Contents

home

Configuring AAA
Overview
RADIUS
HWTACACS
LDAP
AAA implementation on the device
AAA for MPLS L3VPNs
Protocols and standards
RADIUS attributes
FIPS compliance
AAA configuration considerations and task list
Configuring AAA schemes
Configuring local users
Configuring RADIUS schemes
Configuring HWTACACS schemes
Configuring LDAP schemes
Configuring AAA methods for ISP domains
Configuration prerequisites
Creating an ISP domain
Configuring ISP domain attributes
Configuring authentication methods for an ISP domain
Configuring authorization methods for an ISP domain
Configuring accounting methods for an ISP domain
Configuring the session-control feature
Configuring the RADIUS DAE server feature
Changing the DSCP priority for RADIUS packets
Setting the maximum number of concurrent login users
Configuring and applying an ITA policy
Configuring a NAS-ID profile
Configuring the device ID
Displaying and maintaining AAA
AAA configuration examples
Authentication and authorization for SSH users by a RADIUS server
Local authentication and authorization for SSH users
AAA for SSH users by an HWTACACS server
Authentication for SSH users by an LDAP server
AAA for PPP users by an HWTACACS server
ITA configuration example for IPoE users
Local guest configuration and management example
Troubleshooting RADIUS
RADIUS authentication failure
RADIUS packet delivery failure
RADIUS accounting error
Troubleshooting HWTACACS
Troubleshooting LDAP
LDAP authentication failure
802.1X overview
802.1X architecture
Controlled/uncontrolled port and port authorization status
802.1X-related protocols
Packet formats
EAP over RADIUS
802.1X authentication initiation
802.1X client as the initiator
Access device as the initiator
802.1X authentication procedures
Comparing EAP relay and EAP termination
EAP relay
EAP termination
Configuring 802.1X
Access control methods
802.1X VLAN manipulation
Authorization VLAN
Guest VLAN
Auth-Fail VLAN
Critical VLAN
Using 802.1X authentication with other features
ACL assignment
EAD assistant
SmartOn
Compatibility information
Feature and hardware compatibility
Command and hardware compatibility
Configuration prerequisites
802.1X configuration task list
Enabling 802.1X
Enabling EAP relay or EAP termination
Setting the port authorization state
Specifying an access control method
Setting the maximum number of concurrent 802.1X users on a port
Setting the maximum number of authentication request attempts
Setting the 802.1X authentication timeout timers
Configuring online user handshake
Configuration guidelines
Configuration procedure
Configuring the authentication trigger feature
Configuration guidelines
Configuration procedure
Specifying a mandatory authentication domain on a port
Setting the quiet timer
Enabling the periodic online user reauthentication feature
Configuring an 802.1X guest VLAN
Configuration guidelines
Configuration procedure
Configuring an 802.1X Auth-Fail VLAN
Configuration guidelines
Configuration procedure
Configuring an 802.1X critical VLAN
Configuration guidelines
Configuration procedure
Specifying supported domain name delimiters
Configuring the EAD assistant feature
Configuring 802.1X SmartOn
Displaying and maintaining 802.1X
802.1X authentication configuration examples
Basic 802.1X authentication configuration example
802.1X guest VLAN and authorization VLAN configuration example
802.1X with ACL assignment configuration example
802.1X with EAD assistant configuration example (with DHCP relay agent)
802.1X with EAD assistant configuration example (with DHCP server)
802.1X SmartOn configuration example
Troubleshooting 802.1X
EAD assistant for Web browser users
Configuring MAC authentication
Overview
User account policies
Authentication methods
VLAN assignment
ACL assignment
Periodic MAC reauthentication
Compatibility information
Feature and hardware compatibility
Command and hardware compatibility
Configuration prerequisites
Configuration task list
Enabling MAC authentication
Specifying a MAC authentication domain
Configuring the user account format
Configuring MAC authentication timers
Setting the maximum number of concurrent MAC authentication users on a port
Configuring MAC authentication delay
Enabling MAC authentication multi-VLAN mode on a port
Configuring the keep-online feature
Including user IP addresses in MAC authentication requests
Displaying and maintaining MAC authentication
MAC authentication configuration examples
Local MAC authentication configuration example
RADIUS-based MAC authentication configuration example
ACL assignment configuration example
Configuring portal authentication
Overview
Extended portal functions
Portal system components
Portal system using the local portal Web server
Interaction between portal system components
Portal authentication modes
Portal support for EAP
Portal authentication process
Portal packet filtering rules
BYOD support
MAC-based quick portal authentication
Compatibility information
Feature and hardware compatibility
Command and hardware compatibility
Portal configuration task list
Configuration prerequisites
Configuring a portal authentication server
Configuring a portal Web server
Enabling portal authentication
Configuration restrictions and guidelines
Configuration procedure
Specifying a portal Web server
Controlling portal user access
Configuring a portal-free rule
Configuring an authentication source subnet
Configuring an authentication destination subnet
Setting the maximum number of portal users
Specifying a portal authentication domain
Specifying a preauthentication domain
Specifying a preauthentication IP address pool for portal users
Enabling strict-checking on portal authorization information
Enabling portal authentication only for DHCP users
Enabling outgoing packets filtering on a portal-enabled interface
Configuring portal detection features
Configuring online detection of portal users
Configuring portal authentication server detection
Configuring portal Web server detection
Configuring portal user synchronization
Configuring the portal fail-permit feature
Configuring BAS-IP for portal packets sent to the portal authentication server
Specifying a format for the NAS-Port-ID attribute
Specifying the device ID
Enabling portal roaming
Logging out online portal users
Disabling traffic accounting for portal users
Configuring Web redirect
Applying a NAS-ID profile to an interface
Configuring the local portal Web server feature
Customizing authentication pages
Configuring a local portal Web server
Enabling validity check on wireless clients
Automatically logging out wireless portal users
Enabling ARP or ND entry conversion for portal clients
Configuring HTTPS redirect
Configuring MAC-based quick portal authentication
Configuring a remote MAC binding server
Configuring a local MAC binding server
Specifying a MAC binding server on an interface
Specifying a MAC binding server on a service template
Configuring NAS-Port-Type
Configuring portal safe-redirect
Setting the interval at which an AP reports traffic statistics to the AC
Excluding an attribute from portal protocol packets
Enabling portal logging
Configuring portal support for third-party authentication
Editing buttons and pages for third-party authentication
Configuring a third-party authentication server
Specifying an authentication domain for third-party authentication
Configuring portal temporary pass
Displaying and maintaining portal
Portal configuration examples (wired application)
Configuring direct portal authentication
Configuring re-DHCP portal authentication
Configuring cross-subnet portal authentication
Configuring extended direct portal authentication
Configuring extended re-DHCP portal authentication
Configuring extended cross-subnet portal authentication
Configuring portal server detection and portal user synchronization
Configuring cross-subnet portal authentication for MPLS L3VPNs
Configuring direct portal authentication with a preauthentication domain
Configuring re-DHCP portal authentication with a preauthentication domain
Configuring direct portal authentication using the local portal Web server
Portal configuration examples (wireless application)
Configuring direct portal authentication
Verifying the configuration
Configuring MAC-based quick portal authentication
Troubleshooting portal
No portal authentication page is pushed for users
Cannot log out portal users on the access device
Cannot log out portal users on the RADIUS server
Users logged out by the access device still exist on the portal authentication server
Re-DHCP portal authenticated users cannot log in successfully
Configuring port security
Overview
Port security features
Port security modes
Feature and hardware compatibility
Configuration task list
Enabling port security
Setting port security's limit on the number of secure MAC addresses on a port
Setting the port security mode
Configuring port security features
Configuring NTK
Configuring intrusion protection
Configuring secure MAC addresses
Configuration prerequisites
Configuration procedure
Ignoring authorization information from the server
Enabling MAC move
Enabling the authorization-fail-offline feature
Applying a NAS-ID profile to port security
Enabling SNMP notifications for port security
Displaying and maintaining port security
Port security configuration examples
autoLearn configuration example
userLoginWithOUI configuration example
macAddressElseUserLoginSecure configuration example
Troubleshooting port security
Cannot set the port security mode
Cannot configure secure MAC addresses
Configuring user profiles
Overview
Command and hardware compatibility
Configuration restrictions and guidelines
Configuring a user profile
Displaying and maintaining user profiles
Configuring password control
Overview
Password setting
Password updating and expiration
User login control
Password not displayed in any form
Logging
FIPS compliance
Password control configuration task list
Enabling password control
Setting global password control parameters
Setting user group password control parameters
Setting local user password control parameters
Setting super password control parameters
Displaying and maintaining password control
Password control configuration example
Network requirements
Configuration procedure
Verifying the configuration
Configuring keychains
Overview
Configuration procedure
Displaying and maintaining keychain
Keychain configuration example
Network requirements
Configuration procedure
Verifying the configuration
Managing public keys
Overview
FIPS compliance
Creating a local key pair
Distributing a local host public key
Exporting a host public key
Displaying a host public key
Destroying a local key pair
Configuring a peer host public key
Importing a peer host public key from a public key file
Entering a peer host public key
Displaying and maintaining public keys
Examples of public key management
Example for entering a peer host public key
Example for importing a public key from a public key file
Configuring PKI
Overview
PKI terminology
PKI architecture
PKI operation
PKI applications
Support for MPLS L3VPN
FIPS compliance
PKI configuration task list
Configuring a PKI entity
Configuring a PKI domain
Requesting a certificate
Configuration guidelines
Configuring automatic certificate request
Manually requesting a certificate
Aborting a certificate request
Obtaining certificates
Configuration prerequisites
Configuration guidelines
Configuration procedure
Verifying PKI certificates
Verifying certificates with CRL checking
Verifying certificates without CRL checking
Specifying the storage path for the certificates and CRLs
Exporting certificates
Removing a certificate
Configuring a certificate-based access control policy
Displaying and maintaining PKI
PKI configuration examples
Requesting a certificate from an RSA Keon CA server
Requesting a certificate from a Windows Server 2003 CA server
Requesting a certificate from an OpenCA server
IKE negotiation with RSA digital signature from a Windows Server 2003 CA server
Certificate-based access control policy configuration example
Certificate import and export configuration example
Troubleshooting PKI configuration
Failed to obtain the CA certificate
Failed to obtain local certificates
Failed to request local certificates
Failed to obtain CRLs
Failed to import the CA certificate
Failed to import a local certificate
Failed to export certificates
Failed to set the storage path
Configuring IPsec
Overview
Security protocols and encapsulation modes
Security association
Authentication and encryption
IPsec implementation
IPsec RRI
Protocols and standards
FIPS compliance
IPsec tunnel establishment
Implementing ACL-based IPsec
Configuring an ACL
Configuring an IPsec transform set
Configuring a manual IPsec policy
Configuring an IKE-based IPsec policy
Applying an IPsec policy to an interface
Enabling ACL checking for de-encapsulated packets
Configuring IPsec anti-replay
Configuring IPsec anti-replay redundancy
Binding a source interface to an IPsec policy
Enabling QoS pre-classify
Enabling logging of IPsec packets
Configuring the DF bit of IPsec packets
Configuring IPsec RRI
Configuring IPsec for IPv6 routing protocols
Configuration task list
Configuring a manual IPsec profile
Configuring IPsec for tunnels
Configuration task list
Configuring an IKE-based IPsec profile
Applying an IKE-based IPsec profile to a tunnel interface
Configuring SNMP notifications for IPsec
Configuring IPsec fragmentation
Setting the maximum number of IPsec tunnels
Enabling logging for IPsec negotiation
Displaying and maintaining IPsec
IPsec configuration examples
Configuring a manual mode IPsec tunnel for IPv4 packets
Configuring an IKE-based IPsec tunnel for IPv4 packets
Configuring an IKE-based IPsec tunnel for IPv6 packets
Configuring IPsec for RIPng
Configuring IPsec RRI
Configuring IPsec tunnel interface-based IPsec for IPv4 packets
Configuring IKE
Overview
IKE negotiation process
IKE security mechanism
Protocols and standards
FIPS compliance
IKE configuration prerequisites
IKE configuration task list
Configuring an IKE profile
Configuring an IKE proposal
Configuring an IKE keychain
Configuring the global identity information
Configuring the IKE keepalive feature
Configuring the IKE NAT keepalive feature
Configuring IKE DPD
Enabling invalid SPI recovery
Setting the maximum number of IKE SAs
Configuring an IKE IPv4 address pool
Configuring SNMP notifications for IKE
Enabling logging for IKE negotiation
Displaying and maintaining IKE
IKE configuration examples
Main mode IKE with pre-shared key authentication configuration example
Aggressive mode with RSA signature authentication configuration example
Aggressive mode with NAT traversal configuration example
IKE remote extended authentication configuration example
IKE local extended authentication and address pool authorization configuration example
Troubleshooting IKE
IKE negotiation failed because no matching IKE proposals were found
IKE negotiation failed because no IKE proposals or IKE keychains are specified correctly
IPsec SA negotiation failed because no matching IPsec transform sets were found
IPsec SA negotiation failed due to invalid identity information
Configuring IKEv2
Overview
IKEv2 negotiation process
New features in IKEv2
Protocols and standards
IKEv2 configuration task list
Configuring an IKEv2 profile
Configuring an IKEv2 policy
Configuring an IKEv2 proposal
Configuring an IKEv2 keychain
Configure global IKEv2 parameters
Enabling the cookie challenging feature
Configuring the IKEv2 DPD feature
Configuring the IKEv2 NAT keepalive feature
Configuring IKEv2 address pools
Displaying and maintaining IKEv2
IKEv2 configuration examples
IKEv2 with pre-shared key authentication configuration example
IKEv2 with RSA signature authentication configuration example
IKEv2 with NAT traversal configuration example
Troubleshooting IKEv2
IKEv2 negotiation failed because no matching IKEv2 proposals were found
IPsec SA negotiation failed because no matching IPsec transform sets were found
IPsec tunnel establishment failed
Configuring SSH
Overview
How SSH works
SSH authentication methods
FIPS compliance
Configuring the device as an SSH server
SSH server configuration task list
Generating local key pairs
Enabling the Stelnet server
Enabling the SFTP server
Enabling the SCP server
Enabling NETCONF over SSH
Configuring the user lines for SSH login
Configuring a client's host public key
Configuring an SSH user
Configuring the SSH management parameters
Configuring the device as an Stelnet client
Stelnet client configuration task list
Generating local key pairs
Specifying the source IP address for SSH packets
Establishing a connection to an Stelnet server
Configuring the device as an SFTP client
SFTP client configuration task list
Generating local key pairs
Specifying the source IP address for SFTP packets
Establishing a connection to an SFTP server
Working with SFTP directories
Working with SFTP files
Displaying help information
Terminating the connection with the SFTP server
Configuring the device as an SCP client
SCP client configuration task list
Generating local key pairs
Establishing a connection to an SCP server
Specifying algorithms for SSH2
Specifying key exchange algorithms for SSH2
Specifying public key algorithms for SSH2
Specifying encryption algorithms for SSH2
Specifying MAC algorithms for SSH2
Configuring SSH redirect
SSH redirect overview
Feature and hardware compatibility
Configuration restrictions and guidelines
Configuration prerequisites
Configuration procedure
Displaying and maintaining SSH
Stelnet configuration examples
Password authentication enabled Stelnet server configuration example
Publickey authentication enabled Stelnet server configuration example
Password authentication enabled Stelnet client configuration example
Publickey authentication enabled Stelnet client configuration example
SFTP configuration examples
Password authentication enabled SFTP server configuration example
Publickey authentication enabled SFTP client configuration example
SCP configuration example
Network requirements
Configuration procedure
NETCONF over SSH configuration example
Network requirements
Configuration procedure
Verifying the configuration
Configuring SSL
Overview
SSL security services
SSL protocol stack
FIPS compliance
SSL configuration task list
Configuring an SSL server policy
Configuring an SSL client policy
Displaying and maintaining SSL
SSL server policy configuration example
Configuring ASPF
Overview
ASPF basic concepts
ASPF inspections
Command and hardware compatibility
ASPF configuration task list
Configuring an ASPF policy
Applying an ASPF policy to an interface
Applying an ASPF policy to a zone pair
Enabling ICMP error message sending for packet dropping by security policies applied to zone pairs
Displaying and maintaining ASPF
ASPF configuration examples
ASPF FTP application inspection configuration example
ASPF TCP application inspection configuration example
ASPF H.323 application inspection configuration example
ASPF application to a zone pair configuration example
Configuring APR
Overview
PBAR
NBAR
Application group
APR signature database management
Command and hardware compatibility
Licensing requirements
APR configuration task list
Configuring PBAR
Configuring a user-defined NBAR rule
Configuring application groups
Enabling application statistics on an interface
Managing the APR signature database
Scheduling an automatic update for the APR signature database
Triggering an automatic update for the APR signature database
Performing a manual update for the APR signature database
Rolling back the APR signature database
Displaying and maintaining APR
APR configuration examples
PBAR configuration example
NBAR configuration example
Managing sessions
Overview
Session management operation
Session management functions
Command and hardware compatibility
Session management task list
Setting the session aging time for different protocol states
Setting the session aging time for different application layer protocols or applications
Specifying persistent sessions
Enabling session statistics collection
Specifying the loose mode for session state machine
Configuring session logging
Displaying and maintaining session management
Configuring connection limits
Overview
Command and hardware compatibility
Configuration task list
Creating a connection limit policy
Configuring the connection limit policy
Applying the connection limit policy
Displaying and maintaining connection limits
Connection limit configuration example
Network requirements
Configuration procedure
Verifying the configuration
Troubleshooting connection limits
ACLs in the connection limit rules with overlapping segments
Configuring object groups
Overview
Configuring an IPv4 address object group
Configuring an IPv6 address object group
Configuring a port object group
Configuring a service object group
Displaying and maintaining object groups
Configuring object policies
Overview
Object policy rules
Rule numbering
Rule match order
Rule description
Command and hardware compatibility
Object policy configuration task list
Configuration prerequisites
Creating object policies
Creating an IPv4 object policy
Creating an IPv6 object policy
Configuring object policy rules
Configuring an IPv4 object policy rule
Configuring an IPv6 object policy rule
Applying object policies to zone pairs
Changing the rule match order
Enabling rule matching acceleration
Displaying and maintaining object policies
Object policy configuration example
Network requirements
Configuration procedure
Verifying the configuration
Configuring attack detection and prevention
Overview
Command and hardware compatibility
Attacks that the device can prevent
Single-packet attacks
Scanning attacks
Flood attacks
Login dictionary attack
Blacklist
IP blacklist
User blacklist
Address object group blacklist
Whitelist
Address object group whitelist
Client verification
TCP client verification
DNS client verification
HTTP client verification
Attack detection and prevention configuration task list
Configuring an attack defense policy
Creating an attack defense policy
Configuring a single-packet attack defense policy
Configuring a scanning attack defense policy
Configuring a flood attack defense policy
Configuring attack detection exemption
Applying an attack defense policy to an interface
Applying an attack defense policy to the device
Enabling log non-aggregation for single-packet attack events
Configuring TCP client verification
Configuring DNS client verification
Configuring HTTP client verification
Configuring the IP blacklist
Configuring the user blacklist
Configuring the address object group blacklist
Configuring the address object group whitelist
Enabling the login delay
Displaying and maintaining attack detection and prevention
Attack detection and prevention configuration examples
Interface-based attack detection and prevention configuration example
IP blacklist configuration example
User blacklist configuration example
Address object group blacklist configuration example
Address object group whitelist configuration example
Interface-based TCP client verification configuration example
Interface-based DNS client verification configuration example
Interface-based HTTP client verification configuration example
Configuring IP source guard
Overview
Static IPSG bindings
Dynamic IPSG bindings
Command and hardware compatibility
IPSG configuration task list
Configuring the IPv4SG feature
Enabling IPv4SG on an interface
Configuring a static IPv4SG binding
Configuring the IPv6SG feature
Enabling IPv6SG on an interface
Configuring a static IPv6SG binding
Displaying and maintaining IPSG
IPSG configuration examples
Static IPv4SG configuration example
Dynamic IPv4SG using DHCP snooping configuration example
Static IPv6SG configuration example
Dynamic IPv6SG using DHCPv6 snooping configuration example
Configuring ARP attack protection
Command and hardware compatibility
ARP attack protection configuration task list
Configuring unresolvable IP attack protection
Configuring ARP source suppression
Configuring ARP blackhole routing
Displaying and maintaining unresolvable IP attack protection
Configuration example
Configuring source MAC-based ARP attack detection
Configuration procedure
Displaying and maintaining source MAC-based ARP attack detection
Configuration example
Configuring ARP packet source MAC consistency check
Configuring ARP active acknowledgement
Configuring authorized ARP
Configuration procedure
Configuration example (on a DHCP server)
Configuration example (on a DHCP relay agent)
Configuring ARP attack detection
Configuring user validity check
Configuring ARP packet validity check
Configuring ARP restricted forwarding
Displaying and maintaining ARP attack detection
User validity check and ARP packet validity check configuration example
ARP restricted forwarding configuration example
Configuring ARP scanning and fixed ARP
Configuration restrictions and guidelines
Configuration procedure
Configuring ARP gateway protection
Configuration guidelines
Configuration procedure
Configuration example
Configuring ARP filtering
Configuration guidelines
Configuration procedure
Configuration example
Configuring uRPF
Overview
uRPF check modes
Features
uRPF operation
Network application
Command and hardware compatibility
Enabling uRPF
Displaying and maintaining uRPF
uRPF configuration example for interfaces
Configuring IPv6 uRPF
Overview
IPv6 uRPF check modes
Features
IPv6 uRPF operation
Network application
Command and hardware compatibility
Enabling IPv6 uRPF
Displaying and maintaining IPv6 uRPF
IPv6 uRPF configuration example for interfaces
Configuring crypto engines
Overview
Command and hardware compatibility
Displaying and maintaining crypto engines
Configuring FIPS
Overview
Configuration restrictions and guidelines
Configuring FIPS mode
Entering FIPS mode
Configuration changes in FIPS mode
Exiting FIPS mode
FIPS self-tests
Power-up self-tests
Conditional self-tests
Triggering self-tests
Displaying and maintaining FIPS
FIPS configuration examples
Entering FIPS mode through automatic reboot
Entering FIPS mode through manual reboot
Exiting FIPS mode through automatic reboot
Exiting FIPS mode through manual reboot
Document conventions and icons
Conventions
Network topology icons
Support and other resources
Accessing Hewlett Packard Enterprise Support
Accessing updates
Websites
Customer self repair
Remote support
Documentation feedback