Configuration Example, Wireless

Aruba WPA2 with MAC authentication

René Jorissen on December 19, 2012 1 Comment • Tags: #aaa #aruba #authenticate #initial #mac #networks #profile #role #wpa

Configuring an SSID with WPA2 Pre-Shared key or Enterprise authentication and encryption is very common. Sometimes you would like to add an extra authentication method. Although this method isn’t very secure, MAC authentication is still used as an extra method to strengthen the level of security of a wireless or wired network. These days I … Read More

Management

Cacti and HP Procurve

René Jorissen on February 24, 2010 3 Comments • Tags: #cacti #count #cpu #graph #mac #memory #procurve #template

Finding a template for HP Procurve switches wasn’t that hard. I needed to find a template for HP Procurve 2510G switches. The place to look for templates is forums.cacti.net. I searched the forums on the key word “procurve”, which resulted in many hits. I used the template from the article HP procurve 2600 series. After … Read More

Configuration Example, Security

MAB and MDA in an IP Phone environment

René Jorissen on February 5, 2010 26 Comments • Tags: #5330 #authenticate #bypass #cdp #ciscoavpair #devicetrafficclassvoice #domain #hostmode #lldp #mab #mac #mda #mitel #multidomain #multiple #phone #radius #vsa

I blogged before about the MAC Authentication Bypass (MAB) feature in network environments. MAC Authentication Bypass can be used to secure the wired network by verifying MAC addresses to a central database. By using a radius server, like Microsoft IAS or FreeRadius, you can also redirect verified MAC addresses to a specific VLAN. Lately I … Read More

Configuration Example, Proxy

Juniper SA – Host Checker

René Jorissen on May 19, 2009 0 Comments • Tags: #check #checker #file #host #juniper #linux #mac #os #predefined #sa #scanner #virus #windows #x

Security is getting more and more important for people. I notice that especially IT manager would like to implement some kind of security measurements to improve the safety of their network and data. Lately I have been busy with configuring a Juniper SA solution. The customer wants to publish different kind of services through the … Read More

Configuration Example, Security, Switching

Layer 2 security

René Jorissen on July 6, 2008 1 Comment • Tags: #address #arp #attacks #bpduguard #dhcp #dynamic #hopping #inspection #ip #layer #mac #rootguard #source #spoofing #two #vlan

I attended the session layer 2 security, because I had some discussions about layer 2 security with one of my colleagues. We were discussing about using layer 2 security and especially implementing it in the environments from our customers. Looking at my/our customers, I don’t see environments where layer 2 threats would be immediate. But … Read More

Configuration Example, Security

MAC Authentication Bypass – Continued

René Jorissen on June 20, 2008 1 Comment • Tags: #8021x #authenticate #bypass #caveats #guestvlan #ias #lan #mac #nac #nap #on #radius #wake #wol

Finally I had a day “off” and could test MAC Authentication Bypass (MAB) in our test environment at the office. I created the following test environment: There are 4 different VLAN’s and a Cisco Catalyst 3750 connects the VLAN’s to each other. I wanted to create an environment with the following properties: All switch ports … Read More