Aaa For 802.1X Users By A Radius Server - HP 3600 v2 Series Security Configuration Manual

Hide thumbs Also See for 3600 v2 Series:
Table of Contents

Advertisement

AAA for 802.1X users by a RADIUS server

Network requirements
As shown in
Use the RADIUS server for authentication, authorization, and accounting of 802.1X users.
Use MAC-based access control on Ethernet 1/0/1 to authenticate all 802.1X users on the port
separately.
Include the domain name in a username sent to the RADIUS server.
On the RADIUS server, add a service that charges 120 dollars for up to 120 hours per month and assigns
authenticated users to VLAN 4, configure a user with the name dot1x@bbb, and register the service for
the user.
Set the shared keys for secure RADIUS communication to expert. Set the ports for
authentication/authorization and accounting to 1812 and 1813 respectively.
Figure 26 Network diagram
Configuration procedure
NOTE:
Configure the interfaces and VLANs as shown in
address manually or automatically and can access resources in the authorized VLAN after passing
authentication.
Configure the RADIUS server (iMC PLAT 5.0)
1.
NOTE:
This example assumes that the RADIUS server runs iMC PLAT 5.0 (E0101), iMC UAM 5.0 (E0101), and
iMC CAMS 5.0 (E0101).
# Add an access device.
Log in to the iMC management platform, click the Service tab, and select User Access Manager > Access
Device from the navigation tree to enter the Access Device List page. Then, click Add to enter the Add
Access Device page and perform the following configurations:
Set the shared key for secure authentication and accounting communication to expert
Specify the ports for authentication and accounting as 1812 and 1813 respectively
Figure
26, configure the switch to:
Figure
26. Make sure that the host can get a new IP
64

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

A3100-48 v2

Table of Contents