164
[SwitchA-acl-adv-3001] quit
On the security policy server, specify ACL 3000 as the isolation ACL and ACL 3001 as the security
ACL.
4.
Configure portal authentication
# Configure the portal server as follows:
{
Name:
newpt
{
IP address:
192.168.0.111
{
Key:
portal
in plain text
{
Port number:
50100
{
URL:
http://192.168.0.111:8080/portal
[SwitchA] portal server newpt ip 192.168.0.111 key portal port 50100 url
http://192.168.0.111:8080/portal
# Enable portal authentication on the interface connecting Switch B.
[SwitchA] interface vlan-interface 4
[SwitchA–Vlan-interface4] portal server newpt method layer3
[SwitchA–Vlan-interface4] quit
On Switch B, configure a default route to subnet 192.168.0.0/24, setting the next hop as 20.20.20.1.
(Details not shown.)
Configuring portal stateful failover
Network requirements
As shown in
, a failover link is present between Switch A and Switch B. Both Switch A and
Switch B support portal authentication. Configure stateful failover between Switch A and Switch B to
support portal service backup and use VRRP to implement traffic switchover between the switches. More
specifically,
•
When Switch A works normally, Host accesses Switch A for portal authentication before accessing
the Internet; when Switch A fails, Host accesses the Internet through Switch B. The VRRP
uplink/downlink detection mechanism is used to ensure non-stop traffic forwarding.
•
Use the RADIUS server as the authentication/accounting server. In this example, Server takes the
responsibilities of the portal server and the RADIUS server.
•
Switch A and Switch B use the failover link to transmit stateful failover related packets and specify
VLAN 8 on the switches as the VLAN dedicated for stateful failover related packets.