Huawei Quidway S9300 Configuration Manual page 5

Terabit routing switch
Table of Contents

Advertisement

Quidway S9300 Terabit Routing Switch
Configuration Guide - Security
2.2 NAC Features Supported by the S9300..........................................................................................................2-4
2.3 Configuring Web Authentication....................................................................................................................2-4
2.3.1 Establishing the Configuration Task......................................................................................................2-4
2.3.2 Configuring the Web Authentication Server..........................................................................................2-5
2.3.3 Binding the Web Authentication Server to the Interface.......................................................................2-5
2.3.4 Configuring the Free Rule for Web Authentication...............................................................................2-6
2.3.5 (Optional) Configuring the Web Authentication Policy........................................................................2-6
2.3.6 (Optional) Setting the Port that Listens to the Portal Packets................................................................2-7
2.3.7 (Optional) Setting the Version of the Portal Protocol Packets...............................................................2-7
2.3.8 Checking the Configuration...................................................................................................................2-8
2.4 Configuring 802.1x Authentication.................................................................................................................2-8
2.4.1 Establishing the Configuration Task......................................................................................................2-9
2.4.2 Enabling Global 802.1x Authentication.................................................................................................2-9
2.4.3 Enabling 802.1x Authentication on an Interface..................................................................................2-10
2.4.4 (Optional) Enabling MAC Bypass Authentication..............................................................................2-11
2.4.5 Setting the Authentication Method for the 802.1x User......................................................................2-12
2.4.6 (Optional) Configuring the Interface Access Mode.............................................................................2-13
2.4.7 (Optional) Configuring the Authorization Status of an Interface.........................................................2-14
2.4.8 (Optional) Setting the Maximum Number of Concurrent Access Users..............................................2-15
2.4.9 (Optional) Enabling DHCP Packets to Trigger Authentication...........................................................2-16
2.4.10 (Optional) Configuring 802.1x Timers..............................................................................................2-16
2.4.11 (Optional) Configuring the Quiet Timer Function.............................................................................2-17
2.4.12 (Optional) Configuring the 802.1x Re-authentication.......................................................................2-18
2.4.13 (Optional) Configuring the Guest VLAN for 802.1x Authentication................................................2-18
2.4.16 Checking the Configuration...............................................................................................................2-20
2.5 Configuring MAC Address Authentication..................................................................................................2-21
2.5.1 Establishing the Configuration Task....................................................................................................2-22
2.5.2 Enabling Global MAC Address Authentication...................................................................................2-22
2.5.3 Enabling MAC Address Authentication on an Interface......................................................................2-23
2.5.4 (Optional) Enabling Direct Authentication..........................................................................................2-24
2.5.5 Configuring the User Name for MAC Address Authentication...........................................................2-25
2.5.6 (Optional) Configuring the Domain for MAC Address Authentication..............................................2-26
2.5.7 (Optional) Setting the Timers of MAC Address Authentication.........................................................2-27
.......................................................................................................................................................................2-28
2.5.10 (Optional) Re-Authenticating a User with the Specific MAC Address.............................................2-29
2.5.11 Checking the Configuration...............................................................................................................2-30
2.6 Maintaining NAC..........................................................................................................................................2-30
2.6.1 Clearing the Statistics About 802.1x Authentication...........................................................................2-31
2.6.2 Clearing Statistics About MAC Address Authentication.....................................................................2-31
Issue 06 (2010-01-08)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
Contents
iii

Advertisement

Table of Contents
loading

Table of Contents