User Guide: AMF Security version 2.6.0 for VST-VRT

AMF Security OpenFlow Authentication Flow


This section describes the flow of terminal authentication in an OpenFlow configuration.
AMF Security performs authentication at the request of the OpenFlow Switches it manages.
OpenFlow Switches ask AMF Security for authentication in the following manner.

  1. OpenFlow Switch receives packets from the terminal
  2. The OpenFlow Switch checks whether a flow entry has been registered for the source MAC Address of the terminal's packet. When a matching flow entry is found, the OpenFlow Switch transmits the packet according to the flow entry.
  3. If there is no matching flow entry, the OpenFlow Switch sends a packet to query AMF Security.
AMF Security performs the authentication process on the MAC Address in the query packet, then installs a new flow entry on the OpenFlow Switch depending on its decision (whether the packet should be allowed to which VLAN, quarantined to which VLAN or dropped).
AMF Security has four major authentication processes: Device Authentication Data, Authentication using Tag, UnAuth Group and Action.
AMF Security authenticates each device in the order of Action, Device Authentication Data and the UnAuth Group.

As an example, the behavior in the case where Action, Device Authentication Data, and UnAuth Group are registered is shown.
Table 1: Action
Action ID: Drop
Condition MAC Address 00:00:00:00:00:01
OpenFlow/TQ Action Drop(Block)
Table 2: Device Authentication Data
Device ID: Device_A
MAC Address 00:00:00:00:00:01       
Policies VLAN100
Device ID: Device_B
MAC Address 00:00:00:00:00:02       
Policies VLAN101
Table 3: UnAuth Group
Group ID: Unregistered
Policies VLAN200


02 Aug 2024 15:10