hit counter script
Table of Contents

Advertisement

Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x
First Published: 2017-09-27
Last Modified: 2018-02-27
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883

Advertisement

Table of Contents
loading

Summary of Contents for Cisco Nexus 3600 NX-OS

  • Page 1 Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x First Published: 2017-09-27 Last Modified: 2018-02-27 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883...
  • Page 2 Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks . Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.
  • Page 3: Table Of Contents

    AAA Security Services Benefits of Using AAA Remote AAA Services AAA Server Groups AAA Service Configuration Options Authentication and Authorization Process for User Logins Prerequisites for Remote AAA Guidelines and Limitations for AAA Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 4 RADIUS Network Environments Information About RADIUS Operations RADIUS Server Monitoring Vendor-Specific Attributes Prerequisites for RADIUS Guidelines and Limitations for RADIUS Configuring RADIUS Servers Configuring RADIUS Server Hosts Configuring RADIUS Global Preshared Keys Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 5 Configuring TACACS+ Server Groups Configuring the Global Source Interface for TACACS+ Server Groups Configuring the Global TACACS+ Timeout Interval Configuring the Timeout Interval for a Server Configuring TCP Ports Configuring Periodic TACACS+ Server Monitoring Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 6 Configuration Examples for SSH Configuring X.509v3 Certificate-Based SSH Authentication Configuration Example for X.509v3 Certificate-Based SSH Authentication Configuring Telnet Enabling the Telnet Server Reenabling the Telnet Server Configuring the Telnet Source Interface Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 7 Applying an IP ACL as a Port ACL Applying an IP ACL as a Router ACL Verifying the ACL Logging Configuration About System ACLs Carving a TCAM Region Configuring System ACLs Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 8 Rate Controlling Mechanisms Dynamic and Static CoPP ACLs Default Policing Policies Default Class Maps - For Cisco NX-OS Release 7.0(3)I3(1) Strict Default CoPP Policy - For Cisco NX-OS Release 7.0(3)I3(1) Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x viii...
  • Page 9 Contents Moderate Default CoPP Policy - For Cisco NX-OS Release 7.0(3)I3(1) Lenient Default CoPP Policy - For Cisco NX-OS Release 7.0(3)I3(1) Dense Default CoPP Policy - For Cisco NX-OS Release 7.0(3)I3(1) Packets Per Second Credit Limit Modular QoS Command-Line Interface...
  • Page 10 Contents Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 11: Preface

    Documentation Feedback, page xii • Related Documentation for Cisco Nexus 3600 Platform Switches, page xiii Audience This publication is for network administrators who install, configure, and maintain Cisco Nexus switches. Document Conventions Command descriptions use the following conventions: Convention Description...
  • Page 12: Obtaining Documentation And Submitting A Service Request

    Subscribe to What's New in Cisco Product Documentation, which lists all new and revised Cisco technical documentation as an RSS feed and delivers content directly to your desktop using a reader application. The RSS feeds are a free service.
  • Page 13: Related Documentation For Cisco Nexus 3600 Platform Switches

    Preface Related Documentation for Cisco Nexus 3600 Platform Switches Related Documentation for Cisco Nexus 3600 Platform Switches The entire Cisco Nexus 3600 platform switch documentation set is available at the following URL: http://www.cisco.com/c/en/us/support/switches/nexus-3000-series-switches/ tsd-products-support-series-home.html Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 14 Preface Related Documentation for Cisco Nexus 3600 Platform Switches Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 15: New And Changed Information

    • New and Changed Information, page 1 New and Changed Information This table summarizes the new and changed features for the Cisco Nexus 3600 Series NX-OS Security Configuration Guide and where they are documented. Table 1: New and Changed Features...
  • Page 16 Release Unicast RPF Added support for unicast RPF. 7.0(3)F3(1) Configuring Unicast RPF, on page 101 Control Plane Policing (CoPP) Added support for CoPP 7.0(3)F3(1) Configuring Control Plane Policing, on page 109 Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 17: Overview

    C H A P T E R Overview The Cisco NX-OS software supports security features that can protect your network against degradation or failure and also against data loss or compromise resulting from intentional attacks and from unintended but damaging mistakes by well-meaning network users.
  • Page 18: Radius And Tacacs+ Security Protocols

    You can use the Secure Shell (SSH) server to enable an SSH client to make a secure, encrypted connection to a Cisco NX-OS device. SSH uses strong encryption for authentication. The SSH server in the Cisco NX-OS software can interoperate with publicly and commercially available SSH clients.
  • Page 19: Ssh And Telnet

    Each rule specifies a set of conditions that a packet must satisfy to match the rule. When the Cisco NX-OS software determines that an IP ACL applies to a packet, it tests the packet against the conditions of all rules. The first match determines whether a packet is permitted or denied, or if there is no match, the Cisco NX-OS software applies the applicable default rule.
  • Page 20 Overview IP ACLs Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 21: Configuring Aaa

    The authentication, authorization, and accounting (AAA) features allows you to verify the identity of, grant access to, and track the actions of users who manage Cisco Nexus devices. The Cisco Nexus device supports Remote Access Dial-In User Service (RADIUS) or Terminal Access Controller Access Control device Plus (TACACS+) protocols.
  • Page 22: Benefits Of Using Aaa

    Configuring AAA Benefits of Using AAA Authorization to access a Cisco Nexus device is provided by attributes that are downloaded from AAA servers. Remote security servers, such as RADIUS and TACACS+, authorize users for specific rights by associating attribute-value (AV) pairs, which define those rights with the appropriate user.
  • Page 23: Aaa Service Configuration Options

    • None—Uses only the username. Note If the method is for all RADIUS servers, instead of a specific server group, the Cisco Nexus devices choose the RADIUS server from the global pool of configured RADIUS servers in the order of configuration.
  • Page 24: Authentication And Authorization Process For User Logins

    Authentication and Authorization Process for User Logins The authentication and authorization process for user login is as occurs: • When you log in to the required Cisco Nexus device, you can use the Telnet, SSH, Fabric Manager or Device Manager, or console login options.
  • Page 25: Prerequisites For Remote Aaa

    • The Cisco Nexus device is configured as a client of the AAA servers. • The preshared secret key is configured on the Cisco Nexus device and on the remote AAA servers. • The remote server responds to AAA requests from the Cisco Nexus device.
  • Page 26: Guidelines And Limitations For Aaa

    The Cisco Nexus devices do not support all numeric usernames, whether created with TACACS+ or RADIUS, or created locally. If an all numeric username exists on an AAA server and is entered during a login, the Cisco Nexus device still logs in the user.
  • Page 27: Configuring Default Login Authentication Methods

    Configuring Default Login Authentication Methods The default method is local. Before you configure default login authentication methods, configure RADIUS or TACACS+ server groups as needed. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 28: Enabling Login Authentication Failure Messages

    Step 1 switch# configure terminal Enters global configuration mode. Step 2 switch(config)# aaa authentication login Enables login authentication failure messages. The default is disabled. error-enable Step 3 switch(config)# exit Exits configuration mode. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 29: Logging Successful And Failed Login Attempts

    Step 4 show login on-failure log (Optional) Displays whether the switch is configured to log failed authentication messages to the syslog server. Example: switch(config)# show login on-failure log Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 30: Configuring Aaa Command Authorization

    Step 2 aaa authorization {commands | Configures authorization parameters. config-commands} {default} {{[group Use the commands keyword to authorize EXEC group-name] | [ local]} | {[group group-name] | mode commandes. [ none]}} Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 31: Enabling Mschap Authentication

    Enabling MSCHAP Authentication Microsoft Challenge Handshake Authentication Protocol (MSCHAP) is the Microsoft version of CHAP. You can use MSCHAP for user logins to a Cisco Nexus device through a remote authentication server (RADIUS or TACACS+). Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 32: Configuring Aaa Accounting Default Methods

    Configuring AAA Accounting Default Methods The Cisco Nexus device supports TACACS+ and RADIUS methods for accounting. The switches report user activity to TACACS+ or RADIUS security servers in the form of accounting records. Each accounting record contains accounting attribute-value (AV) pairs and is stored on the AAA server.
  • Page 33 Configuring AAA Configuring AAA Accounting Default Methods When you activate AAA accounting, the Cisco Nexus device reports these attributes as accounting records, which are then stored in an accounting log on the security server. You can create default method lists defining specific accounting methods, which include the following:.
  • Page 34: Using Aaa Server Vsas

    The Cisco RADIUS implementation supports one vendor-specific option using the format recommended in the specification. The Cisco vendor ID is 9, and the supported option is vendor type 1, which is named cisco-av-pair. The value is a string with the following format:...
  • Page 35: Secure Login Enhancements

    The SNMPv3 authentication protocol options are SHA and MD5. The privacy protocol options are AES-128 and DES. If you do not specify these options in the cisco-av-pair attribute, MD5 and DES are the default authentication protocols.
  • Page 36: Configuration Examples For Login Parameters

    No Quiet-Mode access list has been configured, default ACL will be applied. Switch is enabled to watch for login Attacks. If more than 2 login failures occur in 45 seconds or less, logins will be disabled for 70 Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 37: Restricting Sessions Per User-Per User Per Login

    1 to 7. If you set the maximum login limit as 1, then only one session (telnet/SSH) is Example: allowed per user. Switch(config)# user max-logins 1 Step 3 exit Exits to privileged EXEC mode. Example: Switch(config)# exit Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 38: Enabling The Password Prompt For User Name

    7. While generating an encrypted shared secret, user input is hidden. Example: You can generate encrypted equivalent of Note Switch(config)# generate plain text separately and can configure the type7_encrypted_secret encrypted shared secret later. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 39: Monitoring And Clearing The Local Aaa Accounting Log

    Exits to privileged EXEC mode. exit Example: Switch(config)# exit Monitoring and Clearing the Local AAA Accounting Log The Cisco Nexus device maintains a local log for the AAA accounting activity. Procedure Command or Action Purpose Step 1 switch# show accounting log [size] Displays the accounting log contents.
  • Page 40: Configuration Examples For Aaa

    Default AAA Settings The following table lists the default settings for AAA parameters. Table 5: Default AAA Parameters Parameters Default Console authentication method local Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 41 Configuring AAA Default AAA Settings Parameters Default Default authentication method local Login authentication failure messages Disabled MSCHAP authentication Disabled Default accounting method local Accounting log display length 250 KB Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 42 Configuring AAA Default AAA Settings Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 43: Configuring Radius

    The Remote Access Dial-In User Service (RADIUS) distributed client/server system allows you to secure networks against unauthorized access. In the Cisco implementation, RADIUS clients run on Cisco Nexus device and send authentication and accounting requests to a central RADIUS server that contains all user authentication and network service access information.
  • Page 44: Information About Radius Operations

    • Networks already using RADIUS. You can add a Cisco Nexus device with RADIUS to the network. This action might be the first step when you make a transition to an AAA server. • Networks that require resource accounting.
  • Page 45: Radius Server Monitoring

    The Cisco RADIUS implementation supports one vendor-specific option using the format recommended in the specification. The Cisco vendor ID is 9, and the supported option is vendor type 1, which is named cisco-av-pair. The value is a string with the following format:...
  • Page 46: Prerequisites For Radius

    • You must obtain IPv4 or IPv6 addresses or hostnames for the RADIUS servers. • You must obtain preshared keys from the RADIUS servers. • Ensure that the Cisco Nexus device is configured as a RADIUS client of the AAA servers. Guidelines and Limitations for RADIUS RADIUS has the following configuration guidelines and limitations: •...
  • Page 47: Configuring Radius Server Hosts

    Saves the change persistenetly through reboots and restarts by copying the running configuration to the startup configuration. The following example shows how to configure host 10.10.1.1 as a RADIUS server: switch# configure terminal Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 48: Configuring Radius Global Preshared Keys

    Configuring RADIUS Global Preshared Keys You can configure preshared keys at the global level for all servers used by the Cisco Nexus device. A preshared key is a shared secret text string between the switch and the RADIUS server hosts.
  • Page 49: Configuring Radius Server Groups

    You can specify one or more remote AAA servers for authentication using server groups. All members of a group must belong to the RADIUS protocol. The servers are tried in the same order in which you configure them. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 50 The following example shows how to configure a RADIUS server group: switch# configure terminal switch (config)# aaa group server radius RadServer switch (config-radius)# server 10.10.1.1 switch (config-radius)# deadtime 30 switch (config-radius)# use-vrf management switch (config-radius)# exit Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 51: Configuring The Global Source Interface For Radius Server Groups

    0 switch(config)# exit switch# copy running-config startup-config Allowing Users to Specify a RADIUS Server at Login You can allow users to specify a RADIUS server at login. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 52: Configuring The Global Radius Transmission Retry Count And Timeout Interval

    RADIUS server only once before reverting to local authentication. You can increase this number up to a maximum of five retries per server. The timeout interval determines how long the Cisco Nexus device waits for responses from RADIUS servers before declaring a timeout failure. Procedure...
  • Page 53: Configuring Accounting And Authentication Attributes For Radius Servers

    (Optional) Specifies a UDP port to use for RADIUS {ipv4-address | ipv6-address | host-name} auth-port udp-port authentication messages. The default UDP port is 1812. The range is from 0 to 65535. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 54: Configuring Periodic Radius Server Monitoring

    Enters global configuration move. Step 2 switch(config)# radius-server host Specifies parameters for server monitoring. The default {ipv4-address | ipv6-address | username is test and the default password is test. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 55: Configuring The Dead-Time Interval

    You can configure the dead-time interval for all RADIUS servers. The dead-time interval specifies the time that the Cisco Nexus device waits after declaring a RADIUS server is dead, before sending out a test packet to determine if the server is now alive. The default value is 0 minutes.
  • Page 56: Manually Monitoring Radius Servers Or Groups

    This example shows how to send a test message to the RADIUS server and server group to confirm availability: switch# test aaa server radius 10.10.1.1 user 1 Ur2Gd2BH switch# test aaa group RadGroup user2 As3He3CI Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 57: Verifying The Radius Configuration

    {hostname | Displays the RADIUS statistics. ipv4-address | ipv6-address} Clearing RADIUS Server Statistics You can display the statistics that the Cisco NX-OS device maintains for RADIUS server activity. Before You Begin Configure RADIUS servers on the Cisco NX-OS device. Procedure...
  • Page 58: Configuration Examples For Radius

    Periodic server monitoring password test Feature History for RADIUS Table 7: Feature History for RADIUS Feature Name Releases Feature Information RADIUS 5.0(3)U1(1) This feature was introduced. IPv6 5.0(3)U3(1) IPv6 support was introduced. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 59: Chapter 5 Configuring Tacacs

    The Terminal Access Controller Access Control System Plus (TACACS+) security protocol provides centralized validation of users attempting to gain access to a Cisco Nexus device. TACACS+ services are maintained in a database on a TACACS+ daemon typically running on a UNIX or Windows NT workstation. You must have access to and must configure a TACACS+ server before the configured TACACS+ features on your Cisco Nexus device are available.
  • Page 60: User Login With Tacacs

    You must configure the TACACS+ that is preshared key to authenticate the switch to the TACACS+ server. A preshared key is a secret text string shared between the Cisco Nexus device and the TACACS+ server host. The length of the key is restricted to 63 characters and can include any printable ASCII characters (white spaces are not allowed).
  • Page 61: Tacacs+ Server Monitoring

    Simple Network Management Protocol (SNMP) trap is generated and the Cisco Nexus device displays an error message that a failure is taking place before it can impact performance. The following figure shows the different TACACS+ server states: Figure 3: TACACS+ Server States The monitoring interval for alive servers and dead servers are different and can be configured by the user.
  • Page 62: Guidelines And Limitations For Tacacs

    If needed, configure periodic TACACS+ server monitoring. Configuring Periodic TACACS+ Server Monitoring, on page 54 Enabling TACACS+ Although by default, the TACACS+ feature is disabled on the Cisco Nexus device. You can enable the TACACS+ feature to access the configuration and verification commands for authentication. Procedure...
  • Page 63: Configuring Tacacs+ Server Hosts

    To access a remote TACACS+ server, you must configure the IPv4 or IPv6 address or the hostname for the TACACS+ server on the Cisco Nexus device. All TACACS+ server hosts are added to the default TACACS+ server group.You can configure up to 64 TACACS+ servers.
  • Page 64: Configuring Tacacs+ Global Preshared Keys

    Configuring TACACS+ Global Preshared Keys You can configure preshared keys at the global level for all servers used by the Cisco Nexus device. A preshared key is a shared secret text string between the Cisco Nexus device and the TACACS+ server hosts.
  • Page 65: Configuring Tacacs+ Server Groups

    Exits configuration mode. Step 6 switch(config)# show tacacs-server (Optional) Displays the TACACS+ server group configuration. groups Step 7 switch(config)# copy (Optional) running-config startup-config Copies the running configuration to the startup configuration. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 66: Configuring The Global Source Interface For Tacacs+ Server Groups

    Configuring the Global TACACS+ Timeout Interval You can set a global timeout interval that the Cisco Nexus device waits for responses from all TACACS+ servers before declaring a timeout failure. The timeout interval determines how long the switch waits for responses from TACACS+ servers before declaring a timeout failure.
  • Page 67: Configuring The Timeout Interval For A Server

    Configuring the Timeout Interval for a Server You can set a timeout interval that the Cisco Nexus device waits for responses from a TACACS+ server before declaring a timeout failure. The timeout interval determines how long the switch waits for responses from a TACACS+ server before declaring a timeout failure.
  • Page 68: Configuring Periodic Tacacs+ Server Monitoring

    The idle timer specifies the interval in which a TACACS+ server receives no requests before the Cisco Nexus device sends out a test packet.You can configure this option to test servers periodically, or you can run a one-time only test.
  • Page 69: Configuring The Dead-Time Interval

    You can configure the dead-time interval for all TACACS+ servers. The dead-time interval specifies the time that the Cisco Nexus device waits, after declaring a TACACS+ server is dead, before sending out a test packet to determine if the server is now alive.
  • Page 70: Manually Monitoring Tacacs+ Servers Or Groups

    Enters global configuration mode. Step 2 switch(config)# no feature tacacs+ Disables TACACS+. Step 3 switch(config)# exit Exits configuration mode. Step 4 switch# copy running-config (Optional) Copies the running configuration to the startup startup-config configuration. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 71: Displaying Tacacs+ Statistics

    This example shows how to configure TACACS+: switch# configure terminal switch(config)# feature tacacs+ switch(config)# tacacs-server key 7 "ToIkLhPpG" switch(config)# tacacs-server host 10.10.2.2 key 7 "ShMoMhTl" switch(config)# aaa group server tacacs+ TacServer switch(config-tacacs+)# server 10.10.2.2 switch(config-tacacs+)# use-vrf management Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 72: Default Settings For Tacacs

    Table 8: Default TACACS+ Parameters Parameters Default TACACS+ Disabled Dead-time interval 0 minutes Timeout interval 5 seconds Idle timer interval 0 minutes Periodic server monitoring username test Periodic server monitoring password test Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 73: Chapter 6 Configuring Ssh And Telnet

    The Secure Shell Protocol (SSH) server feature enables a SSH client to make a secure, encrypted connection to a Cisco Nexus device. SSH uses strong encryption for authentication. The SSH server in the Cisco Nexus device switch interoperates with publicly and commercially available SSH clients.
  • Page 74: Ssh Server Keys

    The SSH client in the Cisco Nexus device works with publicly and commercially available SSH servers. SSH Server Keys SSH requires server keys for secure communications to the Cisco Nexus device. You can use SSH keys for the following SSH options: •...
  • Page 75: Telnet Server

    Telnet can accept either an IP address or a domain name as the remote system address. The Telnet server is enabled by default on the Cisco Nexus device. Guidelines and Limitations for SSH SSH has the following configuration guidelines and limitations: •...
  • Page 76: Specifying The Ssh Public Keys For User Accounts

    Copies the running configuration to the startup configuration. The following example shows how to specify an SSH public key in open SSH format: switch# configure terminal switch(config)# username User1 sshkey ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAri3mQy4W1AV9Y2t2hrEWgbUEYz Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 77: Specifying The Ssh Public Keys In Ietf Secsh Format

    Specifying the SSH Public Keys in PEM-Formatted Public Key Certificate Form You can specify the SSH public keys in PEM-formatted Public Key Certificate form for user accounts. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 78: Configuring The Ssh Source Interface

    The following list contains the valid values for interface. • ethernet • loopback • mgmt • port-channel • vlan Step 3 switch(config)# show ip ssh Displays the configured SSH source interface. source-interface Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 79: Starting Ssh Sessions To Remote Devices

    VRF Name Interface default Ethernet1/7 Starting SSH Sessions to Remote Devices You can start SSH sessions to connect to remote devices from your Cisco Nexus device. Procedure Command or Action Purpose Step 1 switch# ssh {hostname | Creates an SSH session to a remote device.
  • Page 80: Deleting Ssh Server Keys

    Displays the SSH server configuration. Step 6 switch# copy running-config (Optional) startup-config Copies the running configuration to the startup configuration. Clearing SSH Sessions You can clear SSH sessions from the Cisco Nexus device. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 81: Configuration Examples For Ssh

    Display the SSH server key. switch(config)# show ssh key rsa Keys generated:Fri May 8 22:09:47 2009 ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAri3mQy4W1AV9Y2t2hrEWgbUEYzCfTPO5B8LRkedn56BEy2N9ZcdpqE6aqJLZwfZ/ cTFEzaAAZp9AS86dgBAjsKGs7UxnhGySr8ZELv+DQBsDQH6rZt0KR+2Da8hJD4ZXIeccWk0gS1DQUNZ300xstQsYZUtqnx1bvm5/ Ninn0Mc= bitcount:1024 fingerprint: 4b:4d:f6:b9:42:e9:d9:71:3c:bd:09:94:4a:93:ac:ca ************************************** could not retrieve dsa key information ************************************** Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 82: Configuring X.509V3 Certificate-Based Ssh Authentication

    The default is 0 (clear text). If you do not specify a password, the user might Note not be able to log in to the Cisco NX-OS device. If you create a user account with the encrypted Note password option, the corresponding SNMP user will not be created.
  • Page 83 Step 9 show user-account (Optional) Displays configured user account details. Example: switch(config)# show user-account Step 10 show users (Optional) Displays the users logged into the device. Example: switch(config)# show users Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 84: Configuration Example For X.509V3 Certificate-Based Ssh Authentication

    DN : /C = US, ST = New York, L = Metropolis, O = cisco , OU = csg, CN = user1; Algo: x509v3-sign-rsa show users NAME...
  • Page 85: Configuring Telnet

    Configuring SSH and Telnet Configuring Telnet Configuring Telnet Enabling the Telnet Server By default, the Telnet server is enabled. You can disable the Telnet server on your Cisco Nexus device. Procedure Command or Action Purpose Step 1 switch# configure terminal Enters global configuration move.
  • Page 86: Starting Telnet Sessions To Remote Devices

    Before you start a Telnet session to connect to remote devices, you should do the following: • Obtain the hostname for the remote device and, if needed, obtain the username on the remote device. • Enable the Telnet server on the Cisco Nexus device. • Enable the Telnet server on the remote device.
  • Page 87: Verifying The Ssh And Telnet Configuration

    Displays the contents of the CRL list of the specified trustpoint for X.509v3 certificate-based SSH authentication. Default Settings for SSH The following table lists the default settings for SSH parameters. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 88 Default Settings for SSH Table 9: Default SSH Parameters Parameters Default SSH server Enabled SSH server key RSA key generated with 1024 bits RSA key bits for generation 1024 Telnet server Enabled Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 89: Chapter 7 Configuring Ip Acls

    C H A P T E R Configuring IP ACLs This chapter describes how to configure IP access control lists (ACLs) on Cisco NX-OS devices. Unless otherwise specified, the term IP ACL refers to IPv4 and IPv6 ACLs. • Information About ACLs, page 75 •...
  • Page 90: Ip Acl Types And Applications

    IP ACL Types and Applications The Cisco Nexus device supports IPv4, IPv6, and MAC ACLs for security traffic filtering. The switch allows you to use IP access control lists (ACLs) as port ACLs, and Router ACLs as shown in the following table.
  • Page 91: Source And Destination

    • Established TCP connections Sequence Numbers The Cisco Nexus device supports sequence numbers for rules. Every rule that you enter receives a sequence number, either assigned by you or assigned automatically by the device. Sequence numbers simplify the following ACL tasks: •...
  • Page 92: Logical Operators And Logical Operation Units

    The IPv4 TCAMs are single wide. You can create IPv6 port ACLs, router ACLs, and you can match IPv6 addresses for QoS. Cisco NX-OS provides simultaneous support for all three TCAMs. You must remove or reduce the size of the existing TCAMs to enable these new IPv6 TCAMs.
  • Page 93: Licensing Requirements For Acls

    The following table shows the licensing requirements for this feature: Product License Requirement Cisco NX-OS No license is required to use ACLs. Prerequisites for ACLs IP ACLs have the following prerequisites: Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 94: Guidelines And Limitations For Acls

    Table 12: Default IP ACLs Parameters Parameters Default IP ACLs No IP ACLs exist by default. ACL rules Implicit rules apply to all ACLs . The following table lists the default settings for MAC ACLs parameters. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 95: Acl Logging

    Implicit rules apply to all ACLs . ACL Logging The Cisco Nexus device supports ACL logging, which allows you to monitor flows that hit specific access control lists (ACLs). To enable the feature for the ACL entry, configure specific ACEs with the optional log keyword.
  • Page 96: Configuring Ipv4 Acl Logging

    IP address with a network wildcard, the IP address and variable-length subnet mask, the host address, or any to designate any address. Step 4 exit Updates the configuration and exits IP ACL configuration mode. Example: switch(config-acl)# exit switch(config)# Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 97 ACL logging. The range is from 0 to 30000. Example: Note Cisco Nexus NX-OS 7.0(3)F3(1) does not switch(config)# hardware support the hardware rate-limiter rate-limiter access-list-log 200 access-list-log command. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 98: Changing An Ip Acl

    For more information, see the Command Reference for your Cisco Nexus device. Step 5 switch(config-acl)# no (Optional) {sequence-number | {permit | deny} Removes the rule that you specified from the IP ACL. protocol source destination} Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 99: Removing An Ip Acl

    Step 4 switch# show running-config (Optional) Displays the ACL configuration. The removed IP ACL should not appear. Step 5 switch# copy running-config (Optional) Copies the running configuration to the startup startup-config configuration. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 100: Changing Sequence Numbers In An Ip Acl

    You can apply one router ACL per Example: direction. switch(config-if)#ip access-group acl-120 Step 3 show running-config aclmgr (Optional) Displays the ACL configuration. Example: switch(config-if)# show running-config aclmgr Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 101: Applying An Ip Acl As A Port Acl

    You can apply an IPv4 or or IPv6 ACL to any of the following types of interfaces: • Physical Layer 3 interfaces and subinterfaces • Layer 3 Ethernet port-channel interfaces and subinterfaces • Management interfaces Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 102: Verifying The Acl Logging Configuration

    Displays the TCAM sizes that will be applicable on the next reload of the device. switch# show ip access-lists Displays the IPv4 ACL configuration. switch# show ipv6 access-lists Displays the IPv6 ACL configuration. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 103: About System Acls

    ACLs in the startup configuration. About System ACLs Beginning with Cisco NX-OS Release 7.0(3)F3(4) or a later release, you can configure system ACLs on Cisco Nexus 36180YC-R and C3636C-R switches. With system ACLs, you can now configure a Layer 2 port ACL (PACL) on all the ports with the same access-list in the switch.
  • Page 104: Carving A Tcam Region

    Configuring IP ACLs Carving a TCAM Region • For quality of service, ACL, or TCAM carving configuration on Cisco Nexus 3600 platform switches, see the Cisco Nexus 3600 NX-OS Quality of Service Configuration Guide, Release 7.x for more information. Carving a TCAM Region Before configuring the system ACLs, carve the TCAM region first.
  • Page 105 FEX IPV6 Port QoS [fex-ipv6-qos] size = FEX MAC Port QoS [fex-mac-qos] size = IPV4 VACL [vacl] size = IPV6 VACL [ipv6-vacl] size = MAC VACL [mac-vacl] size = IPV4 VLAN QoS [vqos] size = Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 106: Configuring Acl Logging

    The range is from 0 to 1000000 packets. The num_packets default value is 0 packets, which means that logging is not triggered by the number of packet matches. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 107: Applying Acl Logging To An Interface

    The following example shows how to apply the Ethernet interface with the logging specified in acl1 for all ingress traffic: switch# configure terminal switch(config)# interface ethernet 1/2 switch(config-if)# ip access-group acl1 in switch(config-if)# copy running-config startup-config Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 108: Applying The Acl Log Match Level

    Purpose switch# show hardware access-list tcam region Displays the TCAM sizes that will be applicable on the next reload of the device. switch# show ip access-lists Displays the IPv4 ACL configuration. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 109: Configuring Acl Tcam Region Sizes

    You can change the size of the ACL ternary content addressable memory (TCAM) regions in the hardware. You cannot change the size of the small TCAMs (TCAM 12 through 15) Note Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 110 Do you want to continue? (y/n) [n] y This example shows how to display the TCAM region sizes to verify your changes: switch(config)# show hardware accesslist tcam region | exclude "0" IPV4 PACL [ifacl] size = 1024 Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 111: Reverting To The Default Tcam Region Sizes

    Follow these guidelines when configuring ACLs on VTY lines: • Set identical restrictions on all VTY lines because a user can connect to any of them. • Statistics per entry is not supported for ACLs on VTY lines. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 112 The following example shows how to apply the access-class ozi2 command to the in-direction of the vty line. switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# line vty switch(config-line)# access-class ozi2 in switch(config-line)# exit switch# Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 113: Verifying Acls On Vty Lines

    172.18.217.20/24 any switch(config-acl)# exit switch# The following example shows how to apply the ACLs on VTY in and out directions: switch(config)# line vty switch(config-line)# ip access-class ozi in Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 114 The following example shows how to remove the access restrictions on the VTY line: switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# line vty switch(config-line)# no access-class ozi2 in switch(config-line)# no ip access-class ozi2 in switch(config-line)# exit switch# Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 115: Configuring Unicast Rpf

    If Unicast RPF does not find a reverse path for the packet, the packet is dropped. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 116: Unicast Rpf Process

    Forwards the packet. Global Statistics Each time the Cisco NX-OS device drops a packet at an interface due to a failed unicast RPF check, that information is counted globally on the device on a per-forwarding engine (FE) basis. Global statistics on...
  • Page 117: Licensing Requirements For Unicast Rpf

    Unicast RPF requires no license. Any feature not included in a license package is bundled with the Cisco NX-OS system images and is provided at no extra charge to you. For an explanation of the Cisco NX-OS licensing scheme, see the Cisco NX-OS Licensing Guide.
  • Page 118: Default Settings For Unicast Rpf

    • Because of the hardware limitation on the trap resolution, uRPF might not be applied on supervisor-bound packets via inband. • For IP traffic, both IPv4 and IPv6 configurations should be enabled simultaneously. • Due to hardware limitations, the Cisco Nexus 3600 Series switches support only the following combinations: uRPF Configuration...
  • Page 119 Step 4 Exits class map configuration mode. exit Example: switch(config-cmap)# exit switch(config)# Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 120: Configuration Examples For Unicast Rpf

    Verifying the Unicast RPF Configuration To display Unicast RPF configuration information, perform one of the following tasks: Command Purpose show running-config interface ethernet slot/port Displays the interface configuration in the running configuration. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 121: Additional References For Unicast Rpf

    Additional References for Unicast RPF This section includes additional information related to implementing unicast RPF. Related Documents Related Topic Document Title MPLS VPN Cisco Nexus 3600 Series NX-OS Label Switching Configuration Guide Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 122 Configuring Unicast RPF Additional References for Unicast RPF Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 123: Configuring Control Plane Policing

    (DoS) attack, where excessive traffic is directed at the device interfaces. The Cisco NX-OS device provides CoPP to prevent DoS attacks from impacting performance. Such attacks, which can be perpetrated either inadvertently or maliciously, typically involve high rates of traffic destined to the supervisor module or CPU itself.
  • Page 124: Control Plane Protection

    Control Plane Protection Data plane Handles all the data traffic. The basic functionality of a Cisco NX-OS device is to forward packets from one interface to another. The packets that are not meant for the switch itself are called the transit packets.
  • Page 125: Control Plane Packet Types

    ARP request to the host. All of these different packets could be maliciously used to attack the control plane and overwhelm the Cisco NX-OS device. CoPP classifies these packets to different classes and provides a mechanism to individually control the rate at which the supervisor module receives these packets.
  • Page 126: Rate Controlling Mechanisms

    Control Plane Protection Rate Controlling Mechanisms Once the packets are classified, the Cisco NX-OS device has different mechanisms to control the rate at which packets arrive at the supervisor module. Two mechanisms control the rate of traffic to the supervisor module.
  • Page 127: Default Policing Policies

    125. Default Policing Policies When you bring up your Cisco NX-OS device for the first time, the Cisco NX-OS software installs the default copp-system-p-policy-strict policy to protect the supervisor module from DoS attacks. You can set the level of protection by choosing one of the following CoPP policy options from the initial setup utility: •...
  • Page 128: Default Class Maps - For Cisco Nx-Os Release 7.0(3)I3(1

    The copp-system-class-l3mc-data class has the following configuration: class-map type control-plane match-any copp-system-p-class-l3mc-data match exception multicast rpf-failure match exception multicast dest-miss The copp-system-class-l3uc-data class has the following configuration: class-map type control-plane match-any copp-system-p-class-l3uc-data match exception glean Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 129 The copp-system-class-normal-dhcp-relay-response class has the following configuration: class-map type control-plane match-any copp-system-p-class-normal-dhcp-relay-response match access-group name copp-system-p-acl-dhcp-relay-response match access-group name copp-system-p-acl-dhcp6-relay-response Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 130: Strict Default Copp Policy - For Cisco Nx-Os Release 7.0(3)I3(1

    The copp-system-class-fcoe class is not supported for Cisco Nexus 9200 Series switches. Note Strict Default CoPP Policy - For Cisco NX-OS Release 7.0(3)I3(1) On Cisco Nexus 9200 Series switches, the strict CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-strict class copp-system-p-class-l3uc-data...
  • Page 131 0 police cir 400 kbps bc 32000 bytes conform transmit violate drop On Cisco Nexus 9300 and 9500 Series and 3164Q, 31128PQ, 3232C, and 3264Q switches, the strict CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-strict...
  • Page 132: Moderate Default Copp Policy - For Cisco Nx-Os Release 7.0(3)I3(1

    50 pps bc 32 packets conform transmit violate drop Moderate Default CoPP Policy - For Cisco NX-OS Release 7.0(3)I3(1) On Cisco Nexus 9200 Series switches, the moderate CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-moderate class copp-system-p-class-l3uc-data...
  • Page 133 0 police cir 400 kbps bc 48000 bytes conform transmit violate drop On Cisco Nexus 9300 and 9500 Series and 3164Q, 31128PQ, 3232C, and 3264Q switches, the moderate CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-moderate...
  • Page 134: Lenient Default Copp Policy - For Cisco Nx-Os Release 7.0(3)I3(1

    50 pps bc 48 packets conform transmit violate drop Lenient Default CoPP Policy - For Cisco NX-OS Release 7.0(3)I3(1) On Cisco Nexus 9200 Series switches, the lenient CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-lenient class copp-system-p-class-l3uc-data...
  • Page 135 0 police cir 400 kbps bc 64000 bytes conform transmit violate drop On Cisco Nexus 9300 and 9500 Series and 3164Q, 31128PQ, 3232C, and 3264Q switches, the lenient CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-lenient...
  • Page 136: Dense Default Copp Policy - For Cisco Nx-Os Release 7.0(3)I3(1

    50 pps bc 64 packets conform transmit violate drop Dense Default CoPP Policy - For Cisco NX-OS Release 7.0(3)I3(1) On Cisco Nexus 9200 Series switches, the dense CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-dense class copp-system-p-class-l3uc-data...
  • Page 137 0 police cir 200 kbps bc 32000 bytes conform transmit violate drop On Cisco Nexus 9300 and 9500 Series and 3164Q, 31128PQ, 3232C, and 3264Q switches, the dense CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-dense...
  • Page 138: Packets Per Second Credit Limit

    CoPP and the Management Interface The Cisco NX-OS device supports only hardware-based CoPP, which does not support the management interface (mgmt0). The out-of-band mgmt0 interface connects directly to the CPU and does not pass through the in-band traffic hardware where CoPP is implemented.
  • Page 139: Licensing Requirements For Copp

    Filtering this traffic could prevent remote access to the Cisco NX-OS device and require a console connection. • The Cisco NX-OS software does not support egress CoPP or silent mode. CoPP is supported only on ingress (you cannot use the service-policy output copp command to the control plane interface).
  • Page 140 NX-OS Release 7.0(3)I2(1)]. • Cisco Nexus 9200 Series switches support CoPP policer rates only in multiples of 10 kbps. If a rate is configured that is not a multiple of 10 kbps, the rate is rounded down. For example, the switch will use 50 kbps if a rate of 55 kbps is configured.
  • Page 141: Default Settings For Copp

    Configuring Control Plane Policing Default Settings for CoPP If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature Note might differ from the Cisco IOS commands that you would use. Default Settings for CoPP This table lists the default settings for CoPP parameters.
  • Page 142 Exits class map configuration mode. Example: switch(config-cmap)# exit switch(config)# Step 9 (Optional) show class-map type control-plane [class-map-name] Displays the control plane class map configuration. Example: switch(config)# show class-map type control-plane Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 143: Configuring A Control Plane Policy Map

    You must configure a policy map for CoPP, which includes policing parameters. If you do not configure a policer for a class, the following default is configured: • 50 packets per second (pps) with a burst of 32 packets (for Cisco Nexus 9300 and 9500 Series and 3164Q, 31128PQ, 3232C, and 3264Q switches) •...
  • Page 144 Configuring Control Plane Policing Configuring a Control Plane Policy Map Command or Action Purpose • 0 to 268435456 pps (for Cisco Nexus 9300 and • police [cir] {cir-rate [rate-type]} [bc] 9500 Series and 3164Q, 31128PQ, 3232C, and burst-size [burst-size-type] 3264Q switches) •...
  • Page 145: Configuring The Control Plane Service Policy

    CoPP 2013 Nov 13 23:16:46 switch %ACLQOS-SLOT4-5-ACLQOS_NON_ATOMIC: Non atomic ACL/QoS policy update done for CoPP Before You Begin Ensure that you have configured a control plane policy map. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 146: Configuring The Copp Scale Factor Per Line Card

    The scale factor configuration is used to scale the policer rate of the applied CoPP policy for a particular line card. The accepted value is from 0.10 to 2.00. You can increase or reduce the policer rate for a particular line Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 147: Changing Or Reapplying The Default Copp Policy

    Example: switch(config)# copy running-config startup-config Changing or Reapplying the Default CoPP Policy You can change to a different default CoPP policy, or you can reapply the same default CoPP policy. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 148: Copying The Copp Best Practice Policy

    Displays the CoPP status, including the last configuration operation and its status. This command Example: also enables you to verify that the copied policy is not switch# show copp status attached to the control plane. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 149: Verifying The Copp Configuration

    [class-map-name] Displays the control plane class map configuration, including the ACLs that are bound to this class map. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 150 [all] Displays the user-configured access control lists (ACLs) in the startup configuration. The all option displays both the default (CoPP-configured) and user-configured ACLs in the startup configuration. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 151: Displaying The Copp Configuration Status

    Control Plane Service-policy input: copp-system-p-policy-strict class-map copp-system-p-class-critical (match-any) set cos 7 police cir 19000 pps , bc 128 packets module 4 : transmitted 373977 packets; dropped 0 packets; Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 152: Clearing The Copp Statistics

    Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 153: Changing Or Reapplying The Default Copp Policy Using The Setup Utility

    Enable license grace period? (yes/no) [n]: n Continue with Out-of-band (mgmt0) management configuration? (yes/no) [y]: n Configure the default gateway? (yes/no) [y]: n Configure advanced IP options? (yes/no) [n]: <CR> Enable the telnet service? (yes/no) [n]: y Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
  • Page 154: Additional References For Copp

    This section provides additional information related to implementing CoPP. Related Documents Related Topic Document Title Licensing Cisco NX-OS Licensing Guide Standards Standards Title RFC 2698 A Two Rate Three Color Marker Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...

Table of Contents