Configuring Cross-Subnet Portal Authentication With Extended Functions - HP 10500 Series Configuration Manual

Security configuration guide
Hide thumbs Also See for 10500 Series:
Table of Contents

Advertisement

Name: newpt
IP address: 192.168.0.1 1 1
Key: portal, in plain text
Port number: 50100
URL: http://192.168.0.1 1 1:8080/portal.
[Switch] portal server newpt ip 192.168.0.111 key simple portal port 50100 url
http://192.168.0.111:8080/portal
# Configure the switch as a DHCP relay agent, and enable the IP address check function.
[Switch] dhcp enable
[Switch] dhcp relay server-group 0 ip 192.168.0.112
[Switch] interface vlan-interface 100
[Switch–Vlan-interface100] ip address 20.20.20.1 255.255.255.0
[Switch–Vlan-interface100] ip address 10.0.0.1 255.255.255.0 sub
[Switch-Vlan-interface100] dhcp select relay
[Switch-Vlan-interface100] dhcp relay server-select 0
[Switch-Vlan-interface100] dhcp relay address-check enable
# Enable re-DHCP portal authentication on the interface connecting the host.
[Switch–Vlan-interface100] portal server newpt method redhcp
[Switch–Vlan-interface100] quit
Configuring cross-subnet portal authentication with extended
functions
Network requirements
As shown in
Switch A is configured for cross-subnet extended portal authentication. If a user fails security check
after passing identity authentication, the user can access only subnet 192.168.0.0/24. After
passing security check, the user can access Internet resources.
The host accesses Switch A through Switch B.
A RADIUS server serves as the authentication/accounting server.
Figure 65 Network diagram
Figure
65:
155

Advertisement

Table of Contents
loading

Table of Contents