Enabling the radius offload feature – H3C Technologies H3C WX3000E Series Wireless Switches User Manual
Page 47

33
Configuring the IP address of the security policy server
The core of the H3C EAD solution is integration and cooperation, and the security policy server is the
management and control center. Using a collection of software, the security policy server provides
functions such as user management, security policy management, security status assessment, security
cooperation control, and security event audit.
The NAS checks the validity of received control packets and accepts only control packets from known
servers. To use a security policy server that is independent of the AAA servers, you must configure the IP
address of the security policy server on the NAS. To implement all EAD functions, configure both the IP
address of the security policy server and that of the IMC Platform on the NAS.
To configure the IP address of the security policy server for a scheme:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter RADIUS scheme view.
radius scheme
radius-scheme-name
N/A
3.
Specify a security policy
server.
security-policy-server ip-address
No security policy server is
specified by default.
NOTE:
You can specify up to eight security policy servers for a RADIUS scheme.
Enabling the RADIUS offload feature
Some RADIUS servers do not support Extensible Authentication Protocol (EAP) authentication. They
cannot process EAP packets. In this case, the access device must process EAP packets from EAP clients
before forwarding them to the server. The RADIUS offload feature enables an access device to process
EAP packets for this purpose.
The RADIUS offload feature needs the cooperation of the local EAP authentication server. They work
together as follows:
1.
After receiving EAP packets from an EAP client, the local EAP authentication server interacts with
the client, encapsulates the authentication information of the client into the RADIUS MS-CHAPv2
attribute and sends the attribute in a RADIUS authentication request to the RADIUS server for
authentication.
2.
When a RADIUS server receives the requests, it resolves the authentication information in the
request, performs authentication, and then encapsulates and sends the authentication result in a
RADIUS packet to the local EAP authentication server.
To deploy the RADIUS offload feature, complete the following tasks on the access device:
•
Configure the local EAP authentication server, specifying the EAP authentication method as
PEAP-MSCHAPv2 (the only authentication method supported). For more information about the
configuration, see "
Configuring local EAP authentication
•
Configure the EAP offload feature for the RADIUS schemes.
To enable the EAP offload feature:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
- H3C WX5500E Series Access Controllers H3C WX3500E Series Access Controllers H3C WX2500E Series Access Controllers H3C WX6000 Series Access Controllers H3C WX5000 Series Access Controllers H3C LSWM1WCM10 Access Controller Module H3C LSUM3WCMD0 Access Controller Module H3C LSUM1WCME0 Access Controller Module H3C LSWM1WCM20 Access Controller Module H3C LSQM1WCMB0 Access Controller Module H3C LSRM1WCM2A1 Access Controller Module H3C LSBM1WCM2A0 Access Controller Module H3C WA3600 Series Access Points H3C WA2600 Series WLAN Access Points H3C S10500 Series Switches H3C S5800 Series Switches H3C S5820X Series Switches H3C S12500 Series Switches H3C S9500E Series Switches H3C MSR 5600 H3C MSR 50 H3C MSR 3600 H3C MSR 30 H3C MSR 2600 H3C MSR 20-2X[40] H3C MSR 20-1X H3C MSR 930 H3C MSR 900 H3C SR8800 H3C SR6600-X H3C SR6600 H3C SecPath F5020 H3C SecPath F5040 H3C VMSG VFW1000