Page 1
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release First Published: 2018-07-17 Last Modified: 2018-11-05 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883...
Page 2
This product includes software written by Tim Hudson (tjh@cryptsoft.com). Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/go/trademarks.
Page 3
RADIUS and TACACS+ Security Protocols LDAP SSH and Telnet User Accounts and Roles IP ACLs MAC ACLs VACLs DHCP Snooping Dynamic ARP Inspection IP Source Guard Password Encryption Keychain Management Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Enabling MSCHAP or MSCHAP V2 Authentication Configuring AAA Accounting Default Methods Using AAA Server VSAs with Cisco NX-OS Devices About VSAs VSA Format Specifying Cisco NX-OS User Roles and SNMPv3 Parameters on AAA Servers Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 5
Configuring the Global RADIUS Transmission Retry Count and Timeout Interval Configuring the RADIUS Transmission Retry Count and Timeout Interval for a Server Configuring Accounting and Authentication Attributes for RADIUS Servers Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 6
Configuring a Key for a Specific TACACS+ Server Configuring TACACS+ Server Groups Configuring the Global Source Interface for TACACS+ Server Groups Allowing Users to Specify a TACACS+ Server at Login Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 7
Vendor-Specific Attributes for LDAP Cisco VSA Format for LDAP Virtualization Support for LDAP Licensing Requirements for LDAP Prerequisites for LDAP Guidelines and Limitations for LDAP Default Settings for LDAP Configuring LDAP Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 8
Default Settings for SSH and Telnet Configuring SSH Generating SSH Server Keys Specifying the SSH Public Keys for User Accounts Specifying the SSH Public Keys in IETF SECSH Format Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x viii...
Page 9
User Role Rules Licensing Requirements for User Accounts and RBAC Guidelines and Limitations for User Accounts and RBAC Default Settings for User Accounts and RBAC Enabling Password-Strength Checking Configuring User Accounts Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 10
Enabling the 802.1X Feature Configuring AAA Authentication Methods for 802.1X Controlling 802.1X Authentication on an Interface Creating or Removing an Authenticator PAE on an Interface Enabling Periodic Reauthentication for an Interface Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 11
Protocols for IP ACLs and MAC ACLs Source and Destination Implicit Rules for IP and MAC ACLs Additional Filtering Options Sequence Numbers Logical Operators and Logical Operation Units IPv4 ACL Logging Time Ranges Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 12
Carving a TCAM Region Configuring System ACLs Configuration and Show Command Examples for the System ACLs Configuring Object Groups Session Manager Support for Object Groups Creating and Changing an IPv4 Address Object Group Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 13
Monitoring and Clearing MAC ACL Statistics Configuration Example for MAC ACLs Additional References for MAC ACLs C H A P T E R 1 2 Configuring VLAN ACLs About VLAN ACLs Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x xiii...
Page 14
Port Type Changes Licensing Requirements for Port Security Prerequisites for Port Security Default Settings for Port Security Guidelines and Limitations for Port Security Guidelines and Limitations for Port Security on vPCs Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 15
About the DHCP Relay Agent DHCP Relay Agent DHCP Relay Agent Option 82 VRF Support for the DHCP Relay Agent DHCP Smart Relay Agent About the DHCPv6 Relay Agent DHCPv6 Relay Agent Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 16
Enabling or Disabling VRF Support for the DHCPv6 Relay Agent Configuring DHCPv6 Server Addresses on an Interface Configuring the DHCPv6 Relay Source Interface Configuring IPv6 RA Guard Enabling DHCP Client Verifying the DHCP Configuration Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 17
Guidelines and Limitations for IPv6 Snooping How to Configure IPv6 FHS Configuring the IPv6 RA Guard Policy on the Device Configuring IPv6 RA Guard on an Interface Configuring DHCP—DHCPv6 Guard Configuring IPv6 Snooping Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x xvii...
Page 18
Verifying the DAI Configuration Monitoring and Clearing DAI Statistics Configuration Examples for DAI Two Devices Support DAI Configuring Device A Configuring Device B Additional References for DAI Related Documents Standards Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x xviii...
Page 19
Verifying the Password Encryption Configuration Configuration Examples for Password Encryption C H A P T E R 1 9 Configuring Keychain Management About Keychain Management Lifetime of a Key Licensing Requirements for Keychain Management Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 20
Unicast RPF Process Licensing Requirements for Unicast RPF Guidelines and Limitations for Unicast RPF Default Settings for Unicast RPF Configuring Unicast RPF for Cisco Nexus 9500 Switches with -R Line Cards Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 21
Configuring a Control Plane Policy Map Configuring the Control Plane Service Policy Configuring the CoPP Scale Factor Per Line Card Changing or Reapplying the Default CoPP Policy Copying the CoPP Best Practice Policy Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 22
Key Lifetime and Hitless Key Rollover Fallback Key Licensing Requirements for MACsec Guidelines and Limitations for MACsec Enabling MACsec Disabling MACsec Configuring a MACsec Keychain and Keys Configuring MACsec Fallback Key Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x xxii...
Page 23
About Configurable EAPOL Destination and Ethernet Type Enabling EAPOL Configuration Disabling EAPOL Configuration Verifying the MACsec Configuration Displaying MACsec Statistics Configuration Example for MACsec XML Examples MIBs Related Documentation Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x xxiii...
Page 25
Documentation Feedback, on page xxvi • Obtaining Documentation and Submitting a Service Request, on page xxvi Audience This publication is for network administrators who install, configure, and maintain Cisco Nexus switches. Document Conventions Command descriptions use the following conventions: Convention...
Page 26
An exclamation point (!) or a pound sign (#) at the beginning of a line of code indicates a comment line. Related Documentation for Cisco Nexus 9000 Series Switches The entire Cisco Nexus 9000 Series switch documentation set is available at the following URL: http://www.cisco.com/en/US/products/ps13386/tsd_products_support_series_home.html Documentation Feedback To provide technical feedback on this document, or to report an error or omission, please send your comments to nexus9k-docfeedback@cisco.com.
New and Changed Information, on page 1 New and Changed Information This table summarizes the new and changed features for the Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x and tells you where they are documented. Table 1: New and Changed Features for Cisco NX-OS Release 9.x...
Page 28
93240YC-FX2, and Cisco Nexus 93240YC-FX2-Z switches Unicast RPF Added support for 9.2(1) Configuring Unicast RPF, supported for Cisco on page 439 Nexus 9300-EX Series and Cisco Nexus 9300-FX/FX2 Series switches. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
C H A P T E R Overview The Cisco NX-OS software supports security features that can protect your network against degradation or failure and also against data loss or compromise resulting from intentional attacks and from unintended but damaging mistakes by well-meaning network users.
A distributed client/server system implemented through AAA that secures networks against unauthorized access. In the Cisco implementation, RADIUS clients run on Cisco routers and send authentication requests to a central RADIUS server that contains all user authentication and network service access information.
User Accounts and Roles You can create and manage user accounts and assign roles that limit access to operations on the Cisco NX-OS device. Role-based access control (RBAC) allows you to define the rules for an assign role that restrict the authorization that the user has to access management operations.
MAC ACLs are ACLs that filter traffic using the information in the Layer 2 header of each packet. Each rule specifies a set of conditions that a packet must satisfy to match the rule. When the Cisco NX-OS software determines that a MAC ACL applies to a packet, it tests the packet against the conditions of all rules. The first match determines whether a packet is permitted or denied, or if there is no match, the Cisco NX-OS software applies the applicable default rule.
When the ingress traffic reaches the traffic storm control level that is configured on the port, traffic storm control drops the traffic until the interval ends. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Excessive traffic to the supervisor module could overload it and slow down the performance of the entire Cisco NX-OS device. Attacks on the supervisor module can be of various types such as, denial-of-service (DoS) attacks that generate IP traffic streams to the control plane at a very high rate.
Cisco NX-OS device. Cisco NX-OS devices support Remote Access Dial-In User Service (RADIUS) or Terminal Access Controller Access Control System Plus (TACACS+) protocols. Based on the user ID and password combination that you provide, Cisco NX-OS devices perform local authentication or authorization using the local database or remote authentication or authorization using one or more AAA servers.
• You can centrally manage the accounting log for all Cisco NX-OS devices in the fabric. • It is easier to manage user attributes for each Cisco NX-OS device in the fabric than using the local databases on the Cisco NX-OS devices.
Specifies that no AAA authentication be used. Note If you specify the all RADIUS servers method, rather than a specified server group method, the Cisco NX-OS device chooses the RADIUS server from the global pool of configured RADIUS servers, in the order of configuration.
For console login authentication, user login authentication, and user management session accounting, the Cisco NX-OS device tries each option in the order specified. The local option is the default method when other configured options fail. You can disable the local option for the console or default login by using the no aaa authentication login {console | default} fallback error local command.
Configuring AAA AES Password Encryption and Master Encryption Keys • When you log in to the required Cisco NX-OS device, you can use the Telnet, SSH, or console login options. • When you have configured the AAA server groups using the server group authentication method, the Cisco NX-OS device sends an authentication request to the first AAA server in the group as follows: •...
AAA has the following guidelines and limitations: • If you have a user account configured on the local Cisco NX-OS device that has the same name as a remote user account on an AAA server, the Cisco NX-OS software applies the user roles for the local user account to the remote user, not the user roles configured on the AAA server.
This section describes the tasks for configuring AAA on Cisco NX-OS devices. Note If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature might differ from the Cisco IOS commands that you would use.
Page 42
If you perform a password recovery when remote authentication is enabled, local authentication becomes enabled for console login as soon as the password recovery is done. As a result, you can log into the Cisco NX-OS device through the console port using the new password. After login, you can continue to use local authentication, or you can enable remote authentication after resetting the admin password configured at the AAA servers.
Page 44
(Optional) show aaa authentication Displays the configuration of the default login authentication methods. Example: switch# show aaa authentication Step 5 (Optional) copy running-config startup-config Copies the running configuration to the startup configuration. Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Caution Disabling fallback to local authentication can lock your Cisco NX-OS device, forcing you to perform a password recovery in order to gain access. To prevent being locked out of the device, we recommend that you disable fallback to local authentication for only the default login or the console login, not both.
Enabling the Default User Role for AAA Authentication You can allow remote users who do not have a user role to log in to the Cisco NX-OS device through a RADIUS or TACACS+ remote authentication server using a default user role. When you disable the AAA default user role feature, remote users who do not have a user role cannot log in to the device.
Linux kernel authentication messages appear along with the previous message. Step 4 (Optional) show login on-failure log Displays whether the switch is configured to log failed authentication messages to the syslog server. Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
The Cisco NX-OS software supports the Challenge Handshake Authentication Protocol (CHAP), a challenge-response authentication protocol that uses the industry-standard Message Digest (MD5) hashing scheme to encrypt responses. You can use CHAP for user logins to a Cisco NX-OS device through a remote authentication server (RADIUS or TACACS+).
Microsoft Challenge Handshake Authentication Protocol (MSCHAP) is the Microsoft version of CHAP. The Cisco NX-OS software also supports MSCHAP Version 2 (MSCHAP V2). You can use MSCHAP for user logins to a Cisco NX-OS device through a remote authentication server (RADIUS or TACACS+). MSCHAP V2 only supports user logins to a Cisco NX-OS device through remote authentication RADIUS servers.
Page 51
By default, the Cisco NX-OS device uses Password Authentication Protocol (PAP) authentication between the Cisco NX-OS device and the remote server. If you enable MSCHAP or MSCHAP V2, you need to configure your RADIUS server to recognize the MSCHAP and MSCHAP V2 vendor-specific attributes (VSAs).
(AV) pairs and is stored on the AAA server. When you activate AAA accounting, the Cisco NX-OS device reports these attributes as accounting records, which are then stored in an accounting log on the security server.
Page 53
Displays the configuration AAA accounting default methods. Example: switch# show aaa accounting Step 5 (Optional) copy running-config startup-config Copies the running configuration to the startup configuration. Example: switch# copy running-config startup-config Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
The Cisco RADIUS implementation supports one vendor-specific option using the format recommended in the specification. The Cisco vendor ID is 9, and the supported option is vendor type 1, which is named cisco-av-pair. The value is a string with the following format:...
PDUs. Specifying Cisco NX-OS User Roles and SNMPv3 Parameters on AAA Servers You can use the VSA cisco-av-pair on AAA servers to specify user role mapping for the Cisco NX-OS device using this format: shell:roles="roleA roleB …"...
You can restrict the maximum number of simultaneous login sessions per user. Doing so prevents users from having multiple unwanted sessions and solves the potential security issue of unauthorized users accessing a valid SSH or Telnet session. SUMMARY STEPS 1. configure terminal Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
After providing the required options in the username command, press enter. User will be prompted for the username password and password will be hidden. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Configuring AAA Monitoring and Clearing the Local AAA Accounting Log Monitoring and Clearing the Local AAA Accounting Log The Cisco NX-OS device maintains a local log for the AAA accounting activity. You can monitor this log and clear it. SUMMARY STEPS 1.
The following example shows how to configure the switch to enter a 100-second quiet period if 3 failed login attempts is exceeded within 60 seconds. This example shows no login failures. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
User will be prompted for the username password and password will be hidden. Note: Choosing password key in the same line while configuring user account, password will not be hidden. switch(config)# username user1 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
No new or modified standards are supported by this feature, and support for existing standards has not — been modified by this feature. MIBs MIBs MIBs Link MIBs related to AAA To locate and download supported MIBs, go to the following URL: ftp://ftp.cisco.com/pub/mibs/supportlists/nexus9000/Nexus9000MIBSupportList.html Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 64
Configuring AAA Additional References for AAA Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
RADIUS server-based security database. • Networks already using RADIUS. You can add a Cisco NX-OS device with RADIUS to the network. This action might be the first step when you make a transition to a AAA server.
RADIUS Operation When a user attempts to log in and authenticate to a Cisco NX-OS device using RADIUS, the following process occurs: • The user is prompted for and enters a username and password.
The Cisco RADIUS implementation supports one vendor-specific option using the format recommended in the specification. The Cisco vendor ID is 9, and the supported option is vendor type 1, which is named cisco-av-pair. The value is a string with the following format:...
RADIUS requires no license. Any feature not included in a license package is bundled with the nx-os image and is provided at no extra charge to you. For an explanation of the Cisco NX-OS licensing scheme, see the Cisco NX-OS Licensing Guide.
• You can configure a maximum of 64 RADIUS servers on the Cisco NX-OS device. • If you have a user account configured on the local Cisco NX-OS device that has the same name as a remote user account on an AAA server, the Cisco NX-OS software applies the user roles for the local user account to the remote user, not the user roles configured on the AAA server.
You can configure up to 64 RADIUS servers. Note By default, when you configure a RADIUS server IP address or hostname of the Cisco NX-OS device, the RADIUS server is added to the default RADIUS server group. You can also add the RADIUS server to another RADIUS server group.
Page 71
(Optional) copy running-config startup-config Copies the running configuration to the startup configuration. Example: switch# copy running-config startup-config Related Topics Configuring a Key for a Specific RADIUS Server, on page 47 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Configuring Global RADIUS Keys Configuring Global RADIUS Keys You can configure RADIUS keys for all servers used by the Cisco NX-OS device. A RADIUS key is a shared secret text string between the Cisco NX-OS device and the RADIUS server hosts.
Configuring a Key for a Specific RADIUS Server You can configure a key on the Cisco NX-OS device for a specific RADIUS server. A RADIUS key is a secret text string shared between the Cisco NX-OS device and a specific RADIUS server.
You can configure these server groups at any time but they only take effect when you apply them to an AAA service. Before you begin Ensure that all servers in the group are RADIUS servers. SUMMARY STEPS 1. configure terminal Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 75
Step 6 (Optional) use-vrf vrf-name Specifies the VRF to use to contact the servers in the server group. Example: switch(config-radius)# use-vrf vrf1 Step 7 Exits configuration mode. exit Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Configures the global source interface for all RADIUS server groups configured on the device. Example: switch(config)# ip radius source-interface mgmt 0 Step 3 exit Exits configuration mode. Example: switch(config)# exit switch# Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
By default, the Cisco NX-OS device forwards an authentication request based on the default AAA authentication method. You can configure the Cisco NX-OS device to allow the user to specify a VRF and RADIUS server to send the authentication request by enabling the directed-request option. If you enable this option, the user can log in as username@vrfname:hostname, where vrfname is the VRF to use and hostname is the name of a configured RADIUS server.
You can configure a global retransmission retry count and timeout interval for all RADIUS servers. By default, a Cisco NX-OS device retries transmission to a RADIUS server only once before reverting to local authentication. You can increase this number up to a maximum of five retries per server. The timeout interval determines how long the Cisco NX-OS device waits for responses from RADIUS servers before declaring a timeout failure.
Configuring the RADIUS Transmission Retry Count and Timeout Interval for a Server By default, a Cisco NX-OS device retries a transmission to a RADIUS server only once before reverting to local authentication. You can increase this number up to a maximum of five retries per server. You can also set a timeout interval that the Cisco NX-OS device waits for responses from RADIUS servers before declaring a timeout failure.
Page 80
RADIUS configuration to other Cisco NX-OS switch(config)# radius commit devices if you have enabled CFS configuration distribution for the user role feature. Step 6 exit Exits configuration mode. Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
The global configuration parameters include the username and password to use for the servers and an idle timer. The idle timer specifies the interval in which a RADIUS server receives no requests before the Cisco NX-OS device sends out a test packet. You can configure this option to test servers periodically, or you can run a one-time only test.
The idle timer specifies the interval during which a RADIUS server receives no requests before the Cisco NX-OS device sends out a test packet. You can configure this option to test servers periodically, or you can run a one-time only test.
Page 85
Configuring RADIUS Configuring Periodic RADIUS Server Monitoring on Individual Servers Note The default idle timer value is 0 minutes. When the idle time interval is 0 minutes, the Cisco NX-OS device does not perform periodic RADIUS server monitoring. Before you begin Enable RADIUS.
You can configure the dead-time interval for all RADIUS servers. The dead-time interval specifies the time that the Cisco NX-OS device waits after declaring a RADIUS server is dead, before sending out a test packet to determine if the server is now alive. The default value is 0 minutes.
RSA SecurID token. Note The token code used for logging into the Cisco NX-OS device changes every 60 seconds. To prevent problems with device discovery, we recommend using different usernames that are present on the Cisco Secure ACS internal database.
Displays the RADIUS configuration in the startup configuration. show radius-server [hostname | ipv4-address | Displays all configured RADIUS server parameters. ipv6-address] [directed-request | groups | sorted | statistics] Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Configuring RADIUS Monitoring RADIUS Servers Monitoring RADIUS Servers You can monitor the statistics that the Cisco NX-OS device maintains for RADIUS server activity. Before you begin Configure one or more RADIUS server hosts. SUMMARY STEPS 1. show radius-server statistics {hostname | ipv4-address | ipv6-address}...
Cisco Nexus 9000 Series NX-OS Unicast Routing Configuration Guide Standards Standards Title No new or modified standards are supported by this feature, and support for existing standards has not — been modified by this feature. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 91
Configuring RADIUS Additional References for RADIUS MIBs MIBs MIBs Link MIBs related to RADIUS To locate and download supported MIBs, go to the following URL: ftp://ftp.cisco.com/pub/mibs/supportlists/nexus9000/ Nexus9000MIBSupportList.html Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 92
Configuring RADIUS Additional References for RADIUS Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Additional References for TACACS+, on page 102 About TACACS+ The TACACS+ security protocol provides centralized validation of users attempting to gain access to a Cisco NX-OS device. TACACS+ services are maintained in a database on a TACACS+ daemon running, typically, on a UNIX or Windows NT workstation.
This action is usually done by prompting for a username and password combination, but may include prompts for other items, such as your mother’s maiden name. 1. When the Cisco NX-OS device establishes a connection, it contacts the TACACS+ daemon to obtain the username and password.
You must configure the TACACS+ secret key to authenticate the switch to the TACACS+ server. A secret key is a secret text string shared between the Cisco NX-OS device and the TACACS+ server host. The length of the key is restricted to 63 characters and can include any printable ASCII characters (white spaces are not allowed).
The Cisco TACACS+ implementation supports one vendor-specific option using the format recommended in the IETF specification. The Cisco vendor ID is 9, and the supported option is vendor type 1, which is named cisco-av-pair. The value is a string with the following format:...
• You can configure a maximum of 64 TACACS+ servers on the Cisco NX-OS device. • If you have a user account configured on the local Cisco NX-OS device that has the same name as a remote user account on an AAA server, the Cisco NX-OS software applies the user roles for the local user account to the remote user, not the user roles configured on the AAA server.
This section describes how to configure TACACS+ on a Cisco NX-OS device. Note If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature might differ from the Cisco IOS commands that you would use.
Cisco NX-OS device. You can configure up to 64 TACACS+ servers. Note By default, when you configure a TACACS+ server IP address or hostname on the Cisco NX-OS device, the TACACS+ server is added to the default TACACS+ server group. You can also add the TACACS+ server to another TACACS+ server group.
Page 100
Step 6 (Optional) show tacacs-server Displays the TACACS+ server configuration. Example: switch# show tacacs-server Step 7 (Optional) copy running-config startup-config Copies the running configuration to the startup configuration. Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Configuring Global TACACS+ Keys You can configure secret TACACS+ keys at the global level for all servers used by the Cisco NX-OS device. A secret key is a shared secret text string between the Cisco NX-OS device and the TACACS+ server hosts.
TACACS+ protocol. The servers are tried in the same order in which you configure them. You can configure these server groups at any time but they only take effect when you apply them to an AAA service. Before you begin Enable TACACS+. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 104
Related Topics Enabling TACACS+ , on page 73 Remote AAA Services, on page 10 Configuring TACACS+ Server Hosts, on page 73 Configuring the TACACS+ Dead-Time Interval, on page 87 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
You can configure the switch to allow the user to specify which TACACS+ server to send the authentication request by enabling the directed-request option. By default, a Cisco NX-OS device forwards an authentication Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 106
VRF to use and hostname is the name of a configured TACACS+ server. Note If you enable the directed-request option, the Cisco NX-OS device uses only the TACACS+ method for authentication and not the default local method. Note User-specified logins are supported only for Telnet sessions.
Configuring the Timeout Interval for a TACACS+ Server You can set a timeout interval that the Cisco NX-OS device waits for responses from a TACACS+ server before declaring a timeout failure. The timeout interval determines how long the Cisco NX-OS device waits for responses from a TACACS+ server before declaring a timeout failure.
, on page 73 Configuring TCP Ports You can configure another TCP port for the TACACS+ servers if there are conflicts with another application. By default, Cisco NX-OS devices use port 49 for all TACACS+ requests. Before you begin Enable TACACS+.
You can monitor the availability of all TACACS+ servers without having to configure the test parameters for each server individually. Any servers for which test parameters are not configured are monitored using the global level parameters. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 110
The global configuration parameters include the username and password to use for the servers and an idle timer. The idle timer specifies the interval in which a TACACS+ server receives no requests before the Cisco NX-OS device sends out a test packet. You can configure this option to test servers periodically, or you can run a one-time only test.
The idle timer specifies the interval in which a TACACS+ server receives no requests before the Cisco NX-OS device sends out a test packet. You can configure this option to test servers periodically, or you can run a one-time only test.
Page 112
5 range is from 0 to 1440 minutes. Step 4 exit Exits configuration mode. Example: switch(config)# exit switch# Step 5 (Optional) show tacacs-server Displays the TACACS+ server configuration. Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
You can configure the dead-time interval for all TACACS+ servers. The dead-time interval specifies the time that the Cisco NX-OS device waits, after declaring a TACACS+ server is dead, before sending out a test packet to determine if the server is now alive.
, on page 73 Configuring Command Authorization on TACACS+ Servers You can configure authorization for commands on TACACS+ servers. Caution Command authorization disables user role-based authorization control (RBAC), including the default roles. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 117
By default, context sensitive help and command tab completion show only the commands supported for a user as defined by the assigned roles. When you enable command authorization, the Cisco NX-OS software displays all commands in the context sensitive help and in tab completion, regardless of the role assigned to the user.
, on page 73 Testing Command Authorization on TACACS+ Servers, on page 92 Testing Command Authorization on TACACS+ Servers You can test the command authorization for a user on the TACACS+ servers. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
You can enable and disable command authorization verificaiton on the command-line interface (CLI) for the default user session or for another username. Note The commands do no execute when you enable authorization verification. SUMMARY STEPS 1. terminal verify-only [username username] Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
When the feature privilege command is enabled, privilege roles inherit the permissions of lower level privilege roles. Note You must also configure the privilege level for the Cisco NX-OS device on the Cisco Secure Access Control Server (ACS). Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 121
Displays the username, current privilege level, and status of cumulative privilege support. Example: switch(config)# show privilege Step 6 (Optional) copy running-config startup-config Copies the running configuration to the startup configuration. Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
You can manually issue a test message to a TACACS+ server or to a server group. Before you begin Enable TACACS+. SUMMARY STEPS 1. test aaa server tacacs+ {ipv4-address | ipv6-address | hostname} [vrf vrf-name] username password 2. test aaa group group-name username password Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Example: switch# copy running-config startup-config Monitoring TACACS+ Servers You can monitor the statistics that the Cisco NX-OS device maintains for TACACS+ server activity. Before you begin Configure TACACS+ servers on the Cisco NX-OS device. SUMMARY STEPS 1. show tacacs-server statistics {hostname | ipv4-address | ipv6-address}...
The following example shows how to configure a TACACS+ server host and server group: feature tacacs+ tacacs-server key 7 "ToIkLhPpG" tacacs-server host 10.10.2.2 key 7 "ShMoMhTl" aaa group server tacacs+ TacServer server 10.10.2.2 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
This section includes additional information related to implementing TACACS+. Related Documents Related Topic Document Title Cisco NX-OS licensing Cisco NX-OS Licensing Guide VRF configuration Cisco NX-OS 9000 Series NX-OS Unicast Routing Configuration Guide Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 129
No new or modified standards are supported by this feature, and support for existing standards has not — been modified by this feature. MIBs MIBs MIBs Link MIBs related to TACACS+ To locate and download supported MIBs, go to the following URL: ftp://ftp.cisco.com/pub/mibs/supportlists/nexus9000/ Nexus9000MIBSupportList.html Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 130
Configuring TACACS+ Additional References for TACACS+ Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
The Lightweight Directory Access Protocol (LDAP) provides centralized validation of users attempting to gain access to a Cisco NX-OS device. LDAP services are maintained in a database on an LDAP daemon running typically on a UNIX or Windows NT workstation. You must have access to and must configure an LDAP server before the configured LDAP features on your Cisco NX-OS device are available.
The default password attribute type is userPassword. LDAP Operation for User Login When a user attempts a Password Authentication Protocol (PAP) login to a Cisco NX-OS device using LDAP, the following actions occur: 1. When the Cisco NX-OS device establishes a connection, it contacts the LDAP daemon to obtain the username and password.
The Cisco LDAP implementation supports one vendor-specific option using the format recommended in the IETF specification. The Cisco vendor ID is 9, and the supported option is vendor type 1, which is named cisco-av-pair. The value is a string with the following format: protocol : attribute separator value * Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Configuring LDAP Virtualization Support for LDAP The protocol is a Cisco attribute for a particular type of authorization, the separator is an = (equal sign) for mandatory attributes, and an * (asterisk) indicates optional attributes. When you use LDAP servers for authentication on a Cisco NX-OS device, LDAP directs the LDAP server to return user attributes, such as authorization information, along with authentication results.
1. • If you have a user account configured on the local Cisco NX-OS device that has the same name as a remote user account on a AAA server, the Cisco NX-OS software applies the user roles for the local user account to the remote user, not the user roles configured on the AAA server.
Configuring Periodic LDAP Server Monitoring, on page 119 Enabling or Disabling LDAP By default, the LDAP feature is disabled on the Cisco NX-OS device. You must explicitly enable the LDAP feature to access the configuration and verification commands for authentication. SUMMARY STEPS 1.
Cisco NX-OS device. You can configure up to 64 LDAP servers. Note By default, when you configure an LDAP server IP address or hostname on the Cisco NX-OS device, the LDAP server is added to the default LDAP server group. You can also add the LDAP server to another LDAP server group.
[no] ldap-server host {ipv4-address | ipv6-address | Specifies the rootDN for the LDAP server database and the bind password for the root. hostname} rootDN root-name [password password [port tcp-port [timeout seconds] | timeout seconds]] Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 140
Step 8 exit Exits LDAP server group configuration mode. Example: switch(config-ldap)# exit switch(config)# Step 9 (Optional) show ldap-server groups Displays the LDAP server group configuration. Example: switch(config)# show ldap-server groups Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Hosts, on page 111 Configuring the Global LDAP Timeout Interval You can set a global timeout interval that determines how long the Cisco NX-OS device waits for responses from all LDAP servers before declaring a timeout failure. Before you begin Enable LDAP.
Server, on page 116 Configuring the Timeout Interval for an LDAP Server You can set a timeout interval that determines how long the Cisco NX-OS device waits for responses from an LDAP server before declaring a timeout failure. Before you begin Enable LDAP.
Configuring TCP Ports Configuring TCP Ports You can configure another TCP port for the LDAP servers if there are conflicts with another application. By default, Cisco NX-OS devices use port 389 for all LDAP requests. Before you begin Enable LDAP.
You can configure the dead-time interval for all LDAP servers. The dead-time interval specifies the time that the Cisco NX-OS device waits, after declaring that an LDAP server is dead, before sending out a test packet to determine if the server is now alive.
Related Topics Enabling or Disabling LDAP, on page 110 Monitoring LDAP Servers You can monitor the statistics that the Cisco NX-OS device maintains for LDAP server activity. Before you begin Configure LDAP servers on the Cisco NX-OS device. SUMMARY STEPS 1.
Statistics, on page 123 Clearing LDAP Server Statistics, on page 123 Clearing LDAP Server Statistics You can display the statistics that the Cisco NX-OS device maintains for LDAP server activity. Before you begin Configure LDAP servers on the Cisco NX-OS device. SUMMARY STEPS 1.
The following example shows how to configure AAA authorization with certificate authentication for an LDAP server: aaa authorization ssh-certificate default group LDAPServer1 LDAPServer2 exit show aaa authorization Where to Go Next You can now configure AAA authentication methods to include the server groups. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
No new or modified standards are supported by this feature, and support for existing standards has not — been modified by this feature. MIBs MIBs MIBs Link MIBs related to LDAP To locate and download the supported MIBs, go to the following URL: ftp://ftp.cisco.com/pub/mibs/supportlists/nexus9000/Nexus9000MIBSupportList.html Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 152
Configuring LDAP Additional References for LDAP Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
This section includes information about SSH and Telnet. SSH Server You can use the SSH server to enable an SSH client to make a secure, encrypted connection to a Cisco NX-OS device. SSH uses strong encryption for authentication. The SSH server in the Cisco NX-OS software can interoperate with publicly and commercially available SSH clients.
The SSH client in the Cisco NX-OS software works with publicly and commercially available SSH servers. SSH Server Keys SSH requires server keys for secure communications to the Cisco NX-OS device. You can use SSH server keys for the following SSH options: •...
• Due to a Poodle vulnerability, SSLv3 is no longer supported. • IPSG is not supported on the following: • The last six 40-Gb physical ports on the Cisco Nexus 9372PX, 9372TX, and 9332PQ switches • All 40G physical ports on the Cisco Nexus 9396PX, 9396TX, and 93128TX switches •...
Default Settings for SSH and Telnet Note If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature might differ from the Cisco IOS commands that you would use. Default Settings for SSH and Telnet This table lists the default settings for SSH and Telnet parameters.
Page 157
MD5. However, the md5 option has been added, if you want to see the fingerprint in MD5 format for backward compatibility. Step 8 show run security all Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Starting SSH Sessions You can start SSH sessions using IPv4 or IPv6 to connect to remote devices from the Cisco NX-OS device. Before you begin Obtain the hostname for the remote device and, if needed, the username on the remote device.
Configuring SSH Passwordless File Copy You can copy files from a Cisco NX-OS device to a secure copy (SCP) or secure FTP (SFTP) server without a password. To do so, you must create an RSA or DSA identity that consists of public and private keys for authentication with SSH.
Page 163
.pub extension. You can now copy this key pair to any Cisco NX-OS device and use SCP or SFTP to copy the public key file (*.pub) to the home directory of the server.
Configuring SCP and SFTP Servers You can configure an SCP or SFTP server on the Cisco NX-OS device in order to copy files to and from a remote device. After you enable the SCP or SFTP server, you can execute an SCP or SFTP command on the remote device to copy the files to or from the Cisco NX-OS device.
(Optional) crypto ca crl request trustpoint bootflash:static-crl.crl (Optional) show crypto ca certificates (Optional) show crypto ca crl trustpoint (Optional) show user-account (Optional) show users (Optional) copy running-config startup-config Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 166
The default is 0 (clear text). Note If you do not specify a password, the user might not be able to log in to the Cisco NX-OS device. If you create a user account with the encrypted Note password option, the corresponding SNMP user will not be created.
• ssh-rsa Changing the Default SSH Server Port Beginning with Cisco NX-OS Cisco Release 9.2(1), you can change the SSHv2 port number from the default port number 22. Encryptions used while changing the default SSH port provides you with connections that...
Configuring SSH and Telnet Disabling the SSH Server Disabling the SSH Server By default, the SSH server is enabled on the Cisco NX-OS device. You can disable the SSH server to prevent SSH access to the switch. SUMMARY STEPS 1. configure terminal 2.
Copies the running configuration to the startup configuration. Example: switch# copy running-config startup-config Related Topics Generating SSH Server Keys, on page 130 Clearing SSH Sessions You can clear SSH sessions from the Cisco NX-OS device. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Configuring Telnet This section describes how to configure Telnet on the Cisco NX-OS device. Enabling the Telnet Server You can enable the Telnet server on the Cisco NX-OS device. By default, the Telnet server is disabled. SUMMARY STEPS 1. configure terminal 2.
Example: switch# copy running-config startup-config Starting Telnet Sessions to Remote Devices You can start Telnet sessions to connect to remote devices from the Cisco NX-OS device. You can start Telnet sessions using either IPv4 or IPv6. Before you begin Obtain the hostname or IP address for the remote device and, if needed, the username on the remote device.
Displays the SSH server configuration. show telnet server Displays the Telnet server configuration. show username username keypair Displays the public key for the specified user. Displays configured user account details. show user-account Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
The following example shows how to copy files from a Cisco NX-OS device to a secure copy (SCP) or secure FTP (SFTP) server without a password: Step 1 Generate the SSH public and private keys and store them in the home directory of the Cisco NX-OS device for the specified user. Example:...
Page 178
On the SCP or SFTP server, append the public key stored in key_rsa.pub to the authorized_keys file. Example: $ cat key_rsa.pub >> $HOME/.ssh/ authorized_keys You can now copy files from the Cisco NX-OS device to the server without a password using standard SSH and SCP commands. Step 6 (Optional) Repeat this procedure for the DSA keys.
DN : /C = US, ST = New York, L = Metropolis, O = cisco , OU = csg, CN = user1; Algo: x509v3-sign-rsa show users NAME...
Page 180
X.509v3 Certificates for Secure Shell Authentication 6187 MIBs MIBs MIBs Link MIBs related to SSH and Telnet To locate and download supported MIBs, go to the following URL: ftp://ftp.cisco.com/pub/mibs/supportlists/nexus9000/ Nexus9000MIBSupportList.html Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
About User Accounts and RBAC You can create and manage users accounts and assign roles that limit access to operations on the Cisco NX-OS device. RBAC allows you to define the rules for an assign role that restrict the authorization that the user has to access management operations.
All printable ASCII characters are supported in the password string if they are enclosed in quotation marks. If a password is trivial (such as a short, easy-to-decipher password), the Cisco NX-OS software will reject your password configuration if password-strength checking is enabled. Be sure to configure a strong password as shown in the sample configuration.
• You can assign a maximum of 64 user roles to a user account. • If you have a user account configured on the local Cisco NX-OS device that has the same name as a remote user account on an AAA server, the Cisco NX-OS software applies the user roles for the local user account to the remote user, not the user roles configured on the AAA server.
Enabling Password-Strength Checking You can enable password-strength checking which prevents you from creating weak passwords for user accounts. Note When you enable password-strength checking, the Cisco NX-OS software does not check the strength of existing passwords. SUMMARY STEPS 1. configure terminal 2.
Related Topics Characteristics of Strong Passwords, on page 156 Configuring User Accounts You can create a maximum of 256 user accounts on a Cisco NX-OS device. User accounts have the following attributes: • Username • Password • Expiry date •...
Page 187
The default is 0 (clear text). Note If you do not specify a password, the user might not be able to log in to the Cisco NX-OS device. If you create a user account with the encrypted Note password option, the corresponding SNMP user will not be created.
NewUser ssh-cert-dn "/CN 512 characters and must follow the format shown in the = NewUser, OU = Cisco Demo, O = Cisco, C = US" examples. Make sure the email address and state are configured as emailAddress and ST, respectively.
Page 189
Configuring User Accounts and RBAC Creating User Roles and Rules Before you begin If you want to distribute the user role configuration, enable user role configuration distribution on all Cisco NX-OS devices to which you want the configuration distributed. SUMMARY STEPS...
Page 190
Applies the user role configuration changes in the temporary database to the running configuration. Example: switch(config)# role commit Step 13 (Optional) copy running-config startup-config Copies the running configuration to the startup configuration. Example: switch(config)# copy running-config startup-config Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Creating Feature Groups You can create custom feature groups to add to the default list of features provided by the Cisco NX-OS software. These groups contain one or more of the features. You can create up to 64 feature groups.
Before you begin Create one or more user roles. If you want to distribute the user role configuration, enable user role configuration distribution on all Cisco NX-OS devices to which you want the configuration distributed. SUMMARY STEPS 1.
Changing User Role VLAN Policies You can change a user role VLAN policy to limit the VLANs that the user can access. By default, a user role allows access to all VLANs. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 194
1-4 Step 5 exit Exits role VLAN policy configuration mode. Example: switch(config-role-vlan)# exit switch(config-role)# Step 6 (Optional) show role Displays the role configuration. Example: switch(config)# show role Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
VRFs. Before you begin Create one or more user roles. If you want to distribute the user role configuration, enable user role configuration distribution on all Cisco NX-OS devices to which you want the configuration distributed. SUMMARY STEPS 1.
Page 196
Step 9 (Optional) copy running-config startup-config Copies the running configuration to the startup configuration. Example: switch(config-role)# copy running-config startup-config Related Topics Creating User Roles and Rules, on page 162 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Before you begin If you plan to enter the no service password-recovery command, Cisco recommends that you save a copy of the system configuration file in a location away from the device.
To display user account and RBAC configuration information, perform one of the following tasks: Command Purpose Displays the syntax of the show cli syntax roles network-admin commands that the network-admin role can use. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
The following example shows how to configure a user role that can configure only a specific interface: role name Int_Eth2-3_only rule 1 permit command configure terminal; interface * interface policy deny permit interface Ethernet2/3 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
------------------------------------------------------------------- permit read-write 1.3.6.1.2.1.1.5 deny read 1.3.6.1.2.1.1.9 permit read feature snmp Additional References for User Accounts and RBAC This section includes additional information related to implementing user accounts and RBAC. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 201
— been modified by this feature. MIBs MIBs MIBs Link MIBs related to user accounts and To locate and download supported MIBs, go to the following URL: RBAC ftp://ftp.cisco.com/pub/mibs/supportlists/nexus9000/ Nexus9000MIBSupportList.html Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 202
Configuring User Accounts and RBAC Additional References for User Accounts and RBAC Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
C H A P T E R Configuring 802.1X This chapter describes how to configure IEEE 802.1X port-based authentication on Cisco NX-OS devices. This chapter includes the following sections: • About 802.1X, on page 177 • Licensing Requirements for 802.1X, on page 183 •...
The specific roles are as follows: Supplicant The client device that requests access to the LAN and Cisco NX-OS device services and responds to requests from the Cisco NX-OS device. The workstation must be running 802.1X-compliant client software such as that offered in the Microsoft Windows XP operating device.
Page 205
Note If 802.1X is not enabled or supported on the network access device, the Cisco NX-OS device drops any EAPOL frames from the supplicant. If the supplicant does not receive an EAP-request/identity frame after three attempts to start authentication, the supplicant transmits data as if the port is in the authorized state. A port in the authorized state means that the supplicant has been successfully authenticated.
Authenticator PAE Status for Interfaces Authenticator PAE Status for Interfaces When you enable 802.1X on an interface, the Cisco NX-OS software creates an authenticator port access entity (PAE) instance. An authenticator PAE is a protocol entity that supports authentication on the interface.
Cisco NX-OS device grants the client access to the network. If an EAPOL packet is detected on the interface during the lifetime of the link, the Cisco NX-OS device determines that the device connected to that interface is an 802.1X-capable supplicant and uses 802.1X authentication (not MAC authentication bypass) to authorize the interface.
Cisco NX-OS device puts the port in the authorized state. When the endpoint device leaves the port, the Cisco NX-OS device put the port back into the unauthorized state. A security violation in 802.1X is defined as a detection of frames sourced from any MAC address other than the single MAC address authorized as a result of successful authentication.
802.1X Guidelines and Limitations 802.1X port-based authentication has the following configuration guidelines and limitations: • When you upgrade the Cisco Nexus Series switch to Cisco NX-OS Release 9.2(1) using the (dispruptive/non-disruptive) In-Service Software Upgrades (ISSU), you must first the disable 802.1x using the no feature dot1x command and then enable it using the feature dot1x commandfor mutli-authentication to work.
Page 210
• The Cisco NX-OS software supports 802.1X authentication only on physical ports. • The Cisco NX-OS software does not support 802.1X authentication on port channels or subinterfaces. • The Cisco NX-OS software supports 802.1X authentication on member ports of a port channel but not on the port channel itself.
Configuring 802.1X Default Settings for 802.1X • Selective enabling or disabling of dot1x on N9K-M12PQ uplink module ports is not supported for Cisco Nexus 9300 platform switches. • A security violation occurs when the same mac is learnt on a different VLAn with dot1x enabled on the interface.
Configure the connection to the remote RADIUS server. Step 3 Enable 802.1X feature on the Ethernet interfaces. Enabling the 802.1X Feature You must enable the 802.1X feature on the Cisco NX-OS device before authenticating any supplicant devices. SUMMARY STEPS 1. configure terminal 2. feature dot1x 3.
Configuring AAA Authentication Methods for 802.1X You can use remote RADIUS servers for 802.1X authentication. You must configure RADIUS servers and RADIUS server groups and specify the default AAA authentication method before the Cisco NX-OS device can perform 802.1X authentication.
Enables 802.1X authentication on the interface. Force-authorized Disables 802.1X authentication on the interface and allows all traffic on the interface without authentication. This state is the default. Force-unauthorized Disallows all traffic on the interface. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 215
Example: switch# show dot1x interface ethernet 2/1 Step 7 (Optional) copy running-config startup-config Copies the running configuration to the startup configuration. Example: switch# copy running-config startup-config Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
You can create or remove the 802.1X authenticator port access entity (PAE) instance on an interface. Note By default, the Cisco NX-OS software creates the authenticator PAE instance on the interface when you enable 802.1X on an interface. Before you begin Enable the 802.1X feature.
The default is 3600 seconds. The range is from 1 Example: to 65535. switch(config-if)# dot1x timeout re-authperiod 3300 This command affects the behavior of the Cisco Note NX-OS device only if you enable periodic reauthentication on the interface. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Example: switch# dot1x re-authenticate interface 2/1 Manually Initializing 802.1X Authentication You can manually initialize the authentication for all supplicants on a Cisco NX-OS device or for a specific interface. Note Initializing the authentication clears any existing authentication status before starting the authentication process for the client.
The authentication server notifies the switch each time that it receives a Layer 4 packet. If the switch does not receive a notification after sending a packet, the Cisco NX-OS device waits a set period of time and then retransmits the packet. The default is 30 seconds. The range is from 1 to 65535 seconds.
Page 220
Sets the number of seconds that the authenticator ignores EAPOL-Start packets from supplicants that have Example: successfully authenticated. The default value is 0 seconds. switch(config-if)# dot1x timeout ratelimit-period The range is from 1 to 65535 seconds. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
You can enable MAC authentication bypass on an interface that has no supplicant connected. Before you begin Enable the 802.1X feature on the Cisco NX-OS device. SUMMARY STEPS 1. configure terminal 2. interface ethernet slot/port Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
You can enable single host or multiple hosts mode on an interface. Before you begin Enable the 802.1X feature on the Cisco NX-OS device. SUMMARY STEPS 1. configure terminal 2. interface ethernet slot/port Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 223
Displays all 802.1X feature status and configuration information. Example: switch# show dot1x all Step 7 (Optional) copy running-config startup-config Copies the running configuration to the startup configuration. Example: switch(config)# copy running-config startup-config Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Disabling 802.1X Authentication on the Cisco NX-OS Device Disabling 802.1X Authentication on the Cisco NX-OS Device You can disable 802.1X authentication on the Cisco NX-OS device. By default, the Cisco NX-OS software enables 802.1X authentication after you enable the 802.1X feature. However, when you disable the 802.1X feature, the configuration is removed from the Cisco NX-OS device.
You can disable the 802.1X feature on the Cisco NX-OS device. When you disable 802.1X, all related configurations are automatically discarded. The Cisco NX-OS software creates an automatic checkpoint that you can use if you reenable 802.1X and want to recover the configuration.
Displays all 802.1X feature status and configuration information. Example: switch(config)# show dot1x all Step 6 (Optional) copy running-config startup-config Copies the running configuration to the startup configuration. Example: switch(config)# copy running-config startup-config Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Setting the Maximum Authenticator-to-Supplicant Frame for an Interface You can set the maximum number of times that the Cisco NX-OS device retransmits authentication requests to the supplicant on an interface before the session times out. The default is 2 times and the range is from 1 to 10.
Example This example shows how to enable the 802.1x feature: switch# configure terminal switch(config)# aaa accounting dot1x default group radius switch(config)# exit switch# show aaa accounting switch# copy running-config startup-config Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Setting the Maximum Reauthentication Retry Count on an Interface You can set the maximum number of times that the Cisco NX-OS device retransmits reauthentication requests to the supplicant on an interface before the session times out. The default is 2 times and the range is from 1 to 10.
Displays the 802.1X feature configuration in the startup configuration. For detailed information about the fields in the output from these commands, see the Cisco NX-OS Security Command Reference for your platform. 802.1X Support for VXLAN EVPN Guidelines and Limitations for 802.1X Support for VXLAN EVPN The following are the guidelines and limitations for 802.1X support for VXLAN EVPN:...
Configuring 802.1X Support for VXLAN EVPN • You must not configure static and secure MAC together. • The Cisco Nexus 9504 and 9508 switches with -R line cards are not supported. Configuring 802.1X Support for VXLAN EVPN This procedure configures 802.1X for VXLAN EVPN.
RateLimitPeriod = 0 InactivityPeriod = 0 Mac-Auth-Bypass = Enabled Monitoring 802.1X You can display the statistics that the Cisco NX-OS device maintains for the 802.1X activity. Before you begin Enable the 802.1X feature on the Cisco NX-OS device. SUMMARY STEPS 1.
PPP Extensible Authentication Protocol (EAP) RFC 3580 IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines MIBs MIBs MIBs Link IEEE8021-PAE-MIB To locate and download MIBs, go to the following URL: http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 238
Configuring 802.1X Additional References for 802.1X Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
C H A P T E R Configuring IP ACLs This chapter describes how to configure IP access control lists (ACLs) on Cisco NX-OS devices. Unless otherwise specified, the term IP ACL refers to IPv4 and IPv6 ACLs. This chapter includes the following sections: •...
Egress router ACLs are not supported on subinterfaces and on Cisco Nexus You must enable VLAN Note 9300 Series switch uplink ports. interfaces globally before you can configure a VLAN interface. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
If the packet is bridged within the ingress VLAN, the device does not apply router ACLs. Figure 7: Order of ACL Application The following figure shows the order in which the device applies ACLs. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
For example, you can use 0x0800 to specify IP traffic in a MAC ACL rule. In IPv4 and IPv6 ACLs, you can specify protocols by the integer that represents the Internet protocol number. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
105 to the new rule. Removing a rule Without using a sequence number, removing a rule requires that you enter the whole rule, as follows: switch(config-acl)# no permit tcp 10.0.0.0/8 any Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Logical Operators and Logical Operation Units IP ACL rules for TCP and UDP traffic can use logical operators to filter traffic based on port numbers. Cisco NX-OS supports logical operators in only the ingress direction.
Page 246
Note The order of rules in a time range does not affect how a device evaluates whether a time range is active. Cisco NX-OS includes sequence numbers in time ranges to make editing the time range easier. Time ranges also allow you to include remarks, which you can use to insert comments into a time range.
Note Policy-based routing (PBR) ACLs do not support deny access control entries (ACEs) or deny commands to configure a rule. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Atomic ACL Updates By default, when a supervisor module of a Cisco Nexus 9000 Series device updates an I/O module with changes to an ACL, it performs an atomic ACL update. An atomic update does not disrupt traffic that the updated ACL applies to;...
TCAM regions to make room for new requirements. On Cisco Nexus 9200 Series switches, the egress TCAM size is 2K, and the ingress TCAM size is 4K. The concepts of TCAM slices and single- and double-wide regions do not apply to these switches. For example, the ing-ifacl region can host IPv4, IPv6, or MAC type entries.
Page 250
512 entries). • RACL v6, CoPP, and multicast have default TCAM sizes and these TCAM sizes must be non-zero on the following Cisco Nexus 9504 and Cisco Nexus 9508 line cards to avoid line card failure during reload: • N9K-X96136YC-R •...
Page 251
Note For traffic that needs to be classified on 40G ports on Cisco Nexus 9300 Series switches, you must carve the qos regions and the corresponding ns-*qos regions. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 252
Cisco Nexus 9300 Series switches, you must carve qos regions and the corresponding ns-*qos regions. VLAN source or VLAN filter SPAN (for Cisco Nexus 9500 or span 9300 Series switches) Rx SPAN on 40G ports (for Cisco Nexus 9300 Series switches only) Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 253
For Cisco Nexus 9200 Series switches, BFD uses the ing-sup region while DHCPv4 relay, DHCPv4 snooping, and DHCPv4 client use the ing-redirect region. CoPP copp The region size cannot be 0. Note Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
No license is required to use IP ACLs. Any feature not included in a license package is bundled NX-OS with the nx-os image and is provided at no extra charge to you. For an explanation of the Cisco NX-OS licensing scheme, see the Cisco NX-OS Licensing Guide. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
1000 rules. For more information about Session Manager, see the Cisco Nexus 9000 Series NX-OS System Management Configuration Guide. • Configuring IPv4 PACLs in the range of 12k to 64k is supported on Cisco Nexus 9500 Series switches with -RX line cards.
Page 256
(encapsulation path) are not supported. • Cisco Nexus 9300 and 9500 Series switches, and Cisco Nexus 9200 and 9300-EX Series switches have the following limitations for ACL options that can be used on VXLAN traffic: •...
Page 257
• An RACL applied on a Layer 3 physical or logical interface does not match multicast traffic. If multicast traffic must be blocked, use a PACL instead. This behavior applies to Cisco Nexus 9200, 9300, 9300-EX, and 9500 Series switches and Cisco Nexus 3164Q, 31128PQ, 3232C, and 3264Q switches.
Page 258
• RACLs cannot match on packets with multicast MAC destination addresses. • In the Cisco Nexus 9200 and 9300-EX Series switches, RACL with ACL log option will not take into effect as the sup-redirect ACLs will have higher priority for the traffic destined to SUP.
3. (Optional) fragments {permit-all | deny-all} 4. [sequence-number] {permit | deny} protocol {source-ip-prefix | source-ip-mask} {destination-ip-prefix | destination-ip-mask} 5. (Optional) statistics per-entry 6. (Optional) Enter one of the following commands: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 260
Step 6 (Optional) Enter one of the following commands: Displays the IP ACL configuration. • show ip access-lists name • show ipv6 access-lists name Example: switch(config-acl)# show ip access-lists acl-01 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
• show ip access-lists name • show ipv6 access-lists name 8. (Optional) copy running-config startup-config DETAILED STEPS Command or Action Purpose Step 1 configure terminal Enters global configuration mode. Example: switch# configure terminal switch(config)# Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 262
Step 8 (Optional) copy running-config startup-config Copies the running configuration to the startup configuration. Example: switch(config-acl)# copy running-config startup-config Related Topics Changing Sequence Numbers in an IP ACL, on page 238 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
The difference in switch(config)# resequence access-list ip acl-01 numbers is determined by the increment that you specify. 100 10 The starting-sequence-number argument and the Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
You can change the size of the ACL ternary content addressable memory (TCAM) regions in the hardware. You can use this procedure for all Cisco Nexus 9200, 9300, and 9500 Series switches and the Cisco Nexus 3164Q, 31128PQ, 3232C, and 3264Q switches, except for NFE2-enabled devices (such as the X9432C-S 100G line card and the C9508-FM-S fabric module), which must use TCAM templates to configure ACL TCAM region sizes.
Page 267
• e-qos-lite—Configures the size of the IPv4 egress QoS lite TCAM region. • e-racl—Configures the size of the IPv4 egress router ACL (ERACL) TCAM region. • fex-ifacl—Configures the size of the FEX IPv4 port ACL TCAM region. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 268
• ing-l2qos—Configures the size of the ingress Layer 2 QoS TCAM region (Cisco Nexus 9200 switches only). • ing-l2-span-filter—Configures the size of the ingress Layer 2 SPAN filter TCAM region (Cisco Nexus 9200 and 9300-EX switches only). Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 269
• l3qos-lite—Configures the size of the IPv4 Layer 3 QoS lite TCAM region. • mac-ifacl—Configures the size of the MAC port ACL TCAM region. • mac-l3qos—Configures the size of the MAC Layer 3 QoS TCAM region. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 270
X9564TX line cards and the M12PQ generic expansion module (GEM). • ns-mac-vqos—Configures the size of the MAC VLAN QoS TCAM region for the X9536PQ, X9564PX, and X9564TX line cards and the M12PQ generic expansion module (GEM). Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 271
100G M4PC generic expansion module (GEM). • rp-qos—Configures the size of the IPv4 port QoS TCAM region for the 100G 9408PC line card and the 100G M4PC generic expansion module (GEM). Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 272
ERSPAN. For more information and configuration instructions, see the latest Cisco Nexus 9000 Series NX-OS System Management Configuration Guide. Step 3 copy running-config startup-config Copies the running configuration to the startup configuration. Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 273
Verifying Traffic Storm Control Configuration, on page 436. The following example shows how to change the size of the RACL TCAM region on a Cisco Nexus 9500 Series switch: switch(config)# hardware access-list tcam region racl 256 [SUCCESS] New tcam size will be applicable only at boot time.
Page 274
512 [SUCCESS] New tcam size will be applicable only at boot time. You need to 'copy run start' and 'reload' switch(config)# copy running-config startup-config Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
You can use create and apply custom templates to configure ACL TCAM region sizes. For all Cisco Nexus 9200, 9300, and 9500 Series switches and the Cisco Nexus 3164Q, 31128PQ, 3232C, and 3264Q switches, you can use this procedure or the "Configuring ACL TCAM Region Sizes"...
The default TCAM region configuration varies by platform and does not accommodate all TCAM regions. To enable any desired regions, you must decrease the TCAM size of one region and then increase the TCAM size for the desired region. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 277
Configuring TCAM Carving Note For information on configuring QoS TCAM carving, see the Cisco Nexus 9000 Series NX-OS Quality of Service Configuration Guide. The following tables list the default sizes for the ingress and egress TCAM regions on different platforms.
Page 278
Configuring IP ACLs Configuring TCAM Carving Table 18: Default TCAM Region Configuration (Egress) - For Cisco Nexus 9300-FX Series Switches Region Name Size Width Total Size IPv4 RACL 1792 1792 System Table 19: Default TCAM Region Configuration (Ingress) - For Cisco Nexus 9300-EX Series Switches...
Page 279
Region Name Size Width Total Size IPv4 VACL IPv4 RACL System Table 23: Default TCAM Region Configuration (Ingress) - For Layer 2-to-Layer 3 Configurations on Cisco Nexus 9200 Series Switches Region Name Size Width Total Size Ingress NAT Ingress port ACL...
Page 280
Configuring IP ACLs Configuring TCAM Carving Table 24: Default TCAM Region Configuration (Egress) - For Layer 2-to-Layer 3 Configurations on Cisco Nexus 9200 Series Switches Region Name Size Width Total Size Egress VACL Egress RACL 1536 1536 Egress supervisor 2048...
Page 281
Configuring IP ACLs Configuring TCAM Carving To set the size of the ingress IPv6 RACL TCAM region on a Cisco Nexus 9500 Series switch, perform one of two options. Option #1 Reduce the ingress IPv4 RACL by 512 entries (1536 - 512 = 1024) and add an ingress IPv6 RACL with 512 entries—This option is preferred.
Page 282
If TCAM for a particular feature is not configured and you try to apply a feature that requires TCAM carving, the following message appears: ERROR: Module x returned status: TCAM region is not configured. Please configure TCAM region and retry the command. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Sizes, on page 240 Configuring UDF-Based Port ACLs You can configure UDF-based port ACLs for Cisco Nexus 9200, 9300, and 9300-EX Series switches. This feature enables the device to match on user-defined fields (UDFs) and to apply the matching packets to an IPv4 port ACL.
Page 284
Example: The number of UDFs that can be attached to a TCAM region varies by platform. You can attach up to 2 UDFs for Cisco switch(config)# hardware access-list tcam region Nexus 9200 switches, up to 8 UDFs for Cisco Nexus 9300...
ACLs applied to these interface types are considered router ACLs. Note Egress router ACLs are not supported on subinterfaces and on Cisco Nexus 9300 Series switch uplink ports. Before you begin Ensure that the ACL you want to apply exists and that it is configured to filter traffic in the manner that you need for this application.
You can apply an IPv4 or IPv6 ACL to a Layer 2 interface, which can be a physical port or a port channel. ACLs applied to these interface types are considered port ACLs. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 287
Only inbound filtering is supported with port • ip port access-group access-list in ACLs. You can apply one port ACL to an interface. • ipv6 port traffic-filter access-list in Example: switch(config-if)# ip port access-group acl-l2-marketing-group in Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
12. hardware rate-limiter access-list-log packets 13. acllog match-log-level severity-level 14. (Optional) show logging ip access-list cache [detail] Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 289
Configures the log-update interval (in seconds) for the ACL logging process. The default value is 300 seconds. Example: The range is from 5 to 86400 seconds. switch(config)# logging ip access-list cache interval 490 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
You can configure ACLs to intercept and redirect specific HTTP methods to a server that is connected to a specific port. The following HTTP methods can be redirected: • connect • delete • get • head • post Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 291
• delete—Matches HTTP packets with the DELETE method [0x44454c45] • get—Matches HTTP packets with the GET method [0x47455420] • head—Matches HTTP packets with the HEAD method [0x48454144] • post—Matches HTTP packets with the POST method [0x504f5354] Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 292
10 permit tcp any any http-method get tcp-option-length 4 redirect port-channel4001 switch(config-acl)# 20 permit tcp any any http-method post redirect port-channel4001 switch(config-acl)# statistics per-entry switch(config)# interface Ethernet 1/33 switch(config-if)# ip port access-group http-redirect-acl in Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 294
Displays the ACL startup configuration. Note This command displays the user-configured ACLs in the startup configuration. The all option displays both the default (CoPP-configured) and user-configured ACLs in the startup configuration. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
The following example shows how to configure IPv4 ACL logging: switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# ip access-list logging-test Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
• The system PACL is supported for Layer 2 interface only. • Up to 10K ACEs are supported with all other basic features for the switch to come up on Cisco Nexus 9500 Series switches with -R line cards. The hardware capacity on Cisco Nexus 9500 Series switches with -RX line cards is 64K ACEs.
It denies all the traffic during ACL updates. • The atomic ACL update is not supported on Cisco Nexus -R series line cards, but the non-atomic update hardware access-list update default-result is supported on Cisco Nexus -R series line cards.
50 permit ip 1.4.1.1/32 100.100.100.100/32 60 permit ip 1.5.1.1/32 100.100.100.100/32 70 permit ip 1.6.1.1/32 100.100.100.100/32 80 permit ip 1.7.1.1/32 100.100.100.100/32 90 permit ip 1.8.1.1/32 100.100.100.100/32 switch# sh ip access-lists test summary Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 299
SPAN [span] size = Ingress COPP [copp] size = Ingress Flow Counters [flow] size = switch# To view ACL related tech support information, use the show tech-support aclmgr and show tech-support aclqos commands. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Session Manager supports the configuration of object groups. This feature allows you to create a configuration session and verify your object group configuration changes prior to committing them to the running configuration. For more information about Session Manager, see the Cisco Nexus 9000 Series NX-OS System Management Configuration Guide.
You can create and change an IPv6 address group object. SUMMARY STEPS 1. configure terminal 2. object-group ipv6 address name 3. Enter one of the following commands: • [sequence-number] host IPv6-address • [sequence-number] IPv6-address/prefix-len • [sequence-number] IPv6-address network-wildcard Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 302
• no host IPv6-address • no IPv6-address/prefix-len • no IPv6-address network-wildcard Example: switch(config-ipv6addr-ogroup)# no host 2001:db8:0:3ab0::1 Step 5 (Optional) show object-group name Displays the object group configuration. Example: switch(config-ipv6addr-ogroup)# show object-group ipv6-addr-group-A7 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
• lt—Matches port numbers that are less than (and not equal to) the port number that you specify. • neq—Matches all port numbers except for the port number that you specify. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Session Manager supports the configuration of time ranges. This feature allows you to create a configuration session and verify your time-range configuration changes prior to committing them to the running configuration. For more information about Session Manager, see the Cisco Nexus 9000 Series NX-OS System Management Configuration Guide.
Page 306
Step 7 (Optional) show time-range name Displays the time-range configuration. Example: switch(config-time-range)# show time-range workday-daytime Step 8 (Optional) copy running-config startup-config Copies the running configuration to the startup configuration. Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
The following keywords Example: are also valid values for the list-of-weekdays argument: switch(config-time-range)# 100 periodic weekdays • daily —All days of the week. 05:00:00 to 22:00:00 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
ACL. Instead, the device considers the ACL rule using the removed time range to be empty. SUMMARY STEPS 1. configure terminal Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Assigns sequence numbers to the rules contained in the time range, where the first rule receives the starting sequence increment number that you specify. Each subsequent rule receives a Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Displays the time-range configuration. Displays ACL configuration, including all time ranges. show running-config aclmgr Additional References for IP ACLs Related Documents Related Topic Document Title TAP aggregation Configuring TAP Aggregation and MPLS Stripping Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
C H A P T E R Configuring MAC ACLs This chapter describes how to configure MAC access lists (ACLs) on Cisco NX-OS devices. This chapter contains the following sections: • About MAC ACLs, on page 285 • Licensing Requirements for MAC ACLs, on page 286 •...
• MAC packet classification is not supported when MAC ACLs are used as match criteria for QoS policies on Cisco Nexus 9300 Series switch 40G uplink ports. • When you define a MAC ACL on the non EX/FX Cisco Nexus 9000 Series switches, you must define the ethertype for the traffic to be appropriately matched.
Displays the MAC ACL configuration. Example: switch(config-mac-acl)# show mac access-lists acl-mac-01 Step 6 (Optional) copy running-config startup-config Copies the running configuration to the startup configuration. Example: switch(config-mac-acl)# copy running-config startup-config Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Specifies that the device maintains global statistics for packets that match the rules in the ACL. Example: The no option stops the device from maintaining global switch(config-mac-acl)# statistics per-entry statistics for the ACL. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Displays the MAC ACL configuration. Example: switch(config)# show mac access-lists acl-mac-01 Step 4 (Optional) copy running-config startup-config Copies the running configuration to the startup configuration. Example: switch(config)# copy running-config startup-config Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Ensure that the ACL that you want to apply exists and is configured to filter traffic in the manner that you need for this application. SUMMARY STEPS 1. configure terminal Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Applying a MAC ACL as a VACL You can apply a MAC ACL as a VACL. Enabling or Disabling MAC Packet Classification You can enable or disable MAC packet classification on a Layer 2 interface. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 318
MAC packet classification on the Example: interface. switch(config-if)# mac packet-classify Step 4 (Optional) Enter one of the following commands: • Displays the running configuration of the Ethernet interface. • show running-config interface ethernet slot/port Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Displays the MAC ACL configuration. If the MAC ACL includes the show mac access-lists statistics per-entry command, the show mac access-lists command output includes the number of packets that have matched each rule. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
00c0.4f00.0000 0000.00ff.ffff any 0x0806 interface ethernet 2/1 mac port access-group acl-mac-01 Additional References for MAC ACLs Related Documents Related Topic Document Title TAP aggregation Configuring TAP Aggregation and MPLS Stripping Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
C H A P T E R Configuring VLAN ACLs This chapter describes how to configure VLAN access lists (ACLs) on Cisco NX-OS devices. This chapter includes the following sections: • About VLAN ACLs, on page 295 • Licensing Requirements for VACLs, on page 296 •...
VACLs require no license. Any feature not included in a license package is bundled with the image and is provided at no extra charge to you. For an explanation of the Cisco NX-OS licensing scheme, see the Cisco NX-OS Licensing Guide.
Guidelines and Limitations for VACLs VACLs have the following configuration guidelines: • Cisco recommends using the Session Manager to configure ACLs. This feature allows you to verify the ACL configuration and confirm that the resources required by the configuration are available prior to committing them to the running configuration.
Step 3 Enter one of the following commands: Specifies an ACL for the access-map entry. • match {ip | ipv6} address ip-access-list • match mac address mac-access-list Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Step 2 [no] vlan filter map-name vlan-list list Applies the VACL to the VLANs by the list that you specified. The no option unapplies the VACL. Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Displays the VACL configuration. If the VLAN access-map includes the statistics per-entry command, the show vlan access-list command output includes the number of packets that have matched each rule. clear vlan access-list counters Clears statistics for VACLs. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
50-82 Additional References for VACLs Related Documents Related Topic Document Title QoS configuration Cisco Nexus 9000 Series NX-OS Quality of Service Configuration Guide Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
C H A P T E R Configuring Port Security This chapter describes how to configure port security on Cisco NX-OS devices. This chapter includes the following sections: • About Port Security, on page 303 • Licensing Requirements for Port Security, on page 309 •...
A sticky secure MAC address entry remains in the configuration of an interface until one of the following events occurs: • You explicitly remove the address • You configure the interface to act as a Layer 3 interface Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
The length of time after the device last received a packet from the address on the applicable interface. Note This feature is supported only on Cisco Nexus 9200 and 9300-EX Series switches. Absolute The length of time after the device learned the address. This is the default aging method; however, the default aging time is 0 minutes, which disables aging.
Restrict or Protect, the violation is logged in the system log. Because a MAC move violation results in the interface being error disabled, irrespective of the violation mode configured, we recommend using the errdisable command to enable automatic errdisable recovery. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Note You cannot configure port security on VXLAN interfaces. Note Port security is supported for FEX interfaces only in non-vPC deployments on Cisco Nexus 9300-EX Series switches. Port Security and Port-Channel Interfaces Port security is supported on Layer 2 port-channel interfaces. Port security operates on port-channel interfaces in the same manner as on physical interfaces, except as described in this section.
Page 334
To do so, remove all secure member ports from the port-channel interface first. After disabling port security on a member port, you can add it to the port-channel interface again, as needed. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Port security requires no license. Any feature not included in a license package is bundled NX-OS with the nx-os image and is provided at no extra charge to you. For an explanation of the Cisco NX-OS licensing scheme, see the Cisco NX-OS Licensing Guide.
• Port security is supported for FEX interfaces only in non-vPC deployments on Cisco Nexus 9300-EX Series switches. • There is no supported method of disabling the USB port on Cisco Nexus 9000 Series switches. • After configuring the association between the primary and secondary VLANs and deleting the association, all static MAC addresses that were created on the primary VLANs remain on the primary VLAN only.
Configuring Port Security Configuring Port Security • On a secondary vPC port, there is no limit check for static MACs configured. Cisco recommends that you configure the same number of static MACs on a secondary vPC port as defined in the maximum MAC count.
By default, sticky MAC address learning is disabled. Before you begin You must have enabled port security globally. SUMMARY STEPS 1. configure terminal 2. Enter one of the following commands: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Copies the running configuration to the startup configuration. Example: switch(config-if)# copy running-config startup-config Adding a Static Secure MAC Address on an Interface You can add a static secure MAC address on a Layer 2 interface. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 341
Use the vlan keyword if you want to specify the VLAN that traffic from the address is allowed Example: switch(config-if)# switchport port-security mac-address 0019.D2D0.00AE Step 4 (Optional) show running-config port-security Displays the port security configuration. Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Removes the static secure MAC address from port security on the current interface. Example: switch(config-if)# no switchport port-security mac-address 0019.D2D0.00AE Step 4 (Optional) show running-config port-security Displays the port security configuration. Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Enters interface configuration mode for the interface from which you want to remove a sticky secure MAC address. • interface ethernet slot/port • interface port-channel channel-number Example: switch(config)# interface ethernet 2/1 switch(config-if)# Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
1. configure terminal 2. Enter one of the following commands: • interface ethernet slot/port • interface port-channel channel-number 3. [no] switchport port-security maximum number [vlan vlan-ID] 4. (Optional) show running-config port-security Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
MAC addresses learned by the dynamic method have reached their age limit. Absolute aging is the default aging type. By default, the aging time is 0 minutes, which disables aging. Before you begin You must have enabled port security globally. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 347
10 minutes, the age out occurs between 10 and 12 minutes after traffic stops. Step 5 (Optional) show running-config port-security Displays the port security configuration. Example: switch(config-if)# show running-config port-security Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Configures the security violation action for port security on the current interface. The no option resets the violation | shutdown} action to the default, which is to shut down the interface. Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Additional References for Port Security Related Documents Related Topic Document Title Layer 2 Cisco Nexus 9000 Series NX-OS Layer 2 Switching Configuration Guide switching MIBs Cisco NX-OS provides read-only SNMP support for port security. MIBs MIBs Link •...
Page 352
Configuring Port Security Additional References for Port Security Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
C H A P T E R Configuring DHCP This chapter describes how to configure the Dynamic Host Configuration Protocol (DHCP) on a Cisco NX-OS device. This chapter includes the following sections: • About DHCP Snooping, on page 327 •...
In a service provider environment, any device that is not in the service provider network is an untrusted source (such as a customer switch). Host ports are untrusted sources. In the Cisco NX-OS device, you indicate that a source is trusted by configuring the trust state of its connecting interface.
DHCP Snooping in a vPC Environment A virtual port channel (vPC) allows two Cisco NX-OS switches to appear as a single logical port channel to a third device. The third device can be a switch, a server, or any other networking device that supports port channels.
82 field in the DHCP reply. 5. The DHCP server sends the reply to the Cisco NX-OS device. The Cisco NX-OS device verifies that it originally inserted the Option 82 data by inspecting the remote ID and possibly the circuit ID fields. The Cisco NX-OS device removes the Option 82 field and forwards the packet to the interface that connects to the DHCP client that sent the DHCP request.
Configuring DHCP About the DHCP Relay Agent This figure shows the packet formats for the remote ID suboption and the circuit ID suboption. The Cisco NX-OS device uses the packet formats when you globally enable DHCP snooping and when you enable Option 82 data insertion and removal.
Page 358
82 field in the DHCP reply. 6. The DHCP server unicasts the reply to the Cisco NX-OS device if the request was relayed to the server by the device. The Cisco NX-OS device verifies that it originally inserted the Option 82 data by inspecting the remote ID and possibly the circuit ID fields.
DHCP support to clients in multiple VRFs, you can conserve IP addresses by using a single IP address pool rather than one for each VRF. For general information about VRFs, see the Cisco Nexus 9000 Series NX-OS Unicast Routing Configuration Guide.
DHCP support to clients in multiple VRFs, you can conserve IP addresses by using a single IP address pool rather than one for each VRF. For general information about VRFs, see the Cisco Nexus 9000 Series NX-OS Unicast Routing Configuration Guide.
DHCP requires no license. Any feature not included in a license package is bundled with the nx-os image and is provided at no extra charge to you. For an explanation of the Cisco NX-OS licensing scheme, see the Cisco NX-OS Licensing Guide.
• DHCP client and DHCP relay are not supported on the same switch. • DHCP client is not supported for Layer 3 subinterfaces. • DHCP client is supported on the Cisco Nexus 9300 Series switches and the Cisco Nexus 9500 Series switches.
When the DHCP feature is disabled, you cannot configure the DHCP relay agent, DHCP snooping, or any of the features that depend on DHCP. In addition, all DHCP configuration is removed from the device. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Before you begin Make sure that you have enabled the DHCP feature. SUMMARY STEPS 1. configure terminal 2. [no] ip dhcp snooping 3. (Optional) show running-config dhcp 4. (Optional) copy running-config startup-config Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Enables DHCP snooping MAC address verification. The no form of this command disables MAC address Example: verification. switch(config)# ip dhcp snooping verify mac-address Step 3 (Optional) show running-config dhcp Displays the DHCP configuration. Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
The no form of this command configures the port Example: as an untrusted interface. switch(config-if)# ip dhcp snooping trust Step 4 (Optional) show running-config dhcp Displays the DHCP configuration. Example: switch(config-if)# show running-config dhcp Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
(Optional) show ip dhcp relay Displays the DHCP relay configuration. Example: switch(config)# show ip dhcp relay Step 4 (Optional) show ip dhcp relay information Displays the DHCP relay trusted ports configuration. trusted-sources Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Layer 3 Ethernet interface that you want to configure as trusted or untrusted or channel-number is the Layer 3 Example: port-channel interface that you want to configure as trusted switch(config)# interface ethernet 2/1 or untrusted. switch(config-if)# Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Before you begin Make sure that the DHCP feature is enabled. SUMMARY STEPS 1. configure terminal 2. [no] ip dhcp relay information trust-all 3. (Optional) show ip dhcp relay information trusted-sources Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
You can configure the device to support the relaying of DHCP requests that arrive on an interface in one VRF to a DHCP server in a different VRF. Before you begin You must enable Option 82 for the DHCP relay agent. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
DHCP server IP addresses specified. The relay agent forwards replies from all DHCP servers to the host that sent the request. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 378
6.1(2)I3(3a). They are not supported in Cisco NX-OS Release 9.2(1). • Enters interface configuration mode, where vlan-id is the ID of the VLAN that you want to configure with a DHCP server IP address. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Ensure that the DHCP relay agent is enabled. SUMMARY STEPS 1. configure terminal 2. [no] ip dhcp smart-relay global 3. (Optional) show ip dhcp relay 4. (Optional) show running-config dhcp 5. (Optional) copy running-config startup-config Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Configuring DHCPv6 Enabling or Disabling the DHCPv6 Relay Agent You can enable or disable the DHCPv6 relay agent. By default, the DHCPv6 relay agent is enabled. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
You can configure the device to support the relaying of DHCPv6 requests that arrive on an interface in one VRF to a DHCPv6 server in a different VRF. Before you begin Ensure that the DHCP feature is enabled. Ensure that the DHCPv6 relay agent is enabled. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
DHCPv6 server IP addresses specified. The relay agent forwards replies from all DHCPv6 servers to the host that sent the request. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 385
The server address can either be a link-scoped unicast or multicast address or a global or site-local unicast or Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Configuring IPv6 RA Guard You can configure the IPv6 router advertisement (RA) guard feature for Cisco Nexus 9200, 9300, and 9300-EX Series switches and the N9K-X9732C-EX line card. This feature is used to drop all incoming IPv6 RA packets on a Layer 2 interface.
3. ipv6 address use-link-local-only 4. [no] {ip | ipv6} address dhcp 5. (Optional) Do one of the following options: • show running-config interface ethernet slot/port • show running-config interface mgmt 0 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 389
Example: Only the {ip | ipv6} address dhcp command is saved. The switch(config-if)# copy running-config assigned IP address is not saved even though it shows in startup-config the running configuration. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Use the show ip dhcp snooping binding [ip-address | mac-address | dynamic | static | vlan vlan-id | interface interface-type interface-number] command to display all entries from the DHCP snooping binding database. MacAddress IpAddress LeaseSec Type VLAN Interface Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Use the clear ipv6 dhcp relay statistics command to clear the global DHCPv6 relay statistics. Use the clear ipv6 dhcp relay statistics interface interface command to clear the DHCPv6 relay statistics for a particular interface. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
The following example shows how the DHCP client feature can be used to assign an IPv4 address to a VLAN interface: switch# configure terminal switch(config)# interface vlan 7 switch(config-if)# no shutdown switch(config-if)# ip address dhcp switch(config-if)# show running-config interface vlan 7 interface Vlan7 no shutdown ip address dhcp Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
C H A P T E R Configuring IPv6 First Hop Security This chapter describes how to configure First Hop Security (FHS) features on Cisco NX-OS devices. This chapter includes the following sections: • Introduction to First-Hop Security, on page 369 •...
Guidelines and Limitations of First Hop Security The general guidelines and limitations of First Hop Security are as follows: • Before enabling the FHS on the interface or VLAN, we recommend carving TCAM regions on Cisco Nexus 9300 and 9500 Series switches. To enable FHS successfully: •...
• Control traffic (DHCP/ND) will not be redirected to CPU for processing on both vPC peers if it goes over the peer link. • Packets switched over the peer link aren’t processed a second time. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
DHCP Server messages by default. You can customize the IPv6 policy to implement: • Security-level glean. • IPv6 DHCP Guard policy with device-role server. In this configuration, IPv6 Snooping trusts DHCP server messages attached to the vPC link. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
DHCP server traffic. You do not require an individual IPv6 snooping policy per interface. Any DHCP traffic arriving via the vPC peer is also implicitly trusted and if policing is required, the vPC peer automatically drops it. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
RA frame. Once the L2 device has validated the content of the RA frame and router redirect frame against the configuration, it forwards the RA to its unicast or multicast destination. If the RA frame content is not validated, the RA is dropped. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
• If a packet arriving from DHCP server is a Relay Forward or a Relay Reply, only the device role is checked. In addition, IPv6 DHCP Guard doesn't apply the policy for a packet sent out by the local relay agent running on the switch. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
(or VLAN) as well as the DHCP server facing interface (or VLAN). In the case of DHCP Relay, an IPv6 Snooping policy must be attached at the VLAN level to see the server replies. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
RS packets that are received on another interface, are not redirected to the device-role host. Only RA and RR packets (that are allowed) are redirected to the device-role host. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Exits RA guard policy configuration mode and returns to global configuration mode. Example: Device(config-ra-guard)# exit Configuring IPv6 RA Guard on an Interface SUMMARY STEPS 1. configure terminal 2. interface type number 3. ipv6 nd raguard attach-policy [policy-name] Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 405
Et1/0 vlan all Step 6 debug ipv6 snooping raguard [filter | interface | vlanid] Enables debugging for IPv6 RA guard snooping information. Example: Device# debug ipv6 snooping raguard Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
It blocks any incoming server Device(config-dhcp-guard)# device-role server packets. • device-role server—Interface where a normal DHCPv6 server is connected. It allows all DHCPv6 packets originating on this interface. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 407
Exits interface configuration mode and returns to global configuration mode. Example: Device(config-if)# exit Step 12 vlan configuration vlan-id Specifies a VLAN and enters VLAN configuration mode. Example: Device(config)# vlan configuration 1 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 409
• guard—works like inspect, but in addition drops IPv6, ND, RA, and IPv6 DHCP Server packets in case of a threat. Step 8 tracking Enables tracking. Example: Device(config-snoop-policy)# tracking enable Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 410
EXEC mode. Example: Device(config)# exit Step 18 show ipv6 snooping policy policy-name Displays the policy configuration and the interfaces where the policy is applied. Example: Device(config)# show ipv6 snooping policy policy1 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Displays information about the configured policies and the interfaces to which they are attached. Example: Device# show ipv6 snooping policies Step 5 debug ipv6 snooping Enables debugging for snooping information in IPv6. Example: Device# debug ipv6 snooping Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
This section includes additional information related to configuring IPv6 First-Hop Security. Related Documents Related Topic Document Title Cisco NX-OS Licensing Cisco NX-OS Licensing Guide Command reference Cisco Nexus 7000 Series NX-OS Security Command Reference Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 414
Configuring IPv6 First Hop Security Additional References for IPv6 First-Hop Security Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
ARP spoofing attacks and ARP cache poisoning can occur because ARP allows a reply from a host even if an ARP request was not received. After the attack, all traffic from the device under attack flows through the attacker’s computer and then to the router, switch, or host. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
You can configure DAI to drop ARP packets when the IP addresses in the packets are invalid or when the MAC addresses in the body of the ARP packets do not match the addresses specified in the Ethernet header. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
If some devices in a VLAN run DAI and other devices do not, the guidelines for configuring the trust state of interfaces on a device that runs DAI become the following: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
VLAN, the port number, the source and destination IP addresses, and the source and destination MAC addresses. You can also specify the type of packets that are logged. By default, a Cisco Nexus device logs only packets that DAI drops.
• ARP ACLs are not supported. Default Settings for DAI This table lists the default settings for DAI parameters. Table 33: Default DAI Parameters Parameters Default Disabled on all VLANs. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
[no] ip arp inspection vlan vlan-list Enables DAI for the specified list of VLANs. The no option disables DAI for the specified VLANs. Example: switch(config)# ip arp inspection vlan 13 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
• Each ip arp inspection validate command that you enter replaces the configuration from any previous commands. If you enter an ip arp inspection validate command to enable src-mac and dst-mac validations, Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
You can configure the DAI logging buffer size. The default buffer size is 32 messages. SUMMARY STEPS 1. configure terminal 2. [no] ip arp inspection log-buffer entries number 3. (Optional) show running-config dhcp 4. (Optional) copy running-config startup-config Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
DAI log filtering. Example: • all—Logs all packets that match DHCP bindings. switch(config)# ip arp inspection vlan 100 • none—Does not log packets that match DHCP dhcp-bindings permit bindings. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Command Purpose show ip arp inspection statistics [vlan vlan-id] Displays DAI statistics. clear ip arp inspection statistics vlan vlan-id Clears DAI statistics. clear ip arp inspection log Clears DAI logs. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
- Supports-STP-Dispute Device ID Local Intrfce Hldtme Capability Platform Port ID switchB Ethernet2/3 R S I WS-C2960-24TC Ethernet1/4 switchA# Step 2 Enable DAI on VLAN 1 and verify the configuration. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Related Documents Related Topic Document Title ACL TCAM regions Configuring IP ACLs DHCP and DHCP snooping Configuring DHCP, on page 327 Standards Standard Title RFC-826 An Ethernet Address Resolution Protocol (http://tools.ietf.org/html/rfc826) Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
• DHCP packets, which DHCP snooping inspects and then forwards or drops, depending upon the results of inspecting the packet • IP traffic from static IP source entries that you have configured on the Cisco NX-OS device Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
IP source entry. When you first enable IP Source Guard on an interface, you may experience disruption in IP traffic until the hosts on the interface receive a new IP address from a DHCP server. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
• IP Source Guard is not supported on fabric extender (FEX) ports or generic expansion module (GEM) ports. • The following guidelines and limitations apply to the Cisco Nexus 9200 Series switches: • IPv6 adjacency is not formed with IPSG enabled on the incoming interface.
[no] ip dhcp snooping ipsg-excluded vlan vlan-list Specifies the list of VLANs to exclude from the DHCP snooping check for IP Source Guard on trunk ports. Example: switch(config)# ip dhcp snooping ipsg-excluded vlan 1001-1256,3097 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
2/3 no shutdown ip verify source dhcp-snooping-vlan show ip ver source IP source guard excluded vlans: ------------------------------------------------------ None ----------------------------------- IP source guard is enabled on the following interfaces: ------------------------------------------------------ ethernet2/3 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Configuring IP Source Guard Additional References Additional References Related Documents Related Topic Document Title ACL TCAM regions Configuring IP ACLs DHCP and DHCP snooping Configuring DHCP, on page 327 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 438
Configuring IP Source Guard Related Documents Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
After you enable AES password encryption and configure a master key, all existing and newly created clear-text passwords for supported applications (currently RADIUS and TACACS+) are stored in type-6 encrypted format, unless you disable type-6 password encryption. You can also configure Cisco NX-OS to convert all existing weakly encrypted passwords to type-6 encrypted passwords.
Configuring Password Encryption This section describes the tasks for configuring password encryption on Cisco NX-OS devices. Configuring a Master Key and Enabling the AES Password Encryption Feature You can configure a master key for type-6 encryption and enable the Advanced Encryption Standard (AES) password encryption feature.
Page 441
About AES Password Encryption and Master Encryption Keys, on page 413 Configuring Text for a Key, on page 424 Configuring Accept and Send Lifetimes for a Key, on page 425 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Please enter current Master Key: Deleting Type-6 Encrypted Passwords You can delete all type-6 encrypted passwords from the Cisco NX-OS device. SUMMARY STEPS 1. encryption delete type6 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
The device allows you to configure multiple keychains. Some routing protocols that support key-based authentication can use a keychain to implement a hitless key rollover for authentication. For more information, see the Cisco Nexus 9000 Series NX-OS Unicast Routing Configuration Guide.
Keychain management requires no license. Any feature not included in a license package is NX-OS bundled with the nx-os image and is provided at no extra charge to you. For an explanation of the Cisco NX-OS licensing scheme, see the Cisco NX-OS Licensing Guide. Prerequisites for Keychain Management Keychain management has no prerequisites.
Confirms that the keychain no longer exists in running configuration. Example: switch(config-keychain)# show key chain bgp-keys Step 4 (Optional) copy running-config startup-config Copies the running configuration to the startup configuration. Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Displays the configuration status of the AES password encryption feature and the master key. Example: switch(config)# show encryption service stat Step 5 Required: copy running-config startup-config Copies the running configuration to the startup configuration. Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Before you begin Determine the text for the key. You can enter the text as unencrypted text or in the encrypted form that Cisco NX-OS uses to display key text when you use the show key chain command. Using the encrypted form is particularly helpful if you are creating key text to match a key as shown in the show key chain command output from another device.
We recommend that you configure the keys in a keychain to have overlapping lifetimes. This practice prevents loss of key-secured communication due to moments where no key is active. SUMMARY STEPS 1. configure terminal Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 452
Example: as local times. switch(config-keychain-key)# send-lifetime 00:00:00 The start-time argument is the time of day and date that Jun 13 2013 23:59:59 Aug 12 2013 the key becomes active. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Displays the key chains configured on the device. Verifying the Keychain Management Configuration To display keychain management configuration information, perform the following task: Command Purpose show key chain name Displays the keychains configured on the device. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
00:00:00 Nov 12 2013 23:59:59 Mar 12 2013 send-lifetime 00:00:00 Dec 12 2013 23:59:59 Feb 12 2013 Where to Go Next For information about routing features that use keychains, see the Cisco Nexus 9000 Series NX-OS Unicast Routing Configuration Guide. Additional References for Keychain Management...
Page 456
Configuring Keychain Management Additional References for Keychain Management Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
C H A P T E R Configuring Traffic Storm Control This chapter describes how to configure traffic storm control on the Cisco NX-OS device. This chapter includes the following sections: • About Traffic Storm Control, on page 431 •...
A higher threshold allows more packets to pass through. Traffic storm control on the Cisco Nexus 9000v device is implemented in the hardware. The traffic storm control circuitry monitors packets that pass from a Layer 2 interface to the switching bus. Using the Individual/Group bit in the packet destination address, the circuitry determines if the packet is unicast or broadcast, tracks the current count of packets within the 3.9-millisecond interval, and filters out subsequent...
Cisco Nexus 9336C-FX2, Cisco Nexus 93300YC-FX2, and Cisco Nexus 93240YC-FX2-Z switches. • If you have configured a SVI for the VLAN on Cisco Nexus 9200, 9300-EX platform switches, or on the N9K-X9700-FX3 line cards, storm control broadcast does not work for ARP traffic (ARP request).
• Traffic storm control is not supported on 100G ports on the Cisco Nexus 9300 Series switches. It is supported on the Cisco Nexus 9300-EX/FX and FX2 Series switches and the Cisco Nexus 9500 Series switches with the 9700-EX/FX line card.
Page 461
Step 4 [no] storm-control action trap Generates an SNMP trap (defined in CISCO-PORT-STORM-CONTROL-MIB) and a syslog Example: message when the traffic storm control limit is reached. switch(config-if)# storm-control action trap Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Displays the storm control statistics for arp packets [ethernet | port-channel] number on the interface. Monitoring Traffic Storm Control Counters You can monitor the counters the Cisco NX-OS device maintains for traffic storm control activity. Command Purpose show interface [ethernet slot/port | port-channel number] counters...
Additional References for Traffic Storm Control This section includes additional information related to implementing traffic storm control. Related Documents Related Topic Document Title Cisco NX-OS licensing Cisco NX-OS Licensing Guide Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 464
Configuring Traffic Storm Control Additional References for Traffic Storm Control Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
C H A P T E R Configuring Unicast RPF This chapter describes how to configure unicast reverse path forwarding (uRPF) on Cisco NX-OS devices. This chapter includes the following sections: • About Unicast RPF, on page 439 • Licensing Requirements for Unicast RPF, on page 441 •...
Modification would affect the operation of unicast RPF. When a packet is received at the interface where you have configured unicast RPF and ACLs, the Cisco NX-OS software performs the following actions: 1.
• Cisco Nexus 9300 platform switches (excluding the 9300-FXP switches). • Beginning with Cisco NX-OS Release 9.2(1), uRPF is supported for Cisco Nexus 9300-EX Series switches (for IPv4 only) and on Cisco Nexus 9300-FX/FX2 Series switches (for IPv4 and IPv6).
However, this will enable Unicast RPF for both IPv4 and IPv6. • For Cisco Nexus 9300-EX, FX, and FX2 Series switches, the ping to a directly connected peer IP interface will fail when the peer IP interface has strict unicast RPF enabled with the ARP/ND to SRC IP is not resolved.
Configuring Unicast RPF for Cisco Nexus 9500 Switches with -R Line Cards Configuring Unicast RPF for Cisco Nexus 9500 Switches with -R Line Cards You can configure unicast RPF on an ingress interface for Cisco Nexus 9500 Series switches with an -R line card. SUMMARY STEPS 1.
Configuring Unicast RPF for Cisco Nexus 9300 Switches You can configure one of the following Unicast RPF modes on an ingress interface for Cisco Nexus 9300 platform switches (excluding the 9300-FXP switches) running Cisco NX-OS Release 9.2(1) or a later release.
Page 471
Unicast RPF check) does not match the default route if you do not specify the allow-default keyword. • The rx keyword specifies strict Unicast RPF. Step 6 exit Exits interface configuration mode. Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Example: switch(config)# copy running-config startup-config Configuration Examples for Unicast RPF The following example shows how to configure loose unicast RPF for IPv4 packets on a Cisco Nexus 9500 Series switch with an -R line card: interface Ethernet2/3 ip address 172.23.231.240/23...
Configuring Unicast RPF Verifying the Unicast RPF Configuration The following example shows how to configure strict unicast RPF for IPv4 packets on a Cisco Nexus 9300 platform switch: no system urpf disable interface Ethernet2/2 ip address 172.23.231.240/23 ip verify unicast source reachable-via rx...
Page 474
Configuring Unicast RPF Additional References for Unicast RPF Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
C H A P T E R Configuring Switchport Blocking This chapter describes how to configure switchport blocking on the Cisco NX-OS device. This chapter includes the following sections: • About Switchport Blocking, on page 449 • Licensing Requirements for Switchport Blocking, on page 449 •...
• Switchport blocking does not offer levels of control. It prevents the flooding of all unknown egress multicast or unicast packets on the specified port. • Switchport blocking drops control packets that originate from the CPU on Cisco Nexus 9500 Series switches. It does not drop packets on Cisco Nexus 9300 Series switches.
The supervisor module divides the traffic that it manages into three functional components or planes: Data plane Handles all the data traffic. The basic functionality of a Cisco NX-OS device is to forward packets from one interface to another. The packets that are not meant for the switch itself are called the transit packets.
Cisco NX-OS device. For example, a DoS attack on the supervisor module could generate IP traffic streams to the control plane at a very high rate, forcing the control plane to spend a large amount of time in handling these packets and preventing the control plane from processing genuine traffic.
ARP request to the host. All of these different packets could be maliciously used to attack the control plane and overwhelm the Cisco NX-OS device. CoPP classifies these packets to different classes and provides a mechanism to individually control the rate at which the supervisor module receives these packets.
Configuration Guide. Dynamic and Static CoPP ACLs CoPP access control lists (ACLs) are classified as either dynamic or static. Cisco Nexus 9300 and 9500 Series and 3164Q, 31128PQ, 3232C, and 3264Q switches use only dynamic CoPP ACLs. Cisco Nexus 9200 Series switches use both dynamic and static CoPP ACLs.
Default Policing Policies Default Policing Policies When you bring up your Cisco NX-OS device for the first time, the Cisco NX-OS software installs the default copp-system-p-policy-strict policy to protect the supervisor module from DoS attacks. You can set the level of protection by choosing one of the following CoPP policy options from the initial setup utility: •...
Page 485
The copp-system-class-normal-dhcp-relay-response class has the following configuration: class-map type control-plane match-any copp-system-p-class-normal-dhcp-relay-response match access-group name copp-system-p-acl-dhcp-relay-response match access-group name copp-system-p-acl-dhcp6-relay-response Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 486
Note The copp-system-class-fcoe class is not supported for Cisco Nexus 9200 Series switches. Strict Default CoPP Policy On Cisco Nexus 9200 Series switches, the strict CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-strict class copp-system-p-class-l3uc-data set cos 1...
Page 487
0 police cir 400 kbps bc 32000 bytes conform transmit violate drop On Cisco Nexus 9300 and 9500 Series and 3164Q, 31128PQ, 3232C, and 3264Q switches, the strict CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-strict...
Page 488
0 police cir 50 pps bc 32 packets conform transmit violate drop Moderate Default CoPP Policy On Cisco Nexus 9200 Series switches, the moderate CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-moderate class copp-system-p-class-l3uc-data set cos 1...
Page 489
0 police cir 400 kbps bc 48000 bytes conform transmit violate drop On Cisco Nexus 9300 and 9500 Series and 3164Q, 31128PQ, 3232C, and 3264Q switches, the moderate CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-moderate...
Page 490
0 police cir 50 pps bc 48 packets conform transmit violate drop Lenient Default CoPP Policy On Cisco Nexus 9200 Series switches, the lenient CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-lenient class copp-system-p-class-l3uc-data set cos 1...
Page 491
0 police cir 400 kbps bc 64000 bytes conform transmit violate drop On Cisco Nexus 9300 and 9500 Series and 3164Q, 31128PQ, 3232C, and 3264Q switches, the lenient CoPP policy has the following configuration: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 492
7 police cir 100 pps bc 64 packets conform transmit violate drop class copp-system-p-class-l2-default set cos 0 police cir 50 pps bc 64 packets conform transmit violate drop Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 493
0 police cir 50 pps bc 64 packets conform transmit violate drop Dense Default CoPP Policy On Cisco Nexus 9200 Series switches, the dense CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-dense class copp-system-p-class-l3uc-data set cos 1...
Page 494
0 police cir 200 kbps bc 32000 bytes conform transmit violate drop On Cisco Nexus 9300 and 9500 Series and 3164Q, 31128PQ, 3232C, and 3264Q switches, the dense CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-dense...
This example shows how to attach the policy map to the control plane: control-plane service-policy input copp-system-policy Note The copp-system-policy is always configured and applied. There is no need to use this command explicitly. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
CoPP and the Management Interface CoPP and the Management Interface The Cisco NX-OS device supports only hardware-based CoPP, which does not support the management interface (mgmt0). The out-of-band mgmt0 interface connects directly to the CPU and does not pass through the in-band traffic hardware where CoPP is implemented.
Page 497
• Cisco Nexus 9200 Series switches support CoPP policer rates only in multiples of 10 kbps. If a rate is configured that is not a multiple of 10 kbps, the rate is rounded down. For example, the switch will use 50 kbps if a rate of 55 kbps is configured.
• IPv6 ACL not supported for dynamic CoPP Note If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature might differ from the Cisco IOS commands that you would use. Default Settings for CoPP This table lists the default settings for CoPP parameters.
(Optional) show class-map type control-plane [class-map-name] (Optional) copy running-config startup-config DETAILED STEPS Command or Action Purpose Step 1 Enters global configuration mode. configure terminal Example: switch# configure terminal switch(config)# Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 500
Displays the control plane class map configuration. [class-map-name] Example: switch(config)# show class-map type control-plane Step 10 (Optional) copy running-config startup-config Copies the running configuration to the startup configuration. Example: switch(config)# copy running-config startup-config Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
You must configure a policy map for CoPP, which includes policing parameters. If you do not configure a policer for a class, the following default is configured: • 50 packets per second (pps) with a burst of 32 packets (for Cisco Nexus 9300 and 9500 Series and 3164Q, 31128PQ, 3232C, and 3264Q switches) •...
Page 502
Specifies the committed information rate (CIR). The rate range is as follows: • police [cir] {cir-rate [rate-type]} • 0 to 268435456 pps (for Cisco Nexus 9300 and 9500 • police [cir] {cir-rate [rate-type]} [bc] burst-size Series and 3164Q, 31128PQ, 3232C, and 3264Q...
CoPP policy. The changes are effective immediately, so you do not need to reapply the CoPP policy. SUMMARY STEPS 1. configure terminal 2. control-plane 3. scale-factor value module multiple-module-range Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
You can change to a different default CoPP policy, or you can reapply the same default CoPP policy. SUMMARY STEPS 1. [no] copp profile [strict | moderate | lenient | dense] 2. (Optional) show copp status 3. (Optional) show running-config copp Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Step 3 (Optional) show running-config copp Displays the CoPP configuration in the running configuration, including the copied policy configuration. Example: switch# show running-config copp Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Protocol ACL filtering is supported on the MAC and IP ACLs and is not supported on the IPv6 ACls. Beginning Cisco NX-OS Release 9.2(2), support to this feature is added on the following NX-OS platform switches: • Cisco Nexus 9300-EX •...
Page 508
ClassMapA switch(config-pmap)# Step 10 class {class-map-name [insert-before class-map-name2] Specifies a control plane class map name or the class default and enters control plane class configuration mode. | class-default} Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
IP-foo-1 eq bgp class-map type control-plane [match-all | match-any] class-map-name (Optional) match access-group name access-list-name policy-map type control-plane policy-map-name class {class-map-name [insert-before class-map-name2] | class-default} 12. Enter one of the following commands: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 510
Specifies a control plane class map and enters class map class-map-name configuration mode. The default class matching is match-any. The name can be a maximum of 64 characters Example: long and is case sensitive. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 511
Enters the control plane dynamic configuration mode. Example: switch(config)# control-plane dynamic mode switch(config-cp-dyn)# Step 14 service-policy-dynamic input policy-map-name Specifies a policy map for the input traffic. ENd Example: switch(config-cp-dyn)# service-policy-dynamic input PolicyMap1 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
[class-map-name] Displays the control plane class map configuration, including the ACLs that are bound to this class map. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 513
[all] Displays the user-configured access control lists (ACLs) in the startup configuration. The all option displays both the default (CoPP-configured) and user-configured ACLs in the startup configuration. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
639 mac access-list copp-system-p-acl-arp permit any any 0x0806 ip access-list copp-system-p-acl-tacas permit udp any any eq 49 ip access-list copp-system-p-acl-ntp permit udp any 10.0.1.1/23 eq 123 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
So setup always assumes system defaults and not the current system configuration values. Press Enter at anytime to skip a dialog. Use ctrl-c at anytime to skip the remaining dialogs. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Use this configuration and save it? (yes/no) [y]: y switch# Additional References for CoPP This section provides additional information related to implementing CoPP. Related Documents Related Topic Document Title Licensing Cisco NX-OS Licensing Guide Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 518
Configuring Control Plane Policing Additional References for CoPP Standards Standards Title RFC 2698 A Two Rate Three Color Marker Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
About Rate Limits Rate limits can prevent redirected packets for exceptions from overwhelming the supervisor module on a Cisco NX-OS device. You can configure rate limits in packets per second for the following types of redirected packets: • Access-list log packets •...
Nexus 3164Q, 31128PQ, 3232C, and 3264Q switches. • The rate-limiter on egress ports is limited per pipe on the Cisco Nexus 9300 and 9500 Series switches; Cisco Nexus 3164Q and 31128PQ switches; and the Cisco Nexus 3232C and 3264Q switches. The rate-limiter on egress ports is limited per slice on the Cisco Nexus Cisco Nexus 9200 and 9300-EX Series switches.
Default Settings for Rate Limits Note If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature might differ from the Cisco IOS commands that you would use. Default Settings for Rate Limits This table lists the default settings for rate limits parameters.
Page 522
The CoPP policy controls the rate of glean Note packets that are forwarded due to global punt adjacency, and this rate limiter controls the destination-specific glean packets. Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
+------------------+--------+---------------+---------------+----------------- access-list-log Port group with configuration same as default configuration Eth4/1-36 Module: 22 R-L Class Config Allowed Dropped Total +------------------+--------+---------------+---------------+----------------- access-list-log Port group with configuration same as default configuration Eth22/1-0 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
<<configured Additional References for Rate Limits This section includes additional information related to implementing rate limits. Related Documents Related Topic Document Title Cisco NX-OS licensing Cisco NX-OS Licensing Guide Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 526
Configuring Rate Limits Additional References for Rate Limits Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
C H A P T E R Configuring MACsec This document describes how to configure MACsec on Cisco NX-OS devices. • About MACsec, on page 501 • Licensing Requirements for MACsec, on page 502 • Guidelines and Limitations for MACsec, on page 502 •...
• MACsec is supported on the following interface types: • Layer 2 switchports (access and trunk) • Layer 3 routed interfaces (no subinterfaces) • Layer 2 and Layer 3 port channels (no subinterfaces) Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 529
• Allowing MACSec policy to be modified while the policy is referenced by an interface. • Allowing different MACsec policies across different lanes of a breakout port. • Beginning with Cisco Nexus Release 9.2(1), MACsec is supported on the Cisco Nexus 93180YC-FX and the Cisco Nexus 93108TC-FX switches.
• For interoperability between previous releases and Cisco NX-OS Release 9.2(1), pad the MACsec key with zeros if it is less than 32 octets. • On any Cisco NX-OS box , you can configure only one unique combination of an alternate MAC address and Ethernet type on all interfaces.
Example: switch(config)# copy running-config startup-config Disabling MACsec Beginning with Cisco NX-OS Release 9.2(1), disabling the MACsec feature only deactivates this feature and does not remove the associated MACsec configurations. Disabling MACsec has the following conditions: • MACsec shutdown is global command and is not available at the interface level.
6. send-lifetime start-time duration duration 7. (Optional) show key chain name 8. (Optional) copy running-config startup-config DETAILED STEPS Command or Action Purpose Step 1 configure terminal Enters global configuration mode. Example: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 533
The maximum length is 2147483646 seconds (approximately 68 years). Step 7 (Optional) show key chain name Displays the keychain configuration. Example: switch(config-macseckeychain-macseckey)# show key chain 1 Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Configuring MACsec Fallback Key Beginning with Cisco NX-OS Release 9.2(1), you can configure a fallback key on the device to initiate a backup session if the primary session fails as a result of a key/key name (CKN) mismatch or a finite key duration between the switch and peer.
Use the sak-expiry-timer 60 command to add the SAK rekey timer to the MACsec policy. About Configurable EAPOL Destination and Ethernet Type Beginning Cisco NX-OS Release 9.2(2), Cisco enables networks with WAN MACsec to change the Extensible Authentication Protocol (EAP) over LAN (EAPOL) protocol destination address, and the Ethernet type values to nonstandard values.
Step 6 show macsec mka session detail Displays the EAPOL settings. Disabling EAPOL Configuration You can disable the EAPOL configuration on any available interface. SUMMARY STEPS 1. configure terminal Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Displays the running configuration information for MACsec. The following example displays information about the MACsec MKA session for all interfaces. . switch# show macsec mka session Interface Local-TxSCI # Peers Status Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Page 540
Peer CAK : Match Latest Rx MKPDU : 11:11:58 PDT Mon Oct 01 2018 The following example displays the MACsec MKA configuration: switch# show macsec mka summary Interface Status Cipher (Operational) Key-Server MACSEC-policy Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
The following example shows the MACsec MKA statistics for a specific Ethernet interface: switch# show macsec mka statistics interface ethernet 2/2 Per-CA MKA Statistics for Session on interface (Ethernet2/2) with CKN 0x10 ============================================================================ Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
Interface MACSEC-policy Keychain ------------------ -------------------------------- ------------------------ Ethernet2/13 system-default-macsec-policy 1/10000000000000000 Ethernet2/14 system-default-macsec-policy 1/10000000000000000 XML Examples MACsec supports XML output for the following show commands for scripting purposes using | xml: Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...
To locate and download supported MIBs, go to the following URL: ftp://ftp.cisco.com/pub/mibs/supportlists/nexus9000/Nexus9000MIBSupportList.html. Related Documentation Related Topic Document Title Keychain management Cisco Nexus 9000 Series NX-OS Security Configuration Guide System messages Cisco Nexus 9000 Series NX-OS System Messages References Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x...