9.2.3.4. Aruba
9.2.3.4.1. 2530 and 2540
Firmware: ArubaOS accredited release J9854A #YA.16.10.0012
Administration Portal > ON CMDB > Network Devices Brand/Model: Aruba/2530 - Aruba/2540
9.2.3.4.1.1. Radius Global Configuration
Define the RADIUS servers to be used for authentications and their format:
HP-2530-24G-PoEP-2SFPP# configure
HP-2530-24G-PoEP-2SFPP(config)# radius-server host <Radius_Server_IP> key <Radius_Shared_Key>
HP-2530-24G-PoEP-2SFPP(config)# radius-server host <Radius_Server_IP> dyn-authorization
HP-2530-24G-PoEP-2SFPP(config)# radius-server host <Radius_Server_IP> time-window 0
HP-2530-24G-PoEP-2SFPP(config)# radius-server host <Radius_Server_IP> auth-port 1812
HP-2530-24G-PoEP-2SFPP(config)# radius-server host <Radius_Server_IP> acct-port 1813
HP-2530-24G-PoEP-2SFPP(config)# aaa server-group radius "opennac" host <Radius_Server_IP>
HP-2530-24G-PoEP-2SFPP(config)# aaa accounting network start-stop radius server-group "opennac"
8021X
HP-2530-24G-PoEP-2SFPP(config)# aaa authentication port-access eap-radius server-group "opennac"
HP-2530-24G-PoEP-2SFPP(config)# aaa port-access authenticator <port-range>
HP-2530-24G-PoEP-2SFPP(config)# aaa port-access authenticator <port-range> tx-period 10
HP-2530-24G-PoEP-2SFPP(config)# aaa port-access authenticator <port-range> client-limit 2
HP-2530-24G-PoEP-2SFPP(config)# aaa port-access authenticator active
MAC Authentication
HP-2530-24G-PoEP-2SFPP(config)# aaa authentication mac-based chap-radius server-group "opennac"
HP-2530-24G-PoEP-2SFPP(config)# aaa port-access mac-based <port-range>
HP-2530-24G-PoEP-2SFPP(config)# aaa port-access mac-based <port-range> addr-limit 4
HP-2530-24G-PoEP-2SFPP(config)# aaa port-access mac-based <port-range> reauth-period 144
9.2.3.4.1.2. Dot1x Features
Default VLAN
The default VLAN will be the one that will be assigned in case of defining the default VLAN in the openNAC policy.
HP-2530-24G-PoEP-2SFPP(config)# primary-vlan <vlan-id>
HP-2530-24G-PoEP-2SFPP(config)# vlan <vlan-id> name default_vlan
Also, we can apply an interface configuration and configure the auth-vid parameter. auth-vid: Configures the VLAN to which a port should be moved after successful authentication. This parameter is not configured by default.
HP-2530-24G-PoEP-2SFPP(config)# aaa port-access mac-based <port-range> auth-vid 200
Critical VLAN
The critical VLAN will be the one in which the connections will be established in case the RADIUS servers are not available for authorization. Once we have configured an authentication method, we will be able to configure the critical VLAN. unauth-vid: Configures the VLAN to which a port should be assigned while an unauthenticated client is connected. This parameter is not configured by default.
In addition, we can set a timeout for switch authentication before moving the port to the VLAN for unauthenticated clients with the unauth-period parameter.
For 802.1x:
HP-2530-24G-PoEP-2SFPP(config)# aaa port-access authenticator <port-range> unauth-vid 200
HP-2530-24G-PoEP-2SFPP(config)# aaa port-access authenticator <port-range> unauth-period 20
For MAB:
HP-2530-24G-PoEP-2SFPP(config)# aaa port-access mac-based <port-range> unauth-vid 200
HP-2530-24G-PoEP-2SFPP(config)# aaa port-access mac-based <port-range> unauth-period 20
Voice VLAN
The voice VLAN will be used to separate the voice traffic from the data traffic.
HP-2530-24G-PoEP-2SFPP(config)# vlan 100 voice
9.2.3.4.1.3. Security Profiles (ACL’s)
Static
HP-2530-24G-PoEP-2SFPP(config)# aaa port-access mac-based <port-range> unauth-vid 200
HP-2530-24G-PoEP-2SFPP(config)# aaa port-access mac-based <port-range> unauth-period 20
Dynamic
Assigns a RADIUS-configured ACL to filter inbound packets received from a specific client authenticated on a switch port. We will have to configure the following parameter on the opennac policy postconditions, so once the user matches a policy with a configured Dynamic ACL, the rule will be send as a RADIUS parameter and it will be applied in the switch. The parameter we have to configure is the Nas-filter-Rule.
Nas-filter-Rule=permit in tcp from any to any
Nas-filter-Rule=permit in tcp from any to any 23
9.2.3.4.1.4. SNMP
We will configure the SNMP feature to enable the communication between the OpenNAC Core and the network device to extract information like version, port type, location, toggle port, etc. To perform the policy reevaluation through SNMP, it will be necessary to activate this functionality and define the keys of the reading and writing communities:
HP-2530-24G-PoEP-2SFPP(config)# snmp-server community "public"
HP-2530-24G-PoEP-2SFPP(config)# snmp-server community "private" operator unrestricted
9.2.3.4.1.5. CoA
Implemented for versions 1.2.4 and higher. We will introduce the following configuration to be able to perform the CoA from different ips, so we will stablish as many servers as we want. We will need to configure the RADIUS servers previously with their secret key and then we will be able to add the following configuration for the desired servers.
HP-2530-24G-PoEP-2SFPP(config)# radius-server host <Radius_Server_IP dyn-authorization
9.2.3.4.1.6. Troubleshooting & Monitoring
RADIUS Debug:
HP-2530-24G-PoEP-2SFPP# debug security radius-server
HP-2530-24G-PoEP-2SFPP# debug security port-access
HP-2530-24G-PoEP-2SFPP# debug security port-security
HP-2530-24G-PoEP-2SFPP# debug destination session
Display connected users:
Dot1x:
HP-2530-24G-PoEP-2SFPP# display dot1x sessions interface <port>
HP-2530-24G-PoEP-2SFPP# display dot1x interface <port>
- MAC-Authentication (MAB):
HP-2530-24G-PoEP-2SFPP# display mac-authentication interface <port>
HP-2530-24G-PoEP-2SFPP# display mac-authentication interface <port>
HP-2530-24G-PoEP-2SFPP# display mac-address interface <port>
9.2.3.4.2. 2930F
Firmware: ArubaOS accredited release WC.16.04.0014
Administration Portal > ON CMDB > Network Devices Brand/Model: Aruba/2930F
9.2.3.4.2.1. RADIUS Global Configuration
Define the RADIUS servers to be used for authentications and their format:
radius-server host <Radius_Server_IP> key "<Radius_Shared_Key>"
radius-server host <Radius_Server_IP> dyn-authorization
radius-server host <Radius_Server_IP> time-window 0
radius-server dead-time 5
ip client-tracker
aaa accounting network start-stop radius
radius-server dyn-autz-port 3799
aaa server-group radius "opennac" host <Radius_Server_IP>
aaa authentication port-access eap-radius server-group "opennac"
aaa authentication mac-based chap-radius server-group "opennac"
Interface configuration
aaa port-access authenticator <port-range>
aaa port-access authenticator <port-range> tx-period 10
aaa port-access authenticator <port-range> auth-vid "unauthorized_vlan"
aaa port-access authenticator <port-range> client-limit 2
aaa port-access authenticator active
aaa port-access supplicant <port-range>
aaa port-access mac-based <port-range>
aaa port-access mac-based <port-range> addr-limit 4
aaa port-access mac-based <port-range> reauth-period 144
9.2.3.4.2.2. Dot1x Features
Critical VLAN
The critical VLAN will be the one in which the connections will be established in case the RADIUS servers are not available for authorization. Once we have configured an authentication method, we will be able to configure the critical VLAN.
This feature is available with ArubaOS 16.07.
For clients sending untagged traffic, if the RADIUS server is unreachable, the client is placed in a Critical VLAN. There are two ways to configure a Critical Data VLAN:
Directly assigning the VLAN using the command:
aaa port-access <port-range> critical-auth datavlan <vlan-id>
Assign a user-role containing untagged VLAN as critical-role using the command:
aaa port-access <port-range> critical-auth user-role <role-name>
9.2.3.4.2.3. SNMP Traps
In case we want to use SNMP for visibility, we need to enable SNMP on the switch.
Global configuration mode
snmp-server host <opennac-ip> community public
snmp-server community private unrestricted
snmp-server community public restricted
Configuring MAC Table
snmp-server enable traps mac-count-notify
snmp-server enable traps mac-notify
snmp-server enable traps mac-notify mac-move
Configuring access ports
snmp-server enable traps link-change <port-range>
To verify that the SNMP Traps configuration is correct, we can execute the following command:
switch# show mac-notify traps
Mac Notify Trap Information
Mac-notify Enabled : Yes
Mac-move Enabled : Yes
Trap-interval: 60
Port MAC Addresses trap learned/removed
------ ----------------------------------
1 None
2 None
3 Removed
4 Removed
5 Learned
6 Learned
The “Mac-notify Enabled” and “Mac-move Enabled” value should be set to yes.
Configuring SNMP v3
To activate SNMP v3 in a Aruba, several modes can be configured. Into this section we will describe the configuration you need for three of them. AuthPriv: This method provides authentication based on the HMAC-MD5 or HMAC-SHA algorithms.
snmpv3 enable
snmpv3 group managerpriv user <username> sec-model ver3
snmpv3 user <username> auth [md5|sha] <preSharedKeyPriv-string> priv [des|aes] <preSharedKeyPriv-string>
AuthNoPriv: This method provides authentication based on the Hashed Message Authentication Code (HMAC)-MD5 or HMAC-SHA algorithms. “preSharedKeyAuth” is the keyword to authenticate. There is not encryption in this method.
snmpv3 enable
snmpv3 group managerauth user <username> sec-model ver3
snmpv3 user <username> auth sha/md5 <preSharedKeyPriv-string>
NoAuthNoPriv: This method provides no authentication and privacy.
snmpv3 enable
snmpv3 group operatornoauth user <username> sec-model ver3
snmpv3 user <username>
The next step is to configure traps receptors with minimum privilege (recommended).
ip authorized-managers <snmpServer_ip> <snmpServerip_mask> access operator access-method snmp
snmpv3 notify <notify_name> tagvalue <tag_name>
snmpv3 targetaddress [<ipv4-addr|ipv6-addr>] <name>
snmpv3 params <params_name> user <user_name>
9.2.3.4.3. 6200 legacy
Firmware: ArubaOS-CX:ML.10.10.1000
Administration Portal > ON CMDB > Network Devices Brand/Model: Aruba/6200 legacy
9.2.3.4.3.1. Radius Global Configuration
Define the RADIUS servers to be used for authentications and their format:
6200(config)# radius-server host <RADIUS IP> key plaintext <SharedKey> tracking enable
6200(config)# radius-server retries 3
6200(config)# radius-server tracking interval 60
6200(config)# radius-server tracking user-name monitorAruba password plaintext monitorAruba
6200(config)# aaa group server radius opennac
6200(config-sg)# server <RADIUS IP>
6200(config-sg)# exit
6200(config)# aaa accounting port-access start-stop group opennac
9.2.3.4.3.2. Dot1x Configuration
Global configuration
6200(config)# aaa authentication port-access dot1x authenticator
6200(config-dot1x-auth)# radius server-group opennac
6200(config-dot1x-auth)# enable
6200(config-dot1x-auth)# exit
Interface configuration
6200(config)# interface 1/1/1-1/1/4
6200(config-if-<1/1/1-1/1/4>)# aaa authentication port-access dot1x authenticator
6200(config-if-dot1x-auth)# max-eapol-requests 1
6200(config-if-dot1x-auth)# max-retries 1
6200(config-if-dot1x-auth)# reauth
6200(config-if- dot1x-auth)# reauth-period 3600
6200(config-if-dot1x-auth)# exit
6200(config-if-dot1x-auth)# enable
6200(config-if-<1/1/1-1/1/4)# aaa authentication port-access mac-auth
6200(config-if- macauth)# reauth
6200(config-if-macauth)# reauth-period 3600
6200(config-if- macauth)# enable
6200(config-if- macauth)# exit
6200(config-if-<1/1/1-1/1/4)# exit
9.2.3.4.3.3. MAC-Auth Configuration
Global Configuration
6200(config-if)# aaa authentication port-access mac-auth
6200(config-if- macauth)# reauth
6200(config-if-macauth)# reauth-period 3600
6200(config-if- macauth)# enable
6200(config-if- macauth)# exit
6200(config-macauth)# exit
Interface Configuration
6200(config)# interface 1/1/1-1/1/4
6200(config-if-<1/1/1-1/1/4>)# aaa authentication port-access mac-auth enable
6200(config-if-<1/1/1-1/1/4>)# exit
9.2.3.4.3.4. Dot1x Features
Default VLAN
The default VLAN will be the one that will be assigned in case of defining the default VLAN in the OpenNAC policy.
Role Configuration:
6200(config)# port-access role DEFAULT
6200(config-pa-role)# vlan access <VLAN ID>
6200(config-vlan-1)# exit
Interface Configuration:
6200(config)# interface 1/1/1
6200(config-if)# aaa authentication port-access auth-role DEFAULT
Or
Interface Configuration:
6200(config)# interface 1/1/1
6200(config-if)# vlan access <VLAN ID>
Reject VLAN
The Reject VLAN will be the one in which the connections will be established in case the RADIUS servers rejects the authentication.
Role Configuration:
6200(config)# port-access role REJECT
6200(config-pa-role)# vlan access <VLAN ID>
6200(config-vlan-252)# exit
Interface Configuration:
6200(config)# interface 1/1/1
6200(config-if)# aaa authentication port-access reject-role REJECT
Critical VLAN
The critical VLAN will be the one in which the connections will be established in case the RADIUS servers are not available for authorization.
Role Configuration:
6200(config)# port-access role CRITICAL
6200(config-pa-role)# vlan access <VLAN ID>
6200(config-vlan-252)# exit
Interface Configuration:
6200(config)# interface 1/1/1
6200(config-if)# aaa authentication port-access critical-role CRITICAL
9.2.3.4.3.5. Security Profiles (ACLs)
Static Security Profile
Static security profiles are defined by OpenNAC Enterprise and allow us to specify which Access Control List (ACL) to apply to a connection that is established, based on the previously created ACLs on the network device.
Example of defining an ACL on the switch:
access-list ip google
10 permit any any 8.8.8.8
20 deny any any any
Dynamic Security Profile
The dynamic security profiles are those in which OpenNAC Enterprise will send an ACL that has not been previously defined in the network device.
9.2.3.4.3.6. TogglePort
TogglePort SNMP
To perform the policy reevaluation through SNMP, it will be necessary to activate this functionality and define the keys of the reading and writing communities:
6200(config)# snmp-server community <CommunityName>
6200(config-community)# access-level rw
TogglePort CoA
To perform the policy reevaluation through CoA, it will be necessary to activate this functionality and define the clients with their shared-key:
6200(config)# radius dyn-authorization enable
6200(config)# radius dyn-authorization client <OpenNAC IP> secret-key plaintext <SharedKey>
9.2.3.4.3.7. SNMP Traps
In case we want to use SNMP for visibility, we need to enable SNMP on the switch.
Global Configuration:
6200(config)# snmp-server trap mac-notify
Interface Configuration:
6200(config-if)# mac-notify traps aged learned moved removed