H3c-technologies H3C SecPath F1000-E Bedienungsanleitung Seite 1

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Sicherheit H3c-technologies H3C SecPath F1000-E herunter. H3C Technologies H3C SecPath F1000-E User Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 182
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
i
Table of Contents
Portal Configuration····················································································································································· 1
Portal Overview·································································································································································1
Introduction to Portal ················································································································································1
Introduction to Extended Portal Functions ··············································································································1
Portal System Components ······································································································································2
Portal Authentication Modes ···································································································································3
Layer 3 Portal Authentication Process ····················································································································4
Portal Configuration Task List···········································································································································6
Configuration Prerequisites ··············································································································································7
Specifying a Portal Server for Layer 3 Portal Authentication ·······················································································7
Enabling Layer 3 Portal Authentication···························································································································8
Controlling Access of Portal Users ··································································································································9
Configuring a Portal-Free Rule ································································································································9
Configuring an Authentication Subnet···················································································································9
Setting the Maximum Number of Online Portal Users ······················································································ 10
Specifying the Authentication Domain for Portal Users····················································································· 10
Configuring RADIUS Related Attributes ······················································································································· 11
Specifying a NAS ID for an Interface ················································································································· 11
Specifying NAS-Port-Type for an Interface ········································································································· 11
Specifying a NAS ID Profile for an Interface ····································································································· 12
Specifying the Source IP Address for Outgoing Portal Packets················································································· 12
Configuring Portal Detection Functions························································································································ 13
Configuring Detection of Online Portal Users ···································································································· 13
Configuring the Portal Server Detection Function ······························································································ 13
Configuring Portal User Information Synchronization······················································································· 15
Logging Off Portal Users ··············································································································································· 16
Displaying and Maintaining Portal ······························································································································ 16
Portal Configuration Examples ····································································································································· 17
Configuring Direct Portal Authentication ············································································································ 17
Configuring Re-DHCP Portal Authentication······································································································· 22
Configuring Layer 3 Portal Authentication·········································································································· 24
Configuring Direct Portal Authentication with Extended Functions·································································· 26
Configuring Re-DHCP Portal Authentication with Extended Functions····························································· 28
Configuring Layer 3 Portal Authentication with Extended Functions ······························································· 31
Configuring Portal Server Detection and Portal User Information Synchronization ······································· 33
Layer 3 Portal Authentication Across VPNs········································································································ 39
Troubleshooting Portal ··················································································································································· 41
Inconsistent Keys on the Access Device and the Portal Server ········································································· 41
Incorrect Server Port Number on the Access Device ························································································· 41
Seitenansicht 0
1 2 3 4 5 6 ... 181 182

Inhaltsverzeichnis

Seite 1 - Table of Contents

i Table of Contents Portal Configuration··············································································································

Seite 2 - Portal Configuration

9 Controlling Access of Portal Users Configuring a Portal-Free Rule A portal-free rule allows specified users to access specified external websites w

Seite 3 - Portal System Components

1 Web Filtering Configuration This chapter includes these sections: • Introduction to Web Filtering • Configuring Web Filtering • Displaying and Main

Seite 4 - Portal Authentication Modes

2 Processing procedure After receiving an HTTP request containing URL parameters, the device obtains the parameters according to the parameter transm

Seite 5

3 the request is forwarded; otherwise, the suffix is replaced with “.block” and then the request is forwarded. • In addition to the default suffix “

Seite 6

4 To do... Use the command... Remarks Enter system view system-view — Add an ActiveX blocking suffix keyword firewall http activex-blocking suffix

Seite 7

5 Figure 1 Network diagram for URL parameter filtering configuration Configuration procedure # Configure IP addresses for the interfaces. (Omitted)

Seite 8 - Configuration Prerequisites

6 Java Blocking Configuration Example Network requirements The hosts in the network segment 192.168.1.0/24 access the Internet through Device. Enable

Seite 9

7 The configured ACL group is 2100. There are 0 packet(s) being filtered. There are 1 packet(s) being passed. Use the display firewall http java-b

Seite 10

8 Invalid Use of Wildcard Symptom: When you configure a URL parameter filtering entry, the system prompts you that the wildcards are not used correct

Seite 11

i Table of Contents Public Key Configuration··········································································································

Seite 12 - Configuration Manual

1 Public Key Configuration This chapter includes these sections: • Asymmetric Key Algorithm Overview • Configuring the Local Asymmetric Key Pair • Co

Seite 13 - Portal Packets

10 To do… Use the command… Remarks Configure an authentication subnet portal auth-network network-address { mask-length | mask } Optional By defaul

Seite 14

2 Asymmetric Key Algorithm Applications Asymmetric key algorithms can be used for encryption and digital signature: • Encryption – The sender uses t

Seite 15 - 2. Probe parameters

3 Displaying or Exporting the Local RSA or DSA Host Public Key Display the local RSA or DSA host public key on the screen or export it to a specified

Seite 16

4 NOTE: • If you choose to input the public key manually, be sure to input it in the correct format. The key data displayed by the display public-

Seite 17 - Logging Off Portal Users

5 Public Key Configuration Examples Configuring the Public Key of a Peer Manually Network requirements As shown in Figure 2, Device A is authenticate

Seite 18

6 ===================================================== Time of Key pair created: 09:50:07 2007/08/07 Key name: SERVER_KEY Key type: RSA Encryption

Seite 19

7 Figure 3 Network diagram for importing the public key of a peer from a public key file Configuration procedure Step1 Create key pairs on Device

Seite 20

8 Step2 Enable the FTP server function on Device B # Enable the FTP server function, create an FTP user with the username ftp and password 123 . <

Seite 21 - Step2 Configure Device

i Table of Contents Connection Limit Configuration····································································································

Seite 22

1 Connection Limit Configuration This chapter includes these sections: • Connection Limit Overview • Connection Limit Configuration Task List • Creat

Seite 23

2 Configuring the Connection Limit Policy A connection limit policy contains one or more connection limit rules, each specifying an object or range f

Seite 24 - DHCP Configuration

11 NOTE: The device selects the authentication domain for a portal user on an interface in this order: the ISP domainspecified for the interface, t

Seite 25

3 Displaying and Maintaining Connection Limiting To do… Use the command… Remarks Display information about the specified or all connection limit po

Seite 26

4 # Configure connection limit rule 0 to limit connections from hosts on segment 192.168.0.0/24 to the external network per source address, with the

Seite 27 - Functions

5 Solution Rearrange the two connection limit rules by exchanging their rule IDs so that the rule for the host is matched first. Connection Limit Rul

Seite 28

i Contents Firewall configuration·····················································································································

Seite 29

1 Firewall configuration NOTE: The packet filter function supports only the IPv6 packet filtering configurations at the CLI. Firewall overview A

Seite 30

2 Configuring a packet-filter firewall Packet-filter firewall configuration task list Complete the following tasks to configure a packet-filter firew

Seite 31

3 Follow these steps to configure IPv6 packet filtering on an interface: To do... Use the command... Remarks Enter system view system-view — Ente

Seite 32

i Table of Contents IPsec Configuration···············································································································

Seite 33

ii IKE Configuration Examples ························································································································

Seite 34 - Information Synchronization

1 IPsec Configuration This chapter includes these sections: • IPsec Overview • Configuring IPsec • Implementing ACL-Based IPsec • Implementing Tunnel

Seite 35 - Configuration considerations

12 To do… Use the command… Remarks Specify the NAS-Port-Type value for the interface portal nas-port-type ethernet Required Not configured by defau

Seite 36

2 Implementation of IPsec IPsec consists of a series of protocols for IP data security, including Authentication Header (AH), Encapsulating Security

Seite 37

3 • Traffic-based lifetime: Defines the maximum traffic that an SA is allowed to process. An SA becomes invalid when its lifetime expires. Before an

Seite 38

4 Negotiation modes There are two negotiation modes for setting up an SA: • Manual mode: In this mode, all information that an SA needs must be conf

Seite 39

5 Figure 2 Encapsulation process of a clear text packet 1. The router forwards a clear text packet received on the inbound interface to the forwar

Seite 40

6 policy to the IPsec tunnel interface; if you want to apply QoS to IPsec packets, apply the QoS to the physical interface. IPsec for IPv6 Routing Pr

Seite 41

7 applying a manual IPsec policy to a certain IPv6 routing protocol, the packets of that protocol are IPsec protected. For configuration details, ref

Seite 42 - Troubleshooting Portal

8 • Each ACL rule matches both the outbound traffic and the returned inbound traffic. Suppose there is a rule rule 0 permit ip source 1.1.1.0 0.0.0.

Seite 43

9 proposal 1 Configuration on Router B: acl number 3001 rule 0 permit ip source 3.3.3.0 0.0.0.255 destination 1.1.2.0 0.0.0.255 rule 1 deny ip # i

Seite 44

10 Protection modes Currently, data flows can be protected in two modes: • Standard mode: One tunnel is used to protect one data flow. That is, th

Seite 45 - ALG Configuration

11 To do… Use the command… Remarks Specify the authentication algorithm for ESP esp authentication-algorithm { md5 | sha1 } Optional MD5 by default

Seite 46 - 2. Authenticating the user

13 To do… Use the command… Remarks Enter system view system-view — Enter interface view interface interface-type interface-number — Specify the sou

Seite 47 - ALG Configuration Examples

12 • Both ends of an IPsec tunnel must be configured with the same key in the same format, and the keys of the inbound and outbound SAs at an end mu

Seite 48

13 To do… Use the command… Remarks Configure the encryption key (in characters) sa string-key { inbound | outbound } esp string-key Configure the e

Seite 49

14 To do… Use the command… Remark Configure an IPsec connection name connection-name name Optional By default, no IPsec connection name is configur

Seite 50 - # Configure NAT

15 To do… Use the command… Remark Enter system view system-view — Create an IPsec policy template and enter its view ipsec policy-template templa

Seite 51

16 • An IPsec policy can reference only one ACL. If you apply multiple ACLs to an IPsec policy, only the last one takes effect. • With SAs to be es

Seite 52 - RSH Configuration

17 • If the encryption engine is enabled, the engine takes over the responsibility of IPsec processing; • If the encryption engine is disabled or h

Seite 53 - RSH Configuration Example

18 Enabling ACL Checking of De-Encapsulated IPsec Packets In tunnel mode, the IP packet that was encapsulated in an inbound IPsec packet may not be a

Seite 54

19 IPsec anti-replay checking does not affect IPsec SAs created manually. Configuring Packet Information Pre-Extraction If you apply both an IPsec p

Seite 55

20 Task Remarks Applying a QoS Policy to an IPsec Tunnel Interface Optional Enabling the Encryption Engine Optional Configuring the IPsec Anti-Repl

Seite 56

21 To do… Use the command… Remarks Specify the IKE peer for the IPsec profile to reference ike-peer peer-name Required An IPsec profile cannot refe

Seite 57 - SSH2.0 Configuration

14 example, once detecting that the portal server is unreachable, the access device will allow portal users to access network resources without authe

Seite 58 - Authentication

22 To do… Use the command… Remarks Create a tunnel interface and enter its view interface tunnel number Required By default, no tunnel interface ex

Seite 59 - Interaction

23 To do… Use the command… Remarks Apply a QoS policy to the IPsec tunnel interface qos apply policy policy-name { inbound | outbound } Required C

Seite 60 - SSH Connection Across VPNs

24 To do… Use the command… Remarks Clear IPsec statistics reset ipsec statistics Available in user view IPsec Configuration Examples Example for

Seite 61 - Security Volume

25 [DeviceA-ipsec-proposal-tran1] esp authentication-algorithm sha1 [DeviceA-ipsec-proposal-tran1] quit # Create an IPsec policy named map1 manually.

Seite 62 - System Volume

26 # Create an IPsec policy manually. [DeviceB] ipsec policy use1 10 manual # Apply the ACL. [DeviceB-ipsec-policy-manual-use1-10] security acl 3101

Seite 63 - Configuring an SSH User

27 # Create an IPsec proposal named tran1. [DeviceA] ipsec proposal tran1 # Specify the encapsulation mode as tunnel. [DeviceA-ipsec-proposal-tran1]

Seite 64

28 [DeviceB-ipsec-proposal-tran1] transform esp # Specify the algorithms for the proposal. [DeviceB-ipsec-proposal-tran1] esp encryption-algorithm de

Seite 65

29 Figure 7 Network diagram for setting up an IPsec tunnel with IPsec tunnel interfaces Configuation procedure 1. Configure Device A # Name the l

Seite 66

30 # Set the tunnel destination address to 1.1.1.1, the source address of the remote peer. [DeviceA–Tunnel1] destination 1.1.1.1 # Apply IPsec profil

Seite 67

31 # Apply IPsec profile btoa to tunnel interface Tunnel 1. [DeviceB–Tunnel1] ipsec profile btoa [DeviceB–Tunnel1] quit # Configure a static route to

Seite 68

15 To do… Use the command… Remarks Enter system view system-view — Configure the portal server detection function portal server server-name server-

Seite 69

32 [inbound ESP SAs] spi: 1974923076 (0x75b6ef44) proposal: ESP-ENCRYPT-DES ESP-AUTH-MD5 sa duration (kilobytes/sec): 1843200/

Seite 70

33 To meet the above requirements, • Configure basic RIPng parameters. • Configure a manual IPsec policy. • Apply the IPsec policy to a RIPng p

Seite 71

34 [DeviceA-ripng-1] quit 2. Configure Device B # Assign an IPv6 address to each interface. (Omitted) # Create a RIPng process and enable it on Giga

Seite 72

35 # Create an IPsec proposal named tran1, and set the encapsulation mode to transport mode, the security protocol to ESP, the encryption algorithm t

Seite 73

36 ----------------------------- IPsec policy name: "policy001" sequence number: 10 mode: manual -----------------------------

Seite 74

1 IKE Configuration This chapter includes these sections: • IKE Overview • IKE Configuration Task List • Displaying and Maintaining IKE • IKE Configu

Seite 75

2 PFS The Perfect Forward Secrecy (PFS) feature is a security feature based on the DH algorithm. It guarantees that decryption of a key makes no impa

Seite 76

3 Functions of IKE • IKE automatically negotiates IPsec parameters such as the keys, reducing the manual configuration complexity greatly. • IKE al

Seite 77

4 • Determine the strength of the algorithms for IKE negotiation, namely the security protection level, including the identity authentication method

Seite 78

5 for a match. The search starts from the one with the lowest sequence number and proceeds in the ascending order of sequence number until a match is

Seite 79

16 NOTE: • The user information synchronization function requires that a portal server supports the portal user heartbeat function (currently only

Seite 80 - SFTP Service

6 To do… Use the command… Remarks Specify the IKE proposals for the IKE peer to reference proposal proposal-number&<1-6> Optional By defa

Seite 81

7 To do… Use the command… Remarks Apply a DPD to the IKE peer dpd dpd-name Optional No DPD is applied to an IKE peer by default. For DPD configura

Seite 82

8 To do… Use the command… Remarks Set the ISAKMP SA keepalive timeout ike sa keepalive-timer timeout seconds Required No keepalive packet is sent b

Seite 83 - Working with SFTP Files

9 Disabling Next Payload Field Checking The Next payload field is in the generic payload header of the last payload of the IKE negotiation message (t

Seite 84 - Displaying Help Information

10 Figure 11 Network diagram for IKE configuration Configuration procedure 1. Configure Device A # Configure an IKE peer. <DeviceA> system-v

Seite 85

11 Example for Configuring IKE Aggressive Mode and NAT Traversal Network requirements • As shown in Figure 12, the branch office is connected to the

Seite 86

12 [DeviceA-ipsec-proposal-prop] transform esp [DeviceA-ipsec-proposal-prop] esp encryption-algorithm des [DeviceA-ipsec-proposal-prop] esp authentic

Seite 87

13 [DeviceB] ipsec policy policy 10 isakmp # Configure the IPsec policy to reference the IKE peer. [DeviceB-ipsec-policy-isakmp-policy-10] ike-peer p

Seite 88

14 [DeviceA] ike proposal 1 [DeviceA-ike-proposal-1] authentication-algorithm sha [DeviceA-ike-proposal-1] authentication-method pre-share [DeviceA-i

Seite 89

15 # Configure an ACL. [DeviceB] acl number 3101 [DeviceB-acl-adv-3101] rule 0 permit ip source 192.168.0.0 0.0.0.255 destination 172.16.0.0 0.0.0.25

Seite 90

17 To do… Use the command… Remarks Display information about portal users on a specified interface or all interfaces display portal user { all | in

Seite 91 - SSL Configuration

16 [DeviceB-Dialer0] dialer-group 1 [DeviceB-Dialer0] dialer bundle 1 [DeviceB-Dialer0] ipsec policy policy [DeviceB-Dialer0] mtu 1492 [DeviceB-Diale

Seite 92 - SSL Configuration Task List

17 Proposal Mismatch Symptom The proposals mismatch. Analysis Following is the debugging information: got NOTIFY of type NO_PROPOSAL_CHOSEN Or drop m

Seite 93 - Configuration Procedure

18 Solution When a device has multiple peers, you are recommended to configure ACL on the device to distinguish different data flows and try to avoid

Seite 94

18 NOTE: • You need to configure IP addresses for the host, Device, and servers as shown in Figure 4 and ensure that they can reach each other. •

Seite 95

1 Portal Configuration This chapter includes these sections: • Portal Overview • Portal Configuration Task List • Displaying and Maintaining Portal •

Seite 96

19 Figure 6 Add an IP address group # Add a portal device. Select Portal Service Management > Device from the navigation tree to enter the porta

Seite 97 - Troubleshooting SSL

20 Figure 8 Device list On the port group configuration page, click Add to enter the page for adding a port group, as shown in Figure 9. Perform th

Seite 98

21 [Device-radius-rs1] key authentication radius [Device-radius-rs1] key accounting radius # Specify that the ISP domain name should not be included

Seite 99

22 State:ONLINE SubState:NONE ACL:NONE Work-mode:stand-alone MAC IP Vlan Interface ------------------------------

Seite 100 - Web Filtering Configuration

23 NOTE: • For re-DHCP authentication, you need to configure a public address pool (20.20.20.0/24, in this example) and a private address pool (10

Seite 101 - ActiveX Blocking

24 [Device] domain default enable dm1 Step3 Configure portal authentication # Configure the portal server as follows: • Name: newpt • IP address:

Seite 102 - Configuring Web Filtering

25 Figure 11 Configure Layer 3 portal authentication Device AHost8.8.8.2/24GE0/220.20.20.1/24Portal server192.168.0.111/24RADIUS server192.168.0.112/

Seite 103 - Network requirements

26 # Configure the ISP domain to use RADIUS scheme rs1. [DeviceA-isp-dm1] authentication portal radius-scheme rs1 [DeviceA-isp-dm1] authorization por

Seite 104 - Configuration procedure

27 Figure 12 Configure direct portal authentication with extended functions DeviceHost2.2.2.2/24Gateway : 2.2.2.1/24GE0/22.2.2.1/24GE0/1192.168.0.100

Seite 105

28 # Configure the ISP domain to use RADIUS scheme rs1. [Device-isp-dm1] authentication portal radius-scheme rs1 [Device-isp-dm1] authorization porta

Seite 106

2 • Resource access limit: A user passing identity authentication can access only network resources in the quarantined area, such as the anti-virus

Seite 107 - Invalid Blocking Suffix

29 portal authentication, the host uses an assigned private IP address. After passing the authentication, the host can get a public IP address. • Wh

Seite 108

30 # Set the server type for the RADIUS scheme. When using the CAMS or iMC server, you need set the server type to extended. [Device-radius-rs1] ser

Seite 109 - Public Key Configuration

31 • U R L : h t t p : / / 19 2.16 8 . 0 .111:8080/portal. [Device] portal server newpt ip 192.168.0.111 key portal port 50100 url http://192.168.0

Seite 110

32 NOTE: • Make sure that the IP address of the portal device added on the portal server is the IP address of the interface connecting users (20.2

Seite 111

33 NOTE: On the security policy server, you need to specify ACL 3000 as the isolation ACL and ACL 3001 as the security ACL. [DeviceA] acl number 3

Seite 112

34 Figure 15 Network diagram for configuring portal server detection and portal user synchronization DeviceHost2.2.2.2/24Gateway : 2.2.2.1/24GE0/22.2

Seite 113

35 Figure 16 Portal server configuration # Configure an IP address group. Select Portal Service Management > IP Group from the navigation tree t

Seite 114

36 Figure 18 Add a portal device # Associate the portal device with the IP address group. As shown in Figure 19, on the device list, click the icon

Seite 115

37 Figure 20 Add a port group # Select Service Parameters > Validate System Configuration from the navigation tree to make the above configurati

Seite 116

38 # Configure dm1 as the default ISP domain for all users. Then, if a user enters a username without any ISP domain at logon, the authentication and

Seite 117

3 Portal server Server that listens to authentication requests from authentication clients and exchanges client authentication information with the a

Seite 118 - Connection Limit Overview

39 URL : http://192.168.0.111:8080/portal Status : Up Layer 3 Portal Authentication Across VPNs Network requirements As shown in Figure 21

Seite 119

40 [DeviceA-radius-rs1] user-name-format without-domain # Specify the source IP address for outgoing RADIUS packets as 3.3.0.3. [DeviceA-radius-rs1]

Seite 120

41 ACL:NONE Work-mode:stand-alone VPN instance:vpn1 MAC IP Vlan Interface ----------------------------------------

Seite 121 - Analysis

42 Solution Use the display portal server command to display the listening port of the portal server configured on the access device and use the port

Seite 122 - Solution

i Table of Contents ALG Configuration·················································································································

Seite 123 - Contents

1 ALG Configuration This chapter includes these sections: • ALG Overview • Enabling ALG • ALG Configuration Examples ALG Overview The Application Lev

Seite 124 - Firewall configuration

2 • Real-Time Streaming Protocol (RTSP) • Skinny Client Control Protocol (SCCP) • Session Initiation Protocol (SIP) • SQLNET (a language in Ora

Seite 125

3 If the host passes the authentication, a data connection is established between it and the server. Note that if the host is accessing the server in

Seite 126

4 Figure 2 Network diagram for FTP ALG configuration Configuration procedure # Configure the address pool and ACL. <Device> system-view [Devi

Seite 127

5 Figure 3 Network diagram for SIP ALG configuration Configuration procedure # Configure the address pool and ACL. <Device> system-view [Devi

Seite 128

4 • Direct authentication Before authentication, a user manually configures a public IP address or directly obtains a public IP address through DHCP

Seite 129 - IPsec Configuration

6 <Device> system-view [Device] nat static 192.168.1.3 5.5.5.9 # Enable ALG for NBT. [Device] alg nbt # Configure NAT. [Device] interface gigab

Seite 130 - Basic Concepts of IPsec

i Table of Contents RSH Configuration ················································································································

Seite 131 - Encapsulation modes

1 RSH Configuration This chapter includes these sections: • Introduction to RSH • Configuring RSH • RSH Configuration Example Introduction to RSH Re

Seite 132 - IPsec Tunnel Interface

2 . NOTE: If RSH daemon authentication is enabled on the remote host, you must provide the username configuredon the remote host in advance RSH Co

Seite 133

3 Figure 4 Services window Step3 Check for the Remote Shell Daemon entry. If it does not exist, install the daemon first. Step4 Look at the Statu

Seite 134 - Configuring IPsec

4 # Set the time of the host remotely. <Device>rsh 192.168.1.10 command time Trying 192.168.1.10 ... Press CTRL+K to abort The current time is:

Seite 135 - Implementing ACL-Based IPsec

i Table of Contents SSH2.0 Configuration ·············································································································

Seite 136

1 SSH2.0 Configuration This chapter includes these sections: • SSH2.0 Overview • Configuring the Device as an SSH Server • Configuring the Device as

Seite 137 - Mirror image ACLs

2 Stages Description Interaction After the server grants the request, the client and server start to communicate with each other. Version negotiatio

Seite 138 - Protection modes

3 • Password authentication: The server uses AAA for authentication of the client. During password authentication, the client encrypts its username

Seite 139 - Configuring an IPsec Policy

5 The direct authentication/cross-subnet authentication process is as follows: Step1 An authentication client initiates authentication by sending an

Seite 140

4 NOTE: • In the interaction stage, you can execute commands from the client by pasting the commands in text format (the text must be within 2000

Seite 141

5 Generating a DSA or RSA Key Pair In the key and algorithm negotiation stage, the DSA or RSA key pair is required to generate the session ID and fo

Seite 142

6 Follow these steps to configure the protocols for the current user interface to support: To do… Use the command… Remarks Enter system view system

Seite 143 - NOTE:

7 To do… Use the command… Remarks Enter public key code view public-key-code begin — Configure a client public key Enter the content of the public

Seite 144

8 To do… Use the command… Remarks For all users or SFTP users ssh user username service-type { all | sftp } authentication-type { password | { any

Seite 145

9 • Setting the maximum number of SSH authentication attempts Setting the above parameters can help avoid malicious guess at and cracking of the ke

Seite 146

10 To do… Use the command… Remarks Specify a source IPv4 address or interface for the SSH client ssh client source { ip ip-address | interface inte

Seite 147

11 To do... Use the command… Remarks Configure the server host public key See Configuring a Client Public Key Required The method for configuring t

Seite 148 - Configuring an IPsec Profile

12 To do… Use the command… Remarks Display the source IP address or interface currently set for the SSH client display ssh client source Available

Seite 149

13 [Device] ssh server enable # Configure an IP address for interface GigabitEthernet 0/1, which the SSH client will use as the destination for SSH c

Seite 150 - IP Services Volume

6 The re-DHCP authentication process is as follows: Step 1 through step 6 are the same as those in the direct authentication/cross-subnet authenticat

Seite 151

14 Figure 3 SSH client configuration interface In the window shown in Figure 3, click Open to connect to the server. If the connection is normal, y

Seite 152 - IPsec Configuration Examples

15 NOTE: During SSH server configuration, the client public key is required. Therefore, you are recommended to usethe client software to generate a

Seite 153 - 2. Configure Device B

16 Figure 6 Generate a key pair on the client 2) After the key pair is generated, click Save public key and specify the file name as key.pub to sav

Seite 154

17 Figure 7 Generate a key pair on the client 3) Likewise, to save the private key, click Save private key. A warning window pops up to prompt you

Seite 155

18 [Device-GigabitEthernet0/1] quit # Set the authentication mode for the user interfaces to AAA. [Device] user-interface vty 0 4 [Device-ui-vty0-4]

Seite 156

19 Select Connection > SSH > Auth from the navigation tree. The following window appears. Click Browse… to bring up the file selection window,

Seite 157 - Configuation procedure

20 Configuration procedure Step1 Configure the SSH server # Create RSA and DSA key pairs and enable the SSH server. <DeviceB> system-view [Dev

Seite 158

21 Do you want to save the server public key? [Y/N]:n Enter password: After you enter the correct password, you can log into Device B successfully. •

Seite 159

22 After you enter the correct username and password, you can log into Device B successfully. When Device Acts as Client for Publickey Authentication

Seite 160

23 # Set the authentication mode for the user interfaces to AAA. [DeviceB] user-interface vty 0 4 [DeviceB-ui-vty0-4] authentication-mode scheme # En

Seite 161

7 Configuration Prerequisites The portal feature provides a solution for user identity authentication and security check. However, the portal feature

Seite 162 - 3. Configure Device C

1 SFTP Service This chapter includes these sections: • SFTP Overview • Configuring the Device as an SFTP Server • Configuring the Device an SFTP Clie

Seite 163

2 NOTE: When the device functions as the SFTP server, only one client can access the SFTP server at a time. If the SFTP client uses WinSCP, a file

Seite 164

3 To do… Use the command… Remarks Establish a connection to the remote IPv4 SFTP server and enter SFTP client view sftp server [ port-number ] [ vp

Seite 165 - IKE Configuration

4 To do… Use the command… Remarks Display the current working directory of the remote SFTP server pwd Optional dir [ -a | -l ] [ remote-path ] Disp

Seite 166 - Operation of IKE

5 Displaying Help Information This configuration task is to display a list of all commands or the help information of an SFTP client command, such as

Seite 167 - IKE Configuration Task List

6 NOTE: During SFTP server configuration, the client public key is required. Therefore, you are recommended to use the client software to generate

Seite 168 - Configuring an IKE Proposal

7 <DeviceA> sftp 192.168.0.1 identity-key rsa Input Username: client001 Trying 192.168.0.1 ... Press CTRL+K to abort Connected to 192.168.0.1 .

Seite 169 - Configuring an IKE Peer

8 -rwxrwxrwx 1 noone nogroup 1759 Aug 23 06:52 config.cfg -rwxrwxrwx 1 noone nogroup 225 Aug 24 08:01 pubkey2 -rwxrwxrwx 1 noo

Seite 170

9 # Generate RSA and DSA key pairs and enable the SSH server. <Device> system-view [Device] public-key local create rsa [Device] public-key loc

Seite 171 - Setting Keepalive Timers

10 Figure 15 SFTP client interface

Seite 172 - Configuring a DPD

8 CAUTION: • At present, the access device allows you to specify up to four portal servers. • The specified parameters of a portal server can be m

Seite 173 - IKE Configuration Examples

i Table of Contents SSL Configuration·················································································································

Seite 174

1 SSL Configuration This chapter includes these sections: • SSL Overview • SSL Configuration Task List • Displaying and Maintaining SSL • Troublesh

Seite 175 - Traversal

2 NOTE: • For more information about symmetric key algorithms, asymmetric key algorithm RSA and digital signature, see Public Key Configuration

Seite 176

3 Configuring an SSL Server Policy An SSL server policy is a set of SSL parameters for a server to use when booting up. An SSL server policy takes

Seite 177

4 To do... Use the command... Remarks Configure the policy to use a hardware encryption card for SSL encryption and decryption crypto-accelerator

Seite 178

5 Configuration procedure Step1 Configure the HTTPS server (Device) # Create a PKI entity named en, and configure the common name as http-server1

Seite 179

6 On Host, launch IE, enter http://10.1.2.2/certsrv in the address bar and request a certificate for Host as prompted. Step3 Verify your configura

Seite 180 - Troubleshooting IKE

7 To do… Use the command… Remarks Enable certificate-based SSL server authentication server-verify enable Optional Enabled by default NOTE: If

Seite 181 - ACL Configuration Error

8 Step2 You can use the display ssl server-policy command to view the cipher suites that the SSL server policy supports. If the server and the cli

Seite 182

i Table of Contents Web Filtering Configuration ······································································································

Kommentare zu diesen Handbüchern

Keine Kommentare