No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

NE20E-S2 V800R010C10SPC500 Configuration Guide - Security 01

This is NE20E-S2 V800R010C10SPC500 Configuration Guide - Security
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring 802.1X Port-based Authentication

Configuring 802.1X Port-based Authentication

Before configuring 802.1X access services, familiarize yourself with the usage scenario, complete the pre-configuration tasks, and obtain the data required for the configuration. This helps you complete the configuration task quickly and accurately.This feature is supported only on the Admin-VS.

Usage Scenario

A traditional network does not take internal devices into consideration as potential attack sources, and existing network devices are not immune to attacks from internal devices. On a mobile bearer network, NodeBs of different carriers may share an equipment room. If the NE20E that serves as an aggregation device cannot distinguish between authorized and unauthorized NodeBs, the network is at risk. Therefore, the NE20E must be configured with security functions to control NodeB access to the network.

802.1X authentication can be configured on the interfaces of the NE20E to authenticate and control access devices. This authentication implements port-based network access control.

Pre-configuration Tasks

IEEE 802.1X provides only a user identity authentication mechanism. Therefore, RADIUS authentication is required to complete user identity authentication. Before configuring 802.1X authentication, complete the following tasks:

  • Configure an authentication scheme (RADIUS authentication).
  • Configure a RADIUS server group.
  • Configure user names and passwords on the RADIUS server.

Configuration Procedures

Configure 802.1X access services in accordance with the following flowchart.

Figure 17-1 Flowchart for configuring 802.1X access services
Translation
Download
Updated: 2019-01-02

Document ID: EDOC1100055397

Views: 20381

Downloads: 39

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Share
Previous Next