No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

CLI-based Configuration Guide - Security

AR100, AR120, AR150, AR160, AR200, AR1200, AR2200, AR3200, and AR3600 V200R010

This document provides the basic concepts, configuration procedures, and configuration examples in different application scenarios of the network management feature supported by the device.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Application Scenarios for AAA

Application Scenarios for AAA

Deploying AAA for Internet Access Users

Figure 1-25  AAA deployment for Internet access users

As shown in Figure 1-25, an enterprise network connects to the Router through the LAN switch. Users on the enterprise network need to connect to the Internet. To ensure network security, the administrator controls the Internet access rights of the users.

The administrator configures AAA on the Router to allow the Router to communicate with the AAA server. The AAA server then can manage users centrally. After a user enters the user name and password on the client, the Router forwards the authentication information including user name and password to the AAA server, and the AAA server authenticates the user. After being successfully authenticated, the user can access the Internet. The AAA server also records the network resource usage of the user.

To improve reliability, two AAA servers can be deployed in active/standby mode. If the active server fails, the standby server takes over the AAA services, ensuring uninterrupted services.

Deploying AAA for Management Users

As shown in Figure 1-26, the management user (Administrator) connects to the Router to manage, configure, and maintain the Router.

After the management user logs in to the Router with AAA configured, the Router sends the user name and password of the user to the AAA server. The AAA server then authenticates the user and records the user operations.

Figure 1-26  AAA deployment for management users

Deploying AAA for VPN Users

AAA is also applicable to VPN users, for example, PPP dial-up users in an L2TP VPN.

As shown in Figure 1-27, the headquarters (HQ) and a branch of an enterprise are located in two cities, and the branch uses an Ethernet network. Users in the branch need to access the HQ through VPDN connections. L2TP is deployed between the branch and the HQ. The branch gateway functions as a PPPoE server to allow PPP dial-up data to be transmitted over the Ethernet. The branch gateway also functions as an L2TP access concentrator (LAC) to establish L2TP tunnels with the HQ gateway that serves as the L2TP network server (LNS).

To manage access users, the LNS must have AAA authentication configured to communicate with the AAA server. The LNS sends authentication information received from dial-up users to the AAA server, and the AAA server centrally processes the information.

Figure 1-27  AAA deployment for VPN users

Deploying HACA to Authorize Users

HACA is applicable only to MAC address-prioritized portal authentication. In Figure 1-28, the router acts as a FAT AP and allows users to access the network through Wi-Fi. The Agile Controller server deployed on the cloud acts as an external portal server and HACA server to perform authentication and accounting. The router sets up a persistent connection and registers with the HACA server using HTTP/2. During portal authentication, the router and HACA server exchange packets through HTTP/2.

Figure 1-28  Deploying HACA to Authorize Users

Translation
Download
Updated: 2019-08-07

Document ID: EDOC1100034077

Views: 134594

Downloads: 242

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next