beautypg.com

Configuration procedure – H3C Technologies H3C WX3000E Series Wireless Switches User Manual

Page 203

background image

189

Configuration procedure

NOTE:

For re-DHCP authentication, you must configure a public address pool (20.20.20.0/24, in this
example) and a private address pool (10.0.0.0/24, in this example) on the DHCP server. The

configuration steps are omitted. For DHCP configuration information, see

Layer 3 Configuration Guide.

For re-DHCP authentication, the AC must be configured as a DHCP relay agent (instead of a DHCP
server) and the portal-enabled interface must be configured with a primary IP address (a public IP

address) and a secondary IP address (a private IP address).

Configure IP addresses for the AC and servers as shown in

Figure 88

and make sure that client, AC, and

servers have IP connectivity between each other.

Configure the RADIUS server properly to provide normal authentication/accounting services for users.

1.

Configure a RADIUS scheme on the AC:
# Create a RADIUS scheme named rs1 and enter its view.

system-view

[AC] radius scheme rs1

# Set the server type for the RADIUS scheme. When using the IMC server, set the server type to
extended.

[AC-radius-rs1] server-type extended

# Specify the primary authentication server and primary accounting server, and configure the keys

for communication with the servers.

[AC-radius-rs1] primary authentication 192.168.0.113

[AC-radius-rs1] primary accounting 192.168.0.113

[AC-radius-rs1] key accounting radius

[AC-radius-rs1] key authentication radius

[AC-radius-rs1] user-name-format without-domain

# Configure the IP address of the security policy server.

[AC-radius-rs1] security-policy-server 192.168.0.114

[AC-radius-rs1] quit

2.

Configure an authentication domain on the AC:
# Create an ISP domain named dm1 and enter its view.

[AC] domain dm1

# Configure the ISP domain to use RADIUS scheme rs1.

[AC-isp-dm1] authentication portal radius-scheme rs1

[AC-isp-dm1] authorization portal radius-scheme rs1

[AC-isp-dm1] accounting portal radius-scheme rs1

[AC-isp-dm1] quit

3.

On the AC, configure the ACL (ACL 3000) for resources on subnet 192.168.0.0/24 and the ACL
(ACL 3001) for Internet resources.

NOTE:

On the security policy server, specify ACL 3000 as the isolation ACL and ACL 3001 as the security ACL.

[AC] acl number 3000

[AC-acl-adv-3000] rule permit ip destination 192.168.0.0 0.0.0.255