omnivista-upam-zertifikate-authentifizierung-eap-tls
Unterschiede
Hier werden die Unterschiede zwischen zwei Versionen angezeigt.
| Beide Seiten der vorigen RevisionVorhergehende ÜberarbeitungNächste Überarbeitung | Vorhergehende Überarbeitung | ||
| omnivista-upam-zertifikate-authentifizierung-eap-tls [2021/10/12 13:37] – simon | omnivista-upam-zertifikate-authentifizierung-eap-tls [2024/06/09 10:29] (aktuell) – Externe Bearbeitung 127.0.0.1 | ||
|---|---|---|---|
| Zeile 43: | Zeile 43: | ||
| {{ : | {{ : | ||
| + | |||
| + | |||
| + | === Authentication Strategy (UPAM > Authentication) === | ||
| + | In der Authenticatino Strategy gebe ich an, mit welcher Datenbank der Client abgeglichen werden soll. in unserem Fall wollen wir mit dem UPAM abgleichen, weil dort das Zertifikat liegt. (Local Database) | ||
| + | Ebenfalls geben wir hier das " | ||
| + | |||
| + | {{ : | ||
| + | |||
| + | |||
| + | === Access Policy (UPAM > Authentication) === | ||
| + | In der Access Policy werden die Clients gefiltert. Dort gibt es verschiedene Möglichkeiten. Zum Beispiel kann ich nach einen Authentication Typ (802.1x oder MAC) und/oder nach dem Network Type (Wireless oder Wired) filtern. Anschließend muss noch angegeben werden, welche Authentication Strategy für die Clients mit dem entsprechenden Filter verwendet werden soll. | ||
| + | |||
| + | |||
| + | {{ : | ||
| + | |||
| + | |||
| + | ==== Switchkonfiguration ==== | ||
| + | Hier ein Beispiel, wie eine Switchkonfiguration aussehen kann. | ||
| + | < | ||
| + | ! DA-UNP: | ||
| + | unp profile " | ||
| + | unp profile " | ||
| + | unp profile " | ||
| + | unp profile " | ||
| + | unp port-template 802.1x_UPAM direction both aaa-profile " | ||
| + | unp port-template 802.1x_UPAM 802.1x-authentication | ||
| + | unp port 1/1/1 port-type bridge | ||
| + | unp port 1/1/1 port-template 802.1x_UPAM | ||
| + | |||
| + | ! AAA: | ||
| + | aaa radius-server " | ||
| + | aaa profile " | ||
| + | aaa profile " | ||
| + | aaa profile " | ||
| + | aaa profile " | ||
| + | aaa profile " | ||
| + | aaa profile " | ||
| + | aaa profile " | ||
| + | </ | ||
| + | |||
| + | |||
| + | ==== Überprüfung der Clients==== | ||
| + | Um zu gucken, ob die Clients richtig authentifiziert sind, kann der Authentication Record benutzt werden. | ||
| + | |||
| + | {{ : | ||
| + | |||
| + | Eine weitere Variante ist die Kontrolle auf dem Switch. | ||
| + | |||
| + | < | ||
| + | OS6360-HOME --> show unp user details | ||
| + | Port: 1/1/1 | ||
| + | MAC-Address: | ||
| + | SAP = -, | ||
| + | Service ID = -, | ||
| + | VNID = -, | ||
| + | VPNID = -, | ||
| + | ISID = -, | ||
| + | Access Timestamp | ||
| + | User Name = ALCIPT, | ||
| + | IP-Address | ||
| + | Vlan = 19, | ||
| + | Authentication Type = 802.1x, | ||
| + | Authentication Status | ||
| + | Authentication Failure Reason | ||
| + | Authentication Retry Count = 0, | ||
| + | Authentication Server IP Used = 192.168.26.10, | ||
| + | Authentication Server Used = UPAMRadiusServer, | ||
| + | Server Reply-Message | ||
| + | Profile | ||
| + | Profile Source | ||
| + | Profile From Auth Server | ||
| + | Session Timeout | ||
| + | Classification Profile Rule = -, | ||
| + | Role = -, | ||
| + | Role Source | ||
| + | User Role Rule = -, | ||
| + | Restricted Access | ||
| + | Location Policy Status | ||
| + | Time Policy Status | ||
| + | QMR Status | ||
| + | Redirect Url = -, | ||
| + | SIP Call Type = Not in a call, | ||
| + | SIP Media Type = None, | ||
| + | Applications | ||
| + | Encap Value = -, | ||
| + | Rule ID = 1, | ||
| + | |||
| + | Total users : 1 | ||
| + | </ | ||
| + | |||
| + | |||
| + | ==== Beispiel für eine Fail-Authentication==== | ||
| + | |||
| + | {{ : | ||
| + | |||
| + | < | ||
| + | OS6360-HOME --> show unp user details | ||
| + | Port: 1/1/1 | ||
| + | MAC-Address: | ||
| + | SAP = -, | ||
| + | Service ID = -, | ||
| + | VNID = -, | ||
| + | VPNID = -, | ||
| + | ISID = -, | ||
| + | Access Timestamp | ||
| + | User Name = ALCIPT, | ||
| + | IP-Address | ||
| + | Vlan = 10, | ||
| + | Authentication Type = 802.1x, | ||
| + | Authentication Status | ||
| + | Authentication Failure Reason | ||
| + | Authentication Retry Count = 0, | ||
| + | Authentication Server IP Used = 192.168.26.10, | ||
| + | Authentication Server Used = UPAMRadiusServer, | ||
| + | Server Reply-Message | ||
| + | Profile | ||
| + | Profile Source | ||
| + | Profile From Auth Server | ||
| + | Session Timeout | ||
| + | Classification Profile Rule = -, | ||
| + | Role = -, | ||
| + | Role Source | ||
| + | User Role Rule = -, | ||
| + | Restricted Access | ||
| + | Location Policy Status | ||
| + | Time Policy Status | ||
| + | QMR Status | ||
| + | Redirect Url = -, | ||
| + | SIP Call Type = Not in a call, | ||
| + | SIP Media Type = None, | ||
| + | Applications | ||
| + | Encap Value = -, | ||
| + | Rule ID = 1, | ||
| + | |||
| + | Total users : 1 | ||
| + | </ | ||
omnivista-upam-zertifikate-authentifizierung-eap-tls.1634045836.txt.gz · Zuletzt geändert: (Externe Bearbeitung)
