<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Switch security enforcement - authenticator in local mode in Security e-Series</title>
    <link>https://community.hpe.com/t5/security-e-series/switch-security-enforcement-authenticator-in-local-mode/m-p/6059173#M212</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to find a good way to enforce my network security.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our network is a grid of about 15 switches, with spanning tree active.&lt;/P&gt;&lt;P&gt;So we have always a minimum of two paths to communicate from one switch to another.&lt;/P&gt;&lt;P&gt;We use 5 vlans, deployed on all the switches.&lt;/P&gt;&lt;P&gt;The links between the switches are fiber or ethernet gigabit.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;We have a dedicated Management vlan.&lt;/P&gt;&lt;P&gt;We have a radius server for authentication on the switches&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I can't be sure that nobody will gain physical access to my switch, or won't connect his own computer on one of my network plugs somewhere in the plant.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So we have already disabled the clear and reset buttons on the switches.&lt;/P&gt;&lt;P&gt;And we are going to use port-access + radius + 802.1x to control every port connected to a public plug.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I would like to securize the links between the switches :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If someone gain physical access to the switch, disconnect an inter-switch link and connect a computer on the port&lt;/P&gt;&lt;P&gt;he may be able to see all my vlans, and because of spanning tree, he get a full access on my network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I tried the 802.1x authentication on those inter-switches ports.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It works, but only with a radius server. So it works only in one direction.&lt;/P&gt;&lt;P&gt;If you connect a computer on the supplicant port, you get access to the switch.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;and because the supplicant does not have an access to the radius, I can't make it acting as authenticator.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So the good way to do this is to use the local authentication for 802.1x : you don't need any connection to any device prior to establish the connection to the network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But with none of my switches (2510, 2610, 2910 or 2530) I was able to use local authentication. I've tried with my Manager and Operator credentials, changing or not the usernames, I always get a never ending authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As some forums mention it the&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;password port-access&lt;/STRONG&gt; command is not available in the switches,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So it is impossible to configure correctly the authenticator in local mode.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So IMHO there is no way to get a strict control over the inter-switches ports if someone get a physical access to a switch.&lt;/P&gt;&lt;P&gt;I can't use protected ports in inter-switches links because they are limited to 8 mac-addresses learned.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Definitely, I think that 802.1x + local authentication is the only way.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does someone have an idea on howto do this ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Damien&lt;/P&gt;</description>
    <pubDate>Wed, 08 May 2013 16:05:07 GMT</pubDate>
    <dc:creator>Damduq</dc:creator>
    <dc:date>2013-05-08T16:05:07Z</dc:date>
    <item>
      <title>Switch security enforcement - authenticator in local mode</title>
      <link>https://community.hpe.com/t5/security-e-series/switch-security-enforcement-authenticator-in-local-mode/m-p/6059173#M212</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to find a good way to enforce my network security.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our network is a grid of about 15 switches, with spanning tree active.&lt;/P&gt;&lt;P&gt;So we have always a minimum of two paths to communicate from one switch to another.&lt;/P&gt;&lt;P&gt;We use 5 vlans, deployed on all the switches.&lt;/P&gt;&lt;P&gt;The links between the switches are fiber or ethernet gigabit.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;We have a dedicated Management vlan.&lt;/P&gt;&lt;P&gt;We have a radius server for authentication on the switches&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I can't be sure that nobody will gain physical access to my switch, or won't connect his own computer on one of my network plugs somewhere in the plant.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So we have already disabled the clear and reset buttons on the switches.&lt;/P&gt;&lt;P&gt;And we are going to use port-access + radius + 802.1x to control every port connected to a public plug.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I would like to securize the links between the switches :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If someone gain physical access to the switch, disconnect an inter-switch link and connect a computer on the port&lt;/P&gt;&lt;P&gt;he may be able to see all my vlans, and because of spanning tree, he get a full access on my network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I tried the 802.1x authentication on those inter-switches ports.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It works, but only with a radius server. So it works only in one direction.&lt;/P&gt;&lt;P&gt;If you connect a computer on the supplicant port, you get access to the switch.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;and because the supplicant does not have an access to the radius, I can't make it acting as authenticator.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So the good way to do this is to use the local authentication for 802.1x : you don't need any connection to any device prior to establish the connection to the network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But with none of my switches (2510, 2610, 2910 or 2530) I was able to use local authentication. I've tried with my Manager and Operator credentials, changing or not the usernames, I always get a never ending authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As some forums mention it the&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;password port-access&lt;/STRONG&gt; command is not available in the switches,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So it is impossible to configure correctly the authenticator in local mode.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So IMHO there is no way to get a strict control over the inter-switches ports if someone get a physical access to a switch.&lt;/P&gt;&lt;P&gt;I can't use protected ports in inter-switches links because they are limited to 8 mac-addresses learned.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Definitely, I think that 802.1x + local authentication is the only way.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does someone have an idea on howto do this ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Damien&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2013 16:05:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/switch-security-enforcement-authenticator-in-local-mode/m-p/6059173#M212</guid>
      <dc:creator>Damduq</dc:creator>
      <dc:date>2013-05-08T16:05:07Z</dc:date>
    </item>
  </channel>
</rss>

