Search This Blog

Tuesday, September 6, 2016

HPE IMC - TACACS+ Authentication Manager (TAM) configuration



IMC/TAM Configuration


1.    Configure Device Areas 
1.1  User -> Device User Policy -> Authorization Conditions -> Device Areas
1.2  Click Add
1.3  Enter area name and description



2.    Configure Device Types
2.1  User -> Device User Policy -> Authorization Conditions -> Device Types
2.2  Click Add
2.3  Enter type name and description

3.    Configure Devices
3.1  User -> Device User Policy -> Device Management
3.2  Click Add


3.3  Enter shared key, authentication port (default TCP/49), choose device area and device type


Single Connection – the TAM will use single connection for multiple sessions
Watchdog – send keep alive (only if device supports)
Authentication Port – Change port on the device CLI to match the TAM port, default is TCP/49
            Device CLI authentication port configuration:
[HP]hwtacacs scheme TEST
[HP-hwtacacs-test]primary authentication 192.168.0.10 5555

4.    Configure time range
4.1  User -> Device User Policy -> Authorization Conditions
4.2  Click Add
4.3  Enter policy name and select effective and expiration time


5.    Configure Shell Profiles
5.1  User -> Device User Policy -> Authorization Command -> Shell Profiles
5.2  Click Add
5.3  Enter profile name, ACL, privilege level, idle time and session lifetime


            ACL – access control for user access, ACL must be configured on the device
            Idle Time – set the maximum idle timeout for user session, in minutes
Session Lifetime—Duration that a user can manage the device after login. When the session lifetime timer expires, the user is automatically logged out.
6.    Configure Command Set
6.1  User -> Device User Policy -> Authorization Command -> Command Sets
6.2  Click Add
6.3  Enter command name, default authorization action and description


7.    Configure Authorization Profile
7.1  User -> Device User Policy -> Authorization Profile
7.2  Click Add
7.3  Enter authorization policy name and description
7.4  Click Add


7.5  Choose the appropriate profile attributes - device area and type, time range, shell profile and command sets


8.    Add Account
8.1  User -> Device User -> All Device Users
8.2  Click Add
8.3  Enter account name, user name, password and choose user authorization policy
8.4  Set maximum online users


HP Comware switch configuration


# Configure default Tacacs domain
domain default enable TEST
# Define default ip of the Tacacs+ server (not mandatory)
hwtacacs nas-ip 192.168.0.10
# This scheme define what features to use through Tacacs (authentication,authorization and / or Accounting)
hwtacacs scheme TEST
primary authentication 192.168.0.10
primary authorization 192.168.0.10
primary accounting 192.168.0.10
nas-ip 192.168.0.1
key authentication Qwer1234
key authorization Qwer1234
key accounting Qwer1234
user-name-format without-domain
# Associate Tacacs+ domain to the scheme (first try authentication trough Tacacs+ and if not working: locally)
domain TEST
authentication default hwtacacs-scheme TEST local
authorization default hwtacacs-scheme TEST local
accounting default hwtacacs-scheme TEST local
authentication login hwtacacs-scheme TEST local
authorization login hwtacacs-scheme TEST local
accounting login hwtacacs-scheme TEST local
authentication super hwtacacs-scheme TEST
authorization command hwtacacs-scheme TEST local
accounting command hwtacacs-scheme TEST
access-limit disable
state active
idle-cut disable
self-service-url disable
# Definition of user interface
user-interface vty 0 4
authentication-mode scheme
command authorization
command accounting

Configuration example details:
-         - TEST is the TACACS domain name
-          - Qwer1234 is the PSK with the TACACS server
-          - Switch IP address: 192.168.0.1
-          - IMC/TAM IP address: 192.168.0.10

LDAP Integration

     1.    Go to User -> Device User Policy -> LDAP Service -> LDAP Servers
     2.    Click Add
     3.    Enter the required information


Base DN example: ou=xxx;o=yyy;dc=hp;dc=com
Admin DN example: cn=administrator;dc=hp;dc=com

TAM Self-Service portal

TAM self-service portal allow users to view/modify account settings for their personal account.
Login into:

http://<IMC_SERVER_IP_ADDR>:<PORT>/imc/noAuth/tam/login.jsf

System Settings

User -> Device User -> Service Parameters -> System Configuration



Here we can setup the log database size and password policy

How-To

To view all device users list:
User -> Device User -> All Device Users



To view all online users:
User -> Device User -> All Online Users


To view all authentication logins:
User -> Device User -> Log Management -> Authentication Logs*



To view all authorization logs:
User -> Device User -> Log Management -> Authorization Logs*



To view all audit logs:
User -> Device User -> Log Management -> Audit Logs*


*Note you can click on details for more verbose information

To validate system configuration:
User -> Device User -> Service Parameters -> Validate



To validate switch configuration:

Use the command: display hwtacacs <SCHEME_NAME>

Example:
[HP]display hwtacacs TEST
  ---------------------------------------------------------------------------
  HWTACACS-server template name     : test
  Primary-authentication-server     : 192.168.0.10:49
  Primary-authorization-server      : 192.168.0.10:49
  Primary-accounting-server         : 192.168.0.10:49
  Secondary-authentication-server   : 0.0.0.0:0
  Secondary-authorization-server    : 0.0.0.0:0
  Secondary-accounting-server       : 0.0.0.0:0
  Current-authentication-server     : 192.168.0.10:49
  Current-authorization-server      : 192.168.0.10:49
  Current-accounting-server         : 192.168.0.10:49
  Nas-IP address                    : 192.168.0.1
  key authentication                : Qwer1234
  key authorization                 : Qwer1234
  key accounting                    : Qwer1234
  Quiet-interval(min)               : 5
  Realtime-accounting-interval(min) : 12
  Response-timeout-interval(sec)    : 5
  Acct-stop-PKT retransmit times    : 100
  Username format                   : without-domain
  Data traffic-unit                 : B
  Packet traffic-unit               : one-packet
  -------------------------------------------------------------------

1 comment:

  1. Independent Escorts in Dubai is the right decision. the top Dubai Escorts at your one Click. Log on to us for entertainment.

    ReplyDelete