EasyManua.ls Logo

HP 5120 EI Switch Series User Manual

HP 5120 EI Switch Series
304 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #14 background image
4
Figure 4 RADIUS packet format
Code
Attribute
Identifier
0
7
Length
Authenticator (16bytes)
7 15 31
Descriptions of the fields are as follows:
1. The Code field (1 byte long) indicates the type of the RADIUS packet.
Table 1 Main values of the Code field
Code
Packet type
Description
1
Access-Request
From the client to the server. A packet of this type carries user
information for the server to authenticate the user. It must
contain the User-Name attribute and can optionally contain the
attributes of NAS-IP-Address, User-Password, and NAS-Port.
2
Access-Accept
From the server to the client. If all the attribute values carried in
the Access-Request are acceptable, the authentication
succeeds, and the server sends an Access-Accept response.
3
Access-Reject
From the server to the client. If any attribute value carried in
the Access-Request is unacceptable, the authentication fails
and the server sends an Access-Reject response.
4
Accounting-Request
From the client to the server. A packet of this type carries user
information for the server to start or stop accounting for the
user. The Acct-Status-Type attribute in the packet indicates
whether to start or stop accounting.
5
Accounting-Response
From the server to the client. The server sends a packet of this
type to notify the client that it has received the Accounting-
Request and has correctly recorded the accounting
information.
2. The Identifier field (1 byte long) is used to match request and response packets and to detect
retransmitted request packets. Request and response packets of the same type have the same
identifier.
3. The Length field (2 bytes long) indicates the length of the entire packet, including the Code,
Identifier, Length, Authenticator, and Attribute fields. Bytes beyond this length are considered
padding and are neglected upon reception. If the length of a received packet is less than this
length, the packet is dropped. The value of this field is in the range 20 to 4096.
4. The Authenticator field (16 bytes long) is used to authenticate replies from the RADIUS server and to
encrypt user passwords. There are two types of authenticators: request authenticator and response
authenticator.

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the HP 5120 EI Switch Series and is the answer not in the manual?

HP 5120 EI Switch Series Specifications

General IconGeneral
BrandHP
Model5120 EI Switch Series
CategorySwitch
LanguageEnglish

Summary

AAA Configuration

AAA Configuration Considerations and Task List

Outlines the tasks and considerations required for configuring AAA on a NAS device.

Configuring AAA Schemes

Details the process of configuring AAA schemes, including local, RADIUS, and HWTACACS schemes.

Configuring RADIUS and HWTACACS Schemes

Describes configuring RADIUS and HWTACACS schemes, specifying servers, shared keys, and parameters.

Configuring AAA Authentication, Authorization, and Accounting Methods

Details the configuration of authentication, authorization, and accounting methods for users within an ISP domain.

802.1X Configuration

Configuring 802.1X

Provides steps for enabling 802.1X, setting access control, and configuring guest/Auth-Fail VLANs.

Enabling 802.1X and Access Control

Details enabling 802.1X globally and on ports, along with specifying access control methods.

MAC Authentication Configuration

MAC Authentication Configuration Task List

Lists tasks for configuring MAC authentication, including basic setup and examples.

Basic Configuration for MAC Authentication

Covers the basic steps for configuring MAC authentication globally and on ports.

Portal Configuration

Configuring Layer 2 Portal Authentication

Details the steps to configure Layer 2 portal authentication, including VLAN assignment and Auth-Fail VLAN.

Triple Authentication Configuration

Configuring Triple Authentication

Provides steps to configure triple authentication by enabling portal, MAC, and 802.1X authentication.

Port Security Configuration

Enabling Port Security and Setting Mode

Provides steps to enable port security and set its mode, like autoLearn or secure.

User Profile Configuration

Creating and Enabling User Profiles

Details creating and enabling user profiles to apply configurations and restrict user behaviors.

Password Control Configuration

Password Control Configuration Task List

Lists tasks for configuring password control, including global, group, and local user settings.

Configuring Password Control

Details enabling password control features like aging, history, and complexity checking.

Public Key Configuration

Configuring the Local Asymmetric Key Pair

Details creating, destroying, displaying, and exporting local RSA or DSA key pairs.

PKI Configuration

PKI Configuration Task List

Lists tasks for configuring PKI, including entity DN, PKI domain, and certificate requests.

Configuring an Entity DN and PKI Domain

Details configuring entity DN parameters and PKI domains for certificate requests.

Submitting and Retrieving Certificates

Explains submitting certificate requests in auto/manual modes and retrieving certificates.

SSH2.0 Configuration

Configuring the Device as an SSH Server

Provides steps to configure the device as an SSH server, including key generation and user setup.

SSH Server Configuration Task List

Lists tasks for configuring the SSH server, such as key pair generation and enabling the server.

Configuring the Device as an SSH Client

Details configuring the device as an SSH client, including source IP and connection setup.

SFTP Configuration

Configuring the Device as an SFTP Server

Provides steps to enable and configure the device as an SFTP server.

Configuring the Device an SFTP Client

Details configuring the device as an SFTP client, including source IP and connection setup.

SSL Configuration

Configuring an SSL Server Policy

Details setting SSL parameters for a server, including PKI domain and cipher suites.

TCP Attack Protection Configuration

IP Source Guard Configuration

ARP Attack Protection Configuration

ND Attack Defense Configuration

Related product manuals