Engines Ignition Server Technical
Configuration Guide
Enterprise Solutions Engineering
Document Date: April 2010
Document Number: NN48500-586
Document Version: 2.0
Identify Engines Ignition Server
Ethernet Routing Switch
5500 5600 4500 2500
Engineering
1
avaya.com
No
Date
Version
Revised by
Remarks
1
09/09/2009
1.0
JVE
Modifications to Software Baseline section
2
27/04/2010
2.0
JVE
Added Internal Device configuration
Abstract
This Technical Configuration Guide outlines the configuration steps required to create an
authenticated network infrastructure for biomedical devices that are Ethernet attached. The main
components include both the Ethernet edge switches and the Network Access Control
infrastructure provided by Avaya’s Identity Engines portfolio.
The audience for this Technical Configuration Guide is intended to be Avaya Sales teams,
Partner Sales teams and end-user customers.
Revision Control
Use pursuant to the terms of your signed agreement or Avaya policy.
Use pursuant to the terms of your signed agreement or Avaya policy.
Avaya Inc. – Proprietary & Confidential.
3
avaya.com
Tip – Highlights a configuration or technical tip.
Note – Highlights important information to the reader.
Warning – Highlights important information about an action that may result in equipment
damage, configuration or data loss.
Bold text indicates emphasis.
Italic text in a Courier New font indicates text the user must enter or select in a menu item, button
or command:
ERS5520-48T# show running-config
Output examples from Avaya devices are displayed in a Lucinda Console font:
ERS5520-48T# show running-config
! Embedded ASCII Configuration Generator Script
! Model = Ethernet Routing Switch 5520-24T-PWR
! Software version = v5.0.0.011
enable
configure terminal
Conventions
This section describes the text, image, and command conventions used in this document.
Symbols:
Text:
Use pursuant to the terms of your signed agreement or Avaya policy.
Avaya Inc. – Proprietary & Confidential.
4
avaya.com
Prefix
Vendor
00095C
Philips Medical System – Cardiac and Monitoring System
00251B
Philips CareServant
001865
Siemens Medical Solutions Diagnostics Manufacturing
(formerly Bayer Diagnostics Sudbury Ltd)
0030E6
Draeger Medical Systems, Inc. (was: SIEMENS MEDICAL SYSTEMS)
0003B1
Hospira Inc. (was: Abbott Laboratories)
001AFA
Welch Allyn, Inc.
1. Overview: Medical Device Authentication
using Identify Engines
This document provides the framework for implementing device level authentication controls.
Future documents will build on this as a base to further define pre-canned solutions that utilize
device level authentication.
1.1 Access Layer
Any of the following access layer switches that can be used with Ignition Server for device
authentication. However, only the ERS5500 or ERS5600 series can be used if User Access
Policies are also required allowing the RADIUS server to tell the switch what policy to apply for a
specific user or device.
ERS5500
ERS5600
ERS4500
ERS2400
1.2 Ignition Server – Biomedical Device Authentication
For the Ignition Server to authenticate biomedical devices from an EAP authenticator, it must
know the device identity (typically the MAC address). In an existing network consisting of many
biomedical devices, most likely each device identity will not be known, thus making it very difficult
to authorize each device based solely on the full MAC address. Avaya’s Ignition Server can be
configured for device authentication using just the prefix of the biomedical manufacturer’s vendor
MAC. In turn, the Ignition Server can keep a data base of the full MAC address of each device
once it is authenticated by the Ignition Server.
The following is a list of top biomedical manufacturers vendor MAC’s.
Avaya Inc. – Proprietary & Confidential.
Use pursuant to the terms of your signed agreement or Avaya policy.
5
avaya.com
1.3 Configuration Examples
Although any Avaya switch as shown in Section 1.1 could be used, for this example, we will use
an ERS5520 for allow for both device authentication with or without policy.
1.4 Biomedical Device Authentication using Identify
Engines Ignition Server and ERS5500
For this example, we will demonstrate how to configure the Ethernet Routing Switch 5500 and
Ignition Server to allow for device authentication based on the biomedical manufacturer vendor
MAC address. This will allow authentication and VLAN separation of manufacturer traffic. All that
is required is the first three digits of the vendor MAC address for the Ignition Server to
authenticate the device and then tell the EAP authenticator (ERS 5520 in this example) what
VLAN to place the biomedical device in (we will use Philips and Siemens for this example).
The Ethernet Routing Switch 5500 can be configured to accept both EAP and non-EAP (NEAP)
on the same port. In regards to non-EAP, the switch can be configured to accept a password
format using any combination of IP address and MAC address with or without port number. By
default, the password format is set for IP address, MAC address, and port number. For this
example, Ignition Server will be configured for device authentication so it is not important how the
password format is configured on the ERS 5520. However, it is suggested to use a password
format of MAC address so that if the complete MAC address is known, we can use user
authentication versus device authentication on Ignition server.
Overall, we will configured the following
Enable NEAP on ports 14 to 20 of ERS5520 using the non-EAP password format of MAC
address only
Add VLAN 1500 for the Philips devices
Add VLAN 1600 for the Siemens devices
Add VLAN 3000 as the default VLAN everyone connects to until authenticated by Ignition
Server
Configure the Ethernet Routing Switch 5520 and Ignition server with shared key set to
nortel
Use pursuant to the terms of your signed agreement or Avaya policy.
5520-24T-1(config)# vlan create 201 name mgmt type port
5520-24T-1(config)# vlan create 1500 name philips type port
5520-24T-1(config)# vlan create 1600 name siemens type port
5520-24T-1(config)# vlan create 3000 name general type port
ERS5520-1 Step 2 – Enable VLAN tagging on all appropriate ports
5520-24T-1(config)# vlan port 23-24 tagging tagall
ERS5520-1 Step 3 – Set VLAN configuration control to automatic, add VLAN port
members, and set the management VLAN to VLAN 201
5520-24T-1(config)# vlan configcontrol automatic
5520-24T-1(config)# vlan members add 201 23-24
5520-24T-1(config)# vlan members add 1500 23-24
5520-24T-1(config)# vlan members add 1600 23-24
5520-24T-1(config)# vlan members add 3000,14-20,23-24
5520-24T-1(config)# vlan mgmt 201
ERS5520-1 Step 4 – Remove port members from the default VLAN
5520-24T-1(config)# vlan members remove 1 14-20,23-24
Please note that the non-EAP devices must be a member of a VLAN for the switch to
authenticate the devices. You can either leave port member 14-20 in VLAN 1 or create
a separate VLAN and add the port members as we have done by creating VLAN 3000.
Add the recommended settings for connectivity to an SMLT Cluster – VLACP and
Multilink Trunking (MLT) with Spanning Tree disabled on the uplink core ports 23 and 24
1.4.1 ERS Switch Configuration
1.4.1.1 Go to configuration mode.
1.4.1.2 Create VLAN‟s
Use pursuant to the terms of your signed agreement or Avaya policy.
Please note that at this time, non-EAP MAC RADIUS accounting is not supported.
Hence this example does not include the step to enable RADIUS accounting. If you
wish, you can enable RADIUS accounting using the command radius accounting enable.
Use pursuant to the terms of your signed agreement or Avaya policy.
Avaya Inc. – Proprietary & Confidential.
9
avaya.com
ERS5520-1 Step 1 – Enable EAP on port 14-20 with NEAP, set the maximum allowable EAP
and NEAP clients to 1, enable EAP multihost and enable RADIUS NEAP phone
Use pursuant to the terms of your signed agreement or Avaya policy.
Avaya Inc. – Proprietary & Confidential.
10
avaya.com
Step 1 – Verify that EAP has been enabled globally and the correct port members:
5520-24T-1# show eapol port 14-20
Result:
EAPOL Administrative State: Enabled
Port-mirroring on EAP ports: Disabled
EAPOL User Based Policies: Disabled
EAPOL User Based Policies Filter On MAC Addresses: Disabled
Port: 14
Admin Status: Auto
Auth: No
Admin Dir: Both
Oper Dir: Both
ReAuth Enable: No
ReAuth Period: 3600
Quiet Period: 60
Xmit Period: 30
Supplic Timeout: 30
Server Timeout: 30
Max Req: 2
RDS DSE: No
|
|
Port: 20
Admin Status: Auto
Auth: No
Admin Dir: Both
Oper Dir: Both
ReAuth Enable: No
ReAuth Period: 3600
Quiet Period: 60
Xmit Period: 30
Supplic Timeout: 30
Server Timeout: 30
Max Req: 2
RDS DSE: No
Option
Verify
EAPOL Administrative
State
Verify that the EAPOL is Enabled globally.
EAPOL User Based
Policies
Verify that EAPOL policies are Enabled globally.
Admin Status
Verify that the EAP is enabled on ports 14 to 20 by verifying that the
Admin Status is set to Auto.
1.4.2 ERS 5520 Switch: Verify Operations
1.4.2.1 Verify EAP Global and Port Configuration
On the ERS5520 verify the following information:
Avaya Inc. – Proprietary & Confidential.
Use pursuant to the terms of your signed agreement or Avaya policy.
11
avaya.com
Auth
The value will be No even if the IP Phone has successfully
authenticated. Only if there a Supplicant attached to the IP Phone and it
has successfully authenticated will this value change to Yes.
Step 1 – Verify that EAP multihost has been globally configured correctly:
5520-24T-1#show eapol multihost
Result:
Allow Non-EAPOL Clients: Enabled
Use RADIUS To Authenticate Non-EAPOL Clients: Enabled
Allow Non-EAPOL Clients After Single Auth (MHSA): Disabled
Allow Non-EAPOL VoIP Phone Clients: Disabled
EAPOL Request Packet Generation Mode: Multicast
Allow Use of RADIUS Assigned VLANs: Disabled
Allow Use of Non-Eapol RADIUS Assigned VLANs: Enabled
Non-EAPOL RADIUS Password Attribute Format: MACAddr
Non-EAPOL User Based Policies: Enabled
Non-EAPOL User Based Policies Filter On MAC Addresses: Disabled
Use most recent RADIUS VLAN: Disabled
Step 2 – Verify that EAP multihost has been configured correctly at interface level:
5520-24T-1#show eapol multihost interface 14-20
Result:
Port: 14
MultiHost Status: Enabled
Max Eap Clients: 1
Allow Non-EAP Clients: Enabled
Max Non-EAP Client MACs: 1
Use RADIUS To Auth Non-EAP MACs: Enabled
Allow Auto Non-EAP MHSA: Disabled
Allow Non-EAP Phones: Disabled
RADIUS Req Pkt Send Mode: Multicast
Allow RADIUS VLANs: Disabled
Allow Non-EAP RADIUS VLANs: Enabled
Use most recent RADIUS VLAN: Disabled
|
|
Port: 20
MultiHost Status: Enabled
Max Eap Clients: 1
Allow Non-EAP Clients: Enabled
Max Non-EAP Client MACs: 1
Use RADIUS To Auth Non-EAP MACs: Enabled
Allow Auto Non-EAP MHSA: Disabled
Allow Non-EAP Phones: Disabled
RADIUS Req Pkt Send Mode: Multicast
Allow RADIUS VLANs: Disabled
Allow Non-EAP RADIUS VLANs: Enabled
1.4.2.2 Verify EAP Multihost Configuration
Use pursuant to the terms of your signed agreement or Avaya policy.
Avaya Inc. – Proprietary & Confidential.
12
avaya.com
Use most recent RADIUS VLAN: Disabled
Option
Verify
Allow Non-EAPOL
Clients:
Verify that non-EAPOL (NEAP) is Enabled globally and at interface
level.
Use RADIUS To
Authenticate NonEAPOL Clients:
Verify the use RADUIS to authenticate non-EAPOL option is Enabled
globally and at interface level.
Non-EAPOL RADIUS
Password Attribute
Format:
Verify that the non-EAP password format is set for MACAddr. Please
note, some of the older software releases required a leading period “.”
before and after the MAC address.
Allow Non-EAP
RADIUS VLANs:
Verity that non-EAPOL RADIUS VLANs is Enabled globally and at
interface level.
Step 1 – Assuming Siemens devices on ports 14 & 15 and Philips devices on ports19 & 20, verify
device MAC addressses:
5520-24T-1# show eapol multihost non-eap-mac status
Result:
Port Client MAC Address State
---- ------------------ -----------------------------14 00:18:65:00:02:01 Authenticated By RADIUS
15 00:18:65:00:02:02 Authenticated By RADIUS
19 00:09:5C:00:02:03 Authenticated By RADIUS
20 00:09:5C:00:02:04 Authenticated By RADIUS
Step 2 – Assuming Siemens devices on ports 14 & 15 and Philips devices on ports19 & 20, verify
VLAN membership:
5520-24T-1# show vlan interface info 14-20
Result:
Filter Filter
Untagged Unregistered
Port Frames Frames PVID PRI Tagging Name
14 No Yes 1600 0 UntagAll Port 14
15 No Yes 1600 0 UntagAll Port 15
16 No Yes 3000 0 UntagAll Port 16
17 No Yes 3000 0 UntagAll Port 17
18 No Yes 3000 0 UntagAll Port 18
19 No Yes 1500 0 UntagAll Port 19
On the ERS5520 verify the following information:
1.4.2.3 Verify EAP Multihost Status
Use pursuant to the terms of your signed agreement or Avaya policy.
Avaya Inc. – Proprietary & Confidential.
13
avaya.com
20 No Yes 1500 0 UntagAll Port 20
5520-24T-1# show vlan
Result:
Id Name Type Protocol User PID Active IVL/SVL Mgmt
--- -------------------- -------- ---------------- -------- ------ ------- ---1 VLAN #1 Port None 0x0000 Yes IVL No
Port Members: 1-19,21-22
201 mgmt Port None 0x0000 Yes IVL No
Port Members: 23-24
1500 philips Port None 0x0000 Yes IVL No
Port Members: 19-20,23-24
1600 siemens Port None 0x0000 Yes IVL No
Port Members: 14-15,23-24
3000 general Port None 0x0000 Yes IVL No
Port Members: 14-20,23-24
Total VLANs: 5
Option
Verify
Port
Display the ports where the device has successfully been
authenticated.
Client MAC Address
If the IP phone has successfully authenticated via NEAP, its MAC
address should be shown.
State
Verity that Authenticated By RADIUS is displayed
PVID
Port Members
Assuming that we have two Philips devices on ports 19 & 20 and two
Siemens devices on ports 14 & 15. Ports 14 & 15 should be members
of VLAN 1600 with PVID of 1600. Ports 19 & 20 should be members of
VLAN 1500 with PVID of 1500.
On ERS5520-1, verify the following information:
Use pursuant to the terms of your signed agreement or Avaya policy.
Avaya Inc. – Proprietary & Confidential.
14
avaya.com
IDE Step 1 – Go to Site Configuration ->Provisioning -> Vendor/VSA’s -> Nortel -> Device
Template -> New
IDE Step 2 – Name the new Nortel device template (Nortel-VLAN in this example), set the
VLAN Method to Use VLAN ID, set the MAC Address Source: to Inbound-User-Name, and
click on OK
1.4.3 IDE Setup
1.4.3.1 Create a new Nortel device template
Avaya Inc. – Proprietary & Confidential.
Use pursuant to the terms of your signed agreement or Avaya policy.
15
avaya.com
IDE Step 3 – Click on Done to complete configuration
Please note that you must change the Avaya switch device template MAC Address Source from the default setting of Inbound-Calling-Station-Id to Inbound-User-Name for
device authentication to work when using a Avaya ERS switch as an EAP authenticator.
This only applies to device authentication and not user authentication.
Use pursuant to the terms of your signed agreement or Avaya policy.
Avaya Inc. – Proprietary & Confidential.
Loading...
+ 36 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.