H3C S5500-SI Series Operation Manual page 660

Hide thumbs Also See for S5500-SI Series:
Table of Contents

Advertisement

Configuration procedure
You need to configure IP addresses for the devices as shown in
are available between devices.
Perform configurations on the RADIUS server to ensure that the user authentication and
accounting functions can work normally.
Configure Switch A:
1)
Configure a RADIUS scheme
# Create a RADIUS scheme named rs1 and enter its view.
<SwitchA> system-view
[SwitchA] radius scheme rs1
# Set the server type for the RADIUS scheme. When using the iMC server, you need set the server type
to extended.
[SwitchA-radius-rs1] server-type extended
# Specify the primary authentication server and primary accounting server, and configure the keys for
communication with the servers.
[SwitchA-radius-rs1] primary authentication 192.168.0.112
[SwitchA-radius-rs1] primary accounting 192.168.0.112
[SwitchA-radius-rs1] key accounting radius
[SwitchA-radius-rs1] key authentication radius
[SwitchA-radius-rs1] user-name-format without-domain
# Configure the IP address of the security policy server.
[SwitchA-radius-rs1] security-policy-server 192.168.0.113
[SwitchA-radius-rs1] quit
2)
Configure an authentication domain
# Create an ISP domain named dm1 and enter its view.
[SwitchA] domain dm1
# Configure the ISP domain to use RADIUS scheme rs1.
[SwitchA-isp-dm1] authentication portal radius-scheme rs1
[SwitchA-isp-dm1] authorization portal radius-scheme rs1
[SwitchA-isp-dm1] accounting portal radius-scheme rs1
[SwitchA-isp-dm1] quit
# Configure dm1 as the default ISP domain for all users. Then, if a user enters the username without the
ISP domain at login, the authentication and accounting methods of the default domain will be used for
the user.
[SwitchA] domain default enable dm1
3)
Configure the ACL (ACL 3000 ) for restricted resources and the ACL (ACL 3001) for unrestricted
resources
Figure 1-14
1-25
and ensure that routes

Advertisement

Chapters

Table of Contents
loading

Table of Contents