H3c-technologies H3C SecPath F1000-E Manual de usuario Pagina 30

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 182
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 29
29
portal authentication, the host uses an assigned private IP address. After passing the authentication,
the host can get a public IP address.
When users using the host have passed identity authentication but have not passed security check,
they can access only subnet 192.168.0.0/24. After passing security check, they can access Internet
resources.
A RADIUS server serves as the authentication/accounting server.
Figure 13 Configure re-DHCP portal authentication with extended functions
Host
automatically obtains
an IP address
192.168.0.111/24
192.168.0.114/24
192.168.0.112/24
Device
GE0/2
20.20.20.1/24
10.0.0.1/24 sub
GE0/1
192.168.0.100/24
Portal server
Security policy server
DHCP server
192.168.0.113/24
RADIUS server
Configuration procedure
NOTE:
For re-DHCP authentication, you need to configure a public address pool (20.20.20.0/24, in this
example) and a private address pool (10.0.0.0/24, in this example) on the DHCP server. The
configuration steps are omitted. For DHCP configuration information, see
DHCP Configuration
in the
Firewall Web Configuration Manual
.
For re-DHCP authentication, Device must be configured as a DHCP relay agent (instead of a DHCP
server) and the portal-enabled interface must be configured with a primary IP address (a public IP
address) and a secondary IP address (a private IP address).
Make sure that the IP address of the portal device added on the portal server is the private IP address of
the interface connecting users (10.0.0.1
in this example), and the IP address
g
roup associated with the
portal device is the private network segment where the users reside (10.0.0.0/24 in this example).
You need to configure IP addresses for Host, Device, and the servers as shown in
Figure 13 and ensure
that they can reach each other.
Perform configurations on the RADIUS server to ensure that the user authentication and accounting
functions can work normally.
Perform the following configuration on Device:
Step1 Configure a RADIUS scheme
# Create a RADIUS scheme named rs1 and enter its view.
<Device> system-view
[Device] radius scheme rs1
Vista de pagina 29
1 2 ... 25 26 27 28 29 30 31 32 33 34 35 ... 181 182

Comentarios a estos manuales

Sin comentarios