143
© 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Technical Training E.09.xx software update for the ProCurve 5300 series switch products Dec 2004

E.09.xx software update for the ProCurve 5300 series switch products

  • Upload
    garima

  • View
    56

  • Download
    2

Embed Size (px)

DESCRIPTION

Technical Training. E.09.xx software update for the ProCurve 5300 series switch products. Dec 2004. E.09.xx firmware update for the ProCurve 5300 series switch products. New Features Connection Rate Filtering (Virus Throttling). - PowerPoint PPT Presentation

Citation preview

Page 1: E.09.xx software update for the ProCurve 5300 series switch products

© 2004 Hewlett-Packard Development Company, L.P.The information contained herein is subject to change without notice.

Technical Training

E.09.xx software update for the ProCurve 5300 series switch products

Dec 2004

Page 2: E.09.xx software update for the ProCurve 5300 series switch products

2

E.09.xx firmware update for the ProCurve 5300 series switch products New Features• Connection Rate Filtering (Virus Throttling)

Page 3: E.09.xx software update for the ProCurve 5300 series switch products

3

E.09.xx firmware update for the ProCurve 5300 series switch products New Features• Connection Rate Filtering (Virus Throttling)• Multiple 802.1X users per port• Concurrent 802.1X and MAC Auth or Web Auth• 802.1X Guest Vlan• Radius authentication for switch manager login

Page 4: E.09.xx software update for the ProCurve 5300 series switch products

4

E.09.xx firmware update for the ProCurve 5300 series switch products New Features• Connection Rate Filtering (Virus Throttling)• Multiple 802.1X users per port• Concurrent 802.1X and MAC Auth or Web Auth• 802.1X Guest Vlan• Radius authentication for switch manager login• UDP directed broadcast forwarding

Page 5: E.09.xx software update for the ProCurve 5300 series switch products

5

E.09.xx firmware update for the ProCurve 5300 series switch products New Features• Connection Rate Filtering (Virus Throttling)• Multiple 802.1X users per port• Concurrent 802.1X and MAC Auth or Web Auth• 802.1X Guest Vlan• Radius authentication for switch manager login• UDP directed broadcast forwarding• 802.1ab Link Layer Discovery Protocol (LLDP)

Page 6: E.09.xx software update for the ProCurve 5300 series switch products

6

E.09.xx firmware update for the ProCurve 5300 series switch products New Features• Connection Rate Filtering (Virus Throttling)• Multiple 802.1X users per port• Concurrent 802.1X and MAC Auth or Web Auth• 802.1X Guest Vlan• Radius authentication for switch manager login• 802.1ab Link Layer Discovery Protocol (LLDP)• UDP directed broadcast forwarding• Multiple configuration files

Page 7: E.09.xx software update for the ProCurve 5300 series switch products

The Geek Translation

hp

Page 8: E.09.xx software update for the ProCurve 5300 series switch products

The Geek Translation

Cold Raw Dead Fish

hp

Page 9: E.09.xx software update for the ProCurve 5300 series switch products

The Geek Translation

Cold Raw Dead Fish

hp

Page 10: E.09.xx software update for the ProCurve 5300 series switch products

The Geek Translation

Connection Rate

FilteringCold Raw Dead Fish

hp

Page 11: E.09.xx software update for the ProCurve 5300 series switch products

11

Connection Rate Filtering Most anti-virus software works by preventing infection

Works well but occasionally fails

When it fails, the virus can spread very rapidly and cause lots of damage• Many infected machines• Clogged networks

Example – SQLSlammer, MS-Blaster, SASSER

Page 12: E.09.xx software update for the ProCurve 5300 series switch products

12

Connection Rate Filtering Most anti-virus software works by preventing infection

Works well but occasionally fails

When it fails, the virus can spread very rapidly and cause lots of damage• Many infected machines• Clogged networks

Example – SQLSlammer, MS-Blaster, SASSER

05:29 Jan 25 ‘03 – 0 infected

Page 13: E.09.xx software update for the ProCurve 5300 series switch products

13

Connection Rate Filtering Most anti-virus software works by preventing infection

Works well but occasionally fails

When it fails, the virus can spread very rapidly and cause lots of damage• Many infected machines• Clogged networks

Example – SQLSlammer, MS-Blaster, SASSER

05:29 Jan 25 ‘03 – 0 infected

06:00 Jan 25 ‘03 – 74855 infected

Page 14: E.09.xx software update for the ProCurve 5300 series switch products

17

Connection Rate Filtering

What does CRF do to reduce the threat?

Page 15: E.09.xx software update for the ProCurve 5300 series switch products

18

Connection Rate Filtering

What does CRF do to reduce the threat?• Filter function based on connection rate

only

Page 16: E.09.xx software update for the ProCurve 5300 series switch products

19

Connection Rate Filtering

What does CRF do to reduce the threat?• Filter function based on connection rate only• Does not look inside packets for signatures

Page 17: E.09.xx software update for the ProCurve 5300 series switch products

20

Connection Rate Filtering

What does CRF do to reduce the threat?• Filter function based on connection rate only• Does not look inside packets for signatures• Functions only on routed traffic (NOT on

switched traffic)

Page 18: E.09.xx software update for the ProCurve 5300 series switch products

21

Connection Rate Filtering

What does CRF do to reduce the threat?• Filter function based on connection rate only• Does not look inside packets for signatures• Functions only on routed traffic (NOT on switched

traffic)• Many valid nodes will create false positives

Page 19: E.09.xx software update for the ProCurve 5300 series switch products

22

Connection Rate Filtering

What does CRF do to reduce the threat?• Filter function based on connection rate only• Does not look inside packets for signatures• Functions only on routed traffic (NOT on switched

traffic)• Many valid nodes will create false positives• Must be manually configured

Page 20: E.09.xx software update for the ProCurve 5300 series switch products

23

Connection Rate Filtering

What does CRF do to reduce the threat?• Filter function based on connection rate only• Does not look inside packets for signatures• Functions only on routed traffic (NOT on switched

traffic)• Many valid nodes will create false positives• Must be manually configured• Must configure Sensitivity and Response

Page 21: E.09.xx software update for the ProCurve 5300 series switch products

24

Connection Rate FilteringSensitivity

Page 22: E.09.xx software update for the ProCurve 5300 series switch products

25

Connection Rate FilteringSensitivity

Connection Rate Filtering Sensitivity

Max interval between new IP connection requests from same source

Number of New connections without exceeding max interval Penalty Period

Low 0.1 Second 54 <30 Seconds

Medium 1.0 second 37 30 - 60 Seconds

High 1.0 second 22 60 - 90 Seconds

Aggressive 1.0 second 15 90 - 120 Seconds

Page 23: E.09.xx software update for the ProCurve 5300 series switch products

26

Connection Rate FilteringSensitivity

Connection Rate Filtering Sensitivity

Max interval between new IP connection requests from same source

Number of New connections without exceeding max interval Penalty Period

Low 0.1 Second 54 <30 Seconds

Medium 1.0 second 37 30 - 60 Seconds

High 1.0 second 22 60 - 90 Seconds

Aggressive 1.0 second 15 90 - 120 Seconds

Example: At medium sensitivity, a host may be trigger the filter by issuing 37 new outbound connections in a 36 second period if the gap between any two new connections does not exceed 1 second. When there is a gap that exceeds 1 second, the counter is reset.

Page 24: E.09.xx software update for the ProCurve 5300 series switch products

27

Connection Rate Filtering Response

• notify-only– Generates event log entry and trap event when

sensitivity threshold exceeded

Page 25: E.09.xx software update for the ProCurve 5300 series switch products

28

Connection Rate Filtering Response

• notify-only– Generates event log entry and trap event when

sensitivity threshold exceeded• throttle

– Generates event log and trap and then blocks routing of traffic from offending host for penalty period defined by sensitivity

– After penalty period the function is reset and routing resumes

Page 26: E.09.xx software update for the ProCurve 5300 series switch products

29

Connection Rate Filtering Response

• notify-only– Generates event log entry and trap event when sensitivity

threshold exceeded• throttle

– Generates event log and trap and then blocks routing of traffic from offending host for penalty period defined by sensitivity

– After penalty period the function is reset and routing resumes

• block– Generates event log and trap and then blocks

routing of traffic from offending host until manually reset by administrator

Page 27: E.09.xx software update for the ProCurve 5300 series switch products

30

Connection Rate Filtering Typical deployment scenario (not set and forget)

Page 28: E.09.xx software update for the ProCurve 5300 series switch products

31

Connection Rate Filtering Typical deployment scenario (not set and forget)• Deploy in notify-only mode

Page 29: E.09.xx software update for the ProCurve 5300 series switch products

32

Connection Rate Filtering Typical deployment scenario (not set and forget)• Deploy in notify-only mode• Set sensitivity to low

Page 30: E.09.xx software update for the ProCurve 5300 series switch products

33

Connection Rate Filtering Typical deployment scenario (not set and forget)• Deploy in notify-only mode• Set sensitivity to low• Monitor the nodes that are triggering

Page 31: E.09.xx software update for the ProCurve 5300 series switch products

34

Connection Rate Filtering Typical deployment scenario (not set and forget)• Deploy in notify-only mode• Set sensitivity to low• Monitor the nodes that are triggering• Determine the characteristic of valid traffic

from those nodes

Page 32: E.09.xx software update for the ProCurve 5300 series switch products

35

Connection Rate Filtering Typical deployment scenario (not set and forget)• Deploy in notify-only mode• Set sensitivity to low• Monitor the nodes that are triggering• Determine the characteristic of valid traffic from

those nodes• Increase sensitivity, or create an exception

ACL for nodes generating false positives

Page 33: E.09.xx software update for the ProCurve 5300 series switch products

36

Connection Rate Filtering Typical deployment scenario (not set and forget)• Deploy in notify-only mode• Set sensitivity to low• Monitor the nodes that are triggering• Determine the characteristic of valid traffic from

those nodes• Increase sensitivity, or create an exception ACL

for nodes generating false positives• Activate throttling or blocking

Page 34: E.09.xx software update for the ProCurve 5300 series switch products

37

Connection Rate Filtering Typical deployment scenario (not set and forget)• Deploy in notify-only mode• Set sensitivity to low• Monitor the nodes that are triggering• Determine the characteristic of valid traffic from

those nodes• Increase sensitivity, or create an exception ACL

for nodes generating false positives• Activate throttling or blocking• Monitor and adjust

Page 35: E.09.xx software update for the ProCurve 5300 series switch products

38

Connection Rate Filtering What to do with nodes generating legitimate traffic that triggers the CRF?

Use of connection-rate ACLs provides the option to apply exceptions to the configured connection-rate filtering policy.

■ A trusted server exhibiting a relatively high IP connection rate due to heavy demand

■ A trusted traffic source on the same port as other, untrusted traffic sources.

Page 36: E.09.xx software update for the ProCurve 5300 series switch products

39

Connection Rate Filtering Basic CLI commands [no] connection-rate-filter sensitivity < low | medium | high | aggressive >

Global enable/disable and global sensitivity

Page 37: E.09.xx software update for the ProCurve 5300 series switch products

40

Connection Rate Filtering Basic CLI commands [no] connection-rate-filter sensitivity < low | medium | high | aggressive >

Global enable/disable and global sensitivity

Reboot the switch after running this command to enable/disable or change CRF sensitivity!

Page 38: E.09.xx software update for the ProCurve 5300 series switch products

41

Connection Rate Filtering Basic CLI commands [no] filter connection-rate [eth] port-list <notify-only | throttle | block>

Port based configuration of the response

Page 39: E.09.xx software update for the ProCurve 5300 series switch products

42

Connection Rate Filtering Basic CLI commands [no] ip access-list connection-rate-filter name-str

< ignore | filter > ip < any | host src-ip-addr | src-ip-addr src-ip-mask | src-ip-addr/mask

>< ignore | filter > < udp | tcp >< any | host src-ip-addr | src-ip-addr src-ip-mask | src-ip-addr/mask

>< source-port | destination-port | all-ports >

Page 40: E.09.xx software update for the ProCurve 5300 series switch products

43

Connection Rate Filtering Basic CLI commands [no] ip access-list connection-rate-filter name-str

< ignore | filter > ip < any | host src-ip-addr | src-ip-addr src-ip-mask | src-ip-addr/mask

>< ignore | filter > < udp | tcp >< any | host src-ip-addr | src-ip-addr src-ip-mask | src-ip-addr/mask

>< source-port | destination-port | all-ports >

ACLs are ONLY required as exceptions to the CRF policy

Page 41: E.09.xx software update for the ProCurve 5300 series switch products

44

Connection Rate Filtering Config Example

Page 42: E.09.xx software update for the ProCurve 5300 series switch products

45

Connection Rate Filtering Config example Connection Rate ACL

Page 43: E.09.xx software update for the ProCurve 5300 series switch products

46

Connection Rate Filtering - Summary CRF is not set and forget

Page 44: E.09.xx software update for the ProCurve 5300 series switch products

47

Connection Rate Filtering - Summary CRF is not set and forget Operates ONLY on routed traffic

Page 45: E.09.xx software update for the ProCurve 5300 series switch products

48

Connection Rate Filtering - Summary CRF is not set and forget Operates ONLY on routed traffic Requires a switch reboot after enabling, disabling or changing sensitivity of CRF

Page 46: E.09.xx software update for the ProCurve 5300 series switch products

49

Connection Rate Filtering - Summary CRF is not set and forget Operates ONLY on routed traffic Requires a switch reboot after enabling, disabling or changing sensitivity of CRF

Once a host has been blocked, it remains in this state regardless of the port setting – must unblock explicitly

Page 47: E.09.xx software update for the ProCurve 5300 series switch products

50

Connection Rate Filtering - Summary CRF is not set and forget Operates ONLY on routed traffic Requires a switch reboot after enabling, disabling or changing sensitivity of CRF

Once a host has been blocked, it remains in this state regardless of the port setting – must unblock explicitly

CRF is host based (host is blocked, not port)

Page 48: E.09.xx software update for the ProCurve 5300 series switch products

51

Connection Rate Filtering - Summary CRF is not set and forget Operates ONLY on routed traffic Requires a switch reboot after enabling, disabling or changing sensitivity of CRF

Once a host has been blocked, it remains in this state regardless of the port setting – must unblock explicitly

CRF is host based (host is blocked, not port) Sensitivity is set globally, response is set per port, filtering is host based

Page 49: E.09.xx software update for the ProCurve 5300 series switch products

52

Connection Rate Filtering - Benefits Behavior based

Page 50: E.09.xx software update for the ProCurve 5300 series switch products

53

Connection Rate Filtering - Benefits Behavior based Handles unknown worms

Page 51: E.09.xx software update for the ProCurve 5300 series switch products

54

Connection Rate Filtering - Benefits Behavior based Handles unknown worms No signature file

Page 52: E.09.xx software update for the ProCurve 5300 series switch products

55

Connection Rate Filtering - Benefits Behavior based Handles unknown worms No signature file Slows or stops routing of suspect traffic

Page 53: E.09.xx software update for the ProCurve 5300 series switch products

56

Connection Rate Filtering - Benefits Behavior based Handles unknown worms No signature file Slows or stops routing of suspect traffic Allows switch to continue to operate during attack

Page 54: E.09.xx software update for the ProCurve 5300 series switch products

57

Connection Rate Filtering - Benefits Behavior based Handles unknown worms No signature file Slows or stops routing of suspect traffic Allows switch to continue to operate during attack Event log and traps help identify the attacker

Page 55: E.09.xx software update for the ProCurve 5300 series switch products

58

Connection Rate Filtering - Benefits Behavior based Handles unknown worms No signature file Slows or stops routing of suspect traffic Allows switch to continue to operate during attack Event log and traps help identify the attacker Notifies IT and allows time to respond

Page 56: E.09.xx software update for the ProCurve 5300 series switch products

59

Connection Rate Filtering lab• Requires any 5300 switch and one windows PC with traffic

generation tool installed– Configure routable vlans– Set various sensitivities and responses– Generate traffic to be routed– Observe behavior

Page 57: E.09.xx software update for the ProCurve 5300 series switch products

www.hp.com/go/hpprocurve

Q&AConnection Rate Filtering

Page 58: E.09.xx software update for the ProCurve 5300 series switch products

61

Multiple 802.1X users per port – Current Situation

- one client per one 802.1X enabled switch port

Page 59: E.09.xx software update for the ProCurve 5300 series switch products

62

Multiple 802.1X users per port – Current Situation

- one client per one 802.1X enabled switch port- protocol uses multicast address

Page 60: E.09.xx software update for the ProCurve 5300 series switch products

63

Multiple 802.1X users per port – Current Situation

- one client per one 802.1X enabled switch port- protocol uses multicast address- port based authentication

Page 61: E.09.xx software update for the ProCurve 5300 series switch products

64

Multiple 802.1X users per port – Current Situation

- one client per one 802.1X enabled switch port- protocol uses multicast address- port based authentication

- successful authentication by a client opens the port for all traffic

Page 62: E.09.xx software update for the ProCurve 5300 series switch products

65

Multiple 802.1X users per port – Current Situation

- one client per one 802.1X enabled switch port- protocol uses multicast address- port based authentication

- successful authentication by a client opens the port for all traffic

- piggy back attack relatively easy

Page 63: E.09.xx software update for the ProCurve 5300 series switch products

66

Multiple 802.1X users per port – E.09.xx- Supports up to 32 802.1X clients per port

Page 64: E.09.xx software update for the ProCurve 5300 series switch products

67

Multiple 802.1X users per port – E.09.xx- Supports up to 32 802.1X clients per port- All authenticated clients must use the same UNTAGGED Vlan

Page 65: E.09.xx software update for the ProCurve 5300 series switch products

68

Multiple 802.1X users per port – E.09.xx- Supports up to 32 802.1X clients per port- All authenticated clients must use the same UNTAGGED Vlan- Each instance must be associated with a particular source MAC address

Page 66: E.09.xx software update for the ProCurve 5300 series switch products

69

Multiple 802.1X users per port – E.09.xx- Supports up to 32 802.1X clients per port- All authenticated clients must use the same UNTAGGED Vlan- Each instance must be associated with a particular source MAC address- Associated instance must use only its associated source MAC address as dest. address for 802.1X packets (will prevent confusion of other 802.1X clients connected to the same port)

Page 67: E.09.xx software update for the ProCurve 5300 series switch products

70

Multiple 802.1X users per port – E.09.xx- Supports up to 32 802.1X clients per port- All authenticated clients must use the same UNTAGGED Vlan- Each instance must be associated with a particular source MAC address- Associated instance must use only its associated source MAC address as dest address for 802.1X packets (will prevent confusion of other 802.1X clients connected to the same port)

- An 802.1X protocol instance must be able to receive unicast 802.1X packets

Page 68: E.09.xx software update for the ProCurve 5300 series switch products

71

Multiple 802.1X users per port – E.09.xx- Supports up to 32 802.1X clients per port- All authenticated clients must use the same UNTAGGED Vlan- Each instance must be associated with a particular source MAC address- Associated instance must use only its associated source MAC address as dest address for 802.1X packets (will prevent confusion of other 802.1X clients connected to the same port)

- An 802.1X protocol instance must be able to receive unicast 802.1X packets - Authentication is client based

Page 69: E.09.xx software update for the ProCurve 5300 series switch products

72

Multiple 802.1X users per port – E.09.xx- Supports up to 32 802.1X clients per port- All authenticated clients must use the same UNTAGGED Vlan- Each instance must be associated with a particular source MAC address- Associated instance must use only its associated source MAC address as dest address for 802.1X packets (will prevent confusion of other 802.1X clients connected to the same port)

- An 802.1X protocol instance must be able to receive unicast 802.1X packets - Authentication is client based

- successful authentication by a client opens port to traffic with the authenticators SA only

Page 70: E.09.xx software update for the ProCurve 5300 series switch products

73

Multiple 802.1X users per port – E.09.xx[no] aaa port-access authenticator < [ethernet] <port-list>[control | client-limit |quiet-period | tx-period | supplicant-timeout | server-timeout | max-requests | reauth-period | auth-vid | unauth-vid | initialize | reauthenticate | clear-statistics | logoff-period]

Page 71: E.09.xx software update for the ProCurve 5300 series switch products

74

Multiple 802.1X users per port – E.09.xx[no] aaa port-access authenticator < [ethernet] <port-list>[control | client-limit |quiet-period | tx-period | supplicant-timeout | server-timeout | max-requests | reauth-period | auth-vid | unauth-vid | initialize | reauthenticate | clear-statistics | logoff-period]

Default client limit is 1. Need to explicitly enter value >1 to enable multiple authenticated clients per port

Page 72: E.09.xx software update for the ProCurve 5300 series switch products

75

Multiple 802.1X users per port – E.09.xx[no] aaa port-access authenticator < [ethernet] <port-list>[control | client-limit |quiet-period | tx-period | supplicant-timeout | server-timeout | max-requests | reauth-period | auth-vid | unauth-vid | initialize | reauthenticate | clear-statistics | logoff-period]

Default client limit is 1. Need to explicitly enter value >1 to enable multiple authenticated clients per port

There is no port-based authentication with E.09.xx! All 802.1x authentication in this revision is client based

Page 73: E.09.xx software update for the ProCurve 5300 series switch products

76

Multiple 802.1X users per port – E.09.xx[no] aaa port-access authenticator < [ethernet] <port-list>[control | client-limit |quiet-period | tx-period | supplicant-timeout | server-timeout | max-requests | reauth-period | auth-vid | unauth-vid | initialize | reauthenticate | clear-statistics | logoff-period]

Default client limit is 1. Need to explicitly enter value >1 to enable multiple authenticated clients per port.

There is no port-based authentication with E.09.xx! All 802.1x authentication in this revision is client based

#show config (no port based show command for client limit)..aaa port-access authenticator B2aaa port-access authenticator B2 client-limit 18aaa port-access authenticator active.

Page 74: E.09.xx software update for the ProCurve 5300 series switch products

77

Multiple 802.1X users per port – E.09.xx

5300

5300

uplink

Is this a valid configuration?

Page 75: E.09.xx software update for the ProCurve 5300 series switch products

78

Multiple 802.1X users per port – E.09.xx

5300

5300

uplink

Is this a valid configuration?With 802.1X authentication on uplink?

supplicant

authenticator

Page 76: E.09.xx software update for the ProCurve 5300 series switch products

79

Multiple 802.1X users per port – E.09.xx

5300

5300

uplink

Is this a valid configuration?With 802.1X authentication on uplink?What about mixed revisions?

supplicant

authenticator

E.08.xx

E.09.xx

Page 77: E.09.xx software update for the ProCurve 5300 series switch products

80

Multiple 802.1X users per port – E.09.xx

5300

5300

uplink

Is this a valid configuration?With 802.1X authentication on uplink?What about mixed revisions?Conclusion?

E.08.xx

E.09.xx

supplicant

authenticator

Page 78: E.09.xx software update for the ProCurve 5300 series switch products

81

Multiple 802.1X users per port – E.09.xx

5300

5300

uplink

Is this a valid configuration?With 802.1X authentication on uplink?What about mixed revisions?Conclusion?

E.08.xx

E.09.xx

supplicant

authenticator

Do not enable 802.1X authentication on uplinks!

Page 79: E.09.xx software update for the ProCurve 5300 series switch products

82

Multiple 802.1X users per port – E.09.xx Summary

•Prior to E.09.xx, 802.1X was port based•E.09.xx is client based

•Possible to run into supplicant incompatibilities or cases where implementation relied on port based behavior

•Not appropriate for switch uplink ports•Maximum of 32 authenticated clients per port•Default client-limit is 1

Page 80: E.09.xx software update for the ProCurve 5300 series switch products

83

Concurrent 802.1X and web or MAC auth Prior to E.09.xx, 802.1X and Web/MAC auth were mutually exclusive features

Page 81: E.09.xx software update for the ProCurve 5300 series switch products

84

Concurrent 802.1X and web or MAC auth Prior to E.09.xx, 802.1X and Web/MAC auth were mutually exclusive features

E.09.xx allows the simultaneous operation of 802.1X and Web/MAC Auth on the same port

Page 82: E.09.xx software update for the ProCurve 5300 series switch products

85

Concurrent 802.1X and web or MAC auth Prior to E.09.xx, 802.1X and Web/MAC auth were mutually exclusive features

E.09.xx allows the simultaneous operation of 802.1X and Web/MAC Auth on the same port

Concurrent 802.1X and Web Auth operation OR concurrent 802.1X and MAC Auth operation. The ability to run all three (802.1X, Web Auth, MAC Auth) concurrently does not exist

Page 83: E.09.xx software update for the ProCurve 5300 series switch products

86

Concurrent 802.1X and web or MAC auth Prior to E.09.xx, 802.1X and Web/MAC auth were mutually exclusive features

E.09.xx allows the simultaneous operation of 802.1X and Web/MAC Auth on the same port

Concurrent 802.1X and Web Auth operation OR concurrent 802.1X and MAC Auth operation. The ability to run all three (802.1X, Web Auth, MAC Auth) concurrently does not exist

Useful for migration where all clients do not have supplicant

Page 84: E.09.xx software update for the ProCurve 5300 series switch products

87

Concurrent 802.1X and web or MAC auth Prior to E.09.xx, 802.1X and Web/MAC auth were mutually exclusive features

E.09.xx allows the simultaneous operation of 802.1X and Web/MAC Auth on the same port

Concurrent 802.1X and Web Auth operation OR concurrent 802.1X and MAC Auth operation. The ability to run all three (802.1X, Web Auth, MAC Auth) concurrently does not exist

Useful for migration where all clients do not have supplicant Popular example is the Mitel configuration

Page 85: E.09.xx software update for the ProCurve 5300 series switch products

88

Concurrent 802.1X and web or MAC auth Prior to E.09.xx, 802.1X and Web/MAC auth were mutually exclusive features

E.09.xx allows the simultaneous operation of 802.1X and Web/MAC Auth on the same port

Concurrent 802.1X and Web Auth operation OR concurrent 802.1X and MAC Auth operation. The ability to run all three (802.1X, Web Auth, MAC Auth) concurrently does not exist

Useful for migration where all clients do not have supplicant Popular example is the Mitel configuration Total number of clients; 802.1x, web auth, MAC auth, must not exceed 32 on a port

Page 86: E.09.xx software update for the ProCurve 5300 series switch products

89

Concurrent 802.1X and web or MAC auth802.1x Port Control State

Web or MAC Auth State

Action

Auto Disabled 802.1X performs authentication

Auto Enabled Hybrid authentication, 802.1X authentication result takes precedence to Web or MAC Auth authentication result

Force Authorized Disabled All clients granted access

Force Authorized Enabled Web or MAC auth perform authentication

Force Unauthorized

Don’t Care All clients denied access

Page 87: E.09.xx software update for the ProCurve 5300 series switch products

90

Concurrent 802.1X and web or MAC auth and Multiple 802.1X users per port

aaa port-access authenticator <port-list> [control <authorized | auto | unauthorized>][client-limit]

Page 88: E.09.xx software update for the ProCurve 5300 series switch products

91

Concurrent 802.1X and web or MAC auth and Multiple 802.1X users per port

aaa port-access authenticator <port-list> [control <authorized | auto | unauthorized>][client-limit]

AND aaa port-access web-based [e] < port-list >

Page 89: E.09.xx software update for the ProCurve 5300 series switch products

92

Concurrent 802.1X and web or MAC auth and Multiple 802.1X users per port

aaa port-access authenticator <port-list> [control <authorized | auto | unauthorized>][client-limit]

AND aaa port-access web-based [e] < port-list > OR aaa port-access mac-based [e] < port-list >

Page 90: E.09.xx software update for the ProCurve 5300 series switch products

93

Concurrent 802.1X and web or MAC auth and Multiple 802.1X users per port

aaa port-access authenticator <port-list> [control <authorized | auto | unauthorized>][client-limit]

AND aaa port-access web-based [e] < port-list > OR aaa port-access mac-based [e] < port-list >

show config..aaa port-access authenticator B2aaa port-access authenticator B2 client-limit 18aaa port-access authenticator activeaaa port-access mac-based B2..

Page 91: E.09.xx software update for the ProCurve 5300 series switch products

94

Concurrent 802.1X and web or MAC auth and Multiple 802.1X users per port

The Competition: Enterasys has addressed the problem by allowing multiple 802.1X sessions to concurrently run on a port, with client traffic ultimately filtered by authorized client

Enterasys allows concurrency between their 802.1X and Mac authentication features, however not between their 802.1x and Web Auth features.

Extreme Networks allows concurrency between their 802.1X and Web Auth features. They don’t have MAC auth feature.

Page 92: E.09.xx software update for the ProCurve 5300 series switch products

95

Concurrent MAC/802.1X example

PC

Configured to use 802.1X authentication

Data vlan = 2 (untagged)

IP Phone

Configured to use MAC authentication

Voice vlan = 50 (tagged)

5300 switch running E.09.xx code

Authenticates phone with MAC auth

Authenticates PC via 802.1X

Page 93: E.09.xx software update for the ProCurve 5300 series switch products

96

802.1X Guest VLAN In earlier releases, a “friendly” client computer not running 802.1X supplicant software could not be authenticated on a port protected by 802.1X access security

As a result, the port would become blocked and the client could not access the network

Page 94: E.09.xx software update for the ProCurve 5300 series switch products

97

802.1X Guest VLAN In earlier releases, a “friendly” client computer not running 802.1X supplicant software could not be authenticated on a port protected by 802.1X access security

As a result, the port would become blocked and the client could not access the network

This prevented the client from: ■ Acquiring IP addressing from a DHCP server ■ Downloading the 802.1X supplicant software necessary for an authentication session

Page 95: E.09.xx software update for the ProCurve 5300 series switch products

98

802.1X Guest VLAN In earlier releases, a “friendly” client computer not running 802.1X supplicant software could not be authenticated on a port protected by 802.1x access security

As a result, the port would become blocked and the client could not access the network

This prevented the client from: ■ Acquiring IP addressing from a DHCP server ■ Downloading the 802.1X supplicant software necessary for an authentication session

Configuring the 802.1X Open VLAN mode on a port changes how the port responds when it detects a new client

Page 96: E.09.xx software update for the ProCurve 5300 series switch products

99

802.1X Guest VLAN The 802.1X Open VLAN mode solves this problem by temporarily suspending the port’s static VLAN memberships and placing the port in a designated Unauthorized-Client VLAN

Page 97: E.09.xx software update for the ProCurve 5300 series switch products

100

802.1X Guest VLAN The 802.1X Open VLAN mode solves this problem by temporarily suspending the port’s static VLAN memberships and placing the port in a designated Unauthorized-Client VLAN

In this state the client can proceed with initialization services, such as acquiring IP addressing and 802.1X client software, and starting the authentication process

Page 98: E.09.xx software update for the ProCurve 5300 series switch products

101

802.1X Guest VLAN The 802.1X Open VLAN mode solves this problem by temporarily suspending the port’s static VLAN memberships and placing the port in a designated Unauthorized-Client VLAN

In this state the client can proceed with initialization services, such as acquiring IP addressing and 802.1X client software, and starting the authentication process

May want to set up DHCP server and a server that can download 802.1X supplicant on the guest VLAN

Page 99: E.09.xx software update for the ProCurve 5300 series switch products

102

802.1X Guest VLAN The 802.1X Open VLAN mode solves this problem by temporarily suspending the port’s static VLAN memberships and placing the port in a designated Unauthorized-Client VLAN

In this state the client can proceed with initialization services, such as acquiring IP addressing and 802.1X client software, and starting the authentication process

May want to set up DHCP server and a server that can download 802.1X supplicant on the guest VLAN

Still want to keep the radius server on a protected VLAN

Page 100: E.09.xx software update for the ProCurve 5300 series switch products

103

802.1X Guest VLAN Use Models for 802.1X Open VLAN Modes; Unauthorized-Client VLAN Configure this VLAN when unauthenticated, friendly clients will need access to some services before being authenticated

Page 101: E.09.xx software update for the ProCurve 5300 series switch products

104

802.1X Guest VLAN Use Models for 802.1X Open VLAN Modes; Unauthorized-Client VLAN Configure this VLAN when unauthenticated, friendly clients will need access to some services before being authenticated

Authorized-Client VLAN Configure this VLAN for authenticated clients to control the untagged VLAN membership

Page 102: E.09.xx software update for the ProCurve 5300 series switch products

105

802.1X Guest VLAN summary Avoid using authorized client VLAN on ports with client-limit >1 unless all clients can operate on same untagged VLAN

Page 103: E.09.xx software update for the ProCurve 5300 series switch products

106

802.1X Guest VLAN summary Avoid using authorized client VLAN on ports with client-limit >1 unless all clients can operate on same untagged VLAN

All unauthenticated clients on an unauthorized client VLAN can communicate

Page 104: E.09.xx software update for the ProCurve 5300 series switch products

107

802.1X Guest VLAN summary Avoid using authorized client VLAN on ports with client-limit >1 unless all clients can operate on same untagged VLAN

All unauthenticated clients on an unauthorized client VLAN can communicate

With 802.1X authentication enabled:aaa port-access authenticator <port-list> [auth-vid <vlan-

id>]

Page 105: E.09.xx software update for the ProCurve 5300 series switch products

108

802.1X Guest VLAN summary Avoid using authorized client VLAN on ports with client-limit >1 unless all clients can operate on same untagged VLAN

All unauthenticated clients on an unauthorized client VLAN can communicate

With 802.1X authentication enabled:aaa port-access authenticator <port-list> [auth-vid <vlan-id>]

aaa port-access authenticator <port-list> [unauth-vid <vlan-id>]

Page 106: E.09.xx software update for the ProCurve 5300 series switch products

109

802.1X Guest VLAN summary Avoid using authorized client VLAN on ports with client-limit >1 unless all clients can operate on same untagged VLAN

All unauthenticated clients on an unauthorized client VLAN can communicate

With 802.1X authentication enabled:aaa port-access authenticator <port-list> [auth-vid <vlan-id>]

aaa port-access authenticator <port-list> [unauth-vid <vlan-id>]

Show config..aaa port-access authenticator B2 auth-vid 123..

Page 107: E.09.xx software update for the ProCurve 5300 series switch products

110

Radius authorization for switch mgr login-Same feature as released in E.08.53

Eliminates login – enable – login again to gain mgr privilege• "[no] aaa authentication login privilege-mode" • Visible by "show running-config" and "show authentication" when

enabled• Radius server service-attribute type Administrative (6) is the

manager privilege level• Radius server service-attribute type NAS-prompt (7) is just the

operator level• Applies to attempts to login via serial console, telnet, or ssh

Page 108: E.09.xx software update for the ProCurve 5300 series switch products

www.hp.com/go/hpprocurve

Q&A802.1X

Page 109: E.09.xx software update for the ProCurve 5300 series switch products

112

UDP Directed Broadcast Forwarding

Page 110: E.09.xx software update for the ProCurve 5300 series switch products

113

UDP Directed Broadcast ForwardingRouters don’t forward broadcasts generally, however it

may be desirable for example for DHCP, SNTP etc

Page 111: E.09.xx software update for the ProCurve 5300 series switch products

114

UDP Directed Broadcast ForwardingRouters don’t forward broadcasts generally, however it may be

desirable for example for DHCP, SNTP etcOnly applies when routing is enabled

Page 112: E.09.xx software update for the ProCurve 5300 series switch products

115

UDP Directed Broadcast ForwardingRouters don’t forward broadcasts generally, however it may be

desirable for example for DHCP, SNTP etcOnly applies when routing is enabledIdentifies broadcast packet to be forwarded by UDP port number

Page 113: E.09.xx software update for the ProCurve 5300 series switch products

116

UDP Directed Broadcast ForwardingRouters don’t forward broadcasts generally, however it may be

desirable for example for DHCP, SNTP etcOnly applies when routing is enabledIdentifies broadcast packet to be forwarded by UDP port number Configured on a per-VLAN basis

Page 114: E.09.xx software update for the ProCurve 5300 series switch products

117

UDP Directed Broadcast ForwardingRouters don’t forward broadcasts generally, however it may be

desirable for example for DHCP, SNTP etcOnly applies when routing is enabledIdentifies broadcast packet to be forwarded by UDP port number Configured on a per-VLAN basisThe UDP forwarder contains a server address table for each configured VLAN. Each server entry contains an IP address and an associated UDP port. A broadcast packet received on the switch will be forwarded based on this configured table

Page 115: E.09.xx software update for the ProCurve 5300 series switch products

118

UDP Directed Broadcast ForwardingRouters don’t forward broadcasts generally, however it may be

desirable for example for DHCP, SNTP etcOnly applies when routing is enabledIdentifies broadcast packet to be forwarded by UDP port number Configured on a per-VLAN basisThe UDP forwarder contains a server address table for each configured VLAN. Each server entry contains an IP address and an associated UDP port. A broadcast packet received on the switch will be forwarded based on this configured tablePacket can be unicast forwarded to a specific host, or bcast forwarded to a destination subnet

Page 116: E.09.xx software update for the ProCurve 5300 series switch products

119

UDP Directed Broadcast ForwardingPacket processing

A packet received on the switch will get forwarded if the following conditions are met

Page 117: E.09.xx software update for the ProCurve 5300 series switch products

120

UDP Directed Broadcast ForwardingPacket processing

A packet received on the switch will get forwarded if the following conditions are met The received packet is a broadcast packet

Page 118: E.09.xx software update for the ProCurve 5300 series switch products

121

UDP Directed Broadcast ForwardingPacket processing

A packet received on the switch will get forwarded if the following conditions are metThe received packet is a broadcast packetThe destination UDP port of the packet is present in the configured server table

Page 119: E.09.xx software update for the ProCurve 5300 series switch products

122

UDP Directed Broadcast ForwardingPacket processing

A packet received on the switch will get forwarded if the following conditions are metThe received packet is a broadcast packetThe destination UDP port of the packet is present in the configured server tableThe configured server address is either a unicast or a subnet broadcast address

Page 120: E.09.xx software update for the ProCurve 5300 series switch products

123

UDP Directed Broadcast ForwardingPacket processing

A packet received on the switch will get forwarded if the following conditions are metThe received packet is a broadcast packetThe destination UDP port of the packet is present in the configured server tableThe configured server address is either a unicast or a subnet broadcast address

*DHCP forwarding is enabled by default on the 5300 with E.09.xx since this was the behavior in previous releases

Page 121: E.09.xx software update for the ProCurve 5300 series switch products

124

UDP Directed Broadcast Forwarding[no] ip udp-bcast-forward

Enables broadcast forwarding on the switch

Page 122: E.09.xx software update for the ProCurve 5300 series switch products

125

UDP Directed Broadcast Forwarding[no] ip udp-bcast-forwardEnables broadcast forwarding on the switch

[no] ip forward-protocol udp <IP-ADDR> <port-num>| <port-name>Configures a forwarding address for specific bcast type

Page 123: E.09.xx software update for the ProCurve 5300 series switch products

126

UDP Directed Broadcast Forwarding[no] ip udp-bcast-forward

Enables broadcast forwarding on the switch

[no] ip forward-protocol udp <IP-ADDR> <port-num>| <port-name>Configures a forwarding address for specific bcast type

show ip forward-protocol [vlan <VLAN-ID>]Shows bcast forwarding configuration

Page 124: E.09.xx software update for the ProCurve 5300 series switch products

127

802.1ab Link Layer Discovery Protocol (LLDP)

Page 125: E.09.xx software update for the ProCurve 5300 series switch products

128

802.1ab Link Layer Discovery Protocol (LLDP) Standards based discovery protocol roughly

equivalent to the proprietary Cisco Discovery Protocol (CDP)

Page 126: E.09.xx software update for the ProCurve 5300 series switch products

129

802.1ab Link Layer Discovery Protocol (LLDP) Standards based discovery protocol roughly

equivalent to the proprietary Cisco Discovery Protocol (CDP)

5300xl supports CDPv1 and LLDP with E.09.xx code

Page 127: E.09.xx software update for the ProCurve 5300 series switch products

130

802.1ab Link Layer Discovery Protocol (LLDP) Standards based discovery protocol roughly

equivalent to the proprietary Cisco Discovery Protocol (CDP)

5300xl supports CDPv1 and LLDP with E.09.xx code 3400cl is the first ProCurve product to support only

LLDP

Page 128: E.09.xx software update for the ProCurve 5300 series switch products

131

802.1ab Link Layer Discovery Protocol (LLDP) Standards based discovery protocol roughly

equivalent to the proprietary Cisco Discovery Protocol (CDP)

5300xl supports CDPv1 and LLDP with E.09.xx code 3400cl is the first ProCurve product to support only LLDP LLDP sent and received

Page 129: E.09.xx software update for the ProCurve 5300 series switch products

132

802.1ab Link Layer Discovery Protocol (LLDP) Standards based discovery protocol roughly

equivalent to the proprietary Cisco Discovery Protocol (CDP)

5300xl supports CDPv1 and LLDP with E.09.xx code 3400cl is the first ProCurve product to support only LLDP LLDP sent and received LLDP can be disabled (default enabled) not sent,

received, info not stored

Page 130: E.09.xx software update for the ProCurve 5300 series switch products

133

802.1ab Link Layer Discovery Protocol (LLDP) Standards based discovery protocol roughly

equivalent to the proprietary Cisco Discovery Protocol (CDP)

5300xl supports CDPv1 and LLDP with E.09.xx code 3400cl is the first ProCurve product to support only LLDP LLDP sent and received LLDP can be disabled (default enabled) not sent, received,

info not stored ProCurve Manager today queries the CDP MIB via

SNMP (Later versions will read both CDP & LLDP MIBs (Version 2.0)

Page 131: E.09.xx software update for the ProCurve 5300 series switch products

134

802.1ab Link Layer Discovery Protocol (LLDP) Standards based discovery protocol roughly

equivalent to the proprietary Cisco Discovery Protocol (CDP)

5300xl supports CDPv1 and LLDP with E.09.xx code 3400cl is the first ProCurve product to support only LLDP LLDP sent and received LLDP can be disabled (default enabled) not sent, received

info not stored ProCurve Manager today queries the CDP MIB via SNMP

(Later versions will read both CDP & LLDP MIBs (Version 2.0) 3400cl will NOT be discovered by any other PNB

product today• It will when LLDP ships on other products (incl.

PCM+)• Receives CDP packets and uses them to update

LLDP information

Page 132: E.09.xx software update for the ProCurve 5300 series switch products

135

802.1ab Link Layer Discovery Protocol (LLDP) Operating Rules Port Trunking: LLDP manages trunked ports

individually

Page 133: E.09.xx software update for the ProCurve 5300 series switch products

136

802.1ab Link Layer Discovery Protocol (LLDP) Operating Rules Port Trunking LLDP manages trunked ports individually Spanning-Tree Blocking: Spanning tree does not

prevent LLDP packet transmission or receipt on STP-blocked links

Page 134: E.09.xx software update for the ProCurve 5300 series switch products

137

802.1ab Link Layer Discovery Protocol (LLDP) Operating Rules Port Trunking LLDP manages trunked ports individually Spanning-Tree Blocking Spanning tree does not prevent

LLDP packet transmission or receipt on STP-blocked links 802.1X Blocking: Ports blocked by 802.1X operation

do not allow transmission or receipt of LLDP packets

Page 135: E.09.xx software update for the ProCurve 5300 series switch products

138

802.1ab Link Layer Discovery Protocol (LLDP) Operating Rules Port Trunking LLDP manages trunked ports individually Spanning-Tree Blocking Spanning tree does not prevent

LLDP packet transmission or receipt on STP-blocked links 802.1X Blocking Ports blocked by 802.1X operation do not

allow transmission or receipt of LLDP packets IP Address Advertisements: In the default operation,

if a port belongs to only one static VLAN, then the port advertises the lowest-order IP address configured on that VLAN. If a port belongs to multiple VLANs, then the port advertises the lowest-order IP address configured on the VLAN with the lowest VID. If the qualifying VLAN does not have an IP address, the port advertises 127.0.0.1 as its IP address

Page 136: E.09.xx software update for the ProCurve 5300 series switch products

139

802.1ab Link Layer Discovery Protocol (LLDP)[no] lldp enable <PORT-LIST>

Configures ports to send/rec LLDP :default all enabled[no] lldp run

Starts sending and receiving LLDP :default on lldp interval <seconds>

LLDP transmit interval in seconds :default 30lldp holdtime-multiplier <integer>

Multiples of interval to keep an entry valid :default 4lldp clear

Flushes remote device informationshow lldp [<local-device|remote-devices> [<PORT_LIST>]

[detail] ]

Page 137: E.09.xx software update for the ProCurve 5300 series switch products

140

802.1ab Link Layer Discovery Protocol (LLDP)

CDP and LLDP do not interact, they are configured independently, transmit and receive their own packets, and maintain separate neighbor tables

Page 138: E.09.xx software update for the ProCurve 5300 series switch products

141

Multiple Configuration Files Allows storing of three configuration files

• Useful for saving a configuration file for pri/sec flash images• Commands should be familiar with addition of “filename”• # boot [system [flash <primary|secondary>] [config FILENAME]]• # copy config FILENAME tftp ... (tftp options)• # copy config FILENAME-1 config FILENAME-2• # copy tftp config FILENAME ... (tftp options)• # erase startup-config (no change)• # erase config FILENAME• # reload (no change)• # rename config FILENAME-1 FILENAME-2• # startup-default [<primary|secondary>] config FILENAME• # show config files

Page 139: E.09.xx software update for the ProCurve 5300 series switch products

142

Multiple Configuration Files

Reboot command

Secondary boot path

Running config

Primary boot path

Startup config

Prior to E.09.xx, the same startup config wouldBe used regardless of whether you booted fromPrimary or secondary

Page 140: E.09.xx software update for the ProCurve 5300 series switch products

143

Multiple Configuration Files

Reboot command

Secondary boot path

Running config

Primary boot path Startup configOptions

File1File2file3

With E.09.xx and newer code, it is possible to Store multiple config files on the switch and chooseWhich version to use for a image specific reboot policy:(# startup-default [<primary|secondary>] config FILENAME)

Page 141: E.09.xx software update for the ProCurve 5300 series switch products

144

Multiple Configuration FilesHP ProCurve Switch 5304XL(config)# show config files

Configuration files:

id | act pri sec | name --+-------------+----------------------------------------- 1 | * | E0803 2 | * | crf_test 3 | * | E0901

Example shows that there is a config file named “E0803” associated with the primary boot path (pri flash), “E0901”Associated with the secondary boot path, and “crf_test” which is the active config file.

Page 142: E.09.xx software update for the ProCurve 5300 series switch products

www.hp.com/go/hpprocurve

Q&A

Page 143: E.09.xx software update for the ProCurve 5300 series switch products