HP 3600 v2 Series Security Configuration Manual page 179

Hide thumbs Also See for 3600 v2 Series:
Table of Contents

Advertisement

NOTE:
For re-DHCP portal authentication, configure a public address pool (20.20.20.0/24, in this example)
and a private address pool (10.0.0.0/24, in this example) on the DHCP server. (Details not shown)
For re-DHCP portal authentication, the switch must be configured as a DHCP relay agent and the
portal-enabled interface must be configured with a primary IP address (a public IP address) and a
secondary IP address (a private IP address). For information about DHCP relay agent configuration, see
Layer 3—IP Services Configuration Guide
Make sure that the IP address of the portal device added on the portal server is the public IP address of
the interface connecting users (20.20.20.1 in this example), the private IP address range for the IP
address group associated with the portal device is the private network segment where the users reside
(10.0.0.0/24 in this example), and the public IP address range for the IP address group is the public
network segment 20.20.20.0/24.
Configure IP addresses for the switch and servers as shown in
switch, and servers can reach each other.
Configure the RADIUS server properly to provide authentication and accounting functions for users.
Configure the switch:
Configure a RADIUS scheme
1.
# Create a RADIUS scheme named rs1 and enter its view.
<Switch> system-view
[Switch] radius scheme rs1
# Set the server type for the RADIUS scheme. When using the iMC server, set the server type to extended.
[Switch-radius-rs1] server-type extended
# Specify the primary authentication server and primary accounting server, and configure the keys for
communication with the servers.
[Switch-radius-rs1] primary authentication 192.168.0.113
[Switch-radius-rs1] primary accounting 192.168.0.113
[Switch-radius-rs1] key accounting radius
[Switch-radius-rs1] key authentication radius
[Switch-radius-rs1] user-name-format without-domain
# Configure the IP address of the security policy server.
[Switch-radius-rs1] security-policy-server 192.168.0.114
[Switch-radius-rs1] quit
Configure an authentication domain
2.
# Create an ISP domain named dm1 and enter its view.
[Switch] domain dm1
# Configure AAA methods for the ISP domain.
[Switch-isp-dm1] authentication portal radius-scheme rs1
[Switch-isp-dm1] authorization portal radius-scheme rs1
[Switch-isp-dm1] accounting portal radius-scheme rs1
[Switch-isp-dm1] quit
# Configure domain dm1 as the default ISP domain for all users. Then, if a user enters the username
without the ISP domain at logon, the authentication and accounting methods of the default domain are
used for the user.
[Switch] domain default enable dm1
.
Figure 70
168
and make sure that the host,

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

A3100-48 v2

Table of Contents