Manual Chapter :
Management Access
Applies To:
Show VersionsARX
- 6.3.0
Use the authentication command to set a primary, secondary, or tertiary authentication service for the current management-access point. Use the no form of the command to remove an authentication service. | |
primary | secondary | tertiary is a required choice for setting the precedence of this authentication service: primary is the preferred authentication service, secondary is the authentication service to be used if the primary service fails, and tertiary is used if the secondary fails, too. active-directory | radius | local is another required choice, for setting the authentication type. active-directory authenticates through the externally-configured Active Directory. (You can use the active-directory update seed-domain command to automatically discover the Active Directory (AD) and all of its Domain Controllers.) This option allows Windows clients with sufficient privileges (see below) to log in with their Windows credentials. radius authenticates using a RADIUS (Remote Authentication Dial-In User Service) server on the network. local authenticates using services local to the ARX. | |
Use the show management access command to show the current configuration mapping of authentication services to management-access points. To remove an authentication service with no authentication, you must remove the lowest-precedence service first. For example, if you have a management service configured with primary, secondary, and tertiary authentication, you must remove the tertiary authentication service before you can remove the secondary service. | |
The active-directory option requires additional configuration: you must also identify Windows-user groups with sufficient privileges for administrative access. Use the group command to create a group with the same name as the desired Windows group, then use windows-domain (gbl-group) to declare a domain for that group, and finally use the role command to add one or more administrative roles for that group. For example, you could create a Domain Admins group in the medarch.org domain and give it highly-privileged roles, such as storage-engineer and crypto-officer. As another example, you could create a Domain Users group with the lesser role of operator. | |
Before you configure RADIUS authentication, use the show radius-server command to verify that a RADIUS server is properly configured. To insure against RADIUS-server failures, we recommend that you configure a secondary local service behind any primary RADIUS service. | |
A client application can access the ARX API to make queries about the ARX configuration and state. These queries come through one of two management access points, http-api or https-api. Each query from the client application results in a separate authentication. We recommend using local authentication only for the API access points; active-directory or radius authentication may create an excessive load on your domain controllers (for active-directory) or RADIUS server. If you must duplicate accounts in more than one database, we recommend using the same password for all of them. | |
bstnA(cfg)# management access https bstnA(cfg-mgmt-access[HTTPS])# authentication primary active-directory bstnA(cfg-mgmt-access[Telnet])# no authentication secondary | |
Most RADIUS servers listen at a well-known port. By default, the ARX sends all RADIUS traffic to that port. Use the auth-port command to change the destination-port number for outbound RADIUS traffic. Use the no form of the command to reset the port number to the default. | |
port-number (1024-65535) is the destination-port number at the RADIUS server. | |
bstnA(gbl)# radius-server 192.168.25.207 bstnA(gbl-radius[192.168.25.207])# auth-port 5555 | |
Use the clear session command to end a current CLI or GUI user session on the ARX. | |
login-id (1-128 characters) is the ID of the session to disconnect. The show sessions command shows a list of valid IDs. | |
If you choose the login ID for the current CLI session, a prompt warns you that you will be disconnected if you proceed. Enter yes to clear the CLI session and disconnect. Use the show sessions command to view the list of current user sessions. | |
bstnA# clear session 25250 bstnA# clear session F8DAB350CE624E50AD767A717E931826 | |
Use this command to clear all login statistics, shown in the show statistics authentication output. | |
Use the show statistics authentication command to view the number of successful and failed login attempts. This command clears all of those counters. | |
bstnA# clear statistics authentication | |
Use the key command to set the key (password or shared secret) on the ARX to match the key on the RADIUS server. The switch and its RADIUS server must have identical keys. Use the no form of the command to erase the key. Erasing the key disables authentication at the current RADIUS server. | |
The CLI challenges you for the key, and you must re-enter it at the Validate Key prompt. See the example below. | |
bstnA(gbl)# radius-server 192.168.25.201 Key: $3cretPa$$w0rd Validate Key: $3cretPa$$w0rd | |
Each of these services is gated by an authentication service. Use the management access command to start configuring authentication service(s) for a management-access point. Use the no form of the command to remove all authentication services from a management-access point, thus shutting down access. | |
You can use this command to start provisioning the management-IP interfaces that accept these communication protocols, and the authentication services (Active Directory, RADIUS, or local) to be used. This command puts you into cfg-mgmt-access mode, where you use the permit command to permit access through one or more management IPs. You can also use the authentication command to configure a primary, secondary, and/or tertiary authentication service. Use the show management access command to show the current configuration mapping of access points to their authentication services and available interfaces. | |
where arx-management-ip is either the out-of-band management-IP address (interface mgmt) or an in-band (VLAN) management-ip address (interface vlan). The permit command determines which of these address types are available for access. Use show interface mgmt and/or show interface vlan to find the IP addresses for each interface. where arx-management-ip is a valid management IP, as described above. You can use the show statistics api command to find usage statistics for the API. | |
bstnA(cfg)# management access console bstnA(cfg)# management access all bstnA(cfg)# no management access telnet bstnA(cfg)# ... | |
Use the permit command to allow access to the current management-access point. You can permit access through the out-of-band MGMT interface, any in-band (VLAN) interface, or all management interfaces. Use no permit to deny access. | |
vlan | mgmt | all is a required choice: vlan permits (or denies) access through any in-band (VLAN) management interface. Use the show interface vlan command to see all in-band management interfaces. mgmt permits or denies access through the out-of-band management interface, labeled MGMT on the front panel. Use the show interface mgmt command to see the configuration for this interface. This option is unavailable on the ARX-VE, which has no out-of-band management interface. This option also may not apply to the ARX-1500 or ARX-2500, where the out-of-band management interface may be re-purposed as a standard client/server port (see the documentation for interface mgmt). all permits or denies access through all of the above. | |
Use show management access to see which management-access points are currently available. | |
bstnA(cfg)# management access telnet bstnA(cfg-mgmt-access[Telnet])# permit all bstnA(cfg)# management access ssh bstnA(cfg-mgmt-access[SSH])# no permit mgmt | |
Use the radius-server command to configure/identify a RADIUS server as an authentication provider for the ARX. You can use this command multiple times to configure multiple RADIUS servers. Use the no form of the command to remove one RADIUS-server configuration. | |
hostname-or-ip-address (1-128 characters or an IP address) is the hostname or IP address of a RADIUS server. | |
This command places you in gbl-radius mode. From gbl-radius mode, use the key (gbl-radius) command to enter the shared-secret from the RADIUS server. You can change the timeout and/or retry interval with the timeout (gbl-radius) and retries (gbl-radius) commands. If the RADIUS server listens at a port other than the well-known port, you can use the auth-port (gbl-radius) command to adjust the port configuration. To use a RADIUS server, you must configure the server itself as well as the ARX. For details about configuring the external RADIUS server, see Chapter 8, Configuring Management Access, in the ARX® CLI Network-Management Guide. | |
Important: Before you remove a RADIUS server through the no command, ensure a backup authentication method is in place for management services. | |
bstnA(gbl)# radius-server 192.168.25.201 | |
Use the retries command to change the connection-retry interval for communication with RADIUS servers. Use the no form of the command to reset the retry interval to the default. | |
bstnA(gbl)# radius-server 192.168.25.207 bstnA(gbl-radius[192.168.25.207])# retries 4 | |
Use the show management access command to show the authentication services configured for system management. | |
Service is Console, Telnet, SSH, HTTP, HTTPS, SNMP, HTTP-API, or HTTPS-API. This is the management-access point, a point of entry for a system administrator. Use the management access command to edit one or all of these management-access configurations. Primary is the primary authentication service for this management-access point. The choices are AD (for Active-Directory authentication, which allows Windows users to authenticate with their Windows credentials), local (for authentication service that runs on the ARX), or RADIUS (for authentication at a remote RADIUS server). Secondary and Tertiary are backup authentication services. If the primary service fails, the switch uses the secondary service; if the secondary authentication fails too, the switch falls back to the tertiary service. Use the authentication command to reset the primary, secondary, or tertiary service. Allowed Interface is VLAN, Management, or both. VLAN indicates that administrators can gain access through any in-band (VLAN) management interface. Management indicates that access is allowed through the out-of-band management interface, labeled MGMT on the front panel. Use the permit command to permit VLAN and/or MGMT access. | |
See Figure 17.1, below. | |
Figure 17.1 Sample Output: show management access
bstnA> show management access
Use the show radius-server command to display a summary of all RADIUS servers known to the switch. | |
Hostname is the name or IP address of the RADIUS server. Authport is the destination port at the RADIUS server. Acctport is the port used for accounting; currently not used. Timeout is the current connection-timeout interval. Retries is the current connection-retry interval. | |
bstnA(gbl)# show radius-server See Figure 17.2 on page 17-16 for sample output. | |
Figure 17.2 Sample Output: show radius-server
bstnA# show radius-server
Use the show sessions command to view all current management sessions on the switch. | |
Session ID identifies each session. CLI sessions have integer IDs, and GUI sessions have string IDs. The flag, (local session), appears for the current CLI session. Username identifies the administrative user. Access is the type of connection. This is the same as the management-access point that you choose with the management access command (for example, console, ssh, or https). Connect Time shows how long the session has been running displayed in minutes and hours. If the session has been running less than a minute, a dash is displayed instead of the time. Source IP is the IP address from which the user logged in. You can use the clear session with one of the IDs to clear that administrative session, thereby logging off the administrator. | |
bstnA# show sessions | |
Figure 17.3 Sample Output: show sessions
bstnA# show sessions
Immediately after you use ssh-host-key generate to change the SSH host keys on the switch, you should distribute the new keys to remote SSH clients. Use the show ssh-host-key command to show the public host keys. | |
dsa | rsa | rsa1 selects a particular SSH key; by default, all of them are shown. dsa is the key for DSA over SSHv2, rsa selects the key for RSA over SSHv2, and rsa1 chooses RSA over SSHv1. By default, SSHv1 is not supported, use ssh-v1 enable to enable SSHv1 support. | |
Use the ssh-host-key generate command to change all private/public host-key pairs on the switch. Then use this command to see the new public keys and begin distributing them to SSH clients. Install the appropriate public key (DSA, RSA, or RSA1) at each client; refer to the clients SSH documentation for instructions. | |
bstnA(cfg)# show ssh-host-key | |
Use this command to display the authentication-login statistics. Use the clear statistics authentication command to clear the current authentication statistics and reset the counters. | |
bstnA# show statistics authentication | |
SSHv1 (as opposed to SSHv2) has well-documented security holes and is therefore not supported by default. Some installations only support SSHv1, so you can use the ssh-v1 enable command to enable it on the current switch. Use the no form of the command to disable SSHv1 and return to v2-only support. | |
bstnA(cfg)# ssh-v1 enable bstnA(cfg)# no ssh-v1 enable | |
Use the timeout command to change the timeout interval for communication with RADIUS servers. Use the no form of the command to reset the timeout interval to the default. | |
milliseconds (3-65535) is the number of milliseconds to wait for a server response before timing out. | |
After the timeout expires, the switch retries its request as many times as specified through the retries (gbl-radius) command. If all retries fail, the request fails, which causes fallback to the next level of authentication service (secondary or tertiary), if one is configured. | |
bstnA(gbl)# radius-server 192.168.25.207 bstnA(gbl-radius[192.168.25.207])# timeout 10 | |