beautypg.com

H3C Technologies H3C WX6000 Series Access Controllers User Manual

Page 15

background image

ix

Authentication Modes of 802.1X ...................................................................................................35-2

Basic Concepts of 802.1X .............................................................................................................35-2

EAP over LANs..............................................................................................................................35-3

EAP over RADIUS.........................................................................................................................35-5

802.1X Authentication Triggering ..................................................................................................35-5

Authentication Process of 802.1X .................................................................................................35-6

802.1X Timers ...............................................................................................................................35-9

802.1X Extensions.......................................................................................................................35-10

Features Working Together with 802.1X.....................................................................................35-10

Configuring 802.1X .............................................................................................................................35-12

Configuration Task List................................................................................................................35-12

Configuring 802.1X Globally........................................................................................................35-12

Configuring 802.1X on a Port ......................................................................................................35-14

Configuration Guidelines.....................................................................................................................35-15

36 Portal Authentication ............................................................................................................................36-1

Overview ...............................................................................................................................................36-1

Introduction to Extended Portal Functions ....................................................................................36-1

Portal System Components...........................................................................................................36-2

Portal System Using the Local Portal Server ................................................................................36-3

Portal Authentication Modes .........................................................................................................36-4

Portal Authentication Process .......................................................................................................36-6

Configuring Portal Authentication .........................................................................................................36-8

Configuration Prerequisites ...........................................................................................................36-8

Configuration Task List..................................................................................................................36-9

Configuring the Portal Service.......................................................................................................36-9

Configuring a Portal-Free Rule....................................................................................................36-12

Customizing Authentication Pages..............................................................................................36-14

Portal Authentication Configuration Example .....................................................................................36-15

37 AAA .........................................................................................................................................................37-1

Overview ...............................................................................................................................................37-1

Introduction to AAA........................................................................................................................37-1

Introduction to ISP Domain ...........................................................................................................37-2

Configuring AAA....................................................................................................................................37-2

Configuration Prerequisites ...........................................................................................................37-2

Configuration Task List..................................................................................................................37-3

Configuring an ISP Domain ...........................................................................................................37-3

Configuring Authentication Methods for the ISP Domain..............................................................37-4

Configuring Authorization Methods for the ISP Domain................................................................37-6

Configuring Accounting Methods for the ISP Domain...................................................................37-8

AAA Configuration Example .................................................................................................................37-9

38 RADIUS ...................................................................................................................................................38-1

Overview ...............................................................................................................................................38-1

Introduction to RADIUS .................................................................................................................38-1

Client/Server Model .......................................................................................................................38-1

Security and Authentication Mechanisms .....................................................................................38-2