Userloginwithoui Configuration Example - HPE FlexNetwork 10500 Series Security Configuration Manual

Hide thumbs Also See for FlexNetwork 10500 Series:
Table of Contents

Advertisement

# After the port is re-enabled, delete several secure MAC addresses.
[Device] undo port-security mac-address security sticky 0002-0000-0015 vlan 1
[Device] undo port-security mac-address security sticky 0002-0000-0014 vlan 1
...
# Verify that the port security mode of the port changes to autoLearn, and the port can learn MAC
addresses again. (Details not shown.)

userLoginWithOUI configuration example

Network requirements
As shown in
authenticates the client with a RADIUS server in ISP domain sun. If the authentication succeeds, the
client is authorized to access the Internet.
The RADIUS server at 192.168.1.2 acts as the primary authentication server and the secondary
accounting server. The RADIUS server at 192.168.1.3 acts as the secondary authentication
server and the primary accounting server. The shared key for authentication is name, and the
shared key for accounting is money.
All users use the authentication, authorization, and accounting methods of ISP domain sun.
The RADIUS server response timeout time is 5 seconds. The maximum number of RADIUS
packet retransmission attempts is 5. The device sends real-time accounting packets to the
RADIUS server at 15-minute intervals, and sends usernames without domain names to the
RADIUS server.
Configure GigabitEthernet 1/0/1 to allow only one 802.1X user and a user that uses one of the
specified OUI values to be authenticated.
Figure 78 Network diagram
Host
Configuration procedure
The following configuration steps cover some AAA/RADIUS configuration commands. For more
information about the commands, see Security Command Reference.
Make sure the host and the RADIUS server can reach each other.
1.
Configure AAA:
# Configure a RADIUS scheme named radsun.
<Device> system-view
[Device] radius scheme radsun
[Device-radius-radsun] primary authentication 192.168.1.2
[Device-radius-radsun] primary accounting 192.168.1.3
[Device-radius-radsun] secondary authentication 192.168.1.3
[Device-radius-radsun] secondary accounting 192.168.1.2
[Device-radius-radsun] key authentication simple name
Figure
78, a client is connected to the device through GigabitEthernet 1/0/1. The device
Authentication servers
(192.168.1.2/24
192.168.1.3/24)
GE1/0/1
Device
Internet
257

Advertisement

Table of Contents
loading

Table of Contents