112
2.
The access device and the RADIUS server exchange RADIUS packets to authenticate the user.
3.
If the user passes RADIUS authentication, the local portal server pushes a logon success page to the
authentication client.
Authorized VLAN
Layer 2 portal authentication supports VLAN assignment by the authentication server. After a user passes
portal authentication, if the authentication server is configured with an authorized VLAN for the user, the
authentication server assigns the authorized VLAN to the access device, which will then add the user to
the authorized VLAN and generate a MAC VLAN entry. If this VLAN does not exist, the access device will
first create the VLAN and then add the user to the VLAN.
By deploying the authorized VLAN assignment function, you can control which network resources users
passing portal authentication can access.
Auth-Fail VLAN
The Auth-Fail VLAN feature allows users failing authentication to access a VLAN that accommodates
network resources such as the patches server, virus definitions server, client software server, and anti-virus
software server, so that the users can upgrade their client software or other programs. Such a VLAN is
called an ―Auth-Fail VLAN‖.
Layer 2 portal authentication supports MAC-based Auth-Fail VLAN (MAFV). With an Auth-Fail VLAN
configured on a port, if a user on the port fails authentication, the access devices creates a MAC VLAN
entry based on the MAC address of the user and adds the user to the Auth-Fail VLAN. Then, the user can
access the non-HTTP resources in the Auth-Fail VLAN, and all HTTP requests of the user will be redirected
to the authentication page. If the user passes authentication, the access device adds the user to the
assigned VLAN or return the user to the initial VLAN of the port, depending on whether the
authentication server assigns a VLAN. If the user fails the authentication, the access device keeps the user
in the Auth-Fail VLAN. If an access port receives no traffic from a user in the Auth-Fail VLAN during a
specified period of time (90 seconds by default), it removes the user from the Auth-Fail VLAN and adds
the user to the initial VLAN of the port.
NOTE:
After a user is added to the authorized VLAN or Auth-Fail VLAN, the IP address of the client needs to
be automatically or manually updated to ensure that the client can communicate with the hosts in the
VLAN.
Assignment of authorized ACLs
The device can use ACLs to control user access to network resources and limit user access rights. With
authorized ACLs specified on the authentication server, when a user passes authentication, the
authentication server assigns an authorized ACL for the user, and the device filters traffic from the user on
the access port according to the authorized ACL. You must configure the authorized ACLs on the access
device if you specify authorized ACLs on the authentication server. To change the access right of a user,
specify a different authorized ACL on the authentication server or change the rules of the corresponding
authorized ACL on the device.
Portal configuration task list
Complete these tasks to configure Layer 2 portal authentication: