134
Verifying the configuration
1.
From the navigation tree, select
Security
>
Authentication
>
RADIUS
.
2.
Verify the configuration of RADIUS scheme
rs1
.
3.
From the navigation tree, select
Security
>
Authentication
>
ISP Domains
.
4.
Verify the configuration of ISP domain
dm1
.
5.
Use the configured user account to pass portal authentication.
6.
From the navigation tree, select
Security
>
Access Control
>
Portal
.
7.
Verify that the number of online users is not 0 on VLAN-interface 4.
Direct portal authentication using local portal Web server
configuration example
Network requirements
As shown in
, the host is directly connected to the switch (the access device). The host is
assigned a public IP address either manually or through DHCP. The switch acts as both a portal
authentication server and a portal Web server. A RADIUS server acts as the
authentication/accounting server.
Configure direct portal authentication on the switch. Before a user passes portal authentication, the
user can access only the local portal Web server. After passing portal authentication, the user can
access other network resources.
Figure 48 Network diagram
Configuration procedure
1.
Configure a RADIUS scheme on the switch:
a.
From the navigation tree, select
Security
>
Authentication
>
RADIUS
.
b.
Add RADIUS scheme
rs1
.
c.
Configure the primary authentication server:
−
Set the IP address to
192.168.0.112
.
−
Set the authentication port number to
1812
.
−
Set the shared key to
radius
.
−
Set the server state to
Active
.
d.
Configure the primary accounting server:
−
Set the IP address to
192.168.0.112
.
−
Set the accounting port number to
1813
.
−
Set the shared key to
radius
.
−
Set the server state to
Active
.
e.
Configure the switch to not include domain names in the usernames sent to the RADIUS
server.
f.
Click the
Advanced settings
icon
on the
RADIUS
page.