Radius-Based Mac Authentication Configuration Example - HP A5830 Series Configuration Manual

Security switch
Hide thumbs Also See for A5830 Series:
Table of Contents

Advertisement

RADIUS-based MAC authentication configuration example

Network requirements
As shown in
uses RADIUS servers for authentication, authorization, and accounting.
Perform MAC authentication on port GigabitEthernet 1/0/1 to control Internet access. Make sure that:
The device detects whether a user has gone offline every 180 seconds. If a user fails
authentication, the device does not authenticate the user within 180 seconds.
All MAC authentication users belong to ISP domain 2000 and share the user account aaa with
password 123456.
Figure 38 RADIUS-based MAC authentication
Host
Configuration procedure
NOTE:
Make sure that the RADIUS server and the access device can reach each other. Create a shared
account for MAC authentication users on the RADIUS server, and set the username aaa and password
123456 for the account.
Configure RADIUS-based MAC authentication on the device.
1.
# Configure a RADIUS scheme.
<Device> system-view
[Device] radius scheme 2000
[Device-radius-2000] primary authentication 10.1.1.1 1812
[Device-radius-2000] primary accounting 10.1.1.2 1813
[Device-radius-2000] key authentication abc
[Device-radius-2000] key accounting abc
[Device-radius-2000] user-name-format without-domain
[Device-radius-2000] quit
# Apply the RADIUS scheme to ISP domain 2000 for authentication, authorization, and accounting.
[Device] domain 2000
[Device-isp-2000] authentication default radius-scheme 2000
[Device-isp-2000] authorization default radius-scheme 2000
[Device-isp-2000] accounting default radius-scheme 2000
[Device-isp-2000] quit
Figure
38, a host connects to port GigabitEthernet 1/0/1 on the access device. The device
RADIUS servers
Auth:10.1.1.1
Acct:10.1.1.2
GE1/0/1
Device
IP network
103

Advertisement

Table of Contents
loading

Table of Contents