAC authentication ··········································································· 127
MAC authentication configuration examples ················································································ 127
Local MAC authentication configuration example ··································································· 127
RADIUS-based MAC authentication configuration example ······················································ 129
ACL assignment configuration example ··············································································· 131
Configuring portal authentication ····················································· 134
Overview ······························································································································ 134
Extended portal functions ·································································································· 134
Portal system components ································································································ 134
Interaction between portal system components ······································································ 136
Portal authentication modes ······························································································ 136
Portal authentication process ····························································································· 137
Command and hardware compatibility ························································································ 139
Portal configuration task list······································································································ 139
Configuration prerequisites ······································································································ 140
Configuring a portal authentication server ··················································································· 140
Configuring a portal Web server ································································································ 141
Enabling portal authentication on an interface ·············································································· 141
Configuration restrictions and guidelines ·············································································· 142
Configuration procedure ··································································································· 142
Referencing a portal Web server for an interface ·········································································· 142
Controlling portal user access ··································································································· 143
Configuring a portal-free rule ····························································································· 143
Configuring an authentication source subnet ········································································· 144
Configuring an authentication destination subnet···································································· 145
Setting the maximum number of portal users ········································································· 145
Specifying a portal authentication domain ············································································· 146
Specifying a preauthentication domain ················································································· 147
Configuring a preauthentication IP address pool for portal users ················································ 148
Enabling strict-checking on portal authorization information ······················································ 148
Enabling outgoing packets filtering on a portal-enabled interface ··············································· 149
Configuring portal detection features ·························································································· 149
Configuring online detection of portal users ··········································································· 149
Configuring portal authentication server detection ·································································· 150
Configuring portal Web server detection ··············································································· 151
Configuring portal user synchronization ················································································ 152
Configuring the portal fail-permit feature ····················································································· 153
Configuring BAS-IP for unsolicited portal packets sent to the portal authentication server ······················ 153
Enabling portal roaming··········································································································· 154
Specifying a format for the NAS-Port-ID attribute ·········································································· 154
Logging out portal users ·········································································································· 155
Configuring Web redirect ········································································································· 155
Applying a NAS-ID profile to an interface ···················································································· 156
Displaying and maintaining portal ······························································································ 156
Portal configuration examples ··································································································· 157
iii
Configuring direct portal authentication ················································································ 157
Configuring re-DHCP portal authentication············································································ 167
Configuring cross-subnet portal authentication······································································· 170
Configuring extended direct portal authentication ··································································· 173
Configuring extended re-DHCP portal authentication ······························································ 176
Configuring extended cross-subnet portal authentication ························································· 180
Configuring portal server detection and portal user synchronization ··········································· 184
Configuring cross-subnet portal authentication for MPLS L3VPNs ············································· 192
Configuring direct portal authentication with a preauthentication domain ····································· 194
Configuring re-DHCP portal authentication with a preauthentication domain································· 196
Troubleshooting portal ············································································································ 199
No portal authentication page is pushed for users ·································································· 199
Cannot log out portal users on the access device ··································································· 199
Cannot log out portal users on the RADIUS server ································································· 200
Users logged out by the access device still exist on the portal authentication server ······················ 200
Re-DHCP portal authenticated users cannot log in successfully ················································ 200
Configuring port security ································································ 202
Overview ······························································································································ 202
Port security features ······································································································· 202
Port security modes ········································································································· 202
Feature and hardware compatibility ··························································································· 205
Configuration task list·············································································································· 205
Enabling port security ············································································································· 205
Setting port security's limit on the number of secure MAC addresses on a port···································· 206
Setting the port security mode ·································································································· 206
Configuring port security features ······························································································ 208
Configuring NTK ············································································································· 208
Configuring intrusion protection ·························································································· 208
Configuring secure MAC addresses ··························································································· 209
Configuration prerequisites ································································································ 210
Configuration procedure ··································································································· 210
Ignoring authorization information from the server ········································································· 211
Enabling MAC move ··············································································································· 211
Enabling the authorization-fail-offline feature ················································································ 212
Applying a NAS-ID profile to port security ···················································································· 212
Displaying and maintaining port security ····················································································· 213
Port security configuration examples ·························································································· 213
autoLearn configuration example ························································································ 213
userLoginWithOUI configuration example ············································································· 215
macAddressElseUserLoginSecure configuration example ························································ 218
Troubleshooting port security···································································································· 222
Cannot set the port security mode ······················································································· 222
Cannot configure secure MAC addresses ············································································· 222
Configuring user profiles ································································ 223
Overview ······························································································································ 223
Compatibility information ········································································································· 223
Feature and hardware compatibility ····················································································· 223
Command and hardware compatibility ················································································· 223
User profile configuration task list ······························································································ 223
Configuration restrictions and guidelines ····················································································· 224
Configuring a user profile ········································································································· 224
Displaying and maintaining user profiles ····················································································· 224
Configuring password control ·························································· 225
Overview ······························································································································ 225
Password setting ············································································································· 225
Password updating and expiration ······················································································ 226
User login control ············································································································ 227
Password not displayed in any form ···················································································· 227
Logging ························································································································· 227
iv
FIPS compliance···················································································································· 228
Password control configuration task list ······················································································ 228
Enabling password control ······································································································· 228
Setting global password control parameters ················································································· 229
Setting user group password control parameters ·········································································· 230
Setting local user password control parameters ············································································ 231
Setting super password control parameters ················································································· 231
Displaying and maintaining password control ··············································································· 232
Password control configuration example ····················································································· 232
Network requirements ······································································································ 232
Configuration procedure ··································································································· 233
Verifying the configuration ································································································· 234
Managing public keys ···································································· 236
Overview ······························································································································ 236
FIPS compliance···················································································································· 236
Creating a local key pair ·········································································································· 236
Distributing a local host public key ····························································································· 237
Exporting a host public key ································································································ 238
Displaying a host public key ······························································································· 238
Destroying a local key pair ······································································································· 238
Configuring a peer host public key ····························································································· 239
Importing a peer host public key from a public key file ····························································· 239
Entering a peer host public key ·························································································· 239
Displaying and maintaining public keys ······················································································· 240
Examples of public key management ························································································· 240
Example for entering a peer host public key ·········································································· 240
Example for importing a public key from a public key file ·························································· 242
Configuring PKI ··········································································· 245
Overview ······························································································································ 245
PKI terminology ·············································································································· 245
PKI architecture ·············································································································· 246
PKI operation ················································································································· 246
PKI applications ·············································································································· 247
Support for MPLS L3VPN ································································································· 247
FIPS compliance···················································································································· 248
PKI configuration task list········································································································· 248
Configuring a PKI entity ··········································································································· 248
Configuring a PKI domain ········································································································ 249
Requesting a certificate ··········································································································· 251
Configuration guidelines ··································································································· 251
Configuring automatic certificate request ·············································································· 252
Manually requesting a certificate ························································································· 252
Aborting a certificate request ···································································································· 253
Obtaining certificates ·············································································································· 253
Configuration prerequisites ································································································ 253
Configuration guidelines ··································································································· 254
Configuration procedure ··································································································· 254
Verifying PKI certificates ·········································································································· 254
Verifying certificates with CRL checking ··············································································· 254
Verifying certificates without CRL checking ··········································································· 255
Specifying the storage path for the certificates and CRLs ······························································· 256
Exporting certificates ·············································································································· 256
Removing a certificate············································································································· 257
Configuring a certificate-based access control policy ····································································· 257
Displaying and maintaining PKI ································································································· 258
PKI configuration examples ······································································································ 259
Requesting a certificate from an RSA Keon CA server ···························································· 259
Requesting a certificate from a Windows Server 2003 CA server ··············································· 261
Requesting a certificate from an OpenCA server ···································································· 265
Requesting a certificate from an RSA Keon CA server in an NAT-PT network ······························ 268
v
IKE negotiation with RSA digital signature from a Windows Server 2003 CA server ······················· 271
Certificate-based access control policy configuration example ·················································· 274
Certificate import and export configuration example ································································ 275
Troubleshooting PKI configuration ····························································································· 281
Failed to obtain the CA certificate ······················································································· 281
Failed to obtain local certificates ························································································· 281
Failed to request local certificates ······················································································· 282
Failed to obtain CRLs ······································································································· 283
Failed to import the CA certificate ······················································································· 283
Failed to import a local certificate ························································································ 284
Failed to export certificates ································································································ 284
Failed to set the storage path ····························································································· 285
Configuring IPsec ········································································· 286
Overview ······························································································································ 286
Security protocols and encapsulation modes ········································································· 286
Security association ········································································································· 288
Authentication and encryption ···························································································· 288
IPsec implementation ······································································································· 289
IPsec RRI ······················································································································ 290
Protocols and standards ··································································································· 291
FIPS compliance···················································································································· 291
Security strength ···················································································································· 291
IPsec tunnel establishment ······································································································ 291
Implementing ACL-based IPsec ································································································ 292
Configuring an ACL ········································································································· 292
Configuring an IPsec transform set ····················································································· 295
Configuring a manual IPsec policy ······················································································ 297
Configuring an IKE-based IPsec policy················································································· 299
Applying an IPsec policy to an interface ··············································································· 303
Enabling ACL checking for de-encapsulated packets ······························································ 304
Configuring IPsec anti-replay ····························································································· 305
Configuring IPsec anti-replay redundancy ············································································· 305
Binding a source interface to an IPsec policy ········································································· 306
Enabling QoS pre-classify ································································································· 307
Enabling logging of IPsec packets ······················································································· 307
Configuring the DF bit of IPsec packets ················································································ 307
Configuring IPsec RRI ······································································································ 308
Configuring IPsec for IPv6 routing protocols ················································································ 309
Configuration task list ······································································································· 309
Configuring a manual IPsec profile ······················································································ 309
Configuring IPsec for tunnels ···································································································· 311
Configuration task list ······································································································· 311
Configuring an IKE-based IPsec profile ················································································ 311
Applying an IKE-based IPsec profile to a tunnel interface ························································· 312
Configuring SNMP notifications for IPsec ···················································································· 312
Displaying and maintaining IPsec ······························································································ 313
IPsec configuration examples ··································································································· 314
Configuring a manual mode IPsec tunnel for IPv4 packets ······················································· 314
Configuring an IKE-based IPsec tunnel for IPv4 packets ·························································· 317
Configuring an IKE-based IPsec tunnel for IPv6 packets ·························································· 320
Configuring IPsec for RIPng ······························································································ 324
Configuring IPsec RRI ······································································································ 327
Configuring IKE ··········································································· 331
Overview ······························································································································ 331
IKE negotiation process ···································································································· 331
IKE security mechanism ··································································································· 332
Protocols and standards ··································································································· 333
FIPS compliance···················································································································· 333
IKE configuration prerequisites ································································································· 333
IKE configuration task list········································································································· 333
vi
Configuring an IKE profile ········································································································ 334
Configuring an IKE proposal ····································································································· 336
Configuring an IKE keychain ···································································································· 337
Configuring the global identity information ··················································································· 338
Configuring the IKE keepalive function ······················································································· 339
Configuring the IKE NAT keepalive function ················································································· 339
Configuring IKE DPD ·············································································································· 339
Enabling invalid SPI recovery ··································································································· 340
Setting the maximum number of IKE SAs ···················································································· 341
Configuring SNMP notifications for IKE ······················································································· 341
Displaying and maintaining IKE ································································································· 342
IKE configuration examples ······································································································ 342
Main mode IKE with pre-shared key authentication configuration example ··································· 342
Aggressive mode with RSA signature authentication configuration example ································· 346
Aggressive mode with NAT traversal configuration example ····················································· 353
Troubleshooting IKE ··············································································································· 357
IKE negotiation failed because no matching IKE proposals were found ······································· 357
IKE negotiation failed because no IKE proposals or IKE keychains are specified correctly ·············· 358
IPsec SA negotiation failed because no matching IPsec transform sets were found ······················· 358
IPsec SA negotiation failed due to invalid identity information ··················································· 359
Configuring IKEv2 ········································································ 362
Overview ······························································································································ 362
IKEv2 negotiation process ································································································· 362
New features in IKEv2 ······································································································ 363
Protocols and standards ··································································································· 363
IKEv2 configuration task list ····································································································· 363
Configuring an IKEv2 profile ····································································································· 364
Configuring an IKEv2 policy ····································································································· 367
Configuring an IKEv2 proposal·································································································· 368
Configuring an IKEv2 keychain ································································································· 369
Configure global IKEv2 parameters···························································································· 370
Enabling the cookie challenging feature ··············································································· 370
Configuring the IKEv2 DPD feature ····················································································· 370
Configuring the IKEv2 NAT keepalive feature ········································································ 371
Configuring IKEv2 address pools ························································································ 371
Displaying and maintaining IKEv2······························································································ 371
IKEv2 configuration examples··································································································· 372
IKEv2 with pre-shared key authentication configuration example ··············································· 372
IKEv2 with RSA signature authentication configuration example ················································ 376
IKEv2 with NAT traversal configuration example ···································································· 384
Troubleshooting IKEv2 ············································································································ 389
IKEv2 negotiation failed because no matching IKEv2 proposals were found ································· 389
IPsec SA negotiation failed because no matching IPsec transform sets were found ······················· 389
IPsec tunnel establishment failed ························································································ 390
Configuring SSH ·········································································· 391
Overview ······························································································································ 391
How SSH works ·············································································································· 391
SSH authentication methods ······························································································ 392
FIPS compliance···················································································································· 393
Configuring the device as an SSH server ···················································································· 393
SSH server configuration task list ······················································································· 393
Generating local DSA or RSA key pairs················································································ 394
Enabling the Stelnet server ································································································ 395
Enabling the SFTP server ································································································· 395
Enabling the SCP server ··································································································· 395
Enabling NETCONF over SSH ··························································································· 396
Configuring the user lines for SSH login ··············································································· 396
Configuring a client's host public key ··················································································· 396
Configuring an SSH user ·································································································· 397
Configuring the SSH management parameters ······································································ 399
vii
Configuring the device as an Stelnet client ·················································································· 400
Stelnet client configuration task list ······················································································ 400
Generating local DSA or RSA key pairs················································································ 400
Specifying the source IP address for SSH packets ································································· 400
Establishing a connection to an Stelnet server ······································································· 401
Configuring the device as an SFTP client ···················································································· 403
SFTP client configuration task list ······················································································· 403
Generating local DSA or RSA key pairs················································································ 403
Specifying the source IP address for SFTP packets ································································ 403
Establishing a connection to an SFTP server········································································· 404
Working with SFTP directories ··························································································· 405
Working with SFTP files ···································································································· 405
Displaying help information ································································································ 406
Terminating the connection with the SFTP server ··································································· 406
Configuring the device as an SCP client ····················································································· 406
SCP client configuration task list ························································································· 406
Generating local DSA or RSA key pairs················································································ 406
Establishing a connection to an SCP server ·········································································· 407
Displaying and maintaining SSH ······························································································· 408
Stelnet configuration examples ································································································· 408
Password authentication enabled Stelnet server configuration example ······································ 409
Publickey authentication enabled Stelnet server configuration example······································· 411
Password authentication enabled Stelnet client configuration example ······································· 417
Publickey authentication enabled Stelnet client configuration example ········································ 420
SFTP configuration examples ··································································································· 422
Password authentication enabled SFTP server configuration example ········································ 422
Publickey authentication enabled SFTP client configuration example ········································· 424
SCP configuration example ······································································································ 428
Network requirements ······································································································ 428
Configuration procedure ··································································································· 428
NETCONF over SSH configuration example ················································································ 429
Network requirements ······································································································ 430
Configuration procedure ··································································································· 430
Verifying the configuration ································································································· 431
Configuring SSL ··········································································· 432
Overview ······························································································································ 432
SSL security services ······································································································· 432
SSL protocol stack··········································································································· 432
Feature and hardware compatibility ··························································································· 433
FIPS compliance···················································································································· 433
SSL configuration task list ········································································································ 433
Configuring an SSL server policy······························································································· 434
Configuring an SSL client policy ································································································ 435
Displaying and maintaining SSL ································································································ 436
SSL server policy configuration example ····················································································· 436
Configuring ASPF ········································································ 439
Overview ······························································································································ 439
ASPF basic concepts ······································································································· 439
ASPF inspections ············································································································ 440
Command and hardware compatibility ························································································ 442
ASPF configuration task list······································································································ 442
Configuring an ASPF policy······································································································ 442
Applying an ASPF policy to an interface ······················································································ 443
Applying an ASPF policy to a zone pair ······················································································ 443
Displaying and maintaining ASPF ······························································································ 444
ASPF configuration examples ··································································································· 445
ASPF FTP application inspection configuration example ·························································· 445
ASPF TCP application inspection configuration example ························································· 446
ASPF H.323 application inspection configuration example ······················································· 447
ASPF application to a zone pair configuration example ···························································· 448
viii
Configuring APR ·········································································· 451
Overview ······························································································································ 451
PBAR ··························································································································· 451
Group-based application recognition ··················································································· 451
Command and hardware compatibility ························································································ 452
Configuring PBAR ·················································································································· 452
Configuring application groups ·································································································· 453
Enabling application statistics on an interface ·············································································· 453
Displaying and maintaining APR ······························································································· 454
APR configuration example ······································································································ 455
Network requirements ······································································································ 455
Configuration procedure ··································································································· 455
Verifying the configuration ································································································· 455
Managing sessions ······································································· 456
Overview ······························································································································ 456
Session management operation ························································································· 456
Session management functions ·························································································· 456
Command and hardware compatibility ························································································ 457
Session management task list ·································································································· 457
Setting the session aging time for different protocol states ······························································ 457
Setting the session aging time for different application layer protocols ··············································· 458
Specifying persistent sessions ·································································································· 459
Enabling session statistics collection ·························································································· 459
Configuring session logging ····································································································· 459
Displaying and maintaining session management ········································································· 460
Configuring connection limits ·························································· 463
Command and hardware compatibility ························································································ 463
Interface-based connection limit configuration task list ··································································· 463
Creating a connection limit policy ······························································································ 464
Configuring the connection limit policy ························································································ 464
Applying the connection limit policy ···························································································· 465
Displaying and maintaining connection limits ··············································································· 465
Connection limit configuration example ······················································································· 466
Network requirements ······································································································ 466
Configuration procedure ··································································································· 467
Verifying the configuration ································································································· 468
Troubleshooting connection limits ······························································································ 468
ACLs in the connection limit rules with overlapping segments ··················································· 468
Configuring object groups ······························································ 470
Overview ······························································································································ 470
Feature and hardware compatibility ··························································································· 470
Configuring an IPv4 address object group ··················································································· 470
Configuring an IPv6 address object group ··················································································· 471
Configuring a port object group ································································································· 471
Configuring a service object group ····························································································· 471
Displaying and maintaining object groups ···················································································· 472
Configuring object policies ····························································· 473
Overview ······························································································································ 473
Compatibility information ········································································································· 473
Feature and hardware compatibility ····················································································· 473
Command and hardware compatibility ················································································· 473
Object policy rules ·················································································································· 473
Rule numbering ·············································································································· 473
Rule match order············································································································· 474
Rule description ·············································································································· 474
Object policy configuration task list ···························································································· 474
Configuration prerequisites ······································································································ 474
ix
Creating object policies ··········································································································· 474
Creating an IPv4 object policy ···························································································· 474
Creating an IPv6 object policy ···························································································· 475
Configuring object policy rules ·································································································· 475
Configuring an IPv4 object policy rule ·················································································· 475
Configuring an IPv6 object policy rule ·················································································· 476
Applying object policies to zone pairs ························································································· 476
Changing the rule match order ·································································································· 477
Enabling rule matching acceleration ··························································································· 477
Displaying and maintaining object policies ··················································································· 477
Object policy configuration example ··························································································· 478
Network requirements ······································································································ 478
Configuration procedure ··································································································· 479
Verifying the configuration ································································································· 480
Configuring attack detection and prevention ······································· 481
Overview ······························································································································ 481
Command and hardware compatibility ························································································ 481
Attacks that the device can prevent···························································································· 481
Single-packet attacks ······································································································· 481
Scanning attacks ············································································································· 483
Flood attacks ·················································································································· 483
TCP fragment attacks ······································································································· 484
Blacklist feature ····················································································································· 484
Client verification ··················································································································· 485
TCP client verification ······································································································· 485
DNS client verification ······································································································ 487
HTTP client verification ····································································································· 488
Attack detection and prevention configuration task list···································································· 489
Configuring an attack defense policy ·························································································· 489
Creating an attack defense policy ······················································································· 489
Configuring a single-packet attack defense policy··································································· 489
Configuring a scanning attack defense policy ········································································ 491
Configuring a flood attack defense policy ·············································································· 491
Configuring attack detection exemption ················································································ 496
Applying an attack defense policy to an interface ··································································· 497
Applying an attack defense policy to the device ····································································· 497
Disabling log aggregation for single-packet attack events ························································· 498
Configuring TCP fragment attack prevention ················································································ 498
Configuring TCP client verification ····························································································· 498
Configuring DNS client verification ····························································································· 499
Configuring HTTP client verification ··························································································· 500
Configuring the blacklist feature ································································································ 500
Displaying and maintaining attack detection and prevention ···························································· 501
Attack detection and prevention configuration examples ································································· 506
Interface-based attack detection and prevention configuration example ······································ 506
Blacklist configuration example ·························································································· 509
TCP client verification configuration example········································································· 510
DNS client verification configuration example ········································································ 511
HTTP client verification configuration example ······································································· 512
Configuring IP source guard ··························································· 514
Overview ······························································································································ 514
Static IPSG bindings ········································································································ 514
Dynamic IPSG bindings ···································································································· 515
Compatibility information ········································································································· 515
Feature and hardware compatibility ····················································································· 515
Command and hardware compatibility ················································································· 515
IPSG configuration task list ······································································································ 516
Configuring the IPv4SG feature································································································· 516
Enabling IPv4SG on an interface ························································································ 516
Configuring a static IPv4SG binding ···················································································· 517
x
Configuring the IPv6SG feature································································································· 517
Enabling IPv6SG on an interface ························································································ 517
Configuring a static IPv6SG binding ···················································································· 517
Displaying and maintaining IPSG ······························································································ 518
IPSG configuration examples ··································································································· 519
Static IPv4SG configuration example ··················································································· 519
Dynamic IPv4SG using DHCP snooping configuration example ················································ 520
Dynamic IPv4SG using DHCP relay configuration example ······················································ 521
Static IPv6SG configuration example ··················································································· 522
Dynamic IPv6SG using DHCPv6 snooping configuration example ············································· 522
Configuring ARP attack protection ··················································· 524
Command and hardware compatibility ························································································ 524
ARP attack protection configuration task list ················································································ 524
Configuring unresolvable IP attack protection ··············································································· 525
Configuring ARP source suppression··················································································· 525
Enabling ARP blackhole routing ························································································· 525
Displaying and maintaining unresolvable IP attack protection ···················································· 525
Configuration example ······································································································ 526
Configuring source MAC-based ARP attack detection ···································································· 527
Configuration procedure ··································································································· 527
Displaying and maintaining source MAC-based ARP attack detection ········································· 527
Configuration example ······································································································ 528
Configuring ARP packet source MAC consistency check ································································ 529
Configuring ARP active acknowledgement ·················································································· 529
Configuring authorized ARP ····································································································· 529
Configuration procedure ··································································································· 530
Configuration example (on a DHCP server)··········································································· 530
Configuration example (on a DHCP relay agent) ···································································· 531
Configuring ARP detection ······································································································· 532
Configuring user validity check ··························································································· 533
Configuring ARP packet validity check ················································································· 534
Configuring ARP restricted forwarding ················································································· 534
Displaying and maintaining ARP detection ············································································ 535
User validity check and ARP packet validity check configuration example···································· 535
ARP restricted forwarding configuration example ··································································· 536
Configuring ARP scanning and fixed ARP ··················································································· 538
Configuration restrictions and guidelines ·············································································· 538
Configuration procedure ··································································································· 538
Configuring ARP gateway protection ·························································································· 539
Configuration guidelines ··································································································· 539
Configuration procedure ··································································································· 539
Configuration example ······································································································ 539
Configuring ARP filtering ········································································································· 540
Configuration guidelines ··································································································· 540
Configuration procedure ··································································································· 540
Configuration example ······································································································ 541
Configuring uRPF ········································································· 542
Overview ······························································································································ 542
uRPF check modes ········································································································· 542
Features ························································································································ 542
uRPF operation··············································································································· 543
Network application ········································································································· 546
Command and hardware compatibility ························································································ 546
Configuring uRPF ·················································································································· 546
Displaying and maintaining uRPF ······························································································ 547
uRPF configuration example ···································································································· 547
Configuring IPv6 uRPF ·································································· 549
Overview ······························································································································ 549
IPv6 uRPF check modes ··································································································· 549
xi
Features ························································································································ 549
IPv6 uRPF operation ········································································································ 550
Network application ········································································································· 552
Command and hardware compatibility ························································································ 552
Configuring IPv6 uRPF············································································································ 552
Displaying and maintaining IPv6 uRPF ······················································································· 553
IPv6 uRPF configuration example······························································································ 553
Configuring crypto engines ····························································· 555
Overview ······························································································································ 555
Command and hardware compatibility ························································································ 555
Configuring hardware crypto engines ························································································· 555
Displaying and maintaining crypto engines ·················································································· 556
Configuring FIPS ·········································································· 557
Overview ······························································································································ 557
Feature and hardware compatibility ··························································································· 557
Configuration restrictions and guidelines ····················································································· 557
Configuring FIPS mode ··········································································································· 558
Entering FIPS mode········································································································· 558
Configuration changes in FIPS mode ··················································································· 559
Exiting FIPS mode ··········································································································· 560
FIPS self-tests ······················································································································· 561
Power-up self-tests ·········································································································· 561
Conditional self-tests ········································································································ 562
Triggering self-tests ········································································································· 562
Displaying and maintaining FIPS ······························································································· 562
FIPS configuration examples ···································································································· 562
Entering FIPS mode through automatic reboot······································································· 562
Entering FIPS mode through manual reboot ·········································································· 563
Exiting FIPS mode through automatic reboot ········································································· 565
Exiting FIPS mode through manual reboot ············································································ 565
Configuring DPI engine ································································· 567
Command and hardware compatibility ························································································ 567
Overview ······························································································································ 567
DPI engine inspection rules ······························································································· 567
DPI engine mechanism ····································································································· 567
DPI engine configuration task list······························································································· 569
Configure a DPI application profile ····························································································· 570
Activating DPI services············································································································ 570
Configuring action parameter profiles ························································································· 571
Configuring a block source parameter profile ········································································· 571
Configuring a capture parameter profile················································································ 571
Configuring a logging parameter profile ················································································ 572
Configuring a redirect parameter profile················································································ 572
Configuring an email parameter profile ················································································· 572
Optimizing the DPI engine ······································································································· 573
Disabling inspection suspension upon excessive CPU usage ·························································· 574
Displaying and maintaining DPI engine ······················································································· 574
Configuring IPS ··········································································· 576
Overview ······························································································································ 576
IPS signatures ················································································································ 576
Signature actions ············································································································ 576
IPS mechanism··············································································································· 577
IPS signature library management ······················································································ 578
IPS configuration task list········································································································· 579
Configuring an IPS policy········································································································· 579
Specifying a parameter profile for an IPS signature action ······························································ 580
Applying an IPS policy to a DPI application profile ········································································· 580
Importing user-defined IPS signatures ························································································ 580
xii
Using a DPI application profile in an object policy rule ···································································· 581
Using a DPI application profile in an IPv4 object policy rule ······················································ 581
Using a DPI application profile in an IPv6 object policy rule ······················································ 581
Applying object policies to zone pairs ························································································· 581
Managing the IPS signature library ···························································································· 582
Scheduling an IPS signature automatic update ······································································ 582
Triggering an immediate IPS signature update······································································· 583
Specifying the URL for IPS signature auto update ·································································· 583
Performing an IPS signature manual update ········································································· 583
Rolling back the IPS signature library··················································································· 584
Activating DPI services············································································································ 584
Displaying and maintaining IPS ································································································· 584
IPS configuration examples ······································································································ 585
Default IPS policy application example ················································································· 585
User-defined IPS policy application example ········································································· 586
IPS signature library manual update configuration example ······················································ 588
IPS signature library automatic update configuration example ··················································· 590
Document conventions and icons ···················································· 591
Conventions ························································································································· 591
Network topology icons ··········································································································· 592
Support and other resources ·························································· 593
Accessing Hewlett Packard Enterprise Support ············································································ 593
Accessing updates ················································································································· 593
Websites ······················································································································· 594
Customer self repair ········································································································· 594
Remote support ·············································································································· 594
Documentation feedback ·································································································· 594
Index ························································································· 595
xiii
Configuring AAA
Overview
Authentication, Authorization, and Accounting (AAA) provides a uniform framework for implementing
network access management. This feature specifies the following security functions:
• Authentication—Identifies users and verifies their validity.
• Authorization—Grants different users different rights, and controls the users' access to
resources and services. For example, you can permit office users to read and print files and
prevent guests from accessing files on the device.
• Accounting—Records network usage details of users, including the service type, start time,
and traffic. This function enables time-based and traffic-based charging and user behavior
auditing.
AAA uses a client/server model. The client runs on the access device, or the network access server
(NAS), which authenticates user identities and controls user access. The server maintains user
information centrally. See Figure 1.
Figure 1 AAA network diagram
Internet
Network
HWTACACS server
To access networks or resources beyond the NAS, a user sends its identity information to the NAS.
The NAS transparently passes the user information to AAA servers and waits for the authentication,
authorization, and accounting result. Based on the result, the NAS determines whether to permit or
deny the access request.
AAA has various implementations, including RADIUS, HWTACACS, and LDAP. RADIUS is most
often used.
The network in Figure 1 has one RADIUS server and one HWTACACS server. You can use different
servers to implement different security functions. For example, you can use the HWTACACS server
for authentication and authorization, and use the RADIUS server for accounting.
You can choose the security functions provided by AAA as needed. For example, if your company
wants employees to be authenticated before they access specific resources, you would deploy an
authentication server. If network usage information is needed, you would also configure an
accounting server.
The device performs dynamic password authentication.
1
RADIUS
Remote Authentication Dial-In User Service (RADIUS) is a distributed information interaction
protocol that uses a client/server model. The protocol can protect networks against unauthorized
access and is often used in network environments that require both high security and remote user
access.
The RADIUS authorization process is combined with the RADIUS authentication process, and user
authorization information is piggybacked in authentication responses. RADIUS uses UDP port 1812
for authentication and UDP port 1813 for accounting.
RADIUS was originally designed for dial-in user access, and has been extended to support
additional access methods, such as Ethernet and ADSL.
Client/server model
The RADIUS client runs on the NASs located throughout the network. It passes user information to
RADIUS servers and acts on the responses to, for example, reject or accept user access requests.
The RADIUS server runs on the computer or workstation at the network center and maintains
information related to user authentication and network service access.
The RADIUS server operates using the following process:
1. Receives authentication, authorization, and accounting requests from RADIUS clients.
2. Performs user authentication, authorization, or accounting.
3. Returns user access control information (for example, rejecting or accepting the user access
request) to the clients.
The RADIUS server can also act as the client of another RADIUS server to provide authentication
proxy services.
The RADIUS server maintains the following databases:
• Users—Stores user information, such as the usernames, passwords, applied protocols, and IP
addresses.
• Clients—Stores information about RADIUS clients, such as shared keys and IP addresses.
• Dictionary—Stores RADIUS protocol attributes and their values.
Figure 2 RADIUS server databases
2
Basic RADIUS packet exchange process
Figure 3 illustrates the interactions between a user host, the RADIUS client, and the RADIUS server.
Figure 3 Basic RADIUS packet exchange process
3
Figure 4 RADIUS packet format
From the client to the server. A packet of this type includes user
information for the server to authenticate the user. It must contain the
1 Access-Request
User-Name attribute and can optionally contain the attributes of
NAS-IP-Address, User-Password, and NAS-Port.
From the server to the client. If all attribute values included in the
2 Access-Accept Access-Request are acceptable, the authentication succeeds, and
the server sends an Access-Accept response.
From the server to the client. If any attribute value included in the
3 Access-Reject Access-Request is unacceptable, the authentication fails, and the
server sends an Access-Reject response.
From the client to the server. A packet of this type includes user
Accounting-Reques information for the server to start or stop accounting for the user. The
4
t Acct-Status-Type attribute in the packet indicates whether to start or
stop accounting.
From the server to the client. The server sends a packet of this type to
Accounting-Respon
5 notify the client that it has received the Accounting-Request and has
se
successfully recorded the accounting information.
• The Identifier field (1 byte long) is used to match response packets with request packets and to
detect duplicate request packets. The request and response packets of the same exchange
process for the same purpose (such as authentication or accounting) have the same identifier.
• The Length field (2 bytes long) indicates the length of the entire packet (in bytes), including the
Code, Identifier, Length, Authenticator, and Attributes fields. Bytes beyond this length are
considered padding and are ignored by the receiver. If the length of a received packet is less
than this length, the packet is dropped.
• The Authenticator field (16 bytes long) is used to authenticate responses from the RADIUS
server and to encrypt user passwords. There are two types of authenticators: request
authenticator and response authenticator.
• The Attributes field (variable in length) includes authentication, authorization, and accounting
information. This field can contain multiple attributes, each with the following subfields:
4
{ Type—Type of the attribute.
{ Length—Length of the attribute in bytes, including the Type, Length, and Value subfields.
{ Value—Value of the attribute. Its format and content depend on the Type subfield.
Commonly used RADIUS attributes are defined in RFC 2865, RFC 2866, RFC 2867, and RFC
2868. For more information, see "Commonly used standard RADIUS attributes."
Table 2 Commonly used RADIUS attributes
25 Class 72 ARAP-Zone-Access
26 Vendor-Specific 73 ARAP-Security
27 Session-Timeout 74 ARAP-Security-Data
28 Idle-Timeout 75 Password-Retry
29 Termination-Action 76 Prompt
30 Called-Station-Id 77 Connect-Info
31 Calling-Station-Id 78 Configuration-Token
5
No. Attribute No. Attribute
32 NAS-Identifier 79 EAP-Message
33 Proxy-State 80 Message-Authenticator
34 Login-LAT-Service 81 Tunnel-Private-Group-id
35 Login-LAT-Node 82 Tunnel-Assignment-id
36 Login-LAT-Group 83 Tunnel-Preference
37 Framed-AppleTalk-Link 84 ARAP-Challenge-Response
38 Framed-AppleTalk-Network 85 Acct-Interim-Interval
39 Framed-AppleTalk-Zone 86 Acct-Tunnel-Packets-Lost
40 Acct-Status-Type 87 NAS-Port-Id
41 Acct-Delay-Time 88 Framed-Pool
42 Acct-Input-Octets 89 (unassigned)
43 Acct-Output-Octets 90 Tunnel-Client-Auth-id
44 Acct-Session-Id 91 Tunnel-Server-Auth-id
6
HWTACACS
HW Terminal Access Controller Access Control System (HWTACACS) is an enhanced security
protocol based on TACACS (RFC 1492). HWTACACS is similar to RADIUS, and uses a client/server
model for information exchange between the NAS and the HWTACACS server.
HWTACACS typically provides AAA services for PPP, VPDN, and terminal users. In a typical
HWTACACS scenario, terminal users need to log in to the NAS. Working as the HWTACACS client,
the NAS sends users' usernames and passwords to the HWTACACS server for authentication. After
passing authentication and obtaining authorized rights, a user logs in to the device and performs
operations. The HWTACACS server records the operations that each user performs.
Differences between HWTACACS and RADIUS
HWTACACS and RADIUS have many features in common, such as using a client/server model,
using shared keys for data encryption, and providing flexibility and scalability. Table 3 lists the
primary differences between HWTACACS and RADIUS.
Table 3 Primary differences between HWTACACS and RADIUS
HWTACACS RADIUS
Uses TCP, which provides reliable network
Uses UDP, which provides high transport efficiency.
transmission.
Encrypts the entire packet except for the Encrypts only the user password field in an
HWTACACS header. authentication packet.
Protocol packets are complicated and authorization
Protocol packets are simple and the authorization
is independent of authentication. Authentication and
process is combined with the authentication
authorization can be deployed on different
process.
HWTACACS servers.
Supports authorization of configuration commands.
Does not support authorization of configuration
Access to commands depends on both the user's
commands. Access to commands solely depends on
roles and authorization. A user can use only
the user's roles. For more information about user
commands that are permitted by the user roles and
roles, see Fundamentals Configuration Guide.
authorized by the HWTACACS server.
7
Figure 6 Basic HWTACACS packet exchange process for a Telnet user
Host HWTACACS client HWTACACS server
2) Start-authentication packet
8
10. After receiving the login password, the HWTACACS client sends the HWTACACS server a
continue-authentication packet that includes the login password.
11. If the authentication succeeds, the HWTACACS server sends back an authentication response
to indicate that the user has passed authentication.
12. The HWTACACS client sends a user authorization request packet to the HWTACACS server.
13. If the authorization succeeds, the HWTACACS server sends back an authorization response,
indicating that the user is now authorized.
14. Knowing that the user is now authorized, the HWTACACS client pushes its CLI to the user and
permits the user to log in.
15. The HWTACACS client sends a start-accounting request to the HWTACACS server.
16. The HWTACACS server sends back an accounting response, indicating that it has received the
start-accounting request.
17. The user logs off.
18. The HWTACACS client sends a stop-accounting request to the HWTACACS server.
19. The HWTACACS server sends back a stop-accounting response, indicating that the
stop-accounting request has been received.
LDAP
The Lightweight Directory Access Protocol (LDAP) provides standard multiplatform directory service.
LDAP was developed on the basis of the X.500 protocol. It improves the following functions of X.500:
• Read/write interactive access.
• Browse.
• Search.
LDAP is suitable for storing data that does not often change. The protocol is used to store user
information. For example, LDAP server software Active Directory Server is used in Microsoft
Windows operating systems. The software stores the user information and user group information
for user login authentication and authorization.
LDAP directory service
LDAP uses directories to maintain the organization information, personnel information, and resource
information. The directories are organized in a tree structure and include entries. An entry is a set of
attributes with distinguished names (DNs). The attributes are used to store information such as
usernames, passwords, emails, computer names, and phone numbers.
LDAP uses a client/server model, and all directory information is stored in the LDAP server.
Commonly used LDAP server products include Microsoft Active Directory Server, IBM Tivoli
Directory Server, and Sun ONE Directory Server.
LDAP authentication and authorization
AAA can use LDAP to provide authentication and authorization services for users. LDAP defines a
set of operations to implement its functions. The main operations for authentication and authorization
are the bind operation and search operation.
• The bind operation allows an LDAP client to perform the following operations:
{ Establish a connection with the LDAP server.
{ Obtain the access rights to the LDAP server.
{ Check the validity of user information.
• The search operation constructs search conditions and obtains the directory resource
information of the LDAP server.
In LDAP authentication, the client completes the following tasks:
9
1. Uses the LDAP server administrator DN to bind with the LDAP server. After the binding is
created, the client establishes a connection to the server and obtains the right to search.
2. Constructs search conditions by using the username in the authentication information of a user.
The specified root directory of the server is searched and a user DN list is generated.
3. Binds with the LDAP server by using each user DN and password. If a binding is created, the
user is considered legal.
In LDAP authorization, the client performs the same tasks as in LDAP authentication. When the
client constructs search conditions, it obtains both authorization information and the user DN list.
Basic LDAP authentication process
The following example illustrates the basic LDAP authentication process for a Telnet user.
Figure 7 Basic LDAP authentication process for a Telnet user
10
8. The LDAP server processes the request, and sends a response to notify the LDAP client of the
bind operation result. If the bind operation fails, the LDAP client uses another obtained user DN
as the parameter to send a user DN bind request to the LDAP server. This process continues
until a DN is bound successfully or all DNs fail to be bound. If all user DNs fail to be bound, the
LDAP client notifies the user of the login failure and denies the user's access request.
9. The LDAP client saves the user DN that has been bound and exchanges authorization packets
with the authorization server.
{ If LDAP authorization is used, see the authorization process shown in Figure 8.
{ If another method is expected for authorization, the authorization process of that method
applies.
10. After successful authorization, the LDAP client notifies the user of the successful login.
Basic LDAP authorization process
The following example illustrates the basic LDAP authorization process for a Telnet user.
Figure 8 Basic LDAP authorization process for a Telnet user
11
6. The LDAP client sends an authorization search request with the username of the Telnet user to
the LDAP server. If the user uses the same LDAP server for authentication and authorization,
the client sends the request with the saved user DN of the Telnet user to the LDAP server.
7. After receiving the request, the LDAP server searches for the user information by the base DN,
search scope, filtering conditions, and LDAP attributes. If a match is found, the LDAP server
sends a response to notify the LDAP client of the successful search.
8. After successful authorization, the LDAP client notifies the user of the successful login.
AAA manages users in the same ISP domain based on the users' access types. The device supports
the following user access types:
• LAN—LAN users must pass 802.1X or MAC authentication to come online.
• Login—Login users include SSH, Telnet, FTP, and terminal users who log in to the device.
Terminal users can access through a console, AUX, or Async port.
• ADVPN.
• X.25 PAD.
• Portal—Portal users must pass portal authentication to access the network.
• PPP.
• IPoE—IPoE users include Layer 2 and Layer 3 leased line users and Set Top Box (STB) users.
• Web—Web users log in to the Web interface of the device through HTTP or HTTPS.
• SSL VPN.
NOTE:
The device also provides authentication modules (such as 802.1X) for implementation of user
authentication management policies. If you configure these authentication modules, the ISP
domains for users of the access types depend on the configuration of the authentication modules.
12
AAA methods
AAA supports configuring different authentication, authorization, and accounting methods for
different types of users in an ISP domain. The NAS determines the ISP domain and access type of a
user. The NAS also uses the methods configured for the access type in the domain to control the
user's access.
AAA also supports configuring a set of default methods for an ISP domain. These default methods
are applied to users for whom no AAA methods are configured.
The device supports the following authentication methods:
• No authentication—This method trusts all users and does not perform authentication. For
security purposes, do not use this method.
• Local authentication—The NAS authenticates users by itself, based on the locally configured
user information including the usernames, passwords, and attributes. Local authentication
allows high speed and low cost, but the amount of information that can be stored is limited by
the size of the storage space.
• Remote authentication—The NAS works with a RADIUS, HWTACACS, or LDAP server to
authenticate users. The server manages user information in a centralized manner. Remote
authentication provides high capacity, reliable, and centralized authentication services for
multiple NASs. You can configure backup methods to be used when the remote server is not
available.
The device supports the following authorization methods:
• No authorization—The NAS performs no authorization exchange. The following default
authorization information applies after users pass authentication:
{ Non-login users can access the network.
{ Login users obtain the default user role. For more information about the default user role
feature, see Fundamentals Configuration Guide.
{ FTP, SFTP, and SCP login users also have the root directory of the NAS set as the working
directory. However, the users do not have permission to access the root directory.
• Local authorization—The NAS performs authorization according to the user attributes locally
configured for users.
• Remote authorization—The NAS works with a RADIUS, HWTACACS, or LDAP server to
authorize users. RADIUS authorization is bound with RADIUS authentication. RADIUS
authorization can work only after RADIUS authentication is successful, and the authorization
information is included in the Access-Accept packet. HWTACACS authorization is separate
from HWTACACS authentication, and the authorization information is included in the
authorization response after successful authentication. You can configure backup methods to
be used when the remote server is not available.
The device supports the following accounting methods:
• No accounting—The NAS does not perform accounting for the users.
• Local accounting—Local accounting is implemented on the NAS. It counts and controls the
number of concurrent users who use the same local user account, but does not provide
statistics for charging.
• Remote accounting—The NAS works with a RADIUS server or HWTACACS server for
accounting. You can configure backup methods to be used when the remote server is not
available.
In addition, the device provides the following login services to enhance device security:
• Command authorization—Enables the NAS to let the authorization server determine whether
a command entered by a login user is permitted. Login users can execute only commands
permitted by the authorization server. For more information about command authorization, see
Fundamentals Configuration Guide.
13
• Command accounting—When command authorization is disabled, command accounting
enables the accounting server to record all valid commands executed on the device. When
command authorization is enabled, command accounting enables the accounting server to
record all authorized commands. For more information about command accounting, see
Fundamentals Configuration Guide.
• User role authentication—Authenticates each user who wants to obtain another user role
without logging out or getting disconnected. For more information about user role authentication,
see Fundamentals Configuration Guide.
This feature can also help an MCE to implement portal authentication for VPNs. For more
information about MCE, see MPLS Configuration Guide. For more information about portal
authentication, see "Configuring portal authentication."
14
RADIUS attributes
Commonly used standard RADIUS attributes
15
No. Attribute Description
Type of the Accounting-Request packet. Possible values include:
• 1—Start.
• 2—Stop.
• 3—Interim-Update.
• 4—Reset-Charge.
40 Acct-Status-Type • 7—Accounting-On. (Defined in the 3rd Generation Partnership
Project.)
• 8—Accounting-Off. (Defined in the 3rd Generation Partnership
Project.)
• 9 to 14—Reserved for tunnel accounting.
• 15—Reserved for failed.
Authentication method used by the user. Possible values include:
• 1—RADIUS.
45 Acct-Authentic
• 2—Local.
• 3—Remote.
CHAP challenge generated by the NAS for MD5 calculation during CHAP
60 CHAP-Challenge
authentication.
Type of the physical port of the NAS that is authenticating the user.
Possible values include:
• 15—Ethernet.
• 16—Any type of ADSL.
• 17—Cable. (With cable for cable TV.)
61 NAS-Port-Type
• 19—WLAN-IEEE 802.11.
• 201—VLAN.
• 202—ATM.
If the port is an ATM or Ethernet one and VLANs are implemented on it,
the value of this attribute is 201.
Used to encapsulate EAP packets to allow RADIUS to support EAP
79 EAP-Message
authentication.
Used for authentication and verification of authentication packets to
Message-Authenticato
80 prevent spoofing Access-Requests. This attribute is present when EAP
r
authentication is used.
87 NAS-Port-Id String for describing the port of the NAS that is authenticating the user.
16
No. Subattribute Description
Operation for the session, used for session control. Possible values
include:
• 1—Trigger-Request.
20 Command • 2—Terminate-Request.
• 3—SetPolicy.
• 4—Result.
• 5—PortalClear.
Identification for retransmitted packets. For retransmitted packets from
the same session, this attribute must be the same value. For
retransmitted packets from different sessions, this attribute does not
have to be the same value. The client response of a retransmitted
24 Control_Identifier packet must also include this attribute and the value of this attribute
must be the same.
For Accounting-Request packets of the start, stop, and interim update
types, the Control_Identifier attribute does not take effect.
Result of the Trigger-Request or SetPolicy operation, zero for success
25 Result_Code
and any other value for failure.
26 Connect_ID Index of the user connection.
FTP, SFTP, or SCP user working directory.
28 Ftp_Directory When the RADIUS client acts as the FTP, SFTP, or SCP server, this
attribute is used to set the working directory for an FTP, SFTP, or SCP
user on the RADIUS client.
29 Exec_Privilege EXEC user priority.
Startup time of the NAS in seconds, which is represented by the time
59 NAS_Startup_Timestamp
elapsed after 00:00:00 on Jan. 1, 1970 (UTC).
User IP address and MAC address included in authentication and
60 Ip_Host_Addr accounting requests, in the format A.B.C.D hh:hh:hh:hh:hh:hh. A
space is required between the IP address and the MAC address.
Information that must be sent from the server to the client
61 User_Notify
transparently.
Hash value assigned after an 802.1X user passes authentication,
which is a 32-byte string. This attribute is stored in the user list on the
62 User_HeartBeat NAS and verifies the handshake packets from the 802.1X user. This
attribute only exists in Access-Accept and Accounting-Request
packets.
User groups assigned after the SSL VPN user passes authentication.
140 User_Group A user can belong to multiple user groups that are separated by
semicolons. This attribute is used to work with the SSL VPN device.
Security level assigned after the SSL VPN user passes security
141 Security_Level
authentication.
201 Input-Interval-Octets Number of bytes input within a real-time accounting interval.
202 Output-Interval-Octets Number of bytes output within a real-time accounting interval.
Number of packets input within an accounting interval in the unit set on
203 Input-Interval-Packets
the NAS.
Number of packets output within an accounting interval in the unit set
204 Output-Interval-Packets
on the NAS.
Amount of bytes input within an accounting interval, in units of 4G
205 Input-Interval-Gigawords
bytes.
17
No. Subattribute Description
Output-Interval-Gigaword Amount of bytes output within an accounting interval, in units of 4G
206
s bytes.
207 Backup-NAS-IP Backup source IP address for sending RADIUS packets.
255 Product_ID Product name.
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for
features, commands, and parameters might differ in FIPS mode (see "Configuring FIPS") and
non-FIPS mode.
18
Figure 11 AAA configuration procedure
Local AAA
Authentication method
none/ local (the default)/scheme
Accounting method
Configure the RADIUS, HWTACACS, none/ local (the default)/scheme
or LDAP schemes to be used
Remote AAA
Tasks at a glance
(Required.) Perform at least one of the following tasks to configure local users or AAA schemes:
• Configuring local users
• Configuring RADIUS schemes
• Configuring HWTACACS schemes
• Configuring LDAP schemes
(Required.) Configure AAA methods for ISP domains:
1. (Required.) Creating an ISP domain
2. (Optional.) Configuring ISP domain attributes
3. (Required.) Perform at least one of the following tasks to configure AAA authentication, authorization,
and accounting methods for the ISP domain:
{ Configuring authentication methods for an ISP domain
{ Configuring authorization methods for an ISP domain
{ Configuring accounting methods for an ISP domain
(Optional.) Enabling the session-control feature
(Optional.) Configuring the RADIUS DAE server feature
(Optional.) Changing the DSCP priority for RADIUS packets
(Optional.) Setting the maximum number of concurrent login users
(Optional.) Configuring and applying an ITA policy
(Optional.) Configuring a NAS-ID profile
(Optional.) Configuring the Acct-Session-Id format
19
Configuring local users
To implement local authentication, authorization, and accounting, create local users and configure
user attributes on the device. The local users and attributes are stored in the local user database on
the device. A local user is uniquely identified by the combination of a username and a user type.
Local users are classified into the following types:
• Device management user—User who logs in to the device for device management.
• Network access user—User who accesses network resources through the device.
The following shows the configurable local user attributes:
• Service type—Services that the user can use. Local authentication checks the service types of
a local user. If none of the service types is available, the user cannot pass authentication.
Service types include ADVPN, FTP, HTTP, HTTPS, IPoE, LAN access, PAD, portal, PPP, SSH,
SSL VPN, Telnet, and terminal.
• User state—Whether or not a local user can request network services. There are two user
states: active and blocked. A user in active state can request network services, but a user in
blocked state cannot.
• Upper limit of concurrent logins using the same user name—Maximum number of users
who can concurrently access the device by using the same user name. When the number
reaches the upper limit, no more local users can access the device by using the user name.
• User group—Each local user belongs to a local user group and has all attributes of the group.
The attributes include the password control attributes and authorization attributes. For more
information about local user group, see "Configuring user group attributes."
• Binding attributes—Binding attributes control the scope of users, and are checked during
local authentication of a user. If the attributes of a user do not match the binding attributes
configured for the local user account, the user cannot pass authentication. Binding attributes
include the ISDN calling number, IP address, access port, MAC address, and native VLAN. For
support and usage information about binding attributes, see "Configuring local user attributes."
• Authorization attributes—Authorization attributes indicate the user's rights after it passes
local authentication. Authorization attributes include the ACL, idle cut function, PPP callback
number, user profile, user role, VLAN, FTP/SFTP/SCP working directory, VPN instance, and IP
service attributes. The IP service attributes include IPv4 address, IPv6 address, IPv6 address
prefix, IPv6 address pool, primary or secondary DNS server address, and redirect URL. For
support information about authorization attributes, see "Configuring local user attributes."
Configure the authorization attributes based on the service type of local users. For example,
you do not need to configure the FTP/SFTP/SCP working directory attribute for a PPP user.
You can configure an authorization attribute in user group view or local user view. The setting of
an authorization attribute in local user view takes precedence over the attribute setting in user
group view.
{ The attribute configured in user group view takes effect on all local users in the user group.
{ The attribute configured in local user view takes effect only on the local user.
• Password control attributes—Password control attributes help control password security for
device management users. Password control attributes include password aging time, minimum
password length, password composition checking, password complexity checking, and login
attempt limit.
You can configure a password control attribute in system view, user group view, or local user
view. A password control attribute with a smaller effective range has a higher priority. For more
information about password management and global password configuration, see "Configuring
password control."
20
Local user configuration task list
Tasks at a glance
(Required.) Configuring local user attributes
(Optional.) Configuring user group attributes
(Optional.) Displaying and maintaining local users and local user groups
21
Step Command Remarks
Network access user passwords are
encrypted with the encryption algorithm
• For a network access user: and saved in ciphertext. Device
password { cipher | simple } management user passwords are
password encrypted with the hash algorithm and
• For a device management saved in ciphertext.
3. (Optional.) Configure
user: In non-FIPS mode, a
a password for the
local user. { In non-FIPS mode: non-password-protected user passes
password [ { hash | authentication if the user provides the
simple } password ] correct username and passes attribute
{ In FIPS mode: checks. To enhance security, configure
password a password for each local user.
In FIPS mode, only password-protected
users can pass authentication.
• For a network access user:
service-type { advpn | ipoe |
lan-access | portal | ppp |
sslvpn }
• For a device management
user:
4. Assign services to the By default, no service is authorized to a
local user. { In non-FIPS mode:
local user.
service-type { ftp | { http |
https | pad | ssh | telnet |
terminal } * }
{ In FIPS mode:
service-type { https | pad
| ssh | terminal } *
5. (Optional.) Place the By default, a created local user is in
local user to the active state { active | block } active state and can request network
or blocked state. services.
By default, the number of concurrent
6. (Optional.) Set the logins is not limited for the local user.
upper limit of This command takes effect only when
concurrent logins access-limit max-user-number local accounting is configured for the
using the local user local user. It does not apply to FTP,
name. SFTP, or SCP users, who do not
support accounting.
By default, no binding attribute is
configured for a local user.
bind-attribute { call-number Binding attribute call-number applies
7. (Optional.) Configure call-number [ : subcall-number ] | only to PPP users.
binding attributes for ip ip-address | location interface Binding attribute ip applies only to LAN
the local user. interface-type interface-number | users using 802.1X.
mac mac-address | vlan vlan-id } *
Binding attributes location, mac, and
vlan apply only to IPoE, LAN, portal,
and PPP users.
22
Step Command Remarks
authorization-attribute { acl
acl-number | callback-number
callback-number | idle-cut minute |
ip ipv4-address | ipv6 The following default settings apply:
ipv6-address | ipv6-pool • FTP, SFTP, and SCP users have
ipv6-pool-name | ipv6-prefix the root directory of the NAS set as
8. (Optional.) Configure ipv6-prefix prefix-length | the working directory. However, the
authorization { primary-dns | secondary-dns } users do not have permission to
attributes for the local { ip ipv4-address | ipv6 access the root directory.
user. ipv6-address } | • The network-operator user role is
sslvpn-policy-group group-name assigned to local users that are
| url url-string | user-profile created by a network-admin or
profile-name | user-role role-name level-15 user.
| vlan vlan-id | vpn-instance
vpn-instance-name |
work-directory directory-name } *
• Set the password aging time:
password-control aging
aging-time
• Set the minimum password
length:
password-control length
length
• Configure the password
composition policy:
password-control
composition type-number By default, the local user uses password
9. (Optional.) Configure type-number [ type-length control attributes of the user group to
password control type-length ] which the local user belongs.
attributes for the local • Configure the password
user. Only device management users support
complexity checking policy:
the password control feature.
password-control
complexity
{ same-character |
user-name } check
• Configure the maximum login
attempts and the action to
take if there is a login failure:
password-control
login-attempt login-times
[ exceed { lock | lock-time
time | unlock } ]
10. (Optional.) Assign the
local user to a user By default, a local user belongs to the
group group-name
group. default user group system.
23
Step Command Remarks
1. Enter system view. system-view N/A
By default, there is a
2. Create a user group and system-defined user group
enter user group view. user-group group-name
named system, which is the
default user group.
authorization-attribute { acl
acl-number | callback-number
callback-number | idle-cut minute |
ipv6-pool ipv6-pool-name |
ipv6-prefix ipv6-prefix prefix-length |
3. Configure authorization { primary-dns | secondary-dns } By default, no authorization
attributes for the user { ip ipv4-address | ipv6 attribute is configured for a user
group. ipv6-address } | group.
sslvpn-policy-group group-name |
url url-string | user-profile
profile-name | vlan vlan-id |
vpn-instance vpn-instance-name |
work-directory directory-name } *
• Set the password aging time:
password-control aging
aging-time
• Set the minimum password
length:
password-control length
length
• Configure the password
composition policy:
password-control
composition type-number By default, the user group uses
4. (Optional.) Configure type-number [ type-length the global password control
password control attributes type-length ] settings. For more information,
for the user group. • Configure the password see "Configuring password
complexity checking policy: control."
password-control complexity
{ same-character |
user-name } check
• Configure the maximum login
attempts and the action to take
for login failures:
password-control
login-attempt login-times
[ exceed { lock | lock-time time
| unlock } ]
Task Command
display local-user [ class { manage | network } | idle-cut { disable |
Display the local user
enable } | service-type { advpn | ftp | http | https | ipoe | lan-access |
configuration and online user
pad | portal | ppp | ssh | sslvpn | telnet | terminal } | state { active |
statistics.
block } | user-name user-name | vlan vlan-id ]
Display the user group
display user-group [ group-name ]
configuration.
24
Configuring RADIUS schemes
A RADIUS scheme specifies the RADIUS servers that the device can work with and defines a set of
parameters. The device uses the parameters to exchange information with the RADIUS servers,
including the server IP addresses, UDP port numbers, shared keys, and server types.
Configuration task list
Tasks at a glance
(Optional.) Configuring a test profile for RADIUS server status detection
(Required.) Creating a RADIUS scheme
(Required.) Specifying the RADIUS authentication servers
(Optional.) Specifying the RADIUS accounting servers and the relevant parameters
(Optional.) Specifying the shared keys for secure RADIUS communication
(Optional.) Specifying a VPN for the scheme
(Optional.) Setting the username format and traffic statistics units
(Optional.) Setting the maximum number of RADIUS request transmission attempts
(Optional.) Setting the status of RADIUS servers
(Optional.) Specifying the source IP address for outgoing RADIUS packets
(Optional.) Setting RADIUS timers
(Optional.) Enabling the accounting-on feature
(Optional.) Enabling the extended accounting-on feature
(Optional.) Configuring the IP addresses of the security policy servers
(Optional.) Interpreting the RADIUS class attribute as CAR parameters
(Optional.) Configuring the Login-Service attribute check method for SSH, FTP, and terminal users
(Optional.) Setting the data measurement unit for the Remanent_Volume attribute
(Optional.) Specifying a HUAWEI attribute version for interpretation of HUAWEI RADIUS attributes 26-1 and
26-4
(Optional.) Enabling SNMP notifications for RADIUS
(Optional.) Displaying and maintaining RADIUS
25
The device stops detecting the status of the RADIUS server when one of the following operations is
performed:
• The RADIUS server is removed from the RADIUS scheme.
• The test profile configuration is removed for the RADIUS server in RADIUS scheme view.
• The test profile is deleted.
• The RADIUS server is manually set to the blocked state.
• The RADIUS scheme is deleted.
To configure a test profile for RADIUS server status detection:
26
Step Command Remarks
• Specify the primary RADIUS
authentication server:
primary authentication By default, no authentication
{ ipv4-address | ipv6 server is specified.
ipv6-address } [ port-number |
key { cipher | simple } string | To support server status detection,
test-profile profile-name | specify an existing test profile for
vpn-instance the RADIUS authentication server.
3. Specify RADIUS vpn-instance-name ] * If the test profile does not exist, the
device cannot detect the server
authentication servers. • Specify a secondary RADIUS
status.
authentication server:
secondary authentication Two authentication servers in a
{ ipv4-address | ipv6 scheme, primary or secondary,
ipv6-address } [ port-number | cannot have the same
key { cipher | simple } string | combination of IP address, port
test-profile profile-name | number, and VPN.
vpn-instance
vpn-instance-name ] *
27
Step Command Remarks
4. (Optional.) Set the maximum
number of real-time retry realtime-accounting retry-times The default setting is 5.
accounting attempts.
28
Step Command Remarks
1. Enter system view. system-view N/A
29
• The search process continues until the device finds an available secondary server or has
checked all secondary servers in active state. If no server is available, the device considers the
authentication or accounting attempt a failure.
• When the quiet timer of a server expires or you manually set the server to the active state, the
status of the server changes back to active. The device does not check the server again during
the authentication or accounting process.
• When you remove a server in use, communication with the server times out. The device looks
for a server in active state by first checking the primary server, and then checking secondary
servers in the order they are configured.
• When all servers are in blocked state, the device only tries to communicate with the primary
server.
• When one or more servers are in active state, the device tries to communicate with these active
servers only, even if the servers are unavailable.
• When a RADIUS server's status changes automatically, the device changes this server's status
accordingly in all RADIUS schemes in which this server is specified.
• When a RADIUS server is manually set to blocked, server detection is disabled for the server,
regardless of whether a test profile has been specified for the server. When the RADIUS server
is set to active state, server detection is enabled for the server on which an existing test profile
is specified.
By default, the device sets the status of all RADIUS servers to active. However, in some situations,
you must change the status of a server. For example, if a server fails, you can change the status of
the server to blocked to avoid communication attempts to the server.
To set the status of RADIUS servers:
30
receiving a RADIUS packet, a RADIUS server checks whether the source IP address of the packet is
the IP address of a managed NAS.
• If it is the IP address of a managed NAS, the server processes the packet.
• If it is not the IP address of a managed NAS, the server drops the packet.
The source address of outgoing RADIUS packets is typically the IP address of an egress interface on
the NAS to communicate with the RADIUS server. However, in some situations, you must change
the source IP address. For example, when VRRP is configured for stateful failover, configure the
virtual IP of the uplink VRRP group as the source address.
You can specify a source IP address for outgoing RADIUS packets in RADIUS scheme view or in
system view.
• The IP address specified in RADIUS scheme view applies only to one RADIUS scheme.
• The IP address specified in system view applies to all RADIUS schemes whose servers are in a
VPN or the public network.
Before sending a RADIUS packet, the NAS selects a source IP address in the following order:
1. The source IP address specified for the RADIUS scheme.
2. The source IP address specified in system view for the VPN or public network, depending on
where the RADIUS server resides.
3. The IP address of the outbound interface specified by the route.
To specify a source IP address for all RADIUS schemes in a VPN or the public network:
2. Specify a source IP address radius nas-ip { ipv4-address | By default, the IP address of the
for outgoing RADIUS ipv6 ipv6-address } RADIUS packet outbound
packets. [ vpn-instance interface is used as the source IP
vpn-instance-name ] address.
31
• Real-time accounting timer (realtime-accounting)—Defines the interval at which the device
sends real-time accounting packets to the RADIUS accounting server for online users.
When you set RADIUS timers, follow these guidelines:
• When you configure the maximum number of RADIUS packet transmission attempts and the
RADIUS server response timeout timer, consider the number of secondary servers. If the
retransmission process takes too much time, the client connection in the access module (for
example, Telnet) might time out during the process.
• When a number of secondary servers are configured, the client connections of access modules
that have a short client connection timeout period might still be timed out during initial
authentication or accounting, even if the packet transmission attempt limit and server response
timeout period are configured with small values. However, the next authentication or accounting
attempt can succeed, because the device has set the unreachable servers to blocked, which
shortens the amount of time for finding a reachable server.
• Make sure the server quiet timer is set correctly. A timer that is too short might result in frequent
authentication or accounting failures. This is because the device will continue to attempt to
communicate with an unreachable server that is in active state. A timer that is too long might
temporarily block a reachable server that has recovered from a failure. This is because the
server will remain in blocked state until the timer expires.
• A short real-time accounting interval helps improve accounting precision but requires many
system resources. When there are 1000 or more users, set the interval to 15 minutes or longer.
To set RADIUS timers:
32
Step Command Remarks
33
Step Command Remarks
1. Enter system view. system-view N/A
Configuring the Login-Service attribute check method for SSH, FTP, and terminal users
The device supports the following check methods for the Login-Service attribute (RADIUS attribute
15) of SSH, FTP, and terminal users:
• Strict—Matches Login-Service attribute values 50, 51, and 52 for SSH, FTP, and terminal
services, respectively.
• Loose—Matches the standard Login-Service attribute value 0 for SSH, FTP, and terminal
services.
An Access-Accept packet received for a user must contain the matching attribute value. Otherwise,
the user cannot log in to the device.
Use the loose check method only when the server does not issue Login-Service attribute values 50,
51, and 52 for SSH, FTP, and terminal users.
To configure the Login-Service attribute check method for SSH, FTP, and terminal users:
34
Specifying a HUAWEI attribute version for interpretation of HUAWEI RADIUS attributes 26-1
and 26-4
Configure the device to interpret HUAWEI RADIUS attributes 26-1 and 26-4 based on the following
attribute versions:
• Version 1.0—Interprets attribute 26-1 as the input peak rate in bps and attribute 26-4 as the
output peak rate in bps.
• Version 1.1—Interprets attribute 26-1 as the input committed burst size in bits and attribute
26-4 as the output committed burst size in bits.
For the device to correctly interpret attributes 26-1 and 26-4, the specified attribute version must
match the version of the RADIUS server.
To specify a HUAWEI attribute version for the device to interpret attributes 26-1 and 26-4:
Task Command
Display the RADIUS scheme
display radius scheme [ radius-scheme-name ]
configuration.
Display RADIUS packet statistics. display radius statistics
35
Task Command
Clear RADIUS statistics. reset radius statistics
Tasks at a glance
(Required.) Creating an HWTACACS scheme
(Required.) Specifying the HWTACACS authentication servers
(Optional.) Specifying the HWTACACS authorization servers
(Optional.) Specifying the HWTACACS accounting servers
(Required.) Specifying the shared keys for secure HWTACACS communication
(Optional.) Specifying a VPN for the scheme
(Optional.) Setting the username format and traffic statistics units
(Optional.) Specifying the source IP address for outgoing HWTACACS packets
(Optional.) Setting HWTACACS timers
(Optional.) Displaying and maintaining HWTACACS
36
Step Command Remarks
• Specify the primary HWTACACS
authentication server:
primary authentication
{ ipv4-address | ipv6 ipv6-address }
[ port-number | key { cipher |
By default, no authentication
simple } string |
server is specified.
single-connection | vpn-instance
3. Specify HWTACACS vpn-instance-name ] * Two HWTACACS authentication
authentication servers. • Specify a secondary HWTACACS servers in a scheme, primary or
authentication server: secondary, cannot have the
secondary authentication same combination of IP address,
{ ipv4-address | ipv6 ipv6-address } port number, and VPN.
[ port-number | key { cipher |
simple } string |
single-connection | vpn-instance
vpn-instance-name ] *
37
If redundancy is not required, specify only the primary server. An HWTACACS server can function as
the primary accounting server of one scheme and as the secondary accounting server of another
scheme at the same time.
HWTACACS does not support accounting for FTP, SFTP, and SCP users.
To specify HWTACACS accounting servers for an HWTACACS scheme:
38
Step Command Remarks
1. Enter system view. system-view N/A
2. Enter HWTACACS scheme hwtacacs scheme
view. N/A
hwtacacs-scheme-name
39
Before sending an HWTACACS packet, the NAS selects a source IP address in the following order:
1. The source IP address specified for the HWTACACS scheme.
2. The source IP address specified in system view for the VPN or public network, depending on
where the HWTACACS server resides.
3. The IP address of the outbound interface specified by the route.
To specify a source IP address for all HWTACACS schemes of a VPN or the public network:
2. Specify a source IP address hwtacacs nas-ip { ipv4-address | By default, the IP address of the
for outgoing HWTACACS ipv6 ipv6-address } HWTACACS packet outbound
packets. [ vpn-instance interface is used as the source IP
vpn-instance-name ] address.
40
{ Changes the server status to blocked.
{ Starts a quiet timer for the server.
{ Tries to communicate with the next secondary server in active state that has the highest
priority.
• The search process continues until the device finds an available secondary server or has
checked all secondary servers in active state. If no server is available, the device considers the
authentication, authorization, or accounting attempt a failure.
• When the quiet timer of a server expires, the status of the server changes back to active. The
device does not check the server again during the authentication, authorization, or accounting
process.
• When you remove a server in use, communication with the server times out. The device looks
for a server in active state by first checking the primary server, and then checking secondary
servers in the order they are configured.
• When all servers are in blocked state, the device only tries to communicate with the primary
server.
• When one or more servers are in active state, the device tries to communicate with these
servers only, even if they are unavailable.
• When an HWTACACS server's status changes automatically, the device changes this server's
status accordingly in all HWTACACS schemes in which this server is specified.
To set HWTACACS timers:
5. Set the server quiet timer. By default, the server quiet timer
timer quiet minutes
is 5 minutes.
Task Command
Display the configuration or server display hwtacacs scheme [ hwtacacs-server-name
statistics of HWTACACS schemes. [ statistics ]
reset hwtacacs statistics { accounting | all | authentication |
Clear HWTACACS statistics.
authorization }
41
Configuring LDAP schemes
Configuration task list
Tasks at a glance
Configuring an LDAP server:
• (Required.) Creating an LDAP server
• (Required.) Configuring the IP address of the LDAP server
• (Optional.) Specifying the LDAP version
• (Optional.) Setting the LDAP server timeout period
• (Required.) Configuring administrator attributes
• (Required.) Configuring LDAP user attributes
(Optional.) Configuring an LDAP attribute map
(Required.) Creating an LDAP scheme
(Required.) Specifying the LDAP authentication server
(Optional.) Specifying the LDAP authorization server
(Optional.) Specifying an LDAP attribute map for LDAP authorization
(Optional.) Displaying and maintaining LDAP
42
Step Command Remarks
2. Enter LDAP server view. ldap server server-name N/A
By default, LDAPv3 is used.
3. Specify the LDAP version. protocol-version { v2 | v3 } A Microsoft LDAP server supports
only LDAPv3.
43
• Username format.
• User object class.
If the LDAP server contains many directory levels, a user DN search starting from the root directory
can take a long time. To improve efficiency, you can change the start point by specifying the search
base DN.
To configure LDAP user attributes:
44
Step Command Remarks
map ldap-attribute By default, a new LDAP attribute
3. Configure a mapping ldap-attribute-name [ prefix map does not have a mapping entry.
entry. prefix-value delimiter
delimiter-value ] aaa-attribute Repeat this command to configure
{ user-group | user-profile } multiple mapping entries.
45
Displaying and maintaining LDAP
Execute the display command in any view.
Task Command
Display the configuration of LDAP schemes. display ldap scheme [ scheme-name ]
Configuration prerequisites
To use local authentication for users in an ISP domain, configure local user accounts on the device
first. See "Configuring local user attributes."
To use remote authentication, authorization, and accounting, create the required RADIUS,
HWTACACS, or LDAP schemes. For more information about the scheme configuration, see
"Configuring RADIUS schemes," "Configuring HWTACACS schemes," and "Configuring LDAP
schemes."
NOTE:
Support for the authentication domain configuration depends on the access module. You can
specify an authentication domain for 802.1X, portal, or MAC authentication.
When you configure an ISP domain, follow these restrictions and guidelines:
46
• An ISP domain cannot be deleted when it is the default ISP domain. Before you use the undo
domain command, change the domain to a non-default ISP domain by using the undo domain
default enable command.
• You can modify the settings of the system-defined ISP domain system, but you cannot delete
the domain.
• An ISP domain cannot be deleted when it accommodates users who are assigned to
nonexistent domains. Before you use the undo domain command, restore the default setting
of the ISP domain by using the undo domain if-unknown command.
To create an ISP domain:
47
{ Authorization session group profile—The device restricts authenticated users' behaviors
based on the settings in the authorization session group profile. For portal users, the
authorization session group profile can be configured in a preauthentication domain to
restrict user behaviors before users pass authentication.
{ Authorization IPv6 address prefix—The device authorizes the IPv6 address prefix to
authenticated IPoE or PPP users in the domain.
{ IPv6 address pool—The device assigns IPv6 addresses from the pool to authenticated
IPoE, portal, or PPP users in the domain.
{ DNS server address—The attribute specifies the DNS server that offers DNS services to
the authenticated PPP users in the domain.
{ Redirect URL—The device redirects PPP users in the domain to the URL after they pass
authentication.
{ Authorization user group—Authenticated users in the domain obtain all attributes of the
user group.
{ Authorization VPN instance—The device allows authenticated PPP and IPoE users in the
domain to access network resources in the authorization VPN.
{ Maximum number of multicast groups—The attribute restricts the maximum number of
multicast groups that an authenticated IPoE, portal, or PPP user can join concurrently.
• User online duration including idle cut period—If a user goes offline due to connection
failure or malfunction, its online duration sent to the server includes the idle cut period or user
online detection period. The online duration that is generated on the server is longer than the
actual online duration of the user. The user online detection period is supported only by portal
authentication.
• ITA policy—The attribute allows the device to perform accounting at different charge rates for
user data based on destination addresses. The ITA policy assigned from an AAA server takes
precedence over the ITA policy in an ISP domain.
An ISP domain attribute applies to all users in the domain.
To configure ISP domain attributes:
48
Step Command Remarks
authorization-attribute { acl
acl-number | car inbound cir
committed-information-rate [ pir
peak-information-rate ] outbound
cir committed-information-rate
[ pir peak-information-rate ] |
idle-cut minute [ flow ] | igmp
max-access-number number |
ip-pool pool-name | ipv6-pool
4. Configure authorization ipv6-pool-name | ipv6-prefix By default, the authorization
attributes for authenticated ipv6-prefix prefix-length | mld attributes are not configured and
users in the ISP domain. max-access-number number | the idle cut function is disabled.
{ primary-dns | secondary-dns }
{ ip ipv4-address | ipv6
ipv6-address } |
session-group-profile
session-group-profile-name | url
url-string | user-group
user-group-name | user-profile
profile-name | vpn-instance
vpn-instance-name }
5. Configure the device to
include the idle cut period or By default, the user online
user online detection period duration sent to the server does
session-time include-idle-time
in the user online duration to not include the idle cut period or
be sent to the server. user online detection period.
user-address-type { ds-lite |
6. Specify the user address ipv6 | nat64 | private-ds | By default, no user address type is
type in the ISP domain. private-ipv4 | public-ds | specified.
public-ipv4 }
7. Specify the service type for
users in the ISP domain. service-type { hsi | stb | voip } By default, the service type is hsi.
49
the RADIUS server for role authentication. The variable n represents a user role level. For more
information about user role authentication, see Fundamentals Configuration Guide.
Configuration procedure
To configure authentication methods for an ISP domain:
50
Step Command Remarks
By default, the default
10. Specify the authentication authentication sslvpn { ldap-scheme authentication method is
method for SSL VPN ldap-scheme-name [ local ] [ none ] | local used for SSL VPN users.
users. [ none ] | none | radius-scheme
radius-scheme-name [ local ] [ none ] } The none keyword is not
supported in FIPS mode.
51
Step Command Remarks
By default, the default
authorization command authorization method is used
5. Specify the command { hwtacacs-scheme for command authorization.
authorization method. hwtacacs-scheme-name [ local [ none ] |
local [ none ] | none } The none keyword is not
supported in FIPS mode.
By default, the default
authorization ipoe { local [ none ] | none authorization method is used
6. Specify the authorization for IPoE users.
method for IPoE users. | radius-scheme radius-scheme-name
[ local ] [ none ] } The none keyword is not
supported in FIPS mode.
By default, the default
authorization lan-access { local [ none ] authorization method is used
7. Specify the authorization for LAN users.
method for LAN users. | none | radius-scheme
radius-scheme-name [ local ] [ none ] } The none keyword is not
supported in FIPS mode.
authorization login { hwtacacs-scheme
hwtacacs-scheme-name By default, the default
[ radius-scheme radius-scheme-name ] authorization method is used
8. Specify the authorization [ local ] [ none ] | local [ none ] | none | for login users.
method for login users. radius-scheme radius-scheme-name
[ hwtacacs-scheme The none keyword is not
hwtacacs-scheme-name ] [ local ] supported in FIPS mode.
[ none ] }
By default, the default
authorization portal { local [ none ] | authorization method is used
9. Specify the authorization for portal users.
method for portal users. none | radius-scheme
radius-scheme-name [ local ] [ none ] } The none keyword is not
supported in FIPS mode.
authorization ppp { hwtacacs-scheme
hwtacacs-scheme-name By default, the default
[ radius-scheme radius-scheme-name ] authorization method is used
10. Specify the authorization [ local ] [ none ] | local [ none ] | none | for PPP users.
method for PPP users. radius-scheme radius-scheme-name
[ hwtacacs-scheme The none keyword is not
hwtacacs-scheme-name ] [ local ] supported in FIPS mode.
[ none ] }
By default, the default
11. Specify the authorization authorization sslvpn { ldap-scheme authorization method is used
method for SSL VPN ldap-scheme-name [ local ] [ none ] | for SSL VPN users.
users. local [ none ] | none | radius-scheme
radius-scheme-name [ local ] [ none ] } The none keyword is not
supported in FIPS mode.
52
Configuration guidelines
When configuring accounting methods, follow these guidelines:
• FTP, SFTP, and SCP users do not support accounting.
• Local accounting does not provide statistics for charging. It only counts and controls the number
of concurrent users who use the same local user account. The threshold is configured by using
the access-limit command.
Configuration procedure
To configure accounting methods for an ISP domain:
53
Step Command Remarks
accounting portal { broadcast By default, the default
radius-scheme radius-scheme-name1 accounting method is used
9. Specify the accounting radius-scheme radius-scheme-name2 for portal users.
method for portal users. [ local ] [ none ] | local [ none ] | none |
radius-scheme radius-scheme-name The none keyword is not
[ local ] [ none ] } supported in FIPS mode.
54
Configuring the RADIUS DAE server feature
Dynamic Authorization Extensions (DAE) to RADIUS, defined in RFC 5176, can log off online users
or change their authorization information. DAE uses the client/server model.
In a RADIUS network, the RADIUS server typically acts as the DAE client and the NAS acts as the
DAE server.
When the RADIUS DAE server feature is enabled, the NAS performs the following operations:
1. Listens to the default or specified UDP port to receive DAE requests.
2. Logs off online users who match the criteria in the requests, or changes their authorization
information.
3. Sends DAE responses to the DAE client.
DAE defines the following types of packets:
• Disconnect Messages (DMs)—The DAE client sends DM requests to the DAE server to log off
specific online users.
• Change of Authorization Messages (CoA Messages)—The DAE client sends CoA requests
to the DAE server to change the authorization information of specific online users.
To configure the RADIUS DAE server feature:
55
Setting the maximum number of concurrent login
users
Perform this task to set the maximum number of concurrent users who can log on to the device
through a specific protocol, regardless of their authentication methods. The authentication methods
include no authentication, local authentication, and remote authentication.
To set the maximum number of concurrent login users:
56
Step Command Remarks
2. Create an ITA policy and
enter ITA policy view. ita policy policy-name By default, no ITA policy exists.
4. Specify a traffic level for ITA accounting-level level { ipv4 | By default, no traffic level is
accounting. ipv6 } specified for ITA accounting.
57
• Common—The Acct-Session-Id is a string of 38 characters. The string contains the
session-id-prefix, date and time, serial number, LIP address of the access node, device ID, and
the process job ID.
• Simplified—The Acct-Session-Id is a string of 16 characters. The string contains the
session-id-prefix, month, serial number, LIP address of the access node, device ID, and the
process job ID.
Configure the Acct-Session-Id format depending on the server model. For example, the AsiaInfo
server supports only the 16-character Acct-Session-Id, so you must specify the simplified format on
the device to work with the server.
To configure the Acct-Session-Id format:
Task Command
Display the configuration of ISP domains. display domain [ isp-name ]
58
Figure 12 Network diagram
Configuration procedure
1. Configure the RADIUS server on IMC 5.0:
NOTE:
In this example, the RADIUS server runs on IMC PLAT 5.0 (E0101) and IMC UAM 5.0 (E0101).
59
Figure 13 Adding the router as an access device
NOTE:
The IP address range must contain the IP address of the router.
60
Figure 14 Adding an account for device management
61
# Create a RADIUS scheme.
[Router] radius scheme rad
# Specify the primary authentication server.
[Router-radius-rad] primary authentication 10.1.1.1 1812
# Set the shared key for secure communication with the server to expert in plain text.
[Router-radius-rad] key authentication simple expert
# Include domain names in the usernames sent to the RADIUS server.
[Router-radius-rad] user-name-format with-domain
[Router-radius-rad] quit
# Create ISP domain bbb and configure authentication, authorization, and accounting methods
for login users. Because RADIUS user authorization information is piggybacked in
authentication responses, the authentication and authorization methods must use the same
RADIUS scheme.
[Router] domain bbb
[Router-isp-bbb] authentication login radius-scheme rad
[Router-isp-bbb] authorization login radius-scheme rad
[Router-isp-bbb] accounting login none
[Router-isp-bbb] quit
Configuration procedure
# Configure the IP address of interface GigabitEthernet 2/0/1, through which the SSH user accesses
the router.
<Router> system-view
[Router] interface gigabitethernet 2/0/1
[Router-GigabitEthernet2/0/1] ip address 192.168.1.70 255.255.255.0
[Router-GigabitEthernet2/0/1] quit
62
# Enable the SSH service.
[Router] ssh server enable
# Enable scheme authentication for user lines VTY 0 through VTY 63.
[Router] line vty 0 63
[Router-line-vty0-63] authentication-mode scheme
[Router-line-vty0-63] quit
# Set a password for the local user to 123456TESTplat&! in plain text. In FIPS mode, you must set
the password in interactive mode.
[Router-luser-manage-ssh] password simple 123456TESTplat&!
# Create ISP domain bbb and configure the domain to use local authentication and authorization for
login users.
[Router] domain bbb
[Router-isp-bbb] authentication login local
[Router-isp-bbb] authorization login local
[Router-isp-bbb] quit
63
Figure 16 Network diagram
Configuration procedure
1. Configure the HWTACACS server:
# Set the shared keys for secure communication with the router to expert. (Details not shown.)
# Add an account for the SSH user and specify the password. (Details not shown.)
2. Configure the router:
# Create an HWTACACS scheme.
<Router> system-view
[Router] hwtacacs scheme hwtac
# Specify the primary authentication server.
[Router-hwtacacs-hwtac] primary authentication 10.1.1.1 49
# Specify the primary authorization server.
[Router-hwtacacs-hwtac] primary authorization 10.1.1.1 49
# Specify the primary accounting server.
[Router-hwtacacs-hwtac] primary accounting 10.1.1.1 49
# Set the shared keys for secure HWTACACS communication to expert in plain text.
[Router-hwtacacs-hwtac] key authentication simple expert
[Router-hwtacacs-hwtac] key authorization simple expert
[Router-hwtacacs-hwtac] key accounting simple expert
# Exclude domain names from the usernames sent to the HWTACACS server.
[Router-hwtacacs-hwtac] user-name-format without-domain
[Router-hwtacacs-hwtac] quit
# Create an ISP domain and configure the domain to use the HWTACACS scheme for
authentication, authorization, and accounting of login users.
[Router] domain bbb
[Router-isp-bbb] authentication login hwtacacs-scheme hwtac
[Router-isp-bbb] authorization login hwtacacs-scheme hwtac
[Router-isp-bbb] accounting login hwtacacs-scheme hwtac
[Router-isp-bbb] quit
# Create local RSA and DSA key pairs.
[Router] public-key local create rsa
[Router] public-key local create dsa
# Enable the SSH service.
[Router] ssh server enable
# Enable the default user role feature to assign authenticated SSH users the default user role
network-operator.
64
[Router] role default-role enable
# Enable scheme authentication for user lines VTY 0 through VTY 63.
[Router] line vty 0 63
[Router-line-vty0-63] authentication-mode scheme
[Router-line-vty0-63] quit
# Configure the IP address of interface GigabitEthernet 2/0/1, through which the SSH user
accesses the router.
[Router] interface gigabitethernet 2/0/1
[Router-GigabitEthernet2/0/1] ip address 192.168.1.70 255.255.255.0
[Router-GigabitEthernet2/0/1] quit
# Configure the IP address of interface GigabitEthernet 2/0/2, through which the router is
connected to the server.
[Router] interface gigabitethernet 2/0/2
[Router-GigabitEthernet2/0/2] ip address 10.1.1.2 255.255.255.0
[Router-GigabitEthernet2/0/2] quit
Configuration procedure
1. Configure the LDAP server:
65
NOTE:
In this example, the LDAP server runs Microsoft Windows 2003 Server Active Directory.
f. In the dialog box, enter the password ldap!123456, select options as needed, and click
Next.
66
Figure 19 Setting the user's password
g. Click OK.
# Add user aaa to group Users.
a. From the navigation tree, click Users under the ldap.com node.
b. In the right pane, right-click the user aaa and select Properties.
c. In the dialog box, click the Member Of tab and click Add.
67
Figure 20 Modifying user properties
d. In the Select Groups dialog box, enter Users in the Enter the object names to select field,
and click OK.
User aaa is added to group Users.
Figure 21 Adding user aaa to group Users
68
# Configure the IP address of interface GigabitEthernet 2/0/1, through which the SSH user
accesses the router.
<Router> system-view
[Router] interface gigabitethernet 2/0/1
[Router-GigabitEthernet2/0/1] ip address 192.168.1.20 24
[Router-GigabitEthernet2/0/1] quit
# Configure the IP address of interface GigabitEthernet 2/0/2, through which the router
communicates with the server.
[Router] interface gigabitethernet 2/0/2
[Router-GigabitEthernet2/0/2] ip address 10.1.1.2 255.255.255.0
[Router-GigabitEthernet2/0/2] quit
# Create the local DSA key pair and RSA key pairs.
[Router] public-key local create dsa
[Router] public-key local create rsa
# Enable the SSH service.
[Router] ssh server enable
# Enable scheme authentication for user lines VTY 0 through VTY 63.
[Router] line vty 0 63
[Router-line-vty0-63] authentication-mode scheme
[Router-line-vty0-63] quit
# Enable the default user role feature to assign authenticated SSH users the default user role
network-operator.
[Router] role default-role enable
# Configure an LDAP server.
[Router] ldap server ldap1
# Specify the IP address of the LDAP authentication server.
[Router-ldap-server-ldap1] ip 10.1.1.1
# Specify the administrator DN.
[Router-ldap-server-ldap1] login-dn cn=administrator,cn=users,dc=ldap,dc=com
# Specify the administrator password.
[Router-ldap-server-ldap1] login-password simple admin!123456
# Configure the base DN for user search.
[Router-ldap-server-ldap1] search-base-dn dc=ldap,dc=com
[Router-ldap-server-ldap1] quit
# Create an LDAP scheme.
[Router] ldap scheme ldap1-shml
# Specify the LDAP authentication server.
[Router-ldap-ldap-shml] authentication-server ldap1
[Router-ldap-ldap1-shml] quit
# Create ISP domain bbb and configure the authentication, authorization, and accounting
methods for login users.
[Router] domain bbb
[Router-isp-bbb] authentication login ldap-scheme ldap1-shml
[Router-isp-bbb] authorization login none
[Router-isp-bbb] accounting login none
[Router-isp-bbb] quit
69
Verifying the configuration
# Initiate an SSH connection to the router, and enter the username aaa@bbb and password
ldap!123456. The user logs in to the router. (Details not shown.)
# Verify that the user can use the commands permitted by the network-operator user role. (Details
not shown.)
Configuration procedure
1. Configure the LDAP server:
NOTE:
In this example, the LDAP server runs Microsoft Windows 2003 Server Active Directory.
70
Figure 23 Adding user aaa
f. In the dialog box, enter the password ldap!123456, select options as needed, and click
Next.
Figure 24 Setting the user's password
g. Click OK.
# Add user aaa to group Users.
a. From the navigation tree, click Users under the ldap.com node.
b. In the right pane, right-click the user aaa and select Properties.
c. In the dialog box, click the Member Of tab and click Add.
71
Figure 25 Modifying user properties
d. In the Select Groups dialog box, enter Users in the Enter the object names to select field,
and click OK.
User aaa is added to group Users.
Figure 26 Adding user aaa to group Users
72
# Configure the IP address of interface GigabitEthernet 2/0/1, which is connected to the SSL
VPN user.
<Router> system-view
[Router] interface gigabitethernet 2/0/1
[Router-GigabitEthernet2/0/1] ip address 192.168.1.70 24
[Router-GigabitEthernet2/0/1] quit
# Configure the IP address of interface GigabitEthernet 2/0/2, which is connected to the LDAP
server.
[Router] interface gigabitethernet 2/0/2
[Router-GigabitEthernet2/0/2] ip address 10.1.1.2 24
[Router-GigabitEthernet2/0/2] quit
# Create PKI domain sslvpn and obtain the CA and local certificates (see "Configuring PKI").
(Details not shown.)
# Create SSL server policy myssl.
[Router] ssl server-policy myssl
# Specify PKI domain sslvpn for the SSL server policy.
[Router-server-policy-myssl] pki-domain sslvpn
[Router-server-policy-myssl] quit
# Set the SSL VPN gateway name to g1.
[Router] sslvpn gateway g1
# Specify SSL server policy myssl for the SSL VPN gateway.
[Router-gateway-g1] ssl server-policy myssl
# Set the gateway IP address to 192.168.1.70 and port number to 8080.
[Router-gateway-g1] ip address 192.168.1.70 port 8080
# Enable the SSL VPN gateway.
[Router-gateway-g1] service enable
[Router-gateway-g1] quit
# Create SSL VPN context aaa.
[Router] sslvpn context aaa
# Specify gateway g1 for the SSL VPN context.
[Router-sslvpn-context-aaa] gateway g1
# Specify domain bbb for authentication, authorization, and accounting of SSL VPN users in
the context.
[Router-sslvpn-context-aaa] aaa domain bbb
# Create SSL VPN policy group pg1.
[Router-sslvpn-context-aaa] policy-group pg1
# Set the connection idle timeout timer to 120 seconds.
[Router-sslvpn-context-aaa-policy-group-pg1] timeout idle 120
[Router-sslvpn-context-aaa-policy-group-pg1] quit
# Enable the SSL VPN context.
[Router-sslvpn-context-aaa] service enable
# Configure an LDAP server.
[Router] ldap server ldap1
# Specify the IP address of the LDAP server.
[Router-ldap-server-ldap1] ip 10.1.1.1
# Specify the administrator DN.
[Router-ldap-server-ldap1] login-dn cn=administrator,cn=users,dc=ldap,dc=com
73
# Specify the administrator password.
[Router-ldap-server-ldap1] login-password simple admin!123456
# Configure the base DN for user search.
[Router-ldap-server-ldap1] search-base-dn dc=ldap,dc=com
[Router-ldap-server-ldap1] quit
# Create LDAP attribute map test.
[Router] ldap attribute-map test
# Map a partial value string of the LDAP attribute named memberof to AAA attribute named
user-group.
[Router-ldap-attr-map-test] map ldap-attribute memberof prefix cn= delimiter ,
aaa-attribute user-group
[Router-ldap-attr-map-test] quit
# Create an LDAP scheme.
[Router] ldap scheme shml
# Specify the LDAP authentication and authorization servers.
[Router-ldap-shml] authentication-server ldap1
[Router-ldap-shml] authorization-server ldap1
# Specify LDAP attribute map test.
[Router-ldap-shml] attribute-map test
[Router-ldap-shml] quit
# Create ISP domain bbb, and configure the authentication, authorization, and accounting
methods for SSL VPN users.
[Router] domain bbb
[Router-isp-bbb] authentication sslvpn ldap-scheme shml
[Router-isp-bbb] authorization sslvpn ldap-scheme shml
[Router-isp-bbb] accounting sslvpn none
[Router-isp-bbb] quit
# Create user group users, and authorize SSL VPN policy group pg1 to the group.
[Router] user-group users
[Router-ugroup-users] authorization-attribute sslvpn-policy-group pg1
[Router-ugroup-users] quit
74
AAA for PPP users by an HWTACACS server
Network requirements
As shown in Figure 27:
• Router A uses the HWTACACS server to perform PAP authentication for users from Router B.
• The HWTACACS server is also the authorization server and accounting server of Router B.
• Router B does not provide authentication, authorization, or accounting for users from Router A.
Figure 27 Network diagram
Configuration procedure
1. Configure the HWTACACS server (details not shown):
a. Set the shared keys for secure communication with Router A to expert.
b. Add a user account userb for the PPP users from Router B.
c. Specify the password as passb.
2. Configure Router A:
# Create an HWTACACS scheme.
<RouterA> system-view
[RouterA] hwtacacs scheme hwtac
# Configure the primary HWTACACS server at 10.1.1.1. Set the authentication, authorization,
and accounting ports to 49. Configure the router to establish only one TCP connection with the
server.
[RouterA-hwtacacs-hwtac] primary authentication 10.1.1.1 49 single-connection
[RouterA-hwtacacs-hwtac] primary authorization 10.1.1.1 49 single-connection
[RouterA-hwtacacs-hwtac] primary accounting 10.1.1.1 49 single-connection
# Set the shared keys for authentication, authorization, and accounting to expert.
[RouterA-hwtacacs-hwtac] key authentication simple expert
[RouterA-hwtacacs-hwtac] key authorization simple expert
[RouterA-hwtacacs-hwtac] key accounting simple expert
# Exclude domain names from the usernames sent to the HWTACACS server.
[RouterA-hwtacacs-hwtac] user-name-format without-domain
[RouterA-hwtacacs-hwtac] quit
# Create ISP domain bbb and configure the domain to use the HWTACACS scheme for
authentication, authorization, and accounting for PPP users.
[RouterA] domain bbb
[RouterA-isp-bbb] authentication ppp hwtacacs-scheme hwtac
[RouterA-isp-bbb] authorization ppp hwtacacs-scheme hwtac
75
[RouterA-isp-bbb] accounting ppp hwtacacs-scheme hwtac
[RouterA-isp-bbb] quit
# Enable PPP encapsulation on Serial 2/2/0.
[RouterA] interface serial 2/2/0
[RouterA-Serial2/2/0] link-protocol ppp
# Configure interface Serial 2/2/0 to authenticate the peer by using PAP in authentication
domain bbb.
[RouterA-Serial2/2/0] ppp authentication-mode pap domain bbb
# Configure the IP address of interface Serial 2/2/0.
[RouterA-Serial2/2/0] ip address 200.1.1.1 24
[RouterA-Serial2/2/0] quit
3. Configure Router B:
# Enable PPP encapsulation on Serial 2/2/0.
<RouterB> system-view
[RouterB] interface serial 2/2/0
[RouterB-Serial2/2/0] link-protocol ppp
# Configure the local username and password for PAP authentication to userb and plaintext
passb, respectively.
[RouterB-Serial2/2/0] ppp pap local-user userb password simple passb
# Configure the IP address of interface Serial 2/2/0.
[RouterB-Serial2/2/0] ip address 200.1.1.2 24
[RouterB-Serial2/2/0] quit
Troubleshooting RADIUS
RADIUS authentication failure
Symptom
User authentication always fails.
Analysis
Possible reasons include:
• A communication failure exists between the NAS and the RADIUS server.
• The username is not in the userid@isp-name format, or the ISP domain is not correctly
configured on the NAS.
• The user is not configured on the RADIUS server.
• The password entered by the user is incorrect.
• The RADIUS server and the NAS are configured with different shared keys.
76
Solution
To resolve the problem:
1. Check the following items:
{ The NAS and the RADIUS server can ping each other.
{ The username is in the userid@isp-name format and the ISP domain is correctly configured
on the NAS.
{ The user is configured on the RADIUS server.
{ The correct password is entered.
{ The same shared key is configured on both the RADIUS server and the NAS.
2. If the problem persists, contact Hewlett Packard Enterprise Support.
77
Solution
To resolve the problem:
1. Check the following items:
{ The accounting port number is correctly configured.
{ The accounting server IP address is correctly configured on the NAS.
2. If the problem persists, contact Hewlett Packard Enterprise Support.
Troubleshooting HWTACACS
Similar to RADIUS troubleshooting. See "Troubleshooting RADIUS."
Troubleshooting LDAP
Symptom
User authentication fails.
Analysis
Possible reasons include:
• A communication failure exists between the NAS and the LDAP server.
• The LDAP server IP address or port number configured on the NAS is not correct.
• The username is not in the userid@isp-name format, or the ISP domain is not correctly
configured on the NAS.
• The user is not configured on the LDAP server.
• The password entered by the user is incorrect.
• The administrator DN or password is not configured.
• Some user attributes (for example, the username attribute) configured on the NAS are not
consistent with those configured on the server.
• No user search base DN is specified for the LDAP scheme.
Solution
To resolve the problem:
1. Check the following items:
{ The NAS and the LDAP server can ping each other.
{ The IP address and port number of the LDAP server configured on the NAS match those of
the server.
{ The username is in the correct format and the ISP domain for the user authentication is
correctly configured on the NAS.
{ The user is configured on the LDAP server.
{ The correct password is entered.
{ The administrator DN and the administrator password are correctly configured.
{ The user attributes (for example, the username attribute) configured on the NAS are
consistent with those configured on the LDAP server.
{ The user search base DN for authentication is specified.
2. If the problem persists, contact Hewlett Packard Enterprise Support.
78
802.1X overview
802.1X is a port-based network access control protocol initially proposed for securing WLANs. The
protocol has also been widely used on Ethernet networks for access control.
802.1X controls network access by authenticating the devices connected to 802.1X-enabled LAN
ports.
802.1X architecture
802.1X operates in the client/server model. As shown in Figure 28, 802.1X authentication includes
the following entities:
• Client (supplicant)—A user terminal seeking access to the LAN. The terminal must have
802.1X software to authenticate to the access device.
• Access device (authenticator)—Authenticates the client to control access to the LAN. In a
typical 802.1X environment, the access device uses an authentication server to perform
authentication.
• Authentication server—Provides authentication services for the access device. The
authentication server first authenticates 802.1X clients by using the data sent from the access
device. Then, the server returns the authentication results to the access device to make access
decisions. The authentication server is typically a RADIUS server. In a small LAN, you can use
the access device as the authentication server.
Figure 28 802.1X architecture
79
Figure 29 Authorization state of a controlled port
802.1X-related protocols
802.1X uses the Extensible Authentication Protocol (EAP) to transport authentication information for
the client, the access device, and the authentication server. EAP is an authentication framework that
uses the client/server model. The framework supports a variety of authentication methods, including
MD5-Challenge, EAP-Transport Layer Security (EAP-TLS), and Protected EAP (PEAP).
802.1X defines EAP over LAN (EAPOL) for passing EAP packets between the client and the access
device over a wired or wireless LAN. Between the access device and the authentication server,
802.1X delivers authentication information by using one of the following methods:
• Encapsulates EAP packets in RADIUS by using EAP over RADIUS (EAPOR), as described in
"EAP relay."
• Extracts authentication information from the EAP packets and encapsulates the information in
standard RADIUS packets, as described in "EAP termination."
Packet formats
EAP packet format
Figure 30 shows the EAP packet format.
Figure 30 EAP packet format
• Code—Type of the EAP packet. Options include Request (1), Response (2), Success (3), or
Failure (4).
• Identifier—Used for matching Responses with Requests.
• Length—Length (in bytes) of the EAP packet. The EAP packet length is the sum of the Code,
Identifier, Length, and Data fields.
80
• Data—Content of the EAP packet. This field appears only in a Request or Response EAP
packet. The Data field contains the request type (or the response type) and the type data. Type
1 (Identify) and type 4 (MD5-challenge) are two examples for the type field.
EAPOL packet format
Figure 31 shows the EAPOL packet format.
Figure 31 EAPOL packet format
0 7 15
Packet body
N
• PAE Ethernet type—Protocol type. It takes the value 0x888E for EAPOL.
• Protocol version—The EAPOL protocol version used by the EAPOL packet sender.
• Type—Type of the EAPOL packet. Table 4 lists the types of EAPOL packets supported by
Hewlett Packard Enterprise implementation of 802.1X.
Table 4 Types of EAPOL packets
• Length—Data length in bytes, or length of the Packet body. If packet type is EAPOL-Start or
EAPOL-Logoff, this field is set to 0, and no Packet body field follows.
• Packet body—Content of the packet. When the EAPOL packet type is EAP-Packet, the Packet
body field contains an EAP packet.
81
Figure 32 EAP-Message attribute format
Message-Authenticator
As shown in Figure 33, RADIUS includes the Message-Authenticator attribute in all packets that
have an EAP-Message attribute to check their integrity. The packet receiver drops the packet if the
calculated packet integrity checksum is different from the Message-Authenticator attribute value.
The Message-Authenticator prevents EAP authentication packets from being tampered with during
EAP authentication.
Figure 33 Message-Authenticator attribute format
82
• Multicast trigger mode—The access device multicasts Identity EAP-Request packets to
initiate 802.1X authentication at the identity request interval.
• Unicast trigger mode—Upon receiving a frame from an unknown MAC address, the access
device sends an Identity EAP-Request packet out of the receiving port to the MAC address. The
device retransmits the packet if no response has been received within the identity request
timeout interval. This process continues until the maximum number of request attempts set by
using the dot1x retry command is reached.
The username request timeout timer sets both the identity request interval for the multicast trigger
and the identity request timeout interval for the unicast trigger.
In EAP relay mode, the client must use the same authentication method as the RADIUS server.
On the access device, you only need to use the dot1x authentication-method eap command
to enable EAP relay.
• EAP termination mode.
As shown in Figure 35, the access device performs the following operations in EAP termination
mode:
a. Terminates the EAP packets received from the client.
b. Encapsulates the client authentication information in standard RADIUS packets.
c. Uses PAP or CHAP to authenticate to the RADIUS server.
Figure 35 EAP termination
83
Comparing EAP relay and EAP termination
Packet exchange
Benefits Limitations
method
• Supports various EAP The RADIUS server must support the
authentication methods. EAP-Message and
EAP relay • The configuration and Message-Authenticator attributes, and
processing are simple on the the EAP authentication method used by
access device. the client.
• Supports only the following EAP
authentication methods:
{ MD5-Challenge EAP
Works with any RADIUS server authentication.
EAP termination that supports PAP or CHAP { The username and password
authentication. EAP authentication initiated by
an HPE iNode 802.1X client.
• The processing is complex on the
access device.
EAP relay
Figure 36 shows the basic 802.1X authentication procedure in EAP relay mode, assuming that
EAP-MD5 is used.
84
Figure 36 802.1X authentication procedure in EAP relay mode
Client Device Authentication server
EAPOL EAPOR
(1) EAPOL-Start
(2) EAP-Request/Identity
Port authorized
(11) EAP-Request/Identity
(12) EAP-Response/Identity
...
(13) EAPOL-Logoff
Port unauthorized
(14) EAP-Failure
85
10. Upon receiving the RADIUS Access-Accept packet, the access device performs the following
operations:
a. Sends an EAP-Success packet to the client.
b. Sets the controlled port in authorized state.
The client can access the network.
11. After the client comes online, the access device periodically sends handshake requests to
check whether the client is still online. By default, if two consecutive handshake attempts fail,
the device logs off the client.
12. Upon receiving a handshake request, the client returns a response. If the client fails to return a
response after a number of consecutive handshake attempts (two by default), the access
device logs off the client. This handshake mechanism enables timely release of the network
resources used by 802.1X users who have abnormally gone offline.
13. The client can also send an EAPOL-Logoff packet to ask the access device for a logoff.
14. In response to the EAPOL-Logoff packet, the access device changes the status of the
controlled port from authorized to unauthorized. Then, the access device sends an EAP-Failure
packet to the client.
EAP termination
Figure 37 shows the basic 802.1X authentication procedure in EAP termination mode, assuming that
CHAP authentication is used.
86
Figure 37 802.1X authentication procedure in EAP termination mode
In EAP termination mode, the access device rather than the authentication server generates an MD5
challenge for password encryption. The access device then sends the MD5 challenge together with
the username and encrypted password in a standard RADIUS packet to the RADIUS server.
87
Configuring 802.1X
This chapter describes how to configure 802.1X on an HPE device. You can also configure the port
security feature to perform 802.1X. Port security combines and extends 802.1X and MAC
authentication. It applies to a network, a WLAN, for example, that requires different authentication
methods for different users on a port. For more information about the port security feature, see
"Configuring port security."
88
NOTE:
The access device converts VLAN names and VLAN group name into VLAN IDs before VLAN
assignment.
Types of authorized
VLAN selection and assignment rules
VLANs
The device selects a VLAN to be the authorization VLAN of a user,
depending on whether the port has other online users:
• If the port does not have other online users, the device selects the
VLAN with the lowest ID from the group of VLANs.
• VLANs by IDs • If the port has other online users, the device selects the VLAN by
• VLANs by names using the following process:
• VLAN group name a. The device selects the VLAN that has the fewest number of
online users.
b. If two VLANs have the same number of online 802.1X users, the
device selects the VLAN with the lower ID.
The device follows the rules in Table 6 to handle VLAN assignment.
1. The device selects the leftmost VLAN ID without a suffix, or the
leftmost VLAN ID suffixed by u as an untagged VLAN, whichever is
more leftmost.
2. The device assigns the untagged VLAN to the port as the PVID, and
it assigns the remaining as tagged VLANs. If no untagged VLAN is
VLAN IDs with suffixes assigned, the PVID of the port does not change. The port permits
traffic from these tagged and untagged VLANs to pass through.
For example, the authentication server sends the string 1u 2t 3 to the
access device for a user. The device assigns VLAN 1 as an untagged
VLAN and other VLANs as tagged VLANs. VLAN 1 becomes the PVID.
NOTE:
Assign VLAN IDs with suffixes only to hybrid or trunk ports that perform port-based access control.
Table 6 describes how the access device handles VLANs (except for the VLANs specified with
suffixes) on an 802.1X-enabled port.
89
Table 6 VLAN manipulation
A hybrid port is always assigned to a VLAN as an untagged member. After the assignment, do not
reconfigure the port as a tagged member in the VLAN.
For more information about VLAN configuration, see Layer 2—LAN Switching Configuration Guide.
Guest VLAN
The 802.1X guest VLAN on a port accommodates users who have not performed 802.1X
authentication. Users in the guest VLAN can access a limited set of network resources, such as a
software server, to download antivirus software and system patches. Once a user in the guest VLAN
passes 802.1X authentication, it is removed from the guest VLAN and can access authorized
network resources.
The 802.1X guest VLAN takes effect only on a port that performs port-based access control.
The following table illustrates how the access device handles VLANs on an 802.1X-enabled port that
performs port-based access control:
The network device assigns a hybrid port to an 802.1X guest VLAN as an untagged member.
For more information about VLAN configuration, see Layer 2—LAN Switching Configuration Guide.
90
Auth-Fail VLAN
The 802.1X Auth-Fail VLAN on a port accommodates users who have failed 802.1X authentication
because of the failure to comply with the organization security strategy. For example, the VLAN
accommodates users who have entered a wrong password. Users in the Auth-Fail VLAN can access
a limited set of network resources, such as a software server, to download antivirus software and
system patches.
The Auth-Fail VLAN does not accommodate 802.1X users who have failed authentication for
authentication timeouts or network connection problems.
The 802.1X Auth-Fail VLAN takes effect only on a port that performs port-based access control.
The following table illustrates how the access device handles VLANs on an 802.1X-enabled port that
performs port-based access control:
The network device assigns a hybrid port to an 802.1X guest VLAN as an untagged member.
For more information about VLAN configuration, see Layer 2—LAN Switching Configuration Guide.
Critical VLAN
The 802.1X critical VLAN on a port accommodates 802.1X users who have failed authentication
because none of the RADIUS servers in their ISP domain is reachable. Users in the critical VLAN
can access a limited set of network resources depending on the configuration.
The critical VLAN feature takes effect when 802.1X authentication is performed only through
RADIUS servers. If an 802.1X user fails local authentication after RADIUS authentication, the user is
not assigned to the critical VLAN. For more information about the authentication methods, see
"Configuring AAA."
The 802.1X critical VLAN takes effect only on a port that performs port-based access control.
The following table illustrates how the access device handles VLANs on an 802.1X-enabled port that
performs port-based access control:
91
Authentication status VLAN manipulation
The network device assigns a hybrid port to an 802.1X guest VLAN as an untagged member.
When a reachable RADIUS server is detected, the device removes the port from the critical VLAN.
The port sends a multicast Identity EAP/Request to all 802.1X users on the port to trigger
authentication.
For more information about VLAN configuration, see Layer 2—LAN Switching Configuration Guide.
92
EAD assistant
Endpoint Admission Defense (EAD) is an Hewlett Packard Enterprise integrated endpoint access
control solution to improve the threat defensive capability of a network. The solution enables the
security client, security policy server, access device, and third-party server to operate together. If a
terminal device seeks to access an EAD network, it must have an EAD client, which performs 802.1X
authentication.
The EAD assistant feature enables the access device to redirect a user who is seeking to access the
network to download and install an EAD client. This feature eliminates the administrative task to
deploy EAD clients.
EAD assistant is implemented by the following functionality:
• Free IP.
A free IP is a freely accessible network segment, which has a limited set of network resources
such as software and DHCP servers. To ensure security strategy compliance, an
unauthenticated user can access only this segment to perform operations. For example, the
user can download EAD client from a software server or obtain a dynamic IP address from a
DHCP server.
• Redirect URL.
If an unauthenticated 802.1X user is using a Web browser to access the network, the EAD
assistant feature redirects the user to a specific URL. For example, you can use this feature to
redirect the user to the EAD client software download page.
The EAD assistant feature creates an ACL-based EAD rule automatically to open access to the
redirect URL for each redirected user.
EAD rules are implemented by using ACL resources. When the EAD rule timer expires or the user
passes authentication, the rule is removed. If users fail to download EAD client or fail to pass
authentication before the timer expires, they must reconnect to the network to access the free IP.
SmartOn
The SmartOn feature was developed to support the NEC 802.1X client.
As shown in Figure 38, the access device performs SmartOn authentication before 802.1X
authentication. The following shows the authentication process:
1. When a SmartOn-enabled port receives an EAPOL-Start packet from an 802.1X client, it sends
a unicast EAP-Request/Notification packet to the client for SmartOn authentication.
2. Upon receiving an EAP-Response/Notification from the client, the device compares the switch
ID and password in the packet with the switch ID and password configured on the device.
{ If they are the same, 802.1X authentication can continue.
{ If they do not match, SmartOn authentication fails. The access device stops 802.1X
authentication for the client.
93
Figure 38 802.1X authentication process with the SmartOn feature
If the user attempts to use another 802.1X client for authentication, it will fail SmartOn authentication.
The access device stops 802.1X authentication for the user.
NOTE:
After you install the SmartOn client software, add two values QX_ID and QX_PASSWORD to the
Windows registry key [HKEY_LOCAL_MACHINE\SOFTWARE\Soliton Systems K.K.\SmartOn
Client\Clients\1XGate]. Specify the switch ID and password for the QX_ID and QX_PASSWORD,
respectively. The switch ID and password must be the same as the switch ID and password
configured on the device.
Compatibility information
Feature and hardware compatibility
This feature is supported only on the following ports:
• Layer 2 Ethernet ports on Ethernet switching modules.
• Fixed Layer 2 Ethernet ports of the following routers:
{ MSR954(JH296A/JH297A/JH299A).
{ MSR1002-4/1003-8S.
{ MSR2004-24/2004-48.
94
Configuration prerequisites
Before you configure 802.1X, complete the following tasks:
• Configure an ISP domain and AAA scheme (local or RADIUS authentication) for 802.1X users.
• If RADIUS authentication is used, create user accounts on the RADIUS server.
• If local authentication is used, create local user accounts on the access device and set the
service type to lan-access.
Enabling 802.1X
When you enable 802.1X, follow these guidelines:
• Do not enable 802.1X on a port that is in a link aggregation or service loopback group.
• You can enable both 802.1X authentication and portal authentication (except for re-DHCP
authentication) on a Layer 3 interface. A user who passes either authentication can come online.
If you enable re-DHCP portal authentication on an 802.1X-enabled Layer 3 interface, portal
authentication always fails. For more information about portal configuration, see "Configuring
portal authentication."
To enable 802.1X:
95
Step Command Remarks
1. Enter system view. system-view N/A
NOTE:
If EAP relay mode is used, the user-name-format command configured in RADIUS scheme view
does not take effect. The access device sends the authentication data from the client to the server
without any modification.
96
• unauthorized-force—Places the port in the unauthorized state, denying any access requests
from users on the port.
• auto—Places the port initially in unauthorized state to allow only EAPOL packets to pass. After
a user passes authentication, sets the port in the authorized state to allow access to the
network. You can use this option in most scenarios.
To set the authorization state of a port:
97
Setting the maximum number of concurrent
802.1X users on a port
Perform this task to prevent the system resources from being overused.
To set the maximum number of concurrent 802.1X users on a port:
98
Step Command Remarks
1. Enter system view. system-view N/A
2. Set the client timeout dot1x timer supp-timeout
timer. The default is 30 seconds.
supp-timeout-value
3. Set the server dot1x timer server-timeout
timeout timer. The default is 100 seconds.
server-timeout-value
Configuration guidelines
When you configure the online user handshake feature, follow these restrictions and guidelines:
• The SmartOn feature and the online user handshake feature are mutually exclusive. Before you
enable the online user handshake feature, make sure the SmartOn feature is disabled.
• To use the online user handshake security feature, make sure the online user handshake
feature is enabled.
• The online user handshake security feature takes effect only on the network where the iNode
client and IMC server are used.
• If the network has 802.1X clients that cannot exchange handshake packets with the access
device, disable the online user handshake feature. This operation prevents the 802.1X
connections from being incorrectly torn down.
Configuration procedure
To configure the online user handshake feature:
99
Configuring the authentication trigger feature
The authentication trigger feature enables the access device to initiate 802.1X authentication when
802.1X clients cannot initiate authentication.
This feature provides the multicast trigger and unicast trigger (see 802.1X authentication initiation in
"802.1X overview").
Configuration guidelines
When you configure the authentication trigger feature, follow these guidelines:
• Enable the multicast trigger on a port when the clients attached to the port cannot send
EAPOL-Start packets to initiate 802.1X authentication.
• Enable the unicast trigger on a port if only a few 802.1X clients are attached to the port and
these clients cannot initiate authentication.
• To avoid duplicate authentication packets, do not enable both triggers on a port.
Configuration procedure
To configure the authentication trigger feature on a port:
100
Setting the quiet timer
The quiet timer enables the access device to wait a period of time before it can process any
authentication request from a client that has failed an 802.1X authentication.
You can edit the quiet timer, depending on the network conditions.
• In a vulnerable network, set the quiet timer to a high value.
• In a high-performance network with quick authentication response, set the quiet timer to a low
value.
To set the quiet timer:
101
Step Command Remarks
By default, this feature is disabled.
5. (Optional.) Enable the dot1x re-authenticate The device logs off online 802.1X
keep-online feature for server-unreachable users if no authentication server is
802.1X users. keep-online reachable for 802.1X
reauthentication.
Configuration procedure
To configure an 802.1X guest VLAN:
102
Configuration procedure
To configure an 802.1X Auth-Fail VLAN:
Configuration procedure
To configure an 802.1X critical VLAN:
103
If a username string contains none of the delimiters, the access device authenticates the user in the
mandatory or default ISP domain.
To specify a set of domain name delimiters:
NOTE:
If you configure the access device to send usernames with domain names to the RADIUS server,
make sure the domain delimiter can be recognized by the RADIUS server. For username format
configuration, see the user-name-format command in Security Command Reference.
104
Step Command Remarks
By default, no redirect URL is
configured.
4. (Optional.) Configure the dot1x ead-assistant url
redirect URL. url-string Configure the redirect URL if users will
use Web browsers to access the
network.
5. (Optional.) Set the EAD dot1x timer ead-timeout
rule timer. The default setting is 30 minutes.
ead-timeout-value
105
Displaying and maintaining 802.1X
Execute display commands in any view and reset commands in user view.
Task Command
Display 802.1X session information,
display dot1x [ sessions | statistics ] [ interface interface-type
statistics, or configuration information of
interface-number ]
specified or all ports.
Display online 802.1X user information display dot1x connection [ interface interface-type
(centralized devices in standalone interface-number | user-mac mac-addr | user-name
mode). name-string ]
Display online 802.1X user information display dot1x connection [ interface interface-type
(distributed devices in standalone interface-number | slot slot-number | user-mac mac-addr |
mode/centralized devices in IRF mode). user-name name-string ]
display dot1x connection [ chassis chassis-number slot
Display online 802.1X user information
slot-number | interface interface-type interface-number |
(distributed devices in IRF mode).
user-mac mac-addr | user-name name-string ]
reset dot1x statistics [ interface interface-type
Clear 802.1X statistics.
interface-number ]
Remove users from the 802.1X guest reset dot1x guest-vlan interface interface-type
VLAN on a port. interface-number [ mac-address mac-address ]
106
Figure 39 Network diagram
GE2/0/2
Supplicant Authenticator 10.1.1.10/24
GE2/0/1
Vlan-int2
Internet
192.168.1.1/24
Host Device
192.168.1.2/24
Configuration procedure
1. Configure the 802.1X client. If HPE iNode is used, do not select the Carry version info option
in the client configuration. (Details not shown.)
2. Configure the RADIUS servers and add user accounts for the 802.1X users. (Details not
shown.)
For information about the RADIUS commands used on the access device in this example, see
Security Command Reference.
3. Assign an IP address for each interface on the access device. (Details not shown.)
4. Configure user accounts for the 802.1X users on the access device:
# Add a local network access user with the username localuser, and password localpass in
plaintext. (Make sure the username and password are the same as those configured on the
RADIUS servers.)
<Device> system-view
[Device] local-user localuser class network
[Device-luser-network-localuser] password simple localpass
# Set the service type to lan-access.
[Device-luser-network-localuser] service-type lan-access
[Device-luser-network-localuser] quit
5. Configure a RADIUS scheme:
# Create a RADIUS scheme named radius1 and enter its view.
[Device] radius scheme radius1
# Specify the IP addresses of the primary authentication and accounting RADIUS servers.
[Device-radius-radius1] primary authentication 10.1.1.1
[Device-radius-radius1] primary accounting 10.1.1.1
# Configure the IP addresses of the secondary authentication and accounting RADIUS servers.
[Device-radius-radius1] secondary authentication 10.1.1.2
[Device-radius-radius1] secondary accounting 10.1.1.2
# Specify the shared key between the access device and the authentication server.
[Device-radius-radius1] key authentication simple name
# Specify the shared key between the access device and the accounting server.
[Device-radius-radius1] key accounting simple money
# Exclude the ISP domain names from the usernames sent to the RADIUS servers.
[Device-radius-radius1] user-name-format without-domain
[Device-radius-radius1] quit
107
NOTE:
The access device must use the same username format as the RADIUS server. If the RADIUS
server includes the ISP domain name in the username, so must the access device.
# Display the user connection information after an 802.1X user passes authentication.
[Device] display dot1x connection
108
Figure 40 Network diagram
Update server Authentication server
VLAN 10 VLAN 2
GE2/0/1 GE2/0/4
VLAN 1 VLAN 5
GE2/0/2 GE2/0/3
Device
Internet
Host
Port assigned to
guest VLAN
Internet Internet
Host Host
Configuration procedure
1. Configure the 802.1X client. Make sure the 802.1X client can update its IP address after the
access port is assigned to the guest VLAN or an authorization VLAN. (Details not shown.)
2. Configure the RADIUS server to provide authentication, authorization, and accounting services.
Configure user accounts and authorization VLAN (VLAN 5 in this example) for the users.
(Details not shown.)
3. Create VLANs, and assign ports to the VLANs on the access device.
<Device> system-view
[Device] vlan 1
[Device-vlan1] port gigabitethernet 2/0/2
[Device-vlan1] quit
[Device] vlan 10
[Device-vlan10] port gigabitethernet 2/0/1
[Device-vlan10] quit
[Device] vlan 2
[Device-vlan2] port gigabitethernet 2/0/4
[Device-vlan2] quit
[Device] vlan 5
[Device-vlan5] port gigabitethernet 2/0/3
[Device-vlan5] quit
4. Configure a RADIUS scheme on the access device:
# Create RADIUS scheme 2000 and enter RADIUS scheme view.
[Device] radius scheme 2000
# Specify the server at 10.11.1.1 as the primary authentication server, and set the
authentication port to 1812.
109
[Device-radius-2000] primary authentication 10.11.1.1 1812
# Specify the server at 10.11.1.1 as the primary accounting server, and set the accounting port
to 1813.
[Device-radius-2000] primary accounting 10.11.1.1 1813
# Set the shared key to abc in plain text for secure communication between the authentication
server and the device.
[Device-radius-2000] key authentication simple abc
# Set the shared key to abc in plain text for secure communication between the accounting
server and the device.
[Device-radius-2000] key accounting simple abc
# Exclude the ISP domain names from the usernames sent to the RADIUS server.
[Device-radius-2000] user-name-format without-domain
[Device-radius-2000] quit
5. Configure an ISP domain:
# Create ISP domain bbb and enter ISP domain view.
[Device] domain bbb
# Apply RADIUS scheme 2000 to the ISP domain for authentication, authorization, and
accounting.
[Device-isp-bbb] authentication lan-access radius-scheme 2000
[Device-isp-bbb] authorization lan-access radius-scheme 2000
[Device-isp-bbb] accounting lan-access radius-scheme 2000
[Device-isp-bbb] quit
6. Configure 802.1X on the access device:
# Enable 802.1X on port GigabitEthernet 2/0/2.
[Device] interface gigabitethernet 2/0/2
[Device-GigabitEthernet2/0/2] dot1x
# Implement port-based access control on the port.
[Device-GigabitEthernet2/0/2] dot1x port-method portbased
# Set the port authorization mode to auto. By default, the port uses the auto mode.
[Device-GigabitEthernet2/0/2] dot1x port-control auto
# Specify VLAN 10 as the 802.1X guest VLAN on port GigabitEthernet 2/0/2.
[Device-GigabitEthernet2/0/2] dot1x guest-vlan 10
[Device-GigabitEthernet2/0/2] quit
# Enable 802.1X globally.
[Device] dot1x
# Verify that GigabitEthernet 2/0/2 is assigned to VLAN 10 before any user passes authentication on
the port.
[Device] display vlan 10
# After a user passes authentication, display information on GigabitEthernet 2/0/2. Verity that
GigabitEthernet 2/0/2 is assigned to VLAN 5.
[Device] display interface gigabitethernet 2/0/2
110
802.1X with ACL assignment configuration example
Network requirements
As shown in Figure 41, the host that connects to GigabitEthernet 2/0/1 must pass 802.1X
authentication to access the Internet.
Perform 802.1X authentication on GigabitEthernet 2/0/1. Use the RADIUS server at 10.1.1.1 as the
authentication and authorization server, and the RADIUS server at 10.1.1.2 as the accounting
server.
Configure ACL assignment on GigabitEthernet 2/0/1 to deny access of 802.1X users to the FTP
server from 8:00 to 18:00 on weekdays.
Figure 41 Network diagram
Configuration procedure
1. Configure the 802.1X client. Make sure the client is able to update its IP address after the
access port is assigned to the 802.1X guest VLAN or an authorization VLAN. (Details not
shown.)
2. Configure the RADIUS servers to provide authentication, authorization, and accounting
services. Add user accounts and specify the ACL (ACL 3000 in this example) for the users.
(Details not shown.)
3. Assign an IP address to each interface, as shown in Figure 41. (Details not shown.)
4. Configure a RADIUS scheme:
# Create RADIUS scheme 2000 and enter RADIUS scheme view.
<Device> system-view
[Device] radius scheme 2000
# Specify the server at 10.1.1.1 as the primary authentication server, and set the authentication
port to 1812.
[Device-radius-2000] primary authentication 10.1.1.1 1812
# Specify the server at 10.1.1.2 as the primary accounting server, and set the accounting port to
1813.
[Device-radius-2000] primary accounting 10.1.1.2 1813
# Set the shared key to abc in plain text for secure communication between the authentication
server and the device.
[Device-radius-2000] key authentication simple abc
# Set the shared key to abc in plain text for secure communication between the accounting
server and the device.
[Device-radius-2000] key accounting simple abc
# Exclude the ISP domain names from the usernames sent to the RADIUS server.
111
[Device-radius-2000] user-name-format without-domain
[Device-radius-2000] quit
5. Configure an ISP domain:
# Create ISP domain bbb and enter ISP domain view.
[Device] domain bbb
# Apply RADIUS scheme 2000 to the ISP domain for authentication, authorization, and
accounting.
[Device-isp-bbb] authentication lan-access radius-scheme 2000
[Device-isp-bbb] authorization lan-access radius-scheme 2000
[Device-isp-bbb] accounting lan-access radius-scheme 2000
[Device-isp-bbb] quit
6. Configure a time range named ftp from 8:00 to 18:00 on weekdays.
[Device] time-range ftp 8:00 to 18:00 working-day
7. Configure ACL 3000 to deny packets destined for the FTP server at 10.0.0.1 during the
specified time range.
[Device] acl advanced 3000
[Device-acl-ipv4-adv-3000] rule 0 deny ip destination 10.0.0.1 0 time-range ftp
[Device-acl-ipv4-adv-3000] quit
8. Configure 802.1X:
# Enable 802.1X on GigabitEthernet 2/0/1.
[Device] interface gigabitethernet 2/0/1
[Device-GigabitEthernet2/0/1] dot1x
[Device-GigabitEthernet2/0/1] quit
# Enable 802.1X globally.
[Device] dot1x
The output shows that ACL 3000 is active on the user, and the user cannot access the FTP server.
112
• The intranet 192.168.1.0/24 is attached to GigabitEthernet 2/0/1 of the access device.
• The hosts use DHCP to obtain IP addresses.
• A DHCP server and a Web server are deployed on the 192.168.2.0/24 subnet for users to
obtain IP addresses and download client software.
Deploy an EAD solution for the intranet to meet the following requirements:
• Allow unauthenticated users and users who have failed 802.1X authentication to access
192.168.2.0/24. The users can obtain IP addresses and download software.
• If these users use a Web browser to access a network other than 192.168.2.0/24, redirect them
to the Web server for 802.1X client downloading.
• Allow authenticated 802.1X users to access the network.
Figure 42 Network diagram
Internet
Free IP:
WEB server
192.168.2.3/24
Device GE2/0/3
192.168.1.0/24 GE2/0/1 192.168.2.1/24 192.168.2.0/24
Vlan-int 2
192.168.1.1/24 GE2/0/2
10.1.1.10/24
DHCP server
192.168.2.2/24
Authentication servers
10.1.1.1/10.1.1.2
Configuration procedure
1. Make sure the DHCP server, the Web server, and the authentication servers have been
configured correctly. (Details not shown.)
2. Configure an IP address for each interface. (Details not shown.)
3. Configure DHCP relay:
# Enable DHCP.
<Device> system-view
[Device] dhcp enable
# Enable the DHCP relay agent on VLAN-interface 2.
[Device] interface vlan-interface 2
[Device-Vlan-interface2] dhcp select relay
# Specify the DHCP server 192.168.2.2 on the relay agent interface VLAN-interface 2.
[Device-Vlan-interface2] dhcp relay server-address 192.168.2.2
[Device-Vlan-interface2] quit
4. Configure a RADIUS scheme:
# Create RADIUS scheme 2000 and enter RADIUS scheme view.
[Device] radius scheme 2000
113
# Specify the server at 10.1.1.1 as the primary authentication server, and set the authentication
port to 1812.
[Device-radius-2000] primary authentication 10.1.1.1 1812
# Specify the server at 10.1.1.2 as the primary accounting server, and set the accounting port to
1813.
[Device-radius-2000] primary accounting 10.1.1.2 1813
# Set the shared key to abc in plain text for secure communication between the authentication
server and the device.
[Device-radius-2000] key authentication simple abc
# Set the shared key to abc in plain text for secure communication between the accounting
server and the device.
[Device-radius-2000] key accounting simple abc
# Exclude the ISP domain names from the usernames sent to the RADIUS server.
[Device-radius-2000] user-name-format without-domain
[Device-radius-2000] quit
5. Configure an ISP domain:
# Create ISP domain bbb and enter ISP domain view.
[Device] domain bbb
# Apply RADIUS scheme 2000 to the ISP domain for authentication, authorization, and
accounting.
[Device-isp-bbb] authentication lan-access radius-scheme 2000
[Device-isp-bbb] authorization lan-access radius-scheme 2000
[Device-isp-bbb] accounting lan-access radius-scheme 2000
[Device-isp-bbb] quit
6. Configure 802.1X:
# Configure the free IP.
[Device] dot1x ead-assistant free-ip 192.168.2.0 24
# Configure the redirect URL for client software download.
[Device] dot1x ead-assistant url http://192.168.2.3
# Enable the EAD assistant feature.
[Device] dot1x ead-assistant enable
# Enable 802.1X on GigabitEthernet 2/0/1.
[Device] interface gigabitethernet 2/0/1
[Device-GigabitEthernet2/0/1] dot1x
[Device-GigabitEthernet2/0/1] quit
# Enable 802.1X globally.
[Device] dot1x
# Verify that you can ping an IP address on the free IP subnet from a host.
C:\>ping 192.168.2.3
114
Reply from 192.168.2.3: bytes=32 time<1ms TTL=128
Reply from 192.168.2.3: bytes=32 time<1ms TTL=128
The output shows that you can access the free IP subnet before passing 802.1X authentication.
# Verify that you are redirected to the Web server when you enter in your Web browser an IP address
not on the free IP. (Details not shown.)
Internet
Free IP:
WEB server
192.168.2.3/24
Device GE2/0/3
192.168.1.0/24 GE2/0/1 192.168.2.1/24 192.168.2.0/24
Vlan-int 2
192.168.1.1/24 DHCP server
GE2/0/2
10.1.1.10/24
Authentication servers
10.1.1.1/10.1.1.2
Configuration procedure
1. Make sure the Web server and the authentication servers have been configured correctly.
(Details not shown.)
115
2. Configure an IP address for each interface. (Details not shown.)
3. Configure the DHCP server:
# Enable DHCP.
<Device> system-view
[Device] dhcp enable
# Enable the DHCP server on VLAN-interface 2.
[Device] interface vlan-interface 2
[Device-Vlan-interface2] dhcp select server
[Device-Vlan-interface2] quit
# Create DHCP address pool 0.
[Device] dhcp server ip-pool 0
# Specify subnet 192.168.1.0/24 in DHCP address pool 0.
[Device-dhcp-pool-0] network 192.168.1.0 mask 255.255.255.0
# Specify the gateway address 192.168.1.1 in DHCP address pool 0.
[Device-dhcp-pool-0] gateway-list 192.168.1.1
[Device-dhcp-pool-0] quit
4. Configure a RADIUS scheme:
# Create RADIUS scheme 2000 and enter RADIUS scheme view.
[Device] radius scheme 2000
# Specify the server at 10.1.1.1 as the primary authentication server, and set the authentication
port to 1812.
[Device-radius-2000] primary authentication 10.1.1.1 1812
# Specify the server at 10.1.1.2 as the primary accounting server, and set the accounting port to
1813.
[Device-radius-2000] primary accounting 10.1.1.2 1813
# Set the shared key to abc in plain text for secure communication between the authentication
server and the device.
[Device-radius-2000] key authentication simple abc
# Set the shared key to abc in plain text for secure communication between the accounting
server and the device.
[Device-radius-2000] key accounting simple abc
# Exclude the ISP domain names from the usernames sent to the RADIUS server.
[Device-radius-2000] user-name-format without-domain
[Device-radius-2000] quit
5. Configure an ISP domain:
# Create ISP domain bbb and enter ISP domain view.
[Device] domain bbb
# Apply RADIUS scheme 2000 to the ISP domain for authentication, authorization, and
accounting.
[Device-isp-bbb] authentication lan-access radius-scheme 2000
[Device-isp-bbb] authorization lan-access radius-scheme 2000
[Device-isp-bbb] accounting lan-access radius-scheme 2000
[Device-isp-bbb] quit
6. Configure 802.1X:
# Configure the free IP.
[Device] dot1x ead-assistant free-ip 192.168.2.0 24
# Configure the redirect URL for client software download.
116
[Device] dot1x ead-assistant url http://192.168.2.3
# Enable the EAD assistant feature.
[Device] dot1x ead-assistant enable
# Enable 802.1X on GigabitEthernet 2/0/1.
[Device] interface gigabitethernet 2/0/1
[Device-GigabitEthernet2/0/1] dot1x
[Device-GigabitEthernet2/0/1] quit
# Enable 802.1X globally.
[Device] dot1x
# Verify that you can ping an IP address on the free IP subnet from a host.
C:\>ping 192.168.2.3
The output shows that you can access the free IP subnet before passing 802.1X authentication.
# Verify that you are redirected to the Web server when you enter in your Web browser an IP address
not on the free IP. (Details not shown.)
117
Figure 44 Network diagram
Configuration procedure
1. Configure a RADIUS scheme:
# Create RADIUS scheme 2000 and enter RADIUS scheme view.
<Device> system-view
[Device] radius scheme 2000
# Specify the server at 10.1.1.1 as the primary authentication server, and set the authentication
port to 1812.
[Device-radius-2000] primary authentication 10.1.1.1 1812
# Specify the server at 10.1.1.2 as the primary accounting server, and set the accounting port to
1813.
[Device-radius-2000] primary accounting 10.1.1.2 1813
# Set the shared key to abc in plain text for secure communication between the authentication
server and the device.
[Device-radius-2000] key authentication simple abc
# Set the shared key to abc in plain text for secure communication between the accounting
server and the device.
[Device-radius-2000] key accounting simple abc
# Exclude the ISP domain names from the usernames sent to the RADIUS server.
[Device-radius-2000] user-name-format without-domain
[Device-radius-2000] quit
2. Configure an ISP domain:
# Create ISP domain bbb and enter ISP domain view.
[Device] domain bbb
# Apply RADIUS scheme 2000 to the ISP domain for authentication, authorization, and
accounting.
[Device-isp-bbb] authentication lan-access radius-scheme 2000
[Device-isp-bbb] authorization lan-access radius-scheme 2000
[Device-isp-bbb] accounting lan-access radius-scheme 2000
[Device-isp-bbb] quit
3. Configure 802.1X and SmartOn:
# Enable 802.1X on GigabitEthernet 2/0/1.
[Device] interface gigabitethernet 2/0/1
[Device-GigabitEthernet2/0/1] dot1x
# Enable SmartOn on GigabitEthernet 2/0/1.
[Device-GigabitEthernet2/0/1] dot1x smarton
118
[Device-GigabitEthernet2/0/1] quit
# Set the SmartOn password to 1234 in plain text and the switch ID to XYZ.
[Device] dot1x smarton password simple 1234
[Device] dot1x smarton switchid XYZ
# Set the SmartOn client timeout timer to 40 seconds.
[Device] smarton timer supp-timeout 40
# Enable 802.1X globally.
[Device] dot1x
Troubleshooting 802.1X
Web browser users cannot be redirected correctly
Symptom
Unauthenticated users are not redirected to the specified redirect URL after they enter external
website addresses in their Web browsers.
Analysis
Redirection will not happen for one of the following reasons:
• The address is in the string format. The operating system of the host regards the string as a
website name and tries to resolve the string. If the resolution fails, the operating system sends
an ARP request, but the target address is not in the dotted decimal notation. The redirection
feature does redirect this kind of ARP request.
• The address is within a free IP segment. No redirection will take place, even if no host is present
with the address.
• The redirect URL is not in a free IP segment.
• No server is using the redirect URL, or the server with the URL does not provide Web services.
Solution
To resolve the problem:
1. Enter a dotted decimal IP address that is not in any free IP segments.
2. Verify that the access device and the server are configured correctly.
3. If the problem persists, contact Hewlett Packard Enterprise Support.
119
Configuring MAC authentication
Overview
MAC authentication controls network access by authenticating source MAC addresses on a port.
The feature does not require client software, and users do not have to enter a username and
password for network access. The device initiates a MAC authentication process when it detects an
unknown source MAC address on a MAC authentication-enabled port. If the MAC address passes
authentication, the user can access authorized network resources. If the authentication fails, the
device marks the MAC address as a silent MAC address, drops the packet, and starts a quiet timer.
The device drops all subsequent packets from the MAC address within the quiet time. The quiet
mechanism avoids repeated authentication during a short time.
NOTE:
If the MAC address that has failed authentication is a static MAC address or a MAC address that has
passed any security authentication, the device does not mark the MAC address as a silent address.
Authentication methods
You can perform MAC authentication on the access device (local authentication) or through a
RADIUS server.
Local authentication:
• MAC-based accounts—The access device uses the source MAC address of the packet as the
username and password to search the local account database for a match.
• A shared account—The access device uses the shared account username and password to
search the local account database for a match.
RADIUS authentication:
• MAC-based accounts—The access device sends the source MAC address of the packet as
the username and password to the RADIUS server for authentication.
• A shared account—The access device sends the shared account username and password to
the RADIUS server for authentication.
For more information about configuring local authentication and RADIUS authentication, see
"Configuring AAA."
120
VLAN assignment
You can specify the authorization VLAN for a MAC authentication user to control access to
authorized network resources.
• On a RADIUS server, the authorization VLAN can be specified in the form of VLAN ID or VLAN
name.
• On the local access device, the authorization VLAN must be specified in the form of VLAN ID.
You can specify the authorization VLAN in the following views:
{ Local user view.
{ User group view.
For more information about local authorization VLAN configuration, see "Configuring AAA."
When the MAC authentication user passes authentication, the authentication server (either the local
access device or a RADIUS server) assigns the authorization VLAN to the user.
The port through which the user accesses the device is assigned to the authorization VLAN. A hybrid
port is always assigned to a server-assigned authorization VLAN as an untagged member. After the
assignment, do not reconfigure the port as a tagged member in the VLAN.
Table 7 describes the way the network access device handles authorization VLANs for MAC
authenticated users.
Table 7 VLAN manipulation
ACL assignment
You can specify an authorization ACL in the user account for a MAC authentication user to control
the user's access to network resources. After the user passes MAC authentication, the
authentication server (local or remote) assigns the authorization ACL to the access port of the user.
The ACL will filter traffic for this user. You must configure ACL rules for the authorization ACL on the
access device for the ACL assignment feature.
To ensure a successful ACL assignment, make sure the ACL does not contain rules that match
source MAC addresses.
To change the access control criteria for the user, you can use one of the following methods:
• Modify ACL rules on the access device.
• Specify another authorization ACL on the authentication server.
For more information about ACLs, see ACL and QoS Configuration Guide.
121
The device reauthenticates an online MAC authentication user periodically only after it receives the
termination action Radius-request from the authentication server for this user. The Session-Timeout
attribute (session timeout period) assigned by the server is the reauthentication interval. To display
the server-assigned Session-Timeout and Termination-Action attributes, use the display
mac-authentication connection command. Support for the server configuration and assignment of
Session-Timeout and Termination-Action attributes depends on the server model.
When no server is reachable for MAC reauthentication, the device keeps the MAC authentication
users online or logs off the users, depending on the keep-online feature configuration on the device.
For information about the keep-online feature, see "Configuring the keep-online feature."
Compatibility information
Feature and hardware compatibility
This feature is supported only on the following ports:
• Layer 2 Ethernet ports on the following modules:
{ HMIM-8GSW.
{ HMIM-24GSW.
{ HMIM-24GSWP
{ SIC-4GSW.
{ SIC-4GSWP.
• Fixed Layer 2 Ethernet ports on the following routers:
{ MSR954(JH296A/JH297A/JH299A).
{ MSR1002-4/1003-8S.
{ MSR2004-24/2004-48.
Configuration prerequisites
Before you configure MAC authentication, complete the following tasks:
1. Configure an ISP domain and specify an AAA method. For more information, see "Configuring
AAA."
{ For local authentication, you must also create local user accounts (including usernames
and passwords), and specify the lan-access service for local users.
{ For RADIUS authentication, make sure the device and the RADIUS server can reach each
other, and create user accounts on the RADIUS server. If you are using MAC-based
accounts, make sure the username and password for each account are the same as the
MAC address of each MAC authentication user.
122
2. Make sure the port security feature is disabled. For more information about port security, see
"Configuring port security."
123
MAC authentication chooses an authentication domain for users on a port in this order: the
port-specific domain, the global domain, and the default domain. For more information about
authentication domains, see "Configuring AAA."
To specify an authentication domain for MAC authentication users:
124
Step Command Remarks
1. Enter system view. system-view N/A
125
Enabling MAC authentication multi-VLAN mode
on a port
The MAC authentication multi-VLAN mode prevents an authenticated online user from service
interruption caused by VLAN changes on a port. When the port receives a packet sourced from the
user in a VLAN not matching the existing MAC-VLAN mapping, the device neither logs off the user
nor reauthenticates the user. The device creates a new MAC-VLAN mapping for the user, and traffic
transmission is not interrupted. The original MAC-VLAN mapping for the user remains on the device
until it dynamically ages out. Hewlett Packard Enterprise recommends that you configure this feature
on hybrid or trunk ports.
This feature improves transmission of data that is vulnerable to delay and interference. It is typically
applicable to IP phone users.
To enable MAC authentication multi-VLAN mode on a port:
126
Displaying and maintaining MAC authentication
Execute display commands in any view and reset commands in user view.
Task Command
display mac-authentication [ interface interface-type
Display MAC authentication information.
interface-number ]
display mac-authentication connection [ interface
Display MAC authentication connections
interface-type interface-number | user-mac mac-addr |
(centralized devices in standalone mode).
user-name user-name ]
Display MAC authentication connections display mac-authentication connection [ interface
(distributed devices in standalone interface-type interface-number | slot slot-number |
mode/centralized devices in IRF mode). user-mac mac-addr | user-name user-name ]
display mac-authentication connection [ chassis
Display MAC authentication connections chassis-number slot slot-number | interface
(distributed devices in IRF mode). interface-type interface-number | user-mac mac-addr |
user-name user-name ]
reset mac-authentication statistics [ interface
Clear MAC authentication statistics.
interface-type interface-number ]
Configuration procedure
# Add a network access local user. In this example, configure both the username and password as
Host A's MAC address 00-e0-fc-12-34-56.
<Device> system-view
127
[Device] local-user 00-e0-fc-12-34-56 class network
[Device-luser-network-00-e0-fc-12-34-56] password simple 00-e0-fc-12-34-56
# Configure ISP domain bbb to perform local authentication for LAN users.
[Device] domain bbb
[Device-isp-bbb] authentication lan-access local
[Device-isp-bbb] quit
# Configure MAC authentication to use MAC-based accounts. Each MAC address is in the
hexadecimal notation with hyphens, and letters are in lower case.
[Device] mac-authentication user-name-format mac-address with-hyphen lowercase
128
Host mode : Single VLAN
Max online users : 4096
Authentication attempts : successful 1, failed 0
Current online users : 1
MAC address Auth state
00e0-fc12-3456 Authenticated
The output shows that Host A has passed MAC authentication and has come online. Host B failed
MAC authentication and its MAC address is marked as a silent MAC address.
Configuration procedure
1. Make sure the RADIUS server and the access device can reach each other. (Details not
shown.)
2. Configure the RADIUS servers:
# Create a shared account for MAC authentication users. (Details not shown.)
# Set the username aaa and password 123456 for the account. (Details not shown.)
3. Configure RADIUS-based MAC authentication on the device:
# Configure a RADIUS scheme.
<Device> system-view
[Device] radius scheme 2000
[Device-radius-2000] primary authentication 10.1.1.1 1812
[Device-radius-2000] primary accounting 10.1.1.2 1813
[Device-radius-2000] key authentication simple abc
[Device-radius-2000] key accounting simple abc
129
[Device-radius-2000] user-name-format without-domain
[Device-radius-2000] quit
# Apply the RADIUS scheme to ISP domain bbb for authentication, authorization, and
accounting.
[Device] domain bbb
[Device-isp-bbb] authentication default radius-scheme 2000
[Device-isp-bbb] authorization default radius-scheme 2000
[Device-isp-bbb] accounting default radius-scheme 2000
[Device-isp-bbb] quit
# Enable MAC authentication on port GigabitEthernet 2/0/1.
[Device] interface gigabitethernet 2/0/1
[Device-GigabitEthernet2/0/1] mac-authentication
[Device-GigabitEthernet2/0/1] quit
# Specify the MAC authentication domain as the ISP domain bbb.
[Device] mac-authentication domain bbb
# Set MAC authentication timers.
[Device] mac-authentication timer offline-detect 180
[Device] mac-authentication timer quiet 180
# Specify username aaa and password 123456 in plain text for the account shared by MAC
authentication users.
[Device] mac-authentication user-name-format fixed account aaa password simple 123456
# Enable MAC authentication globally.
[Device] mac-authentication
GigabitEthernet2/0/1 is link-up
MAC authentication : Enabled
Authentication domain : Not configured
Auth-delay timer : Disabled
Re-auth server-unreachable : Logoff
Host mode : Single VLAN
Max online users : 4096
130
Authentication attempts : successful 1, failed 0
Current online users : 1
MAC address Auth state
00e0-fc12-3456 Authenticated
Configuration procedure
Make sure the RADIUS servers and the access device can reach each other.
1. Configure ACL 3000 to deny packets destined for 10.0.0.1.
<Sysname> system-view
[Sysname] acl advanced 3000
[Sysname-acl-ipv4-adv-3000] rule 0 deny ip destination 10.0.0.1 0
[Sysname-acl-ipv4-adv-3000] quit
2. Configure RADIUS-based MAC authentication on the device:
# Configure a RADIUS scheme.
[Sysname] radius scheme 2000
[Sysname-radius-2000] primary authentication 10.1.1.1 1812
[Sysname-radius-2000] primary accounting 10.1.1.2 1813
[Sysname-radius-2000] key authentication simple abc
[Sysname-radius-2000] key accounting simple abc
[Sysname-radius-2000] user-name-format without-domain
[Sysname-radius-2000] quit
# Apply the RADIUS scheme to an ISP domain for authentication, authorization, and
accounting.
[Sysname] domain bbb
[Sysname-isp-bbb] authentication default radius-scheme 2000
131
[Sysname-isp-bbb] authorization default radius-scheme 2000
[Sysname-isp-bbb] accounting default radius-scheme 2000
[Sysname-isp-bbb] quit
# Specify the ISP domain for MAC authentication.
[Sysname] mac-authentication domain bbb
# Configure the device to use MAC-based user accounts. Each MAC address is in the
hexadecimal notation with hyphens, and letters are in lower case.
[Sysname] mac-authentication user-name-format mac-address with-hyphen lowercase
# Enable MAC authentication on port GigabitEthernet 2/0/1.
[Sysname] interface gigabitethernet 2/0/1
[Sysname-GigabitEthernet2/0/1] mac-authentication
[Sysname-GigabitEthernet2/0/1] quit
# Enable MAC authentication globally.
[Sysname] mac-authentication
3. Configure the RADIUS servers:
# Add a user account with 00-e0-fc-12-34-56 as both the username and password on each
RADIUS server. (Details not shown.)
# Specify ACL 3000 as the authorization ACL for the user account. (Details not shown.)
Verifying the configuration
# Verify the MAC authentication configuration.
[Sysname] display mac-authentication
Global MAC authentication parameters:
MAC authentication : Enabled
User name format : MAC address in lowercase(xx-xx-xx-xx-xx-xx)
Username : mac
Password : Not configured
Offline detect period : 180 s
Quiet period : 180 s
Server timeout : 100 s
Authentication domain : bbb
Max MAC-auth users : 1024 per slot
Online MAC-auth users : 2
GigabitEthernet2/0/1 is link-up
MAC authentication : Enabled
Authentication domain : Not configured
Auth-delay timer : Disabled
Re-auth server-unreachable : Logoff
Host mode : Single VLAN
Max online users : 4096
Authentication attempts : successful 1, failed 0
Current online users : 1
MAC address Auth state
00e0-fc12-3456 Authenticated
132
# Verify that you cannot ping the FTP server from the host.
C:\>ping 10.0.0.1
The output shows that ACL 3000 has been assigned to port GigabitEthernet 2/0/1 to deny access to
the FTP server.
133
Configuring portal authentication
Overview
Portal authentication controls user access to the Internet. Portal authenticates a user by the
username and password the user enters on a portal authentication page. Therefore, portal
authentication is also known as Web authentication. When portal authentication is deployed on a
network, an access device redirects unauthenticated users to the website provided by a portal Web
server. The users can access the resources on the website without authentication. If the users want
to access the Internet, they must pass authentication on the website.
Portal authentication is classified into the following types:
• Active authentication—Users visit the authentication website provided by the portal Web
server and enter their username and password for authentication.
• Forced authentication—Users are redirected to the portal authentication website for
authentication when they visit other websites.
Portal authentication flexibly imposes access control on the access layer and vital data entries. It has
the following advantages:
• Allows users to perform authentication through Web pages without installing client software.
• Provides ISPs with diversified management choices and extended functions. For example, the
ISPs can place advertisements, provide community services, and publish information on the
authentication page.
• Supports multiple authentication modes. For example, re-DHCP authentication implements a
flexible address assignment scheme and saves public IP addresses. Cross-subnet
authentication can authenticate users who reside in a different subnet than the access device.
The device supports Portal 1.0, Portal 2.0, and Portal 3.0.
134
Figure 48 Portal system components
Portal authentication
server
Authentication client
AAA server
Authentication client
Security policy
server
Authentication client
An authentication client is a Web browser that runs HTTP/HTTPS or a user host that runs a portal
client application. Security check for the user host is implemented through the interaction between
the portal client and the security policy server.
Access device
An access device refers to a broadband access device such as a switch or a router. An access
device has the following functions:
• Redirects all HTTP requests of unauthenticated users to the portal Web server.
• Interacts with the portal authentication server and the AAA server to complete authentication,
authorization, and accounting.
• Allows users that pass portal authentication to access authorized Internet resources.
Portal authentication server
The portal authentication server receives authentication requests from authentication clients and
interacts with the access device to authenticate users.
Portal Web server
The portal Web server pushes the Web authentication page to authentication clients and forwards
user authentication information (username and password) to the portal authentication server. The
access device also redirects HTTP requests from unauthenticated users to the portal Web server.
The portal Web server can be integrated with the portal authentication server or an independent
server.
AAA server
The AAA server interacts with the access device to implement authentication, authorization,
accounting for portal users. In a portal system, a RADIUS server can perform authentication,
authorization, accounting for portal users, and an LDAP server can perform authentication for portal
users.
Security policy server
The security policy server interacts with the portal client and the access device for security check and
authorization for users.
135
Interaction between portal system components
The components of a portal system interact as follows:
1. An unauthenticated user initiates authentication by accessing an Internet website through a
Web browser. When receiving the HTTP request, the access device redirects it to the Web
authentication page provided by the portal Web server. The user can also visit the
authentication website to log in. The user must log in through the HPE iNode client for extended
portal functions.
2. The user enters the authentication information on the authentication page/dialog box and
submits the information. The portal Web server forwards the information to the portal
authentication server. Then the portal authentication server processes the information and
forwards it to the access device.
3. The access device interacts with the AAA server to implement authentication, authorization,
accounting for the user.
4. If security policies are not imposed on the user, the access device allows the authenticated user
to access the Internet. If security policies are imposed on the user, the portal client, the access
device, and the security policy server interact to check the user host. If the user passes the
security check, the security policy server authorizes the user to access resources based on the
check result. Portal authentication through Web does not support security check for users. To
implement security check, the client must be the HPE iNode client.
NOTE:
Portal authentication supports NAT traversal whether it is initiated by a Web client or an HPE iNode
client. When the portal authentication client is on a private network, the portal authentication server
is on a public network, and the access device is enabled with NAT, network address translations
performed on the access device do not affect portal authentication. However, in such a case,
Hewlett Packard Enterprise recommends using an interface's public IP address as the source
address of outgoing portal packets.
136
Cross-subnet authentication
Cross-subnet authentication is similar to direct authentication, except it allows Layer 3 forwarding
devices to exist between the authentication client and the access device.
In direct authentication, re-DHCP authentication, and cross-subnet authentication, a user's IP
address uniquely identifies the user. After a user passes authentication, the access device generates
an ACL for the user based on the user's IP address to control forwarding of the packets from the user.
Because no Layer 3 forwarding device exists between authentication clients and the access device
in direct authentication and re-DHCP authentication, the access device can learn the user MAC
addresses. The access device can enhance its capability of controlling packet forwarding by using
the learned MAC addresses.
4) Authentication request
5) RADIUS
authentication
Timer
6) Authentication reply
9) Security check
10) Authorization
137
6. The access device sends an authentication reply packet to the portal authentication server to
notify authentication success or failure.
7. The portal authentication server sends an authentication success or failure packet to the client.
8. If the authentication is successful, the portal authentication server sends an authentication
reply acknowledgment packet to the access device.
If the client is an iNode client, the authentication process includes step 9 and step 10 for extended
portal functions. Otherwise the authentication process is complete.
9. The client and the security policy server exchange security check information. The security
policy server detects whether or not the user host installs anti-virus software, virus definition
files, unauthorized software, and operating system patches.
10. The security policy server authorizes the user to access certain network resources based on
the check result. The access device saves the authorization information and uses it to control
access of the user.
Re-DHCP authentication process (with CHAP/PAP authentication)
Figure 50 Re-DHCP authentication process
138
Step 13 and step 14 are for extended portal functions.
13. The client and the security policy server exchanges security check information. The security
policy server detects whether or not the user host installs anti-virus software, virus definition
files, unauthorized software, and operating system patches.
14. The security policy server authorizes the user to access certain network resources based on
the check result. The access device saves the authorization information and uses it to control
access of the user.
139
Tasks at a glance
(Optional.) Logging out portal users
(Optional.) Configuring Web redirect
On Etherchannel interfaces, both Web redirect and portal authentication can be enabled at the same time.
On other types of interfaces, Web redirect does not work when both Web redirect and portal authentication
are enabled.
(Optional.) Applying a NAS-ID profile to an interface
Configuration prerequisites
The portal feature provides a solution for user identity authentication and security check. To
complete user identity authentication, portal must cooperate with RADIUS.
The prerequisites for portal authentication configuration are as follows:
• The portal authentication server, portal Web server, and RADIUS server have been installed
and configured correctly.
• To use the re-DHCP portal authentication mode, make sure the DHCP relay agent is enabled
on the access device, and the DHCP server is installed and configured correctly.
• The portal client, access device, and servers can reach each other.
• To use the remote RADIUS server, configure usernames and passwords on the RADIUS server,
and configure the RADIUS client on the access device. For information about RADIUS client
configuration, see "Configuring AAA."
• To implement extended portal functions, install and configure IMC EAD. Make sure the ACLs
configured on the access device correspond to the isolation ACL and the security ACL on the
security policy server. For information about security policy server configuration on the access
device, see "Configuring AAA." For installation and configuration about the security policy
server, see IMC EAD Security Policy Help.
140
Step Command Remarks
• To specify an IPv4 portal server:
Specify an IPv4 portal
ip ipv4-address [ vpn-instance
authentication server, an IPv6
vpn-instance-name] [ key { cipher |
3. Specify the IP address of authentication portal server, or
simple } key-string ]
the portal authentication both.
server. • To specify an IPv6 portal server:
ipv6 ipv6-address [ vpn-instance By default, no portal
vpn-instance-name] [ key { cipher | authentication server is
simple } key-string ] specified.
141
Configuration restrictions and guidelines
When you enable portal authentication on an interface, follow these restrictions and guidelines:
• Make sure the interface has a valid IP address before you enable re-DHCP portal
authentication on the interface.
• Do not add the Ethernet interface enabled with portal authentication to an aggregation group.
Otherwise, portal authentication does not take effect.
• Cross-subnet authentication mode (layer3) does not require Layer 3 forwarding devices
between the access device and the portal authentication clients. However, if a Layer 3
forwarding device exists between the authentication client and the access device, you must use
the cross-subnet portal authentication mode.
• With re-DHCP portal authentication, Hewlett Packard Enterprise recommends that you also
configure authorized ARP on the interface to make sure only valid users can access the
network. With authorized ARP configured on the interface, the interface learns ARP entries only
from the users who have obtained a public address from DHCP.
• For successful re-DHCP portal authentication, make sure the BAS-IP/BAS-IPv6 attribute value
is the same as the device IP or IPv6 address specified on the portal authentication server. To
configure the BAS-IP/BAS-IPv6 attribute, use the portal { bas-ip | bas-ipv6 } command.
• An IPv6 portal server does not support the re-DHCP portal authentication mode.
• You can enable both IPv4 portal authentication and IPv6 portal authentication on an interface.
Configuration procedure
To enable portal authentication on an interface:
142
Step Command Remarks
Reference an IPv4 portal Web
• To reference an IPv4 portal Web server:
server, an IPv6 portal Web
portal apply web-server server-name
3. Reference a portal server, or both for the
[ fail-permit ]
Web server for the interface.
interface. • To reference an IPv6 portal Web server:
portal ipv6 apply web-server By default, the interface does
server-name [ fail-permit ] not reference any portal Web
server.
143
Step Command Remarks
By default, no source-based
portal free-rule rule-number source portal-free rule exists.
2. Configure a
source-based { interface interface-type If you specify both a VLAN and an
portal-free rule. interface-number | mac mac-address | interface, the interface must belong
vlan vlan-id } * to the VLAN. Otherwise, the
portal-free rule does not take effect.
144
Step Command Remarks
1. Enter system view. system-view N/A
145
If you set the maximum total number smaller than the number of current online portal users on the
device, this configuration still takes effect. The online users are not affected but the system forbids
new portal users to log in.
If you set the maximum number of portal users on an interface smaller than the number of current
online portal users on the interface, this configuration still takes effect. The online users are not
affected but the system forbids new portal users to log in from the interface.
Make sure the maximum combined number of IPv4 and IPv6 portal users specified on all interfaces
does not exceed the maximum number of total portal users allowed in the system. Otherwise, the
exceeding number of portal users will not be able to log in to the device.
To set the maximum number of total portal users allowed in the system:
146
Step Command Remarks
147
Configuring a preauthentication IP address pool for portal
users
Perform this task to specify a preauthentication IP address pool for portal users. You must specify a
preauthentication IP address pool on a portal-enabled interface in the following situation:
• Portal users access the network through a subinterface of the portal-enabled interface.
• The subinterface does not have an IP address.
• Portal users need to obtain IP addresses through DHCP.
After a user connects to a portal-enabled interface, the user uses an IP address for portal
authentication according to the following rules:
• If the interface is configured with a preauthentication IP address pool, the user uses the
following IP address:
{ If the client is configured to obtain an IP address automatically through DHCP, the user
obtains an address from the specified IP address pool.
{ If the client is configured with a static IP address, the user uses the static IP address.
• If the interface has an IP address but no preauthentication IP pool configured, the user uses the
static IP address or the IP address obtained from a DHCP server.
• If the interface has no IP address or preauthentication IP pool configured, the user cannot
perform portal authentication.
After the user passes portal authentication, the AAA server authorizes an IP address pool for
re-assigning an IP address to the user. If no authorized IP address pool is deployed, the user
continues using the previous IP address.
If the portal user does not perform authentication or fails to pass authentication, the assigned IP
address is still retained.
When you configure a preauthentication IP address pool, follow these guidelines and restrictions:
• This configuration takes effect only when the direct IPv4 portal authentication is enabled on the
interface.
• Make sure the specified IP address pool exists and is complete. Otherwise, the user cannot
obtain the IP address and cannot perform portal authentication.
To configure an IP address pool before portal authentication:
148
To enable strict-checking on portal authorization information:
149
• ARP or ND detection—Sends ARP or ND requests to the user and detects the ARP or ND
entry status of the user at configurable intervals.
{ If the ARP or ND entry of the user is refreshed within the maximum number of detection
attempts, the device considers that the user is online and stops detecting the user's ARP or
ND entry. Then the device resets the idle timer and repeats the detection process when the
timer expires.
{ If the ARP or ND entry of the user is not refreshed after the maximum number of detection
attempts, the device logs out the user.
ARP and ND detections apply only to direct and re-DHCP portal authentication. ICMP detection
applies to all portal authentication modes.
To configure online detection of IPv4 portal users:
150
You can configure the device to take one or more of the following actions when the server
reachability status changes:
• Sending a trap message to the NMS. The trap message contains the name and current state of
the portal authentication server.
• Sending a log message, which contains the name, the current state, and the original state of the
portal authentication server.
• Enabling portal fail-permit. When the portal authentication server is unreachable, the portal
fail-permit feature on an interface allows users on the interface to have network access. When
the server recovers, it resumes portal authentication on the interface. For more information, see
"Configuring the portal fail-permit feature."
To configure portal authentication server detection:
151
Step Command Remarks
1. Enter system view. system-view N/A
2. Enter portal Web
server view. portal web-server server-name N/A
152
Configuring the portal fail-permit feature
Perform this task to configure the portal fail-permit feature on an interface. When the access device
detects that the portal authentication server or portal Web server is unreachable, it allows users on
the interface to have network access without portal authentication.
If you enable fail-permit for both a portal authentication server and a portal Web server on an
interface, the interface does the following:
• Disables portal authentication when either server is unreachable.
• Resumes portal authentication when both servers are reachable.
After portal authentication resumes, unauthenticated users must pass portal authentication to
access the network. Users who have passed portal authentication before the fail-permit event can
continue accessing the network.
To configure portal fail-permit:
153
Step Command Remarks
154
Logging out portal users
Logging out a user terminates the authentication process for the user or removes the user from the
authenticated users list.
To log out users:
Step Command
1. Enter system view. system-view
2. Log out IPv4 portal users. portal delete-user { ipv4-address | all | interface interface-type
interface-number }
3. Log out IPv6 portal users. portal delete-user { all | interface interface-type interface-number |
ipv6 ipv6-address }
155
Step Command Remarks
1. Enter system view. system-view N/A
Task Command
Display portal rules on an interface (centralized display portal rule { all | dynamic | static }
devices in standalone mode). interface interface-type interface-number
156
Task Command
display portal rule { all | dynamic | static }
Display portal rules on an interface (distributed
interface interface-type interface-number [ slot
devices in standalone mode).
slot-id ]
display portal rule { all | dynamic | static }
Display portal rules on an interface (distributed
interface interface-type interface-number [ chassis
devices in IRF mode).
chassis-number slot slot-number ]
Display portal configuration and portal running state display portal interface interface-type
information on an interface. interface-number
Display portal authentication server information. display portal server [ server-name ]
Display portal Web server information. display portal web-server [ server-name ]
Display packet statistics for portal authentication display portal packet statistics [ server
servers. server-name ]
display portal user { all | interface interface-type
interface-number| ip ip-address | ipv6 ipv6-address |
Display portal user information.
pre-auth [ interface interface-type interface-number
| | ip ip-address | ipv6 ipv6-address ] } [ verbose ]
Clear packet statistics for portal authentication reset portal packet statistics [ server
servers. server-name ]
Display Web redirect rule information (centralized display web-redirect rule interface interface-type
devices in standalone mode). interface-number
Display Web redirect rule information (distributed
display web-redirect rule interface interface-type
devices in standalone mode/centralized devices in
interface-number [ slot slot-number ]
IRF mode).
display web-redirect rule interface interface-type
Display Web redirect rule information (distributed
interface-number [ chassis chassis-number slot
devices in IRF mode).
slot-number ]
157
Figure 51 Network diagram
Configuration prerequisites
• Configure IP addresses for the host, router, and servers as shown in Figure 51 and make sure
they can reach each other.
• Configure the RADIUS server correctly to provide authentication and accounting functions.
Configuring the portal authentication server on IMC PLAT 5.0
This example assumes that the portal server runs on IMC PLAT 5.0(E0101) and IMC UAM
5.0(E0101).
1. Configure the portal authentication server:
a. Log in to IMC and click the Service tab.
b. Select User Access Manager > Portal Service Management > Server from the
navigation tree to enter the portal server configuration page, as shown in Figure 52.
c. Configure the portal server parameters as needed.
This example uses the default settings.
d. Click OK.
Figure 52 Portal server configuration
158
2. Configure the IP address group:
a. Select User Access Manager > Portal Service Management > IP Group from the
navigation tree to enter the portal IP address group configuration page.
b. Click Add to enter the page shown in Figure 53.
c. Enter the IP group name.
d. Enter the start IP address and end IP address of the IP group.
Make sure the host IP address is in the IP group.
e. Select a service group.
This example uses the default group Ungrouped.
f. Select Normal from the Action list.
g. Click OK.
Figure 53 Adding an IP address group
159
Figure 54 Adding a portal device
160
Figure 56 Adding a port group
5. Select User Access Manager > Service Parameters > Validate System Configuration from
the navigation tree to validate the configurations.
Configuring the portal server on IMC PLAT 7.1
In this example, the portal server runs on IMC PLAT 7.1 (E0303) and IMC EIA 7.1 (F0303).
1. Configure the portal authentication server:
a. Log in to IMC and click the User tab.
b. Select User Access Policy > Portal Service > Server from the navigation tree to enter the
portal server configuration page, as shown in Figure 57.
c. Configure the portal server parameters as needed.
This example uses the default values.
d. Click OK.
161
Figure 57 Portal authentication server configuration
162
Figure 58 Adding an IP address group
163
4. Associate the portal device with the IP address group:
a. As shown in Figure 60, click the Port Group Information Management icon for device NAS
to enter the port group configuration page.
b. Click Add to enter the page shown in Figure 61.
c. Enter the port group name.
d. Select the configured IP address group.
The IP address used by the user to access the network must be within this IP address
group.
e. Use the default settings for other parameters.
f. Click OK.
Figure 60 Device list
164
# Specify the primary authentication server and primary accounting server, and configure the
keys for communication with the servers.
[Router-radius-rs1] primary authentication 192.168.0.112
[Router-radius-rs1] primary accounting 192.168.0.112
[Router-radius-rs1] key authentication simple radius
[Router-radius-rs1] key accounting simple radius
# Exclude the ISP domain name from the username sent to the RADIUS server.
[Router-radius-rs1] user-name-format without-domain
[Router-radius-rs1] quit
# Enable RADIUS session control.
[Router] radius session-control enable
2. Configure an authentication domain:
# Create an ISP domain named dm1 and enter its view.
[Router] domain dm1
# Configure AAA methods for the ISP domain.
[Router-isp-dm1] authentication portal radius-scheme rs1
[Router-isp-dm1] authorization portal radius-scheme rs1
[Router-isp-dm1] accounting portal radius-scheme rs1
[Router-isp-dm1] quit
# Configure domain dm1 as the default ISP domain. If a user enters the username without the
ISP domain name at login, the authentication and accounting methods of the default domain
are used for the user.
[Router] domain default enable dm1
3. Configure portal authentication:
# Configure a portal authentication server.
[Router] portal server newpt
[Router-portal-server-newpt] ip 192.168.0.111 key simple portal
[Router-portal-server-newpt] port 50100
[Router-portal-server-newpt] quit
# Configure a portal Web server.
[Router] portal web-server newpt
[Router-portal-websvr-newpt] url http://192.168.0.111:8080/portal
[Router-portal-websvr-newpt] quit
# Enable direct portal authentication on GigabitEthernet 2/0/2.
[Router] interface gigabitethernet 2/0/2
[Router–GigabitEthernet2/0/2] portal enable method direct
# Reference the portal Web server newpt on GigabitEthernet 2/0/2.
[Router–GigabitEthernet2/0/2] portal apply web-server newpt
# Configure the BAS-IP as 2.2.2.1 for portal packets sent from GigabitEthernet 2/0/2 to the
portal authentication server.
[Router–GigabitEthernet2/0/2] portal bas-ip 2.2.2.1
[Router–GigabitEthernet2/0/2] quit
165
Authorization : Strict checking
ACL : Disabled
IPv4:
Portal status: Enabled
Authentication type: Direct
Portal Web server: newpt
Authentication domain: Not configured
Pre-auth IP pool: Not configured
BAS-IP: 2.2.2.1
User Detection: Not configured
Action for server detection:
Server type Server name Action
-- -- --
Layer3 source network:
IP address Mask
A user can perform portal authentication by using the HPE iNode client or through Web page. Before
passing the authentication, the user can access only the authentication page
http://192.168.0.111:8080/portal. All Web requests from the user will be redirected to the
authentication page. After passing the authentication, the user can access Internet resources.
# After the user passes authentication, use the following command to display information about the
portal user.
[Router] display portal user interface gigabitethernet 2/0/2
Total portal users: 1
Username: abc
Portal server: newpt
State: Online
VPN instance: N/A
MAC IP VLAN Interface
0015-e9a6-7cfe 2.2.2.2 -- GigabitEthernet2/0/2
Authorization information:
166
DHCP IP pool: N/A
Session group profile: N/A
ACL: N/A
CAR: N/A
Portal server
192.168.0.111/24
GE2/0/2
20.20.20.1/24 GE2/0/1
10.0.0.1/24 sub 192.168.0.100/24
RADIUS server
192.168.0.113/24
167
Configuration procedure
Perform the following tasks on the router.
1. Configure a RADIUS scheme:
# Create a RADIUS scheme named rs1 and enter its view.
<Router> system-view
[Router] radius scheme rs1
# Specify the primary authentication server and primary accounting server, and configure the
keys for communication with the servers.
[Router-radius-rs1] primary authentication 192.168.0.113
[Router-radius-rs1] primary accounting 192.168.0.113
[Router-radius-rs1] key authentication simple radius
[Router-radius-rs1] key accounting simple radius
# Exclude the ISP domain name from the username sent to the RADIUS server.
[Router-radius-rs1] user-name-format without-domain
[Router-radius-rs1] quit
# Enable RADIUS session control.
[Router] radius session-control enable
2. Configure an authentication domain:
# Create an ISP domain named dm1 and enter its view.
[Router] domain dm1
# Configure AAA methods for the ISP domain.
[Router-isp-dm1] authentication portal radius-scheme rs1
[Router-isp-dm1] authorization portal radius-scheme rs1
[Router-isp-dm1] accounting portal radius-scheme rs1
[Router-isp-dm1] quit
# Configure domain dm1 as the default ISP domain. If a user enters the username without the
ISP domain name at login, the authentication and accounting methods of the default domain
are used for the user.
[Router] domain default enable dm1
3. Configure DHCP relay and authorized ARP:
# Configure DHCP relay.
[Router] dhcp enable
[Router] dhcp relay client-information record
[Router] interface gigabitethernet 2/0/2
[Router–GigabitEthernet2/0/2] ip address 20.20.20.1 255.255.255.0
[Router–GigabitEthernet2/0/2] ip address 10.0.0.1 255.255.255.0 sub
[Router-GigabitEthernet2/0/2] dhcp select relay
[Router-GigabitEthernet2/0/2] dhcp relay server-address 192.168.0.112
# Enable authorized ARP.
[Router-GigabitEthernet2/0/2] arp authorized enable
[Router-GigabitEthernet2/0/2] quit
4. Configure portal authentication:
# Configure a portal authentication server.
[Router] portal server newpt
[Router-portal-server-newpt] ip 192.168.0.111 key simple portal
[Router-portal-server-newpt] port 50100
[Router-portal-server-newpt] quit
168
# Configure a portal Web server.
[Router] portal web-server newpt
[Router-portal-websvr-newpt] url http://192.168.0.111:8080/portal
[Router-portal-websvr-newpt] quit
# Enable re-DHCP portal authentication on GigabitEthernet 2/0/2.
[Router] interface gigabitethernet 2/0/2
[Router-GigabitEthernet2/0/2] portal enable method redhcp
# Reference the portal Web server newpt on GigabitEthernet 2/0/2.
[Router–GigabitEthernet2/0/2] portal apply web-server newpt
# Configure the BAS-IP as 20.20.20.1 for portal packets sent from GigabitEthernet 2/0/2 to the
portal authentication server.
[Router–GigabitEthernet2/0/2] portal bas-ip 20.20.20.1
[Router–GigabitEthernet2/0/2] quit
169
IP address Prefix length
A user can perform portal authentication by using the HPE iNode client or through Web page. Before
passing the authentication, the user can access only the authentication page
http://192.168.0.111:8080/portal. All Web requests from the user will be redirected to the
authentication page. After passing the authentication, the user can access Internet resources.
# After the user passes authentication, use the following command to display information about the
portal user.
[Router] display portal user interface gigabitethernet 2/0/2
Total portal users: 1
Username: abc
Portal server: newpt
State: Online
VPN instance: N/A
MAC IP VLAN Interface
0015-e9a6-7cfe 20.20.20.2 -- GigabitEthernet2/0/2
Authorization information:
DHCP IP pool: N/A
Session group profile: N/A
ACL: N/A
CAR: N/A
170
Configuration prerequisites and guidelines
• Configure IP addresses for the router and servers as shown in Figure 63 and make sure the
host, router, and servers can reach each other.
• Configure the RADIUS server correctly to provide authentication and accounting functions.
• Make sure the IP address of the portal device added on the portal authentication server is the IP
address (20.20.20.1) of the router's interface connecting the host. The IP address group
associated with the portal device is the subnet of the host (8.8.8.0/24).
Configuration procedure
Perform the following tasks on Router A.
1. Configure a RADIUS scheme:
# Create a RADIUS scheme named rs1 and enter its view.
<RouterA> system-view
[RouterA] radius scheme rs1
# Specify the primary authentication server and primary accounting server, and configure the
keys for communication with the servers.
[RouterA-radius-rs1] primary authentication 192.168.0.112
[RouterA-radius-rs1] primary accounting 192.168.0.112
[RouterA-radius-rs1] key authentication simple radius
[RouterA-radius-rs1] key accounting simple radius
# Exclude the ISP domain name from the username sent to the RADIUS server.
[RouterA-radius-rs1] user-name-format without-domain
[RouterA-radius-rs1] quit
# Enable RADIUS session control.
[Router] radius session-control enable
2. Configure an authentication domain:
# Create an ISP domain named dm1 and enter its view.
[RouterA] domain dm1
# Configure AAA methods for the ISP domain.
[RouterA-isp-dm1] authentication portal radius-scheme rs1
[RouterA-isp-dm1] authorization portal radius-scheme rs1
[RouterA-isp-dm1] accounting portal radius-scheme rs1
[RouterA-isp-dm1] quit
# Configure domain dm1 as the default ISP domain. If a user enters the username without the
ISP domain name at login, the authentication and accounting methods of the default domain
are used for the user.
[Router] domain default enable dm1
3. Configure portal authentication:
# Configure a portal authentication server.
[RouterA] portal server newpt
[RouterA-portal-server-newpt] ip 192.168.0.111 key simple portal
[RouterA-portal-server-newpt] port 50100
[RouterA-portal-server-newpt] quit
# Configure a portal Web server.
[Router] portal web-server newpt
[RouterA-portal-websvr-newpt] url http://192.168.0.111:8080/portal
[RouterA-portal-websvr-newpt] quit
# Enable cross-subnet portal authentication on GigabitEthernet 2/0/2.
171
[RouterA] interface gigabitethernet 2/0/2
[RouterA–GigabitEthernet2/0/2] portal enable method layer3
# Reference the portal Web server newpt on GigabitEthernet 2/0/2.
[RouterA–GigabitEthernet2/0/2] portal apply web-server newpt
# Configure the BAS-IP as 20.20.20.1 for portal packets sent from GigabitEthernet 2/0/2 to the
portal authentication server.
[RouterA–GigabitEthernet2/0/2] portal bas-ip 20.20.20.1
[RouterA–GigabitEthernet2/0/2] quit
On Router B, configure a default route to subnet 192.168.0.0/24, specifying the next hop address as
20.20.20.1. (Details not shown.)
Verifying the configuration
# Verify that the portal configuration has taken effect.
[Router] display portal interface gigabitethernet 2/0/2
Portal information of GigabitEthernet2/0/2
NAS-ID profile: Not configured
Authorization : Strict checking
ACL : Disabled
IPv4:
Portal status: Enabled
Authentication type: Layer3
Portal Web server: newpt
Authentication domain: Not configured
Pre-auth IP pool: Not configured
BAS-IP: 20.20.20.1
User Detection: Not configured
Action for server detection:
Server type Server name Action
-- -- --
Layer3 source network:
IP address Mask
172
IP address Prefix length
A user can perform portal authentication by using the HPE iNode client or through Web page. Before
passing the authentication, the user can access only the authentication page
http://192.168.0.111:8080/portal. All Web requests from the user will be redirected to the
authentication page. After passing the authentication, the user can access Internet resources.
# After the user passes authentication, use the following command to display information about the
portal user.
[Router] display portal user interface gigabitethernet 2/0/2
Total portal users: 1
Username: abc
Portal server: newpt
State: Online
VPN instance: N/A
MAC IP VLAN Interface
0015-e9a6-7cfe 8.8.8.2 -- GigabitEthernet2/0/2
Authorization information:
DHCP IP pool: N/A
Session group profile: N/A
ACL: N/A
CAR: N/A
Configuration prerequisites
• Configure IP addresses for the host, router, and servers as shown in Figure 64 and make sure
they can reach each other.
173
• Configure the RADIUS server correctly to provide authentication and accounting functions.
Configuration procedure
Perform the following tasks on the router.
1. Configure a RADIUS scheme:
# Create a RADIUS scheme named rs1 and enter its view.
<Router> system-view
[Router] radius scheme rs1
# Specify the primary authentication server and primary accounting server, and configure the
keys for communication with the servers.
[Router-radius-rs1] primary authentication 192.168.0.112
[Router-radius-rs1] primary accounting 192.168.0.112
[Router-radius-rs1] key accounting simple radius
[Router-radius-rs1] key authentication simple radius
[Router-radius-rs1] user-name-format without-domain
# Specify the security policy server.
[Router-radius-rs1] security-policy-server 192.168.0.113
[Router-radius-rs1] quit
# Enable RADIUS session control.
[Router] radius session-control enable
2. Configure an authentication domain:
# Create an ISP domain named dm1 and enter its view.
[Router] domain dm1
# Configure AAA methods for the ISP domain.
[Router-isp-dm1] authentication portal radius-scheme rs1
[Router-isp-dm1] authorization portal radius-scheme rs1
[Router-isp-dm1] accounting portal radius-scheme rs1
[Router-isp-dm1] quit
# Configure domain dm1 as the default ISP domain. If a user enters the username without the
ISP domain name at login, the authentication and accounting methods of the default domain
are used for the user.
[Router] domain default enable dm1
3. Configure ACL 3000 as the isolation ACL and ACL 3001 as the security ACL.
[Router] acl advanced 3000
[Router-acl-ipv4-adv-3000] rule permit ip destination 192.168.0.0 0.0.0.255
[Router-acl-ipv4-adv-3000] rule deny ip
[Router-acl--ipv4adv-3000] quit
[Router] acl advanced 3001
[Router-acl-ipv4-adv-3001] rule permit ip
[Router-acl-ipv4-adv-3001] quit
NOTE:
Make sure you specify ACL 3000 as the isolation ACL and ACL 3001 as the security ACL on the
security policy server.
174
[Router-portal-server-newpt] port 50100
[Router-portal-server-newpt] quit
# Configure a portal Web server.
[Router] portal web-server newpt
[Router-portal-websvr-newpt] url http://192.168.0.111:8080/portal
[Router-portal-websvr-newpt] quit
# Enable direct portal authentication on GigabitEthernet 2/0/2.
[Router] interface gigabitethernet 2/0/2
[Router–GigabitEthernet2/0/2] portal enable method direct
# Reference the portal Web server newpt on GigabitEthernet 2/0/2.
[Router–GigabitEthernet2/0/2] portal apply web-server newpt
# Configure the BAS-IP as 2.2.2.1 for portal packets sent from GigabitEthernet 2/0/2 to the
portal authentication server.
[Router–GigabitEthernet2/0/2] portal bas-ip 2.2.2.1
[Router–GigabitEthernet2/0/2] quit
175
-- -- --
Layer3 source network:
IP address Prefix length
Before passing portal authentication, a user that uses the HPE iNode client can access only the
authentication page http://192.168.0.111:8080/portal. All Web requests from the user will be
redirected to the authentication page.
• The user can access the resources permitted by ACL 3000 after passing only identity
authentication.
• The user can access Internet resources permitted by ACL 3001 after passing both identity
authentication and security check.
# After the user passes identity authentication and security check, use the following command to
display information about the portal user.
[Router] display portal user interface gigabitethernet 2/0/2
Total portal users: 1
Username: abc
Portal server: newpt
State: Online
VPN instance: N/A
MAC IP VLAN Interface
0015-e9a6-7cfe 2.2.2.2 -- GigabitEthernet2/0/2
Authorization information:
DHCP IP pool: N/A
Session group profile: N/A
ACL: 3001
CAR: N/A
176
Figure 65 Network diagram
177
# Enable RADIUS session control.
[Router-radius-rs1] radius session-control enable
[Router-radius-rs1] quit
# Enable RADIUS session control.
[Router] radius session-control enable
2. Configure an authentication domain:
# Create an ISP domain named dm1 and enter its view.
[Router] domain dm1
# Configure AAA methods for the ISP domain.
[Router-isp-dm1] authentication portal radius-scheme rs1
[Router-isp-dm1] authorization portal radius-scheme rs1
[Router-isp-dm1] accounting portal radius-scheme rs1
[Router-isp-dm1] quit
# Configure domain dm1 as the default ISP domain. If a user enters the username without the
ISP domain name at login, the authentication and accounting methods of the default domain
are used for the user.
[Router] domain default enable dm1
3. Configure ACL 3000 as the isolation ACL and ACL 3001 as the security ACL.
[Router] acl advanced 3000
[Router-acl-ipv4-adv-3000] rule permit ip destination 192.168.0.0 0.0.0.255
[Router-acl-ipv4-adv-3000] rule deny ip
[Router-acl-ipv4-adv-3000] quit
[Router] acl advanced 3001
[Router-acl-ipv4-adv-3001] rule permit ip
[Router-acl-ipv4-adv-3001] quit
NOTE:
Make sure you specify ACL 3000 as the isolation ACL and ACL 3001 as the security ACL on the
security policy server.
178
# Configure a portal Web server.
[Router] portal web-server newpt
[Router-portal-websvr-newpt] url http://192.168.0.111:8080/portal
[Router-portal-websvr-newpt] quit
# Enable re-DHCP portal authentication on GigabitEthernet 2/0/2.
[Router] interface gigabitethernet 2/0/2
[Router-GigabitEthernet2/0/2] portal enable method redhcp
# Reference the portal Web server newpt on GigabitEthernet 2/0/2.
[Router–GigabitEthernet2/0/2] portal apply web-server newpt
# Configure the BAS-IP as 20.20.20.1 for portal packets sent from GigabitEthernet 2/0/2 to the
portal authentication server.
[Router–GigabitEthernet2/0/2] portal bas-ip 20.20.20.1
[Router–GigabitEthernet2/0/2] quit
179
IP address Prefix length
Before passing portal authentication, a user that uses the HPE iNode client can access only the
authentication page http://192.168.0.111:8080/portal. All Web requests from the user will be
redirected to the authentication page.
• The user can access the resources permitted by ACL 3000 after passing only identity
authentication.
• The user can access Internet resources permitted by ACL 3001 after passing both identity
authentication and security check.
# After the user passes identity authentication and security check, use the following command to
display information about the portal user.
[Router] display portal user interface gigabitethernet 2/0/2
Total portal users: 1
Username: abc
Portal server: newpt
State: Online
VPN instance: N/A
MAC IP VLAN Interface
0015-e9a6-7cfe 20.20.20.2 -- GigabitEthernet2/0/2
Authorization information:
DHCP IP pool: N/A
Session group profile: N/A
ACL: 3001
CAR: N/A
180
Figure 66 Network diagram
181
# Configure domain dm1 as the default ISP domain. If a user enters the username without the
ISP domain name at login, the authentication and accounting methods of the default domain
are used for the user.
[RouterA] domain default enable dm1
3. Configure ACL 3000 as the isolation ACL and ACL 3001 as the security ACL.
[RouterA] acl advanced 3000
[RouterA-acl-ipv4-adv-3000] rule permit ip destination 192.168.0.0 0.0.0.255
[RouterA-acl-ipv4-adv-3000] rule deny ip
[RouterA-acl-ipv4-adv-3000] quit
[RouterA] acl advanced 3001
[RouterA-acl-ipv4-adv-3001] rule permit ip
[RouterA-acl-ipv4-adv-3001] quit
NOTE:
Make sure you specify ACL 3000 as the isolation ACL and ACL 3001 as the security ACL on the
security policy server.
On Router B, configure a default route to subnet 192.168.0.0/24, specifying the next hop address as
20.20.20.1. (Details not shown.)
Verifying the configuration
# Verify that the portal configuration has taken effect.
[Router] display portal interface gigabitethernet 2/0/2
Portal information of GigabitEthernet 2/0/2
NAS-ID profile: Not configured
Authorization : Strict checking
ACL : Disabled
IPv4:
Portal status: Enabled
Authentication type: Layer3
182
Portal Web server: newpt
Authentication domain: Not configured
Pre-auth IP pool: Not configured
BAS-IP: 20.20.20.1
User Detection: Not configured
Action for server detection:
Server type Server name Action
-- -- --
Layer3 source network:
IP address Mask
Before passing portal authentication, a user that uses the HPE iNode client can access only the
authentication page http://192.168.0.111:8080/portal. All Web requests from the user are
redirected to the authentication page.
• The user can access the resources permitted by ACL 3000 after passing only identity
authentication.
• The user can access Internet resources permitted by ACL 3001 after passing both identity
authentication and security check.
# After the user passes identity authentication and security check, use the following command to
display information about the portal user.
[Router] display portal user interface gigabitethernet 2/0/2
Total portal users: 1
Username: abc
Portal server: newpt
State: Online
VPN instance: N/A
MAC IP VLAN Interface
0015-e9a6-7cfe 8.8.8.2 -- GigabitEthernet2/0/2
Authorization information:
DHCP IP pool: N/A
Session group profile: N/A
183
ACL: 3001
CAR: N/A
184
Configuring the portal authentication server on IMC PLAT 5.0
This example assumes that the portal server runs on IMC PLAT 5.0(E0101) and IMC UAM
5.0(E0101).
1. Configure the portal authentication server:
a. Log in to IMC and click the Service tab.
b. Select User Access Manager > Portal Service Management > Server from the
navigation tree to enter the portal server configuration page, as shown in Figure 68.
c. Configure the portal server heartbeat interval and user heartbeat interval.
d. Use the default settings for other parameters.
e. Click OK.
Figure 68 Portal authentication server configuration
185
Figure 69 Adding an IP address group
186
b. Click Add to enter the page shown in Figure 72.
c. Enter the port group name.
d. Select the configured IP address group.
The IP address used by the user to access the network must be within this IP address
group.
e. Use the default settings for other parameters.
f. Click OK.
Figure 71 Device list
5. Select User Access Manager > Service Parameters > Validate System Configuration from
the navigation tree to validate the configurations.
Configuring the portal server on IMC PLAT 7.1
In this example, the portal server runs on IMC PLAT 7.1 (E0303) and IMC EIA 7.1 (F0303).
1. Configure the portal authentication server:
a. Log in to IMC and click the User tab.
b. Select User Access Policy > Portal Service > Server from the navigation tree to enter the
portal server configuration page, as shown in Figure 73.
c. Configure the portal server parameters as needed.
This example uses the default values.
d. Click OK.
187
Figure 73 Portal authentication server configuration
188
Figure 74 Adding an IP address group
189
4. Associate the portal device with the IP address group:
a. As shown in Figure 76, click the Port Group Information Management icon for device NAS
to enter the port group configuration page.
b. Click Add to enter the page shown in Figure 77.
c. Enter the port group name.
d. Select the configured IP address group.
The IP address used by the user to access the network must be within this IP address
group.
e. Use the default settings for other parameters.
f. Click OK.
Figure 76 Device list
190
# Specify the primary authentication server and primary accounting server, and configure the
keys for communication with the servers.
[Router-radius-rs1] primary authentication 192.168.0.112
[Router-radius-rs1] primary accounting 192.168.0.112
[Router-radius-rs1] key authentication simple radius
[Router-radius-rs1] key accounting simple radius
# Exclude the ISP domain name from the username sent to the RADIUS server.
[Router-radius-rs1] user-name-format without-domain
[Router-radius-rs1] quit
# Enable RADIUS session control.
[Router] radius session-control enable
2. Configure an authentication domain:
# Create an ISP domain named dm1 and enter its view.
[Router] domain dm1
# Configure AAA methods for the ISP domain.
[Router-isp-dm1] authentication portal radius-scheme rs1
[Router-isp-dm1] authorization portal radius-scheme rs1
[Router-isp-dm1] accounting portal radius-scheme rs1
[Router-isp-dm1] quit
# Configure domain dm1 as the default ISP domain. If a user enters the username without the
ISP domain name at login, the authentication and accounting methods of the default domain
are used for the user.
[Router] domain default enable dm1
3. Configure portal authentication:
# Configure a portal authentication server.
[Router] portal server newpt
[Router-portal-server-newpt] ip 192.168.0.111 key simple portal
[Router-portal-server-newpt] port 50100
# Configure reachability detection of the portal authentication server: set the server detection
interval to 40 seconds, and send log messages upon reachability status changes.
[Router-portal-server-newpt] server-detect timeout 40 log
NOTE:
The value of timeout must be greater than or equal to the portal server heartbeat interval.
# Configure portal user synchronization with the portal authentication server, and set the
synchronization detection interval to 600 seconds.
[Router-portal-server-newpt] user-sync timeout 600
[Router-portal-server-newpt] quit
NOTE:
The value of timeout must be greater than or equal to the portal user heartbeat interval.
191
[Router–GigabitEthernet2/0/2] portal enable method direct
# Enable portal fail-permit for the portal authentication server newpt.
[Router–GigabitEthernet2/0/2] portal fail-permit server newpt
# Reference the portal Web server newpt on GigabitEthernet 2/0/2.
[Router–GigabitEthernet2/0/2] portal apply web-server newpt
# Configure the BAS-IP as 2.2.2.1 for portal packets sent from GigabitEthernet 2/0/2 to the
portal authentication server.
[Router–GigabitEthernet2/0/2] portal bas-ip 2.2.2.1
[Router–GigabitEthernet2/0/2] quit
The Up status of the portal authentication server indicates that the portal authentication server is
reachable. If the access device detects that the portal authentication server is unreachable, the
Status field in the command output displays Down. The access device generates a server
unreachable log "Portal server newpt turns down from up." and disables portal authentication on the
access interface, so the host can access the external network without authentication.
Configuration prerequisites
• Before enabling portal authentication, configure MPLS L3VPN and specify VPN targets for VPN
1 and VPN 3 so that VPN 1 and VPN 3 can communicate with each other. This example
192
describes only the access authentication configuration on the user-side PE. For information
about MPLS L3VPN configurations, see MPLS Configuration Guide.
• Configure the RADIUS server correctly to provide authentication and accounting functions.
Configuration procedure
Perform the following tasks on Router A.
1. Configure a RADIUS scheme:
# Create a RADIUS scheme named rs1 and enter its view.
<RouterA> system-view
[RouterA] radius scheme rs1
# For the RADIUS scheme, specify the VPN instance that is bound to the interface connected to
the portal/RADIUS server. This example uses VPN instance vpn3.
[RouterA-radius-rs1] vpn-instance vpn3
NOTE:
For the VPN instance information, see the MPLS L3VPN configuration on Router A.
# Specify the primary authentication server and primary accounting server, and configure the
keys for communication with the servers.
[RouterA-radius-rs1] primary authentication 192.168.0.111
[RouterA-radius-rs1] primary accounting 192.168.0.111
[RouterA-radius-rs1] key accounting simple radius
[RouterA-radius-rs1] key authentication simple radius
# Exclude the ISP domain name from the username sent to the RADIUS server.
[RouterA-radius-rs1] user-name-format without-domain
# Specify the source IP address for RADIUS packets to be sent as 3.3.0.3. This address must
be the same as that of the portal device specified on the portal authentication server to avoid
authentication failures.
[RouterA-radius-rs1] nas-ip 3.3.0.3
[RouterA-radius-rs1] quit
# Enable RADIUS session control.
[RouterA] radius session-control enable
2. Configure an authentication domain:
# Create an ISP domain named dm1 and enter its view.
[RouterA] domain dm1
# Configure AAA methods for the ISP domain.
[RouterA-isp-dm1] authentication portal radius-scheme rs1
[RouterA-isp-dm1] authorization portal radius-scheme rs1
[RouterA-isp-dm1] accounting portal radius-scheme rs1
[RouterA-isp-dm1] quit
# Configure domain dm1 as the default ISP domain. If a user enters the username without the
ISP domain name at login, the authentication and accounting methods of the default domain
are used for the user.
[RouterA] domain default enable dm1
3. Configure portal authentication:
# Configure a portal authentication server.
[RouterA] portal server newpt
[RouterA-portal-server-newpt] ip 192.168.0.111 vpn-instance vpn3 key simple portal
[RouterA-portal-server-newpt] port 50100
193
[RouterA-portal-server-newpt] quit
# Configure a portal Web server.
[RouterA] portal web-server newpt
[RouterA-portal-websvr-newpt] url http://192.168.0.111:8080/portal
[RouterA-portal-websvr-newpt] vpn-instance vpn3
[RouterA-portal-websvr-newpt] quit
# Enable cross-subnet portal authentication on GigabitEthernet 2/0/1.
[RouterA] interface gigabitethernet 2/0/1
[RouterA–GigabitEthernet2/0/1] portal enable method layer3
# Reference the portal Web server newpt on GigabitEthernet 2/0/1.
[RouterA–GigabitEthernet2/0/1] portal apply web-server newpt
# Configure the BAS-IP as 3.3.0.3 for portal packets sent from GigabitEthernet 2/0/1 to the
portal authentication server.
[RouterA–GigabitEthernet2/0/1] portal bas-ip 3.3.0.3
[RouterA–GigabitEthernet2/0/1] quit
194
Figure 79 Network diagram
Configuration prerequisites
• Configure IP addresses for the host, router, and servers as shown in Figure 79 and make sure
they can reach each other.
• Configure the RADIUS server correctly to provide authentication and accounting functions.
Configuration procedure
Perform the following tasks on the router.
1. Configure a preauthentication IP address pool:
# Configure DHCP address pool pre to assign IP addresses and other configuration
parameters to clients on subnet 2.2.2.0/24.
<Router> system-view
[Router] dhcp server ip-pool pre
[Router-dhcp-pool-pre] gateway-list 2.2.2.1
[Router-dhcp-pool-pre] network 2.2.2.0 24
[Router-dhcp-pool-pre] quit
# Enable the DHCP server on GigabitEthernet 2/0/2.
[Router] interface gigabitethernet 2/0/2
[Router–GigabitEthernet2/0/2] dhcp select server
[Router–GigabitEthernet2/0/2] quit
2. Configure a preauthentication domain:
# Create an ISP domain named abc and enter its view.
[Router] domain abc
# Specify authorization ACL 3010 in the domain.
[Router-isp-abc] authorization-attribute acl 3010
[Router-isp-abc] quit
# Configure a rule to permit access to the subnet 192.168.0.0/24.
[Router] acl advanced 3010
[Router-acl-ipv4-adv-3010] rule 1 permit ip destination 192.168.0.0 24
[Router-acl-ipv4-adv-3010] quit
# Configure preauthentication domain abc on GigabitEthernet 2/0/2.
[Router] interface gigabitethernet 2/0/2
[Router–GigabitEthernet2/0/2] portal pre-auth domain abc
[Router–GigabitEthernet2/0/2] quit
3. Configure portal authentication:
# Configure a portal authentication server.
195
[Router] portal server newpt
[Router-portal-server-newpt] ip 192.168.0.111 key simple portal
[Router-portal-server-newpt] port 50100
[Router-portal-server-newpt] quit
# Configure a portal Web server.
[Router] portal web-server newpt
[Router-portal-websvr-newpt] url http://192.168.0.111:8080/portal
[Router-portal-websvr-newpt] quit
# Enable direct portal authentication on GigabitEthernet 2/0/2.
[Router] interface gigabitethernet 2/0/2
[Router–GigabitEthernet2/0/2] portal enable method direct
# Reference the portal Web server newpt on GigabitEthernet 2/0/2.
[Router–GigabitEthernet2/0/2] portal apply web-server newpt
# Configure the BAS-IP as 2.2.2.1 for portal packets sent from GigabitEthernet 2/0/2 to the
portal authentication server.
[Router–GigabitEthernet2/0/2] portal bas-ip 2.2.2.1
[Router–GigabitEthernet2/0/2] quit
196
Figure 80 Network diagram
Portal server
192.168.0.111/24
GE2/0/2
20.20.20.1/24 GE2/0/1
10.0.0.1/24 sub 192.168.0.100/24
RADIUS server
192.168.0.113/24
197
[Router-acl-ipv4-adv-3010] rule 1 permit ip destination 192.168.0.0 24
[Router-acl-ipv4-adv-3010] quit
# Configure preauthentication domain abc on GigabitEthernet 2/0/2.
[Router] interface gigabitethernet 2/0/2
[Router–GigabitEthernet2/0/2] portal pre-auth domain abc
[Router–GigabitEthernet2/0/2] quit
2. Configure DHCP relay and authorized ARP.
# Configure DHCP relay.
[Router] dhcp enable
[Router] dhcp relay client-information record
[Router] interface gigabitethernet 2/0/2
[Router–GigabitEthernet2/0/2] ip address 20.20.20.1 255.255.255.0
[Router–GigabitEthernet2/0/2] ip address 10.0.0.1 255.255.255.0 sub
[Router-GigabitEthernet2/0/2] dhcp select relay
[Router-GigabitEthernet2/0/2] dhcp relay server-address 192.168.0.112
# Enable authorized ARP.
[Router-GigabitEthernet2/0/2] arp authorized enable
[Router-GigabitEthernet2/0/2] quit
3. Configure portal authentication:
# Configure a portal authentication server.
[Router] portal server newpt
[Router-portal-server-newpt] ip 192.168.0.111 key simple portal
[Router-portal-server-newpt] port 50100
[Router-portal-server-newpt] quit
# Configure a portal Web server.
[Router] portal web-server newpt
[Router-portal-websvr-newpt] url http://192.168.0.111:8080/portal
[Router-portal-websvr-newpt] quit
# Enable re-DHCP portal authentication on GigabitEthernet 2/0/2.
[Router] interface gigabitethernet 2/0/2
[Router–GigabitEthernet2/0/2] portal enable method redhcp
# Reference the portal Web server newpt on GigabitEthernet 2/0/2.
[Router–GigabitEthernet2/0/2] portal apply web-server newpt
# Configure the BAS-IP as 20.20.20.1 for portal packets sent from GigabitEthernet 2/0/2 to the
portal authentication server.
[Router–GigabitEthernet2/0/2] portal bas-ip 20.20.20.1
[Router–GigabitEthernet2/0/2] quit
198
Session group profile: N/A
ACL number: 3010
Inbound CAR: N/A
Outbound CAR: N/A
Troubleshooting portal
No portal authentication page is pushed for users
Symptom
When a user is redirected to the IMC portal authentication server, no portal authentication page or
error message is prompted for the user. The login page is blank.
Analysis
The key configured on the portal access device and that configured on the portal authentication
server are inconsistent. As a result, packet verification fails, and the portal authentication server
refuses to push the authentication page.
Solution
Use the display portal server command on the access device to check whether a key is configured
for the portal authentication server.
• If no key is configured, configure the right key.
• If a key is configured, use the ip or ipv6 command in the portal authentication server view to
correct the key, or correct the key configured for the access device on the portal authentication
server.
199
Cannot log out portal users on the RADIUS server
Symptom
The access device uses the HPE IMC server as the RADIUS server to perform identity
authentication for portal users. You cannot log out the portal users on the RADIUS server.
Analysis
The HPE IMC server uses session control packets to send disconnection requests to the access
device. On the access device, the listening UDP port for session control packets is disabled by
default. Therefore, the access device cannot receive the portal user logout requests from the
RADIUS server.
Solution
On the access device, execute the radius session-control enable command in system view to
enable the RADIUS session control function.
Users logged out by the access device still exist on the portal
authentication server
Symptom
After you log out a portal user on the access device, the user still exists on the portal authentication
server.
Analysis
When you execute the portal delete-user command on the access device to log out a user, the
access device sends an unsolicited logout notification to the portal authentication server. If the
BAS-IP or BAS-IPv6 address carried in the logout notification is different from the portal device IP
address specified on the portal authentication server, the portal authentication server discards the
logout notification. When sending of the logout notifications times out, the access device logs out the
user. However, the portal authentication server does not receive the logout notification successfully,
and therefore it regards the user is still online.
Solution
Configure the BAS-IP or BAS-IPv6 attribute on the interface enabled with portal authentication.
Make sure the attribute value is the same as the portal device IP address specified on the portal
authentication server.
200
discards the portal notification packet. As a result, the portal authentication server considers that the
user has failed the authentication.
Solution
Configure the BAS-IP or BAS-IPv6 attribute on the interface enabled with portal authentication.
Make sure the attribute value is the same as the portal device IP address specified on the portal
authentication server.
201
Configuring port security
Overview
Port security combines and extends 802.1X and MAC authentication to provide MAC-based network
access control. This feature applies to networks, such as a WLAN, that require different
authentication methods for different users on a port.
Port security provides the following functions:
• Prevents unauthorized access to a network by checking the source MAC address of inbound
traffic.
• Prevents access to unauthorized devices or hosts by checking the destination MAC address of
outbound traffic.
• Controls MAC address learning and authentication on a port to make sure the port learns only
source trusted MAC addresses.
A frame is illegal if its source MAC address cannot be learned in a port security mode or it is from a
client that has failed 802.1X or MAC authentication. The port security feature automatically takes a
predefined action on illegal frames. This automatic mechanism enhances network security and
reduces human intervention.
NOTE:
For scenarios that require only 802.1X authentication or MAC authentication, Hewlett Packard
Enterprise recommends you use the 802.1X authentication or MAC authentication feature rather
than port security. For more information about 802.1X and MAC authentication, see "Configuring
802.1X" and "Configuring MAC authentication."
202
Upon receiving a frame, the port in a security mode searches the MAC address table for the source
MAC address. If a match is found, the port forwards the frame. If no match is found, the port learns
the MAC address or performs authentication, depending on the security mode. If the frame is illegal,
the port takes the predefined NTK or intrusion protection action. Outgoing frames are not restricted
by port security's NTK action unless they trigger the NTK feature.
The maximum number of users a port supports equals the smaller value from the following values:
• The maximum number of secure MAC addresses that port security allows.
• The maximum number of concurrent users the authentication mode in use allows.
For example, if 802.1X allows more concurrent users than port security's limit on the number of MAC
addresses on the port in userLoginSecureExt mode, port security's limit takes effect.
Table 8 describes the port security modes and the security features.
Table 8 Port security modes
userLogin N/A
TIP:
• userLogin specifies 802.1X authentication and port-based access control. userLogin with
Secure specifies 802.1X authentication and MAC-based access control. Ext indicates allowing
multiple 802.1X users to be authenticated and serviced at the same time. A security mode
without Ext allows only one user to pass 802.1X authentication.
• macAddress specifies MAC authentication.
• Else specifies that the authentication method before Else is applied first. If the authentication
fails, whether to turn to the authentication method following Else depends on the protocol type of
the authentication request.
• Or specifies that the authentication method following Or is applied first. If the authentication fails,
the authentication method before Or is applied.
203
A port in this mode can learn MAC addresses. The automatically learned MAC addresses are
not added to the MAC address table as dynamic MAC address. Instead, these MAC addresses
are added to the secure MAC address table as secure MAC addresses. You can also configure
secure MAC addresses by using the port-security mac-address security command.
A port in autoLearn mode allows frames sourced from the following MAC addresses to pass:
{ Secure MAC addresses.
{ MAC addresses configured by using the mac-address dynamic and mac-address static
commands.
When the number of secure MAC addresses reaches the upper limit, the port transitions to
secure mode.
• secure.
MAC address learning is disabled on a port in secure mode. You configure MAC addresses by
using the mac-address static and mac-address dynamic commands. For more information
about configuring MAC address table entries, see Layer 2—LAN Switching Configuration
Guide.
A port in secure mode allows only frames sourced from the following MAC addresses to pass:
{ Secure MAC addresses.
{ MAC addresses configured by using the mac-address dynamic and mac-address static
commands.
Performing 802.1X authentication
• userLogin.
A port in this mode performs 802.1X authentication and implements port-based access control.
The port can service multiple 802.1X users. Once an 802.1X user passes authentication on the
port, any subsequent 802.1X users can access the network through the port without
authentication.
• userLoginSecure.
A port in this mode performs 802.1X authentication and implements MAC-based access control.
The port services only one user passing 802.1X authentication.
• userLoginSecureExt.
This mode is similar to the userLoginSecure mode except that this mode supports multiple
online 802.1X users.
• userLoginWithOUI.
This mode is similar to the userLoginSecure mode. The difference is that a port in this mode
also permits frames from one user whose MAC address contains a specific OUI.
In this mode, the port performs OUI check at first. If the OUI check fails, the port performs
802.1X authentication. The port permits frames that pass OUI check or 802.1X authentication.
NOTE:
An OUI is a 24-bit number that uniquely identifies a vendor, manufacturer, or organization. In
MAC addresses, the first three octets are the OUI.
204
In this mode, the port performs 802.1X authentication first. If 802.1X authentication fails, MAC
authentication is performed.
• macAddressOrUserLoginSecureExt.
This mode is similar to the macAddressOrUserLoginSecure mode, except that this mode
supports multiple 802.1X and MAC authentication users.
• macAddressElseUserLoginSecure.
This mode is the combination of the macAddressWithRadius and userLoginSecure modes, with
MAC authentication having a higher priority as the Else keyword implies. The mode allows one
802.1X authentication user and multiple MAC authentication users to log in.
In this mode, the port performs MAC authentication upon receiving non-802.1X frames. Upon
receiving 802.1X frames, the port performs MAC authentication and then, if the authentication
fails, 802.1X authentication.
• macAddressElseUserLoginSecureExt.
This mode is similar to the macAddressElseUserLoginSecure mode except that this mode
supports multiple 802.1X and MAC authentication users as the Ext keyword implies.
205
When port security is enabled, you cannot enable 802.1X or MAC authentication, or change the
access control mode or port authorization state. Port security automatically modifies these settings in
different security modes.
To enable port security:
You can use the undo port-security enable command to disable port security. Because the
command logs off the online users, make sure no online users are present.
Enabling or disabling port security resets the following security settings to the default:
• 802.1X access control mode is MAC-based.
• Port authorization state is auto.
For more information about 802.1X authentication and MAC authentication configuration, see
"Configuring 802.1X" and "Configuring MAC authentication."
206
{ HMIM-8GSW.
{ HMIM-24GSW.
{ HMIM-24GSWP.
{ SIC-4GSW.
{ SIC-4GSWP.
• Fixed Layer 2 Ethernet ports on the following routers:
{ MSR954(JH296A/JH297A/JH299A).
{ MSR1002-4/1003-8S.
{ MSR2004-24/2004-48.
Before you set a port security mode for a port, complete the following tasks:
• Disable 802.1X and MAC authentication.
• Verify that the port does not belong to any aggregation group or service loopback group.
• If you are configuring the autoLearn mode, set port security's limit on the number of secure
MAC addresses. You cannot change the setting when the port is operating in autoLearn mode.
When you set the port security mode, follow these guidelines:
• You can specify a port security mode when port security is disabled, but your configuration
cannot take effect.
• Changing the port security mode of a port logs off the online users of the port.
• Do not enable 802.1X authentication or MAC authentication on a port where port security is
configured.
To set the port security mode:
207
Configuring port security features
Port security features are supported only on the following ports:
• Layer 2 Ethernet ports on the following modules:
{ HMIM-8GSW.
{ HMIM-24GSW.
{ HMIM-24GSWP.
{ SIC-4GSW.
{ SIC-4GSWP.
• Fixed Layer 2 Ethernet ports on the following routers:
{ MSR954(JH296A/JH297A/JH299A).
{ MSR1002-4/1003-8S.
{ MSR2004-24/2004-48.
Configuring NTK
The NTK feature checks the destination MAC addresses in outbound frames to make sure frames
are forwarded only to authenticated devices.
The NTK feature supports the following modes:
• ntkonly—Forwards only unicast frames with authenticated destination MAC addresses.
• ntk-withbroadcasts—Forwards only broadcast frames and unicast frames with authenticated
destination MAC addresses.
• ntk-withmulticasts—Forwards only broadcast frames, multicast frames, and unicast frames
with authenticated destination MAC addresses.
The NTK feature drops any unicast frame with an unknown destination MAC address. Not all port
security modes support triggering the NTK feature. For more information, see Table 8.
To configure the NTK feature:
208
• disableport-temporarily—Disables the port for a period of time. The period can be configured
with the port-security timer disableport command.
To configure the intrusion protection feature:
NOTE:
On a port operating in either macAddressElseUserLoginSecure mode or
macAddressElseUserLoginSecureExt mode, intrusion protection is triggered only after both MAC
authentication and 802.1X authentication fail for the same frame.
209
Can be saved and
Type Address sources Aging mechanism survive a device
reboot?
By default, sticky MAC addresses do
• Manually added (by not age out. However, you can
using the configure an aging timer or use the
port-security aging timer together with the inactivity
mac-address aging feature to remove old sticky MAC
security command addresses.
with the sticky • If only the aging timer is Yes.
keyword). configured, the aging timer counts
Sticky The secure MAC
• Converted from up regardless of whether traffic aging timer restarts at
dynamic secure MAC data has been sent from the sticky a reboot.
addresses. MAC addresses.
• Automatically learned • If both the aging timer and the
when the dynamic inactivity aging feature are
secure MAC feature is configured, the aging timer restarts
disabled. once traffic data is detected from
the sticky MAC addresses.
• Converted from sticky
MAC addresses. No.
• Automatically learned All dynamic secure
Dynamic Same as sticky MAC addresses.
after the dynamic MAC addresses are
secure MAC feature is lost at reboot.
enabled.
When the maximum number of secure MAC address entries is reached, the port changes to secure
mode. In secure mode, the port cannot add or learn any more secure MAC addresses. The port
allows only frames sourced from secure MAC addresses or MAC addresses configured by using the
mac-address dynamic or mac-address static command to pass through.
Configuration prerequisites
Before you configure secure MAC addresses, complete the following tasks:
• Enable port security.
• Set port security's limit on the number of MAC addresses on the port. Perform this task before
you enable autoLearn mode.
• Set the port security mode to autoLearn.
• Configure the port to permit packets of the specified VLAN to pass or add the port to the VLAN.
Make sure the VLAN already exists.
Configuration procedure
To configure a secure MAC address:
210
Step Command Remarks
• In system view:
port-security mac-address
security [ sticky ] mac-address
interface interface-type
By default, no secure MAC
interface-number vlan vlan-id
address exists.
3. Configure a secure • In Layer 2 Ethernet interface view:
In a VLAN, a MAC address cannot
MAC address. a. interface interface-type be specified as both a static
interface-number secure MAC address and a sticky
b. port-security mac-address MAC address.
security [ sticky ] mac-address
vlan vlan-id
c. quit
4. Enter Layer 2 Ethernet interface interface-type
interface view. N/A
interface-number
211
Step Command Remarks
1. Enter system view. system-view N/A
212
Step Command Remarks
• In system view:
port-security nas-id-profile
profile-name
• In Layer 2 Ethernet interface
view: By default, no NAS-ID profile is
2. Apply a NAS-ID profile. applied in system view or in
a. interface interface-type interface view.
interface-number
b. port-security
nas-id-profile
profile-name
Task Command
Display the port security configuration, display port-security [ interface interface-type
operation information, and statistics. interface-number ]
Display information about secure MAC display port-security mac-address security [ interface
addresses. interface-type interface-number ] [ vlan vlan-id ] [ count ]
Display information about blocked MAC display port-security mac-address block [ interface
addresses. interface-type interface-number ] [ vlan vlan-id ] [ count ]
213
Configuration procedure
# Enable port security.
<Device> system-view
[Device] port-security enable
# Set port security's limit on the number of secure MAC addresses to 64 on port GigabitEthernet
2/0/1.
[Device] interface gigabitethernet 2/0/1
[Device-GigabitEthernet2/0/1] port-security max-mac-count 64
# Configure the port to be silent for 30 seconds after the intrusion protection feature is triggered.
[Device-GigabitEthernet2/0/1] port-security intrusion-mode disableport-temporarily
[Device-GigabitEthernet2/0/1] quit
[Device] port-security timer disableport 30
GigabitEthernet2/0/1 is link-up
Port mode : autoLearn
NeedToKnow mode : Disabled
Intrusion protection mode : DisablePortTemporarily
Security MAC address attribute
Learning mode : Sticky
Aging type : Periodical
Max secure MAC addresses : 64
Current secure MAC addresses : 5
Authorization : Permitted
The port allows for MAC address learning, and you can view the number of learned MAC addresses
in the Current secure MAC addresses field.
# Display additional information about the learned MAC addresses.
[Device] interface gigabitethernet 2/0/1
[Device-GigabitEthernet2/0/1] display this
#
interface GigabitEthernet2/0/1
port-security max-mac-count 64
port-security port-mode autolearn
214
port-security mac-address security sticky 0002-0000-0015 vlan 1
port-security mac-address security sticky 0002-0000-0014 vlan 1
port-security mac-address security sticky 0002-0000-0013 vlan 1
port-security mac-address security sticky 0002-0000-0012 vlan 1
port-security mac-address security sticky 0002-0000-0011 vlan 1
#
[Device-GigabitEthernet2/0/1] quit
# Verify that the port security mode changes to secure after the number of MAC addresses learned
by the port reaches 64.
[Device] display port-security interface gigabitethernet 2/0/1
# Verify that the port will be disabled for 30 seconds after it receives a frame with an unknown MAC
address. (Details not shown.)
# After the port is re-enabled, delete several secure MAC addresses.
[Device] undo port-security mac-address security sticky 0002-0000-0015 vlan 1
[Device] undo port-security mac-address security sticky 0002-0000-0014 vlan 1
…
# Verify that the port security mode of the port changes to autoLearn, and the port can learn MAC
addresses again. (Details not shown.)
215
Configuration procedure
The following configuration steps cover some AAA/RADIUS configuration commands. For more
information about the commands, see Security Command Reference.
Make sure the host and the RADIUS server can reach each other.
1. Configure AAA:
# Configure a RADIUS scheme named radsun.
<Device> system-view
[Device] radius scheme radsun
[Device-radius-radsun] primary authentication 192.168.1.2
[Device-radius-radsun] primary accounting 192.168.1.3
[Device-radius-radsun] secondary authentication 192.168.1.3
[Device-radius-radsun] secondary accounting 192.168.1.2
[Device-radius-radsun] key authentication simple name
[Device-radius-radsun] key accounting simple money
[Device-radius-radsun] timer response-timeout 5
[Device-radius-radsun] retry 5
[Device-radius-radsun] timer realtime-accounting 15
[Device-radius-radsun] user-name-format without-domain
[Device-radius-radsun] quit
# Configure ISP domain sun.
[Device] domain sun
[Device-isp-sun] authentication lan-access radius-scheme radsun
[Device-isp-sun] authorization lan-access radius-scheme radsun
[Device-isp-sun] accounting lan-access radius-scheme radsun
[Device-isp-sun] quit
2. Configure 802.1X:
# Set the 802.1X authentication method to CHAP. By default, the authentication method for
802.1X is CHAP.
[Device] dot1x authentication-method chap
# Specify ISP domain sun as the mandatory authentication domain for 802.1X users on
GigabitEthernet 2/0/1.
[Device] interface gigabitethernet 2/0/1
[Device-GigabitEthernet2/0/1] dot1x mandatory-domain sun
[Device-GigabitEthernet2/0/1] quit
3. Configure port security:
# Enable port security.
[Device] port-security enable
# Add five OUI values. (You can add a maximum of 16 OUI values. The port permits only one
user matching one of the OUIs to pass authentication.)
[Device] port-security oui index 1 mac-address 1234-0100-1111
[Device] port-security oui index 2 mac-address 1234-0200-1111
[Device] port-security oui index 3 mac-address 1234-0300-1111
[Device] port-security oui index 4 mac-address 1234-0400-1111
[Device] port-security oui index 5 mac-address 1234-0500-1111
# Set the port security mode to userLoginWithOUI.
[Device] interface gigabitethernet 2/0/1
[Device-GigabitEthernet2/0/1] port-security port-mode userlogin-withoui
[Device-GigabitEthernet2/0/1] quit
216
Verifying the configuration
# Verify the RADIUS scheme configuration.
[Device] display radius scheme radsun
RADIUS scheme name : radsun
Index : 0
Primary authentication server:
IP : 192.168.1.2 Port: 1812
VPN : Not configured
State: Active
Test profile: Not configured
Primary accounting server:
IP : 192.168.1.3 Port: 1813
VPN : Not configured
State: Active
# After users pass authentication, display port security configuration. Verify that port GigabitEthernet
2/0/1 allows only one 802.1X user to be authenticated.
[Device] display port-security interface gigabitethernet 2/0/1
Port security : Enabled
AutoLearn aging time : 30 min
Disableport timeout : 30 s
MAC move : Denied
Authorization fail : Online
217
OUI value list :
Index : 1 Value : 123401
Index : 2 Value : 123402
Index : 3 Value : 123403
Index : 4 Value : 123404
Index : 5 Value : 123405
GigabitEthernet2/0/1 is link-up
Port mode : userLoginWithOUI
NeedToKnow mode : Disabled
Intrusion protection mode : NoAction
Security MAC address attribute
Learning mode : Sticky
Aging type : Periodical
Max secure MAC addresses : Not configured
Current secure MAC addresses : 1
Authorization : Permitted
# Display information about the online 802.1X user to verify 802.1X configuration.
[Device] display dot1x
# Verify that the port also allows one user whose MAC address has an OUI among the specified
OUIs to pass authentication.
[Device] display mac-address interface gigabitethernet 2/0/1
MAC Address VLAN ID State Port/NickName Aging
1234-0300-0011 1 Learned GE2/0/1 Y
218
Figure 83 Network diagram
Configuration procedure
Make sure the host and the RADIUS server can reach each other.
1. Configure RADIUS authentication/accounting and ISP domain settings. (See
"userLoginWithOUI configuration example.")
2. Configure port security:
# Enable port security.
<Device> system-view
[Device] port-security enable
# Use MAC-based accounts for MAC authentication. Each MAC address must be in the
hexadecimal notation with hyphens, and letters are in upper case.
[Device] mac-authentication user-name-format mac-address with-hyphen uppercase
# Specify the MAC authentication domain.
[Device] mac-authentication domain sun
# Set the 802.1X authentication method to CHAP. By default, the authentication method for
802.1X is CHAP.
[Device] dot1x authentication-method chap
# Set port security's limit on the number of MAC addresses to 64 on the port.
[Device] interface gigabitethernet 2/0/1
[Device-GigabitEthernet2/0/1] port-security max-mac-count 64
# Set the port security mode to macAddressElseUserLoginSecure.
[Device-GigabitEthernet2/0/1] port-security port-mode mac-else-userlogin-secure
# Specify ISP domain sun as the mandatory authentication domain for 802.1X users.
[Device-GigabitEthernet2/0/1] dot1x mandatory-domain sun
# Set the NTK mode of the port to ntkonly.
[Device-GigabitEthernet2/0/1] port-security ntk-mode ntkonly
[Device-GigabitEthernet2/0/1] quit
219
OUI value list
GigabitEthernet2/0/1 is link-up
Port mode : macAddressElseUserLoginSecure
NeedToKnow mode : NeedToKnowOnly
Intrusion protection mode : NoAction
Security MAC address attribute
Learning mode : Sticky
Aging type : Periodical
Max secure MAC addresses : 64
Current secure MAC addresses : 0
Authorization : Permitted
# After users pass authentication, display MAC authentication information. Verify that port
GigabitEthernet 2/0/1 allows multiple MAC authentication users to be authenticated.
[Device] display mac-authentication interface gigabitethernet 2/0/1
Global MAC authentication parameters:
MAC authentication : Enabled
User name format : MAC address in uppercase(XX-XX-XX-XX-XX-XX)
Username : mac
Password : Not configured
Offline detect period : 300 s
Quiet period : 180 s
Server timeout : 100 s
Authentication domain : sun
Max MAC-auth users : 1024 per slot
Online MAC-auth users : 3
GigabitEthernet2/0/1 is link-up
MAC authentication : Enabled
Authentication domain : Not configured
Auth-delay timer : Disabled
Re-auth server-unreachable : Logoff
Host mode : Single VLAN
Max online users : 4096
Authentication attempts : successful 3, failed 7
Current online users : 3
MAC address Auth state
1234-0300-0011 Authenticated
1234-0300-0012 Authenticated
1234-0300-0013 Authenticated
# Display 802.1X authentication information. Verify that GigabitEthernet 2/0/1 allows only one
802.1X user to be authenticated.
[Device] display dot1x interface gigabitethernet 2/0/1
Global 802.1X parameters:
802.1X authentication : Enabled
220
CHAP authentication : Enabled
Max-tx period : 30 s
Handshake period : 15 s
Quiet timer : Disabled
Quiet period : 60 s
Supp timeout : 30 s
Server timeout : 100 s
Reauth period : 3600 s
Max auth requests : 2
SmartOn supp timeout : 30 s
SmartOn retry counts : 3
EAD assistant function : Disabled
EAD timeout : 30 min
Domain delimiter : @
Max 802.1X users : 1024 per slot
Online 802.1X users : 1
GigabitEthernet2/0/1 is link-down
802.1X authentication : Enabled
Handshake : Enabled
Handshake security : Disabled
Unicast trigger : Disabled
Periodic reauth : Disabled
Port role : Authenticator
Authorization mode : Auto
Port access control : MAC-based
Multicast trigger : Enabled
Mandatory auth domain : sun
Guest VLAN : Not configured
Auth-Fail VLAN : Not configured
Critical VLAN : Not configured
Re-auth server-unreachable : Logoff
Max online users : 4096
SmartOn : Disabled
221
# Verify that frames with an unknown destination MAC address, multicast address, or broadcast
address are discarded. (Details not shown.)
222
Configuring user profiles
Overview
A user profile saves a set of predefined parameters, such as a CAR policy or a QoS policy.
The user profile application allows flexible traffic policing on a per-user basis. Each time a user
passes authentication, the device automatically applies the parameters in the user profile to this
user.
The user profile restricts authenticated user behavior as follows:
1. After the authentication server verifies a user, the server sends the device the name of the user
profile specified for the user.
2. The device applies the parameters in the user profile to the user.
3. When the user logs out, the device automatically removes the user profile parameters.
Compatibility information
Feature and hardware compatibility
Hardware User profile compatibility
MSR954(JH296A/JH297A/JH299A) No
MSR1002-4/1003-8S Yes
MSR2003 Yes
MSR2004-24/2004-48 Yes
MSR3012/3024/3044/3064 Yes
MSR4060/4080 Yes
223
Configuration restrictions and guidelines
When you configure user profiles, follow these restrictions and guidelines:
• Configure authentication parameters before you create a user profile. The user profile supports
working with only PPPoE authentication.
• Specify a user profile for each user account:
{ In remote authentication, specify a user profile on the authentication server.
{ In local authentication, specify a user profile in the local user view. For information about
local users, see "Configuring AAA."
Task Command
Display configuration and online user information
for the specified user profile or all user profiles display user-profile [ name profile-name ]
(centralized devices in standalone mode).
Display configuration and online user information
for the specified user profile or all user profiles display user-profile [ name profile-name ] [ slot
(distributed devices in standalone slot-number ]
mode/centralized devices in IRF mode).
Display configuration and online user information
display user-profile [ name profile-name ] [ chassis
for the specified user profile or all user profiles
chassis-number slot slot-number ]
(distributed devices in IRF mode).
224
Configuring password control
Overview
Password control allows you to implement the following features:
• Manage login and super password setup, expirations, and updates for device management
users.
• Control user login status based on predefined policies.
Local users are divided into two types: device management users and network access users. This
feature applies only to device management users. For more information about local users, see
"Configuring AAA."
Password setting
Minimum password length
You can define the minimum length of user passwords. If a user enters a password that is shorter
than the minimum length, the system rejects the password.
Password composition policy
A password can be a combination of characters from the following types:
• Uppercase letters A to Z.
• Lowercase letters a to z.
• Digits 0 to 9.
• Special characters. For information about special characters, see the password-control
composition command in Security Command Reference.
Depending on the system's security requirements, you can set the minimum number of character
types a password must contain and the minimum number of characters for each type, as shown
in Table 10.
Table 10 Password composition policy
In non-FIPS mode, all the combination levels are available for a password. In FIPS mode, only the
level 4 combination is available for a password.
When a user sets or changes a password, the system checks if the password meets the combination
requirement. If not, the operation fails.
Password complexity checking policy
A less complicated password such as a password containing the username or repeated characters is
more likely to be cracked. For higher security, you can configure a password complexity checking
policy to ensure that all user passwords are relatively complicated. With such a policy configured,
225
when a user configures a password, the system checks the complexity of the password. If the
password is complexity-incompliant, the configuration will fail.
You can apply the following password complexity requirements:
• A password cannot contain the username or the reverse of the username. For example, if the
username is abc, a password such as abc982 or 2cba is not complex enough.
• A character or number cannot be included three or more times consecutively. For example,
password a111 is not complex enough.
226
Current login passwords of device management users are not stored in the password history,
because a device management user password is saved in cipher text and cannot be recovered to a
plaintext password.
NOTE:
This account is locked only for this user. Other users can still use this account, and the blacklisted
user can use other user accounts.
Logging
The system logs all successful password changing events and user adding events to the password
control blacklist.
227
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for
features, commands, and parameters might differ in FIPS mode (see "Configuring FIPS") and
non-FIPS mode.
Tasks at a glance
(Required.) Enabling password control
(Optional.) Setting global password control parameters
(Optional.) Setting user group password control parameters
(Optional.) Setting local user password control parameters
(Optional.) Setting super password control parameters
228
Step Command Remarks
• In non-FIPS mode, the
global password control
feature is disabled by
2. Enable the global password default.
password-control enable
control feature. • In FIPS mode, the global
password control feature is
enabled, and cannot be
disabled by default.
6. Configure the password password-control complexity By default, the system does not
complexity checking policy. { same-character | user-name } perform password complexity
check checking.
7. Set the maximum number of
history password records for password-control history
The default setting is 4.
each user. max-record-num
229
Step Command Remarks
By default, the maximum number
8. Configure the login attempt password-control login-attempt of login attempts is 3 and a user
limit. login-times [ exceed { lock | failing to log in after the specified
lock-time time | unlock } ] number of attempts must wait for
1 minute before trying again.
9. Set the number of days
during which a user is password-control
notified of the pending The default setting is 7 days.
alert-before-expire alert-time
password expiration.
10. Set the maximum number of
days and maximum number password-control By default, a user can log in three
of times that a user can log in expired-user-login delay delay times within 30 days after the
after the password expires. times times password expires.
230
Setting local user password control parameters
Step Command Remarks
1. Enter system view. system-view N/A
By default, no local user exists.
Local user password control
2. Create a device applies to device management
management user and enter local-user user-name class users instead of network access
local user view. manage users.
For information about how to
configure a local user, see
"Configuring AAA."
By default, the setting equals that
3. Configure the password for the user group to which the
expiration time for the local password-control aging local user belongs. If no expiration
user. aging-time time is configured for the user
group, the global setting applies to
the local user.
By default, the setting equals that
4. Configure the minimum for the user group to which the
password length for the local local user belongs. If no minimum
password-control length length
user. password length is configured for
the user group, the global setting
applies to the local user.
By default, the settings equal
those for the user group to which
5. Configure the password password-control composition the local user belongs. If no
composition policy for the type-number type-number password composition policy is
local user. [ type-length type-length ] configured for the user group, the
global settings apply to the local
user.
By default, the settings equal
those for the user group to which
6. Configure the password password-control complexity the local user belongs. If no
complexity checking policy { same-character | user-name } password complexity checking
for the local user. check policy is configured for the user
group, the global settings apply to
the local user.
By default, the settings equal
those for the user group to which
7. Configure the login attempt password-control login-attempt
the local user belongs. If no
limit. login-times [ exceed { lock |
login-attempt policy is configured
lock-time time | unlock } ]
for the user group, the global
settings apply to the local user.
231
Step Command Remarks
1. Enter system view. system-view N/A
2. Set the password expiration password-control super aging
time for super passwords. The default setting is 90 days.
aging-time
• In non-FIPS mode, the
default setting is 10
3. Configure the minimum password-control super length characters.
length for super passwords. length
• In FIPS mode, the default
setting is 15 characters.
• In non-FIPS mode, a default
super password must
contain at least one
password-control super character type and at least
4. Configure the password one character for each type.
composition policy for super composition type-number
passwords. type-number [ type-length • In FIPS mode, a default
type-length ] super password must
contain at least four
character types and at least
one character for each type.
Task Command
Display password control configuration. display password-control [ super ]
Display information about users in the display password-control blacklist [ user-name name |
password control blacklist. ip ipv4-address | ipv6 ipv6-address ]
Delete users from the password control
reset password-control blacklist [ user-name name ]
blacklist.
reset password-control history-record [ user-name
Clear history password records.
name | super [ role role name ] ]
NOTE:
The reset password-control history-record command can delete the history password records of
one or all users even when the password history feature is disabled.
232
• A password expires after 30 days.
• The minimum password update interval is 36 hours.
• The maximum account idle time is 30 days.
• A password cannot contain the username or the reverse of the username.
• No character appears consecutively three or more times in a password.
Configure a super password control policy for user role network-operator to meet the following
requirements:
• A super password must contain at least 24 characters.
• A super password must contain at least four character types and at least five characters for
each type.
Configure a password control policy for the local Telnet user test to meet the following requirements:
• The password must contain at least 24 characters.
• The password must contain at least four character types and at least five characters for each
type.
• The password for the local user expires after 20 days.
Configuration procedure
# Enable the password control feature globally.
<Sysname> system-view
[Sysname] password-control enable
# Disable a user account permanently if a user fails two consecutive login attempts on the user
account.
[Sysname] password-control login-attempt 2 exceed lock
# Specify that a user can log in five times within 60 days after the password expires.
[Sysname] password-control expired-user-login delay 60 times 5
# Refuse any password that contains the username or the reverse of the username.
[Sysname] password-control complexity user-name check
# Specify that no character can be included three or more times consecutively in a password.
[Sysname] password-control complexity same-character check
# Globally specify that all passwords must each contain at least four character types and at least four
characters for each type.
[Sysname] password-control composition type-number 4 type-length 4
# Specify that a super password must contain at least four character types and at least five
characters for each type.
233
[Sysname] password-control super composition type-number 4 type-length 5
# Specify that the password of the local user must contain at least four character types and at least
five characters for each type.
[Sysname-luser-manage-test] password-control composition type-number 4 type-length 5
# Set the password for the local user to expire after 20 days.
[Sysname-luser-manage-test] password-control aging 20
234
<Sysname> display local-user user-name test class manage
Total 1 local users matched.
235
Managing public keys
Overview
This chapter describes public key management for the following asymmetric key algorithms:
• Revest-Shamir-Adleman Algorithm (RSA).
• Digital Signature Algorithm (DSA).
• Elliptic Curve Digital Signature Algorithm (ECDSA).
Many security applications, including SSH, SSL, and PKI, use asymmetric key algorithms to secure
communications between two parties, as shown in Figure 84. Asymmetric key algorithms use two
separate keys (one public and one private) for encryption and decryption. Symmetric key algorithms
use only one key.
Figure 84 Encryption and decryption
A key owner can distribute the public key in plain text on the network but must keep the private key in
privacy. It is mathematically infeasible to calculate the private key even if an attacker knows the
algorithm and the public key.
The security applications use the asymmetric key algorithms for the following purposes:
• Encryption and decryption—Any public key receiver can use the public key to encrypt
information, but only the private key owner can decrypt the information.
• Digital signature—The key owner uses the private key to digitally sign information to be sent.
The receiver decrypts the information with the sender's public key to verify information
authenticity.
RSA, DSA, and ECDSA can all perform digital signature, but only RSA can perform encryption and
decryption.
Asymmetric key algorithms enable secure key distribution on an insecure network. The security
strength of an asymmetric key varies by the key modulus length as with any symmetric key
algorithm.
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for
features, commands, and parameters might differ in FIPS mode (see "Configuring FIPS") and
non-FIPS mode.
236
• Enter an appropriate key modulus length at prompt (see Table 11). The longer the key modulus
length, the higher the security, the longer the key generation time.
• If you do not assign the key pair a name, the system assigns the default name to the key pair
and marks the key pair as default. You can also assign the default name to another key pair, but
the system does not mark the key pair as default. The key pair name must be unique among all
manually named key pairs that use the same key algorithm. If a name conflict occurs, the
system asks whether you want to overwrite the existing key pair.
• The key pairs are automatically saved and can survive system reboots.
Table 11 A comparison of different types of asymmetric key algorithms
NOTE:
Only SSH 1.5 uses the RSA server key pair.
• In non-FIPS mode: 512 to 2048 bits
and defaults to 1024 bits.
Hewlett Packard Enterprise
DSA One host key pair. recommends using 768 bits or
longer.
• In FIPS mode: 2048 bits.
ECDSA One host key pair. 192 bits.
237
• Display a host public key.
After the key is displayed, record the key, for example, copy it to an unformatted file. On the
peer device, you must literally enter the key.
Step Command
1. Enter system view. system-view
• Export an RSA host public key:
{ In non-FIPS mode:
public-key local export rsa [ name key-name ] { openssh |
ssh1 | ssh2 } [ filename ]
2. Export a local host public { In FIPS mode:
key. public-key local export rsa [ name key-name ] { openssh |
ssh2 } [ filename ]
• Export a DSA host public key:
public-key local export dsa [ name key-name ] { openssh |
ssh2 } [ filename ]
Task Command
Display local RSA public keys. display public-key local rsa public [ name key-name ]
Display local DSA public keys. display public-key local dsa public [ name key-name ]
NOTE:
Do not distribute the RSA server public key serverkey (default) to a peer device.
238
Step Command
1. Enter system view. system-view
2. Destroy a local key pair. public-key local destroy { dsa | ecdsa | rsa }
[ name key-name ]
239
Step Command Remarks
When you exit public key view, the
4. Return to system view. peer-public-key end system automatically saves the peer
host public key.
Task Command
display public-key local { dsa | ecdsa | rsa } public [ name
Display local public keys.
key-name ]
Display peer host public keys. display public-key peer [ brief | name publickey-name ]
Device A Device B
Configuration procedure
1. Configure Device A:
# Create local RSA key pairs with default names on Device A, and use the default modulus
length 1024 bits.
<DeviceA> system-view
[DeviceA] public-key local create rsa
The range of public key modulus is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
.................++++++
......................................++++++
.....++++++++
..............++++++++
Create the key pair successfully.
240
# Display all local RSA public keys.
[DeviceA] display public-key local rsa public
=============================================
Key name: hostkey (default)
Key type: RSA
Time when key pair created: 16:48:31 2011/05/12
Key code:
30819F300D06092A864886F70D010101050003818D0030818902818100DA3B90F59237347B
8D41B58F8143512880139EC9111BFD31EB84B6B7C7A1470027AC8F04A827B30C2CAF79242E
45FDFF51A9C7E917DB818D54CB7AEF538AB261557524A7441D288EC54A5D31EFAE4F681257
6D7796490AF87A8C78F4A7E31F0793D8BA06FB95D54EBB9F94EB1F2D561BF66EA27DFD4788
CB47440AF6BB25ACA50203010001
=============================================
Key name: serverkey (default)
Key type: RSA
Time when key pair created: 16:48:31 2011/05/12
Key code:
307C300D06092A864886F70D0101010500036B003068026100C9451A80F7F0A9BA1A90C7BC
1C02522D194A2B19F19A75D9EF02219068BD7FD90FCC2AF3634EEB9FA060478DD0A1A49ACE
E1362A4371549ECD85BA04DEE4D6BB8BE53B6AED7F1401EE88733CA3C4CED391BAE633028A
AC41C80A15953FB22AA30203010001
2. Configure Device B:
# Enter the host public key of Device A in public key view. The key must be literally the same as
displayed on Device A.
<DeviceB> system-view
[DeviceB] public-key peer devicea
Enter public key view. Return to system view with "peer-public-key end" command.
[DeviceB-pkey-public-key-devicea]30819F300D06092A864886F70D010101050003818D003081
890
2818100DA3B90F59237347B
[DeviceB-pkey-public-key-devicea]8D41B58F8143512880139EC9111BFD31EB84B6B7C7A14700
27A
C8F04A827B30C2CAF79242E
[DeviceB-pkey-public-key-devicea]45FDFF51A9C7E917DB818D54CB7AEF538AB261557524A744
1D2
88EC54A5D31EFAE4F681257
[DeviceB-pkey-public-key-devicea]6D7796490AF87A8C78F4A7E31F0793D8BA06FB95D54EBB9F
94E
B1F2D561BF66EA27DFD4788
[DeviceB-pkey-public-key-devicea]CB47440AF6BB25ACA50203010001
# Save the public key and return to system view.
[DeviceB-pkey-public-key-devicea] peer-public-key end
=============================================
Key name: devicea
241
Key type: RSA
Key modulus: 1024
Key code:
30819F300D06092A864886F70D010101050003818D0030818902818100DA3B90F59237347B
8D41B58F8143512880139EC9111BFD31EB84B6B7C7A1470027AC8F04A827B30C2CAF79242E
45FDFF51A9C7E917DB818D54CB7AEF538AB261557524A7441D288EC54A5D31EFAE4F681257
6D7796490AF87A8C78F4A7E31F0793D8BA06FB95D54EBB9F94EB1F2D561BF66EA27DFD4788
CB47440AF6BB25ACA50203010001
Configuration procedure
1. Configure Device A:
# Create local RSA key pairs with default names on Device A, and use the default modulus
length 1024 bits.
<DeviceA> system-view
[DeviceA] public-key local create rsa
The range of public key modulus is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
.................++++++
......................................++++++
.....++++++++
..............++++++++
Create the key pair successfully.
# Display all local RSA public keys.
[DeviceA] display public-key local rsa public
=============================================
Key name: hostkey (default)
Key type: RSA
Time when key pair created: 16:48:31 2011/05/12
Key code:
30819F300D06092A864886F70D010101050003818D0030818902818100DA3B90F59237347B
8D41B58F8143512880139EC9111BFD31EB84B6B7C7A1470027AC8F04A827B30C2CAF79242E
242
45FDFF51A9C7E917DB818D54CB7AEF538AB261557524A7441D288EC54A5D31EFAE4F681257
6D7796490AF87A8C78F4A7E31F0793D8BA06FB95D54EBB9F94EB1F2D561BF66EA27DFD4788
CB47440AF6BB25ACA50203010001
=============================================
Key name: serverkey (default)
Key type: RSA
Time when key pair created: 16:48:31 2011/05/12
Key code:
307C300D06092A864886F70D0101010500036B003068026100C9451A80F7F0A9BA1A90C7BC
1C02522D194A2B19F19A75D9EF02219068BD7FD90FCC2AF3634EEB9FA060478DD0A1A49ACE
E1362A4371549ECD85BA04DEE4D6BB8BE53B6AED7F1401EE88733CA3C4CED391BAE633028A
AC41C80A15953FB22AA30203010001
# Export the RSA host public key to the file devicea.pub.
[DeviceA] public-key local export rsa ssh2 devicea.pub
[DeviceA] quit
# Enable the FTP server function, create an FTP user with the username ftp and password 123,
and configure the FTP user role as network-admin.
[DeviceA] ftp server enable
[DeviceA] local-user ftp
[DeviceA-luser-manage-ftp] password simple 123
[DeviceA-luser-manage-ftp] service-type ftp
[DeviceA-luser-manage-ftp] authorization-attribute user-role network-admin
[DeviceA-luser-manage-ftp] quit
2. Configure Device B:
# Use FTP in binary mode to get the public key file devicea.pub from Device A.
<DeviceB> ftp 10.1.1.1
Connected to 10.1.1.1 (10.1.1.1).
220 FTP service ready.
User(10.1.1.1:(none)):ftp
331 Password required for ftp.
Password:
230 User logged in.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> binary
200 TYPE is now 8-bit binary
ftp> get devicea.pub
227 Entering Passive Mode (10,1,1,1,118,252)
150 Accepted data connection
226 File successfully transferred
301 bytes received in 0.003 seconds (98.0 kbyte/s)
ftp> quit
221-Goodbye. You uploaded 0 and downloaded 1 kbytes.
221 Logout.
# Import the host public key from the key file devicea.pub.
<DeviceB> system-view
[DeviceB] public-key peer devicea import sshkey devicea.pub
243
Verifying the configuration
# Verify that the peer host public key configured on Device B is the same as the key displayed on
Device A.
[DeviceB] display public-key peer name devicea
=============================================
Key name: devicea
Key type: RSA
Key modulus: 1024
Key code:
30819F300D06092A864886F70D010101050003818D0030818902818100DA3B90F59237347B
8D41B58F8143512880139EC9111BFD31EB84B6B7C7A1470027AC8F04A827B30C2CAF79242E
45FDFF51A9C7E917DB818D54CB7AEF538AB261557524A7441D288EC54A5D31EFAE4F681257
6D7796490AF87A8C78F4A7E31F0793D8BA06FB95D54EBB9F94EB1F2D561BF66EA27DFD4788
CB47440AF6BB25ACA50203010001
244
Configuring PKI
Overview
Public Key Infrastructure (PKI) is an asymmetric key infrastructure to encrypt and decrypt data for
securing network services. Data encrypted with the public key can be decrypted only with the private
key. Likewise, data encrypted with the private key can be decrypted only with the public key.
PKI uses digital certificates to distribute and employ public keys, and provides network
communication and e-commerce with security services such as user authentication, data
confidentiality, and data integrity.
Hewlett Packard Enterprise's PKI system provides certificate management for IPsec and SSL.
PKI terminology
Digital certificate
A digital certificate is an electronic document signed by a CA that binds a public key with the identity
of its owner.
A digital certificate includes the following information:
• Issuer name (name of the CA that issued the certificate).
• Subject name (name of the individual or group to which the certificate is issued).
• Identity information of the subject.
• Subject's public key.
• Signature of the CA.
• Validity period.
A digital certificate must comply with the international standards of ITU-T X.509, of which X.509 v3 is
the most commonly used.
This chapter covers the following types of certificates:
• CA certificate—Certificate of a CA. Multiple CAs in a PKI system form a CA tree, with the root
CA at the top. The root CA generates a self-signed certificate, and each lower level CA holds a
CA certificate issued by the CA immediately above it. The chain of these certificates forms a
chain of trust.
• Registration authority (RA) certificate—Certificate issued by a CA to an RA. RAs act as
proxies for CAs to process enrollment requests in a PKI system.
• Local certificate—Digital certificate issued by a CA to a local PKI entity, which contains the
entity's public key.
• Peer certificate—CA-signed digital certificate of a peer, which contains the peer's public key.
Certificate revocation list
A certificate revocation list (CRL) is a list of serial numbers for certificates that have been revoked. A
CRL is created and signed by the CA that originally issued the certificates.
The CA publishes CRLs periodically to revoke certificates. Entities that are associated with the
revoked certificates should not be trusted.
The CA must revoke a certificate when any of the following conditions occurs:
• The certificate subject name is changed.
• The private key is compromised.
245
• The association between the subject and CA is changed. For example, when an employee
terminates employment with an organization.
CA policy
A CA policy is a set of criteria that a CA follows to process certificate requests, to issue and revoke
certificates, and to publish CRLs. Typically, a CA advertises its policy in a certification practice
statement (CPS). You can obtain a CA policy through out-of-band means such as phone, disk, and
email. Make sure you understand the CA policy before you select a trusted CA for certificate request
because different CAs might use different policies.
PKI architecture
A PKI system consists of PKI entities, CAs, RAs and a certificate/CRL repository, as shown in Figure
87.
Figure 87 PKI architecture
• PKI entity—An end user using PKI certificates. The PKI entity can be an operator, an
organization, a device like a router or a switch, or a process running on a computer. PKI entities
use SCEP to communicate with the CA or RA.
• CA—Certification authority that grants and manages certificates. A CA issues certificates,
defines the certificate validity periods, and revokes certificates by publishing CRLs.
• RA—Registration authority, which offloads the CA by processing enrollment requests. The RA
accepts certificate requests, verifies user identity, and determines whether to ask the CA to
issue certificates.
The RA is optional in a PKI system. In cases when the CA operates over a wide geographical
area or when there is security concern over exposing the CA to direct network access, it is
advisable to delegate some of the tasks to an RA and leave the CA to concentrate on its primary
tasks of signing certificates and CRLs.
• Certificate/CRL repository—A certificate distribution point that stores certificates and CRLs,
and distributes these certificates and CRLs to PKI entities. It also provides the query function. A
PKI repository can be a directory server using the LDAP or HTTP protocol, of which LDAP is
commonly used.
PKI operation
The following workflow describes how a PKI entity requests a local certificate from a CA that has
RAs:
1. A PKI entity submits a certificate request to the RA.
246
2. The RA verifies the identity of the entity and sends a digital signature containing the identity
information and the public key to the CA.
3. The CA verifies the digital signature, approves the request, and issues a certificate.
4. After receiving the certificate from the CA, the RA sends the certificate to the certificate
repositories and notifies the PKI entity that the certificate has been issued.
5. The entity obtains the certificate from the certificate repository.
PKI applications
The PKI technology can meet security requirements of online transactions. As an infrastructure, PKI
has a wide range of applications. Here are some application examples.
• VPN—A VPN is a private data communication network built on the public communication
infrastructure. A VPN can use network layer security protocols (for example, IPsec) in
conjunction with PKI-based encryption and digital signature technologies for confidentiality.
• Secure emails—PKI can address the email requirements for confidentiality, integrity,
authentication, and non-repudiation. A common secure email protocol is Secure/Multipurpose
Internet Mail Extensions (S/MIME), which is based on PKI and allows for transfer of encrypted
mails with signature.
• Web security—PKI can be used in the SSL handshake phase to verify the identities of the
communicating parties by digital certificates.
247
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for
features, commands, and parameters might differ in FIPS mode (see "Configuring FIPS") and
non-FIPS mode.
248
Step Command Remarks
By default, no PKI entities exist.
2. Create a PKI entity and
enter its view. pki entity entity-name To create multiple PKI entities, repeat
this step.
3. Set a common name for the common-name By default, the common name is not
entity. common-name-sting set.
4. Set the country code of the
entity. country country-code-string By default, the country code is not set.
5. Set the locality of the entity. locality locality-name By default, the locality is not set.
6. Set the organization of the
entity. organization org-name By default, the organization is not set.
9. Set the FQDN of the entity. fqdn fqdn-name-string By default, the FQDN is not set.
By default, no trusted CA is
specified.
To obtain a CA certificate, the
trusted CA name must be
3. Specify the trusted provided. The trusted CA name
CA. ca identifier name
uniquely identifies the CA to be
used if multiple CAs exist on the
same CA server. The CA server's
URL is specified by using the
certificate request url command.
4. Specify the PKI entity
name. certificate request entity entity-name By default, no entity is specified.
6. Specify the certificate certificate request url url-string By default, the certificate request
request URL. [ vpn-instance vpn-instance-name ] URL is not specified.
249
Step Command Remarks
7. (Optional.) Set the By default, the device polls the CA
SCEP polling interval server for the certificate request
and maximum certificate request polling { count
status every 20 minutes. The
number of polling count | interval minutes }
maximum number of polling
attempts. attempts is 50.
250
Step Command Remarks
• Specify the source IPv4 address for
This task is required if the CA
the PKI protocol packets:
policy requires that the CA server
source ip { ip-address | interface
12. (Optional.) Specify a accept certificate requests from a
{interface-type interface-number }
source IP address for specific IP address or subnet.
the PKI protocol • Specify the source IPv6 address for
the PKI protocol packets: By default, the source IP address
packets. of PKI protocol packets is the IP
source ipv6 { ipv6-address |
interface { interface-type address of their outgoing
interface-number }} interface.
Requesting a certificate
To request a certificate, a PKI entity must provide its identity information and public key to a CA.
A certificate request can be submitted to a CA in offline or online mode.
• Offline mode—A certificate request is submitted by using an out-of-band method, such as
phone, disk, or email. You can use this mode as required or if you fail to request a certificate in
online mode.
To submit a certificate request in offline mode:
a. Use pki request-certificate domain pkcs10 to print the request information on the
terminal or use pki request-certificate domain pkcs10 filename to save the request
information to a local file.
b. Send the printed information or the saved file to the CA by using an out-of-band method.
• Online mode—A certificate request can be automatically or manually submitted. This section
describes the online request mode.
Configuration guidelines
The following guidelines apply to certificate request for an entity in a PKI domain:
• Make sure the device is time synchronized with the CA server. Otherwise, the certificate request
might fail because the certificate might be considered to be outside of the validity period. For
information about how to configure the system time, see Fundamentals Configuration Guide.
• To request a new certificate for a PKI entity that already has a local certificate, perform the
following tasks:
a. Use the pki delete-certificate command to delete the existing local certificate.
b. Use the public-key local create to generate a new key pair. The new key pair will
automatically overwrite the old key pair in the domain.
c. Submit a new certificate request.
• After a new certificate is obtained, do not use the public-key local create or public-key local
destroy command to generate or destroy a key pair with the same name as the key pair in the
local certificate. Otherwise, the existing local certificate becomes unavailable.
• A PKI domain can have local certificates using only one type of cryptographic algorithms (DSA,
ECDSA, or RSA). If DSA or ECDSA is used, a PKI domain can have only one local certificate. If
RSA is used, a PKI domain can have one local certificate for signature, and one local certificate
for encryption.
251
Configuring automatic certificate request
IMPORTANT:
The device does not support automatic certificate rollover. To avoid service interruptions, you must
manually submit a certificate renewal request before the current certificate expires.
In auto request mode, a PKI entity with no local certificates automatically submits a certificate
request to the CA when an application works with the PKI entity. For example, when IKE negotiation
uses a digital signature for identity authentication, but no local certificate is available, the entity
automatically submits a certificate request. It saves the certificate locally after obtaining the
certificate from the CA.
A CA certificate must be present before you request a local certificate. If no CA certificate exists in the
PKI domain, the PKI entity automatically obtains a CA certificate before sending a certificate request.
To configure automatic certificate request:
252
Step Command Remarks
This command is not saved in
the configuration file.
This command triggers the PKI
6. Submit a certificate entity to automatically generate
request or generate a pki request-certificate domain
domain-name [ password password ] a key pair if the key pair
certificate request in specified in the PKI domain
PKCS#10 format. [ pkcs10 [ filename filename ] ]
does not exist. The name,
algorithm, and length of the key
pair are configured in the PKI
domain.
2. Abort a certificate request. pki abort-certificate-request This command is not saved in the
domain domain-name configuration file.
Obtaining certificates
You can obtain the CA certificate, local certificates, and peer certificates related to a PKI domain from
a CA and save them locally for higher lookup efficiency. To do so, use either the offline mode or the
online mode:
• In offline mode, obtain the certificates by an out-of-band means like FTP, disk, or email, and
then import them locally. Use this mode when the CRL repository is not specified, the CA server
does not support SCEP, or the CA server generates the key pair for the certificates.
• In online mode, you can obtain the CA certificate through SCEP and obtain local certificates or
peer certificates through LDAP.
Configuration prerequisites
To obtain local or peer certificates in online mode, specify the LDAP server for the PKI domain.
To import local or peer certificates in offline mode, perform the following tasks:
• Use FTP or TFTP to upload the certificate files to the storage media of the device. If FTP or
TFTP is not available, display and copy the contents of a certificate to a file on the device. Make
sure the certificate is in PEM format because only certificates in PEM format can be imported.
• To import a certificate, a CA certificate chain must exist in the PKI domain, or be contained in the
certificate. If the CA certificate chain is not available, obtain it before importing the certificate.
253
Configuration guidelines
• To import a local certificate containing an encrypted key pair, you must provide the challenge
password. Contact the CA administrator to obtain the password.
• If a CA certificate already exists locally, you cannot obtain it again in online mode. If you want to
obtain a new one, use the pki delete-certificate command to remove the existing CA certificate
and local certificates first.
• If local or peer certificates already exist, you can obtain new local or peer certificates to
overwrite the existing ones. If RSA is used, a PKI domain can have two local certificates, one for
signature and the other for encryption.
• If CRL checking is enabled, obtaining a certificate triggers CRL checking. If the certificate to be
obtained has been revoked, the certificate cannot be obtained.
• The device compares the validity period of a certificate with the local system time to determine
whether the certificate is valid. Make sure the system time of the device is synchronized with the
CA server.
Configuration procedure
To obtain certificates:
254
If no CRL repository is found after the selection process, the device obtains the CRL through SCEP.
In this scenario, the CA certificate and the local certificates must have been obtained.
When verifying the CA certificate of a PKI domain, the system needs to verify all the certificates in the
CA certificate chain of the domain. To ensure a successful certificate verification process, the device
must contain all the PKI domains to which the CA certificates in the certificate chain belong.
Each CA certificate contains an issuer field that identifies the parent CA that issued the certificate.
After identifying the parent certificate of a certificate, the system locates the PKI domains to which
the parent certificate belongs. If CRL checking is enabled for the domains, the system checks
whether or not the CA certificate has been revoked. The process continues until the root CA
certificate is reached. The system verifies that each CA certificate in the certificate chain is issued by
the named parent CA, starting from the root CA.
To verify certificates with CRL checking:
255
Specifying the storage path for the certificates and
CRLs
CAUTION:
If you change the storage path, save the configuration before you reboot or shut down the device to
avoid loss of the certificates or the CRLs.
The device has a default storage path for certificates and CRLs. You can change the storage path
and specify different paths for the certificates and CRLs.
After you change the storage path for certificates or CRLs, the certificate files (with the .cer or .p12
extension) and CRL files (with the .crl extension) in the original path are moved to the new path.
To specify the storage path for certificates and CRLs:
Exporting certificates
IMPORTANT:
To export all certificates in the PKCS12 format, the PKI domain must have a minimum of one local
certificate. Otherwise, the certificates in the PKI domain cannot be exported.
You can export the CA certificate and the local certificates in a PKI domain to certificate files. The
exported certificate files can then be imported back to the device or other PKI applications.
When you export a local certificate with the RSA key pair, the name of the target file might be
different than the file name specified with the filename keyword. It depends on the purpose of the
key pair of the certificate.
To export certificates:
256
Step Command Remarks
• Export certificates in DER format:
pki export domain domain-name der { all
| ca | local } filename filename
• Export certificates in PKCS12 format:
pki export domain domain-name p12 { all If you do not specify a file
| local } passphrase p12passwordstring name when you export a
2. Export certificates. filename filename certificate in PEM format, the
• Export certificates in PEM format: certificate is displayed on the
pki export domain domain-name pem terminal.
{ { all | local } [ { 3des-cbc | aes-128-cbc |
aes-192-cbc | aes-256-cbc | des-cbc }
pempasswordstring ] | ca } [ filename
filename ]
Removing a certificate
You can remove the CA certificate, local certificate, or peer certificates in a PKI domain. After you
remove the CA certificate, the system automatically removes the local certificates, peer certificates,
and CRLs in the domain.
You can remove a local certificate and request a new one when the local certificate is about to expire
or the certificate's private key is compromised. To remove a local certificate and request a new
certificate, perform the following tasks:
1. Remove the local certificate.
2. Use the public-key local destroy command to destroy the existing local key pair.
3. Use the public-key local create command to generate a new key pair.
4. Request a new certificate.
To remove a certificate:
257
scenario, the match process stops, and the system performs the access control action defined in the
access control rule.
The following conditions describe how a certificate-based access control policy verifies the validity of
a certificate:
• If a certificate matches a permit statement, the certificate passes the verification.
• If a certificate matches a deny statement or does not match any statements in the policy, the
certificate is regarded invalid.
• If a statement is associated with a non-existing attribute group, or the attribute group does not
have attribute rules, the certificate matches the statement.
• If the certificate-based access control policy referenced by a security application (for example,
HTTPS) does not exist, all certificates in the application pass the verification.
To configure a certificate-based access control policy:
Task Command
display pki certificate domain domain-name { ca | local | peer
Display the contents of a certificate.
[ serial serial-num ] }
Display certificate request status. display pki certificate request-status [ domain domain-name ]
Display locally stored CRLs in a PKI
display pki crl domain domain-name
domain.
Display certificate attribute group
display pki certificate attribute-group [ group-name ]
information.
Display certificate-based access control
display pki certificate access-control-policy [ policy-name ]
policy information.
258
PKI configuration examples
You can use different software applications, such as Windows server, RSA Keon, and OpenCA, to
act as the CA server.
If you use Windows server or OpenCA, you must install the SCEP add-on for Windows server or
enable SCEP for OpenCA. In either case, when you configure a PKI domain, you must use the
certificate request from ra command to specify the RA to accept certificate requests.
If you use RSA Keon, the SCEP add-on is not required. When you configure a PKI domain, you must
use the certificate request from ca command to specify the CA to accept certificate requests.
259
# Specify the name of the trusted CA. The setting must be the same as CA name configured on
the CA server. This example uses myca.
[Device-pki-domain-torsa] ca identifier myca
# Configure the URL of the CA server. The URL format is http://host:port/Issuing Jurisdiction ID,
where Issuing Jurisdiction ID is a hexadecimal string generated on the CA server.
[Device-pki-domain-torsa] certificate request url
http://1.1.2.22:446/80f6214aa8865301d07929ae481c7ceed99f95bd
# Configure the device to send certificate requests to ca.
[Device-pki-domain-torsa] certificate request from ca
# Set the PKI entity name to aaa.
[Device-pki-domain-torsa] certificate request entity aaa
# Specify the URL of the CRL repository.
[Device-pki-domain-torsa] crl url ldap://1.1.2.22:389/CN=myca
# Configure a general-purpose RSA key pair named abc with a length of 1024 bits.
[Device-pki-domain-torsa] public-key rsa general name abc length 1024
[Device-pki-domain-torsa] quit
4. Generate the RSA key pair.
[Device] public-key local create rsa name abc
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512,it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
..........................++++++
.....................................++++++
Create the key pair successfully.
5. Request a local certificate:
# Obtain the CA certificate and save it locally.
[Device] pki retrieve-certificate domain torsa ca
The trusted CA's finger print is:
MD5 fingerprint:EDE9 0394 A273 B61A F1B3 0072 A0B1 F9AB
SHA1 fingerprint: 77F9 A077 2FB8 088C 550B A33C 2410 D354 23B2 73A8
Is the finger print correct?(Y/N):y
Retrieved the certificates successfully.
# Submit a certificate request manually and set the certificate revocation password to 1111. The
certificate revocation password is required when an RSA Keon CA server is used.
[Device] pki request-certificate domain torsa password 1111
Start to request the general certificate ...
……
Request certificate of domain torsa successfully
260
Signature Algorithm: sha1WithRSAEncryption
Issuer: CN=myca
Validity
Not Before: Jan 6 03:10:58 2013 GMT
Not After : Jan 6 03:10:58 2014 GMT
Subject: CN=Device
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:ab:45:64:a8:6c:10:70:3b:b9:46:34:8d:eb:1a:
a1:b3:64:b2:37:27:37:9d:15:bd:1a:69:1d:22:0f:
3a:5a:64:0c:8f:93:e5:f0:70:67:dc:cd:c1:6f:7a:
0c:b1:57:48:55:81:35:d7:36:d5:3c:37:1f:ce:16:
7e:f8:18:30:f6:6b:00:d6:50:48:23:5c:8c:05:30:
6f:35:04:37:1a:95:56:96:21:95:85:53:6f:f2:5a:
dc:f8:ec:42:4a:6d:5c:c8:43:08:bb:f1:f7:46:d5:
f1:9c:22:be:f3:1b:37:73:44:f5:2d:2c:5e:8f:40:
3e:36:36:0d:c8:33:90:f3:9b
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 CRL Distribution Points:
Full Name:
DirName: CN = myca
To display detailed information about the CA certificate, use the display pki certificate domain
command.
261
Figure 90 Network diagram
262
# Configure the certificate request URL. The URL format is
http://host:port/certsrv/mscep/mscep.dll, where host:port is the host IP address and port
number of the CA server.
[Device-pki-domain-winserver] certificate request url
http://4.4.4.1:8080/certsrv/mscep/mscep.dll
# Configure the device to send certificate requests to ra.
[Device-pki-domain-winserver] certificate request from ra
# Set the PKI entity name to aaa.
[Device-pki-domain-winserver] certificate request entity aaa
# Configure a general-purpose RSA key pair named abc with a length of 1024 bits.
[Device-pki-domain-winserver] public-key rsa general name abc length 1024
[Device-pki-domain-winserver] quit
4. Generate the RSA local key pair.
[Device] public-key local create rsa name abc
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512,it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
..........................++++++
.....................................++++++
Create the key pair successfully.
5. Request a local certificate:
# Obtain the CA certificate and save it locally.
[Device] pki retrieve-certificate domain winserver ca
The trusted CA's finger print is:
MD5 fingerprint:766C D2C8 9E46 845B 4DCE 439C 1C1F 83AB
SHA1 fingerprint:97E5 DDED AB39 3141 75FB DB5C E7F8 D7D7 7C9B 97B4
Is the finger print correct?(Y/N):y
Retrieved the certificates successfully.
# Submit a certificate request manually.
[Device] pki request-certificate domain winserver
Start to request the general certificate ...
…
Request certificate of domain winserver successfully
263
Subject: CN=test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:c3:b5:23:a0:2d:46:0b:68:2f:71:d2:14:e1:5a:
55:6e:c5:5e:26:86:c1:5a:d6:24:68:02:bf:29:ac:
dc:31:41:3f:5d:5b:36:9e:53:dc:3a:bc:0d:11:fb:
d6:7d:4f:94:3c:c1:90:4a:50:ce:db:54:e0:b3:27:
a9:6a:8e:97:fb:20:c7:44:70:8f:f0:b9:ca:5b:94:
f0:56:a5:2b:87:ac:80:c5:cc:04:07:65:02:39:fc:
db:61:f7:07:c6:65:4c:e4:5c:57:30:35:b4:2e:ed:
9c:ca:0b:c1:5e:8d:2e:91:89:2f:11:e3:1e:12:8a:
f8:dd:f8:a7:2a:94:58:d9:c7:f8:1a:78:bd:f5:42:
51:3b:31:5d:ac:3e:c3:af:fa:33:2c:fc:c2:ed:b9:
ee:60:83:b3:d3:e5:8e:e5:02:cf:b0:c8:f0:3a:a4:
b7:ac:a0:2c:4d:47:5f:39:4b:2c:87:f2:ee:ea:d0:
c3:d0:8e:2c:80:83:6f:39:86:92:98:1f:d2:56:3b:
d7:94:d2:22:f4:df:e3:f8:d1:b8:92:27:9c:50:57:
f3:a1:18:8b:1c:41:ba:db:69:07:52:c1:9a:3d:b1:
2d:78:ab:e3:97:47:e2:70:14:30:88:af:f8:8e:cb:
68:f9:6f:07:6e:34:b6:38:6a:a2:a8:29:47:91:0e:
25:39
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage:
Digital Signature, Non Repudiation, Key Encipherment, Data Encip
herment
X509v3 Subject Key Identifier:
C9:BB:D5:8B:02:1D:20:5B:40:94:15:EC:9C:16:E8:9D:6D:FD:9F:34
X509v3 Authority Key Identifier:
keyid:32:F1:40:BA:9E:F1:09:81:BD:A8:49:66:FF:F8:AB:99:4A:30:21:9
B
Full Name:
URI:file://\\g07904c\CertEnroll\sec.crl
264
CA Issuers - URI:file://\\gc\CertEnroll\gc_sec.crt
1.3.6.1.4.1.311.20.2:
.0.I.P.S.E.C.I.n.t.e.r.m.e.d.i.a.t.e.O.f.f.l.i.n.e
Signature Algorithm: sha1WithRSAEncryption
76:f0:6c:2c:4d:bc:22:59:a7:39:88:0b:5c:50:2e:7a:5c:9d:
6c:28:3c:c0:32:07:5a:9c:4c:b6:31:32:62:a9:45:51:d5:f5:
36:8f:47:3d:47:ae:74:6c:54:92:f2:54:9f:1a:80:8a:3f:b2:
14:47:fa:dc:1e:4d:03:d5:d3:f5:9d:ad:9b:8d:03:7f:be:1e:
29:28:87:f7:ad:88:1c:8f:98:41:9a:db:59:ba:0a:eb:33:ec:
cf:aa:9b:fc:0f:69:3a:70:f2:fa:73:ab:c1:3e:4d:12:fb:99:
31:51:ab:c2:84:c0:2f:e5:f6:a7:c3:20:3c:9a:b0:ce:5a:bc:
0f:d9:34:56:bc:1e:6f:ee:11:3f:7c:b2:52:f9:45:77:52:fb:
46:8a:ca:b7:9d:02:0d:4e:c3:19:8f:81:46:4e:03:1f:58:03:
bf:53:c6:c4:85:95:fb:32:70:e6:1b:f3:e4:10:ed:7f:93:27:
90:6b:30:e7:81:36:bb:e2:ec:f2:dd:2b:bb:b9:03:1c:54:0a:
00:3f:14:88:de:b8:92:63:1e:f5:b3:c2:cf:0a:d5:f4:80:47:
6f:fa:7e:2d:e3:a7:38:46:f6:9e:c7:57:9d:7f:82:c7:46:06:
7d:7c:39:c4:94:41:bd:9e:5c:97:86:c8:48:de:35:1e:80:14:
02:09:ad:08
To display detailed information about the CA certificate, use the display pki certificate domain
command.
265
[Device-pki-entity-aaa] organization test
[Device-pki-entity-aaa] organization-unit software
[Device-pki-entity-aaa] quit
3. Configure a PKI domain:
# Create a PKI domain named openca and enter its view.
[Device] pki domain openca
# Specify the name of the trusted CA as myca.
[Device-pki-domain-openca] ca identifier myca
# Configure the certificate request URL. The URL is in the format http://host/cgi-bin/pki/scep,
where host is the host IP address of the OpenCA server.
[Device-pki-domain-openca] certificate request url
http://192.168.222.218/cgi-bin/pki/scep
# Configure the device to send certificate requests to the RA.
[Device-pki-domain-openca] certificate request from ra
# Specify PKI entity aaa for certificate request.
[Device-pki-domain-openca] certificate request entity aaa
# Configure a general-purpose RSA key pair named abc with a length of 1024 bits.
[Device-pki-domain-openca] public-key rsa general name abc length 1024
[Device-pki-domain-openca] quit
4. Generate the RSA key pair.
[Device] public-key local create rsa name abc
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512,it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
..........................++++++
.....................................++++++
Create the key pair successfully.
5. Request a local certificate:
# Obtain the CA certificate and save it locally.
[Device] pki retrieve-certificate domain openca ca
The trusted CA's finger print is:
MD5 fingerprint:5AA3 DEFD 7B23 2A25 16A3 14F4 C81C C0FA
SHA1 fingerprint:9668 4E63 D742 4B09 90E0 4C78 E213 F15F DC8E 9122
Is the finger print correct?(Y/N):y
Retrieved the certificates successfully.
# Submit a certificate request manually.
[Device] pki request-certificate domain openca
Start to request the general certificate ...
…
Request certificate of domain openca successfully
266
Version: 3 (0x2)
Serial Number:
21:1d:b8:d2:e4:a9:21:28:e4:de
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=CN, L=shangdi, ST=pukras, O=OpenCA Labs, OU=mysubUnit, CN=sub-ca,
DC=pki-subdomain, DC=mydomain-sub, DC=com
Validity
Not Before: Jun 30 09:09:09 2011 GMT
Not After : May 1 09:09:09 2012 GMT
Subject: CN=rnd, O=test, OU=software, C=CN
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:b8:7a:9a:b8:59:eb:fc:70:3e:bf:19:54:0c:7e:
c3:90:a5:d3:fd:ee:ff:c6:28:c6:32:fb:04:6e:9c:
d6:5a:4f:aa:bb:50:c4:10:5c:eb:97:1d:a7:9e:7d:
53:d5:31:ff:99:ab:b6:41:f7:6d:71:61:58:97:84:
37:98:c7:7c:79:02:ac:a6:85:f3:21:4d:3c:8e:63:
8d:f8:71:7d:28:a1:15:23:99:ed:f9:a1:c3:be:74:
0d:f7:64:cf:0a:dd:39:49:d7:3f:25:35:18:f4:1c:
59:46:2b:ec:0d:21:1d:00:05:8a:bf:ee:ac:61:03:
6c:1f:35:b5:b4:cd:86:9f:45
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Cert Type:
SSL Client, S/MIME
X509v3 Key Usage:
Digital Signature, Non Repudiation, Key Encipherment
X509v3 Extended Key Usage:
TLS Web Client Authentication, E-mail Protection, Microsoft
Smartcardlogin
Netscape Comment:
User Certificate of OpenCA Labs
X509v3 Subject Key Identifier:
24:71:C9:B8:AD:E1:FE:54:9A:EA:E9:14:1B:CD:D9:45:F4:B2:7A:1B
X509v3 Authority Key Identifier:
keyid:85:EB:D5:F7:C9:97:2F:4B:7A:6D:DD:1B:4D:DD:00:EE:53:CF:FD:5B
267
X509v3 CRL Distribution Points:
Full Name:
URI:http://192.168.222.218/pki/pub/crl/cacrl.crl
To display detailed information about the CA certificate, use the display pki certificate domain
command.
268
Configuring the RSA Keon CA server
1. In this example, an RSA Keon CA server acts as the CA server. For information about
configuring an RSA Keon CA server, see "Requesting a certificate from an RSA Keon CA
server."
2. Enable local certificate publishing.
3. Configure a static route to the subnet 192.168.18.0/24 (the following describes the
configuration on the Windows XP operating system):
a. Open the cmd window.
b. Enter route add 192.16.18.0 mask 255.255.255.0 192.168.1.1.
C:\Documents and Settings\username\route add 192.16.18.0 mask 255.255.255.0
192.168.1.1
Configuring Device B
# Enable IPv6.
<DeviceB> system-view
[DeviceB] ipv6
# Assign an IPv6 address to interface GigabitEthernet 2/0/1, and enable NAT-PT on the
interface.
[DeviceB] interface gigabitethernet 2/0/1
[DeviceB-GigabitEthernet2/0/1] ipv6 address 2001::9/64
[DeviceB-GigabitEthernet2/0/1] natpt enable
[DeviceB-GigabitEthernet2/0/1] quit
# Assign an IPv4 address to interface GigabitEthernet 2/0/2, and enable NAT-PT on the
interface.
[DeviceB] interface gigabitethernet 2/0/2
[DeviceB-GigabitEthernet2/0/2] ip address 192.168.1.1 255.255.255.0
[DeviceB-GigabitEthernet2/0/2] natpt enable
[DeviceB-GigabitEthernet2/0/2] quit
# Specify the NAT-PT prefix.
[DeviceB] natpt prefix 3001::
# Configure the static mapping at the IPv4 network side.
[DeviceB] natpt v4bound static 192.168.1.2 3001::5
# Configure the static mapping at the IPv6 network side.
[DeviceB] natpt v6bound static 2001::5 192.16.18.111
Configuring Device A
1. Configure a static route to the subnet corresponding to the NAT-PT prefix.
<DeviceA> system-view
[DeviceA] ipv6 route-static 3001:: 16 2001::9
2. Create an entity named aaa and set its common name to test.
[DeviceA] pki entity aaa
[DeviceA-pki-entity-aaa] common-name test
[DeviceA-pki-entity-aaa] quit
3. Configure a PKI domain:
# Create a PKI domain named torsa and enter its view.
[DeviceA] pki domain torsa
# Specify the name of the trusted CA as myca.
[DeviceA-pki-domain-torsa] ca identifier myca
269
# Configure the certificate request URL. The URL is in the format http://host:port/Issuing
Jurisdiction ID, where Issuing Jurisdiction ID is a hexadecimal string generated on the CA
server.
[DeviceA-pki-domain-torsa] certificate request url
http://[3001::5]:446/c95e970f632d27be5e8cbf80e971d9c4a9a93337
# Configure the device to send certificate requests to ca.
[DeviceA-pki-domain-torsa] certificate request from ca
# Set the PKI entity name to aaa.
[DeviceA-pki-domain-torsa] certificate request entity aaa
# Specify the URL of the CRL repository. In this example, the URL in HTTP format is not
allowed because the RSA Keon CA server cannot process IPv6 data in HTTP packets,
although IPv6 packets from Device A can be converted to IPv4 packets by Device B. If an
OpenCA server acts as the CA server, you can specify a URL in HTTP format. This limitation
depends on the types of your CA server.
[DeviceA-pki-domain-torsa] crl url
ldap://[3001::5]:389/CN=sslrsa,OU=sec,O=docm,C=cn
# Configure a general-purpose RSA key pair named abc with a length of 1024 bits.
[DeviceA-pki-domain-torsa] public-key rsa general name abc length 1024
[DeviceA-pki-domain-torsa] quit
4. Generate the RSA key pair.
[DeviceA] public-key local create rsa name abc
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512,it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
..........................++++++
.....................................++++++
Create the key pair successfully.
5. Request a local certificate:
# Obtain the CA certificate and save it locally.
[DeviceA] pki retrieve-certificate domain torsa ca
The trusted CA's finger print is:
MD5 fingerprint:EDE9 0394 A273 B61A F1B3 0072 A0B1 F9AB
SHA1 fingerprint: 77F9 A077 2FB8 088C 550B A33C 2410 D354 23B2 73A8
Is the finger print correct?(Y/N):y
Retrieved the certificates successfully
# Obtain the CRL and save it locally.
[DeviceA] pki retrieve-crl domain torsa
# Submit a certificate request manually.
[DeviceA] pki request-certificate domain torsa password 123
Start to request the general certificate ...
…
Request certificate of domain torsa successfully
270
Data:
Version: 3 (0x2)
Serial Number:
1a:6f:8e:6c:d6:36:b9:00:37:51:19:f5:ad:e7:30:e2
Signature Algorithm: sha1WithRSAEncryption
Issuer: CN=myca
Validity
Not Before: Jan 6 03:18:53 2013 GMT
Not After : Jan 6 03:18:53 2014 GMT
Subject: CN=test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:b8:65:45:a1:5e:21:e3:c0:c4:25:e5:26:97:25:
f8:91:c5:3c:76:95:2c:34:66:1a:4c:af:bc:0a:92:
9d:c2:79:ec:2d:eb:5a:3a:54:e1:98:e6:c1:58:ee:
0f:4b:84:63:51:d8:37:a5:a5:fd:7e:81:1f:d2:8c:
53:a3:09:3e:98:a8:51:d5:3f:3c:02:02:d3:19:51:
ca:6c:a0:a1:4d:07:0d:d8:09:61:6f:dd:10:e5:0f:
18:4d:43:e6:43:ec:54:c6:ba:2e:b5:c4:dc:ba:05:
53:74:e8:e9:42:ef:c6:9d:98:b7:1c:20:c7:03:a9:
f2:26:64:a6:ad:05:09:c8:69
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 CRL Distribution Points:
Full Name:
DirName: CN = myca
To display detailed information about the CA certificate and the CRLs, use the display pki
certificate domain and display pki crl domain commands.
271
Device A and Device use IKE to set up SAs, and the IKE proposal uses RSA digital signature for
identity authentication.
Device A and Device B use the same CA.
Figure 93 Network diagram
# Configure a general-purpose RSA key pair named abc with a length of 1024 bits.
[DeviceA-pki-domain-1] public-key rsa general name abc length 1024
[DeviceA-pki-domain-1] quit
272
[DeviceA] public-key local create rsa name abc
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512,it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
..........................++++++
.....................................++++++
Create the key pair successfully.
# Create IKE proposal 1, and configure the authentication method as RSA digital signature.
[DeviceA] ike proposal 1
[DeviceA-ike-proposal-1] authentication-method rsa-signature
[DeviceA-ike-proposal-1] quit
# Reference the PKI domain used in IKE negotiation for the IKE profile peer.
[DeviceA] ike profile peer
[DeviceA-ike-profile-peer] certificate domain 1
Configuring Device B
# Configure a PKI entity.
<DeviceB> system-view
[DeviceB] pki entity en
[DeviceB-pki-entity-en] ip 3.3.3.1
[DeviceB-pki-entity-en] common-name deviceb
[DeviceB-pki-entity-en] quit
# Configure a general-purpose RSA key pair named abc with a length of 1024 bits.
[DeviceB-pki-domain-1] public-key rsa general name abc length 1024
[DeviceB-pki-domain-1] quit
273
.....................................++++++
Create the key pair successfully.
# Create IKE proposal 1, and configure the authentication method as RSA digital signature.
[DeviceB] ike proposal 1
[DeviceB-ike-proposal-1] authentication-method rsa-signature
[DeviceB-ike-proposal-1] quit
# Reference the PKI domain used in IKE negotiation for the IKE profile peer.
[DeviceB] ike profile peer
[DeviceB-ike-profile-peer] certificate domain 1
The configurations are for IKE negotiation with RSA digital signature. For information about how to
configure IPsec SAs to be set up, see "Configuring IPsec."
Configuration procedure
1. Create the PKI domain domain1 to be referenced by SSL. (Details not shown.)
2. Request an SSL server certificate for the device from the CA server. (Details not shown.)
3. Configure the HTTPS server (the device):
# Enable the HTTPS services.
<Device> system-view
[Device] ip https enable
# Configure an SSL policy for the HTTPS server.
[Device] ssl server-policy abc
[Device-ssl-server-policy-abc] pki-domain domain1
[Device-ssl-server-policy-abc] client-verify enable
[Device-ssl-server-policy-abc] quit
274
4. Configure certificate attribute groups:
# Create a certificate attribute group named mygroup1 and add two attribute rules. The first
rule defines that the DN in the subject DN contains the string of aabbcc. The second rule
defines that the IP address of the certificate issuer is 10.0.0.1.
[Device] pki certificate attribute-group mygroup1
[Device-pki-cert-attribute-group-mygroup1] attribute 1 subject-name dn ctn aabbcc
[Device-pki-cert-attribute-group-mygroup1] attribute 2 issuer-name ip equ 10.0.0.1
[Device-pki-cert-attribute-group-mygroup1] quit
# Create a certificate attribute group named mygroup2 and add two attribute rules. The first
rule defines that the FQDN in the alternative subject name does not contain the string of apple.
The second rule defines that the DN of the certificate issuer name contains the string of
aabbcc.
[Device] pki certificate attribute-group mygroup2
[Device-pki-cert-attribute-group-mygroup2] attribute 1 alt-subject-name fqdn nctn
apple
[Device-pki-cert-attribute-group-mygroup2] attribute 2 issuer-name dn ctn aabbcc
[Device-pki-cert-attribute-group-mygroup2] quit
5. Configure a certificate-based access control policy:
# Create a certificate-based access control policy named myacp.
[Device] pki certificate access-control-policy myacp
# Define a statement to deny the certificates that match the attribute rules in the certificate
attribute group mygroup1.
[Device-pki-cert-acp-myacp] rule 1 deny mygroup1
# Define a statement to permit the certificates that match the attribute rules in the certificate
attribute group mygroup2.
[Device-pki-cert-acp-myacp] rule 2 permit mygroup2
[Device-pki-cert-acp-myacp] quit
275
3. Import the certificate files to PKI domain importdomain on Device B.
Figure 95 Network diagram
Configuration procedure
1. Export the certificates on Device A:
# Export the CA certificate to a .pem file.
<DeviceA> system-view
[DeviceA] pki export domain exportdomain pem ca filename pkicachain.pem
# Export the local certificate to a file named pkilocal.pem in PEM format, and use 3DES_CBC
to encrypt the private key with the password 111111.
[DeviceA] pki export domain exportdomain pem local 3des-cbc 111111 filename
pkilocal.pem
Now, Device A has three certificate files in PEM format:
{ A CA certificate file named pkicachain.pem.
{ A local certificate file named pkilocal.pem-signature, which contains the private key for
signature.
{ A local certificate file named pkilocal.pem-encryption, which contains the private key for
encryption.
# Display the local certificate file pkilocal.pem-signature.
[DeviceA] quit
<DeviceA> more pkicachain.pem-sign
Bag Attributes
friendlyName:
localKeyID: 90 C6 DC 1D 20 49 4F 24 70 F5 17 17 20 2B 9E AC 20 F3 99 89
subject=/C=CN/O=OpenCA Labs/OU=Users/CN=subsign 11
issuer=/C=CN/L=shangdi/ST=pukras/O=OpenCA Labs/OU=docm/CN=subca1
-----BEGIN CERTIFICATE-----
MIIEgjCCA2qgAwIBAgILAJgsebpejZc5UwAwDQYJKoZIhvcNAQELBQAwZjELMAkG
…
-----END CERTIFICATE-----
Bag Attributes
friendlyName:
localKeyID: 90 C6 DC 1D 20 49 4F 24 70 F5 17 17 20 2B 9E AC 20 F3 99 89
Key Attributes: <No Attributes>
-----BEGIN ENCRYPTED PRIVATE KEY-----
MIICxjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQIZtjSjfslJCoCAggA
…
-----END ENCRYPTED PRIVATE KEY-----
276
# Display the local certificate file pkilocal.pem-encryption.
<DeviceA> more pkicachain.pem-encr
Bag Attributes
friendlyName:
localKeyID: D5 DF 29 28 C8 B9 D9 49 6C B5 44 4B C2 BC 66 75 FE D6 6C C8
subject=/C=CN/O=OpenCA Labs/OU=Users/CN=subencr 11
issuer=/C=CN/L=shangdi/ST=pukras/O=OpenCA Labs/OU=docm/CN=subca1
-----BEGIN CERTIFICATE-----
MIIEUDCCAzigAwIBAgIKCHxnAVyzWhIPLzANBgkqhkiG9w0BAQsFADBmMQswCQYD
…
-----END CERTIFICATE-----
Bag Attributes
friendlyName:
localKeyID: D5 DF 29 28 C8 B9 D9 49 6C B5 44 4B C2 BC 66 75 FE D6 6C C8
Key Attributes: <No Attributes>
-----BEGIN ENCRYPTED PRIVATE KEY-----
MIICxjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQI7H0mb4O7/GACAggA
…
-----END ENCRYPTED PRIVATE KEY-----
2. Download the certificate files pkicachain.pem, pkilocal.pem-sign, and pkilocal.pem-encr
from Device A to the host through FTP. (Details not shown.)
3. Upload the certificate files pkicachain.pem, pkilocal.pem-sign, and pkilocal.pem-encr from
the host to Device B through FTP. (Details not shown.)
4. Import the certificate files to Device B:
# Disable CRL checking. (You can configure CRL checking as required. This example assumes
CRL checking is not required.)
<DeviceB> system-view
[DeviceB] pki domain importdomain
[DeviceB-pki-domain-importdomain] undo crl check enable
# Specify the RSA key pair for signature as sign, and the RSA key pair for encryption as encr
for certificate request.
[DeviceB-pki-domain-importdomain] public-key rsa signature name sign encryption name
encr
[DeviceB-pki-domain-importdomain] quit
# Import the CA certificate file pkicachain.pem in PEM format to the PKI domain.
[DeviceB] pki import domain importdomain pem ca filename pkicachain.pem
# Import the local certificate file pkilocal.pem-signature in PEM format to the PKI domain. The
certificate file contains a key pair.
[DeviceB] pki import domain importdomain pem local filename pkilocal.pem-signature
Please input the password:******
# Import the local certificate file pkilocal.pem-encryption in PEM format to the PKI domain.
The certificate file contains a key pair.
[DeviceB] pki import domain importdomain pem local filename pkilocal.pem-encryption
Please input the password:******
# Display the imported local certificate information on Device B.
[DeviceB] display pki certificate domain importdomain local
Certificate:
Data:
Version: 3 (0x2)
277
Serial Number:
98:2c:79:ba:5e:8d:97:39:53:00
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=CN, L=shangdi, ST=pukras, O=OpenCA Labs, OU=docm, CN=subca1
Validity
Not Before: May 26 05:56:49 2011 GMT
Not After : Nov 22 05:56:49 2012 GMT
Subject: C=CN, O=OpenCA Labs, OU=Users, CN=subsign 11
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:9f:6e:2f:f6:cb:3d:08:19:9a:4a:ac:b4:ac:63:
ce:8d:6a:4c:3a:30:19:3c:14:ff:a9:50:04:f5:00:
ee:a3:aa:03:cb:b3:49:c4:f8:ae:55:ee:43:93:69:
6c:bf:0d:8c:f4:4e:ca:69:e5:3f:37:5c:83:ea:83:
ad:16:b8:99:37:cb:86:10:6b:a0:4d:03:95:06:42:
ef:ef:0d:4e:53:08:0a:c9:29:dd:94:28:02:6e:e2:
9b:87:c1:38:2d:a4:90:a2:13:5f:a4:e3:24:d3:2c:
bf:98:db:a7:c2:36:e2:86:90:55:c7:8c:c5:ea:12:
01:31:69:bf:e3:91:71:ec:21
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Cert Type:
SSL Client, S/MIME
X509v3 Key Usage:
Digital Signature, Non Repudiation
X509v3 Extended Key Usage:
TLS Web Client Authentication, E-mail Protection, Microsoft
Smartcardlogin
Netscape Comment:
User Certificate of OpenCA Labs
X509v3 Subject Key Identifier:
AA:45:54:29:5A:50:2B:89:AB:06:E5:BD:0D:07:8C:D9:79:35:B1:F5
X509v3 Authority Key Identifier:
keyid:70:54:40:61:71:31:02:06:8C:62:11:0A:CC:A5:DB:0E:7E:74:DE:DD
278
X509v3 CRL Distribution Points:
Full Name:
URI:http://192.168.40.130/pki/pub/crl/cacrl.crl
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
08:7c:67:01:5c:b3:5a:12:0f:2f
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=CN, L=shangdi, ST=pukras, O=OpenCA Labs, OU=docm, CN=subca1
Validity
Not Before: May 26 05:58:26 2011 GMT
Not After : Nov 22 05:58:26 2012 GMT
Subject: C=CN, O=OpenCA Labs, OU=Users, CN=subencr 11
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:db:26:13:d3:d1:a4:af:11:f3:6d:37:cf:d0:d4:
48:50:4e:0f:7d:54:76:ed:50:28:c6:71:d4:48:ae:
4d:e7:3d:23:78:70:63:18:33:f6:94:98:aa:fa:f6:
62:ed:8a:50:c6:fd:2e:f4:20:0c:14:f7:54:88:36:
2f:e6:e2:88:3f:c2:88:1d:bf:8d:9f:45:6c:5a:f5:
94:71:f3:10:e9:ec:81:00:28:60:a9:02:bb:35:8b:
bf:85:75:6f:24:ab:26:de:47:6c:ba:1d:ee:0d:35:
75:58:10:e5:e8:55:d1:43:ae:85:f8:ff:75:81:03:
8c:2e:00:d1:e9:a4:5b:18:39
Exponent: 65537 (0x10001)
X509v3 extensions:
279
X509v3 Basic Constraints:
CA:FALSE
Netscape Cert Type:
SSL Server
X509v3 Key Usage:
Key Encipherment, Data Encipherment
Netscape Comment:
VPN Server of OpenCA Labs
X509v3 Subject Key Identifier:
CC:96:03:2F:FC:74:74:45:61:38:1F:48:C0:E8:AA:18:24:F0:2B:AB
X509v3 Authority Key Identifier:
keyid:70:54:40:61:71:31:02:06:8C:62:11:0A:CC:A5:DB:0E:7E:74:DE:DD
Full Name:
URI:http://192.168.40.130/pki/pub/crl/cacrl.crl
To display detailed information about the CA certificate, use the display pki certificate domain
command.
280
Troubleshooting PKI configuration
This section provides troubleshooting information for common problems with PKI.
281
2. Obtain or import the CA certificate.
3. Configure the correct LDAP server.
4. Specify the key pair used for certificate request in the PKI domain, or remove the existing key
pair and submit a certificate request again.
5. Check the registration policy on the CR or RA, and make sure the attributes of the PKI entity
meet the policy requirements.
6. Obtain the CRL from the CRL repository.
7. Specify the correct source IP address that the CA server can accept. For the correct settings,
contact the CA administrator.
8. Synchronize the system time of the device with the CA server.
9. If the problem persists, contact Hewlett Packard Enterprise Support.
282
Failed to obtain CRLs
Symptom
CRLs cannot be obtained.
Analysis
• The network connection is down, for example, because the network cable is damaged or the
connectors have bad contact.
• No CA certificate has been obtained before you try to obtain CRLs.
• The URL of the CRL repository is not configured and cannot be obtained from the CA certificate
or local certificates in the PKI domain.
• The specified URL of the CRL repository is incorrect.
• The device tries to obtain CRLs through SCEP, but experiences the following problems:
{ The PKI domain does not have local certificates.
{ The key pairs in the certificates have been changed.
{ The PKI domain has incorrect URL for certificate request.
• The specified URL of the CRL repository does not contain the host name or IP address, and the
LDAP server is incorrect or is not specified in the PKI domain.
• The CA does not issue CRLs.
• The PKI domain is not specified with the source IP address that the CA server can accept, or is
specified with an incorrect one.
Solution
1. Check for and fix any network connection problems.
2. Obtain or import the CA certificate.
3. If the URL of the CRL repository cannot be obtained, verify that the following conditions exist:
{ The URL for certificate request is valid.
{ A local certificate has been successfully obtained.
{ The local certificate contains a public key that matches the locally stored key pair.
4. Make sure the LDAP server address is contained in the CRL repository URL, or is configured in
the PKI domain.
5. Make sure the CA server support publishing CRLs.
6. Specify a correct source IP address that the CA server can accept. For the correct settings,
contact the CA administrator.
7. If the problem persists, contact Hewlett Packard Enterprise Support.
283
2. Make sure the format of the imported file is correct.
3. If the problem persists, contact Hewlett Packard Enterprise Support.
284
4. Configure the correct key pair in the PKI domain.
5. Clear up the storage space of the device.
6. If the problem persists, contact Hewlett Packard Enterprise Support.
285
Configuring IPsec
Overview
IP Security (IPsec) is defined by the IETF to provide interoperable, high-quality, cryptography-based
security for IP communications. It is a Layer 3 VPN technology that transmits data in a secure
channel established between two endpoints (such as two security gateways). Such a secure channel
is usually called an IPsec tunnel.
IPsec is a security framework that has the following protocols and algorithms:
• Authentication Header (AH).
• Encapsulating Security Payload (ESP).
• Internet Key Exchange (IKE).
• Algorithms for authentication and encryption.
AH and ESP are security protocols that provide security services. IKE performs automatic key
exchange. For more information about IKE, see "Configuring IKE."
IPsec provides the following security services for data packets in the IP layer:
• Confidentiality—The sender encrypts packets before transmitting them over the Internet,
protecting the packets from being eavesdropped en route.
• Data integrity—The receiver verifies the packets received from the sender to make sure they
are not tampered with during transmission.
• Data origin authentication—The receiver verifies the authenticity of the sender.
• Anti-replay—The receiver examines packets and drops outdated and duplicate packets.
IPsec delivers the following benefits:
• Reduced key negotiation overhead and simplified maintenance by supporting the IKE protocol.
IKE provides automatic key negotiation and automatic IPsec security association (SA) setup
and maintenance.
• Good compatibility. You can apply IPsec to all IP-based application systems and services
without modifying them.
• Encryption on a per-packet rather than per-flow basis. Per-packet encryption allows for
flexibility and greatly enhances IP security.
286
algorithms such as DES, 3DES, and AES, and authentication algorithms HMAC-MD5 and
HMAC-SHA1.
Both AH and ESP provide authentication services, but the authentication service provided by AH is
stronger. In practice, you can choose either or both security protocols. When both AH and ESP are
used, an IP packet is encapsulated first by ESP and then by AH.
Encapsulation modes
IPsec supports the following encapsulation modes:
• Transport mode—The security protocols protect the upper layer data of an IP packet. Only the
transport layer data is used to calculate the security protocol headers. The calculated security
protocol headers and the encrypted data (only for ESP encapsulation) are placed after the
original IP header. You can use the transport mode when end-to-end security protection is
required (the secured transmission start and end points are the actual start and end points of
the data). The transport mode is typically used for protecting host-to-host communications, as
shown in Figure 96.
Figure 96 IPsec protection in transport mode
IPsec tunnel
Host A Host B
Data flow
• Tunnel mode—The security protocols protect the entire IP packet. The entire IP packet is used
to calculate the security protocol headers. The calculated security protocol headers and the
encrypted data (only for ESP encapsulation) are encapsulated in a new IP packet. In this mode,
the encapsulated packet has two IP headers. The inner IP header is the original IP header. The
outer IP header is added by the network device that provides the IPsec service. You must use
the tunnel mode when the secured transmission start and end points are not the actual start and
end points of the data packets (for example, when two gateways provide IPsec but the data
start and end points are two hosts behind the gateways). The tunnel mode is typically used for
protecting gateway-to-gateway communications, as shown in Figure 97.
Figure 97 IPsec protection in tunnel mode
IPsec tunnel
Figure 98 shows how the security protocols encapsulate an IP packet in different encapsulation
modes.
Figure 98 Security protocol encapsulations in different modes
Mode
Transport Tunnel
Protocol
AH IP AH Data IP AH IP Data
287
Security association
A security association (SA) is an agreement negotiated between two communicating parties called
IPsec peers. An SA comprises the following parameters for data protection:
• Security protocols (AH, ESP, or both).
• Encapsulation mode (transport mode or tunnel mode).
• Authentication algorithm (HMAC-MD5 or HMAC-SHA1).
• Encryption algorithm (DES, 3DES, or AES).
• Shared keys and their lifetimes.
An SA is unidirectional. At least two SAs are needed to protect data flows in a bidirectional
communication. If two peers want to use both AH and ESP to protect data flows between them, they
construct an independent SA for each protocol in each direction.
An SA is uniquely identified by a triplet, which consists of the security parameter index (SPI),
destination IP address, and security protocol identifier. An SPI is a 32-bit number. It is transmitted in
the AH/ESP header.
An SA can be set up manually or through IKE.
• Manual mode—Configure all parameters for the SA through commands. This configuration
mode is complex and does not support some advanced features (such as periodic key update),
but it can implement IPsec without IKE. This mode is mainly used in small and static networks
or when the number of IPsec peers in the network is small.
• IKE negotiation mode—The peers negotiate and maintain the SA through IKE. This
configuration mode is simple and has good expansibility. In medium- and large-scale dynamic
networks, Hewlett Packard Enterprise recommends setting up SAs through IKE negotiations.
A manually configured SA never ages out. An IKE-created SA has a lifetime, which comes in two
types:
• Time-based lifetime—Defines how long the SA can be valid after it is created.
• Traffic-based lifetime—Defines the maximum traffic that the SA can process.
If both lifetime timers are configured for an SA, the SA becomes invalid when either of the lifetime
timers expires. Before the SA expires, IKE negotiates a new SA, which takes over immediately after
its creation.
288
• AES—Encrypts plaintext data with a 128-bit, 192-bit, or 256-bit key. AES provides the highest
security strength and is slower than 3DES.
Crypto engine
The IPsec feature is resource intensive for its complex encryption/decryption and authentication
algorithms. To improve processing performance, you can use crypto engine to offload IPsec tasks.
The crypto engine processes all IPsec protected packets and hands the processed packets back to
the device for forwarding.
For more information about crypto engines, see "Configuring crypto engines."
IPsec implementation
To implement IPsec protection for packets between two peers, complete the following tasks on each
peer:
• Configure an IPsec policy, which defines the range of packets to be protected by IPsec and the
security parameters used for the protection.
• Apply the IPsec policy to an interface or an application.
When you apply an IPsec policy to an interface, you implement IPsec based on the interface.
Packets received and sent by the interface are protected according to the IPsec policy. When you
apply an IPsec policy to an application, you implement IPsec based on the application. Packets of
the application are protected according to the IPsec policy, regardless of the receiving and sending
interface of the packets.
IPsec protects packets as follows:
• When an IPsec peer identifies the packets to be protected according to the IPsec policy, it sets
up an IPsec tunnel and sends the packet to the remote peer through the tunnel. The IPsec
tunnel can be manually configured beforehand, or it can be set up through IKE negotiation
triggered by the packet. The IPsec tunnels are actually the IPsec SAs. The inbound packets are
protected by the inbound SA, and the outbound packets are protected by the outbound SA.
• When the remote IPsec peer receives the packet, it drops, de-encapsulates, or directly
forwards the packet according to the configured IPsec policy.
Interface-based IPsec supports setting up IPsec tunnels based on ACLs.
ACL-based IPsec
To implement ACL-based IPsec, configure an ACL to define the data flows to be protected, specify
the ACL in an IPsec policy, and then apply the IPsec policy to an interface. When packets sent by the
interface match the permit rule of the ACL, the packets are protected by the outbound IPsec SA and
encapsulated with IPsec. When the interface receives an IPsec packet whose destination address is
the IP address of the local device, it searches for the inbound IPsec SA according to the SPI carried
in the IPsec packet header for de-encapsulation. If the de-encapsulated packet matches the permit
rule of the ACL, the device processes the packet. Otherwise, it drops the packet.
The device supports the following data flow protection modes:
• Standard mode—One IPsec tunnel protects one data flow. The data flow permitted by an ACL
rule is protected by one IPsec tunnel that is established solely for it.
• Aggregation mode—One IPsec tunnel protects all data flows permitted by all the rules of an
ACL. This mode is only used to communicate with old-version devices.
• Per-host mode—One IPsec tunnel protects one host-to-host data flow. One host-to-host data
flow is identified by one ACL rule and protected by one IPsec tunnel established solely for it.
This mode consumes more system resources when multiple data flows exist between two
subnets to be protected.
289
Application-based IPsec
Application-based IPsec does not require an ACL. You can implement application-based IPsec by
one of the following methods:
• Bind an IPsec profile to an application protocol. All packets of the application protocol are
encapsulated with IPsec. This method can be used to protect IPv6 routing protocols. The
supported IPv6 routing protocols include OSPFv3, IPv6 BGP, and RIPng.
• Apply an IPsec profile to a tunnel interface. All packets routed to the tunnel interface are
encapsulated with IPsec. This method can be used to protect only ADVPN tunnel packets.
All packets of the applications that are not bound to IPsec and the IPsec packets that failed to be
de-encapsulated are dropped.
In one-to-many communication scenarios, you must configure the IPsec SAs for an IPv6 routing
protocol in manual mode because of the following reasons:
• The automatic key exchange mechanism is used only to protect communications between two
points. In one-to-many communication scenarios, automatic key exchange cannot be
implemented.
• One-to-many communication scenarios require that all the devices use the same SA
parameters (SPI and key) to receive and send packets. IKE negotiated SAs cannot meet this
requirement.
IPsec RRI
As shown in Figure 99, the traffic between the enterprise center and the branches are protected by
IPsec. The gateway at the enterprise center is configured with static routes to route traffic to the
IPsec-protected interfaces. It is difficult to add or modify static routes on the gateway at the
enterprise center if the IPsec VPN has a large number of branches or if the network structure
changes.
Figure 99 IPsec VPN
IPsec Reverse Route Injection (RRI) enables an IPsec tunnel gateway to automatically add static
routes destined for protected private networks or static routes destined for peer IPsec tunnel
gateways to a routing table. As shown in Figure 99, you can enable IPsec RRI on the gateway at the
enterprise center. After an IPsec tunnel is established, the gateway automatically adds a static route
to the routing table, which can be looked up. The destination IP address is the protected private
network, and the next hop is the remote IP address of the IPsec tunnel. The traffic destined for the
peer end is routed to the IPsec tunnel interface and thereby protected by IPsec.
290
You can advertise the static routes created by IPsec RRI in the internal network, and the internal
network device can use them to forward traffic in the IPsec VPN.
In an MPLS L3VPN network, IPsec RRI can add static routes to VPN instances' routing tables.
IPsec RRI is applicable to gateways that must provide many IPsec tunnels (for example, a
headquarters gateway).
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for
features, commands, and parameters might differ in FIPS mode (see "Configuring FIPS") and
non-FIPS mode.
Security strength
By default, the device provides low encryption. To obtain high encryption, you must install the Strong
Cryptography feature license. This feature provides stronger cryptography, additional IPsec tunnels,
and higher encryption performance. For more information about obtaining the Strong Cryptography
feature license, see the release notes or contact your Hewlett Packard Enterprise sales
representative.
Support for features, commands, and parameters depends on the cryptography capability.
IPsec tunnels can be established in different methods. Choose a correct method to establish IPsec
tunnels according to your network conditions:
• ACL-based IPsec tunnel—Protects packets identified by an ACL. To establish an ACL-based
IPsec tunnel, configure an IPsec policy, specify an ACL in the policy, and apply the policy to an
interface (see "Implementing ACL-based IPsec"). The IPsec tunnel establishment steps are the
same in an IPv4 network and in an IPv6 network.
• Application-based IPsec tunnel—Protects the packets of an application. This method can be
used to protect IPv6 routing protocols and ADVPN tunnels. It does not require an ACL. For
information about IPv6 routing protocol protection, see "Configuring IPsec for IPv6 routing
protocols." For information about ADVPN tunnel protection, see "Configuring IPsec for tunnels."
291
Implementing ACL-based IPsec
Use the following procedure to implement ACL-based IPsec:
1. Configure an ACL for identifying data flows to be protected. To use IPsec to protect VPN traffic,
you do not need to specify the VPN parameters in the ACL rules.
2. Configure IPsec transform sets to specify the security protocols, authentication and encryption
algorithms, and the encapsulation mode.
3. Configure an IPsec policy to associate data flows with the IPsec transform sets, specify the SA
negotiation mode, the peer IP addresses (the start and end points of the IPsec tunnel), the
required keys, and the SA lifetime.
An IPsec policy is a set of IPsec policy entries that have the same name but different sequence
numbers. In the same IPsec policy, an IPsec policy entry with a smaller sequence number has
a higher priority.
4. Apply the IPsec policy to an interface.
Complete the following tasks to configure ACL-based IPsec:
Tasks at a glance
(Required.) Configuring an ACL
(Required.) Configuring an IPsec transform set
(Required.) Configure an IPsec policy (use either method):
• Configuring a manual IPsec policy
• Configuring an IKE-based IPsec policy
(Required.) Applying an IPsec policy to an interface
(Optional.) Enabling ACL checking for de-encapsulated packets
(Optional.) Configuring IPsec anti-replay
(Optional.) Configuring IPsec anti-replay redundancy
(Optional.) Binding a source interface to an IPsec policy
(Optional.) Enabling QoS pre-classify
(Optional.) Enabling logging of IPsec packets
(Optional.) Configuring the DF bit of IPsec packets
(Optional.) Configuring IPsec RRI
(Optional.) Configuring SNMP notifications for IPsec
Configuring an ACL
IPsec uses ACLs to identify the traffic to be protected.
Keywords in ACL rules
An ACL is a collection of ACL rules. Each ACL rule is a deny or permit statement. A permit statement
identifies a data flow protected by IPsec, and a deny statement identifies a data flow that is not
protected by IPsec. IPsec compares a packet against the ACL rules and processes the packet
according to the first rule it matches.
• Each ACL rule matches both the outbound traffic and the returned inbound traffic. Suppose
there is a rule rule 0 permit ip source 1.1.1.0 0.0.0.255 destination 2.2.2.0 0.0.0.255. This
rule matches both traffic from 1.1.1.0 to 2.2.2.0 and traffic from 2.2.2.0 to 1.1.1.0.
292
• In the outbound direction, if a permit statement is matched, IPsec considers that the packet
requires protection and continues to process it. If a deny statement is matched or no match is
found, IPsec considers that the packet does not require protection and delivers it to the next
function module.
• In the inbound direction:
{ Non-IPsec packets that match a permit statement are dropped.
{ IPsec packets destined for the device itself are de-encapsulated. By default, the
de-encapsulated packets are compared against the ACL rules. Only those that match a
permit statement are processed. Other packets are dropped. If ACL checking for
de-encapsulated IPsec packets is disabled, the de-encapsulated packets are not compared
against the ACL rules and are directly processed by other modules.
When defining ACL rules for IPsec, follow these guidelines:
• Permit only data flows that need to be protected and use the any keyword with caution. With the
any keyword specified in a permit statement, all outbound traffic matching the permit statement
will be protected by IPsec. All inbound IPsec packets matching the permit statement will be
received and processed, but all inbound non-IPsec packets will be dropped. This will cause all
the inbound traffic that does not need IPsec protection to be dropped.
• Avoid statement conflicts in the scope of IPsec policy entries. When creating a deny statement,
be careful with its match scope and match order relative to permit statements. The policy
entries in an IPsec policy have different match priorities. ACL rule conflicts between them are
prone to cause mistreatment of packets. For example, when configuring a permit statement for
an IPsec policy entry to protect an outbound traffic flow, you must avoid the situation that the
traffic flow matches a deny statement in a higher priority IPsec policy entry. Otherwise, the
packets will be sent out as normal packets. If they match a permit statement at the receiving
end, they will be dropped by IPsec.
The following example shows how an improper statement causes unexpected packet dropping. Only
the ACL-related configuration is presented.
Assume Router A is connected to subnet 1.1.2.0/24 and Router B is connected to subnet 3.3.3.0/24,
and the IPsec policy configuration on Router A and Router B is as follows:
• IPsec configuration on Router A:
acl advanced 3000
rule 0 permit ip source 1.1.1.0 0.0.0.255 destination 2.2.2.0 0.0.0.255
rule 1 deny ip
acl advanced 3001
rule 0 permit ip source 1.1.2.0 0.0.0.255 destination 3.3.3.0 0.0.0.255
rule 1 deny ip
#
ipsec policy testa 1 isakmp <---IPsec policy entry with a higher priority
security acl 3000
ike-profile aa
transform-set 1
#
ipsec policy testa 2 isakmp <---IPsec policy entry with a lower priority
security acl 3001
ike-profile bb
transform-set 1
• IPsec configuration on Router B:
acl advanced 3001
rule 0 permit ip source 3.3.3.0 0.0.0.255 destination 1.1.2.0 0.0.0.255
rule 1 deny ip
293
#
ipsec policy testb 1 isakmp
security acl 3001
ike-profile aa
transform-set 1
On Router A, apply the IPsec policy testa to the outbound interface of Router A. The IPsec policy
contains two policy entries, testa 1 and testa 2. The ACLs used by the two policy entries each
contain a rule that matches traffic from 1.1.2.0/24 to 3.3.3.0/24. The one in policy entry testa 1 is a
deny statement and the one in policy entry testa 2 is a permit statement. Because testa 1 is
matched prior to testa 2, traffic from 1.1.2.0/24 to 3.3.3.0/24 will match the deny statement and be
sent as normal traffic. When the traffic arrives at Router B, the traffic matches rule 0 (a permit
statement) in ACL 3001 in the applied IPsec policy testb. Because non-IPsec traffic that matches a
permit statement must be dropped on the inbound interface, Router B drops the traffic.
To make sure subnet 1.1.2.0/24 can access subnet 3.3.3.0/24, you can delete the deny rule in ACL
3000 on Router A.
Mirror image ACLs
To make sure SAs can be set up and the traffic protected by IPsec can be processed correctly
between two IPsec peers, create mirror image ACLs on the IPsec peers. As shown in Figure 100,
ACL rules on Router B are mirror images of the rules on Router A. In this way, SAs can be created
successfully for the traffic between Host A and Host C and for the traffic between Network 1 and
Network 2.
Figure 100 Mirror image ACLs
If the ACL rules on IPsec peers do not form mirror images of each other, SAs can be set up only
when both of the following requirements are met:
• The range specified by an ACL rule on one peer is covered by its counterpart ACL rule on the
other peer. As shown in Figure 101, the range specified by the ACL rule configured on Router A
is covered by its counterpart on Router B.
• The peer with the narrower rule initiates SA negotiation. If a wider ACL rule is used by the SA
initiator, the negotiation request might be rejected because the matching traffic is beyond the
scope of the responder. As shown in Figure 101, the SA negotiation initiated by Host A to Host C
is accepted but the SA negotiations from Host C to Host A, from Host C to Host B, and from
Host D to Host A are rejected.
294
Figure 101 Non-mirror image ACLs
295
Step Command Remarks
• (Low encryption.) Specify the
encryption algorithm for ESP:
esp encryption-algorithm
des-cbc
• (High encryption in non-FIPS
mode.) Specify the encryption
algorithm for ESP:
esp encryption-algorithm
{ 3des-cbc | aes-cbc-128 |
aes-cbc-192 | aes-cbc-256 |
aes-ctr-128 | aes-ctr-192 | Configure at least one command.
aes-ctr-256 | camellia-cbc-128 | By default, no security algorithm is
camellia-cbc-192 | specified.
camellia-cbc-256 | des-cbc | You can specify security
gmac-128 | gmac-192 | algorithms for a security protocol
gmac-256 | gcm-128 | gcm-192 | only when the security protocol is
gcm-256 | null | sm1-cbc-128 | used by the transform set. For
sm1-cbc-192 | sm1-cbc-256 | example, you can specify the
sm4-cbc } * ESP-specific security algorithms
• (High encryption in FIPS mode.) only when you select ESP or
Specify the encryption algorithm AH-ESP as the security protocol.
for ESP:
If you use ESP in FIPS mode, you
esp encryption-algorithm
must specify both the ESP
{ aes-cbc-128 | aes-cbc-192 |
encryption algorithm and the ESP
aes-cbc-256 | aes-ctr-128 |
4. Specify the security authentication algorithm.
aes-ctr-192 | aes-ctr-256 |
algorithms. gmac-128 | gmac-192 | You can specify multiple
gmac-256 | gcm-128 | gcm-192 | algorithms by using one
gcm-256 } * command, and the algorithm
• (In non-FIPS mode.) Specify the specified earlier has a higher
authentication algorithm for ESP: priority.
esp authentication-algorithm The aes-ctr-128, aes-ctr-192,
{ aes-xcbc-mac | md5 | sha1 | aes-ctr-256, camellia-cbc-128,
sha256 | sha384 | sha512 | sm3 } camellia-cbc-192,
* camellia-cbc-256, gmac-128,
• (In FIPS mode.) Specify the gmac-192, gmac-256, gcm-128,
authentication algorithm for ESP: gcm-192, and gcm-256
esp authentication-algorithm encryption algorithms and the
{ sha1 | sha256 | sha384 | aes-xcbc-mac, sha256, sha384,
sha512 } * and sha512 authentication
algorithms are available only for
• (In non-FIPS mode.) Specify the
IKEv2.
authentication algorithm for AH:
ah authentication-algorithm
{ aes-xcbc-mac | md5 | sha1 |
sha256 | sha384 | sha512 | sm3 }
*
• (In FIPS mode.) Specify the
authentication algorithm for AH:
ah authentication-algorithm
{ sha1 | sha256 | sha384 |
sha512 } *
296
Step Command Remarks
By default, the security protocol
encapsulates IP packets in tunnel
mode.
The transport mode applies only
5. Specify the mode in when the source and destination
which the security encapsulation-mode { transport | IP addresses of data flows match
protocol encapsulates tunnel } those of the IPsec tunnel.
IP packets.
IPsec for IPv6 routing protocols
supports only the transport mode.
IPsec for ADVPN tunnels
supports only the tunnel mode.
By default, the PFS feature is not
used for SA negotiation.
For more information about PFS,
• In non-FIPS mode: see "Configuring IKE."
pfs { dh-group1 | dh-group2 | The security level of the
6. (Optional.) Enable the dh-group5 | dh-group14 | Diffie-Hellman (DH) group of the
Perfect Forward dh-group24 | dh-group19 | initiator must be higher than or
Secrecy (PFS) feature dh-group20 } equal to that of the responder.
for the IPsec policy. • In FIPS mode: The end without the PFS feature
pfs { dh-group14 | dh-group19 | performs SA negotiation
dh-group20 } according to the PFS
requirements of the peer end.
The DH groups 19 and 20 are
available only for IKEv2.
7. (Optional.) Enable the
Extended Sequence By default, the ESN feature is
esn enable [ both ]
Number (ESN) feature. disabled.
297
Configuration procedure
To configure a manual IPsec policy:
298
Step Command Remarks
• Configure an authentication
key in hexadecimal format
for AH:
sa hex-key authentication
{ inbound | outbound } ah
{ cipher | simple }
key-value
• Configure an authentication
key in character format for
AH: By default, no keys are configured for
sa string-key { inbound | the IPsec SA.
outbound } ah { cipher | Configure keys correctly for the security
simple } key-value protocol (AH, ESP, or both) you have
• Configure a key in character specified in the IPsec transform set
format for ESP: used by the IPsec policy.
8. Configure keys for the sa string-key { inbound | If you configure a key in both the
IPsec SA. outbound } esp { cipher | character and the hexadecimal formats,
simple } key-value only the most recent configuration takes
• Configure an authentication effect.
key in hexadecimal format If you configure a key in character
for ESP: format for ESP, the device automatically
sa hex-key authentication generates an authentication key and an
{ inbound | outbound } esp encryption key for ESP.
{ cipher | simple }
key-value
• Configure an encryption key
in hexadecimal format for
ESP:
sa hex-key encryption
{ inbound | outbound } esp
{ cipher | simple }
key-value
299
• The remote IP address of the IPsec tunnel is required on an IKE negotiation initiator and is
optional on the responder. The remote IP address specified on the local end must be the same
as the local IP address specified on the remote end.
• The IPsec SA uses the local lifetime settings or those proposed by the peer, whichever are
smaller.
• The IPsec SA can have both a time-based lifetime and a traffic-based lifetime. The IPsec SA
expires when either lifetime expires.
Directly configuring an IKE-based IPsec policy
3. (Optional.) Configure a
description for the IPsec By default, no description is
description text
policy. configured.
300
Step Command Remarks
By default, the local IPv4 address
of IPsec tunnel is the primary IPv4
address of the interface to which
the IPsec policy is applied, and
the local IPv6 address of the
IPsec tunnel is the first IPv6
address of the interface to which
the IPsec policy is applied.
8. Specify the local IP address local-address { ipv4-address |
of the IPsec tunnel. The local IP address specified by
ipv6 ipv6-address }
this command must be the same
as the IP address used as the
local IKE identity.
In a VRRP network, the local IP
address must be the virtual IP
address of the VRRP group to
which the IPsec-applied interface
belongs.
301
Step Command Remarks
1. Enter system view. system-view N/A
302
Step Command Remarks
303
Step Command Remarks
By default, no IPsec policy is
applied to the interface.
You can apply only one IPsec
3. Apply an IPsec policy to the ipsec apply { policy | policy to an interface.
interface. ipv6-policy } policy-name An IKE-based IPsec policy can be
applied to multiple interfaces, and
a manual IPsec policy can be
applied to only one interface.
By default, no traffic processing
card or device is specified.
It is required when the following
conditions are met:
• An IKE-based IPsec policy is
4. Specify a traffic processing applied to global logical
card or device for the interfaces, such as VLAN
interface (distributed devices interfaces and tunnel
in standalone service slot slot-number
interfaces.
mode/centralized devices in • The IPsec anti-replay
IRF mode). function is globally enabled.
The traffic processing card or
device specified for a tunnel
interface must be the card or
device where the source interface
of the tunnel interface resides.
By default, no traffic processing
card is specified.
It is required when the following
conditions are met:
• An IKE-based IPsec policy is
applied to global logical
5. Specify a traffic processing interfaces, such as VLAN
card for the interface service chassis chassis-number interfaces and tunnel
(distributed devices in IRF slot slot-number interfaces.
mode). • The IPsec anti-replay
function is globally enabled.
The traffic processing card
specified for a tunnel interface
must be the card where the
source interface of the tunnel
interface resides.
304
Step Command Remarks
2. Enable ACL checking for
de-encapsulated packets. ipsec decrypt-check enable By default, this feature is enabled.
IMPORTANT:
• IPsec anti-replay is enabled by default. Failure to detect anti-replay attacks might result in denial
of services. Use caution when you disable IPsec anti-replay.
• Set the anti-replay window size as small as possible to reduce the impact on system
performance.
• Typically, a distributed device processes packets for a global logical interface directly on the
service cards that received the packets. However, IPsec anti-replay requires that packets sent
and received on the same global logical interface be processed by the same service card. To
implement IPsec anti-replay on distributed devices, use the service command in the global
logical interface view to specify a service card for forwarding the traffic on the interface.
305
To configure IPsec anti-replay redundancy:
306
Enabling QoS pre-classify
CAUTION:
If you configure both IPsec and QoS on an interface, make sure the IPsec traffic classification rules
match the QoS traffic classification rules. If the rules do not match, QoS might classify the packets of
one IPsec SA to different queues, causing packets to be sent out of order. When IPsec anti-replay is
enabled, IPsec will drop the incoming packets that are out of the anti-replay window, resulting in
packet loss.
If you apply both an IPsec policy and a QoS policy to an interface, QoS classifies packets by using
the new headers added by IPsec. If you want QoS to classify packets by using the headers of the
original IP packets, enable the QoS pre-classify feature.
IPsec traffic classification rules are determined by the specified ACL rules. For more information
about QoS policy and classification, see ACL and QoS Configuration Guide.
To enable the QoS pre-classify feature:
307
• copy—Copies the DF bit in the original IP header to the new IP header.
You can configure the DF bit in system view and interface view. The interface-view DF bit setting
takes precedence over the system-view DF bit setting. If the interface-view DF bit setting is not
configured, the interface uses the system-view DF bit setting.
Follow these guidelines when you configure the DF bit:
• The DF bit setting takes effect only in tunnel mode, and it changes the DF bit in the new IP
header rather than the original IP header.
• Configure the same DF bit setting on the interfaces where the same IPsec policy bound to a
source interface has been applied.
• If the DF bit is set, the devices on the path cannot fragment the IPsec packets. Therefore, make
sure the path MTU is larger than the IPsec packets. Otherwise, the IPsec packets will be
discarded. If the path MTU is smaller than the IPsec packets, clear the DF bit.
To configure the DF bit of IPsec packets on an interface:
308
Configuration procedure
To configure IPsec RRI:
Tasks at a glance
(Required.) Configuring an IPsec transform set
(Required.) Configuring a manual IPsec profile
(Required.) Applying the IPsec profile to an IPv6 routing protocol (see Layer 3—IP Routing Configuration
Guide)
(Optional.) Enabling logging of IPsec packets
(Optional.) Configuring SNMP notifications for IPsec
309
• The IPsec transform set used by the IPsec profile at the two tunnel ends must have the same
security protocol, encryption and authentication algorithms, and packet encapsulation mode.
• The local inbound and outbound IPsec SAs must have the same SPI and key.
• The IPsec SAs on the devices in the same scope must have the same key. The scope is defined
by protocols. For OSPF, the scope consists of OSPF neighbors or an OSPF area. For RIPng,
the scope consists of directly-connected neighbors or a RIPng process. For BGP, the scope
consists of BGP peers or a BGP peer group.
• The keys for the IPsec SAs at the two tunnel ends must be configured in the same format. For
example, if the key at one end is entered as a string of characters, the key on the other end
must also be entered as a string of characters.
To configure a manual IPsec profile:
310
Configuring IPsec for tunnels
Configuration task list
Complete the following tasks to configure IPsec for tunnels:
Tasks at a glance
(Required.) Configuring an IPsec transform set
(Required.) Configuring an IKE-based IPsec profile
(Required.) Applying an IKE-based IPsec profile to a tunnel interface
(Optional.) Enabling logging of IPsec packets
(Optional.) Configuring SNMP notifications for IPsec
3. (Optional.) Configure a
description for the IPsec By default, no description is
description text
profile. configured.
311
Step Command Remarks
By default, no IPsec transform set
4. Specify IPsec transform transform-set is specified for an IPsec profile.
sets. transform-set-name&<1-6> The specified IPsec transform
sets must use the tunnel mode.
By default, no IKE profile is
specified for an IPsec profile, and
the device selects an IKE profile
configured in system view for
negotiation. If no IKE profile is
configured in system view, the
5. Specify an IKE profile. ike-profile profile-name globally configured IKE settings
are used.
You can specify only one IKE
profile for an IPsec profile.
For more information about IKE
profiles, see "Configuring IKE."
6. Set the IPsec SA lifetime. sa duration { time-based seconds | By default, the global SA lifetime
traffic-based kilobytes } is used.
7. (Optional.) Set the IPsec By default, the global SA idle
SA idle timeout. sa idle-time seconds
timeout is used.
By default, the time-based SA
ipsec sa global-duration
8. Set the global SA lifetime. lifetime is 3600 seconds, and the
{ time-based seconds |
traffic-based SA lifetime is
traffic-based kilobytes }
1843200 kilobytes.
9. (Optional.) Enable the
global IPsec SA idle By default, the global IPsec SA
timeout feature, and set ipsec sa idle-time seconds
idle timeout function is disabled.
the global SA idle timeout.
3. Apply an IKE-based IPsec tunnel protection ipsec profile By default, no IPsec profile is
profile to the tunnel interface. profile-name applied to the tunnel interface.
312
displays notifications. For more information about SNMP notifications, see Network Management
and Monitoring Configuration Guide.
To generate and output SNMP notifications for a specific IPsec failure or event type, perform the
following tasks:
1. Enable SNMP notifications for IPsec globally.
2. Enable SNMP notifications for the failure or event type.
To configure SNMP notifications for IPsec:
Task Command
display ipsec { ipv6-policy | policy } [ policy-name
Display IPsec policy information.
[ seq-number ] ]
display ipsec { ipv6-policy-template |
Display IPsec policy template information.
policy-template } [ template-name [ seq-number ] ]
Display IPsec profile information. display ipsec profile [ profile-name ]
Display IPsec transform set information. display ipsec transform-set [ transform-set-name ]
display ipsec sa [ brief | count | interface interface-type
interface-number | { ipv6-policy | policy } policy-name
Display IPsec SA information.
[ seq-number ] | profile policy-name | remote [ ipv6 ]
ip-address ]
Display IPsec statistics. display ipsec statistics [ tunnel-id tunnel-id ]
display ipsec tunnel { brief | count | tunnel-id
Display IPsec tunnel information.
tunnel-id }
reset ipsec sa [ { ipv6-policy | policy } policy-name
[ seq-number ] | profile policy-name | remote
Clear IPsec SAs.
{ ipv4-address | ipv6 ipv6-address } | spi { ipv4-address |
ipv6 ipv6-address } { ah | esp } spi-num ]
Clear IPsec statistics. reset ipsec statistics [ tunnel-id tunnel-id ]
313
IPsec configuration examples
Configuring a manual mode IPsec tunnel for IPv4 packets
Network requirements
As shown in Figure 102, establish an IPsec tunnel between Router A and Router B to protect data
flows between subnet 10.1.1.0/24 and subnet 10.1.2.0/24. Configure the tunnel as follows:
• Specify the encapsulation mode as tunnel, the security protocol as ESP, the encryption
algorithm as 128-bit AES, and the authentication algorithm as HMAC-SHA1.
• Manually set up IPsec SAs.
Figure 102 Network diagram
Router A Router B
GE2/0/2 GE2/0/2
2.2.2.1/24 2.2.3.1/24
Internet
GE2/0/1 GE2/0/1
10.1.1.1/24 10.1.2.1/24
Host A Host B
10.1.1.2/24 10.1.2.2/24
Configuration procedure
1. Configure Router A:
# Configure IP addresses for interfaces. (Details not shown.)
# Configure an ACL to identify data flows from subnet 10.1.1.0/24 to subnet 10.1.2.0/24.
<RouterA> system-view
[RouterA] acl advanced 3101
[RouterA-acl-ipv4-adv-3101] rule permit ip source 10.1.1.0 0.0.0.255 destination
10.1.2.0 0.0.0.255
[RouterA-acl-ipv4-adv-3101] quit
# Configure a static route to Host B. The command uses the direct next hop address (2.2.2.3)
as an example.
[RouterA] ip route-static 10.1.2.0 255.255.255.0 gigabitethernet 2/0/2 2.2.2.3
# Create an IPsec transform set named tran1.
[RouterA] ipsec transform-set tran1
# Specify the encapsulation mode as tunnel.
[RouterA-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Specify the security protocol as ESP.
[RouterA-ipsec-transform-set-tran1] protocol esp
# Specify the ESP encryption and authentication algorithms.
[RouterA-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-128
[RouterA-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[RouterA-ipsec-transform-set-tran1] quit
# Create a manual IPsec policy entry with the name map1 and the sequence number 10.
[RouterA] ipsec policy map1 10 manual
314
# Apply ACL 3101.
[RouterA-ipsec-policy-manual-map1-10] security acl 3101
# Apply the IPsec transform set tran1.
[RouterA-ipsec-policy-manual-map1-10] transform-set tran1
# Specify the remote IP address of the IPsec tunnel as 2.2.3.1.
[RouterA-ipsec-policy-manual-map1-10] remote-address 2.2.3.1
# Configure inbound and outbound SPIs for ESP.
[RouterA-ipsec-policy-manual-map1-10] sa spi outbound esp 12345
[RouterA-ipsec-policy-manual-map1-10] sa spi inbound esp 54321
# Configure the inbound and outbound SA keys for ESP.
[RouterA-ipsec-policy-manual-map1-10] sa string-key outbound esp simple abcdefg
[RouterA-ipsec-policy-manual-map1-10] sa string-key inbound esp simple gfedcba
[RouterA-ipsec-policy-manual-map1-10] quit
# Apply the IPsec policy map1 to interface GigabitEthernet 2/0/2.
[RouterA] interface gigabitethernet 2/0/2
[RouterA-GigabitEthernet2/0/2] ip address 2.2.2.1 255.255.255.0
[RouterA-GigabitEthernet2/0/2] ipsec apply policy map1
[RouterA-GigabitEthernet2/0/2] quit
2. Configure Router B:
# Configure IP addresses for interfaces. (Details not shown.)
# Configure an ACL to identify data flows from subnet 10.1.2.0/24 to subnet 10.1.1.0/24.
<RouterB> system-view
[RouterB] acl advanced 3101
[RouterB-acl-ipv4-adv-3101] rule permit ip source 10.1.2.0 0.0.0.255 destination
10.1.1.0 0.0.0.255
[RouterB-acl-ipv4-adv-3101] quit
# Configure a static route to Host A. The command uses the direct next hop address (2.2.3.3)
as an example.
[RouterB] ip route-static 10.1.1.0 255.255.255.0 gigabitethernet 2/0/2 2.2.3.3
# Create an IPsec transform set named tran1.
[RouterB] ipsec transform-set tran1
# Specify the encapsulation mode as tunnel.
[RouterB-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Specify the security protocol as ESP.
[RouterB-ipsec-transform-set-tran1] protocol esp
# Specify the ESP encryption and authentication algorithms.
[RouterB-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-128
[RouterB-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[RouterB-ipsec-transform-set-tran1] quit
# Create a manual IPsec policy entry with the name use1 and the sequence number 10.
[RouterB] ipsec policy use1 10 manual
# Apply ACL 3101.
[RouterB-ipsec-policy-manual-use1-10] security acl 3101
# Apply IPsec transform set tran1.
[RouterB-ipsec-policy-manual-use1-10] transform-set tran1
# Specify the remote IP address of the IPsec tunnel as 2.2.2.1.
[RouterB-ipsec-policy-manual-use1-10] remote-address 2.2.2.1
315
# Configure the inbound and outbound SPIs for ESP.
[RouterB-ipsec-policy-manual-use1-10] sa spi outbound esp 54321
[RouterB-ipsec-policy-manual-use1-10] sa spi inbound esp 12345
# Configure the inbound and outbound SA keys for ESP.
[RouterB-ipsec-policy-manual-use1-10] sa string-key outbound esp simple gfedcba
[RouterB-ipsec-policy-manual-use1-10] sa string-key inbound esp simple abcdefg
[RouterB-ipsec-policy-manual-use1-10] quit
# Apply the IPsec policy use1 to interface GigabitEthernet 2/0/2.
[RouterB] interface gigabitethernet 2/0/2
[RouterB-GigabitEthernet2/0/2] ipsec policy use1
[RouterB-GigabitEthernet2/0/2] quit
-----------------------------
IPsec policy: map1
Sequence number: 10
Mode: Manual
-----------------------------
Tunnel id: 549
Encapsulation mode: tunnel
Path MTU: 1443
Tunnel:
local address: 2.2.2.1
remote address: 2.2.3.1
Flow:
as defined in ACL 3101
[Inbound ESP SA]
SPI: 54321 (0x0000d431)
Connection ID: 1
Transform set: ESP-ENCRYPT-AES-CBC-128 ESP-AUTH-SHA1
No duration limit for this SA
[Outbound ESP SA]
SPI: 12345 (0x00003039)
Connection ID: 2
Transform set: ESP-ENCRYPT-AES-CBC-128 ESP-AUTH-SHA1
No duration limit for this SA
316
Configuring an IKE-based IPsec tunnel for IPv4 packets
Network requirements
As shown in Figure 103, establish an IPsec tunnel between Router A and Router B to protect data
flows between subnet 10.1.1.0/24 and subnet 10.1.2.0/24. Configure the IPsec tunnel as follows:
• Specify the encapsulation mode as tunnel, the security protocol as ESP, the encryption
algorithm as 128-bit AES, and the authentication algorithm as HMAC-SHA1.
• Set up SAs through IKE negotiation.
Figure 103 Network diagram
Router A Router B
GE2/0/2 GE2/0/2
2.2.2.1/24 2.2.3.1/24
Internet
GE2/0/1 GE2/0/1
10.1.1.1/24 10.1.2.1/24
Host A Host B
10.1.1.2/24 10.1.2.2/24
Configuration procedure
1. Configure Router A:
# Configure IP addresses for interfaces. (Details not shown.)
# Configure an ACL to identify data flows from subnet 10.1.1.0/24 to subnet 10.1.2.0/24.
<RouterA> system-view
[RouterA] acl advanced 3101
[RouterA-acl-ipv4-adv-3101] rule permit ip source 10.1.1.0 0.0.0.255 destination
10.1.2.0 0.0.0.255
[RouterA-acl-ipv4-adv-3101] quit
# Configure a static route to Host B. The command uses the direct next hop address (2.2.2.3)
as an example.
[RouterA] ip route-static 10.1.2.0 255.255.255.0 gigabitethernet 2/0/2 2.2.2.3
# Create an IPsec transform set named tran1.
[RouterA] ipsec transform-set tran1
# Specify the encapsulation mode as tunnel.
[RouterA-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Specify the security protocol as ESP.
[RouterA-ipsec-transform-set-tran1] protocol esp
# Specify the ESP encryption and authentication algorithms.
[RouterA-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-128
[RouterA-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[RouterA-ipsec-transform-set-tran1] quit
# Create and configure the IKE keychain named keychain1.
[RouterA] ike keychain keychain1
# Specify the plaintext 123456TESTplat&! as the pre-shared key to be used with the remote
peer at 2.2.3.1.
317
[RouterA-ike-keychain-keychain1] pre-shared-key address 2.2.3.1 255.255.255.0 key
simple 123456TESTplat&!
[RouterA-ike-keychain-keychain1] quit
# Create and configure the IKE profile named profile1.
[RouterA] ike profile profile1
[RouterA-ike-profile-profile1] keychain keychain1
[RouterA-ike-profile-profile1] match remote identity address 2.2.3.1 255.255.255.0
[RouterA-ike-profile-profile1] quit
# Create an IKE-based IPsec policy entry with the name map1 and the sequence number 10.
[RouterA] ipsec policy map1 10 isakmp
# Apply ACL 3101.
[RouterA-ipsec-policy-isakmp-map1-10] security acl 3101
# Apply the IPsec transform set tran1.
[RouterA-ipsec-policy-isakmp-map1-10] transform-set tran1
# Specify the local and remote IP addresses of the IPsec tunnel as 2.2.2.1 and 2.2.3.1.
[RouterA-ipsec-policy-isakmp-map1-10] local-address 2.2.2.1
[RouterA-ipsec-policy-isakmp-map1-10] remote-address 2.2.3.1
# Apply the IKE profile profile1.
[RouterA-ipsec-policy-isakmp-map1-10] ike-profile profile1
[RouterA-ipsec-policy-isakmp-map1-10] quit
# Apply the IPsec policy map1 to interface GigabitEthernet 2/0/2.
[RouterA] interface gigabitethernet 2/0/2
[RouterA-GigabitEthernet2/0/2] ip address 2.2.2.1 255.255.255.0
[RouterA-GigabitEthernet2/0/2] ipsec apply policy map1
[RouterA-GigabitEthernet2/0/2] quit
2. Configure Router B:
# Configure IP addresses for interfaces. (Details not shown.)
# Configure an ACL to identify data flows from subnet 10.1.2.0/24 to subnet 10.1.1.0/24.
<RouterB> system-view
[RouterB] acl advanced 3101
[RouterB-acl-ipv4-adv-3101] rule permit ip source 10.1.2.0 0.0.0.255 destination
10.1.1.0 0.0.0.255
[RouterB-acl-ipv4-adv-3101] quit
# Configure a static route to Host A. The command uses the direct next hop address (2.2.3.3)
as an example.
[RouterB] ip route-static 10.1.1.0 255.255.255.0 gigabitethernet 2/0/2 2.2.3.3
# Create an IPsec transform set named tran1.
[RouterB] ipsec transform-set tran1
# Specify the encapsulation mode as tunnel.
[RouterB-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Specify the security protocol as ESP.
[RouterB-ipsec-transform-set-tran1] protocol esp
# Specify the ESP encryption and authentication algorithms.
[RouterB-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-128
[RouterB-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[RouterB-ipsec-transform-set-tran1] quit
# Create and configure the IKE keychain named keychain1.
318
[RouterB] ike keychain keychain1
[RouterB-ike-keychain-keychain1] pre-shared-key address 2.2.2.1 255.255.255.0 key
simple 123456TESTplat&!
[RouterB-ike-keychain-keychain1] quit
# Create and configure the IKE profile named profile1.
[RouterB] ike profile profile1
[RouterB-ike-profile-profile1] keychain keychain1
[RouterB-ike-profile-profile1] match remote identity address 2.2.2.1 255.255.255.0
[RouterB-ike-profile-profile1] quit
# Create an IKE-based IPsec policy entry with the name use1 and the sequence number 10.
[RouterB] ipsec policy use1 10 isakmp
# Apply ACL 3101.
[RouterB-ipsec-policy-isakmp-use1-10] security acl 3101
# Apply the IPsec transform set tran1.
[RouterB-ipsec-policy-isakmp-use1-10] transform-set tran1
# Specify the local and remote IP addresses of the IPsec tunnel as 2.2.3.1 and 2.2.2.1.
[RouterB-ipsec-policy-isakmp-use1-10] local-address 2.2.3.1
[RouterB-ipsec-policy-isakmp-use1-10] remote-address 2.2.2.1
# Apply the IKE profile profile1.
[RouterB-ipsec-policy-isakmp-use1-10] ike-profile profile1
[RouterB-ipsec-policy-isakmp-use1-10] quit
# Apply the IPsec policy use1 to interface GigabitEthernet 2/0/2.
[RouterB] interface gigabitethernet 2/0/2
[RouterB-GigabitEthernet2/0/2] ip address 2.2.3.1 255.255.255.0
[RouterB-GigabitEthernet2/0/2] ipsec apply policy use1
[RouterB-GigabitEthernet2/0/2] quit
-----------------------------
IPsec policy: map1
Sequence number: 10
Mode: ISAKMP
-----------------------------
Tunnel id: 0
Encapsulation mode: tunnel
Perfect Forward Secrecy:
Path MTU: 1443
Tunnel:
local address: 2.2.3.1
319
remote address: 2.2.2.1
Flow:
sour addr: 2.2.3.1/0.0.0.0 port: 0 protocol: ip
dest addr: 2.2.2.1/0.0.0.0 port: 0 protocol: ip
Host A Host B
333::3/64 555::5/64
320
Configuration procedure
1. Configure Router A:
# Configure IPv6 addresses for interfaces. (Details not shown.)
# Configure an ACL to identify data flows from subnet 333::/64 to subnet 555::/64.
<RouterA> system-view
[RouterA] acl ipv6 advanced 3101
[RouterA-acl-ipv6-adv-3101] rule permit ipv6 source 333::0 64 destination 555::0 64
[RouterA-acl-ipv6-adv-3101] quit
# Configure a static route to Host B. The command uses the direct next hop address (111::2) as
an example.
[RouterA] ipv6 route-static 555::0 64 111::2
# Create an IPsec transform set named tran1.
[RouterA] ipsec transform-set tran1
# Specify the encapsulation mode as tunnel.
[RouterA-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Specify the security protocol as ESP.
[RouterA-ipsec-transform-set-tran1] protocol esp
# Specify the ESP encryption and authentication algorithms.
[RouterA-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-128
[RouterA-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[RouterA-ipsec-transform-set-tran1] quit
# Create and configure the IKE keychain named keychain1.
[RouterA] ike keychain keychain1
[RouterA-ike-keychain-keychain1] pre-shared-key address ipv6 222::1 64 key simple
123456TESTplat&!
[RouterA-ike-keychain-keychain1] quit
# Create and configure the IKE profile named profile1.
[RouterA] ike profile profile1
[RouterA-ike-profile-profile1] keychain keychain1
[RouterA-ike-profile-profile1] match remote identity address ipv6 222::1 64
[RouterA-ike-profile-profile1] quit
# Create an IKE-based IPsec policy entry with the name map1 and the sequence number 10.
[RouterA] ipsec ipv6-policy map1 10 isakmp
# Apply IPv6 ACL 3101.
[RouterA-ipsec-ipv6-policy-isakmp-map1-10] security acl ipv6 3101
# Apply the IPsec transform set tran1.
[RouterA-ipsec-ipv6-policy-isakmp-map1-10] transform-set tran1
# Specify the local and remote IPv6 addresses of the IPsec tunnel as 111::1 and 222::1.
[RouterA-ipsec-ipv6-policy-isakmp-map1-10] local-address ipv6 111::1
[RouterA-ipsec-ipv6-policy-isakmp-map1-10] remote-address ipv6 222::1
# Apply the IKE profile profile1.
[RouterA-ipsec-ipv6-policy-isakmp-map1-10] ike-profile profile1
[RouterA-ipsec-ipv6-policy-isakmp-map1-10] quit
# Apply the IPsec policy map1 to interface GigabitEthernet 2/0/2.
[RouterA] interface gigabitethernet 2/0/2
[RouterA-GigabitEthernet2/0/2] ipv6 address 111::1/64
[RouterA-GigabitEthernet2/0/2] ipsec apply ipv6-policy map1
321
[RouterA-GigabitEthernet2/0/2] quit
2. Configure Router B:
# Configure IPv6 addresses for interfaces. (Details not shown.)
# Configure an ACL to identify data flows from subnet 555::/64 to subnet 333::/64.
<RouterB> system-view
[RouterB] acl ipv6 advanced 3101
[RouterB-acl-ipv6-adv-3101] rule permit ipv6 source 555::/64 destination 333::/64
[RouterB-acl-ipv6-adv-3101] quit
# Configure a static route to Host A. The command uses the direct next hop address (222::2) as
an example.
[RouterB] ipv6 route-static 333::0 64 222::2
# Create an IPsec transform set named tran1.
[RouterB] ipsec transform-set tran1
# Specify the encapsulation mode as tunnel.
[RouterB-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Specify the security protocol as ESP.
[RouterB-ipsec-transform-set-tran1] protocol esp
# Specify the ESP encryption and authentication algorithms.
[RouterB-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-128
[RouterB-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[RouterB-ipsec-transform-set-tran1] quit
# Create and configure the IKE keychain named keychain1.
[RouterB] ike keychain keychain1
[RouterB-ike-keychain-keychain1] pre-shared-key address ipv6 111::1 64 key simple
123456TESTplat&!
[RouterB-ike-keychain-keychain1] quit
# Create and configure the IKE profile named profile1.
[RouterB] ike profile profile1
[RouterB-ike-profile-profile1] keychain keychain1
[RouterB-ike-profile-profile1] match remote identity address ipv6 111::1 64
[RouterB-ike-profile-profile1] quit
# Create an IKE-based IPsec policy entry with the name use1 and the sequence number 10.
[RouterB] ipsec ipv6-policy use1 10 isakmp
# Apply ACL 3101.
[RouterB-ipsec-ipv6-policy-isakmp-use1-10] security acl ipv6 3101
# Apply the IPsec transform set tran1.
[RouterB-ipsec-ipv6-policy-isakmp-use1-10] transform-set tran1
# Specify the local and remote IPv6 addresses of the IPsec tunnel as 222::1 and 111::1.
[RouterB-ipsec-ipv6-policy-isakmp-use1-10] local-address ipv6 222::1
[RouterB-ipsec-ipv6-policy-isakmp-use1-10] remote-address ipv6 111::1
# Apply the IKE profile profile1.
[RouterB-ipsec-ipv6-policy-isakmp-use1-10] ike-profile profile1
[RouterB-ipsec-ipv6-policy-isakmp-use1-10] quit
# Apply the IPsec policy use1 to interface GigabitEthernet 2/0/2.
[RouterB] interface gigabitethernet 2/0/2
[RouterB-GigabitEthernet2/0/2] ipv6 address 222::1/64
[RouterB-GigabitEthernet2/0/2] ipsec apply ipv6-policy use1
322
[RouterB-GigabitEthernet2/0/2] quit
-----------------------------
IPsec policy: map1
Sequence number: 10
Mode: ISAKMP
-----------------------------
Tunnel id: 0
Encapsulation mode: tunnel
Perfect Forward Secrecy:
Path MTU: 1423
Tunnel:
local address: 111::1
remote address: 222::1
Flow:
sour addr: 111::1/0 port: 0 protocol: ipv6
dest addr: 222::1/0 port: 0 protocol: ipv6
323
Configuring IPsec for RIPng
Network requirements
As shown in Figure 105, Router A, Router B, and Router C learn IPv6 routes through RIPng.
Establish an IPsec tunnel between the routers to protect the RIPng packets transmitted in between.
Specify the security protocol as ESP, the encryption algorithm as 128-bit AES, and the authentication
algorithm as HMAC-SHA1 for the IPsec tunnel.
Figure 105 Network diagram
Requirements analysis
To meet the network requirements, perform the following tasks:
1. Configure basic RIPng.
For more information about RIPng configuration, see Layer 3—IP Routing Configuration Guide.
2. Configure an IPsec profile.
{ The IPsec profiles on all the routers must have IPsec transform sets that use the same
security protocol, authentication and encryption algorithms, and encapsulation mode.
{ The SPI and key configured for the inbound SA and those for the outbound SA must be the
same on each router.
{ The SPI and key configured for the SAs on all the routers must be the same.
3. Apply the IPsec profile to a RIPng process or to an interface.
Configuration procedure
1. Configure Router A:
# Configure IPv6 addresses for interfaces. (Details not shown.)
# Configure basic RIPng.
<RouterA> system-view
[RouterA] ripng 1
[RouterA-ripng-1] quit
[RouterA] interface gigabitethernet 2/0/1
[RouterA-GigabitEthernet2/0/1] ripng 1 enable
[RouterA-GigabitEthernet2/0/1] quit
# Create and configure the IPsec transform set named tran1.
[RouterA] ipsec transform-set tran1
[RouterA-ipsec-transform-set-tran1] encapsulation-mode transport
[RouterA-ipsec-transform-set-tran1] protocol esp
[RouterA-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-128
[RouterA-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[RouterA-ipsec-transform-set-tran1] quit
# Create and configure the IPsec profile named profile001.
[RouterA] ipsec profile profile001 manual
[RouterA-ipsec-profile-profile001] transform-set tran1
[RouterA-ipsec-profile-profile001] sa spi outbound esp 123456
[RouterA-ipsec-profile-profile001] sa spi inbound esp 123456
324
[RouterA-ipsec-profile-profile001] sa string-key outbound esp simple abcdefg
[RouterA-ipsec-profile-profile001] sa string-key inbound esp simple abcdefg
[RouterA-ipsec-profile-profile001] quit
# Apply the IPsec profile to RIPng process 1.
[RouterA] ripng 1
[RouterA-ripng-1] enable ipsec-profile profile001
[RouterA-ripng-1] quit
2. Configure Router B:
# Configure IPv6 addresses for interfaces. (Details not shown.)
# Configure basic RIPng.
<RouterB> system-view
[RouterB] ripng 1
[RouterB-ripng-1] quit
[RouterB] interface gigabitethernet 2/0/1
[RouterB-GigabitEthernet2/0/1] ripng 1 enable
[RouterB-GigabitEthernet2/0/1] quit
[RouterB] interface gigabitethernet 2/0/2
[RouterB-GigabitEthernet2/0/2] ripng 1 enable
[RouterB-GigabitEthernet2/0/2] quit
# Create and configure the IPsec transform set named tran1.
[RouterB] ipsec transform-set tran1
[RouterB-ipsec-transform-set-tran1] encapsulation-mode transport
[RouterB-ipsec-transform-set-tran1] protocol esp
[RouterB-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-128
[RouterB-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[RouterB-ipsec-transform-set-tran1] quit
# Create and configure the IPsec profile named profile001.
[RouterB] ipsec profile profile001 manual
[RouterB-ipsec-profile-profile001] transform-set tran1
[RouterB-ipsec-profile-profile001] sa spi outbound esp 123456
[RouterB-ipsec-profile-profile001] sa spi inbound esp 123456
[RouterB-ipsec-profile-profile001] sa string-key outbound esp simple abcdefg
[RouterB-ipsec-profile-profile001] sa string-key inbound esp simple abcdefg
[RouterB-ipsec-profile-profile001] quit
# Apply the IPsec profile to RIPng process 1.
[RouterB] ripng 1
[RouterB-ripng-1] enable ipsec-profile profile001
[RouterB-ripng-1] quit
3. Configure Router C:
# Configure IPv6 addresses for interfaces. (Details not shown.)
# Configure basic RIPng.
<RouterC> system-view
[RouterC] ripng 1
[RouterC-ripng-1] quit
[RouterC] interface gigabitethernet 2/0/1
[RouterC-GigabitEthernet2/0/1] ripng 1 enable
[RouterC-GigabitEthernet2/0/1] quit
325
# Create and configure the IPsec transform set named tran1.
[RouterC] ipsec transform-set tran1
[RouterC-ipsec-transform-set-tran1] encapsulation-mode transport
[RouterC-ipsec-transform-set-tran1] protocol esp
[RouterC-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-128
[RouterC-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[RouterC-ipsec-transform-set-tran1] quit
# Create and configure the IPsec profile named profile001.
[RouterC] ipsec profile profile001 manual
[RouterC-ipsec-profile-profile001] transform-set tran1
[RouterC-ipsec-profile-profile001] sa spi outbound esp 123456
[RouterC-ipsec-profile-profile001] sa spi inbound esp 123456
[RouterC-ipsec-profile-profile001] sa string-key outbound esp simple abcdefg
[RouterC-ipsec-profile-profile001] sa string-key inbound esp simple abcdefg
[RouterC-ipsec-profile-profile001] quit
# Apply the IPsec profile to RIPng process 1.
[RouterC] ripng 1
[RouterC-ripng-1] enable ipsec-profile profile001
[RouterC-ripng-1] quit
# Use the display ipsec sa command to display the established IPsec SAs.
[RouterA] display ipsec sa
-------------------------------
Global IPsec SA
-------------------------------
-----------------------------
IPsec profile: profile001
Mode: Manual
-----------------------------
Encapsulation mode: transport
326
[Inbound ESP SA]
SPI: 123456 (0x3039)
Connection ID: 1
Transform set: ESP-ENCRYPT-AES-CBC-128 ESP-AUTH-SHA1
No duration limit for this SA
[Outbound ESP SA]
SPI: 123456 (0x3039)
Connection ID: 2
Transform set: ESP-ENCRYPT-AES-CBC-128 ESP-AUTH-SHA1
No duration limit for this SA
Router D
Configuration procedure
1. Assign IPv4 addresses to the interfaces on the routers according to Figure 106. (Details not
shown.)
2. Configure Router A:
# Create an IPsec transform set named tran1, and specify ESP as the security protocol, DES
as the encryption algorithm, and HMAC-SHA-1-96 as the authentication algorithm.
<RouterA> system-view
[RouterA] ipsec transform-set tran1
[RouterA-ipsec-transform-set-tran1] encapsulation-mode tunnel
327
[RouterA-ipsec-transform-set-tran1] protocol esp
[RouterA-ipsec-transform-set-tran1] esp encryption-algorithm des
[RouterA-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[RouterA-ipsec-transform-set-tran1] quit
# Create an IPsec policy template named temp1, referencing the transform set tran1.
[RouterA] ipsec policy-template temp1 1
[RouterA-ipsec-policy-template-temp1-1] transform-set tran1
# Enable IPsec RRI, set the preference to 100 and the tag to 1000 for the static routes created
by IPsec RRI.
[RouterA-ipsec-policy-template-temp1-1] reverse-route dynamic
[RouterA-ipsec-policy-template-temp1-1] reverse-route preference 100
[RouterA-ipsec-policy-template-temp1-1] reverse-route tag 1000
[RouterA-ipsec-policy-template-temp1-1] quit
# Create an IKE-based IPsec policy entry with the name map1 and the sequence number 10 by
referencing IPsec policy template temp1.
[RouterA] ipsec policy map1 10 isakmp template temp1
# Create an IKE proposal named 1, and specify 3DES as the encryption algorithm,
HMAC-SHA1 as the authentication algorithm, and pre-share as the authentication method.
[RouterA] ike proposal 1
[RouterA-ike-proposal-1] encryption-algorithm 3des-cbc
[RouterA-ike-proposal-1] authentication-algorithm sha
[RouterA-ike-proposal-1] authentication-method pre-share
[RouterA-ike-proposal-1] quit
# Create an IKE keychain named key1 and specify the plaintext 123 as the pre-shared key to
be used with the remote peer at 2.2.2.2.
[RouterA] ike keychain key1
[RouterA-ike-keychain-key1] pre-shared-key address 2.2.2.2 key simple 123
[RouterA-ike-keychain-key1] quit
# Apply the IPsec policy map1 to interface GigabitEthernet 2/0/1.
[RouterA] interface gigabitethernet 2/0/1
[RouterA-GigabitEthernet2/0/1] ipsec apply policy map1
[RouterA-GigabitEthernet2/0/1] quit
3. Configure Router B:
# Create an IPsec transform set named tran1, and specify ESP as the security protocol, DES
as the encryption algorithm, and HMAC-SHA-1-96 as the authentication algorithm.
[RouterB] ipsec transform-set tran1
[RouterB-ipsec-transform-set-tran1] encapsulation-mode tunnel
[RouterB-ipsec-transform-set-tran1] protocol esp
[RouterB-ipsec-transform-set-tran1] esp encryption-algorithm des
[RouterB-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[RouterB-ipsec-transform-set-tran1] quit
# Configure ACL 3000 to identify traffic from subnet 5.5.5.0/24 to subnet 4.4.4.0/24.
[RouterB] acl advanced 3000
[RouterB-acl-ipv4-adv-3000] rule permit ip source 5.5.5.0 0.0.0.255 destination
4.4.4.0 0.0.0.255
[RouterB-acl-ipv4-adv-3000] quit
# Create an IKE-based IPsec policy entry with the name map1 and the sequence number 10.
Specify the transform set tran1 and ACL 3000, and specify the remote IP address for the tunnel
as 1.1.1.1.
328
[RouterB] ipsec policy map1 10 isakmp
[RouterB-ipsec-policy-isakmp-map1-10] transform-set tran1
[RouterB-ipsec-policy-isakmp-map1-10] security acl 3000
[RouterB-ipsec-policy-isakmp-map1-10] remote-address 1.1.1.1
[RouterB-ipsec-policy-isakmp-map1-10] quit
# Create an IKE proposal named 1, and specify 3DES as the encryption algorithm,
HMAC-SHA1 as the authentication algorithm, and pre-share as the authentication method.
[RouterB] ike proposal 1
[RouterB-ike-proposal-1] encryption-algorithm 3des-cbc
[RouterB-ike-proposal-1] authentication-algorithm sha
[RouterB-ike-proposal-1] authentication-method pre-share
[RouterB-ike-proposal-1] quit
# Create an IKE keychain named key1 and specify the plaintext 123 as the pre-shared key to
be used with the remote peer at 1.1.1.1.
[RouterB] ike keychain key1
[RouterB-ike-keychain-key1] pre-shared-key address 1.1.1.1 key simple 123
[RouterB-ike-keychain-key1] quit
# Apply the IPsec policy map1 to interface GigabitEthernet 2/0/1.
[RouterB] interface gigabitethernet 2/0/1
[RouterB-GigabitEthernet2/0/1] ipsec apply policy map1
[RouterB-GigabitEthernet2/0/1] quit
Make sure Router B has a route to the peer private network, with the outgoing interface as
GigabitEthernet 2/0/1.
4. Configure Router C and Router D in the same way Router B is configured.
Verifying the configuration
1. Verify that IPsec RRI can automatically create a static route from Router A to Router B:
# Initiate a connection from subnet 5.5.5.0/24 to subnet 4.4.4.0/24. IKE negotiation is triggered
to establish IPsec SAs between Router A and Router B. (Details not shown.)
# Verify that IPsec SAs are established on Router A.
[RouterA] display ipsec sa
-------------------------------
Interface: GigabitEthernet2/0/1
-------------------------------
-----------------------------
IPsec policy: map1
Sequence number: 10
Mode: Template
-----------------------------
Tunnel id: 0
Encapsulation mode: tunnel
Perfect forward secrecy:
Path MTU: 1463
Tunnel:
local address: 1.1.1.1
remote address: 2.2.2.2
Flow:
sour addr: 4.4.4.0/255.255.255.0 port: 0 protocol: ip
329
dest addr: 5.5.5.0/255.255.255.0 port: 0 protocol: ip
330
Configuring IKE
Unless otherwise specified, the term "IKE" in this chapter refers to IKEv1.
Overview
Built on a framework defined by ISAKMP, Internet Key Exchange (IKE) provides automatic key
negotiation and SA establishment services for IPsec.
IKE provides the following benefits for IPsec:
• Automatically negotiates IPsec parameters.
• Performs DH exchanges to calculate shared keys, making sure each SA has a key that is
independent of other keys.
• Automatically negotiates SAs when the sequence number in the AH or ESP header overflows,
making sure IPsec can provide the anti-replay service by using the sequence number.
As shown in Figure 107, IKE negotiates SAs for IPsec and transfers the SAs to IPsec, and IPsec
uses the SAs to protect IP packets.
Figure 107 Relationship between IKE and IPsec
331
Figure 108 IKE exchange process in main mode
As shown in Figure 108, the main mode of IKE negotiation in phase 1 involves three pairs of
messages:
• SA exchange—Used for negotiating the IKE security policy.
• Key exchange—Used for exchanging the DH public value and other values, such as the
random number. The two peers use the exchanged data to generate key data and use the
encryption key and authentication key to ensure the security of IP packets.
• ID and authentication data exchange—Used for identity authentication.
The main difference between the main mode and the aggressive mode is that the aggressive mode
does not provide identity information protection and exchanges only three messages, rather than
three pairs. The main mode provides identity information protection but is slower.
332
DH algorithm
The DH algorithm is a public key algorithm. With this algorithm, two peers can exchange keying
material and then use the material to calculate the shared keys. Due to the decryption complexity, a
third party cannot decrypt the keys even after intercepting all keying materials.
PFS
The Perfect Forward Secrecy (PFS) feature is a security feature based on the DH algorithm. After
PFS is enabled, an additional DH exchange is performed in IKE phase 2 to make sure IPsec keys
have no derivative relations with IKE keys and a broken key brings no threats to other keys.
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for
features, commands, and parameters might differ in FIPS mode (see "Configuring FIPS") and
non-FIPS mode.
333
Tasks at a glance Remarks
(Optional.) Configuring the IKE keepalive function N/A
(Optional.) Configuring the IKE NAT keepalive function N/A
(Optional.) Configuring IKE DPD N/A
(Optional.) Enabling invalid SPI recovery N/A
(Optional.) Setting the maximum number of IKE SAs N/A
(Optional.) Configuring SNMP notifications for IKE N/A
334
To configure an IKE profile:
335
Step Command Remarks
9. (Optional.) Specify the local match local address { interface-type
interface or IP address to By default, an IKE profile can
interface-number | { ipv4-address |
which the IKE profile can be be applied to any local
ipv6 ipv6-address } [ vpn-instance
applied. interface or IP address.
vpn-name ] }
By default, no inside VPN
instance is specified for an IKE
10. (Optional.) Specify an inside profile, and the device
VPN instance. inside-vpn vpn-instance vpn-name forwards protected data to the
VPN instance where the
interface receiving the data
resides.
11. (Optional.) Specify a priority By default, the priority of an
for the IKE profile. priority number
IKE profile is 100.
336
Step Command Remarks
• In non-FIPS mode:
encryption-algorithm By default:
{ 3des-cbc | aes-cbc-128 | • In non-FIPS mode, an IKE
aes-cbc-192 | aes-cbc-256 | proposal uses the 56-bit
3. Specify an encryption des-cbc | sm1-cbc-128 | DES encryption algorithm
algorithm for the IKE sm1-cbc-192 | sm1-cbc-256 | in CBC mode.
proposal. sm4-cbc }
• In FIPS mode, an IKE
• In FIPS mode: proposal uses the 128-bit
encryption-algorithm AES encryption algorithm
{ aes-cbc-128 | aes-cbc-192 | in CBC mode.
aes-cbc-256 }
4. Specify an authentication authentication-method By default, an IKE proposal uses
method for the IKE { dsa-signature | pre-share | the pre-shared key
proposal. rsa-signature } authentication method.
• In non-FIPS mode:
5. Specify an authentication authentication-algorithm By default, an IKE proposal uses
algorithm for the IKE { md5 | sha | sm3 } the HMAC-SHA1 authentication
proposal. • In FIPS mode: algorithm.
authentication-algorithm sha
By default:
• In non-FIPS mode: • In non-FIPS mode, DH
dh { group1 | group14 | group2 group1 (the 768-bit DH
6. Specify a DH group for key | group24 | group5 }
negotiation in phase 1. group) is used.
• In FIPS mode: • In FIPS mode, DH group14
dh group14 (the 2048-bit DH group) is
used.
7. Set the IKE SA lifetime for By default, the IKE SA lifetime is
the IKE proposal. sa duration seconds
86400 seconds.
337
Step Command Remarks
2. Create an IKE keychain ike keychain keychain-name By default, no IKE keychain
and enter its view. [ vpn-instance vpn-name ] exists.
By default, no pre-shared key is
pre-shared-key { address configured.
3. Configure a pre-shared { ipv4-address [ mask | mask-length ] | For security purposes, all
key. ipv6 ipv6-address [ prefix-length ] } | pre-shared keys, including those
hostname host-name } key { cipher configured in plain text, are
cipher-key | simple simple-key } saved in cipher text to the
configuration file.
4. (Optional.) Specify a local match local address { interface-type
interface or IP address to By default, an IKE keychain can
interface-number | { ipv4-address |
which the IKE keychain can be applied to any local interface
ipv6 ipv6-address } [ vpn-instance
be applied. or IP address.
vpn-name ] }
5. (Optional.) Specify a
priority for the IKE priority number The default priority is 100.
keychain.
338
Configuring the IKE keepalive function
IKE sends keepalive packets to query the liveness of the peer. If the peer is configured with the
keepalive timeout time, you must configure the keepalive interval on the local device. If the peer
receives no keepalive packets during the timeout time, the IKE SA is deleted along with the IPsec
SAs it negotiated.
Follow these guidelines when you configure the IKE keepalive function:
• Configure IKE DPD instead of the IKE keepalive function unless IKE DPD is not supported on
the peer. The IKE keepalive function sends keepalives at regular intervals, which consumes
network bandwidth and resources.
• The keepalive timeout time configured on the local device must be longer than the keepalive
interval configured at the peer. Since it seldom occurs that more than three consecutive packets
are lost on a network, you can set the keepalive timeout three times as long as the keepalive
interval.
To configure the IKE keepalive function:
339
1. The local device sends a DPD message to the peer, and waits for a response from the peer.
2. If the peer does not respond within the retry interval specified by the retry seconds parameter,
the local device resends the message.
3. If still no response is received within the retry interval, the local end sends the DPD message
again. The system allows a maximum of two retries.
4. If the local device receives no response after two retries, the device considers the peer to be
dead, and deletes the IKE SA along with the IPsec SAs it negotiated.
5. If the local device receives a response from the peer during the detection process, the peer is
considered alive. The local device performs a DPD detection again when the triggering interval
is reached or it has traffic to send, depending on the DPD mode.
Follow these guidelines when you configure the IKE DPD function:
• When DPD settings are configured in both IKE profile view and system view, the DPD settings
in IKE profile view apply. If DPD is not configured in IKE profile view, the DPD settings in system
view apply.
• It is a good practice to set the triggering interval longer than the retry interval so that a DPD
detection is not triggered during a DPD retry.
To configure IKE DPD:
2. Enable invalid SPI recovery. ike invalid-spi-recovery By default, the invalid SPI recovery
enable is disabled.
340
Setting the maximum number of IKE SAs
You can set the maximum number of half-open IKE SAs and the maximum number of established
IKE SAs.
• The supported maximum number of half-open IKE SAs depends on the device's processing
capability. Adjust the maximum number of half-open IKE SAs to make full use of the device's
processing capability without affecting the IKE SA negotiation efficiency.
• The supported maximum number of established IKE SAs depends on the device's memory
space. Adjust the maximum number of established IKE SAs to make full use of the device's
memory space without affecting other applications in the system.
To set the limit on the number of IKE SAs:
341
Displaying and maintaining IKE
Execute display commands in any view and reset commands in user view.
Task Command
Display configuration information about all IKE
display ike proposal
proposals.
display ike sa [ verbose [ connection-id
Display information about the current IKE SAs. connection-id | remote-address [ ipv6 ]
remote-address [ vpn-instance vpn-name ] ] ]
Delete IKE SAs. reset ike sa [ connection-id connection-id ]
Clear IKE MIB statistics. reset ike statistics
Host A Host B
10.1.1.2/24 10.1.2.2/24
Configuration procedure
1. Configure Device A:
# Assign an IP address to each interface. (Details not shown.)
# Configure ACL 3101 to identify traffic from subnet 10.1.1.0/24 to subnet 10.1.2.0/24.
<DeviceA> system-view
[DeviceA] acl advanced 3101
[DeviceA-acl-ipv4-adv-3101] rule permit ip source 10.1.1.0 0.0.0.255 destination
10.1.2.0 0.0.0.255
[DeviceA-acl-ipv4-adv-3101] quit
342
# Create an IPsec transform set named tran1.
[DeviceA] ipsec transform-set tran1
# Set the packet encapsulation mode to tunnel.
[DeviceA-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Use the ESP protocol for the IPsec transform set.
[DeviceA-ipsec-transform-set-tran1] protocol esp
# Specify the encryption and authentication algorithms.
[DeviceA-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-128
[DeviceA-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[DeviceA-ipsec-transform-set-tran1] quit
# Create an IKE keychain named keychain1.
[DeviceA] ike keychain keychain1
# Specify plaintext 123456TESTplat&! as the pre-shared key to be used with the remote peer
at 2.2.2.2.
[DeviceA-ike-keychain-keychain1] pre-shared-key address 2.2.2.2 255.255.255.0 key
simple 123456TESTplat&!
[DeviceA-ike-keychain-keychain1] quit
# Create an IKE profile named profile1.
[DeviceA] ike profile profile1
# Specify IKE keychain keychain1.
[DeviceA-ike-profile-profile1] keychain keychain1
# Configure the local ID with the identity type as IP address and the value as 1.1.1.1.
[DeviceA-ike-profile-profile1] local-identity address 1.1.1.1
# Configure a peer ID with the identity type as IP address and the value as 2.2.2.2/24.
[DeviceA-ike-profile-profile1] match remote identity address 2.2.2.2 255.255.255.0
[DeviceA-ike-profile-profile1] quit
# Create an IKE-based IPsec policy entry with the name map1 and the sequence number 10.
[DeviceA] ipsec policy map1 10 isakmp
# Specify the remote IP address 2.2.2.2 for the IPsec tunnel.
[DeviceA-ipsec-policy-isakmp-map1-10] remote-address 2.2.2.2
# Specify ACL 3101 to identify the traffic to be protected.
[DeviceA-ipsec-policy-isakmp-map1-10] security acl 3101
# Specify IPsec transform set tran1 for the IPsec policy.
[DeviceA-ipsec-policy-isakmp-map1-10] transform-set tran1
# Specify IKE profile profile1 for the IPsec policy.
[DeviceA-ipsec-policy-isakmp-map1-10] ike-profile profile1
[DeviceA-ipsec-policy-isakmp-map1-10] quit
# Apply IPsec policy map1 to interface GigabitEthernet 2/0/1.
[DeviceA-GigabitEthernet2/0/1] ipsec apply policy map1
[DeviceA-GigabitEthernet2/0/1] quit
# Configure a static route to subnet 10.1.2.0/24.
[DeviceA] ip route-static 10.1.2.0 255.255.255.0 2.2.2.2
2. Configure Device B:
# Assign IP addresses to each interface. (Details not shown.)
# Configure ACL 3101 to identify traffic from subnet 10.1.2.0/24 to subnet 10.1.1.0/24.
<DeviceB> system-view
[DeviceB] acl advanced 3101
343
[DeviceB-acl-ipv4-adv-3101] rule permit ip source 10.1.2.0 0.0.0.255 destination
10.1.1.0 0.0.0.255
[DeviceB-acl-ipv4-adv-3101] quit
# Create an IPsec transform set named tran1.
[DeviceB] ipsec transform-set tran1
# Set the packet encapsulation mode to tunnel.
[DeviceB-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Use the ESP protocol for the IPsec transform set.
[DeviceB-ipsec-transform-set-tran1] protocol esp
# Specify the encryption and authentication algorithms.
[DeviceB-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-128
[DeviceB-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[DeviceB-ipsec-transform-set-tran1] quit
# Create and IKE keychain named keychain1.
[DeviceB]ike keychain keychain1
# Specify plaintext 123456TESTplat&! as the pre-shared key to be used with the remote peer
at 1.1.1.1.
[DeviceB-ike-keychain-keychain1] pre-shared-key address 1.1.1.1 255.255.255.0 key
simple 123456TESTplat&!
[DeviceB-ike-keychain-keychain1] quit
# Create an IKE profile named profile1.
[DeviceB] ike profile profile1
# Specify IKE keychain keychain1
[DeviceB-ike-profile-profile1] keychain keychain1
# Configure the local ID with the identity type as IP address and the value as 2.2.2.2.
[DeviceB-ike-profile-profile1] local-identity address 2.2.2.2
# Configure a peer ID with the identity type as IP address and the value as 1.1.1.1/24.
[DeviceB-ike-profile-profile1] match remote identity address 1.1.1.1 255.255.255.0
[DeviceB-ike-profile-profile1] quit
# Create an IKE-based IPsec policy entry with the name use1 and the sequence number 10.
[DeviceB] ipsec policy use1 10 isakmp
# Specify the remote IP address 1.1.1.1 for the IPsec tunnel.
[DeviceB-ipsec-policy-isakmp-use1-10] remote-address 1.1.1.1
# Specify ACL 3101 to identify the traffic to be protected.
[DeviceB-ipsec-policy-isakmp-use1-10] security acl 3101
# Specify IPsec transform set tran1 for the IPsec policy.
[DeviceB-ipsec-policy-isakmp-use1-10] transform-set tran1
# Specify IKE profile profile1 for the IPsec policy.
[DeviceB-ipsec-policy-isakmp-use1-10] ike-profile profile1
[DeviceB-ipsec-policy-isakmp-use1-10] quit
# Apply IPsec policy use1 to interface GigabitEthernet 2/0/1.
[DeviceB-GigabitEthernet2/0/1] ipsec apply policy use1
[DeviceB-GigabitEthernet2/0/1] quit
# Configure a static route to the subnet where Host A resides.
[DeviceB] ip route-static 10.1.1.0 255.255.255.0 1.1.1.1
344
Verifying the configuration
# Initiate a connection from subnet 10.1.1.0/24 to subnet 10.1.2.0/24 to trigger IKE negotiation. After
IPsec SAs are successfully negotiated by IKE, traffic between the two subnets is IPsec protected.
# Display the IKE proposal configuration on Device A and Device B. Because no IKE proposal is
configured, the command displays the default IKE proposal.
[DeviceA] display ike proposal
Priority Authentication Authentication Encryption Diffie-Hellman Duration
method algorithm algorithm group (seconds)
----------------------------------------------------------------------------
default PRE-SHARED-KEY SHA1 AES-CBC-128 Group 1 86400
-----------------------------
IPsec policy: map1
Sequence number: 10
Mode: ISAKMP
-----------------------------
Tunnel id: 0
Encapsulation mode: tunnel
Perfect forward secrecy:
Path MTU: 1456
Tunnel:
local address: 1.1.1.1
remote address: 2.2.2.2
Flow:
sour addr: 10.1.1.0/255.255.255.0 port: 0 protocol: ip
dest addr: 10.1.2.0/255.255.255.0 port: 0 protocol: ip
345
Transform set: ESP-ENCRYPT-AES-CBC-128 ESP-AUTH-SHA1
SA duration (kilobytes/sec): 1843200/3600
SA remaining duration (kilobytes/sec): 1843200/3484
Max received sequence-number:
Anti-replay check enable: Y
Anti-replay window size: 64
UDP encapsulation used for NAT traversal: N
Status: Active
346
Configuration procedure
1. Configure Device A:
# Assign an IP address to each interface. (Details not shown.)
# Configure ACL 3101 to identify traffic from subnet 10.1.1.0/24 to subnet 10.1.2.0/24.
<DeviceA> system-view
[DeviceA] acl advanced 3101
[DeviceA-acl-ipv4-adv-3101] rule permit ip source 10.1.1.0 0.0.0.255 destination
10.1.2.0 0.0.0.255
[DeviceA-acl-ipv4-adv-3101] quit
# Create an IPsec transform set named tran1.
[DeviceA] ipsec transform-set tran1
# Set the packet encapsulation mode to tunnel.
[DeviceA-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Use the ESP protocol for the IPsec transform set.
[DeviceA-ipsec-transform-set-tran1] protocol esp
# Specify the encryption and authentication algorithms.
[DeviceA-ipsec-transform-set-tran1] esp encryption-algorithm des-cbc
[DeviceA-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[DeviceA-ipsec-transform-set-tran1] quit
# Create a PKI entity named entity1.
[DeviceA] pki entity entity1
# Set the common name as routera for the PKI entity.
[DeviceA-pki-entity-entity1] common-name routera
[DeviceA-pki-entity-entity1] quit
# Create a PKI domain named domain1.
[DeviceA] pki domain domain1
# Set the certificate request mode to auto and set the password to 123 for certificate revocation.
[DeviceA-pki-domain-domain1] certificate request mode auto password simple 123
# Set an MD5 fingerprint for verifying the validity of the CA root certificate.
[DeviceA-pki-domain-domain1] root-certificate fingerprint md5
50c7a2d282ea710a449eede6c56b102e
# Specify the trusted CA 8088.
[DeviceA-pki-domain-domain1] ca identifier 8088
# Specify the URL of the registration server for certificate request through the SCEP protocol.
This example uses the URL of
http://192.168.222.1:446/eadbf9af4f2c4641e685f7a6021e7b298373feb7.
[DeviceA-pki-domain-domain1] certificate request url
http://192.168.222.1:446/eadbf9af4f2c4641e685f7a6021e7b298373feb7
# Specify the CA to accept certificate requests.
[DeviceA-pki-domain-domain1] certificate request from ca
# Specify the PKI entity for certificate request as entity1.
[DeviceA-pki-domain-domain1] certificate request entity entity1
# Specify the RSA key pair rsa1 with the general purpose for certificate request.
[DeviceA-pki-domain-domain1] public-key rsa general name rsa1
[DeviceA-pki-domain-domain1] quit
# Create an IKE profile named profile1.
[DeviceA] ike profile profile1
347
# Specify PKI domain domain1 for the IKE profile.
[DeviceA-ike-profile-profile1] certificate domain domain1
# Specify that IKE negotiation operates in aggressive mode.
[DeviceA-ike-profile-profile1] exchange-mode aggressive
# Set the local identity to the FQDN name www.routera.com.
[DeviceA-ike-profile-profile1] local-identity fqdn www.routera.com
# Configure a peer ID with the identity type of FQDN name and the value of www.routerb.com.
[DeviceA-ike-profile-profile1] match remote identity fqdn www.routerb.com
[DeviceA-ike-profile-profile1] quit
# Create an IKE proposal named 10.
[DeviceA] ike proposal 10
# Specify the authentication algorithm as HMAC-MD5.
[DeviceA-ike-proposal-10] authentication-algorithm md5
# Specify the RSA authentication method.
[DeviceA-ike-proposal-10] authentication-method rsa-signature
[DeviceA-ike-proposal-10] quit
# Create an IKE-based IPsec policy entry with the name map1 and the sequence number 10.
[DeviceA] ipsec policy map1 10 isakmp
# Specify the remote IP address 2.2.2.2 for the IPsec tunnel.
[DeviceA-ipsec-policy-isakmp-map1-10] remote-address 2.2.2.2
# Specify IPsec transform set tran1 for the IPsec policy.
[DeviceA-ipsec-policy-isakmp-map1-10] transform-set tran1
# Specify ACL 3101 to identify the traffic to be protected.
[DeviceA-ipsec-policy-isakmp-map1-10] security acl 3101
# Specify IKE profile profile1 for the IPsec policy.
[DeviceA-ipsec-policy-isakmp-map1-10] ike-profile profile1
[DeviceA-ipsec-policy-isakmp-map1-10] quit
# Apply the IPsec policy map1 to interface GigabitEthernet 2/0/1.
[DeviceA-GigabitEthernet2/0/1] ipsec apply policy map1
[DeviceA-GigabitEthernet2/0/1] quit
# Configure a static route to the subnet where Host B resides.
[DeviceA] ip route-static 10.1.2.0 255.255.255.0 2.2.2.2
2. Configure Device B:
# Assign an IP address to each interface. (Details not shown.)
# Create an IPsec transform set named tran1.
<DeviceB> system-view
[DeviceB] ipsec transform-set tran1
# Set the packet encapsulation mode to tunnel.
[DeviceB-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Use the ESP protocol for the IPsec transform set.
[DeviceB-ipsec-transform-set-tran1] protocol esp
# Specify the encryption and authentication algorithms.
[DeviceB-ipsec-transform-set-tran1] esp encryption-algorithm des-cbc
[DeviceB-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[DeviceB-ipsec-transform-set-tran1] quit
# Create a PKI entity named entity2.
348
[DeviceB] pki entity entity2
# Set the common name as routerb for the PKI entity.
[DeviceB-pki-entity-entity2] common-name routerb
[DeviceA-pki-entity-entity1] quit
# Create a PKI domain named domain2.
[DeviceB] pki domain domain2
# Set the certificate request mode to auto and set the password to 123 for certificate revocation.
[DeviceB-pki-domain-domain2] certificate request mode auto password simple 123
# Set an MD5 fingerprint for verifying the validity of the CA root certificate.
[DeviceB-pki-domain-domain2] root-certificate fingerprint md5
50c7a2d282ea710a449eede6c56b102e
# Specify the trusted CA 8088.
[DeviceB-pki-domain-domain2] ca identifier 8088
# Specify the URL of the registration server for certificate request through the SCEP protocol.
This example uses the URL of
http://192.168.222.1:446/eadbf9af4f2c4641e685f7a6021e7b298373feb7.
[DeviceB-pki-domain-domain2] certificate request url
http://192.168.222.1:446/eadbf9af4f2c4641e685f7a6021e7b298373feb7
# Specify the CA to accept certificate requests.
[DeviceB-pki-domain-domain2] certificate request from ca
# Specify the PKI entity for certificate request as entity2.
[DeviceB-pki-domain-domain2] certificate request entity entity2
# Specify the RSA key pair rsa1 with the general purpose for certificate request.
[DeviceB-pki-domain-domain2] public-key rsa general name rsa1
[DeviceB-pki-domain-domain2] quit
# Create an IKE profile named profile2.
[DeviceB] ike profile profile2
# Set the local identity to the FQDN name www.routerb.com.
[DeviceB-ike-profile-profile2] local-identity identity fqdn www.routerb.com
# Configure a peer ID with the identity type of FQDN name and the value of www.routera.com.
[DeviceB-ike-profile-profile2] match remote identity fqdn www.routera.com
[DeviceB-ike-profile-profile2] quit
# Create an IKE proposal named 10.
[DeviceB] ike proposal 10
# Specify the authentication algorithm as HMAC-MD5.
[DeviceB-ike-proposal-10] authentication-algorithm md5
# Specify the RSA authentication method.
[DeviceB-ike-proposal-10] authentication-method rsa-signature
[DeviceB-ike-proposal-10] quit
# Create an IPsec policy template with the name template1 and the sequence number 1.
[DeviceB] ipsec policy-template template1 1
# Specify IPsec transform set tran1 for the IPsec policy template.
[DeviceB-ipsec-policy-template-template1-1] transform-set tran1
[DeviceB-ipsec-policy-template-template1-1] quit
# Create an IKE-based IPsec policy entry with the name use1 and the sequence number 1 by
referencing the IPsec policy template template1.
[DeviceB] ipsec policy use1 1 isakmp template template1
349
# Apply IPsec policy use1 to interface GigabitEthernet 2/0/1.
[DeviceB-GigabitEthernet2/0/1] ipsec apply policy use1
[DeviceB-GigabitEthernet2/0/1] quit
# Configure a static route to the subnet where Host A resides.
[DeviceB] ip route-static 10.1.1.0 255.255.255.0 1.1.1.1
350
00:69:1c:4c:34:a4:5e:bb:30:97:45:2b:5e:52:43:
c0:49:1f:e1:d8:0f:5c:48:c2:39:69:d1:84:e4:14:
70:3d:98:41:28:1c:20:a1:9a:3f:91:67:78:77:27:
d9:08:5f:7a:c4:36:45:8b:f9:7b:e7:7d:6a:98:bb:
4e:a1:cb:2c:3d:92:66:bd:fb:80:35:16:c6:35:f0:
ff:0b:b9:3c:f3:09:94:b7:d3:6f:50:8d:83:f1:66:
2f:91:0b:77:a5:98:22:b4:77:ac:84:1d:03:8e:33:
1b:31:03:78:4f:77:a0:db:af
Exponent: 65537 (0x10001)
Signature Algorithm: sha1WithRSAEncryption
9a:6d:8c:46:d3:18:8a:00:ce:12:ee:2b:b0:aa:39:5d:3f:90:
08:49:b9:a9:8f:0d:6e:7b:e1:00:fb:41:f5:d4:0c:e4:56:d8:
7a:a7:61:1d:2b:b6:72:e3:09:0b:13:9d:fa:c8:fc:c4:65:a7:
f9:45:21:05:75:2c:bf:36:7b:48:b4:4a:b9:fe:87:b9:d8:cf:
55:16:87:ec:07:1d:55:5a:89:74:73:68:5e:f9:1d:30:55:d9:
8a:8f:c5:d4:20:7e:41:a9:37:57:ed:8e:83:a7:80:2f:b8:31:
57:3a:f2:1a:28:32:ea:ea:c5:9a:55:61:6a:bc:e5:6b:59:0d:
82:16
351
Full Name:
URI:http://xx.rsa.com:447/8088.crl
-----------------------------
IPsec policy: map1
Sequence number: 10
Mode: ISAKMP
-----------------------------
Tunnel id: 0
Encapsulation mode: tunnel
Perfect forward secrecy:
Path MTU: 1456
Tunnel:
local address: 1.1.1.1
remote address: 2.2.2.2
Flow:
sour addr: 10.1.1.0/255.255.255.0 port: 0 protocol: ip
dest addr: 10.1.2.0/255.255.255.0 port: 0 protocol: ip
352
Connection ID: 2
Transform set: ESP-ENCRYPT-AES-CBC-128 ESP-AUTH-SHA1
SA duration (kilobytes/sec): 1843200/3600
SA remaining duration (kilobytes/sec): 1843200/3484
Max received sequence-number:
UDP encapsulation used for NAT traversal: N
Status: Active
# Display the information about the CA certificate, local certificate, IKE SA, and IPsec SA on Device
B.
[DeviceB] display ike sa
[DeviceB] display pki certificate domain domain2 ca
[DeviceB] display pki certificate domain domain2 local
[DeviceB] display ipsec sa
Host A Host B
10.1.1.2/24 10.1.2.2/24
Configuration procedure
1. Configure Device A:
# Assign an IP address to each interface. (Details not shown.)
# Configure ACL 3000 to identify traffic from subnet 10.1.1.0/24 to subnet 10.1.2.0/24.
<DeviceA> system-view
[DeviceA] acl advanced 3000
[DeviceA-acl-ipv4-adv-3000] rule 0 permit ip source 10.1.1.0 0.0.0.255 destination
10.1.2.0 0.0.0.255
[DeviceA-acl-ipv4-adv-3000] quit
# Create an IPsec transform set named transform1.
[DeviceA] ipsec transform-set transform1
# Use the ESP protocol for the IPsec transform set.
353
[DeviceA-ipsec-transform-set-transform1] protocol esp
# Specify the encryption and authentication algorithms.
[DeviceA-ipsec-transform-set-transform1] esp encryption-algorithm 3des-cbc
[DeviceA-ipsec-transform-set-transform1] esp authentication-algorithm md5
[DeviceA-ipsec-transform-set-transform1] quit
# Create an IKE keychain named keychain1.
[DeviceA] ike keychain keychain1
# Specify plaintext 12345zxcvb!@#$%ZXCVB as the pre-shared key to be used with the
remote peer at 2.2.2.2.
[DeviceA-ike-keychain-keychain1] pre-shared-key address 2.2.2.2 255.255.255.0 key
simple 12345zxcvb!@#$%ZXCVB
[DeviceA-ike-keychain-keychain1] quit
# Create an IKE profile named profile1.
[DeviceA] ike profile profile1
# Specify IKE keychain keychain1.
[DeviceA-ike-profile-profile1] keychain keychain1
# Specify that IKE negotiation operates in aggressive mode.
[DeviceA-ike-profile-profile1] exchange-mode aggressive
# Set the local identity to the FQDN name www.devicea.com.
[DeviceA-ike-profile-profile1] local-identity fqdn www.devicea.com
# Configure a peer ID with the identity type as IP address and the value as 2.2.2.2/24.
[DeviceA-ike-profile-profile1] match remote identity address 2.2.2.2 255.255.255.0
[DeviceA-ike-profile-profile1] quit
# Create an IKE-based IPsec policy entry with the name policy1 and the sequence number 1.
[DeviceA] ipsec policy policy1 1 isakmp
# Specify the remote IP address 2.2.2.2 for the IPsec tunnel.
[DeviceA-ipsec-policy-isakmp-policy1-1] remote-address 2.2.2.2
# Specify IPsec transform set transform1 for the IPsec policy.
[DeviceA-ipsec-policy-isakmp-policy1-1] transform-set transform1
# Specify ACL 3000 to identify the traffic to be protected.
[DeviceA-ipsec-policy-isakmp-policy1-1] security acl 3000
# Specify IKE profile profile1 for the IPsec policy.
[DeviceA-ipsec-policy-isakmp-policy1-1] ike-profile profile1
[DeviceA-ipsec-policy-isakmp-policy1-1] quit
# Apply IPsec policy policy1 to interface GigabitEthernet 2/0/1.
[DeviceA-GigabitEthernet2/0/1] ipsec apply policy policy1
[DeviceA-GigabitEthernet2/0/1] quit
# Configure a static route to the subnet where Host B resides.
[DeviceA] ip route-static 10.1.2.0 255.255.255.0 1.1.1.2
2. Configure Device B:
# Assign an IP address to each interface. (Details not shown.)
# Create IPsec transform set transform1.
<DeviceB> system-view
[DeviceB] ipsec transform-set transform1
# Use the ESP protocol for the IPsec transform set.
[DeviceB-ipsec-transform-set-transform1] protocol esp
# Specify the encryption and authentication algorithms.
354
[DeviceB-ipsec-transform-set-transform1] esp encryption-algorithm 3des-cbc
[DeviceB-ipsec-transform-set-transform1] esp authentication-algorithm md5
[DeviceB-ipsec-transform-set-transform1] quit
# Create IKE keychain keychain1.
[DeviceB]ike keychain keychain1
# Specify plaintext 12345zxcvb!@#$%ZXCVB as the pre-shared key to be used with the
remote peer at 1.1.1.1. The source address of packets from 1.1.1.1 is translated into 3.3.3.1 by
the NAT device, so specify the IP address of the remote peer as 3.3.3.1.
[DeviceB-ike-keychain-keychain1] pre-shared-key address 3.3.3.1 255.255.255.0 key
simple 12345zxcvb!@#$%ZXCVB
[DeviceB-ike-keychain-keychain1] quit
# Create an IKE profile named profile1.
[DeviceB] ike profile profile1
# Specify IKE keychain keychain1.
[DeviceB-ike-profile-profile1] keychain keychain1
# Specify that IKE negotiation operates in aggressive mode.
[DeviceB-ike-profile-profile1] exchange-mode aggressive
# Configure a peer ID with the identity type of FQDN name and the value of www.devicea.com.
[DeviceB-ike-profile-profile1] match remote identity fqdn www.devicea.com
[DeviceB-ike-profile-profile1] quit
# Create an IPsec policy template with the name template1 and the sequence number 1.
[DeviceB] ipsec policy-template template1 1
# Specify IPsec transform set transform1 for the IPsec policy template.
[DeviceB-ipsec-policy-template-template1-1] transform-set transform1
# Specify 2.2.2.2 as the local address of the IPsec tunnel.
[DeviceB-ipsec-policy-template-template1-1] local-address 2.2.2.2
# Specify IKE profile profile1 for the IPsec policy.
[DeviceB-ipsec-policy-template-template1-1] ike-profile profile1
[DeviceB-ipsec-policy-template-template1-1] quit
# Create an IKE-based IPsec policy entry with the name policy1 and the sequence number 1
by referencing the IPsec policy template template1.
[DeviceB] ipsec policy policy1 1 isakmp template template1
# Apply IPsec policy policy1 to interface GigabitEthernet 2/0/1.
[DeviceB-GigabitEthernet2/0/1] ipsec apply policy policy1
[DeviceB-GigabitEthernet2/0/1] quit
# Configure a static route to the subnet where Host A resides.
[DeviceB] ip route-static 10.1.1.0 255.255.255.0 3.3.3.1
355
[DeviceA] display ike sa verbose
-----------------------------------------------
Connection ID: 13
Outside VPN:
Inside VPN:
Profile: profile1
Transmitting entity: Initiator
-----------------------------------------------
Local IP: 1.1.1.1
Local ID type: FQDN
Local ID: www.devicea.com
Authentication-method: PRE-SHARED-KEY
Authentication-algorithm: MD5
Encryption-algorithm: 3DES-CBC
-----------------------------
IPsec policy: policy1
Sequence number: 1
Mode: ISAKMP
-----------------------------
Tunnel id: 0
Encapsulation mode: tunnel
Perfect forward secrecy:
Path MTU: 1435
Tunnel:
local address: 1.1.1.1
remote address: 2.2.2.2
Flow:
sour addr: 10.1.1.0/255.255.255.0 port: 0 protocol: ip
dest addr: 10.2.1.0/255.255.255.0 port: 0 protocol: ip
356
SPI: 830667426 (0x3182faa2)
Connection ID: 1
Transform set: ESP-ENCRYPT-3DES-CBC ESP-AUTH-MD5
SA duration (kilobytes/sec): 1843200/3600
SA remaining duration (kilobytes/sec): 1843200/2313
Max received sequence-number:
Anti-replay check enable: Y
Anti-replay window size: 64
UDP encapsulation used for nat traversal: Y
Status: Active
Troubleshooting IKE
IKE negotiation failed because no matching IKE proposals
were found
Symptom
1. The IKE SA is in Unknown state.
<Sysname> display ike sa
Connection-ID Remote Flag DOI
------------------------------------------------------------------
1 192.168.222.5 Unknown IPSEC
Flags:
RD--READY RL--REPLACED FD-FADING
2. When IKE event debugging and packet debugging are enabled, the following messages
appear:
IKE event debugging message:
The attributes are unacceptable.
IKE packet debugging message:
Construct notification packet: NO_PROPOSAL_CHOSEN.
Analysis
Certain IKE proposal settings are incorrect.
Solution
1. Examine the IKE proposal configuration to see whether the two ends have matching IKE
proposals.
2. Modify the IKE proposal configuration to make sure the two ends have matching IKE proposals.
357
IKE negotiation failed because no IKE proposals or IKE
keychains are specified correctly
Symptom
1. The IKE SA is in Unknown state.
<Sysname> display ike sa
Connection-ID Remote Flag DOI
------------------------------------------------------------------
1 192.168.222.5 Unknown IPSEC
Flags:
RD--READY RL--REPLACED FD-FADING
2. The following IKE event debugging or packet debugging message appeared:
IKE event debugging message:
Notification PAYLOAD_MALFORMED is received.
IKE packet debugging message:
Construct notification packet: PAYLOAD_MALFORMED.
Analysis
• If the following debugging information appeared, the matched IKE profile is not referencing the
matched IKE proposal:
Failed to find proposal 1 in profile profile1.
• If the following debugging information appeared, the matched IKE profile is not referencing the
matched IKE keychain:
Failed to find keychain keychain1 in profile profile1.
Solution
• Verify that the matched IKE proposal (IKE proposal 1 in this debugging message example) is
specified for the IKE profile (IKE profile 1 in the example).
• Verify that the matched IKE keychain (IKE keychain 1 in this debugging message example) is
specified for the IKE profile (IKE profile 1 in the example).
Analysis
Certain IPsec policy settings are incorrect.
358
Solution
1. Examine the IPsec configuration to see whether the two ends have matching IPsec transform
sets.
2. Modify the IPsec configuration to make sure the two ends have matching IPsec transform sets.
Analysis
Certain IPsec policy settings of the responder are incorrect. Verify the settings as follows:
1. Use the display ike sa verbose command to verify that matching IKE profiles were found in
IKE negotiation phase 1. If no matching IKE profiles were found and the IPsec policy is
referencing an IKE profile, the IPsec SA negotiation fails.
# Verify that matching IKE profiles were found in IKE negotiation phase 1.
<Sysname> display ike sa verbose
-----------------------------------------------
Connection ID: 3
Outside VPN:
Inside VPN:
Profile:
Transmitting entity: Responder
-----------------------------------------------
Local IP: 192.168.222.5
Local ID type: IPV4_ADDR
Local ID: 192.168.222.5
Authentication-method: PRE-SHARED-KEY
Authentication-algorithm: MD5
Encryption-algorithm: 3DES-CBC
359
# Verify that the IPsec policy is referencing an IKE profile.
[Sysname] display ipsec policy
-------------------------------------------
IPsec Policy: policy1
Interface: GigabitEthernet2/0/1
-------------------------------------------
-----------------------------
Sequence number: 1
Mode: isakmp
-----------------------------
Description:
Security data flow: 3000
Selector mode: aggregation
Local address: 192.168.222.5
Remote address: 192.168.222.71
Transform set: transform1
IKE profile: profile1
SA duration(time based):
SA duration(traffic based):
SA idle time:
2. Verify that the ACL used by the IPsec policy is correctly configured. If the flow range defined by
the responder's ACL is smaller than that defined by the initiator's ACL, IPsec proposal matching
will fail.
For example, if the initiator's ACL defines a flow from one network segment to another but the
responder's ACL defines a flow from one host to another host, IPsec proposal matching will fail.
# On the initiator:
[Sysname] display acl 3000
Advanced ACL 3000, named -none-, 2 rules,
ACL's step is 5
rule 0 permit ip source 192.168.222.0 0.0.0.255 destination 192.168.222.0 0.0.0.255
# On the responder:
[Sysname] display acl 3000
Advanced ACL 3000, named -none-, 2 rules,
ACL's step is 5
rule 0 permit ip source 192.168.222.71 0 destination 192.168.222.5 0
3. Verify that the IPsec policy has a remote address and an IPsec transform set configured and
that the IPsec transform set has all necessary settings configured.
If, for example, the IPsec policy has no remote address configured, the IPsec SA negotiation
will fail:
[Sysname] display ipsec policy
-------------------------------------------
IPsec Policy: policy1
Interface: GigabitEthernet2/0/1
-------------------------------------------
-----------------------------
Sequence number: 1
Mode: isakmp
360
-----------------------------
Description:
Security data flow: 3000
Selector mode: aggregation
Local address: 192.168.222.5
Remote address:
Transform set: transform1
IKE profile: profile1
SA duration(time based):
SA duration(traffic based):
SA idle time:
Solution
1. If the IPsec policy specifies an IKE profile but no matching IKE profiles were found in IKE
negotiation, perform one of the following operations on the responder:
{ Remove the specified IKE profile from the IPsec policy.
{ Modify the specified IKE profile to match the IKE profile of the initiator.
2. If the flow range defined by the responder's ACL is smaller than that defined by the initiator's
ACL, modify the responder's ACL so the ACL defines a flow range equal to or greater than that
of the initiator's ACL.
For example:
[Sysname] display acl 3000
Advanced ACL 3000, named -none-, 2 rules,
ACL's step is 5
rule 0 permit ip source 192.168.222.0 0.0.0.255 destination 192.168.222.0 0.0.0.255
3. Configure the missing settings (for example, the remote address).
361
Configuring IKEv2
Overview
Internet Key Exchange version 2 (IKEv2) is an enhanced version of IKEv1. The same as IKEv1,
IKEv2 has a set of self-protection mechanisms and can be used on insecure networks for reliable
identity authentication, key distribution, and IPsec SA negotiation. IKEv2 provides stronger
protection against attacks and higher key exchange ability and needs less message exchanges than
IKEv1.
362
New features in IKEv2
DH guessing
In the IKE_SA_INIT exchange, the initiator guesses the DH group that the responder is most likely to
use and sends it in an IKE_SA_INIT request message. If the initiator's guess is correct, the
responder responds with an IKE_SA_INIT response message and the IKE_SA_INIT exchange is
finished. If the guess is wrong, the responder responds with an INVALID_KE_PAYLOAD message
that contains the DH group that it wants to use. The initiator then uses the DH group selected by the
responder to reinitiate the IKE_SA_INIT exchange. The DH guessing mechanism allows for more
flexible DH group configuration and enables the initiator to adapt to different responders.
Cookie challenging
Messages for the IKE_SA_INIT exchange are in plain text. An IKEv1 responder cannot confirm the
validity of the initiators and must maintain half-open IKE SAs, which makes the responder
susceptible to DoS attacks. An attacker can send a large number of IKE_SA_INIT requests with
forged source IP addresses to the responder, exhausting the responder's system resources.
IKEv2 introduces the cookie challenging mechanism to prevent such DoS attacks. When an IKEv2
responder maintains a threshold number of half-open IKE SAs, it starts the cookie challenging
mechanism. The responder generates a cookie and includes it in the response sent to the initiator. If
the initiator initiates a new IKE_SA_INIT request that carries the correct cookie, the responder
considers the initiator valid and proceeds with the negotiation. If the carried cookie is incorrect, the
responder terminates the negotiation.
The cookie challenging mechanism automatically stops working when the number of half-open IKE
SAs drops below the threshold.
IKEv2 SA rekeying
For security purposes, both IKE SAs and IPsec SAs have a lifetime and must be rekeyed when the
lifetime expires. An IKEv1 SA lifetime is negotiated. An IKEv2 SA lifetime, in contrast, is configured. If
two peers are configured with different lifetimes, the peer with the shorter lifetime always initiates the
SA rekeying. This mechanism reduces the possibility that two peers will simultaneously initiate a
rekeying. Simultaneous rekeying results in redundant SAs and SA status inconsistency on the two
peers.
IKEv2 message retransmission
Unlike IKEv1 messages, IKEv2 messages appear in request/response pairs. IKEv2 uses the
Message ID field in the message header to identify the request/response pair. If an initiator sends a
request but receives no response with the same Message ID value within a specific period of time,
the initiator retransmits the request.
It is always the IKEv2 initiator that initiates the retransmission, and the retransmitted message must
use the same Message ID value.
363
• The strength of the algorithms for IKEv2 negotiation, including the encryption algorithms,
integrity protection algorithms, PRF algorithms, and DH groups. Different algorithms provide
different levels of protection. A stronger algorithm means better resistance to decryption of
protected data but requires more resources. Typically, the longer the key, the stronger the
algorithm.
• The local and remote identity authentication methods.
{ To use the pre-shared key authentication method, you must determine the pre-shared key.
{ To use the RSA digital signature authentication method, you must determine the PKI
domain for the local end to use. For information about PKI, see "Configuring PKI."
To configure IKEv2, perform the following tasks:
364
5. Specify a local interface or IP address for the IKEv2 profile so the profile can be applied only to
the specified interface or IP address. For this task, specify the local address configured in IPsec
policy or IPsec policy template view (using the local-address command). If no local address is
configured, specify the IP address of the interface that uses the IPsec policy.
6. Specify a priority number for the IKEv2 profile. To determine the priority of an IKEv2 profile:
a. First, the device examines the existence of the match local command. An IKEv2 profile
with the match local command configured has a higher priority.
b. If a tie exists, the device compares the priority numbers. An IKEv2 profile with a smaller
priority number has a higher priority.
c. If a tie still exists, the device prefers an IKEv2 profile configured earlier.
7. Specify a VPN instance for the IKEv2 profile. The IKEv2 profile is used for IKEv2 negotiation
only on the interfaces that belong to the VPN instance.
8. Configure the IKEv2 SA lifetime.
The local and remote ends can use different IKEv2 SA lifetimes. They do not negotiate the
lifetime. The end with a smaller SA lifetime will initiate an SA negotiation when the lifetime
expires.
9. Configure IKEv2 DPD to detect dead IKEv2 peers. You can also configure this feature in
system view. If you configure IKEv2 DPD in both views, the IKEv2 DPD settings in IKEv2 profile
view apply. If you do not configure IKEv2 DPD in IKEv2 profile view, the IKEv2 DPD settings in
system view apply.
10. Specify an inside VPN instance. This setting determines where the device should forward
received IPsec packets after it de-encapsulates them. If you specify an inside VPN instance,
the device looks for a route in the specified VPN instance to forward the packets. If you do not
specify an inside VPN instance, the internal and external networks are in the same VPN
instance. The device looks for a route in this VPN instance to forward the packets.
11. Configure the NAT keepalive interval.
Configure this task when the device is behind a NAT gateway. The device sends NAT keepalive
packets regularly to its peer to prevent the NAT session from being aged because of no
matching traffic.
12. Enable the configuration exchange feature.
The configuration exchange feature enables the local and remote ends to exchange
configuration data, such as gateway address, internal IP address, and route. The exchange
includes data request and response, and data push and response.
This feature typically applies to scenarios where branches and the headquarters communicate
through virtual tunnels.
This feature enables the IPsec gateway at a branch to send IP address requests to the IPsec
gateway at the headquarters. When the headquarters receives the request, it sends an IP
address to the branch in the response packet. The headquarters can also actively push an IP
address to the branch. The branch uses the allocated IP address as the IP address of the virtual
tunnel to communicate with the headquarters.
13. Enable AAA authorization.
The AAA authorization feature enables IKEv2 to request authorization attributes, such as the
IKEv2 address pool, from AAA. IKEv2 uses the address pool to assign IP addresses to remote
users. For more information about AAA authorization, see "Configuring AAA."
To configure an IKEv2 profile:
365
Step Command Remarks
9. (Optional.) Specify a
priority for the IKEv2 By default, the priority of an IKEv2
priority priority
profile. profile is 100.
366
Step Command Remarks
14. (Optional.) Set the
IKEv2 NAT keepalive By default, the global IKEv2 NAT
nat-keepalive seconds
interval. keepalive setting is used.
3. Specify the local interface or match local address By default, no local interface or
address used for IKEv2 { interface-type interface-number | address is used for IKEv2 policy
policy matching. { { ipv4-address | ipv6 matching, and the policy matches
ipv6-address } } } any local interface or address.
By default, no VPN instance is
4. Specify a VPN instance for specified for IKEv2 policy
IKEv2 policy matching. match vrf { name vrf-name | any } matching. The IKEv2 policy
matches all local addresses in the
public network.
5. Specify an IKEv2 proposal By default, no IKEv2 proposal is
for the IKEv2 policy. proposal proposal-name
specified for an IKEv2 policy.
367
Configuring an IKEv2 proposal
An IKEv2 proposal contains security parameters used in IKE_SA_INIT exchanges, including the
encryption algorithms, integrity protection algorithms, PRF algorithms, and DH groups. An algorithm
specified earlier has a higher priority.
A complete IKEv2 proposal must have at least one set of security parameters, including one
encryption algorithm, one integrity protection algorithm, one PRF algorithm, and one DH group.
You can specify multiple IKEv2 proposals for an IKEv2 policy. A proposal specified earlier has a
higher priority.
To configure an IKEv2 proposal:
368
Step Command Remarks
In non-FIPS mode:
integrity { aes-xcbc-mac | md5 |
sha1 | sha256 | sha384 | sha512 } By default, an IKEv2 proposal does
4. Specify the integrity *
protection algorithms. not have any integrity protection
In FIPS mode: algorithms.
integrity { sha1 | sha256 | sha384
| sha512 } *
In non-FIPS mode:
prf { aes-xcbc-mac | md5 | sha1 |
5. Specify the PRF sha256 | sha384 | sha512 } * By default, an IKEv2 proposal uses
algorithms. the integrity protection algorithms as
In FIPS mode: the PRF algorithms.
prf { sha1 | sha256 | sha384 |
sha512 } *
In non-FIPS mode:
dh { group1 | group14 | group2 |
group24 | group5 | group19 |
6. Specify the DH groups. group20 } * By default, an IKEv2 proposal does
not have any DH groups.
In FIPS mode:
dh { group14 | group19 |
group20 } *
369
Step Command Remarks
• To configure a host name for
the peer:
hostname host-name
• To configure a host IP
address or address range for
the peer: By default, no hostname, host IP
address { ipv4-address address, address range, or identity
[ mask | mask-length ] | ipv6 information is configured for an
4. Configure the information
ipv6-address IKEv2 peer.
for identifying the IKEv2
[ prefix-length ] }
peer. You must configure different IP
• To configure an ID for the
addresses/address ranges for
peer:
different peers.
identity { address
{ ipv4-address | ipv6
{ ipv6-address } } | fqdn
fqdn-name | email
email-string | key-id
key-id-string }
5. Configure a pre-shared key pre-shared-key [ local | remote ] By default, an IKEv2 peer does not
for the peer. { ciphertext | plaintext } string have a pre-shared key.
370
Step Command Remarks
1. Enter system view. system-view N/A
2. Configure global IKEv2 ikev2 dpd interval interval [ retry By default, global DPD is
DPD. seconds ] { on-demand | periodic } disabled.
ikev2 address-group
2. Configure an IKEv2 IPv4 group-name start-ipv4-address By default, no IKEv2 IPv4 address
address pool. end-ipv4-address [ mask | pool exists.
mask-length ]
ikev2 ipv6-address-group
3. Configure an IKEv2 IPv6 group-name prefix By default, no IKEv2 IPv6 address
address pool. prefix/prefix-len assign-len pool exists.
assign-len
Task Command
Display the IKEv2 proposal configuration. display ikev2 proposal [ name | default ]
371
Task Command
Display the IKEv2 policy configuration. display ikev2 policy [ policy-name | default ]
Display the IKEv2 profile configuration. display ikev2 profile [ profile-name ]
display ikev2 sa [ { local | remote } { ipv4-address |
Display the IKEv2 SA information. ipv6 ipv6-address } [ vpn-instance
vpn-instance-name ] ] [ verbose [ tunnel tunnel-id ] ]
reset ikev2 sa [ [ { local | remote } { ipv4-address |
Delete IKEv2 SAs and the child SAs negotiated
ipv6 ipv6-address } [ vpn-instance
through the IKEv2 SAs.
vpn-instance-name ] ] | tunnel tunnel-id ] [ fast ]
Configuration procedures
1. Configure Device A:
# Assign an IP address to each interface. (Details not shown.)
# Configure IPv4 advanced ACL 3101 to identify traffic from subnet 10.1.1.0/24 to subnet
10.1.2.0/24.
<DeviceA> system-view
[DeviceA] acl advanced 3101
[DeviceA-acl-ipv4-adv-3101] rule permit ip source 10.1.1.0 0.0.0.255 destination
10.1.2.0 0.0.0.255
[DeviceA-acl-ipv4-adv-3101] quit
# Create an IPsec transform set named tran1.
372
[DeviceA] ipsec transform-set tran1
# Set the packet encapsulation mode to tunnel.
[DeviceA-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Use the ESP protocol for the IPsec transform set.
[DeviceA-ipsec-transform-set-tran1] protocol esp
# Specify the encryption and authentication algorithms.
[DeviceA-ipsec-transform-set-tran1] esp encryption-algorithm des-cbc
[DeviceA-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[DeviceA-ipsec-transform-set-tran1] quit
# Create an IKEv2 keychain named keychain1.
[DeviceA] ikev2 keychain keychain1
# Create an IKEv2 peer named peer1.
[DeviceA-ikev2-keychain-keychain1] peer peer1
# Specify the peer IP address 2.2.2.2/24.
[DeviceA-ikev2-keychain-keychain1-peer-peer1] address 2.2.2.2 24
# Specify the peer ID, which is the IP address 2.2.2.2.
[DeviceA-ikev2-keychain-keychain1-peer-peer1] identity address 2.2.2.2
# Specify the plaintext abcde as the pre-shared key to be used with the peer at 2.2.2.2.
[DeviceA-ikev2-keychain-keychain1-peer-peer1] pre-shared-key plaintext abcde
[DeviceA-ikev2-keychain-keychain1-peer-peer1] quit
[DeviceA-ikev2-keychain-keychain1] quit
# Create an IKEv2 profile named profile1.
[DeviceA] ikev2 profile profile1
# Specify the local authentication method as pre-shared key.
[DeviceA-ikev2-profile-profile1] authentication-method local pre-share
# Specify the remote authentication method as pre-shared key.
[DeviceA-ikev2-profile-profile1] authentication-method remote pre-share
# Specify the IKEv2 keychain keychain1.
[DeviceA-ikev2-profile-profile1] keychain keychain1
# Specify the peer ID that the IKEv2 profile matches. The peer ID is the IP address 2.2.2.2/24.
[DeviceA-ikev2-profile-profile1] match remote identity address 2.2.2.2 255.255.255.0
[DeviceA-ikev2-profile-profile1] quit
# Create an IKE-based IPsec policy entry with the name map1 and the sequence number 10.
[DeviceA] ipsec policy map1 10 isakmp
# Specify the remote IP address 2.2.2.2 for the IPsec tunnel.
[DeviceA-ipsec-policy-isakmp-map1-10] remote-address 2.2.2.2
# Specify ACL 3101 to identify the traffic to be protected.
[DeviceA-ipsec-policy-isakmp-map1-10] security acl 3101
# Specify the IPsec transform set tran1 for the IPsec policy.
[DeviceA-ipsec-policy-isakmp-map1-10] transform-set tran1
# Specify the IKEv2 profile profile1 for the IPsec policy.
[DeviceA-ipsec-policy-isakmp-map1-10] ikev2-profile profile1
[DeviceA-ipsec-policy-isakmp-map1-10] quit
# Apply the IPsec policy map1 to interface GigabitEthernet 1/0/1.
[DeviceA] interface gigabitethernet 1/0/1
[DeviceA-GigabitEthernet1/0/1] ipsec apply policy map1
373
[DeviceA-GigabitEthernet1/0/1] quit
# Configure a static route to the subnet where Host B resides.
[DeviceA] ip route-static 10.1.2.0 255.255.255.0 2.2.2.2
2. Configure Device B:
# Assign an IP address to each interface. (Details not shown.)
# Configure IPv4 advanced ACL 3101 to identify traffic from subnet 10.1.2.0/24 to subnet
10.1.1.0/24.
<DeviceB> system-view
[DeviceB] acl advanced 3101
[DeviceB-acl-ipv4-adv-3101] rule permit ip source 10.1.2.0 0.0.0.255 destination
10.1.1.0 0.0.0.255
[DeviceB-acl-ipv4-adv-3101] quit
# Create an IPsec transform set named tran1.
[DeviceB] ipsec transform-set tran1
# Set the packet encapsulation mode to tunnel.
[DeviceB-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Use the ESP protocol for the IPsec transform set.
[DeviceB-ipsec-transform-set-tran1] protocol esp
# Specify the encryption and authentication algorithms.
[DeviceB-ipsec-transform-set-tran1] esp encryption-algorithm des-cbc
[DeviceB-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[DeviceB-ipsec-transform-set-tran1] quit
# Create an IKEv2 keychain named keychain1.
[DeviceB] ikev2 keychain keychain1
# Create an IKEv2 peer named peer1.
[DeviceB-ikev2-keychain-keychain1] peer peer1
# Specify the peer IP address 1.1.1.1/24.
[DeviceB-ikev2-keychain-keychain1-peer-peer1] address 1.1.1.1 24
# Specify the peer ID, which is the IP address 1.1.1.1.
[DeviceB-ikev2-keychain-keychain1-peer-peer1] identity address 1.1.1.1
# Specify the plaintext abcde as the pre-shared key to be used with the peer at 1.1.1.1.
[DeviceB-ikev2-keychain-keychain1-peer-peer1] pre-shared-key plaintext abcde
[DeviceB-ikev2-keychain-keychain1-peer-peer1] quit
[DeviceB-ikev2-keychain-keychain1] quit
# Create an IKEv2 profile named profile1.
[DeviceB] ikev2 profile profile1
# Specify the local authentication method as pre-shared key.
[DeviceB-ikev2-profile-profile1] authentication-method local pre-share
# Specify the remote authentication method as pre-shared key.
[DeviceB-ikev2-profile-profile1] authentication-method remote pre-share
# Specify the IKEv2 keychain keychain1.
[DeviceB-ikev2-profile-profile1] keychain keychain1
# Specify the peer ID that the IKEv2 profile matches. The peer ID is the IP address 1.1.1.1/24.
[DeviceA-ikev2-profile-profile1] match remote identity address 1.1.1.1 255.255.255.0
[DeviceA-ikev2-profile-profile1] quit
# Create an IKE-based IPsec policy entry with the name use1 and the sequence number 10.
[DeviceB] ipsec policy use1 10 isakmp
374
# Specify the remote IP address 1.1.1.1 for the IPsec tunnel.
[DeviceB-ipsec-policy-isakmp-use1-10] remote-address 1.1.1.1
# Specify ACL 3101 to identify the traffic to be protected.
[DeviceB-ipsec-policy-isakmp-use1-10] security acl 3101
# Specify the IPsec transform set tran1 for the IPsec policy.
[DeviceB-ipsec-policy-isakmp-use1-10] transform-set tran1
# # Specify the IKEv2 profile profile1 for the IPsec policy.
[DeviceB-ipsec-policy-isakmp-use1-10] ikev2-profile profile1
[DeviceB-ipsec-policy-isakmp-use1-10] quit
# Apply the IPsec policy use1 to interface GigabitEthernet 1/0/1.
[DeviceB] interface gigabitethernet 1/0/1
[DeviceB-GigabitEthernet1/0/1] ipsec apply policy use1
[DeviceB-GigabitEthernet1/0/1] quit
# Configure a static route to the subnet where Host A resides.
[DeviceB] ip route-static 10.1.1.0 255.255.255.0 1.1.1.1
-----------------------------
IPsec policy: map1
Sequence number: 10
Mode: ISAKMP
-----------------------------
375
Tunnel id: 0
Encapsulation mode: tunnel
Perfect forward secrecy:
Path MTU: 1456
Tunnel:
local address: 1.1.1.1
remote address: 2.2.2.2
Flow:
sour addr: 10.1.1.0/255.255.255.0 port: 0 protocol: IP
dest addr: 10.1.2.0/255.255.255.0 port: 0 protocol: IP
# Display the IKEv2 proposal, IKEv2 policy, IKEv2 SA and IPsec SAs on Device B.
[DeviceB] display ikev2 proposal
[DeviceB] display ikev2 policy
[DeviceB] display ikev2 sa
[DeviceB] display ipsec sa
376
Figure 114 Network diagram
Configuration procedure
1. Configure Device A:
# Assign an IP address to each interface. (Details not shown.)
# Configure IPv4 advanced ACL 3101 to identify traffic from subnet 10.1.1.0/24 to subnet
10.1.2.0/24.
<DeviceA> system-view
[DeviceA] acl advanced 3101
[DeviceA-acl-ipv4-adv-3101] rule permit ip source 10.1.1.0 0.0.0.255 destination
10.1.2.0 0.0.0.255
[DeviceA-acl-ipv4-adv-3101] quit
# Create an IPsec transform set named tran1.
[DeviceA] ipsec transform-set tran1
# Set the packet encapsulation mode to tunnel.
[DeviceA-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Use the ESP protocol for the IPsec transform set.
[DeviceA-ipsec-transform-set-tran1] protocol esp
# Specify the encryption and authentication algorithms.
[DeviceA-ipsec-transform-set-tran1] esp encryption-algorithm des-cbc
[DeviceA-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[DeviceA-ipsec-transform-set-tran1] quit
# Create a PKI entity named entity1.
[DeviceA] pki entity entity1
# Set the common name to routera for the PKI entity.
[DeviceA-pki-entity-entity1] common-name routera
[DeviceA-pki-entity-entity1] quit
# Create a PKI domain named domain1.
[DeviceA] pki domain domain1
# Set the certificate request mode to auto and set the password to 123 for certificate revocation.
[DeviceA-pki-domain-domain1] certificate request mode auto password simple 123
# Set an MD5 fingerprint for verifying the validity of the CA root certificate.
[DeviceA-pki-domain-domain1] root-certificate fingerprint md5
50c7a2d282ea710a449eede6c56b102e
377
# Specify the trusted CA 8088.
[DeviceA-pki-domain-domain1] ca identifier 8088
# Specify the URL of the registration server for certificate request through the SCEP protocol.
This example uses the URL of
http://192.168.222.1:446/eadbf9af4f2c4641e685f7a6021e7b298373feb7.
[DeviceA-pki-domain-domain1] certificate request url
http://192.168.222.1:446/eadbf9af4f2c4641e685f7a6021e7b298373feb7
# Specify the CA to accept certificate requests.
[DeviceA-pki-domain-domain1] certificate request from ca
# Specify the PKI entity for certificate request as entity1.
[DeviceA-pki-domain-domain1] certificate request entity entity1
# Specify the RSA key pair rsa1 with the general purpose for certificate request.
[DeviceA-pki-domain-domain1] public-key rsa general name rsa1
[DeviceA-pki-domain-domain1] quit
# Create an IKEv2 profile named profile1.
[DeviceA] ikev2 profile profile1
# Specify the local authentication method as RSA signatures.
[DeviceA-ikev2-profile-profile1] authentication-method local rsa-signature
# Specify the remote authentication method as RSA signatures.
[DeviceA-ikev2-profile-profile1] authentication-method remote rsa-signature
# Specify the PKI domain domain1 for the IKEv2 profile.
[DeviceA-ikev2-profile-profile1] certificate domain domain1
# Set the local ID to the FQDN name www.routera.com.
[DeviceA-ikev2-profile-profile1] identity local fqdn www.routera.com
# Specify the peer ID that the IKEv2 profile matches. The peer ID is the FQDN name
www.routerb.com.
[DeviceA-ikev2-profile-profile1] match remote identity fqdn www.routerb.com
[DeviceA-ikev2-profile-profile1] quit
# Create an IKEv2 proposal named 10.
[DeviceA] ikev2 proposal 10
# Specify the integrity protection algorithm as HMAC-MD5.
[DeviceA-ikev2-proposal-10] integrity md5
# Specify the encryption algorithm as 3DES-CBC.
[DeviceA-ikev2-proposal-10] encryption 3des-cbc
# Specify the DH group as Group 1.
[DeviceA-ikev2-proposal-10] dh group1
# Specify the PRF algorithm as HMAC-MD5.
[DeviceA-ikev2-proposal-10] prf md5
[DeviceA-ikev2-proposal-10] quit
# Create an IKEv2 policy named 1.
[DeviceA] ikev2 policy 1
# Specify the IKEv2 proposal 10 for the IKEv2 policy.
[DeviceA-ikev2-policy-1] proposal 10
[DeviceA-ikev2-policy-1] quit
# Create an IKE-based IPsec policy entry with the name map1 and the sequence number 10.
[DeviceA] ipsec policy map1 10 isakmp
# Specify the remote IP address 2.2.2.2 for the IPsec tunnel.
378
[DeviceA-ipsec-policy-isakmp-map1-10] remote-address 2.2.2.2
# Specify the IPsec transform set tran1 for the IPsec policy.
[DeviceA-ipsec-policy-isakmp-map1-10] transform-set tran1
# Specify ACL 3101 to identify the traffic to be protected.
[DeviceA-ipsec-policy-isakmp-map1-10] security acl 3101
# Specify the IKEv2 profile profile1 for the IPsec policy.
[DeviceA-ipsec-policy-isakmp-map1-10] ikev2-profile profile1
[DeviceA-ipsec-policy-isakmp-map1-10] quit
# Apply the IPsec policy map1 to interface GigabitEthernet 1/0/1.
[DeviceA] interface gigabitethernet 1/0/1
[DeviceA-GigabitEthernet1/0/1] ipsec apply policy map1
[DeviceA-GigabitEthernet1/0/1] quit
# Configure a static route to the subnet where Host B resides.
[DeviceA] ip route-static 10.1.2.0 255.255.255.0 2.2.2.2
2. Configure Device B:
# Assign an IP address to each interface. (Details not shown.)
# Configure IPv4 advanced ACL 3101 to identify traffic from subnet 10.1.2.0/24 to subnet
10.1.1.0/24.
<DeviceB> system-view
[DeviceB] acl advanced 3101
[DeviceB-acl-ipv4-adv-3101] rule permit ip source 10.1.2.0 0.0.0.255 destination
10.1.1.0 0.0.0.255
[DeviceB-acl-ipv4-adv-3101] quit
# Create an IPsec transform set named tran1.
[DeviceB] ipsec transform-set tran1
# Set the packet encapsulation mode to tunnel.
[DeviceB-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Use the ESP protocol for the IPsec transform set.
[DeviceB-ipsec-transform-set-tran1] protocol esp
# Specify the encryption and authentication algorithms.
[DeviceB-ipsec-transform-set-tran1] esp encryption-algorithm des-cbc
[DeviceB-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[DeviceB-ipsec-transform-set-tran1] quit
# Create a PKI entity named entity2.
[DeviceB] pki entity entity2
# Set the common name to routerb for the PKI entity.
[DeviceB-pki-entity-entity2] common-name routerb
[DeviceB-pki-entity-entity2] quit
# Create a PKI domain named domain2.
[DeviceB] pki domain domain2
# Set the certificate request mode to auto and set the password to 123 for certificate revocation.
[DeviceB-pki-domain-domain2] certificate request mode auto password simple 123
# Set an MD5 fingerprint for verifying the validity of the CA root certificate.
[DeviceB-pki-domain-domain2] root-certificate fingerprint md5
50c7a2d282ea710a449eede6c56b102e
# Specify the trusted CA 8088.
[DeviceB-pki-domain-domain2] ca identifier 8088
379
# Specify the URL of the registration server for certificate request through the SCEP protocol.
This example uses the URL of
http://192.168.222.1:446/eadbf9af4f2c4641e685f7a6021e7b298373feb7.
[DeviceB-pki-domain-domain2] certificate request url
http://192.168.222.1:446/eadbf9af4f2c4641e685f7a6021e7b298373feb7
# Specify the CA to accept certificate requests.
[DeviceB-pki-domain-domain2] certificate request from ca
# Specify the PKI entity for certificate request as entity2.
[DeviceB-pki-domain-domain2] certificate request entity entity2
# Specify the RSA key pair rsa1 with the general purpose for certificate request.
[DeviceB-pki-domain-domain2] public-key rsa general name rsa1
[DeviceB-pki-domain-domain2] quit
# Create an IKEv2 profile named profile2.
[DeviceB] ikev2 profile profile2
# Specify the local authentication method as RSA signatures.
[DeviceB-ikev2-profile-profile2] authentication-method local rsa-signature
# Specify the remote authentication method as RSA signatures.
[DeviceB-ikev2-profile-profile2] authentication-method remote rsa-signature
# Set the local identity to the FQDN name www.routerb.com.
[DeviceB-ikev2-profile-profile2] identity local fqdn www.routerb.com
# Specify the peer ID that the IKEv2 profile matches. The peer ID is the FQDN name
www.routera.com.
[DeviceB-ikev2-profile-profile2] match remote identity fqdn www.routera.com
[DeviceB-ikev2-profile-profile2] quit
# Create an IKEv2 proposal named 10.
[DeviceB] ikev2 proposal 10
# Specify the integrity protection algorithm as HMAC-MD5.
[DeviceB-ikev2-proposal-10] integrity md5
# Specify the encryption algorithm as 3DES-CBC.
[DeviceB-ikev2-proposal-10] encryption 3des-cbc
# Specify the DH group as Group 1.
[DeviceB-ikev2-proposal-10] dh group1
# Specify the PRF algorithm as HMAC-MD5.
[DeviceB-ikev2-proposal-10] prf md5
[DeviceB-ikev2-proposal-10] quit
# Create an IKEv2 policy named 1.
[DeviceB] ikev2 policy 1
# Specify the IKEv2 proposal 10 for the IKEv2 policy.
[DeviceB-ikev2-policy-1] proposal 10
[DeviceB-ikev2-policy-1] quit
# Create an IPsec policy template entry with the name template1 and the sequence number 1.
[DeviceB] ipsec policy-template template1 1
# Specify the remote IP address 1.1.1.1 for the IPsec tunnel.
[DeviceB-ipsec-policy-template-template1-1] remote-address 1.1.1.1
# Specify ACL 3101 to identify the traffic to be protected.
[DeviceB-ipsec-policy-template-template1-1] security acl 3101
# Specify the IPsec transform set tran1 for the IPsec policy template.
380
[DeviceB-ipsec-policy-template-template1-1] transform-set tran1
# Specify the IKEv2 profile profile2 for the IPsec policy template.
[DeviceB-ipsec-policy-template-template1-1] ikev2-profile profile2
[DeviceB-ipsec-policy-template-template1-1] quit
# Create an IKE-based IPsec policy entry with the name use1 and the sequence number 1 by
using the IPsec policy template template1.
[DeviceB] ipsec policy use1 1 isakmp template template1
# Apply IPsec policy use1 to interface GigabitEthernet 1/0/1.
[DeviceB] interface gigabitethernet 1/0/1
[DeviceB-GigabitEthernet1/0/1] ipsec apply policy use1
[DeviceB-GigabitEthernet1/0/1] quit
# Configure a static route to the subnet where Host A resides.
[DeviceB] ip route-static 10.1.1.0 255.255.255.0 1.1.1.1
381
IN-NEGO: Negotiating, EST: Establish, DEL:Deleting
382
Not After : Sep 26 02:06:43 2013 GMT
Subject: CN=devicea
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:b0:a1:cd:24:6e:1a:1d:51:79:f0:2a:3e:9f:e9:
84:07:16:78:49:1b:7d:0b:22:f0:0a:ed:75:91:a4:
17:fd:c7:ef:d0:66:5c:aa:e3:2a:d9:71:12:e4:c6:
25:77:f0:1d:97:bb:92:a8:bd:66:f8:f8:e8:d5:0d:
d2:c8:01:dd:ea:e6:e0:80:ad:db:9d:c8:d9:5f:03:
2d:22:07:e3:ed:cc:88:1e:3f:0c:5e:b3:d8:0e:2d:
ea:d6:c6:47:23:6a:11:ef:3c:0f:6b:61:f0:ca:a1:
79:a0:b1:02:1a:ae:8c:c9:44:e0:cf:d1:30:de:4c:
f0:e5:62:e7:d0:81:5d:de:d3
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 CRL Distribution Points:
Full Name:
URI:http://xx.rsa.com:447/8088.crl
-----------------------------
IPsec policy: map1
Sequence number: 10
Mode: ISAKMP
-----------------------------
Tunnel id: 0
Encapsulation mode: tunnel
Perfect forward secrecy:
Path MTU: 1456
Tunnel:
local address: 1.1.1.1
383
remote address: 2.2.2.2
Flow:
sour addr: 10.1.1.0/255.255.255.0 port: 0 protocol: ip
dest addr: 10.1.2.0/255.255.255.0 port: 0 protocol: ip
# Display the information about the CA certificate, local certificate, IKEv2 SA, and IPsec SA on
Device B.
[DeviceB] display ikev2 sa
[DeviceB] display pki certificate domain domain2 ca
[DeviceB] display pki certificate domain domain2 local
[DeviceB] display ipsec sa
384
Figure 115 Network diagram
Configuration procedure
1. Configure Device A:
# Assign an IP address to each interface. (Details not shown.)
# Configure IPv4 advanced ACL 3101 to identify traffic from subnet 10.1.1.0/24 to subnet
10.1.2.0/24.
<DeviceA> system-view
[DeviceA] acl advanced 3101
[DeviceA-acl-ipv4-adv-3101] rule 0 permit ip source 10.1.1.0 0.0.0.255 destination
10.1.2.0 0.0.0.255
[DeviceA-acl-ipv4-adv-3101] quit
# Create an IPsec transform set named transform1.
[DeviceA] ipsec transform-set transform1
# Use the ESP protocol for the IPsec transform set.
[DeviceA-ipsec-transform-set-transform1] protocol esp
# Specify the encryption and authentication algorithms.
[DeviceA-ipsec-transform-set-transform1] esp encryption-algorithm 3des-cbc
[DeviceA-ipsec-transform-set-transform1] esp authentication-algorithm md5
[DeviceA-ipsec-transform-set-transform1] quit
# Create an IKEv2 keychain named keychain1.
[DeviceA] ikev2 keychain keychain1
# Create an IKEv2 peer named peer1.
[DeviceA-ikev2-keychain-keychain1] peer peer1
# Specify the peer IP address 2.2.2.2/24.
[DeviceA-ikev2-keychain-keychain1-peer-peer1] address 2.2.2.2 24
# Specify the peer ID, which is the IP address 2.2.2.2.
[DeviceA-ikev2-keychain-keychain1-peer-peer1] identity address 2.2.2.2
# Specify the plaintext 123 as the pre-shared key to be used with the peer.
[DeviceA-ikev2-keychain-keychain1-peer-peer1] pre-shared-key plaintext 123
[DeviceA-ikev2-keychain-keychain1-peer-peer1] quit
[DeviceA-ikev2-keychain-keychain1] quit
# Create an IKEv2 profile named profile1.
[DeviceA] ikev2 profile profile1
# Specify the IKEv2 keychain keychain1.
[DeviceA-ikev2-profile-profile1] keychain keychain1
# Set the local ID to the FQDN name www.devicea.com.
385
[DeviceA-ikev2-profile-profile1] identity local fqdn www.devicea.com
# Specify the peer ID that the IKEv2 profile matches. The peer ID is the IP address 2.2.2.2/24.
[DeviceA-ikev2-profile-profile1] match remote identity address 2.2.2.2 255.255.255.0
[DeviceA-ikev2-profile-profile1] quit
# Create an IKE-based IPsec policy entry with the name policy1 and the sequence number 1.
[DeviceA] ipsec policy policy1 1 isakmp
# Specify the remote IP address 2.2.2.2 for the IPsec tunnel.
[DeviceA-ipsec-policy-isakmp-policy1-1] remote-address 2.2.2.2
# Specify the IPsec transform set transform1 for the IPsec policy.
[DeviceA-ipsec-policy-isakmp-policy1-1] transform-set transform1
# Specify ACL 3101 to identify the traffic to be protected.
[DeviceA-ipsec-policy-isakmp-policy1-1] security acl 3101
# Specify the IKEv2 profile profile1 for the IPsec policy.
[DeviceA-ipsec-policy-isakmp-policy1-1] ikev2-profile profile1
[DeviceA-ipsec-policy-isakmp-policy1-1] quit
# Apply the IPsec policy policy1 to interface GigabitEthernet 1/0/1.
[DeviceA] interface gigabitethernet 1/0/1
[DeviceA-GigabitEthernet1/0/1] ipsec apply policy policy1
[DeviceA-GigabitEthernet1/0/1] quit
# Configure a static route to the subnet where Host B resides.
[DeviceA] ip route-static 10.1.2.0 255.255.255.0 2.2.2.2
2. Configure Device B:
# Assign an IP address to each interface. (Details not shown.)
# Configure IPv4 advanced ACL 3101 to identify traffic from subnet 10.1.2.0/24 to subnet
10.1.1.0/24.
<DeviceA> system-view
[DeviceA] acl advanced 3101
[DeviceA-acl-ipv4-adv-3101] rule 0 permit ip source 10.1.2.0 0.0.0.255 destination
10.1.1.0 0.0.0.255
[DeviceA-acl-ipv4-adv-3101] quit
# Create an IPsec transform set named transform1.
<DeviceB> system-view
[DeviceB] ipsec transform-set transform1
# Use the ESP protocol for the IPsec transform set.
[DeviceB-ipsec-transform-set-transform1] protocol esp
# Specify the encryption and authentication algorithms.
[DeviceB-ipsec-transform-set-transform1] esp encryption-algorithm 3des-cbc
[DeviceB-ipsec-transform-set-transform1] esp authentication-algorithm md5
[DeviceB-ipsec-transform-set-transform1] quit
# Create an IKEv2 keychain named keychain1.
[DeviceB]ikev2 keychain keychain1
# Create an IKEv2 peer named peer1.
[DeviceB-ikev2-keychain-keychain1] peer peer1
# Specify the peer IP address 1.1.1.1/24.
[DeviceB-ikev2-keychain-keychain1-peer-peer1] address 1.1.1.1 24
# Specify the peer ID, which is the IP address 1.1.1.1.
[DeviceB-ikev2-keychain-keychain1-peer-peer1] identity address 1.1.1.1
386
# Specify the plaintext 123 as the pre-shared key to be used with the peer.
[DeviceB-ikev2-keychain-keychain1-peer-peer1] pre-shared-key plaintext 123
[DeviceB-ikev2-keychain-keychain1-peer-peer1] quit
[DeviceB-ikev2-keychain-keychain1] quit
# Create an IKEv2 profile named profile1.
[DeviceB] ikev2 profile profile1
# Specify the IKEv2 keychain keychain1.
[DeviceB-ikev2-profile-profile1] keychain keychain1
# Specify the peer ID that the IKEv2 profile matches. The peer ID is the FQDN name
www.devicea.com.
[DeviceB-ikev2-profile-profile1] match remote identity fqdn www.devicea.com
[DeviceB-ikev2-profile-profile1] quit
# Create an IPsec policy template entry with the name template1 and the sequence number 1.
[DeviceB] ipsec policy-template template1 1
# Specify the remote IP address 1.1.1.1 for the IPsec tunnel.
[DeviceB-ipsec-policy-template-template1-1] remote-address 1.1.1.1
# Specify ACL 3101 to identify the traffic to be protected.
[DeviceB-ipsec-policy-template-template1-1] security acl 3101
# Specify the IPsec transform set transform1 for the IPsec policy template.
[DeviceB-ipsec-policy-template-template1-1] transform-set transform1
# Specify the IKEv2 profile profile1 for the IPsec policy template.
[DeviceB-ipsec-policy-template-template1-1] ikev2-profile profile1
[DeviceB-ipsec-policy-template-template1-1] quit
# Create an IKE-based IPsec policy entry with the name policy1 and the sequence number 1
by using the IPsec policy template template1.
[DeviceB] ipsec policy policy1 1 isakmp template template1
# Apply the IPsec policy policy1 to interface GigabitEthernet 1/0/1.
[DeviceB] interface gigabitethernet 1/0/1
[DeviceB-GigabitEthernet1/0/1] ipsec apply policy policy1
[DeviceB-GigabitEthernet1/0/1] quit
# Configure a static route to the subnet where Host A resides. The next hop is the IP address of
the output interface on the NAT device. (Details not shown.)
Verifying the configuration
# Initiate a connection from subnet 10.1.1.0/24 to subnet 10.1.2.0/24 to trigger IKEv2 negotiation.
After IPsec SAs are successfully negotiated by IKEv2, traffic between the two subnets is IPsec
protected.
# Display the IKEv2 SA on Device A.
[DeviceA] display ikev2 sa
Tunnel ID Local Remote Status
---------------------------------------------------------------------------
1 1.1.1.1/500 2.2.2.2/500 EST
Status:
IN-NEGO: Negotiating, EST: Establish, DEL:Deleting
[DeviceA] display ikev2 sa verbose
-----------------------------------------------
Connection ID: 13
Outside VPN:
387
Inside VPN:
Profile: profile1
Transmitting entity: Initiator
-----------------------------------------------
Local IP: 1.1.1.1
Local ID type: FQDN
Local ID: www.devicea.com
Authentication-method: PRE-SHARED-KEY
Authentication-algorithm: MD5
Encryption-algorithm: 3DES-CBC
-----------------------------
IPsec policy: policy1
Sequence number: 1
Mode: ISAKMP
-----------------------------
Tunnel id: 0
Encapsulation mode: tunnel
Perfect forward secrecy:
Path MTU: 1435
Tunnel:
local address: 1.1.1.1
remote address: 2.2.2.2
Flow:
sour addr: 10.1.1.0/255.255.255.0 port: 0 protocol: IP
dest addr: 10.2.1.0/255.255.255.0 port: 0 protocol: IP
388
Max received sequence-number:
Anti-replay check enable: Y
Anti-replay window size: 64
UDP encapsulation used for nat traversal: Y
Status: active
Troubleshooting IKEv2
IKEv2 negotiation failed because no matching IKEv2
proposals were found
Symptom
The IKEv2 SA is in IN-NEGO status.
<Sysname> display ikev2 sa
Tunnel ID Local Remote Status
---------------------------------------------------------------------------
5 123.234.234.124/500 123.234.234.123/500 IN-NEGO
Status:
IN-NEGO: Negotiating, EST: Establish, DEL:Deleting
Analysis
Certain IKEv2 proposal settings are incorrect.
Solution
1. Examine the IKEv2 proposal configuration to see whether the two ends have matching IKEv2
proposals.
2. Modify the IKEv2 proposal configuration to make sure the two ends have matching IKEv2
proposals.
389
Analysis
Certain IPsec policy settings are incorrect.
Solution
1. Examine the IPsec configuration to see whether the two ends have matching IPsec transform
sets.
2. Modify the IPsec configuration to make sure the two ends have matching IPsec transform sets.
390
Configuring SSH
Overview
Secure Shell (SSH) is a network security protocol. Using encryption and authentication, SSH can
implement secure remote access and file transfer over an insecure network.
SSH uses the typical client-server model to establish a channel for secure data transfer based on
TCP.
SSH includes two versions: SSH1.x and SSH2.0 (hereinafter referred to as SSH1 and SSH2), which
are not compatible. SSH2 is better than SSH1 in performance and security.
The device supports the following SSH applications:
• Secure Telnet—Stelnet provides secure and reliable network terminal access services.
Through Stelnet, a user can securely log in to a remote server. Stelnet can protect devices
against attacks, such as IP spoofing and plain text password interception. The device can act
as an Stelnet server or an Stelnet client.
• Secure File Transfer Protocol—Based on SSH2, SFTP uses SSH connections to provide
secure file transfer. The device can act as an SFTP server, allowing a remote user to log in to
the SFTP server for secure file management and transfer. The device can also act as an SFTP
client, enabling a user to log in from the device to a remote device for secure file transfer.
• Secure Copy—Based on SSH2, SCP offers a secure method to copy files. The device can act
as an SCP server, allowing a user to log in to the device for file upload and download. The
device can also act as an SCP client, enabling a user to log in from the device to a remote
device for secure file transfer.
• NETCONF over SSH—Based on SSH2, it enables users to securely log in to the device
through SSH and perform NETCONF operations on the device through the
NETCONF-over-SSH connections. The device can act only as a NETCONF-over-SSH server.
For more information about NETCONF, see Network Management and Monitoring
Configuration Guide.
When acting as an SSH client or server, the device supports the following SSH versions:
• When acting as an SSH client, the device supports only SSH2.
• When acting as an Stelnet, SFTP, or SCP server, the device supports both SSH2 and SSH1 in
non-FIPS mode and only SSH2 in FIPS mode.
• When acting as a NETCONF-over-SSH server, the device supports only SSH2 in either
non-FIPS mode or FIPS modes.
Unless otherwise noted, the SSH server collectively refers to the Stelnet server, SFTP server, SCP
server, and NETCONF-over-SSH server.
Stages Description
The SSH server listens to connection requests on port 22. After a client
Connection establishment initiates a connection request, the server and the client establish a
TCP connection.
391
Stages Description
Version negotiation The two parties determine a version to use.
SSH supports multiple algorithms. Based on the local algorithms, the
two parties negotiate the following algorithms:
• Key exchange algorithm for generating session keys.
Algorithm negotiation
• Encryption algorithm for encrypting data.
• Public key algorithm for digital signature and authentication.
• HMAC algorithm for protecting data integrity.
The two parties use the DH exchange algorithm to dynamically
generate the session keys and session ID.
Key exchange • The session keys are used for protecting data transfer.
• The session ID is used for identifying the SSH connection.
In this stage, the client also authenticates the server.
The SSH server authenticates the client in response to the client's
Authentication
authentication request.
After passing the authentication, the client sends a session request to
Session request the server to request the establishment of a session (or request the
Stelnet, SFTP, SCP, or NETCONF service).
After the server grants the request, the client and the server start to
communicate with each other in the session.
In this stage, you can paste commands in text format and execute
them at the CLI. The text pasted at one time must be no more than
2000 bytes. To execute the commands successfully, Hewlett Packard
Interaction
Enterprise recommends that you paste commands that are in the
same view.
To execute commands of more than 2000 bytes, save the commands
in a configuration file, upload the file to the server through SFTP, and
use it to restart the server.
392
NOTE:
SSH1 clients do not support secondary password authentication that is initiated by the AAA server.
Publickey authentication
The server authenticates a client by verifying the digital signature of the client. The publickey
authentication process is as follows:
1. The client sends the server a publickey authentication request that includes the username,
public key, and public key algorithm name.
If the digital certificate of the client is required in authentication, the client also encapsulates the
digital certificate in the authentication request. The digital certificate carries the public key
information of the client.
2. The server verifies the client's public key.
{ If the public key is invalid, the server informs the client of the authentication failure.
{ If the public key is valid, the server requests the digital signature of the client. After receiving
the signature, the server uses the public key to verify the signature and informs the client of
the authentication result.
When acting as an SSH server, the device supports using the public key algorithms RSA and DSA to
verify digital signatures.
When acting as an SSH client, the device supports using the public key algorithms RSA and DSA to
generate digital signatures.
For more information about public key configuration, see "Managing public keys."
Password-publickey authentication
The server requires SSH2 clients to pass both password authentication and publickey authentication.
However, an SSH1 client only needs to pass either authentication.
Any authentication
The server requires clients to pass password authentication or publickey authentication.
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for
features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more
information about FIPS mode, see "Configuring FIPS."
393
Tasks at a glance Remarks
Required only for Stelnet and
(Required.) Configuring the user lines for SSH login
NETCONF-over-SSH servers.
Required if the authentication method is
(Required.) Configuring a client's host public key
publickey, password-publickey, or any.
See "Configuring PKI."
Required if the following conditions exist:
Configuring the PKI domain for verifying the client's The authentication method is publickey.
digital certificate • The client sends its public key to the server
through a digital certificate for validity check.
The PKI domain must have the CA certificate to
verify the client's digital certificate.
Required if the authentication method is
publickey, password-publickey, or any.
(Required/optional.) Configuring an SSH user
Optional if the authentication method is
password.
(Optional.) Configuring the SSH management
N/A
parameters
394
Configuration procedure
To generate local DSA or RSA key pairs on the SSH server:
395
Enabling NETCONF over SSH
After you enable NETCONF over SSH on the device, a client can perform NETCONF operations on
the device through a NETCONF-over-SSH connection.
When acting as a server in the NETCONF-over-SSH connection, the device does not support
connection requests initiated by SSH1 clients.
To enable NETCONF over SSH:
396
You can enter the content of a client's host public key or import the client's host public key from the
public key file. Hewlett Packard Enterprise recommends that you import the client's host public key.
Entering a client's host public key
Before you enter the client's host public key, you must use the display public-key local public
command on the client to obtain the client's host public key.
To enter a client's host public key:
Importing a client's host public key from the public key file
Before you import the host public key, upload the client's public key file (in binary) to the server, for
example, through FTP or TFTP. During the import process, the server automatically converts the
host public key in the public key file to a string in PKCS format.
To import a client's host public key from the public key file:
Step Command
1. Enter system view. system-view
2. Import a client's public key
from the public key file. public-key peer keyname import sshkey filename
397
• If the authentication method is password-publickey or any, you must create an SSH user on
the SSH server and perform one of the following tasks:
{ For local authentication, configure a local user on the SSH server.
{ For remote authentication, configure an SSH user on a remote authentication server, for
example, a RADIUS server.
In either case, the local user or the SSH user configured on the remote authentication server
must have the same username as the SSH user.
For information about configuring local users and remote authentication, see "Configuring AAA."
Configuration restrictions and guidelines
When you configure an SSH user, follow these restrictions and guidelines:
• An SSH server supports up to 1024 SSH users.
• For an SFTP or SCP user, the working directory depends on the authentication method.
{ If the authentication method is password, the working directory is authorized by AAA.
{ If the authentication method is publickey or password-publickey, the working folder is
specified by the authorization-attribute command in the associated local user view.
• For an SSH user, the user role also depends on the authentication method.
{ If the authentication method is password, the user role is authorized by the remote AAA
server or the local device.
{ If the authentication method is publickey or password-publickey, the user role is specified
by the authorization-attribute command in the associated local user view.
• If you change the authentication parameters for a logged-in SSH user, the change takes effect
on the user at the next login.
• For all authentication methods except password authentication, you must specify a client's host
public key or digital certificate.
{ For a client that sends the user's public key information directly to the server, specify the
client's host public key on the server. The specified public key must already exist. For more
information about public keys, see "Configuring a client's host public key."
{ For a client that sends the user's public key information to the server through a digital
certificate, specify the PKI domain on the server. This PKI domain verifies the client's digital
certificate. For successful verification, the specified PKI domain must have the correct CA
certificate. For more information about configuring a PKI domain, see "Configuring PKI."
• When the device operates as an SSH server in FIPS mode, the device does not support the
authentication method of any or publickey.
Configuration procedure
To configure an SSH user, and specify the service type and authentication method:
Step Command
1. Enter system view. system-view
• In non-FIPS mode:
ssh user username service-type { all | netconf | scp | sftp |
stelnet } authentication-type { password | { any |
password-publickey | publickey } assign { pki-domain
2. Create an SSH user, and domain-name | publickey keyname } }
specify the service type and
authentication method. • In FIPS mode:
ssh user username service-type { all | netconf | scp | sftp |
stelnet } authentication-type { password |
password-publickey assign { pki-domain domain-name |
publickey keyname } }
398
Configuring the SSH management parameters
Step Command Remarks
1. Enter system view. system-view N/A
By default, the SSH server does
2. Enable the SSH server to ssh server compatible-ssh1x not support SSH1 clients.
support SSH1 clients. enable This command is not available in
FIPS mode.
By default, the RSA server key
pair is not updated.
3. Set the minimum interval for
updating the RSA server key This command takes effect only
ssh server rekey-interval hours
pair. on SSH1 users.
This command is not available in
FIPS mode.
The default setting is 60 seconds.
4. Set the SSH user ssh server If a user does not finish the
authentication timeout timer. authentication-timeout authentication when the timeout
time-out-value timer expires, the connection
cannot be established.
The default setting is 3.
5. Set the maximum number of If the authentication method is
SSH authentication ssh server any, the total number of publickey
attempts. authentication-retries times authentication attempts and
password authentication attempts
cannot exceed the upper limit.
• Control IPv4 SSH user
connections:
ssh server acl
{ basic-acl-number |
advanced-acl-number | mac
6. Specify an ACL to control mac-acl-number } By default, no ACLs are specified
and all SSH users can initiate
SSH user connections. • Control IPv6 SSH user
SSH connections to the server.
connections:
ssh server ipv6 acl { ipv6
basic-acl-number | ipv6
advanced-acl-number | mac
mac-acl-number }
• Set the DSCP value in IPv4 The default setting is 48.
packets: The DSCP value of a packet
7. Set the DSCP value in the ssh server dscp dscp-value defines the priority of the packet
packets that the SSH server • Set the DSCP value in IPv6 and affects the transmission
sends to the SSH clients. packets: priority of the packet. A bigger
ssh server ipv6 dscp DSCP value represents a higher
dscp-value priority.
The default setting is 10 minutes.
8. Set the SFTP connection idle sftp server idle-timeout When the idle timeout timer
timeout timer. time-out-value expires, the system automatically
tears the connection down.
399
Step Command Remarks
The default setting is 32.
When the number of online SSH
9. Specify the maximum users reaches the upper limit, the
number of concurrent online aaa session-limit ssh
system denies new SSH
SSH users. max-sessions
connection requests.
Changing the upper limit does not
affect online SSH users.
400
• Improving the manageability of Stelnet clients in authentication service.
To specify the source IP address for SSH packets:
401
Task Command Remarks
• In non-FIPS mode:
ssh2 server [ port-number ] [ vpn-instance
vpn-instance-name ] [ identity-key { dsa | rsa } |
prefer- compress zlib | prefer-ctos-cipher
{ 3des | aes128 | aes256 | des } |
prefer-ctos-hmac { md5 | md5-96 | sha1 |
sha1-96 } | prefer-kex { dh-group-exchange |
dh-group1 | dh-group14 } | prefer-stoc-cipher
{ 3des | aes128 | aes256 | des } |
prefer-stoc-hmac { md5 | md5-96 | sha1 |
sha1-96 } ] * [ dscp dscp-value | escape
Establish a character | publickey keyname | source
connection to an IPv4 { interface interface-type interface-number | ip Available in user view.
Stelnet server. ip-address } ] *
• In FIPS mode:
ssh2 server [ port-number ] [ vpn-instance
vpn-instance-name ] [ identity-key rsa |
prefer-compress zlib | prefer-ctos-cipher
{ aes128 | aes256 } | prefer-ctos-hmac { sha1 |
sha1-96 } | prefer-kex dh-group14 |
prefer-stoc-cipher { aes128 | aes256 } |
prefer-stoc-hmac { sha1 | sha1-96 } ] *
[ escape character | publickey keyname |
source { interface interface-type
interface-number | ip ip-address } ] *
402
Configuring the device as an SFTP client
SFTP client configuration task list
Tasks at a glance Remarks
Only required when the SFTP server uses
(Required.) Generating local DSA or RSA key pairs the authentication method publickey,
password-publickey, or any.
(Optional.) Specifying the source IP address for SFTP packets N/A
(Required.) Establishing a connection to an SFTP server N/A
(Optional.) Working with SFTP directories N/A
(Optional.) Working with SFTP files N/A
(Optional.) Displaying help information N/A
(Optional.) Terminating the connection with the SFTP server N/A
403
Step Command Remarks
1. Enter system view. system-view N/A
404
Task Command Remarks
• In non-FIPS mode:
sftp ipv6 server [ port-number ] [ vpn-instance
vpn-instance-name ] [ -i interface-type
interface-number ] [ identity-key { dsa | rsa } | prefer-
compress zlib | prefer-ctos-cipher { 3des | aes128 |
aes256 | des } | prefer-ctos-hmac { md5 | md5-96 |
sha1 | sha1-96 } | prefer-kex { dh-group-exchange |
dh-group1 | dh-group14 } | prefer-stoc-cipher
{ 3des | aes128 | aes256 | des } | prefer-stoc-hmac
{ md5 | md5-96 | sha1 | sha1-96 } ] * [ dscp
Establish a dscp-value | publickey keyname | source { interface
connection to an interface-type interface-number | ipv6
ipv6-address } ] * Available in user view.
IPv6 SFTP
server. • In FIPS mode:
sftp ipv6 server [ port-number ] [ vpn-instance
vpn-instance-name ] [ -i interface-type
interface-number ] [ identity-key rsa|
prefer-compress zlib | prefer-ctos-cipher { aes128
| aes256 } | prefer-ctos-hmac { sha1 | sha1-96 } |
prefer-kex dh-group14 | prefer-stoc-cipher
{ aes128 | aes256 } | prefer-stoc-hmac { sha1 |
sha1-96 } ] * [ publickey keyname | source
{ interface interface-type interface-number | ipv6
ipv6-address } ] *
405
Task Command Remarks
Download a file from the SFTP
get remote-file [ local-file ] Available in SFTP client view.
server and save it locally.
Upload a local file to the SFTP
put local-file [ remote-file ] Available in SFTP client view.
server.
406
• SSH supports locally generated DSA and RSA key pairs only with default names.
• The SCP client operating in FIPS mode supports only RSA key pairs. Do not generate local
DSA key pairs when the device operates as an SCP client in FIPS mode.
• The key modulus length must be less than 2048 bits when you generate a DSA key pair.
Configuration procedure
To generate local DSA or RSA key pairs on the SCP client:
407
Task Command Remarks
• In non-FIPS mode:
scp ipv6 server [ port-number ] [ vpn-instance
vpn-instance-name ] [ -i interface-type
interface-number ] { put | get } source-file-name
[ destination-file-name ] [ identity-key { dsa |
rsa } | prefer-compress zlib |
prefer-ctos-cipher { 3des | aes128 | aes256 |
des } | prefer-ctos-hmac { md5 | md5-96 | sha1 |
sha1-96 } | prefer-kex { dh-group-exchange |
dh-group1 | dh-group14 } | prefer-stoc-cipher
{ 3des | aes128 | aes256 | des } |
prefer-stoc-hmac { md5 | md5-96 | sha1 |
sha1-96 }] * [ publickey keyname | source
Connect to an IPv6 SCP { interface interface-type interface-number | ipv6
server, and transfer files ipv6-address } ] * Available in user view.
with the server.
• In FIPS mode:
scp ipv6 server [ port-number ] [ vpn-instance
vpn-instance-name ] [ -i interface-type
interface-number ] { put | get } source-file-name
[ destination-file-name ] [ identity-key rsa |
prefer-compress zlib | prefer-ctos-cipher
{ aes128 | aes256 } | prefer-ctos-hmac { sha1 |
sha1-96 } | prefer-kex dh-group14 |
prefer-stoc-cipher { aes128 | aes256 } |
prefer-stoc-hmac { sha1 | sha1-96 }] *
[ publickey keyname | source { interface
interface-type interface-number | ipv6
ipv6-address } ] *
Task Command
Display the source IP address configured for
display sftp client source
the SFTP client.
Display the source IP address configured for
display ssh client source
the Stelnet client.
Display SSH server status or sessions. display ssh server { session | status }
Display SSH user information on the SSH
display ssh user-information [ username ]
server.
display public-key local { dsa | rsa } public [ name
Display the public keys of the local key pairs.
publickey-name ]
Display information about peer public keys. display public-key peer [ brief | name publickey-name ]
408
• When the device acts as an Stelnet server, only RSA key pairs are supported. Do not generate
a DSA key pair on the Stelnet server.
Configuration procedure
1. Configure the Stelnet server:
# Generate RSA key pairs.
<Router> system-view
[Router] public-key local create rsa
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
........................++++++
...................++++++
..++++++++
............++++++++
Create the key pair successfully.
# Generate a DSA key pair.
[Router] public-key local create dsa
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
.++++++++++++++++++++++++++++++++++++++++++++++++++*
........+......+.....+......................................+
...+.................+..........+...+.
Create the key pair successfully.
# Enable the Stelnet server.
[Router] ssh server enable
409
# Assign an IP address to GigabitEthernet 2/0/1. The Stelnet client uses this IP address as the
destination for SSH connection.
[Router] interface gigabitethernet 2/0/1
[Router-GigabitEthernet2/0/1] ip address 192.168.1.40 255.255.255.0
[Router-GigabitEthernet2/0/1] quit
# Set the authentication mode to AAA for the user lines.
[Router] line vty 0 15
[Router-line-vty0-15] authentication-mode scheme
[Router-line-vty0-15] quit
# Create a local device management user client001.
[Router] local-user client001 class manage
# Set the password to aabbcc in plain text for the local user client001.
[Router-luser-manage-client001] password simple aabbcc
# Authorize the local user client001 to use the SSH service.
[Router-luser-manage-client001] service-type ssh
# Assign the user role network-admin to the local user client001.
[Router-luser-manage-client001] authorization-attribute user-role network-admin
[Router-luser-manage-client001] quit
# Create an SSH user client001. Specify the service type as stelnet and the authentication
method as password for the user.
[Router] ssh user client001 service-type stelnet authentication-type password
2. Establish a connection to the Stelnet server:
There are different types of Stelnet client software, such as PuTTY and OpenSSH. This
example uses an Stelnet client that runs PuTTY version 0.58.
To establish a connection to the Stelnet server:
a. Launch PuTTY.exe to enter the interface shown in Figure 117.
b. In the Host Name (or IP address) field, enter the IP address 192.168.1.40 of the Stelnet
server.
410
Figure 117 Specifying the host name (or IP address)
411
Configuration procedure
In the server configuration, the client's host public key is required. Use the client software to generate
RSA key pairs on the client before configuring the Stelnet server.
There are different types of Stelnet client software, such as PuTTY and OpenSSH. This example
uses an Stelnet client that runs PuTTY version 0.58.
The configuration procedure is as follows:
1. Generate RSA key pairs on the Stelnet client:
a. Run PuTTYGen.exe, select SSH-2 RSA and click Generate.
Figure 119 Generating a key pair on the client
b. Continuously move the mouse and do not place the mouse over the green progress bar
shown in Figure 120. Otherwise, the progress bar stops moving and the key pair generating
process stops.
412
Figure 120 Generating process
c. After the key pair is generated, click Save public key to save the public key.
A file saving window appears.
Figure 121 Saving a key pair on the client
413
e. On the page as shown in Figure 121, click Save private key to save the private key.
A confirmation dialog box appears.
f. Click Yes.
A file saving window appears.
g. Enter a file name (private.ppk in this example), and click Save.
h. Transmit the public key file to the server through FTP or TFTP. (Details not shown.)
2. Configure the Stelnet server:
# Generate RSA key pairs.
<Router> system-view
[Router] public-key local create rsa
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
........................++++++
...................++++++
..++++++++
............++++++++
Create the key pair successfully.
# Generate a DSA key pair.
[Router] public-key local create dsa
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
.++++++++++++++++++++++++++++++++++++++++++++++++++*
........+......+.....+......................................+
...+.................+..........+...+
Create the key pair successfully.
# Enable the Stelnet server.
[Router] ssh server enable
# Assign an IP address to GigabitEthernet 2/0/1. The Stelnet client uses this address as the
destination for SSH connection.
[Router] interface gigabitethernet 2/0/1
[Router-GigabitEthernet2/0/1] ip address 192.168.1.40 255.255.255.0
[Router-GigabitEthernet2/0/1] quit
# Set the authentication mode to AAA for the user lines.
[Router] line vty 0 15
[Router-line-vty0-15] authentication-mode scheme
[Router-line-vty0-15] quit
# Import the peer public key from file key.pub and name it clientkey.
[Router] public-key peer clientkey import sshkey key.pub
# Create an SSH user client002. Specify the authentication method as publickey for the user,
and assign the public key clientkey to the user.
[Router] ssh user client002 service-type stelnet authentication-type publickey assign
publickey clientkey
414
# Create a local device management user client002.
[Router] local-user client002 class manage
# Authorize the local user client002 to use the SSH service.
[Router-luser-manage-client002] service-type ssh
# Assign the user role network-admin to the user client002.
[Router-luser-manage-client002] authorization-attribute user-role network-admin
[Router-luser-manage-client002] quit
3. Specify the private key file and establish a connection to the Stelnet server:
a. Launch PuTTY.exe on the Stelnet client to enter the interface shown in Figure 122.
b. In the Host Name (or IP address) field, enter the IP address 192.168.1.40 of the Stelnet
server.
Figure 122 Specifying the host name (or IP address)
415
Figure 123 Specifying the preferred SSH version
e. Select Connection > SSH > Auth from the navigation tree.
The window shown in Figure 124 appears.
f. Click Browse… to bring up the file selection window, navigate to the private key file
(private.ppk in this example), and click OK.
Figure 124 Specifying the private key file
416
g. Click Open to connect to the server.
If the connection is successfully established, the system notifies you to enter the username.
After entering the username (client002), you can enter the CLI of the server.
Configuration procedure
1. Configure the Stelnet server:
# Generate RSA key pairs.
<RouterB> system-view
[RouterB] public-key local create rsa
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
........................++++++
...................++++++
..++++++++
............++++++++
Create the key pair successfully.
# Generate a DSA key pair.
[RouterB] public-key local create dsa
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
.++++++++++++++++++++++++++++++++++++++++++++++++++*
........+......+.....+......................................+
...+.................+..........+...+
Create the key pair successfully.
# Enable the Stelnet server.
417
[RouterB] ssh server enable
# Assign an IP address to GigabitEthernet 2/0/1. The Stelnet client uses this address as the
destination address for SSH connection.
[RouterB] interface gigabitethernet 2/0/1
[RouterB-GigabitEthernet2/0/1] ip address 192.168.1.40 255.255.255.0
[RouterB-GigabitEthernet2/0/1] quit
# Set the authentication mode to AAA for the user lines.
[RouterB] line vty 0 15
[RouterB-line-vty0-15] authentication-mode scheme
[RouterB-line-vty0-15] quit
# Create a local device management user client001.
[RouterB] local-user client001 class manage
# Set the password to aabbcc in plain text for the local user client001.
[RouterB-luser-manage-client001] password simple aabbcc
# Authorize the local user client001 to use the SSH service.
[RouterB-luser-manage-client001] service-type ssh
# Assign the user role network-admin to the local user client001.
[RouterB-luser-manage-client001] authorization-attribute user-role network-admin
[RouterB-luser-manage-client001] quit
# Create an SSH user client001. Specify the service type as stelnet and the authentication
method as password for the user.
[RouterB] ssh user client001 service-type stelnet authentication-type password
2. Establish a connection to the Stelnet server 192.168.1.40:
# Assign an IP address to GigabitEthernet 2/0/1.
<RouterA> system-views
[RouterA] interface gigabitethernet 2/0/1
[RouterA-GigabitEthernet2/0/1] ip address 192.168.1.56 255.255.255.0
[RouterA-GigabitEthernet2/0/1] quit
[RouterA] quit
Before establishing a connection to the server, you can configure the server's host public key
on the client to authenticate the server.
{ To configure the server's host public key on the client, perform the following tasks:
# Use the display public-key local dsa public command on the server to display the
server's host public key. (Details not shown.)
# Enter public key view of the client and copy the host public key of the server to the client.
[RouterA] public-key peer key1
Enter public key view. Return to system view with "peer-public-key end" command.
[RouterA-pkey-public-key-key1]
308201B73082012C06072A8648CE3804013082011F0281810
0D757262C4584C44C211F18BD96E5F0
[RouterA-pkey-public-key-key1]61C4F0A423F7FE6B6B85B34CEF72CE14A0D3A5222FE08CEC
E
65BE6C265854889DC1EDBD13EC8B274
[RouterA-pkey-public-key-key1]DA9F75BA26CCB987723602787E922BA84421F22C3C89CB9B
0
6FD60FE01941DDD77FE6B12893DA76E
[RouterA-pkey-public-key-key1]EBC1D128D97F0678D7722B5341C8506F358214B16A2FAC4B
3
418
68950387811C7DA33021500C773218C
[RouterA-pkey-public-key-key1]737EC8EE993B4F2DED30F48EDACE915F0281810082269009
E
14EC474BAF2932E69D3B1F18517AD95
[RouterA-pkey-public-key-key1]94184CCDFCEAE96EC4D5EF93133E84B47093C52B20CD35D0
2
492B3959EC6499625BC4FA5082E22C5
[RouterA-pkey-public-key-key1]B374E16DD00132CE71B020217091AC717B612391C76C1FB2
E
88317C1BD8171D41ECB83E210C03CC9
[RouterA-pkey-public-key-key1]B32E810561C21621C73D6DAAC028F4B1585DA7F42519718C
C
9B09EEF0381840002818000AF995917
[RouterA-pkey-public-key-key1]E1E570A3F6B1C2411948B3B4FFA256699B3BF871221CC9C5
D
F257523777D033BEE77FC378145F2AD
[RouterA-pkey-public-key-key1]D716D7DB9FCABB4ADBF6FB4FDB0CA25C761B308EF53009F7
1
01F7C62621216D5A572C379A32AC290
[RouterA-pkey-public-key-key1]E55B394A217DA38B65B77F0185C8DB8095522D1EF044B465
E
8716261214A5A3B493E866991113B2D
[RouterA-pkey-public-key-key1]485348
[RouterA-pkey-public-key-key1] peer-public-key end
[RouterA] quit
# Establish an SSH connection to the server, and specify the host public key of the server as
key1.
<RouterA> ssh2 192.168.1.40 publickey key1
Username: client001
Press CTRL+C to abort.
Connecting to 192.168.1.40 port 22.
[email protected]'s password:
Enter a character ~ and a dot to abort.
******************************************************************************
* Copyright (c) 2010-2015 Hewlett Packard Enterprise Development LP. *
* Without the owner's prior written consent, *
* no decompiling or reverse-engineering shall be allowed. *
******************************************************************************
<RouterB>
After you enter the correct password, you log in to Router B successfully.
{ If the client does not have the server's host public key, the system will notify you to confirm
the further access when you access the server. Select Yes to access the server and
download the server's host public key.
<RouterA> ssh2 192.168.1.40
Username: client001
Press CTRL+C to abort.
Connecting to 192.168.1.40 port 22.
The server is not authenticated. Continue? [Y/N]:y
419
Do you want to save the server public key? [Y/N]:y
[email protected]'s password:
Enter a character ~ and a dot to abort.
******************************************************************************
* Copyright (c) 2010-2015 Hewlett Packard Enterprise Development LP. *
* Without the owner's prior written consent, *
* no decompiling or reverse-engineering shall be allowed. *
******************************************************************************
<RouterB>
After you enter the correct password, you can access Router B successfully. At the next
connection attempt, the client authenticates the server by using the saved server's host
public key on the client.
Configuration procedure
In the server configuration, the client's host public key is required. Generate a DSA key pair on the
client before configuring the Stelnet server.
1. Configure the Stelnet client:
# Assign an IP address to GigabitEthernet 2/0/1.
<RouterA> system-view
[RouterA] interface gigabitethernet 2/0/1
[RouterA-GigabitEthernet2/0/1] ip address 192.168.1.56 255.255.255.0
[RouterA-GigabitEthernet2/0/1] quit
# Generate a DSA key pair.
[RouterA] public-key local create dsa
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
.++++++++++++++++++++++++++++++++++++++++++++++++++*
........+......+.....+......................................+
420
...+.................+..........+...+
Create the key pair successfully.
# Export the DSA host public key to the file key.pub.
[RouterA] public-key local export dsa ssh2 key.pub
[RouterA] quit
# Transmit the public key file key.pub to the server through FTP or TFTP. (Details not shown.)
2. Configure the Stelnet server:
# Generate RSA key pairs.
<RouterB> system-view
[RouterB] public-key local create rsa
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
........................++++++
...................++++++
..++++++++
............++++++++
Create the key pair successfully.
# Generate a DSA key pair.
[RouterB] public-key local create dsa
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
.++++++++++++++++++++++++++++++++++++++++++++++++++*
........+......+.....+......................................+
...+.................+..........+...+
Create the key pair successfully.
# Enable the Stelnet server.
[RouterB] ssh server enable
# Assign an IP address to GigabitEthernet 2/0/1. The Stelnet client uses this address as the
destination address for SSH connection.
[RouterB] interface gigabitethernet 2/0/1
[RouterB-GigabitEthernet2/0/1] ip address 192.168.1.40 255.255.255.0
[RouterB-GigabitEthernet2/0/1] quit
# Set the authentication mode to AAA for the user lines.
[RouterB] line vty 0 15
[RouterB-line-vty0-15] authentication-mode scheme
[RouterB-line-vty0-15] quit
# Import the peer public key from the file key.pub, and name it clientkey.
[RouterB] public-key peer clientkey import sshkey key.pub
# Create an SSH user client002. Specify the authentication method as publickey for the user,
and assign the public key clientkey to the user.
[RouterB] ssh user client002 service-type stelnet authentication-type publickey
assign publickey clientkey
421
# Create a local device management user client002.
[RouterB] local-user client002 class manage
# Authorize the local user client002 to use the SSH service.
[RouterB-luser-manage-client002] service-type ssh
# Assign the user role network-admin to the local user client002.
[RouterB-luser-manage-client002] authorization-attribute user-role network-admin
[RouterB-luser-manage-client002] quit
3. Establish an SSH connection to the Stelnet server 192.168.1.40.
<RouterA> ssh2 192.168.1.40
Username: client002
Press CTRL+C to abort.
Connecting to 192.168.1.40 port 22.
The server is not authenticated. Continue? [Y/N]:y
Do you want to save the server public key? [Y/N]:n
Enter a character ~ and a dot to abort.
******************************************************************************
* Copyright (c) 2010-2015 Hewlett Packard Enterprise Development LP. *
* Without the owner's prior written consent, *
* no decompiling or reverse-engineering shall be allowed. *
******************************************************************************
<RouterB>
Select Yes to access the server and download the server's host public key. At the next
connection attempt, the client authenticates the server by using the saved server's host public
key on the client.
422
Figure 127 Network diagram
Configuration procedure
1. Configure the SFTP server:
# Generate RSA key pairs.
<Router> system-view
[Router] public-key local create rsa
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
........................++++++
...................++++++
..++++++++
............++++++++
Create the key pair successfully.
# Generate a DSA key pair.
[Router] public-key local create dsa
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
.++++++++++++++++++++++++++++++++++++++++++++++++++*
........+......+.....+......................................+
...+.................+..........+...+
Create the key pair successfully.
# Enable the SFTP server.
[Router] sftp server enable
# Assign an IP address to GigabitEthernet 2/0/1. The client uses this address as the destination
for SSH connection.
[Router] interface gigabitethernet 2/0/1
[Router-GigabitEthernet2/0/1] ip address 192.168.1.45 255.255.255.0
[Router-GigabitEthernet2/0/1] quit
# Create a local device management user client002.
[Router] local-user client002 class manage
# Set the password to aabbcc in plain text for the local user client002.
[Router-luser-manage-client002] password simple aabbcc
# Authorize the local user client002 to use the SSH service.
[Router-luser-manage-client002] service-type ssh
# Assign the user role network-admin and the working directory flash:/ to the local user
client002.
423
[Router-luser-manage-client002] authorization-attribute user-role network-admin
work-directory flash:/
[Router-luser-manage-client002] quit
# Create an SSH user client002. Specify the authentication method as password and service
type as sftp for the user.
[Router] ssh user client002 service-type sftp authentication-type password
2. Establish a connection to the SFTP server:
The device supports different types of SFTP client software. This example uses an SFTP client
that runs PSFTP of PuTTY version 0.58.
NOTE:
PSFTP supports only password authentication.
424
Figure 129 Network diagram
Configuration procedure
In the server configuration, the client's host public key is required. Generate RSA key pairs on the
client before configuring the SFTP server.
1. Configure the SFTP client:
# Assign an IP address to GigabitEthernet 2/0/1.
<RouterA> system-view
[RouterA] interface gigabitethernet 2/0/1
[RouterA-GigabitEthernet2/0/1] ip address 192.168.0.2 255.255.255.0
[RouterA-GigabitEthernet2/0/1] quit
# Generate RSA key pairs.
[RouterA] public-key local create rsa
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
........................++++++
...................++++++
..++++++++
............++++++++
Create the key pair successfully.
# Export the host public key to the file pubkey.
[RouterA] public-key local export rsa ssh2 pubkey
[RouterA] quit
# Transmit the public key file pubkey to the server through FTP or TFTP. (Details not shown.)
2. Configure the SFTP server:
# Generate RSA key pairs.
<RouterB> system-view
[RouterB] public-key local create rsa
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
........................++++++
...................++++++
..++++++++
............++++++++
Create the key pair successfully.
# Generate a DSA key pair.
[RouterB] public-key local create dsa
425
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
.++++++++++++++++++++++++++++++++++++++++++++++++++*
........+......+.....+......................................+
...+.................+..........+...+
Create the key pair successfully.
# Enable the SFTP server.
[RouterB] sftp server enable
# Assign an IP address to GigabitEthernet 2/0/1. The client uses this address as the destination
address for SSH connection.
[RouterB] interface gigabitethernet 2/0/1
[RouterB-GigabitEthernet2/0/1] ip address 192.168.0.1 255.255.255.0
[RouterB-GigabitEthernet2/0/1] quit
# Import the peer public key from the file pubkey, and name it routerkey.
[RouterB] public-key peer routerkey import sshkey pubkey
# Create an SSH user client001. Specify the service type as sftp and the authentication
method as publickey for the user. Assign the public key routerkey to the user.
[RouterB] ssh user client001 service-type sftp authentication-type publickey assign
publickey routerkey
# Create a local device management user client001.
[RouterB] local-user client001 class manage
# Authorize the local user client001 to use the SSH service.
[RouterB-luser-manage-client001] service-type ssh
# Assign the user role network-admin and the working directory flash:/ to the local user
client001.
[RouterB-luser-manage-client001] authorization-attribute user-role network-admin
work-directory flash:/
[RouterB-luser-manage-client001] quit
3. Establish a connection between the SFTP client and the SFTP server:
# Establish a connection to the SFTP server and enter SFTP client view.
<RouterA> sftp 192.168.0.1 identity-key rsa
Username: client001
Press CTRL+C to abort.
Connecting to 192.168.0.1 port 22.
The server is not authenticated. Continue? [Y/N]:y
Do you want to save the server public key? [Y/N]:n
sftp>
# Display files under the current directory of the server, delete the file z, and verify the result.
sftp> dir -l
-rwxrwxrwx 1 noone nogroup 1759 Aug 23 06:52 config.cfg
-rwxrwxrwx 1 noone nogroup 225 Aug 24 08:01 pubkey2
-rwxrwxrwx 1 noone nogroup 283 Aug 24 07:39 pubkey
drwxrwxrwx 1 noone nogroup 0 Sep 01 06:22 new
-rwxrwxrwx 1 noone nogroup 225 Sep 01 06:55 pub
-rwxrwxrwx 1 noone nogroup 0 Sep 01 08:00 z
426
sftp> delete z
Removing /z
sftp> dir -l
-rwxrwxrwx 1 noone nogroup 1759 Aug 23 06:52 config.cfg
-rwxrwxrwx 1 noone nogroup 225 Aug 24 08:01 pubkey2
-rwxrwxrwx 1 noone nogroup 283 Aug 24 07:39 pubkey
drwxrwxrwx 1 noone nogroup 0 Sep 01 06:22 new
-rwxrwxrwx 1 noone nogroup 225 Sep 01 06:55 pub
# Add a directory new1 and verify the result.
sftp> mkdir new1
sftp> dir -l
-rwxrwxrwx 1 noone nogroup 1759 Aug 23 06:52 config.cfg
-rwxrwxrwx 1 noone nogroup 225 Aug 24 08:01 pubkey2
-rwxrwxrwx 1 noone nogroup 283 Aug 24 07:39 pubkey
drwxrwxrwx 1 noone nogroup 0 Sep 01 06:22 new
-rwxrwxrwx 1 noone nogroup 225 Sep 01 06:55 pub
drwxrwxrwx 1 noone nogroup 0 Sep 02 06:30 new1
# Rename the directory new1 to new2 and verify the result.
sftp> rename new1 new2
sftp> dir
-rwxrwxrwx 1 noone nogroup 1759 Aug 23 06:52 config.cfg
-rwxrwxrwx 1 noone nogroup 225 Aug 24 08:01 pubkey2
-rwxrwxrwx 1 noone nogroup 283 Aug 24 07:39 pubkey
drwxrwxrwx 1 noone nogroup 0 Sep 01 06:22 new
-rwxrwxrwx 1 noone nogroup 225 Sep 01 06:55 pub
drwxrwxrwx 1 noone nogroup 0 Sep 02 06:33 new2
# Download the pubkey2 file from the server and save it as a local file public.
sftp> get pubkey2 public
Fetching / pubkey2 to public
/pubkey2 100% 225 1.4KB/s 00:00
# Upload a local file pu to the server, save it as puk, and verify the result.
sftp> put pu puk
Uploading pu to / puk
sftp> dir
-rwxrwxrwx 1 noone nogroup 1759 Aug 23 06:52 config.cfg
-rwxrwxrwx 1 noone nogroup 225 Aug 24 08:01 pubkey2
-rwxrwxrwx 1 noone nogroup 283 Aug 24 07:39 pubkey
drwxrwxrwx 1 noone nogroup 0 Sep 01 06:22 new
drwxrwxrwx 1 noone nogroup 0 Sep 02 06:33 new2
-rwxrwxrwx 1 noone nogroup 283 Sep 02 06:35 pub
-rwxrwxrwx 1 noone nogroup 283 Sep 02 06:36 puk
sftp>
# Exit SFTP client view.
sftp> quit
<RouterA>
427
SCP configuration example
Unless otherwise noted, devices in the configuration examples operate in non-FIPS mode.
When you configure SCP on a device that operates in FIPS mode, follow these restrictions and
guidelines:
• The modulus length of the key pair must be 2048 bits.
• When the device acts as an SCP server, only RSA key pairs are supported. Do not generate a
DSA key pair on the SCP server.
Network requirements
As shown in Figure 130:
• Router B uses the password authentication method.
• The client's username and password are saved on Router B.
Establish an SCP connection between Router A and Router B, so you can log in to Router B to
transfer files.
Figure 130 Network diagram
Configuration procedure
1. Configure the SCP server:
# Generate RSA key pairs.
<RouterB> system-view
[RouterB] public-key local create rsa
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
........................++++++
...................++++++
..++++++++
............++++++++
Create the key pair successfully.
# Generate a DSA key pair.
[RouterB] public-key local create dsa
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
428
.++++++++++++++++++++++++++++++++++++++++++++++++++*
........+......+.....+......................................+
...+.................+..........+...+.
Create the key pair successfully.
# Enable the SCP server.
[RouterB] scp server enable
# Assign an IP address to GigabitEthernet 2/0/1. The client uses this address as the destination
for SCP connection.
[RouterB] interface gigabitethernet 2/0/1
[RouterB-GigabitEthernet2/0/1] ip address 192.168.0.1 255.255.255.0
[RouterB-GigabitEthernet2/0/1] quit
# Create a local device management user client001.
[RouterB] local-user client001 class manage
# Set the password to aabbcc in plain text for the local user client001.
[RouterB-luser-manage-client001] password simple aabbcc
# Authorize the local user client001 to use the SSH service.
[RouterB-luser-manage-client001] service-type ssh
# Assign the user role network-admin to the local user client001.
[RouterB-luser-manage-client001] authorization-attribute user-role network-admin
[RouterB-luser-manage-client001] quit
# Configure the SSH user client001. Specify the service type as scp and the authentication
method password for the user.
[RouterB] ssh user client001 service-type scp authentication-type password
2. Assign an IP address to GigabitEthernet 2/0/1 on the SCP client.
<RouterA> system-view
[RouterA] interface gigabitethernet 2/0/1
[RouterA-GigabitEthernet2/0/1] ip address 192.168.0.2 255.255.255.0
[RouterA-GigabitEthernet2/0/1] quit
[RouterA] quit
3. Connect to the SCP server, download the file remote.bin from the server, and save it locally to
the file local.bin.
<RouterA> scp 192.168.0.1 get remote.bin local.bin
Username: client001
Press CTRL+C to abort.
Connecting to 192.168.0.1 port 22.
The server is not authenticated. Continue? [Y/N]:y
Do you want to save the server public key? [Y/N]:n
[email protected]’s password:
remote.bin 100% 2875 2.8KB/s 00:00
429
• When the device acts as a NETCONF-over-SSH server, only RSA key pairs are supported. Do
not generate a DSA key pair on the NETCONF-over-SSH server.
Network requirements
As shown in Figure 131:
• The router uses local password authentication.
• The client's username and password are saved on the router.
Establish a NETCONF-over-SSH connection between the host and the router, so that you can log in
to the router to perform NETCONF operations.
Figure 131 Network diagram
Configuration procedure
# Generate RSA key pairs.
<Router> system-view
[Router] public-key local create rsa
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
........................++++++
...................++++++
..++++++++
............++++++++
Create the key pair successfully.
# Assign an IP address to GigabitEthernet 2/0/1. The client uses this address as the destination for
NETCONF-over-SSH connection.
430
[Router] interface gigabitethernet 2/0/1
[Router-GigabitEthernet2/0/1] ip address 192.168.1.40 255.255.255.0
[Router-GigabitEthernet2/0/1] quit
# Set the password to aabbcc in plain text for the local user client001.
[Router-luser-manage-client001] password simple aabbcc
# Configure an SSH user client001. Specify the service type as NETCONF and the authentication
method as password for the user.
[Router] ssh user client001 service-type netconf authentication-type password
431
Configuring SSL
Overview
Secure Sockets Layer (SSL) is a cryptographic protocol that provides communication security for
TCP-based application layer protocols such as HTTP. SSL has been widely used in applications
such as e-business and online banking to provide secure data transmission over the Internet.
432
Figure 133 SSL protocol stack
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for
features, commands, and parameters might differ in FIPS mode (see "Configuring FIPS") and
non-FIPS mode.
433
Configuring an SSL server policy
An SSL server policy is a set of SSL parameters used by the SSL server. An SSL server policy takes
effect only after it is associated with an application such as HTTPS.
NOTE:
SSL versions include SSL 2.0, SSL 3.0, and TLS 1.0 (or SSL 3.1). By default, the SSL server can
communicate with clients running SSL 3.0 or TLS 1.0. When the server receives an SSL 2.0 Client
Hello message from a client that supports both SSL 2.0 and SSL 3.0/TLS 1.0, it notifies the client to
use SSL 3.0 or TLS 1.0 for communication.
434
Step Command Remarks
By default, SSL client
authentication is disabled. The
SSL server does not perform
digital certificate-based
authentication on SSL clients.
6. (Optional.) Enable mandatory When authenticating a client
or optional SSL client client-verify { enable | optional } by using the digital certificate,
authentication. the SSL server verifies the
certificate chain presented by
the client. It also checks that
the certificates in the certificate
chain (except the root CA
certificate) are not revoked.
435
Step Command Remarks
• In non-FIPS mode:
5. Specify the SSL version version { ssl3.0 | tls1.0 } By default, an SSL client policy
for the SSL client policy. • In FIPS mode: uses TLS 1.0.
version tls1.0
6. Enable the SSL client to
authenticate servers By default, SSL server
through digital server-verify enable
authentication is enabled.
certificates.
Task Command
Display SSL server policy information. display ssl server-policy [ policy-name ]
Display SSL client policy information. display ssl client-policy [ policy-name ]
Configuration considerations
To meet the network requirements, perform the following tasks:
• Configure Device to work as the HTTPS server and request a certificate for Device. For more
information about HTTPS, see Fundamentals Configuration Guide.
• Request a certificate for Host so that Device can authenticate the identity of Host.
Configuration procedure
Before performing the following tasks, make sure Device, Host, and the CA server can reach each
other.
1. Configure the HTTPS server on Device:
436
# Create a PKI entity named en. Set the common name to http-server1 and the FQDN to
ssl.security.com for the entity.
<Device> system-view
[Device] pki entity en
[Device-pki-entity-en] common-name http-server1
[Device-pki-entity-en] fqdn ssl.security.com
[Device-pki-entity-en] quit
# Create PKI domain 1 and specify the name of the trusted CA as CA server. Set the URL of
the registration server to http://10.1.2.2/certsrv/mscep/mscep.dll, the authority for certificate
request to RA, and the entity for certificate request to en. Set the URL of the CRL repository to
http://10.1.2.2/CertEnroll/caserver.crl.
[Device] pki domain 1
[Device-pki-domain-1] ca identifier CA server
[Device-pki-domain-1] certificate request url
http://10.1.2.2/certsrv/mscep/mscep.dll
[Device-pki-domain-1] certificate request from ra
[Device-pki-domain-1] certificate request entity en
[Device-pki-domain-1] crl url http://10.1.2.2/CertEnroll/caserver.crl
# Configure a general-purpose RSA key pair named abc and set the key modulus length to
1024 bits.
[Device-pki-domain-1] public-key rsa general name abc length 1024
[Device-pki-domain-1] quit
# Generate the RSA key pair named abc.
[Device] public-key local create rsa name abc
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512,it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
..........................++++++
.....................................++++++
Create the key pair successfully.
# Obtain the CA certificate.
[Device] pki retrieve-certificate domain 1 ca
The trusted CA's finger print is:
MD5 fingerprint:7682 5865 ACC2 7B16 6F52 D60F D998 4484
SHA1 fingerprint:DF6B C53A E645 5C81 D6FC 09B0 3459 DFD1 94F6 3DDE
Is the finger print correct?(Y/N):y
Retrieved the certificates successfully.
# Generate a certificate request for Device.
[Device] pki request-certificate domain 1
Start to request general certificate ...
Certificate requested successfully.
# Create an SSL server policy named myssl.
[Device] ssl server-policy myssl
# Specify PKI domain 1 for the SSL server policy.
[Device-ssl-server-policy-myssl] pki-domain 1
# Enable client authentication.
[Device-ssl-server-policy-myssl] client-verify enable
437
[Device-ssl-server-policy-myssl] quit
# Configure the HTTPS service to use SSL server policy myssl.
[Device] ip https ssl-server-policy myssl
# Enable the HTTPS service.
[Device] ip https enable
# Create a local user named usera. Set the password to 123, service type to https, and user
role to network-admin.
[Device] local-user usera
[Device-luser-usera] password simple 123
[Device-luser-usera] service-type https
[Device-luser-usera] authorization-attribute user-role network-admin
2. Request a certificate for Host:
a. Launch IE on Host, and then enter http://10.1.2.2/certsrv in the address bar.
b. Request a client certificate for Host. (Details not shown.)
Verifying the configuration
Perform the following tasks on Host:
1. Launch IE and enter https://10.1.1.1 in the address bar.
2. Select the certificate issued by the CA server.
The login page of the device should appear.
3. Enter username usera and password 123.
Verify that now you can log in to the Web interface to access and manage the device.
438
Configuring ASPF
Overview
Advanced Stateful Packet Filter (ASPF) is proposed to address the issues that a packet-filter firewall
cannot solve. An ASPF provides the following main functions:
• Application layer protocol inspection—ASPF checks the application layer information of
packets, such as the protocol type and port number, and inspects the application layer protocol
status for each connection. ASPF maintains the status information of each connection, and
based on the status information, determines whether to permit a packet to pass through the
firewall into the internal network. In this way, ASPF defends the internal network against
attacks.
• Transport layer protocol inspection (generic TCP and UDP inspection)—ASPF checks a
TCP/UDP packet's source and destination addresses and port numbers to determine whether
to permit the packet to pass through the firewall into the internal network.
• ICMP error message check—ASPF inspects the connection information carried in an ICMP
error message. If the information does not match the connection, ASPF drops the packet.
• TCP SYN check—ASPF checks the first packet of a TCP connection to determine if it is a SYN
packet. If it is not a SYN packet, ASPF drops the packet. When a router attached to the network
starts up, it can receive a non-SYN packet of an existing TCP connection for the first time. If you
do not want to interrupt the existing TCP connection, you can disable the TCP SYN check. The
router allows the first non-SYN packet that is used to establish a TCP connection to pass. After
the network topology becomes steady, you can enable TCP SYN check again.
At the border of a network, ASPF can work with a packet-filter firewall to provide the network with a
more comprehensive security policy that better meets the actual needs. The packet-filter firewall
permits or denies packets according to ACL rules. The ASPF records information about the
permitted packets to ensure that their return packets can pass through the packet-filter firewall.
439
• Destination zone—A security zone for which the first packet of a traffic flow is destined.
For information about security zones, see Fundamentals Configuration Guide.
ASPF inspections
This section introduces the basic idea of ASPF inspection on application layer and transport layer
protocols.
Application layer protocol inspection
As shown in Figure 135, ACLs on the edge device deny incoming packets to the internal network.
The ASPF application layer protocol inspection allows return packets from the external network to
the internal network.
Figure 135 Application layer protocol inspection
440
Figure 136 FTP inspection
As shown in Figure 136, FTP connections are established and removed as follows:
1. The FTP client initiates an FTP control connection from port 1333 to port 21 of the FTP server.
2. As a result of negotiation, the server initiates a data connection from port 20 to port 1600 of the
client.
3. When data transmission times out or ends, the data connection is removed.
ASPF implements FTP inspection during the FTP connection lifetime as follows:
1. ASPF checks the IP packets the FTP client sends to the FTP server to identify TCP-based FTP
packets. Based on the port number, ASPF identifies the control connection between the FTP
client and server and creates a control connection session entry.
2. ASPF checks each FTP control connection packet, and examines their TCP status based on
the control connection session entry. ASPF analyzes the FTP instructions in the control
connection packet. If the packet contains a data channel setup instruction, ASPF creates an
associated entry for the data connection.
3. For return FTP control connection packets, ASPF examines their TCP status based on the
control connection session entry to make packet forwarding decisions.
4. When the FTP data passes through the device, ASPF is triggered to create a session entry for
the data connection and remove the associated entry.
5. For returned FTP data packets, ASPF examines their TCP status based on the data connection
session entry to make packet forwarding decisions.
6. When the data transmission ends, ASPF removes the data connection session entry. When the
FTP connection is removed, ASPF removes the control connection session entry.
Transport layer protocol inspection
The transport layer protocol inspection refers to generic TCP/UDP inspection. It creates session
entries to record the transport layer information of the packets to dynamically filter TCP and UDP
packets. The transport layer information includes source and destination addresses and port
numbers.
Generic TCP/UDP inspection requires that return packets must match the corresponding packets
that are previously sent out of the external interface. The return packets must have the same
source/destination addresses and source/destination port numbers as the outgoing packets (but
reversed). Otherwise, the return packets are blocked. For multichannel application layer protocols
like FTP, the deployment of TCP inspection without application layer inspection leads to failure of
establishing a data connection.
441
Command and hardware compatibility
Commands and descriptions for centralized devices apply to the following routers:
• MSR1002-4/1003-8S.
• MSR2003.
• MSR2004-24/2004-48.
• MSR3012/3024/3044/3064.
• MSR954(JH296A/JH297A/JH299A)
Commands and descriptions for distributed devices apply to MSR4060 and MSR4080 routers.
442
Step Command Remarks
By default, TCP SYN check is
5. (Optional.) Enable TCP SYN disabled. ASPF does not drop the
check. tcp syn-check non-SYN packet when it is the first
packet to establish a TCP
connection.
You can apply an ASPF policy to a zone pair to inspect traffic from the source zone to the destination
zone. ASPF compares all packets with session entries. If a packet that is permitted by packet filtering
does not match any existing session entries, ASPF creates a new session entry.
ASPF for a zone pair takes effect only when it functions with a packet filter:
443
• The packet filter allows only solicited access from the source zone to the network that the
destination zone connects.
• The ASPF policy compares the packets against session entries and allows matching packets
from the source zone to the destination zone. The policy also allows return packets from the
destination zone to the source zone.
To apply an ASPF policy to a zone pair:
Task Command
Display the configuration of all ASPF policies
display aspf all
and their applications to interfaces.
Display ASPF policy applications to
display aspf interface
interfaces.
Display the configuration of an ASPF policy. display aspf policy aspf-policy-number
Display ASPF sessions (centralized devices
display aspf session [ ipv4 | ipv6] [ verbose ]
in standalone mode).
Display ASPF sessions (distributed devices in
display aspf session [ ipv4 | ipv6 ] [ slot slot-number ]
standalone mode/centralized devices in IRF
[ verbose ]
mode).
Display ASPF sessions (distributed devices in display aspf session [ ipv4 | ipv6 ] [ chassis
IRF mode). chassis-number slot slot-number ] [ verbose ]
Clear ASPF session statistics (centralized
reset aspf session [ ipv4 | ipv6 ]
devices in standalone mode).
Clear ASPF session statistics (distributed
devices in standalone mode/centralized reset aspf session [ ipv4 | ipv6 ] [ slot slot-number ]
devices in IRF mode).
Clear ASPF session statistics (distributed reset aspf session [ ipv4 | ipv6 ] [ chassis
devices in IRF mode). chassis-number slot slot-number ]
444
ASPF configuration examples
ASPF FTP application inspection configuration example
Network requirements
Configure an ASPF policy on Router A to inspect the FTP traffic flows passing through Router A.
Only return packets for FTP connections initiated by users on the internal network are permitted to
pass through Router A and get into the internal network. All other types of packets from the external
network to the internal network are blocked.
Figure 137 Network diagram
Configuration procedure
# Configure ACL 3111 to deny all IP packets.
<RouterA> system-view
[RouterA] acl advanced 3111
[RouterA-acl-ipv4-adv-3111] rule deny ip
[RouterA-acl-ipv4-adv-3111] quit
# Apply ACL 3111 to deny all incoming IP packets on interface GigabitEthernet 2/0/1.
[RouterA] interface gigabitethernet 2/0/1
[RouterA-GigabitEthernet2/0/1] packet-filter 3111 inbound
445
Protocol: TCP(6)
# Verify that only the return packets of FTP connections can enter the internal network. (Details not
shown.)
Configuration procedure
# Configure ACL 3111 to deny all IP packets.
<RouterA> system-view
[RouterA] acl advanced 3111
[RouterA-acl-ipv4-adv-3111] rule deny ip
[RouterA-acl-ipv4-adv-3111] quit
# Apply ACL 3111 to deny all incoming IP packets on interface GigabitEthernet 2/0/1.
[RouterA] interface gigabitethernet 2/0/1
[RouterA-GigabitEthernet2/0/1] packet-filter 3111 inbound
446
Verifying the configuration
# Display the configuration of ASPF policy 1.
<RouterA> display aspf policy 1
ASPF policy configuration:
Policy number: 1
Enable ICMP error message check
Enable TCP SYN packet check
Detect these protocols:
TCP
Router A can recognize faked ICMP error messages from external networks, and drop the non-SYN
packets that are the first packets to establish TCP connections.
Configuration procedure
# Create ACL 3200 and configure two rules in the ACL: one to permit packets destined to
Gatekeeper to pass, and one to deny all IP packets.
<RouterA> system-view
[RouterA] acl advanced 3200
[RouterA-acl-ipv4-adv-3200] rule 0 permit ip destination 192.168.1.2 0
[RouterA-acl-ipv4-adv-3200] rule 5 deny ip
[RouterA-acl-ipv4-adv-3200] quit
447
# Apply ACL 3200 to filter incoming packets on interface GigabitEthernet 2/0/1.
[RouterA] interface gigabitethernet 2/0/1
[RouterA-GigabitEthernet2/0/1] packet-filter 3200 inbound
Initiator:
Source IP/port: 1.1.1.111/1719
Destination IP/port: 192.168.1.2/1719
VPN instance/VLAN ID/VLL ID: -/-/-
Protocol: UDP(17)
Initiator:
Source IP/port: 1.1.1.111/3521
Destination IP/port: 192.168.1.2/20155
VPN instance/VLAN ID/VLL ID: -/-/-
Protocol: TCP(6)
Initiator:
Source IP/port: 1.1.1.111/33185
Destination IP/port: 192.168.1.3/32829
VPN instance/VLAN ID/VLL ID: -/-/-
Protocol: UDP(17)
Initiator:
Source IP/port: 1.1.1.111/3688
Destination IP/port: 192.168.1.2/1720
VPN instance/VLAN ID/VLL ID: -/-/-
Protocol: TCP(6)
# Verify that only return packets that match the entries can pass through GigabitEthernet 2/0/1.
(Details not shown.)
448
Hardware Configuration example compatibility
MSR954(JH296A/JH297A/JH299A) No
MSR1002-4/1003-8S Yes
MSR2003 Yes
MSR2004-24/2004-48 Yes
MSR3012/3024/3044/3064 Yes
MSR4060/4080 Yes
Network requirements
Configure an ASPF policy on Router A to inspect FTP traffic that passes through Router A to
implement the following filtering:
• Permits only return packets for the FTP connections initiated by users on the internal network to
pass through Router A.
• Blocks all other types of packets from the external network to the internal network.
Figure 140 Network diagram
Configuration procedure
# Configure ACL 3500 to permit IP packets.
<Router> system-view
[Router] acl advanced 3500
[Router-acl-ipv4-adv-3500] rule permit ip
[Router-acl-ipv4-adv-3500] quit
# Apply the ACL to filter to permit outgoing packets in the zone pair.
449
[Router-zone-pair-security-Trust-Untrust] packet-filter 3500
# Verify that only return packets that match the entries can enter the internal network. (Details not
shown.)
450
Configuring APR
Overview
The application recognition (APR) feature enables QoS and ASPF to recognize application protocols
of packets sent on ports that are not well known. APR separately counts the number of packets or
bytes that an interface has received or sent based on application protocols. It also calculates the
transmission rates of the interface at the same time.
APR uses the following methods to recognize an application protocol:
• Port-based application recognition (PBAR).
• Group-based application recognition.
PBAR
PBAR maps a port to an application protocol and recognizes packets of the application protocol
according to the port-protocol mapping.
The port-protocol mappings include the following types:
• Predefined—An application protocol uses the port defined by the system.
• User-defined—An application protocol uses the port defined by the user.
PBAR offers the following mappings to maintain and apply user-defined port configuration:
• General port mapping—Maps a user-defined port to an application protocol. All packets
destined for that port are regarded as packets of the application protocol. For example, if port
2121 is mapped to FTP, all packets destined for that port are regarded as FTP packets.
• Host-port mapping—Maps a user-defined port to an application protocol for packets to or from
some specific hosts. For example, you can establish a host-port mapping so that all packets
destined for the network segment 10.110.0.0/16 on port 2121 are regarded as FTP packets. To
define the range of the hosts, you can specify the ACL, the host IP address range, or the
subnet.
Host-port mapping can be further divided into the following categories:
{ ACL-based host-port mapping—Maps a port to an application protocol for the packets
matching the specified ACL.
{ Subnet-based host-port mapping—Maps a port to an application protocol for the packets
sent to the specified subnet.
{ IP address-based host-port mapping—Maps a port to an application protocol for the
packets destined for the specified IP addresses.
451
The following types of application groups are available:
• Predefined—The predefined application groups exist on the device by default, and you cannot
modify or delete these application groups. To display the predefined application groups, use the
display app-group pre-defined command.
• User-defined—The user-defined application groups are manually created, and you can modify
or delete these application groups. To display the user-defined application groups, use the
display app-group user-defined command.
Configuring PBAR
Step Command Remarks
1. Enter system
view. system-view N/A
452
Configuring application groups
The device supports a maximum of 65536 applications groups, and each application group contains
a maximum of 65536 user-defined application protocols.
To configure an application group:
3. (Optional.) Configure a
description for the By default, the description is
user-defined application description group-description
"User-defined application group."
group.
By default, the user-defined
application group does not contain
any application protocols.
If the application statistics feature is enabled on an interface, the device separately counts the
number of packets or bytes that the interface has received or sent for each application protocol. It
also calculates the transmission rates of the interface for these protocols.
To display application statistics, use the display application statistics command.
To enable the application statistics feature on an interface:
453
Step Command Remarks
By default, this feature is disabled.
3. Enable application statistics application statistics enable You can enable the application
on an interface. [ inbound | outbound ] statistics feature on both the
inbound and outbound directions
of the interface.
Task Command
Display information about application display application [ name application-name | pre-defined |
protocols. user-defined ]
Display information about application display app-group [ name group-name | pre-defined |
groups. user-defined ]
Display statistics for the specified display application statistics [ direction { inbound |
application protocols (centralized devices in outbound } | interface interface-type interface-number |
standalone mode). name application-name ] *
Clear application statistics for an interface reset application statistics [ interface interface-type
or all interfaces. interface-number ]
454
APR configuration example
Network requirements
As shown in Figure 141, configure APR on the router to recognize the HTTP packets sent by the host
and destined for port 8080.
The router drops the packets recognized by APR.
Figure 141 Network diagram
Configuration procedure
# Create an application group named group1, and enter application group view.
<Router> system-view
[Router] app-group group1
# Create a traffic class named classifier_1, and match group1 to the class.
[Router] traffic classifier classifier_1
[Router-classifier-classifier_1] if-match app-group group1
[Router-classifier-classifier_1] quit
# Create a traffic behavior named bdeny, and configure the action as deny.
[Router] traffic behavior bdeny
[Router-behavior-bdeny] filter deny
[Router-behavior-bdeny] quit
# Create QoS policy 1, associate classifier_1 with traffic behavior bdeny to create a class-behavior
association in the QoS policy.
[Router] qos policy 1
[Router-qospolicy-1] classifier classifier_1 behavior bdeny
[Router-qospolicy-1] quit
# Apply the QoS policy to the inbound direction of interface GigabitEthernet 2/0/1.
[Router] interface gigabitethernet 2/0/1
[Router-GigabitEthernet2/0/1] qos apply policy 1 inbound
[Router-GigabitEthernet2/0/1] quit
455
Managing sessions
Overview
Session management is a common module, providing basic services for NAT, ASPF, and intrusion
detection and protection to implement their session-based services. Session management can be
applied for the follow purposes:
• Fast match between packets and sessions.
• Management of transport layer protocol states.
• Identification of application layer protocols.
• Session aging based on protocol states or application layer protocols.
• Persistent sessions.
• Special packet match for the application layer protocols requiring port negotiation.
• ICMP/ICMPv6 error control packet resolution and session match based on the resolution
results.
456
• Sets aging time for sessions based on application layer protocols.
• Supports ICMP/ICMPv6 error packet mapping, enabling the device to search for original
sessions according to the payloads in the ICMP/ICMPv6 error packets.
Because error packets are generated due to host errors, the mapping can help speed up the
aging of the original sessions.
• Supports persistent sessions, which are kept alive for a long period of time.
• Supports session management for the control channels and dynamic data channels of
application layer protocols, for example, FTP.
Except for configuring session logging, all other tasks are mutually independent and can be
configured in any order.
If a session in a certain protocol state has no packet hit before the aging time expires, the device
automatically removes the session.
To set the session aging time for different protocol states:
457
Step Command Remarks
The default aging time for
sessions in different protocol
states is as follows:
• FIN_WAIT: 30 seconds.
• ICMP-REPLY: 30 seconds.
• ICMP-REQUEST: 60
session aging-time state { fin | seconds.
2. Set the session aging time icmp-reply | icmp-request | • RAWIP-OPEN: 30 seconds.
rawip-open | rawip-ready | syn |
for different protocol states
tcp-est | udp-open | udp-ready } • RAWIP-READY: 60
time-value seconds.
• TCP SYN-SENT and
SYN-RCV: 30 seconds.
• TCP ESTABLISHED: 3600
seconds.
• UDP-OPEN: 30 seconds.
• UDP-READY: 60 seconds.
The aging time for session of different application layer protocols are valid for TCP sessions in
ESTABLISHED state or UDP sessions in READY state. If a session has no packet hit before the
aging time expires, the device automatically removes the session. For sessions used by other
application layer protocols, the aging time for sessions in different protocol states applies.
Set an appropriate aging time to guarantee protocol packet exchange. For example, if the aging time
for FTP session is shorter than the interval for sending FTP keepalive messages, an FTP session
cannot be maintained.
To set the session aging time for different application layer protocols:
458
Step Command Remarks
• RTSP: 3600 seconds.
• SCCP: 3600 seconds.
• SIP: 300 seconds.
• SQLNET: 600 seconds.
• TFTP: 60 seconds.
• XDMCP: 3600 seconds.
459
• Traffic-based logging—The device outputs a session log when the traffic amount of a session
reaches a threshold. After outputting a session log, the device resets the traffic counter for the
session. The traffic-based thresholds can be byte-based and packet-based. If you set both
thresholds, the last configuration takes effect.
If you set both time-based and traffic-based logging, the device outputs a session log when
whichever is reached. After outputting a session log, the device resets the traffic counter and restarts
the interval for the session.
If you enable session logging but specify neither the traffic-based nor the time-based type, the device
outputs a session log when a session entry is created or removed.
To configure session logging:
Task Command
Display the aging time for sessions of
display session aging-time application
different application layer protocols.
Display the aging time for sessions in
display session aging-time state
different protocol states.
display session table ipv4 [ source-ip start-source-ip
[ end-source-ip ] ] [ destination-ip start-destination-ip
Display IPv4 session table entries
[ end-destination-ip ] ] [ protocol { dccp | icmp | raw-ip | sctp
(centralized devices in standalone mode).
| tcp | udp | udp-lite } ] [ source-port source-port ]
[ destination-port destination-port ] [ verbose ]
display session table ipv4 [ slot slot-number ] [ source-ip
Display IPv4 session table entries start-source-ip [ end-source-ip ] ] [ destination-ip
(distributed devices in standalone start-destination-ip [ end-destination-ip ] ] [ protocol { dccp |
mode/centralized devices in IRF mode). icmp | raw-ip | sctp | tcp | udp | udp-lite } ] [ source-port
source-port ] [ destination-port destination-port ] [ verbose ]
460
Task Command
display session table ipv4 [ chassis chassis-number slot
slot-number ] [ source-ip start-source-ip [ end-source-ip ] ]
Display IPv4 session table entries [ destination-ip start-destination-ip [ end-destination-ip ] ]
(distributed devices in IRF mode). [ protocol { dccp | icmp | raw-ip | sctp | tcp | udp |
udp-lite } ] [ source-port source-port ] [ destination-port
destination-port ] [ verbose ]
display session table ipv6 [ source-ip start-source-ip
[ end-source-ip ] ] [ destination-ip start-destination-ip
Display IPv6 session table entries
[ end-destination-ip ] ] [ protocol { dccp | icmpv6 | raw-ip |
(centralized devices in standalone mode).
sctp | tcp | udp | udp-lite } ] [ source-port source-port ]
[ destination-port destination-port ] [ verbose ]
display session table ipv6 [ slot slot-number ] [ source-ip
Display IPv6 session table entries start-source-ip [ end-source-ip ] ] [ destination-ip
(distributed devices in standalone start-destination-ip [ end-destination-ip ] ] [ protocol { dccp |
mode/centralized devices in IRF mode). icmpv6 | raw-ip | sctp | tcp | udp | udp-lite } ] [ source-port
source-port ] [ destination-port destination-port ] [ verbose ]
display session table ipv6 [ chassis chassis-number slot
slot-number ] [ source-ip start-source-ip [ end-source-ip ] ]
Display IPv6 session table entries [ destination-ip start-destination-ip [ end-destination-ip ] ]
(distributed devices in IRF mode). [ protocol { dccp | icmpv6 | raw-ip | sctp | tcp | udp |
udp-lite } ] [ source-port source-port ] [ destination-port
destination-port ] [ verbose ]
Display session statistics (centralized
display session statistics [ summary ]
devices in standalone mode).
Display session statistics (distributed
devices in standalone mode/centralized display session statistics [ summary ] [ slot slot-number ]
devices in IRF mode).
Display session statistics (distributed display session statistics [ summary ] [ chassis
devices in IRF mode). chassis-number slot slot-number ]
Display relation table entries (centralized
display session relation-table { ipv4 | ipv6 }
devices in standalone mode).
Display relation table entries (distributed
display session relation-table { ipv4 | ipv6 } [ slot
devices in standalone mode/centralized
slot-number ]
devices in IRF mode).
Display relation table entries (distributed display session relation-table { ipv4 | ipv6 } [ chassis
devices in IRF mode). chassis-number slot slot-number ]
reset session table ipv4 [ source-ip source-ip ]
[ destination-ip destination-ip ] [ protocol { dccp | icmp |
Clear IPv4 session table entries
raw-ip | sctp | tcp | udp | udp-lite } ] [ source-port
(centralized devices in standalone mode).
source-port ] [ destination-port destination-port ]
[ vpn-instance vpn-instance-name ]
reset session table ipv4 [ slot slot-number ] [ source-ip
Clear IPv4 session table entries (distributed source-ip ] [ destination-ip destination-ip ] [ protocol { dccp |
devices in standalone mode/centralized icmp | raw-ip | sctp | tcp | udp | udp-lite } ] [ source-port
devices in IRF mode). source-port ] [ destination-port destination-port ]
[ vpn-instance vpn-instance-name ]
reset session table ipv4 [ chassis chassis-number slot
slot-number ] [ source-ip source-ip ] [ destination-ip
Clear IPv4 session table entries (distributed destination-ip ] [ protocol { dccp | icmp | raw-ip | sctp | tcp |
devices in IRF mode). udp | udp-lite } ] [ source-port source-port ]
[ destination-port destination-port ] [ vpn-instance
vpn-instance-name ]
461
Task Command
reset session table ipv6 [ source-ip source-ip ]
[ destination-ip destination-ip ] [ protocol { dccp | icmpv6 |
Clear IPv6 session table entries
raw-ip | sctp | tcp | udp | udp-lite } ] [ source-port
(centralized devices in standalone mode).
source-port ] [ destination-port destination-port ]
[ vpn-instance vpn-instance-name ]
reset session table ipv6 [ slot slot-number ] [ source-ip
Clear IPv6 session table entries (distributed source-ip ] [ destination-ip destination-ip ] [ protocol { dccp |
devices in standalone mode/centralized icmpv6 | raw-ip | sctp | tcp | udp | udp-lite } ] [ source-port
devices in IRF mode). source-port ] [ destination-port destination-port ]
[ vpn-instance vpn-instance-name ]
reset session table ipv6 [ chassis chassis-number slot
slot-number ] [ source-ip source-ip ] [ destination-ip
Clear IPv6 session table entries (distributed destination-ip ] [ protocol { dccp | icmpv6 | raw-ip | sctp |
devices in IRF mode). tcp | udp | udp-lite } ] [ source-port source-port ]
[ destination-port destination-port ] [ vpn-instance
vpn-instance-name ]
Clear IPv4 and IPv6 session table entries
reset session table
(centralized devices in standalone mode).
Clear IPv4 and IPv6 session table entries
(distributed devices in standalone reset session table [ slot slot-number ]
mode/centralized devices in IRF mode).
Clear IPv4 and IPv6 session table entries reset session table [ chassis chassis-number slot
(distributed devices in IRF mode). slot-number ]
Clear session statistics (centralized devices
reset session statistics
in standalone mode).
Clear session statistics (distributed devices
in standalone mode/centralized devices in reset session statistics [ slot slot-number ]
IRF mode).
Clear session statistics (distributed devices reset session statistics [ chassis chassis-number slot
in IRF mode). slot-number ]
Clear relation table entries (centralized
reset session relation-table [ ipv4 | ipv6 ]
devices in standalone mode).
Clear relation table entries (distributed
reset session relation-table [ ipv4 | ipv6 ] [ slot
devices in standalone mode/centralized
slot-number ]
devices in IRF mode).
Clear relation table entries (distributed reset session relation-table [ ipv4 | ipv6 ] [chassis
devices in IRF mode). chassis-number slot slot-number ]
462
Configuring connection limits
The connection limit feature enables the device to monitor and limit the number of established
connections.
As shown in Figure 142, the following problems might exist:
• If Host B initiates a large number of connections in a short period of time, it might exhaust
system resources and cause Host A to be unable to access the Internet.
• If the internal server receives a large number of connection requests in a short period of time,
the server cannot process other requests.
Figure 142 Network diagram
To resolve these problems, configure connection limits on the interfaces of the device.
463
Creating a connection limit policy
A connection limit policy contains a set of connection limit rules, each of which defines a range of
connections and the criteria for limiting the connections.
To create a connection limit policy:
464
Step Command Remarks
amount max-amount
min-amount
• IPv6 connection limit policy
view:
limit limit-id acl ipv6
{ acl-number | name
acl-name } [ per-destination
| per-service | per-source ]
* amount max-amount
min-amount
Task Command
Display the connection limit policy display connection-limit { ipv6-policy | policy } { all | policy-id }
465
Task Command
information.
Display the connection limit statistics
display connection-limit statistics { global | interface
globally or on an interface (centralized
interface-type interface-number }
devices in standalone mode).
Display the connection limit statistics
globally or on an interface (distributed display connection-limit statistics { global | interface
devices in standalone mode/centralized interface-type interface-number } [ slot slot-number ]
devices in IRF mode).
Display the connection limit statistics display connection-limit statistics { global | interface
globally or on an interface (distributed interface-type interface-number } [ chassis chassis-number slot
devices in IRF mode). slot-number ]
display connection-limit { ipv6-stat-nodes | stat-nodes }
Display statistics about IPv6 { global | interface interface-type interface-number }
connections matching connection limit [ destination destination-ip | service-port port-number | source
rules globally or on an interface source-ip ] * [ count ]
(centralized devices in standalone display connection-limit stat-nodes { global | interface
mode). interface-type interface-number } dslite-peer b4-address
[ count ]
display connection-limit { ipv6-stat-nodes | stat-nodes }
Display statistics about IPv6 { global | interface interface-type interface-number } [ slot
connections matching connection limit slot-number ] [ destination destination-ip | service-port
rules globally or on an interface port-number | source source-ip ] * [ count ]
(distributed devices in standalone display connection-limit stat-nodes { global | interface
mode/centralized devices in IRF mode). interface-type interface-number } [ slot slot-number ] dslite-peer
b4-address [ count ]
display connection-limit { ipv6-stat-nodes | stat-nodes }
{ global | interface interface-type interface-number } [ chassis
Display statistics about IPv6 chassis-number slot slot-number ] [ destination destination-ip |
connections matching connection limit service-port port-number | source source-ip ] * [ count ]
rules globally or on an interface
(distributed devices in IRF mode). display connection-limit stat-nodes { global | interface
interface-type interface-number } [ chassis chassis-number slot
slot-number ] dslite-peer b4-address [ count ]
Clear the connection limit statistics
reset connection-limit statistics { global | interface
globally or on an interface (centralized
interface-type interface-number }
devices in standalone mode).
Clear the connection limit statistics
globally or on an interface (distributed reset connection-limit statistics { global | interface
devices in standalone mode/centralized interface-type interface-number } [ slot slot-number ]
devices in IRF mode).
Clear the connection limit statistics reset connection-limit statistics { global | interface
globally or on an interface (distributed interface-type interface-number } [ chassis chassis-number slot
devices in IRF mode). slot-number ]
466
• All hosts on segment 192.168.0.0/24 can establish a maximum of 100000 connections to the
external network.
• Each host on segment 192.168.0.0/24 can establish a maximum of 100 connections to the
external network.
• A maximum of 10000 query requests from DNS clients to the DNS server are allowed at the
same time.
• A maximum of 10000 connection requests from Web clients to the Web server are allowed at
the same time.
Figure 143 Network diagram
Configuration procedure
The following example only describes how to configure connection limits. For information about NAT
configuration and internal server configuration, see Layer 3—IP Services Configuration Guide.
# Create ACL 3000 to permit packets from all hosts on the internal network.
<Router> system-view
[Router] acl advanced 3000
[Router-acl-ipv4-adv-3000] rule permit ip source 192.168.0.0 0.0.0.255
[Router-acl-ipv4-adv-3000] quit
# Create ACL 3001 to permit packets to the Web server and the DNS server.
[Router] acl advanced 3001
[Router-acl-ipv4-adv-3001] rule permit ip destination 192.168.0.2 0
[Router-acl-ipv4-adv-3001] rule permit ip destination 192.168.0.3 0
[Router-acl-ipv4-adv-3001] quit
# Configure connection limit rule 1 to permit a maximum of 100000 connections from all the hosts
that match ACL 3000. When the number of connections exceeds 100000, new connections cannot
be established until the number drops below 95000.
[Router-connection-limit-policy-1] limit 1 acl 3000 amount 100000 95000
# Configure connection limit rule 2 to permit a maximum of 10000 connections to the servers that
match ACL 3001. When the number of connections exceeds 10000, new connections cannot be
established until the number drops below 9800.
[Router-connection-limit-policy-1] limit 2 acl 3001 per-destination amount 10000 9800
[Router-connection-limit-policy-1] quit
467
[Router] connection-limit policy 2
# Configure connection limit rule 1 to permit a maximum of 100 connections from each host matching
ACL 3000. When the number of connections exceeds 100, new connections cannot be established
until the number drops below 90.
[Router-connection-limit-policy-2] limit 1 acl 3000 per-source amount 100 90
[Router-connection-limit-policy-2] quit
Applied list:
Global
[Router] display connection-limit policy 2
IPv4 connection limit policy 2 has been applied 1 times, and has 1 limit rules.
Limit rule list:
Policy Rule StatType HiThres LoThres ACL
------------------------------------------------------------
2 1 Src 100 90 3000
Applied list:
GigabitEthernet2/0/1
468
[Router-acl-ipv4-basic-2001] quit
[Router] acl basic 2002
[Router-acl-ipv4-basic-2002] rule permit source 192.168.0.100 0
[Router-acl-ipv4-basic-2002] quit
[Router] connection-limit policy 1
[Router-connection-limit-policy-1] limit 1 acl 2001 per-destination amount 10 5
[Router-connection-limit-policy-1] limit 2 acl 2002 per-destination amount 100 10
As a result, the host at 192.168.0.100 can only initiate a maximum of 10 connections to the external
network.
Analysis
Both limit rules 1 and 2 contain IP address 192.168.0.100. Limit rule 1 is first matched and takes
effect to limit the connections from 192.168.0.100.
Solution
To resolve the problem:
1. Rearrange the two connection limit rules by exchanging their rule IDs.
2. If the problem persists, contact Hewlett Packard Enterprise Support.
469
Configuring object groups
Overview
An object group is a group of objects that can be used by an object policy or object group to identify
packets. Object groups are divided into the following types:
• IPv4 address object group—A group of IPv4 address objects used to match the IPv4 address
in a packet.
• IPv6 address object group—A group of IPv6 address objects used to match the IPv6 address
in a packet.
• Port object group—A group of port objects used to match the protocol port number in a
packet.
• Service object group—A group of service objects used to match the upper-layer service in a
packet.
3. (Optional.) Configure a
description for the IPv4 By default, an object group does
description text
address object group. not have a description.
470
Configuring an IPv6 address object group
Step Command Remarks
1. Enter system view. system-view N/A
2. Configure an IPv6 address
object group and enter its object-group ipv6 address The system has one default IPv6
view. object-group-name address object group.
3. (Optional.) Configure a
description for the IPv6 By default, an object group does
description text
address object group. not have a description.
471
Displaying and maintaining object groups
Execute display commands in any view.
Task Command
display object-group [ { { ip | ipv6 } address | service |
Display information about object groups. port } [ default ] [ name object-group-name ] | name
object-group-name ]
472
Configuring object policies
Overview
An object policy is a set of rules for security control over packets between a source and a destination
security zone. These two zones define a zone pair. The object policy matches the first packet of a
traffic flow against the rules. If a match is found, the device stops the match process and takes the
action defined in the rule over the packet and all subsequent packets of the flow.
For more information about zone pair and security zone configuration, see Fundamentals
Configuration Guide.
Compatibility information
Feature and hardware compatibility
Hardware Object policy compatibility
MSR954(JH296A/JH297A/JH299A) No
MSR1002-4/1003-8S Yes
MSR2003 Yes
MSR2004-24/2004-48 Yes
MSR3012/3024/3044/3064 Yes
MSR4060/4080 Yes
Rule numbering
Each rule is uniquely identified by an ID. The rule ID can be manually configured or automatically
assigned by the system when you create the rule. In automatic rule numbering, the system assigns
the rule an integer next to the greatest ID being used. For example, if the greatest ID is 60000, the
473
system automatically assigns 60001. If the greatest ID is 65534, the system assigns the smallest
unused rule ID to the rule.
Rule description
You can configure a description for each rule to identify different rules in an object policy.
Configuration prerequisites
Before configuring an object policy, complete the following tasks:
• Configure time ranges (see ACL and QoS Configuration Guide).
• Configure IPv4 address objects, IPv6 address objects, and service objects (see "Configuring
object groups").
474
Step Command Remarks
3. (Optional.) Configure a
description for the By default, an object policy does not
description text
object policy. have a description.
2. Enter IPv4
object policy object-policy ip object-policy-name N/A
view.
rule [ rule-id ] { drop | pass } [ [ source-ip By default, no object policy
3. Configure an object-group-name | any ] [ destination-ip rule exists.
IPv4 object object-group-name | any ] [ service
object-group-name | any ] [ vrf vrf-name ] If you specify a nonexistent
policy rule. object group, the rule does
[ counting ] [ disable ] [ logging ] [ time-range
time-range-name ] ] * not match packets.
4. (Optional.)
Configure a By default, an object policy
description for rule rule-id comment text rule does not have a
the rule. description.
475
Configuring an IPv6 object policy rule
You can specify an existing object group in an IPv6 object policy rule for matching target IPv6
packets. If no object group is specified for a rule, the rule applies to all IPv6 packets.
The following object groups can be referenced in a rule for packet matching:
• Source IPv6 address object group—Used for matching the source IPv6 addresses of
packets.
• Destination IPv6 address object group—Used for matching the destination IPv6 addresses
of packets.
• Service object group—Used for matching the service types carried in packets.
• VRF instance—Used for matching the MPLS L3VPN instances of packets.
For more information about the object groups, see "Configuring object groups."
To configure an IPv6 object policy rule:
4. (Optional.)
Configure a By default, an object policy rule
description for the rule rule-id comment text
does not have a description.
rule.
476
Step Command Remarks
• Apply an IPv4 object policy to the zone pair:
object-policy apply ip object-policy-name By default, no object
4. Apply an object policy
to the zone pair. • Apply an IPv6 object policy to the zone pair: policy is applied to a zone
object-policy apply ipv6 pair.
object-policy-name
Step Command
1. Enter system view. system-view
• Enter IPv4 object policy view:
object-policy ip object-policy-name
2. Enter object policy view.
• Enter IPv6 object policy view:
object-policy ipv6 object-policy-name
3. Move an object policy rule. move rule rule-id before insert-rule-id
Task Command
Display acceleration information for
display object-policy accelerate { summary { ip | ipv6 } |
object policies (centralized devices in
verbose { ip object-policy-name | ipv6 object-policy-name } }
standalone mode).
477
Task Command
Display acceleration information for
display object-policy accelerate { summary { ip | ipv6 } |
object policies (distributed devices in
verbose { ip object-policy-name | ipv6 object-policy-name } slot
standalone mode/centralized devices
slot-number }
in IRF mode).
Display acceleration information for display object-policy accelerate { summary { ip | ipv6 } |
object policies (distributed devices in verbose { ip object-policy-name | ipv6 object-policy-name }
IRF mode). chassis chassis-number slot slot-number }
Display information about IPv4 object
display object-policy ip [ object-policy-name ]
policies.
Display information about IPv6 object
display object-policy ipv6 [ object-policy-name ]
policies.
Display information about the object display object-policy zone-pair security [ source
policies applied to zone pairs. source-zone-name destination destination-zone-name ]
Display statistics for object policies display object-policy statistics zone-pair security source
applied to a zone pair. source-zone-name destination destination-zone-name [ ip | ipv6 ]
reset object-policy statistics [ zone-pair security source
Clear statistics for the object policies
source-zone-name destination destination-zone-name ] [ ip |
applied to zone pairs.
ipv6 ]
GE2/0/1
GE2/0/2 GE2/0/4
Device A GE2/0/3
478
Configuration procedure
1. Create a time range named work to cover 8:00 to 18:00 on weekdays.
<DeviceA> system-view
[DeviceA] time-range work 08:00 to 18:00 working-day
2. Create security zones:
# Create a security zone named president, and add GigabitEthernet 2/0/2 to the zone.
[DeviceA] security-zone name president
[DeviceA-security-zone-president] import interface gigabitethernet 2/0/2
[DeviceA-security-zone-president] quit
# Create a security zone named finance, and add GigabitEthernet 2/0/3 to the zone.
[DeviceA] security-zone name finance
[DeviceA-security-zone-finance] import interface gigabitethernet 2/0/3
[DeviceA-security-zone-finance] quit
# Create a security zone named market, and add GigabitEthernet 2/0/4 to the zone.
[DeviceA] security-zone name market
[DeviceA-security-zone-market] import interface gigabitethernet 2/0/4
[DeviceA-security-zone-market] quit
# Create a security zone named database, and add GigabitEthernet 2/0/1 to the zone.
[DeviceA] security-zone name database
[DeviceA-security-zone-database] import interface gigabitethernet 2/0/1
[DeviceA-security-zone-database] quit
3. Create object groups:
# Create an IPv4 address object group named president. Configure an IPv4 address object
with the subnet address of 192.168.1.0/24 for the group.
[DeviceA] object-group ip address president
[DeviceA-obj-grp-ip-president] network subnet 192.168.1.0 24
[DeviceA-obj-grp-ip-president] quit
# Create an IPv4 address object group named finance. Configure an IPv4 address object with
the subnet address of 192.168.2.0/24 for the group.
[DeviceA] object-group ip address finance
[DeviceA-obj-grp-ip-finance] network subnet 192.168.2.0 24
[DeviceA-obj-grp-ip-finance] quit
# Create an IPv4 address object group named market. Configure an IPv4 address object with
the subnet address of 192.168.3.0/24 for the group.
[DeviceA] object-group ip address market
[DeviceA-obj-grp-ip-market] network subnet 192.168.3.0 24
[DeviceA-obj-grp-ip-market] quit
# Create an IPv4 address object group named database. Configure an IPv4 address object
with the subnet address of 192.168.0.0/24 for the group.
[DeviceA] object-group ip address database
[DeviceA-obj-grp-ip-database] network subnet 192.168.0.0 24
[DeviceA-obj-grp-ip-database] quit
# Create a service object group named web. Configure a service object with the HTTP service.
[DeviceA] object-group service web
[DeviceA-obj-grp-service-web] service 6 destination eq 80
[DeviceA-obj-grp-service-web] quit
4. Create object policies and rules:
479
# Create an IPv4 object policy named president-database. Configure a rule that allows the
president office to access the financial database server through HTTP at any time.
[DeviceA] object-policy ip president-database
[DeviceA-object-policy-ip-president-database] rule pass source-ip president
destination-ip database service web
[DeviceA-object-policy-ip-president-database] quit
# Create an IPv4 object policy named finance-database. Configure a rule that allows the
financial office to access the financial database server through HTTP from 8:00 to 18:00 on
weekdays.
[DeviceA] object-policy ip finance-database
[DeviceA-object-policy-ip-finance-database] rule pass source-ip finance
destination-ip database service web time-range work
[DeviceA-object-policy-ip-finance-database] quit
# Create an IPv4 object policy named market-database. Configure a rule that prohibits the
marketing office from accessing the financial database server through HTTP at any time.
[DeviceA] object-policy ip market-database
[DeviceA-object-policy-ip-market-database] rule drop source-ip market
destination-ip database service web
[DeviceA-object-policy-ip-market-database] quit
5. Apply object policies to zone pairs:
# Create a zone pair from security zone president to security zone database. Apply IPv4
object policy president-database to the zone pair.
[DeviceA] zone-pair security source president destination database
[DeviceA-zone-pair-security-president-database] object-policy apply ip
president-database
[DeviceA-zone-pair-security-president-database] quit
# Create a zone pair from security zone finance to security zone database. Apply IPv4 object
policy finance-database to the zone pair.
[DeviceA] zone-pair security source finance destination database
[DeviceA-zone-pair-security-finance-database] object-policy apply ip
finance-database
[DeviceA-zone-pair-security-finance-database] quit
# Create a zone pair from security zone market to security zone database. Apply IPv4 object
policy market-database to the zone pair.
[DeviceA] zone-pair security source market destination database
[DeviceA-zone-pair-security-market-database] object-policy apply ip market-database
[DeviceA-zone-pair-security-market-database] quit
480
Configuring attack detection and
prevention
Overview
Attack detection and prevention enables a device to detect attacks by inspecting arriving packets,
and to take prevention actions to protect a private network. Prevention actions include logging,
packet dropping, blacklisting, and client verification.
Single-packet attacks
Single-packet attacks are also known as malformed packet attacks. An attacker typically launches
single-packet attacks by using the following methods:
• An attacker sends defective packets to a device, which causes the device to malfunction or
crash.
• An attacker sends normal packets to a device, which interrupts connections or probes network
topologies.
• An attacker sends a large number of forged packets to a target device, which consumes
network bandwidth and causes denial of service (DoS).
Table 13 lists the single-packet attack types that the device can detect and prevent.
Table 13 Types of single-packet attacks
481
Single-packet attack Description
482
Single-packet attack Description
Scanning attacks
Scanning is a preintrusion activity used to prepare for intrusion into a network. The scanning allows
the attacker to find a way into the target network and to disguise the attacker's identity.
Attackers use scanning tools to probe a network, find vulnerable hosts, and discover services that
are running on the hosts. Attackers can use the information to launch attacks.
The device can detect and prevent the IP sweep and port scan attacks. If an attacker performs port
scanning from multiple hosts to the target host, distributed port scan attacks occur.
Flood attacks
An attacker launches a flood attack by sending a large number of forged requests to the victim in a
short period of time. The victim is too busy responding to these forged requests to provide services
for legal users, and a DoS attack occurs.
The device can detect and prevent the following types of flood attacks:
• SYN flood attack.
A SYN flood attacker exploits the TCP three-way handshake characteristics and makes the
victim unresponsive to legal users. An attacker sends a large number of SYN packets with
forged source addresses to a server. This causes the server to open a large number of
half-open connections and respond to the requests. However, the server will never receive the
expected ACK packets. The server is unable to accept new incoming connection requests
because all of its resources are bound to half-open connections.
• ACK flood attack.
An ACK packet is a TCP packet only with the ACK flag set. Upon receiving an ACK packet from
a client, the server must search half-open connections for a match.
An ACK flood attacker sends a large number of ACK packets to the server. This causes the
server to be busy searching for half-open connections, and the server is unable to process
packets for normal services.
• SYN-ACK flood attack.
Upon receiving a SYN-ACK packet, the server must search for the matching SYN packet it has
sent. A SYN-ACK flood attacker sends a large number of SYN-ACK packets to the server. This
causes the server to be busy searching for SYN packets, and the server is unable to process
packets for normal services.
• FIN flood attack.
FIN packets are used to shut down TCP connections.
A FIN flood attacker sends a large number of forged FIN packets to a server. The victim might
shut down correct connections, or be unable to provide services because it is busy searching
for matching connections.
• RST flood attack.
RST packets are used to abort TCP connections when TCP connection errors occur.
483
An RST flood attacker sends a large number of forged RST packets to a server. The victim
might shut down correct connections, or be unable to provide services because it is busy
searching for matching connections.
• DNS flood attack.
The DNS server processes and replies all DNS queries that it receives.
A DNS flood attacker sends a large number of forged DNS queries. This attack consumes the
bandwidth and resources of the DNS server, which prevents the server from processing and
replying legal DNS queries.
• HTTP flood attack.
Upon receiving an HTTP GET request, the HTTP server performs complex operations,
including character string searching, database traversal, data reassembly, and format
switching. These operations consume a large amount of system resources.
An HTTP flood attacker sends a large number of HTTP GET requests that exceed the
processing capacity of the HTTP server, which causes the server to crash.
• ICMP flood attack.
An ICMP flood attacker sends ICMP request packets, such as ping packets, to a host at a fast
rate. Because the target host is busy replying to these requests, it is unable to provide services.
• ICMPv6 flood attack.
An ICMPv6 flood attacker sends ICMPv6 request packets, such as ping packets, to a host at a
fast rate. Because the target host is busy replying to these requests, it is unable to provide
services.
• UDP flood attack.
A UDP flood attacker sends UDP packets to a host at a fast rate. These packets consume a
large amount of the target host's bandwidth, so the host cannot provide other services.
Blacklist feature
The following matrix shows the feature and hardware compatibility:
484
Hardware Blacklist compatibility
MSR2004-24/2004-48 Yes
MSR3012/3024/3044/3064 Yes
MSR4060/4080 Yes
The blacklist feature is an attack prevention method that filters packets by source IP addresses in
blacklist entries. Compared with ACL-based packet filter, blacklist filtering is simpler and provides
effective screening at a faster speed.
Client verification
TCP client verification
The TCP client verification feature protects TCP servers against the following flood attacks:
• SYN.
• ACK.
• SYN-ACK.
• FIN.
• RST.
The TCP client verification feature enables a TCP proxy on the device.
TCP client verification can operate in the following modes:
• Safe reset—Enables unidirectional TCP proxy for packets only from TCP connection initiators.
The unidirectional TCP proxy is sufficient for most scenarios because attacks are often seen
from clients.
As shown in Figure 145, if packets from TCP clients passes through the proxy device, but the
packets from servers do not, only the safe reset mode can be used.
Figure 145 Safe reset mode application
• SYN cookie—Enables bidirectional TCP proxy for TCP clients and servers.
As shown in Figure 146, if packets from clients and servers pass through the TCP proxy device,
either safe reset or SYN cookie can be used.
485
Figure 146 Safe reset/SYN cookie mode application
(1) SYN
(2) SYN ACK (invalid sequence
number)
(3) RST
(7) ACK
486
Figure 148 TCP proxy in SYN cookie mode
The DNS client verification feature requires that clients use the standard TCP/IP protocol suite and
DNS protocol. Legitimate clients that use non-standard protocols will be verified as illegitimate by the
DNS client authenticator.
With client verification, the first DNS resolution takes more time than normal DNS resolution.
487
HTTP client verification
The HTTP client verification feature protects HTTP servers against HTTP flood attacks. It is
configured on the device where packets from the HTTP clients to the HTTP servers pass through. A
device with HTTP client verification feature configured is called an HTTP client authenticator.
As shown in Figure 150, the HTTP client verification functions as follows:
1. Upon receiving a SYN packet destined for a protected HTTP server, the HTTP client
authenticator performs TCP client verification in SYN cookie mode. If the client passes the TCP
client verification, a TCP connection is established between the client and the authenticator. For
more information about TCP client verification, see "TCP client verification."
2. When the authenticator receives an HTTP Get packet from the client, it performs the first
redirect verification. The authenticator records the client information and responds with an
HTTP Redirect packet. The HTTP Redirect packet contains a redirect URI and requires the
client to terminate the TCP connection.
3. After receiving the HTTP Redirect packet, the client terminates the TCP connection and then
establishes a new TCP connection with the authenticator.
4. When the authenticator receives the HTTP Get packet, it performs the second redirection
verification. The authenticator verifies the following information:
{ The client has passed the first redirection verification.
{ The URI in the HTTP Get packet is the redirect URI.
5. If the client passes the second redirection verification, the authenticator adds its IP address to
the trusted IP list, and responds a Redirect packet. The Redirect packet contains the URI that
the client originally carried and requires the client to terminate the TCP connection.
6. The authenticator directly forwards the trusted client's subsequent packets to the server.
Figure 150 HTTP client verification process
488
Attack detection and prevention configuration task
list
Tasks at a glance
(Required.) Configuring an attack defense policy:
• (Required.) Creating an attack defense policy
• (Required.) Perform at least one of the following tasks to configure attack detection:
{ Configuring a single-packet attack defense policy
{ Configuring a scanning attack defense policy
{ Configuring a flood attack defense policy
• (Optional.) Configuring attack detection exemption
(Required.) Perform at least one of the tasks to apply an attack defense policy:
• Applying an attack defense policy to an interface
• Applying an attack defense policy to the device
(Optional.) Disabling log aggregation for single-packet attack events
(Optional.) Configuring TCP fragment attack prevention
489
You can also configure the device to not take any actions.
To configure a single-packet attack defense policy:
490
Step Command Remarks
The default action is logging
for single-packet attacks of the
5. (Optional.) Specify the informational and low levels.
actions against signature level { high | info | low |
single-packet attacks of a medium } action { { drop | logging } * | The default actions are
specific level. none } logging and drop for
single-packet attacks of the
medium and high levels.
6. (Optional.) Enable
signature detection for By default, signature detection
signature level { high | info | low |
single-packet attacks of a is disabled for all levels of
medium } detect
specific level. single-packet attacks.
491
You can configure flood attack detection and prevention for a specific IP address. For non-specific IP
addresses, the device uses the global attack prevention settings.
Configuring a SYN flood attack defense policy
492
Step Command Remarks
2. Enter attack defense policy attack-defense policy
view. N/A
policy-name
3. Enable SYN-ACK flood By default, SYN-ACK flood attack
attack detection for syn-ack-flood detect
detection is disabled for
non-specific IP addresses. non-specific
non-specific IP addresses.
4. Set the global trigger By default, the global trigger
threshold for SYN-ACK syn-ack-flood threshold
threshold is 1000 for SYN-ACK
flood attack prevention. threshold-value
flood attack prevention.
5. Specify global actions By default, no global action is
against SYN-ACK flood syn-ack-flood action
specified for SYN-ACK flood
attacks. { client-verify | drop | logging } *
attacks.
syn-ack-flood detect { ip
ip-address | ipv6 ipv6-address }
6. Configure IP-specific [ vpn-instance By default, SYN-ACK flood attack
SYN-ACK flood attack vpn-instance-name ] [ threshold detection is not configured for any
detection. threshold-value ] [ action IP address.
{ { client-verify | drop | logging }
* | none } ]
493
Step Command Remarks
4. Set the global trigger By default, the global trigger
threshold for RST flood rst-flood threshold
threshold is 1000 for RST flood
attack prevention. threshold-value
attack prevention.
5. Specify global actions rst-flood action { client-verify | By default, no global action is
against RST flood attacks. drop | logging } * specified for RST flood attacks.
rst-flood detect { ip ip-address |
ipv6 ipv6-address }
6. Configure IP-specific RST [ vpn-instance By default, RST flood attack
flood attack detection. vpn-instance-name ] [ threshold detection is not configured for any
threshold-value ] [ action IP address.
{ { client-verify | drop | logging }
* | none } ]
494
Step Command Remarks
icmpv6-flood detect ipv6
6. Configure IP-specific ipv6-address [ vpn-instance By default, ICMPv6 flood attack
ICMPv6 flood attack vpn-instance-name ] [ threshold detection is not configured for any
detection. threshold-value ] [ action { { drop IPv6 address.
| logging } * | none } ]
495
Step Command Remarks
dns-flood detect { ip ip-address |
ipv6 ipv6-address }
[ vpn-instance
7. Configure IP-specific DNS By default, DNS flood attack
vpn-instance-name ] [ port
flood attack detection. detection is not configured for any
port-list ] [ threshold
IP address.
threshold-value ] [ action
{ { client-verify | drop | logging }
* | none } ]
496
• L3VPN instance.
• fragment keyword for matching non-first fragments.
To configure attack detection exemption:
497
Disabling log aggregation for single-packet attack events
Log aggregation aggregates all logs generated in a period and sends one log. The logs with the
same attributes for the following items can be aggregated:
• Interface where the attack is detected.
• Attack type.
• Attack defense action.
• Source and destination IP addresses.
• VPN instance to which the victim IP address belongs.
Hewlett Packard Enterprise recommends that you not disable log aggregation. A large number of
logs will consume the display resources of the console.
To disable log aggregation for single-packet attack events:
498
IP addresses protected by TCP client verification can be manually added or automatically learned:
• You can manually add protected IP addresses. The device performs client verification when it
receives the first SYN packet destined for a protected IP address.
• The TCP client verification can automatically add victims' IP addresses to the protected IP list
when collaborating with flood attack detection. Make sure client-verify is specified as the flood
attack prevention action. For more information, see "Configuring a flood attack defense policy."
If a TCP client is verified legitimate, the device adds the client's IP address to the trusted IP list. The
device directly forwards TCP packets from trusted IP addresses.
To configure TCP client verification:
499
Step Command Remarks
500
Hardware Blacklist compatibility
MSR954(JH296A/JH297A/JH299A) No
MSR1002-4/1003-8S Yes
MSR2003 Yes
MSR2004-24/2004-48 Yes
MSR3012/3024/3044/3064 Yes
MSR4060/4080 Yes
The blacklist feature filters packets sourced from IP addresses in blacklist entries.
Blacklist entries can be manually added or dynamically learned:
• You can manually add a blacklist entry by using the blacklist ip or blacklist ipv6 command.
These entries do not age out by default. You can configure an aging time for each entry.
• The device can automatically add blacklist entries when collaborating with the scanning attack
detection feature. Each dynamically learned blacklist entry has an aging time, which is user
configurable. Make sure the block-source keyword is specified as the scanning attack
prevention action for collaboration. For more information about the scanning attack detection
and prevention feature, see "Configuring a scanning attack defense policy."
To configure the blacklist feature:
501
Task Command
Display attack detection and prevention statistics
display attack-defense statistics interface
on an interface (centralized devices in
interface-type interface-number
standalone mode).
Display attack detection and prevention statistics
display attack-defense statistics interface
on an interface (distributed devices in standalone
interface-type interface-number [ slot slot-number ]
mode/centralized devices in IRF mode).
display attack-defense statistics interface
Display attack detection and prevention statistics
interface-type interface-number [ chassis
on an interface (distributed devices in IRF mode).
chassis-number slot slot-number ]
Display attack detection and prevention statistics
for the device (centralized devices in standalone display attack-defense statistics local
mode).
Display attack detection and prevention statistics
display attack-defense statistics local [ slot
for the device (distributed devices in standalone
slot-number ]
mode/centralized devices in IRF mode).
Display attack detection and prevention statistics display attack-defense statistics local [ chassis
for the device (distributed devices in IRF mode). chassis-number slot slot-number ]
502
Task Command
Display information about IPv6 scanning attack display attack-defense scan victim ipv6 [ interface
victims (distributed devices in standalone interface-type interface-number [ slot slot-number ] |
mode/centralized devices in IRF mode). local [ slot slot-number ] ] [ count ]
display attack-defense scan victim ipv6 [ interface
Display information about IPv6 scanning attack interface-type interface-number [ chassis
victims (distributed devices in IRF mode). chassis-number slot slot-number ] | local [ chassis
chassis-number slot slot-number ] ] [ count ]
display attack-defense { ack-flood | dns-flood |
Display flood attack detection and prevention fin-flood | flood | http-flood | icmp-flood | rst-flood |
statistics for an IPv4 address (centralized syn-ack-flood | syn-flood | udp-flood } statistics ip
devices in standalone mode). [ ip-address [ vpn vpn-instance-name ] ] [ interface
interface-type interface-number | local ] [ count ]
display attack-defense { ack-flood | dns-flood |
Display flood attack detection and prevention fin-flood | flood | http-flood | icmp-flood | rst-flood |
statistics for an IPv4 address (distributed devices syn-ack-flood | syn-flood | udp-flood } statistics ip
in standalone mode/centralized devices in IRF [ ip-address [ vpn vpn-instance-name ] ] [ interface
mode). interface-type interface-number [ slot slot-number ] |
local [ slot slot-number ] ] [ count ]
display attack-defense { ack-flood | dns-flood |
fin-flood | flood | http-flood | icmp-flood | rst-flood |
Display flood attack detection and prevention syn-ack-flood | syn-flood | udp-flood } statistics ip
statistics for an IPv4 address (distributed devices [ ip-address [ vpn vpn-instance-name ] ] [ interface
in IRF mode). interface-type interface-number [ chassis
chassis-number slot slot-number ] | local [ chassis
chassis-number slot slot-number ] ] [ count ]
display attack-defense { ack-flood | dns-flood |
Display flood attack detection and prevention fin-flood | flood | http-flood | icmpv6-flood | rst-flood |
statistics for an IPv6 address (centralized syn-ack-flood | syn-flood | udp-flood } statistics ipv6
devices in standalone mode). [ ipv6-address [ vpn vpn-instance-name ] ] [ interface
interface-type interface-number | local ] [ count ]
display attack-defense { ack-flood | dns-flood |
Display flood attack detection and prevention fin-flood | flood | http-flood | icmpv6-flood | rst-flood |
statistics for an IPv6 address (distributed devices syn-ack-flood | syn-flood | udp-flood } statistics ipv6
in standalone mode/centralized devices in IRF [ ipv6-address [ vpn vpn-instance-name ] ] [ interface
mode). interface-type interface-number [ slot slot-number ] |
local [ slot slot-number ] ] [ count ]
display attack-defense { ack-flood | dns-flood |
fin-flood | flood | http-flood | icmpv6-flood | rst-flood |
Display flood attack detection and prevention syn-ack-flood | syn-flood | udp-flood } statistics ipv6
statistics for an IPv6 address (distributed devices [ ipv6-address [ vpn vpn-instance-name ] ] [ interface
in IRF mode). interface-type interface-number [ chassis
chassis-number slot slot-number ] | local [ chassis
chassis-number slot slot-number ] ] [ count ]
Display information about IPv4 addresses display attack-defense policy policy-name { ack-flood
protected by flood attack detection and | dns-flood | fin-flood | flood | http-flood | icmp-flood |
prevention (centralized devices in standalone rst-flood | syn-ack-flood | syn-flood | udp-flood } ip
mode). [ ip-address [ vpn vpn-instance-name ] ] [ count ]
display attack-defense policy policy-name { ack-flood
Display information about IPv4 addresses
| dns-flood | fin-flood | flood | http-flood | icmp-flood |
protected by flood attack detection and
rst-flood | syn-ack-flood | syn-flood | udp-flood } ip
prevention (distributed devices in standalone
[ ip-address [ vpn vpn-instance-name ] ] [ slot
mode/centralized devices in IRF mode).
slot-number ] [ count ]
503
Task Command
display attack-defense policy policy-name { ack-flood
Display information about IPv4 addresses | dns-flood | fin-flood | flood | http-flood | icmp-flood |
protected by flood attack detection and rst-flood | syn-ack-flood | syn-flood | udp-flood } ip
prevention (distributed devices in IRF mode). [ ip-address [ vpn vpn-instance-name ] ] [ chassis
chassis-number slot slot-number ] [ count ]
display attack-defense policy policy-name { ack-flood
Display information about IPv6 addresses
| dns-flood | fin-flood | flood | http-flood |
protected by flood attack detection and
icmpv6-flood | rst-flood | syn-ack-flood | syn-flood |
prevention (centralized devices in standalone
udp-flood } ipv6 [ ipv6-address [ vpn
mode).
vpn-instance-name ] ] [ count ]
display attack-defense policy policy-name { ack-flood
Display information about IPv6 addresses
| dns-flood | fin-flood | flood | http-flood |
protected by flood attack detection and
icmpv6-flood | rst-flood | syn-ack-flood | syn-flood |
prevention (distributed devices in standalone
udp-flood } ipv6 [ ipv6-address [ vpn
mode/centralized devices in IRF mode).
vpn-instance-name ] ] [ slot slot-number ] [ count ]
display attack-defense policy policy-name { ack-flood
| dns-flood | fin-flood | flood | http-flood |
Display information about IPv6 addresses
icmpv6-flood | rst-flood | syn-ack-flood | syn-flood |
protected by flood attack detection and
udp-flood } ipv6 [ ipv6-address [ vpn
prevention (distributed devices in IRF mode).
vpn-instance-name ] ] [ chassis chassis-number slot
slot-number ] [ count ]
Display IPv4 blacklist entries (centralized devices display blacklist ip [ source-ip-address [ vpn-instance
in standalone mode). vpn-instance-name ] ] [ count ]
Display IPv4 blacklist entries (distributed devices
display blacklist ip [ source-ip-address [ vpn-instance
in standalone mode/centralized devices in IRF
vpn-instance-name ] ] [ slot slot-number ] [ count ]
mode).
display blacklist ip [ source-ip-address [ vpn-instance
Display IPv4 blacklist entries (distributed devices
vpn-instance-name ] ] [ chassis chassis-number slot
in IRF mode).
slot-number ] [ count ]
Display IPv6 blacklist entries (centralized devices display blacklist ipv6 [ source-ipv6-address
in standalone mode). [ vpn-instance vpn-instance-name ] ] [ count ]
Display IPv6 blacklist entries (distributed devices display blacklist ipv6 [ source-ipv6-address
in standalone mode/centralized devices in IRF [ vpn-instance vpn-instance-name ] ] [ slot
mode). slot-number ] [ count ]
display blacklist ipv6 [ source-ipv6-address
Display IPv6 blacklist entries (distributed devices
[ vpn-instance vpn-instance-name ] ] [ chassis
in IRF mode).
chassis-number slot slot-number ] [ count ]
Display protected IPv4 list entries for client display client-verify { dns | http | tcp } protected ip
verification (centralized devices in standalone [ ip-address [ vpn vpn-instance-name ] ] [ port
mode). port-number ] [ count ]
Display protected IPv4 addresses for client display client-verify { dns | http | tcp } protected ip
verification (distributed devices in standalone [ ip-address [ vpn vpn-instance-name ] ] [ port
mode/centralized devices in IRF mode). port-number ] [ slot slot-number ] [ count ]
display client-verify { dns | http | tcp } protected ip
Display protected IPv4 addresses for client [ ip-address [ vpn vpn-instance-name ] ] [ port
verification (distributed devices in IRF mode). port-number ] [ chassis chassis-number slot
slot-number ] [ count ]
Display protected IPv6 addresses for client display client-verify { dns | http | tcp } protected ipv6
verification (centralized devices in standalone [ ipv6-address [ vpn vpn-instance-name ] ] [ port
mode). port-number ] [ count ]
Display protected IPv6 addresses for client display client-verify { dns | http | tcp } protected ipv6
verification (distributed devices in standalone [ ipv6-address [ vpn vpn-instance-name ] ] [ port
mode/centralized devices in IRF mode). port-number ] [ slot slot-number ] [ count ]
504
Task Command
display client-verify { dns | http | tcp } protected ipv6
Display protected IPv6 addresses for client [ ipv6-address [ vpn vpn-instance-name ] ] [ port
verification (distributed devices in IRF mode). port-number ] [ chassis chassis-number slot
slot-number ] [ count ]
Display trusted IPv4 addresses for client
display client-verify { dns | http | tcp } trusted ip
verification (centralized devices in standalone
[ ip-address [ vpn vpn-instance-name ] ] [ count ]
mode).
Display trusted IPv4 addresses for client display client-verify { dns | http | tcp } trusted ip
verification (distributed devices in standalone [ ip-address [ vpn vpn-instance-name ] ] [ slot
mode/centralized devices in IRF mode). slot-number ] [ count ]
display client-verify { dns | http | tcp } trusted ip
Display trusted IPv4 addresses for client
[ ip-address [ vpn vpn-instance-name ] ] [ chassis
verification (distributed devices in IRF mode).
chassis-number slot slot-number ] [ count ]
Display trusted IPv6 addresses for client
display client-verify { dns | http | tcp } trusted ipv6
verification (centralized devices in standalone
[ ipv6-address [ vpn vpn-instance-name ] ] [ count ]
mode).
Display trusted IPv6 addresses for client display client-verify { dns | http | tcp } trusted ipv6
verification (distributed devices in standalone [ ipv6-address [ vpn vpn-instance-name ] ] [ slot
mode/centralized devices in IRF mode). slot-number ] [ count ]
display client-verify { dns | http | tcp } trusted ipv6
Display trusted IPv6 addresses for client
[ ipv6-address [ vpn vpn-instance-name ] ] [ chassis
verification (distributed devices in IRF mode).
chassis-number slot slot-number ] [ count ]
Clear attack detection and prevention statistics reset attack-defense statistics interface
for an interface. interface-type interface-number
Clear attack detection and prevention statistics
reset attack-defense statistics local
for the device.
Clear flood attack detection and prevention reset attack-defense policy policy-name flood
statistics. protected { ip | ipv6 } statistics
reset blacklist ip { source-ip-address [ vpn-instance
Clear dynamic IPv4 blacklist entries. vpn-instance-name ] [ ds-lite-peer
ds-lite-peer-address ] | all }
reset blacklist ipv6 { source-ipv6-address
Clear dynamic IPv6 blacklist entries.
[ vpn-instance vpn-instance-name ] | all }
505
Attack detection and prevention configuration
examples
Interface-based attack detection and prevention
configuration example
Network requirements
As shown in Figure 151, Router is the gateway for the internal network. GigabitEthernet 2/0/2
connects to the external network, and GigabitEthernet 2/0/3 connects to an internal server.
To protect the internal hosts and internal server against scanning attacks and smurf attacks,
configure an attack defense policy to meet the following requirements:
• Configure low-level scanning attack detection. Configure the device to log scanning attacks and
keep the attackers' IP addresses on the blacklist for 10 minutes.
• Configure signature detection for smurf attack, and configure the device to log smurf attacks.
To protect the internal server against SYN flood attacks, configure another attack defense policy to
meet the following requirements:
• Set the attack prevention triggering threshold to 5000 packets per second.
• Specify the prevention action as packet dropping and logging.
Figure 151 Network diagram
Configuration procedure
# Configure IP addresses for the interfaces on Router. (Details not shown.)
# Enable the global blacklist feature.
<Router> system-view
[Router] blacklist global enable
# Configure signature detection for smurf attacks, and specify the prevention action as logging.
[Router-attack-defense-policy-a1] signature detect smurf action logging
# Configure low level scanning attack detection. Specify the prevention action as logging and
block-source, and set the aging time to 10 minutes for the blacklist entries.
506
[Router-attack-defense-policy-a1] scan detect level low action logging block-source
timeout 10
# Configure SYN flood attack detection for 10.1.1.2. Set the threshold for triggering attack prevention
to 5000. Specify the prevention actions as logging and drop.
[Router-attack-defense-policy-a1] syn-flood detect ip 10.1.1.2 threshold 5000 action
logging drop
[Router-attack-defense-policy-a1] quit
507
IP option record route Disabled info L
IP option internet timestamp Disabled info L
IP option security Disabled info L
IP option loose source routing Disabled info L
IP option stream ID Disabled info L
IP option strict source routing Disabled info L
IP option route alert Disabled info L
ICMP echo request Disabled info L
ICMP echo reply Disabled info L
ICMP source quench Disabled info L
ICMP destination unreachable Disabled info L
ICMP redirect Disabled info L
ICMP time exceeded Disabled info L
ICMP parameter problem Disabled info L
ICMP timestamp request Disabled info L
ICMP timestamp reply Disabled info L
ICMP information request Disabled info L
ICMP information reply Disabled info L
ICMP address mask request Disabled info L
ICMP address mask reply Disabled info L
ICMPv6 echo request Disabled info L
ICMPv6 echo reply Disabled info L
ICMPv6 group membership query Disabled info L
ICMPv6 group membership report Disabled info L
ICMPv6 group membership reduction Disabled info L
ICMPv6 destination unreachable Disabled info L
ICMPv6 time exceeded Disabled info L
ICMPv6 parameter problem Disabled info L
ICMPv6 packet too big Disabled info L
508
Flood attack defense for protected IP addresses:
Address VPN instance Flood type Thres(pps) Actions Ports
10.1.1.2 -- SYN-FLOOD 5000 L,D -
# Verify that the attack detection and prevention takes effect on GigabitEthernet 2/0/2.
[Router] display attack-defense statistics interface gigabitethernet 2/0/2
Attack policy name: a1
Scan attack defense statistics:
AttackType AttackTimes Dropped
Port scan 2 0
IP sweep 3 0
Distribute port scan 1 0
Flood attack defense statistics:
AttackType AttackTimes Dropped
SYN flood 1 5000
Signature attack defense statistics:
AttackType AttackTimes Dropped
Smurf 1 0
# Verify that the IPv4 blacklist feature collaborates with the scanning attack detection.
[Router] display blacklist ip
IP address VPN instance DS-Lite tunnel peer Type TTL(sec) Dropped
5.5.5.5 -- -- Dynamic 600 353452
Configuration procedure
# Configure IP addresses for the interfaces on Router. (Details not shown.)
# Enable the global blacklist feature.
<Router> system-view
[Router] blacklist global enable
# Add a blacklist entry for Host C and set the aging time to 50 minutes for the entry.
509
[Router] blacklist ip 192.168.1.4 timeout 50
# Verify that the router drops packets from Host D. (Details not shown.)
# Execute the undo blacklist ip 5.5.5.5 command and verify that the router forwards packets from
Host D. (Details not shown.)
# Verify that the router drops packets from Host C for 50 minutes and forwards packets from Host C
after 50 minutes. (Details not shown.)
Configuration procedure
# Configure IP addresses for the interfaces on Router. (Details not shown.)
# Create attack defense policy a1.
<Router> system-view
[Router] attack-defense policy a1
# Set the global threshold to 10000 for triggering SYN flood attack prevention.
[Router-attack-defense-policy-a1] syn-flood threshold 10000
# Specify logging and client-verify as the global actions against SYN flood attacks.
[Router-attack-defense-policy-a1] syn-flood action logging client-verify
[Router-attack-defense-policy-a1] quit
510
[Router-GigabitEthernet2/0/1] quit
# Enable TCP client verification in SYN cookie mode on interface GigabitEthernet 2/0/1.
[Router] interface gigabitethernet 2/0/1
[Router-GigabitEthernet2/0/1] client-verify tcp enable mode syn-cookie
[Router-GigabitEthernet2/0/1] quit
Configuration procedure
# Configure IP addresses for the interfaces on Router. (Details not shown.)
# Create attack defense policy a1.
<Router> system-view
[Router] attack-defense policy a1
# Set the global threshold to 10000 for triggering DNS flood attack prevention.
[Router-attack-defense-policy-a1] dns-flood threshold 10000
# Specify logging and client-verify as the global actions against DNS flood attacks.
[Router-attack-defense-policy-a1] dns-flood action logging client-verify
[Router-attack-defense-policy-a1] quit
511
# Enable DNS client verification on interface GigabitEthernet 2/0/1.
[Router] interface gigabitethernet 2/0/1
[Router-GigabitEthernet2/0/1] client-verify dns enable
[Router-GigabitEthernet2/0/1] quit
Configuration procedure
# Configure IP addresses for the interfaces on Router. (Details not shown.)
# Create attack defense policy a1.
<Router> system-view
[Router] attack-defense policy a1
# Set the global threshold to 10000 for triggering HTTP flood attack prevention.
[Router-attack-defense-policy-a1] http-flood threshold 10000
# Specify logging and client-verify as the global actions against HTTP flood attacks.
[Router-attack-defense-policy-a1] http-flood action logging client-verify
[Router-attack-defense-policy-a1] quit
512
[Router] interface gigabitethernet 2/0/1
[Router-GigabitEthernet2/0/1] client-verify http enable
[Router-GigabitEthernet2/0/1] quit
513
Configuring IP source guard
Overview
IP source guard (IPSG) prevents spoofing attacks by using an IPSG binding table to match
legitimate packets. It drops packets that do not match the table. IPSG is a per-interface packet filter.
Configuring the feature on one interface does not affect packet forwarding on another interface.
The IPSG bindings are interface-specific. The bindings fall into the following types:
• IP.
• MAC.
• IP-MAC.
• IP-VLAN.
• MAC-VLAN.
• IP-MAC-VLAN.
IPSG bindings can be static or dynamic.
• Static bindings—Configured manually.
• Dynamic bindings—Generated based on information from other modules. For more
information about dynamic bindings, see "Dynamic IPSG bindings."
As shown in Figure 156, IPSG forwards only the packets that match an IPSG binding.
Figure 156 Diagram for the IPSG feature
IP network
514
Dynamic IPSG bindings
IPSG automatically obtains user information from other modules to generate dynamic bindings. The
source modules include 802.1X, DHCP relay, DHCP snooping, DHCPv6 snooping, and DHCP
server.
DHCP-based IPSG bindings are suitable for scenarios where hosts on a LAN obtain IP addresses
through DHCP. IPSG is configured on the DHCP snooping device or the DHCP relay agent. It
generates dynamic bindings based on the DHCP snooping entries or DHCP relay entries. IPSG
allows only packets from the DHCP clients to pass through.
Dynamic IPv4SG
Dynamic bindings generated based on different source modules are for different usages:
For more information about 802.1X, see "Configuring 802.1X." For information about DHCP
snooping, DHCP relay, and DHCP server see Layer 3—IP Services Configuration Guide.
Dynamic IPv6SG
IPv6SG on an interface obtains information from DHCPv6 snooping entries to generate bindings for
packet filtering.
For more information about DHCPv6 snooping, see Layer 3—IP Services Configuration Guide.
Compatibility information
Feature and hardware compatibility
Hardware IP source guard compatibility
MSR954(JH296A/JH297A/JH299A) No
MSR1002-4/1003-8S Yes
MSR2003 Yes
MSR2004-24/2004-48 Yes
MSR3012/3024/3044/3064 Yes
MSR4060/4080 Yes
515
• MSR2004-24/2004-48.
• MSR3012/3024/3044/3064.
• MSR954(JH296A/JH297A/JH299A)
Commands and descriptions for distributed devices apply to MSR4060 and MSR4080 routers.
Tasks at a glance
(Required.) Enabling IPv4SG on an interface
(Optional.) Configuring a static IPv4SG binding
Tasks at a glance
(Required.) Enabling IPv6SG on an interface
(Optional.) Configuring a static IPv6SG binding
516
Configuring a static IPv4SG binding
Step Command Remarks
1. Enter system view. system-view N/A
The following interface types are
interface interface-type supported:
2. Enter interface view.
interface-number • Layer 2 Ethernet port.
• VLAN interface.
By default, no static IPv4SG binding is
ip source binding { ip-address configured on an interface.
3. Configure a static ip-address | ip-address
The vlan vlan-id option is supported only
IPv4SG binding. ip-address mac-address
in Layer 2 Ethernet interface view.
mac-address | mac-address
mac-address } [ vlan vlan-id ] You can configure the same static
IPv4SG binding on different interfaces.
517
Step Command Remarks
The following interface types are
interface interface-type supported:
2. Enter interface view.
interface-number • Layer 2 Ethernet port.
• VLAN interface.
Task Command
display ip source binding [ static | [ vpn-instance
Display IPv4SG bindings
vpn-instance-name ] [ dhcp-relay | dhcp-server | dhcp-snooping |
(centralized devices in standalone
dot1x ] ] [ ip-address ip-address ] [ mac-address mac-address ]
mode).
[ vlan vlan-id ] [ interface interface-type interface-number ]
display ip source binding [ static | [ vpn-instance
Display IPv4SG bindings
vpn-instance-name ] [ dhcp-relay | dhcp-server | dhcp-snooping |
(distributed devices in standalone
dot1x ] ] [ ip-address ip-address ] [ mac-address mac-address ]
mode/centralized devices in IRF
[ vlan vlan-id ] [ interface interface-type interface-number ] [ slot
mode).
slot-number ]
display ip source binding [ static | [ vpn-instance
vpn-instance-name ] [ dhcp-relay | dhcp-server | dhcp-snooping |
Display IPv4SG bindings
dot1x ] ] [ ip-address ip-address ] [ mac-address mac-address ]
(distributed devices in IRF mode).
[ vlan vlan-id ] [ interface interface-type interface-number ] [ chassis
chassis-number slot slot-number ]
display ipv6 source binding [ static | [ vpn-instance
Display IPv6SG bindings
vpn-instance-name ] [ dhcpv6-snooping ] ] [ ip-address
(centralized devices in standalone
ipv6-address ] [ mac-address mac-address ] [ vlan vlan-id ]
mode).
[ interface interface-type interface-number ]
Display IPv6SG bindings display ipv6 source binding [ static | [ vpn-instance
(distributed devices in standalone vpn-instance-name ] [ dhcpv6-snooping ] ] [ ip-address
mode/centralized devices in IRF ipv6-address ] [ mac-address mac-address ] [ vlan vlan-id ]
mode). [ interface interface-type interface-number ] [ slot slot-number ]
display ipv6 source binding [ static | [ vpn-instance
vpn-instance-name ] [ dhcpv6-snooping ] ] [ ip-address
Display IPv6 bindings (distributed
ipv6-address ] [ mac-address mac-address ] [ vlan vlan-id ]
devices in IRF mode).
[ interface interface-type interface-number ] [ chassis
chassis-number slot slot-number ]
518
IPSG configuration examples
Static IPv4SG configuration example
Network requirements
As shown in Figure 157, all hosts use static IP addresses.
Configure static IPv4SG bindings on Device A and Device B to meet the following requirements:
• GigabitEthernet 2/0/2 of Device A allows only IP packets from Host C to pass.
• GigabitEthernet 2/0/1 of Device A allows only IP packets from Host A to pass.
• GigabitEthernet 2/0/1 of Device B allows IP packets from Host B to pass.
Figure 157 Network diagram
GE2/0/1 GE2/0/2
Device A
GE2/0/2 GE2/0/1
Device B
Host C
IP: 192.168.0.3/24
MAC : 0001-0203-0405
Host A Host B
IP: 192.168.0.1/24 IP: 192.168.0.2/24
MAC: 0001-0203-0406 MAC: 0001-0203-0407
Configuration procedure
1. Configure Device A:
# Configure IP addresses for the interfaces. (Details not shown.)
# Enable IPv4SG on GigabitEthernet 2/0/2.
<DeviceA> system-view
[DeviceA] interface gigabitethernet 2/0/2
[DeviceA-GigabitEthernet2/0/2] ip verify source ip-address mac-address
# On GigabitEthernet 2/0/2, configure a static IPv4SG binding for Host C.
[DeviceA-GigabitEthernet2/0/2] ip source binding ip-address 192.168.0.3 mac-address
0001-0203-0405
[DeviceA-GigabitEthernet2/0/2] quit
# Enable IPv4SG on GigabitEthernet 2/0/1.
[DeviceA] interface gigabitethernet 2/0/1
[DeviceA-GigabitEthernet2/0/1] ip verify source ip-address mac-address
# On GigabitEthernet 2/0/1, configure a static IPv4SG binding for Host A.
[DeviceA-GigabitEthernet2/0/1] ip source binding ip-address 192.168.0.1 mac-address
0001-0203-0406
[DeviceA-GigabitEthernet2/0/1] quit
2. Configure Device B:
# Configure an IP address for each interface. (Details not shown.)
# Enable IPv4SG on GigabitEthernet 2/0/2.
<DeviceB> system-view
[DeviceB] interface gigabitethernet 2/0/2
519
[DeviceB-GigabitEthernet2/0/2] ip verify source ip-address mac-address
[DeviceB-GigabitEthernet2/0/2] quit
# Enable IPv4SG on GigabitEthernet 2/0/1.
[DeviceB] interface gigabitethernet 2/0/1
[DeviceB-GigabitEthernet2/0/1] ip verify source ip-address mac-address
# On GigabitEthernet 2/0/1, configure a static IPv4SG binding for Host B.
[DeviceB-GigabitEthernet2/0/1] ip source binding mac-address 0001-0203-0407
[DeviceB-GigabitEthernet2/0/1] quit
# Verify that the static IPv4SG bindings are configured successfully on Device B.
<DeviceB> display ip source binding static
Total entries found: 2
IP Address MAC Address Interface VLAN Type
N/A 0001-0203-0407 GE2/0/1 N/A Static
Configuration procedure
1. Configure the DHCP server.
For information about DHCP server configuration, see Layer 3—IP Services Configuration
Guide.
2. Configure the device:
# Configure IP addresses for the interfaces. (Details not shown.)
# Enable DHCP snooping.
<Device> system-view
520
[Device] dhcp snooping enable
# Configure GigabitEthernet 2/0/2 as a trusted interface.
[Device] interface gigabitethernet 2/0/2
[Device-GigabitEthernet2/0/2] dhcp snooping trust
[Device-GigabitEthernet2/0/2] quit
# Enable IPv4SG on GigabitEthernet 2/0/1 and verify the source IP address and MAC address
for dynamic IPSG.
[Device] interface gigabitethernet 2/0/1
[Device-GigabitEthernet2/0/1] ip verify source ip-address mac-address
# Enable recording of client information in DHCP snooping entries on GigabitEthernet 2/0/1.
[Device-GigabitEthernet2/0/1] dhcp snooping binding record
[Device-GigabitEthernet2/0/1] quit
Configuration procedure
1. Configure the DHCP relay agent:
# Configure IP addresses for the interfaces. (Details not shown.)
# Enable the DHCP service.
<Router> system-view
[Router] dhcp enable
# Enable recording DHCP relay client entries.
[Router] dhcp relay client-information record
# Configure interface GigabitEthernet 2/0/1 to operate in DHCP relay mode.
[Router] interface gigabitethernet 2/0/1
[Router-GigabitEthernet2/0/1] dhcp select relay
# Specify the IP address of the DHCP server.
[Router-GigabitEthernet2/0/1] dhcp relay server-address 10.1.1.1
521
[Router-GigabitEthernet2/0/1] quit
2. Enable IPv4SG on interface GigabitEthernet 2/0/1 and verify the source IP address and MAC
address for dynamic IPSG.
[Router] interface gigabitethernet 2/0/1
[Router-GigabitEthernet2/0/1] ip verify source ip-address mac-address
[Router-GigabitEthernet2/0/1] quit
Configuration procedure
# Enable IPv6SG on GigabitEthernet 2/0/1.
<Device> system-view
[Device] interface gigabitethernet 2/0/1
[Device-GigabitEthernet2/0/1] ipv6 verify source ip-address mac-address
522
• Enable DHCPv6 snooping on the device to record the IPv6 address and the MAC address of
the host in a DHCPv6 snooping entry.
• Enable dynamic IPv6SG on GigabitEthernet 2/0/1 to filter received packets based on DHCPv6
snooping entries. Only packets from the client that obtains an IP address from the DHCPv6
server are allowed to pass.
Figure 161 Network diagram
Configuration procedure
1. Configure DHCPv6 snooping:
# Enable DHCPv6 snooping globally.
<Device> system-view
[Device] ipv6 dhcp snooping enable
# Configure GigabitEthernet 2/0/2 as a trusted interface.
[Device] interface gigabitethernet 2/0/2
[Device-GigabitEthernet2/0/2] ipv6 dhcp snooping trust
[Device-GigabitEthernet2/0/2] quit
2. Enable IPv6SG:
# Enable IPv6SG on GigabitEthernet 2/0/1 and verify the source IP address and MAC address
for dynamic IPv6SG.
[Device] interface gigabitethernet 2/0/1
[Device-GigabitEthernet2/0/1] ipv6 verify source ip-address mac-address
# Enable recording of client information in DHCPv6 snooping entries on GigabitEthernet 2/0/1.
[Device-GigabitEthernet2/0/1] ipv6 dhcp snooping binding record
[Device-GigabitEthernet2/0/1] quit
523
Configuring ARP attack protection
ARP attacks and viruses are threatening LAN security. This chapter describes multiple features used
to detect and prevent ARP attacks.
Although ARP is easy to implement, it provides no security mechanism and is vulnerable to network
attacks. An attacker can exploit ARP vulnerabilities to attack network devices in the following ways:
• Acts as a trusted user or gateway to send ARP packets so the receiving devices obtain
incorrect ARP entries.
• Sends a large number of unresolvable IP packets to have the receiving device busy with
resolving IP addresses until its CPU is overloaded. Unresolvable IP packets refer to IP packets
for which ARP cannot find corresponding MAC addresses.
• Sends a large number of ARP packets to overload the CPU of the receiving device.
For more information about ARP attack features and types, see ARP Attack Protection Technology
White Paper.
524
Configuring unresolvable IP attack protection
If a device receives a large number of unresolvable IP packets from a host, the following situations
can occur:
• The device sends a large number of ARP requests, overloading the target subnets.
• The device keeps trying to resolve the destination IP addresses, overloading its CPU.
To protect the device from such IP attacks, you can configure the following features:
• ARP source suppression—Stops resolving packets from a host if the number of unresolvable
IP packets from the host exceeds the upper limit within 5 seconds. The device continues ARP
resolution when the interval elapses. This feature is applicable if the attack packets have the
same source addresses.
• ARP blackhole routing—Creates a blackhole route destined for an unresolvable IP address.
The device drops all matching packets until the blackhole route ages out. This feature is
applicable regardless of whether the attack packets have the same source addresses.
2. Enable ARP source suppression. arp source-suppression By default, ARP source suppression is
enable disabled.
3. Set the maximum number of
unresolvable packets that the arp source-suppression By default, the maximum number is
device can receive from a host limit limit-value 10.
within 5 seconds.
Task Command
Display ARP source suppression configuration
display arp source-suppression
information.
525
Configuration example
Network requirements
As shown in Figure 162, a LAN contains two areas: an R&D area in VLAN 10 and an office area in
VLAN 20. Each area connects to the gateway (Device) through an access switch.
A large number of ARP requests are detected in the office area and are considered an attack caused
by unresolvable IP packets. To prevent the attack, configure ARP source suppression and ARP
blackhole routing.
Figure 162 Network diagram
IP network
Gateway
Device
VLAN 10 VLAN 20
Configuration considerations
If the attack packets have the same source address, configure the ARP source suppression feature
as follows:
1. Enable ARP source suppression.
2. Set the threshold to 100. If the number of unresolvable IP packets received from a host within 5
seconds exceeds 100, the device stops resolving packets from the host until the 5 seconds
elapse.
If the attack packets have different source addresses, enable the ARP blackhole routing feature on
the gateway.
Configuration procedure
# Enable ARP source suppression and set the threshold to 100.
<Device> system-view
[Device] arp source-suppression enable
[Device] arp source-suppression limit 100
526
Configuring source MAC-based ARP attack
detection
This feature checks the number of ARP packets delivered to the CPU. If the number of packets from
the same MAC address within 5 seconds exceeds a threshold, the device adds the MAC address to
an ARP attack entry. Before the entry is aged out, the device handles the attack by using either of the
following methods:
• Monitor—Only generates log messages.
• Filter—Generates log messages and filters out subsequent ARP packets from that MAC
address.
You can exclude the MAC addresses of some gateways and servers from this detection. This feature
does not inspect ARP packets from those devices even if they are attackers.
Configuration procedure
To configure source MAC-based ARP attack detection:
4. Set the aging timer for ARP By default, the lifetime is 300
attack entries. arp source-mac aging-time time
seconds.
5. (Optional.) Exclude specific
MAC addresses from this arp source-mac exclude-mac By default, no MAC address is
detection. mac-address&<1-64> excluded.
NOTE:
When an ARP attack entry is aged out, ARP packets sourced from the MAC address in the entry can
be processed correctly.
Task Command
Display ARP attack entries detected by source
display arp source-mac [ interface interface-type
MAC-based ARP attack detection (centralized
interface-number ]
devices in standalone mode).
Display ARP attack entries detected by source
MAC-based ARP attack detection (distributed display arp source-mac { slot slot-number | interface
devices in standalone mode/centralized interface-type interface-number }
devices in IRF mode).
527
Task Command
Display ARP attack entries detected by source
display arp source-mac { chassis chassis-number slot
MAC-based ARP attack detection (distributed
slot-number | interface interface-type interface-number }
devices in IRF mode).
Configuration example
Network requirements
As shown in Figure 163, the hosts access the Internet through a gateway (Device). If malicious users
send a large number of ARP requests to the gateway, the gateway might crash and cannot process
requests from the clients. To solve this problem, configure source MAC-based ARP attack detection
on the gateway.
Figure 163 Network diagram
IP network
Configuration considerations
An attacker might forge a large number of ARP packets by using the MAC address of a valid host as
the source MAC address. To prevent such attacks, configure the gateway in the following steps:
1. Enable source MAC-based ARP attack detection and specify the handling method as filter.
2. Set the threshold.
3. Set the lifetime for ARP attack entries.
4. Exclude the MAC address of the server from this detection.
Configuration procedure
# Enable source MAC-based ARP attack detection, and specify the handling method as filter.
<Device> system-view
[Device] arp source-mac filter
528
# Set the lifetime for ARP attack entries to 60 seconds.
[Device] arp source-mac aging-time 60
529
With authorized ARP enabled, an interface is disabled from learning dynamic ARP entries. This
feature prevents user spoofing and allows only authorized clients to access network resources.
Configuration procedure
To enable authorized ARP:
Configuration procedure
1. Configure Device A:
# Specify the IP address for GigabitEthernet 2/0/1.
<DeviceA> system-view
[DeviceA] interface gigabitethernet 2/0/1
[DeviceA-GigabitEthernet2/0/1] ip address 10.1.1.1 24
[DeviceA-GigabitEthernet2/0/1] quit
# Configure DHCP.
[DeviceA] dhcp enable
[DeviceA] dhcp server ip-pool 1
[DeviceA-dhcp-pool-1] network 10.1.1.0 mask 255.255.255.0
[DeviceA-dhcp-pool-1] quit
# Enter Layer 3 Ethernet interface view.
[DeviceA] interface gigabitethernet 2/0/1
# Enable authorized ARP.
[DeviceA-GigabitEthernet2/0/1] arp authorized enable
[DeviceA-GigabitEthernet2/0/1] quit
530
2. Configure Device B:
<DeviceB> system-view
[DeviceB] interface gigabitethernet 2/0/1
[DeviceB-GigabitEthernet2/0/1] ip address dhcp-alloc
[DeviceB-GigabitEthernet2/0/1] quit
The output shows that IP address 10.1.1.2 has been assigned to Device B.
Device B must use the IP address and MAC address in the authorized ARP entry to communicate
with Device A. Otherwise, the communication fails. Thus user validity is ensured.
GE2/0/1 GE2/0/2
10.1.1.2/24 10.10.1.1/24
Device B
Device A Device C
Configuration procedure
1. Configure Device A:
# Specify the IP address for GigabitEthernet 2/0/1.
<DeviceA> system-view
[DeviceA] interface gigabitethernet 2/0/1
[DeviceA-GigabitEthernet2/0/1] ip address 10.1.1.1 24
[DeviceA-GigabitEthernet2/0/1] quit
# Configure DHCP.
[DeviceA] dhcp enable
[DeviceA] dhcp server ip-pool 1
[DeviceA-dhcp-pool-1] network 10.10.1.0 mask 255.255.255.0
[DeviceA-dhcp-pool-1] gateway-list 10.10.1.1
[DeviceA-dhcp-pool-1] quit
[DeviceA] ip route-static 10.10.1.0 24 10.1.1.2
531
2. Configure Device B:
# Enable DHCP.
<DeviceB> system-view
[DeviceB] dhcp enable
# Specify the IP addresses of GigabitEthernet 2/0/1 and GigabitEthernet 2/0/2.
[DeviceB] interface gigabitethernet 2/0/1
[DeviceB-GigabitEthernet2/0/1] ip address 10.1.1.2 24
[DeviceB-GigabitEthernet2/0/1] quit
[DeviceB] interface gigabitethernet 2/0/2
[DeviceB-GigabitEthernet2/0/2] ip address 10.10.1.1 24
# Enable DHCP relay agent on GigabitEthernet 2/0/2.
[DeviceB-GigabitEthernet2/0/2] dhcp select relay
# Add the DHCP server 10.1.1.1 to DHCP server group 1.
[DeviceB-GigabitEthernet2/0/2] dhcp relay server-address 10.1.1.1
# Enable authorized ARP.
[DeviceB-GigabitEthernet2/0/2] arp authorized enable
[DeviceB-GigabitEthernet2/0/2] quit
# Enable recording of relay entries on the relay agent.
[DeviceB] dhcp relay client-information record
3. Configure Device C:
<DeviceC> system-view
[DeviceC] ip route-static 10.1.1.0 24 10.10.1.1
[DeviceC] interface gigabitethernet 2/0/2
[DeviceC-GigabitEthernet2/0/2] ip address dhcp-alloc
[DeviceC-GigabitEthernet2/0/2] quit
The output shows that Device A assigned the IP address 10.10.1.2 to Device C.
Device C must use the IP address and MAC address in the authorized ARP entry to communicate
with Device B. Otherwise, the communication fails. Thus the user validity is ensured.
532
{ MSR954(JH296A/JH297A/JH299A).
{ MSR1002-4/1003-8S.
{ MSR2004-24/2004-48.
ARP detection enables access devices to block ARP packets from unauthorized clients to prevent
user spoofing and gateway spoofing attacks. ARP detection does not check ARP packets received
from ARP trusted interfaces.
ARP detection provides the user validity check, ARP packet validity check, and ARP restricted
forwarding features.
If both ARP packet validity check and user validity check are enabled, the former one applies first,
and then the latter applies.
533
Step Command Remarks
excluded from ARP detection.
ARP restricted forwarding controls the forwarding of ARP packets that are received on untrusted
interfaces and have passed user validity check as follows:
• If the packets are ARP requests, they are forwarded through the trusted interface.
• If the packets are ARP replies, they are forwarded according to their destination MAC address.
If no match is found in the MAC address table, they are forwarded through the trusted interface.
Configure user validity check before you configure ARP restricted forwarding.
To enable ARP restricted forwarding:
534
Step Command Remarks
1. Enter system view. system-view N/A
2. Enter VLAN view. vlan vlan-id N/A
Task Command
Display the VLANs enabled with ARP detection. display arp detection
display arp detection statistics [ interface
Display the ARP detection statistics.
interface-type interface-number ]
reset arp detection statistics [ interface
Clear the ARP detection statistics.
interface-type interface-number ]
Configuration procedure
1. Add all interfaces on Router B to VLAN 10, and specify the IP address of VLAN-interface 10 on
Switch A. (Details not shown.)
2. Configure the DHCP server on Switch A, and configure DHCP address pool 0.
535
<SwitchA> system-view
[SwitchA] dhcp enable
[SwitchA] dhcp server ip-pool 0
[SwitchA-dhcp-pool-0] network 10.1.1.0 mask 255.255.255.0
3. Configure Host A (DHCP client) and Host B. (Details not shown.)
4. Configure Router B:
# Enable DHCP snooping.
<RouterB> system-view
[RouterB] dhcp snooping enable
[RouterB] interface gigabitethernet 2/0/3
[RouterB-GigabitEthernet2/0/3] dhcp snooping trust
[RouterB-GigabitEthernet2/0/3] quit
# Enable recording of client information in DHCP snooping entries on GigabitEthernet 2/0/1.
[RouterB] interface gigabitethernet 2/0/1
[RouterB-GigabitEthernet2/0/1] dhcp snooping binding record
[RouterB-GigabitEthernet2/0/1] quit
# Enable ARP detection for VLAN 10.
[RouterB] vlan 10
[RouterB-vlan10] arp detection enable
# Configure the upstream interface as a trusted interface. By default, an interface is an
untrusted interface.
[RouterB-vlan10] interface gigabitethernet 2/0/3
[RouterB-GigabitEthernet2/0/3] arp detection trust
[RouterB-GigabitEthernet2/0/3] quit
# Configure a static IP source guard binding entry on interface GigabitEthernet 2/0/2 for user
validity check.
[RouterB] interface gigabitethernet 2/0/2
[RouterB-GigabitEthernet2/0/2] ip source binding ip-address 10.1.1.6 mac-address
0001-0203-0607 vlan 10
[RouterB-GigabitEthernet2/0/2] quit
# Enable ARP packet validity check by checking the MAC addresses and IP addresses of ARP
packets.
[RouterB] arp detection validate dst-mac ip src-mac
After the configurations are completed, Router B first checks the validity of ARP packets
received on GigabitEthernet 2/0/1 and GigabitEthernet 2/0/2. If the ARP packets are confirmed
valid, the router performs user validity check by using the static IP source guard binding entries
and finally DHCP snooping entries.
536
Figure 167 Network diagram
Configuration procedure
1. Configure VLAN 10, add interfaces to VLAN 10, and specify the IP address of the VLAN
interface. (Details not shown.)
2. Configure the DHCP server on Switch A, and configure DHCP address pool 0.
<SwitchA> system-view
[SwitchA] dhcp enable
[SwitchA] dhcp server ip-pool 0
[SwitchA-dhcp-pool-0] network 10.1.1.0 mask 255.255.255.0
3. Configure Host A (DHCP client) and Host B. (Details not shown.)
4. Configure Router B:
# Enable DHCP snooping, and configure GigabitEthernet 2/0/3 as a DHCP trusted interface.
<RouterB> system-view
[RouterB] dhcp snooping enable
[RouterB] interface gigabitethernet 2/0/3
[RouterB-GigabitEthernet2/0/3] dhcp snooping trust
[RouterB-GigabitEthernet2/0/3] quit
# Enable ARP detection for user validity check.
[RouterB] vlan 10
[RouterB-vlan10] arp detection enable
# Configure GigabitEthernet 2/0/3 as an ARP trusted interface.
[RouterB-vlan10] interface gigabitethernet 2/0/3
[RouterB-GigabitEthernet2/0/3] arp detection trust
[RouterB-GigabitEthernet2/0/3] quit
# Configure a static IP source guard entry on interface GigabitEthernet 2/0/2.
[RouterB] interface gigabitethernet 2/0/2
[RouterB-GigabitEthernet2/0/2] ip source binding ip-address 10.1.1.6 mac-address
0001-0203-0607 vlan 10
[RouterB-GigabitEthernet2/0/2] quit
# Enable ARP packet validity check by checking the MAC addresses and IP addresses of ARP
packets.
[RouterB] arp detection validate dst-mac ip src-mac
# Configure port isolation.
537
[RouterB] port-isolate group 1
[RouterB] interface gigabitethernet 2/0/1
[RouterB-GigabitEthernet2/0/1] port-isolate enable group 1
[RouterB-GigabitEthernet2/0/1] quit
[RouterB] interface gigabitethernet 2/0/2
[RouterB-GigabitEthernet2/0/2] port-isolate enable group 1
[RouterB-GigabitEthernet2/0/2] quit
After the configurations are completed, Router B first checks the validity of ARP packets
received on GigabitEthernet 2/0/1 and GigabitEthernet 2/0/2. If the ARP packets are confirmed
valid, the router performs user validity check by using the static IP source guard binding entries
and finally DHCP snooping entries. However, ARP broadcast requests sent from Host A can
pass the check on Router B and reach Host B. Port isolation fails.
# Enable ARP restricted forwarding.
[RouterB] vlan 10
[RouterB-vlan10] arp restricted-forwarding enable
[RouterB-vlan10] quit
After the configuration is completed, Router B forwards ARP broadcast requests from Host A to
Switch A through the trusted interface GigabitEthernet 2/0/3. Host B cannot receive such
packets. Port isolation operates correctly.
Configuration procedure
To configure ARP scanning and fixed ARP:
538
Step Command
1. Enter system view. system-view
2. Enter interface view. interface interface-type interface-number
3. Enable ARP scanning. arp scan [ start-ip-address to end-ip-address ]
4. Return to system view. quit
5. Enable fixed ARP. arp fixup
Configuration guidelines
Follow these guidelines when you configure ARP gateway protection:
• You can enable ARP gateway protection for a maximum of eight gateways on an interface.
• Do not configure both the arp filter source and arp filter binding commands on an interface.
• If ARP gateway protection operates with ARP detection and ARP fast-reply, ARP gateway
protection applies first.
Configuration procedure
To configure ARP gateway protection:
Configuration example
Network requirements
As shown in Figure 168, Host B launches gateway spoofing attacks to Router B. As a result, traffic
that Router B intends to send to Router A is sent to Host B.
Configure Router B to block such attacks.
539
Figure 168 Network diagram
Gateway
Router A 10.1.1.1/24
GE2/0/3
Router B
GE2/0/1 GE2/0/2
Host A Host B
Configuration procedure
# Configure ARP gateway protection on Router B.
<RouterB> system-view
[RouterB] interface gigabitethernet 2/0/1
[RouterB-GigabitEthernet2/0/1] arp filter source 10.1.1.1
[RouterB-GigabitEthernet2/0/1] quit
[RouterB] interface gigabitethernet 2/0/2
[RouterB-GigabitEthernet2/0/2] arp filter source 10.1.1.1
Configuration guidelines
Follow these guidelines when you configure ARP filtering:
• You can configure a maximum of eight permitted entries on an interface.
• Do not configure both the arp filter source and arp filter binding commands on an interface.
• If ARP filtering operates with ARP detection and ARP fast-reply, ARP filtering applies first.
Configuration procedure
To configure ARP filtering:
540
Step Command Remarks
1. Enter system view. system-view N/A
2. Enter Layer 2 Ethernet
interface or Layer 2 aggregate interface interface-type
N/A
interface view. interface-number
3. Enable ARP filtering and arp filter binding ip-address By default, ARP filtering is
configure a permitted entry. mac-address disabled.
Configuration example
Network requirements
As shown in Figure 169, the IP and MAC addresses of Host A are 10.1.1.2 and 000f-e349-1233,
respectively. The IP and MAC addresses of Host B are 10.1.1.3 and 000f-e349-1234, respectively.
Configure ARP filtering on GigabitEthernet 2/0/1 and GigabitEthernet 2/0/2 of Router B to permit
ARP packets from only Host A and Host B.
Figure 169 Network diagram
Configuration procedure
# Configure ARP filtering on Router B.
<RouterB> system-view
[RouterB] interface gigabitethernet 2/0/1
[RouterB-GigabitEthernet2/0/1] arp filter binding 10.1.1.2 000f-e349-1233
[RouterB-GigabitEthernet2/0/1] quit
[RouterB] interface gigabitethernet 2/0/2
[RouterB-GigabitEthernet2/0/2] arp filter binding 10.1.1.3 000f-e349-1234
541
Configuring uRPF
Overview
Unicast Reverse Path Forwarding (uRPF) protects a network against source address spoofing
attacks, such as DoS and DDoS attacks.
Attackers send packets with a forged source address to access a system that uses IP-based
authentication, in the name of authorized users or even the administrator. Even if the attackers or
other hosts cannot receive any response packets, the attacks are still disruptive to the attacked
target.
Figure 170 Source address spoofing attack
As shown in Figure 170, an attacker on Router A sends the server (Router B) requests with a forged
source IP address 2.2.2.1 at a high rate. Router B sends response packets to IP address 2.2.2.1
(Router C). Consequently, both Router B and Router C are attacked. If the administrator disconnects
Router C by mistake, the network service is interrupted.
Attackers can also send packets with different forged source addresses or attack multiple servers
simultaneously to block connections or even break down the network.
uRPF can prevent these source address spoofing attacks. It checks whether an interface that
receives a packet is the output interface of the FIB entry that matches the source address of the
packet. If not, uRPF considers it a spoofing attack and discards the packet.
Features
Default route—When a default route exists, all packets that fail to match a specific FIB entry match
the default route during uRPF check and thus are permitted to pass. To avoid this situation, you can
disable uRPF from using any default route to discard such packets. If you allow using the default
route (set by using allow-default-route), uRPF permits packets that only match the default route. By
default, uRPF discards packets that can only match a default route. Typically, you do not need to
configure the allow-default-route keyword on a PE device because it has no default route pointing
to the CE. If you enable uRPF on a CE that has a default route pointing to the PE, select the
allow-default-route keyword.
542
Link layer check—Strict uRPF check can further perform link layer check on a packet. It uses the
next hop address in the matching FIB entry to look up the ARP table for a matching entry. If the
source MAC address of the packet matches the MAC address in the matching ARP entry, the packet
passes strict uRPF check. Link layer check is applicable to ISP devices where a Layer 3 Ethernet
interface connects a large number of PCs. Loose uRPF does not support link layer check.
ACL—To identify specific packets as valid packets, you can use an ACL to match these packets.
Even if the packets do not pass uRPF check, they are still forwarded.
uRPF operation
uRPF does not check multicast packets.
Figure 171 shows how uRPF works.
543
Figure 171 uRPF work flow
544
1. uRPF checks address validity:
{ uRPF permits a packet with a multicast destination address.
{ For a packet with an all-zero source address, uRPF permits the packet if it has a broadcast
destination address. (A packet with source address 0.0.0.0 and destination address
255.255.255.255 might be a DHCP or BOOTP packet and cannot be discarded.) uRPF
proceeds to step 7 if the packet has a non-broadcast destination address.
{ uRPF proceeds to step 2 for other packets.
2. uRPF checks whether the source address matches a unicast route:
{ If yes, uRPF proceeds to step 3.
{ If no, uRPF proceeds to step 7. A non-unicast source address matches a non-unicast route.
3. uRPF checks whether the matching route is to the host itself:
{ If yes, the output interface of the matching route is an InLoop interface. uRPF checks
whether the receiving interface of the packet is an InLoop interface. If yes, it does not check
the packet. If no, it proceeds to step 7.
{ If no, uRPF proceeds to step 4.
4. uRPF checks whether the matching route is a default route:
{ If yes, uRPF checks whether the allow-default-route keyword is configured to allow using
the default route. If yes, it proceeds to step 5. If no, it proceeds to step 7.
{ If no, uRPF proceeds to step 5.
5. uRPF checks whether the receiving interface matches the output interface of the matching FIB
entry:
{ If yes, uRPF proceeds to step 6.
{ If no, uRPF checks whether the check mode is loose. If yes, it proceeds to step 6. If no, it
proceeds to step 7.
6. uRPF checks whether the link-check keyword is configured for link layer check:
{ If no, the packet passes the check.
{ If yes, uRPF uses the next-hop address of the FIB entry to look up the ARP table for a
matching entry. Then it checks whether the MAC address of the matching ARP entry is
identical with the source MAC address of the packet. If yes, the packet passes the check. If
no, uRPF proceeds to step 7.
7. uRPF checks whether the packet is permitted by the ACL:
{ If yes, the packet is forwarded (such a packet is displayed in the uRPF information as a
"suppressed drop").
{ If no, the packet is discarded.
545
Network application
Figure 172 Network diagram
ISP B
uRPF (loose)
ISP A
ISP C
uRPF (strict)
User
As shown in Figure 172, strict uRPF check is configured between an ISP network and a customer
network. Loose uRPF check is configured between ISPs.
For special packets or users, you can configure ACLs.
Configuring uRPF
A device supports uRPF configuration only on interfaces.
Follow these guidelines when you configure uRPF:
• uRPF checks only incoming packets on interfaces.
• You can use the display ip interface command to display statistics about packets discarded by
uRPF (displayed as "Drops" and "Suppressed drops").
546
• Do not configure the allow-default-route keyword for loose uRPF check. Otherwise, uRPF
might fail to work.
To enable uRPF on an interface:
Task Command
Display uRPF configuration (centralized
display ip urpf [ interface interface-type interface-number ]
devices in standalone mode).
Display uRPF configuration (distributed
display ip urpf [ interface interface-type interface-number ]
devices in standalone mode/centralized
[ slot slot-number ]
devices in IRF mode).
Display uRPF configuration (distributed display ip urpf [ interface interface-type interface-number ]
devices in IRF mode). [ chassis chassis-number slot slot-number ]
Configuration procedure
1. Configure Router B:
# Define ACL 2010 to permit traffic from network 10.1.1.0/24.
<RouterB> system-view
[RouterB] acl basic 2010
[RouterB-acl-ipv4-basic-2010] rule permit source 10.1.1.0 0.0.0.255
[RouterB-acl-ipv4-basic-2010] quit
547
# Specify the IP address of GigabitEthernet 2/0/1.
[RouterB] interface gigabitethernet 2/0/1
[RouterB-GigabitEthernet2/0/1] ip address 1.1.1.2 255.255.255.0
# Configure strict uRPF check on GigabitEthernet 2/0/1.
[RouterB-GigabitEthernet2/0/1] ip urpf strict acl 2010
2. Configure Router A:
# Specify the IP address of GigabitEthernet 2/0/1.
<RouterA> system-view
[RouterA] interface gigabitethernet 2/0/1
[RouterA-GigabitEthernet2/0/1] ip address 1.1.1.1 255.255.255.0
# Configure strict uRPF check on GigabitEthernet 2/0/1 and allow use of the default route for
uRPF check.
[RouterA-GigabitEthernet2/0/1] ip urpf strict allow-default-route
548
Configuring IPv6 uRPF
Overview
Unicast Reverse Path Forwarding (uRPF) protects a network against source address spoofing
attacks, such as DoS and DDoS attacks.
Attackers send packets with a forged source address to access a system that uses IP-based
authentication, in the name of authorized users or even the administrator. Even if the attackers or
other hosts cannot receive any response packets, the attacks are still disruptive to the attacked
target.
Figure 174 Source address spoofing attack
As shown in Figure 174, an attacker on Router A sends the server (Router B) requests with a forged
source IPv6 address 2000::1 at a high rate. Router B sends response packets to IPv6 address
2000::1 (Router C). Consequently, both Router B and Router C are attacked. If the administrator
disconnects Router C by mistake, the network service is interrupted.
Attackers can also send packets with different forged source addresses or attack multiple servers
simultaneously to block connections or even break down the network.
IPv6 uRPF can prevent these source address spoofing attacks. It checks whether an interface that
receives a packet is the output interface of the FIB entry that matches the source address of the
packet. If not, uRPF considers it a spoofing attack and discards the packet.
Features
Default route—When a default route exists, all packets that fail to match a specific IPv6 FIB entry
match the default route during IPv6 uRPF check and thus are permitted to pass. If you allow using
the default route (by using allow-default-route), IPv6 uRPF permits packets that only match the
default route. By default, IPv6 uRPF discards packets that can only match a default route. Typically,
you do not need to configure the allow-default-route keyword on a PE device because it has no
default route pointing to the CE device. If you enable IPv6 uRPF on a CE that has a default route
pointing to the PE, select the allow-default-route keyword.
549
IPv6 ACLs—To identify specific packets as valid packets, you can use an IPv6 ACL to match these
packets. Even if the packets do not pass IPv6 uRPF check, they are still forwarded.
1. IPv6 uRPF checks whether the received packet carries a multicast destination address:
{ If yes, IPv6 uRPF permits the packet.
550
{ If no, IPv6 uRPF proceeds to step 2.
2. IPv6 uRPF checks whether the source address matches a unicast route:
{ If yes, IPv6 uRPF proceeds to step 3.
{ If no, IPv6 uRPF proceeds to step 6. A non-unicast source address matches a non-unicast
route.
3. IPv6 uRPF checks whether the matching route is to the host itself:
{ If yes, the output interface of the matching route is an InLoop interface. IPv6 uRPF checks
whether the receiving interface of the packet is an InLoop interface. If yes, IPv6 uRPF
permits the packet. If no, IPv6 uRPF proceeds to step 6. If the source address is a link-local
address and is the receiving interface address, also proceeds to step 6.
{ If no, IPv6 uRPF proceeds to step 4.
4. IPv6 uRPF checks whether the receiving interface matches the output interface of the matching
FIB entry:
{ If yes, IPv6 uRPF proceeds to step 5.
{ If no, IPv6 uRPF checks whether the check mode is loose. If yes, it proceeds to step 5. If no,
it proceeds to step 6.
5. IPv6 uRPF checks whether the matching route is a default route:
{ If yes, IPv6 uRPF checks whether the allow-default-route keyword is configured to allow
using the default route. If yes, the packet is forwarded. If no, IPv6 uRPF proceeds to step 6.
{ If no, the packet is forwarded.
6. IPv6 uRPF checks whether the packet is permitted by the IPv6 ACL:
{ If yes, the packet is forwarded (such a packet is displayed in the uRPF information as a
"suppressed drop").
{ If no, the packet is discarded.
551
Network application
Figure 176 Network diagram
ISP B
ISP A
ISP C
User
As shown in Figure 176, strict IPv6 uRPF check is configured between an ISP network and a
customer network. Loose IPv6 uRPF check is configured between ISPs.
For special packets or users, you can configure IPv6 ACLs.
552
• Do not configure the allow-default-route keyword for loose IPv6 uRPF check. Otherwise, IPv6
uRPF might fail to work.
To enable IPv6 uRPF on an interface:
Task Command
Display IPv6 uRPF configuration (centralized display ipv6 urpf [ interface interface-type
devices in standalone mode). interface-number ]
Display IPv6 uRPF configuration (distributed
display ipv6 urpf [ interface interface-type
devices in standalone mode/centralized
interface-number ] [ slot slot-number ]
devices in IRF mode).
display ipv6 urpf [ interface interface-type
Display IPv6 uRPF configuration (distributed
interface-number ] [ chassis chassis-number slot
devices in IRF mode).
slot-number ]
Configuration procedure
1. Configure Router B:
# Define IPv6 ACL 2010 to permit traffic from network 1010::/64.
<RouterB> system-view
[RouterB] acl ipv6 number 2010
[RouterB-acl-basic-2010] rule permit source 1010:: 64
[RouterB-acl-basic-2010] quit
553
# Specify the IPv6 address of GigabitEthernet 2/0/1.
[RouterB] interface gigabitethernet 2/0/1
[RouterB-GigabitEthernet2/0/1] ipv6 address 1000::2/64
# Configure strict uRPF check on GigabitEthernet 2/0/1.
[RouterB-GigabitEthernet2/0/1] ipv6 urpf strict acl 2010
2. Configure Router A:
# Specify the IPv6 address of GigabitEthernet 2/0/1.
<RouterA> system-view
[RouterA] interface gigabitethernet 2/0/1
[RouterA-GigabitEthernet2/0/1] ipv6 address 1000::1/64
# Configure strict uRPF check on GigabitEthernet 2/0/1 and allow using the default route for
IPv6 uRPF check.
[RouterA-GigabitEthernet2/0/1] ipv6 urpf strict allow-default-route
554
Configuring crypto engines
Overview
Crypto engines encrypt and decrypt data for service modules. Crypto engines include the following
types:
• Hardware crypto engines—A hardware crypto engine is a coprocessor integrated on a CPU
or hardware crypto card. Hardware crypto engines can accelerate encryption/decryption speed,
which improves device processing efficiency. You can enable or disable hardware crypto
engines globally as needed.
• Software crypto engines—A software crypto engine is a set of software encryption algorithms.
The device uses software crypto engines to encrypt and decrypt data for service modules. They
are always enabled. You cannot enable or disable software crypto engines.
If you disable hardware crypto engines, the device uses only software crypto engines for data
encryption/decryption. If you enable hardware crypto engines, the device preferentially uses
hardware crypto engines. If the device does not support hardware crypto engines, or if the hardware
crypto engines do not support the required encryption algorithm, the device uses software crypto
engines for data encryption/decryption.
Crypto engines provide encryption/decryption services for service modules, for example, the IPsec
module. When a service module requires data encryption/decryption, it sends the desired data to a
crypto engine. After the crypto engine completes data encryption/decryption, it sends the data back
to the service module.
555
Step Command
1. Enter system view. system-view
• To disable hardware crypto engines:
crypto-engine accelerator disable
2. Disable or enable hardware crypto engines.
• To enable hardware crypto engines:
undo crypto-engine accelerator disable
Task Command
Display crypto engine information. display crypto-engine
Display crypto engine statistics (centralized display crypto-engine statistics [ engine-id
devices in standalone mode). engine-id ]
Display crypto engine statistics (distributed
display crypto-engine statistics [ engine-id engine-id
devices in standalone mode/centralized devices
slot slot-number ]
in IRF mode).
Display crypto engine statistics (distributed display crypto-engine statistics [ engine-id engine-id
devices in IRF mode). chassis chassis-number slot slot-number ]
Clear crypto engine statistics (centralized
reset crypto-engine statistics [ engine-id engine-id ]
devices in standalone mode ).
Clear crypto engine statistics (distributed devices
reset crypto-engine statistics [ engine-id engine-id
in standalone mode/centralized devices in IRF
slot slot-number ]
mode).
Clear crypto engine statistics (distributed devices reset crypto-engine statistics [ engine-id engine-id
in IRF mode). chassis chassis-number slot slot-number ]
556
Configuring FIPS
The device that provides low encryption does not support FIPS.
Overview
Federal Information Processing Standards (FIPS) was developed by the National Institute of
Standards and Technology (NIST) of the United States. FIPS specifies the requirements for
cryptographic modules. FIPS 140-2 defines four levels of security, named Level 1 to Level 4, from
low to high. The device supports Level 2.
Unless otherwise noted, in this document the term FIPS refers to FIPS 140-2.
557
b. Specify the current configuration file as the startup configuration file.
c. Delete the startup configuration file in binary format.
d. Reboot the device.
Otherwise, the commands that are not supported by FIPS mode, if they are in the configuration
file, might be restored.
• The system enters an intermediate state between when the fips mode enable command is
executed and when the system is rebooted. If you choose the manual reboot method, do not
execute any commands except for the following commands:
{ reboot.
{ save.
{ Other commands used for configuration preparation to enter FIPS mode.
• Configuration rollback is supported in FIPS mode and also during a switch between FIPS mode
and non-FIPS mode. After a configuration rollback between FIPS mode and non-FIPS mode,
perform the following tasks:
a. Delete the local user and configure a new local user. Local user attributes include password,
user role, and service type.
b. Save the current configuration file.
c. Specify the current configuration file as the startup configuration file.
d. Reboot the device. The new configuration takes effect after the reboot. During this process,
do not exit the system or perform other operations.
• If a device enters FIPS or non-FIPS mode through automatic reboot, configuration rollback fails.
To support configuration rollback, you must execute the save command after the device enters
FIPS or non-FIPS mode.
• Do not use FIPS and non-FIPS devices to create an IRF fabric.
• To enable FIPS mode for an IRF fabric, you must reboot the entire IRF fabric.
558
3. Configure a username and password to log in to the device in FIPS mode.
The password must include at least 15 characters that contain uppercase and lowercase letters,
digits, and special characters.
The system automatically uses the startup configuration file to reboot the device and enter FIPS
mode. You can only use the configured username and password to log in to the FIPS device.
After login, you are assigned the role of security administrator Crypto Officer.
Manual reboot
To use manual reboot to enter FIPS mode:
1. Enable the password control feature globally.
2. Set the number of character types a password must contain to 4, and set the minimum number
of characters for each type to one character.
3. Set the minimum length of user passwords to 15 characters.
4. Add a local user account for device management, including the following items:
{ A username.
{ A password that complies with the password control policies as described in step 2 and
step 3.
{ A user role of network-admin.
{ A service type of terminal.
5. Delete the FIPS-incompliant local user service types Telnet, HTTP, and FTP.
6. Enable FIPS mode.
7. Select the manual reboot method.
8. Save the configuration file and specify it as the startup configuration file.
9. Delete the startup configuration file in binary format (an .mdb file).
10. Reboot the device.
The system enters FIPS mode. You can use the configured username and password to log in to
the device in FIPS mode.
To enable FIPS mode:
559
When the device acts as a server to authenticate a client through the public key, the key pair for
the client must also have a modulus length of 2048 bits.
• SSH, SNMPv3, IPsec, and SSL do not support DES, 3DES, RC4, or MD5.
• The password control feature cannot be disabled globally. The undo password control
enable command does not take effect.
• The keys must contain at least 15 characters and 4 character types of uppercase and
lowercase letters, digits, and special characters. This requirement applies to the following
passwords:
{ AAA server's shared key.
{ IKE pre-shared key.
{ SNMPv3 authentication key.
The password for a device management local user and password for switching user roles
depend on password control policies. By default, the passwords must contain at least 15
characters and 4 character types of uppercase and lowercase letters, digits, and special
characters.
560
To disable FIPS mode:
FIPS self-tests
To ensure the correct operation of cryptography modules, FIPS provides self-test mechanisms,
including power-up self-test and conditional self-test. You can also trigger a self-test. If the power-up
self-test fails, the card where the self-test process exists reboots. If the conditional self-test fails, the
system outputs self-test failure information.
NOTE:
If a self-test fails, contact Hewlett Packard Enterprise Support.
Power-up self-tests
The power-up self-test, also called known-answer test, examines the availability of FIPS-allowed
cryptographic algorithms. A cryptographic algorithm is run on data for which the correct output is
already known. The calculated output is compared with the known answer. If they are not identical,
the known-answer test fails.
The power-up self-test examines the cryptographic algorithms listed in Table 14.
Table 14 Power-up self-test list
Type Operations
Tests the following algorithms:
• DSA (signature and authentication).
• RSA (signature and authentication).
• RSA (encryption and decryption).
Cryptographic algorithm
• AES.
self-test
• 3DES.
• SHA1.
• HMAC-SHA1.
• Random number generator algorithms.
Tests the following algorithms used by cryptographic engines:
• DSA (signature and authentication).
• RSA (signature and authentication).
• RSA (encryption and decryption).
Cryptographic engine self-test • AES.
• 3DES.
• SHA1.
• HMAC-SHA1.
• Random number generator algorithms.
561
Conditional self-tests
A conditional self-test runs when an asymmetrical cryptographic module or a random number
generator module is invoked. Conditional self-tests include the following types:
• Pair-wise consistency test—This test is run when a DSA/RSA asymmetrical key-pair is
generated. It uses the public key to encrypt a plain text, and uses the private key to decrypt the
encrypted text. If the decryption is successful, the test succeeds. Otherwise, the test fails.
• Continuous random number generator test—This test is run when a random number is
generated. Each subsequent generation of a random number will be compared with the
previously generated number. The test fails if any two compared numbers are the same. This
test can also be run when a DSA/RSA asymmetrical key-pair is generated.
Triggering self-tests
To examine whether the cryptography modules operate correctly, you can trigger a self-test on the
cryptographic algorithms. The triggered self-test is the same as the power-up self-test. If the self-test
fails, the card where the self-test process exists reboots.
To trigger a self-test:
Step Command
1. Enter system view. system-view
2. Trigger a self-test. fips self-test
Task Command
Display the FIPS mode state. display fips status
562
The system will create a new startup configuration file for FIPS mode. After you set the
login username and password for FIPS mode, the device will reboot automatically.
Enter username(1-55 characters):root
Enter password(15-63 characters):
Confirm password:
Waiting for reboot... After reboot, the device will enter FIPS mode.
<Sysname>
563
<Sysname> system-view
[Sysname] password-control enable
# Set the number of character types a password must contain to 4, and set the minimum number of
characters for each type to one character.
[Sysname] password-control composition type-number 4 type-length 1
# Add a local user account for device management, including a username of test, a password of
12345zxcvb!@#$%ZXCVB, a user role of network-admin, and a service type of terminal.
[Sysname] local-user test class manage
[Sysname-luser-manage-test] password simple 12345zxcvb!@#$%ZXCVB
[Sysname-luser-manage-test] authorization-attribute user-role network-admin
[Sysname-luser-manage-test] service-type terminal
[Sysname-luser-manage-test] quit
# Enable FIPS mode, and choose the manual reboot method to enter FIPS mode.
[Sysname] fips mode enable
FIPS mode change requires a device reboot. Continue? [Y/N]:y
Reboot the device automatically? [Y/N]:n
Change the configuration to meet FIPS mode requirements, save the configuration to the
next-startup configuration file, and then reboot to enter FIPS mode.
# Save the current configuration to the root directory of the storage medium, and specify it as the
startup configuration file.
[Sysname] save
The current configuration will be written to the device. Are you sure? [Y/N]:y
Please input the file name(*.cfg)[flash:/startup.cfg]
(To leave the existing filename unchanged, press the enter key):
flash:/startup.cfg exists, overwrite? [Y/N]:y
Validating file. Please wait...
Saved the current configuration to device successfully.
[Sysname] quit
564
new password:
confirm:
Updating user information. Please wait ... ...
…
<Sysname>
565
# Save the current configuration to the root directory of the storage medium, and specify it as the
startup configuration file.
[Sysname] save
The current configuration will be written to the device. Are you sure? [Y/N]:y
Please input the file name(*.cfg)[flash:/startup.cfg]
(To leave the existing filename unchanged, press the enter key):
flash:/startup.cfg exists, overwrite? [Y/N]:y
Validating file. Please wait...
Saved the current configuration to device successfully.
[Sysname] quit
566
Configuring DPI engine
Command and hardware compatibility
Commands and descriptions for centralized devices apply to the following routers:
• MSR1002-4/1003-8S.
• MSR2003.
• MSR2004-24/2004-48.
• MSR3012/3024/3044/3064.
• MSR954(JH296A/JH297A/JH299A)
Commands and descriptions for distributed devices apply to MSR4060 and MSR4080 routers.
Overview
DPI engine is an inspection module shared by DPI service modules, such as IPS, URL filtering, file
filtering, data filtering, content filtering, and antivirus. DPI engine uses inspection rules to identify the
application layer information. DPI service modules process packets based on the inspection results.
Packets are inspected by the DPI engine once and are processed by multiple DPI service modules.
With DPI engine, the DPI service modules do not need to inspect packets separately, which prevents
degrading device performance.
DPI engine provides the following functions:
• Protocol parsing—Identifies the application layer protocols and analyzes the application layer
information. Information analysis includes recognizing, normalizing, and uncompressing
application layer fields.
• AC pattern matching—Matches packet payloads by the Aho-Corasick (AC) patterns in
inspection rules. AC pattern matching is fast and it is the core function of the DPI engine.
• Option matching—Matches packet payloads by the options in the inspection rules whose AC
patterns have been matched. Option matching is slower than AC pattern matching.
567
{ If a matching rule is found and the rule action is inspect, the device forwards the packet to
the DPI engine.
{ If a matching rule is found and the rule action is drop or pass, the device processes the
packet according to the action.
{ If no matching rule is found, the device drops the packet.
For more information about the object policy, see Security Configuration Guide.
2. The DPI engine performs protocol parsing for the packet and searches for applicable inspection
rules according to the parsing results.
3. If an applicable inspection rule contains AC patterns, DPI engine performs AC pattern matching.
If an applicable inspection rule does not contain AC patterns, DPI engine directly performs
option matching. The packet matches the rule if it matches the options.
4. If the packet matches an AC pattern in an applicable inspection rule, the DPI engine further
compares the packet against the options in the rule. The packet matches the rule if it matches
the options.
5. If the packet matches an inspection rule, the DPI engine informs the corresponding DPI service
modules to process the packet. If the packet does not match any rule, the DPI engine allows the
packet to pass.
568
Figure 178 DPI engine mechanism
Start
No
Match an object
Drop
policy rule?
Yes
No
Rule action is Perform the rule action
inspect?
Yes
DPI engine
Protocol parsing
Yes
No
No Match AC pattern?
Yes
No
Match option?
Yes
End
569
Task at a glance
(Optional.) Configuring action parameter profiles
(Optional.) Optimizing the DPI engine
(Optional.) Disabling inspection suspension upon excessive CPU usage
570
Configuring action parameter profiles
Configuring a block source parameter profile
A block source parameter profile defines the block period for the block source action in DPI service
modules.
For the block period to take effect, make sure the blacklist feature is enabled. With the blacklist
feature enabled, the device drops the packet that matches an inspection rule and adds the packet
source IP address to the IP blacklist. The device directly drops subsequent packets from the source
IP address during the block period. To enable the blacklist feature, use the blacklist enable or the
blacklist global enable command. For more information about the blacklist feature, see Security
Configuration Guide.
If the blacklist feature is disabled, the block period does not take effect. The device inspects all
packets and drops the matching ones.
To configure a block source parameter profile:
4. Set the daily export time for By default, the cached captured
cached captured packets. export repeating-at time packets are exported at 1:00 a.m.
every day.
571
Step Command Remarks
5. Specify the URL to which By default, no URL is specified for
cached captured packets are export url url-string exporting the cached captured
exported packets.
572
Step Command Remarks
2. Create an email
parameter profile and inspect email parameter-profile By default, no email parameter
enter its view. parameter-name profiles exist.
5. Disable a DPI engine inspect optimization [ chunk | By default, all DPI engine
optimization feature. no-acsignature | raw | uncompress | optimization features are
url-normalization ] disable enabled.
573
Disabling inspection suspension upon excessive
CPU usage
Packet inspection in the DPI engine is a complex and resource-consuming process. When the CPU
usage is too high, the DPI engine by default suspends packet inspection to guarantee the device
performance. You can also perform this task to configure the DPI engine to continue packet
inspection even when the CPU usage is too high.
To disable inspection suspension upon excessive CPU usage:
Task Command
Display the match statistics of the DPI engine
inspection rules (centralized devices in standalone display inspect hit-statistics
mode).
Display the match statistics of the DPI engine
inspection rules (distributed devices in standalone display inspect hit-statistics [ slot slot-number ]
mode/centralized devices in IRF mode).
Display the match statistics of the DPI engine display inspect hit-statistics [ chassis
inspection rules (distributed devices–in IRF mode). chassis-number slot slot-number ]
Display HTTP packet inspection statistics (centralized
display inspect http
devices in standalone mode).
Display HTTP packet inspection statistics (distributed
devices in standalone mode/centralized devices in display inspect http [ slot slot-number ]
IRF mode).
Display HTTP packet inspection statistics (distributed display inspect http [ chassis chassis-number
devices–in IRF mode). slot slot-number ]
Display the memory usage of AC pattern inspection
display inspect memory engine ac
engines (centralized devices in standalone mode).
Display the memory usage of AC pattern inspection
display inspect memory engine ac [ slot
engines (distributed devices in standalone
slot-number ]
mode/centralized devices in IRF mode).
Display the memory usage of AC pattern inspection display inspect memory engine ac [ chassis
engines (distributed devices–in IRF mode). chassis-number slot slot-number ]
Display the memory usage of MiniAC pattern
inspection engines (centralized devices in standalone display inspect memory engine mn
mode).
Display the memory usage of MiniAC pattern
display inspect memory engine mn [ slot
inspection engines (distributed devices in standalone
slot-number ]
mode/centralized devices in IRF mode).
574
Task Command
Display the memory usage of MiniAC pattern display inspect memory engine mn [ chassis
inspection engines (distributed devices–in IRF mode). chassis-number slot slot-number ]
Display the memory usage of DPI engine inspection
display inspect memory rule
rules (centralized devices in standalone mode).
Display the memory usage of DPI engine inspection
rules (distributed devices in standalone display inspect memory rule [ slot slot-number ]
mode/centralized devices in IRF mode).
Display the memory usage of DPI engine inspection display inspect memory rule [ chassis
rules (distributed devices–in IRF mode). chassis-number slot slot-number ]
Display the status of the DPI engine. display inspect status
Clear the match statistics of the DPI engine inspection
reset inspect hit-statistics
rules (centralized devices in standalone mode).
Clear the match statistics of the DPI engine inspection
rules (distributed devices in standalone reset inspect hit-statistics [ slot slot-number ]
mode/centralized devices in IRF mode).
Clear the match statistics of the DPI engine inspection reset inspect hit-statistics [ chassis
rules (distributed devices–in IRF mode). chassis-number slot slot-number ]
Clear HTTP packet inspection statistics (centralized
reset inspect http
devices in standalone mode).
Clear HTTP packet inspection statistics (distributed
devices in standalone mode/centralized devices in reset inspect http [ slot slot-number ]
IRF mode).
Clear HTTP packet inspection statistics (distributed reset inspect http [ chassis chassis-number slot
devices–in IRF mode). slot-number ]
575
Configuring IPS
IPS requires a license to run on the device. If the license expires, you can still use the IPS functions
but you can no longer update the IPS signature library on the device.
Overview
Intrusion prevention systems (IPS) are network security appliances that enable devices to monitor
network traffic for malicious activity and to proactively take prevention actions.
The IPS feature provides the following functions:
• In-depth protection—IPS inspects the application layer data of packets, performs protocol
analysis and reassembly on network traffic flows, and takes actions according to the analysis
results.
• Real-time protection—IPS monitors network traffic in real-time and can take actions on
detected attacks.
• All-around protection—IPS can detect and prevent the following types of attacks:
{ Malicious software such as worms, viruses, Trojan, bots, spyware, adware, scanners, and
backdoors.
{ Malicious attacks such as common gateway interface (CGI) attacks, cross-site scripting
attacks, injection attacks, directory traversal attacks, information leakage attacks, remote
file inclusion attacks, buffer overflow attacks, code execution attacks, and DoS attacks.
• Bidirectional protection—IPS monitors the traffic passing through the device to prevent
attacks arising from the internal and external networks.
IPS signatures
The device compares traffic flows with IPS signatures to detect, classify, and prevent network attacks.
You can specify the actions to apply to traffic flows matching each signature.
The device supports the following types of IPS signatures:
• Predefined IPS signatures—Automatically generated by the device based on the local
signature library. You cannot add, modify, or delete a predefined IPS signature, but you can
enable or disable the signature, or assign actions to the signature. For more information about
signature actions, see "Signature actions."
• User-defined IPS signatures—If network attacks that cannot be identified by predefined
signatures appear, you can create user-defined signatures for the attacks. To create
user-defined IPS signatures, create an IPS signature file in the Snort format and import the file
to the device.
Signature actions
When the device detects a matching packet for an IPS signature, it takes the actions specified for the
signature on the packet.
The device supports the following signature actions:
• Reset—Closes the TCP connections for matching packets by sending TCP reset messages.
• Redirect—Redirects matching packets to a webpage.
• Block-source—Drops matching packets and, if the blacklist feature is enabled, adds the
sources of the packets to the IP blacklist. Successive packets from the sources will be blocked
for a time period specified by the block-period command. For more information about the IP
576
blacklist feature, see Security Configuration Guide. For information about configuring the block
period, see the DPI engine commands in the DPI Command Reference.
• Drop—Drops matching packets.
• Permit—Permits matching packets to pass.
• Capture—Captures matching packets.
• Logging—Logs matching packets.
IPS mechanism
As shown in Figure 179, upon receiving a packet, the IPS device performs the following operations:
1. The device compares the packet with the IP blacklist rules.
{ If a matching rule is found, the device drops the packet.
{ If no matching rule is found, the device goes to step 2.
2. The device compares the packet with the object policy rules. The device identifies the packet
application layer protocol and extracts the packet signatures if the matching object policy rule
meets the following conditions:
{ The object policy rule is configured with the inspect app-profile-name option. The
app-profile-name argument specifies the DPI application profile.
{ The specified DPI application profile uses an IPS policy.
For more information about object policy rules, see Security Configuration Guide.
3. The device determines the actions for the packet by comparing the extracted packet signatures
with the IPS signatures in the IPS policy:
{ If the packet does not match any IPS signatures, the device permits the packet to pass.
{ If the packet matches only one IPS signature, the device takes the signature actions.
{ If the packet matches multiple IPS signatures, the device uses the following rules to select
the actions:
− If the matching IPS signatures have two or more actions, including block-source,
redirect, drop, permit, and reset, the device takes the action of the highest priority. The
actions in descending order of priority are reset, redirect, block-source/drop, and
permit.
− The device will execute the block-source, capture, and logging actions if they are in
the matching IPS signatures.
577
Figure 179 IPS mechanism
578
Use this method when the device cannot obtain the IPS signature file automatically.
You must first download the most up to date IPS signature file manually. The device then
obtains the downloaded file to update its local signature library.
Rolling back the IPS signature library
If filtering false alarms or filtering exceptions occur frequently, you can roll back the IPS signature
library to the previous version.
579
Specifying a parameter profile for an IPS
signature action
You can specify parameter profiles for IPS signature actions. A parameter profile is a set of
parameters that determine how the action is executed. If you do not specify a parameter profile for an
action, or if the specified profile does not exist, the default action parameter settings are used. For
information about configuring parameter profiles, see "Configure DPI engine."
To specify a parameter profile for an IPS signature action:
580
Step Command Remarks
2. Import user-defined By default, no user-defined IPS
IPS signatures. ips signature import snort file-path
signatures exist.
581
Step Command Remarks
1. Enter system view. system-view N/A
The default security zones Any,
Local, Trust, DMZ,
2. Configure the security Management, and Untrust are
zones. security-zone name zone-name
automatically created when you
create the first security zone on
the device.
582
Triggering an immediate IPS signature update
Anytime you find a release of new signature version on the TippingPoint website, you can trigger the
device to immediately update the local signature library.
For a successful automatic update, make sure the device can resolve the IP address of the
TippingPoint website through DNS, and the device can connect to the TippingPoint website. For
more information about DNS, see Layer 3—IP Services Configuration Guide.
To trigger an immediate IPS signature update:
Step Command
1. Enter system view. system-view
Step Command
583
Rolling back the IPS signature library
If an IPS signature library update causes exceptions or a high false alarm rate, you can roll back the
IPS signature library.
Before rolling back the IPS signature library, the device backs up the current signature library as the
previous version. For example, the previous library version is V1 and the current library version is V2.
If you perform a rollback to the previous version, library version V1 becomes the current version and
library version V2 becomes the previous version. If you perform a rollback to the previous version
again, the library rolls back to library version V2.
To roll back the IPS signature library version:
Step Command
1. Enter system view. system-view
Task Command
display ips signature [ pre-defined |
user-defined ] [ direction { any | to-client |
Display IPS signature information to-server } ] [ category category-name | fidelity
{ high | low | medium } | protocol { icmp | ip | tcp |
udp } | severity { critical | high | low | medium } ] *
display ips signature { pre-defined |
Display detailed information about an IPS signature.
user-defined } signature-id
Display IPS signature library information. display ips signature information
584
Task Command
Display IPS policy information. display ips policy policy-name
Configuration procedure
1. Assign IP addresses to interfaces, as shown in Figure 180. (Details not shown.)
2. Configure the security zones:
# Assign GigabitEthernet 1/0/1 to the security zone Trust.
<Device> system-view
[Device] security-zone name trust
[Device-security-zone-Trust] import interface gigabitethernet 1/0/1
[Device-security-zone-Trust] quit
# Assign GigabitEthernet 1/0/2 to the security zone Untrust.
[Device] security-zone name untrust
[Device-security-zone-Untrust] import interface gigabitethernet 1/0/2
[Device-security-zone-Untrust] quit
3. Create the IP address object group ipsfilter and configure an IP address object with the subnet
192.168.1.0/24.
[Device] object-group ip address ipsfilter
[Device-obj-grp-ip-ipsfilter] network subnet 192.168.1.0 24
[Device-obj-grp-ip-ipsfilter] quit
4. Apply the default IPS policy to a DPI application profile:
# Create the DPI application profile sec and enter its view.
[Device] app-profile sec
# Apply the default IPS policy to the DPI application profile and set the policy mode to protect.
[Device-app-profile-sec] ips apply policy default mode protect
585
[Device-app-profile-sec] quit
5. Configure an object policy:
# Create the IPv4 object policy ipsfilter, and enter its view.
[Device] object-policy ip ipsfilter
# Configure an object policy rule to apply the DPI application profile sec to packets that match
the IP address object group urlfilter.
[Device-object-policy-ip-ipsfilter] rule inspect sec source-ip ipsfilter
destination-ip any
[Device-object-policy-ip-ipsfilter] quit
6. Create a zone pair between the source zone Trust and the destination zone Untrust, and apply
the object policy ipsfilter to the zone pair.
[Device] zone-pair security source trust destination untrust
[Device-zone-pair-security-Trust-Untrust] object-policy apply ip ipsfilter
[Device-zone-pair-security-Trust-Untrust] quit
586
Configuration procedure
1. Assign IP addresses to interfaces, as shown in Figure 181. (Details not shown.)
2. Configure the security zones:
# Assign GigabitEthernet 1/0/1 to security zone Trust.
<Device> system-view
[Device] security-zone name trust
[Device-security-zone-Trust] import interface gigabitethernet 1/0/1
[Device-security-zone-Trust] quit
# Assign GigabitEthernet 1/0/2 to security zone Untrust.
[Device] security-zone name untrust
[Device-security-zone-Untrust] import interface gigabitethernet 1/0/2
[Device-security-zone-Untrust] quit
3. Create the IP address object group ipsfilter and configure an IP address object with the subnet
192.168.1.0/24.
[Device] object-group ip address ipsfilter
[Device-obj-grp-ip-ipsfilter] network subnet 192.168.1.0 24
[Device-obj-grp-ip-ipsfilter] quit
4. Configure an IPS policy:
# Create the IPS policy ips1 and enter its view.
[Device] ips policy ips1
# Enable predefined IPS signature 2 and specify the actions drop, capture, and logging for
the signature.
[Device-ips-policy-ips1] signature override pre-defined 2 enable drop capture logging
# Disable predefined IPS signature 4.
[Device-ips-policy-ips1] signature override pre-defined 4 disable
# Enable predefined IPS signature 6.
[Device-ips-policy-ips1] signature override pre-defined 6 enable
[Device-ips-policy-ips1] quit
5. Apply the IPS policy ips1 to a DPI application profile:
# Create the DPI application profile sec.
[Device] app-profile sec
# Apply the IPS policy ips1 to the DPI application profile and set the policy mode to protect.
[Device-app-profile-sec] ips apply policy ips1 mode protect
[Device-app-profile-sec] quit
6. Configure an object policy:
# Create the IPv4 object policy ipsfilter, and enter its view.
[Device] object-policy ip ipsfilter
# Configure an object policy rule to apply the DPI application profile sec to packets that match
the IP address object group ipsfilter.
[Device-object-policy-ip-ipsfilter] rule inspect sec source-ip ipsfilter
destination-ip any
[Device-object-policy-ip-ipsfilter] quit
7. Create a zone pair between the source zone Trust and the destination zone Untrust, and apply
the object policy ipsfilter to the zone pair.
[Device] zone-pair security source trust destination untrust
[Device-zone-pair-security-Trust-Untrust] object-policy apply ip ipsfilter
[Device-zone-pair-security-Trust-Untrust] quit
587
8. Activate DPI services.
[Device] inspect activate
Configuration procedure
1. Assign IP addresses to interfaces, as shown in Figure 182. (Details not shown.)
2. Enable the device to communicate with the FTP server:
# Configure ACL 2001 to permit all traffic.
<Device> system-view
[Device] acl basic 2001
[Device-acl-ipv4-basic-2001] rule permit
[Device-acl-ipv4-basic-2001] quit
# Assign GigabitEthernet 1/0/3 to the zone DMZ.
[Device] security-zone name dmz
[Device-security-zone-Untrust] import interface gigabitethernet 1/0/3
[Device-security-zone-Untrust] quit
588
# Create a zone pair between the source zone Local and the destination zone DMZ, and apply
ACL 2001 to the zone pair for packet filtering.
[Device] zone-pair security source local destination dmz
[Device-zone-pair-security-Local-DMZ] packet-filter 2001
[Device-zone-pair-security-Local-DMZ] quit
# Create a zone pair between the source zone DMZ and the destination zone Local, and apply
ACL 2001 to the zone pair for packet filtering.
[Device] zone-pair security source dmz destination local
[Device-zone-pair-security-DMZ-Local] packet-filter 2001
[Device-zone-pair-security-DMZ-Local] quit
3. Configure the security zones:
# Assign GigabitEthernet 1/0/1 to the security zone Trust.
[Device] security-zone name trust
[Device-security-zone-Trust] import interface gigabitethernet 1/0/1
[Device-security-zone-Trust] quit
# Assign GigabitEthernet 1/0/2 to the security zone Untrust.
[Device] security-zone name untrust
[Device-security-zone-Untrust] import interface gigabitethernet 1/0/2
[Device-security-zone-Untrust] quit
4. Create the IP address object group ipsfilter and configure an IP address object with the subnet
192.168.1.0/24.
[Device] object-group ip address ipsfilter
[Device-obj-grp-ip-ipsfilter] network subnet 192.168.1.0 24
[Device-obj-grp-ip-ipsfilter] quit
5. Update the device IPS signature library by using the IPS signature file ips-1.0.8-encrypt.dat
stored on the FTP server.
[Device] ips signature update ftp://ips:[email protected]/ips-1.0.8-encrypt.dat
6. Apply the default IPS policy to a DPI application profile:
# Create the DPI application profile sec.
[Device] app-profile sec
# Apply the default IPS policy to the DPI application profile and set the policy mode to protect.
[Device-app-profile-sec] ips apply policy default mode protect
[Device-app-profile-sec] quit
7. Configure an object policy:
# Create the IPv4 object policy ipsfilter, and enter its view.
[Device] object-policy ip ipsfilter
# Configure an object policy rule to apply the DPI application profile sec to packets that match
the IP address object group urlfilter.
[Device-object-policy-ip-ipsfilter] rule inspect sec source-ip ipsfilter
destination-ip any
[Device-object-policy-ip-ipsfilter] quit
8. Create a zone pair between the source zone Trust and the destination zone Untrust, and apply
the object policy ipsfilter to the zone pair.
[Device] zone-pair security source trust destination untrust
[Device-zone-pair-security-Trust-Untrust] object-policy apply ip ipsfilter
[Device-zone-pair-security-Trust-Untrust] quit
9. Activate DPI services.
[Device] inspect activate
589
Verifying the configuration
# Verify that the device can use the default IPS policy to detect and prevent known network attacks.
(Details not shown.)
For example, if an incoming attack packet the predefined IPS signature
GNU_Bash_Local_Memory_Corruption_Vulnerability(CVE-2014-718), the device automatically
executes the signature actions (reset and logging) on the packet.
# Verify that the device IPS signature library is updated.
<Device> display ips signature information
Configuration procedure
1. Assign IP addresses to interfaces, as shown in Figure 183. (Details not shown.)
2. Configure DNS for the device to resolve the domain name of the TippingPoint website into the
IP address. (Details not shown.)
3. Enable automatic IPS signature library update.
<Device> system-view
[Device] ips signature auto-update
[Device-ips-autoupdate]
# Configure the device to perform automatic update at a random time between 08:30 am and
09:30 am every Saturday.
[Device-ips-autoupdate] update schedule weekly sat start-time 9:00:00 tingle 30
[Device-ips-autoupdate] quit
590
Document conventions and icons
Conventions
This section describes the conventions used in the documentation.
Port numbering in examples
The port numbers in this document are for illustration only and might be unavailable on your device.
Command conventions
Convention Description
Boldface Bold text represents commands and keywords that you enter literally as shown.
Italic Italic text represents arguments that you replace with actual values.
[] Square brackets enclose syntax choices (keywords or arguments) that are optional.
Braces enclose a set of required syntax choices separated by vertical bars, from which
{ x | y | ... }
you select one.
Square brackets enclose a set of optional syntax choices separated by vertical bars,
[ x | y | ... ]
from which you select one or none.
Asterisk marked braces enclose a set of required syntax choices separated by vertical
{ x | y | ... } *
bars, from which you select at least one.
Asterisk marked square brackets enclose optional syntax choices separated by vertical
[ x | y | ... ] *
bars, from which you select one choice, multiple choices, or none.
The argument or keyword and argument combination before the ampersand (&) sign
&<1-n>
can be entered 1 to n times.
# A line that starts with a pound (#) sign is comments.
GUI conventions
Convention Description
Window names, button names, field names, and menu items are in Boldface. For
Boldface
example, the New User window appears; click OK.
Multi-level menus are separated by angle brackets. For example, File > Create >
>
Folder.
Symbols
Convention Description
An alert that calls attention to important information that if not understood or followed
WARNING! can result in personal injury.
An alert that calls attention to important information that if not understood or followed
CAUTION: can result in data loss, data corruption, or damage to hardware or software.
591
Network topology icons
Convention Description
Represents a security card, such as a firewall, load balancing, NetStream, SSL VPN,
IPS, or ACG card.
592
Support and other resources
Accessing Hewlett Packard Enterprise Support
• For live assistance, go to the Contact Hewlett Packard Enterprise Worldwide website:
www.hpe.com/assistance
• To access documentation and support services, go to the Hewlett Packard Enterprise Support
Center website:
www.hpe.com/support/hpesc
Information to collect
• Technical support registration number (if applicable)
• Product name, model or version, and serial number
• Operating system name and version
• Firmware version
• Error messages
• Product-specific reports and logs
• Add-on products or components
• Third-party products or components
Accessing updates
• Some software products provide a mechanism for accessing software updates through the
product interface. Review your product documentation to identify the recommended software
update method.
• To download product updates, go to either of the following:
{ Hewlett Packard Enterprise Support Center Get connected with updates page:
www.hpe.com/support/e-updates
{ Software Depot website:
www.hpe.com/support/softwaredepot
• To view and update your entitlements, and to link your contracts, Care Packs, and warranties
with your profile, go to the Hewlett Packard Enterprise Support Center More Information on
Access to Support Materials page:
www.hpe.com/support/AccessToSupportMaterials
IMPORTANT:
Access to some updates might require product entitlement when accessed through the Hewlett
Packard Enterprise Support Center. You must have an HP Passport set up with relevant
entitlements.
593
Websites
Website Link
Networking websites
Hewlett Packard Enterprise Networking Information Library www.hpe.com/networking/resourcefinder
Hewlett Packard Enterprise Networking website www.hpe.com/info/networking
Hewlett Packard Enterprise Networking My Support www.hpe.com/networking/support
General websites
Hewlett Packard Enterprise Information Library www.hpe.com/info/enterprise/docs
Hewlett Packard Enterprise Support Center www.hpe.com/support/hpesc
Contact Hewlett Packard Enterprise Worldwide www.hpe.com/assistance
Subscription Service/Support Alerts www.hpe.com/support/e-updates
Software Depot www.hpe.com/support/softwaredepot
Customer Self Repair (not applicable to all devices) www.hpe.com/support/selfrepair
Insight Remote Support (not applicable to all devices) www.hpe.com/info/insightremotesupport/docs
Remote support
Remote support is available with supported devices as part of your warranty, Care Pack Service, or
contractual support agreement. It provides intelligent event diagnosis, and automatic, secure
submission of hardware event notifications to Hewlett Packard Enterprise, which will initiate a fast
and accurate resolution based on your product’s service level. Hewlett Packard Enterprise strongly
recommends that you register your device for remote support.
For more information and device support details, go to the following website:
www.hpe.com/info/insightremotesupport/docs
Documentation feedback
Hewlett Packard Enterprise is committed to providing documentation that meets your needs. To help
us improve the documentation, send any errors, suggestions, or comments to Documentation
Feedback ([email protected]). When submitting your feedback, include the document title,
part number, edition, and publication date located on the front cover of the document. For online help
content, include the product name, product version, help edition, and publication date located on the
legal notices page.
594
Index
Numerics EAP relay enable, 96
critical VLAN configuration, 103 port security configuration, 202, 205, 213
EAD assistant configuration (DHCP relay port security MAC address autoLearn, 213
agent), 112 port security MAC move, 211
EAD assistant configuration (DHCP port security MAC+802.1X authentication, 204
server), 115 port security mode, 206
EAD assistant feature, 93 port security NTK, 208
EAP over RADIUS, 81 port users max, 98
EAP packet format, 80 port-based access control, 88
EAP relay authentication, 84 quiet timer, 101
595
RADIUS Message-Authentication attribute, 82 ISP domain authentication method, 49
related protocols, 80 ISP domain authorization method, 51
SmartOn configuration, 105 ISP domain creation, 46
SmartOn feature, 93 ISP domain method, 46
SmartOn feature configuration, 117 ITA policy configuration, 56
supported domain name delimiters, 103 LDAP administrator attribute, 43
troubleshooting, 119 LDAP attribute map, 44
user profile configuration, 223 LDAP attribute map for authorization, 45
VLAN manipulation, 88 LDAP authentication server, 45
596
RADIUS request transmission attempts security portal authentication device access, 135
max, 29 account idle time (password control), 227
RADIUS scheme, 25 accounting
RADIUS scheme creation, 26 AAA configuration, 1, 18, 58
RADIUS scheme VPN, 28 AAA ISP domain accounting method, 52
RADIUS security policy server IP address, 33 AAA ITA policy configuration, 56
RADIUS server SSH user AAA RADIUS accounting-on, 32
authentication+authorization, 58 AAA RADIUS accounting-on (extended), 33
RADIUS server status, 29 AAA RADIUS Acct-Session-Id format, 57
RADIUS session-control, 54 session management statistics collection, 459
RADIUS shared keys, 28 ACK flood, 492
RADIUS SNMP notification, 35 ACL
RADIUS timers, 31 802.1X ACL assignment, 92
RADIUS traffic statistics units, 28 802.1X+ACL assignment configuration, 111
RADIUS username format, 28 APR PBAR host port mapping (ACL-based), 451
scheme configuration, 19 attack D&P detection exemption, 496
troubleshoot HWTACACS, 78 IPsec ACL, 292
troubleshoot LDAP user authentication IPsec ACL de-encapsulated packet check, 304
fails, 78
IPsec ACL rule keywords, 292
troubleshoot RADIUS, 76
IPsec ACL-based implementation, 289, 292
troubleshoot RADIUS accounting error, 77
IPsec ACL-based tunnel establishment, 291
troubleshoot RADIUS authentication
IPsec mirror image ACLs, 294
failure, 76
IPsec non-mirror image ACLs, 294
troubleshoot RADIUS packet delivery
IPv6 uRPF default route, 549
failure, 77
MAC authentication ACL assignment, 121, 131
user group attribute, 23
SSH management parameters, 399
user management by ISP domains, 12
uRPF, 542
user management by user access types, 12
action
accelerating
IPS signature, 576
object policy rule matching acceleration, 477
IPS signature action parameter profile, 580
access control
activating
security portal authentication, 139
DPI engine service, 570
security portal authentication
IPS DPI services, 584
configuration, 134, 157
active
access control policy
ARP active acknowledgement, 529
PKI certificate-based access control
policy, 274 security portal authentication type, 134
accessing address
IPv6 uRPF configuration, 549, 552, 553
uRPF configuration, 542, 546, 547
597
address pool interface NAS ID profile, 156
IPsec IKEv2 address pool, 371 IPS object policies to zone pairs, 581
Address Resolution Protocol. Use ARP IPS policy (DPI profile), 580
Advanced Stateful Packet Filter. See ASPF IPsec policy to interface, 303
AES IPsec profile to tunnel interface (IKE-based), 312
IPsec encryption algorithm, 288 IPv4 object policy to zone pair, 476
aging IPv6 object policy to zone pair, 476
session management aging time (application port security NAS-ID profile, 212
layer protocol), 458 APR
session management aging time (protocol application group configuration, 453
state), 457 application statistics enable, 453
AH configuration, 451, 455
IPsec security protocol 51, 286 display, 454
alert protocol (SSL), 432 group-based (predefined), 451
algorithm group-based (user-defined), 451
IPsec authentication, 288 maintain, 454
IPsec encryption (3DES), 288 PBAR configuration, 452
IPsec encryption (AES), 288 PBAR mapping, 451
IPsec encryption (DES), 288 architecture
IPsec IKE DH algorithm, 333 802.1X, 79
SSH negotiation, 392 PKI, 246
anti-replay ARP
IPsec anti-replay redundancy, 305 attack protection. See ARP attack protection
IPsec configuration, 305 scanning configuration restrictions, 538
any authentication (SSH), 392 ARP attack protection
application active acknowledgement, 529
IPsec application-based implementation, 290 ARP detection display, 535
IPsec application-based tunnel ARP detection maintain, 535
establishment, 291
authorized ARP configuration, 529
IPv6 uRPF network, 552
authorized ARP configuration (DHCP relay
uRPF network, 546 agent), 531
application recognition. See APR authorized ARP configuration (DHCP server), 530
applying command and hardware compatibility, 524
AAA ITA policy, 56 configuration, 524
ASPF policy (interface), 443 detection configuration, 532
ASPF policy (zone pair), 443 filtering configuration, 540, 541
attack D&P policy application (device), 497 fixed ARP configuration, 538
attack D&P policy application (interface), 497 gateway protection, 539, 539
connection limit policy, 465 packet source MAC consistency check, 529
598
packet validity check configuration, 534 blacklist configuration, 500, 509
restricted forwarding, 534 client verification, 485
restricted forwarding configuration, 536 client verification (DNS), 487, 499
scanning configuration, 538 client verification (HTTP), 488, 500
source MAC-based attack detection, 527, 528 client verification (TCP), 485, 498
source MAC-based detection display, 527 client verification configuration (DNS), 511
unresolvable IP attack, 525, 526 client verification configuration (HTTP), 512
unresolvable IP attack blackhole routing, 525 client verification configuration (TCP), 510
unresolvable IP attack protection display, 525 command and hardware compatibility, 481
unresolvable IP attack source configuration, 481, 489, 506
suppression, 525 configuration (interface-based), 506
user validity check, 533 defense policy configuration, 489
user+packet validity check, 535 defense policy configuration (ACK flood), 492
ASPF defense policy configuration (DNS flood), 495
application inspection (FTP), 445 defense policy configuration (FIN flood), 493
application inspection (H.323), 447 defense policy configuration (flood), 491
application inspection (TCP), 446 defense policy configuration (HTTP flood), 496
application layer protocol inspection, 440 defense policy configuration (ICMP flood), 494
APR configuration, 451 defense policy configuration (ICMPv6 flood), 494
basic concepts, 439 defense policy configuration (RST flood), 493
configuration, 439, 442, 445 defense policy configuration (scanning), 491
display, 444 defense policy configuration (single-packet), 489
inspection, 440 defense policy configuration (SYN flood), 492
maintain, 444 defense policy configuration (SYN-ACK
policy application (interface), 443 flood), 492
policy application (zone pair), 443, 448 defense policy configuration (UDP flood), 495
policy configuration, 442 defense policy creation, 489
session management, 456 detection exemption configuration, 496
session management configuration, 457 device-preventable attacks, 481
transport layer protocol inspection, 441 display, 501
assigning log aggregation disable, 498
802.1X ACL assignment, 92 maintain, 501
MAC authentication ACL, 131 policy application (device), 497
associating policy application (interface), 497
IPsec SA, 288 TCP fragment attack prevention
attack configuration, 498
ARP attack protection configuration, 524 attack detection and prevention. See attack D&P
attack D&P attack prevention
599
ASPF application inspection (H.323), 447 802.1X EAP relay enable, 96
ASPF application inspection (TCP), 446 802.1X EAP relay/termination, 84
ASPF configuration, 439, 442, 445 802.1X EAP termination, 86
attacking 802.1X EAP termination enable, 96
detection and prevention. See attack D&P 802.1X initiation, 82
attribute 802.1X mandatory port authentication
802.1X RADIUS EAP-Message, 81 domain, 100
802.1X RADIUS Message-Authentication, 82 802.1X overview, 79
AAA HWTACACS scheme, 36 802.1X periodic online user reauthentication, 101
AAA ISP domain attribute, 47 802.1X RADIUS Message-Authentication
AAA LDAP administrator attribute, 43 attribute, 82
802.1X authentication request attempts IPsec IKE RSA signature authentication, 332
max, 98 IPsec IKEv2 configuration (pre-shared key
802.1X authentication trigger, 100 authentication), 372
600
IPsec RRI configuration, 308, 327 Auth-Fail VLAN
IPsec tunnel for IPv4 packets (IKE-based), 317 802.1X authentication, 91
IPsec tunnel for IPv4 packets (manual), 314 802.1X configuration, 102
IPsec tunnel for IPv6 (IKE-based), 320 authorization
MAC authentication, 120, 123, 127 IPsec IKEv2 address pool, 371
MAC authentication (local), 127 LDAP process, 11
MAC authentication (RADIUS-based), 129 authorization VLAN
MAC authentication VLAN assignment, 121 802.1X assignment, 89
password control configuration, 225, 228, 232 802.1X assignment configuration, 108
periodic MAC reauthentication, 121 802.1X supported, 88
port security authentication modes, 202 802.1X unsupported, 89
port security client authorized ARP
macAddressElseUserLoginSecure, 218 configuration, 529
port security client userLoginWithOUI, 215 configuration (DHCP relay agent), 531
port security configuration, 202, 205, 213 configuration (DHCP server), 530
port security MAC address autoLearn, 213 authorizing
security portal authentication client, 135 802.1X authorization VLAN, 88
security portal authentication server, 135 802.1X port authorization state, 96
SSH configuration, 391 802.1X port authorization status, 79
SSH methods, 392 802.1X port authorized-force state, 96
SSH Secure Telnet client password 802.1X port auto state, 96
authentication, 417 802.1X port unauthorized-force state, 96
SSH Secure Telnet client publickey AAA configuration, 1, 18, 58
authentication, 420
AAA ISP domain authorization method, 51
SSH Secure Telnet server password
AAA LDAP authorization, 9
authentication, 409
AAA local SSH user
SSH Secure Telnet server publickey
authentication+authorization, 62
authentication, 411
AAA RADIUS server SSH user
SSH server configuration, 393
authentication+authorization, 58
SSH SFTP client publickey authentication, 424
AAA RADIUS session-control, 54
SSH SFTP server password
port security authorization-fail-offline
authentication, 422
feature, 212
SSL services, 432
port security server authorization
user profile, 224 information, 211
user profile configuration, 223 auto
authentication FIPS mode (automatic reboot), 558
LDAP process, 10 FIPS mode entry (automatic reboot), 562
Authentication, Authorization, and Accounting. FIPS mode exit (automatic reboot), 560, 565
Use AAA
601
IPS signature library update configuration PKI certificate request, 251
(automatic), 590 PKI certificate request (automatic), 252
PKI certificate request (automatic), 252 PKI certificate request (manual), 252
port security MAC address autoLearn, 213 PKI certificate request abort, 253
B PKI certificate verification, 254
PKI CRL, 245
BAS-IP
PKI domain configuration, 249
security portal authentication BAS-IP, 153
PKI entity configuration, 248
binding
PKI Keon CA server certificate request (NAT-PT
IP source guard (IPSG) dynamic binding, 515
network), 268
IP source guard (IPSG) static binding, 514
PKI OpenCA server certificate request, 265
IPsec source interface to policy, 306
PKI RSA Keon CA server certificate request, 259
IPv4 source guard (IPv4SG) dynamic binding
PKI storage path, 256
configuration, 520
PKI Windows 2003 CA server certificate
IPv4 source guard (IPv4SG) dynamic
request, 261
binding+DHCP relay configuration, 521
PKI Windows 2003 CA server IKE
IPv4 source guard (IPv4SG) static binding
negotiation+RSA digital signature, 271
configuration, 517, 519
troubleshooting PKI CA certificate import
IPv6 source guard (IPv6SG) dynamic
failure, 283
binding+DHCPv6 snooping
configuration, 522 troubleshooting PKI CA certificate obtain
failure, 281
IPv6 source guard (IPv6SG) static binding
configuration, 517, 522 capturing
DPI engine action parameter profile (block PKI certificate verification (w/o CRL
source), 571 checking), 255
PKI certificate-based access control policy, 274
C
revocation list. Use CRL
CA
change cipher spec protocol (SSL), 432
PKI architecture, 246
changing
PKI CA policy, 246
AAA RADIUS packet DSCP priority, 55
PKI certificate, 245
IPv4 object policy rule match order, 477
PKI certificate export, 256
IPv6 object policy rule match order, 477
PKI certificate obtain, 253
CHAP/PAP authentication
PKI certificate removal, 257
602
direct/cross-subnet portal authentication attack D&P client verification (HTTP), 488
process, 137 attack D&P client verification (TCP), 485
re-DHCP portal authentication process, 138 security portal authentication, 135
checking security portal authentication system
IPsec ACL de-encapsulated packet check, 304 components, 134
IPv6 uRPF loose check mode, 549 SSL client policy configuration, 435
IPv6 uRPF strict check mode, 549 command
PKI certificate verification (CRL checking), 254 AAA command accounting method, 13
PKI certificate verification (w/o CRL AAA command authorization method, 13
checking), 255 attack D&P command and hardware
uRPF loose check mode, 542 compatibility, 481
uRPF strict check mode, 542 command and hardware compatibility
class attribute (RADIUS), 33 ARP attack protection, 524
classifying IP source guard (IPSG), 515
IPsec QoS pre-classify enable, 307 IPv6 uRPF, 552
clearing portal, 139
IPsec packet DF bit clear, 307 uRPF, 546
client user profile, 223
802.1X authentication, 83 communication
802.1X authentication (access device peer public key entry, 240
initiated), 82 comparing
802.1X authentication (client-initiated), 82 802.1X EAP relay/termination authentication, 84
802.1X authentication client timeout timer, 98 compatibility
802.1X authentication configuration, 106 attack D&P command and hardware
802.1X authentication initiation, 82 compatibility, 481
802.1X authorization VLAN assignment IP source guard (IPSG), 515
configuration, 108 portal command and hardware compatibility, 139
802.1X basic configuration, 106 user profile, 223
802.1X configuration, 88, 95 complexity checking (password control), 225
802.1X EAD assistant configuration (DHCP composition checking (password control), 225
relay agent), 112 conditional self-test, 562
802.1X EAD assistant configuration (DHCP configuring
server), 115
802.1X, 88, 95
802.1X guest VLAN assignment
802.1X authentication, 106
configuration, 108
802.1X authentication trigger, 100
802.1X SmartOn feature configuration, 117
802.1X Auth-Fail VLAN, 91, 102
802.1X+ACL assignment configuration, 111
802.1X authorization VLAN assignment, 108
attack D&P client verification, 485
802.1X basics, 106
attack D&P client verification (DNS), 487
802.1X critical VLAN, 91, 103
603
802.1X EAD assistant, 104 AAA RADIUS server status detection test
802.1X EAD assistant (DHCP relay agent), 112 profile, 25
802.1X EAD assistant (DHCP server), 115 AAA scheme, 19
802.1X guest VLAN, 90, 102 AAA user group attributes, 23
802.1X guest VLAN assignment, 108 APR, 451, 455
802.1X online user handshake, 99 APR application groups, 453
802.1X SmartOn, 105, 117 APR PBAR, 452
802.1X+ACL assignment, 111 ARP active acknowledgement, 529
AAA, 1, 18, 58 ARP attack detection (source
AAA Acct-Session-Id format, 57 MAC-based), 527, 528
AAA RADIUS security policy server IP attack D&P client verification (DNS), 499, 511
address, 33 attack D&P client verification (HTTP), 500, 512
AAA RADIUS server SSH user attack D&P client verification (TCP), 498, 510
authentication+authorization, 58 attack D&P defense policy, 489
604
attack D&P defense policy (ACK flood), 492 DPI engine application profile, 570
attack D&P defense policy (DNS flood), 495 FIPS, 557, 562
attack D&P defense policy (FIN flood), 493 FIPS mode, 558
attack D&P defense policy (flood), 491 fixed ARP, 538
attack D&P defense policy (HTTP flood), 496 IP source guard (IPSG), 514, 516, 519
attack D&P defense policy (ICMP flood), 494 IPS, 576, 579, 585
attack D&P defense policy (ICMPv6 IPS policy, 579
flood), 494 IPS policy (default), 585
attack D&P defense policy (RST flood), 493 IPS policy (user-defined), 586
attack D&P defense policy (scanning), 491 IPS signature library update (automatic), 590
attack D&P defense policy IPS signature library update (manual), 583, 588
(single-packet), 489 IPS signature library update (triggered), 583
attack D&P defense policy (SYN flood), 492 IPsec, 286, 314
attack D&P defense policy (SYN-ACK IPsec ACL, 292
flood), 492
IPsec ACL anti-replay, 305
attack D&P defense policy (UDP flood), 495
IPsec anti-replay redundancy, 305
attack D&P detection exemption, 496
IPsec for IPv6 routing protocols, 309
attack D&P policy application (device), 497
IPsec IKE, 331, 333, 342
attack D&P policy application (interface), 497
IPsec IKE (aggressive mode+NAT traversal), 353
attack D&P TCP fragment attack
IPsec IKE (aggressive mode+RSA signature
prevention, 498
authentication), 346
authorized ARP, 529
IPsec IKE (main mode/pre-shared key
authorized ARP (DHCP relay agent), 531 authentication), 342
authorized ARP (DHCP server), 530 IPsec IKE DPD, 339
connection limit, 463, 466 IPsec IKE global identity information, 338
connection limit (interface-based), 463 IPsec IKE keepalive function, 339
connection limit policy, 464 IPsec IKE keychain, 337
crypto engine, 555 IPsec IKE NAT keepalive function, 339
crypto engine (hardware), 555 IPsec IKE profile, 334
DPI engine, 567, 569 IPsec IKE proposal, 336
DPI engine action parameter profile (block IPsec IKE SNMP notification, 341
source), 571
IPsec IKEv2, 362, 363, 372
DPI engine action parameter profile
IPsec IKEv2 (NAT traversal), 384
(capture), 571
IPsec IKEv2 (pre-shared key authentication), 372
DPI engine action parameter profile
IPsec IKEv2 (RSA signature authentication), 376
(email), 572
IPsec IKEv2 address pool, 371
DPI engine action parameter profile
IPsec IKEv2 DPD, 370
(logging), 572
IPsec IKEv2 global parameters, 370
DPI engine action parameter profile
(redirect), 572 IPsec IKEv2 keychain, 369
605
IPsec IKEv2 NAT keepalive, 371 MAC authentication (RADIUS-based), 129
IPsec IKEv2 policy, 367 MAC authentication ACL assignment, 131
IPsec IKEv2 profile, 364 MAC authentication delay, 125
IPsec IKEv2 proposal, 368 MAC authentication keep-online, 126
IPsec IPv6 routing protocol profile MAC authentication timer, 124
(manual), 309 MAC authentication user account format, 124
IPsec packet DF bit, 307 NAS-ID profile, 57
IPsec policy (IKE-based), 299 NETCONF-over-SSH, 429
IPsec policy (IKE-based/direct), 300 NETCONF-over-SSH client user line, 396
IPsec policy (IKE-based/template), 301 object group, 470
IPsec policy (manual), 297 object policy, 473, 478
IPsec profile (IKE-based), 311 password control, 225, 228, 232
IPsec RIPng, 324 PKI, 245, 248, 259
IPsec RRI, 308, 327 PKI certificate import/export, 275
IPsec SNMP notification, 312 PKI certificate request (automatic), 252
IPsec transform set, 295 PKI certificate request (manual), 252
IPsec tunnel, 311 PKI certificate request abort, 253
IPsec tunnel for IPv4 packets (IKE-based), 317 PKI certificate-based access control
IPsec tunnel for IPv4 packets (manual), 314 policy, 257, 274
IPsec tunnel for IPv6 packets (IKE-based), 320 PKI domain, 249
IPv4 address object group, 470 PKI entity, 248
IPv4 object policy rule, 475 PKI Keon CA server certificate request (NAT-PT
IPv4 source guard (IPv4SG), 516 network), 268
IPv4 source guard (IPv4SG) dynamic PKI OpenCA server certificate request, 265
binding, 520 PKI RSA Keon CA server certificate request, 259
IPv4 source guard (IPv4SG) dynamic PKI Windows 2003 CA server certificate
binding+DHCP relay, 521 request, 261
IPv4 source guard (IPv4SG) static PKI Windows 2003 CA server IKE
binding, 517, 519 negotiation+RSA digital signature, 271
IPv6 address object group, 471 port object group, 471
IPv6 object policy rule, 475 port security, 202, 205, 213
IPv6 source guard (IPv6SG), 517 port security client
IPv6 source guard (IPv6SG) dynamic macAddressElseUserLoginSecure, 218
binding+DHCPv6 snooping, 522 port security client userLoginWithOUI, 215
IPv6 source guard (IPv6SG) static port security features, 208
binding, 517, 522 port security intrusion protection, 208
IPv6 uRPF, 549, 552, 553 port security MAC address autoLearn, 213
MAC authentication, 120, 123, 127 port security NTK feature, 208
MAC authentication (local), 127 port security secure MAC addresses, 209
606
preauthentication IP address pool for portal security portal authentication user
user, 148 synchronization, 152
public peer key, 239 security portal authentication Web server, 141
Secure Telnet client user line, 396 security portal authentication Web server
security portal authentication, 134, 139, 157 detection, 151
security portal authentication (cross-subnet service object group, 471
for MPLS L3VPN), 192 session management, 456, 457
security portal authentication session management logging, 459
cross-subnet, 170 SSH, 391
security portal authentication destination SSH client host public key, 396
subnet, 145 SSH device as Secure Telnet client, 400
security portal authentication detection SSH device as server, 393
features, 149
SSH device as SFTP client, 403
security portal authentication direct, 157
SSH management parameters, 399
security portal authentication direct with
SSH SCP, 428
preauthentication domain, 194
SSH SCP client device, 406
security portal authentication extended
SSH Secure Telnet, 408
cross-subnet, 180
SSH Secure Telnet client password
security portal authentication extended
authentication, 417
direct, 173
SSH Secure Telnet client publickey
security portal authentication extended
authentication, 420
re-DHCP, 176
SSH Secure Telnet server password
security portal authentication fail-permit, 153
authentication, 409
security portal authentication portal-free
SSH Secure Telnet server publickey
rule, 143
authentication, 411
security portal authentication re-DHCP, 167
SSH SFTP, 422
security portal authentication re-DHCP with
SSH SFTP client publickey authentication, 424
preauthentication domain, 196
SSH SFTP server password authentication, 422
security portal authentication server, 140
SSH user, 397
security portal authentication server
SSL, 432, 433
BAS-IP, 153
SSL client policy, 435
security portal authentication server
detection, 150 SSL server policy, 434, 436
607
configuration (interface-based), 463 PKI architecture, 246
display, 465 PKI CA policy, 246
maintain, 465 PKI certificate export, 256
policy application, 465 PKI certificate removal, 257
policy configuration, 464 PKI certificate-based access control policy, 257
policy creation, 464 troubleshooting PKI CRL obtain failure, 283
troubleshoot overlapping ACL segments, 468 cross-subnet
connection limits portal authentication, 170
troubleshoot, 468 portal authentication (MPLS L3VPN), 192
consistency check (ARP attack protection), 529 portal authentication extended, 180
controlling portal authentication mode, 137, 137
802.1X controlled/uncontrolled port, 79 crypto engine
AAA RADIUS session-control, 54 configuration, 555
port security MAC address learning, 203 display, 556
security portal authentication user hardware configuration, 555
access, 143 IPsec, 289
cookie challenging maintain, 556
IPsec IKEv2, 363 cryptography
IPsec IKEv2 cookie challenging, 370 FIPS self-test, 561
copying
D
IPsec packet DF bit copy, 307
DAE
creating
AAA RADIUS DAE server, 55
AAA HWTACACS scheme, 36
data
AAA ISP domain, 46
SSL configuration, 432, 433
AAA LDAP scheme, 45
data encryption
AAA RADIUS scheme, 26
PKI configuration, 245, 248, 259
attack D&P defense policy, 489
DDoS attack (uRPF), 542
connection limit policy, 464
default
IPv4 object policy, 474
IPS policy configuration, 585
IPv6 object policy, 474
IPv6 uRPF default route, 549
local key pair, 236
uRPF route, 542
security LDAP server, 42
defending
criteria
attack D&P defense policy, 489
DPI engine inspection rules, 567
attack D&P defense policy (flood), 491
critical VLAN
attack D&P defense policy (scanning), 491
802.1X authentication, 91
attack D&P defense policy (single-packet), 489
802.1X configuration, 103
attack D&P defense policy configuration (ACK
CRL
flood), 492
PKI, 245
608
attack D&P defense policy configuration security portal authentication detection
(DNS flood), 495 features, 149
attack D&P defense policy configuration (FIN security portal authentication server, 150
flood), 493 security portal authentication server
attack D&P defense policy configuration detection+user synchronization, 184
(HTTP flood), 496 security portal authentication user online
attack D&P defense policy configuration detection, 149
(ICMP flood), 494 security portal authentication user
attack D&P defense policy configuration synchronization, 152
(ICMPv6 flood), 494 security portal authentication Web server, 151
attack D&P defense policy configuration (RST device
flood), 493 802.1X authentication, 83
attack D&P defense policy configuration (SYN 802.1X authentication configuration, 106
flood), 492
802.1X authentication initiation, 82
attack D&P defense policy configuration
802.1X authorization VLAN assignment
(SYN-ACK flood), 492
configuration, 108
attack D&P defense policy configuration
802.1X basic configuration, 106
(UDP flood), 495
802.1X configuration, 88, 95
attack D&P policy application (device), 497
802.1X EAD assistant, 104
attack D&P policy application (interface), 497
802.1X EAD assistant configuration (DHCP relay
delaying
agent), 112
MAC authentication delay, 125
802.1X EAD assistant configuration (DHCP
delimiter (802.1X domain name), 103 server), 115
DES 802.1X guest VLAN assignment
IPsec encryption algorithm, 288 configuration, 108
describing 802.1X SmartOn, 105
object policy rule description, 474 802.1X SmartOn feature configuration, 117
destination 802.1X+ACL assignment configuration, 111
security portal authentication portal-free AAA configuration, 1, 18, 58
rule, 143 AAA device management user, 20
security portal authentication subnet, 145 AAA HWTACACS accounting server, 37
destroying AAA HWTACACS authentication server, 36
local key pair, 238 AAA HWTACACS authorization server, 37
detecting AAA HWTACACS implementation, 7
AAA RADIUS server status detection test AAA HWTACACS scheme, 36
profile, 25
AAA HWTACACS scheme VPN, 38
ARP attack detection (source
AAA HWTACACS shared keys, 38
MAC-based), 527, 528
AAA implementation, 12
ARP detection configuration, 532
AAA LDAP attribute map for authorization, 45
attack D&P detection exemption, 496
609
AAA LDAP authentication server, 45 IPv4 source guard (IPv4SG) dynamic
AAA LDAP authorization server, 45 binding+DHCP relay configuration, 521
AAA LDAP implementation, 9 MAC authentication, 120, 123, 127
AAA LDAP scheme, 42 MAC authentication (local), 127
AAA LDAP server timeout period, 43 MAC authentication (RADIUS-based), 129
AAA local user, 20 MAC authentication ACL assignment, 131
AAA MPLS L3VPN implementation, 14 MAC authentication configuration, 120
AAA RADIUS accounting server password control configuration, 225, 228, 232
parameters, 27 password control parameters (global), 229
AAA RADIUS authentication server, 26 password control parameters (local user), 231
AAA RADIUS implementation, 2 password control parameters (super), 231
AAA RADIUS scheme, 25 password control parameters (user group), 230
AAA RADIUS scheme VPN, 28 password setting, 225
AAA RADIUS security policy server IP port security server authorization
address, 33 information, 211
AAA RADIUS server status, 29 portal authentication direct configuration, 157
AAA RADIUS shared keys, 28 portal authentication re-DHCP, 167
AAA scheme, 19 security portal authentication AAA server, 135
APR configuration, 455 security portal authentication client, 135
attack D&P blacklist configuration, 509 security portal authentication configuration, 157
attack D&P client verification configuration security portal authentication device access, 135
(DNS), 511 security portal authentication policy server, 135
attack D&P client verification configuration security portal authentication server, 135
(HTTP), 512 security portal authentication Web server, 135
attack D&P client verification configuration SSH SCP client, 406
(TCP), 510
SSH SCP server enable, 395
attack D&P configuration, 481, 489, 506
SSH Secure Telnet client, 400
attack D&P configuration
SSH Secure Telnet server connection
(interface-based), 506
establishment, 401
attack D&P defense policy, 489
SSH Secure Telnet server enable, 395
attack D&P device-preventable attacks, 481
SSH server configuration, 393
attack D&P policy application (device), 497
SSH SFTP client, 403
authorized ARP (DHCP server), 530
SSH SFTP server enable, 395
connection limit configuration, 463, 466
SSL server policy configuration, 434, 436
connection limit configuration
uRPF configuration, 547
(interface-based), 463
user profile, 224
crypto engine configuration, 555
user profile configuration, 223
crypto engine hardware configuration, 555
DF bit
IPsec packet DF bit clear, 307
610
IPsec packet DF bit copy, 307 PKI certificate obtain, 253
IPsec packet DF bit set, 307 PKI certificate removal, 257
DH algorithm PKI certificate request, 251
IPsec IKE, 333 PKI certificate request (automatic), 252
IPsec PFS, 333 PKI certificate request (manual), 252
DH guessing PKI certificate request abort, 253
IPsec IKEv2, 363 PKI certificate verification, 254
DHCP PKI certificate-based access control policy, 257
802.1X EAD assistant configuration (DHCP PKI configuration, 245, 248, 259
relay agent), 112 PKI CRL, 245
802.1X EAD assistant configuration (DHCP PKI domain configuration, 249
server), 115 PKI entity configuration, 248
authorized ARP (DHCP server), 530 PKI Keon CA server certificate request (NAT-PT
authorized ARP (relay agent), 531 network), 268
IPv4 source guard (IPv4SG) dynamic PKI local certificate, 245
binding+DHCP relay configuration, 521 PKI OpenCA server certificate request, 265
IPv6 source guard (IPv6SG) dynamic PKI peer certificate, 245
binding+DHCPv6 snooping
PKI RA certificate, 245
configuration, 522
PKI RSA Keon CA server certificate request, 259
security portal authentication extended
PKI verification (CRL checking), 254
re-DHCP configuration, 176
PKI verification (w/o CRL checking), 255
security portal authentication modes, 136
PKI Windows 2003 CA server certificate
security portal authentication process, 137
request, 261
security portal authentication re-DHCP
Digital Signature Algorithm. Use DSA
configuration, 167, 196
direct portal authentication mode, 136, 137
security portal authentication re-DHCP
directory
process (with CHAP/PAP authentication), 138
AAA LDAP directory service, 9
troubleshooting security portal
authentication users cannot log in SSH SFTP, 405
(re-DHCP), 200 disabling
DHCPv6 attack D&P log aggregation, 498
IPv6 source guard (IPv6SG) dynamic DPI engine inspection suspension upon excessive
binding+DHCPv6 snooping CPU usage, 574
configuration, 522 displaying
digital certificate 802.1X, 106
PKI CA certificate, 245 AAA, 58
PKI CA policy, 246 AAA HWTACACS, 41
PKI CA storage path, 256 AAA LDAP, 46
PKI certificate export, 256 AAA local users/user groups, 24
PKI certificate import/export, 275 AAA RADIUS, 35
611
APR, 454 attack D&P DNS client verification, 487, 499
ARP attack detection (source attack D&P DNS client verification
MAC-based), 527 configuration, 511
ARP attack protection (unresolvable IP domain
attack), 525 802.1X mandatory port authentication
ARP detection, 535 domain, 100
ASPF, 444 802.1X supported domain name delimiters, 103
attack D&P, 501 AAA ISP domain accounting method, 52
connection limit, 465 AAA ISP domain attribute, 47
crypto engine, 556 AAA ISP domain authentication method, 49
DPI engine, 574 AAA ISP domain authorization method, 51
FIPS, 562 MAC authentication, 123
host public key, 238 PKI domain configuration, 249
IP source guard (IPSG), 518 security portal authentication domain, 146
IPS, 584 security portal preauthentication domain, 147
IPsec, 313 Don't Fragment bit. See DF bit
IPsec IKE, 342 DoS attack (uRPF), 542
IPsec IKEv2, 371 DPD
IPv4 source guard (IPv4SG), 518 IPsec IKE DPD, 339
IPv6 source guard (IPv6SG), 518 IPsec IKEv2 DPD, 370
IPv6 uRPF, 553 DPI
MAC authentication, 127 DPI engine inspection suspension upon excessive
object group, 472 CPU usage disable, 574
object policy, 477 engine action parameter profile
password control, 232 configuration, 571
612
engine maintain, 574 IPv4 source guard (IPv4SG) dynamic
engine optimization, 573 binding+DHCP relay configuration, 521
engine service activation, 570 IPv6 source guard (IPv6SG) dynamic
IPS configuration, 576, 579, 585 binding+DHCPv6 snooping configuration, 522
613
802.1X periodic online user IPsec configuration, 286, 314
reauthentication, 101 IPsec RIPng configuration, 324
AAA RADIUS accounting-on, 32 IPsec RRI configuration, 308, 327
AAA RADIUS accounting-on (extended), 33 IPsec transport mode, 287
AAA RADIUS session-control, 54 IPsec tunnel for IPv4 packets (IKE-based), 317
AAA RADIUS SNMP notification, 35 IPsec tunnel for IPv4 packets (manual), 314
APR application statistics, 453 IPsec tunnel for IPv6 packets (IKE-based), 320
IPsec ACL de-encapsulated packet check, 304 IPsec tunnel mode, 287
IPsec IKE invalid SPI recovery, 340 encrypting
IPsec IKEv2 cookie challenging, 370 crypto engine configuration, 555
IPsec packet logging, 307 crypto engine hardware configuration, 555
IPsec QoS pre-classify, 307 IPsec, 288
IPv4 object policy rule matching IPsec configuration, 286, 314
acceleration, 477 IPsec crypto engine, 289
IPv4 source guard (IPv4SG) on interface, 516 IPsec encryption algorithm (3DES), 288
IPv6 object policy rule matching IPsec encryption algorithm (AES), 288
acceleration, 477
IPsec encryption algorithm (DES), 288
IPv6 source guard (IPv6SG) on interface, 517
IPsec RIPng configuration, 324
MAC authentication, 123
IPsec RRI configuration, 308, 327
MAC authentication multi-VLAN mode, 126
IPsec tunnel for IPv4 packets (IKE-based), 317
NETCONF-over-SSH, 396
IPsec tunnel for IPv4 packets (manual), 314
outgoing packets filtering on portal
IPsec tunnel for IPv6 packets (IKE-based), 320
interface, 149
peer public key entry, 240
password control, 228
public key import from file, 242
port security, 205
public key management, 236, 240
port security authorization-fail-offline, 212
SSH configuration, 391
port security MAC move, 211
SSH server configuration, 393
security portal authentication, 141
SSL services, 432
security portal authentication roaming, 154
entering
session management statistics collection, 459
FIPS mode (automatic reboot), 558, 562
SSH SCP server, 395
FIPS mode (manual reboot), 558, 563
SSH Secure Telnet server, 395
peer public key, 239, 240
SSH SFTP server, 395
ESP
strict-checking mode on portal authorization
IPsec security protocol 50, 286
information, 148
establishing
encapsulating
IPsec tunnel establishment, 291
802.1X RADIUS EAP-Message attribute, 81
SSH SCP server connection, 407
IPsec ACL de-encapsulated packet check, 304
SSH Secure Telnet server connection, 401
IPsec anti-replay, 305
SSH SFTP server connection, 404
614
Ethernet DPI engine application profile, 570
802.1X overview, 79 outgoing packets filtering on portal
ARP attack protection configuration, 524 interface, 149
exempting FIN flood, 493
615
attack D&P defense policy (DNS flood), 495 fragment
attack D&P defense policy (FIN flood), 493 attack D&P TCP fragment attack prevention, 498
attack D&P defense policy (HTTP flood), 496 IPsec packet DF bit, 307
attack D&P defense policy (ICMP flood), 494 frame
attack D&P defense policy (ICMPv6 port security configuration, 202, 205
flood), 494 FTP
attack D&P defense policy (RST flood), 493 AAA RADIUS Login-Service attribute check
attack D&P defense policy (SYN flood), 492 method, 34
attack D&P defense policy (SYN-ACK ASPF application inspection (FTP), 445
flood), 492 local host public key distribution, 237
attack D&P defense policy (UDP flood), 495 SSH SCP server connection establishment, 407
attack D&P device-preventable SSH SFTP client device, 403
attacks, 481, 483 SSH SFTP client publickey authentication, 424
forcing SSH SFTP configuration, 422
security portal authentication forced SSH SFTP directories, 405
type, 134
SSH SFTP files, 405
format
SSH SFTP packet source IP address, 403
802.1X EAP packet format, 80
SSH SFTP server connection establishment, 404
802.1X EAPOL packet format, 81
SSH SFTP server connection termination, 406
802.1X packet, 80
SSH SFTP server password authentication, 422
AAA HWTACACS username, 39
Fully Qualified Domain Name. Use FQDN
AAA RADIUS packet format, 3
function
AAA RADIUS username, 28
security portal authentication extended
MAC authentication user account, 124 functions, 134
specifying NAS-Port-ID attribute format, 154
G
forwarding
gateway
ARP detection restricted forwarding, 534, 536
ARP gateway protection, 539, 539
IP source guard (IPSG)
configuration, 514, 516, 519 IPsec RRI, 290
616
IPsec IKE global identity information, 338 HW Terminal Access Controller Access Control
global parameter System. Use HWTACACS
617
port security server authorization troubleshoot negotiation failure (no proposal
information, 211 match), 357
IKE, 331, See also ISAKMP troubleshoot negotiation failure (no proposal or
configuration, 331, 333, 342 keychain specified correctly), 358
configuration (aggressive mode+NAT troubleshooting, 357
traversal), 353 IKEv2, 362, See also ISAKMP
configuration (aggressive mode+RSA address pool, 371
signature authentication), 346 configuration, 362, 363, 372
configuration (main mode/pre-shared key configuration (NAT traversal), 384
authentication), 342 configuration (pre-shared key
DH algorithm, 333 authentication), 372
display, 342 configuration (RSA signature authentication), 376
DPD configuration, 339 cookie challenging, 363, 370
FIPS compliance, 333 DH guessing, 363
global identity information, 338 display, 371
identity authentication, 332 DPD configuration, 370
invalid SPI recovery, 340 global parameter configuration, 370
IPsec negotiation mode, 288 keychain configuration, 369
IPsec policy (IKE-based), 299 maintain, 371
IPsec policy (IKE-based/direct), 300 NAT keepalive, 371
IPsec policy (IKE-based/template), 301 negotiation, 362
IPsec profile (IKE-based), 311 new features, 363
IPsec SA, 288 policy configuration, 367
IPsec tunnel establishment, 291 profile configuration, 364
IPsec tunnel for IPv4 packets (IKE-based), 317 proposal configuration, 368
IPsec tunnel for IPv6 packets (IKE-based), 320 protocols and standards, 363
keepalive function, 339 retransmission, 363
keychain configuration, 337 SA rekeying, 363
maintain, 342 troubleshoot, 389
NAT keepalive function, 339 troubleshoot negotiation failure (no proposal
negotiation, 331 match), 389
PFS, 333 IKEv2 feature
profile configuration, 334 IPsec IKEv2 cookie challenging, 363
proposal configuration, 336 IPsec IKEv2 DH guessing, 363
protocols and standards, 333 IPsec IKEv2 retransmission, 363
SA max, 341 IPsec IKEv2 SA rekeying, 363
security mechanism, 332 IMC
SNMP notification, 341 AAA RADIUS session-control, 54
implementing
618
802.1X MAC-based access control, 88 Internet
802.1X port-based access control, 88 SSL configuration, 432, 433
AAA for MPLS L3VPNs, 14 Internet Key Exchange. Use IKEv2
AAA HWTACACS, 7 interpreting
AAA LDAP, 9 AAA HUAWEI RADIUS attributes 26-1 and 26-4
AAA on device, 12 (version 1.0), 35
AAA RADIUS, 2 AAA HUAWEI RADIUS attributes 26-1 and 26-4
IPsec, 289 (version 1.1), 35
IPsec ACL-based implementation, 289 AAA RADIUS class attribute as CAR parameter, 33
public key from file, 242 port security disableport mode, 208
619
ARP attack protection configuration, 524 signature action parameter profile
ARP detection restricted forwarding, 536 configuration, 580
ARP detection user+packet validity signature actions, 576
check, 535 signature library management, 578, 582
ARP filtering configuration, 541 signature library rollback, 584
ARP gateway protection, 539 signature library update configuration
attack D&P blacklist, 484, 500 (automatic), 590
authorized ARP (DHCP relay agent), 531 signature library update configuration
authorized ARP (DHCP server), 530 (manual), 588
policy application (DPI profile), 580 IKE configuration (main mode/pre-shared key
authentication), 342
policy configuration, 579
IKE DPD, 339
policy configuration (default), 585
IKE global identity information, 338
policy configuration (user-defined), 586
IKE identity authentication, 332
620
IKE invalid SPI recovery, 340 policy configuration (IKE-based), 299
IKE keepalive function, 339 policy configuration (IKE-based/direct), 300
IKE keychain, 337 policy configuration (IKE-based/template), 301
IKE NAT keepalive function, 339 policy configuration (manual), 297
IKE negotiation, 331 policy configuration restrictions, 297
IKE negotiation mode, 288 policy configuration restrictions (IKE-based), 299
IKE profile configuration, 334 profile configuration (IKE-based), 311
IKE proposal, 336 protocols and standards, 291
IKE SA max, 341 QoS pre-classify enable, 307
IKE security mechanism, 332 RIPng configuration, 324
IKE SNMP notification, 341 RRI, 290
IKE-based profile application to tunnel RRI configuration, 308, 327
interface, 312 SA, 288
IKEv2 address pool, 371 security protocols, 286
IKEv2 configuration, 362, 363, 372 security strength, 291
IKEv2 configuration (NAT traversal), 384 SNMP notification configuration, 312
IKEv2 configuration (pre-shared key source interface policy bind, 306
authentication), 372 transform set, 295
IKEv2 configuration (RSA signature troubleshoot IKE, 357
authentication), 376
troubleshoot IKE negotiation failure (no proposal
IKEv2 cookie challenging, 370 match), 357
IKEv2 DPD, 370 troubleshoot IKE negotiation failure (no proposal
IKEv2 global parameters, 370 or keychain specified correctly), 358
IKEv2 keychain, 369 troubleshoot IKEv2, 389
IKEv2 NAT keepalive, 371 troubleshoot IKEv2 negotiation failure (no
IKEv2 negotiation, 362 proposal match), 389
IKEv2 new features, 363 troubleshoot SA negotiation failure (invalid
IKEv2 policy configuration, 367 identity info), 359
IKEv2 profile configuration, 364 troubleshoot SA negotiation failure (no transform
IKEv2 proposal, 368 set match), 358, 389
621
address object group configuration, 470 SSH Secure Telnet server connection
IPsec tunnel for IPv4 packets (IKE-based), 317 establishment, 401
IPsec tunnel for IPv4 packets (manual), 314 SSH SFTP server connection establishment, 404
object policy creation, 474 uRPF. See IPv6 uRPF
object policy rule configuration, 475 IPv6 IPsec
object policy rule match order change, 477 routing protocol profile (manual), 309
object policy rule matching acceleration, 477 routing protocols configuration, 309
object policy zone pair application, 476 IPv6 source guard (IPv6SG)
source guard. See IPv4 source guard configuration, 514, 516, 517, 519
SSH SCP client device, 406 display, 518
SSH SCP server connection dynamic binding+DHCPv6 snooping
establishment, 407 configuration, 522
SSH Secure Telnet server connection enable on interface, 517
establishment, 401 maintain, 518
SSH SFTP server connection static binding configuration, 517, 522
establishment, 404 IPv6 uRPF
IPv4 source guard (IPv4SG) check modes, 549
configuration, 514, 516, 516, 519 command and hardware compatibility, 552
display, 518 configuration, 549, 552, 553
dynamic binding configuration, 520 display, 553
dynamic binding+DHCP relay features, 549
configuration, 521 network application, 552
enable on interface, 516 operation, 550
maintain, 518 ISAKAMP
static binding configuration, 517, 519 protocols and standards, 333, 363
IPv6 ISAKMP, 331, 362, See also IKE
address object group, 470 IPsec IKE configuration, 331, 333, 342
address object group configuration, 471 IPsec IKE configuration (aggressive mode+NAT
IPsec. See IPv6 IPsec traversal), 353
IPsec tunnel for IPv6 packets (IKE-based), 320 IPsec IKE configuration (aggressive mode+RSA
object policy creation, 474 signature authentication), 346
object policy rule configuration, 475 IPsec IKE configuration (main mode/pre-shared
object policy rule match order change, 477 key authentication), 342
object policy rule matching acceleration, 477 IPsec IKEv2 configuration, 362, 363, 372
object policy zone pair application, 476 IPsec IKEv2 configuration (NAT traversal), 384
source guard. See IPv6 source guard IPsec IKEv2 configuration (pre-shared key
SSH SCP client device, 406 authentication), 372
622
ISP keyword
AAA device implementation, 12 IPsec ACL rule keywords, 292
AAA ISP domain accounting method, 52 L
AAA ISP domain attribute, 47
LAN
AAA ISP domain authentication method, 49
802.1X overview, 79
AAA ISP domain authorization method, 51
Layer 3
AAA ISP domain creation, 46
IPsec configuration, 286, 314
AAA ISP domain method, 46
IPsec RIPng configuration, 324
ITA
IPsec RRI configuration, 308, 327
AAA ITA policy configuration, 56
IPsec tunnel for IPv4 packets (IKE-based), 317
K IPsec tunnel for IPv4 packets (manual), 314
keepalive IPsec tunnel for IPv6 packets (IKE-based), 320
IPsec IKE function, 339 PKI MPLS L3VPN support, 247
IPsec IKE NAT function, 339 LDAP
IPsec IKEv2 NAT, 371 AAA configuration, 1, 18, 58
keep-online feature (MAC authentication), 126 AAA implementation, 9
Keon CA AAA LDAP server SSH user authentication, 65
PKI CA server certificate request (NAT-PT AAA LDAP server SSL VPN user
network), 268 authentication+authorization, 70
key AAA local user configuration, 20
IPsec IKE pre-shared key authentication, 332 AAA scheme, 19
PKI configuration, 245, 248, 259 administrator attribute, 43
key pair attribute map, 44
SCP client DSA host key pair, 406 attribute map for authorization, 45
SCP client RSA host key pair, 406 authentication, 9
SCP client RSA server key pair, 406 authentication process, 10
SFTP client DSA host key pair, 403 authentication server, 45
SFTP client RSA host key pair, 403 authorization, 9
SFTP client RSA server key pair, 403 authorization process, 11
SSH server DSA host key pair, 394 authorization server, 45
SSH server RSA host key pair, 394 directory service, 9
SSH server RSA server key pair, 394 display, 46
Stelnet client DSA host key pair, 400 protocols and standards, 14
Stelnet client RSA host key pair, 400 scheme configuration, 42
Stelnet client RSA server key pair, 400 scheme creation, 45
keychain server creation, 42
IPsec IKE keychain, 337 server IP address, 42
IPsec IKEv2 keychain, 369 server timeout period, 43
623
troubleshooting user authentication fails, 78 troubleshooting PKI local certificate import
user attribute, 43 failure, 284
versions, 42 log aggregation, 498
library logging
IPS configuration, 576, 579, 585 attack D&P log aggregation, 498
IPS signature library management, 578, 582 DPI engine action parameter profile
IPS signature library rollback, 584 (logging), 572
IPS signature library update configuration IPsec packet logging enable, 307
(automatic), 590 password events, 227
IPS signature library update configuration session management logging, 459
(manual), 588 logging in
Lightweight Directory Access Protocol. Use LDAP AAA concurrent login user max, 56
limiting password expired login, 226
connection limit. See connection limit password user first login, 227
port security secure MAC addresses, 206 password user login attempt limit, 227
link password user login control, 227
uRPF link layer check, 542 RADIUS Login-Service attribute, 34
local logging out
802.1X authorization VLAN, 88 security portal authentication users, 155
AAA local accounting method, 13 M
AAA local authentication, 13
MAC
AAA local authentication configuration, 18
802.1X MAC-based access control, 88
AAA local authorization method, 13
address. See MAC addressing
AAA SSH user
ARP attack detection (source MAC-based), 527
authentication+authorization, 62
authentication. See MAC authentication
host public key display, 238
SSL services, 432
host public key distribution, 237
MAC address
host public key export, 238
802.1X authentication (client-initiated), 82
key pair creation, 236
MAC addressing
key pair destruction, 238
802.1X authentication (access device
MAC authentication, 120
initiated), 82
MAC authentication (local), 127
ARP attack detection (source MAC-based), 528
password control parameters (local user), 231
ARP attack protection configuration, 524
PKI digital certificate, 245
ARP packet source MAC consistency check, 529
troubleshooting PKI certificate obtain
IP source guard (IPSG)
failure, 281
configuration, 514, 516, 519
troubleshooting PKI certificate request
IPv4 source guard (IPv4SG) dynamic binding
failure, 282
configuration, 520
624
IPv4 source guard (IPv4SG) dynamic port security configuration, 202, 205, 213
binding+DHCP relay configuration, 521 port security features, 208
IPv4 source guard (IPv4SG) static binding port security intrusion protection, 208
configuration, 519 port security MAC address autoLearn, 213
IPv6 source guard (IPv6SG) dynamic port security MAC move, 211
binding+DHCPv6 snooping
port security MAC+802.1X authentication, 204
configuration, 522
port security mode, 206
IPv6 source guard (IPv6SG) static binding
port security NTK, 208
configuration, 522
RADIUS-based, 120, 129
MAC authentication, 123, 127
timer configuration, 124
MAC authentication (local), 127
user account format, 124
MAC authentication (RADIUS-based), 129
user account policies, 120
MAC authentication configuration, 120
VLAN assignment, 121
port security client
MAC learning
macAddressElseUserLoginSecure, 218
port security autoLearn MAC learning
port security MAC address autoLearn, 213
control, 203
port security macAddressWithRadius, 204
port security MAC learning control modes, 202
port security secure MAC address, 209
port security secure MAC learning control, 203
port security secure MAC address port
maintaining
limit, 206
802.1X, 106
troubleshooting port security secure MAC
addresses, 222 AAA HWTACACS, 41
625
managing IPsec ACL-based implementation standard, 289
IPS signature library, 578, 582 IPsec application-based implementation, 290
public keys, 236, 240 IPsec encapsulation transport, 287
sessions. See session management IPsec encapsulation tunnel, 287
manual IPsec IKE negotiation, 288
FIPS mode (manual reboot), 558 IPsec IKE negotiation (time-based lifetime), 288
FIPS mode entry (manual reboot), 563 IPsec IKE negotiation (traffic-based lifetime), 288
FIPS mode exit (manual reboot), 560, 565 IPv6 uRPF loose check, 549
IPS signature library update configuration IPv6 uRPF strict check, 549
(manual), 588 MAC authentication multi-VLAN, 126
IPsec IPv6 routing protocol profile PKI offline, 251
(manual), 309 PKI online, 251
mapping port security, 206
APR configuration, 451, 455 port security authentication control, 202
APR PBAR configuration, 452 port security autoLearn MAC learning
APR PBAR general port mapping, 451 control, 203
APR PBAR host port mapping, 451 port security MAC learning control, 202
matching port security MAC learning control
DPI engine configuration, 567, 569 autoLearn, 202
DPI engine inspection rules, 567 port security MAC learning control secure, 202
object policy rule match order, 474 port security macAddressWithRadius
object policy rule match order change, 477 authentication, 204
object policy rule matching acceleration, 477 port security secure MAC learning control, 203
message security portal authentication, 136
ARP attack protection configuration, 524 security portal authentication (cross-subnet), 137
Message Authentication Code. Use MAC security portal authentication (direct), 136
minimum password length, 225 security portal authentication (re-DHCP), 136
mirroring uRPF loose check, 542
IPsec mirror image ACLs, 294 uRPF strict check, 542
IPsec non-mirror image ACLs, 294 userLogin 802.1X authentication, 204
mode userLoginSecure 802.1X authentication, 204
802.1X EAP relay/termination comparison, 84 userLoginSecureExt 802.1X authentication, 204
802.1X multicast trigger, 82, 100 userLoginWithOUI 802.1X authentication, 204
802.1X unicast trigger, 82, 100 MPLS L3VPN
626
802.1X multicast trigger mode, 82, 100 network
multichannel protocol (ASPF), 439, 442 802.1X access control method, 97
N 802.1X architecture, 79
802.1X authentication, 82, 83
NAS
802.1X authentication request attempts max, 98
AAA configuration, 18
802.1X authentication server timeout timer, 98
AAA device implementation, 12
802.1X authentication trigger, 100
AAA HWTACACS implementation, 7
802.1X Auth-Fail VLAN, 91, 102
AAA LDAP implementation, 9
802.1X authorization state, 96
AAA MPLS L3VPN implementation, 14
802.1X authorization VLAN assignment
AAA NAS-ID profile configuration, 57
configuration, 108
AAA RADIUS implementation, 2
802.1X basic configuration, 106
AAA RADIUS security policy server IP
802.1X critical VLAN, 91, 103
address, 33
802.1X EAD assistant, 104
applying interface NAS-ID profile
802.1X EAD assistant configuration (DHCP relay
(RADIUS), 156
agent), 112
NAS-Port-ID
802.1X EAD assistant configuration (DHCP
specifying format for portal
server), 115
authentication, 154
802.1X EAP over RADIUS, 81
NAT
802.1X EAP relay authentication, 84
IPsec IKE configuration (aggressive
802.1X EAP relay enable, 96
mode+NAT traversal), 353
802.1X EAP relay/termination, 84
IPsec IKE keepalive function, 339
802.1X EAP termination, 86
IPsec IKEv2 configuration (NAT traversal), 384
802.1X EAP termination enable, 96
IPsec IKEv2 keepalive, 371
802.1X guest VLAN, 90, 102
session management, 456
802.1X online user handshake, 99
session management configuration, 457
802.1X packet format, 80
NAT-PT
802.1X periodic online user reauthentication, 101
PKI Keon CA server certificate request, 268
802.1X port users max, 98
need to know. Use NTK
802.1X related protocols, 80
negotiating
802.1X SmartOn, 105
IPsec IKE negotiation, 331
802.1X SmartOn feature configuration, 117
IPsec IKE negotiation mode, 288
802.1X VLAN manipulation, 88
IPsec IKEv2 negotiation, 362
802.1X+ACL assignment configuration, 111
NETCONF
AAA device implementation, 12
enable over SSH, 396
AAA HWTACACS implementation, 7
Secure Telnet client user line
configuration, 396 AAA HWTACACS scheme, 36
SSH client user line configuration, 396 AAA HWTACACS server PPP user, 75
627
AAA ISP domain accounting method, 52 ARP detection user validity check, 533
AAA ISP domain attribute, 47 ARP detection user+packet validity check, 535
AAA ISP domain authentication method, 49 ARP filtering, 540, 541
AAA ISP domain authorization method, 51 ARP gateway protection, 539, 539
AAA ISP domain creation, 46 ARP packet source MAC consistency check, 529
AAA ISP domain method, 46 ARP scanning, 538
AAA LDAP implementation, 9 ASPF application inspection (FTP), 445
AAA LDAP scheme, 42 ASPF application inspection (H.323), 447
AAA LDAP server SSH user authentication, 65 ASPF application inspection (TCP), 446
AAA LDAP server SSL VPN user ASPF inspection, 440
authentication+authorization, 70 ASPF policy, 442
AAA local SSH user ASPF policy application (interface), 443
authentication+authorization, 62 ASPF policy application (zone pair), 443, 448
AAA local user, 20 attack D&P blacklist configuration, 509
AAA MPLS L3VPN implementation, 14 attack D&P client verification configuration
AAA NAS-ID profile configuration, 57 (DNS), 511
AAA network access user, 20 attack D&P client verification configuration
AAA RADIUS implementation, 2 (HTTP), 512
AAA RADIUS scheme, 25 attack D&P client verification configuration
AAA RADIUS server SSH user (TCP), 510
authentication+authorization, 58 attack D&P configuration (interface-based), 506
AAA scheme, 19 attack D&P log aggregation, 498
applying interface NAS-ID profile, 156 attack D&P policy application (device), 497
APR application group configuration, 453 authorized ARP (DHCP relay agent), 531
APR application statistics enable, 453 authorized ARP (DHCP server), 530
APR configuration, 455 authorized ARP configuration, 529
APR PBAR configuration, 452 connection limit configuration
ARP active acknowledgement, 529 (interface-based), 463
ARP attack detection (source connection limit policy application, 465
MAC-based), 527, 528 connection limit policy configuration, 464
ARP attack protection (unresolvable IP connection limit policy creation, 464
attack), 525, 526 crypto engine hardware configuration, 555
ARP attack protection blackhole routing DPI engine action parameter profile, 571
(unresolvable IP attack), 525 DPI engine action parameter profile (block
ARP attack protection source suppression source), 571
(unresolvable IP attack), 525 DPI engine action parameter profile
ARP detection configuration, 532 (capture), 571
ARP detection packet validity check, 534 DPI engine action parameter profile (email), 572
ARP detection restricted forwarding, 534, 536
628
DPI engine action parameter profile IPsec ACL de-encapsulated packet check, 304
(logging), 572 IPsec ACL-based implementation, 289, 292
DPI engine action parameter profile IPsec anti-replay, 305
(redirect), 572 IPsec anti-replay redundancy, 305
DPI engine application profile, 570 IPsec application-based implementation, 290
DPI engine inspection mechanism, 567 IPsec crypto engine, 289
DPI engine inspection rules, 567 IPsec IKE configuration (aggressive mode+NAT
DPI engine inspection suspension upon traversal), 353
excessive CPU usage disable, 574 IPsec IKE configuration (aggressive mode+RSA
DPI engine optimization, 573 signature authentication), 346
DPI engine service activation, 570 IPsec IKE configuration (main mode/pre-shared
FIPS mode entry (automatic reboot), 562 key authentication), 342
FIPS mode entry (manual reboot), 563 IPsec IKE SNMP notification, 341
FIPS mode exit (automatic reboot), 565 IPsec IKEv2 address pool, 371
FIPS mode exit (manual reboot), 565 IPsec IKEv2 configuration (NAT traversal), 384
fixed ARP configuration, 538 IPsec IKEv2 configuration (pre-shared key
IP source guard (IPSG) dynamic binding, 515 authentication), 372
IP source guard (IPSG) static binding, 514 IPsec IKEv2 configuration (RSA signature
IPS DPI application profile use in object policy authentication), 376
rule, 581 IPsec implementation, 289
IPS DPI service activation, 584 IPsec IPv6 routing protocol profile (manual), 309
IPS mechanism, 577 IPsec IPv6 routing protocols, 309
IPS object policy application to zone IPsec packet DF bit, 307
pairs, 581 IPsec packet logging enable, 307
IPS policy application (DPI profile), 580 IPsec policy (IKE-based), 299
IPS policy configuration, 579 IPsec policy (IKE-based/direct), 300
IPS policy configuration (default), 585 IPsec policy (IKE-based/template), 301
IPS policy configuration (user-defined), 586 IPsec policy (manual), 297
IPS signature action parameter profile, 580 IPsec policy application to interface, 303
IPS signature actions, 576 IPsec profile (IKE-based), 311
IPS signature library management, 578, 582 IPsec profile application to tunnel interface
IPS signature library rollback, 584 (IKE-based), 312
IPS signature library update configuration IPsec QoS pre-classify enable, 307
(automatic), 590 IPsec RIPng configuration, 324
IPS signature library update configuration IPsec RRI, 290
(manual), 588 IPsec RRI configuration, 308, 327
IPS signatures, 576 IPsec SNMP notification, 312
IPS user-defined signature import, 580 IPsec source interface policy bind, 306
IPsec ACL, 292 IPsec transform set, 295
629
IPsec tunnel configuration, 311 NETCONF-over-SSH client user line, 396
IPsec tunnel establishment, 291 NETCONF-over-SSH configuration, 429
IPsec tunnel for IPv4 packets (IKE-based), 317 NETCONF-over-SSH enable, 396
IPsec tunnel for IPv4 packets (manual), 314 password control parameters (global), 229
IPsec tunnel for IPv6 packets (IKE-based), 320 password control parameters (local user), 231
IPv4 source guard (IPv4SG) configuration, 516 password control parameters (super), 231
IPv4 source guard (IPv4SG) dynamic binding password control parameters (user group), 230
configuration, 520 peer public key entry, 240
IPv4 source guard (IPv4SG) dynamic periodic MAC reauthentication, 121
binding+DHCP relay configuration, 521 PKI applications, 247
IPv4 source guard (IPv4SG) enable on PKI architecture, 246
interface, 516
PKI CA policy, 246
IPv4 source guard (IPv4SG) static binding
PKI CA storage path, 256
configuration, 517, 519
PKI certificate import/export, 275
IPv6 source guard (IPv6SG) configuration, 517
PKI certificate request, 251
IPv6 source guard (IPv6SG) dynamic
PKI certificate-based access control policy, 274
binding+DHCPv6 snooping
PKI CRL, 245
configuration, 522
PKI digital certificate, 245
IPv6 source guard (IPv6SG) enable on
interface, 517 PKI domain configuration, 249
IPv6 source guard (IPv6SG) static binding PKI entity configuration, 248
configuration, 517, 522 PKI MPLS L3VPN support, 247
IPv6 uRPF application, 552 PKI OpenCA server certificate request, 265
IPv6 uRPF check modes, 549 PKI operation, 246
IPv6 uRPF configuration, 552 PKI RSA Keon CA server certificate request, 259
IPv6 uRPF operation, 550 PKI RSA Keon CA server certificate request
MAC authentication (local), 127 (NAT-PT network), 268
630
port security NAS-ID profile, 212 SSH Secure Telnet server password
port security NTK, 208 authentication, 409
port security secure MAC address, 209 SSH Secure Telnet server publickey
port security secure MAC address port authentication, 411
limit, 206 SSH server configuration, 393
public key import from file, 242 SSH SFTP client device, 403
Secure Telnet client user line, 396 SSH SFTP client publickey authentication, 424
security portal authentication AAA server, 135 SSH SFTP configuration, 422
security portal authentication client, 135 SSH SFTP directories, 405
security portal authentication domain, 146 SSH SFTP files, 405
security portal authentication system SSH SFTP packet source IP address, 403
components, 134 SSH SFTP server connection establishment, 404
security portal preauthentication domain, 147 SSH SFTP server connection termination, 406
session management aging time (application SSH SFTP server enable, 395
layer protocol), 458 SSH SFTP server password authentication, 422
session management aging time (protocol SSH user configuration, 397
state), 457 SSL client policy configuration, 435
session management functions, 456 SSL protocol stack, 432
session management logging, 459 SSL server policy configuration, 434, 436
session management persistent session, 459 uRPF application, 546
session management statistics collection, 459 uRPF check modes, 542
SSH client host public key configuration, 396 uRPF configuration, 546
SSH management parameters, 399 uRPF operation, 543
SSH SCP client device, 406 network management
SSH SCP configuration, 428 802.1X authentication configuration, 106
SSH SCP server connection 802.1X configuration, 88, 95
establishment, 407
802.1X guest VLAN assignment
SSH SCP server enable, 395 configuration, 108
SSH Secure Telnet client device, 400 802.1X overview, 79
SSH Secure Telnet client password AAA configuration, 1, 18, 58
authentication, 417
AAA HWTACACS/RADIUS differences, 7
SSH Secure Telnet client publickey
APR configuration, 451
authentication, 420
ARP attack protection configuration, 524
SSH Secure Telnet configuration, 408
ASPF configuration, 439, 442, 445
SSH Secure Telnet packet source IP
attack D&P configuration, 481, 489, 506
address, 400
connection limit configuration, 463, 466
SSH Secure Telnet server connection
crypto engine configuration, 555
establishment, 401
DPI engine configuration, 567, 569
SSH Secure Telnet server enable, 395
FIPS configuration, 557, 562
631
IP source guard (IPSG) IPsec IKE SA max, 341
configuration, 514, 516, 519 object policy rule numbering, 473
IPS configuration, 576, 579, 585
O
IPsec configuration, 286, 314
object group
IPsec IKE configuration, 331, 333, 342
configuration, 470
IPsec IKEv2 configuration, 362, 363, 372
display, 472
IPv6 uRPF configuration, 549, 553
IPv4 address object group, 470
MAC authentication, 123, 127
IPv4 address object group configuration, 470
MAC authentication configuration, 120
IPv6 address object group, 470
object group configuration, 470
IPv6 address object group configuration, 471
object policy configuration, 473, 478
port object group, 470
password control configuration, 225, 228, 232
port object group configuration, 471
PKI configuration, 245, 248, 259
service object group, 470
port security configuration, 202, 205, 213
service object group configuration, 471
public key management, 236, 240
object policy
security portal authentication, 139
configuration, 473, 478
security portal authentication
creation, 474
configuration, 134, 134
display, 477
session management, 456
IPv4 rule configuration, 475
session management configuration, 457
IPv4 zone pair application, 476
SSH configuration, 391
IPv6 rule configuration, 475
SSL configuration, 432, 433
IPv6 zone pair application, 476
SSL services, 432
rule, 473
uRPF configuration, 542, 547
rule configuration, 475
user profile configuration, 223
rule description, 474
no
rule match order, 474
AAA no accounting method, 13
rule match order change, 477
AAA no authentication, 13
rule matching acceleration, 477
AAA no authorization, 13
rule numbering, 473
notifying
zone pair application, 476
AAA RADIUS SNMP notification, 35
obtaining
IPsec IKE SNMP notification, 341
PKI certificate, 253
IPsec SNMP notification, 312
offline
NTK
MAC authentication offline detect, 124
ntkonly mode, 208
PKI offline mode, 251
ntk-withbroadcasts mode, 208
port security authorization-fail-offline
ntk-withmulticasts mode, 208
feature, 212
port security feature, 202
online
numbering
632
802.1X online user handshake, 99 attack D&P TCP fragment attack prevention, 498
802.1X periodic online user DPI engine configuration, 567, 569
reauthentication, 101 DPI engine inspection rules, 567
MAC authentication keep-online, 126 IPsec ACL de-encapsulated packet check, 304
PKI online mode, 251 IPsec anti-replay, 305
security portal authentication user online IPsec crypto engine, 289
detection, 149 IPsec implementation, 289
OpenCA IPsec packet DF bit, 307
PKI CA server certificate request, 265 IPsec packet logging enable, 307
optimizing IPsec QoS pre-classify enable, 307
DPI engine, 573 IPv6 uRPF configuration, 549, 552, 553
option object group configuration, 470
DPI engine configuration, 567, 569 security portal authentication BAS-IP for
P unsolicited portal packets, 153
uRPF configuration, 542, 546, 547
packet
packet filtering
802.1X EAP format, 80
ASPF application inspection (FTP), 445
802.1X EAPOL format, 81
ASPF application inspection (H.323), 447
802.1X format, 80
ASPF application inspection (TCP), 446
AAA HWTACACS outgoing packet source IP
address, 39 ASPF configuration, 439, 442, 445
attack D&P blacklist, 484, 500 password control parameters (local user), 231
633
password control parameters (super), 231 pattern
password control parameters (user DPI engine configuration, 569
group), 230 PBAR
password APR configuration, 455
SSH password authentication, 392 APR configuration (port-based), 451
SSH password-publickey authentication, 392 configuration, 452
SSH Secure Telnet client password peer
authentication, 417 IPsec implementation, 289
SSH Secure Telnet server password IPsec SA, 288
authentication, 409
IPsec source interface policy bind, 306
SSH SFTP server password
peer public key entry, 239
authentication, 422
peer public key import from file, 239
password control
PKI digital certificate, 245
configuration, 225, 228, 232
public key peer configuration, 239
display, 232
per-destination connection limit rule, 464
enable, 228
Perfect Forward Secrecy. See PFS
event logging, 227
periodic MAC reauthentication, 121
expired password login, 226
per-service connection limit rule, 464
FIPS compliance, 228
persistent session, 459
maintain, 232
per-source connection limit rule, 464
max user account idle time, 227
PFS (IKE), 333
parameters (global), 229
PKI
parameters (local user), 231
applications, 247
parameters (super), 231
architecture, 246
parameters (user group), 230
CA digital certificate, 245
password complexity checking, 225
CA policy, 246
password composition checking, 225
CA storage path, 256
password expiration, 226, 226
certificate export, 256
password history, 226
certificate import/export, 275
password minimum length, 225
certificate obtain, 253
password not displayed, 227
certificate removal, 257
password setting, 225
certificate request, 251
password updating, 226, 226
certificate request (automatic), 252
user first login, 227
certificate request (manual), 252
user login attempt limit, 227
certificate request abort, 253
user login control, 227
certificate verification, 254
path
certificate verification (CRL checking), 254
troubleshooting PKI storage path set
certificate verification (w/o CRL checking), 255
failure, 285
certificate-based access control policy, 257, 274
634
configuration, 245, 248, 259 ASPF policy application (zone pair), 443, 448
CRL, 245 attack D&P defense policy, 489
display, 258 attack D&P defense policy (flood), 491
domain configuration, 249 attack D&P defense policy (scanning), 491
entity configuration, 248 attack D&P defense policy (single-packet), 489
FIPS compliance, 248 connection limit policy application, 465
local digital certificate, 245 connection limit policy configuration, 464
MPLS L3VPN support, 247 connection limit policy creation, 464
OpenCA server certificate request, 265 IPS configuration (default), 585
operation, 246 IPS DPI application profile use in object policy
peer digital certificate, 245 rule, 581
public key management, 236, 240 IPS object policy application to zone pairs, 581
RA digital certificate, 245 IPS policy application (DPI profile), 580
RSA Keon CA server certificate request, 259 IPS policy configuration, 579
RSA Keon CA server certificate request IPS policy configuration (user-defined), 586
(NAT-PT network), 268 IPsec (manual), 297
terminology, 245 IPsec application to interface, 303
troubleshoot CA certificate import failure, 283 IPsec IKEv2 configuration, 367
troubleshoot CA certificate obtain failure, 281 IPsec policy (IKE-based), 299
troubleshoot certificate export failure, 284 IPsec policy (IKE-based/direct), 300
troubleshoot configuration, 281 IPsec policy (IKE-based/template), 301
troubleshoot CRL obtain failure, 283 IPsec QoS pre-classify enable, 307
troubleshoot local certificate import IPsec source interface policy bind, 306
failure, 284 IPsec transform set, 295
troubleshoot local certificate obtain MAC authentication user account policies, 120
failure, 281 object group configuration, 470
troubleshoot local certificate request password control configuration, 225, 228, 232
failure, 282
PKI CA policy, 246
troubleshoot storage path set failure, 285
PKI certificate-based access control policy, 257
Windows 2003 CA server certificate request
security portal authentication extended
configuration, 261
functions, 134
Windows 2003 CA server IKE
security portal authentication policy server, 135
negotiation+RSA digital signature, 271
SSL client policy configuration, 435
policy
SSL server policy configuration, 434, 436
AAA ITA policy configuration, 56
port
AAA RADIUS security policy server IP
802.1X Auth-Fail VLAN, 102
address, 33
802.1X critical VLAN, 103
ASPF, 442
802.1X guest VLAN, 102
ASPF policy application (interface), 443
applying interface NAS-ID profile, 156
635
APR configuration, 451, 455 802.1X+ACL assignment configuration, 111
APR PBAR configuration, 452 authentication modes, 202
APR PBAR mapping, 451 authorization-fail-offline, 212
MAC authentication, 123, 127 client macAddressElseUserLoginSecure, 218
MAC authentication (local), 127 client userLoginWithOUI, 215
MAC authentication (RADIUS-based), 129 configuration, 202, 205, 213
MAC authentication concurrent port users display, 213
max, 125 enable, 205
MAC authentication configuration, 120 feature configuration, 208
MAC authentication delay, 125 features, 202
MAC authentication multi-VLAN mode, 126 intrusion protection, 208
object group, 470 intrusion protection feature, 202
object group configuration, 471 MAC address autoLearn, 213
security. See port security MAC address learning control, 203
security portal authentication, 139 MAC authentication, 204
security portal authentication MAC move enable, 211
configuration, 134, 157 MAC+802.1X authentication, 204
port security mode set, 206
802.1X access control method, 97 NAS-ID profile application, 212
802.1X authentication, 204 NTK configuration, 208
802.1X authentication configuration, 106 NTK feature, 202
802.1X authorization state, 96 secure MAC address, 209
802.1X authorization status, 79 secure MAC address port limit, 206
802.1X authorization VLAN assignment server authorization information, 211
configuration, 108
troubleshoot, 222
802.1X basic configuration, 106
troubleshoot mode cannot be set, 222
802.1X configuration, 88, 95
troubleshoot secure MAC addresses, 222
802.1X controlled/uncontrolled port, 79
portal
802.1X EAD assistant configuration (DHCP
command and hardware compatibility, 139
relay agent), 112
user profile configuration, 223
802.1X EAD assistant configuration (DHCP
portal authentication
server), 115
AAA server, 135
802.1X guest VLAN assignment
access device, 135
configuration, 108
authentication destination subnet, 145
802.1X mandatory port authentication
domain, 100 authentication modes, 136
636
client, 135 troubleshooting, 199
configuration, 134, 139, 157 troubleshooting cannot log out users (access
configuration restrictions, 142 device), 199
configuring preauthentication IP address troubleshooting cannot log out users (RADIUS
pool, 148 server), 200
cross-subnet authentication, 170 troubleshooting no page pushed for users, 199
cross-subnet for MPLS L3VPN, 192 troubleshooting users logged out still exist on
detection features, 149 server, 200
637
applying IPsec profile to tunnel interface configuring AAA ISP domain accounting
(IKE-based), 312 method, 52
applying IPv4 object policy to zone pair, 476 configuring AAA ISP domain attribute, 47
applying IPv6 object policy to zone pair, 476 configuring AAA ISP domain authentication
applying port security NAS-ID profile, 212 method, 49
authenticating with 802.1X EAP relay, 84 configuring AAA ISP domain authorization
authenticating with 802.1X EAP method, 51
termination, 86 configuring AAA ISP domain method, 46
binding IPsec source interface to policy, 306 configuring AAA LDAP administrator
changing AAA RADIUS packet DSCP attributes, 43
priority, 55 configuring AAA LDAP attribute map, 44
changing IPv4 object policy rule match configuring AAA LDAP scheme, 42
order, 477 configuring AAA LDAP server IP address, 42
changing IPv6 object policy rule match configuring AAA LDAP server SSH user
order, 477 authentication, 65
configuring 802.1X, 95 configuring AAA LDAP server SSL VPN user
configuring 802.1X authentication authentication+authorization, 70
trigger, 100 configuring AAA LDAP user attributes, 43
configuring 802.1X Auth-Fail VLAN, 102 configuring AAA local SSH user
configuring 802.1X authorization VLAN authentication+authorization, 62
assignment, 108 configuring AAA local user, 20
configuring 802.1X basics, 106 configuring AAA local user attributes, 21
configuring 802.1X critical VLAN, 103 configuring AAA NAS-ID profile, 57
configuring 802.1X EAD assistant, 104 configuring AAA RADIUS Acct-Session-Id
configuring 802.1X EAD assistant (DHCP relay format, 57
agent), 112 configuring AAA RADIUS DAE server, 55
configuring 802.1X EAD assistant (DHCP configuring AAA RADIUS Login-Service attribute
server), 115 check method, 34
configuring 802.1X guest VLAN, 102 configuring AAA RADIUS scheme, 25
configuring 802.1X guest VLAN configuring AAA RADIUS security policy server IP
assignment, 108 address, 33
configuring 802.1X online user handshake, 99 configuring AAA RADIUS server SSH user
configuring 802.1X SmartOn, 105, 117 authentication+authorization, 58
configuring 802.1X+ACL assignment, 111 configuring AAA RADIUS server status detection
configuring AAA, 18 test profile, 25
configuring AAA HWTACACS server PPP configuring AAA user group attributes, 23
user, 75 configuring and applying AAA ITA policy, 56
configuring AAA HWTACACS server SSH configuring APR, 455
user, 63 configuring APR application groups, 453
638
configuring APR PBAR, 452 configuring attack D&P client verification
configuring ARP active (HTTP), 500, 512
acknowledgement, 529 configuring attack D&P client verification
configuring ARP attack detection (source (TCP), 498, 510
MAC-based), 527, 528 configuring attack D&P defense policy, 489
configuring ARP attack protection configuring attack D&P defense policy (ACK
(unresolvable IP attack), 525, 526 flood), 492
configuring ARP attack protection blackhole configuring attack D&P defense policy (DNS
routing (unresolvable IP attack), 525 flood), 495
configuring ARP attack protection source configuring attack D&P defense policy (FIN
suppression (unresolvable IP attack), 525 flood), 493
configuring ARP detection, 532 configuring attack D&P defense policy
configuring ARP detection packet validity (flood), 491
check, 534 configuring attack D&P defense policy (HTTP
configuring ARP detection restricted flood), 496
forwarding, 534, 536 configuring attack D&P defense policy (ICMP
configuring ARP detection user validity flood), 494
check, 533 configuring attack D&P defense policy (ICMPv6
configuring ARP detection user+packet flood), 494
validity check, 535 configuring attack D&P defense policy (RST
configuring ARP filtering, 540, 541 flood), 493
configuring ARP gateway protection, 539, 539 configuring attack D&P defense policy
configuring ARP packet source MAC (scanning), 491
consistency check, 529 configuring attack D&P defense policy
configuring ARP scanning, 538 (single-packet), 489
639
configuring authorized ARP configuration configuring IPS signature library update
(DHCP relay agent), 531 (triggered), 583
configuring authorized ARP configuration configuring IPS signature library update
(DHCP server), 530 configuration (automatic), 590
configuring connection limit, 466 configuring IPS signature library update
configuring connection limit configuration (manual), 588
(interface-based), 463 configuring IPsec ACL, 292
configuring connection limit policy, 464 configuring IPsec ACL anti-replay, 305
configuring crypto engine (hardware), 555 configuring IPsec anti-replay redundancy, 305
configuring DPI engine, 569 configuring IPsec for IPv6 routing protocols, 309
configuring DPI engine action parameter configuring IPsec IKE, 333
profile (block source), 571 configuring IPsec IKE (aggressive mode+NAT
configuring DPI engine action parameter traversal), 353
profile (capture), 571 configuring IPsec IKE (aggressive mode+RSA
configuring DPI engine action parameter signature authentication), 346
profile (email), 572 configuring IPsec IKE (main mode/pre-shared key
configuring DPI engine action parameter authentication), 342
profile (logging), 572 configuring IPsec IKE DPD, 339
configuring DPI engine action parameter configuring IPsec IKE global identity
profile (redirect), 572 information, 338
configuring DPI engine application configuring IPsec IKE keepalive function, 339
profile, 570 configuring IPsec IKE keychain, 337
configuring FIPS mode, 558 configuring IPsec IKE NAT keepalive function, 339
configuring FIPS mode entry (automatic configuring IPsec IKE profile, 334
reboot), 562
configuring IPsec IKE proposal, 336
configuring FIPS mode entry (manual
configuring IPsec IKE SA max, 341
reboot), 563
configuring IPsec IKE SNMP notification, 341
configuring FIPS mode exit (automatic
configuring IPsec IKEv2, 363
reboot), 565
configuring IPsec IKEv2 (NAT traversal), 384
configuring FIPS mode exit (manual
configuring IPsec IKEv2 (pre-shared key
reboot), 565
authentication), 372
configuring fixed ARP, 538
configuring IPsec IKEv2 (RSA signature
configuring IP source guard (IPSG), 516
authentication), 376
configuring IPS, 579
configuring IPsec IKEv2 address pool, 371
configuring IPS policy, 579
configuring IPsec IKEv2 DPD, 370
configuring IPS policy (default), 585
configuring IPsec IKEv2 global parameters, 370
configuring IPS policy (user-defined), 586
configuring IPsec IKEv2 keychain, 369
configuring IPS signature library update
configuring IPsec IKEv2 NAT keepalive, 371
(manual), 583
configuring IPsec IKEv2 policy, 367
configuring IPsec IKEv2 profile, 364
640
configuring IPsec IKEv2 proposal, 368 configuring MAC authentication (local), 127
configuring IPsec IPv6 routing protocol profile configuring MAC authentication
(manual), 309 (RADIUS-based), 129
configuring IPsec packet DF bit, 307 configuring MAC authentication ACL
configuring IPsec policy (IKE-based), 299 assignment, 131
configuring IPsec policy configuring MAC authentication delay, 125
(IKE-based/direct), 300 configuring MAC authentication keep-online, 126
configuring IPsec policy configuring MAC authentication multi-VLAN
(IKE-based/template), 301 mode, 126
configuring IPsec policy (manual), 297 configuring MAC authentication timer, 124
configuring IPsec profile (IKE-based), 311 configuring MAC authentication user account
configuring IPsec RIPng, 324 format, 124
configuring IPsec RRI, 308, 327 configuring NETCONF-over-SSH client user
configuring IPsec SNMP notification, 312 line, 396
configuring IPv6 source guard (IPv6SG) configuring PKI Windows 2003 CA server IKE
dynamic binding+DHCPv6 snooping, 522 negotiation+RSA digital signature, 271
configuring IPv6 source guard (IPv6SG) static configuring port object group, 471
binding, 517, 522 configuring port security, 205
configuring IPv6 uRPF, 552, 553 configuring port security client
configuring MAC authentication, 123 macAddressElseUserLoginSecure, 218
641
configuring port security client configuring security portal authentication
userLoginWithOUI, 215 re-DHCP with preauthentication domain, 196
configuring port security features, 208 configuring security portal authentication
configuring port security intrusion server, 140
protection, 208 configuring security portal authentication server
configuring port security MAC address BAS-IP, 153
autoLearn, 213 configuring security portal authentication server
configuring port security NTK, 208 detection, 150
configuring port security secure MAC configuring security portal authentication server
addresses, 209 detection+user synchronization, 184
configuring preauthentication IP address pool configuring security portal authentication source
for portal user, 148 subnet, 144
configuring public peer key, 239 configuring security portal authentication user
configuring Secure Telnet client user line, 396 online detection, 149
configuring security password control, 232 configuring security portal authentication user
synchronization, 152
configuring security portal
authentication, 139, 157 configuring security portal authentication Web
server, 141
configuring security portal authentication
(cross-subnet for MPLS L3VPN), 192 configuring security portal authentication Web
server detection, 151
configuring security portal authentication
cross-subnet, 170 configuring service object group, 471
642
configuring SSH SFTP server password displaying connection limit, 465
authentication, 422 displaying crypto engine, 556
configuring SSH user, 397 displaying DPI engine, 574
configuring SSL, 433 displaying FIPS, 562
configuring SSL client policy, 435 displaying host public key, 238
configuring SSL server policy, 434, 436 displaying IP source guard (IPSG), 518
configuring uRPF, 546, 547 displaying IPS, 584
configuring user profile, 223, 224 displaying IPsec, 313
configuring Web redirect, 155 displaying IPsec IKE, 342
controlling security portal authentication user displaying IPsec IKEv2, 371
access, 143 displaying IPv4 source guard (IPv4SG), 518
creating AAA HWTACACS scheme, 36 displaying IPv6 source guard (IPv6SG), 518
creating AAA ISP domain, 46 displaying IPv6 uRPF, 553
creating AAA LDAP scheme, 45 displaying MAC authentication, 127
creating AAA LDAP server, 42 displaying object group, 472
creating AAA RADIUS scheme, 26 displaying object policy, 477
creating attack D&P defense policy, 489 displaying port security, 213
creating connection limit policy, 464 displaying public key, 240
creating IPv4 object policy, 474 displaying security password control, 232
creating IPv6 object policy, 474 displaying security PKI, 258
creating local key pair, 236 displaying security portal authentication, 156
destroying local key pair, 238 displaying security SSL, 436
disabling attack D&P log aggregation, 498 displaying session management, 460
disabling DPI engine inspection suspension displaying SSH, 408
upon excessive CPU usage, 574
displaying SSH SFTP help information, 406
displaying 802.1X, 106
displaying uRPF, 547
displaying AAA, 58
displaying user profile, 224
displaying AAA HWTACACS, 41
distributing local host public key, 237
displaying AAA LDAP, 46
enabling 802.1X, 95
displaying AAA local users/user groups, 24
enabling 802.1X EAP relay, 96
displaying AAA RADIUS, 35
enabling 802.1X EAP termination, 96
displaying APR, 454
enabling 802.1X periodic online user
displaying ARP attack detection (source reauthentication, 101
MAC-based), 527
enabling AAA RADIUS accounting-on, 32
displaying ARP attack protection
enabling AAA RADIUS accounting-on
(unresolvable IP attack), 525
(extended), 33
displaying ARP detection, 535
enabling AAA RADIUS session-control, 54
displaying ASPF, 444
enabling AAA RADIUS SNMP notification, 35
displaying attack D&P, 501
enabling APR application statistics, 453
643
enabling IPsec ACL de-encapsulated packet exiting FIPS mode, 560
check, 304 exiting FIPS mode (automatic reboot), 560
enabling IPsec IKE invalid SPI recovery, 340 exiting FIPS mode (manual reboot), 560
enabling IPsec IKEv2 cookie challenging, 370 exporting host public key, 238
enabling IPsec packet logging, 307 exporting PKI certificate, 256
enabling IPsec QoS pre-classify, 307 generating SCP client local DSA key pair, 406
enabling IPv4 object policy rule matching generating SCP client local RSA key pair, 406
acceleration, 477 generating SFTP client local DSA key pair, 403
enabling IPv4 source guard (IPv4SG) on generating SFTP client local RSA key pair, 403
interface, 516
generating SSH server local DSA key pair, 394
enabling IPv6 object policy rule matching
generating SSH server local RSA key pair, 394
acceleration, 477
generating Stelnet client local DSA key pair, 400
enabling IPv6 source guard (IPv6SG) on
generating Stelnet client local RSA key pair, 400
interface, 517
ignoring port security server authorization
enabling MAC authentication, 123
information, 211
enabling NETCONF-over-SSH, 396
implementing security ACL-based IPsec, 292
enabling outgoing packets filtering on portal
importing IPS user-defined signature, 580
interface, 149
importing peer public key from file, 239
enabling password control, 228
importing public key from file, 242
enabling port security, 205
interpreting AAA RADIUS class attribute as CAR
enabling port security
parameter, 33
authorization-fail-offline, 212
limiting port security secure MAC addresses, 206
enabling port security MAC move, 211
logging out security portal authentication
enabling portal authorization strict-checking
users, 155
mode, 148
maintaining 802.1X, 106
enabling security portal authentication, 141
maintaining AAA HWTACACS, 41
enabling security portal authentication
maintaining AAA RADIUS, 35
roaming, 154
maintaining APR, 454
enabling session management statistics
collection, 459 maintaining ARP detection, 535
enabling SSH Secure Telnet server, 395 maintaining attack D&P, 501
entering FIPS mode (automatic reboot), 558 maintaining crypto engine, 556
entering FIPS mode (manual reboot), 558 maintaining DPI engine, 574
entering peer public key, 239, 240 maintaining IP source guard (IPSG), 518
644
maintaining IPv6 source guard (IPv6SG), 518 setting password control parameters
maintaining MAC authentication, 127 (global), 229
maintaining security password control, 232 setting password control parameters (local
maintaining security portal user), 231
authentication, 156 setting password control parameters (super), 231
maintaining session management, 460 setting password control parameters (user
managing IPS signature library, 582 group), 230
645
specifying an attribute version for AAA troubleshooting IPsec SA negotiation failure
HUAWEI RADIUS attributes 26-1 and 26-4 (invalid identity info), 359
interpretation, 35 troubleshooting IPsec SA negotiation failure (no
specifying IPS signature action parameter transform set match), 358, 389
profile, 580 troubleshooting IPsec SA negotiation failure
specifying IPS signature auto update (tunnel failure), 390
URL, 583 troubleshooting PKI CA certificate import
specifying MAC authentication domain, 123 failure, 283
specifying NAS-Port-ID attribute format, 154 troubleshooting PKI CA certificate obtain
specifying PKI CA storage path, 256 failure, 281
specifying security portal authentication troubleshooting PKI certificate export failure, 284
domain, 146 troubleshooting PKI CRL obtain failure, 283
specifying security portal preauthentication troubleshooting PKI local certificate import
domain, 147 failure, 284
specifying session management persistent troubleshooting PKI local certificate obtain
session, 459 failure, 281
specifying SSH Secure Telnet packet source IP troubleshooting PKI local certificate request
address, 400 failure, 282
specifying SSH SFTP packet source IP troubleshooting PKI storage path set failure, 285
address, 403 troubleshooting port security mode cannot be
terminating SSH SFTP server connection, 406 set, 222
triggering FIPS self-test, 562 troubleshooting port security secure MAC
troubleshooting 802.1X, 119 addresses, 222
troubleshooting AAA LDAP user troubleshooting security 802.1X EAD assistant
authentication fails, 78 Web browser users not correctly redirected, 119
troubleshooting AAA RADIUS accounting troubleshooting security portal authentication
error, 77 cannot log out users (access device), 199
troubleshooting AAA RADIUS authentication troubleshooting security portal authentication
failure, 76 cannot log out users (RADIUS server), 200
troubleshooting AAA RADIUS packet delivery troubleshooting security portal authentication no
failure, 77 page pushed for users, 199
troubleshooting connection limit overlapping troubleshooting security portal authentication
ACL segments, 468 users cannot log in (re-DHCP), 200
troubleshooting IPsec IKE negotiation failure troubleshooting security portal authentication
(no proposal match), 357 users logged out still exist on server, 200
troubleshooting IPsec IKE negotiation failure using IPS DPI application profile in IPv4 object
(no proposal or keychain specified policy rule, 581
correctly), 358 using IPS DPI application profile in IPv6 object
troubleshooting IPsec IKEv2 negotiation policy rule, 581
failure (no proposal match), 389 verifying PKI certificate, 254
646
verifying PKI certificate verification (CRL ARP attack protection configuration, 524
checking), 254 ARP gateway protection, 539
verifying PKI certificate verification (w/o CRL protocols and standards
checking), 255 802.1X overview, 79
working with SSH SFTP directories, 405 802.1X related protocols, 80
working with SSH SFTP files, 405 AAA, 14
process AAA HWTACACS, 7, 14
AAA LDAP authentication process, 10 AAA LDAP, 9, 14
AAA LDAP authorization process, 11 AAA RADIUS, 2, 14
profile ASPF inspection, 440
AAA NAS-ID profile configuration, 57 IPsec, 291
AAA RADIUS server status detection test IPsec IKE, 333
profile, 25
IPsec IKEv2, 363
DPI engine action parameter profile, 571
IPsec IPv6 routing protocols configuration, 309
DPI engine action parameter profile (block
IPsec security protocol 50 (ESP), 286
source), 571
IPsec security protocol 51 (AH), 286
DPI engine action parameter profile
SSL configuration, 432, 433
(capture), 571
SSL protocol stack, 432
DPI engine action parameter profile
public key
(email), 572
display, 240
DPI engine action parameter profile
(logging), 572 file import, 242
647
SSH user configuration, 397 Hewlett Packard Enterprise proprietary
Public Key Infrastructure. Use PKI attributes, 16
HUAWEI attributes 26-1 and 26-4 interpretation
Q
(version 1.0), 35
QoS
HUAWEI attributes 26-1 and 26-4 interpretation
APR configuration, 451 (version 1.1), 35
IPsec QoS pre-classify enable, 307 HWTACACS/RADIUS differences, 7
quiet information exchange security, 2
802.1X timer, 101 Login-Service attribute check method, 34
MAC authentication quiet timer, 124 MAC authentication, 120
R MAC authentication (RADIUS-based), 129
RA maintain, 35
648
troubleshooting packet delivery failure, 77 PKI certificate, 257
troubleshooting security portal request
authentication cannot log out users (RADIUS PKI certificate request abort, 253
server), 200 requesting
user authentication methods, 2 PKI certificate request, 251
username format, 28 resource access restriction (portal authentication), 134
real-time restrictions
AAA HWTACACS real-time accounting ARP detection restricted forwarding, 534, 536
timer, 40
ARP scanning configuration, 538
AAA RADIUS real-time accounting timer, 31
FIPS configuration, 557
rebooting
fixed ARP configuration, 538
FIPS mode (automatic reboot), 565
IPsec policy configuration (IKE-based), 299
FIPS mode (manual reboot), 565
IPsec policy configuration restrictions, 297
FIPS mode entry (manual reboot), 563
Secure Telnet client local key pair generation, 400
record protocol (SSL), 432
security portal authentication, 142
recoverinng
SSH SCP client local key pair generation, 406
IPsec IKE invalid SPI recovery, 340
SSH server local key pair generation, 394
re-DHCP portal authentication mode, 136, 138
SSH SFTP client local key pair generation, 403
redirect
SSH user configuration, 398
DPI engine action parameter profile
user profile configuration, 224
(redirect), 572
retransmission
redundancy
IPsec IKEv2, 363
IPsec anti-replay redundancy, 305
reverse route injection. Use RRI
referencing
Revest-Shamir-Adleman Algorithm. Use RSA
security portal authentication Web server, 142
RIPng
registration authority. Use RA
IPsec RIPng configuration, 324
relay agent
roaming
802.1X EAD assistant configuration (DHCP
security portal authentication roaming, 154
relay agent), 112
rolling back
authorized ARP (DHCP relay agent), 531
IPS signature library, 579, 584
remote
route
802.1X authorization VLAN, 88
IPsec RRI, 290
AAA remote accounting method, 13
IPsec RRI configuration, 308
AAA remote authentication, 13
router
AAA remote authentication configuration, 18
APR configuration, 455
AAA remote authorization method, 13
portal authentication direct, 157
Remote Authentication Dial-In User Service.
portal authentication re-DHCP, 167
Use RADIUS
security portal authentication, 157
removing
routing
649
802.1X authentication configuration, 106 SSH client host public key configuration, 396
802.1X basic configuration, 106 SSH management parameters, 399
802.1X configuration, 88, 95 SSH Secure Telnet server publickey
802.1X EAD assistant configuration (DHCP authentication, 411
relay agent), 112 SSH server RSA host key pair, 394
802.1X EAD assistant configuration (DHCP SSH server RSA server key pair, 394
server), 115 SSH SFTP client publickey authentication, 424
802.1X guest VLAN assignment Stelnet client RSA host key pair, 400
configuration, 108 Stelnet client RSA server key pair, 400
802.1X+ACL assignment configuration, 111 RST flood attack, 493
APR application group configuration, 453 rule
APR PBAR configuration, 452 connection limit per-destination, 464
IPsec IPv6 routing protocol profile connection limit per-service, 464
(manual), 309
connection limit per-source, 464
IPsec IPv6 routing protocols
DPI engine inspection, 567
configuration, 309
IPS DPI application profile use in object policy
SSH configuration, 391
rule, 581
SSH server configuration, 393
IPsec ACL rule keywords, 292
RRI
object policy, 473
configuration, 308
object policy configuration, 473, 478
IPsec RRI configuration, 327
object policy rule configuration, 475
RSA
object policy rule description, 474
IPsec IKE configuration (aggressive
object policy rule match order, 474
mode+RSA signature authentication), 346
object policy rule match order change, 477
IPsec IKE signature authentication, 332
object policy rule matching acceleration, 477
PKI certificate export, 256
object policy rule numbering, 473
PKI Keon CA server certificate request
security portal authentication portal-free
(NAT-PT network), 268
rule, 143
PKI OpenCA server certificate request, 265
S
PKI RSA Keon CA server certificate
request, 259 S/MIME (PKI secure email), 247
PKI Windows 2003 CA server certificate SA
request, 261 IPsec transform set, 295
PKI Windows 2003 CA server IKE security IKE SA max, 341
negotiation+RSA digital signature, 271 troubleshooting IPsec SA negotiation failure
public key management, 236, 240 (invalid identity info), 359
SCP client RSA host key pair, 406 troubleshooting IPsec SA negotiation failure (no
SCP client RSA server key pair, 406 transform set match), 358, 389
SFTP client RSA host key pair, 403 troubleshooting IPsec SA negotiation failure
SFTP client RSA server key pair, 403 (tunnel failure), 390
650
SA rekeying 802.1X access control method, 97
IPsec IKEv2, 363 802.1X authentication, 82, 83
scanning attack 802.1X authentication configuration, 106
attack D&P defense policy, 491 802.1X authentication request attempts max, 98
attack D&P device-preventable 802.1X authentication server timeout timer, 98
attacks, 481, 483 802.1X authentication trigger, 100
scheduling 802.1X Auth-Fail VLAN, 91, 102
IPS signature library update (automatic), 582 802.1X authorization VLAN, 88
scheme 802.1X authorization VLAN assignment
AAA, 19 configuration, 108
AAA HWTACACS, 36 802.1X basic configuration, 106
AAA HWTACACS scheme VPN, 38 802.1X critical VLAN, 91, 103
AAA LDAP, 42 802.1X display, 106
AAA LDAP scheme creation, 45 802.1X EAD assistant, 104
AAA RADIUS, 25 802.1X EAD assistant configuration (DHCP relay
AAA RADIUS scheme VPN, 28 agent), 112
SCP 802.1X EAD assistant configuration (DHCP
client device configuration, 406 server), 115
server publickey authentication, 411 802.1X supported domain name delimiters, 103
SSH packet source IP address, 400 AAA concurrent login user max, 56
651
AAA device implementation, 12 APR application statistics enable, 453
AAA display, 58 APR configuration, 451, 455
AAA HWTACACS implementation, 7 APR display, 454
AAA HWTACACS scheme, 36, 36 APR maintain, 454
AAA HWTACACS server SSH users, 63 ARP active acknowledgement, 529
AAA ISP domain accounting method, 52 ARP attack detection (source
AAA ISP domain attribute, 47 MAC-based), 527, 528
AAA ISP domain authentication method, 49 ARP attack protection (unresolvable IP
AAA ISP domain authorization method, 51 attack), 525, 526
AAA RADIUS packet DSCP priority, 55 ASPF application inspection (FTP), 445
AAA RADIUS security policy server IP ASPF application inspection (TCP), 446
address, 33 ASPF configuration, 439, 442, 445, 445
AAA RADIUS server SSH user ASPF display, 444
authentication+authorization, 58 ASPF maintain, 444
AAA RADIUS server status detection test ASPF policy application (interface), 443
profile, 25 ASPF policy application (zone pair), 443, 448
AAA RADIUS session-control, 54 association. See SA
AAA scheme, 19 attack D&P blacklist, 484
APR application group configuration, 453 attack D&P blacklist configuration, 509
652
attack D&P client verification, 485 crypto engine maintain, 556
attack D&P client verification (DNS), 487 enabling portal authorization strict-checking, 148
attack D&P client verification (HTTP), 488 expired password login, 226
attack D&P client verification (TCP), 485 FIPS configuration, 557, 562
attack D&P client verification configuration FIPS configuration restrictions, 557
(DNS), 511 FIPS display, 562
attack D&P client verification configuration FIPS mode configuration, 558
(HTTP), 512 FIPS mode entry, 558
attack D&P client verification configuration FIPS mode entry (automatic reboot), 562
(TCP), 510
FIPS mode entry (manual reboot), 563
attack D&P command and hardware
FIPS mode exit, 560
compatibility, 481
FIPS mode exit (automatic reboot), 565
attack D&P configuration, 481, 489, 506
FIPS mode exit (manual reboot), 565
attack D&P configuration
FIPS mode system changes, 559
(interface-based), 506
FIPS self-test, 561
attack D&P defense policy, 489
fixed ARP configuration, 538
attack D&P detection exemption, 496
fixed ARP configuration restrictions, 538
attack D&P device-preventable attacks, 481
host public key export, 238
attack D&P display, 501
HWTACACS protocols and standards, 14
attack D&P log aggregation, 498
IP, 286, See also IPsec
attack D&P maintain, 501
IP source guard (IPSG)
attack D&P policy application (device), 497
configuration, 514, 516, 519
attack D&P policy application (interface), 497
IP source guard (IPSG) dynamic binding, 515
authorized ARP (DHCP relay agent), 531
IP source guard (IPSG) static binding, 514
authorized ARP (DHCP server), 530
IPS configuration, 576, 579, 585
authorized ARP configuration, 529
IPS DPI application profile use in object policy
configuring preauthentication IP address pool
rule, 581
for portal user, 148
IPS DPI service activation, 584
connection limit configuration, 463, 466
IPS mechanism, 577
connection limit configuration
IPS object policy application to zone pairs, 581
(interface-based), 463
IPS policy application (DPI profile), 580
connection limit display, 465
IPS policy configuration, 579
connection limit maintain, 465
IPS policy configuration (default), 585
connection limit policy application, 465
IPS policy configuration (user-defined), 586
connection limit policy configuration, 464
IPS signature action parameter profile, 580
connection limit policy creation, 464
IPS signature actions, 576
crypto engine configuration, 555
IPS signature library management, 578, 582
crypto engine display, 556
IPS signature library rollback, 584
crypto engine hardware configuration, 555
653
IPS signature library update configuration IPsec RRI configuration, 308
(automatic), 590 IPsec security strength, 291
IPS signature library update configuration IPsec SNMP notification, 312
(manual), 588 IPsec tunnel configuration, 311
IPS signatures, 576 IPv4 address object group configuration, 470
IPS user-defined signature import, 580 IPv4 source guard (IPv4SG) configuration, 516
IPsec ACL anti-replay, 305 IPv4 source guard (IPv4SG) dynamic binding
IPsec ACL-based implementation, 292 configuration, 520
IPsec configuration, 286, 314 IPv4 source guard (IPv4SG) dynamic
IPsec crypto engine, 289 binding+DHCP relay configuration, 521
IPsec display, 313 IPv4 source guard (IPv4SG) enable on
IPsec encapsulation modes, 286 interface, 516
IPsec IKE configuration, 331, 333, 342 IPv4 source guard (IPv4SG) static binding
IPsec IKE display, 342 configuration, 517, 519
IPsec IKE maintain, 342 IPv6 address object group configuration, 471
IPsec IKE mechanism, 332 IPv6 source guard (IPv6SG) configuration, 517
IPsec IKE profile configuration, 334 IPv6 source guard (IPv6SG) dynamic
binding+DHCPv6 snooping configuration, 522
IPsec IKE protocols and standards, 333
IPv6 source guard (IPv6SG) enable on
IPsec IKEv2 configuration, 362, 363, 372
interface, 517
IPsec IKEv2 display, 371
IPv6 source guard (IPv6SG) static binding
IPsec IKEv2 maintain, 371
configuration, 517, 522
IPsec IKEv2 new features, 363
IPv6 uRPF configuration, 549, 552, 553
IPsec IKEv2 policy configuration, 367
IPv6 uRPF display, 553
IPsec IKEv2 profile configuration, 364
LDAP protocols and standards, 14
IPsec IKEv2 protocols and standards, 363
local host public key distribution, 237
IPsec IPv6 routing protocols, 309
local key pair creation, 236
IPsec maintain, 313
local key pair destruction, 238
IPsec packet DF bit, 307
MAC authentication, 123, 127
IPsec packet logging enable, 307
MAC authentication (local), 127
IPsec policy configuration restrictions, 297
MAC authentication (RADIUS-based), 129
IPsec policy configuration restrictions
MAC authentication ACL assignment, 121, 131
(IKE-based), 299
MAC authentication concurrent port users
IPsec profile (IKE-based), 311
max, 125
IPsec profile application to tunnel interface
MAC authentication configuration, 120
(IKE-based), 312
MAC authentication delay, 125, 125
IPsec protocols, 286
MAC authentication display, 127
IPsec protocols and standards, 291
MAC authentication domain, 123
IPsec QoS pre-classify enable, 307
MAC authentication enable, 123
IPsec RRI, 290
654
MAC authentication keep-online, 126 password user first login, 227
MAC authentication maintain, 127 password user login control, 227
MAC authentication methods, 120 peer public key entry, 239, 240
MAC authentication multi-VLAN mode, 126 peer public key import from file, 239
MAC authentication multi-VLAN mode periodic MAC reauthentication, 121
configuration, 126 PKI applications, 247
MAC authentication timer, 124 PKI architecture, 246
MAC authentication user account format, 124 PKI CA policy, 246
MAC authentication user account PKI CA storage path, 256
policies, 120 PKI certificate export, 256
MAC authentication VLAN assignment, 121 PKI certificate import/export, 275
NETCONF-over-SSH client user line, 396 PKI certificate obtain, 253
NETCONF-over-SSH configuration, 429 PKI certificate removal, 257
NETCONF-over-SSH enable, 396 PKI certificate request, 251, 251
object group configuration, 470 PKI certificate request (automatic), 252, 252
object policy configuration, 473, 478 PKI certificate request (manual), 252
object policy creation, 474 PKI certificate request abort, 253
object policy display, 477 PKI certificate verification, 254
object policy rule, 473 PKI certificate verification (CRL checking), 254
object policy rule configuration, 475 PKI certificate verification (w/o CRL
object policy rule match order change, 477 checking), 255
object policy rule matching acceleration, 477 PKI certificate-based access control
outgoing packets filtering on portal policy, 257, 274
interface, 149 PKI configuration, 245, 248, 259
password control configuration, 225, 228, 232 PKI CRL, 245
password control display, 232 PKI digital certificate, 245
password control enable, 228 PKI display, 258
password control maintain, 232 PKI domain configuration, 249, 249
password control parameters (global), 229 PKI entity configuration, 248, 248
password control parameters (local user), 231 PKI MPLS L3VPN support, 247
password control parameters (super), 231 PKI OpenCA server certificate request, 265
password control parameters (user PKI operation, 246
group), 230 PKI RSA Keon CA server certificate request, 259
password event logging, 227 PKI RSA Keon CA server certificate request
password expiration, 226, 226 (NAT-PT network), 268
password history, 226 PKI terminology, 245
password not displayed, 227 PKI Windows 2003 CA server certificate
password setting, 225 request, 261
password updating, 226, 226
655
PKI Windows 2003 CA server IKE portal authentication user online detection, 149
negotiation+RSA digital signature, 271 portal authentication user synchronization, 152
port. See port security portal authentication Web server detection, 151
port object group configuration, 471 portal preauthentication domain, 147
port security display, 213 public key display, 240
portal authentication, 139 public key import from file, 242
portal authentication (cross-subnet for MPLS public key management, 236, 240
L3VPN), 192 public key peer configuration, 239
portal authentication BAS-IP, 153 RADIUS protocols and standards, 14
portal authentication configuration, 134, 157 SCP client local DSA key pair generation, 406
portal authentication cross-subnet, 170 SCP client local RSA key pair generation, 406
portal authentication detection features, 149 Secure Telnet client user line, 396
portal authentication direct service object group configuration, 471
configuration, 157
session management, 456
portal authentication direct configuration
session management aging time (application
with preauthentication domain, 194
layer protocol), 458
portal authentication domain, 146
session management aging time (protocol
portal authentication extended cross-subnet state), 457
configuration, 180
session management configuration, 457
portal authentication extended direct
session management display, 460
configuration, 173
session management logging, 459
portal authentication extended re-DHCP, 176
session management maintain, 460
portal authentication fail-permit, 153
session management persistent session, 459
portal authentication logout, 155
session management statistics collection
portal authentication max number users, 145
enable, 459
portal authentication policy server, 135
SFTP client local DSA key pair generation, 403
portal authentication re-DHCP, 167
SFTP client local RSA key pair generation, 403
portal authentication re-DHCP with
SSH authentication methods, 392
preauthentication domain, 196
SSH client host public key configuration, 396
portal authentication roaming, 154
SSH configuration, 391
portal authentication security check
SSH display, 408
function, 134
SSH management parameters, 399
portal authentication server, 140
SSH SCP client device, 406
portal authentication server detection, 150
SSH SCP configuration, 428
portal authentication source subnet, 144
SSH SCP server connection establishment, 407
portal authentication subnet, 145
SSH SCP server enable, 395
portal authentication troubleshooting, 199
SSH Secure Telnet client device, 400
portal authentication types, 134
SSH Secure Telnet client password
portal authentication user access, 143
authentication, 417
656
SSH Secure Telnet client publickey troubleshooting AAA HWTACACS, 78
authentication, 420 troubleshooting AAA LDAP user authentication
SSH Secure Telnet configuration, 408 fails, 78
SSH Secure Telnet packet source IP troubleshooting AAA RADIUS, 76
address, 400 troubleshooting AAA RADIUS accounting
SSH Secure Telnet server connection error, 77
establishment, 401 troubleshooting AAA RADIUS authentication
SSH Secure Telnet server enable, 395 failure, 76
SSH Secure Telnet server password troubleshooting AAA RADIUS packet delivery
authentication, 409 failure, 77
SSH Secure Telnet server publickey troubleshooting IPsec IKE, 357
authentication, 411 troubleshooting IPsec IKEv2, 389
SSH server configuration, 393 troubleshooting PKI CA certificate failure, 281
SSH server local DSA key pair generation, 394 troubleshooting PKI CA certificate import
SSH server local RSA key pair generation, 394 failure, 283
SSH SFTP client device, 403 troubleshooting PKI certificate export failure, 284
SSH SFTP client publickey authentication, 424 troubleshooting PKI configuration, 281
SSH SFTP configuration, 422 troubleshooting PKI CRL obtain failure, 283
SSH SFTP directories, 405 troubleshooting PKI local certificate failure, 281
SSH SFTP files, 405 troubleshooting PKI local certificate import
SSH SFTP help information display, 406 failure, 284
SSH SFTP packet source IP address, 403 troubleshooting PKI local certificate request
SSH SFTP server connection failure, 282
establishment, 404 troubleshooting PKI storage path set failure, 285
SSH SFTP server connection termination, 406 uRPF configuration, 542, 546, 547
SSH SFTP server enable, 395 uRPF display, 547
SSH SFTP server password user profile configuration, 223, 224
authentication, 422 user profile configuration restrictions, 224
SSH user configuration, 397 user profile display, 224
SSH user configuration restrictions, 398 security zone
SSL client policy configuration, 435 object policy configuration, 473, 478
SSL configuration, 432, 433 server
SSL display, 436 802.1X authentication configuration, 106
SSL security services, 432 802.1X authentication server timeout timer, 98
SSL server policy configuration, 434, 436 802.1X authorization VLAN assignment
Stelnet client local DSA key pair configuration, 108
generation, 400 802.1X basic configuration, 106
Stelnet client local RSA key pair 802.1X configuration, 88, 95
generation, 400 802.1X EAD assistant configuration (DHCP relay
troubleshooting 802.1X, 119 agent), 112
657
802.1X EAD assistant configuration (DHCP SCP client DSA or RSA key pairs, 406
server), 115 SFTP client DSA or RSA key pairs, 403
802.1X guest VLAN assignment SSH server DSA or RSA key pairs, 394
configuration, 108 Stelnet client DSA or RSA key pairs, 400
802.1X SmartOn feature configuration, 117 session management
802.1X+ACL assignment configuration, 111 aging time (application layer protocol), 458
AAA HWTACACS quiet timer, 40 aging time (protocol state), 457
AAA HWTACACS response timeout timer, 40 configuration, 456, 457
AAA LDAP timeout period, 43 display, 460
AAA RADIUS quiet timer, 31 functions, 456
AAA RADIUS response timeout timer, 31 maintain, 460
MAC authentication server timeout timer, 124 operation, 456
PKI OpenCA server certificate request, 265 persistent session, 459
PKI Windows 2003 CA server certificate session logging, 459
request, 261
session statistics collection enable, 459
port security authorization information, 211
setting
security portal authentication AAA server, 135
802.1X authentication request attempts max, 98
security portal authentication fail-permit, 153
802.1X authentication timeout timers, 98
security portal authentication policy
802.1X port authorization state, 96
server, 135
802.1X port users max, 98
security portal authentication server, 135, 140
802.1X quiet timer, 101
security portal authentication server
AAA concurrent login user max, 56
detection, 150
AAA HWTACACS timer, 40
security portal authentication server
AAA HWTACACS traffic statistics unit, 39
detection+user synchronization, 184
AAA HWTACACS username format, 39
security portal authentication system
components, 134 AAA LDAP server timeout period, 43
security portal authentication Web server AAA RADIUS request transmission attempts
detection, 151 max, 29
658
password control parameters (global), 229 IPS signature library update configuration
password control parameters (local user), 231 (automatic), 590
password control parameters (super), 231 IPS signature library update configuration
password control parameters (user (manual), 588
group), 230 IPS user-defined, 576
port security mode, 206 IPS user-defined signature import, 580
security portal authentication max number signature authentication (IKE), 332
users, 145 single-channel protocol (ASPF), 439, 442
session management aging time (application single-packet attack
layer protocol), 458 attack D&P defense policy, 489
session management aging time (protocol attack D&P device-preventable attacks, 481
state), 457 attack D&P log aggregation disable, 498
SFTP SmartOn
client device configuration, 403 802.1X configuration, 105
client local key pair generation 802.1X feature, 93
restrictions, 403
802.1X feature configuration, 117
client publickey authentication, 424
SNMP
configuration, 422
AAA RADIUS notifications, 35
directories, 405
IPsec IKE SNMP notification, 341
files, 405
IPsec SNMP notification, 312
help information display, 406
software
server connection establishment, 404
crypto engine configuration, 555
server connection termination, 406
source
server enable, 395
ARP attack detection (source
server password authentication, 422 MAC-based), 527, 528
SSH application, 391 ARP detection src-mac validity check, 534
SSH management parameters, 399 DPI engine action parameter profile (block
SSH SFTP packet source IP address, 403 source), 571
shared key security portal authentication portal-free
AAA HWTACACS, 38 rule, 143
AAA RADIUS, 28 security portal authentication subnet, 144
signature specifying
IPS configuration, 576, 579, 585 802.1X access control method, 97
IPS policy configuration, 579 802.1X mandatory port authentication
IPS predefined, 576 domain, 100
IPS signature action parameter profile, 580 802.1X supported domain name delimiters, 103
IPS signature library management, 578, 582 AAA HUAWEI RADIUS attribute version for
IPS signature library rollback, 584 attribute interpretation, 35
AAA HWTACACS accounting server, 37
659
AAA HWTACACS authentication server, 36 AAA RADIUS Login-Service attribute check
AAA HWTACACS authorization server, 37 method, 34
AAA HWTACACS outgoing packet source IP AAA RADIUS server SSH user
address, 39 authentication+authorization, 58
AAA HWTACACS scheme VPN, 38 authentication methods, 392
AAA HWTACACS shared keys, 38 client host public key configuration, 396
AAA LDAP attribute map for authorization, 45 configuration, 391
AAA LDAP authentication server, 45 display, 408
AAA LDAP authorization server, 45 FIPS compliance, 393
AAA LDAP version, 42 how it works, 391
AAA RADIUS accounting server management parameters, 399
parameters, 27 NETCONF-over-SSH client user line, 396
AAA RADIUS authentication server, 26 NETCONF-over-SSH configuration, 429
AAA RADIUS outgoing packet source IP NETCONF-over-SSH enable, 396
address, 30 public key management, 236, 240
AAA RADIUS scheme VPN, 28 SCP, 391
AAA RADIUS shared keys, 28 SCP client device, 406
IPS signature action parameter profile, 580 SCP configuration, 428
IPS signature auto update URL, 583 SCP server connection establishment, 407
MAC authentication domain, 123 SCP server enable, 395
NAS-Port-ID attribute format, 154 Secure Copy. Use SCP
PKI CA storage path, 256 Secure FTP. Use SFTP
security portal authentication domain, 146 Secure Telnet, 391
security portal preauthentication domain, 147 Secure Telnet client device, 400
session management persistent sessions, 459 Secure Telnet client password authentication, 417
SSH Secure Telnet packet source IP Secure Telnet client publickey authentication, 420
address, 400 Secure Telnet client user line, 396
SSH SFTP packet source IP address, 403 Secure Telnet configuration, 408
SPI Secure Telnet packet source IP address, 400
IPsec IKE invalid SPI recovery, 340 Secure Telnet server connection
spoofing establishment, 401
IPv6 uRPF configuration, 549, 552, 553 Secure Telnet server enable, 395
uRPF configuration, 542, 546, 547 Secure Telnet server password
SSH authentication, 409
AAA HWTACACS server SSH user, 63 Secure Telnet server publickey
AAA LDAP server SSH user authentication, 65 authentication, 411
AAA local SSH user server configuration, 393
authentication+authorization, 62 server local key pair generation restrictions, 394
SFTP, 391
660
SFTP client device, 403 APR application statistics enable, 453
SFTP client publickey authentication, 424 connection limit configuration, 463, 466
SFTP configuration, 422 connection limit configuration
SFTP directories, 405 (interface-based), 463
SFTP files, 405 session management statistics collection, 459
SFTP help information display, 406 sticky
SFTP packet source IP address, 403 port security secure MAC address, 209
SFTP server connection establishment, 404 storage
661
attack D&P client verification (DNS), 499 IPsec IKEv2 global parameters, 370
attack D&P client verification (HTTP), 500 IPsec IKEv2 keychain, 369
attack D&P client verification (TCP), 498 IPsec IKEv2 proposal, 368
attack D&P client verification configuration password control configuration, 225, 228, 232
(DNS), 511 SCP client local key pair generation, 406
attack D&P client verification configuration SFTP client local key pair generation, 403
(HTTP), 512 SSH authentication methods, 392
attack D&P client verification configuration SSH configuration, 391
(TCP), 510
SSH server local key pair generation, 394
attack D&P configuration, 481, 489, 506
Stelnet client local key pair generation, 400
attack D&P configuration
T
(interface-based), 506
attack D&P defense policy, 489 TCP
attack D&P detection exemption, 496 AAA HWTACACS implementation, 7
attack D&P log aggregation, 498 ASPF application inspection (TCP), 446
attack D&P policy application (device), 497 attack D&P TCP client verification, 485, 498
attack D&P policy application (interface), 497 attack D&P TCP client verification
attack D&P TCP fragment attack configuration, 510
prevention, 498 attack D&P TCP fragment attack, 484
FIPS configuration, 557, 562 attack D&P TCP fragment attack prevention
FIPS mode configuration, 558 configuration, 498
FIPS mode entry (automatic reboot), 562 SSL configuration, 432, 433
FIPS mode exit (automatic reboot), 565 SSH Secure Telnet client device, 400
FIPS mode exit (manual reboot), 565 SSH Secure Telnet client password
authentication, 417
FIPS mode system changes, 559
SSH Secure Telnet client publickey
IPsec authentication, 288
authentication, 420
IPsec configuration, 286
SSH Secure Telnet configuration, 408
IPsec encryption, 288
SSH Secure Telnet packet source IP address, 400
IPsec IKE configuration, 331, 333, 342
SSH Secure Telnet server connection
IPsec IKE global identity information, 338
establishment, 401
IPsec IKE invalid SPI recovery, 340
SSH Secure Telnet server password
IPsec IKE keychain, 337
configuration, 409
IPsec IKE proposal, 336
SSH Secure Telnet server publickey
IPsec IKE SA max, 341 authentication, 411
IPsec IKE SNMP notification, 341 terminal
IPsec IKEv2 address pool, 371 AAA RADIUS Login-Service attribute check
IPsec IKEv2 configuration, 362, 363, 372 method, 34
IPsec IKEv2 cookie challenging, 370 terminating
662
SSH SFTP server connection, 406 IPsec tunnel for IPv6 packets (IKE-based), 320
testing session management traffic-based session
AAA RADIUS server status detection test logging, 459
profile, 25 transform set (IPsec), 295
FIPS conditional self-test, 561 Transmission Control Protocol. Use TCP
FIPS power-up self-test, 561 transporting
FIPS triggered self-test, 561 IPsec encapsulation transport mode, 287
TFTP trapping
local host public key distribution, 237 AAA RADIUS SNMP notification, 35
time IPsec IKE SNMP notification, 341
IPsec IKE negotiation (time-based IPsec SNMP notification, 312
lifetime), 288 triggering
session management time-based session 802.1X authentication trigger, 100
logging, 459 FIPS self-test, 562
timeout troubleshooting
802.1X authentication timeout, 98 802.1X, 119
MAC authentication server timeout, 124 AAA HWTACACS, 78
timer AAA LDAP user authentication fails, 78
802.1X authentication timeout, 98 AAA RADIUS, 76
802.1X quiet, 101 AAA RADIUS accounting error, 77
AAA HWTACACS real-time accounting, 40 AAA RADIUS authentication failure, 76
AAA HWTACACS server quiet, 40 AAA RADIUS packet delivery failure, 77
AAA HWTACACS server response timeout, 40 connection limit overlapping ACL segments, 468
AAA RADIUS real-time accounting, 31 connection limits, 468
AAA RADIUS server quiet, 31 IPsec IKE, 357
AAA RADIUS server response timeout, 31 IPsec IKE negotiation failure (no proposal
MAC authentication offline detect, 124 match), 357
MAC authentication quiet, 124 IPsec IKE negotiation failure (no proposal or
MAC authentication server timeout, 124 keychain specified correctly), 358
traffic IPsec IKEv2, 389
AAA HWTACACS traffic statistics units, 39 IPsec IKEv2 negotiation failure (no proposal
AAA RADIUS traffic statistics units, 28 match), 389
IPsec configuration, 286, 314 IPsec SA negotiation failure (invalid identity
IPsec IKE negotiation (traffic-based info), 359
lifetime), 288 IPsec SA negotiation failure (no transform set
IPsec RIPng configuration, 324 match), 358, 389
IPsec RRI configuration, 308, 327 IPsec SA negotiation failure (tunnel failure), 390
IPsec tunnel for IPv4 packets (IKE-based), 317 PKI CA certificate import failure, 283
IPsec tunnel for IPv4 packets (manual), 314 PKI CA certificate obtain failure, 281
663
PKI certificate export failure, 284 AAA RADIUS request transmission attempts
PKI configuration, 281 max, 29
PKI CRL obtain failure, 283 AAA RADIUS session-control, 54
PKI local certificate import failure, 284 attack D&P defense policy (UDP flood), 495
PKI local certificate obtain failure, 281 uncontrolled port (802.1X), 79
PKI storage path set failure, 285 802.1X unicast trigger mode, 82, 100
port security, 222 Unicast Reverse Path Forwarding. Use uRPF
port security secure MAC addresses, 222 RADIUS Remanent_Volume attribute data
security 802.1X EAD assistant Web browser measurement unit, 34
users not correctly redirected, 119 updating
664
security portal authentication extended user account
cross-subnet configuration, 180 MAC authentication user account format, 124
security portal authentication extended direct MAC authentication user account policies, 120
configuration, 173 user authentication
security portal authentication extended password control configuration, 225, 228, 232
re-DHCP, 176
password control parameters (global), 229
security portal authentication logout, 155
password control parameters (local user), 231
security portal authentication max number
password control parameters (super), 231
users, 145
password control parameters (user group), 230
security portal authentication re-DHCP, 167
password event logging, 227
security portal authentication re-DHCP with
password expiration, 226, 226
preauthentication domain, 196
password expired login, 226
security portal authentication roaming, 154
password history, 226
security portal authentication user
password max user account idle time, 227
access, 143
password not displayed, 227
security portal authentication user online
detection, 149 password setting, 225
665
IPS DPI application profile in IPv6 object IPv4 source guard (IPv4SG) static binding
policy rule, 581 configuration, 519
666
security portal authentication direct port security MAC address autoLearn, 213
configuration with preauthentication working with
domain, 194 SSH SFTP directories, 405
security portal authentication extended SSH SFTP files, 405
cross-subnet configuration, 180
X
security portal authentication extended direct
configuration, 173 X.500
security portal authentication extended AAA LDAP implementation, 9
functions, 134 Z
security portal authentication extended
zone
re-DHCP, 176
ASPF destination zone, 439
security portal authentication re-DHCP, 167
ASPF policy application (zone pair), 443, 448
security portal authentication re-DHCP with
ASPF source zone, 439
preauthentication domain, 196
ASPF zone pair, 439
security portal authentication server
detection+user synchronization, 184 IPS object policy application to zone pairs, 581
667