n1000v Security
n1000v Security
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCBs public domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) 2011 Cisco Systems, Inc. All rights reserved.
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
CONTENTS
New and Changed Information Preface
xv xv xv xvi xvii xiii
Audience
xix
Access Control Lists (ACLs) Port Security DHCP Snooping IP Source Guard
1-3 1-3 1-4
1-3
2-1
Information About User Accounts 2-1 Role 2-1 User Name 2-3 Password 2-3 Check of Password Strength 2-3 Expiration Date 2-4
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
iii
Contents
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Guidelines and Limitations Default Settings
2-4 2-4
Configuring User Access 2-4 Enabling the Check of Password Strength Disabling the Check of Password Strength Creating a User Account 2-6 Creating a Role 2-8 Creating a Feature Group 2-10 Configuring Interface Access 2-12 Configuring VLAN Access 2-13 Verifying the User Access Configuration Example Configuration
2-15 2-15
2-5 2-6
Additional References 2-16 Related Documents 2-16 Standards 2-16 MIBs 2-16 Feature History for User Accounts Configuring VSD
3-1 3-1 2-16
Information About Virtual Service Domain Service Virtual Machine 3-1 Port Profiles 3-2 Guidelines and Limitations Default Settings
3-3 3-3
Configuring VSD 3-4 Configuring an Inside or Outside VSD Port Profile Configuring a Member VSD Port Profile 3-7 Verifying the Configuration Configuration Example
3-10 3-8
3-4
Additional References 3-10 Related Documents 3-11 Standards 3-11 Feature History Configuring AAA
3-11 4-1 4-1
iv
OL-22823-01
Contents
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
AAA Security Services 4-1 Authentication 4-2 Authorization 4-3 Accounting 4-3 AAA Server Groups 4-4 Prerequisites for AAA Default Settings
4-4 4-4 4-4
Configuring AAA 4-4 Configuring a Login Authentication Method 4-6 Enabling Login Authentication Failure Messages 4-7 Verifying AAA Configuration Example AAA Configuration Additional References 4-9 Related Documents 4-9 Standards 4-9 Feature History for AAA Configuring RADIUS
5-1 4-10 4-8 4-9
Information About RADIUS 5-1 RADIUS Network Environments 5-1 RADIUS Operation 5-2 RADIUS Server Monitoring 5-2 Vendor-Specific Attributes 5-3 Prerequisites for RADIUS Guidelines and Limitations Default Settings
5-5 5-4 5-4
Configuring RADIUS Servers 5-5 Configuring RADIUS Server Hosts 5-6 Configuring the Global RADIUS Key 5-7 Configuring a RADIUS Server Key 5-8 Configuring RADIUS Server Groups 5-9 Enabling RADIUS Server Directed Requests 5-10 Setting the Global Timeout for All RADIUS Servers 5-12 Configuring a Global Retry Count for All RADIUS Servers 5-13 Setting the Timeout Interval for a Single RADIUS Server 5-14 Configuring Retries for a Single RADIUS Server 5-15
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
Contents
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Configuring a RADIUS Accounting Server 5-16 Configuring a RADIUS Authentication Server 5-17 Configuring Periodic RADIUS Server Monitoring 5-18 Configuring the Global Dead-Time Interval 5-20 Manually Monitoring RADIUS Servers or Groups 5-21 Verifying RADIUS Configuration Example RADIUS Configuration Additional References 5-22 Related Documents 5-22 Standards 5-23 Feature History for RADIUS Configuring TACACS+
6-1 5-23 5-22 5-22
Information About TACACS+ 6-1 TACACS+ Operation for User Login 6-2 Default TACACS+ Server Encryption Type and Preshared Key TACACS+ Server Monitoring 6-3 Vendor-Specific Attributes 6-3 Cisco VSA Format 6-3 Prerequisites for TACACS+ Guidelines and Limitations Default Settings
6-4 6-4 6-4
6-2
Configuring TACACS+ 6-5 Enabling or Disabling TACACS+ 6-8 Configuring Shared Keys 6-9 Configuring a TACACS+ Server Host 6-11 Configuring a TACACS+ Server Group 6-12 Enabling TACACS+ Server Directed Requests 6-15 Setting the TACACS+ Global Timeout Interval 6-16 Setting a Timeout Interval for an Individual TACACS+ Host 6-17 Configuring the TCP Port for a TACACS+ Host 6-18 Configuring Monitoring for a TACACS+ Host 6-20 Configuring the TACACS+ Global Dead-Time Interval 6-21 Displaying Statistics for a TACACS+ Host Example TACACS+ Configuration
6-23 6-22
vi
OL-22823-01
Contents
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Feature History for TACACS+ Additional References 6-24 Related Documents 6-24 Standards 6-24 Configuring SSH
7-1 6-23
Information About SSH 7-1 SSH Server 7-1 SSH Client 7-2 SSH Server Keys 7-2 Prerequisites for SSH Default Settings
7-3 7-2 7-2
Configuring SSH 7-3 Generating SSH Server Keys 7-3 Configuring a User Account with a Public Key Configuring an OpenSSH Key 7-5 Configuring IETF or PEM Keys 7-7 Starting SSH Sessions 7-8 Clearing SSH Hosts 7-9 Disabling the SSH Server 7-9 Deleting SSH Server Keys 7-10 Clearing SSH Sessions 7-12 Verifying the SSH Configuration SSH Example Configuration Additional References 7-15 Related Documents 7-15 Standards 7-15 Feature History for SSH Configuring Telnet
8-1 8-1 7-15 7-13 7-14
7-5
Information About the Telnet Server Prerequisites for Telnet Guidelines and Limitations Default Setting Configuring Telnet
8-2 8-2 8-1 8-2
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
vii
Contents
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Enabling the Telnet Server 8-2 Starting an IP Telnet Session to a Remote Device Clearing Telnet Sessions 8-4 Verifying the Telnet Configuration Additional References 8-5 Related Documents 8-5 Standards 8-6 Feature History for Telnet Configuring an IP ACL
9-1 8-6 8-5
8-3
Information About ACLs 9-1 ACL Types and Applications 9-2 Order of ACL Application 9-2 About Rules 9-2 Source and Destination 9-2 Protocols 9-3 Implicit Rules 9-3 Additional Filtering Options 9-3 Sequence Numbers 9-4 Statistics 9-4 Prerequisites for IP ACLs Guidelines and Limitations Default Settings
9-5 9-5 9-5
Configuring IP ACLs 9-5 Creating an IP ACL 9-6 Changing an IP ACL 9-7 Removing an IP ACL 9-9 Changing Sequence Numbers in an IP ACL 9-10 Applying an IP ACL as a Port ACL 9-11 Adding an IP ACL to a Port Profile 9-12 Applying an IP ACL to the Management Interface Verifying IP ACL Configurations Monitoring IP ACL
9-15 9-15 9-14
9-13
Example Configurations for IP ACL Additional References 9-15 Related Documents 9-16 Standards 9-16
viii
OL-22823-01
Contents
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Feature History for IP ACL Configuring a MAC ACL
9-16
Information About MAC ACLs Prerequisites for MAC ACLs Guidelines and Limitations Default Settings
10-2
Configuring MAC ACLs 10-2 Creating a MAC ACL 10-2 Changing a MAC ACL 10-3 Removing a MAC ACL 10-5 Changing Sequence Numbers in a MAC ACL Applying a MAC ACL as a Port ACL 10-7 Adding a MAC ACL to a Port Profile 10-8 Verifying MAC ACL Configurations Monitoring MAC ACLs
10-10 10-11 10-9
10-6
Example Configurations for MAC ACLs Additional References 10-11 Related Documents 10-12 Standards 10-12 Feature History for MAC ACL Configuring Port Security
11-1 10-12
Information About Port Security 11-1 Secure MAC Address Learning 11-1 Static Method 11-2 Dynamic Method 11-2 Sticky Method 11-2 Dynamic Address Aging 11-2 Secure MAC Address Maximums 11-3 Interface Secure MAC Addresses 11-3 Security Violations and Actions 11-4 Port Security and Port Types 11-5 Result of Changing an Access Port to a Trunk Port Result of Changing a Trunk Port to an Access Port Guidelines and Limitations Default Settings
11-6 11-6 11-5
11-5 11-5
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
ix
Contents
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Enabling or Disabling Port Security on a Layer 2 Interface 11-6 Enabling or Disabling Sticky MAC Address Learning 11-8 Adding a Static Secure MAC Address on an Interface 11-9 Removing a Static or a Sticky Secure MAC Address from an Interface Removing a Dynamic Secure MAC Address 11-11 Configuring a Maximum Number of MAC Addresses 11-12 Configuring an Address Aging Type and Time 11-14 Configuring a Security Violation Action 11-15 Recovering Ports Disabled for Port Security Violations 11-17 Verifying the Port Security Configuration Displaying Secure MAC Addresses Additional References 11-19 Related Documents 11-19 Standards 11-19 Feature History for Port Security Configuring DHCP Snooping
12-1 11-19 11-18 11-18 11-18
11-10
Information About DHCP Snooping 12-1 Overview 12-1 Trusted and Untrusted Sources 12-2 DHCP Snooping Binding Database 12-2 Relay Agent Information Option 12-3 High Availability 12-3 Prerequisites for DHCP Snooping Guidelines and Limitations Default Settings
12-4 12-3 12-3
Configuring DHCP Snooping 12-4 Minimum DHCP Snooping Configuration 12-4 Enabling or Disabling the DHCP Feature 12-5 Enabling or Disabling DHCP Snooping Globally 12-6 Enabling or Disabling DHCP Snooping on a VLAN 12-7 Enabling or Disabling DHCP Snooping MAC Address Verification 12-8 Configuring an Interface as Trusted or Untrusted 12-9 Configuring the Rate Limit for DHCP Packets 12-10 Detecting Ports Disabled for DHCP Rate Limit Violation 12-11 Recovering Ports Disabled for DHCP Rate Limit Violations 12-12
OL-22823-01
Contents
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Clearing the DHCP Snooping Binding Database 12-13 Clearing All Binding Entries 12-13 Clearing Binding Entries for an Interface 12-14 Relaying Switch and Circuit Information in DHCP 12-15 Verifying the DHCP Snooping Configuration Monitoring DHCP Snooping
12-16 12-16 12-16
Example Configuration for DHCP Snooping Additional References 12-17 Related Documents 12-17 Standards 12-17 Feature History for DHCP Snooping Configuring Dynamic ARP Inspection
12-17 13-1
Information About DAI 13-1 About ARP 13-1 About ARP Spoofing Attacks 13-2 About DAI and ARP Spoofing 13-2 Interface Trust and Network Security Prerequisites for DAI Default Settings
13-5 13-4 13-4
13-3
Configuring DAI 13-5 Configuring a VLAN for DAI 13-6 Configuring a Trusted vEthernet Interface 13-6 Resetting a vEthernet Interface to Untrusted 13-8 Configuring DAI Rate Limits 13-9 Resetting DAI Rate Limits to Default Values 13-11 Detecting and Recovering Error-Disabled Interfaces Validating ARP Packets 13-13 Verifying the DAI Configuration Monitoring DAI
13-15 13-15 13-14
13-12
Additional References 13-17 Related Documents 13-17 Standards 13-17 Feature History for DAI
13-18
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
xi
Contents
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Configuring IP Source Guard
14-1 14-1 14-2
Information About IP Source Guard Prerequisites for IP Source Guard Guidelines and Limitations Default Settings
14-2 14-2
Configuring IP Source Guard 14-2 Enabling or Disabling IP Source Guard on a Layer 2 Interface Adding or Removing a Static IP Source Entry 14-4 Verifying the IP Source Guard Configuration Displaying IP Source Guard Bindings Additional References 14-5 Related Documents 14-5 Standards 14-6 Feature History for IP Source Guard Disabling HTTP Server
15-1 15-1 14-6 14-5 14-5 14-5
14-3
Information About the HTTP Server Guidelines and Limitations Default Setting
15-2 15-2 15-1
Verifying the HTTP Configuration Additional References 15-3 Related Documents 15-4 Standards 15-4
15-3
Feature History for Disabling the HTTP Server Security Configuration Limits
INDEX
15-4
16-1
xii
OL-22823-01
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Feature DHCP Snooping Relay Agent (Option 82) DHCP Snooping binding table Enable DHCP Enable SSH server Enable Telnet server Disable HTTP Server VSD
Description You can configure DHCP to relay VSM MAC and port information in DHCP packets. You can clear DHCP snooping binding table entries for an interface.
Where Documented Chapter 12, Configuring DHCP Snooping Chapter 12, Configuring DHCP Snooping Chapter 12, Configuring DHCP Snooping Chapter 7, Configuring SSH Chapter 8, Configuring Telnet Chapter 15, Disabling HTTP Server Chapter 3, Configuring VSD
4.2(1)SV1(4)
You can enable or disable DHCP globally 4.2(1)SV1(4) using the feature DHCP command. You can enable or disable the SSH server using the feature DHCP command. 4.2(1)SV1(4)
You can enable or disable the Telnet server 4.2(1)SV1(4) using the feature DHCP command. Disabling the HTTP server for security purposes. 4.2(1)SV1(4)
Virtual service domains (VSDs) allow you 4.0(4)SV1(2) to classify and separate traffic for network services. Dynamic Host Configuration Protocol 4.0(4)SV1(2) (DHCP) snooping acts like a firewall between untrusted hosts and trusted DHCP servers. 4.0(4)SV1(2)
DHCP Snooping
Dynamic ARP Inspection Dynamic ARP inspection (DAI) provides (DAI) IP communication within a Layer 2 broadcast domain by mapping an IP address to a MAC address. IP Source Guard IP Source Guard is a per-interface traffic permit filter for IP and MAC addresses.
4.0(4)SV1(2)
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
xiii
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
xiv
OL-22823-01
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Preface
The Security Configuration document provides procedures for configuring security features, such as AAA, VSD, SSH, and so forth. This preface describes the following aspects of this document:
Audience, page xv Document Organization, page xv Document Conventions, page xvi Available Documents, page xvii Obtaining Documentation and Submitting a Service Request, page xix
Audience
This guide is for experienced network system users.
Document Organization
This document is organized into the following chapters: Chapter and Title Chapter 1, Security Overview Chapter 2, Managing User Accounts Chapter 3, Configuring VSD Chapter 4, Configuring AAA Chapter 5, Configuring RADIUS Chapter 6, Configuring TACACS+ Chapter 7, Configuring SSH Chapter 8, Configuring Telnet Chapter 9, Configuring an IP ACL Description Describes the security features. Describes how to configure user accounts. Describes how to configure VSD. Describes how to configure AAA. Describes how to configure RADIUS. Describes how to configure TACACS+. Describes how to configure SSH. Describes how to configure Telnet. Describes how to configure IP access control lists (ACLs) for filtering traffic.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
xv
Preface
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Chapter and Title Chapter 10, Configuring a MAC ACL Chapter 11, Configuring Port Security Chapter 13, Configuring Dynamic ARP Inspection Chapter 15, Disabling HTTP Server Chapter 16, Security Configuration Limits Description Describes how to configure MAC access control lists (ACLs) for filtering traffic. Describes how to configure port security. Describes how to configure Dynamic ARP Inspection.
Chapter 12, Configuring DHCP Snooping Describes how to configure DHCP snooping.
Chapter 14, Configuring IP Source Guard Describes how to configure IP Source Guard. Describes how to disable HTTP server. Describes configuration limits for security features.
Document Conventions
Command descriptions use these conventions: boldface font italic font {} [ ] x|y|z string Commands and keywords are in boldface. Arguments for which you supply values are in italics. Elements in braces are required choices. Elements in square brackets are optional. Alternative, mutually exclusive elements are separated by vertical bars. A nonquoted set of characters. Do not use quotation marks around the string or the string will include the quotation marks.
Terminal sessions and information the device displays are in screen font. Information you must enter is in boldface screen font. Arguments for which you supply values are in italic screen font. Nonprinting characters, such as passwords, are in angle brackets. Default responses to system prompts are in square brackets. An exclamation point (!) or a pound sign (#) at the beginning of a line of code indicates a comment line.
< > [ ] !, #
This document uses the following conventions for notes and cautions:
Note
Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual.
xvi
OL-22823-01
Preface
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Caution
Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.
Available Documents
This section lists the documents used with the Cisco Nexus 1000 and available on Cisco.com at the following url: http://www.cisco.com/en/US/products/ps9902/tsd_products_support_series_home.html
General Information
Cisco Nexus 1000V Documentation Roadmap, Release 4.2(1)SV1(4) Cisco Nexus 1000V Release Notes, Release 4.2(1)SV1(4) Cisco Nexus 1000V Compatibility Information, Release 4.2(1)SV1(4) Cisco Nexus 1010 Management Software Release Notes, Release 4.2(1)SP1(2)
Configuration Guides
Cisco Nexus 1000V License Configuration Guide, Release 4.2(1)SV1(4) Cisco Nexus 1000V Getting Started Guide, Release 4.2(1)SV1(4) Cisco Nexus 1000V High Availability and Redundancy Configuration Guide, Release 4.2(1)SV1(4) Cisco Nexus 1000V Interface Configuration Guide, Release 4.2(1)SV1(4) Cisco Nexus 1000V Layer 2 Switching Configuration Guide, Release 4.2(1)SV1(4) Cisco Nexus 1000V Port Profile Configuration Guide, Release 4.2(1)SV1(4) Cisco Nexus 1000V Quality of Service Configuration Guide, Release 4.2(1)SV1(4) Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1)SV1(4) Cisco Nexus 1000V System Management Configuration Guide, Release 4.2(1)SV1(4) Cisco Nexus 1010 Software Configuration Guide, Release 4.2(1)SP1(2)
Programming Guide
Cisco Nexus 1000V XML API User Guide, Release 4.2(1)SV1(4)
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
xvii
Preface
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Reference Guides
Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4) Cisco Nexus 1000V MIB Quick Reference Cisco Nexus 1010 Command Reference, Release 4.2(1)SP1(2)
xviii
OL-22823-01
Preface
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
xix
Preface
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
xx
OL-22823-01
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
CH A P T E R
Security Overview
This chapter provides an overview of the following security features used with the Cisco Nexus 1000V:
User Accounts, page 1-1 Virtual Service Domain, page 1-1 Authentication, Authorization, and Accounting (AAA), page 1-2 RADIUS Security Protocol, page 1-2 TACACS+ Security Protocol, page 1-2 SSH, page 1-3 Telnet, page 1-3 Access Control Lists (ACLs), page 1-3 Port Security, page 1-3 DHCP Snooping, page 1-3 Dynamic ARP Inspection, page 1-4 IP Source Guard, page 1-4
User Accounts
Access to the Cisco Nexus 1000V is accomplished by setting up user accounts that define the specific actions permitted by each user. You can create up to 256 user accounts. For each user account, you define a role, user name, password, and expiration date. For information about configuring and managing user accounts, see Chapter 2, Managing User Accounts.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
1-1
Security Overview
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
AuthenticationProvides the method of identifying users, including login and password dialog, challenge and response, messaging support, and, depending on the security protocol that you select, encryption. Authentication is the way a user is identified prior to being allowed access to the network and network services. You configure AAA authentication by defining a named list of authentication methods and then applying that list to various interfaces. AuthorizationProvides the method for remote access control, including one-time authorization or authorization for each service, per-user account list and profile, user group support, and support of IP, IPX, ARA, and Telnet. Remote security servers, such as RADIUS and TACACS+, authorize users for specific rights by associating attribute-value (AV) pairs, which define those rights, with the appropriate user. AAA authorization works by assembling a set of attributes that describe what the user is authorized to perform. These attributes are compared with the information contained in a database for a given user, and the result is returned to AAA to determine the users actual capabilities and restrictions.
AccountingProvides the method for collecting and sending security server information used for billing, auditing, and reporting, such as user identities, start and stop times, executed commands (such as PPP), number of packets, and number of bytes. Accounting enables you to track the services that users are accessing, as well as the amount of network resources that they are consuming.
Note
You can configure authentication outside of AAA. However, you must configure AAA if you want to use RADIUS or TACACS+, or if you want to configure a backup authentication method. For information about configuring AAA, see Chapter 4, Configuring AAA.
1-2
OL-22823-01
Chapter 1
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
For information about configuring TACACS+, see Chapter 6, Configuring TACACS+.
SSH
You can use the Secure Shell (SSH) server to enable an SSH client to make a secure, encrypted connection to a device. SSH uses strong encryption for authentication. The SSH server can operate with publicly and commercially available SSH clients. The SSH client works with publicly and commercially available SSH servers. For information, see the Chapter 7, Configuring SSH.
Telnet
You can use the Telnet protocol to set up TCP/IP connections to a host. Telnet allows a person at one site to establish a TCP connection to a login server at another site and then passes the keystrokes from one device to the other. Telnet can accept either an IP address or a domain name as the remote device address. For information, see the Chapter 8, Configuring Telnet..
Port Security
Port security lets you configure Layer 2 interfaces permitting inbound traffic from a restricted and secured set of MAC addresses. Traffic from a secured MAC address is not allowed on another interface within the same VLAN. The number of MAC addresses that can be secured is configured per interface. For more information, see Chapter 11, Configuring Port Security.
DHCP Snooping
DHCP snooping provides a mechanism to prevent a malicious host masquerading as a DHCP server from assigning IP addresses (and related configuration) to DHCP clients. In addition, DHCP snooping prevents certain denial of service attacks on the DHCP server.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
1-3
Security Overview
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DHCP snooping requires you to configure a trust setting for ports, which is used to differentiate between trusted and untrusted DHCP servers. In addition, DHCP snooping learns IP addresses assigned by the DHCP server, so that other security features (for example, Dynamic ARP inspection and IP source guard) can function when DHCP is used to assign IP addresses to interfaces. For more information, see Chapter 12, Configuring DHCP Snooping.
IP Source Guard
IP Source Guard is a per-interface traffic filter that permits IP traffic only when the packet IP address and MAC address match one of the following:
The IP address and MAC address in the DHCP snooping binding The static IP source entries that you configure
1-4
OL-22823-01
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
C H A P T E R
Information About User Accounts, page 2-1 Guidelines and Limitations, page 2-4 Default Settings, page 2-4 Configuring User Access, page 2-4 Example Configuration, page 2-15 Additional References, page 2-16 Feature History for User Accounts, page 2-16
Role, page 2-1 User Name, page 2-3 Password, page 2-3 Expiration Date, page 2-4
Role
A role is a collection of rules that define the specific actions that can be shared by a group of users. The following broadly defined roles, for example, can be assigned to user accounts. These roles are predefined in the Cisco Nexus 1000V and cannot be modified:
role: network-admin description: Predefined network admin role has access to all commands on the switch ------------------------------------------------------------------Rule Perm Type Scope Entity ------------------------------------------------------------------1 permit read-write role: network-operator
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
2-1
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
description: Predefined network operator role has access to all read commands on the switch ------------------------------------------------------------------Rule Perm Type Scope Entity ------------------------------------------------------------------1 permit read
You can create an additional 64 roles that define access for users. Each user account must be assigned at least one role and can be assigned up to 64 roles. You can create roles that, by default, permit access to the following commands only. You must add rules to allow users to configure features.
Component Rule
Description One of the defined role criteria, such as a command that is permitted or denied. You can add up to 256 rules to each role. The following are the rules for the predefined roles:
role: network-admin
--------------------------------------------------------Rule Perm Type Scope Entity --------------------------------------------------------1 permit read-write
role: network-operator
--------------------------------------------------------Rule Perm Type Scope Entity --------------------------------------------------------1 permit read-only
Feature
An individual feature, such as syslog or TACACS+, whose access can be defined in a rule. To see a list of available features, use the show role feature command. A grouping of features whose access can be defined in a rule. You can create up to 64 such groupings. To see a list of available feature groups, use the show role feature-group command. A single command, or group of commands collected in a regular expression, whose access can be defined in a rule. A role permitting access to a command takes precedence over a role that denies access to the command. For example, if a user is assigned a role that denies access to the configuration command, but is also assigned a role that permits access to this command, then access is permitted.
Feature Group
Command
2-2
OL-22823-01
Chapter 2
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
User Name
A user name identifies an individual user by a unique character string, such as daveGreen. User names are case sensitive and can consist of up to 28 alphanumeric characters. A user name consisting of all numerals is not allowed. If an all numeric user name exists on an AAA server and is entered during login, the user is not logged in.
Password
A password is a case-sensitive character string that enables access by a specific user and helps prevent unauthorized access. You can add a user without a password, but they may not be able to access the device. Passwords should be strong so that they cannot be easily guessed for unauthorized access. The following characters are not permitted in clear text passwords:
dollar signs ($) spaces quotation marks (" or ') vertical bars (|) right angle brackets (>)
The following special characters are not permitted at the beginning of the password:
At least eight characters Uppercase letters Lowercase letters Numbers Special characters
Consecutive characters, such as abcd Repeating characters, such as aaabbb Dictionary words Proper names
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
2-3
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
lower case letters,upper case letters, digits, and special characters
Expiration Date
By default, a user account does not expire. You can, however, explicitly configure an expiration date on which the account will be disabled.
You can create up to 64 roles in addition to the two predefined user roles. You can create up to 256 rules in a user role. You can create up to 64 feature groups. You can add up to 256 users. You can assign a maximum of 64 user roles to a user account. If you have a user account that has the same name as a remote user account on an AAA server, the user roles for the local user account are applied to the remote user, not the user roles configured on the AAA server.
Default Settings
Table 2-3 lists the default settings for user access.
Table 2-3 User Access Defaults
Parameters User account password User account expiration date. User account role Interface policy VLAN policy
Default Undefined None Network-operator All interfaces are accessible. All VLANs are accessible.
Enabling the Check of Password Strength, page 2-5 Disabling the Check of Password Strength, page 2-6 Creating a User Account, page 2-6 Creating a Role, page 2-8
2-4
OL-22823-01
Chapter 2
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Creating a Feature Group, page 2-10 Configuring Interface Access, page 2-12 Configuring VLAN Access, page 2-13
You are logged in to the CLI in EXEC mode. Checking password strength is enabled by default. This procedure can be used to enable it again should it become disabled.
SUMMARY STEPS
1. 2 3 4
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Enables password-strength checking. The default is enabled. You can disable the checking of password strength by using the no form of this command. (Optional) Displays the configuration for checking password strength.
Step 3
show password strength-check Example: n1000v# show password strength-check Password strength check enabled n1000v(config)#
Step 4
(Optional) Saves the running configuration persistently through reboots and restarts by copying Example: it to the startup configuration. n1000v# copy running-config startup-config
copy running-config startup-config
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
2-5
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You are logged in to the CLI in EXEC mode. Checking password strength is enabled by default. This procedure can be used to disable it.
SUMMARY STEPS
1. 2 3 4
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Step 3
show password strength-check Example: n1000v# show password strength-check Password strength check not enabled n1000v(config)#
Step 4
(Optional) Saves the running configuration persistently through reboots and restarts by copying Example: it to the startup configuration. n1000v# copy running-config startup-config
copy running-config startup-config
2-6
OL-22823-01
Chapter 2
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You can add up to 256 user accounts. Changes to user accounts do not take effect until the user logs in and creates a new session. Do not use the following words in user accounts. These words are reserved for other purposes.
adm bin daemon ftp ftpuser games gdm gopher haltlp mail mailnull man mtsuser news nobody nscd operator rpc rpcuser shutdown sync sys uucp xfs
A user account can have up to 64 roles, but must have at least one role. For more information about roles, see the Role section on page 2-1. If you do not specify a password, the user might not be able to log in. For information about using SSH public keys instead of passwords, see the Configuring a User Account with a Public Key section on page 7-5.
SUMMARY STEPS
1. 2 3 4 5
config t show role username user-name [password [0 | 5]password] [expire date] [role role-name] show user-account user-name copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
(Optional) Displays the available roles that can be assigned to users. You can create a new user role with the Creating a Role procedure on page 2-8)
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
2-7
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 3
username name [password [0 | 5] password] [expire date] [role role-name] Example: n1000v(config)# username NewUser password 4Ty18Rnt
name: A case-sensitive, alphanumeric character string of up to 28 characters in length. password: The default password is undefined.
0 = (the default) Specifies that the password
you are entering is in clear text. The Cisco Nexus 1000V encrypts the clear text password before saving it in the running configuration. In the example shown, the password 4Ty18Rnt is encrypted in your running configuration in password 5 format.
5 = Specifies that the password you are
entering is already in encrypted format. The Cisco Nexus 1000V does not encrypt the password before saving it in the running configuration. User passwords are not displayed in the configuration files.
expire date: YYYY-MM-DD. The default is no expiration date. role: You must assign at least one role. You can assign up to 64 roles. The default role is network-operator.
Step 4
show user-account username Example: n1000v(config)# show user-account NewUser user:NewUser this user account has no expiry date roles:network-operator network-admin n1000v(config)#
Step 5
(Optional) Saves the running configuration persistently through reboots and restarts by copying Example: it to the startup configuration. n1000v# copy running-config startup-config
copy running-config startup-config
Creating a Role
Use this procedure to create a role defining a set of specific actions that are permitted or denied. This role will be assigned to users whose access requirements match the actions defined.
You are logged in to the CLI in EXEC mode. You can configure up to 64 user roles.
2-8
OL-22823-01
Chapter 2
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You can configure up to up to 256 rules for each role. You can assign a single role to more that one user. The rule number specifies the order in which it is applied, in descending order. For example, if a role has three rules, rule 3 is applied first, rule 2 is applied next, and rule 1 is applied last. By default, the user roles that you create allow access only to the show, exit, end, and configure terminal commands. You must add rules to allow users to configure features.
SUMMARY STEPS
1. 2 3 4
config t role name role-name (Optional) description string rule number {deny | permit} command command-string rule number {deny | permit} {read | read-write} rule number {deny | permit} {read | read-write} feature feature-name rule number {deny | permit} {read | read-write} feature-group group-name Repeat Step 4 to create all needed rules for this role. show role copy running-config startup-config
5 6 7
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Names a user role and places you in Role Configuration mode for that role. The name is a case-sensitive, alphanumeric string of up to 16 characters. (Optional) Configures the role description, which can include spaces.
Step 3
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
2-9
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 4
rule number {deny | permit} command command-string Example: n1000v(config-role)# rule 1 deny command clear users
Purpose Creates a rule to permit or deny a specific command. The command you specify can contain spaces and regular expressions. For example, interface ethernet * permits/denies access to all Ethernet interfaces. This example rule denies access to the clear users command.
rule number {deny | permit} {read | read-write} Example: n1000v(config-role)# rule 2 deny read-write rule number {deny | permit} {read | read-write} feature feature-name Example: n1000v(config-role)# rule 3 permit read feature eth-port-sec rule number {deny | permit} {read | read-write} feature-group group-name Example: n1000v(config-role)# rule 4 deny read-write feature-group eth-port-sec
Creates a blanket rule to permit or deny all operations. This example rule permits read-only access for any operation. Creates a rule for feature access. Use the show role feature command to display a list of available features. This example rule permits users read-only access to the Ethernet port security feature. Creates a rule for feature group access. Use the show role feature-group command to display a list of feature groups. This example configures a rule denying access to a feature group. (Optional) Displays the user role configuration.
Step 5 Step 6
Repeat Step 4 to create all needed rules for the specified role.
show role Example: n1000v(config)# show role
Step 7
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
You are logged in to the CLI in EXEC mode. You can create up to 64 custom feature groups.
2-10
OL-22823-01
Chapter 2
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
SUMMARY STEPS
1. 2 3 4 5 6 7
config t role feature-group name group-name show role feature feature feature-name Repeat 4 for all features to be added to the feature group. show role feature-group copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
role feature-group name group-name Example: n1000v(config)# role feature-group name GroupA n1000v(config-role-featuregrp)#
Places you into the Role Feature Group Configuration mode for the named group.
Step 3
show role feature Example: n1000v(config-role-featuregrp)# show role feature feature: aaa feature: access-list feature: cdp feature: install . . . n1000v(config-role-featuregrp)#
Displays a list of available features for use in defining the feature group.
Step 4
Step 5
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
2-11
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 6
show role feature-group Example: n1000v(config-role-featuregrp)# show role feature-group feature group: GroupA feature: syslog feature: snmp feature: ping n1000v(config-role-featuregrp)#
Step 7
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
You are logged in to the CLI in EXEC mode. You have already created one or more user roles using the Creating a Role procedure on page 2-8. In this procedure, you will be modifying a role you have already created. By default, a role allows access to all interfaces. In this procedure you will, first, deny access to all interfaces and then permit access to selected interfaces.
SUMMARY STEPS
1. 2 3 4 5 6
config t role name role-name interface policy deny permit interface interface-list show role copy running-config startup-config
2-12
OL-22823-01
Chapter 2
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Specifies a user role and enters Role Configuration mode for the named role.
Step 3
Enters the Interface Configuration mode, and denies all interface access for the role. Access to any interface must now be explicitly defined for this role using the permit interface command. Specifies the interface(s) that users assigned to this role can access. Repeat this command to specify all interface lists that users assigned to this role are permitted to access. (Optional) Displays the role configuration.
Step 4
Step 5
show role role-name Example: n1000v(config-role-interface)# show role name network-observer role: network-observer description: temp Vlan policy: permit (default) Interface policy: deny Permitted interfaces: Ethernet2/1-4
Step 6
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
You are logged in to the CLI in EXEC mode. You have already created one or more user roles using the Creating a Role procedure on page 2-8. In this procedure, you will be modifying a role you have already created.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
2-13
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
By default, access is allowed to all VLANs. In this procedure you will, first, deny access to all VLANs and then permit access to selected VLANs.
SUMMARY STEPS
1. 2 3 4 5 6 7
config t role name role-name vlan policy deny permit vlan vlan-range exit show role copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Step 3
Enters the VLAN Configuration mode, and denies all VLAN access for the role. Access to any VLAN must now be explicitly defined for this role using the permit vlan command. Specifies the VLAN(s) that users assigned to this role can access. Repeat this command to specify all VLANs that users assigned to this role are permitted to access.
Step 4
permit vlan
vlan-list
2-14
OL-22823-01
Chapter 2
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 5
show role role-name Example: n1000v(config-role)# show role network-observer role: network-observer description: temp Vlan policy: deny Permitted vlans: vlan 1-4 Interface policy: deny Permitted interfaces: Ethernet2/1-4
Step 6
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
show user-account
Example Configuration
The following example shows how to configure a role:
role name UserA rule 3 permit read feature snmp rule 2 permit read feature dot1x rule 1 deny command clear *
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
2-15
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Additional References
For additional information related to implementing RBAC, see the following sections:
Related Documents, page 2-16 Standards, page 2-16 MIBs, page 2-16
Related Documents
Related Topic User access commands Managing users on the switch Document Title Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4) Cisco Nexus 1000V Getting Started Guide, Release 4.2(1)SV1(4)
Standards
Standards Title No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
MIBs
MIBs
MIBs Link To locate and download MIBs, go to the following URL: http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml
CISCO-COMMON-MGMT-MIB
2-16
OL-22823-01
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
CH A P T E R
Configuring VSD
This chapter describes how to configure VSD and includes the following topics:
Information About Virtual Service Domain, page 3-1 Guidelines and Limitations, page 3-3 Default Settings, page 3-3 Configuring VSD, page 3-4 Verifying the Configuration, page 3-8 Configuration Example, page 3-10 Additional References, page 3-10 Feature History, page 3-11
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
3-1
Configuring VSD
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
There is no source MAC learning on these interfaces. Each SVM creates a secure VSD. Interfaces within the VSD are shielded by the SVM.
Port Profiles
A VSD is the collection of interfaces that are guarded by the SVM providing the security service. Any traffic coming into the VSD or going out of the VSD has to go through the SVM. Traffic that both originates and terminates within the same VSD need not be routed through the SVM as it is considered to be safe. A VSD is formed by creating the following port profiles: Port Profile Inside Description Traffic originating from a VSD member goes into the service VM (SVM) through the inside port and comes out of the outside port before it is forwarded to its destination. Traffic destined for a VSD member goes into the SVM through the outside port and comes out of the inside port before it is forwarded to its destination. Location for individual inside VMs.
Outside Member
In Figure 3-1, a single VEM takes the place of vswitches; the SVMs define the following VSDs; VSD DB VSD Web VSD Internet VSD Default SVM (guard) SVM_db SVM_web SVM_Internet Inside Port Profile SVM_db_inside SVM_web_inside SVM_internet_inside SVM VSD Outside Port Profile SVM_db_outside SVM_web_outside SVM_internet_outside vEth Email Member Port Profile(s) vEth_db1 vEth_db2 vEth_web
3-2
OL-22823-01
Chapter 3
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Figure 3-1 Virtual Service Domain (VSD) Example
Veth_web WEB
Veth_email Email
SVM_web
SVM_db
SVM_internet
To prevent traffic latency, VSD should only be used for securing traffic. Up to 6 VSDs can be configured per host and up to 64 on the VSM. Up to 214 interfaces per VSD are supported on a single host, and 2048 interfaces on the VSM. Vmotion is not supported for the SVM and should be disabled. To avoid network loops following a VSM reload or a network disruption, control and packet VLANS must be disabled in all port profiles of the Service VMs. If a port profile without a service port is configured on an SVM, it will flood the network with packets. When configuring a port profile on an SVM, first bring the SVM down, This prevents a port-profile that is mistakenly configured without a service port from flooding the network with packets. The SVM can be returned to service after the configuration is complete and verified. VShield 4.1 does not support VSD. VSD feature will not function as expected if used with VShield 4.1.
Default Settings
The following table lists the Telnet defaults. Parameters service-port default-action switchport trunk allowed vlan Default Forward. All
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
196145
pNic Internet
3-3
Configuring VSD
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Configuring VSD
This section includes the following procedures:
Configuring an Inside or Outside VSD Port Profile, page 3-4 Configuring a Member VSD Port Profile, page 3-7
You are logged in to the CLI in EXEC mode. You have taken the SVM out of service to prevent any configuration errors from flooding the network. Once the configuration is complete and verified, you can bring the SVM back into service. If you do not configure a service-port, the SVM will come up as a regular VM, flooding the network with packets. Selected VLAN filtering is not supported in this configuration. The default should be used instead, which allows all VLANs on the port.
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7. 8. 9.
config t port-profile name switchport mode trunk switchport trunk allowed vlan vlanID virtual-service-domain name no shut vmware port-group pg-name service-port {inside | outside} [default-action {drop | forward}] state enabled
3-4
OL-22823-01
Chapter 3
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t
Example: n1000v# config t n1000v(config)#
Step 2
port-profile name
Example: n1000v(config)# port-profile webserver-inside n1000v(config-port-profile)#
Creates a port profile and places you into Port Profile Configuration mode for the named port profile. The port profile name can be up to 80 characters and must be unique for each port profile on the Cisco Nexus 1000V. Designates that the interfaces are switch trunk ports.
Step 3
Step 4
Step 5
virtual-service-domain name
Example: n1000v(config-port-profile)# virtual-service-domain vsd1-webserver n1000v(config-port-profile)#
Step 6
no shutdown
Example: n1000v(config-port-prof)# no shutdown n1000v(config-port-prof)#
Step 7
Designates the port-profile as a VMware port-group. The port profile is mapped to a VMware port group of the same name. When a vCenter Server connection is established, the port group created in Cisco Nexus 1000V is then distributed to the virtual switch on the vCenter Server. name: Port group name. If you do not specify a pg-name, then the port group name will be the same as the port profile name. If you want to map the port profile to a different port group name, use the pg-name option followed by the alternate name.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
3-5
Configuring VSD
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 8
Purpose Configures the interface as either inside or outside and designates (default-action) whether packets should be forwarded or dropped if the service port is down. If you do not specify a default-action, then the forward setting is used by default.
Caution
If you do not configure a service-port, the SVM will come up as a regular VM, flooding the network with packets.
Example: n1000v(config-port-prof)# service-port inside default-action forward n1000v(config-port-prof)# Example: n1000v(config-port-prof)# service-port outside default-action forward n1000v(config-port-prof)#
This example configures an inside VSD that forwards packets if the service port is down. This example configures an outside VSD that forwards packets if the service port is down.
Step 9
state enabled
Example: n1000v(config-port-prof)# state enabled n1000v(config-port-prof)#
Enables the VSD port profile. The configuration for this port profile is applied to the assigned ports, and the port group is created in the VMware vSwitch on the vCenter Server. (Optional) Displays the configuration for this VSD port profile. Use this to verify that the port-profile was configured as expected.
Step 10
Step 11
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
3-6
OL-22823-01
Chapter 3
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You are logged in to the CLI in EXEC mode. Do not configure a member VSD port profile on an SVM. A member VSD port profile does not have a service port, and will flood the network with packets if configured on an SVM.
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7. 8. 9.
config t port-profile name switchport access vlan vlanID switchport trunk allowed vlan vlanID virtual-service-domain name no shut state enabled show virtual-service-domain name copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t
Example: n1000v# config t n1000v(config)#
Step 1
port-profile name
Example: n1000v(config)# port-profile vsd1-member n1000v(config-port-profile)#
Creates a port profile and places you into Port Profile Configuration mode for the named port profile. The port profile name can be up to 80 characters and must be unique for each port profile on the Cisco Nexus 1000V. Assigns a VLAN ID to the access port for this port profile.
Step 2
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
3-7
Configuring VSD
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 3
virtual-service-domain name
Example: n1000v(config-port-profile)# virtual-service-domain vsd1-webserver n1000v(config-port-profile)#
Step 4
no shutdown
Example: n1000v(config-port-prof)# no shutdown n1000v(config-port-prof)#
Step 5
state enabled
Example: n1000v(config-port-prof)# state enabled n1000v(config-port-prof)#
Enables the VSD port profile. The configuration for this port profile is applied to the assigned ports, and the port group is created in the VMware vSwitch on the vCenter Server. (Optional) Displays the configuration for this VSD port profile. Use this to verify that the port-profile was configured as expected.
Step 6
Step 7
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
3-8
OL-22823-01
Chapter 3
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command show virtual-service-domain interface module vem module_number execute vemcmd show vsd Purpose Displays the interface configuration for all VSDs. See Example 3-3 on page 3-9. Displays the VEM VSD configuration by sending the command to the VEM from the remote Cisco Nexus 1000V. See Example 3-4 on page 3-10. module vem module_number execute vemcmd show vsd ports Displays the VEM VSD ports configuration by sending the command to the VEM from the remote Cisco Nexus 1000V. See Example 3-5 on page 3-10. For detailed information about command output for these commands, see the Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4).
Example 3-1 show virtual-service-domain name vsd_name
n1000v## show virtual-service-domain name vsd1 Default Action: drop ___________________________ Interface Type ___________________________ Vethernet1 Member Vethernet2 Member Vethernet3 Member Vethernet6 Member Vethernet7 Inside Vethernet8 Outside n1000v#
Example 3-2
n1000v# show virtual-service-domain brief Name vsd-id default action in-ports zone 1 n1000v# forward 1
out-ports 1
mem-ports 2
Example 3-3
n1000v# sho virtual-service-domain interface _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Name Interface Type Status _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ vsd1 Vethernet1 Member Active vsd1 Vethernet2 Member Active vsd1 Vethernet3 Member Active vsd1 Vethernet6 Member Active vsd1 Vethernet7 Inside Active vsd1 Vethernet8 Outside Active vsd2 Vethernet9 Inside Active vsd2 Vethernet10 Outside Active
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
3-9
Configuring VSD
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Example 3-4 module module_number execute vemcmd show vsd
n1000v# module vem 4 execute vemcmd show vsd ID Def_Act ILTL OLTL NMLTL State Member LTLs 1 FRWD 51 50 1 ENA 49 n1000v#
Example 3-5
n1000v# module vem 4 execute vemcmd show vsd ports LTL IfIndex VSD_ID VSD_PORT_TYPE 49 1c000010 1 REGULAR 50 1c000040 1 OUTSIDE 51 1c000030 1 INSIDE n1000v#
Configuration Example
The following example shows how to configure VSD.
port-profile vsd1_member vmware port-group switchport access vlan 315 virtual-service-domain vsd1 no shutdown state enabled port-profile svm_vsd1_in vmware port-group switchport mode trunk switchport trunk allowed vlan 310-319 virtual-service-domain vsd1 service-port inside default-action drop no shutdown state enabled port-profile svm_vsd1_out vmware port-group switchport mode trunk switchport trunk allowed vlan 310-319 virtual-service-domain vsd1 service-port outside default-action drop no shutdown
Additional References
For additional information related to VSD configuration, see the following:
3-10
OL-22823-01
Chapter 3
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Related Documents
Related Topic Port Profiles CLI Document Title Cisco Nexus 1000V Port Profile Configuration Guide, Release 4.2(1)SV1(4) Cisco Nexus 1000V Getting Started Guide, Release 4.2(1)SV1(4) Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4)
Standards
Standards Title No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
Feature History
This section provides the VSD release history. Feature Name VSD Releases Feature Information
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
3-11
Configuring VSD
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
3-12
OL-22823-01
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
CH A P T E R
Configuring AAA
This chapter describes how to configure authentication, authorization, and accounting (AAA) and includes the following sections:
Information About AAA, page 4-1 Prerequisites for AAA, page 4-4 AAA Guidelines and Limitations, page 4-4 Default Settings, page 4-4 Configuring AAA, page 4-4 Verifying AAA Configuration, page 4-8 Example AAA Configuration, page 4-9 Additional References, page 4-9 Feature History for AAA, page 4-10
AAA Security Services, page 4-1 AAA Server Groups, page 4-4
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
4-1
Configuring AAA
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Separate AAA configurations are made for the following services:
User Telnet or Secure Shell (SSH) login authentication Console login authentication User management session accounting
Table 4-1 shows the related CLI command for configuring an AAA service.
.
Table 4-1
AAA Service Configuration Option Telnet or SSH login Console login AAA secures the following:
Related Command aaa authentication login default aaa authentication login console
Authentication
Authentication identifies users with a login and password, messaging, and encryption. Authentication is accomplished as follows: Authentication Method Local database Description Authenticates the following with a local lookup database of user names or passwords.
Console login authentication User login authentication User management session accounting
Authenticates the following using a remote server lookup database of user names and passwords.
Console login authentication User login authentication User management session accounting Console login authentication User login authentication User management session accounting
None
4-2
OL-22823-01
Chapter 4
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Figure 4-1 Authenticating User Log In
Start
No
Yes Was a server found? No Local username and password database lookup
Yes
No
End-Access denied
Authorization
Authorization restricts the actions that a user is allowed to perform.
Accounting
Accounting tracks and maintains a log of every SVS management session. You can use this information to generate reports for troubleshooting and auditing purposes. You can store accounting logs locally or send them to remote AAA servers.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
4-3
Configuring AAA
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
At least one TACACS+ or RADIUS server is IP reachable The VSM is configured as an AAA server client. A shared secret key is configured on the VSM and the remote AAA server. See the Configuring Shared Keys procedure on page 6-9.
Default Settings
The following table lists the AAA defaults. Parameters Console authentication method Default authentication method Login authentication failure messages Default local local Disabled
Configuring AAA
This section includes the following topics:
Configuring a Login Authentication Method, page 4-6 Enabling Login Authentication Failure Messages, page 4-7
4-4
OL-22823-01
Chapter 4
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Use the following flow chart to configure AAA.
Flow Chart: Configuring AAA
Configuring AAA
Yes
No
Yes
End
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
4-5
Configuring AAA
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You are logged in to the CLI in EXEC mode. If authentication is to be done with TACACS+ server group(s), you have already added the group(s). For more information, see Configuring a TACACS+ Server Group, page 6-12.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t aaa authentication login {console | default} {group group-list [none] | local | none} exit show aaa authentication copy running-config start-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
aaa authentication login {console | default} {group group-list [none]| local | none} Example: n1000v(config)# aaa authentication login console group tacgroup
local: The local database is used for authentication. Local is the default and is used when no methods are configured or when all the configured methods fail to respond. none: Authentication is done by username.
Step 3
exit Example: n1000v(config)# exit n1000v#
Exits the CLI Global Configuration mode and returns you to EXEC mode.
4-6
OL-22823-01
Chapter 4
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 4
show aaa authentication Example: n1000v# show aaa authentication default: group tacgroup console: group tacgroup n1000v#
Step 5
You are logged in to the CLI in EXEC mode. The following is the Login Authentication Failure message:
Remote AAA servers unreachable; local authentication done. Remote AAA servers unreachable; local authentication failed.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t aaa authentication login error-enable exit show aaa authentication login error-enable copy running-config start-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
aaa authentication login error-enable Example: n1000v(config)# aaa authentication login error-enable n1000v(config)#
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
4-7
Configuring AAA
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 3
exit Example: n1000v(config)# exit n1000v#
Purpose Exits CLI Global Configuration mode and returns you to EXEC mode.
Step 4
show aaa authentication login error-enable Example: n1000v# show aaa authentication login error-enable enabled n1000v#
Step 5
Example 4-1
Example 4-2
n1000v# show running-config aaa all version 4.0(1) aaa authentication login default local aaa accounting default local no aaa authentication login error-enable no aaa authentication login mschap enable no radius-server directed-request no snmp-server enable traps aaa server-state-change
4-8
OL-22823-01
Chapter 4
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
no tacacs-server directed-request n1000v#
Example 4-3
Additional References
For additional information related to implementing AAA, see the following sections:
Related Documents
Related Topic System Management CLI TACACS+ Security protocol Document Title Cisco Nexus 1000V System Management Configuration Guide, Release 4.2(1)SV1(4) Cisco Nexus 1000V Getting Started Guide, Release 4.2(1)SV1(4) Chapter 6, Configuring TACACS+
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
4-9
Configuring AAA
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
4-10
OL-22823-01
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
CH A P T E R
Configuring RADIUS
This chapter describes how to configure RADIUS protocol on Cisco NX-OS devices. This chapter includes the following sections:
Information About RADIUS, page 5-1 Prerequisites for RADIUS, page 5-4 Guidelines and Limitations, page 5-4 Default Settings, page 5-5 Configuring RADIUS Servers, page 5-5 Verifying RADIUS Configuration, page 5-22 Displaying RADIUS Server Statistics, page 5-22 Example RADIUS Configuration, page 5-22 Additional References, page 5-22 Feature History for RADIUS, page 5-23
RADIUS Network Environments, page 5-1 RADIUS Operation, page 5-2 Vendor-Specific Attributes, page 5-3
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
5-1
Configuring RADIUS
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You can use RADIUS in the following network environments that require access security:
Networks with multiple-vendor network devices, each supporting RADIUS. For example, network devices from several vendors can use a single RADIUS server-based security database. Networks already using RADIUS. You can add a Cisco NX-OS device with RADIUS to the network. This action might be the first step when you make a transition to a AAA server. Networks that require resource accounting. You can use RADIUS accounting independent of RADIUS authentication or authorization. The RADIUS accounting functions allow data to be sent at the start and end of services, indicating the amount of resources (such as time, packets, bytes, and so on) used during the session. An Internet service provider (ISP) might use a freeware-based version of the RADIUS access control and accounting software to meet special security and billing needs. Networks that support authentication profiles. Using the RADIUS server in your network, you can configure AAA authentication and set up per-user profiles. Per-user profiles enable the NX-OS device to better manage ports using their existing RADIUS solutions and to efficiently manage shared resources to offer different service-level agreements.
RADIUS Operation
When a user attempts to log in to the and authenticate to an NX-OS device using RADIUS, the following happens:
1. 2. 3.
The user is prompted for and enters a username and password. The username and encrypted password are sent over the network to the RADIUS server. The user receives one of the following responses from the RADIUS server:
ACCEPTThe user is authenticated. REJECTThe user is not authenticated and is prompted to reenter the username and password,
or access is denied.
CHALLENGEA challenge is issued by the RADIUS server. The challenge collects additional
a new password. The ACCEPT or REJECT response is bundled with additional data that is used for EXEC or network authorization. You must first complete RADIUS authentication before using RADIUS authorization. The additional data included with the ACCEPT or REJECT packets consists of the following:
Services that the user can access, including Telnet, rlogin, or local-area transport (LAT) connections, and Point-to-Point Protocol (PPP), Serial Line Internet Protocol (SLIP), or EXEC services. Connection parameters, including the host or client IPv4 address, access list, and user timeouts.
5-2
OL-22823-01
Chapter 5
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
sent its way. Whenever a RADIUS server changes to the dead or alive state, a Simple Network Management Protocol (SNMP) trap is generated and an error message is displayed indicating that a failure is taking place. See Figure 5-1.
Figure 5-1 RADIUS Server States
Application request
Alive
Test
Test
Note
The monitoring interval for alive servers and dead servers are different and can be configured by the user. The RADIUS server monitoring is performed by sending a test authentication request to the RADIUS server.
Vendor-Specific Attributes
The Internet Engineering Task Force (IETF) draft standard specifies a method for communicating VSAs between the network access server and the RADIUS server. The IETF uses attribute 26. VSAs allow vendors to support their own extended attributes that are not suitable for general use. The Cisco RADIUS implementation supports one vendor-specific option using the format recommended in the specification. The Cisco vendor ID is 9, and the supported option is vendor type 1, which is named cisco-av-pair. The value is a string with the following format:
protocol : attribute separator value *
The protocol is a Cisco attribute for a particular type of authorization, separator is = (equal sign) for mandatory attributes, and * (asterisk) indicates optional attributes. When you use RADIUS servers for authentication, the RADIUS protocol directs the RADIUS server to return user attributes, such as authorization information, along with authentication results. This authorization information is specified through VSAs. The following are supported VSA protocol options:
ShellProtocol used in access-accept packets to provide user profile information. AccountingProtocol used in accounting-request packets. If a value contains any white spaces, you should enclose the value within double quotation marks.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
5-3
154534
Configuring RADIUS
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
The following are supported attributes:
rolesLists all the roles to which the user belongs. The value field is a string that lists the role names delimited by white space. For example, if the user belongs to roles network-operator and vdc-admin, the value field would be network-operator vdc-admin. This attribute, which the RADIUS server sends in the VSA portion of the Access-Accept frames, can only be used with the shell protocol value. The following examples show the roles attribute as supported by Cisco ACS:
shell:roles=network-operator vdc-admin shell:roles*network-operator vdc-admin
If you are using Cisco ACS and intend to use the same ACS group for both Cisco Nexus 1000V and Cisco UCS authentication, use the following roles attribute:
cisco-av-pair*shell:roles="network-admin admin"
Note
When you specify a VSA as shell:roles*"network-operator vdc-admin" or "shell:roles*\"network-operator vdc-admin\"", this VSA is flagged as an optional attribute and other Cisco devices ignore this attribute. accountinginfoStores accounting information in addition to the attributes covered by a standard RADIUS accounting protocol. This attribute is sent only in the VSA portion of the Account-Request frames from the RADIUS client on the switch. It can be used only with the accounting protocol data units (PDUs).
You already know the RADIUS server IP addresses or hostnames. You already know the key(s) used to secure RADIUS communication in your network. The device is already configured as a RADIUS client of the AAA servers.
5-4
OL-22823-01
Chapter 5
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Default Settings
Table 5-1 lists the RADIUS default settings.
Table 5-1 Default RADIUS Parameters
Parameters Server roles Dead timer interval Retransmission count Retransmission timer interval Idle timer interval Periodic server monitoring username Periodic server monitoring password
Configuring RADIUS Server Hosts, page 5-6 Configuring the Global RADIUS Key, page 5-7 Configuring a RADIUS Server Key, page 5-8 Configuring RADIUS Server Groups, page 5-9 Enabling RADIUS Server Directed Requests, page 5-10 Setting the Global Timeout for All RADIUS Servers, page 5-12 Configuring a Global Retry Count for All RADIUS Servers, page 5-13 Setting the Timeout Interval for a Single RADIUS Server, page 5-14 Configuring Retries for a Single RADIUS Server, page 5-15 Configuring a RADIUS Accounting Server, page 5-16 Configuring a RADIUS Authentication Server, page 5-17 Configuring Periodic RADIUS Server Monitoring, page 5-18 Configuring the Global Dead-Time Interval, page 5-20 Manually Monitoring RADIUS Servers or Groups, page 5-21
Note
Be aware that the Cisco NX-OS commands for this feature may differ from those used in Cisco IOS.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
5-5
Configuring RADIUS
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You are logged in to the CLI in EXEC mode. You can configure up to 64 RADIUS servers. All RADIUS server hosts are automatically added to the default RADIUS server group.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t radius-server host {ipv4-address | host-name} exit show radius-server copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Step 3
Step 4
Step 5
(Optional) Saves this change in the running configuration to the startup configuration.
5-6
OL-22823-01
Chapter 5
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You are logged in to the CLI in EXEC mode. You know the global key that is used for RADIUS server authentication.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t radius-server key [0 | 7] key-value exit show radius-server copy running-config startup-config
DETAILED STEPS
To configure a global preshared key, follow these steps: Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Specifies a preshared key for all RADIUS servers. You can specify a clear text (0) or encrypted (7) preshared key. The default format is clear text. The maximum length is 63 characters. By default, no preshared key is configured. Returns you to the CLI EXEC mode.
Step 3
Step 4
The preshared keys are saved in encrypted form in the running configuration. Use the show running-config command to display the encrypted preshared keys.
Step 5
(Optional) Saves this change in the running configuration to the startup configuration.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
5-7
Configuring RADIUS
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You are logged in to the CLI in EXEC mode. You have the key to be used for the remote RADIUS host.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t radius-server host {ipv4-address | host-name} key key-value exit show radius-server copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
radius-server host {ipv4-address | host-name} key [0 | 7] key-value Example: n1000v(config)# radius-server host 10.10.1.1 key 0 PlIjUhYg
Specifies a preshared key for a specific RADIUS server. You can specify a clear text (0) or encrypted (7) preshared key. The default format is clear text. The maximum length is 63 characters. This preshared key is used instead of the global preshared key. Returns you to the CLI EXEC mode.
Step 3
Step 4
The preshared keys are saved in encrypted form in the running configuration. Use the show running-config command to display the encrypted preshared keys.
Step 5
(Optional) Saves this change in the running configuration to the startup configuration.
5-8
OL-22823-01
Chapter 5
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You are logged in to the CLI in EXEC mode. All servers in a RADIUS server group must belong to the RADIUS protocol. The servers in the group are tried in the same order in which you configure them.
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7. 8.
config t aaa group server radius group-name server {ipv4-address | server-name} deadtime minutes use-vrf vrf-name (Optional) source-interface {interface-type} {interface-number} (Optional) show radius-server groups [group-name] (Optional) copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
aaa group server radius group-name Example: n1000v(config)# aaa group server radius RadServer n1000v(config-radius)#
Creates a RADIUS server group and enters the RADIUS server group configuration mode for that group. The group-name argument is a case-sensitive alphanumeric string with a maximum length of 127 characters. Configures the RADIUS server as a member of the RADIUS server group.
Tip
Step 3
If the specified RADIUS server is not found, configure it using the radius-server host command and retry this command.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
5-9
Configuring RADIUS
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 4
deadtime minutes Example: n1000v(config-radius)# deadtime 30
Purpose (Optional) Configures the monitoring dead time. The default is 0 minutes. The range is from 1 through 1440.
Note
If the dead-time interval for a RADIUS server group is greater than zero (0), that value takes precedence over the global dead-time value (see the Configuring the Global Dead-Time Interval section on page 5-20).
Step 5
(Optional) Specifies the VRF to use to contact the servers in the server group. (Optional) Specifies a source interface to be used to reach the RADIUS server.
Step 6
loopback = Virtual interface number from 0 to 1023 mgmt = Management interface 0 null = Null interface 0 port-channel = Port channel number from 1 to 4096
Step 7
Example: n1000v(config-radius)# show radius-server group total number of groups:2 following RADIUS server groups are configured: group Radserver: server: 10.10.1.1 deadtime is 30 group test: deadtime is 30
Step 8
(Optional) Saves this change in the running configuration to the startup configuration.
Note
5-10
OL-22823-01
Chapter 5
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
BEFORE YOU BEGIN
Before beginning this procedure, you must know or do the following:
You are logged in to the CLI in EXEC mode. Directed requests are disabled by default.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t radius-server directed-request exit show radius-server directed-request copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Step 3
Step 4
Step 5
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
5-11
Configuring RADIUS
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You are logged in to the CLI in EXEC mode. The timeout specified in the Setting the Timeout Interval for a Single RADIUS Server procedure on page 5-14 overrides the global RADIUS timeout.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t radius-server timeout seconds exit show radius-server copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Specifies the transmission timeout interval for RADIUS servers. The default timeout interval is 5 seconds and the allowable range is from 1 to 60 seconds. Returns you to the CLI EXEC mode.
Step 3
Step 4
(Optional) Displays the RADIUS server configuration. (Optional) Saves this change in the running configuration to the startup configuration.
Step 5
5-12
OL-22823-01
Chapter 5
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You are logged in to the CLI in EXEC mode. By default, retransmission to a RADIUS server is only tried once before reverting to local authentication. You can increase the number of retries up to a maximum of five. The retry count specified for a single RADIUS server in the Configuring Retries for a Single RADIUS Server procedure on page 5-15, overrides this global setting.
SUMMARY STEPS
1. 2. 3. 4. 5. 6.
config t radius-server retransmission count radius-server timeout seconds exit show radius-server copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Defines the number of retransmits allowed before reverting to local authentication. This is a global Example: setting that applies to all RADIUS servers. The n1000v(config)# radius-server retransmit 3 default number of retransmits is 1 and the range is from 0 to 5.
radius-server retransmit count exit Example: n1000v(config)# exit n1000v#
Step 3
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
5-13
Configuring RADIUS
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 4
show radius-server Example: n1000v# show radius-server
Purpose (Optional) Displays the RADIUS server configuration. (Optional) Saves this change in the running configuration to the startup configuration.
Step 5
You are logged in to the CLI in EXEC mode. The timeout specified for a single RADIUS server overrides the timeout defined in the Setting the Global Timeout for All RADIUS Servers procedure on page 5-12.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t radius-server host {ipv4-address | host-name} timeout seconds exit show radius-server copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
radius-server host {ipv4-address | host-name} timeout seconds Example: n1000v(config)# radius-server host server1 timeout 10
Specifies the timeout interval for the specified server. The default timeout interval is 5 seconds and the allowable range is from 1 to 60 seconds.
Note
The timeout specified for a single RADIUS server overrides the global RADIUS timeout.
5-14
OL-22823-01
Chapter 5
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 3
exit Example: n1000v(config)# exit n1000v#
Step 4
(Optional) Displays the RADIUS server configuration. (Optional) Saves this change in the running configuration to the startup configuration.
Step 5
You are logged in to the CLI in EXEC mode. By default, retransmission to a RADIUS server is only tried once before reverting to local authentication. You can increase the number of retries up to a maximum of five. The retry count specified for a single RADIUS server overrides the global setting made for all RADIUS servers.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t radius-server host {ipv4-address | host-name} retransmit count exit show radius-server copy running-config startup-config
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
5-15
Configuring RADIUS
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
radius-server host {ipv4-address | host-name} retransmit count Example: n1000v(config)# radius-server host server1 retransmit 3
Specifies the retransmission count for a specific server. The default is the global value.
Note
This retransmit count for a single RADIUS server overrides the global setting for all RADIUS servers.
Step 3
Step 4
(Optional) Displays the RADIUS server configuration. (Optional) Saves this change in the running configuration to the startup configuration.
Step 5
You are logged in to the CLI in EXEC mode. By default, RADIUS servers are used for both accounting and authentication. You know the destination UDP port number for RADIUS accounting messages.
SUMMARY STEPS
1. 2. 3. 4. 5. 6.
config t radius-server host {ipv4-address | host-name} acct-port udp-port radius-server host {ipv4-address | host-name} accounting exit show radius-server copy running-config startup-config
5-16
OL-22823-01
Chapter 5
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
To configure the authentication and accounting attributes for RADIUS servers, follow these steps: Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
radius-server host {ipv4-address | host-name} acct-port udp-port Example: n1000v(config)# radius-server host 10.10.1.1 acct-port 2004
(Optional) Associates a specific host with the UDP port that receives RADIUS accounting messages. The default UDP port is 1812. The range is from 0 to 65535. (Optional) Designates the specific RADIUS host as an accounting server. The default is both accounting and authentication.
Step 3
radius-server host {ipv4-address | host-name} accounting Example: n1000v(config)# radius-server host 10.10.1.1 accounting
Step 4
Step 5
(Optional) Displays the RADIUS server configuration. (Optional) Saves this change in the running configuration to the startup configuration.
Step 6
You are logged in to the CLI in EXEC mode. By default, RADIUS servers are used for both accounting and authentication. You know the destination UDP port number for RADIUS authentication messages.
SUMMARY STEPS
1. 2. 3.
config t radius-server host {ipv4-address | host-name} auth-port udp-port radius-server host {ipv4-address | host-name} authentication
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
5-17
Configuring RADIUS
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
4. 5. 6.
DETAILED STEPS
To configure the authentication and accounting attributes for RADIUS servers, follow these steps: Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
radius-server host {ipv4-address | host-name} auth-port udp-port Example: n1000v(config)# radius-server host 10.10.2.2 auth-port 2005
(Optional) Associates a specific host with the UDP port that receives RADIUS authentication messages. The default UDP port is 1812. The range is from 0 to 65535. (Optional) Designates the specific RADIUS host as an authentication server. The default is both accounting and authentication.
Step 3
radius-server host {ipv4-address | host-name} authentication Example: n1000v(config)# radius-server host 10.10.2.2 authentication
Step 4
Step 5
(Optional) Displays the RADIUS server configuration. (Optional) Saves this change in the running configuration to the startup configuration.
Step 6
You are logged in to the CLI in EXEC mode. The test idle timer specifies the interval of time that elapses before a test packet is sent to a nonresponsive RADIUS server.
5-18
OL-22823-01
Chapter 5
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Note
For security reasons, do not configure a username that is in the RADIUS database as a test username.
Note
The default idle timer value is 0 minutes. When the idle time interval is 0 minutes, the NX-OS device does not perform periodic RADIUS server monitoring.
SUMMARY STEPS
1. 2. 3. 4. 5. 6.
config t radius-server host {ipv4-address | host-name} test {idle-time minutes | password password [idle-time minutes] | username name [password password [idle-time minutes]]} radius-server dead-time minutes exit show radius-server copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
radius-server host {ipv4-address | host-name} test {idle-time minutes | password password [idle-time minutes] | username name [password password [idle-time minutes]]} Example: n1000v(config)# radius-server host 10.10.1.1 test username user1 password Ur2Gd2BH idle-time 3
Specifies parameters for server monitoring. The default username is test and the default password is test. The default value for the idle timer is 0 minutes. The valid range is 0 to 1440 minutes.
Note
For periodic RADIUS server monitoring, you must set the idle timer to a value greater than 0.
Step 3
Specifies the number of minutes to wait before sending a test packet to a RADIUS server that was declared dead. The default value is 0 minutes. The valid range is 1 to 1440 minutes. Returns you to the CLI EXEC mode.
Step 4
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
5-19
Configuring RADIUS
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 5
show radius-server Example: n1000v# show radius-server
Purpose (Optional) Displays the RADIUS server configuration. (Optional) Saves this change in the running configuration to the startup configuration.
Step 6
Note
When the dead-time interval is 0 minutes, RADIUS servers are not marked as dead even if they are not responding. You can configure the dead-time interval for a RADIUS server group (see the Configuring RADIUS Server Groups section on page 5-9).
SUMMARY STEPS
1. 2. 3. 4. 5.
config t radius-server deadtime minutes exit show radius-server copy running-config startup-config
DETAILED STEPS
To configure the RADIUS dead-time interval, follow these steps: Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Configures the dead-time interval. The default value is 0 minutes. The range is from 1 to 1440 minutes.
5-20
OL-22823-01
Chapter 5
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 3
exit Example: n1000v(config)# exit n1000v#
Step 4
Step 5
(Optional) Saves this change in the running configuration to the startup configuration.
SUMMARY STEPS
1. 2.
test aaa server radius {ipv4-address | host-name} [vrf vrf-name] username password test aaa group group-name username password
DETAILED STEPS
Command
Step 1
test aaa server radius {ipv4-address | server-name} [vrf vrf-name] username password Example: n1000v# test aaa server radius 10.10.1.1 user1 Ur2Gd2BH
Step 1
test aaa group group-name username password Example: n1000v# test aaa group RadGroup user2 As3He3CI
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
5-21
Configuring RADIUS
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
show radius-server [server-name | ipv4-address] Displays all configured RADIUS server [directed-request | groups | sorted | statistics] parameters.
Additional References
For additional information related to implementing RADIUS, see the following sections:
Related Documents
Related Topic Command reference Document Title Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4)
5-22
OL-22823-01
Chapter 5
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Standards
Standards Title No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
5-23
Configuring RADIUS
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
5-24
OL-22823-01
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
CH A P T E R
Configuring TACACS+
This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol. This chapter includes the following sections:
Information About TACACS+, page 6-1 Prerequisites for TACACS+, page 6-4 Guidelines and Limitations, page 6-4 Default Settings, page 6-4 Configuring TACACS+, page 6-5 Displaying Statistics for a TACACS+ Host, page 6-22 Example TACACS+ Configuration, page 6-23 Additional References, page 6-24 Feature History for TACACS+, page 6-23
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
6-1
Configuring TACACS+
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Default TACACS+ Server Encryption Type and Preshared Key, page 6-2 TACACS+ Server Monitoring, page 6-3 Vendor-Specific Attributes, page 6-3
When a connection is established, the TACACS+ daemon is contacted to obtain the username and password.
Note
TACACS+ allows an arbitrary conversation between the daemon and the user until the daemon receives enough information to authenticate the user. This action is usually done by prompting for a username and password combination, but may include prompts for additional information, such as mothers maiden name. The TACACS+ daemon provides one of the following responses:
a. ACCEPTUser authentication succeeds and service begins. If user authorization is needed,
2.
authorization begins.
b. REJECTUser authentication failed. The TACACS+ daemon either denies further access to the
network connection. If an ERROR response is received, the device tries to use an alternative method for authenticating the user. If further authorization is required after authentication, the user also undergoes an additional authorization phase. Users must first successfully complete TACACS+ authentication before proceeding to TACACS+ authorization.
3.
If TACACS+ authorization is required, the TACACS+ daemon is contacted and it returns an ACCEPT or REJECT authorization response. An ACCEPT response contains attributes that are used to direct the EXEC or NETWORK session for that user and determines the services that the user can access. Services include the following:
Telnet, rlogin, Point-to-Point Protocol (PPP), Serial Line Internet Protocol (SLIP), or EXEC services Connection parameters, including the host or client IP address, access list, and user timeouts
6-2
OL-22823-01
Chapter 6
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Application request
Alive
Test
Test
Note
The monitoring interval for alive servers and dead servers are different and can be configured by the user. The TACACS+ server monitoring is performed by sending a test authentication request to the TACACS+ server.
Vendor-Specific Attributes
The Internet Engineering Task Force (IETF) draft standard specifies a method for communicating vendor-specific attributes (VSAs) between the network access server and the TACACS+ server. The IETF uses attribute 26. VSAs allow vendors to support their own extended attributes that are not suitable for general use.
The protocol is a Cisco attribute for a particular type of authorization, separator is = (equal sign) for mandatory attributes, and * (asterisk) indicates optional attributes.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
6-3
154534
Configuring TACACS+
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
When you use TACACS+ servers for authentication, the TACACS+ protocol directs the TACACS+ server to return user attributes, such as authorization information, along with authentication results. This authorization information is specified through VSAs. The following are supported VSA protocol options:
ShellProtocol used in access-accept packets to provide user profile information. AccountingProtocol used in accounting-request packets. If a value contains any white spaces, you should enclose the value within double quotation marks. rolesLists all the roles to which the user belongs. The value consists of a string listing the role names delimited by white space. This subattribute, which the TACACS+ server sends in the VSA portion of the Access-Accept frames, can only be used with the shell protocol value. accountinginfoStores accounting information in addition to the attributes covered by a standard TACACS+ accounting protocol. This attribute is sent only in the VSA portion of the Account-Request frames from the TACACS+ client on the switch. It can be used only with the accounting protocol data units (PDUs).
Obtain the IP addresses or hostnames for the TACACS+ servers. Obtain the preshared keys from the TACACS+ servers, if any. Ensure that the Cisco Nexus 1000V is configured as a TACACS+ client of the AAA servers. You have already configured AAA, including remote TACACS+ authentication using the following procedures:
Configuring a Login Authentication Method, page 4-6 Configuring AAA, page 4-4
You can configure a maximum of 64 TACACS+ servers. The logging level for TACACS + must be set to 5.
Default Settings
The following table lists the TACACS+ defaults. Parameters TACACS+ Dead timer interval Default Disabled 0 minutes
6-4
OL-22823-01
Chapter 6
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Parameters Timeout interval Idle timer interval Periodic server monitoring username Periodic server monitoring password Default 5 seconds 0 minutes test test
Configuring TACACS+
This section includes the following topics:
Flow Chart: Configuring TACACS+, page 6-6 Configuring a TACACS+ Server Host, page 6-11 Configuring a TACACS+ Server Host, page 6-11 Configuring Shared Keys, page 6-9 Configuring a TACACS+ Server Group, page 6-12 Enabling TACACS+ Server Directed Requests, page 6-15 Setting the TACACS+ Global Timeout Interval, page 6-16 Setting a Timeout Interval for an Individual TACACS+ Host, page 6-17 Configuring the TCP Port for a TACACS+ Host, page 6-18 Configuring Monitoring for a TACACS+ Host, page 6-20 Configuring the TACACS+ Global Dead-Time Interval, page 6-21
Note
Be aware that the Cisco Nexus 1000V commands may differ from the Cisco IOS commands.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
6-5
Configuring TACACS+
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Use the following flow chart to configure TACACS+.
Flow Chart: Configuring TACACS+
Configuring TACACS+
Configuring Server Groups? Yes Configuring a TACACS+ Server Group, page 6-12
No
6-6
OL-22823-01
Chapter 6
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Flow Chart: Configuring TACACS+ (Continued)
No
No
TACACS+ Timeout Interval? Yes Setting the TACACS+ Global Timeout Interval, page 6-16
No
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
6-7
Configuring TACACS+
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Flow Chart: Configuring TACACS+ (Continued)
No
Yes Configuring the TCP Port for a TACACS+ Host, page 6-18
No
Host Monitoring?
End
You are logged in to the CLI in EXEC mode. By default, TACACS+ is disabled. You must explicitly enable the TACACS+ feature to access the configuration and verification commands that support TACACS+ authentication.
6-8
OL-22823-01
Chapter 6
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Caution
When you disable TACACS+, all related configurations are automatically discarded.
SUMMARY STEPS
1. 2. 3. 4.
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
[no] tacacs+ enable Example: n1000v(config)# tacacs+ enable n1000v(config)# Example: n1000v(config)# no tacacs+ enable n1000v(config)#
Step 3
Exits the CLI Global Configuration mode and returns you to EXEC mode.
Step 4
The global key, or a secret text string shared between the Cisco Nexus 1000V and all TACACS+ server hosts The key, or secret text string shared between the Cisco Nexus 1000V and a single TACACS+ server host
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
6-9
Configuring TACACS+
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
BEFORE YOU BEGIN
Before beginning this procedure, you must know or do the following:
You are logged in to the CLI in EXEC mode. You have already enabled TACACS+ for authentication. See the Enabling or Disabling TACACS+ procedure on page 6-8. You know the key for the TACACS+ server host(s). By default, no global key is configured.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t tacacs-server key [0 | 7] global_key exit show tacacs-server copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Step 3
To configure a global key for all TACACS+ server hosts, continue with the next step. To configure a key for a single TACACS+ server host, go to Step 5. Designates the global key shared between the Cisco Nexus 1000V and the TACACS+ server hosts. 0: Specifies a clear text string (key) to follow. [the default] 7: Specifies an encrypted string (key) to follow. global_key: A string of up to 63 characters. By default, no global key is configured.
Step 4 Step 5
Go to Step 6.
tacacs-server host {ipv4-address | host-name} key [0 | 7] shared_key Example: n1000v(config)# tacacs-server host 10.10.1.1 key 0 PlIjUhYg n1000v(config)#
Designates the key shared between the Cisco Nexus 1000V and this specific TACACS+ server host. 0: Specifies a clear text string (key) to follow. [the default] 7: Specifies an encrypted string (key) to follow. global_key: A string of up to 63 characters. This shared key is used instead of the global shared key.
6-10
OL-22823-01
Chapter 6
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 6
exit Example: n1000v(config)# exit n1000v#
Purpose Exits the CLI Global Configuration mode and returns you to EXEC mode.
Step 7
show tacacs-server Example: n1000v# show tacacs-server Global TACACS+ shared secret:******** timeout value:5 deadtime value:0 total number of servers:1 following TACACS+ servers are configured: 10.10.2.2: available on port:49
The global shared key is saved in encrypted form in the running configuration. To display the key, use the show running-config command.
Step 8
(Optional) Copies these changes in the running configuration to the startup configuration.
You are logged in to the CLI in EXEC mode. You have already enabled TACACS+ for authentication. See the Enabling or Disabling TACACS+ procedure on page 6-8. You have already configured the shared key, using the following: Configuring Shared Keys procedure on page 6-9 You know the IP addresses or the hostnames for the remote TACACS+ server hosts. All TACACS+ server hosts are added to the default TACACS+ server group.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t tacacs-server host {ipv4-address | host-name} exit show tacacs-server copy running-config startup-config
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
6-11
Configuring TACACS+
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Step 3
Exits the CLI Global Configuration mode and returns you to EXEC mode.
Step 4
show tacacs-server Example: n1000v# show tacacs-server timeout value:5 deadtime value:0 total number of servers:1 following TACACS+ servers are configured: 10.10.2.2: available on port:49 n1000v#
Step 5
(Optional) Copies these changes in the running configuration to the startup configuration.
You are logged in to the CLI in EXEC mode. All servers added to a TACACS+ server group must use the TACACS+ protocol. Once the TACACS+ server group is configured, the server members are tried in the same order in which you configured them. You have already enabled TACACS+ for authentication. See the Enabling or Disabling TACACS+ procedure on page 6-8.
6-12
OL-22823-01
Chapter 6
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You have already configured the preshared keys, using the following: Configuring Shared Keys procedure on page 6-9 A TACACS+ server group can provide fail-over in case one server fails to respond. If the first server in the group fails, the next server in the group is tried until a server responds. Multiple server groups can provide fail-over for each other in this same way.
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7. 8.
config t aaa group server tacacs+ group-name server {ipv4-address | host-name} deadtime minutes use-vrf vrf-name (Optional) source-interface {interface-type} {interface-number} (Optional) show tacacs-server groups (Optional) copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
aaa group server tacacs+ group-name Example: n1000v(config)# aaa group server tacacs+ TacServer n1000v(config-tacacs+)#
Creates a TACACS+ server group with the specified name and places you into the TACACS+ configuration mode for that group.
Step 3
Configures the TACACS+ server host-name or IP address as a member of the TACACS+ server group.
Tip
If the specified TACACS+ server is not found, configure it using the tacacs-server host command and retry this command.
Step 4
(Optional) Configures the monitoring dead time for this TACACS+ group. The default is 0 minutes. The range is from 0 through 1440.
Note
If the dead-time interval for a TACACS+ server group is greater than zero (0), that value takes precedence over the global dead-time value (see the Configuring the TACACS+ Global Dead-Time Interval procedure on page 6-21).
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
6-13
Configuring TACACS+
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 5
use-vrf vrf-name Example: n1000v(config-tacacs+)# use-vrf management n1000v(config-tacacs+)#
Purpose (Optional) Specifies the virtual routing and forwarding instance (VRF) to use to contact this server group.
Step 6
loopback = Virtual interface number from 0 to 1023 mgmt = Management interface 0 null = Null interface 0 port-channel = Port channel number from 1 to 4096
Step 7
Example: n1000v(config-tacacs+)# show tacacs-server groups total number of groups:1 following TACACS+ server groups are configured: group TacServer: server 10.10.2.2 on port 49 deadtime is 30 vrf is management n1000v(config-tacacs+)#
Step 8
(Optional) Copies these changes made in the running configuration to the startup configuration.
Example: n1000v(config)# aaa group server tacacs+ TacServer n1000v(config-tacacs+)# server 10.10.2.2 n1000v(config-tacacs+)# deadtime 30 n1000v(config-tacacs+)# use-vrf management n1000v(config-tacacs+)# show tacacs-server groups total number of groups:1 following TACACS+ server groups are configured: group TacServer: server 10.10.2.2 on port 49 deadtime is 30 vrf is management n1000v(config-tacacs+)#
6-14
OL-22823-01
Chapter 6
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You are logged in to the CLI in EXEC mode. You have already enabled TACACS+ for authentication. See the Enabling or Disabling TACACS+ procedure on page 6-8.
Note
When directed requests are enabled, the user can log in as username@vrfname:hostname, where vrfname is the VRF to use and hostname is the name of a configured TACACS+ server.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t tacacs-server directed-request exit show tacacs-server directed-request copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Enables use of directed requests for specifying the TACACS+ server to send an authentication request to when logging in. The default is disabled.
Step 3
Exits the CLI Global Configuration mode and returns you to EXEC mode.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
6-15
Configuring TACACS+
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 4
show tacacs-server directed-request Example: n1000v# show tacacs-server directed-request enabled n1000v#
Step 5
You are logged in to the CLI in EXEC mode. You have already enabled TACACS+ for authentication. See the Enabling or Disabling TACACS+ procedure on page 6-8. The timeout specified for an individual TACACS+ server overrides the global timeout interval. To set the timeout for an individual server, see the Setting a Timeout Interval for an Individual TACACS+ Host procedure on page 6-17.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t tacacs-server timeout seconds exit show tacacs-server copy running-config startup-config
6-16
OL-22823-01
Chapter 6
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Specifies the interval in seconds that the Cisco Nexus 1000V waits for a response from a server. The default timeout interval is 5 seconds. The range is from 1 to 60 seconds. Exits the CLI Global Configuration mode and returns you to EXEC mode.
Step 3
Step 4
show tacacs-server Example: n1000v# show tacacs-server Global TACACS+ shared secret:******** timeout value:10 deadtime value:0 total number of servers:1 following TACACS+ servers are configured: 10.10.2.2: available on port:49 n1000v#
Step 5
(Optional) Copies these changes made in the running configuration to the startup configuration.
You are logged in to the CLI in EXEC mode. You have already enabled TACACS+ for authentication. See the Enabling or Disabling TACACS+ procedure on page 6-8. The timeout setting for an individual TACACS+ server overrides the global timeout interval.
SUMMARY STEPS
1. 2.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
6-17
Configuring TACACS+
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
3. 4. 5.
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
tacacs-server host {ipv4-address | host-name} timeout seconds Example: n1000v(config)# tacacs-server host 10.10.2.2 timeout 10 n1000v(config)#
Specifies the timeout interval for a specific server. The default is the global timeout interval. For more information, see the Setting the TACACS+ Global Timeout Interval procedure on page 6-16. Exits the CLI Global Configuration mode and returns you to EXEC mode.
Step 3
Step 4
show tacacs-server Example: n1000v# show tacacs-server Global TACACS+ shared secret:******** timeout value:10 deadtime value:0 total number of servers:1 following TACACS+ servers are configured: 10.10.2.2: available on port:49 timeout:10 n1000v#
Step 5
(Optional) Copies these changes made in the running configuration to the startup configuration.
You are logged in to the CLI in EXEC mode. You have already enabled TACACS+ for authentication. See the Enabling or Disabling TACACS+ procedure on page 6-8.
6-18
OL-22823-01
Chapter 6
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You have configured the TACACS+ server using the Configuring a TACACS+ Server Host procedure on page 6-11.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t tacacs-server host {ipv4-address | host-name} port tcp-port exit show tacacs-server copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
tacacs-server host {ipv4-address | host-name} port tcp-port Example: n1000v(config)# tacacs-server host 10.10.2.2 port 2 n1000v(config)#
Step 3
Exits the CLI Global Configuration mode and returns you to EXEC mode.
Step 4
show tacacs-server Example: n1000v# show tacacs-server Global TACACS+ shared secret:******** timeout value:10 deadtime value:0 total number of servers:1 following TACACS+ servers are configured: 10.10.2.2: available on port:2 timeout:10 n1000v#
Step 5
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
6-19
Configuring TACACS+
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You are logged in to the CLI in EXEC mode. You have already enabled TACACS+ for authentication. See the Enabling or Disabling TACACS+ procedure on page 6-8. You have configured the TACACS+ server. See the Configuring a TACACS+ Server Host procedure on page 6-11. The idle timer specifies how long a TACACS+ server should remain idle (receiving no requests) before sending it a test packet. The default idle timer value is 0 minutes. When the idle time interval is 0 minutes, periodic TACACS+ server monitoring is not done.
SUMMARY STEPS
1. 2. 3. 4. 5. 6.
config t tacacs-server host {ipv4-address | host-name} test {idle-time minutes | password password [idle-time minutes] | username name [password password [idle-time minutes]]} tacacs-server dead-time minutes exit show tacacs-server copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
tacacs-server host {ipv4-address | host-name} test {idle-time minutes | password password [idle-time minutes] | username name [password password [idle-time minutes]]} Example: n1000v(config)# tacacs-server host 10.10.2.2 test username pvk2 password a3z9yjqz7 idle-time 3
To protect network security, we recommend assigning a username that is not already in the TACACS+ database.
password: The default is test. idle-time: The default is 0 minutes. The valid range is from 0 to 1440 minutes.
Note
For periodic TACACS+ server monitoring, the idle timer value must be greater than 0.
6-20
OL-22823-01
Chapter 6
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 3
tacacs-server dead-time minutes Example: n1000v(config)# tacacs-server dead-time 5
Purpose Specifies the duration of time in minutes before checking a TACACS+ server that was previously unresponsive. The default value is 0 minutes and the valid range is from 0 to 1440 minutes. Exits the CLI Global Configuration mode and returns you to EXEC mode.
Step 4
Step 5
show tacacs-server Example: n1000v# show tacacs-server Global TACACS+ shared secret:******** timeout value:10 deadtime value:0 total number of servers:1 following TACACS+ servers are configured: 10.10.2.2: available on port:2 timeout:10 n1000v#
Step 6
(Optional) Copies these changes made to the running configuration to the startup configuration.
You are logged in to the CLI in EXEC mode. You have already enabled TACACS+ for authentication. See the Enabling or Disabling TACACS+ procedure on page 6-8. You have configured the TACACS+ server. See the Configuring a TACACS+ Server Host procedure on page 6-11. When the dead-timer interval is 0 minutes, TACACS+ servers are not marked as dead even if they are not responding. You can configure the dead-timer per group (see the Configuring a TACACS+ Server Group procedure on page 6-12).
SUMMARY STEPS
1. 2. 3.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
6-21
Configuring TACACS+
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
4. 5.
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Configures the global dead-time interval. The default value is 0 minutes. The range is from 1 to 1440 minutes Exits the CLI Global Configuration mode and returns you to EXEC mode.
Step 3
Step 4
Step 5
You are logged in to the CLI in EXEC mode. You have already enabled TACACS+ for authentication. See the Enabling or Disabling TACACS+ procedure on page 6-8. You have configured the TACACS+ server. See the Configuring a TACACS+ Server Host procedure on page 6-11.
SUMMARY STEPS
1.
6-22
OL-22823-01
Chapter 6
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
show tacacs-server statistics {hostname | ipv4-address}
Example: n1000v# show tacacs-server statistics 10.10.1.1 Server is not monitored Authentication Statistics failed transactions: 9 sucessfull transactions: 2 requests sent: 2 requests timed out: 0 responses with no matching requests: 0 responses not processed: 0 responses containing errors: 0 Authorization Statistics failed transactions: 1 sucessfull transactions: 0 requests sent: 0 requests timed out: 0 responses with no matching requests: 0 responses not processed: 0 responses containing errors: 0 Accounting Statistics failed transactions: 0 sucessfull transactions: 0 requests sent: 0 requests timed out: 0 responses with no matching requests: 0 responses not processed: 0 responses containing errors: 0
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
6-23
Configuring TACACS+
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Additional References
For additional information related to implementing TACACS+, see the following sections:
Related Documents
Related Topic CLI System Management Document Title Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4) Cisco Nexus 1000V System Management Configuration Guide, Release 4.2(1)SV1(4)
Standards
Standards Title No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
6-24
OL-22823-01
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
CH A P T E R
Configuring SSH
This chapter describes how to configure Secure Shell Protocol (SSH). This chapter includes the following sections:
Information About SSH, page 7-1 Prerequisites for SSH, page 7-2 Guidelines and Limitations, page 7-2 Default Settings, page 7-3 Configuring SSH, page 7-3 Verifying the SSH Configuration, page 7-13 SSH Example Configuration, page 7-14 Additional References, page 7-15 Feature History for SSH, page 7-15
SSH Server, page 7-1 SSH Client, page 7-2 SSH Server Keys, page 7-2
SSH Server
You can use the SSH server to enable an SSH client to make a secure, encrypted connection. SSH uses strong encryption for authentication. The SSH server can operate with publicly and commercially available SSH clients. TACACS+ user authentication and locally stored user names and passwords is supported for SSH.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
7-1
Configuring SSH
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
SSH Client
The SSH client feature is an application that runs over the SSH protocol to provide device authentication and encryption. The SSH client enables a secure, encrypted connection to any device that runs the SSH server. This connection provides an encrypted outbound connection. With authentication and encryption, the SSH client produces secure communication over an insecure network. The SSH client works with publicly and commercially available SSH servers.
SSH version 2 using Rivest, Shamir, and Adelman (RSA) public-key cryptography SSH version 2 using the Digital System Algrorithm (DSA)
Be sure to have an SSH server key-pair with the correct version before enabling the SSH service. Generate the SSH server key-pair according to the SSH client version used. The SSH service accepts two types of key-pairs for use by SSH version 2:
The dsa option generates the DSA key-pair for the SSH version 2 protocol. The rsa option generates the RSA key-pair for the SSH version 2 protocol.
By default, an RSA key using 1024 bits is generated. SSH supports the following public key formats:
OpenSSH IETF Secure Shell (SECSH) Public Key Certificate in Privacy-Enhanced Mail (PEM)
Caution
If you delete all of the SSH keys, you cannot start the SSH services.
You have configured IP on a Layer 3 interface, out-of-band on the mgmt 0 interface, or inband on an Ethernet interface. Before enabling the SSH server, obtain the SSH key.
Only SSH version 2 (SSHv2) is supported. SSH is enabled by default. Cisco NX-OS commands might differ from the Cisco IOS commands.
7-2
OL-22823-01
Chapter 7
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Default Settings
The following table lists the default settings for SSH. Parameters SSH server SSH server key RSA key bits for generation Default Enabled. RSA key generated with 1024 bits. 1024.
Configuring SSH
This section includes the following topics:
Generating SSH Server Keys, page 7-3 Configuring a User Account with a Public Key, page 7-5 Starting SSH Sessions, page 7-8 Clearing SSH Hosts, page 7-9 Disabling the SSH Server, page 7-9 Deleting SSH Server Keys, page 7-10 Clearing SSH Sessions, page 7-12
You are logged in to the CLI in EXEC mode. The default SSH server key is an RSA key that is generated using 1024 bits.
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7.
config t no feature ssh ssh key {dsa [force] | rsa [bits [force]]} feature ssh exit show ssh key copy running-config startup-config
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
7-3
Configuring SSH
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Disables SSH.
Step 3
ssh key {dsa [force] | rsa [bits [force]]} Example: n1000v(config)# ssh key dsa force
Generates the SSH server key. The bits argument is the number of bits used to generate the key. The range is from 768 to 2048 and the default value is 1024. Use the force keyword to replace an existing key. Enables SSH.
Step 4
Step 5
Step 6
Example: n1000v# config t n1000v(config)# no feature ssh XML interface to system may become unavailable since ssh is disabled n1000v(config)# ssh key dsa force generating dsa key(1024 bits)..... . generated dsa key n1000v(config)# feature ssh n1000v(config)# show ssh key ************************************** rsa Keys generated:Sun Jul 27 15:18:46 2008 ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAyKcb7Nv9Ki1OOId9/tdHHa/ngQujlvK5mXyL/n+DeOXK fVhHbX2a+V0cm7CCLUkBh+BvZRmpmOVTmU/5awfVhVxMKXMiPOPBc+A6/n3FVroyRwupMki6mWoM6Uwa GID5gsVPqFjFNSgMWtbhjo97XVKhgjFW+wOVt8QoAcrEtnwEfsnQk1EIr/0XIP1mqTsrqTsmjZ2vLk+f FzTGYAxMvYZI+BrN47aoH2ywS7CpnODjCDXJuDYSPbc3PA8t0ghU/60m9R+s6AZPuljVQbGfxPrahEu4 GVc6sMJNU1JxmqDJkodhMArObB4Umzj7E3Rdby/ZWx/clTYiXQR1X1VfhQ== bitcount:2048 fingerprint: fd:ca:48:73:b9:ee:e7:86:9e:1e:40:46:f1:50:1d:44 ************************************** dsa Keys generated:Sun Jul 27 15:20:12 2008 ssh-dss AAAAB3NzaC1kc3MAAACBALpdxLjXNS/jcCNY+F1QZV9HegxBEb0DMUmq9bSq2N+KAcvHllEh
7-4
OL-22823-01
Chapter 7
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
GnaiHhqarOlcEKqhLbIbuqtKTCvfa+Y1hBIAhWVjg1UR3/M22jqxnfhnxL5YRc1Q7fcesFax0myayAIU nXrkO5iwv9XHTu+EInRc4kJ0XrG9SxtLmDe/fi2ZAAAAFQDbRabAjZa6GfDpwjXw5smRhrElJwAAAIEA r50yi3hHawNnb5qgYLXhN+KA8XJF753eCWHtMw7NR8fz6fjQ1R2J97UjjGuQ8DvwpGeNQ5S+AuIo0rGq svdg7TTecBcbgBOnR7Fs2+W5HiSVEGbvj1xaeK8fkNE6kaJumBB343b8Rgj0G97MP/os1GfkEqmX9glB 0IOM2mgHHyoAAACAfRir27hHy+fw8CxPlsK0R6cFhxYyd/qYYogXFKYIOPxpLoYrjqODeOFThU7TJuBz aS97eXiruzbffHwzUGfXgmQT5o9IMZRTClWPA/5Ju4O9YABYHccUghf0W+QtgGOT6FOSvBh8uOV0kcHC GMJAP8omphauZJlc+wgFxhnkyh4= bitcount:1024 fingerprint: 44:91:32:1f:7a:d1:83:3c:f3:5e:db:53:0a:2d:ce:69 **************************************
OpenSSH format IETF SECSH format Public Key Certificate in PEM format
You are logged in to the CLI in EXEC mode. You have already generated an SSH public key in OpenSSH format. The user account already exists.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t username username sshkey ssh-key exit show user-account copy running-config startup-config
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
7-5
Configuring SSH
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Configures the SSH public key in OpenSSH format with an exiting user account. To create a user account use the following command: username name password pwd
Example: n1000v(config)# username user1 sshkey ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAyK cb7Nv9Ki1OOId9/tdHHa/ngQujlvK5mXyL/n+DeOXKfVhHbX2a+V0cm7CCLUkBh+BvZRmpmOVTmU/5aw fVhVxMKXMiPOPBc+A6/n3FVroyRwupMki6mWoM6UwaGID5gsVPqFjFNSgMWtbhjo97XVKhgjFW+wOVt8 QoAcrEtnwEfsnQk1EIr/0XIP1mqTsrqTsmjZ2vLk+fFzTGYAxMvYZI+BrN47aoH2ywS7CpnODjCDXJuD YSPbc3PA8t0ghU/60m9R+s6AZPuljVQbGfxPrahEu4GVc6sMJNU1JxmqDJkodhMArObB4Umzj7E3Rdby /ZWx/clTYiXQR1X1VfhQ==
Step 3
Step 4
show user-account
Example: n1000v# show user-account user:admin this user account has no expiry date roles:network-admin user:user1 this user account has no expiry date roles:network-operator ssh public key: ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAyKcb7Nv9Ki1OOId9/tdH Ha/ngQujlvK5mXyL/n+DeOXKfVhHbX2a+V0cm7CCLUkBh+BvZRmpmOVTmU/5awfVhVxMKXMiPOPBc+A6 /n3FVroyRwupMki6mWoM6UwaGID5gsVPqFjFNSgMWtbhjo97XVKhgjFW+wOVt8QoAcrEtnwEfsnQk1EI r/0XIP1mqTsrqTsmjZ2vLk+fFzTGYAxMvYZI+BrN47aoH2ywS7CpnODjCDXJuDYSPbc3PA8t0ghU/60m 9R+s6AZPuljVQbGfxPrahEu4GVc6sMJNU1JxmqDJkodhMArObB4Umzj7E3Rdby/ZWx/clTYiXQR1X1Vf hQ==
Step 5
7-6
OL-22823-01
Chapter 7
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You are logged in to the CLI in EXEC mode. You have already generated an SSH public key in one of the following formats:
IETF SECSH format Public Key Certificate in PEM format
SUMMARY STEPS
1. 2. 3. 4. 5. 6.
copy server-file bootflash:filename config t username username sshkey file bootflash:filename exit show user-account copy running-config startup-config
DETAILED STEPS
Command
Step 1
copy server-file bootflash:filename
Purpose Downloads the file containing the SSH key from a server. The server can be FTP, secure copy (SCP), secure FTP (SFTP), or TFTP.
Example: n1000v# copy tftp://10.78.1.10/secsh_file.pub bootflash:secsh_file.pub vrf management Trying to connect to tftp server...... Connection to server Established. | TFTP get operation was successful n1000v#
Step 2
Step 3
username username sshkey file bootflash:filename Example: n1000v(config)# username User1 sshkey file bootflash:secsh_file.pub
Step 4
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
7-7
Configuring SSH
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 5
show user-account
Example: n1000v# show user-account user:admin this user account has no expiry date roles:network-admin user:user2 this user account has no expiry date roles:network-operator ssh public key: ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAyKcb7Nv9Ki1OOId9/tdHHa/ngQujlvK5mXyL/n+DeOXKfVhHbX2a+V0cm7CC LUkBh+BvZRmpmOVTmU/5awfVhVxMKXMiPOPBc+A6/n3FVroyRwupMki6 mWoM6UwaGID5gsVPqFjFNSgMWtbhjo97XVKhgjFW+wOVt8QoAcrEtnwEfsnQk1EIr/0XIP1mqTsrqTsmjZ2vLk+f FzTGYAxMvYZI+BrN47aoH2ywS7CpnODjCDXJuDYSPbc3PA8t0ghU/60m9R+s6AZPuljVQbGfxPrahEu4GVc6sMJN U1JxmqDJkodhMArObB4Umzj7E3Rdby/ZWx/clTYiXQR1X1VfhQ==
Step 6
You are logged in to the CLI in EXEC mode. You have already obtained the hostname and, if needed, the username, for the remote device. The SSH server is already enabled on the remote device.
SUMMARY STEPS
1.
ssh [username@]{hostname | username@hostname} [vrf vrf-name] ssh6 [username@]{hostname | username@hostname} [vrf vrf-name]
DETAILED STEPS
Command
Step 1
ssh [root@]{ip address | hostname} [vrf vrf-name] Example: n1000v(config)# ssh root@172.28.30.77 root@172.28.30.77's password: Last login: Sat Jul 26 11:07:23 2008 from 171.70.209.64
Purpose Creates an SSH IP session to a remote device using IP. The default VRF is the default VRF.
7-8
OL-22823-01
Chapter 7
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
BSUMMARY STEPS
1.
DETAILED STEPS
Command
Step 1
clear ssh hosts Example: n1000v# clear ssh hosts
You are logged in to the CLI in EXEC mode. If you disable SSH, to enable it again you must first generate an SSH server key. See the Generating SSH Server Keys procedure on page 7-3.
SUMMARY STEPS
1. 2. 3. 4.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
7-9
Configuring SSH
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
no feature ssh Example: n1000v(config)# no feature ssh XML interface to system may become unavailable since ssh is disabled n1000v(config)#
Step 3
show ssh server Example: n1000v(config)# show ssh server ssh is not enabled n1000v(config)#
Step 4
You are logged in to the CLI in EXEC mode. If you disable SSH, to enable it again you must first generate an SSH server key. See the Generating SSH Server Keys procedure on page 7-3.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t no feature ssh no ssh key [dsa | rsa] show ssh key copy running-config startup-config
7-10
OL-22823-01
Chapter 7
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Step 3
Deletes the SSH server key. The default is to delete all the SSH keys. (Optional) Displays the SSH server key configuration. (Optional) Copies the running configuration to the startup configuration.
Step 4
Step 5
Example: n1000v# config t n1000v(config)# no feature ssh n1000v(config)# no ssh key rsa n1000v(config)# show ssh key ************************************** rsa Keys generated:Sun Jul 27 15:18:46 2008 ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAyKcb7Nv9Ki1OOId9/tdHHa/ngQujlvK5mXyL/n+DeOXK fVhHbX2a+V0cm7CCLUkBh+BvZRmpmOVTmU/5awfVhVxMKXMiPOPBc+A6/n3FVroyRwupMki6mWoM6Uwa GID5gsVPqFjFNSgMWtbhjo97XVKhgjFW+wOVt8QoAcrEtnwEfsnQk1EIr/0XIP1mqTsrqTsmjZ2vLk+f FzTGYAxMvYZI+BrN47aoH2ywS7CpnODjCDXJuDYSPbc3PA8t0ghU/60m9R+s6AZPuljVQbGfxPrahEu4 GVc6sMJNU1JxmqDJkodhMArObB4Umzj7E3Rdby/ZWx/clTYiXQR1X1VfhQ== bitcount:2048 fingerprint: fd:ca:48:73:b9:ee:e7:86:9e:1e:40:46:f1:50:1d:44 ************************************** dsa Keys generated:Sun Jul 27 15:20:12 2008 ssh-dss AAAAB3NzaC1kc3MAAACBALpdxLjXNS/jcCNY+F1QZV9HegxBEb0DMUmq9bSq2N+KAcvHllEh GnaiHhqarOlcEKqhLbIbuqtKTCvfa+Y1hBIAhWVjg1UR3/M22jqxnfhnxL5YRc1Q7fcesFax0myayAIU nXrkO5iwv9XHTu+EInRc4kJ0XrG9SxtLmDe/fi2ZAAAAFQDbRabAjZa6GfDpwjXw5smRhrElJwAAAIEA r50yi3hHawNnb5qgYLXhN+KA8XJF753eCWHtMw7NR8fz6fjQ1R2J97UjjGuQ8DvwpGeNQ5S+AuIo0rGq svdg7TTecBcbgBOnR7Fs2+W5HiSVEGbvj1xaeK8fkNE6kaJumBB343b8Rgj0G97MP/os1GfkEqmX9glB 0IOM2mgHHyoAAACAfRir27hHy+fw8CxPlsK0R6cFhxYyd/qYYogXFKYIOPxpLoYrjqODeOFThU7TJuBz aS97eXiruzbffHwzUGfXgmQT5o9IMZRTClWPA/5Ju4O9YABYHccUghf0W+QtgGOT6FOSvBh8uOV0kcHC GMJAP8omphauZJlc+wgFxhnkyh4= bitcount:1024 fingerprint: 44:91:32:1f:7a:d1:83:3c:f3:5e:db:53:0a:2d:ce:69
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
7-11
Configuring SSH
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
************************************** mcs-srvr43(config)# no ssh key rsa mcs-srvr43(config)# show ssh key ************************************** could not retrieve rsa key information ************************************** dsa Keys generated:Sun Jul 27 15:20:12 2008 ssh-dss AAAAB3NzaC1kc3MAAACBALpdxLjXNS/jcCNY+F1QZV9HegxBEb0DMUmq9bSq2N+KAcvHllEh GnaiHhqarOlcEKqhLbIbuqtKTCvfa+Y1hBIAhWVjg1UR3/M22jqxnfhnxL5YRc1Q7fcesFax0myayAIU nXrkO5iwv9XHTu+EInRc4kJ0XrG9SxtLmDe/fi2ZAAAAFQDbRabAjZa6GfDpwjXw5smRhrElJwAAAIEA r50yi3hHawNnb5qgYLXhN+KA8XJF753eCWHtMw7NR8fz6fjQ1R2J97UjjGuQ8DvwpGeNQ5S+AuIo0rGq svdg7TTecBcbgBOnR7Fs2+W5HiSVEGbvj1xaeK8fkNE6kaJumBB343b8Rgj0G97MP/os1GfkEqmX9glB 0IOM2mgHHyoAAACAfRir27hHy+fw8CxPlsK0R6cFhxYyd/qYYogXFKYIOPxpLoYrjqODeOFThU7TJuBz aS97eXiruzbffHwzUGfXgmQT5o9IMZRTClWPA/5Ju4O9YABYHccUghf0W+QtgGOT6FOSvBh8uOV0kcHC GMJAP8omphauZJlc+wgFxhnkyh4= bitcount:1024 fingerprint: 44:91:32:1f:7a:d1:83:3c:f3:5e:db:53:0a:2d:ce:69 ************************************** mcs-srvr43(config)# no ssh key dsa mcs-srvr43(config)# show ssh key ************************************** could not retrieve rsa key information ************************************** could not retrieve dsa key information ************************************** no ssh keys present. you will have to generate them ************************************** n1000v#
SUMMARY STEPS
1. 2. 3.
7-12
OL-22823-01
Chapter 7
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
show users Example: n1000v# show users
Step 2
Step 3
Example: n1000v# show users NAME LINE admin tty1 admin pts/0 admin pts/1 n1000v# clear line 0 n1000v# show users NAME LINE admin tty1 admin pts/1 mcs-srvr43(config)#
TIME IDLE Jul 25 19:13 old Jul 28 09:49 00:02 Jul 28 09:46 .
Example: n1000v# show ssh key rsa ************************************** rsa Keys generated:Mon Jul 28 09:49:18 2008 ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAGEAv0a4p6VulQMW4AMgoPfApB2KegF3QTojCzed51iVQnEkNglnM7A/oEIZAtlVLY k/PEzt+ED7lPal/8pomaqjgRxHSeK2gw1cJKSDbcYH5na8uox1Hr50eK0q2+ZfvMqV bitcount:768 fingerprint:
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
7-13
Configuring SSH
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
76:6c:a0:5c:79:a6:ae:3d:cb:27:a1:86:62:fa:09:df **************************************
Step 2
Step 3
Step 4
Step 5
Step 6
Example: n1000v# config t n1000v(config)# no feature ssh n1000v(config)# ssh key rsa generating rsa key(1024 bits)..... n1000v(config)# feature ssh n1000v(config)# show ssh key rsa Keys generated:Sat Sep 29 00:10:39 2007 ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAvWhEBsF55oaPHNDBnpXOTw6+/OdHoLJZKr+MZm99n2U0 ChzZG4svRWmHuJY4PeDWl0e5yE3g3EO3pjDDmt923siNiv5aSga60K36lr39HmXL6VgpRVn1XQFiBwn4
7-14
OL-22823-01
Chapter 7
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
na+H1d3Q0hDt+uWEA0tka2uOtXlDhliEmn4HVXOjGhFhoNE= bitcount:1024 fingerprint: 51:6d:de:1c:c3:29:50:88:df:cc:95:f0:15:5d:9a:df ************************************** could not retrieve dsa key information ************************************** n1000v(config)# username User1 sshkey ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAy19oF6QaZl9G+3f1XswK3OiW4H7YyUyuA50rv7gsEPjhOBYmsi6PAVKui1nIf/ DQhum+lJNqJP/eLowb7ubO+lVKRXFY/G+lJNIQW3g9igG30c6k6+XVn+NjnI1B7ihvpVh7dLddMOXwOnXHYshXmSiH 3UD/vKyziEh5S4Tplx8= n1000v(config)# copy running-config startup-config [########################################] 100% n1000v(config)#
Additional References
For additional information related to implementing RBAC, see the following sections:
Related Documents
Related Topic CLI Telnet Document Title Cisco Nexus 1000V Getting Started Guide, Release 4.2(1)SV1(4) Chapter 8, Configuring Telnet
Standards
Standards Title No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
7-15
Configuring SSH
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
7-16
OL-22823-01
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
CH A P T E R
Configuring Telnet
This chapter describes how to configure Telnet and includes the following topics:
Information About the Telnet Server, page 8-1 Prerequisites for Telnet, page 8-1 Guidelines and Limitations, page 8-2 Default Setting, page 8-2 Configuring Telnet, page 8-2 Verifying the Telnet Configuration, page 8-5 Additional References, page 8-5 Feature History for Telnet, page 8-6
You have configured IP on a Layer 3 interface, out-of-band on the mgmt 0 interface, or inband on an Ethernet interface.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
8-1
Configuring Telnet
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
The Telnet server is enabled by default. Cisco NX-OS commands may differ from Cisco IOS commands.
Default Setting
The following table lists the default setting for Telnet. Parameters Telnet server Default Enabled.
Configuring Telnet
This section includes the following topics:
Enabling the Telnet Server, page 8-2 Starting an IP Telnet Session to a Remote Device, page 8-3 Clearing Telnet Sessions, page 8-4
You are logged in to the CLI in EXEC mode. By default, the Telnet server is enabled.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t feature telnet exit show telnet server copy running-config startup-config
8-2
OL-22823-01
Chapter 8
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Step 3
show telnet server Example: n1000v(config)# show telnet server telnet service enabled n1000v(config)#
Step 4
(Optional) Copies these changes made in the running configuration to the startup configuration.
You are logged in to the CLI in EXEC mode. You have verified that the Telnet server is enabled on the remote device. You have already obtained the hostname for the remote device and, if needed, the username on the remote device. You have already verified that the Telnet server is enabled. If not you have enabled it using the Enabling the Telnet Server procedure on page 8-2. By default, the Telnet server is enabled.
SUMMARY STEPS
1.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
8-3
Configuring Telnet
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
telnet {ip address | host-name} [port-number] [vrf vrf-name] Example: n1000v# telnet 10.10.1.1
Purpose Creates an IP Telnet session to the specified destination. port-number: The port number, from 1 to 65535, to use for this session. The default port number is 23. vrf-name: The default VRF is the default VRF.
SUMMARY STEPS
1. 2.
DETAILED STEPS
Command
Step 1
show users Example: n1000v# show users
Step 2
Step 3
Example: n1000v# show users NAME LINE admin tty1 admin pts/1 admin pts/2 n1000v# clear line 1 n1000v# show users NAME LINE admin tty1 admin pts/2 n1000v#
8-4
OL-22823-01
Chapter 8
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Example: n1000v# show running-config security all version 4.0(1) username admin password 5 $1$xMw2Q/1S$ZEWRvyAxAJAFV0weuSPvg1 role network-admin username user2 password 5 $1$byNNnnSP$xfXVKjE5UEScvriwX3Kyj0 role network-operator username user2 sshkey ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAyKcb7Nv9Ki1OOId9/tdHHa/ngQujlvK5mXyL/n+DeOXKfVhHbX2a+V0cm7CCLU kBh+BvZRmpmOVTmU/5awfVhVxMKXMiPOPBc+A6/n3FVroyRwupMki6mW oM6UwaGID5gsVPqFjFNSgMWtbhjo97XVKhgjFW+wOVt8QoAcrEtnwEfsnQk1EIr/0XIP1mqTsrqTsmjZ2vLk+fFzTG YAxMvYZI+BrN47aoH2ywS7CpnODjCDXJuDYSPbc3PA8t0ghU/60m9R+s6AZPuljVQbGfxPrahEu4GVc6sMJNU1 JxmqDJkodhMArObB4Umzj7E3Rdby/ZWx/clTYiXQR1X1VfhQ== telnet server enable banner motd # User Access Verification # ssh key rsa 1024 force no ssh key dsa force ssh server enable
Additional References
For additional information related to implementing Telnet, see the following sections:
Related Documents
Related Topic SSH CLI Document Title Chapter 7, Configuring SSH Cisco Nexus 1000V Getting Started Guide, Release 4.2(1)SV1(4)
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
8-5
Configuring Telnet
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Standards
Standards Title No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
8-6
OL-22823-01
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
C H A P T E R
Configuring an IP ACL
This chapter describes how to configure IP access control lists (ACLs). This chapter includes the following sections:
Information About ACLs, page 9-1 Prerequisites for IP ACLs, page 9-5 Guidelines and Limitations, page 9-5 Default Settings, page 9-5 Configuring IP ACLs, page 9-5 Verifying IP ACL Configurations, page 9-14 Monitoring IP ACL, page 9-15 Example Configurations for IP ACL, page 9-15 Additional References, page 9-15 Feature History for IP ACL, page 9-16
ACL Types and Applications, page 9-2 Order of ACL Application, page 9-2 About Rules, page 9-2 Statistics, page 9-4
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
9-1
Configuring an IP ACL
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
IP ACLsThe device applies IPv4 ACLs only to IP traffic. MAC ACLsThe device applies MAC ACLs only to non-IP traffic.
About Rules
Rules are what you create, modify, and remove when you configure how an ACL filters network traffic. Rules appear in the running configuration. When you apply an ACL to an interface or change a rule within an ACL that is already applied to an interface, the supervisor module creates ACL entries from the rules in the running configuration and sends those ACL entries to the applicable I/O module. You can create rules in ACLs in access-list configuration mode by using the permit or deny command. The device allows traffic that matches the criteria in a permit rule and blocks traffic that matches the criteria in a deny rule. You have many options for configuring the criteria that traffic must meet in order to match the rule. This section describes some of the options that you can use when you configure a rule. For information about every option, see the applicable permit and deny commands in the Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4). This section includes the following topics:
Source and Destination, page 9-2 Protocols, page 9-3 Implicit Rules, page 9-3 Additional Filtering Options, page 9-3 Sequence Numbers, page 9-4 Statistics, page 9-4 Statistics, page 9-4
9-2
OL-22823-01
Chapter 9
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Protocols
IP and MAC ACLs let you to identify traffic by protocol. You can specify some protocols by name. For example, in an IP ACL, you can specify ICMP by name. You can specify any protocol by number. In MAC ACLs, you can specify protocols by the Ethertype number of the protocol, which is a hexadecimal number. For example, you can use 0x0800 to specify IP traffic in a MAC ACL rule. In IP ACLs, you can specify protocols by the integer that represents the Internet protocol number. For example, you can use 115 to specify Layer 2 Tunneling Protocol (L2TP) traffic. For a list of the protocols that each type of ACL supports by name, see the applicable permit and deny commands in the Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4).
Implicit Rules
IP and MAC ACLs have implicit rules, which means that although these rules do not appear in the running configuration, the device applies them to traffic when no other rules in an ACL match. When you configure the device to maintain per-rule statistics for an ACL, the device does not maintain statistics for implicit rules. All IP ACLs include the following implicit rule that denies unmatched IP traffic:
deny ip any any
This implicit rule ensures that unmatched traffic is denied, regardless of the protocol specified in the Layer 2 header of the traffic.
For information about all filtering options available in rules, see the applicable permit and deny commands in the Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4).
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
9-3
Configuring an IP ACL
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Sequence Numbers
The device supports sequence numbers for rules. Every rule that you enter receives a sequence number, either assigned by you or assigned automatically by the device. Sequence numbers simplify the following ACL tasks:
Adding new rules between existing rulesBy specifying the sequence number, you specify where in the ACL a new rule should be positioned. For example, if you need to insert a rule between rules numbered 100 and 110, you could assign a sequence number of 105 to the new rule. Removing a ruleWithout using a sequence number, removing a rule requires that you enter the whole rule, as follows:
n1000v(config-acl)# no permit tcp 10.0.0.0/8 any
However, if the same rule had a sequence number of 101, removing the rule requires only the following command:
n1000v(config-acl)# no 101
Moving a ruleWith sequence numbers, if you need to move a rule to a different position within an ACL, you can add a second instance of the rule using the sequence number that positions it correctly, and then you can remove the original instance of the rule. This action allows you to move the rule without disrupting traffic.
If you enter a rule without a sequence number, the device adds the rule to the end of the ACL and assigns a sequence number that is 10 greater than the sequence number of the preceding rule to the rule. For example, if the last rule in an ACL has a sequence number of 225 and you add a rule without a sequence number, the device assigns the sequence number 235 to the new rule. In addition, you can reassign sequence numbers to rules in an ACL. Resequencing is useful when an ACL has rules numbered contiguously, such as 100 and 101, and you need to insert one or more rules between those rules.
Statistics
The device can maintain global statistics for each rule that you configure in IPv4 and MAC ACLs. If an ACL is applied to multiple interfaces, the maintained rule statistics are the sum of packet matches (hits) on all the interfaces on which that ACL is applied.
Note
The device does not support interface-level ACL statistics. For each ACL that you configure, you can specify whether the device maintains statistics for that ACL, which allows you to turn ACL statistics on or off as needed to monitor traffic filtered by an ACL or to help troubleshoot the configuration of an ACL. The device does not maintain statistics for implicit rules in an ACL. For example, the device does not maintain a count of packets that match the implicit deny ip any any rule at the end of all IPv4 ACLs. If you want to maintain statistics for implicit rules, you must explicitly configure the ACL with rules that are identical to the implicit rules. For more information, see the Implicit Rules section on page 9-3.
9-4
OL-22823-01
Chapter 9
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You must be familiar with IP addressing and protocols to configure IP ACLs. You must be familiar with the interface types that you want to configure with ACLs.
In most cases, ACL processing for IP packets are processed on the I/O modules. Management interface traffic is always processed on the supervisor module, which is slower. ACLs are not supported in port channels.
Default Settings
Table 9-1 lists the default settings for IP ACL parameters.
Table 9-1 Default IP ACL Parameters
Default No IP ACLs exist by default Implicit rules apply to all ACLs (see the Implicit Rules section on page 9-3)
Configuring IP ACLs
This section includes the following topics:
Creating an IP ACL, page 9-6 Changing an IP ACL, page 9-7 Removing an IP ACL, page 9-9 Changing Sequence Numbers in an IP ACL, page 9-10 Applying an IP ACL as a Port ACL, page 9-11 Applying an IP ACL to the Management Interface, page 9-13
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
9-5
Configuring an IP ACL
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Creating an IP ACL
You can create an IPv4 ACL on the device and add rules to it.
SUMMARY STEPS
1. 2. 3. 4. 5. 6.
config t [no] ip access-list {name | match-local-traffic} [sequence-number] {permit | deny} protocol source destination statistics per-entry show ip access-lists name copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
[no] ip access-list {name | match-local-traffic} Example: n1000v(config)# ip access-list acl-01 n1000v(config-acl)# Example: n1000v(config)# ip access-list match-local-traffic n1000v(config-acl)#
Creates the named IP ACL (up to 64 characters in length) and enters IP ACL configuration mode. The match-local-traffic option enables matching for locally-generated traffic. The no option removes the specified access list.
9-6
OL-22823-01
Chapter 9
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 3
[sequence-number] {permit | deny} protocol source destination Example: n1000v(config-acl)# permit ip 192.168.2.0/24 any
Purpose Creates a rule in the IP ACL. You can create many rules. The sequence-number argument can be a whole number between 1 and 4294967295. The permit and deny commands support many ways of identifying traffic. For more information, see the Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4). (Optional) Specifies that the device maintains global statistics for packets that match the rules in the ACL. (Optional) Displays the IP ACL configuration.
Step 4
Step 5
Step 6
Changing an IP ACL
You can add and remove rules in an existing IPv4 ACL. You cannot change existing rules. Instead, to change a rule, you can remove it and recreate it with the desired changes. If you need to add more rules between existing rules than the current sequence numbering allows, you can use the resequence command to reassign sequence numbers. For more information, see the Changing Sequence Numbers in an IP ACL section on page 9-10.
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7.
config t ip access-list name [sequence-number] {permit | deny} protocol source destination no {sequence-number | {permit | deny} protocol source destination} [no] statistics per-entry show ip access-list name copy running-config startup-config
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
9-7
Configuring an IP ACL
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Places you into IP ACL configuration mode for the specified ACL.
Step 3
[sequence-number] {permit | deny} protocol source destination Example: n1000v(config-acl)# 100 permit ip 192.168.2.0/24 any
(Optional) Creates a rule in the IP ACL. Using a sequence number allows you to specify a position for the rule in the ACL. Without a sequence number, the rule is added to the end of the rules. The sequence-number argument can be a whole number between 1 and 4294967295. The permit and deny commands support many ways of identifying traffic. For more information, see the Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4)
Step 4
(Optional) Removes the rule that you specified from the IP ACL. The permit and deny commands support many ways of identifying traffic. For more information, see the Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4). (Optional) Specifies that the device maintains global statistics for packets that match the rules in the ACL. The no option stops the device from maintaining global statistics for the ACL.
Step 5
Step 6
Step 7
9-8
OL-22823-01
Chapter 9
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Removing an IP ACL
You can remove an IP ACL from the device.
You are logged in to the CLI in EXEC mode. Make sure that you know whether the ACL is applied to an interface. Removing an ACL does not affect the configuration of the interfaces where applied. Instead, the device considers the removed ACL to be empty.
SUMMARY STEPS
1. 2. 3. 4.
config t [no] ip access-list name show ip access-list name summary copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Removes the IP ACL that you specified by name from the running configuration. (Optional) Displays the IP ACL configuration. If the ACL remains applied to an interface, the command lists the interfaces. (Optional) Copies the running configuration to the startup configuration.
Step 3
show ip access-list name summary Example: n1000v(config)# show ip access-lists acl-01 summary
Step 4
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
9-9
Configuring an IP ACL
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
SUMMARY STEPS
1. 2. 3. 4.
config t resequence ip access-list name starting-sequence-number increment show ip access-lists name copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
resequence ip access-list name starting-sequence-number increment Example: n1000v(config)# resequence access-list ip acl-01 100 10
Assigns sequence numbers to the rules contained in the ACL, where the first rule receives the starting sequence number that you specify. Each subsequent rule receives a number larger than the preceding rule. The difference in numbers is determined by the increment that you specify. The starting-sequence-number argument and the increment argument can be a whole number between 1 and 4294967295. (Optional) Displays the IP ACL configuration.
Step 3
Step 4
9-10
OL-22823-01
Chapter 9
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You are logged in to the CLI in EXEC mode. You can apply one port ACL to an interface. Make sure that the ACL you want to apply exists and that it is configured to filter traffic in the manner that you need for this application. For more information, see the Creating an IP ACL section on page 9-6 or the Changing an IP ACL section on page 9-7. An IP ACL can also be configured in a port profile. For more information, see the Adding an IP ACL to a Port Profile procedure on page 9-12.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t interface vethernet port ip port access-group access-list [in | out] show running-config aclmgr copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Places you into Interface Configuration mode for the specified vEthernet interface.
Step 3
ip port access-group access-list [in | out] Example: n1000v(config-if)# ip port access-group acl-l2-marketing-group in
Applies an inbound or outbound IPv4 ACL to the interface. You can apply one port ACL to an interface.
Step 4
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
9-11
Configuring an IP ACL
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 5
copy running-config startup-config Example: n1000v(config-if)# copy running-config startup-config
You are logged in to the CLI in EXEC mode. You have already created the IP ACL to add to this port profile using the Creating an IP ACL procedure on page 9-6; and you know its name. If using an existing port profile, you have already created it and you know its name. If creating a new port profile, you know the interface type (Ethernet or vEthernet) and the name you want to give the profile. For more information about port profiles, see the Cisco Nexus 1000V Port Profile Configuration Guide, Release 4.2(1)SV1(4); You know the name of the IP access control list that you want to configure for this port profile. You know the direction of packet flow for the access list.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t port-profile [type {ethernet | vethernet}] profile-name ip port access-group name {in | out} show port-profile [brief | expand-interface | usage] [name profile-name] copy running-config startup-config
9-12
OL-22823-01
Chapter 9
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
port-profile [type {ethernet | vethernet}] name Example: n1000v(config)# port-profile AccessProf n1000v(config-port-prof)#
Enters port profile configuration mode for the named port profile.
Step 3
ip port access-group name {in | out} Example: n1000v(config-port-prof)# ip port access-group allaccess4 out
Adds the named ACL to the port profile for either inbound or outbound traffic.
Step 4
show port-profile name profile-name Example: n1000v(config-port-prof)# show port-profile name AccessProf
Step 5
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
You are logged in to the CLI in EXEC mode. Make sure that the ACL you want to apply exists and that it is configured to filter traffic in the manner that you need for this application. For more information, see the Creating an IP ACL section on page 9-6 or the Changing an IP ACL section on page 9-7.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t interface mgmt0 [no] ip access-group access-list [in | out] show ip access-lists access-list copy running-config startup-config
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
9-13
Configuring an IP ACL
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Places you into interface configuration mode for the management interface.
Step 3
Applies a specified inbound or outbound IPv4 ACL to the interface. The no option removes the specified configuration.
Step 4
show ip access-lists
access-list
Example: n1000v(config-if)# show ip access-lists telnet summary IP access list telnet statistics per-entry Total ACEs Configured:2 Configured on interfaces: mgmt0 - ingress (Router ACL) Active on interfaces: mgmt0 - ingress (Router ACL)
Step 5
9-14
OL-22823-01
Chapter 9
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command show ip access-list [name] summary show running-config interface Purpose Displays a summary of all configured IPv4 ACLs or a named IPv4 ACL. Displays the configuration of an interface to which you have applied an ACL.
Monitoring IP ACL
Use the following commands for IP ACL monitoring: Command show ip access-lists Purpose Displays IPv4 ACL configuration. If the IPv4 ACL includes the statistics per-entry command, then the show ip access-lists command output includes the number of packets that have matched each rule. Clears statistics for all IPv4 ACLs or for a specific IPv4 ACL.
The following example shows how to enable access list matching for locally-generated traffic:
ip access-list match-local-traffic
Additional References
For additional information related to implementing IP ACLs, see the following sections:
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
9-15
Configuring an IP ACL
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Related Documents
Related Topic ACL concepts. Configuring interfaces. Configuring port profiles. Complete command syntax, command modes, command history, defaults, usage guidelines, and examples for Cisco Nexus 1000V commands. Document Title Information About ACLs, page 9-1 Cisco Nexus 1000V Interface Configuration Guide, Release 4.2(1)SV1(4) Cisco Nexus 1000V Port Profile Configuration Guide, Release 4.2(1)SV1(4) Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4)
Standards
Standards Title No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
9-16
OL-22823-01
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
C H A P T E R
10
Information About MAC ACLs, page 10-1 Prerequisites for MAC ACLs, page 10-1\ Default Settings, page 10-2 Configuring MAC ACLs, page 10-2 Verifying MAC ACL Configurations, page 10-9 Monitoring MAC ACLs, page 10-10 Example Configurations for MAC ACLs, page 10-11 Additional References, page 10-11 Feature History for MAC ACL, page 10-12
You are familiar with MAC addressing and non-IP protocols to configure MAC ACLs. You are familiar with the concepts in the Information About ACLs section on page 9-1.
In most cases, ACL processing for IP packets are processed on the I/O modules. Management interface traffic is always processed on the supervisor module, which is slower. ACLs are not supported in port channels.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
10-1
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Default Settings
Table 10-1 lists MAC ACL defaults.
Table 10-1 Default MAC ACLs Parameters
Default No MAC ACLs exist by default Implicit rules apply to all ACLs (see the Implicit Rules section on page 9-3)
Creating a MAC ACL, page 10-2 Changing a MAC ACL, page 10-3 Removing a MAC ACL, page 10-5 Changing Sequence Numbers in a MAC ACL, page 10-6 Applying a MAC ACL as a Port ACL, page 10-7 Adding a MAC ACL to a Port Profile, page 10-8
You are logged in to the CLI in EXEC mode. You have a name to assign to the ACL you are creating. If you want to also add the ACL to a port-profile, you must know or do the following:
If using an existing port profile, you have already created it using the Cisco Nexus 1000V Port
Profile Configuration Guide, Release 4.2(1)SV1(4); and you know its name.
If creating a new port profile, you know the interface type (Ethernet or vEthernet) and the name
SUMMARY STEPS
1. 2. 3.
10-2
OL-22823-01
Chapter 10
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
4. 5. 6.
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Step 3
{permit | deny} source destination protocol Example: n1000v(config-mac-acl)# permit 00c0.4f00.0000 0000.00ff.ffff any
Creates a rule in the MAC ACL. The permit and deny commands support many ways of identifying traffic. For more information, see the Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4). (Optional) Specifies that the device maintains global statistics for packets that match the rules in the ACL. (Optional) Displays the MAC ACL configuration for verification.
Step 4
Step 5
show mac access-lists name Example: n1000v(config-mac-acl)# show mac access-lists acl-mac-01
Step 6
You are logged in to the CLI in EXEC mode. In an existing MAC ACL, you cannot change existing rules. In an existing MAC ACL, you can add and remove rules.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
10-3
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Use the resequence command to reassign sequence numbers, such as when adding rules between existing sequence numbers.
SUMMARY STEPS
1. 2. 3. 4. 5. 6. 7.
config t mac access-list name [sequence-number] {permit | deny} source destination protocol no {sequence-number | {permit | deny} source destination protocol} [no] statistics per-entry show mac access-lists name copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Places you in ACL configuration mode for the ACL that you specify by name.
Step 3
[sequence-number] {permit | deny} source destination protocol Example: n1000v(config-mac-acl)# 100 permit mac 00c0.4f00.00 0000.00ff.ffff any
(Optional) Creates a rule in the MAC ACL. Using a sequence number allows you to specify a position for the rule in the ACL. Without a sequence number, the rule is added to the end of the rules. The permit and deny commands support many ways of identifying traffic. For more information, see the Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4). (Optional) Removes the rule that you specify from the MAC ACL. The permit and deny commands support many ways of identifying traffic. For more information, see the Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4). (Optional) Specifies that the device maintains global statistics for packets that match the rules in the ACL. The no option stops the device from maintaining global statistics for the ACL.
Step 4
Step 5
10-4
OL-22823-01
Chapter 10
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 6
show mac access-lists name Example: n1000v(config-mac-acl)# show mac access-lists acl-mac-01
Step 7
You are logged in to the CLI in EXEC mode. Make sure that you know whether the ACL is applied to an interface. You can remove ACLs that are currently applied. Removing an ACL does not affect the configuration of interfaces where you have applied the ACL. Instead, removed ACLs are considered empty. To find the interfaces that a MAC ACL is configured on, use the show mac access-lists command with the summary keyword.
SUMMARY STEPS
1. 2. 3. 4.
config t no mac access-list name show mac access-lists name summary copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
10-5
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 3
show mac access-lists name summary Example: n1000v(config)# show mac access-lists acl-mac-01 summary
Purpose (Optional) Displays the MAC ACL configuration. If the ACL remains applied to an interface, the command lists the interfaces. (Optional) Copies the running configuration to the startup configuration.
Step 4
SUMMARY STEPS
1. 2. 3. 4.
config t resequence mac access-list name starting-sequence-number increment show mac access-lists name copy running-config startup-config
10-6
OL-22823-01
Chapter 10
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
resequence mac access-list name starting-sequence-number increment Example: n1000v(config)# resequence mac access-list acl-mac-01 100 10
Assigns sequence numbers to the rules contained in the ACL, where the first rule receives the number specified by the starting-sequence number that you specify. Each subsequent rule receives a number larger than the preceding rule. The difference in numbers is determined by the increment number that you specify. (Optional) Displays the MAC ACL configuration.
Step 3
show mac access-lists name Example: n1000v(config)# show mac access-lists acl-mac-01
Step 4
You are logged in to the CLI in EXEC mode. Make sure that the ACL that you want to apply exists and is configured to filter traffic in the manner that you need for this application. For more information about configuring MAC ACLs, see the Configuring MAC ACLs section on page 10-2. A MAC ACL can also be applied to a port using a port profile. For information about port profiles, see the Cisco Nexus 1000V Port Profile Configuration Guide, Release 4.2(1)SV1(4).
SUMMARY STEPS
1. 2. 3. 4. 5.
config t interface vethernet port mac port access-group access-list [in | out] show running-config aclmgr copy running-config startup-config
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
10-7
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Places you into Interface Configuration mode for the specified interface.
Step 3
mac port access-group access-list [in | out] Example: n1000v(config-if)# mac port access-group acl-01 in
Step 4
Step 5
You are logged in to the CLI in EXEC mode. You have already created the MAC ACL to add to this port profile using the Creating a MAC ACL procedure on page 10-2; and you know its name. If using an existing port profile, you have already created it and you know its name. If creating a new port profile, you know the interface type (Ethernet or vEthernet) and the name you want to give the profile. For more information about port profiles, see the Cisco Nexus 1000V Port Profile Configuration Guide, Release 4.2(1)SV1(4); You know the direction of packet flow for the access list.
SUMMARY STEPS
1.
config t
10-8
OL-22823-01
Chapter 10
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
2. 3. 4. 5.
port-profile [type {ethernet | vethernet}] profile-name mac port access-group name {in | out} show port-profile [brief | expand-interface | usage] [name profile-name] copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
port-profile [type {ethernet | vethernet}] name Example: n1000v(config)# port-profile AccessProf n1000v(config-port-prof)#
Enters port profile configuration mode for the named port profile.
Step 3
mac port access-group name {in | out} Example: n1000v(config-port-prof)# mac port access-group allaccess4 out
Adds the named ACL to the port profile for either inbound or outbound traffic.
Step 4
show port-profile name profile-name Example: n1000v(config-port-prof)# show port-profile name AccessProf
Step 5
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
10-9
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Example 10-1 show mac access-list
n1000v# show mac access-list MAC access list acl-mac-01 10 permit 00c0.4f00.0000 0000.00ff.ffff any n1000v#
10-10
OL-22823-01
Chapter 10
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Purpose Displays the MAC ACL configuration. If the MAC ACL includes the statistics per-entry command, the show mac access-lists command output includes the number of packets that have matched each rule. Clears statistics for all MAC ACLs or for a specific MAC ACL.
This example shows how to add the MAC ACL allaccess4 to the port profile AccessProf:
config t port-profile AccessProf mac port access-group allaccess4 out show port-profile name AccessProf port-profile AccessProf description: allaccess4 type: vethernet status: disabled capability l3control: no pinning control-vlan: pinning packet-vlan: system vlans: none port-group: max ports: 32 inherit: config attributes: mac port access-group allaccess4 out evaluated config attributes: mac port access-group allaccess4 out assigned interfaces:
Additional References
For additional information related to implementing MAC ACLs, see the following sections:
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
10-11
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Related Documents
Related Topic ACL concepts. Configuring interfaces. Configuring port profiles. Complete command syntax, command modes, command history, defaults, usage guidelines, and examples for all Cisco Nexus 1000V commands. Document Title Information About ACLs, page 9-1 Cisco Nexus 1000V Interface Configuration Guide, Release 4.2(1)SV1(4) Cisco Nexus 1000V Port Profile Configuration Guide, Release 4.2(1)SV1(4) Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4)
Standards
Standards Title No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
10-12
OL-22823-01
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
C H A P T E R
11
Information About Port Security, page 11-1 Guidelines and Limitations, page 11-5 Additional References, page 11-19 Configuring Port Security, page 11-6 Verifying the Port Security Configuration, page 11-18 Displaying Secure MAC Addresses, page 11-18 Example Configuration for Port Security, page 11-18 Additional References, page 11-19 Feature History for Port Security, page 11-19
Secure MAC Address Learning, page 11-1 Dynamic Address Aging, page 11-2 Secure MAC Address Maximums, page 11-3 Security Violations and Actions, page 11-4 Port Security and Port Types, page 11-5
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
11-1
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Dynamic Method, page 11-2 (the default method) Sticky Method, page 11-2
Static Method
The static learning method lets you manually add or remove secure MAC addresses in the configuration of an interface. A static secure MAC address entry remains in the configuration of an interface until you explicitly remove it. For more information, see the Removing a Static or a Sticky Secure MAC Address from an Interface section on page 11-10. Adding secure addresses by the static method is not affected by whether dynamic or sticky address learning is enabled.
Dynamic Method
By default, when you enable port security on an interface, you enable the dynamic learning method. With this method, the device secures MAC addresses as ingress traffic passes through the interface. If the address is not yet secured and the device has not reached any applicable maximum, it secures the address and allows the traffic. Dynamic addresses are aged and dropped once the age limit is reached, as described in the Dynamic Address Aging section on page 11-2. Dynamic addresses do not persist through restarts. To remove a specific address learned by the dynamic method or to remove all addresses learned by the dynamic method on a specific interface, see the Removing a Dynamic Secure MAC Address section on page 11-11.
Sticky Method
If you enable the sticky method, the device secures MAC addresses in the same manner as dynamic address learning. These addresses can be made persistent through a reboot by copying the running-configuration to the startup-configuration, copy run start. Dynamic and sticky address learning are mutually exclusive. When you enable sticky learning on an interface, dynamic learning is stopped and sticky learning is used instead. If you disable sticky learning, dynamic learning is resumed. Sticky secure MAC addresses are not aged. To remove a specific address learned by the sticky method, see the Removing a Static or a Sticky Secure MAC Address from an Interface section on page 11-10.
11-2
OL-22823-01
Chapter 11
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
InactivityThe length of time after the device last received a packet from the address on the applicable interface. AbsoluteThe length of time after the device learned the address. This is the default aging method; however, the default aging time is 0 minutes, which disables aging.
VLAN 1 VLAN 2 ......... VLAN n VEM 3 MAC table MAC table MAC table MAC table
VLAN 1 VLAN 2 ......... VLAN n VEM 4 MAC table MAC table MAC table MAC table
MAC table
MAC table
MAC table
MAC table
Tip
To make use of the full bandwidth of the port, set the maximum number of addresses to one and configure the MAC address of the attached device. The following limits can determine how many secure MAC address are permitted on an interface:
Device maximumThe device has a nonconfigurable limit of 8192 secure MAC addresses. If learning a new address would violate the device maximum, the device does not permit the new address to be learned, even if the interface or VLAN maximum has not been reached.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
11-3
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Interface maximumYou can configure a maximum number of secure MAC addresses for each interface protected by port security. The default interface maximum is one address. Interface maximums cannot exceed the device maximum. VLAN maximumYou can configure the maximum number of secure MAC addresses per VLAN for each interface protected by port security. A VLAN maximum cannot exceed the interface maximum. VLAN maximums are useful only for trunk ports. There are no default VLAN maximums. For an example of how VLAN and interface maximums interact, see the Security Violations and Actions section on page 11-4.
You can configure VLAN and interface maximums per interface, as needed; however, when the new limit is less than the applicable number of secure addresses, you must reduce the number of secure MAC addresses first. To remove dynamically learned addresses, see the Removing a Dynamic Secure MAC Address section on page 11-11. To remove addresses learned by the sticky or static methods, see the Removing a Static or a Sticky Secure MAC Address from an Interface section on page 11-10.
interface in VLAN 1.
Ten addresses are learned on the interface and inbound traffic from an 11th address arrives at
the interface.
Ingress traffic from a secure MAC address arrives at a different interface in the same VLAN as the interface on which the address is secured.
Note
After a secure MAC address is configured or learned on one secure port, the sequence of events that occurs when port security detects that secure MAC address on a different port in the same VLAN is known as a MAC move violation.
When a security violation occurs on an interface, the action specified in its port security configuration is applied. The possible actions that the device can take are as follows:
ShutdownShuts down the interface that received the packet triggering the violation. The interface is error disabled. This action is the default. After you reenable the interface, it retains its port security configuration, including its secure MAC addresses. You can use the errdisable global configuration command to configure the device to reenable the interface automatically if a shutdown occurs, or you can manually reenable the interface by entering the shutdown and no shut down interface configuration commands.
11-4
OL-22823-01
Chapter 11
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Example: n1000v(config)# errdisable recovery cause psecure-violation n1000v(config)# copy running-config startup-config (Optional)
ProtectPrevents violations from occurring. Address learning continues until the maximum number of MAC addresses on the interface is reached, after which the device disables learning on the interface and drops all ingress traffic from nonsecure MAC addresses.
If a violation occurs because ingress traffic from a secure MAC address arrives at a different interface than the interface on which the address is secure, the action is applied on the interface that received the traffic. A MAC Move Violation is triggered on the port seeing the MAC which is already secured on another interface.
Trunk portsYou can configure port security on interfaces that you have configured as Layer 2 trunk ports. VLAN maximums are not useful for access ports. The device allows VLAN maximums only for VLANs associated with the trunk port. SPAN portsYou can configure port security on SPAN source ports but not on SPAN destination ports. Ethernet PortsPort security is not supported on Ethernet ports. Ethernet Port ChannelsPort security is not supported on Ethernet port channels.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
11-5
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Switched port analyzer (SPAN) destination ports
Port security does not depend upon other features. Port security does not support 802.1X. Port Security cannot be configured on interfaces with existing static MACs. Port Security cannot be enabled on interfaces whose VLANs have an existing static MAC even if it is programmed on a different interface.
Default Settings
Table 11-1 lists the default settings for port security parameters.
Table 11-1 Default Port Security Parameters
Parameters Interface MAC address learning method Interface maximum number of secure MAC addresses Security violation action
Enabling or Disabling Port Security on a Layer 2 Interface, page 11-6 Enabling or Disabling Sticky MAC Address Learning, page 11-8 Adding a Static Secure MAC Address on an Interface, page 11-9 Removing a Static or a Sticky Secure MAC Address from an Interface, page 11-10 Removing a Dynamic Secure MAC Address, page 11-11 Configuring a Maximum Number of MAC Addresses, page 11-12 Configuring an Address Aging Type and Time, page 11-14 Configuring a Security Violation Action, page 11-15 Recovering Ports Disabled for Port Security Violations, page 11-17
Note
11-6
OL-22823-01
Chapter 11
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
BEFORE YOU BEGIN
Before beginning this procedure, you must know or do the following:
You are logged in to the CLI in EXEC mode. By default, port security is disabled on all interfaces. Enabling port security on an interface also enables dynamic MAC address learning. If you want to enable sticky MAC address learning, you must also complete the steps in the Enabling or Disabling Sticky MAC Address Learning section on page 11-8.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t interface type number [no] switchport port-security show running-config port-security copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Places you into Interface Configuration mode for the specified interface.
Step 3
Enables port security on the interface. Using the no option disables port security on the interface. Displays the port security configuration.
Step 4
Step 5
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
11-7
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You are logged in to the CLI in EXEC mode. Dynamic MAC address learning is the default on an interface. By default, sticky MAC address learning is disabled. Make sure that port security is enabled on the interface that you are configuring.
To verify the configuration, see the Verifying the Port Security Configuration section on
page 11-18.
To enable port security on the interface, see the Enabling or Disabling Port Security on a Layer
SUMMARY STEPS
1. 2. 3. 4. 5.
config t interface type number [no] switchport port-security mac-address sticky show running-config port-security copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
11-8
OL-22823-01
Chapter 11
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 2
interface type number Example: n1000v(config)# interface vethernet 36 n1000v(config-if)#
Purpose Places you into Interface Configuration mode for the specified interface.
Step 3
[no] switchport port-security mac-address sticky Example: n1000v(config-if)# switchport port-security mac-address sticky
Enables sticky MAC address learning on the interface. Using the no option disables sticky MAC address learning. Displays the port security configuration.
Step 4
Step 5
You are logged in to the CLI in EXEC mode. By default, no static secure MAC addresses are configured on an interface. Determine if the interface maximum has been reached for secure MAC addresses (use the show port-security command). If needed, you can remove a secure MAC address. See one of the following:
Removing a Static or a Sticky Secure MAC Address from an Interface section on page 11-10 Removing a Dynamic Secure MAC Address section on page 11-11) Configuring a Maximum Number of MAC Addresses section on page 11-12).
Make sure that port security is enabled on the interface that you are configuring.
To verify the configuration, see the Verifying the Port Security Configuration section on
page 11-18.
To enable port security on the interface, see the Enabling or Disabling Port Security on a Layer
SUMMARY STEPS
1. 2.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
11-9
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
3. 4. 5.
[no] switchport port-security mac-address address [vlan vlan-ID] show running-config port-security copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Places you into Interface Configuration mode for the specified interface.
Step 3
[no] switchport port-security mac-address address [vlan vlan-ID] Example: n1000v(config-if)# switchport port-security mac-address 0019.D2D0.00AE
Configures a static MAC address for port security on the current interface. Use the vlan keyword if you want to specify the VLAN that traffic from the address is allowed on. Displays the port security configuration.
Step 4
Step 5
You are logged in to the CLI in EXEC mode. Make sure that port security is enabled on the interface that you are configuring.
To verify the configuration, see the Verifying the Port Security Configuration section on
page 11-18.
To enable port security on the interface, see the Enabling or Disabling Port Security on a Layer
11-10
OL-22823-01
Chapter 11
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
SUMMARY STEPS
1. 2. 3. 4. 5.
config t interface type number no switchport port-security mac-address address [vlan vlan-ID] show running-config port-security copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Places you into Interface Configuration mode for the specified interface.
Step 3
no switchport port-security mac-address address Example: n1000v(config-if)# no switchport port-security mac-address 0019.D2D0.00AE
Removes the MAC address from port security on the current interface.
Step 4
Step 5
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
11-11
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
SUMMARY STEPS
1. 2. 3.
config t clear port-security dynamic {interface vethernet number | address address} [vlan vlan-ID] show port-security address
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
clear port-security dynamic {interface vethernet number | address address} [vlan vlan-ID] Example: n1000v(config)# clear port-security dynamic interface vethernet 36
Removes dynamically learned, secure MAC addresses, as specified. If you use the interface keyword, you remove all dynamically learned addresses on the interface that you specify. If you use the address keyword, you remove the single, dynamically learned address that you specify. Use the vlan keyword if you want to further limit the command to removing an address or addresses on a particular VLAN.
Step 3
Note
When you specify a maximum number of addresses that is less than the number of addresses already learned or statically configured on the interface, the command is rejected. To reduce the number of addresses learned by the sticky or static methods, see the Removing a Static or a Sticky Secure MAC Address from an Interface section on page 11-10. To remove all addresses learned by the dynamic method, use the shutdown and no shutdown commands to restart the interface.
11-12
OL-22823-01
Chapter 11
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
BEFORE YOU BEGIN
Before beginning this procedure, you must know or do the following:
You are logged in to the CLI in EXEC mode. The Secure MACs share the L2 Forwarding Table (L2FT). The forwarding table for each VLAN can hold up to 1024 entries. By default, an interface has a maximum of one secure MAC address. VLANs have no default maximum number of secure MAC addresses. Make sure that port security is enabled on the interface that you are configuring.
To verify the configuration, see the Verifying the Port Security Configuration section on
page 11-18.
To enable port security on the interface, see the Enabling or Disabling Port Security on a Layer
SUMMARY STEPS
1. 2. 3. 4. 5.
config t interface type number [no] switchport port-security maximum number [vlan vlan-ID] show running-config port-security copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Places you into Interface Configuration mode for the specified interface.
Step 3
[no] switchport port-security maximum number [vlan vlan-ID] Example: n1000v(config-if)# switchport port-security maximum 425
Configures the maximum number of MAC addresses that can be learned or statically configured for the current interface. The highest valid number is 4096. The no option resets the maximum number of MAC addresses to the default, which is 1. If you want to specify the VLAN that the maximum applies to, use the vlan keyword.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
11-13
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 4
show running-config port-security Example: n1000v(config-if)# show running-config port-security
Step 5
You are logged in to the CLI in EXEC mode. By default, the aging time is 0 minutes, which disables aging. Absolute aging is the default aging type. Make sure that port security is enabled on the interface that you are configuring.
To verify the configuration, see the Verifying the Port Security Configuration section on
page 11-18.
To enable port security on the interface, see the Enabling or Disabling Port Security on a Layer
SUMMARY STEPS
1. 2. 3. 4. 5. 6.
config t interface type number [no] switchport port-security aging type {absolute | inactivity} [no] switchport port-security aging time minutes show running-config port-security copy running-config startup-config
11-14
OL-22823-01
Chapter 11
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Places you into Interface Configuration mode for the specified interface.
Step 3
[no] switchport port-security aging type {absolute | inactivity} Example: n1000v(config-if)# switchport port-security aging type inactivity
Configures the type of aging that the device applies to dynamically learned MAC addresses. The no option resets the aging type to the default, which is absolute aging. Configures the number of minutes that a dynamically learned MAC address must age before the address is dropped. The maximum valid minutes is 1440. The no option resets the aging time to the default, which is 0 minutes (no aging). Displays the port security configuration.
Step 4
[no] switchport port-security aging time minutes Example: n1000v(config-if)# switchport port-security aging time 120
Step 5
Step 6
You are logged in to the CLI in EXEC mode. The default security action is to shut down the port on which the security violation occurs. You can configure the following interface responses to security violations:
protectDrops packets with unknown source addresses until you remove a sufficient number
of secure MAC addresses to drop below the maximum value and causes the SecurityViolation counter to increment.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
11-15
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
shutdown(the default) Puts the interface into the error-disabled state immediately and sends
an SNMP trap notification. For more information, see the Security Violations and Actions section on page 11-4.
Make sure that port security is enabled on the interface that you are configuring.
To verify the configuration, see the Verifying the Port Security Configuration section on
page 11-18.
To enable port security on the interface, see the Enabling or Disabling Port Security on a Layer
SUMMARY STEPS
1. 2. 3. 4. 5.
config t interface type number [no] switchport port-security violation {protect | restrict | shutdown} show running-config port-security copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Places you into Interface Configuration mode for the specified interface.
Step 3
[no] switchport port-security violation {protect | restrict | shutdown} Example: n1000v(config-if)# switchport port-security violation protect
Configures the security violation action for port security on the current interface. The no option resets the violation action to the default, which is to shut down the interface.
protect: Drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value. restrict: Drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value and increments the SecurityViolation counter. shutdown: (the default) Puts the interface into the error-disabled state immediately and sends an SNMP trap notification.
11-16
OL-22823-01
Chapter 11
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 4
show running-config port-security Example: n1000v(config-if)# show running-config port-security
Step 5
You are logged in to the CLI in EXEC mode. To recover an interface manually from the error-disabled state, you must enter the shutdown command and then the no shutdown command . For more information, see the Security Violations and Actions section on page 11-4.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t interface type number errdisable recovery cause psecure-violation errdisable recovery interval seconds show interface type number
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Places you into Interface Configuration mode for the specified interface.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
11-17
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 3
Purpose Enables timed automatic recovery of the specified port that is disabled for port security violation.
Step 4
Step 5
For detailed information about the fields in the output from this command, see the Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4).
11-18
OL-22823-01
Chapter 11
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Additional References
For additional information related to implementing port security, see the following sections:
Related Documents
Related Topic Layer 2 switching Port security commands: complete command syntax, command modes, command history, defaults, usage guidelines, and examples Document Title Cisco Nexus 1000V Layer 2 Switching Configuration Guide, Release 4.2(1)SV1(4) Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4)
Standards
Standards Title No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
11-19
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
11-20
OL-22823-01
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
C H A P T E R
12
Information About DHCP Snooping, page 12-1 Prerequisites for DHCP Snooping, page 12-3 Guidelines and Limitations, page 12-3 Default Settings, page 12-4 Configuring DHCP Snooping, page 12-4 Verifying the DHCP Snooping Configuration, page 12-16 Monitoring DHCP Snooping, page 12-16 Example Configuration for DHCP Snooping, page 12-16 Additional References, page 12-17 Feature History for DHCP Snooping, page 12-17
Overview, page 12-1 Trusted and Untrusted Sources, page 12-2 DHCP Snooping Binding Database, page 12-2
Overview
DHCP snooping acts like a firewall between untrusted hosts and trusted DHCP servers by doing the following:
Validates DHCP messages received from untrusted sources and filters out invalid response messages from DHCP servers. Builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addresses. Uses the DHCP snooping binding database to validate subsequent requests from untrusted hosts.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
12-1
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Dynamic ARP inspection (DAI) and IP Source Guard also use information stored in the DHCP snooping binding database. For more information about these features, see Chapter 13, Configuring Dynamic ARP Inspection and Chapter 14, Configuring IP Source Guard. DHCP snooping is enabled globally and per VLAN. By default, DHCP snooping is inactive on all VLANs. You can enable the feature on a single VLAN or a range of VLANs.
Note
For DHCP snooping to function properly, all DHCP servers must be connected to the device through trusted interfaces.
Note
The DHCP snooping binding database is also referred to as the DHCP snooping binding table. DHCP snooping updates the database when the device receives specific DHCP messages. For example, the feature adds an entry to the database when the device receives a DHCPACK message from the server. The feature removes the entry in the database when the IP address lease expires or the device receives a DHCPRELEASE or DHCP DECLINE from the DHCP client or a DHCPNACK from the DHCP server. Each entry in the DHCP snooping binding database includes the MAC address of the host, the leased IP address, the lease time, the binding type, and the VLAN number and interface information associated with the host.
12-2
OL-22823-01
Chapter 12
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You can remove dynamically added entries from the binding database by using the clear ip dhcp snooping binding command. For more information, see the Clearing the DHCP Snooping Binding Database section on page 12-13.
For detailed information about the Relay Agent Information Option, see RFC-3046, DHCP Relay Agent Information Option. To configure the relay agent, see the Relaying Switch and Circuit Information in DHCP procedure on page 12-15.
High Availability
The DHCP snooping binding table and all database entries created on the VEM are exported to the VSM and are persistent across VSM reboots.
A DHCP snooping database is stored on each VEM and can contain up to 1024 bindings. For seamless DHCP snooping, Virtual Service Domain (VSD) service VM ports are trusted ports by default. If you configure these ports as untrusted, this setting is ignored. If the VSM uses the VEM for connectivity (that is, the VSM has its VSM AIPC, management, and inband ports on a particular VEM), these virtual Ethernet interfaces must be configured as trusted interfaces. The connecting interfaces on a device upstream from the Cisco Nexus 1000V must be configured as trusted if DHCP snooping is enabled on the device.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
12-3
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Default Settings
Table 12-1 lists the defaults for DHCP snooping.
Table 12-1 Default DHCP Snooping Parameters
Parameters DHCP feature DHCP snooping global DHCP snooping VLAN DHCP snooping MAC address verification DHCP snooping trust
Default Disabled Disabled Disabled Enabled Trusted for Ethernet interfaces, vEthernet interfaces, and port channels, in the VSD feature. Untrusted for vEthernet interfaces not participating in the VSD feature.
Minimum DHCP Snooping Configuration, page 12-4 Enabling or Disabling the DHCP Feature, page 12-5 Enabling or Disabling DHCP Snooping Globally, page 12-6 Enabling or Disabling DHCP Snooping on a VLAN, page 12-7 Enabling or Disabling DHCP Snooping MAC Address Verification, page 12-8 Configuring an Interface as Trusted or Untrusted, page 12-9 Configuring the Rate Limit for DHCP Packets, page 12-10 Detecting Ports Disabled for DHCP Rate Limit Violation, page 12-11 Recovering Ports Disabled for DHCP Rate Limit Violations, page 12-12 Clearing the DHCP Snooping Binding Database, page 12-13 Relaying Switch and Circuit Information in DHCP, page 12-15
Enable the DHCP feature. For more information, see the Enabling or Disabling the DHCP Feature section on page 12-5. Enable DHCP snooping globally. For more information, see the Enabling or Disabling DHCP Snooping Globally section on page 12-6. Enable DHCP snooping on at least one VLAN. For more information, see the Enabling or Disabling DHCP Snooping on a VLAN section on page 12-7.
12-4
OL-22823-01
Chapter 12
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
By default, DHCP snooping is disabled on all VLANs.
Step 4
Ensure that the DHCP server is connected to the device using a trusted interface. For more information, see the Configuring an Interface as Trusted or Untrusted section on page 12-9.
You are logged in to the CLI in EXEC mode. By default, DHCP is disabled.
SUMMARY STEPS
1. 2. 3. 4.
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
feature dhcp Example: n1000v(config)# feature dhcp Example: n1000v(config)# no feature dhcp
Enables DHCP snooping globally. The no option disables DHCP snooping but preserves an existing DHCP snooping configuration.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
12-5
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 3
show feature Example: n1000v(config)# show feature Feature Name Instance -------------------- -------dhcp-snooping 1 http-server 1 lacp 1 netflow 1 port-profile-roles 1 private-vlan 1 sshServer 1 tacacs 1 telnetServer 1 n1000v(config)#
Step 4
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
By default, DHCP snooping is globally disabled. If DHCP snooping is globally disabled, all DHCP snooping stops and no DHCP messages are relayed. If you configure DHCP snooping and then globally disable it, the remaining configuration is preserved.
SUMMARY STEPS
1. 2. 3. 4.
config t [no] ip dhcp snooping show running-config dhcp copy running-config startup-config
12-6
OL-22823-01
Chapter 12
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Enables DHCP snooping globally. The no option disables DHCP snooping but preserves an existing DHCP snooping configuration. Shows the DHCP snooping configuration.
Step 3
Step 4
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
You are logged in to the CLI in EXEC mode. By default, DHCP snooping is disabled on all VLANs.
SUMMARY STEPS
1. 2. 3. 4.
config t [no] ip dhcp snooping vlan vlan-list show running-config dhcp copy running-config startup-config
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
12-7
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
[no] ip dhcp snooping vlan vlan-list Example: n1000v(config)# ip dhcp snooping vlan 100,200,250-252
Enables DHCP snooping on the VLANs specified by vlan-list. The no option disables DHCP snooping on the VLANs specified. Shows the DHCP snooping configuration.
Step 3
Step 4
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
You are logged in to the CLI in EXEC mode. MAC address verification is enabled by default.
SUMMARY STEPS
1. 2. 3. 4.
config t [no] ip dhcp snooping verify mac-address show running-config dhcp copy running-config startup-config
12-8
OL-22823-01
Chapter 12
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
[no] ip dhcp snooping verify mac-address Example: n1000v(config)# ip dhcp snooping verify mac-address
Enables DHCP snooping MAC address verification. The no option disables MAC address verification.
Step 3
Step 4
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
You are logged in to the CLI in EXEC mode. By default, vEthernet interfaces are untrusted. The only exception is the special vEthernet ports used by other features such as VSD which are trusted Ensure that the vEthernet interface is configured as a Layer 2 interface. For seamless DHCP snooping, DAI, and IP Source Guard, Virtual Service Domain (VSD) service VM ports are trusted ports by default. If you configure these ports as untrusted, this setting is ignored.
SUMMARY STEPS
1. 2.
3. 4.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
12-9
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
5.
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
interface vethernet interface-number Example: n1000v(config)# interface vethernet 3 n1000v(config-if)# port-profile profilename Example: n1000v(config)# port-profile vm-data n1000v(config-port-prof)#
Enters interface configuration mode, where interface-number is the vEthernet interface that you want to configure as trusted or untrusted for DHCP snooping. Enters port profile configuration mode for the specified port profile, where profilename is a unique name of up to 80 characters. Configures the interface as a trusted interface for DHCP snooping. The no option configures the port as an untrusted interface. Shows the DHCP snooping configuration.
Step 3
Step 4
Step 5
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
You are logged in to the CLI in EXEC mode. Ports are put into an errdisabled state if they exceed the limit you set in this procedure for rate of DHCP packets per second. You can configure the rate limit on either the interface or port profile.
SUMMARY STEPS
1. 2.
12-10
OL-22823-01
Chapter 12
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
port-profile profilename
3. 4. 5.
[no] ip dhcp snooping limit rate rate show running-config dhcp copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
interface vethernet interface-number Example: n1000v(config)# interface vethernet 3 n1000v(config-if)# port-profile profilename Example: n1000v(config)# port-profile vm-data n1000v(config-port-prof)#
Enters interface configuration mode, where interface-number is the vEthernet interface for which you want to configure the DHCP packets per second limit. Enters port profile configuration mode for the specified port profile, where profilename is a unique name of up to 80 characters. Configures the limit for the rate of DHCP packets per second (1 - 2048). The no option removes the rate limit. Shows the DHCP snooping configuration.
Step 3
[no] ip dhcp snooping limit rate rate Example: n1000v(config-port-prof)# ip dhcp snooping limit rate 30
Step 4
Step 5
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
You are logged in to the CLI in EXEC mode. A failure to conform to the set rate causes the port to be put into an errdisable state. You must enter the shutdown command and then the no shutdown command to recover an interface manually from the error-disabled state.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
12-11
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
SUMMARY STEPS
1. 2. 3. 4.
config t [no] errdisable detect cause dhcp-rate-limit show running-config dhcp copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
[no] errdisable detect cause dhcp-rate-limit Example: n1000v(config)# errdisable detect cause dhcp-rate-limit
Enables DHCP error-disabled detection. The no option disables DHCP error-disabled detection.
Step 3
Step 4
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
You are logged in to the CLI in EXEC mode. Ports that rate causes the port to be put into an errdisable state. You must enter the shutdown command and then the no shutdown command to recover an interface manually from the error-disabled state.
SUMMARY STEPS
1. 2. 3.
config t [no] errdisable recovery cause dhcp-rate-limit errdisable recovery interval timer-interval
12-12
OL-22823-01
Chapter 12
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
4. 5.
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
[no] errdisable recovery cause dhcp-rate-limit Example: n1000v(config)# errdisable detect cause dhcp-rate-limit
Step 3
Sets the DHCP error-disabled recovery interval, where timer-interval is the number of seconds (30-65535).
Step 4
Step 5
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
Clearing All Binding Entries, page 12-13 Clearing Binding Entries for an Interface, page 12-14
SUMMARY STEPS
1.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
12-13
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
2.
DETAILED STEPS
Command
Step 1
clear ip dhcp snooping binding Example: n1000v# clear ip dhcp snooping binding
Purpose Clears dynamically added entries from the DHCP snooping binding database. Displays the DHCP snooping binding database.
Step 2
show ip dhcp snooping binding Example: n1000v# show ip dhcp snooping binding
You are logged in to the CLI in EXEC mode. You have the following information for the interface:
VLAN ID IP address MAC address
SUMMARY STEPS
1. 2.
clear ip dhcp snooping binding [{vlan vlan-id mac mac-addr ip ip-addr interface interface-id} | vlan vlan-id1 | interface interface-id1] show ip dhcp snooping binding
DETAILED STEPS
Command
Step 1
clear ip dhcp snooping binding [{vlan vlan-id mac mac-addr ip ip-addr interface interface-id} | vlan vlan-id1 | interface interface-id1] Example: n1000v# clear ip dhcp snooping binding vlan 10 mac EEEE.EEEE.EEEE ip 10.10.10.1 interface vethernet 1
Purpose Clears dynamically added entries for an interface from the DHCP snooping binding database.
Step 2
show ip dhcp snooping binding Example: n1000v# show ip dhcp snooping binding
12-14
OL-22823-01
Chapter 12
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You are logged in to the CLI in EXEC mode. For more information, see the following:
Relay Agent Information Option section on page 12-3 RFC-3046, DHCP Relay Agent Information Option.
SUMMARY STEPS
1. 2. 3. 4.
config t [no] ip dhcp snooping information option show runing-config dhcp copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
[no] ip dhcp snooping information option Example: n1000v(config)# ip dhcp snooping information option n1000v(config)#
Configures DHCP to relay the VSM MAC address and vEthernet port information in DHCP packets. Use the no option to remove this configuration.
Step 3
show running-config dhcp Example: n1000v(config)# show running-config dhcp !Command: show running-config dhcp !Time: Fri Dec 17 11:30:22 2010 version ip dhcp service ip dhcp ip dhcp 4.2(1)SV1(4) snooping information option dhcp relay relay information option
n1000v(config)#
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
12-15
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 4
copy running-config startup-config Example: n1000v(config)# copy running-config startup-config
Purpose (Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
For detailed information about these commands, see the Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4).
12-16
OL-22823-01
Chapter 12
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Additional References
For additional information related to implementing DHCP snooping, see the following sections:
Related Documents
Related Topic IP Source Guard Dynamic ARP Inspection DHCP snooping commands: complete command syntax, command modes, command history, defaults, usage guidelines, and examples Document Title Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1)SV1(4), Chapter 14, Configuring IP Source Guard Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1)SV1(4), Chapter 13, Configuring Dynamic ARP Inspection Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4)
Standards
Standards RFC-2131 RFC-3046 Title Dynamic Host Configuration Protocol (http://tools.ietf.org/html/rfc2131) DHCP Relay Agent Information Option (http://tools.ietf.org/html/rfc3046)
Feature Name Relay Agent (Option 82) feature dhcp command DHCP snooping
Releases
Feature Information
4.2(1)SV1(4) You can configure relaying of VSM MAC and port information in DHCP packets. 4.2(1)SV1(4) Command added for enabling DHCP feature globally. 4.0(4)SV1(2) This feature was introduced.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
12-17
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
12-18
OL-22823-01
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
C H A P T E R
13
Information About DAI, page 13-1 Prerequisites for DAI, page 13-4 Guidelines and Limitations, page 13-4 Default Settings, page 13-5 Configuring DAI, page 13-5 Verifying the DAI Configuration, page 13-14 Monitoring DAI, page 13-15 Example DAI Configuration, page 13-15 Additional References, page 13-17 Feature History for DAI, page 13-18
About ARP, page 13-1 About ARP Spoofing Attacks, page 13-2 About DAI and ARP Spoofing, page 13-2 Interface Trust and Network Security, page 13-3
About ARP
ARP provides IP communication within a Layer 2 broadcast domain by mapping an IP address to a MAC address. For example, host B wants to send information to host A but does not have the MAC address of host A in its ARP cache. In ARP terms, host B is the sender and host A is the target. To get the MAC address of host A, host B generates a broadcast message for all hosts within the broadcast domain to obtain the MAC address associated with the IP address of host A. All hosts within the broadcast domain receive the ARP request, and host A responds with its MAC address.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
13-1
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
A C
In Figure 13-1, hosts A, B, and C are connected to the device on interfaces A, B, and C, all of which are on the same subnet. Their IP and MAC addresses are shown in parentheses. For example, host A uses IP address IA and MAC address MA. When host A needs to send IP data to host B, it broadcasts an ARP request for the MAC address associated with IP address IB. When the device and host B receive the ARP request, they add a binding to their ARP caches for a host with the IP address IA and a MAC address MA. When host B responds, the device and host A update their ARP caches with a binding for a host with the IP address IB and the MAC address MB. Host C can spoof host A and B by broadcasting the following forged ARP responses:
one for a host with an IP address of IA and a MAC address of MC one for a host with the IP address of IB and a MAC address of MC.
Host B then uses MC as the destination MAC address for traffic that was intended for IA, which means that host C intercepts that traffic. Likewise, host A and the device use MC as the destination MAC address for traffic intended for IB. Because host C knows the authentic MAC addresses for IA and IB, it can forward the intercepted traffic.
Intercepts all ARP requests and responses on untrusted ports. Verifies that a packet has a valid IP-to-MAC address binding before updating the ARP cache or forwarding the packet. Drops invalid ARP packets.
DAI can determine the validity of an ARP packet based on valid IP-to-MAC address bindings stored in a Dynamic Host Configuration Protocol (DHCP) snooping binding database. This database is built by DHCP snooping when it is enabled on the VLANs and on the device. It may also contain static entries that you have created.
13-2
111750
OL-22823-01
Chapter 13
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
If an ARP packet is received on a trusted interface, the device forwards the packet without any checks. On untrusted interfaces, the device forwards the packet only if it is valid. For more information about trusted interfaces, see the Interface Trust and Network Security, page 13-3. You can enable or disable validation of ARP packets for destination MAC address, source MAC address, and IP address. For more information, see the Validating ARP Packets section on page 13-13.
UntrustedInterfaces that are connected to hosts Packets are validated by DAI. TrustedInterfaces that are connected to devices Packets bypass all DAI validation checks.
With this configuration, all ARP packets that enter the network from a device bypass the security check. No other validation is needed at any other place in the VLAN or in the network. For information about configuring a trusted interface, see the Configuring a Trusted vEthernet Interface section on page 13-6.
Caution
Use the trust state configuration carefully. Configuring interfaces as untrusted when they should be trusted can result in a loss of connectivity. In Figure 13-2, assume that both device A and device B are running DAI on the VLAN that includes host 1 and host 2. If host 1 and host 2 acquire their IP addresses from the DHCP server connected to device A, only device A binds the IP-to-MAC address of host 1. If the interface between device A and device B is untrusted, the ARP packets from host 1 are dropped by device B and connectivity between host 1 and host 2 is lost.
Figure 13-2 ARP Packet Validation on a VLAN Enabled for DAI
DHCP server
Host 1
Host 2
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
186694
13-3
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
If you configure interfaces as trusted when they should be untrusted, you may open a security hole in a network. If device A is not running DAI, host 1 can easily poison the ARP cache of device B (and host 2, if you configured the link between the devices as trusted). This condition can occur even though device B is running DAI. DAI ensures that hosts (on untrusted interfaces) connected to a device that runs DAI do not poison the ARP caches of other hosts in the network; however, DAI does not prevent hosts in other portions of the network from poisoning the caches of the hosts that are connected to a device that runs DAI.
Note
Depending on your network setup, you may not be able to validate a given ARP packet on all devices in the VLAN.
For more information, see IETF Standard RFC-826, An Ethernet Address Resolution Protocol (http://tools.ietf.org/html/rfc826).
DHCP Snooping
The software running on your Cisco Nexus 1000V supports DAI. The VEM feature level is updated to a release that supports DAI. For more information about setting the VEM feature level, see the Cisco Nexus 1000V Software Upgrade Guide, Release 4.2(1)SV1(4).
DAI is an ingress security feature and does not perform any egress checking. DAI is not effective when the host is connected to a device that does not support DAI or that does not have DAI enabled. To prevent attacks that are limited to a single Layer 2 broadcast domain, you should separate a domain with DAI from those without DAI. This separation secures the ARP caches of hosts in the domain with DAI. DAI verifies IP-to-MAC address bindings in incoming ARP requests and ARP responses. If you have not configured static entries, then DHCP snooping must be enabled on the same VLANs on which you configure DAI. For more information, see the Configuring DHCP Snooping section on page 12-4.
13-4
OL-22823-01
Chapter 13
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DAI is supported on vEthernet interfaces and private VLAN ports. If you want DAI to use dynamic IP-MAC address bindings to determine if ARP packets are valid, ensure that DHCP snooping is configured. For more information, see the Configuring DHCP Snooping section on page 12-4). Virtual Service Domain (VSD) service VM ports are trusted ports by default. Even if you configure VSD ports as untrusted, they still appear as trusted ports to DAI.
Default Settings
Table 13-1 lists the DAI defaults.
Table 13-1 Default DAI Settings
Parameters VLAN Trust state of vEthernet interfaces not in a VSD Trust state of vEthernet Interfaces in a VSD Trust state of Ethernet port channels Incoming ARP packet rate limit for untrusted interfaces Incoming ARP packet rate limit for trusted interfaces Rate limit burst interval Detecting and Recovering DAI error-disabled interfaces Validation checks VLAN statistics
Default VLANs are not configured for DAI. Untrusted Trusted Trusted 15 packets per second (pps) Unlimited 1 second Error-disabled detection and recovery is not configured. No checks are performed. ARP request and response statistics.
Configuring DAI
This section includes the following topics:
Configuring a VLAN for DAI, page 13-6 Configuring a Trusted vEthernet Interface, page 13-6 Resetting a vEthernet Interface to Untrusted, page 13-8 Configuring DAI Rate Limits, page 13-9 Resetting DAI Rate Limits to Default Values, page 13-11 Detecting and Recovering Error-Disabled Interfaces, page 13-12 Validating ARP Packets, page 13-13
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
13-5
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You are logged in to the CLI in EXEC mode. By default, VLANs are not configured for DAI. You have already enabled DHCP snooping. For more information, see the Enabling or Disabling the DHCP Feature section on page 12-5. You know which VLANs you want to configure for DAI and they have already been created.
SUMMARY STEPS
1. 2. 3. 4.
config t [no] ip arp inspection vlan list show ip arp inspection vlan list copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t
Example: switch# config t switch(config)#
Step 2
Configures the specified VLAN or list of VLANs for DAI. (Optional) Shows the DAI status for the specified list of VLANs.
Step 3
Step 4
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
13-6
OL-22823-01
Chapter 13
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
BEFORE YOU BEGIN
Before beginning this procedure, you must know or do the following:
You are logged in to the CLI in EXEC mode. By default, vEthernet interfaces are untrusted, unless they are part of a VSD. If an interface is untrusted, all ARP requests and responses are verified for a valid IP-MAC address binding before the local cache is updated and the packet forwarded. If a packet has an invalid IP-MAC address binding, it is dropped. ARP packets received on a trusted interface are forwarded but not checked. You can configure a trusted interface on either of the following:
the interface, itself the existing port profile that the interface is assigned to
If configuring a trusted interface on the port profile, it has already been created and you know its name.
SUMMARY STEPS
1. 2.
3. 4.
[no] ip arp inspection trust show ip arp inspection interface type slot/number show port-profile profilename
5.
DETAILED STEPS
Command
Step 1
config t
Example: switch# config t switch(config)#
Step 2
Places you into the CLI Interface Configuration mode, for the specified vEthernet interface.
port-profile profilename
Example: switch(config)# port-profile vm-data switch(config-port-prof)#
Places you into the CLI Port Profile Configuration mode for the specified port profile.
Step 3
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
13-7
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command ip arp inspection trust
Example: switch(config-port-prof)# ip arp inspection trust
Purpose Configures the interfaces assigned to the port profile as trusted ARP interfaces.
Step 4
(Optional) Displays the trusted state and the ARP packet rate for the specified interface.
(Optional) Displays the port profile configuration including the ARP trusted state. (Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
Step 5
You are logged in to the CLI in EXEC mode. By default, vEthernet interfaces are untrusted, unless they are part of a VSD. If an interface is untrusted, all ARP requests and responses are verified for a valid IP-MAC address binding before the local cache is updated and the packet forwarded. If a packet has an invalid IP-MAC address binding, it is dropped.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t interface vethernet interface-number default ip arp inspection trust show ip arp inspection interface type slot/number copy running-config startup-config
13-8
OL-22823-01
Chapter 13
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t
Example: switch# config t switch(config)#
Step 2
Places you into the CLI Interface Configuration mode, for the specified vEthernet interface.
Step 3
Removes the trusted designation from the interface and returns it to the default untrusted state.
Step 4
(Optional) Displays the trusted state and the ARP packet rate for the specified interface.
Step 5
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
You are logged in to the CLI in EXEC mode. Because of their aggregation, trunk ports should be configured with higher rate limit. Once the rate of incoming packets exceeds the configured rate, the interface is automatically put into an errdisable state. The default DAI rate limits are as follows:
Untrusted interfaces = 15 packets per second Trusted interfaces = unlimited Burst interval = 1 second
You can configure the rate limits for an interface on either of the following:
the interface, itself the existing port profile that the interface is assigned to
If configuring the port profile, it has already been created and you know its name.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
13-9
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
SUMMARY STEPS
1. 2.
3. 4. 5.
ip arp inspection limit {rate pps [burst interval bint] | none} show running-config dhcp copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t
Example: switch# config t switch(config)#
Step 2
Places you into the CLI Interface Configuration mode, for the specified vEthernet interface.
port-profile profilename
Example: switch(config)# port-profile vm-data switch(config-port-prof)#
Places you into the CLI Port Profile configuration mode for the specified port profile.
Step 3
Configures the specified ARP inspection limit on the interface or the port profile as follows:
rate: allowable values are between 1 and 2048 packets per second (pps)
Untrusted interface default = 15 packets per
second
Trusted interface default = unlimited
burst interval: allowable values are between 1 and 15 seconds (default = 1 second). none: unlimited number of packets per second
Step 4
(Optional) Displays the DHCP snooping configuration, including the DAI configuration. (Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
Step 5
13-10
OL-22823-01
Chapter 13
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
You are logged in to the CLI in EXEC mode. The default DAI rate limits are as follows:
Untrusted interfaces = 15 packets per second Trusted interfaces = unlimited Burst interval = 1 second
You can configure the rate limits for an interface on either of the following:
the interface, itself the existing port profile that the interface is assigned to
If configuring the port profile, it has already been created and you know its name.
SUMMARY STEPS
1. 2. 3. 4. 5.
config t interface vethernet interface-number default ip arp inspection limit {rate pps [burst interval bint] | none} show running-config dhcp copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t
Example: switch# config t switch(config)#
Step 2
Places you into the CLI Interface Configuration mode, for the specified vEthernet interface.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
13-11
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 3
Purpose
default ip arp inspection limit {rate pps [burst Removes the configured DAI rate limits from the interval bint] | none} interface and returns them to the default values.
Example: switch(config-if)# default ip arp inspection limit rate
rate:
Untrusted interface default = 15 packets per
second
Trusted interface default = unlimited Step 4
burst interval: default = 1 second none: unlimited number of packets per second
(Optional) Displays the DHCP snooping configuration, including the DAI rate limits. (Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
Step 5
You are logged in to the CLI in EXEC mode. By default, interfaces are not configured for DAI error-disabled recovery. To manually recover an interface from the error-disabled state, use the following command sequence. 1. shutdown 2. no shutdown
SUMMARY STEPS
1. 2. 3. 4. 5. 6.
config t [no] errdisable detect cause arp-inspection [no] errdisable recovery cause arp-inspection errdisable recovery interval timer-interval show running-config | include errdisable copy running-config startup-config
13-12
OL-22823-01
Chapter 13
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
DETAILED STEPS
Command
Step 1
config t
Example: switch# config t switch(config)#
Step 2
Configures the detection of interfaces that have been error-disabled by ARP inspection. The no option disables the detection. Configures the recovery of interfaces that have been error-disabled by ARP inspection.
Step 3
Step 4
Configures the recovery interval for interfaces that have been error-disabled by ARP inspection. timer-interval: allowable values are between 30 and 65535 seconds. (Optional) Displays the errdisable configuration.
Step 5
Step 6
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
You are logged in to the CLI in EXEC mode. You can enable validation of the following, which are disabled by default:
Destination MAC address
Checks the destination MAC address in the Ethernet header against the target MAC address in the ARP body, and drops packets with an invalid MAC address.
IP address
Checks the ARP body for invalid and unexpected IP addresses, including 0.0.0.0, 255.255.255.255, and any IP multicast address. Sender IP addresses are checked in both ARP requests and responses. Target IP addresses are checked only in ARP responses.
Source MAC address
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
13-13
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body for ARP requests and responses, and drops packets with invalid MAC addresses.
SUMMARY STEPS
1. 2. 3. 4.
config t [no] ip arp inspection validate {[src-mac] [dst-mac] [ip]} show running-config dhcp copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t
Example: switch# config t switch(config)#
Step 2
Enables the specified validation and overwrites any existing validation that was previously saved:
You can specify all three of these validations but you must specify at least one. Use the no option to disable a validation.
Step 3
(Optional) Displays the DHCP snooping configuration, including the DAI configuration. (Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
Step 4
13-14
OL-22823-01
Chapter 13
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command show ip arp inspection interface vethernet interface-number show ip arp inspection vlan vlan-ID Purpose Displays the trust state and ARP packet rate for a specific interface. Displays the DAI configuration for a specific VLAN.
For detailed information about command output, see the Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4).
Monitoring DAI
To monitor DAI, use the following commands: Command show ip arp inspection statistics show ip arp inspection statistics vlan clear ip arp inspection statistics Purpose Displays DAI statistics. Displays DAI statistics for a specified VLAN. Clears DAI statistics.
For detailed information about command output, see the Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4).
One VEM is hosting an authentic web server and a DHCP server. The other VEM is hosting a client virtual machine (VM 1) and a virtual machine (VM 2) with a rogue web server. VM 1 is connected to vEthernet interface 3, which is untrusted by default, and belongs to VLAN 1. VM 2 is connected to vEthernet 10 and VLAN 1.
Without DAI enabled, VM 2 can spoof the ARP cache in VM 1 by sending a packet even though an ARP request was not generated. In this case, the packet directs VM 1 to send its traffic to the VM 2 web server instead of the authentic web server. If DAI is enabled when VM2 attempts to spoof the ARP cache in VM1, the unsolicited ARP packet sent by VM 2 is dropped because DAI detects the invalid IP-to-MAC address binding. The attempt to spoof the ARP cache fails, and VM 1 connects to the authentic web server.
Note
DAI depends on the DHCP snooping database to verify IP-to-MAC address bindings in incoming ARP requests and ARP responses. Make sure to enable DHCP snooping to permit ARP packets that have dynamically-assigned IP addresses. For configuration information, see Chapter 12, Configuring DHCP Snooping.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
13-15
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
The following steps are used to configure DAI for this example:
Step 1
Step 2
Check the statistics before and after DAI processes any packets.
n1000v# show ip arp inspection statistics vlan 1 Vlan : 1 ----------ARP Req Forwarded ARP Res Forwarded ARP Req Dropped ARP Res Dropped DHCP Drops DHCP Permits SMAC Fails-ARP Req SMAC Fails-ARP Res DMAC Fails-ARP Res IP Fails-ARP Req IP Fails-ARP Res n1000v#
= = = = = = = = = = =
0 0 0 0 0 0 0 0 0 0 0
If VM 1 sends out two ARP requests with an IP address of 10.0.0.1 and a MAC address of 0002.0002.0002, both requests are permitted, as shown in the following command output:
n1000v# show ip arp inspection statistics vlan 1 Vlan : 1 ----------ARP Req Forwarded ARP Res Forwarded ARP Req Dropped ARP Res Dropped DHCP Drops DHCP Permits SMAC Fails-ARP Req SMAC Fails-ARP Res DMAC Fails-ARP Res IP Fails-ARP Req IP Fails-ARP Res
= = = = = = = = = = =
2 0 0 0 0 2 0 0 0 0 0
If VM 2 tries to send an ARP request with an IP address of 10.0.0.3, the packet is dropped and an error message is logged.
00:12:08: %SW_DAI-4-DHCP_SNOOPING_DENY: 2 Invalid ARPs (Req) on vEthernet3, vlan 1.([0002.0002.0002/10.0.0.3/0000.0000.0000/0.0.0.0/02:42:35 UTC Fri Jul 13 2008])
13-16
OL-22823-01
Chapter 13
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
The statistics display as follows:
n1000v# show ip arp inspection statistics vlan 1 n1000v# Vlan : 1 ----------ARP Req Forwarded ARP Res Forwarded ARP Req Dropped ARP Res Dropped DHCP Drops DHCP Permits SMAC Fails-ARP Req SMAC Fails-ARP Res DMAC Fails-ARP Res IP Fails-ARP Req IP Fails-ARP Res n1000v#
= = = = = = = = = = =
2 0 2 0 2 2 0 0 0 0 0
Additional References
For additional information related to implementing DAI, see the following sections:
Related Documents
Related Topic DHCP snooping DAI and DHCP commands: complete command syntax, command modes, command history, defaults, usage guidelines, and examples Document Title Configuring DHCP Snooping, page 12-1 Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4)
Standards
Standards RFC-826 Title An Ethernet Address Resolution Protocol (http://tools.ietf.org/html/rfc826)
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
13-17
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Releases
Feature Information
13-18
OL-22823-01
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
C H A P T E R
14
Information About IP Source Guard, page 14-1 Prerequisites for IP Source Guard, page 14-2 Guidelines and Limitations, page 14-2 Default Settings, page 14-2 Configuring IP Source Guard, page 14-2 Verifying the IP Source Guard Configuration, page 14-5 Displaying IP Source Guard Bindings, page 14-5 Example Configuration for IP Source Guard, page 14-5 Additional References, page 14-5 Feature History for IP Source Guard, page 14-6
DHCP packets, which DHCP snooping inspects and then forwards or drops, depending upon the results of inspecting the packet. IP traffic from static IP source entries that you have configured in the Cisco Nexus 1000V.
The device permits the IP traffic when DHCP snooping adds a binding table entry for the IP address and MAC address of an IP packet or when you have configured a static IP source entry. The device drops IP packets when the IP address and MAC address of the packet do not have a binding table entry or a static IP source entry. For example, assume that the show ip dhcp snooping binding command displays the following binding table entry:
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
14-1
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
MacAddress ---------00:02:B3:3F:3B:99 IpAddress ---------10.5.5.2 LeaseSec Type VLAN --------- -----------6943 dhcp-snooping 10 Interface --------vEthernet3
If the device receives an IP packet with an IP address of 10.5.5.2, IP Source Guard forward the packet only if the MAC address of the packet is 00:02:B3:3F:3B:99.
You should be familiar with DHCP snooping before you configure IP Source Guard. DHCP snooping is enabled (see the Configuring DHCP Snooping section on page 12-4).
IP Source Guard limits IP traffic on an interface to only those sources that have an IP-MAC address binding table entry or static IP source entry. When you first enable IP Source Guard on an interface, you may experience disruption in IP traffic until the hosts on the interface receive a new IP address from a DHCP server. IP Source Guard is dependent upon DHCP snooping to build and maintain the IP-MAC address binding table or upon manual maintenance of static IP source entries. For more information on DHCP snooping, see Chapter 12, Configuring DHCP Snooping. For seamless IP Source Guard, Virtual Service Domain (VSD) service VM ports are trusted ports by default. If you configure these ports as untrusted, this setting is ignored.
Default Settings
Table 14-1 lists IP Source Guard defaults.
Table 14-1 Default IP Source Guard Parameters
Default Disabled on each interface. None. No static or default IP source entries exist by default.
Enabling or Disabling IP Source Guard on a Layer 2 Interface, page 14-3 Adding or Removing a Static IP Source Entry, page 14-4
14-2
OL-22823-01
Chapter 14
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
By default, IP Source Guard is disabled on all interfaces. Ensure that DHCP snooping is enabled. For more information, see the Enabling or Disabling the DHCP Feature section on page 12-5.
SUMMARY STEPS
1. 2.
3. 4. 5.
[no] ip verify source dhcp-snooping-vlan show running-config dhcp copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: switch# config t switch(config)#
Step 2
interface vethernet interface-number Example: switch(config)# interface vethernet 3 switch(config-if)# port-profile profilename Example: switch(config)# port-profile vm-data switch(config-port-prof)#
Enters interface configuration mode, where interface-number is the vEthernet interface that you want to configure as trusted or untrusted for DHCP snooping. Enters port profile configuration mode for the specified port profile, where profilename is a unique name of up to 80 characters. Enables IP Source Guard on the interface. The no option disables IP Source Guard on the interface.
Step 3
[no] ip verify source dhcp-snooping-vlan Example: switch(config-if)# ip verify source dhcp-snooping vlan
Step 4
(Optional) Displays the running configuration for DHCP snooping, including the IP Source Guard configuration.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
14-3
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Command
Step 5
copy running-config startup-config Example: switch(config-if)# copy running-config startup-config
SUMMARY STEPS
1. 2. 3. 4.
config t [no] ip source binding IP-address MAC-address vlan vlan-ID interface vethernet interface-number show ip dhcp snooping binding [interface vethernet interface-number] copy running-config startup-config
DETAILED STEPS
Command
Step 1
config t Example: switch# config t switch(config)#
Step 2
[no] ip source binding IP-address MAC-address vlan vlan-ID interface vethernet interface-number Example: switch(config)# ip source binding 10.5.22.17 001f.28bd.0013 vlan 100 interface ethernet 3
Creates a static IP source entry for the current interface, or if you use the no option, removes a static IP source entry.
Step 3
show ip dhcp snooping binding [interface vethernet interface-number] Example: switch(config)# show ip dhcp snooping binding interface ethernet 3
(Optional) Displays IP-MAC address bindings for the interface specified, including static IP source entries. Static entries appear with the term static in the Type column. (Optional) Copies the running configuration to the startup configuration.
Step 4
14-4
OL-22823-01
Chapter 14
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
For detailed information about command output, see the Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4).
Additional References
For additional information related to implementing IP Source Guard, see the following sections:
Related Documents
Related Topic Information About DHCP Snooping, page 12-1 IP Source Guard commands: complete command syntax, command modes, command history, defaults, usage guidelines, and examples DHCP snooping commands: complete command syntax, command modes, command history, defaults, usage guidelines, and examples Document Title Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1)SV1(4), Chapter 12, Configuring DHCP Snooping Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4)
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
14-5
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Standards
Standards Title No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
Releases
Feature Information
14-6
OL-22823-01
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
CH A P T E R
15
Information About the HTTP Server, page 15-1 Guidelines and Limitations, page 15-1 Default Setting, page 15-2 Disabling HTTP Server, page 15-2 Verifying the HTTP Configuration, page 15-3 Additional References, page 15-3 Feature History for Disabling the HTTP Server, page 15-4
The HTTP server is enabled by default. VUM will not install VEMs if the HTTP server is disabled. During VEM installation, VUM talks directly to the HTTP server to extract required module information from the VSM. To install VEMs, you must do one of the following:
Use VUM by enabling the HTTP server during VEM installation, and then disabling it after the
The HTTP server must be enabled in order to get the Cisco Nexus 1000V XML plugin from the VSM.
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
15-1
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Default Setting
The HTTP server is enabled by default.
You are logged in to the CLI in EXEC mode. By default, the HTTP server is enabled.
SUMMARY STEPS
1. 2. 3. 4.
DETAILED STEPS
Command
Step 1
config t Example: n1000v# config t n1000v(config)#
Step 2
Step 3
Step 4
copy running-config startup-config Example: n1000v(config)# copy running-config startup-config [########################################] 100% n1000v(config)#
(Optional) Saves the running configuration persistently through reboots and restarts by copying it to the startup configuration.
15-2
OL-22823-01
Chapter 15
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Example: config t no feature http-server
State -------disabled disabled disabled disabled disabled disabled enabled disabled disabled
Additional References
For additional information related to implementing Telnet, see the following sections:
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
15-3
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
Related Documents
Related Topic Complete command syntax, command modes, command history, defaults, usage guidelines, and examples Document Title Cisco Nexus 1000V Command Reference, Release 4.2(1)SV1(4)
Standards
Standards Title No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
15-4
OL-22823-01
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
CH A P T E R
16
Security Feature Active VLANs across all VEMs MAC addresses over VLAN within a VEM MAC addresses per VLAN within a VEM Secure vEths per VSM Secure MACs per VSM Secure MACs per vEth ACLs ACEs per ACL ACL Interfaces NetFlow Policies NetFlow Interfaces SPAN/ERSPAN Sessions Port Security Multicast Groups Virtual Service Domains (VSD) VSD Interfaces
Maximum Limit 2000 32000 4000 2000 8000 1025 128 128
Per DVS Per Host
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
16-1
Chapter 16
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
16-2
OL-22823-01
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
INDEX
A
AAA default settings description guidelines limitations prerequisites services standards
4-1 4-9 6-12 4-8 4-6 4-4 4-1 to 4-4 4-9
example configuration
4-4 4-4
C
Cisco vendor ID
6-3 5-3, 6-3 16-1 8-4 16-1
class-map limits
authentication default
4-4 4-6
TACACS+ server groups verifying configurations aaa authentication command AAA servers FreeRADIUS VSA format access control lists order of application See ACLs. types of accounting default ACLs configuring in port profiles ARP inspection
4-4 4-3 9-2 9-2
D
5-4
TACACS+
description
DHCP binding database See DHCP snooping binding database DHCP feature enabling
12-5
method default
OL-22823-01
IN-1
Index
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
displaying DHCP bindings enabling globally
12-6 12-7 11-17, 12-11, 12-12, 13-12 12-3 12-16
E
enable authentication failure messages port profile Telnet
8-2 13-12 3-6, 3-8 4-7
information about
2-4
relay agent, option 82 data, relaying switch and circuit information, DHCP snooping 12-15 trusted and untrusted interfaces DHCP snooping binding database described entries disable HTTP Telnet
15-2 8-2 12-2 12-2 12-9
F
feature groups creating flow chart configuring AAA FreeRADIUS VSA format for role attributes
5-4 4-5 6-6 2-10
configuring TACACS+
documentation additional publications dynamic ARP inspection additional validation ARP requests
13-1 13-2 13-6, 13-8 13-6 13-13 1-xvii
H
HTTP
15-1 15-2
15-1
I
13-3
IN-2
OL-22823-01
Index
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
interfaces, VSD IP ACLs changing an IP ACL configuring
9-5 to ?? 9-6 9-7 3-1
P
password checking strength passwords information about policy map limits port ACLs applying port profiles ACL
9-12, 10-8 9-11, 9-13 3-5 16-1 2-3 2-5, 2-6
port-profile command
9-9 9-14
enabling on an interface
14-4 11-4 11-9
L
limits, configuration login AAA, about login authentication configuring console methods
4-6
6-2 2-7
4-1
R
RADIUS
M
MAC ACLs changing a MAC ACL creating a MAC ACL description
10-1 10-5 9-13, 10-9 10-3 10-2
configuring servers
prerequisites
5-10 5-22
O
option 82, DHCP snooping
12-15
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
IN-3
Index
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
RADIUS Servers retries to a single server RADIUS servers configuring accounting attributes configuring a timeout interval configuring dead-time intervals configuring hosts configuring keys
5-6 5-8 5-18 5-16, 5-17 5-14 5-16, 5-17 5-15
8-5 3-8
generating server key-pairs state enabled command statistics RADIUS servers TACACS+
6-22 5-22 3-6, 3-8
1-3, 7-1
3-7 3-5
example configurations
T
TACACS+
13-12
configuring
6-5 to ?? 6-16
configuring global timeout interval configuring shared keys default settings description disabling enabling
6-8 6-22 6-4 6-1 to ?? 6-9
relay agent, DHCP snooping remote session, Telnet IPv4 roles example configuration information about interface access limitations verifying
2-4 2-15 2-13 2-1 2-12
2-15
displaying statistics
6-8
example configurations global preshared keys guidelines limitations prerequisites preshared key
6-4 6-4 6-4 6-2
6-23 6-2
VLAN access
S
Secure Shell default settings
7-3 4-1 4-4
6-15
security services, about server groups, description service policy limits service-port command services, AAA, about session, clearing Telnet
configuring dead-time interval configuring periodic monitoring configuring server groups configuring TCP ports
6-12 6-18
IN-4
OL-22823-01
Index
S e n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
displaying statistics monitoring TCP ports TACACS+ servers Telnet
3-1, 8-1 8-4 6-18 6-3 6-22
V
vendor ID, Cisco
6-3 6-3
vendor-specific attributes (VSAs) virtual service domain create display interfaces port profile
3-8 3-8 3-1
clearing a session clear session default setting enable, disable prerequisites for start IPv4 session Telnet command timeout TACACS+
6-16 8-4 8-3
information about
3-4
virtual -service-domain command virtual-service-domain command vmware port-group command VSAs protocol options
5-3 3-5
3-8 3-5
U
user access defaults verifying user account prohibited words user accounts configuring guidelines
2-6 2-4 2-1 2-7 2-4 2-15
example configuration
2-15
information about limitations roles guidelines user names information about user roles creating
2-8 2-4
2-3
2-10
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) OL-22823-01
IN-5
Index
Se n d d o c u m e n t c o m m e n t s t o n ex u s 1 k - d o c f e e d b a ck @ c i s c o . c o m .
IN-6
OL-22823-01