AAA
This node is only available in the NAC unified mode.
Authentication Profile
Procedure
- Create an authentication profile.
- Modify an authentication profile.
- Choose Authentication Profile tab. and click the
- Click the name of the authentication profile you want to modify on the Authentication Profile List page to open the authentication profile configuration page.
- Set parameters for modifying the authentication profile. Table 5-85 describes the parameters for modifying an authentication profile.
- Click Apply. In the dialog box that is displayed, click OK.
- Delete an authentication profile.
- Display the profile reference relationship.
- Configure a profile referenced in the authentication profile.
The following profiles can be referenced in the authentication profile: 802.1X profile, Portal profile, MAC access profile, authentication-free rule profile, and domain profile.
- Choose Authentication Profile tab. and click the
- Click
on the left of Authentication Profile List. The system displays the authentication profile names. Click
on the left of an authentication profile name. The profiles referenced by this profile are displayed in the navigation area.
- Click any profile referenced by the authentication profile. The configuration page of the referenced profile is displayed on the right. You can select another profile from the drop-down list or click Create to create a profile, and set the profile parameters. For descriptions of the profile parameters, see its configuration page.
- Click Apply. In the dialog box that is displayed, click OK.
Authentication/Authorization/Accounting Scheme
Procedure
- Configure an authentication scheme.
- Create an authentication scheme.
- Choose Authentication/Authorization/Accounting Scheme tab, as shown in Figure 5-160. and click the
- Click Create in Authentication Scheme List to open the Create Authentication Scheme page, as shown in Figure 5-161.
Table 5-86 describes the parameters on the page.Table 5-86 Parameters on the Create Authentication Scheme page
Item
Description
Authentication scheme name
Specifies the name of an authentication scheme.
First authentication
The value can be RADIUS, HWTACACS, Local, or Non-authentication.
Second authentication
The value can be a mode except the first authentication mode. When the authentication server of the first authentication mode does not respond, the second authentication mode is triggered.
When the first authentication mode is no authentication, the second authentication mode cannot be configured.
Third authentication
The value can be a mode except the first and second authentication modes. When the authentication servers of the first and second authentication modes do not respond, the third authentication mode is triggered.
When the second authentication mode is no authentication or not configured, the third authentication mode cannot be configured.
Fourth authentication
The value can be no authentication or not configured. When the authentication servers of the first, second, and third authentication modes do not respond, the fourth authentication mode is triggered.
When the third authentication mode is no authentication or not configured, the fourth authentication mode cannot be configured.
After authentication is switched to local Specifies whether to configure the device to send accounting packets after an accounting server is configured but local authentication is triggered because the authentication server does not respond. Typically, a server functions as both the remote accounting server and the authentication server. If the authentication server does not respond, the accounting server also does not respond. When accounting and authentication + local authentication are configured on a device, a user is authenticated using the local authentication mode after the server does not respond to the user's authentication request. Because the accounting server also does not respond, after the user is authenticated using the local authentication mode, the device still sends accounting packets. As a result, the user goes offline because of accounting-start failures. To prevent this issue, the device does not send accounting packets by default when a user is authenticated using the local authentication mode after the server does not respond to the user's authentication request.
This configuration item is supported only when local authentication mode is available.
If non-authentication is configured, a user passes the authentication using any user name or password. Therefore, to protect the device or network security, you are advised to enable authentication, allowing only the authenticated users to access the device or network.
- Set parameters for the authentication scheme.
- Click OK.
- Modify the authentication scheme.
- Choose Authentication/Authorization/Accounting Scheme tab. and click the
- Click the authentication scheme that you want to modify in Authentication Scheme List.
- Set parameters for the authentication scheme. Table 5-86 describes the parameters on the page.
- Click OK.
- Create an authentication scheme.
- Configure an authorization scheme.
- Create an authorization scheme.
- Choose Authentication/Authorization/Accounting Scheme tab. and click the
- Click Create in Authorization Scheme List to open the Create Authorization Scheme page, as shown in Figure 5-162.
Table 5-87 describes the parameters on the page.Table 5-87 Parameters on the Create Authorization Scheme page
Item
Description
Authorization scheme name
Specifies the name of an authorization scheme.
First authorization
The value can be HWTACACS, If-authenticated, Local, or Non-authorization.
Second authorization
The value can be a mode except the first authorization mode. When the authorization server of the first authorization mode does not respond, the second authorization mode is triggered.
When the first authorization mode is no authorization, the second authorization mode cannot be configured.
Third authorization
The value can be a mode except the first and second authorization modes. When the authorization servers of the first and second authorization modes do not respond, the third authorization mode is triggered.
When the second authorization mode is no authorization or not configured, the third authorization mode cannot be configured.
Fourth authorization
The value can be no authorization or not configured. When the authorization servers of the first, second, and third authorization modes do not respond, the fourth authorization mode is triggered.
When the third authorization mode is no authorization or not configured, the fourth authorization mode cannot be configured.
- Set parameters for the authorization scheme.
- Click OK.
- Modify the authorization scheme.
- Choose Authentication/Authorization/Accounting Scheme tab. and click the
- Click the authorization scheme that you want to modify in Authorization Scheme List.
- Modify parameters for the authorization scheme. Table 5-87 describes the parameters on the page.
- Click OK.
- Create an authorization scheme.
- Configure the accounting scheme.
- Create an accounting scheme.
- Choose Authentication/Authorization/Accounting Scheme tab. and click the
- Click Create in Accounting Scheme List to open the Create Accounting Scheme page, as shown in Figure 5-163.
Table 5-88 describes the parameters on the page.
- Set parameters for the accounting scheme.
- Click OK.
- Modify the accounting scheme.
- Choose Authentication/Authorization/Accounting Scheme tab. and click the
- Click the accounting scheme that you want to modify in Accounting Scheme List.
- Modify parameters for the accounting scheme. Table 5-88 describes the parameters on the page.
- Click OK.
- Create an accounting scheme.
Service Scheme
Context
Access users must obtain authorization information before they can go online. Authorization information about users can be managed by configuring a service scheme.
Procedure
- Create a service scheme profile.
- Modify a service scheme profile.
- Choose Service Scheme tab. and click the
- Click the service scheme profile that you want to modify. The settings of the service scheme profile are displayed.
- Set parameters for the service scheme profile. Table 5-89 describes the parameters for modifying a service scheme profile.
- Click OK.
- Delete a service scheme profile.
External Portal
Procedure
- Perform global settings for the external Portal server.
- Create a Portal authentication server.
- Modify a Portal authentication server.
- Choose External Portal tab. and click the
- Click the name of the authentication server that you want to modify. The authentication server modification page is displayed.
- Modify parameters for authentication server. Table 5-91 describes the parameters for modifying an authentication server.
- Click OK.
- Delete an authentication server.
- Choose External Portal tab. and click the
- Select the authentication server name and click Delete. The system asks you whether to delete the record.
- Click OK.
RADIUS
Context
RADIU protects a network from unauthorized access. It is typically used on networks that require high security and control remote user access.
Procedure
- Configure a RADIUS server profile.
- Create a RADIUS server profile.
- Choose RADIUS tab, as shown in Figure 5-168. and click the
- Click Create in RADIUS Server
Profile to open the Create RADIUS Server Profile page, as shown in Figure 5-169.
Table 5-92 describes the parameters on the page.Table 5-92 Parameters for creating a RADIUS server profile
Parameter
Description
Profile name
Name of a RADIUS server profile.
STA HT Mode - Active/Standby mode: When multiple RADIUS authentication or accounting servers are configured, the server with the highest weight becomes the active server, and the other servers are backup servers. Among the backup servers, the servers with a higher weight have a higher priority.
- Load balancing mode: When multiple RADIUS authentication or accounting servers are configured, user authentication or accounting requests are sent to the servers based on the weight proportion of each server.
NAS IP address NAS-IP-Address attribute of RADIUS packets sent by the device. Profile default shared key
RADIUS shared key.
NAS Identifier mode Encapsulation format of the NAS-Identifier attribute. - Device Host Name: Sets the encapsulation format of NAS-Identifier to a user's host name.
- User VLAN ID: Sets the encapsulation format of NAS-Identifier to a user's VLAN ID.
- AP MAC: Sets the encapsulation format of NAS-Identifier to the AP's MAC address.
User name format in packets
User name format in packets sent from the device to the RADIUS server.
- Original user name: The device does not modify the user name entered by the user in the packets sent to the RADIUS server.
- With domain name: The device encapsulates the domain name in the user name when sending RADIUS packets to the RADIUS server.
- Without domain name: The device does not encapsulate the domain name in the user name when sending RADIUS packets to the RADIUS server.
MAC address format in Calling-Station-Id
Encapsulation format of the MAC address in the Calling-Station-ID attribute of RADIUS packets. Called-Station-ID format Content encapsulated in the Called-Station-ID attribute of RADIUS packets. Separator Separator before the SSID encapsulated in the Called-Station-ID attribute. This parameter is supported only when Containing the SSID is selected.
MAC address format in Called-Station-Id Encapsulation format of the MAC address in the Called-Station-ID attribute of RADIUS packets. This parameter is supported only when Called-Station-ID format is set to AP MAC or AC MAC.
- On the Create RADIUS Server Profile page,
click Create Server. The Create Server
Configuration page is displayed, as
shown in Figure 5-170.
Table 5-93 describes the parameters on the page.Table 5-93 Parameters for creating a server
Parameter
Description
IP address
IP address of a RADIUS server.
Shared key Shared key of the RADIUS server.
Server Settings
The following parameters are valid only when Authentication is selected.
Port number
Port number of the authentication server.
Weight
Weight of the authentication server.
Source address of outgoing packets
Source IP address of the RADIUS authentication server.
Server Settings
The following parameters are valid only when Accounting is selected.
Port number
Port number of the accounting server.
Weight
Weight of the accounting server.
Source address of outgoing packets
Source IP address of the accounting server.
- Set parameters for the RADIUS server.
- Click OK.
- Modify a RADIUS server profile.
- Choose RADIUS tab. and click the
- Select a RADIUS server profile in RADIUS Server Profile to open the RADIUS server profile modification page.
- Modify the parameters of the RADIUS server profile. Table 5-92 describes the parameters for modifying a spectrum profile.
- Click OK.
- Create a RADIUS server profile.
- Configure an authorization server.
- Create an authorization server.
- Choose RADIUS tab. and click the
- Click Create in Authorization
Server to open the Create Authorization Server page, as shown in Figure 5-171.
Table 5-94 describes the parameters on the page.
- Set parameters for authorization server.
- Click OK.
- Modify an authorization server.
- Choose RADIUS tab. and click the
- Select the authentication server in Authorization Server.
- Modify parameters for authorization server. Table 5-94 describes the parameters for modifying an authorization server.
- Click OK.
- Create an authorization server.
HWTACACS
Context
HWTACACS prevents unauthorized users from attacking a network and supports command-line authorization. Compared with RADIUS, HWTACACS is more reliable in transmission and encryption, and is more suitable for security control.
Procedure
- Enable or disable HWTACACS.
- Configure an HWTACACS server profile.
- Create an HWTACACS server profile.
- Choose HWTACACS tab. and click the
- Click Create in HWTACACS Server Profile to open the Create HWTACACS server profile page, as shown in Figure 5-173.
Table 5-95 describes the parameters on the page.Table 5-95 Parameters for creating an HWTACACS server profile
Parameter
Description
Profile name
Name of an HWTACACS server profile.
Key
Shared key for the HWTACACS server.
User name
User name format in packets sent from the device to the HWTACACS server.- Original user name: The device does not modify the user name entered by the user in the packets sent to the HWTACACS server.
- With domain name: The device encapsulates the domain name in the user name when sending RADIUS packets to the HWTACACS server.
- Without domain name: The device does not encapsulate the domain name in the user name when sending RADIUS packets to the HWTACACS server.
Source address of outgoing packets
Source IP address used by a device to communicate with an HWTACACS server.
- Set parameters for the HWTACACS server.
- Click OK.
- Modify an HWTACACS server profile.
- Choose HWTACACS tab. and click the
- Select an HWTACACS server profile in HWTACACS Server Profile to open the HWTACACS server profile modification page.
- Modify parameters for the HWTACACS server. Table 5-95 describes the parameters for modifying an HWTACACS server profile.
- Click OK.
- Create an HWTACACS server profile.
- Configure an Authentication/Authorization/Accounting server.
- Create an Authentication/Accounting server.
- Choose HWTACACS tab. and click the
- Click Create in Authentication/Authorization/Accounting Server to open the Create Authentication/Authorization/Accounting Server page, as shown in Figure 5-174.
Table 5-96 describes the parameters on the page.Table 5-96 Parameters for creating an Authentication/Authorization/Accounting server
Parameter
Description
Profile name
Name of an HWTACACS server profile.
Server type
Server type, which can be an authentication, authorization, or accounting server.
Primary Server Configuration
Primary server IPv4 address
IPv4 address of the primary server.
Primary server IPv4 port number
IPv4 port number of the primary server.
IPV4 VPN instance name
IPV4 VPN instance of the primary server.
Click
, create and select a VPN instance.
Primary server IPv6 address
IPv6 address of the primary server.
Primary server IPv6 port number
IPv6 port number of the primary server.
IPV6 VPN instance name
IPV6 VPN instance of the primary server.
Click
, create and select a VPN instance.
Secondary Server Configuration
Secondary server IPv4 address
IPv4 address of the secondary server.
Secondary server IPv4 port number
IPv4 port number of the secondary server.
IPV4 VPN instance name
IPV4 VPN instance of the secondary server.
Click
, create and select a VPN instance.
Secondary server IPv6 address
IPv6 address of the secondary server.
Secondary server IPv6 port number
IPv6 port number of the secondary server.
IPV6 VPN instance name
IPV6 VPN instance of the secondary server.
Click
, create and select a VPN instance.
Third Server Configuration
Third server IPv4 address
IPv4 address of the third server.
Third server IPv4 port number
IPv4 port number of the third server.
IPV4 VPN instance name
IPV4 VPN instance of the third server.
Click
, create and select a VPN instance.
Third server IPv6 address
IPv6 address of the third server.
Third server IPv6 port number
IPv6 port number of the third server.
IPV6 VPN instance name
IPV6 VPN instance of the third server.
Click
, create and select a VPN instance.
Fourth Server Configuration
Fourth server IPv4 address
IPv4 address of the fourth server.
Fourth server IPv4 port number
IPv4 port number of the fourth server.
IPV4 VPN instance name
IPV4 VPN instance of the fourth server.
Click
, create and select a VPN instance.
Fourth server IPv6 address
IPv6 address of the fourth server.
Fourth server IPv6 port number
IPv6 port number of the fourth server.
IPV6 VPN instance name
IPV6 VPN instance of the fourth server.
Click
, create and select a VPN instance.
- Set parameters for the Authentication/Authorization/Accounting server.
- Click OK.
- Modify an Authentication/Authorization/Accounting server.
- Choose HWTACACS tab. and click the
- Click the profile to modify in Authentication/Authorization/Accounting Server. The page for modifying an Authentication/Authorization/Accounting server is displayed.
- Modify parameters of the Authentication/Authorization/Accounting server. For description of the parameters, see Table 5-96.
- Click OK.
- Create an Authentication/Accounting server.
Local User
Procedure
- Create a local user.
- Modify a local user.
- Choose Local User tab. and click the
- Click the name of the user that you want to modify.
- Set parameters for modifying the user. Indicates whether a user is forcibly disconnected from the network. Table 5-97 describes the parameters for modifying a local user.
- Click OK.
- Delete a local user.
Advanced Settings
Procedure
- Configure 802.1X authentication globally.
- Configure Portal authentication globally.
- Configure MAC address authentication globally.
- Enable the CNA bypass function for iOS terminals.
- Choose Advanced Settings tab, as shown in Figure 5-177. and click the
- Set Enable the CNA bypass function for iOS terminals in Others to ON.
- Click Apply.
- In the dialog box that is displayed, click OK.
Free Mobility
Procedure
- Choose Free Mobility tab. and click the
- Set Free mobility status to ON to open the Free Mobility page, as shown in Figure 5-178.
Table 5-101 describes the parameters on the page.Table 5-101 Parameters for enabling Free Mobility
Item
Description
Free mobility status
Enables Free mobility:- ON
- OFF
Controller server IP
Configures an IP address for the primary controller.
Backup controller server IP
Configures an IP address for the backup controller.
Connection password
Configures the password used by the device to set up a connection with the controller.
The value is a string of 8 to 32 characters.
Confirm connection password
Confirms the password used by the device to set up a connection with the controller.
Source IP address
Specifies the source IP address for the communication between switch and controller.
- Configure the parameters.
- Click Apply.
- In the dialog box that is displayed, click OK.