beautypg.com

H3C Technologies H3C S6300 Series Switches User Manual

Page 7

background image

i

Contents

Configuring AAA ························································································································································· 1

 

Overview ············································································································································································ 1

 

RADIUS ······································································································································································ 2

 

HWTACACS ····························································································································································· 7

 

LDAP ·········································································································································································· 9

 

AAA implementation on the device ····················································································································· 11

 

Protocols and standards ······································································································································· 13

 

RADIUS attributes ·················································································································································· 13

 

FIPS compliance ····························································································································································· 16

 

AAA configuration considerations and task list ·········································································································· 16

 

Configuring AAA schemes ············································································································································ 18

 

Configuring local users ········································································································································· 18

 

Configuring RADIUS schemes ······························································································································ 22

 

Configuring HWTACACS schemes ····················································································································· 32

 

Configuring LDAP schemes ·································································································································· 38

 

Configuring AAA methods for ISP domains ················································································································ 41

 

Configuration prerequisites ·································································································································· 42

 

Creating an ISP domain ······································································································································· 42

 

Setting the ISP domain status ······························································································································· 42

 

Configuring authentication methods for an ISP domain ··················································································· 43

 

Configuring authorization methods for an ISP domain ····················································································· 44

 

Configuring accounting methods for an ISP domain ························································································· 45

 

Enabling the session-control feature ····························································································································· 46

 

Setting the maximum number of concurrent login users ···························································································· 47

 

Displaying and maintaining AAA ································································································································ 47

 

AAA configuration examples ········································································································································ 47

 

AAA for SSH users by an HWTACACS server ·································································································· 47

 

Local authentication, HWTACACS authorization, and RADIUS accounting for SSH users ·························· 49

 

Authentication and authorization for SSH users by a RADIUS server ····························································· 51

 

Authentication for SSH users by an LDAP server ······························································································· 54

 

Troubleshooting RADIUS ··············································································································································· 59

 

RADIUS authentication failure ······························································································································ 59

 

RADIUS packet delivery failure ···························································································································· 59

 

RADIUS accounting error ····································································································································· 60

 

Troubleshooting HWTACACS ······································································································································ 60

 

Troubleshooting LDAP ···················································································································································· 60

 

802.1X overview ······················································································································································· 62

 

802.1X architecture ······················································································································································· 62

 

Controlled/uncontrolled port and port authorization status ······················································································ 62

 

802.1X-related protocols ·············································································································································· 63

 

Packet formats ························································································································································ 63

 

EAP over RADIUS ·················································································································································· 64

 

Initiating 802.1X authentication ··································································································································· 65

 

802.1X client as the initiator································································································································ 65

 

Access device as the initiator ······························································································································· 65

 

802.1X authentication procedures ······························································································································ 66

 

Comparing EAP relay and EAP termination ······································································································· 66

 

EAP relay ································································································································································ 67