1-26
[Switch-acl-adv-3001] rule permit ip
[Switch-acl-adv-3001] quit
4) Configure portal authentication
# Configure the portal server as follows:
z
Name: newpt
z
IP address: 192.168.0.111
z
Key: portal
z
Port number: 50100
z
URL: http://192.168.0.111/portal.
[Switch] portal server newpt ip 192.168.0.111 key portal port 50100
url http://192.168.0.111/portal
# Configure the switch as a DHCP relay agent, and enable the invalid address check function.
[Switch] dhcp enable
[Switch] dhcp relay server-group 0 ip 192.168.0.112
[Switch] interface vlan-interface 100
[Switch–Vlan-interface100] ip address 20.20.20.1 255.255.255.0
[Switch–Vlan-interface100] ip address 10.0.0.1 255.255.255.0 sub
[Switch-Vlan-interface100] dhcp select relay
[Switch-Vlan-interface100] dhcp relay server-select 0
[Switch-Vlan-interface100] dhcp relay address-check enable
# Enable re-DHCP portal authentication on the interface connecting the host.
[Switch–Vlan-interface100] portal server newpt method redhcp
[Switch–Vlan-interface100] quit
Configuring Layer 3 Portal Authentication with Extended Functions
Network requirements
z
Switch A is configured for Layer 3 extended portal authentication. When users have passed identity
authentication but have not passed security authentication, they can access only subnet
192.168.0.0/24. After passing security authentication, they can access unrestricted Internet
resources.
z
The host accesses Switch A through Switch B.
z
A RADIUS server serves as the authentication/accounting server.
Summary of Contents for S7902E
Page 82: ...1 4 DeviceA interface tunnel 1 DeviceA Tunnel1 service loopback group 1 ...
Page 200: ...1 11 DeviceB display vlan dynamic No dynamic vlans exist ...
Page 598: ...ii ...
Page 1757: ...4 9 ...
Page 1770: ...6 4 ...
Page 2017: ...2 11 Figure 2 3 SFTP client interface ...
Page 2238: ...1 16 DeviceA cfd linktrace service instance 1 mep 1001 target mep 4002 ...