91
Use RADIUS servers to perform authentication, authorization, and accounting for the 802.1X users. If
RADIUS authentication fails, perform local authentication on the access device.
Configure the host at 10.1.1.1/24 as the primary authentication and accounting servers, and the host at
10.1.1.2/24 as the secondary authentication and accounting servers. Assign all users to the ISP domain
bbb
.
Configure the shared key as
name
for packets between the access device and the authentication server.
Configure the shared key as
money
for packets between the access device and the accounting server.
Figure 30
Network diagram
Configuration procedure
1.
Configure the 802.1X client. If HP iNode is used, do not select the
Carry version info
option in the
client configuration. (Details not shown.)
2.
Configure the RADIUS servers and add user accounts for the 802.1X users. (Details not shown.)
For information about the RADIUS commands used on the access device in this example, see
Security Command Reference
.
3.
Assign an IP address for each interface on the access device. (Details not shown.)
4.
Configure user accounts for the 802.1X users on the access device:
# Add a local network access user with the username
localuser
, and password
localpass
in
plaintext. (Make sure the username and password are the same as those configured on the
RADIUS servers.)
<Device> system-view
[Device] local-user localuser class network
[Device-luser-network-localuser] password simple localpass
# Set the service type to
lan-access
.
[Device-luser-network-localuser] service-type lan-access
[Device-luser-network-localuser] quit
5.
Configure a RADIUS scheme:
# Create the RADIUS scheme
radius1
and enter RADIUS scheme view.
[Device] radius scheme radius1
# Specify the IP addresses of the primary authentication and accounting RADIUS servers.
[Device-radius-radius1] primary authentication 10.1.1.1
[Device-radius-radius1] primary accounting 10.1.1.1
# Configure the IP addresses of the secondary authentication and accounting RADIUS servers.
[Device-radius-radius1] secondary authentication 10.1.1.2
Internet
Device
Authenticator
Host
192.168.1.2/24
XGE1/0/1
Vlan-int2
192.168.1.1/24
RADIUS server cluster
Primary: 10.1.1.1/24
Secondary: 10.1.1.2/24
Supplicant
XGE1/0/2
10.1.1.10/24