EasyManua.ls Logo

ProCurve 2610 User Manual

ProCurve 2610
454 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Access Security Guide
2610
2610-PWR
ProCurve Switches
R.11.XX
www.procurve.com

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the ProCurve 2610 and is the answer not in the manual?

ProCurve 2610 Specifications

General IconGeneral
LayerLayer 2
Jumbo Frame SupportYes
RAM64 MB
Flash Memory16 MB
ManagementWeb browser, CLI, SNMP
Remote Management ProtocolSNMP, Telnet, SSH
FeaturesVLAN support, QoS, IGMP snooping
Compliant StandardsIEEE 802.3, IEEE 802.3u, IEEE 802.3x, IEEE 802.1D, IEEE 802.1p, IEEE 802.1Q, IEEE 802.1s, IEEE 802.1w, IEEE 802.1X
Power SupplyInternal
Operating Temperature0 to 50°C
Dimensions44.3 cm x 25.4 cm x 4.4 cm

Summary

Product Documentation

Printed Publications

Details on publications printed and shipped with the switch, available in PDF format.

Electronic Publications

Information on electronic publications available in PDF format on the ProCurve Web site.

Software Feature Index

Getting Started

Introduction

Describes how to use ProCurve's switch security features to protect access to your switch.

Overview of Access Security Features

Covers the access security features including passwords, TACACS+, RADIUS, SSH, and SSL.

Management Access Security Protection

Details two key areas to protect: unauthorized client access to management features and the network.

General Switch Traffic Security Guidelines

Provides guidelines for implementing network traffic security based on OSI model precedence.

Conventions

Explains conventions used for command syntax and displayed information in the guide.

Feature Descriptions by Model

Indicates which product or product series offer a specific software feature.

Command Syntax Statements

Explains the syntax conventions for CLI commands, including delimiters and formatting.

Command Prompts

Describes the default CLI prompt and how it can be customized.

Screen Simulations

Illustrates how simulated screen text and command output appear in the guide.

Port Identity Examples

Explains the port identity system used for chassis-based and stackable switches.

Sources for More Information

Consults other product manuals and the ProCurve website for additional switch information.

Need Only a Quick Start?

Provides guidance for users who only need a quick start for IP addressing.

IP Addressing

Recommends using the Switch Setup screen to quickly configure IP addressing.

To Set Up and Install the Switch in Your Network

Guides users to the Installation and Getting Started Guide for physical setup and basic configuration.

Configuring Username and Password Security

Overview

Explains console access levels (Manager and Operator) and password pair configuration.

Configuring Local Password Security

Details configuring local passwords and usernames via Menu, CLI, and Web interfaces.

Menu: Setting Passwords

Procedure for setting Manager and Operator passwords using the switch's menu interface.

CLI: Setting Passwords and Usernames

Describes using CLI commands to configure Manager and Operator passwords and usernames.

Web: Setting Passwords and Usernames

Explains how to configure passwords and optional usernames via the web browser interface.

Front-Panel Security

Covers front-panel features for enabling/disabling password clearing and factory reset.

When Security Is Important

Discusses the importance of security for confidential data and physical access concerns.

Front-Panel Button Functions

Details the functions of the Reset and Clear buttons on the switch's front panel.

Configuring Front-Panel Security

Explains CLI commands to disable/re-enable password clearing, reset-on-clear, and factory reset.

Password Recovery

Describes the password recovery feature for regaining management access after losing passwords.

Password Recovery Process

Details the process of recovering a lost password, including contacting Customer Care.

Web and MAC Authentication

Overview

Introduces Web and MAC authentication for port-based security using RADIUS servers.

Client Options

Explains port-based solutions where ports can belong to one untagged VLAN at a time.

General Features

Lists features including port-access authenticator, VLAN assignment, and web page login.

How Web and MAC Authentication Operate

Describes client authentication process with RADIUS servers for Web-based and MAC-based methods.

Authenticator Operation

Explains how clients present credentials to the switch for verification by a RADIUS server.

Terminology

Defines terms like Authorized-Client VLAN, Authentication Server, Authenticator, CHAP, Client, Redirect URL, Static VLAN.

Operating Rules and Notes

Covers concurrent authentication, precedence, VLAN rules, and client movement.

General Setup Procedure for Web/MAC Authentication

Outlines steps before configuring Web/MAC authentication, including local passwords and port determination.

Do These Steps Before You Configure Web/MAC Authentication

Prepares for Web/MAC authentication by configuring local accounts, ports, and VLANs.

Additional Information for Configuring the RADIUS Server To Support MAC Authentication

Provides server configuration details for MAC authentication, including MAC address format.

Configuring the Switch To Access a RADIUS Server

Details commands for configuring the switch to access a RADIUS server for authentication.

Configuring Web Authentication

Provides an overview and steps for configuring Web Authentication on switch ports.

Configure the Switch for Web-Based Authentication

Lists commands for configuring Web-Based Authentication, including DHCP and SSL options.

Configuring MAC Authentication on the Switch

Outlines steps for configuring MAC Authentication on switch ports, including address format.

Show Commands for Web-Based Authentication

Lists commands to display Web Authentication status and configuration settings.

Show Commands for MAC-Based Authentication

Lists commands to display MAC Authentication status and configuration settings.

Show Client Status

Explains possible client status information reported by 'show...clients' commands.

TACACS+ Authentication

Overview

Explains TACACS+ authentication for allowing or denying access to the switch.

Terminology Used in TACACS Applications:

Defines terms like NAS, TACACS+ Server, and Authentication.

General System Requirements

Lists requirements for using TACACS+ authentication, including server setup and switch configuration.

General Authentication Setup Procedure

Provides steps for testing TACACS+ service before full implementation to avoid lockouts.

Configuring TACACS+ on the Switch

Details the process of configuring TACACS+ authentication on the switch.

Before You Begin

Recommends reading setup procedures and configuring TACACS+ servers before switch configuration.

CLI Commands Described in this Section

Lists CLI commands covered in the TACACS+ configuration section.

Viewing the Switch’s Current Authentication Configuration

Lists login attempts, primary/secondary access methods for console and Telnet.

Viewing the Switch’s Current TACACS+ Server Contact Configuration

Lists timeout, encryption key, and IP addresses of TACACS+ servers the switch can contact.

Configuring the Switch’s Authentication Methods

Explains configuring access control for Console, Telnet, SSH using TACACS+ or local methods.

Configuring the Switch’s TACACS+ Server Access

Details parameters for the tacacs-server command, including host IP, encryption key, and timeout.

How Authentication Operates

Describes the general authentication process using a TACACS+ server.

General Authentication Process Using a TACACS+ Server

Explains the sequence of events when a client requests authentication via a TACACS+ server.

Local Authentication Process

Describes how the switch reverts to local authentication when TACACS+ fails or is not used.

Using the Encryption Key

Explains how encryption keys help prevent unauthorized access to TACACS+ packets.

Controlling Web Browser Interface Access When Using TACACS+ Authentication

Provides methods to prevent unauthorized access via the web browser interface.

Messages Related to TACACS+ Operation

Lists CLI messages related to TACACS+ operation and their meanings.

Operating Notes

Discusses Authorized IP Managers, local passwords, and TACACS+ server accessibility.

RADIUS Authentication and Accounting

Overview

Explains RADIUS for authentication and accounting, allowing separate settings for each server.

Terminology

Defines terms related to RADIUS, including CHAP, EAP, Host, NAS, RADIUS Client/Server, Shared Secret Key.

Switch Operating Rules for RADIUS

Outlines rules for RADIUS operation, including server accessibility and authentication methods.

General RADIUS Setup Procedure

Provides preparation steps for configuring RADIUS on the switch, including server details.

Configuring the Switch for RADIUS Authentication

Lists commands for configuring RADIUS authentication methods for various access types.

Outline of the Steps for Configuring RADIUS Authentication

Details three main steps for configuring RADIUS authentication: access methods, server access, and global parameters.

1. Configure Authentication for the Access Methods You Want RADIUS To Protect

Describes configuring authentication for Serial port, Telnet, SSH, Web, and Port-Access.

2. Configure the Switch To Access a RADIUS Server

Explains how to configure the switch to interact with RADIUS servers for authentication and accounting.

3. Configure the Switch’s Global RADIUS Parameters

Details global RADIUS parameters like login attempts, global server key, timeouts, and retransmits.

Local Authentication Process

Describes when and how the switch reverts to local authentication if RADIUS fails or is unavailable.

Controlling Web Browser Interface Access When Using RADIUS Authentication

Methods to prevent unauthorized access through the web browser interface using RADIUS authentication.

Configuring RADIUS Authorization

Explains how to limit user services by enabling AAA RADIUS authorization for CLI commands.

Configuring RADIUS Accounting

Details configuring RADIUS accounting, including types, reports, and session options.

Viewing RADIUS Statistics

Shows how to view general RADIUS configuration and specific server information.

Configuring RADIUS Server Support for Switch Services

Overview

Provides information on setting up a RADIUS server for CoS and ACL features on ports.

Configuring the RADIUS Server for CoS Services

Guidelines for configuring a RADIUS server to dynamically apply Class of Service (CoS).

Viewing the Currently Active Per-Port CoS Configuration Specified by a RADIUS Server

Shows how to view CoS settings imposed by a RADIUS server during an active client session.

Configuring and Using RADIUS-Assigned Access Control Lists

Describes applying RADIUS-assigned dynamic port ACLs to filter traffic from authenticated clients.

Introduction

Introduces RADIUS-assigned ACLs for filtering IP traffic from authenticated clients.

Terminology

Defines terms related to ACLs like ACE, ACL, ACL ID, DA, Deny, Dynamic Port ACL, Implicit Deny, Inbound Traffic, NAS.

Overview of RADIUS-Assigned, Dynamic Port ACLs

Explains dynamic port ACLs for Layer-3 filtering of IP traffic from authenticated clients.

Contrasting Dynamic and Static ACLs

Highlights key differences between static ACLs on ports and dynamic port ACLs assigned by RADIUS.

How a RADIUS Server Applies a Dynamic Port ACL to a Switch Port

Describes how RADIUS assigns ACLs to ports based on client credentials to filter inbound traffic.

General ACL Features, Planning, and Configuration

Provides steps for using dynamic port ACLs to establish access policies for client IP traffic.

The Packet-filtering Process

Explains the sequential comparison and action process when applying an ACL to filter a packet.

Operating Rules for Dynamic Port ACLs

Details rules for relating clients to dynamic port ACLs and their limitations.

Configuring an ACL in a RADIUS Server

Provides guidelines for configuring RADIUS servers to specify dynamic port ACLs.

Configuring ACE Syntax in RADIUS Servers

Details the syntax and operating information for ACLs configured in a RADIUS server.

Configuring the Switch To Support Dynamic Port ACLs

Outlines steps to enable switch forwarding of client credentials to RADIUS for dynamic ACLs.

Displaying the Current Dynamic Port ACL Activity on the Switch

Shows commands to display current ACL activity imposed per port by RADIUS server responses.

Event Log Messages

Lists event log messages related to ACL configuration and application errors.

Causes of Client Deauthentication Immediately After Authenticating

Explains common reasons for client deauthentication after successful authentication.

Monitoring Shared Resources

Discusses how RADIUS-based sessions using dynamic port ACLs share switch resources.

Configuring Secure Shell (SSH)

Overview

Introduces Secure Shell (SSH) for remote management access via encrypted paths.

Terminology

Defines terms related to SSH, including SSH Server, Key Pair, PEM, Private Key, Public Key, Levels.

Prerequisite for Using SSH

Requires installing an SSH client application with key generation or import capabilities.

Public Key Formats

Specifies that client applications must export public keys in PEM-Encoded or Non-Encoded ASCII format.

Steps for Configuring and Using SSH for Switch and Client Authentication

Outlines general steps for configuring SSH for two-way authentication between switch and client.

General Operating Rules and Notes

Covers rules for public key exportability, key pair persistence, and security implications.

Configuring the Switch for SSH Operation

Lists SSH-related CLI commands and provides instructions for configuring SSH on the switch.

1. Assign Local Login (Operator) and Enable (Manager) Password

Recommends assigning at least a Manager password for switch configuration security.

2. Generate the Switch’s Public and Private Key Pair

Explains the need to generate a public/private host key pair for SSH negotiation.

3. Provide the Switch’s Public Key to Clients

Describes copying the switch's public key to client 'known hosts' files for secure access.

4. Enable SSH on the Switch and Anticipate SSH Client Contact Behavior

Details enabling SSH, host public-key authentication, and client contact behavior.

5. Configure the Switch for SSH Authentication

Explains configuring primary/secondary authentication methods for SSH Login and Enable levels.

6. Use an SSH Client To Access the Switch

Instructs users to test SSH configuration to ensure desired operation level.

Further Information on SSH Client Public-Key Authentication

Provides details on client public-key authentication, key file creation, and transfer.

Messages Related to SSH Operation

Lists common SSH operation messages and their meanings, including TFTP errors.

Configuring Secure Socket Layer (SSL)

Overview

Introduces SSL/TLS for secure web transactions, providing encrypted and authenticated access.

Terminology

Defines terms related to SSL, including SSL Server, Key Pair, Digital Certificate, Self-Signed Certificate.

Prerequisite for Using SSL

Requires installing an SSL-enabled web browser application for switch management access.

Steps for Configuring and Using SSL for Switch and Client Authentication

Outlines general steps for configuring SSL, including client preparation and switch preparation.

General Operating Rules and Notes

Covers rules for certificate generation, key pair persistence, and security implications.

Configuring the Switch for SSL Operation

Lists SSL-related CLI commands and provides instructions for configuring SSL on the switch.

1. Assign Local Login (Operator) and Enable (Manager) Password

Recommends assigning a Manager password for switch configuration security.

2. Generate the Switch’s Server Host Certificate

Explains generating a server certificate, including self-signed and CA-signed types.

3. Enable SSL on the Switch and Anticipate SSL Browser Contact Behavior

Details enabling SSL and handling browser contact behavior, including security concerns.

Common Errors in SSL Setup

Lists common errors during SSL setup, such as missing certificates or reserved TCP ports.

Access Control Lists (ACLs)

Introduction

Explains how ACLs filter traffic from hosts, groups, or subnets for network performance.

ACL Applications

Details how ACLs filter traffic at the network edge to remove unwanted traffic and improve performance.

Optional Network Management Applications

Discusses augmenting ACLs with Identity Driven Management (IDM) via RADIUS server.

Optional PCM and IDM Applications

Introduces ProCurve Manager (PCM) and Identity Driven Manager (IDM) for network management.

General Application Options

Explains Layer 3 IP filtering with ACLs for network performance and restricting network use.

Terminology

Defines terms related to ACLs: ACE, ACL, ACL ID, DA, Deny, Dynamic Port ACL, Implicit Deny, Inbound Traffic, NAS, SA, Standard ACL, Wildcard.

Overview

Describes Standard ACLs for source IP filtering and Extended ACLs for broader criteria.

Types of IP ACLs

Explains Standard ACLs (source IP) and Extended ACLs (source/destination IP, TCP/UDP criteria).

ACL Inbound Application Points

Details applying ACL filtering to inbound IP traffic on physical ports or static trunks.

Features Common to All ACLs

Highlights common ACL features like multiple entries, ACEs, implicit deny, and logging.

General Steps for Planning and Configuring ACLs

Provides a process for planning and configuring ACLs, including traffic type and policy determination.

ACL Operation

Describes how ACLs operate on assigned ports and static trunks to filter traffic types.

The Packet-Filtering Process

Explains the sequential comparison of ACEs to packets and the action taken upon finding a match.

Planning an ACL Application

Guides planning ACL applications by understanding switch resources and desired policies.

Switch Resource Usage

Discusses how ACLs load resources and the importance of resource planning for configurations.

Managing ACL Resource Consumption

Explains how IP subnet masks and application changes consume ACL resources.

Traffic Management and Improved Network Performance

Details how ACLs block unnecessary traffic and restrict user access to improve performance.

Security

Explains how ACLs enhance security by blocking inbound IP traffic from unauthorized source IP addresses.

Guidelines for Planning the Structure of an ACL

Provides steps for planning ACL structure, including determining application points and ACE order.

ACL Configuration and Operating Rules

Covers per-interface ACL limits, implicit deny, explicit permit/deny, and ACL assignment exclusivity.

How an ACE Uses a Mask To Screen Packets for Matches

Explains how IP addresses and masks in ACEs enforce selection policies for packet screening.

Configuring and Assigning an ACL

Describes how to configure and assign numbered and named ACLs to interfaces.

ACL Configuration Structure

Details the basic ACL structure including type, name, deny/permit entries, and implicit deny.

ACL Configuration Factors

Discusses ACL resource consumption and the significance of entry sequence in ACLs.

Using the CLI To Create an ACL

Describes using the CLI method for creating short ACLs and general ACE rules.

Traffic/Security Filters

Overview

Enhances in-band security and control over network resources using static per-port filters.

General Operation

Explains configuring traffic filters to forward or drop unwanted traffic between ports and trunks.

Applying a Source Port Filter in a Multinetted VLAN

Details preventing traffic from one subnet routing to another within the same VLAN using source-port filters.

Using Source-Port Filters

Covers operating rules for configuring source-port filters on ports or port trunks.

Operating Rules for Source-Port Filters

Explains rules for configuring one source-port filter per port/trunk and its composition.

Configuring a Source-Port Filter

Describes the source-port filter command for creating or deleting filters with drop/forward actions.

Viewing a Source-Port Filter

Explains how to list source-port filters and view detailed information using the show filter command.

Filter Indexing

Details how the switch automatically assigns index (IDX) numbers to source-port filters.

Editing a Source-Port Filter

Explains updating existing filters by changing actions for destination ports or trunks.

Using Named Source-Port Filters

Describes using named filters applicable to multiple ports and trunks for easier management.

Configuring Port-Based and User-Based Access Control (802.1X)

Overview

Introduces 802.1X for port-based and user-based access control, simplifying security management.

Why Use Port-Based or User-Based Access Control?

Explains how 802.1X simplifies security by providing access control and user profiles via RADIUS servers.

General Features

Lists key 802.1X features: authenticator/supplicant operation, RADIUS authentication, Open VLAN mode, user-based control.

User Authentication Methods

Compares Port-Based and User-Based access control methods, highlighting their operating details.

Terminology

Defines 802.1X terms: Authenticator, CHAP, Client, User-Based, Guest VLAN, EAP, EAPOL, Friendly Client, MD5, PVID, Port-Based, Static VLAN.

General 802.1X Authenticator Operation

Describes security on point-to-point links between clients and switches using 802.1X-aware devices.

Example of the Authentication Process

Illustrates the authentication process involving switch, client, and RADIUS server or local authentication.

VLAN Membership Priority

Explains the priority order for assigning VLAN membership after client authentication.

General Operating Rules and Notes

Covers rules for user-based and port-based modes, re-authentication, and concurrent authentication.

General Setup Procedure for 802.1X Access Control

Outlines steps before configuring 802.1X, including local accounts, ports, and RADIUS servers.

Overview: Configuring 802.1X Authentication on the Switch

Provides steps for configuring 802.1X authentication, including user-based, port-based, and supplicant settings.

Configuring Switch Ports as 802.1X Authenticators

Details configuring ports as 802.1X authenticators, including enabling, setting modes, and commands.

1. Enable 802.1X Authentication on Selected Ports

Enables ports as 802.1X authenticators and sets default port-based authentication.

2. Reconfigure Settings for Port-Access

Allows reconfiguring port-access settings like control mode (authorized, auto, unauthorized).

3. Configure the 802.1X Authentication Method

Specifies the authentication type: local, EAP-RADIUS, or CHAP-RADIUS.

4. Enter the RADIUS Host IP Address(es)

Configures the switch to use RADIUS servers for authentication, specifying IP addresses and keys.

5. Enable 802.1X Authentication on the Switch

Activates 802.1X port-access on ports configured as authenticators.

6. Optional: Reset Authenticator Operation

Allows resetting 802.1X authentication and statistics on specified ports.

7. Optional: Configure 802.1X Controlled Directions

Configures how ports transmit traffic before successful authentication (ingress/egress).

802.1X Open VLAN Mode

Provides a path for clients to acquire 802.1X supplicant software before authentication.

Introduction

Describes using 802.1X Open VLAN mode for clients needing supplicant software or initialization services.

VLAN Membership Priorities

Explains the priority order for port VLAN membership after client authentication.

Use Models for 802.1X Open VLAN Modes

Details applying Open VLAN mode with Unauthorized-Client and Authorized-Client VLANs.

Configuring and Monitoring Port Security

Overview

Introduces Port Security for configuring MAC addresses, detecting and logging unauthorized attempts.

Basic Operation

Describes the default port security setting (off/continuous) and intruder protection mechanisms.

Eavesdrop Protection

Explains that configuring port security automatically enables eavesdrop prevention for the port.

Blocking Unauthorized Traffic

Details how the switch blocks unauthorized traffic without disabling the port upon security violation.

Trunk Group Exclusion

States that port security does not operate on static or dynamic trunk groups.

Planning Port Security

Guides planning port security configuration by considering ports, authorized devices, and security actions.

Port Security Command Options and Operation

Describes CLI port security commands, including learn modes, address limits, and actions.

Retention of Static MAC Addresses

Explains how learned and assigned static MAC addresses are retained after reboots or configuration changes.

Displaying Current Port Security Settings

Shows how to display port security listings for all ports or specified ports using CLI commands.

Configuring Port Security

Details using the CLI to configure port security, add/delete devices, and clear intrusion flags.

MAC Lockdown

Explains MAC Lockdown as permanent assignment of MAC address/VLAN to a specific port to prevent hijacking.

Differences Between MAC Lockdown and Port Security

Compares MAC Lockdown and Port Security, highlighting their distinct features and architecture levels.

Deploying MAC Lockdown

Provides considerations for deploying MAC Lockdown within network topologies, especially with Spanning Tree Protocol.

MAC Lockout

Describes MAC Lockout as a simple blacklist feature to drop all traffic to/from a MAC address on the switch.

Port Security and MAC Lockout

Explains that MAC Lockout overrides Port Security and 802.1X authentication and cannot be used together.

Web: Displaying and Configuring Port Security Features

Guides users on how to check and configure Port Security settings via the web browser interface.

Reading Intrusion Alerts and Resetting Alert Flags

Explains how the switch notifies of security violations and how to reset alert flags.

Notice of Security Violations

Describes how the switch sets alert flags and provides notification methods for security violations.

How the Intrusion Log Operates

Explains how the Intrusion Log lists detected security violation attempts and their history.

Keeping the Intrusion Log Current by Resetting Alert Flags

Details how resetting alert flags keeps the Intrusion Log current and allows new intrusion logging.

Using the Event Log To Find Intrusion Alerts

Shows how to use the Event Log and CLI commands to find and review port security intrusions.

Web: Checking for Intrusions, Listing Intrusion Alerts, and Resetting Alert Flags

Guides users on checking Alert Log and Intrusion Log via the web browser interface.

Operating Notes for Port Security

Provides notes on identifying intruder IP addresses, log entries, and LACP availability with port security.

Using Authorized IP Managers

Overview

Explains how Authorized IP Managers use IP addresses and masks to control network access to the switch.

Configuration Options

Details configurable options: authorized manager addresses, access levels for Telnet, SNMP, and web browser.

Access Levels

Defines Manager and Operator access levels for stations using Telnet, SNMPv1, SNMPv2c.

Defining Authorized Management Stations

Describes authorizing single stations or groups of stations using IP addresses and masks.

Overview of IP Mask Operation

Explains how IP masks control switch access by defining ranges of authorized IP addresses.

Menu: Viewing and Configuring IP Authorized Managers

Provides steps to view and configure IP Authorized Managers using the switch's console menu.

CLI: Viewing and Configuring Authorized IP Managers

Lists CLI commands for viewing and configuring authorized IP managers and their access levels.

Web: Configuring IP Authorized Managers

Details configuring IP Authorized Managers via the web browser interface (add, modify, delete).

Web Proxy Servers

Recommends avoiding web proxy servers for switch access due to security risks.

Web-Based Help

Guides users on accessing web-based help for the web browser interface screen.

Building IP Masks

Explains how IP Mask parameters control recognition of authorized manager station IP addresses.

Configuring One Station Per Authorized Manager IP Entry

Describes the easiest way to authorize stations by adding each IP address with a 255.255.255.255 mask.

Configuring Multiple Stations Per Authorized Manager IP Entry

Explains using IP Masks to authorize groups of stations with the same access level.

Additional Examples for Authorizing Multiple Stations

Provides examples of IP mask analysis for single and multiple station entries.

Operating Notes

Covers network security precautions, modem/console access, duplicate IPs, and web proxy servers.

Related product manuals