Rbac Configuration Example For Radius Authentication Users - HP 5130 EI series Configuration Manual

Hide thumbs Also See for 5130 EI series:
Table of Contents

Advertisement

Permission denied.
<Switch> ping 192.168.1.58
Permission denied.

RBAC configuration example for RADIUS authentication users

Network requirements
As shown in
login users, including the Telnet user at 192.168.1.58. The Telnet user uses the username hello@bbb and
is assigned the user role role2.
The user role role2 has the following permissions:
Uses all commands in ISP view.
Uses the read and write commands of the arp and radius features.
Does not have access to the read commands of the acl feature.
Configures VLANs 1 to 20 and interfaces GigabitEthernet 1/0/1 to GigabitEthernet 1/0/20.
The switch and the FreeRADIUS server use the shared key expert and authentication port 1812. The switch
delivers usernames with their domain names to the server.
Figure 25 Network diagram
Configuration procedure
Make sure the settings on the switch and the RADIUS server match.
1.
Configure the switch:
# Assign VLAN-interface 2 an IP address from the same subnet as the Telnet user.
<Switch> system-view
[Switch] interface vlan-interface 2
[Switch-Vlan-interface2] ip address 192.168.1.70 255.255.255.0
[Switch-Vlan-interface2] quit
# Assign VLAN-interface 3 an IP address from the same subnet as the RADIUS server.
[Switch] interface vlan-interface 3
[Switch-Vlan-interface3] ip address 10.1.1.2 255.255.255.0
[Switch-Vlan-interface3] quit
# Enable Telnet server.
[Switch] telnet server enable
# Enable scheme authentication on the user lines for Telnet users.
Figure
25, the switch uses the FreeRADIUS server at 10.1.1.1/24 to provide AAA service for
61

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents