No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


NE20E-S2 V800R010C10SPC500 Configuration Guide - Security 01

This is NE20E-S2 V800R010C10SPC500 Configuration Guide - Security
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Example for Configuring 802.1X Port-based Authentication

Example for Configuring 802.1X Port-based Authentication

Networking Requirements

On the network as shown in Figure 17-3, the NE20E connects to a NodeB through a switch to aggregate and transmit service packets from the NodeB. Most NodeBs are placed in unattended equipment rooms (NodeBs of different carriers may be placed in the same equipment room). Therefore, security measures must be taken to control access to the mobile bearer network. NodeBs are required to send 802.1X packets to verify their validity when accessing the network. Only authenticated NodeBs are allowed to access the network. In addition, MAC-based access control is required.

Figure 17-3 Networking for 802.1X port-based authentication

Configuration Roadmap

The configuration roadmap is as follows:

  • Configure an 802.1X template.
  • Configure a RADIUS authentication scheme.
  • Configure a forcible authentication domain.
  • Enable 802.1X authentication on a specified interface, and set the maximum number of access users on the interface to 1.

Data Preparation

To configure 802.1X authentication, you need the following data:

  • Name of the 802.1X authentication-enabled interface
  • Name of the 802.1X template
  • Forcible authentication domain
  • Type of the authentication service


  1. Configure an 802.1X template so that the default 802.1X template 1 is not used.

    <HUAWEI> system-view
    [~HUAWEI] dot1x-template 10
    [*HUAWEI-dot1x-template-10] quit

  2. Configure a RADIUS authentication scheme.

    # Configure a RADIUS server group named shiva.

    [~HUAWEI]  radius-server group shiva

    # Configure the IP address and port number for a RADIUS server.

    [*HUAWEI-radius-shiva] radius-server authentication 1812
    [*HUAWEI-radius-shiva] quit

    # Configure authentication scheme 1, with the RADIUS authentication mode.

    [~HUAWEI-aaa] authentication-scheme 1
    [*HUAWEI-aaa-authen-1] authentication-mode radius
    [*HUAWEI-aaa-authen-1] quit

    # Configure accounting scheme 1, with the none accounting mode.

    [~HUAWEI-aaa] accounting-scheme 1
    [*HUAWEI-aaa-accounting-1] accounting-mode none
    [*HUAWEI-aaa-accounting-1] quit

  3. Configure a forcible authentication domain named huawei.

    [~HUAWEI-aaa] domain huawei
    [*HUAWEI-aaa-domain-huawei] authentication-scheme 1
    [*HUAWEI-aaa-domain-huawei] accounting-scheme 1
    [*HUAWEI-aaa-domain-huawei] radius-server group shiva
    [*HUAWEI-aaa-domain-huawei] dot1x-template 10
    [*HUAWEI-aaa-domain-huawei] quit
    [~HUAWEI-aaa] quit

  4. Enable 802.1X authentication on GE 0/1/1.

    [~HUAWEI] interface GigabitEthernet 0/1/1
    [*HUAWEI-GigabitEthernet1/0/1] dot1x enable
    [*HUAWEI-GigabitEthernet1/0/1] dot1x max-user 1
    [*HUAWEI-GigabitEthernet1/0/1] dot1x force-domain huawei
    [*HUAWEI-GigabitEthernet1/0/1] dot1x port-method mac
    [*HUAWEI-GigabitEthernet1/0/1] dot1x port-control auto
    [*HUAWEI-GigabitEthernet1/0/1] quit

  5. Verify the configuration.

    [~HUAWEI] display dot1x interface GigabitEthernet 0/1/1
         Dot1x authentication: enable
         Port control method: mac
         Port control type: auto
         Max user num: 1
         Port current status: authorized
         Port current access user num: 1

Configuration Files

NE20E configuration file

 dot1x-template 10
radius-server group shiva
 radius-server authentication 1812 weight 0
 authentication-scheme 1
 accounting-scheme 1
  accounting-mode none
 domain huawei
  authentication-scheme 1
  accounting-scheme 1
  radius-server group shiva 
  dot1x-template 10
interface GigabitEthernet1/0/1
 undo shutdown
 dot1x enable
 dot1x force-domain huawei
 dot1x max-user 1
Updated: 2019-01-02

Document ID: EDOC1100055397

Views: 19692

Downloads: 39

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next