Red Hat NETWORK 4.1.0 - Betriebsanweisung Seite 1

Stöbern Sie online oder laden Sie Betriebsanweisung nach Server Red Hat NETWORK 4.1.0 - herunter. Red Hat NETWORK 4.1.0 - Developers guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 101
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1

PacketFence Administration Guidefor version 4.1.0

Seite 2 - Version 4.1.0 - December 2013

Chapter 2Copyright © 2008-2013 Inverse inc.Introduction 6Components

Seite 3 - Table of Contents

Chapter 17Copyright © 2008-2013 Inverse inc.Manual FreeRADIUS 2 configuration 96authorize { preprocess eap { ok = return

Seite 4

Chapter 17Copyright © 2008-2013 Inverse inc.Manual FreeRADIUS 2 configuration 97eap { default_eap_type = peap timer_expire = 60

Seite 5 - AboutthisGuide

Chapter 3Copyright © 2008-2013 Inverse inc.System Requirements 7System RequirementsAssumptionsPacketFence reuses many components in an infrastructure.

Seite 6 - Introduction

Chapter 3Copyright © 2008-2013 Inverse inc.System Requirements 8∏ Intel or AMD CPU 3 GHz∏ 4 GB of RAM∏ 100 GB of disk space (RAID-1 recommended)∏ 1 Ne

Seite 7

Chapter 4Copyright © 2008-2013 Inverse inc.Installation 9InstallationThis section will guide you through the installation of PacketFence together with

Seite 8

Chapter 4Copyright © 2008-2013 Inverse inc.Installation 10# rpm -Uvh http://pkgs.repoforge.org/rpmforge-release/rpmforge-release-0.5.3-1.el6.rf.`uname

Seite 9 - Network Integration

Chapter 4Copyright © 2008-2013 Inverse inc.Installation 11Software DownloadPacketFence provides a RPM repository for RHEL / CentOS instead of a single

Seite 10 - Components

Chapter 4Copyright © 2008-2013 Inverse inc.Installation 12Or when using Ubuntu 12.04 LTS:deb http://inverse.ca/downloads/PacketFence/ubuntu precise pr

Seite 11 - System Requirements

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 13ConfigurationIn this section, you’ll learn how to configure PacketFence. PacketFence will u

Seite 12 - Operating System Requirements

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 14Web-based Administration InterfacePacketFence provides a web-based administration inte

Seite 13 - Installation

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 15The other files in this directory are managed by PacketFence using templates, so it is easy

Seite 14 - Debian and Ubuntu

PacketFence Administration Guideby Inverse Inc.Version 4.1.0 - December 2013Copyright © 2008-2013 Inverse inc.Permission is granted to copy, distribut

Seite 15 - Software Installation

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 16AuthenticationPacketFence can authenticate users that register devices via the captive port

Seite 16

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 17Now, we want to authenticate employees using Active Directory (over LDAP), and

Seite 17 - Configuration

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 18Network Devices Definition (switches.conf)This section applies only for VLAN enforcement. U

Seite 18 - Apache Configuration

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 19From PacketFence to a switchEdit the switch config file (/usr/local/pf/conf/switches.conf)

Seite 19 - Roles Management

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 20PackeFence needs sometimes to establish an interactive command-line session with a switch.

Seite 20 - Authentication

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 21The current format is the following:Format: <rolename>Role=<controller_role>And

Seite 21

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 22Inline enforcement uses ipset to mark nodes as registered, unregistered and isol

Seite 22 - SNMP v1, v2c and v3

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 23dns PacketFence IP address in this network. Ininline type, set it to a valid DNS prod

Seite 23 - Switch Configuration

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 24By default no DHCP Server should be running on that interface where you are sending the req

Seite 24 - Radius Secret

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 25[interface eth0.1010]mask=255.255.255.0type=dhcp-listenergateway=10.0.101.1ip=10.0.101.4Rep

Seite 25 - Default VLAN/role assignment

Copyright © 2008-2013 Inverse inc.iiiTable of ContentsAbout this Guide ...

Seite 26 - (networks.conf)

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 26For dhcpd, make sure that the clients DHCP requests are correctly forwarded (IP Helpers in

Seite 27 - Production DHCP access

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 27[192.168.3.0]netmask=255.255.255.0gateway=192.168.3.1next_hop=domain-name=isolation.example

Seite 28 - Interface in every VLAN

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 28ip access-list extended PF_REGISTRATION permit ip any host 192.168.2.1 permit udp any any e

Seite 29 - Routed Networks

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 29mschap { use_mppe = yes require_encryption = yes require_strong = yes

Seite 30

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 30[logging] default = FILE:/var/log/krb5libs.log kdc = FILE:/var/log/krb5kdc.log admin_server

Seite 31

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 31 [global] workgroup = DOMAIN server string = pf_server_name security = ads passdb back

Seite 32 - FreeRADIUS Configuration

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 32Note that for Debian and Ubuntu you will probably have this error:# kinit succeeded but ads

Seite 33 - Samba / Kerberos / Winbind

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 33# radtest dd9999 Abcd1234 localhost:18120 12 testing123Sending Access-Request of id 74 to 1

Seite 34

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 34Log filesHere are the most important PacketFence log files:/usr/local/pf/logs/packetfence.l

Seite 35

Chapter 5Copyright © 2008-2013 Inverse inc.Configuration 35Proxy InterceptionIn PacketFence you are now able to intercept proxy request and forward th

Seite 36

Copyright © 2008-2013 Inverse inc.ivSNMP Traps Limit ...

Seite 37 - Starting PacketFence Services

Chapter 6Copyright © 2008-2013 Inverse inc.Configuration by example 36Configuration by exampleHere is an end-to-end sample configuration of PacketFenc

Seite 38 - Passthrough

Chapter 6Copyright © 2008-2013 Inverse inc.Configuration by example 37Network InterfacesHere are the NICs startup scripts on PacketFence./etc/sysconfi

Seite 39 - Proxy Interception

Chapter 6Copyright © 2008-2013 Inverse inc.Configuration by example 38DEVICE=eth1ONBOOT=yesBOOTPROTO=noneTrap receiverPacketFence uses snmptrapd as th

Seite 40 - Configuration by example

Chapter 6Copyright © 2008-2013 Inverse inc.Configuration by example 39snmp-server enable traps port-securitysnmp-server enable traps port-security tra

Seite 41 - Network Interfaces

Chapter 6Copyright © 2008-2013 Inverse inc.Configuration by example 40[default]SNMPCommunityRead = publicSNMPCommunityWrite = privateSNMPommunityTrap

Seite 42 - Switch Setup

Chapter 6Copyright © 2008-2013 Inverse inc.Configuration by example 41[general]domain=yourdomain.org#Put your External/Infra DNS servers herednsserver

Seite 43

Chapter 6Copyright © 2008-2013 Inverse inc.Configuration by example 42[interface eth0]mask=255.255.255.0type=managementgateway=192.168.1.1ip=192.168.1

Seite 44

Chapter 6Copyright © 2008-2013 Inverse inc.Configuration by example 43[192.168.2.0]netmask=255.255.255.0gateway=192.168.2.1next_hop=192.168.2.254domai

Seite 45

Chapter 6Copyright © 2008-2013 Inverse inc.Configuration by example 44In order to have the inline mode properly working, you need to enable IP forward

Seite 46

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 45Optional componentsBlocking malicious activities with violationsPolicy violations all

Seite 47 - Inline enforcement specifics

Chapter 1Copyright © 2008-2013 Inverse inc.AboutthisGuide 1AboutthisGuideThis guide will walk you through the installation and the day to day admi

Seite 48

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 46ConfigurationPacketFence will provide you with a basic suricata.yaml that you can mod

Seite 49 - Optional components

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 47trapIsolate the host and place them in violation. It opens a violationand leaves it o

Seite 50 - Violations

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 48[defaults]priority=4max_enable=3actions=email,logauto_enable=Yenable=Ngrace=120mwindo

Seite 51

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 49Noteviolations.conf is loaded at startup. A restart is required when changes are made

Seite 52

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 50It is important to get the correct scan config ID and NBE report format ID to populat

Seite 53 - Compliance Checks

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 51Using Nessus:trigger=Nessus::<violationId>Using OpenVAS:trigger=OpenVAS::<vi

Seite 54

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 52∏ You just have to change the host value by the Nessus server IP.RADIUS AccountingRAD

Seite 55 - Scan on registration

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 53OinkmasterOinkmaster is a perl script that enables the possibility to update the diff

Seite 56 - RADIUS Accounting

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 54CautionRight now PacketFence only supports floating network devices on Cisco

Seite 57 - Floating Network Devices

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 55trunkPort Yes/no. Should the port be configured as a muti-vlan port?pvid VLAN in whic

Seite 58 - Identification

Chapter 2Copyright © 2008-2013 Inverse inc.Introduction 2IntroductionPacketFence is a fully supported, trusted, Free and Open Source network access co

Seite 59 - Guests Management

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 56Managed guestsPart of the web administration interface, the guests management interfa

Seite 60 - Guest pre-registration

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 57ConfigurationGuest self-registrationIt is possible to modify the default values of th

Seite 61

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 58∏DURATION: a number corresponding to the period duration.∏DATETIME_UNIT: a character

Seite 62 - Statement of Health (SoH)

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 59status, etc) to a RADIUS Server or a DHCP server. The section below explains you how

Seite 63 - Policy example

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 60NoteYou may also want to set other attributes such as auto_enable, grace, etc.When d

Seite 64 - Configure the feature

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 61Alternatively, you can configure these parameters from the PacketFence Web administra

Seite 65 - Billing Engine

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 62[default]billing_engine = enabled...Billing engine parameters are specified in conf/p

Seite 66 - Portal Profiles

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 63OAuth2 AuthenticationThe captive portal of PacketFence allows a guest/user to registe

Seite 67 - OAuth2 Authentication

Chapter 7Copyright © 2008-2013 Inverse inc.Optional components 64GitHubTo use GitHub, you also need an API code and a secret key. To get one, you need

Seite 68 - Gaming Devices Registration

Chapter 8Copyright © 2008-2013 Inverse inc.Operating System Best Practices 65Operating System Best PracticesIptablesIPTables is now entirely managed b

Seite 69 - Log4perl

Chapter 2Copyright © 2008-2013 Inverse inc.Introduction 3module. This allows you to secure yourwired and wireless networks the sameway usi

Seite 70 - High Availability

Chapter 8Copyright © 2008-2013 Inverse inc.Operating System Best Practices 66Once you downloaded those packages, you need to modify the logging config

Seite 71 - DRBD Configuration and setup

Chapter 8Copyright © 2008-2013 Inverse inc.Operating System Best Practices 67∏ pf2 is the second PacketFence server∏ PacketFence is properly configure

Seite 72

Chapter 8Copyright © 2008-2013 Inverse inc.Operating System Best Practices 68global { usage-count yes;}common { protocol C;}resource mysql { sy

Seite 73 - MySQL Configuration

Chapter 8Copyright © 2008-2013 Inverse inc.Operating System Best Practices 69Make sure you see something like this in /proc/drbd:... 0: cs:Connected r

Seite 74 - Heartbeat configuration

Chapter 8Copyright © 2008-2013 Inverse inc.Operating System Best Practices 70... 0: cs:Connected ro:Primary/Secondary ds:UpToDate/UpToDate C r----

Seite 75

Chapter 8Copyright © 2008-2013 Inverse inc.Operating System Best Practices 71∏eth0.z is the name of the NIC configuration file (/etc/sysconfig/network

Seite 76 - RADIUS HA configuration

Chapter 8Copyright © 2008-2013 Inverse inc.Operating System Best Practices 72Look at Heartbeat log file /var/log/ha-log to make sure that everything i

Seite 77 - Performance optimization

Chapter 9Copyright © 2008-2013 Inverse inc.Performance optimization 73Performance optimizationMySQL optimizationsTuning MySQL itselfIf you’re PacketFe

Seite 78

Chapter 9Copyright © 2008-2013 Inverse inc.Performance optimization 74mysql> show variables;| innodb_additional_mem_pool_size | 1048576 || inn

Seite 79 - Keeping tables small

Chapter 9Copyright © 2008-2013 Inverse inc.Performance optimization 75# uptime12:01:58 up 235 days, 1:46, 1 user, load average: 0.15, 0.39, 0.52# io

Seite 80 - Captive Portal Optimizations

Chapter 2Copyright © 2008-2013 Inverse inc.Introduction 4Guest Access PacketFence supports a special guest VLANout of the box. You configure your

Seite 81 - Frequently Asked Questions

Chapter 9Copyright © 2008-2013 Inverse inc.Performance optimization 76Host 'host_name' is blocked because of many connection errors. Unblock

Seite 82 - VLAN assignment techniques

Chapter 10Copyright © 2008-2013 Inverse inc.Frequently Asked Questions 77Frequently Asked QuestionsPacketFence FAQ is now available online. Please vis

Seite 83

Chapter 11Copyright © 2008-2013 Inverse inc.Technical introductionto VLAN enforcement 78Technical introduction to VLANenforcementIntroductionVLAN ass

Seite 84

Chapter 11Copyright © 2008-2013 Inverse inc.Technical introductionto VLAN enforcement 79The supplicant (i.e., client device) is not allowed access thr

Seite 85 - Port Security traps

Chapter 11Copyright © 2008-2013 Inverse inc.Technical introductionto VLAN enforcement 80You need to create a registration VLAN (with a DHCP server, bu

Seite 86 - Limitations

Chapter 11Copyright © 2008-2013 Inverse inc.Technical introductionto VLAN enforcement 81MAC notification trapsIf your switches support MAC notificatio

Seite 87

Chapter 12Copyright © 2008-2013 Inverse inc.Technical introductionto Inline enforcement 82Technical introduction to InlineenforcementIntroductionBefor

Seite 88

Chapter 12Copyright © 2008-2013 Inverse inc.Technical introductionto Inline enforcement 83∏ Everyone behind an inline interface is on the same Layer 2

Seite 89 - More on VoIP Integration

Chapter 13Copyright © 2008-2013 Inverse inc.Technical introductionto Hybrid enforcement 84Technical introduction to HybridenforcementIntroductionBefor

Seite 90 - Mac Authentication and 802.1X

Chapter 14Copyright © 2008-2013 Inverse inc.More on VoIP Integration 85More on VoIP IntegrationVoIP has been growing in popularity on enterprise netwo

Seite 91 - Additional Information

Chapter 2Copyright © 2008-2013 Inverse inc.Introduction 5Network IntegrationVLAN enforcement is pictured in the above diagram. Inline enforcement shou

Seite 92 - Information

Chapter 14Copyright © 2008-2013 Inverse inc.More on VoIP Integration 86NoteNot all vendors support VoIP on port-security, please refer to the Network

Seite 93 - Chapter 17

Chapter 15Copyright © 2008-2013 Inverse inc.Additional Information 87Additional InformationFor more information, please consult the mailing archives o

Seite 94 - Administration Tools 90

Chapter 16Copyright © 2008-2013 Inverse inc.Commercial Supportand Contact Information 88Commercial Support and ContactInformationFor any questions or

Seite 95

Chapter 17Copyright © 2008-2013 Inverse inc.GNU Free Documentation License 89GNU Free Documentation LicensePlease refer to http://www.gnu.org/licenses

Seite 96

Chapter 17Copyright © 2008-2013 Inverse inc.Administration Tools 90AppendixA.Administration Toolspfcmdpfcmd is the command line interface to most Pa

Seite 97

Chapter 17Copyright © 2008-2013 Inverse inc.Administration Tools 91Usage: pfcmd.pl <command> [options]checkup | perform a s

Seite 98 - Web Admin GUI

Chapter 17Copyright © 2008-2013 Inverse inc.Administration Tools 92The node view option shows all information contained in the node database table for

Seite 99

Chapter 17Copyright © 2008-2013 Inverse inc.Administration Tools 93Usage: pfcmd_vlan command [options] Command: -deauthenticate de-a

Seite 100 - In /usr/local/pf/raddb/users

Chapter 17Copyright © 2008-2013 Inverse inc.Administration Tools 94Web Admin GUIThe Web Admin GUI, accessible using https on port 1443, shows the same

Seite 101

Chapter 17Copyright © 2008-2013 Inverse inc.Manual FreeRADIUS 2 configuration 95AppendixB.Manual FreeRADIUS 2configurationSince we provide a working

Kommentare zu diesen Handbüchern

Keine Kommentare