beautypg.com

Layer 3 portal authentication across vpns, Network requirements, Configuration procedure – H3C Technologies H3C SecPath F1000-E User Manual

Page 40

background image

39

URL : http://192.168.0.111:8080/portal

Status : Up

Layer 3 Portal Authentication Across VPNs

Network requirements

As shown in

Figure 21

, Device A, as the PE device connecting the user side, needs to provide Layer 3

portal authentication for hosts in VPN 1 through communication with the RADIUS server and portal

server in VPN 3.

Figure 21 Network diagram for Layer 3 portal authentication across VPNs

Configuration procedure

NOTE:

Before enabling portal authentication, be sure to configure the MPLS L3VPN capabilities properly and
specify VPN targets for VPN 1 and VPN 3 so that VPN 1 and VPN 3 can communicate with each other.
This example gives only the access authentication configuration on the user-side PE.

Configure the RADIUS server properly to provide normal authentication/accounting functions for users.

Perform the following configuration on Device A:

Step1

Configure a RADIUS scheme

# Create a RADIUS scheme named rs1 and enter its view.

system-view

[DeviceA] radius scheme rs1

# Configure the VPN instance to which the RADIUS scheme belongs as vpn3.

[DeviceA-radius-rs1] vpn-instance vpn3

# Set the server type for the RADIUS scheme. When using the CAMS or iMC server, you need to set the
server type to extended.

[DeviceA-radius-rs1] server-type extended

# Specify the primary authentication server and primary accounting server, and configure the keys for
communication with the servers.

[DeviceA-radius-rs1] primary authentication 192.168.0.111

[DeviceA-radius-rs1] primary accounting 192.168.0.111

[DeviceA-radius-rs1] key accounting radius

[DeviceA-radius-rs1] key authentication radius

# Configure Device A to exclude the ISP domain name from the username sent to the RADIUS server.