H3c-technologies H3C SecPath F1000-E Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Sécurité H3c-technologies H3C SecPath F1000-E. H3C Technologies H3C SecPath F1000-E User Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 273
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1

H3C SecPath Series High-End FirewallsAccess Control Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com

Page 2

v Configuration consideration ························································································································

Page 3 - Preface

90 Displaying session table information 1. Select Firewall > Session Table > Session Summary from the navigation tree. The session table appe

Page 4 - Obtaining documentation

91 Table 35 Field description Field Description Protocol Transport layer protocol, which can be TCP, UDP, ICMP, or RAWIP State Session status, which

Page 5 - Documentation feedback

92 Figure 93 Global session statistics Table 36 Field description Item Description Current Session(s) Total number of sessions of the system Curren

Page 6 - Contents

93 Item Description RAWIP Session Establishment Rate RAWIP session establishment rate in a 1-second sampling interval Received TCP Packet(s) Number

Page 7

94 Displaying session statistics per IP address 1. Select Firewall > Session Table > Statistics from the navigation tree. 2. Click the IP Sta

Page 8

95 Field Description RAWIP Connection Count Number of current RAWIP connections RAWIP Connection Rate RAWIP connection establishment rate in a 5-sec

Page 9

96 Field Description TCP Connection Count Total number of TCP half-open connections, TCP half-close connections, and full TCP connections TCP Half-Op

Page 10

97 Configuring session aging timers based on application layer protocol types Aging timers set in this task apply only to the sessions in READY/ESTAB

Page 11 - Configuring ACLs

98 For more information about the configuration of basic and advance ACLs, see "Configuring ACLs." To specify the persistent session rule:

Page 12 - Match order

99 Configuring virtual fragment reassembly The virtual fragment reassembly configuration is available only in the Web interface. Overview To prevent

Page 13 - IPv4 ACL acceleration

1 Configuring ACLs NOTE: The IPv6 ACL configuration is available only at the CLI. Overview An access control list (ACL) is a set of rules (or perm

Page 14 - Creating an ACL

100 2. Configure the parameters as described in Table 40. 3. Click Apply. Table 40 Configuration items Item Description Security Zone Specify a se

Page 15 - Configuring a basic ACL rule

101 2. Configure a static address mapping: a. Select Firewall > NAT Policy > Static NAT from the navigation tree. b. Click Add in the Static

Page 16

102 Figure 101 Configuring virtual fragment reassembly After the configuration, if the SecPath receives disordered fragments from the security zone

Page 17

103 Configuring ASPF The ASPF configuration is available only in the Web interface. Overview Application Specific Packet Filter (ASPF) applications

Page 18

104 Figure 103 Adding an ASPF policy 4. Configure the parameters as described in Table 41. 5. Click Apply. Table 41 Configuration items Item Des

Page 19

105 Configuration procedure 1. Configure zone 1 and zone 2, and specify security zones for the interfaces. (Details not shown.) 2. Configure an ASP

Page 20

106 Configuring connection limits Overview If a client in an internal network initiates a large number of connections to the external network through

Page 21 - ACL configuration example

107 Figure 107 Connection limit policies 3. Click Add to add an entry as required. 4. Configure the necessary parameters as described in Table 42

Page 22 - Defining an ACL

108 Configuring connection limit at the CLI Connection limit configuration task list Complete the following tasks to configure connection limiting:

Page 23

109 Step Command 3. Configure an IP address-based connection limit rule. limit limit-id { source ip { ip-address mask-length | any } [ source-vpn sr

Page 24

2 Match order The rules in an ACL are sorted in a specific order. When a packet matches a rule, the device stops the match process and performs the ac

Page 25 - ACL configuration task list

110 Figure 108 Network diagram Configuration procedure The following describes only connection limit configuration steps. For more information abou

Page 26 - Configuring a basic ACL

111 Troubleshooting connection limit Connection limit rules with overlapping segments 1. Symptom On the SecPath, create a connection limit policy an

Page 27 - Configuring an advanced ACL

112 Configuring portal authentication The portal configuration is available only at the CLI. Feature and hardware compatibility Feature F1000-A-EI/E

Page 28

113 Figure 109 Portal system components Authentication client An authentication client is an entity seeking access to network resources. It is typi

Page 29

114 2. On the authentication homepage/authentication dialog box, the user enters and submits the authentication information, which the portal server

Page 30 - Copying an ACL

115 packets from the client to go through the access port. Because no Layer 3 devices are present between the authentication clients and the access d

Page 31

116 8. The security policy server exchanges security check information with the authentication client to check whether the authentication client mee

Page 32

117 Portal configuration task list Task Remarks Specifying a portal server for Layer 3 portal authentication Required Enabling Layer 3 portal authe

Page 33

118 NOTE: • For installation and configuration about the security policy server, see CAMS EAD Security Policy Component User Manual or IMC EAD Sec

Page 34 - Configuring security zones

119 there are Layer 3 forwarding devices between the authentication client and the access device, you must select the cross-subnet portal authenticat

Page 35 - Creating a zone

3 ACL rule numbering What is the ACL rule numbering step If you do not assign an ID to the rule you are creating, the system automatically assigns it

Page 36 - Configuring a zone member

120 NOTE: Regardless of whether portal authentication is enabled, you can only add or remove a portal-free rule. You cannot modify it. Configuring

Page 37 - Zone ID Display the zone ID

121 Specifying the authentication domain for portal users After you specify the authentication domain for portal users on an interface, the firewall

Page 38 - Zone configuration example

122 that is bound with the access VLAN. The value of this NAS ID will be used as that of the NAS-identifier attribute in the RADIUS packets to be sen

Page 39 - Configuration consideration

123 Specifying an auto redirection URL for authenticated portal users After a user passes portal authentication, if the access device is configured w

Page 40

124 NOTE: Adjust the maximum number of transmission attempts and the interval of sending probe packets according to the actual network conditions.

Page 41

125 You can configure any combination of the configuration items described as needed, with respect to the following: • If both detection methods are

Page 42

126 Step Command Remarks 2. Configure the portal user information synchronization function. portal server server-name user-sync [ interval interval

Page 43

127 Task Command Remarks Display the portal configuration of a specific interface. display portal interface interface-type interface-number [ | { beg

Page 44

128 Figure 112 Network diagram NOTE: • Configure IP addresses for the host, SecPath firewall, and servers as shown in Figure 112 and make suret

Page 45 - HTTP configuration example

129 • Enter the start IP address and end IP address of the IP group. Make sure that the IP address of the user host (2.2.2.2) is in the IP group. •

Page 46 - Creating a basic ACL

4 For example, when you use a large ACL for a session-based service, such as NAT or ASPF, you can enable ACL acceleration to avoid session timeouts ca

Page 47

130 Figure 116 Device list On the port group configuration page, click Add to enter the page for adding a port group, as shown in Figure 117. Perfo

Page 48

131 [SecPath-radius-rs1] key accounting radius # Specify that the ISP domain name should not be included in the username sent to the RADIUS server. [

Page 49 - HTTPS configuration example

132 ACL:NONE Work-mode:stand-alone MAC IP Vlan Interface ----------------------------------------------------------

Page 50 - Creating a PKI domain

133 Configuration procedure NOTE: • For re-DHCP authentication, configure a public address pool (20.20.20.0/24, in this example) and a private ad

Page 51 - Generating an RSA key pair

134 [SecPath] domain default enable dm1 3. Configure portal authentication on the SecPath: # Configure the portal server as follows: { Name: newpt

Page 52

135 Configuration procedure NOTE: • Make sure that the IP address of the portal device added on the portal server is the IP address of the interf

Page 53 - Adding a local user

136 { U R L : h t t p : / / 19 2 .16 8 . 0 .111:8080/portal. [SecPathA] portal server newpt ip 192.168.0.111 key portal port 50100 url http://192.1

Page 54

137 [SecPath] radius scheme rs1 # Set the server type for the RADIUS scheme. When using the CAMS or IMC server, set the server type to extended. [Se

Page 55 - Address resource overview

138 [SecPath] portal server newpt ip 192.168.0.111 key portal port 50100 url http://192.168.0.111:8080/portal # Enable extended portal authentication

Page 56

139 Configuration procedure NOTE: • For re-DHCP authentication, configure a public address pool (20.20.20.0/24, in this example) and a private ad

Page 57

5 Figure 1 ACL list Figure 2 ACL configuration page Table 3 Configuration items Item Description ACL Number Enter a number for the ACL. Match Ord

Page 58

140 [SecPath] domain default enable dm1 3. On the SecPath, configure the ACL (ACL 3000 ) for resources on subnet 192.168.0.0/24 and the ACL (ACL 300

Page 59

141 Figure 122 Network diagram Configuration procedure NOTE: • Make sure that the IP address of the portal device added on the portal server is

Page 60

142 [SecPathA-isp-dm1] authentication portal radius-scheme rs1 [SecPathA-isp-dm1] authorization portal radius-scheme rs1 [SecPathA-isp-dm1] accountin

Page 61

143 • The host is assigned with a public network IP address either manually or through DHCP. Before passing portal authentication, the host can acce

Page 62 - Exporting configuration

144 Log in to IMC and select the Service tab. Then, select Portal Service Management > Server from the navigation tree to enter the portal server

Page 63

145 • Set whether to enable IP address reallocation. Direct portal authentication is used in this example, and therefore select No from the Realloca

Page 64

146 Figure 128 Adding a port group # Select Service Parameters > Validate System Configuration from the navigation tree to validate the configur

Page 65

147 # Configure dm1 as the default ISP domain for all users. Then, if a user enters a username without any ISP domain at logon, the authentication an

Page 66

148 Troubleshooting portal Inconsistent keys on the access device and the portal server Symptom When a user is forced to access the portal server, th

Page 67

149 Configuring AAA Feature and hardware compatibility Feature F1000-A-EI/E-SI/S-AI F1000-E F5000-A5 Firewall module FIPS No No No Yes DVPN users N

Page 68 - Exporting configurations

6 Figure 3 List of basic ACL rules Figure 4 Basic ACL rule configuration page Table 4 Configuration items Item Description Rule ID Select the Rule

Page 69 - Importing configurations

150 accounting information to the servers. The RADIUS and HWTACACS protocols define how a NAS and a remote server exchange user information between t

Page 70

151 Security and authentication mechanisms RADIUS uses a shared key that is never transmitted over the network to authenticate information exchanged

Page 71

152 6. The user accesses the network resources. 7. The host requests the RADIUS client to tear down the connection and the RADIUS client sends a st

Page 72

153 • The Identifier field (1 byte long) is used to match request packets and response packets and to detect duplicate request packets. Request and

Page 73 - Interzone policy overview

154 No. Attribute No. Attribute 21 (unassigned) 68 Acct-Tunnel-Connection 22 Framed-Route 69 Tunnel-Password 23 Framed-IPX-Network 70 ARAP-Pas

Page 74

155 • Vendor-ID—Indicates the ID of the vendor. Its most significant byte is 0, and the other three bytes contains a code that is compliant to RFC 1

Page 75

156 HWTACACS RADIUS Supports authorization of configuration commands. Which commands a user can use depends on both the user level and the AAA author

Page 76

157 2. Upon receiving the request, the HWTACACS client sends a start-authentication packet to the HWTACACS server. 3. The HWTACACS server sends bac

Page 77

158 Figure 135 Determining the ISP domain of a user by the username The authentication, authorization, and accounting process of a user depends on

Page 78

159 Figure 136 Network diagram for AAA across VPNs NOTE: Together with the AAA across VPNs feature, you can implement portal authentication acros

Page 79

7 Item Description Source IP Address Select the Source IP Address box and enter a source IP address and source wildcard, in dotted decimal notation. S

Page 80

160 No. Attribute Description 7 Framed-Protocol Encapsulation protocol for framed access. 8 Framed-IP-Address IP address assigned to the user. 1

Page 81

161 No. Attribute Description 80 Message-Authenticator Used for authentication and checking of authentication packets to prevent spoofing Access-Req

Page 82

162 No. Sub-attribute Description 62 User_HeartBeat Hash value assigned after an 802.1X user passes authentication, which is a 32-byte string. This

Page 83

163 Figure 137 AAA configuration procedure Table 48 AAA configuration task list Task Remarks Configuring AAA schemes Configuring local users Requir

Page 84

164 Configuring AAA schemes Configuring local users To implement local user authentication, authorization, and accounting, you must create local user

Page 85

165 about binding attributes, see "Configuring local user attributes." Be cautious when deciding which binding attributes to configure for

Page 86

166 Step Command Remarks 1. Enter system view. system-view N/A 2. Set the password display mode for all local users. local-user password-display-m

Page 87

167 Step Command Remarks 8. Configure the password control attributes for the local user. • Set the password aging time: password-control aging agi

Page 88

168 Configuring user group attributes User groups simplify local user configuration and management. A user group comprises a group of local users and

Page 89

169 Displaying and maintaining local users and local user groups Task Command Remarks Display local user information. display local-user [ idle-cut

Page 90

8 Figure 6 Advanced ACL rule configuration page Table 5 Configuration items Item Description Rule ID Select the Rule ID box and enter a number for t

Page 91

170 Figure 139 RADIUS scheme configuration page 3. Enter a RADIUS scheme name. 4. Click the expand button before Advanced in the Common Configura

Page 92

171 Figure 140 Common configuration area 5. Configure the common parameters for the RADIUS scheme as described in Table 49. Table 49 Configuration

Page 93 - Function

172 Item Description Username Format Select the format of usernames to be sent to the RADIUS server. A username is generally in the format of userid@

Page 94

173 Item Description Request Transmission Attempts Set the maximum number of attempts for transmitting a RADIUS packet to a single RADIUS server. Be

Page 95 - Managing sessions

174 Item Description RADIUS Packet Source IP Specify the source IP address for the firewall to use in RADIUS packets sent to the RADIUS server. IMP

Page 96

175 Figure 141 RADIUS server configuration page 7. Configure the parameters of the RADIUS authentication servers and accounting servers as describ

Page 97

176 Figure 142 Network diagram Configuring the RADIUS server running on CAMS This example assumes that the RADIUS server runs on CAMS version 2.10-

Page 98 - 3. Click Apply

177 Enter hello@bbb as the user name. Set the password to abc and confirm the password. Select Telnet as the service type. Set the EXEC privilege lev

Page 99

178 Figure 145 Adding an access device The IP address of the access device must be the same as the source IP address of the RADIUS packets sent fro

Page 100

179 Figure 146 Adding an account for device management Configuring SecPath # Configure the IP address and security zone of each interface. (Details

Page 101

9 Item Description Source IP Address Select the Source IP Address box and enter a source IP address and source wildcard, in dotted decimal notation. S

Page 102

180 Figure 147 RADIUS authentication server configuration page 5. In the RADIUS Server Configuration area, click Add to configure a RADIUS account

Page 103

181 Figure 149 RADIUS scheme configuration page # Enable the Telnet service on SecPath. [SecPath] telnet server enable # Configure SecPath to use A

Page 104

182 Verifying the configuration After the configuration, the Telnet user should be able to Telnet to SecPath and use the configured account (username

Page 105

183 Specifying the RADIUS authentication/authorization servers You can specify one primary authentication/authorization server and up to 16 secondary

Page 106

184 Follow these guidelines when you configure RADIUS accounting servers: • The IP addresses of the primary and secondary accounting servers must be

Page 107

185 Step Command Remarks 1. Enter system view. system-view N/A 2. Enter RADIUS scheme view. radius scheme radius-scheme-name N/A 3. Specify a sha

Page 108 - Clearing sessions

186 NOTE: Changing the RADIUS server type restores the unit for data flows and that for the packets sent to the RADIUS server to the defaults. Set

Page 109 - Overview

187 • If you remove an authentication or accounting server in use, the communication of the firewall with the server soon times out, and the firewal

Page 110 - Configuring the SecPath

188 The firewall periodically sends accounting updates to RADIUS accounting servers to report the traffic statistics of online users. For normal and

Page 111

189 To specify a source IP address for all RADIUS schemes in a VPN or the public network: Step Command Remarks 1. Enter system view. system-view N

Page 112 - Configuration guidelines

Copyright © 2011-2013, Hangzhou H3C Technologies Co., Ltd. and its licensors All rights reserved No part of this manual may be reproduced or transmi

Page 113 - Configuring ASPF

10 Figure 7 List of Ethernet frame header ACL rules Figure 8 Ethernet frame header ACL rule configuration page Table 6 Configuration items Item De

Page 114 - ASPF configuration example

190 configured with small values. In this case, the next authentication or accounting attempt may succeed because the firewall has set the state of t

Page 115 - Configuration procedure

191 Configuring the IP address of the security policy server The core of the H3C EAD solution is integration and cooperation, and the security policy

Page 116

192 • The status of a RADIUS server changes. If a NAS receives no response to an accounting or authentication request before the specified maximum n

Page 117

193 Task Command Remarks Clear RADIUS statistics. reset radius statistics Available in user view Clear the buffered stop-accounting requests for wh

Page 118

194 { After receiving an authentication/accounting response from a server, the firewall changes the status of the server identified by the source IP

Page 119

195 Figure 150 Creating an HWTACACS scheme Configuring HWTACACS server 1. If the HWTACACS scheme system already exists, select User > HWTACACS

Page 120 - Verifying the configuration

196 Configuration item Description Secondary Server TCP Port Enter the TCP port of the secondary server. Configure different TCP port numbers specif

Page 121

197 Item Description Realtime-Accounting Interval Real-time accounting interval, whose value must be a multiple of 3. To implement real-time accounti

Page 122

198 Item Description Username Format Set the format of the username sent to the HWTACACS server. A username is generally in the format of userid@isp-

Page 123 - Security policy server

199 Figure 153 Network diagram Configuring the HWTACACS server # Set the shared keys to expert, add a Telnet user, and set a password for the user.

Page 124 - Portal authentication mode

11 Item Description Destination MAC Address Select the Destination MAC Address box and specify the destination MAC address and wildcard. Destination W

Page 125

200 Figure 155 Configuring an HWTACACS authentication server 5. On the page as shown in Figure 155, configure an HWTACACS authorization server for

Page 126

201 Figure 156 Configuring the parameters for communication # Through CLI, enable Telnet services on SecPath. <SecPath> system-view [SecPath]

Page 127 - Configuration prerequisites

202 Task Remarks Specifying the HWTACACS authentication servers Required Specifying the HWTACACS authorization servers Optional Specifying the HWTA

Page 128

203 Step Command Remarks 2. Enter HWTACACS scheme view. hwtacacs scheme hwtacacs-scheme-name N/A 3. Specify HWTACACS authentication servers. • Spe

Page 129

204 When the firewall receives a connection teardown request from a host or a connection teardown command from an administrator, it sends a stop-acco

Page 130

205 Step Command Remarks 3. Specify the shared keys for authenticating HWTACACS authentication, authorization, and accounting packets. key { account

Page 131

206 Step Command Remarks 2. Enter HWTACACS scheme view. hwtacacs scheme hwtacacs-scheme-name N/A 3. Set the format of usernames sent to the HWTACAC

Page 132

207 Step Command Remarks 2. Enter HWTACACS scheme view. hwtacacs scheme hwtacacs-scheme-name N/A 3. Specify a source IP address for outgoing HWTACA

Page 133

208 Displaying and maintaining HWTACACS Task Command Remarks Display the configuration information or statistics of HWTACACS schemes. display hwtaca

Page 134

209 Creating an ISP domain In a networking scenario with multiple ISPs, an access device may connect users of different ISPs, and users of different

Page 135

12 Figure 9 Network diagram Creating a time range # Create a periodic time range of Saturday and Sunday. • Select Resource > Time Range from th

Page 136 - Logging off portal users

210 Step Command Remarks 6. Enable the self-service server location function and specify the URL of the self-service server. self-service-url enable

Page 137

211 • Determine whether to configure an authentication method for all access types or service types. Follow these guidelines when you configure AAA

Page 138 - RADIUS server

212 Step Command Remarks 8. Specify the authentication method for SSL VPN users. authentication ssl-vpn radius-scheme radius-scheme-name Optional. T

Page 139

213 • If you specify the radius-scheme radius-scheme-name local or hwtacacs-scheme hwtacacs-scheme-name [ local | none ] option when you configure a

Page 140

214 • Local accounting (local)—Local accounting is implemented on the access device. It counts and controls the number of concurrent users who use t

Page 141

215 Step Command Remarks 5. Specify the command accounting method. accounting command hwtacacs-scheme hwtacacs-scheme-name Optional. The default acc

Page 142

216 Step Command Remarks 2. Create a NAS ID profile and enter NAS ID profile view. aaa nas-id profile profile-name You can apply a NAS ID profile to

Page 143

217 Figure 157 Network diagram Configuring the RADIUS server on CAMS This section uses CAMS version 2.10-R0210. 1. Add an access device: a. Log i

Page 144

218 Enter username hello@bbb and set the password. Select Telnet as the service type. Set the EXEC privilege level to 3. This value identifies the pr

Page 145

219 Figure 160 Adding an access device 2. Add a user for device management: a. Click the User tab, and then select Access User View > Device M

Page 146

13 Figure 11 Creating an ACL • Enter the ACL number 2000. • Select the match order Config. • Click Apply. # Create a rule to allow Host A to acce

Page 147 - { Port number: 50100

220 Figure 161 Adding a user for device management Configuring the RADIUS server on IMC PLAT 5.0 This section uses IMC PL AT 5.0 (E0101H03) and IMC

Page 148

221 { IP address of the outbound interface (the default) Figure 162 Adding an access device 2. Add a user for device management: a. Click the Us

Page 149

222 Figure 163 Adding an account for device management Configuring SecPath You can use either method to configure SecPath. • Method 1: You can con

Page 150

223 Figure 164 RADIUS authentication server configuration page d. Click Apply. e. In the RADIUS Server Configuration area, click Add to configure

Page 151

224 Figure 166 RADIUS scheme configuration page # Enable the Telnet service on SecPath. [SecPath] telnet server enable # Configure SecPath to use A

Page 152

225 # Configure the IP address of interface GigabitEthernet 0/2, through which SecPath communicates with the server. [SecPath] interface GigabitEthe

Page 153 - Configuration considerations

226 Network requirements As shown in Figure 167, configure SecPath to perform local authentication and authorization for Telnet users. Figure 167 Net

Page 154

227 Level switching authentication for Telnet users by a RADIUS server The RADIUS server in this example runs ACSv4.0. Network requirements As shown

Page 155

228 # Configure the IP address of GigabitEthernet 0/2, through which SecPath communicates with the server. [SecPath] interface GigabitEthernet 0/2 [

Page 156

229 Configuring the RADIUS server Add the usernames and passwords for user privilege level switching authentication, as shown in Table 56 and Figure

Page 157

14 Figure 13 Configuring an ACL rule to deny access of other hosts to SecPath on Saturday and Sunday • Select Deny as the operation. • Select time

Page 158 - Troubleshooting portal

230 Figure 170 List of the usernames for privilege level switching Verifying the configuration After you complete the configuration, the user can T

Page 159 - Configuring AAA

231 Error: Invalid configuration or no response from the authentication server. Info: Change authentication mode to local. Password: Å Enter the p

Page 160 - Client/server model

232 Set the ports for authentication and accounting to 1812 and 1813, respectively. Select LAN Access Service as the service type. Select H3C as the

Page 161

233 Figure 173 Adding a charging plan 3. Add a service: a. Click the Service tab, and then select Access Service > Service Configuration from

Page 162 - RADIUS packet format

234 Select the user hello from the IMC Platform or add the user if it does not exist. Enter portal as the account name and set the password. Select

Page 163

235 { IP address specified with the nas-ip command on the access device { IP address specified with the radius nas-ip command on the access device

Page 164 - Extended RADIUS attributes

236 Figure 177 Adding a charging plan 3. Add a service: a. Click the Service tab, and then select User Access Manager > Service Configuration

Page 165 - HWTACACS

237 Select the user hello from the IMC Platform or add the user if it does not exist. Enter the account name portal and set the password. Select the

Page 166

238 Figure 180 Portal server configuration 2. Configure the IP address group: a. Select Access Service > Portal Service Management > IP Gro

Page 167 - Domain-based user management

239 Enable or disable IP address reallocation. To use direct portal authentication, select No from the Reallocate IP list. c. Leave the default sett

Page 168 - AAA across VPNs

15 Figure 15 Associating HTTP service with ACL 2000 • Click the + sign before HTTP to expand the configuration area. • Enter 2000 in the ACL fiel

Page 169 - RADIUS attributes

240 Figure 184 Port group configuration 5. Select Service Parameters > Validate System Configuration from the navigation tree to validate the c

Page 170

241 Figure 185 Portal server configuration 2. Configure the IP address group: a. Select User Access Manager > Portal Service Management > I

Page 171

242 a. Select User Access Manager > Portal Service Management > Device from the navigation tree. b. Click Add to configure a portal device as

Page 172 - Configuring AAA at the CLI

243 Select Portal_user from the IP Group list. The IP address used by the user to access the network must be within this IP address group. c. Leave

Page 173

244 [SecPath-isp-dm1] accounting portal radius-scheme rs1 [SecPath-isp-dm1] quit # Configure dm1 as the default ISP domain for all users. Then, if a

Page 174 - Configuring AAA schemes

245 Analysis 1. A communication failure exists between the NAS and the RADIUS server. 2. The username is not in the format of userid@isp-name or th

Page 175

246 Solution Check that: 1. The accounting port number is correctly set. 2. The authentication/authorization server and the accounting server are

Page 176 - Remarks

247 Configuring password control Feature and hardware compatibility Feature F1000-A-EI/E-SI/S-AI F1000-E F5000-A5 Firewall module FIPS No No No Ye

Page 177

248 system records the new password and the time. If the user chooses to leave the password or the user fails to change it, the system allows the use

Page 178

249 { Digits 0 to 9. { 32 special characters. For information about special characters, see the password-control composition command in Security Co

Page 179

16 Configuring a basic ACL Configuring an IPv4 basic ACL IPv4 basic ACLs match packets based only on source IP addresses. To configure an IPv4 basic A

Page 180

250 The system logs all successful password changing events and user blacklisting events due to login failures. Password control configuration task l

Page 181

251 To enable password control: Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the password control feature. password-contr

Page 182

252 Step Command Remarks 8. Specify the maximum number of login attempts and the action to be taken when a user fails to log in after the specified

Page 183

253 Step Command Remarks 5. Configure the password composition policy for the user group. password-control composition type-number type-number [ typ

Page 184

254 To switch from a lower user level to a higher one, a user needs to enter a password for authentication. This password is called a super password.

Page 185

255 Task Command Remarks Display information about users blacklisted due to authentication failure. display password-control blacklist [ user-name na

Page 186

256 [Sysname] password-control aging 30 # Set the minimum password update interval to 36 hours. [Sysname] password-control password update interval 3

Page 187

257 User authentication timeout: 60 seconds Maximum failed login attempts: 2 times Login attempt-failed action: Lock Minimu

Page 188

258 Configuring FIPS Feature and hardware compatibility Feature F1000-A-EI/E-SI/S-AI F1000-E F5000-A5 Firewall module FIPS No No No Yes Overview

Page 189 - Configuring SecPath

259 Enabling FIPS mode IMPORTANT: To enable both FIPS mode and password control, enable FIPS mode first and then password control. To disable both

Page 190

17 Step Command Remarks 4. Set the rule numbering step. step step-value Optional. 5 by default. 5. Create or edit a rule. rule [ rule-id ] { deny

Page 191

260 Table 58 Power-up self-tests Type Operations Cryptographic algorithm self-test Test the following algorithms: • DSA (signature and authenticat

Page 192 - Creating a RADIUS scheme

261 Displaying and maintaining FIPS Execute display commands in any view. Task Command Display FIPS state. display fips status

Page 193

262 Index A C D E F I L O P S T V Z A AAA configuration examples,216 AAA overview,149 Address resource overview,45 ASPF configuration example,104

Page 194

263 Service management configuration examples,35 Specifying a portal server for Layer 3 portal authentication,118 Specifying a source IP address for

Page 195

18 Step Command Remarks 5. Create or edit a rule. rule [ rule-id ] { deny | permit } protocol [ { { ack ack-value | fin fin-value | psh psh-value |

Page 196

19 Step Command Remarks 5. Create or edit a rule. rule [ rule-id ] { deny | permit } protocol [ { { ack ack-value | fin fin-value | psh psh-value |

Page 197

Preface The H3C SecPath Series High-End Firewalls documentation set includes 10 configuration guides, which describe the software features for the H3C

Page 198

20 Step Command Remarks 5. Create or edit a rule. rule [ rule-id ] { deny | permit } [ cos vlan-pri | counting | dest-mac dest-addr dest-mask | { l

Page 199

21 Step Command Remarks 2. Enable ACL acceleration for an IPv4 ACL. acl accelerate number acl-number Disabled by default. The ACL must exist. Only IP

Page 200

22 Figure 16 Network diagram Configuration procedure # Create a periodic time range from 8:00 to 18:00 on working days. <SecPath> system-view

Page 201

23 Reply from 1000::100: time<1ms Ping statistics for 1000::100: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip t

Page 202

24 Configuring security zones You can configure security zones only in the Web interface. To use an interface as a service interface, you must add it

Page 203

25 Figure 17 Zone classification Zone configuration task list Task Remarks Selecting the virtual device to which the specified zone belongs Option

Page 204 - Creating an HWTACACS scheme

26 Figure 18 Zone list 2. Click Add. Figure 19 Creating a zone 3. Configure the zone as described in Table 7. 4. Click Apply. Table 7 Configur

Page 205 - Configuring HWTACACS server

27 Figure 20 Modifying a zone 3. Configure the zone as described in Table 8. 4. Click Apply. Table 8 Configuration items Item Description Zone ID

Page 206

28 Item Description Preference Set the preference of the specified zone By default, packets from a high priority zone to a low priority zone are allo

Page 207 - Item Descri

29 Figure 21 Network diagram Configuration consideration By default, the system has created the Trust, DMZ and Untrust zones, and you only need to

Page 208

Convention Description &<1-n> The argument or keyword and argument combination before the ampersand (&) sign can be entered 1 to n times

Page 209 - 10.1.1.1/24

30 Figure 22 Configuring the Trust zone c. Select GigabitEthernet 0/1. d. Click Apply. 2. Configure the DMZ zone, and add interface GigabitEther

Page 210

31 Figure 23 Configuring the DMZ zone c. Select GigabitEthernet 0/2. d. Click Apply. 3. Configure the Untrust zone and add interface GigabitEthe

Page 211

32 Figure 24 Configuring the Untrust zone c. Select GigabitEthernet 0/3. d. Click Apply.

Page 212

33 Configuring service management Overview The service management module provides six types of services: FTP, Telnet, SSH, SFTP, HTTP, and HTTPS. You

Page 213

34 Configuring service management 1. Select Device Management > Service Management from the navigation tree. The service management configuration

Page 214

35 Item Description ACL Associate the HTTP service with an ACL. Only the clients that pass the ACL filtering are permitted to use the HTTP service. Y

Page 215

36 Configuring a periodic time range on Saturday and Sunday 1. Select Resource > Time Range from the navigation tree. 2. Click Add. The page fo

Page 216

37 a. Enter the ACL number 2000. b. Select the match order Config. c. Click Apply. Creating a rule to allow Host A to access SecPath 1. Click the

Page 217

38 Figure 30 Configuring an ACL rule to disable other hosts from accessing SecPath on Saturday and Sunday Configuring an ACL rule to allow other ho

Page 218

39 Figure 32 Associating HTTP service with ACL 2000 HTTPS configuration example Network requirements As shown in Figure 33, Host can access and con

Page 219 - Creating an ISP domain

Click the links on the top navigation bar to obtain different categories of product documentation: [Technical Support & Documents > Technical D

Page 220

40 The page for adding a PKI entity appears. Figure 34 Adding a PKI entity 3. Configure a PKI entity as shown in Figure 34. a. Enter en as the PK

Page 221

41 Figure 35 Adding a PKI domain 3. Add a PKI domain as shown in Figure 35. a. Enter 1 as the PKI domain name. b. Enter CA server as the CA iden

Page 222

42 2. Click Retrieve Cert. The page for retrieving a certificate appears. 3. Retrieve the CA certificate as shown in Figure 37. a. Select 1 as the

Page 223

43 Figure 39 Enabling HTTPS service 2. Select the Enable HTTPS service box. 3. Select CN=http-server1 from the certificate list. 4. Click Apply

Page 224

44 Verifying the configuration Open an Internet browser on Host and enter h t t p s : / / 10 .1.1.1 in the address bar to enter the web login interf

Page 225

45 Configuring address resources NOTE: The address resource configuration is available only in the web interface. Address resource overview Addre

Page 226 - AAA configuration examples

46 Figure 42 Host address resource configuration page Table 10 Configuration items Item Description IP Address Select either of them as the address

Page 227

47 Figure 43 Address range resource list Figure 44 Address range resource configuration page Table 11 Configuration items Item Description Name S

Page 228

48 Configuring a subnet address resource Select Resource > Address > IP Address from the navigation tree, and click the Subnet tab to enter the

Page 229

49 Item Description Exclude IP Address Specify the IP addresses to be excluded. • Type an IP address in the text box next to the Add button, and the

Page 230

i Contents Configuring ACLs ··························································································································

Page 231

50 Table 13 Configuration items Item Description Name Specify the name for the address group resource. IMPORTANT: All resources (excluding the time

Page 232

51 Table 14 Configuration items Item Description Name Specify the name for the MAC address resource. IMPORTANT: All resources (excluding the time ra

Page 233

52 Figure 52 MAC address group configuration page Table 15 Configuration items Item Description Name Specify the name for the MAC address group res

Page 234

53 Figure 53 Export configurations Importing resource configurations On any of the resource list page, click Import to bring up the dialog box as s

Page 235

54 Configuring service resources The service resource configuration is available only in the web interface. Overview A service resource defines a ser

Page 236

55 Configuring a customized service resource 1. Select Resource > Service > Customized Service from the navigation tree. All existing customiz

Page 237

56 Item Description TCP Source Port Set the source and destination TCP port ranges in the fields. These fields are available after you select TCP. •

Page 238

57 ICMP message name Type Code ttl-exceeded 11 0 Configuring a service group resource 1. Select Resource > Service > Service Group from the

Page 239 - $enab3$ pass3 3

58 Table 18 Configuration items Item Description Name Specify a unique name for the service group resource. IMPORTANT: Service and address resource

Page 240

59 Importing configurations 1. On the customized or service group resource list page, click Import. The page for importing configurations appears as

Page 241

ii Exporting and importing configuration ·············································································································

Page 242

60 Configuring time range resources Overview A time range resource defines a time range, which can be referenced by an ACL or an interzone policy to

Page 243

61 Figure 63 Time range resource configuration page Table 19 Configuration items Item Description Name Enter the name for the time range resource.

Page 244

62 Step Command Remarks 3. Display the configuration and status of one or all time ranges. display time-range { time-range-name | all } [ | { begin

Page 245

63 Interzone policy configuration NOTE: The interzone policy configuration is available only in the web interface. Interzone policy overview Inte

Page 246

64 Configuring an interzone policy Configuration task list NOTE: Before configuring an Interzone policy, be sure to configure the zones. For infor

Page 247

65 Figure 64 List of interzone policy rule list Table 21 Operations you can perform on the list Field Operation Source Address/Destination Address/

Page 248

66 Figure 65 Interzone policy rule configuration page Table 22 Configuration items Item Description Source Zone Specify the source zone for the in

Page 249

67 Item Description Service Select a service resource for the rule. You can select one service resource from the list or click Multiple to select mo

Page 250

68 Item Description Continue to add next rule Specify whether to create another rule after finishing this one. • If you select this box, you will ent

Page 251

69 Exporting and importing configuration Select Firewall > Security Policy > Interzone Policy from the navigation tree to enter the interzone p

Page 252

iii Configuring ASPF ·································································································································

Page 253

70 Table 23 Operations you can perform on the list Field Operation Referenced ACLs Click an ACL to enter the ACL configuration page, where you can vi

Page 254 - Troubleshooting AAA

71 results matching the search conditions. Click Reset in the Operation column to clear the packets statistics of the related interzone policy and at

Page 255

72 Figure 73 Network diagram Method 1: Configuring an interzone policy rule # Create a periodic time range from 8:00 to 18:00 on working days (from

Page 256 - Troubleshooting HWTACACS

73 Figure 75 Configure an IP address resource • Select the IP Address option. • Type public as the name. • Type 10 .1.1.12 as the IP address. T

Page 257 - Configuring password control

74 • Select Trust as the source zone and Untrust as the destination zone. • Select public as the address. • Select Permit as the filter action. •

Page 258

75 Figure 78 Configure a time range • Type worktime in the Name field. • Select the Periodic Time Range box. • Set the start time to 8:00. • Se

Page 259 - { Digits 0 to 9

76 Figure 80 Allow the host Public to access the external network at any time • Select Permit as the operation. • Select the Source IP Address bo

Page 260

77 Figure 81 Deny all the other hosts' access to the external network during working time • Select Deny as the operation. • Select the time

Page 261

78 • Select Trust as the source zone. • Select Untrust as the destination zone. • Select 3000 under Available ACLs, and click << to add it t

Page 262

79 Figure 83 Firewall policy configuration wizard: 1/7 3. Configure the items on the page. Table 27 Configuration items item Description Source Zo

Page 263

iv AAA overview ······································································································································

Page 264

80 Table 28 Configuration items Item Description Filter Action Specify the action to be taken for packets matching the firewall policy: • Permit—All

Page 265

81 Figure 86 Firewall policy configuration wizard: 4/7 9. Configure the items on the page. Table 30 Configuration items item Description Service (

Page 266

82 Figure 87 Firewall policy configuration wizard: 5/7 11. Configure the items on the page. Table 31 Configuration items Item Description Time Ran

Page 267

83 Figure 88 Firewall policy configuration wizard: 6/7 13. Configure the items as described in Table 32. Table 32 Configuration items Item Descrip

Page 268 - Configuring FIPS

84 Figure 89 Firewall policy configuration wizard: 7/7 15. Select whether to save the current configuration to the configuration files to be used

Page 269 - FIPS self-tests

85 Managing sessions Overview The session management feature is designed to manage sessions of applications such as network address translation (NAT)

Page 270 - Triggering a self-test

86 • Supporting ICMP error packet mapping and allowing the system to search for original sessions according to the payloads of these packets. As ICM

Page 271 - Task Command

87 Displaying and maintaining session management information Task Remarks Displaying session table information Display the session table information

Page 272 - A C D E F I L O P S T V Z

88 Figure 90 Session configuration 2. Configure the parameters as described in Table 33. 3. Click Apply.

Page 273

89 Table 33 Configuration items Item Description Enable unidirectional traffic detection Enable or disable unidirectional traffic detection. • With

Commentaires sur ces manuels

Pas de commentaire