FS S5900-24S4T2Q Ethernet Switch Security Configuration

Chapter 1 AAA Configuration

Access control is the method used to control access to networks and services. Authentication, authorization, and accounting (AAA) network security services provide the primary framework for setting up access control on your OLT or access server.

1.1 AAA Overview

AAA is an architectural framework for configuring a set of three independent security functions in a consistent manner. It provides a modular way of performing the following services:

1.1.1 AAA Security Service

AAA provides the following benefits:

1.1.2 AAA Principles

AAA allows dynamic configuration of authentication and authorization types on a per-line or per-service basis. This is achieved by creating method lists and applying them to specific services or interfaces.

1.1.3 AAA Method List

To configure AAA, define a named method list and apply it to a service or interface. The method list defines the running AAA type and sequence. Any defined method list must be applied before running, except for the default method list which is applied automatically to all interfaces. A method list is a sequential list of authentication methods. If one method fails or does not respond, the software attempts the next method in the list.

1.1.4 AAA Configuration Process

To configure AAA security on switches or access servers, follow these steps:

  1. Assess security risks and decide on appropriate measures to prevent unauthorized entry and attacks.
  2. If using a security server, configure security protocol parameters (RADIUS, TACACS+, Kerberos).
  3. Define method lists for authentication using an AAA authentication command.
  4. Apply the method lists to specific interfaces or lines if required.
  5. Optionally, configure authorization using the aaa authorization command.
  6. Optionally, configure accounting using the aaa accounting command.

1.1.5 AAA Configuration Example

The following example shows a typical AAA network configuration with RADIUS and TACACS+ servers:

(Diagram description: A network diagram shows a Remote PC connected to a NAS (Network Access Server). The NAS is connected to two RADIUS servers (R1, R2) and two TACACS+ servers (T1, T2). A Workstation is also shown.)

In this example, the default method list is applied to all interfaces. When a remote user attempts to log in, the network access server queries R1 for authentication. If R1 authenticates, a PASS response is sent. If R1 fails, the user is denied access. If R1 does not respond (ERROR), the server queries R2. A FAIL response means the user did not meet authentication criteria, while an ERROR means the server did not respond.

1.2 Authentication Configuration

1.2.1 AAA Authentication Configuration Task List

1.2.2 AAA Authentication Configuration Task

To configure AAA authentication:

  1. If using a separate security server, configure security protocol parameters (RADIUS, TACACS+).
  2. Configure Authentication Method List Using aaa authentication.
  3. Apply the accounting method list to a specific interface or line, if necessary.
1.2.2.1 Configuring Login Authentication Using AAA

The aaa authentication login command enables AAA authentication. You can create one or more lists of authentication methods that are tried at login. These lists are applied using the login authentication line configuration command.

Commands:

Supported login authentication methods:

Keyword Notes
enable Uses the enable password for authentication.
group name Uses named server group for authentication.
group radius Uses RADIUS for authentication.
group tacacs+ Uses group tacacs+ for authentication.
line Uses the line password for authentication.
local Uses the local username database for authentication.
localgroup Uses the local strategy group username database for authentication.
local-case Uses case-sensitive local user name authentication.
none Passes the authentication unconditionally.

Example using local password:

aaa authentication login default local

Example using RADIUS:

aaa authentication login default group radius
1.2.2.2 Enabling Password Protection at the Privileged Level

The aaa authentication enable default command creates a series of authentication methods for accessing the privileged EXEC command level. You can specify up to four methods.

Command:

Supported enable authentication methods are similar to login authentication methods (enable, group name, group radius, group tacacs+, line, none).

1.2.2.3 Configuring Message Banners for AAA Authentication

You can configure personal logon or failed logon banners. When AAA authentication fails, the configured message banner is displayed.

To configure the registration banner:

aaa authentication banner delimiter text-string delimiter

To configure the banner of failed logon:

aaa authentication fail-message delimiter text-string delimiter

Usage Guidelines: Use a delimiter to indicate the start and end of the banner text string.

1.2.2.4 Modifying the Notification Character String for Username Input

Use the aaa authentication username-prompt command to modify the default username input prompt text. Use no aaa authentication username-prompt to revert to the default.

1.2.2.5 Modifying AAA authentication password-prompt

Use the aaa authentication password-prompt text-string command to change the password prompt text. Use no aaa authentication password-prompt to revert to the default.

1.2.2.6 Creating the Authentication Database with the Local Privilege

Use the enable password { [encryption-type] encrypted-password} [level level] command to create the enable password database with local privilege. Use no enable password [level level] to cancel it.

1.2.3 AAA Authentication Configuration Example

1.2.3.1 RADIUS Authentication Example

Example configuration to authenticate and authorize using RADIUS:

aaa authentication login radius-login group radius local
aaa authorization network radius-network group radius line vty 3
login authentication radius-login

Explanation:

1.3 Authorization Configuration

1.3.1 AAA Authorization Configuration Task List

1.3.2 AAA Authorization Configuration Task

To configure AAA authorization:

  1. If using a separate security server, configure security protocol parameters (RADIUS, TACACS+).
  2. Run aaa authorization to define the authorization method list.
  3. Apply the accounting method list to a specific interface or line, if necessary.
1.3.2.1 Configuring EXEC authorization through AAA

The aaa authorization exec command creates authorization method lists to determine if users can run the EXEC shell and their privilege level.

Commands:

Supported EXEC authorization methods:

Keyword Notes
group WORD Uses the named server group to conduct authorization.
group radius Uses RADIUS authorization.
group tacacs+ Uses tacacs+ authorization.
local Uses the local database to perform authorization.
if-authenticated Automatically authorizes the authenticated user with all required functions.
none Passes the authorization unconditionally.

Example of Local EXEC Authorization:

aaa authentication login default local aaa
authorization exec default local
!
localauthor a1
exec privilege default 15
!
local author-group a1
!
username exec1 password 0 abc
username exec2 password 0 abc author-group a1 username
exec3 password 0 abc maxlinks 10
username exec4 password 0 abc autocommand telnet 172.16.20.1

Explanation:

1.4 AAA Accounting Configuration

1.4.1 AAA Accounting Configuration Task List

1.4.2 AAA Accounting Configuration Task

To configure AAA accounting:

  1. If using a separate security server, configure security protocol parameters (RADIUS, TACACS+).
  2. Apply the method lists to a particular interface or line, if required.
  3. If necessary, apply the accounting method list to a specific interface or line.
1.4.2.1 Configuring Connection Accounting using AAA

Use the aaa accounting connection command to provide accounting information about outbound connections (Telnet, PAD, H323, rlogin). Only H323 is currently supported.

Command:

Supported connection accounting methods:

Keyword Notes
group WORD Uses the named server group to conduct accounting.
group radius Uses the RADIUS for accounting.
group tacacs+ Uses the TACACS+ for accounting.
none Disables accounting services for the specified line or interface.
stop-only Sends a "stop" record accounting notice at the end of the requested user process.
start-stop RADIUS or TACACS+ sends a "start" accounting notice at the beginning of the requested process and a "stop" accounting notice at the end of the process.
1.4.2.2 Configuring Network Accounting using AAA

Use the aaa accounting network command to establish accounting method lists for PPP/SLIP sessions, providing information on packets, bytes, and time.

Command:

Supported network accounting methods are similar to connection accounting methods.

1.4.2.3 Configuring Accounting Update Through AAA

Use the aaa accounting update [newinfo] [periodic number] command to enable AAA accounting updates. The newinfo keyword sends temporary accounting records when new information is available. The periodic keyword sends records periodically based on the specified number.

1.4.2.4 Limiting User Accounting Without Username

Use the aaa accounting suppress null-username command to prevent the AAA system from sending accounting records for users with null usernames.

1.5 Local Account Policy Configuration

1.5.1 Local Account Policy Configuration Task List

1.5.2 Local Account Policy Configuration Task

1.5.2.1 Local authentication policy configuration

Use the localauthen WORD command to enter local authentication configuration.

1.5.2.2 Local authorization policy configuration

Use the localauthor WORD command to enter local authorization configuration.

1.5.2.3 Local password policy configuration

Use the localpass WORD command to enter local password configuration.

1.5.2.4 Local policy group configuration

Use the localgroup WORD command to configure local policy groups.

1.5.3 Local Account Policy Example

Example configuration for local authentication and authorization:

aaa authentication login default local aaa
authorization exec default local
!
localpass a3 non-user
non-history
element number lower-letter upper-letter special-character min-length 10
validity 2d
!
localauthen a1
login max-tries 4 try-duration 2m
!
localauthor a2
exec privilege default 15
!
local pass-group a3 local authen-
group a1 local author-group a2
!

Explanation:

Chapter 2 Configuring RADIUS

This chapter describes the Remote Authentication Dial-In User Service (RADIUS) security system, its operation, and suitable network environments for its use. It covers RADIUS configuration using the AAA command set and provides examples.

2.1 Overview

2.1.1 RADIUS Overview

RADIUS is a distributed client/server system that secures networks against unauthorized access. RADIUS clients on switches send authentication requests to a central RADIUS server containing user authentication and network service access information. RADIUS is implemented in environments requiring high security while maintaining network access for remote users.

Use RADIUS in the following environments:

RADIUS is not suitable for:

2.1.2 RADIUS Operation

When a user logs in using RADIUS:

  1. The user is prompted for and enters a username and password.
  2. The username and encrypted password are sent to the RADIUS server.
  3. The RADIUS server responds with ACCEPT (authenticated), REJECT (not authenticated, prompt again or deny access), or CHALLENGE (request for additional data).

The ACCEPT or REJECT response may include data for EXEC or network authorization, such as services the user can access and connection parameters.

2.2 RADIUS Configuration Steps

To configure RADIUS on your switch or access server:

  1. Use the aaa authentication global configuration command to define method lists for RADIUS authentication.
  2. Use line and interface commands to enable the defined method lists.

Optional tasks:

2.3 RADIUS Configuration Task List

2.4 RADIUS Configuration Task

2.4.1 Configuring Switch to RADIUS Server Communication

Use the radius-server host command to specify the RADIUS server's IP address or hostname and port numbers. Use the radius-server key command to set the shared secret text string.

To configure global communication settings:

2.4.2 Configuring Switch to Use Vendor-Specific RADIUS Attributes

Use the radius-server vsa send [authentication] command to enable the network access server to recognize and use vendor-specific attributes (VSAs) as defined by RADIUS IETF attribute 26.

2.4.3 Specifying RADIUS Authentication

Define method lists for RADIUS authentication using the aaa authentication command, specifying RADIUS as the authentication method.

2.4.4 Specifying RADIUS Authorization

Use the aaa authorization command, specifying RADIUS as the authorization method, to set parameters that restrict a user's network access.

2.4.5 Specifying RADIUS Accounting

Use the aaa accounting command, specifying RADIUS as the accounting method, to track user services and network resource consumption.

2.5 RADIUS Configuration Examples

2.5.1 RADIUS Authentication Example

Example configuration for switch authentication and authorization using RADIUS:

aaa authentication login use-radius group radius local

Explanation:

2.5.2 RADIUS Application in AAA

Example of general RADIUS configuration with AAA:

radius-server host 1.2.3.4
radius-server key myRaDiUSpassWoRd
aaa authentication login admins group radius local line vty 1 16
login authentication admins

Explanation:

Chapter 3 TACACS+ Configuration

TACACS+ provides centralized verification of network access rights for users, ensuring communication safety through encrypted information exchange.

3.1 TACACS+ Overview

Before using TACACS+, the TACACS+ server must be accessed and configured. TACACS+ supports independent modularized authentication, authorization, and accounting.

3.1.1 The Operation of TACACS+ Protocol

3.1.1.1 Authentication in ASCII Form

When logging in via ASCII form with TACACS+:

  1. The network access server prompts for a username.
  2. After the username is entered, the server prompts for a password.
  3. The password is sent to the TACACS+ service program.

TACACS+ allows dialogues between the server program and the user until enough information is collected to identify the user.

3.1.1.2 Authentication in PAP and CHAP Ways

PAP login is similar to ASCII login, but the username and password are sent in a PAP message, not entered by the user. CHAP login is similar, requiring user authorization after authentication if requested by the server.

If TACACS+ authorization is needed, it contacts the TACACS+ server again for ACCEPT or REJECT responses, potentially including attribute-value (AV) data for EXEC or NETWORK dialogue confirmation.

3.2 TACACS+ Configuration Process

To configure TACACS+ support:

  1. Use the tacacs-server command to assign IP addresses of TACACS+ servers and the tacacs key command to set the encrypted secret key for information exchange.
  2. Use the global configuration command aaa authentication to define method tables using TACACS+ for authentication.
  3. Use line and interface commands to apply the defined method tables.

3.3 TACACS+ Configuration Task List

3.4 TACACS+ Configuration Task

3.4.1 Assigning TACACS+ server

Use the tacacs-server host ip-address [single-connection | multi-connection] [port integer] [timeout integer] [key string] command to assign the IP address of the TACACS+ server and configure related features. This is useful for servers configured with different priorities.

Additional configurations:

3.4.2 Setting up TACACS+ encrypted secret key

Use the tacacs-server key keystring command to set the encrypted secret key for TACACS+ messages. The same secret key must be configured on the TACACS+ server program for successful encryption.

3.4.3 Assigning to use TACACS+ for authentication

Define method tables for TACACS+ authentication using the aaa authentication command, specifying TACACS+ as the authentication way.

3.4.4 Assigning to use TACACS+ for authorization

Use the aaa authorization command, specifying TACACS+ as the authorization way, to set parameters for user network access limitations.

3.4.5 Assigning to use TACACS+ for accounting

Use the aaa accounting command, specifying TACACS+ as the accounting way, to track user service and network resource consumption.

3.5 TACACS+ Configuration Example

3.5.1 TACACS+ authentication example

Example of configuring login authentication using TACACS+:

aaa authentication login test group tacacs+ local aaa
authorization exec test group tacacs+ tacacs-server host
1.2.3.4
tacacs-server key testkey

Explanation:

3.5.2 TACACS+ Authorization Examples

Example configuration for TACACS+ authorization:

aaa authentication login default group tacacs+ local aaa
authorization exec default group tacacs+ tacacs-server host
10.1.2.3
tacacs-server key goaway

Explanation:

3.5.3 TACACS+ Accounting Example

Example of configuring login authentication method table using TACACS+ for accounting:

aaa authentication login default group tacacs+ local
aaa accounting exec default start-stop group tacacs+ tacacs-server
host 10.1.2.3
tacacs-server key goaway

Explanation:

PDF preview unavailable. Download the PDF instead.

s5900-24s4t2q-security-configuration-commands

Related Documents

Preview FS S5500-48T8SP Security Configuration Guide
This document provides a comprehensive guide to configuring security features on the FS S5500-48T8SP switch, focusing on AAA (Authentication, Authorization, and Accounting) and RADIUS. It details how to set up authentication methods, authorization policies, and accounting for network access control, as well as web authentication configurations.
Preview FS S5860-20SQ vs S5900-24S4T2Q Switch Competitive Comparison
A detailed competitive comparison of FS S5860-20SQ and S5900-24S4T2Q network switches, covering software functions, performance, reliability, and hardware specifications.
Preview FS N9550-32D Switch Hardware Guide
Comprehensive hardware guide for the FS N9550-32D switch, covering installation, configuration, chassis details, cooling, power, site requirements, and network connectivity. This document provides step-by-step instructions for hardware installation and initial software configuration.
Preview S3950-4T12S-R Switch Configuration Guide
Comprehensive guide detailing the configuration of FS S3950-4T12S-R network switch, covering system management, Ethernet, IP services, routing, security, and more for network professionals.
Preview FS IES3100-8TF L2+ Managed Industrial Switch Quick Start Guide
This quick start guide provides essential information for deploying and configuring the FS IES3100-8TF L2+ Managed Industrial Switch. It covers hardware details, installation requirements, connection procedures, basic configuration, and troubleshooting steps.
Preview FS S3400-48T4SP PoE+ Switch NTP Configuration Guide
This document provides a guide on configuring Network Time Protocol (NTP) on the FS S3400-48T4SP PoE+ Switch. It covers NTP overview, configuration as an NTP server, authentication, and association.
Preview FS S5850-24S2Q Managed L2/L3 Routing Switch Quick Start Guide
A quick start guide for the FS S5850-24S2Q Managed L2/L3 Routing Switch, covering hardware overview, installation requirements, mounting, grounding, connecting ports, and basic configuration.
Preview FS S3400C-24MG4S Switch Web Configuration Guide
Comprehensive guide for configuring the FS S3400C-24MG4S switch using its web-based interface. Covers setup, network settings, security, and management.