106
© 2001- 2011 D-Link Corporation. All Rights Reserved.
Configuration Guide
simpler. At the start of service for a user, the RADIUS client that is configured to use
accounting sends an accounting start packet specifying the type of service that it will deliver.
Once the server responds with an acknowledgement, the client periodically transmits
accounting data. At the end of service delivery, the client sends an accounting stop packet
allowing the server to update specified statistics. The server again responds with an
acknowledgement.
802.1x Network Access Control Example
This example configures a single RADIUS server used for authentication and accounting at
10.10.10.10. The shared secret is configured to be
secret
. The process creates a new
authentication list, called radiusList, which uses RADIUS as the authentication method. This
authentication list is associated with the 802.1x default login. 802.1x port based access control
is enabled for the system, and interface 0/1 is configured to be in force-authorized mode
because this is where the RADIUS server and protected network resources are located.
Figure 60.
DWS-3000 with 802.1x Network Access Control
If a user, or supplicant, attempts to communicate via the switch on any interface except
interface 0/1, the system challenges the supplicant for login credentials. The system encrypts
the provided information and transmits it to the RADIUS server. If the RADIUS server grants
access, the system sets the 802.1x port state of the interface to authorized and the supplicant is
able to access network resources.
config
radius server host auth 10.10.10.10
radius server key auth 10.10.10.10
secret
secret
radius server host acct 10.10.10.10
radius server key acct 10.10.10.10
secret
secret
radius accounting mode
authentication login radiusList radius
dot1x defaultlogin radiusList
dot1x system-auth-control
interface 0/1
dot1x port-control force-authorized
exit
exit
Summary of Contents for UNIFIED WIRED & WIRELESS ACCESS SYSTEM DWS-3000
Page 2: ...2 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 12: ...12 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 14: ...14 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 32: ...32 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 40: ...40 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 44: ...44 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 56: ...56 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 66: ...66 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 84: ...84 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 90: ...90 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 103: ...Web Examples 103 15 Access Control Lists ACLs Figure 57 Attach IP ACL to an Interface ...
Page 110: ...110 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 123: ...Web Examples 123 18 Port Security Figure 70 Port Security Violation Status ...
Page 124: ...124 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 129: ...RADIUS Configuration Examples 129 19 RADIUS Figure 73 Configuring the RADIUS Server ...
Page 137: ...TACACS Configuration Example 137 20 TACACS Figure 82 Set the User Login TACACS ...
Page 138: ...138 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 146: ...146 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 176: ...176 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 184: ...184 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...