Wired Intelligent Edge

last person joined: yesterday 

Bring performance and reliability to your network with the HPE Aruba Networking Core, Aggregation, and Access layer switches. Discuss the latest features and functionality of your switching devices, and find ways to improve security across your network to bring together a mobile-first solution
Expand all | Collapse all

RADIUS Configuration for Management Authentication for the MAS Switches

This thread has been viewed 4 times
  • 1.  RADIUS Configuration for Management Authentication for the MAS Switches

    Posted Jul 17, 2013 07:39 AM

    Hello All,

     

    I've never had to configure Management Authentication for management access to the MAS Switches via RADIUS. So I wanted to confirm if I am on the right track as regards my thoughts towards configuring this.

     

    So, based on the fact that they will be using RADIUS, will I have to build a Role for example for IT. Then an ACL giving them access to the Management VLAN (to manage the MAS Switches). Then configure the RADIUS Servers and associate them to a Server Group which will be applied to the "aaa authentication mgmt" Profile. Is this correct so far?

     

    Secondly, can I use Server Derivation Policy associated to the Server Group configuration and can my Attribute from AD be "Class" which when successfully authenticated, assigns them to the Role I created.

     

    Will this work for Management Authentication?

     

    I know for User Authentication, this would be the norm but wanted to be sure about Management Authentication.

     

    Look forward to your responses.

     



  • 2.  RE: RADIUS Configuration for Management Authentication for the MAS Switches

    Posted Jul 17, 2013 04:50 PM

    Any ideas anyone?



  • 3.  RE: RADIUS Configuration for Management Authentication for the MAS Switches
    Best Answer

    EMPLOYEE
    Posted Jul 17, 2013 05:22 PM

    Hello,

    Unlike user authentication where you create user-roles, management authentication uses 4 pre-defined roles:

     

    The roles are defined as follows:

    • root: permits access to all management functions on the Mobility Access Switch
    • read-only: permits access to CLI show commands or WebUI monitoring pages only
    • guest-provisioning: permits access to adding and configuring guest users in the Mobility Access Switch’s internal database only
    • network-operations: permits access to Monitoring pages in the WebUI and the CLI commands thatare useful for monitoring the Mobility Access Switch.

    These roles can be passed back using the Aruba VSA (Aruba-Admin-Role) or a standard RADIUS attribute and a server derivation rule will need to be used to map to the aforementioned roles. The latter is probably what you want to use given your application and yes it would be part of the server-group that is associated to the "aaa authentication mgmt" profile.

     

    As a side note, this is the same for Mobility Controlles too.

     

    I'm not quite sure what you mean by "Then an ACL giving them access to the Management VLAN (to manage the MAS Switches)." It is assumed that if they are in the management authentication process, they already have connectivity to the switch through at least one of these connection methods, ssh, telnet, webUI, or console.

     

    Best regards,

     

    Madani



  • 4.  RE: RADIUS Configuration for Management Authentication for the MAS Switches

    Posted Jul 17, 2013 05:29 PM

    @madjali wrote:

    Hello,

    Unlike user authentication where you create user-roles, management authentication uses 4 pre-defined roles:

     

    The roles are defined as follows:

    • root: permits access to all management functions on the Mobility Access Switch
    • read-only: permits access to CLI show commands or WebUI monitoring pages only
    • guest-provisioning: permits access to adding and configuring guest users in the Mobility Access Switch’s internal database only
    • network-operations: permits access to Monitoring pages in the WebUI and the CLI commands thatare useful for monitoring the Mobility Access Switch.

    These roles can be passed back using the Aruba VSA (Aruba-Admin-Role) or a standard RADIUS attribute and a server derivation rule will need to be used to map to the aforementioned roles. The latter is probably what you want to use given your application and yes it would be part of the server-group that is associated to the "aaa authentication mgmt" profile.

     

    As a side note, this is the same for Mobility Controlles too.

     

    I'm not quite sure what you mean by "Then an ACL giving them access to the Management VLAN (to manage the MAS Switches)." It is assumed that if they are in the management authentication process, they already have connectivity to the switch through at least one of these connection methods, ssh, telnet, webUI, or console.

     

    Best regards,

     

    Madani


    Thx Madani.

     

    So I guess I can use the "Class" Attribute (for example in a Group called "IT" in AD) and then have my Server Derivation policy map this "Class" Attribute to the "root" role. Correct?

     

     

     

     



  • 5.  RE: RADIUS Configuration for Management Authentication for the MAS Switches

    EMPLOYEE
    Posted Jul 17, 2013 05:34 PM

    Yup, that should work just fine.

     

    Madani



  • 6.  RE: RADIUS Configuration for Management Authentication for the MAS Switches

    Posted Jul 17, 2013 05:35 PM

    Awesome!!!!