收藏 分销(赏)

SNAC与Aruba无线网络安全的完美结合_NiuXiaohu.docx

上传人:pc****0 文档编号:8760993 上传时间:2025-03-01 格式:DOCX 页数:48 大小:2.37MB 下载积分:10 金币
下载 相关 举报
SNAC与Aruba无线网络安全的完美结合_NiuXiaohu.docx_第1页
第1页 / 共48页
SNAC与Aruba无线网络安全的完美结合_NiuXiaohu.docx_第2页
第2页 / 共48页


点击查看更多>>
资源描述
SNAC与Aruba无线网络安全的完美结合 测试报告 Symantec 目 录 1. 测试目的与内容 3 2. 测试拓扑 4 3. 接入交换机配置 5 4. Aruba无线控制器配置 9 5. 未安装Agent认证 12 6. 安装Agent认证 13 7. 移动终端认证 20 8. 已验证的Aruba无线AC列表 21 9. Aruba配置 21 1. 测试目的与内容 Ø 测试目的: p 验证无线802.1x准入控制具体实现; p 验证Symantec-SNAC产品与Aruba无线AP设备的兼容性; Ø 测试内容: p 已安装Agent的无线接入终端,测试认证过程 p 未安装Agent的无线接入终端,测试认证过程 2. 测试拓扑 图 1 测试拓扑图 Ø 硬件环境描述 p 1台终端管理服务器、1台DHCP服务器、1台Lan Enforce、1台Radius认证服务器、1台支持POE供电的4948交换机、1台Aruba无线AP、1台IPhone、1台IPDA2、1台HTC、1台笔记本。 Ø 软件环境描述 p 服务器操作系统:Windows 2003 Enterprise; p 终端操作系统:Win7、IPhone系统、IPDA系统、安卓系统。 3. 接入交换机配置 Ø 交换机只需配置相应VLAN信息,交换机与Aruba无线控制器启用TRUNK连接,Aruba无线控制器配置对应的VLAN-ID信息即可; p VLan10:Mgt 10.112.196.0/24 p VLan20:Work 10.112.197.0/24 p VLan30:Repair 10.112.198.0/24 p VLan40:Guest 10.112.199.0/24 Lan Enforce配置: 图 2 Lan Enforce上设置Radius 图 3 Lan Enforce上指向Aruba控制器 图 4 Lan Enforce上设置Vlan信息 图 5 Lan Enforce上设置Vlan切换 4. Aruba无线控制器配置 图 6设置SSID对应Vlan信息——sec-test 图 7 设置Radius服务器——10.112.198.170 图 8 Aruba-认证设置 图 9 Work role 图 10 Repair role 图 11 Guest role 5. 未安装Agent认证 自动弹出认证对话框,需要输入身份认证信息: 图 12 身份认证信息输入 身份认证通过,接入网络成功: 图 13 认证成功-接入Work区域 6. 安装Agent认证 场景一:身份认证成功和安全策略检查合规,进入Work区域 图 14 身份认证和安全策略检查都正确 图 15 客户端IP信息-Work区域 图 16 Aruba控制器信息-Work Roles 场景二:身份认证成功和安全策略检查不合规,进入Repair区域 图 17 身份认证成功策略检查不合规 图 18 客户端IP信息-Repairk区域 图 19 Aruba控制器信息-Repair Roles 场景三:身份认证不成功和安全策略检查合规,等待二次认证 图 20主机完整性检查通过 图 21 输入错误信息--身份认证不成功 图 22 再次弹出身份认证对话框 图 23 Aruba控制器上没有认证信息 场景四:安全检查合规变化为安全检查不合规,从Work区域自动跳入Repair区域 图 24 身份认证成功和策略检查合规 图 25 认证成功进入Work区域 图 26 Aruba控制器-Work区域 图 27策略检查不合规跳入Repair区域 图 28 Aruba控制器-Repair区域 7. 移动终端认证 结果: Ø IPAD2、IPhone、安卓操作系统移动终端,支持802.1X协议认证,根据用户名、密码认证,工作正常(根据用户名可以切换到不同的区域)。 8. 已验证的Aruba无线AC列表 型号 版本 用户 Aruba2400 Version 5.0.3.3 CCTV Aruba3400 Version 5.0.2.0 ABC 9. Aruba配置 (Aruba3400) #show running-config Building Configuration... version 5.0 enable secret "8aad4a010166ca17983134f406de05e9503959a575ba2f84ca" hostname "Aruba3400" clock timezone CHT 8 location "Building1.floor1" mms config 0 controller config 40 ip access-list eth validuserethacl permit any ! netservice svc-netbios-dgm udp 138 netservice svc-snmp-trap udp 162 netservice svc-syslog udp 514 netservice svc-l2tp udp 1701 netservice svc-ike udp 500 netservice svc-https tcp 443 netservice svc-smb-tcp tcp 445 netservice svc-dhcp udp 67 68 netservice svc-pptp tcp 1723 netservice svc-sec-papi udp 8209 netservice svc-sccp tcp 2000 netservice svc-http-accl tcp 88 netservice svc-telnet tcp 23 netservice svc-netbios-ssn tcp 139 netservice svc-sip-tcp tcp 5060 netservice svc-kerberos udp 88 netservice svc-tftp udp 69 netservice svc-http-proxy3 tcp 8888 netservice svc-noe udp 32512 netservice svc-cfgm-tcp tcp 8211 netservice svc-adp udp 8200 netservice svc-pop3 tcp 110 netservice svc-lpd-tcp tcp 631 netservice svc-rtsp tcp 554 netservice svc-msrpc-tcp tcp 135 139 netservice svc-dns udp 53 netservice svc-h323-udp udp 1718 1719 netservice svc-h323-tcp tcp 1720 netservice svc-vocera udp 5002 netservice svc-http tcp 80 netservice svc-http-proxy2 tcp 8080 netservice svc-sip-udp udp 5060 netservice svc-nterm tcp 1026 1028 netservice svc-noe-oxo udp 5000 alg noe netservice svc-papi udp 8211 netservice svc-natt udp 4500 netservice svc-ftp tcp 21 netservice svc-microsoft-ds tcp 445 netservice svc-svp 119 netservice svc-smtp tcp 25 netservice svc-gre 47 netservice svc-netbios-ns udp 137 netservice svc-sips tcp 5061 netservice svc-smb-udp udp 445 netservice svc-cups tcp 515 netservice svc-esp 50 netservice svc-v6-dhcp udp 546 547 netservice svc-snmp udp 161 netservice svc-bootp udp 67 69 netservice svc-msrpc-udp udp 135 139 netservice svc-ntp udp 123 netservice svc-icmp 1 netservice svc-ssh tcp 22 netservice svc-lpd-udp udp 631 netservice svc-v6-icmp 58 netservice svc-http-proxy1 tcp 3128 ip access-list session control user any udp 68 deny any any svc-icmp permit any any svc-dns permit any any svc-papi permit any any svc-sec-papi permit any any svc-cfgm-tcp permit any any svc-adp permit any any svc-tftp permit any any svc-dhcp permit any any svc-natt permit ! ip access-list session allow-diskservices any any svc-netbios-dgm permit any any svc-netbios-ssn permit any any svc-microsoft-ds permit any any svc-netbios-ns permit ! ip access-list session validuser any any any permit ! ip access-list session vocera-acl any any svc-vocera permit queue high ! ip access-list session icmp-acl any any svc-icmp permit ! ip access-list session captiveportal user alias controller svc-https dst-nat 8081 user any svc-http dst-nat 8080 user any svc-https dst-nat 8081 user any svc-http-proxy1 dst-nat 8088 user any svc-http-proxy2 dst-nat 8088 user any svc-http-proxy3 dst-nat 8088 ! ip access-list session allowall any any any permit ! ip access-list session https-acl any any svc-https permit ! ip access-list session sip-acl any any svc-sip-udp permit queue high any any svc-sip-tcp permit queue high ! ip access-list session dns-acl any any svc-dns permit ! ip access-list session tftp-acl any any svc-tftp permit ! ip access-list session skinny-acl any any svc-sccp permit queue high ! ip access-list session srcnat user any any src-nat ! ip access-list session vpnlogon user any svc-ike permit user any svc-esp permit any any svc-l2tp permit any any svc-pptp permit any any svc-gre permit ! ip access-list session logon-control user any udp 68 deny any any svc-icmp permit any any svc-dns permit any any svc-dhcp permit any any svc-natt permit ! ip access-list session allow-printservices any any svc-cups permit any any svc-lpd-tcp permit any any svc-lpd-udp permit ! ip access-list session cplogout user alias controller svc-https dst-nat 8081 ! ip access-list session http-acl any any svc-http permit ! ip access-list session dhcp-acl any any svc-dhcp permit ! ip access-list session ap-uplink-acl any any udp 68 permit any any svc-icmp permit any host 224.0.0.251 udp 5353 permit ! ip access-list session noe-acl any any svc-noe permit queue high ! ip access-list session svp-acl any any svc-svp permit queue high user host 224.0.1.116 any permit ! ip access-list session ap-acl any any svc-gre permit any any svc-syslog permit any user svc-snmp permit user any svc-http permit user any svc-http-accl permit user any svc-smb-tcp permit user any svc-msrpc-tcp permit user any svc-snmp-trap permit user any svc-ntp permit user alias controller svc-ftp permit ! ip access-list session h323-acl any any svc-h323-tcp permit queue high any any svc-h323-udp permit queue high ! ipv6 access-list session v6-icmp-acl any any svc-v6-icmp permit ! ipv6 access-list session v6-https-acl any any svc-https permit ! ipv6 access-list session v6-dhcp-acl any any svc-v6-dhcp permit ! ipv6 access-list session v6-dns-acl any any svc-dns permit ! ipv6 access-list session v6-allowall any any any permit ! ipv6 access-list session v6-http-acl any any svc-http permit ! ipv6 access-list session v6-logon-control user any udp 68 deny any any svc-v6-icmp permit any any svc-v6-dhcp permit any any svc-dns permit ! vpn-dialer default-dialer ike authentication PRE-SHARE changeme ! user-role ap-role session-acl control session-acl ap-acl ! user-role default-vpn-role session-acl allowall ipv6 session-acl v6-allowall ! user-role vip-role vlan 30 session-acl allowall ! user-role voice session-acl sip-acl session-acl noe-acl session-acl svp-acl session-acl vocera-acl session-acl skinny-acl session-acl h323-acl session-acl dhcp-acl session-acl tftp-acl session-acl dns-acl session-acl icmp-acl ! user-role default-via-role session-acl allowall ipv6 session-acl v6-allowall ! user-role guest-logon captive-portal "default" session-acl logon-control session-acl captiveportal ! user-role guest session-acl http-acl session-acl https-acl session-acl dhcp-acl session-acl icmp-acl session-acl dns-acl ipv6 session-acl v6-http-acl ipv6 session-acl v6-https-acl ipv6 session-acl v6-dhcp-acl ipv6 session-acl v6-icmp-acl ipv6 session-acl v6-dns-acl ! user-role stateful-dot1x ! user-role authenticated session-acl allowall ipv6 session-acl v6-allowall ! user-role logon session-acl logon-control session-acl captiveportal session-acl vpnlogon ipv6 session-acl v6-logon-control ! ip radius source-interface vlan 192 ! no spanning-tree interface mgmt shutdown ! dialer group evdo_us init-string ATQ0V1E0 dial-string ATDT#777 ! dialer group gsm_us init-string AT+CGDCONT=1,"IP","ISP.CINGULAR" dial-string ATD*99# ! dialer group vivo_br init-string AT+CGDCONT=1,"IP",".br" dial-string ATD*99# ! vlan 20 "quarantine-vlan20" vlan 30 "employee-vlan30" vlan 192 "Server-vlan192" interface gigabitethernet 1/0 description "GE1/0" trusted trusted vlan 1-4094 ! interface gigabitethernet 1/1 description "GE1/1" trusted trusted vlan 1-4094 ! interface gigabitethernet 1/2 description "GE1/2" trusted trusted vlan 1-4094 switchport access vlan 192 ! interface gigabitethernet 1/3 description "GE1/3" trusted trusted vlan 1-4094 switchport access vlan 192 ! interface vlan 1 ip address 10.10.10.254 255.255.255.0 ! interface vlan 20 ip address 20.20.20.254 255.255.255.0 operstate up ! interface vlan 30 ip address 30.30.30.254 255.255.255.0 operstate up ! interface vlan 192 ip address 192.168.0.254 255.255.255.0 ! ap mesh-recovery-profile cluster RecoverygmUKRL3MghP1K5I0 wpa-hexkey C9BA810ED99D44182ED2349A0778359D75C01C1B49B85FAAE1D44D7B9A4CF3F7 wms general poll-interval 60000 general poll-retries 3 general ap-ageout-interval 30 general sta-ageout-interval 30 general learn-ap disable general persistent-known-interfering enable general propagate-wired-macs enable general stat-update enable general collect-stats disable ! crypto isakmp policy 20 encryption aes256 ! crypto ipsec transform-set default-aes esp-aes256 esp-sha-hmac crypto dynamic-map default-dynamicmap 10000 set transform-set default-transform default-aes ! vpdn group l2tp ! ip dhcp pool AP-pool default-router 10.10.10.254 network 10.10.10.0 255.255.255.0 authoritative ! ip dhcp pool vlan20-pool default-router 20.20.20.254 network 20.20.20.0 255.255.255.0 authoritative ! ip dhcp pool vlan30-pool default-router 30.30.30.254 network 30.30.30.0 255.255.255.0 authoritative ! service dhcp ip dhcp default-pool private ! vpdn group pptp ! mux-address 0.0.0.0 adp discovery disable adp igmp-join disable adp igmp-vlan 0 voip prioritization disable voip rtcp-inactivity disable voip sip-midcall-req-timeout disable ssh mgmt-auth username/password mgmt-user admin root 7e7c4a93013118206cf92729b708c9cf040324a2b47dd66cd2 no database synchronize database synchronize rf-plan-data ip mobile domain default ! ip igmp ! no firewall attack-rate cp 1024 ! firewall cp ! firewall cp no acceleration cifs caching no acceleration cifs chattiness no acceleration cifs read-ahead no acceleration cifs write-behind no acceleration http authentication no acceleration http caching no acceleration http deduplication no acceleration http post no acceleration http sharepoint no acceleration mapi aggregation no acceleration mapi caching no acceleration mapi prefetching ! packet-capture-defaults tcp disable udp disable sysmsg disable other disable ! ip domain lookup ! country CN aaa authentication mac "default" ! aaa authentication dot1x "ABC-dot1x-auth" ! aaa authentication dot1x "default" ! aaa authentication-server radius "ABC-radius-server" host 192.168.0.200 key "admin" ! aaa server-group "ABC-servergroup" auth-server ABC-radius-server ! aaa server-group "default" auth-server Internal set role condition role value-of ! aaa authentication via connection-profile "default" ! aaa authentication via web-auth "default" ! aaa authentication via global-config ! aaa profile "ABC-aaa" authentication-dot1x "ABC-dot1x-auth" dot1x-server-group "ABC-servergroup" ! aaa profile "default" ! aaa authentication captive-portal "default" ! aaa authentication wispr "default" ! aaa authentication vpn "default" ! aaa authentication vpn "default-rap" ! aaa authentication mgmt ! aaa authentication stateful-ntlm "default" ! aaa authentication stateful-kerberos "default" ! aaa authentication stateful-dot1x ! aaa authentication via auth-profile "default" ! aaa authentication wired ! web-server ! papi-security ! guest-access-email ! control-plane-security ! voice dialplan-profile "default" ! voice sip ! aaa password-policy mgmt ! ap system-profile "default" ! ap regulatory-domain-profile "default" country-code CN valid-11g-channel 1 valid-11g-channel 6 valid-11g-channel 11 valid-11a-channel 149 valid-11a-channel 153 valid-11a-channel 157 valid-11a-channel 161 valid-11a-channel 165 valid-11g-40mhz-channel-pair 1-5 valid-11g-40mhz-channel-pair 7-11 valid-11a-40mhz-channel-pair 149-153 valid-11a-40mhz-channel-pair 157-161 ! ap wired-ap-profile "default" ! ap enet-link-profile "default" ! ap mesh-ht-ssid-profile "default" ! ap mesh-cluster-profile "default" ! ap wired-port-profile "default" ! ap mesh-radio-profile "default" ! ids general-profile "default" ! ids rate-thresholds-profile "default" ! ids signature-profile "default" ! ids impersonation-profile "default" ! ids unauthorized-devic
展开阅读全文

开通  VIP会员、SVIP会员  优惠大
下载10份以上建议开通VIP会员
下载20份以上建议开通SVIP会员


开通VIP      成为共赢上传

当前位置:首页 > 管理财经 > 管理学资料

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        抽奖活动

©2010-2026 宁波自信网络信息技术有限公司  版权所有

客服电话:0574-28810668  投诉电话:18658249818

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :微信公众号    抖音    微博    LOFTER 

客服