NEC Corporation of America. Design Guide for Port Based Network Access Control (NAC)/802.1x and OpenFlow Network Integration. Version 3.

Size: px
Start display at page:

Download "NEC Corporation of America. Design Guide for Port Based Network Access Control (NAC)/802.1x and OpenFlow Network Integration. Version 3."

Transcription

1 NEC Corporation of America Design Guide for Port Based Network Access Control (NAC)/802.1x and OpenFlow Network Integration Version 3.0

2 Table of Contents 1. Introduction Error Bookmark not defined. 1.1 Purpose Error Bookmark not defined. 1.2 Overview Error Bookmark not defined. 2. Use Cases for Wired Users and Wireless Users Demo Environment Wired users Error Bookmark not defined. 2.3 Wireless users Error Bookmark not defined. 3. Configuration Examples Dell PoE 802.1x enabled Switch Radius Server to use FreeRadius Server 4 4. OpenFlow Switches and ProgrammableFlow Controller OFS versions OFS types Edge OFS: Core OFS: PFC Configuration Example 8 5. Glossary 11 Revision History 11 NEC Corporation of America, 2015 Page 2 of 11

3 1. Use Cases for Wired Users and Wireless Users 1.1 Demo Environment The following servers and switches are used to build the demo for both use cases as a reference. Switch/Server Hardware OS Software Version ProgrammableFlow Controller PFC V6.0 NEC Express5800/R120b-2 CPU: Intel(R) Xeon(R) CPU X5690 Memory: 24GB HDD: 300GB, 10000rpm, (RAID-1) NIC: 1000Base-T x 6 Power: AC100V/200V±10%, Redundant power supply FAN: Redundant fan Optical drive for DVD-RAM Red Hat Enterprise Linux 6.4 (x86_64) Kernel version: kernel el6.x86_64 RADIUS Server ESXi VM CentOS 6.4 FreeRADIUS running version DHCP Server ESXi VM CentOS 6.4 Wireless LAN Controller ESXi VM Meru WLC MC4200V sdn x Switch Dell PowerConnect5524P Firmware PF5240 Switch PF5240R-48T4XW-AX OS-F3PA Ver. V PF5820 Switch NEC PF5820 Software Version Management/Secure Channel Switch Cisco 2960S IOS 12.2(55)SE7 2. Configuration Examples 2.1 Dell PoE 802.1x enabled Switch vlan 2,11-20,55, ,4000 radius-server host usage dot1.x radius-server key testing123 logging host severity debugging aaa authentication dot1x default radius interface vlan 2 ip address < Dell Switch Mgmt interface vlan 4000 ip address interface gigabitethernet1/0/2 < Radius Server switchport access vlan 2 interface gigabitethernet1/0/3 <----In this demo,vlan 12 will be assigned after authentication dot1x host-mode multi-sessions dot1x reauthentication dot1x radius-attributes vlan dot1x port-control auto NEC Corporation of America, 2015 Page 3 of 11

4 interface gigabitethernet1/0/4 < Uplink to PFS (MCLAG) switchport mode trunk switchport trunk allowed vlan remove 1-2,11,4000 interface gigabitethernet1/0/5 < Uplink to PFS (MCLAG) switchport mode trunk switchport trunk allowed vlan remove 1-2,11,4000 interface gigabitethernet1/0/6 <---- In this demo,vlan 13 will be assigned after authentication dot1x host-mode multi-sessions dot1x reauthentication dot1x radius-attributes vlan dot1x port-control auto interface gigabitethernet1/0/7 < Meru AP switchport access vlan 2 interface gigabitethernet1/0/8 < Meru WLC switchport mode trunk switchport access vlan none switchport trunk native vlan 2 switchport trunk allowed vlan remove 1,11-20,4000 interface gigabitethernet1/0/24 < Uplink to management network switchport access vlan Radius Server to use FreeRadius Server Details Tips for CentOS (Warning: You should read the manual to get more detail configuration info. The following is just tips to help you get you started the server) FreeRadius Server Installation: yum install freeradius freeradius-mysql freeradius-utils mysql-server -y mysql setup service mysqld start chkconfig --levels 235 mysqld on /usr/bin/mysql_secure_installation mysql -uroot -p CREATE DATABASE radius; GRANT ALL PRIVILEGES ON radius.* TO radius@localhost IDENTIFIED BY " YourPASSWORD "; flush privileges; mysql> use radius; SOURCE /etc/raddb/sql/mysql/schema.sql SOURCE /etc/raddb/sql/mysql/admin.sql SOURCE /etc/raddb/sql/mysql/nas.sql NEC Corporation of America, 2015 Page 4 of 11

5 mysql> INSERT INTO `radcheck` (`id`, `username`, `attribute`, `op`, `value`) VALUES (1,'test','User-Password',':=','test'); Now open up CentOS:/etc/raddb/sql.conf and enter your mysql database details you just created, Example: # Connection info: server = "localhost" #port = 3306 login = "radius" password = "YourPASSWORD" # Database table configuration for everything except Oracle radius_db = "radius" In /etc/raddb/radiusd.conf ensure that the line saying: $INCLUDE sql.conf is uncommented. FreeRadius server configuration to enable, EAP and PEAP /etc/raddb/eap.conf eap{ use_tunneled_reply = yes peap { copy_request_to_tunnel = yes use_tunneled_reply = yes Open up /etc/raddb/clients.conf set your secret to something a bit more random, example: Change: secret = yoursecret Debug mode of Radius server command: radiusd X /etc/raddb/users to manage user credentials and VLAN info, one option to test quickly. Using DB tables is recommendable for production level setup. /etc/raddb/authorized_macs to manage MAC addresses of each user: add new MACs for end stations to come in to the network. The following scenario is from wireless use case when wireless end station uses PEAP and MS-CHAPv2 with lee user name and D2-A0 MAC address. Password is hidden from debugging messages. /etc/raddb/users has user credentials and VLAN info. An example of debugging messages from Radius Server with the request from 802.1x switch which authentication request comes from end stations: NEC Corporation of America, 2015 Page 5 of 11

6 rad_recv: Access-Request packet from host port 65412, id=10, length=196 < is 802.1x switch IP User-Name = "lee" <- User Name NAS-IP-Address = NAS-Port = 0 Called-Station-Id = "80-EA-96-F :8021x" Calling-Station-Id = " D2-A0" < x s client, supplicant s MAC address Framed-MTU = 1400 NAS-Port-Type = Wireless Connect-Info = "CONNECT 0Mbps " EAP-Message = 0x02f1002b a941fee3dfc1e8bc55c8f52a359c7f0db0271abb69d40f92c03f4e50a30e4139 State = 0x8996e0de8067f944f83f a9247 Message-Authenticator = 0x009d ddfbce7c61491f29fba2a Sending Access-Accept of id 10 to port <- Response to 802.1x switch Reply-Message = "Device with MAC Address d2-a0 authorized for network access" <- Authorized calling station Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "14" Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "14" <- VLAN ID set in Radius Server for the specific user, lee User-Name = "lee" <- lee User Name got authenticated MS-MPPE-Recv-Key = 0x6874f146e6fdf017b39f4975a31943dfa85d14db137ee592f1c3410ca32921de MS-MPPE-Send-Key = 0x6fb8154bdf06f911cca4883e82003e8d8ce bfd5d1263d72702d4fbc11 EAP-Message = 0x03f10004 Message-Authenticator = 0x NEC Corporation of America, 2015 Page 6 of 11

7 3. OpenFlow Switches and ProgrammableFlow Controller An Openflow switch is a software program or a hardware that forwards packets based on the flow rules defined by an Openflow Controller. The configuration is based on Figure 2 and Figure 7 to illustrate physical topology. 3.1 OFS versions 1. Openflow version Openflow version 1.3 The demo was built based on OF1.3. OF version doesn t matter for this demo. The example is a just reference. PFC example config for OF1.3 network-default { openflow-version 1.3 PF5240 openflow openflow-id 1 protocol-version OFS types The demo shows to enable VLAN auto configuration so that PFC automatically sets VLANS into switches to avoid VLAN configuration mistakes on each switch. Currently VLAN auto configuration from PFC works only on NEC PF524x switches. 1. Edge OFS 2. Core OFS Edge OFS: Edge OFS are used to connect hosts/vms/non-openflow devices. This demo used PF5240. PF5240 SW1 interface gigabitethernet 0/15 description "Uplink from 0/4 of Dell" initial-inactive switchport mode trunk openflow-table-resource mode 14 openflow openflow-id 1 protocol-version 04 controller controller-name pfcserver dpid table normal1 priority table expanded priority openflow-interface gigabitethernet 0/1-40, gigabitethernet 0/43-48, tengigabitethernet 0/49-52 emergency-mode disable mac-learning disable enable PF5240 SW2 interface gigabitethernet 0/15 description "Uplink from 0/5 of Dell" initial-inactive switchport mode trunk openflow openflow-id 1 NEC Corporation of America, 2015 Page 7 of 11

8 protocol-version 04 controller controller-name pfcserver dpid table normal1 priority table expanded priority openflow-interface gigabitethernet 0/1-40, gigabitethernet 0/43-48, tengigabitethernet 0/49-52 emergency-mode disable mac-learning disable enable Core OFS: Core switches are connected to other edge OFS only and not to any non-openflow devices. This demo used PF5820. Core VLAN 4009 should be set manually on PF5820, but 4009 was set automatically on Edge OFS. interface port 59 no learning switchport access vlan 4009 flood-blocking exit interface port 60 no learning switchport access vlan 4009 flood-blocking exit To enable VLAN auto configuration on PFC side: real-network { vlan-connect enable vlan-auto-configuration enable 3.3 PFC Configuration Example The following is the example of PFC configuration of wired scenario with DHCP Server being in OpenFlow network. PFC works as a DHCP relay agent in this example as shown in Figure 3 and Figure 1. real-network { flow-entry-list dhcp { sequence-number 10 { mac-destination-address wildcard feff.ffff.ffff mac-ether-type 0x800 ip-protocol 17 l4-destination-port 67 l4-source-port 68 vtn 8021xDemoVTN { vbridge vbr0013 { vlan-map vlan-id 13 <- end station will be dynamically detected by PFC when VLAN tagged packet (VLAN 13) comes into OpenFlow network initially interface if_vrt vbridge vbr0020 { NEC Corporation of America, 2015 Page 8 of 11

9 vlan-map vlan-id 4012 interface vbif00020 interface vbiftovrt vbridge vbr0033 { vlan-map vlan-id 33 interface if_s2 interface if_vrt vrouter vrt { interface if_vbr0013 { ip address /24 interface if_vbr0020 { ip address /24 interface if_vbr0033 { ip address /24 dhcp-relay server dhcp-relay interface if_vbr0013 dhcp-relay interface if_vbr0020 dhcp-relay enable vexternal DHCPserver { ofs-map ofs-datapath-id ofs-port GBE0/13 vlan-id 4012 tagged interface veif vexternal Server2 { ofs-map ofs-datapath-id ofs-port GBE0/13 vlan-id 33 tagged interface veif vlink vl_vbr001_vrt_ { vtn link vbridge vbr0013 interface if_vrt vtnnode vrt interface if_vbr0013 vlink vl_vbr002_dhcpserv_ { vtn link vbridge vbr0020 interface vbif00020 vtnnode DHCPserver interface veif vlink vl_vbr002_server2_ { vtn link vbridge vbr0033 interface if_s2 vtnnode Server2 interface veif vlink vl_vbr002_vrt_ { vtn link vbridge vbr0033 interface if_vrt vtnnode vrt interface if_vbr0033 vlink vl_vbr002_vrt_ { vtn link vbridge vbr0020 interface vbiftovrt vtnnode vrt interface if_vbr0020 NEC Corporation of America, 2015 Page 9 of 11

10 The following is the example of PFC configuration of wireless scenario with DHCP Server being in traditional network. WLC works as a DHCP server in this example as shown in Figure 8 and Figure 9. vtn WirelessVTN { vbridge vb14 { vlan-map vlan-id 14 <- end station will be dynamically detected by PFC when VLAN tagged packets (VLAN 14) comes into OpenFlow network initially interface vbifrouter14 vbridge vb44 { vlan-map vlan-id 44 interface vbif44 interface vbrouter44 vrouter vr { interface vrif14 { ip address /24 interface vrif44 { ip address /24 vexternal ve44 { ofs-map ofs-datapath-id ofs-port GBE0/13 vlan-id 44 tagged interface veif vlink vl_vb14_vr_ { vtn link vbridge vb14 interface vbifrouter14 vtnnode vr interface vrif14 vlink vl_vb44_ve44_ { vtn link vbridge vb44 interface vbif44 vtnnode ve44 interface veif vlink vl_vb44_vr_ { vtn link vbridge vb44 interface vbrouter44 vtnnode vr interface vrif44 Warning: To make PFC configuration clear on each VTN in this demo, MCLAG setting on PFC is omitted x Supplicant Configuration Example on Windows and Linux Clients Windows for wired and wireless Linux CentOS or RedHat Configuring_Connection_Settings.html NEC Corporation of America, 2015 Page 10 of 11

11 4. Glossary PFC NEC PF6800 ProgrammableFlow Controller PFS NEC PF524x/PF5820 ProgrammableFlow Switch NAC Network Access Control PEAP Protected Extensible Authentication Protocol RADIUS Remote Authentication Dial In User Service WLC Wireless LAN Controller AP Access Point OFS OpenFlow Switch Revision History Revision Date Author Note 1 1/22,2015 Jenny Initial version Oshima 2 2/3, 2015 Jenny Oshima Added wired/wireless user scenarios, configuration examples, supplicant configuration NEC Corporation of America, 2015 Page 11 of 11

How to Configure a BYOD Environment with the Unified AP in Standalone Mode

How to Configure a BYOD Environment with the Unified AP in Standalone Mode Configuration Guide How to Configure a BYOD Environment with the Unified AP in Standalone Mode Overview This guide describes how to configure and implement BYOD environment with the D-Link Unified Access

More information

CT5760 Controller and Catalyst 3850 Switch Configuration Example

CT5760 Controller and Catalyst 3850 Switch Configuration Example CT5760 Controller and Catalyst 3850 Switch Configuration Example Document ID: 116342 Contributed by Antoine KMEID and Serge Yasmine, Cisco TAC Engineers. Aug 13, 2013 Contents Introduction Prerequisites

More information

Deploying the BIG-IP System v11 with RADIUS Servers

Deploying the BIG-IP System v11 with RADIUS Servers Deployment Guide Deploying the BIG-IP System v11 with What s inside: 2 Prerequisites and configuration notes 2 Configuration example 3 Preparation Worksheet 4 Configuring the BIG-IP iapp for RADIUS 7 Next

More information

Configuring RADIUS Servers

Configuring RADIUS Servers CHAPTER 13 This chapter describes how to enable and configure the Remote Authentication Dial-In User Service (RADIUS), that provides detailed accounting information and flexible administrative control

More information

Network Security Solutions Implementing Network Access Control (NAC)

Network Security Solutions Implementing Network Access Control (NAC) Network Security Solutions Implementing Network Access Control (NAC) Tested Solution: Protecting a network with Sophos NAC Advanced and Switches Sophos NAC Advanced is a sophisticated Network Access Control

More information

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide Overview Interlink Networks Secure.XS and Cisco Wireless Deployment Guide (An AVVID certification required document) This document is intended to serve as a guideline to setup Interlink Networks Secure.XS

More information

TotalCloud Phone System

TotalCloud Phone System TotalCloud Phone System Cisco SF 302-08P PoE VLAN Configuration Guide Note: The below information and configuration is for deployment of the Cbeyond managed switch solution using the Cisco 302 8 port Power

More information

Install Guide for JunosV Wireless LAN Controller

Install Guide for JunosV Wireless LAN Controller The next-generation Juniper Networks JunosV Wireless LAN Controller is a virtual controller using a cloud-based architecture with physical access points. The current functionality of a physical controller

More information

How To Set Up An Ipa 1X For Aaa On A Ipa 2.1X On A Network With Aaa (Ipa) On A Computer Or Ipa (Ipo) On An Ipo 2.0.1

How To Set Up An Ipa 1X For Aaa On A Ipa 2.1X On A Network With Aaa (Ipa) On A Computer Or Ipa (Ipo) On An Ipo 2.0.1 Implementation of IEEE 802.1X in wired networks Best Practice Document Produced by UNINETT led working group on security (UFS 133) Authors: Øystein Gyland, Tom Myren, Rune Sydskjør, Gunnar Bøe March 2013

More information

AGLARBRI PROJECT AFRICAN GREAT LAKES RURAL BROADBAND RESEARCH INFRASTRUCTURE. RADIUS installation and configuration

AGLARBRI PROJECT AFRICAN GREAT LAKES RURAL BROADBAND RESEARCH INFRASTRUCTURE. RADIUS installation and configuration AGLARBRI PROJECT AFRICAN GREAT LAKES RURAL BROADBAND RESEARCH INFRASTRUCTURE RADIUS installation and configuration Project Manager: Miguel Sosa (mesc@kth.se) Member Email Position and number of credits

More information

Dynamic VLAN assignment using RADIUS. Network Diagram

Dynamic VLAN assignment using RADIUS. Network Diagram Dynamic VLAN assignment using RADIUS This document describes how to dynamically assign clients to VLANs using RADIUS. This is useful is you have multiple clients using the same physical network and need

More information

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your

More information

APPLICATION NOTE. Copyright 2011, Juniper Networks, Inc. 1

APPLICATION NOTE. Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE Configuring and Deploying the AX411 Wireless Access Point Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction......................................................................................................3

More information

Allied Telesis Solutions. Tested Solution: LAN Client Authentication. LAN Client Authentication. Introduction. Public/Private Zone x600

Allied Telesis Solutions. Tested Solution: LAN Client Authentication. LAN Client Authentication. Introduction. Public/Private Zone x600 Solutions LAN Client Authentication Tested Solution: LAN Client Authentication Public/Private Zone x600 Client devices Windows 2008 server Enterprise CA server AR770 8000GS Private Zone x900 stack Internet

More information

LAN Client Authentication

LAN Client Authentication x600 x900 Tested Solution Networking LAN Client Authentication Introduction The key to strong LAN security, and seamless mobility within an Enterprise network, is to identity and authenticate the user

More information

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2

More information

Configuring Wired 802.1x Authentication on Windows Server 2012

Configuring Wired 802.1x Authentication on Windows Server 2012 Configuring Wired 802.1x Authentication on Windows Server 2012 Johan Loos johan@accessdenied.be Version 1.0 Why 802.1x Authentication? The purpose of this document is to guide you through the procedure

More information

WiNG 4.X / WiNG 5.X RADIUS Attributes

WiNG 4.X / WiNG 5.X RADIUS Attributes Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG 4.X / WiNG 5.X RADIUS Attributes Part No. TME-08-2011-01 Rev. C MOTOROLA and the Stylized M Logo are registered in the US Patent

More information

Application Note User Groups

Application Note User Groups Application Note User Groups Application Note User Groups Table of Contents Background... 3 Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 6 Configuration...

More information

On-boarding and Provisioning with Cisco Identity Services Engine

On-boarding and Provisioning with Cisco Identity Services Engine On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID

More information

Integration with IP Phones

Integration with IP Phones Copyright 2010 Sophos Limited. All rights reserved. No part of this publication may be reproduced, stored in retrieval system, or transmitted, in any form or by any means electronic, mechanical, photocopying,

More information

Deployment Scenario AP1 STA. Home AAA. Local AAA AP2

Deployment Scenario AP1 STA. Home AAA. Local AAA AP2 ERP IMPLEMENTATION Kedar Gaonkar IETF-69 Chicago, July 23rd, 2007 Deployment Scenario AP1 STA Local AAA Home AAA AP2 Implementation Setup consists of 4 machines: Supplicant (STA), Access Point (AP), and

More information

FreeRADIUS server. Defining clients Access Points and RADIUS servers

FreeRADIUS server. Defining clients Access Points and RADIUS servers FreeRADIUS server Freeradius (http://www.freeradius.org) is a very powerfull/configurable and freely available opensource RADIUS server. ARNES recommends it for the organisations that connect to ARNES

More information

Chapter 5 - Basic Authentication Methods

Chapter 5 - Basic Authentication Methods Chapter 5 - Basic Authentication Methods The following topics are discussed in this chapter: Password Authentication Protocol (PAP) Password formats Alternate authentication methods Forcing Authentication

More information

Network Detector Setup and Configuration

Network Detector Setup and Configuration 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net MODE SYST RPS MASTR STAT SPEDUPLX STACK 1 2 3 4 5 6 7 8 91 0 11 12 1X 2X 11X 12X 13 14 15 16 1718 19 20 2122 23 24 13X

More information

ClearPass Policy manager Cisco Switch Setup with CPPM. Technical Note

ClearPass Policy manager Cisco Switch Setup with CPPM. Technical Note ClearPass Policy manager Cisco Switch Setup with CPPM Technical Note Copyright 2012 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba

More information

Configuring iscsi Multipath

Configuring iscsi Multipath CHAPTER 13 Revised: April 27, 2011, OL-20458-01 This chapter describes how to configure iscsi multipath for multiple routes between a server and its storage devices. This chapter includes the following

More information

RADIUS. - make life easier. by Daniel Starnowski

RADIUS. - make life easier. by Daniel Starnowski RADIUS - make life easier by Daniel Starnowski About me Daniel Starnowski Network administrator since 2000 MikroTik user since 2008 MikroTik Trainer since 2011 From Kraków, Poland 1038-1596 capital of

More information

Case Study - Configuration between NXC2500 and LDAP Server

Case Study - Configuration between NXC2500 and LDAP Server Case Study - Configuration between NXC2500 and LDAP Server 1 1. Scenario:... 3 2. Topology:... 4 3. Step-by-step Configurations:...4 a. Configure NXC2500:...4 b. Configure LDAP setting on NXC2500:...10

More information

UNDERSTANDING IDENTITY-BASED NETWORKING SERVICES AUTHENTICATION AND POLICY ENFORCEMENT

UNDERSTANDING IDENTITY-BASED NETWORKING SERVICES AUTHENTICATION AND POLICY ENFORCEMENT UNDERSTANDING IDENTITY-BASED NETWORKING SERVICES AUTHENTICATION AND POLICY ENFORCEMENT John Stone CTO Cisco Systems Internetworking Ireland jstone@cisco.com 2005 Cisco Systems, Inc. All rights reserved.

More information

Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller

Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller August 2006 Contents Overview section on page 1 Configuring Guest Access on the Cisco Wireless LAN Controller section on page

More information

Active Fabric Manager (AFM) Plug-in for VMware vcenter Virtual Distributed Switch (VDS) CLI Guide

Active Fabric Manager (AFM) Plug-in for VMware vcenter Virtual Distributed Switch (VDS) CLI Guide Active Fabric Manager (AFM) Plug-in for VMware vcenter Virtual Distributed Switch (VDS) CLI Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use

More information

Belnet Networking Conference 2013

Belnet Networking Conference 2013 Belnet Networking Conference 2013 Thursday 12 December 2013 @ http://events.belnet.be Workshop roaming services: eduroam / govroam Belnet Aris Adamantiadis, Nicolas Loriau Bruxelles 05 December 2013 Agenda

More information

What is VLAN Routing?

What is VLAN Routing? Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

Geschreven door Administrator woensdag 13 februari 2013 17:37 - Laatst aangepast woensdag 13 februari 2013 18:05

Geschreven door Administrator woensdag 13 februari 2013 17:37 - Laatst aangepast woensdag 13 februari 2013 18:05 Nexus 1000V returns the control of networking back to network administrators so that there is a clear boundary between server administrators and network administrators. For small businesses, one administrator

More information

A practical guide to Eduroam

A practical guide to Eduroam 1 A practical guide to Eduroam Rok Papež ARNES - Academic and research network of Slovenia rok.papez@arnes.si Akyaka,Gökova, April 2007 2 Eduroam AAI 3 Eduroam wireless network components Access Points

More information

Configuring DHCP Snooping

Configuring DHCP Snooping CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples.

More information

Mobility System Software Quick Start Guide

Mobility System Software Quick Start Guide Mobility System Software Quick Start Guide Version 8.0 P/N 530-041387 Rev.05 Table of Contents About this Guide Using the Web Quick Start (WLC2, WLC8, WLC200,WLC800R, and WLC880R) Remotely Configuring

More information

Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication

Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication Requirements You can configure voice over IP (VoIP) on an EX Series switch to support IP telephones. To configure

More information

Nutanix Hyperconverged Appliance with the Brocade VDX ToR Switch Deployment Guide

Nutanix Hyperconverged Appliance with the Brocade VDX ToR Switch Deployment Guide January 8, 2016 Nutanix Hyperconverged Appliance with the Brocade VDX ToR Switch Deployment Guide 2016 Brocade Communications Systems, Inc. All Rights Reserved. Brocade, Brocade Assurance, the B-wing symbol,

More information

Gaining Visibility by Using the Network

Gaining Visibility by Using the Network Gaining Visibility by Using the Network Daniel Braine CCIE R/S:24663 Security/Wireless CSE Dec 2012 Fly By the Seat of Your Pants Network Management Management & Security Who's actually on my network?

More information

Configuring Cisco 802.1x Multi-domain Authentication (MDA) on a Cisco Catalyst 3750, with Avaya 96xx and 46xx Series IP Telephones - Issue 1.

Configuring Cisco 802.1x Multi-domain Authentication (MDA) on a Cisco Catalyst 3750, with Avaya 96xx and 46xx Series IP Telephones - Issue 1. Avaya Solution & Interoperability Test Lab Configuring Cisco 802.1x Multi-domain Authentication (MDA) on a Cisco Catalyst 3750, with Avaya 96xx and 46xx Series IP Telephones - Issue 1.0 Abstract These

More information

Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation

Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation This document describes the steps to undertake in configuring a Layer 2/Layer 3 switch (in this document a FMS7382S

More information

Interoperability between Avaya IP phones and ProCurve switches

Interoperability between Avaya IP phones and ProCurve switches An HP ProCurve Networking Application Note Interoperability between Avaya IP phones and ProCurve switches Contents 1. Introduction... 3 2. Architecture... 3 3. Checking PoE compatibility... 3 4. Configuring

More information

PF6800 Ver. 6.0 Troubleshooting Guide

PF6800 Ver. 6.0 Troubleshooting Guide PF6800 Ver. 6.0 Troubleshooting Guide PFC00EK0600-01 Copyrights Information in this manual may not include all information disclosed by NEC Corporation or may use different expressions than information

More information

How to Create VLANs Within a Virtual Switch in VMware ESXi

How to Create VLANs Within a Virtual Switch in VMware ESXi How to Create VLANs Within a Virtual Switch in VMware ESXi I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support

More information

TotalCloud Phone System

TotalCloud Phone System TotalCloud Phone System Adtran Netvanta 1234P PoE VLAN Configuration Guide Note: The below information and configuration is for deployment of the Cbeyond managed switch solution using the Adtran Netvanta

More information

Web Authentication Application Note

Web Authentication Application Note What is Web Authentication? Web Authentication Application Note Web authentication is a Layer 3 security feature that causes the router to not allow IP traffic (except DHCP-related packets) from a particular

More information

x900 Switch Access Requestor

x900 Switch Access Requestor Network Security Solutions Implementing Network Access Control (NAC) Tested Solution: Protecting your network with Microsoft Network Access Protection (NAP) and Switches Today s networks increasingly require

More information

FreeRADIUS Install and Configuration. Joel Jaeggli 05/04/2006

FreeRADIUS Install and Configuration. Joel Jaeggli 05/04/2006 FreeRADIUS Install and Configuration Joel Jaeggli 05/04/2006 What is RADIUS? A AAA protocol (Authentication, Authorization and Accounting). Authentication Confirmation that the user is who they say they

More information

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com. 2006 Cisco Systems, Inc. All rights reserved.

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com. 2006 Cisco Systems, Inc. All rights reserved. Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and

More information

Tested Solution: Protecting your network with Symantec Network Access Control (NAC) and Allied Telesis Switches

Tested Solution: Protecting your network with Symantec Network Access Control (NAC) and Allied Telesis Switches Network Security Solutions Implementing Network Access Control (NAC) Tested Solution: Protecting your network with Symantec Network Access Control (NAC) and Switches Today s networks increasingly require

More information

netld External Authentication Setup Guide

netld External Authentication Setup Guide netld External Authentication Setup Guide Overview netld is able to integrate with authentication servers such as Active Directory and FreeRADIUS. When using this integration, you do not need to create

More information

How to Configure an Initial Installation of the VMware ESXi Hypervisor

How to Configure an Initial Installation of the VMware ESXi Hypervisor How to Configure an Initial Installation of the VMware ESXi Hypervisor I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide

More information

APPLICATION NOTE No. 330181203-02

APPLICATION NOTE No. 330181203-02 APPLICATION NOTE No. 330181203-02 Date: April 2003 Author: Eli Shmulenson, ITC Tier IV Product Support Engineering Product: Avaya P330, P330-ML, C460 General: Steel-Belted Radius Server configuration for

More information

Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example

Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Document ID: 69632 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure

More information

Management Authentication using Windows IAS as a Radius Server

Management Authentication using Windows IAS as a Radius Server Management Authentication using Windows IAS as a Radius Server OVERVIEW: In this we are using Radius server Windows IAS as a backend server for the management authentication for the controller. When the

More information

Switch Configuration Required to Support Cisco ISE Functions

Switch Configuration Required to Support Cisco ISE Functions APPENDIXC Switch Configuration Required to Support Cisco ISE Functions To ensure Cisco ISE is able to interoperate with network switches and functions from Cisco ISE are successful across the network segment,

More information

Configure WorkGroup Bridge on the WAP131 Access Point

Configure WorkGroup Bridge on the WAP131 Access Point Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless

More information

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance CHAPTER 4 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive

More information

Using LiveAction with Cisco Secure ACS (TACACS+ Server)

Using LiveAction with Cisco Secure ACS (TACACS+ Server) LiveAction Application Note Using LiveAction with Cisco Secure ACS (TACACS+ Server) September 2012 http://www.actionpacked.com Table of Contents 1. Introduction... 1 2. Cisco Router Configuration... 2

More information

NEC contribution to OpenDaylight: Virtual Tenant Network (VTN)

NEC contribution to OpenDaylight: Virtual Tenant Network (VTN) NEC contribution to OpenDaylight: Virtual Tenant Network (VTN) June. 2013 NEC Page 1 Agenda OpenDaylight Virtual Tenant Network - VTN Model Live Demo VTN Implementation Page 2 OpenDaylight Virtual Tenant

More information

AlliedWare Plus OS How To Configure a VoIP Phone System with PoE/PoE+

AlliedWare Plus OS How To Configure a VoIP Phone System with PoE/PoE+ AlliedWare Plus OS How To Configure a VoIP Phone System with PoE/PoE+ Introduction IP phones use Voice over IP (VoIP) technologies that allow telephone calls to be made over an IP network such as the Internet

More information

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive

More information

Ruckus Wireless ZoneDirector Command Line Interface

Ruckus Wireless ZoneDirector Command Line Interface Ruckus Wireless ZoneDirector Command Line Interface Reference Guide Part Number 800-70258-001 Published September 2010 www.ruckuswireless.com Contents About This Guide Document Conventions................................................

More information

TrustSec How-To Guide: On-boarding and Provisioning

TrustSec How-To Guide: On-boarding and Provisioning TrustSec How-To Guide: On-boarding and Provisioning For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...

More information

Cloud.com CloudStack 2.1 Installation Guide

Cloud.com CloudStack 2.1 Installation Guide Cloud.com CloudStack 2.1 Installation Guide November, 2010 1 Specifications are subject to change without notice. The Cloud.com logo, Cloud.com, CloudStack, Hypervisor Attached Storage, HAS, Hypervisor

More information

MAC Authentication Bypass

MAC Authentication Bypass This document provides deployment guidance for (MAB). MAB is now a core component of Cisco Identity-Based Networking Services (IBNS). Like IBNS, MAB identifies the users or devices logging into an enterprise

More information

freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011

freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011 freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011 freeradius is... Multiple protocoles : RADIUS, EAP... An Open-Source

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Application Notes for Configuring Enterasys Wireless Access Point 3000 (RBT3K-AG) to Support Avaya IP Office, Avaya IP Wireless Telephones and Avaya Phone Manager

More information

Cisco ISE Command-Line Interface

Cisco ISE Command-Line Interface This chapter provides information on the Cisco Identity Services Engine (Cisco ISE) command-line interface (CLI) that you can use to configure and maintain Cisco ISE. Cisco ISE Administration and Configuration

More information

Configuring User Authentication

Configuring User Authentication Configuring User This chapter provides the following information about configuring and monitoring user authentication on Enterasys N Series, S Series, and K Series modular switches, A Series, B Series,

More information

Configuring the Device for Access Point Discovery

Configuring the Device for Access Point Discovery Configuring the Device for Access Point Discovery Finding Feature Information, page 1 Prerequisites for Configuring the Device for Access Point Discovery, page 1 Restrictions for Configuring the Device

More information

Cisco 7940 How To. (c) 2003-2010 Bicom Systems

Cisco 7940 How To. (c) 2003-2010 Bicom Systems Cisco 7940 How To Cisco 7940 How To All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping,

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 25 This chapter describes how to configure system message logging on the Catalyst 2960 switch. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco

More information

Switch Quick Configuration CLI Guide for

Switch Quick Configuration CLI Guide for Switch Quick Configuration CLI Guide for SSE-G48-TG4 SSE-G24-TG4 SSE-X24S SSE-X24SR SSE-X3348S SSE-X3348SR SSE-X3348T SSE-X3348TR SBM-GEM-X2C SBM-GEM-X2C+ SBM-GEM-X3S+ SBM-XEM-X10SM Release : 1.0d 1 /

More information

The 802.1x specification

The 802.1x specification The 802.1x specification Fulvio Risso Politecnico di Torino Based on an existing presentation of Piero Nicoletti 1 IEEE 802.1x Port-Based Network Access Control Use physical access characteristics of IEEE

More information

The example in this Note uses Linux for both the access controller (RADIUS server) and the supplicant (client).

The example in this Note uses Linux for both the access controller (RADIUS server) and the supplicant (client). How To Use 802.1x Security with AT-WA7400 APs, AT-8624PoE Switches, and Linux s freeradius and Xsupplicant Introduction This How To Note details how to take advantage of 802.1x security to ensure that

More information

802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS

802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS APPLICATION NOTE Ref APNUS004 rev. A-0, March 08, 2007 802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS Why? In addition to MAC address filtering, ACKSYS products support a more reliable authentication

More information

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU ITMS: 26140230008 DOPYTOVO ORIENTOVANÝ PROJEKT Moderné

More information

Windows Server 2012 Hyper-V Virtual Switch Extension Software UNIVERGE PF1000 Overview. IT Network Global Solutions Division UNIVERGE Support Center

Windows Server 2012 Hyper-V Virtual Switch Extension Software UNIVERGE PF1000 Overview. IT Network Global Solutions Division UNIVERGE Support Center Windows Server 2012 Hyper-V Virtual Switch Extension Software UNIVERGE Overview IT Network Global Solutions Division UNIVERGE Support Center ProgrammableFlow API architecture Microsoft VSEM Provider Third

More information

RWL Tech Note Wireless 802.1x Authentication with Windows NPS

RWL Tech Note Wireless 802.1x Authentication with Windows NPS Wireless 802.1x Authentication with Windows NPS Prepared by Richard Litchfield HP Networking Solution Architect Hewlett-Packard Australia Limited 410 Concord Road Rhodes NSW 2138 AUSTRALIA Date Prepared:

More information

Unified Access Point Administrator's Guide

Unified Access Point Administrator's Guide Unified Access Point Administrator's Guide Product Model: DWL-3600AP DWL-6600AP DWL-8600AP Unified Wired & Wireless Access System Release 2.0 November 2011 Copyright 2011. All rights reserved. November

More information

Cisco TrustSec 3.0 How-To Guide: Introduction to MACSec and NDAC

Cisco TrustSec 3.0 How-To Guide: Introduction to MACSec and NDAC Guide Cisco TrustSec 3.0 How-To Guide: Introduction to MACSec and NDAC Guide 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents Introduction...

More information

Wireless Technology Seminar

Wireless Technology Seminar Wireless Technology Seminar Introduction Adam Worthington Network Consultant Adam.Worthington@euroele.com Wireless LAN Why? Flexible network access for your users? Guest internet access? VoWIP? RFID? Available

More information

Introduction to MPIO, MCS, Trunking, and LACP

Introduction to MPIO, MCS, Trunking, and LACP Introduction to MPIO, MCS, Trunking, and LACP Sam Lee Version 1.0 (JAN, 2010) - 1 - QSAN Technology, Inc. http://www.qsantechnology.com White Paper# QWP201002-P210C lntroduction Many users confuse the

More information

Mobility Task Force. Deliverable F. Inventory of web-based solution for inter-nren roaming

Mobility Task Force. Deliverable F. Inventory of web-based solution for inter-nren roaming Mobility Task Force Deliverable F Inventory of web-based solution for inter-nren roaming Version 1.1 Authors: Sami Keski-Kasari , Harri Huhtanen Contributions: James

More information

What information will you find in this document?

What information will you find in this document? How To Note How To Use the local RADIUS server to authenticate 802.1x supplicants using X.509 certificates Introduction The local RADIUS server within AlliedWare Plus can authenticate 802.1x supplicants

More information

Network Access Security It's Broke, Now What? June 15, 2010

Network Access Security It's Broke, Now What? June 15, 2010 Network Access Security It's Broke, Now What? June 15, 2010 Jeffrey L Carrell Network Security Consultant Network Conversions SHARKFEST 10 Stanford University June 14-17, 2010 Network Access Security It's

More information

Lab 8.4.5.1 Configuring LEAP/EAP using Local RADIUS Authentication

Lab 8.4.5.1 Configuring LEAP/EAP using Local RADIUS Authentication Lab 8.4.5.1 Configuring LEAP/EAP using Local RADIUS Authentication Objective Topology Estimated Time: 40 minutes Number of Team Members: Students can work in teams of two. In this lab, the student will

More information

Lab 11.5.6.1 Configure Syslog on AP

Lab 11.5.6.1 Configure Syslog on AP Lab 11.5.6.1 Configure Syslog on AP Estimated Time: 25 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, students will configure and use syslog logging to monitor

More information

RADIUS Server Load Balancing

RADIUS Server Load Balancing The feature distributes authentication, authorization, and accounting (AAA) authentication and accounting transactions across RADIUS servers in a server group These servers can share the AAA transaction

More information

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these

More information

Cisco TrustSec How-To Guide: Guest Services

Cisco TrustSec How-To Guide: Guest Services Cisco TrustSec How-To Guide: Guest Services For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...

More information

HP Intelligent Management Center User Access Management Software

HP Intelligent Management Center User Access Management Software Data sheet HP Intelligent Management Center User Access Management Software Key features One central database of users and available services Advanced reporting capabilities Directory of network-attached

More information

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide

More information

APPENDIX 3 LOT 3: WIRELESS NETWORK

APPENDIX 3 LOT 3: WIRELESS NETWORK APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop

More information

Web Authentication Proxy on a Wireless LAN Controller Configuration Example

Web Authentication Proxy on a Wireless LAN Controller Configuration Example Web Authentication Proxy on a Wireless LAN Controller Configuration Example Document ID: 113151 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Proxy on

More information

DIGIPASS Authentication for Cisco ASA 5500 Series

DIGIPASS Authentication for Cisco ASA 5500 Series DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations

More information