H3c-technologies H3C SecPath F1000-E Manual de usuario

Busca en linea o descarga Manual de usuario para La Seguridad H3c-technologies H3C SecPath F1000-E. H3C Technologies H3C SecPath F1000-E User Manual Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 273
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente

Indice de contenidos

Pagina 1

H3C SecPath Series High-End FirewallsAccess Control Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com

Pagina 2

v Configuration consideration ························································································································

Pagina 3 - Preface

90 Displaying session table information 1. Select Firewall > Session Table > Session Summary from the navigation tree. The session table appe

Pagina 4 - Obtaining documentation

91 Table 35 Field description Field Description Protocol Transport layer protocol, which can be TCP, UDP, ICMP, or RAWIP State Session status, which

Pagina 5 - Documentation feedback

92 Figure 93 Global session statistics Table 36 Field description Item Description Current Session(s) Total number of sessions of the system Curren

Pagina 6 - Contents

93 Item Description RAWIP Session Establishment Rate RAWIP session establishment rate in a 1-second sampling interval Received TCP Packet(s) Number

Pagina 7

94 Displaying session statistics per IP address 1. Select Firewall > Session Table > Statistics from the navigation tree. 2. Click the IP Sta

Pagina 8

95 Field Description RAWIP Connection Count Number of current RAWIP connections RAWIP Connection Rate RAWIP connection establishment rate in a 5-sec

Pagina 9

96 Field Description TCP Connection Count Total number of TCP half-open connections, TCP half-close connections, and full TCP connections TCP Half-Op

Pagina 10

97 Configuring session aging timers based on application layer protocol types Aging timers set in this task apply only to the sessions in READY/ESTAB

Pagina 11 - Configuring ACLs

98 For more information about the configuration of basic and advance ACLs, see "Configuring ACLs." To specify the persistent session rule:

Pagina 12 - Match order

99 Configuring virtual fragment reassembly The virtual fragment reassembly configuration is available only in the Web interface. Overview To prevent

Pagina 13 - IPv4 ACL acceleration

1 Configuring ACLs NOTE: The IPv6 ACL configuration is available only at the CLI. Overview An access control list (ACL) is a set of rules (or perm

Pagina 14 - Creating an ACL

100 2. Configure the parameters as described in Table 40. 3. Click Apply. Table 40 Configuration items Item Description Security Zone Specify a se

Pagina 15 - Configuring a basic ACL rule

101 2. Configure a static address mapping: a. Select Firewall > NAT Policy > Static NAT from the navigation tree. b. Click Add in the Static

Pagina 16

102 Figure 101 Configuring virtual fragment reassembly After the configuration, if the SecPath receives disordered fragments from the security zone

Pagina 17

103 Configuring ASPF The ASPF configuration is available only in the Web interface. Overview Application Specific Packet Filter (ASPF) applications

Pagina 18

104 Figure 103 Adding an ASPF policy 4. Configure the parameters as described in Table 41. 5. Click Apply. Table 41 Configuration items Item Des

Pagina 19

105 Configuration procedure 1. Configure zone 1 and zone 2, and specify security zones for the interfaces. (Details not shown.) 2. Configure an ASP

Pagina 20

106 Configuring connection limits Overview If a client in an internal network initiates a large number of connections to the external network through

Pagina 21 - ACL configuration example

107 Figure 107 Connection limit policies 3. Click Add to add an entry as required. 4. Configure the necessary parameters as described in Table 42

Pagina 22 - Defining an ACL

108 Configuring connection limit at the CLI Connection limit configuration task list Complete the following tasks to configure connection limiting:

Pagina 23

109 Step Command 3. Configure an IP address-based connection limit rule. limit limit-id { source ip { ip-address mask-length | any } [ source-vpn sr

Pagina 24

2 Match order The rules in an ACL are sorted in a specific order. When a packet matches a rule, the device stops the match process and performs the ac

Pagina 25 - ACL configuration task list

110 Figure 108 Network diagram Configuration procedure The following describes only connection limit configuration steps. For more information abou

Pagina 26 - Configuring a basic ACL

111 Troubleshooting connection limit Connection limit rules with overlapping segments 1. Symptom On the SecPath, create a connection limit policy an

Pagina 27 - Configuring an advanced ACL

112 Configuring portal authentication The portal configuration is available only at the CLI. Feature and hardware compatibility Feature F1000-A-EI/E

Pagina 28

113 Figure 109 Portal system components Authentication client An authentication client is an entity seeking access to network resources. It is typi

Pagina 29

114 2. On the authentication homepage/authentication dialog box, the user enters and submits the authentication information, which the portal server

Pagina 30 - Copying an ACL

115 packets from the client to go through the access port. Because no Layer 3 devices are present between the authentication clients and the access d

Pagina 31

116 8. The security policy server exchanges security check information with the authentication client to check whether the authentication client mee

Pagina 32

117 Portal configuration task list Task Remarks Specifying a portal server for Layer 3 portal authentication Required Enabling Layer 3 portal authe

Pagina 33

118 NOTE: • For installation and configuration about the security policy server, see CAMS EAD Security Policy Component User Manual or IMC EAD Sec

Pagina 34 - Configuring security zones

119 there are Layer 3 forwarding devices between the authentication client and the access device, you must select the cross-subnet portal authenticat

Pagina 35 - Creating a zone

3 ACL rule numbering What is the ACL rule numbering step If you do not assign an ID to the rule you are creating, the system automatically assigns it

Pagina 36 - Configuring a zone member

120 NOTE: Regardless of whether portal authentication is enabled, you can only add or remove a portal-free rule. You cannot modify it. Configuring

Pagina 37 - Zone ID Display the zone ID

121 Specifying the authentication domain for portal users After you specify the authentication domain for portal users on an interface, the firewall

Pagina 38 - Zone configuration example

122 that is bound with the access VLAN. The value of this NAS ID will be used as that of the NAS-identifier attribute in the RADIUS packets to be sen

Pagina 39 - Configuration consideration

123 Specifying an auto redirection URL for authenticated portal users After a user passes portal authentication, if the access device is configured w

Pagina 40

124 NOTE: Adjust the maximum number of transmission attempts and the interval of sending probe packets according to the actual network conditions.

Pagina 41

125 You can configure any combination of the configuration items described as needed, with respect to the following: • If both detection methods are

Pagina 42

126 Step Command Remarks 2. Configure the portal user information synchronization function. portal server server-name user-sync [ interval interval

Pagina 43

127 Task Command Remarks Display the portal configuration of a specific interface. display portal interface interface-type interface-number [ | { beg

Pagina 44

128 Figure 112 Network diagram NOTE: • Configure IP addresses for the host, SecPath firewall, and servers as shown in Figure 112 and make suret

Pagina 45 - HTTP configuration example

129 • Enter the start IP address and end IP address of the IP group. Make sure that the IP address of the user host (2.2.2.2) is in the IP group. •

Pagina 46 - Creating a basic ACL

4 For example, when you use a large ACL for a session-based service, such as NAT or ASPF, you can enable ACL acceleration to avoid session timeouts ca

Pagina 47

130 Figure 116 Device list On the port group configuration page, click Add to enter the page for adding a port group, as shown in Figure 117. Perfo

Pagina 48

131 [SecPath-radius-rs1] key accounting radius # Specify that the ISP domain name should not be included in the username sent to the RADIUS server. [

Pagina 49 - HTTPS configuration example

132 ACL:NONE Work-mode:stand-alone MAC IP Vlan Interface ----------------------------------------------------------

Pagina 50 - Creating a PKI domain

133 Configuration procedure NOTE: • For re-DHCP authentication, configure a public address pool (20.20.20.0/24, in this example) and a private ad

Pagina 51 - Generating an RSA key pair

134 [SecPath] domain default enable dm1 3. Configure portal authentication on the SecPath: # Configure the portal server as follows: { Name: newpt

Pagina 52

135 Configuration procedure NOTE: • Make sure that the IP address of the portal device added on the portal server is the IP address of the interf

Pagina 53 - Adding a local user

136 { U R L : h t t p : / / 19 2 .16 8 . 0 .111:8080/portal. [SecPathA] portal server newpt ip 192.168.0.111 key portal port 50100 url http://192.1

Pagina 54

137 [SecPath] radius scheme rs1 # Set the server type for the RADIUS scheme. When using the CAMS or IMC server, set the server type to extended. [Se

Pagina 55 - Address resource overview

138 [SecPath] portal server newpt ip 192.168.0.111 key portal port 50100 url http://192.168.0.111:8080/portal # Enable extended portal authentication

Pagina 56

139 Configuration procedure NOTE: • For re-DHCP authentication, configure a public address pool (20.20.20.0/24, in this example) and a private ad

Pagina 57

5 Figure 1 ACL list Figure 2 ACL configuration page Table 3 Configuration items Item Description ACL Number Enter a number for the ACL. Match Ord

Pagina 58

140 [SecPath] domain default enable dm1 3. On the SecPath, configure the ACL (ACL 3000 ) for resources on subnet 192.168.0.0/24 and the ACL (ACL 300

Pagina 59

141 Figure 122 Network diagram Configuration procedure NOTE: • Make sure that the IP address of the portal device added on the portal server is

Pagina 60

142 [SecPathA-isp-dm1] authentication portal radius-scheme rs1 [SecPathA-isp-dm1] authorization portal radius-scheme rs1 [SecPathA-isp-dm1] accountin

Pagina 61

143 • The host is assigned with a public network IP address either manually or through DHCP. Before passing portal authentication, the host can acce

Pagina 62 - Exporting configuration

144 Log in to IMC and select the Service tab. Then, select Portal Service Management > Server from the navigation tree to enter the portal server

Pagina 63

145 • Set whether to enable IP address reallocation. Direct portal authentication is used in this example, and therefore select No from the Realloca

Pagina 64

146 Figure 128 Adding a port group # Select Service Parameters > Validate System Configuration from the navigation tree to validate the configur

Pagina 65

147 # Configure dm1 as the default ISP domain for all users. Then, if a user enters a username without any ISP domain at logon, the authentication an

Pagina 66

148 Troubleshooting portal Inconsistent keys on the access device and the portal server Symptom When a user is forced to access the portal server, th

Pagina 67

149 Configuring AAA Feature and hardware compatibility Feature F1000-A-EI/E-SI/S-AI F1000-E F5000-A5 Firewall module FIPS No No No Yes DVPN users N

Pagina 68 - Exporting configurations

6 Figure 3 List of basic ACL rules Figure 4 Basic ACL rule configuration page Table 4 Configuration items Item Description Rule ID Select the Rule

Pagina 69 - Importing configurations

150 accounting information to the servers. The RADIUS and HWTACACS protocols define how a NAS and a remote server exchange user information between t

Pagina 70

151 Security and authentication mechanisms RADIUS uses a shared key that is never transmitted over the network to authenticate information exchanged

Pagina 71

152 6. The user accesses the network resources. 7. The host requests the RADIUS client to tear down the connection and the RADIUS client sends a st

Pagina 72

153 • The Identifier field (1 byte long) is used to match request packets and response packets and to detect duplicate request packets. Request and

Pagina 73 - Interzone policy overview

154 No. Attribute No. Attribute 21 (unassigned) 68 Acct-Tunnel-Connection 22 Framed-Route 69 Tunnel-Password 23 Framed-IPX-Network 70 ARAP-Pas

Pagina 74

155 • Vendor-ID—Indicates the ID of the vendor. Its most significant byte is 0, and the other three bytes contains a code that is compliant to RFC 1

Pagina 75

156 HWTACACS RADIUS Supports authorization of configuration commands. Which commands a user can use depends on both the user level and the AAA author

Pagina 76

157 2. Upon receiving the request, the HWTACACS client sends a start-authentication packet to the HWTACACS server. 3. The HWTACACS server sends bac

Pagina 77

158 Figure 135 Determining the ISP domain of a user by the username The authentication, authorization, and accounting process of a user depends on

Pagina 78

159 Figure 136 Network diagram for AAA across VPNs NOTE: Together with the AAA across VPNs feature, you can implement portal authentication acros

Pagina 79

7 Item Description Source IP Address Select the Source IP Address box and enter a source IP address and source wildcard, in dotted decimal notation. S

Pagina 80

160 No. Attribute Description 7 Framed-Protocol Encapsulation protocol for framed access. 8 Framed-IP-Address IP address assigned to the user. 1

Pagina 81

161 No. Attribute Description 80 Message-Authenticator Used for authentication and checking of authentication packets to prevent spoofing Access-Req

Pagina 82

162 No. Sub-attribute Description 62 User_HeartBeat Hash value assigned after an 802.1X user passes authentication, which is a 32-byte string. This

Pagina 83

163 Figure 137 AAA configuration procedure Table 48 AAA configuration task list Task Remarks Configuring AAA schemes Configuring local users Requir

Pagina 84

164 Configuring AAA schemes Configuring local users To implement local user authentication, authorization, and accounting, you must create local user

Pagina 85

165 about binding attributes, see "Configuring local user attributes." Be cautious when deciding which binding attributes to configure for

Pagina 86

166 Step Command Remarks 1. Enter system view. system-view N/A 2. Set the password display mode for all local users. local-user password-display-m

Pagina 87

167 Step Command Remarks 8. Configure the password control attributes for the local user. • Set the password aging time: password-control aging agi

Pagina 88

168 Configuring user group attributes User groups simplify local user configuration and management. A user group comprises a group of local users and

Pagina 89

169 Displaying and maintaining local users and local user groups Task Command Remarks Display local user information. display local-user [ idle-cut

Pagina 90

8 Figure 6 Advanced ACL rule configuration page Table 5 Configuration items Item Description Rule ID Select the Rule ID box and enter a number for t

Pagina 91

170 Figure 139 RADIUS scheme configuration page 3. Enter a RADIUS scheme name. 4. Click the expand button before Advanced in the Common Configura

Pagina 92

171 Figure 140 Common configuration area 5. Configure the common parameters for the RADIUS scheme as described in Table 49. Table 49 Configuration

Pagina 93 - Function

172 Item Description Username Format Select the format of usernames to be sent to the RADIUS server. A username is generally in the format of userid@

Pagina 94

173 Item Description Request Transmission Attempts Set the maximum number of attempts for transmitting a RADIUS packet to a single RADIUS server. Be

Pagina 95 - Managing sessions

174 Item Description RADIUS Packet Source IP Specify the source IP address for the firewall to use in RADIUS packets sent to the RADIUS server. IMP

Pagina 96

175 Figure 141 RADIUS server configuration page 7. Configure the parameters of the RADIUS authentication servers and accounting servers as describ

Pagina 97

176 Figure 142 Network diagram Configuring the RADIUS server running on CAMS This example assumes that the RADIUS server runs on CAMS version 2.10-

Pagina 98 - 3. Click Apply

177 Enter hello@bbb as the user name. Set the password to abc and confirm the password. Select Telnet as the service type. Set the EXEC privilege lev

Pagina 99

178 Figure 145 Adding an access device The IP address of the access device must be the same as the source IP address of the RADIUS packets sent fro

Pagina 100

179 Figure 146 Adding an account for device management Configuring SecPath # Configure the IP address and security zone of each interface. (Details

Pagina 101

9 Item Description Source IP Address Select the Source IP Address box and enter a source IP address and source wildcard, in dotted decimal notation. S

Pagina 102

180 Figure 147 RADIUS authentication server configuration page 5. In the RADIUS Server Configuration area, click Add to configure a RADIUS account

Pagina 103

181 Figure 149 RADIUS scheme configuration page # Enable the Telnet service on SecPath. [SecPath] telnet server enable # Configure SecPath to use A

Pagina 104

182 Verifying the configuration After the configuration, the Telnet user should be able to Telnet to SecPath and use the configured account (username

Pagina 105

183 Specifying the RADIUS authentication/authorization servers You can specify one primary authentication/authorization server and up to 16 secondary

Pagina 106

184 Follow these guidelines when you configure RADIUS accounting servers: • The IP addresses of the primary and secondary accounting servers must be

Pagina 107

185 Step Command Remarks 1. Enter system view. system-view N/A 2. Enter RADIUS scheme view. radius scheme radius-scheme-name N/A 3. Specify a sha

Pagina 108 - Clearing sessions

186 NOTE: Changing the RADIUS server type restores the unit for data flows and that for the packets sent to the RADIUS server to the defaults. Set

Pagina 109 - Overview

187 • If you remove an authentication or accounting server in use, the communication of the firewall with the server soon times out, and the firewal

Pagina 110 - Configuring the SecPath

188 The firewall periodically sends accounting updates to RADIUS accounting servers to report the traffic statistics of online users. For normal and

Pagina 111

189 To specify a source IP address for all RADIUS schemes in a VPN or the public network: Step Command Remarks 1. Enter system view. system-view N

Pagina 112 - Configuration guidelines

Copyright © 2011-2013, Hangzhou H3C Technologies Co., Ltd. and its licensors All rights reserved No part of this manual may be reproduced or transmi

Pagina 113 - Configuring ASPF

10 Figure 7 List of Ethernet frame header ACL rules Figure 8 Ethernet frame header ACL rule configuration page Table 6 Configuration items Item De

Pagina 114 - ASPF configuration example

190 configured with small values. In this case, the next authentication or accounting attempt may succeed because the firewall has set the state of t

Pagina 115 - Configuration procedure

191 Configuring the IP address of the security policy server The core of the H3C EAD solution is integration and cooperation, and the security policy

Pagina 116

192 • The status of a RADIUS server changes. If a NAS receives no response to an accounting or authentication request before the specified maximum n

Pagina 117

193 Task Command Remarks Clear RADIUS statistics. reset radius statistics Available in user view Clear the buffered stop-accounting requests for wh

Pagina 118

194 { After receiving an authentication/accounting response from a server, the firewall changes the status of the server identified by the source IP

Pagina 119

195 Figure 150 Creating an HWTACACS scheme Configuring HWTACACS server 1. If the HWTACACS scheme system already exists, select User > HWTACACS

Pagina 120 - Verifying the configuration

196 Configuration item Description Secondary Server TCP Port Enter the TCP port of the secondary server. Configure different TCP port numbers specif

Pagina 121

197 Item Description Realtime-Accounting Interval Real-time accounting interval, whose value must be a multiple of 3. To implement real-time accounti

Pagina 122

198 Item Description Username Format Set the format of the username sent to the HWTACACS server. A username is generally in the format of userid@isp-

Pagina 123 - Security policy server

199 Figure 153 Network diagram Configuring the HWTACACS server # Set the shared keys to expert, add a Telnet user, and set a password for the user.

Pagina 124 - Portal authentication mode

11 Item Description Destination MAC Address Select the Destination MAC Address box and specify the destination MAC address and wildcard. Destination W

Pagina 125

200 Figure 155 Configuring an HWTACACS authentication server 5. On the page as shown in Figure 155, configure an HWTACACS authorization server for

Pagina 126

201 Figure 156 Configuring the parameters for communication # Through CLI, enable Telnet services on SecPath. <SecPath> system-view [SecPath]

Pagina 127 - Configuration prerequisites

202 Task Remarks Specifying the HWTACACS authentication servers Required Specifying the HWTACACS authorization servers Optional Specifying the HWTA

Pagina 128

203 Step Command Remarks 2. Enter HWTACACS scheme view. hwtacacs scheme hwtacacs-scheme-name N/A 3. Specify HWTACACS authentication servers. • Spe

Pagina 129

204 When the firewall receives a connection teardown request from a host or a connection teardown command from an administrator, it sends a stop-acco

Pagina 130

205 Step Command Remarks 3. Specify the shared keys for authenticating HWTACACS authentication, authorization, and accounting packets. key { account

Pagina 131

206 Step Command Remarks 2. Enter HWTACACS scheme view. hwtacacs scheme hwtacacs-scheme-name N/A 3. Set the format of usernames sent to the HWTACAC

Pagina 132

207 Step Command Remarks 2. Enter HWTACACS scheme view. hwtacacs scheme hwtacacs-scheme-name N/A 3. Specify a source IP address for outgoing HWTACA

Pagina 133

208 Displaying and maintaining HWTACACS Task Command Remarks Display the configuration information or statistics of HWTACACS schemes. display hwtaca

Pagina 134

209 Creating an ISP domain In a networking scenario with multiple ISPs, an access device may connect users of different ISPs, and users of different

Pagina 135

12 Figure 9 Network diagram Creating a time range # Create a periodic time range of Saturday and Sunday. • Select Resource > Time Range from th

Pagina 136 - Logging off portal users

210 Step Command Remarks 6. Enable the self-service server location function and specify the URL of the self-service server. self-service-url enable

Pagina 137

211 • Determine whether to configure an authentication method for all access types or service types. Follow these guidelines when you configure AAA

Pagina 138 - RADIUS server

212 Step Command Remarks 8. Specify the authentication method for SSL VPN users. authentication ssl-vpn radius-scheme radius-scheme-name Optional. T

Pagina 139

213 • If you specify the radius-scheme radius-scheme-name local or hwtacacs-scheme hwtacacs-scheme-name [ local | none ] option when you configure a

Pagina 140

214 • Local accounting (local)—Local accounting is implemented on the access device. It counts and controls the number of concurrent users who use t

Pagina 141

215 Step Command Remarks 5. Specify the command accounting method. accounting command hwtacacs-scheme hwtacacs-scheme-name Optional. The default acc

Pagina 142

216 Step Command Remarks 2. Create a NAS ID profile and enter NAS ID profile view. aaa nas-id profile profile-name You can apply a NAS ID profile to

Pagina 143

217 Figure 157 Network diagram Configuring the RADIUS server on CAMS This section uses CAMS version 2.10-R0210. 1. Add an access device: a. Log i

Pagina 144

218 Enter username hello@bbb and set the password. Select Telnet as the service type. Set the EXEC privilege level to 3. This value identifies the pr

Pagina 145

219 Figure 160 Adding an access device 2. Add a user for device management: a. Click the User tab, and then select Access User View > Device M

Pagina 146

13 Figure 11 Creating an ACL • Enter the ACL number 2000. • Select the match order Config. • Click Apply. # Create a rule to allow Host A to acce

Pagina 147 - { Port number: 50100

220 Figure 161 Adding a user for device management Configuring the RADIUS server on IMC PLAT 5.0 This section uses IMC PL AT 5.0 (E0101H03) and IMC

Pagina 148

221 { IP address of the outbound interface (the default) Figure 162 Adding an access device 2. Add a user for device management: a. Click the Us

Pagina 149

222 Figure 163 Adding an account for device management Configuring SecPath You can use either method to configure SecPath. • Method 1: You can con

Pagina 150

223 Figure 164 RADIUS authentication server configuration page d. Click Apply. e. In the RADIUS Server Configuration area, click Add to configure

Pagina 151

224 Figure 166 RADIUS scheme configuration page # Enable the Telnet service on SecPath. [SecPath] telnet server enable # Configure SecPath to use A

Pagina 152

225 # Configure the IP address of interface GigabitEthernet 0/2, through which SecPath communicates with the server. [SecPath] interface GigabitEthe

Pagina 153 - Configuration considerations

226 Network requirements As shown in Figure 167, configure SecPath to perform local authentication and authorization for Telnet users. Figure 167 Net

Pagina 154

227 Level switching authentication for Telnet users by a RADIUS server The RADIUS server in this example runs ACSv4.0. Network requirements As shown

Pagina 155

228 # Configure the IP address of GigabitEthernet 0/2, through which SecPath communicates with the server. [SecPath] interface GigabitEthernet 0/2 [

Pagina 156

229 Configuring the RADIUS server Add the usernames and passwords for user privilege level switching authentication, as shown in Table 56 and Figure

Pagina 157

14 Figure 13 Configuring an ACL rule to deny access of other hosts to SecPath on Saturday and Sunday • Select Deny as the operation. • Select time

Pagina 158 - Troubleshooting portal

230 Figure 170 List of the usernames for privilege level switching Verifying the configuration After you complete the configuration, the user can T

Pagina 159 - Configuring AAA

231 Error: Invalid configuration or no response from the authentication server. Info: Change authentication mode to local. Password: Å Enter the p

Pagina 160 - Client/server model

232 Set the ports for authentication and accounting to 1812 and 1813, respectively. Select LAN Access Service as the service type. Select H3C as the

Pagina 161

233 Figure 173 Adding a charging plan 3. Add a service: a. Click the Service tab, and then select Access Service > Service Configuration from

Pagina 162 - RADIUS packet format

234 Select the user hello from the IMC Platform or add the user if it does not exist. Enter portal as the account name and set the password. Select

Pagina 163

235 { IP address specified with the nas-ip command on the access device { IP address specified with the radius nas-ip command on the access device

Pagina 164 - Extended RADIUS attributes

236 Figure 177 Adding a charging plan 3. Add a service: a. Click the Service tab, and then select User Access Manager > Service Configuration

Pagina 165 - HWTACACS

237 Select the user hello from the IMC Platform or add the user if it does not exist. Enter the account name portal and set the password. Select the

Pagina 166

238 Figure 180 Portal server configuration 2. Configure the IP address group: a. Select Access Service > Portal Service Management > IP Gro

Pagina 167 - Domain-based user management

239 Enable or disable IP address reallocation. To use direct portal authentication, select No from the Reallocate IP list. c. Leave the default sett

Pagina 168 - AAA across VPNs

15 Figure 15 Associating HTTP service with ACL 2000 • Click the + sign before HTTP to expand the configuration area. • Enter 2000 in the ACL fiel

Pagina 169 - RADIUS attributes

240 Figure 184 Port group configuration 5. Select Service Parameters > Validate System Configuration from the navigation tree to validate the c

Pagina 170

241 Figure 185 Portal server configuration 2. Configure the IP address group: a. Select User Access Manager > Portal Service Management > I

Pagina 171

242 a. Select User Access Manager > Portal Service Management > Device from the navigation tree. b. Click Add to configure a portal device as

Pagina 172 - Configuring AAA at the CLI

243 Select Portal_user from the IP Group list. The IP address used by the user to access the network must be within this IP address group. c. Leave

Pagina 173

244 [SecPath-isp-dm1] accounting portal radius-scheme rs1 [SecPath-isp-dm1] quit # Configure dm1 as the default ISP domain for all users. Then, if a

Pagina 174 - Configuring AAA schemes

245 Analysis 1. A communication failure exists between the NAS and the RADIUS server. 2. The username is not in the format of userid@isp-name or th

Pagina 175

246 Solution Check that: 1. The accounting port number is correctly set. 2. The authentication/authorization server and the accounting server are

Pagina 176 - Remarks

247 Configuring password control Feature and hardware compatibility Feature F1000-A-EI/E-SI/S-AI F1000-E F5000-A5 Firewall module FIPS No No No Ye

Pagina 177

248 system records the new password and the time. If the user chooses to leave the password or the user fails to change it, the system allows the use

Pagina 178

249 { Digits 0 to 9. { 32 special characters. For information about special characters, see the password-control composition command in Security Co

Pagina 179

16 Configuring a basic ACL Configuring an IPv4 basic ACL IPv4 basic ACLs match packets based only on source IP addresses. To configure an IPv4 basic A

Pagina 180

250 The system logs all successful password changing events and user blacklisting events due to login failures. Password control configuration task l

Pagina 181

251 To enable password control: Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the password control feature. password-contr

Pagina 182

252 Step Command Remarks 8. Specify the maximum number of login attempts and the action to be taken when a user fails to log in after the specified

Pagina 183

253 Step Command Remarks 5. Configure the password composition policy for the user group. password-control composition type-number type-number [ typ

Pagina 184

254 To switch from a lower user level to a higher one, a user needs to enter a password for authentication. This password is called a super password.

Pagina 185

255 Task Command Remarks Display information about users blacklisted due to authentication failure. display password-control blacklist [ user-name na

Pagina 186

256 [Sysname] password-control aging 30 # Set the minimum password update interval to 36 hours. [Sysname] password-control password update interval 3

Pagina 187

257 User authentication timeout: 60 seconds Maximum failed login attempts: 2 times Login attempt-failed action: Lock Minimu

Pagina 188

258 Configuring FIPS Feature and hardware compatibility Feature F1000-A-EI/E-SI/S-AI F1000-E F5000-A5 Firewall module FIPS No No No Yes Overview

Pagina 189 - Configuring SecPath

259 Enabling FIPS mode IMPORTANT: To enable both FIPS mode and password control, enable FIPS mode first and then password control. To disable both

Pagina 190

17 Step Command Remarks 4. Set the rule numbering step. step step-value Optional. 5 by default. 5. Create or edit a rule. rule [ rule-id ] { deny

Pagina 191

260 Table 58 Power-up self-tests Type Operations Cryptographic algorithm self-test Test the following algorithms: • DSA (signature and authenticat

Pagina 192 - Creating a RADIUS scheme

261 Displaying and maintaining FIPS Execute display commands in any view. Task Command Display FIPS state. display fips status

Pagina 193

262 Index A C D E F I L O P S T V Z A AAA configuration examples,216 AAA overview,149 Address resource overview,45 ASPF configuration example,104

Pagina 194

263 Service management configuration examples,35 Specifying a portal server for Layer 3 portal authentication,118 Specifying a source IP address for

Pagina 195

18 Step Command Remarks 5. Create or edit a rule. rule [ rule-id ] { deny | permit } protocol [ { { ack ack-value | fin fin-value | psh psh-value |

Pagina 196

19 Step Command Remarks 5. Create or edit a rule. rule [ rule-id ] { deny | permit } protocol [ { { ack ack-value | fin fin-value | psh psh-value |

Pagina 197

Preface The H3C SecPath Series High-End Firewalls documentation set includes 10 configuration guides, which describe the software features for the H3C

Pagina 198

20 Step Command Remarks 5. Create or edit a rule. rule [ rule-id ] { deny | permit } [ cos vlan-pri | counting | dest-mac dest-addr dest-mask | { l

Pagina 199

21 Step Command Remarks 2. Enable ACL acceleration for an IPv4 ACL. acl accelerate number acl-number Disabled by default. The ACL must exist. Only IP

Pagina 200

22 Figure 16 Network diagram Configuration procedure # Create a periodic time range from 8:00 to 18:00 on working days. <SecPath> system-view

Pagina 201

23 Reply from 1000::100: time<1ms Ping statistics for 1000::100: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip t

Pagina 202

24 Configuring security zones You can configure security zones only in the Web interface. To use an interface as a service interface, you must add it

Pagina 203

25 Figure 17 Zone classification Zone configuration task list Task Remarks Selecting the virtual device to which the specified zone belongs Option

Pagina 204 - Creating an HWTACACS scheme

26 Figure 18 Zone list 2. Click Add. Figure 19 Creating a zone 3. Configure the zone as described in Table 7. 4. Click Apply. Table 7 Configur

Pagina 205 - Configuring HWTACACS server

27 Figure 20 Modifying a zone 3. Configure the zone as described in Table 8. 4. Click Apply. Table 8 Configuration items Item Description Zone ID

Pagina 206

28 Item Description Preference Set the preference of the specified zone By default, packets from a high priority zone to a low priority zone are allo

Pagina 207 - Item Descri

29 Figure 21 Network diagram Configuration consideration By default, the system has created the Trust, DMZ and Untrust zones, and you only need to

Pagina 208

Convention Description &<1-n> The argument or keyword and argument combination before the ampersand (&) sign can be entered 1 to n times

Pagina 209 - 10.1.1.1/24

30 Figure 22 Configuring the Trust zone c. Select GigabitEthernet 0/1. d. Click Apply. 2. Configure the DMZ zone, and add interface GigabitEther

Pagina 210

31 Figure 23 Configuring the DMZ zone c. Select GigabitEthernet 0/2. d. Click Apply. 3. Configure the Untrust zone and add interface GigabitEthe

Pagina 211

32 Figure 24 Configuring the Untrust zone c. Select GigabitEthernet 0/3. d. Click Apply.

Pagina 212

33 Configuring service management Overview The service management module provides six types of services: FTP, Telnet, SSH, SFTP, HTTP, and HTTPS. You

Pagina 213

34 Configuring service management 1. Select Device Management > Service Management from the navigation tree. The service management configuration

Pagina 214

35 Item Description ACL Associate the HTTP service with an ACL. Only the clients that pass the ACL filtering are permitted to use the HTTP service. Y

Pagina 215

36 Configuring a periodic time range on Saturday and Sunday 1. Select Resource > Time Range from the navigation tree. 2. Click Add. The page fo

Pagina 216

37 a. Enter the ACL number 2000. b. Select the match order Config. c. Click Apply. Creating a rule to allow Host A to access SecPath 1. Click the

Pagina 217

38 Figure 30 Configuring an ACL rule to disable other hosts from accessing SecPath on Saturday and Sunday Configuring an ACL rule to allow other ho

Pagina 218

39 Figure 32 Associating HTTP service with ACL 2000 HTTPS configuration example Network requirements As shown in Figure 33, Host can access and con

Pagina 219 - Creating an ISP domain

Click the links on the top navigation bar to obtain different categories of product documentation: [Technical Support & Documents > Technical D

Pagina 220

40 The page for adding a PKI entity appears. Figure 34 Adding a PKI entity 3. Configure a PKI entity as shown in Figure 34. a. Enter en as the PK

Pagina 221

41 Figure 35 Adding a PKI domain 3. Add a PKI domain as shown in Figure 35. a. Enter 1 as the PKI domain name. b. Enter CA server as the CA iden

Pagina 222

42 2. Click Retrieve Cert. The page for retrieving a certificate appears. 3. Retrieve the CA certificate as shown in Figure 37. a. Select 1 as the

Pagina 223

43 Figure 39 Enabling HTTPS service 2. Select the Enable HTTPS service box. 3. Select CN=http-server1 from the certificate list. 4. Click Apply

Pagina 224

44 Verifying the configuration Open an Internet browser on Host and enter h t t p s : / / 10 .1.1.1 in the address bar to enter the web login interf

Pagina 225

45 Configuring address resources NOTE: The address resource configuration is available only in the web interface. Address resource overview Addre

Pagina 226 - AAA configuration examples

46 Figure 42 Host address resource configuration page Table 10 Configuration items Item Description IP Address Select either of them as the address

Pagina 227

47 Figure 43 Address range resource list Figure 44 Address range resource configuration page Table 11 Configuration items Item Description Name S

Pagina 228

48 Configuring a subnet address resource Select Resource > Address > IP Address from the navigation tree, and click the Subnet tab to enter the

Pagina 229

49 Item Description Exclude IP Address Specify the IP addresses to be excluded. • Type an IP address in the text box next to the Add button, and the

Pagina 230

i Contents Configuring ACLs ··························································································································

Pagina 231

50 Table 13 Configuration items Item Description Name Specify the name for the address group resource. IMPORTANT: All resources (excluding the time

Pagina 232

51 Table 14 Configuration items Item Description Name Specify the name for the MAC address resource. IMPORTANT: All resources (excluding the time ra

Pagina 233

52 Figure 52 MAC address group configuration page Table 15 Configuration items Item Description Name Specify the name for the MAC address group res

Pagina 234

53 Figure 53 Export configurations Importing resource configurations On any of the resource list page, click Import to bring up the dialog box as s

Pagina 235

54 Configuring service resources The service resource configuration is available only in the web interface. Overview A service resource defines a ser

Pagina 236

55 Configuring a customized service resource 1. Select Resource > Service > Customized Service from the navigation tree. All existing customiz

Pagina 237

56 Item Description TCP Source Port Set the source and destination TCP port ranges in the fields. These fields are available after you select TCP. •

Pagina 238

57 ICMP message name Type Code ttl-exceeded 11 0 Configuring a service group resource 1. Select Resource > Service > Service Group from the

Pagina 239 - $enab3$ pass3 3

58 Table 18 Configuration items Item Description Name Specify a unique name for the service group resource. IMPORTANT: Service and address resource

Pagina 240

59 Importing configurations 1. On the customized or service group resource list page, click Import. The page for importing configurations appears as

Pagina 241

ii Exporting and importing configuration ·············································································································

Pagina 242

60 Configuring time range resources Overview A time range resource defines a time range, which can be referenced by an ACL or an interzone policy to

Pagina 243

61 Figure 63 Time range resource configuration page Table 19 Configuration items Item Description Name Enter the name for the time range resource.

Pagina 244

62 Step Command Remarks 3. Display the configuration and status of one or all time ranges. display time-range { time-range-name | all } [ | { begin

Pagina 245

63 Interzone policy configuration NOTE: The interzone policy configuration is available only in the web interface. Interzone policy overview Inte

Pagina 246

64 Configuring an interzone policy Configuration task list NOTE: Before configuring an Interzone policy, be sure to configure the zones. For infor

Pagina 247

65 Figure 64 List of interzone policy rule list Table 21 Operations you can perform on the list Field Operation Source Address/Destination Address/

Pagina 248

66 Figure 65 Interzone policy rule configuration page Table 22 Configuration items Item Description Source Zone Specify the source zone for the in

Pagina 249

67 Item Description Service Select a service resource for the rule. You can select one service resource from the list or click Multiple to select mo

Pagina 250

68 Item Description Continue to add next rule Specify whether to create another rule after finishing this one. • If you select this box, you will ent

Pagina 251

69 Exporting and importing configuration Select Firewall > Security Policy > Interzone Policy from the navigation tree to enter the interzone p

Pagina 252

iii Configuring ASPF ·································································································································

Pagina 253

70 Table 23 Operations you can perform on the list Field Operation Referenced ACLs Click an ACL to enter the ACL configuration page, where you can vi

Pagina 254 - Troubleshooting AAA

71 results matching the search conditions. Click Reset in the Operation column to clear the packets statistics of the related interzone policy and at

Pagina 255

72 Figure 73 Network diagram Method 1: Configuring an interzone policy rule # Create a periodic time range from 8:00 to 18:00 on working days (from

Pagina 256 - Troubleshooting HWTACACS

73 Figure 75 Configure an IP address resource • Select the IP Address option. • Type public as the name. • Type 10 .1.1.12 as the IP address. T

Pagina 257 - Configuring password control

74 • Select Trust as the source zone and Untrust as the destination zone. • Select public as the address. • Select Permit as the filter action. •

Pagina 258

75 Figure 78 Configure a time range • Type worktime in the Name field. • Select the Periodic Time Range box. • Set the start time to 8:00. • Se

Pagina 259 - { Digits 0 to 9

76 Figure 80 Allow the host Public to access the external network at any time • Select Permit as the operation. • Select the Source IP Address bo

Pagina 260

77 Figure 81 Deny all the other hosts' access to the external network during working time • Select Deny as the operation. • Select the time

Pagina 261

78 • Select Trust as the source zone. • Select Untrust as the destination zone. • Select 3000 under Available ACLs, and click << to add it t

Pagina 262

79 Figure 83 Firewall policy configuration wizard: 1/7 3. Configure the items on the page. Table 27 Configuration items item Description Source Zo

Pagina 263

iv AAA overview ······································································································································

Pagina 264

80 Table 28 Configuration items Item Description Filter Action Specify the action to be taken for packets matching the firewall policy: • Permit—All

Pagina 265

81 Figure 86 Firewall policy configuration wizard: 4/7 9. Configure the items on the page. Table 30 Configuration items item Description Service (

Pagina 266

82 Figure 87 Firewall policy configuration wizard: 5/7 11. Configure the items on the page. Table 31 Configuration items Item Description Time Ran

Pagina 267

83 Figure 88 Firewall policy configuration wizard: 6/7 13. Configure the items as described in Table 32. Table 32 Configuration items Item Descrip

Pagina 268 - Configuring FIPS

84 Figure 89 Firewall policy configuration wizard: 7/7 15. Select whether to save the current configuration to the configuration files to be used

Pagina 269 - FIPS self-tests

85 Managing sessions Overview The session management feature is designed to manage sessions of applications such as network address translation (NAT)

Pagina 270 - Triggering a self-test

86 • Supporting ICMP error packet mapping and allowing the system to search for original sessions according to the payloads of these packets. As ICM

Pagina 271 - Task Command

87 Displaying and maintaining session management information Task Remarks Displaying session table information Display the session table information

Pagina 272 - A C D E F I L O P S T V Z

88 Figure 90 Session configuration 2. Configure the parameters as described in Table 33. 3. Click Apply.

Pagina 273

89 Table 33 Configuration items Item Description Enable unidirectional traffic detection Enable or disable unidirectional traffic detection. • With

Comentarios a estos manuales

Sin comentarios