EasyManua.ls Logo

HP E3800 Series User Manual

HP E3800 Series
732 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #703 background imageLoading...
Page #703 background image
16-1
16
Key Management System
Overview
The switches covered in this guide provide support for advanced routing
capabilities. Security turns out to be extremely important as complex net-
works and the internet grow and become a part of our daily life and business.
This fact forces protocol developers to improve security mechanisms
employed by their protocols, which in turn becomes an extra burden for
system administrators who have to set up and maintain them. One possible
solution to the problem is to centralize the mechanisms used to configure and
maintain security information for all routing protocols. The Key Management
System (KMS) can carry this burden.
KMS is designed to configure and maintain key chains. A key chain is a set of
keys with a timing mechanism for activating and deactivating individual keys.
KMS provides specific instances of routing protocols with one or more Send
or Accept keys that must be active at the time of a request. A protocol instance
is usually an interface on which the protocol is running.
Terminology
Key Chain: A key or set of keys assigned for use by KMS-enabled
protocols. A key chain may optionally contain the time to activate and
deactivate a particular key.
Time-Independent Key: A key that has no activate or deactivate
time associated with it. This type of key does not expire, which
eliminates the need for a key chain.
Feature Default Menu CLI Web
Generating a Key Chain n/a n/a page 16-2 n/a
Generating a Time-Independent key n/a n/a page 16-3 n/a
Generating a Time-Dependent key n/a n/a page 16-5 n/a

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the HP E3800 Series and is the answer not in the manual?

HP E3800 Series Specifications

General IconGeneral
ModelHP E3800 Series
LayerLayer 3
Uplink Ports4 x SFP+ ports
StackingYes
Power over Ethernet (PoE)Available on some models
ManagementWeb, CLI, SNMP
Power SupplyRedundant (optional)
Operating Temperature0°C to 45°C
Dimensions (W x D x H)440 x 424 x 44 mm
Operating Humidity10% to 90% non-condensing

Summary

Security Overview

Quick Start: Using the Management Interface Wizard

Step-by-step method to prepare the switch for secure network operation, covering security settings and protocols.

Configuring Username and Password Security

Configuring Local Password Security

Describes setting passwords for Manager and Operator levels using the menu interface.

To Delete Password Protection (Including Recovery from a Lost Password)

Procedure for deleting all usernames and passwords, including recovering from a lost manager password.

CLI: Setting Passwords and Usernames

Explains configuring manager and operator passwords and usernames using CLI commands.

Front-Panel Security

Covers enabling/disabling front-panel buttons for password clearing, rebooting, and factory reset.

Password Recovery

Explains the password recovery feature, its prerequisites, and the process for disabling or re-enabling it.

Virus Throttling (Connection-Rate Filtering)

General Configuration Guidelines

Provides guidelines for configuring connection-rate filtering, including for attack-free and attack-prone networks.

Configuring Connection-Rate Filtering

Details commands for enabling connection-rate filtering on the switch and applying it on a per-port basis.

Enabling Connection-Rate Filtering and Configuring Sensitivity

Explains the command to enable connection-rate filtering and set the global sensitivity level.

Configuring the Per-Port Filtering Mode

Describes configuring the per-port policy for responding to high inbound IP connection attempts from a given source.

Configuring and Applying Connection-Rate ACLs

Explains how to create and apply connection-rate ACLs to filter IP traffic from authenticated clients.

Web and MAC Authentication

Web Authentication

Describes the Web Authentication method using a web page login to authenticate users for network access.

MAC Authentication

Explains MAC Authentication for authenticating devices by their MAC address for network access.

Setup Procedure for Web/MAC Authentication

Provides steps for configuring Web/MAC authentication, including prerequisite checks and port configuration.

Configuring Web Authentication

Details the steps for configuring Web Authentication, including redirect URLs and optional settings.

Configuring MAC Authentication on the Switch

Provides an overview and commands for configuring MAC Authentication on the switch.

TACACS+ Authentication

General Authentication Setup Procedure

Outlines a general procedure for setting up and testing TACACS+ authentication to prevent lockouts.

Configuring TACACS+ on the Switch

Describes steps for configuring TACACS+ operation, including before you begin and CLI commands.

Configuring the Switch’s Authentication Methods

Explains how the 'aaa authentication' command configures access control for Console, Telnet, SSH, Web, and Port-Access.

Configuring the TACACS+ Server for Single Login

Explains how to check User Setup entries on the TACACS+ server for correct single login feature operation.

Configuring the Switch’s TACACS+ Server Access

Details configuring TACACS+ server access parameters: host IP address, encryption key, and timeout value.

Using the Encryption Key

Explains how encryption keys prevent unauthorized access by encrypting username and password information in TACACS+ packets.

RADIUS Authentication, Authorization, and Accounting

General RADIUS Setup Procedure

Provides preparation steps and information collection for configuring RADIUS on the switch.

Configuring the Switch for RADIUS Authentication

Describes configuring the switch for RADIUS authentication, including server access and global parameters.

Outline of the Steps for Configuring RADIUS Authentication

Outlines three main steps for configuring RADIUS authentication: configure access methods, enable RADIUS, and configure servers.

Configure Authentication for the Access Methods You Want RADIUS To Protect

Describes configuring RADIUS authentication for Console, Telnet, SSH, WebAgent, and Port-Access methods.

Configure the Switch To Access a RADIUS Server

Describes configuring the switch to interact with a RADIUS server for authentication and accounting services.

Controlling WebAgent Access

Provides methods to prevent unauthorized access through the WebAgent, including local authentication and IP manager features.

Commands Authorization

Explains how RADIUS protocol combines user authentication and authorization for controlling CLI command access.

Enabling Authorization

Describes configuring authorization for controlling access to CLI commands using RADIUS protocol.

Configuring RADIUS Accounting

Provides steps for configuring RADIUS accounting, including accessing a RADIUS server and accounting types.

Steps for Configuring RADIUS Accounting

Outlines steps for configuring RADIUS accounting: accessing RADIUS server, reconfiguring Acct-Session-ID, and configuring accounting types.

Changing RADIUS-Server Access Order

Describes how the switch accesses RADIUS servers in the order listed and how to change this order.

Dynamic Removal of Authentication Limits

Explains configuring RADIUS attributes for dynamic removal of 802.1X, MAC, and Web authentication limits.

Configuring the RADIUS VSAs

Details configuring RADIUS attributes (VSAs) for CoS, rate-limiting, and ACLs supported on the switch.

Configuring RADIUS Server Support for Switch Services

Configuring and Using Dynamic (RADIUS-Assigned) Access Control Lists

Describes applying RADIUS-assigned ACLs to filter IP traffic from authenticated clients.

Configuring an ACL in a RADIUS Server

Provides guidelines for configuring RADIUS-assigned ACLs on a RADIUS server, including an example for FreeRADIUS.

Example Using the Standard Attribute (92) In an IPv4 ACL

Illustrates configuring RADIUS-assigned IPv4 ACL support using the standard attribute for client identification.

Example Using HP VSA 63 To Assign IPv6 and/or IPv4 ACLs

Shows configuring VSA attribute 63 for RADIUS-assigned IPv6 and IPv4 ACL support on FreeRADIUS.

Example Using HP VSA 61 To Assign IPv4 ACLs

Demonstrates using HP VSA attribute 61 for configuring RADIUS-assigned IPv4 ACL support on FreeRADIUS.

Configuring the Switch To Support RADIUS-Assigned ACLs

Details steps to configure the switch for RADIUS-assigned ACLs: configure RADIUS operation and authentication method.

Configuring Secure Shell (SSH)

Steps for Configuring and Using SSH for Switch and Client Authentication

Outlines steps for two-way authentication: client preparation and switch preparation.

Configuring the Switch for SSH Operation

Details SSH-related CLI commands for generating keys, enabling/disabling SSH, and configuring parameters.

1. Assigning a Local Login (Operator) and Enable (Manager) Password

Explains how to assign local login and enable passwords to the switch for management access.

2. Generating the Switch’s Public and Private Key Pair

Describes generating a public and private host key pair on the switch for SSH client negotiation.

3. Providing the Switch’s Public Key to Clients

Guides on copying the switch’s public key to SSH clients for authentication and preventing unauthorized access.

Configuring Secure Socket Layer (SSL)

Steps for Configuring and Using SSL for Switch and Client Authentication

Outlines general steps: client preparation (install SSL browser) and switch preparation (generate certificate).

Configuring the Switch for SSL Operation

Details steps for SSL configuration: assign local passwords, generate server host certificate, and enable SSL.

1. Assigning a Local Login (Operator) and Enabling (Manager) Password

Recommends assigning a Manager password to the switch for security and explains WebAgent configuration.

2. Generating the Switch’s Server Host Certificate

Describes generating a server certificate on the switch before enabling SSL for secure connections.

Generate a Self-Signed Host Certificate with the WebAgent

Explains how to generate a self-signed host certificate using the WebAgent, including security and error handling.

Generate a CA-Signed server host certificate with the WebAgent

Details the three-phase process for installing a CA-signed certificate using the WebAgent.

3. Enabling SSL on the Switch and Anticipating SSL Browser Contact Behavior

Explains enabling SSL using CLI/WebAgent and the browser's contact behavior, including man-in-the-middle attack prevention.

Using the CLI Interface to Enable SSL

Provides CLI commands to enable or disable SSL on the switch, including port configuration.

IPv4 Access Control Lists (ACLs)

Overview of Options for Applying IPv4 ACLs on the Switch

Explains applying static ACLs (RACL, VACL, Static Port ACL) and dynamic (RADIUS-assigned) ACLs.

RADIUS-Assigned ACLs

Explains dynamic ACLs assigned by a RADIUS server to filter IP traffic from authenticated clients.

RADIUS-Assigned (Dynamic) Port ACL Applications

Describes dynamic ACLs configured on RADIUS servers to filter inbound IPv4 and IPv6 traffic from authenticated clients.

General ACL Features, Planning, and Configuration

Suggests steps for planning and configuring ACLs: determine policies, plan ACLs, configure on RADIUS server, and test.

IPv4 Static ACL Operation

Introduces static ACLs, their operation on interfaces, and traffic filtering options for IPv4 traffic.

Planning an ACL Application

Provides steps for planning ACLs: identify ACL action, identify traffic types, design ACLs, and configure ACLs.

IPv4 ACL Configuration and Operating Rules

Details RACLs, VACLs, and Static Port ACLs configuration and operating rules.

Configuring and Assigning an IPv4 ACL

Describes steps for configuring and assigning IPv4 ACLs using the CLI or an offline text editor.

Using the CLI To Create an ACL

Describes using the CLI or an offline text editor to create an ACL, recommending CLI for short ACLs.

Configuring Standard ACLs

Describes commands for performing operations on standard ACLs: creating, adding ACEs, deleting, resequencing, and remarks.

Configuring Named, Standard ACLs

Describes commands for creating and entering context of a named, standard ACL, and appending ACEs.

Displaying ACL Configuration Data

Lists commands to display ACL configuration, including summary, content, VLAN, port, and RADIUS assignments.

Creating or Editing ACLs Offline

Describes using an offline method to create or extensively edit large ACLs via text files and TFTP.

Enable ACL “Deny” Logging

Explains how ACL logging generates messages for explicit 'deny' actions, aiding network testing and monitoring.

Configuring Advanced Threat Protection

DHCP Snooping

Protects the network from common DHCP attacks like address spoofing and address exhaustion.

Enabling DHCP Snooping

Details the command to enable DHCP snooping globally and optionally on specific VLANs.

Configuring DHCP Snooping Trusted Ports

Describes configuring ports as trusted; DHCP server packets on trusted ports are forwarded without validation.

Dynamic ARP Protection

Protects the network from ARP cache poisoning by validating IP-to-MAC bindings on untrusted ports.

Dynamic IP Lockdown

Prevents IP source address spoofing on a per-port and per-VLAN basis using known IP-to-MAC bindings.

Protection Against IP Source Address Spoofing

Discusses attacks using forged IP source addresses and how dynamic IP lockdown protects against them.

Enabling Dynamic IP Lockdown

Details the command to enable dynamic IP lockdown on all ports or specified ports.

Adding an IP-to-MAC Binding to the DHCP Binding Database

Describes adding static IP-to-MAC bindings for dynamic IP lockdown and DHCP/ARP packet validation.

Traffic/Security Filters and Monitors

Introduction

Explains using static filters to enhance security and control access to network resources by forwarding or dropping traffic.

Filter Types and Operation

Details filter types: Source-Port, Multicast, and Protocol, including their selection criteria.

Source-Port Filters

Enables forwarding or dropping traffic from end nodes on a source-port to specific destination ports.

Named Source-Port Filters

Allows specifying named source-port filters for use on multiple ports and port trunks.

Defining and Configuring Named Source-Port Filters

Describes the named source-port filter command operating from the global configuration level.

Configuring Port-Based and User-Based Access Control (802.1X)

General Setup Procedure for 802.1X Access Control

Outlines steps before configuring 802.1X: configure local username/password and determine switch ports.

802.1X Open VLAN Mode

Describes using 802.1X Open VLAN mode to provide a path for clients needing 802.1X supplicant software download.

Setting Up and Configuring 802.1X Open VLAN Mode

Provides preparation steps and configuration for 802.1X Open VLAN mode, including VLANs and RADIUS server setup.

Configuring Switch Ports as 802.1X Authenticators

Details commands for configuring switch ports as 802.1X authenticators, including authentication commands and options.

Configuring and Monitoring Port Security

Port Security

Explains basic operation, intruder protection, eavesdrop prevention, and general operation for port security.

MAC Lockdown

Defines MAC Lockdown as permanent assignment of MAC address to a port to prevent station movement and hijacking.

MAC Lockout

Explains MAC Lockout as a blacklist for any traffic to/from a MAC address on all ports and VLANs.

Using Authorized IP Managers

Configuring IP Authorized Managers for the Switch

Details configuring IP authorized managers for the switch, including access method and privilege level.

Key Management System

Overview

Introduces Key Management System (KMS) for configuring and maintaining security information for routing protocols.

Configuring Key Chain Management

Outlines three KMS configuration steps: create key chain entry, assign key, and assign key chain to KMS-enabled protocol.

Related product manuals