151
Make sure that the IP address of the portal device added on the portal server is the private IP address of
the interface connecting users (10.0.0.1, in this example) and that the IP address group associated with
the portal device is the private network segment where the users reside (10.0.0.0/24, in this example).
Configure IP addresses for the router and servers as shown in
and make sure that the host,
router, and servers can reach each other.
Perform configurations on the RADIUS server to ensure that the user authentication and accounting
functions can work normally.
Configuration procedure
Configure the router:
1.
Configure a RADIUS scheme.
# Create a RADIUS scheme named
rs1
and enter its view.
<Router> system-view
[Router] radius scheme rs1
# Set the server type for the RADIUS scheme. When using the iMC server, you must set the server type to
extended
.
[Router-radius-rs1] server-type extended
# Specify the primary authentication server and primary accounting server, and configure the keys for
communication with the servers.
[Router-radius-rs1] primary authentication 192.168.0.113
[Router-radius-rs1] primary accounting 192.168.0.113
[Router-radius-rs1] key authentication radius
[Router-radius-rs1] key accounting radius
[Router-radius-rs1] user-name-format without-domain
# Configure the IP address of the security policy server.
[Router-radius-rs1] security-policy-server 192.168.0.114
[Router-radius-rs1] quit
2.
Configure an authentication domain.
# Create an ISP domain named
dm1
and enter its view.
[Router] domain dm1
# Configure AAA methods for the ISP domain.
[Router-isp-dm1] authentication portal radius-scheme rs1
[Router-isp-dm1] authorization portal radius-scheme rs1
[Router-isp-dm1] accounting portal radius-scheme rs1
[Router-isp-dm1] quit
# Configure
dm1
as the default ISP domain for all users. Then, if a user enters the username without the
ISP domain at logon, the authentication and accounting methods of the default domain are used for the
user.
[Router] domain default enable dm1
3.
Configure the ACL (ACL 3000 ) for resources on subnet 192.168.0.0/24 and the ACL (ACL 3001)
for Internet resources.
NOTE:
On the security policy server, specify ACL 3000 as the isolation ACL and ACL 3001 as the security
ACL.