Portal configuration task list, Basic portal configuration, Configuration prerequisites – H3C Technologies H3C S7500E Series Switches User Manual
Page 144
8-7
13) Based on the security checking result, the security policy server authorizes the user to
access certain resources, and sends the authorization information to the access device. The
access device then controls accesses of the user based on the authorization information.
Portal Configuration Task List
Complete these tasks to configure portal authentication:
Task
Remarks
Required
Configuring a Portal-Free Rule
Optional
Configuring an Authentication Subnet
Optional
Specifying the Source IP Address for Portal Packets to Be Sent
Optional
Optional
Specifying the Authentication Domain for Portal Users
Optional
Specifying a NAS ID Profile for an Interface
Optional
Setting the Maximum Number of Online Portal Users
Optional
Basic Portal Configuration
Configuration Prerequisites
The portal feature provides a solution for user identity authentication and security checking.
However, the portal feature cannot implement this solution by itself. Currently, RADIUS
authentication needs to be configured on the access device to cooperate with the portal feature
to complete user authentication.
The prerequisites for portal authentication configuration are as follows:
z
The portal server and the RADIUS server have been installed and configured properly.
z
With re-DHCP authentication, the IP address match check function of DHCP relay agent is
enabled on the access device, and the DHCP server is installed and configured properly.
z
The portal client, access device, and servers are routable to each other.
z
With RADIUS authentication, usernames and passwords of the users are configured on the
RADIUS server, and the RADIUS client configurations are performed on the access device.
For information about RADIUS client configuration, see AAA Configuration in the Security
Configuration Guide.
z
To implement extended portal functions, install and configure iMC EAD, and ensure that
the ACLs configured on the access device correspond to those specified for resources in
the quarantined area and restricted resources on the security policy server respectively.
For information about security policy server configuration on the access device, see AAA
Configuration in the Security Configuration Guide.