Typical NAC Configuration (Unified Mode) (the Agile Controller-Campus as the Authentication Server) (V200R009C00 and Later Versions)
- Configuring Portal Authentication for Access Users on Huawei Agile Controller-Campus (Authentication Point on Core Switch)
- Configuring Portal Authentication for Access Users on Huawei Agile Controller-Campus (Authentication Point on Aggregation Switch)
- Configuring 802.1X and MAC Address Authentication for Access Users on Huawei Agile Controller-Campus
- Delivering VLANs or ACLs to Successfully Authenticated Users on Huawei Agile Controller-Campus
- Identifying Types of Terminals Accessing the Network on Huawei Agile Controller-Campus
Configuring Portal Authentication for Access Users on Huawei Agile Controller-Campus (Authentication Point on Core Switch)
Introduction to Portal authentication
Portal authentication is also called web authentication, when a user accesses the network, the user must be first authenticated on the Portal website. If the authentication fails, the user can access only certain network resources. After the authentication succeeds, the user can access other network resources. Portal authentication has the following advantages:
- Ease of use: In most cases, Portal authentication does not require the client to have additional software installed and allows the client to be directly authenticated on a web page.
- Convenient operations: Portal authentication achieves service expansion on the Portal page, including advertisement push, responsibility announcement, and enterprise publicity.
- Mature technology: Portal authentication has been widely used in networks of carriers, fast food chains, hotels, and schools.
- Flexible deployment: Portal authentication implements access control at the access layer or at the ingress of key data.
- Flexible user management: Portal authentication can be performed on users based on the combination of user names and any one of VLANs, IP addresses, and MAC addresses.
Enterprises often choose Portal authentication for guests because they move frequently.
Networking Requirements
- The authentication operations should be simple. The authentication system only performs access authorization. Minimum client software is installed on user terminals.
- To facilitate network reconstruction and reduce investments, the enterprise requires the authentication point be deployed on the core switch.
- A unified identity authentication mechanism is used to authenticate all terminals accessing the campus network and deny access from unauthorized terminals.
- R&D employees can connect only to public servers (such as the web and DNS servers) of the enterprise before the authentication, and can connect to both the intranet (code library and issue tracking system) and Internet after being authenticated.
- Marketing employees can connect only to public servers (such as the web and DNS servers) of the enterprise before the authentication, and can connect only to the Internet after being authenticated.
Configuration Logic
Item |
Description |
---|---|
Creating a department and an account |
- |
Adding switches |
Set parameters for switches connected to the Agile Controller-Campus. |
(Optional) adding an authentication rule |
Configure the conditions for users to pass the authentication. If no authentication rule is created, the default authentication rule (that allows all users to pass the authentication) of the Agile Controller-Campus is used. |
Adding an authorization result |
Create network access right profiles so that users granted with different profiles have different network access rights. |
Adding an authorization rule |
Select network access right profiles and users in an authorization rule so that specified network access rights are granted to specific users. |
Configuration Notes
- This configuration example applies to all switches running V200R009C00 or a later version.
- Huawei's Agile Controller-Campus in V100R001 functions as the Portal server and RADIUS server in this example. For the Agile Controller-Campus, the version required is V100R001, V100R002, V100R003.
- The RADIUS authentication and accounting shared keys and Portal shared key on the switch must be the same as those on the Agile Controller-Campus server.
- By default, the switch allows the packets from RADIUS and Portal servers to pass. You do not need to configure authentication-free rules for the two servers on the switch.
Data Plan
VLAN ID |
Function |
---|---|
101 |
VLAN for R&D employees |
102 |
VLAN for marketing employees |
103 |
VLAN for connection between the aggregation switch and core switch |
104 |
VLAN to which interfaces connecting to the servers belong |
Item |
Data |
Description |
|
---|---|---|---|
Access switch (connecting to the R&D department) |
Interface number: GE0/0/1 VLAN: 101 |
Connects to employees' PCs. |
|
Interface number: GE0/0/2 VLAN: 101 |
Connects to the aggregation switch. |
||
Access switch (connecting to the marketing department) |
Interface number: GE0/0/1 VLAN: 102 |
Connects to employees' PCs. |
|
Interface number: GE0/0/2 VLAN: 102 |
Connects to the aggregation switch. |
||
Aggregation switch |
Interface number: GE1/0/1 VLAN: 101 VLANIF101 IP address: 192.168.0.1 |
Connects to the access switch of the R&D department. Functions as the gateway for R&D employees. |
|
Interface number: GE1/0/2 VLAN: 102 VLANIF102 IP address: 192.168.1.1 |
Connects to the access switch of the marketing department. Functions as the gateway for marketing employees. |
||
Interface number: GE1/0/3 VLAN: 103 VLANIF103 IP address: 172.16.2.1 |
Connects to the core switch. |
||
Core switch |
Interface number: GE1/0/1 VLAN: 103 VLANIF103 IP address: 172.16.2.2 |
Connects to the aggregation switch. |
|
Interface number: GE1/0/2 VLAN: 104 VLANIF104 IP address: 172.16.1.254 |
Connects to the server area and functions as the gateway for the servers. |
||
Server |
Agile Controller-Campus (RADIUS server + Portal server) |
IP address: 172.16.1.1 |
- |
DNS server |
IP address: 172.16.1.2 |
- |
|
Web server |
IP address: 172.16.1.3 |
- |
|
Code library |
IP address: 172.16.1.4 |
- |
|
Issue tracking system |
IP address: 172.16.1.5 |
- |
Item |
Data |
Description |
---|---|---|
Core switch |
Number of the ACL for R&D employees' post-authentication domain: 3001 |
You need to enter this ACL number when configuring authorization rules and results on the Agile Controller-Campus. |
Number of the ACL for marketing employees' post-authentication domain: 3002 |
You need to enter this ACL number when configuring authorization rules and results on the Agile Controller-Campus. |
|
Authentication server:
|
|
|
Accounting server:
|
||
Portal server:
|
||
Agile Controller-Campus |
Host name: access.example.com |
Users can use the domain name to access the Portal server. |
Device IP address: 172.16.1.254 |
- |
|
Authentication port: 1812 |
- |
|
Accounting port: 1813 |
- |
|
RADIUS shared key: YsHsjx_202206 |
The RADIUS shared key must be the same as that configured on the switch. |
|
Port number that the Portal server uses to receive packets: 50200 |
- |
|
Portal shared key: YsHsjx_202206 |
It must be the same as the Portal authentication shared key configured on the switch. |
|
Department: R&D
Department: Marketing
|
Two departments and two corresponding accounts have been created on the Agile Controller-Campus: R&D department and an R&D employee account A-123; Marketing department and a marketing employee account B-123. |
|
Pre-authentication domain |
Agile Controller-Campus (including RADIUS server and Portal server), DNS server, and web server |
- |
Post-authentication domain |
|
- |
Procedure
- Configure the access switch to ensure network connectivity.
The following provides the configuration for SwitchA, the access switch connecting to the R&D department. The configuration for SwitchB, the access switch connecting to the marketing department, is similar to that for SwitchA.
<HUAWEI> system-view [HUAWEI] sysname SwitchA [SwitchA] vlan 101 [SwitchA-vlan101] quit [SwitchA] interface gigabitethernet 0/0/1 //Interface connected to the R&D department [SwitchA-GigabitEthernet0/0/1] port link-type access [SwitchA-GigabitEthernet0/0/1] port default vlan 101 [SwitchA-GigabitEthernet0/0/1] quit [SwitchA] interface gigabitethernet 0/0/2 //Interface connected to the aggregation switch [SwitchA-GigabitEthernet0/0/2] port link-type trunk [SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 101 [SwitchA-GigabitEthernet0/0/2] quit
- Configure the core switch.
- Configure the Agile Controller-Campus.
- Verify the configuration.
- Employees can access only the Agile Controller-Campus, DNS, and web servers before authentication.
- The Portal authentication page is pushed to an employee when the employee attempts to visit an Internet website. After the employee enters the correct account and password, the requested web page is displayed.
- R&D employee A can access the Internet, code library, and issue tracking system after authentication. Marketing employee B can access the Internet but not the code library and issue tracking system after authentication.
- After an employee is authenticated, run the display access-user command on the switch. The command output shows that the employee is online.
Configuration Files
# sysname SwitchA # vlan batch 101 # interface GigabitEthernet0/0/1 port link-type access port default vlan 101 # interface GigabitEthernet0/0/2 port link-type trunk port trunk allow-pass vlan 101 # return
# sysname SwitchC # vlan batch 101 to 103 # dhcp enable # interface Vlanif101 ip address 192.168.0.1 255.255.255.0 dhcp select interface dhcp server dns-list 172.16.1.2 # interface Vlanif102 ip address 192.168.1.1 255.255.255.0 dhcp select interface dhcp server dns-list 172.16.1.2 # interface Vlanif103 ip address 172.16.2.1 255.255.255.0 # interface GigabitEthernet1/0/1 port link-type trunk port trunk allow-pass vlan 101 # interface GigabitEthernet1/0/2 port link-type trunk port trunk allow-pass vlan 102 # interface GigabitEthernet1/0/3 port link-type trunk port trunk allow-pass vlan 103 # ip route-static 172.16.1.0 255.255.255.0 172.16.2.2 # return
# Configuration file of the core switch
# sysname SwitchD # vlan batch 103 to 104 # authentication-profile name p1 portal-access-profile web1 # domain portal # radius-server template policy radius-server shared-key cipher %#%#1*yT+0O\X;V}hP,G^TMN7mTXA^mIz)SoR:86;lNK%#%# radius-server authentication 172.16.1.1 1812 weight 80 radius-server accounting 172.16.1.1 1813 weight 80 # acl number 3001 rule 1 permit ip acl number 3002 rule 1 deny ip destination 172.16.1.4 0 rule 2 deny ip destination 172.16.1.5 0 rule 3 permit ip # free-rule-template name default_free_rule free-rule 1 destination ip 172.16.1.2 mask 255.255.255.255 free-rule 2 destination ip 172.16.1.3 mask 255.255.255.255 # web-auth-server portal_huawei server-ip 172.16.1.1 port 50200 shared-key cipher %#%#q9a^<=Ct5'=0n40/1g}/m6Mo,U9u5!s(GYM}Z{<~%#%# url http://access.***.com:8080/portal source-ip 172.16.1.254 # portal-access-profile name web1 web-auth-server portal_huawei layer3 # aaa authentication-scheme auth authentication-mode radius accounting-scheme acco accounting-mode radius accounting realtime 15 domain portal authentication-scheme auth accounting-scheme acco radius-server policy # interface Vlanif103 ip address 172.16.2.2 255.255.255.0 authentication-profile p1 # interface Vlanif104 ip address 172.16.1.254 255.255.255.0 # interface GigabitEthernet1/0/1 port link-type trunk port trunk allow-pass vlan 103 # interface GigabitEthernet1/0/2 port link-type access port default vlan 104 # ip route-static 192.168.0.0 255.255.255.0 172.16.2.1 ip route-static 192.168.1.0 255.255.255.0 172.16.2.1 # portal quiet-period portal timer quiet-period 240 portal quiet-times 5 # return
Configuring Portal Authentication for Access Users on Huawei Agile Controller-Campus (Authentication Point on Aggregation Switch)
Introduction to Portal authentication
Portal authentication is also called web authentication, when a user accesses the network, the user must be first authenticated on the Portal website. If the authentication fails, the user can access only certain network resources. After the authentication succeeds, the user can access other network resources. Portal authentication has the following advantages:
- Ease of use: In most cases, Portal authentication does not require the client to have additional software installed and allows the client to be directly authenticated on a web page.
- Convenient operations: Portal authentication achieves service expansion on the Portal page, including advertisement push, responsibility announcement, and enterprise publicity.
- Mature technology: Portal authentication has been widely used in networks of carriers, fast food chains, hotels, and schools.
- Flexible deployment: Portal authentication implements access control at the access layer or at the ingress of key data.
- Flexible user management: Portal authentication can be performed on users based on the combination of user names and any one of VLANs, IP addresses, and MAC addresses.
Enterprises often choose Portal authentication for guests because they move frequently.
Networking Requirements
- The authentication operations should be simple. The authentication system only performs access authorization. Minimum client software is installed on user terminals.
- Moderate security control is required. To facilitate maintenance, a moderate number of authentication points need to be deployed on the aggregation switch.
- A unified identity authentication mechanism is used to authenticate all terminals accessing the campus network and deny access from unauthorized terminals.
- R&D employees can connect only to public servers (such as the web and DNS servers) of the enterprise before the authentication, and can connect to both the intranet (code library and issue tracking system) and Internet after being authenticated.
- Marketing employees can connect only to public servers (such as the web and DNS servers) of the enterprise before the authentication, and can connect only to the Internet after being authenticated.
Configuration Logic
Item |
Description |
---|---|
Creating a department and an account |
- |
Adding switches |
Set parameters for switches connected to the Agile Controller-Campus. |
(Optional) adding an authentication rule |
Configure the conditions for users to pass the authentication. If no authentication rule is created, the default authentication rule (that allows all users to pass the authentication) of the Agile Controller-Campus is used. |
Adding an authorization result |
Create network access right profiles so that users granted with different profiles have different network access rights. |
Adding an authorization rule |
Select network access right profiles and users in an authorization rule so that specified network access rights are granted to specific users. |
Configuration Notes
- This configuration example applies to all switches running V200R009C00 or a later version.
- Huawei's Agile Controller-Campus in V100R001 functions as the Portal server and RADIUS server in this example. For the Agile Controller-Campus, the version required is V100R001, V100R002, V100R003.
- The RADIUS authentication and accounting shared keys and Portal shared key on the switch must be the same as those on the Agile Controller-Campus server.
- By default, the switch allows the packets from RADIUS and Portal servers to pass. You do not need to configure authentication-free rules for the two servers on the switch.
- When you run the access-user arp-detect command to configure the IP address and MAC address of the user gateway as the source IP address and source MAC address of user offline detection packets, ensure that the MAC address of the gateway remains unchanged, especially in active/standby switchover scenarios. If the gateway MAC address is changed, ARP entries of terminals will be incorrect on the device, and the terminals cannot communicate with the device.
Data Plan
VLAN ID |
Function |
---|---|
101 |
VLAN for R&D employees |
102 |
VLAN for marketing employees |
103 |
VLAN to which interfaces connecting to the servers belong |
Item |
Data |
Description |
|
---|---|---|---|
Access switch (connecting to the R&D department) |
Interface number: GE0/0/1 VLAN: 101 |
Connects to employees' PCs. |
|
Interface number: GE0/0/2 VLAN: 101 |
Connects to the aggregation switch. |
||
Access switch (connecting to the marketing department) |
Interface number: GE0/0/1 VLAN: 102 |
Connects to employees' PCs. |
|
Interface number: GE0/0/2 VLAN: 102 |
Connects to the aggregation switch. |
||
Aggregation switch |
Interface number: GE1/0/1 VLAN: 101 VLANIF101 IP address: 192.168.0.1 |
Connects to the access switch of the R&D department. Functions as the gateway for R&D employees. |
|
Interface number: GE1/0/2 VLAN: 102 VLANIF102 IP address: 192.168.1.1 |
Connects to the access switch of the marketing department. Functions as the gateway for marketing employees. |
||
Interface number: GE1/0/3 VLAN: 103 VLANIF103 IP address: 172.16.1.254 |
Connects to the enterprise server area. Functions as the gateway for servers. |
||
Server |
Agile Controller-Campus (RADIUS server + Portal server) |
IP address: 172.16.1.1 |
- |
DNS server |
IP address: 172.16.1.2 |
- |
|
Web server |
IP address: 172.16.1.3 |
- |
|
Code library |
IP address: 172.16.1.4 |
- |
|
Issue tracking system |
IP address: 172.16.1.5 |
- |
Item |
Data |
Description |
---|---|---|
Aggregation switch |
Number of the ACL for R&D employees' post-authentication domain: 3001 |
You need to enter this ACL number when configuring authorization rules and results on the Agile Controller-Campus. |
Number of the ACL for marketing employees' post-authentication domain: 3002 |
You need to enter this ACL number when configuring authorization rules and results on the Agile Controller-Campus. |
|
Authentication server:
|
|
|
Accounting server:
|
||
Portal server:
|
||
Agile Controller-Campus |
Host name: access.example.com |
Users can use the domain name to access the Portal server. |
Device IP address: 172.16.1.254 |
- |
|
Authentication port: 1812 |
- |
|
Accounting port: 1813 |
- |
|
RADIUS shared key: YsHsjx_202206 |
The RADIUS shared key must be the same as that configured on the switch. |
|
Port number that the Portal server uses to receive packets: 50200 |
- |
|
Portal shared key: YsHsjx_202206 |
It must be the same as the Portal authentication shared key configured on the switch. |
|
Department: R&D
Department: Marketing
|
Two departments and two corresponding accounts have been created on the Agile Controller-Campus: R&D department and an R&D employee account A-123; Marketing department and a marketing employee account B-123. |
|
Pre-authentication domain |
Agile Controller-Campus (including RADIUS server and Portal server), DNS server, and web server |
- |
Post-authentication domain |
|
- |
Procedure
- Configure the access switch to ensure network connectivity.
The following provides the configuration for SwitchA, the access switch connecting to the R&D department. The configuration for SwitchB, the access switch connecting to the marketing department, is similar.
<HUAWEI> system-view [HUAWEI] sysname SwitchA [SwitchA] vlan 101 [SwitchA-vlan101] quit [SwitchA] interface gigabitethernet 0/0/1 //Interface connected to the R&D department [SwitchA-GigabitEthernet0/0/1] port link-type access [SwitchA-GigabitEthernet0/0/1] port default vlan 101 [SwitchA-GigabitEthernet0/0/1] quit [SwitchA] interface gigabitethernet 0/0/2 //Interface connected to the aggregation switch [SwitchA-GigabitEthernet0/0/2] port link-type trunk [SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 101 [SwitchA-GigabitEthernet0/0/2] quit
- Configure the aggregation switch.
- Configure the Agile Controller-Campus.
- Verify the configuration.
- Employees can access only the Agile Controller-Campus, DNS, and web servers before authentication.
- The Portal authentication page is pushed to an employee when the employee attempts to visit an Internet website. After the employee enters the correct account and password, the requested web page is displayed.
- R&D employee A can access the Internet, code library, and issue tracking system after authentication. Marketing employee B can access the Internet but not the code library and issue tracking system after authentication.
- After an employee is authenticated, run the display access-user command on the switch. The command output shows that the employee is online.
Configuration Files
# sysname SwitchA # vlan batch 101 # interface GigabitEthernet0/0/1 port link-type access port default vlan 101 # interface GigabitEthernet0/0/2 port link-type trunk port trunk allow-pass vlan 101 # return
# sysname SwitchB # vlan batch 102 # interface GigabitEthernet0/0/1 port link-type access port default vlan 102 # interface GigabitEthernet0/0/2 port link-type trunk port trunk allow-pass vlan 102 # return
# Configuration file of the aggregation switch
# sysname SwitchC # vlan batch 101 to 103 # authentication-profile name p1 portal-access-profile web1 # domain portal # access-user arp-detect vlan 101 ip-address 192.168.0.1 mac-address 00e0-fc12-3456 access-user arp-detect vlan 102 ip-address 192.168.1.1 mac-address 00e0-fc12-3456 # dhcp enable # radius-server template policy radius-server shared-key cipher %#%#lJIB8CQ<:A;x$h2V5+;+C>HwC+@XAL)ldpQI}:$X%#%# radius-server authentication 172.16.1.1 1812 source ip-address 172.16.1.254 weight 80 radius-server accounting 172.16.1.1 1813 source ip-address 172.16.1.254 weight 80 # acl number 3001 rule 1 permit ip acl number 3002 rule 1 deny ip destination 172.16.1.4 0 rule 2 deny ip destination 172.16.1.5 0 rule 3 permit ip # free-rule-template name default_free_rule free-rule 1 destination ip 172.16.1.2 mask 255.255.255.255 free-rule 2 destination ip 172.16.1.3 mask 255.255.255.255 # web-auth-server portal_huawei server-ip 172.16.1.1 port 50200 shared-key cipher %#%#q9a^<=Ct5'=0n40/1g}/m6Mo,U9u5!s(GYM}Z{<~%#%# url http://access.***.com:8080/portal source-ip 172.16.1.254 # portal-access-profile name web1 web-auth-server portal_huawei direct # aaa authentication-scheme auth authentication-mode radius accounting-scheme acco accounting-mode radius accounting realtime 15 domain portal authentication-scheme auth accounting-scheme acco radius-server policy # interface Vlanif101 ip address 192.168.0.1 255.255.255.0 authentication-profile p1 dhcp select interface dhcp server dns-list 172.16.1.2 # interface Vlanif102 ip address 192.168.1.1 255.255.255.0 authentication-profile p1 dhcp select interface dhcp server dns-list 172.16.1.2 # interface Vlanif103 ip address 172.16.1.254 255.255.255.0 # interface GigabitEthernet1/0/1 port link-type trunk port trunk allow-pass vlan 101 # interface GigabitEthernet1/0/2 port link-type trunk port trunk allow-pass vlan 102 # interface GigabitEthernet1/0/3 port link-type access port default vlan 103 # portal quiet-period portal timer quiet-period 240 portal quiet-times 5 # return
Configuring 802.1X and MAC Address Authentication for Access Users on Huawei Agile Controller-Campus
Overview
On a NAC network, the 802.1X, MAC address, and Portal authentication modes are configured on the user access interfaces of a device to meet various authentication requirements. Users can access the network using any authentication mode.
If multiple authentication modes are enabled, the authentication modes take effect in the sequence they are configured. In addition, after multiple authentication modes are deployed, users can be authenticated in different modes by default and assigned different network rights accordingly by the device.
Networking Requirements
Enterprises have high requirements on network security. To prevent unauthorized access and protect information security, an enterprise requests users to pass identity authentication and security check before they access the enterprise network. Only authorized users are allowed to access the enterprise network.
In addition, dumb terminals, such as IP phones and printers, can access the enterprise network only after passing authentication.
The enterprise network has the following characteristics:
The access switches on the network do not support 802.1X authentication.
The enterprise network has a small size and does not have branch networks.
The enterprise has no more than 1000 employees. A maximum of 2000 users, including guests, access the network every day.
Dumb terminals, such as IP phones and printers, are connected to the enterprise network.
To reduce network reconstruction investment, you are advised to configure the 802.1X authentication function on the aggregation switch and connect a single centralized authentication server to the aggregation switch in bypass mode. MAC address authentication needs to be configured for dumb terminals.
Configuration Logic
Item |
Description |
---|---|
Creating a department and an account |
- |
Adding switches |
Set parameters for switches connected to the Agile Controller-Campus. |
Adding an authentication rule |
Configure the conditions for users to pass the authentication. |
Adding an authorization result |
Create network access right profiles so that users granted with different profiles have different network access rights. |
Adding an authorization rule |
Select network access right profiles and users in an authorization rule so that specified network access rights are granted to specific users. |
Configuration Notes
This configuration example applies to all switches running V200R009C00 or a later version, Huawei Agile Controller-Campus in V100R001 functions as the RADIUS server. For the Agile Controller-Campus, the version required is V100R001, V100R002, V100R003.
The RADIUS authentication and accounting shared keys and Portal shared key on the switch must be the same as those on the Agile Controller-Campus server.
By default, the switch allows the packets from RADIUS server to pass. You do not need to configure authentication-free rules for the server on the switch.
When you run the access-user arp-detect command to configure the IP address and MAC address of the user gateway as the source IP address and source MAC address of user offline detection packets, ensure that the MAC address of the gateway remains unchanged, especially in active/standby switchover scenarios. If the gateway MAC address is changed, ARP entries of terminals will be incorrect on the device, and the terminals cannot communicate with the device.
Data Plan
Item |
Data |
---|---|
Agile Controller-Campus |
IP address: 192.168.100.100 |
Post-authentication domain server |
IP address: 192.168.102.100 |
Aggregation switch (SwitchA) |
|
Access switch (SwitchC) |
User VLAN ID: 200 |
Access switch (SwitchD) |
User VLAN ID: 200 |
Item |
Data |
---|---|
RADIUS scheme |
|
ACL number of the post-authentication domain |
3002 |
Item |
Data |
---|---|
Department |
R&D department |
Access user |
User name: A Wired access account: A-123 Password: YsHsjx_202207 |
Device group |
Wired device group: Switch |
Switch IP address |
SwitchA: 192.168.10.10 |
RADIUS authentication key |
YsHsjx_202206 |
Charging Key |
YsHsjx_202206 |
Procedure
- Configure the access switches.
- Configure the aggregation switch.
- Configure the Agile Controller-Campus.
- Verify the configuration.
- An employee can only access the Agile Controller-Campus server before passing the authentication.
- After passing the authentication, the employee can access resources in the post-authentication domain.
- After the employee passes the authentication, run the display access-user command on the switch. The command output shows information about the online employee.
Configuration Files
SwitchA configuration file
# sysname SwitchA # vlan batch 100 200 # authentication-profile name p1 dot1x-access-profile d1 mac-access-profile m1 # domain isp # access-user arp-detect vlan 200 ip-address 192.168.200.1 mac-address 00e0-fc12-3456 # radius-server template rd1 radius-server shared-key cipher %#%#FP@&C(&{$F2HTlPxg^NLS~KqA/\^3Fex;T@Q9A](%#%# radius-server authentication 192.168.100.100 1812 weight 80 radius-server accounting 192.168.100.100 1813 weight 80 # dot1x-access-profile name d1 # mac-access-profile name m1 mac-authen username fixed A-123 password cipher %#%#'Fxw8E,G-81(A3U<^HH9Sj\:&hTdd>R>HILQYLtW%#%# # acl number 3002 rule 1 permit ip destination 192.168.102.100 0 rule 2 deny ip # aaa authentication-scheme abc authentication-mode radius accounting-scheme acco1 accounting-mode radius accounting realtime 15 domain isp authentication-scheme abc accounting-scheme acco1 radius-server rd1 # interface Vlanif100 ip address 192.168.10.10 255.255.255.0 # interface Vlanif200 ip address 192.168.200.1 255.255.255.0 # interface GigabitEthernet0/0/1 port link-type trunk port trunk allow-pass vlan 200 authentication-profile p1 # interface GigabitEthernet0/0/2 port link-type trunk port trunk allow-pass vlan 200 authentication-profile p1 # interface GigabitEthernet0/0/6 port link-type trunk port trunk allow-pass vlan 100 # ip route-static 192.168.100.0 255.255.255.0 192.168.10.10 ip route-static 192.168.102.0 255.255.255.0 192.168.10.10 # return
SwitchC configuration file
# sysname SwitchC # vlan batch 200 # l2protocol-tunnel user-defined-protocol 802.1x protocol-mac 0180-c200-0003 group-mac 0100-0000-0002 # interface GigabitEthernet0/0/1 port link-type access port default vlan 200 l2protocol-tunnel user-defined-protocol 802.1x enable # interface GigabitEthernet0/0/2 port link-type access port default vlan 200 l2protocol-tunnel user-defined-protocol 802.1x enable # interface GigabitEthernet0/0/3 port link-type trunk port trunk allow-pass vlan 200 l2protocol-tunnel user-defined-protocol 802.1x enable # return
Delivering VLANs or ACLs to Successfully Authenticated Users on Huawei Agile Controller-Campus
Overview
- ACL-based authorization is classified into:
ACL description-based authorization: If ACL description-based authorization is configured on the server, authorization information includes the ACL description. The device matches ACL rules based on the ACL description authorized by the server to control user rights. The ACL number, corresponding description, and ACL rule must be configured on the device.
The standard RADIUS attribute (011) Filter-Id is used.
Dynamic ACL-based authorization: The server authorizes rules in an ACL to the device. Users can access network resources controlled using this ACL. The ACL and ACL rules must be configured on the server. The ACL does not need to be configured on the device.
The Huawei proprietary RADIUS attribute (26-82) HW-Data-Filter is used.
Dynamic VLAN: If dynamic VLAN delivery is configured on the server, authorization information includes the delivered VLAN attribute. After the device receives the delivered VLAN attribute, it changes the VLAN of the user to the delivered VLAN.
The delivered VLAN does not change or affect the interface configuration. The delivered VLAN, however, takes precedence over the VLAN configured on the interface. That is, the delivered VLAN takes effect after the authentication succeeds, and the configured VLAN takes effect after the user goes offline.
The following standard RADIUS attributes are used for dynamic VLAN delivery:- (064) Tunnel-Type (It must be set to VLAN or 13.)
- (065) Tunnel-Medium-Type (It must be set to 802 or 6.)
- (081) Tunnel-Private-Group-ID (For devices running versions earlier than V200R012C00, it can be the VLAN ID or VLAN description. For devices running V200R012C00 and later versions, it can be the VLAN ID, VLAN description, VLAN name, or VLAN pool.)
To ensure that the RADIUS server delivers VLAN information correctly, all the three RADIUS attributes must be used. In addition, the Tunnel-Type and Tunnel-Medium-Type attributes must be set to the specified values.
The following uses ACL number and dynamic VLAN delivery as an example. The configuration differences between ACL number delivery and dynamic ACL delivery are described in notes.
Networking Requirements
- Before passing authentication, terminals can access the public server (with IP address 192.168.40.1), and download the 802.1X client or update the antivirus database.
- After passing authentication, terminals can access the service server (with IP address 192.168.50.1) and devices in the laboratory (with VLAN ID 20 and IP address segment 192.168.20.10-192.168.20.100).
Configuration Logic
Item |
Description |
---|---|
Creating a department and an account |
- |
Adding switches |
Set parameters for switches connected to the Agile Controller-Campus. |
(Optional) adding an authentication rule |
Configure the conditions for users to pass the authentication. If no authentication rule is created, the default authentication rule (that allows all users to pass the authentication) of the Agile Controller-Campus is used. |
Adding an authorization result |
Create network access right profiles so that users granted with different profiles have different network access rights. |
Adding an authorization rule |
Select network access right profiles and users in an authorization rule so that specified network access rights are granted to specific users. |
Configuration Notes
This configuration example applies to all switches running V200R009C00 or a later version, Huawei Agile Controller-Campus in V100R001 functions as the RADIUS server. For the Agile Controller-Campus, the version required is V100R001, V100R002, V100R003.
When the device supports UCL groups, using UCL groups to configure authorization rules is recommended. For details, see section "AAA Configuration" > "Configuring Authorization Rules" in the Configuration Guide - User Access and Authentication.
When you run the access-user arp-detect command to configure the IP address and MAC address of the user gateway as the source IP address and source MAC address of user offline detection packets, ensure that the MAC address of the gateway remains unchanged, especially in active/standby switchover scenarios. If the gateway MAC address is changed, ARP entries of terminals will be incorrect on the device, and the terminals cannot communicate with the device.
Data Plan
Item |
Data |
---|---|
RADIUS scheme |
|
Resources accessible to users before authentication |
Access rights to the public server are configured using an authentication-free rule. The name of the authentication-free rule profile is default_free_rule. |
Resources accessible to users after authentication |
Access rights to the laboratory are granted using a dynamic VLAN. The VLAN ID is 20. Access rights to the service server are granted using an ACL number. The ACL number is 3002. |
Item |
Data |
---|---|
Department |
R&D department |
Access user |
User name: A Wired access account: A-123 Password: YsHsjx_202207 |
Switch IP address |
SwitchA: 10.10.10.1 |
RADIUS authentication key |
YsHsjx_202206 |
RADIUS accounting key |
YsHsjx_202206 |
Procedure
- Configure access switch SwitchA.
- Configure the Agile Controller-Campus.
- Verify the configuration.
- An employee can only access the Agile Controller-Campus server and public server before passing authentication.
- An employee can access the Agile Controller-Campus server, public server, service server, and laboratory after passing authentication.
- After the employee passes authentication, run the display access-user command on the switch. The command output shows information about the online employee.
Configuration File
# sysname SwitchA # vlan batch 10 20 # authentication-profile name p1 dot1x-access-profile d1 free-rule-template default_free_rule access-domain huawei force # access-user arp-detect vlan 10 ip-address 192.168.1.10 mac-address 00e0-fc12-3456 # radius-server template rd1 radius-server shared-key cipher %^%#FP@&C(&{$F2HTlPxg^NLS~KqA/\^3Fex;T@Q9A](%^%# radius-server authentication 192.168.30.1 1812 weight 80 radius-server accounting 192.168.30.1 1813 weight 80 # acl number 3002 rule 1 permit ip destination 192.168.30.1 0 rule 2 permit ip destination 192.168.50.1 0 rule 3 deny ip # free-rule-template name default_free_rule free-rule 10 destination ip 192.168.40.0 mask 255.255.255.0 # aaa authentication-scheme abc authentication-mode radius accounting-scheme acco1 accounting-mode radius accounting realtime 15 domain huawei authentication-scheme abc accounting-scheme acco1 radius-server rd1 # interface Vlanif10 ip address 192.168.1.10 255.255.255.0 # interface GigabitEthernet0/0/1 port link-type hybrid port hybrid pvid vlan 10 port hybrid untagged vlan 10 authentication-profile p1 # interface GigabitEthernet0/0/2 port link-type hybrid port hybrid untagged vlan 20 # interface GigabitEthernet0/0/3 port link-type trunk port trunk allow-pass vlan 10 20 # interface LoopBack1 ip address 10.10.10.1 255.255.255.0 # dot1x-access-profile name d1 # return
Identifying Types of Terminals Accessing the Network on Huawei Agile Controller-Campus
Context
As an increasing number of smart terminals are used, Bring Your Own Device (BYOD), a new working style for enterprises, has become a trend. When an enterprise uses the BYOD solution, the administrator must determine the users and terminals that can connect to the enterprise network, where users can connect to the enterprise network, and access rights of different terminals. All these require terminal type identification.
Two terminal type identification methods are available:
Local identification
A switch identifies terminal types by analyzing MAC addresses, DHCP option information, and user agent (UA) information of terminals and then controls terminal access and grants access rights to terminals accordingly. The switch can also send identified terminal type information to a server, which then controls terminal access and grants access rights to terminals accordingly.
Remote identification
A switch obtains MAC addresses, DHCP option information, and UA information of terminals and sends the information to a server, which then controls terminal access and grants access rights to terminals accordingly.
Networking Requirements
In Figure 3-213, to meet service requirements, an enterprise needs to deploy an identity authentication system to implement access control on users who attempt to access the enterprise network. Only authorized users can access the enterprise network.
- The authentication operations should be simple. The authentication system only performs access authorization and does not require any client software on user terminals.
- To facilitate future network reconstruction and save investment, the authentication control point must be deployed on a core switch.
- A unified identity authentication mechanism is used to authenticate all terminals accessing the campus network and deny accesses from unauthorized terminals. This mechanism identifies the terminals, records information about devices accessing the network, and automatically groups the devices by the device type to facilitate tracing of accidental information disclosure.
- R&D employees can only access public servers (such as the public web and DNS servers) of the company before authentication, and can access both the intranet (code base and issue tracking system) and Internet after passing authentication.
- Marketing employees can only access public servers (such as the public web and DNS servers) of the company before authentication, and can only access the Internet after passing authentication.
Configuration Logic
- Perform Portal authentication configuration. For details, see Configuring Portal Authentication for Access Users on Huawei Agile Controller-Campus (Authentication Point on Core Switch).
- Configure the terminal type awareness function so that the switch can identify terminal types based on the packets sent by terminals.
- Enable the UA function so that the switch can obtain UA information from the packets sent by terminals.
Configuration Notes
The authentication control point in this example must be deployed on the S5720-HI, S5730-HI, S5731-H, S5731S-H, S5731-S, S5731S-S, S6720-HI, S5732-H, S6730-H, S6730S-H, S6730-S, or S6730S-S fixed switch or X series card of modular switch running V200R009C00 or a later version.
Huawei Agile Controller-Campus in V100R001 functions as the Portal server and RADIUS server in this example. For the Agile Controller-Campus, the version required is V100R001, V100R002, V100R003.
The RADIUS authentication and accounting shared keys and Portal shared key on the switch must be the same as those on the Agile Controller-Campus server.
By default, the switch allows the packets from RADIUS and Portal servers to pass. You do not need to configure authentication-free rules for the two servers on the switch.
Data Plan
This example provides only the configuration of terminal type identification. For details about VLAN planning, network data planning, and service data planning, see Configuring Portal Authentication for Access Users on Huawei Agile Controller-Campus (Authentication Point on Core Switch).
In this example, the administrator user name and password are admin and Admin_123, and the user name and password of Portal users are Jason and Admin_1234.
Procedure
- Configure the core switch.
# Configure the core switch to send DHCP option and UA information to the Agile Controller-Campus, which then uses the information as original information to identify terminals.
<HUAWEI> system-view [HUAWEI] sysname SwitchD [SwitchD] dhcp enable [SwitchD] dhcp snooping enable [SwitchD] device-sensor dhcp option 12 55 60 [SwitchD] http parse user-agent enable
For wireless users, you can configure attributes for APs when the switch works as an AC. In versions earlier than V200R011C10, the configurations are not delivered to APs in real time, and are delivered to APs only after you run the commit command in the WLAN view. In V200R011C10 and later versions, the commit command is deleted, the switch delivers the configurations to APs every 5 seconds.
- Configure the Agile Controller-Campus.
- Check the configuration.
Check terminal type identification results.
- Choose .
Check whether the terminal is in the device list.
If the terminal is in the device list, its terminal type has been identified.
- Configuring Portal Authentication for Access Users on Huawei Agile Controller-Campus (Authentication Point on Core Switch)
- Configuring Portal Authentication for Access Users on Huawei Agile Controller-Campus (Authentication Point on Aggregation Switch)
- Configuring 802.1X and MAC Address Authentication for Access Users on Huawei Agile Controller-Campus
- Delivering VLANs or ACLs to Successfully Authenticated Users on Huawei Agile Controller-Campus
- Identifying Types of Terminals Accessing the Network on Huawei Agile Controller-Campus