HP 5500 HI Series Configuration Manual page 189

Security
Hide thumbs Also See for 5500 HI Series:
Table of Contents

Advertisement

# Specify the primary authentication server and primary accounting server, and configure the keys
for communication with the servers.
[Switch-radius-rs1] primary authentication 192.168.0.112
[Switch-radius-rs1] primary accounting 192.168.0.112
[Switch-radius-rs1] key authentication simple radius
[Switch-radius-rs1] key accounting simple radius
# Configure the access device to not carry the ISP domain name in the username sent to the
RADIUS server.
[Switch-radius-rs1] user-name-format without-domain
[Switch-radius-rs1] quit
2.
Configure an authentication domain:
# Create ISP domain dm1 and enter its view.
[Switch] domain dm1
# Configure AAA methods for the ISP domain.
[Switch-isp-dm1] authentication portal radius-scheme rs1
[Switch-isp-dm1] authorization portal radius-scheme rs1
[Switch-isp-dm1] accounting portal radius-scheme rs1
[Switch-isp-dm1] quit
# Configure domain dm1 as the default ISP domain for all users. Then, if a user enters a username
without the ISP domain at logon, the authentication and accounting methods of the default domain
are used for the user.
[Switch] domain default enable dm1
3.
Configure portal authentication:
# Configure a portal server on the switch, making sure that the IP address, port number and URL
match those of the actual portal server.
[Switch] portal server newpt ip 192.168.0.111 key simple portal port 50100 url
http://192.168.0.111:8080/portal
# Enable portal authentication on the interface connecting the host.
[Switch] interface vlan-interface 100
[Switch–Vlan-interface100] portal server newpt method direct
[Switch–Vlan-interface100] quit
4.
Configure the portal server detection function:
# Configure the access device to detect portal server newpt, specifying the detection method as
portal heartbeat probe, setting the server probe interval to 40 seconds, and specifying the access
device to send a server unreachable trap message and disable portal authentication to permit
unauthenticated portal users if two consecutive probes fail.
[Switch] portal server newpt server-detect method portal-heartbeat action trap
permit-all interval 40 retry 2
The product of interval and retry must be greater than or equal to the portal server heartbeat
interval, and HP recommends configuring the interval as a value greater than the portal server
heartbeat interval configured on the portal server.
5.
Configure portal user synchronization:
# Configure the access device to synchronize portal user information with portal server newpt,
setting the synchronization probe interval to 600 seconds, and specifying the access device to log
off users if the users do not appear in the user synchronization packets sent from the server in two
consecutive probe intervals.
176

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents