11-H3C IMC UAM L2TP over IPsec Authentication with UAM Configuration Examples

HomeSupportNetwork Operations & ManagementIntelligent Management Center 7Configure & DeployConfiguration ExamplesiMC UAM Configuration Examples-5W10111-H3C IMC UAM L2TP over IPsec Authentication with UAM Configuration Examples

 

H3C IMC UAM

L2TP over IPsec Authentication with UAM  Configuration Examples

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Software version: IMC UAM 7.2 (E0403)

 

Copyright © 2016 Hangzhou H3C Technologies Co., Ltd. All rights reserved.

No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of Hangzhou H3C Technologies Co., Ltd.

The information in this document is subject to change without notice.



Introduction

This document provides examples for using UAM as the RADIUS server to authenticate L2TP over IPsec VPN connections.

Prerequisites

The access device must support routing and PPP, and the iNode PC client must support L2TP/IPsec VPN authentication.

Example: Configuring L2TP over IPsec authentication with UAM

Network configuration

As shown in Figure 1, configure UAM as the RADIUS server to authenticate L2TP users and assign access control policies to the L2TP VPN gateway.

Configure the L2TP VPN gateway to control internal network access and Internet access according to the access control policies assigned by UAM.

Figure 1 Network diagram

 

Procedures

Configuring the LNS

This example uses H3C SecPath F5040 as the LNS.

1.     Enter system view.

<H3C> system-view

System View: return to User View with Ctrl+Z.

2.     Configure the DHCP relay agent.

# Enable DHCP and specify DHCP server 192.168.1.32 for DHCP server group 0.

[H3C] dhcp enable

[H3C] dhcp relay server-group 0 ip 192.168.1.32

3.     Configure the RADIUS server.

# Configure a RADIUS scheme named wkf5315.

[H3C] radius scheme wkf5315

New Radius scheme

# Specify IMC UAM as the authentication and accounting server.

[H3C-radius-wkf5315] primary authentication 192.168.1.17 1812

[H3C-radius-wkf5315] primary accounting 192.168.1.17 1813

# Configure shared keys for authentication and accounting.

[H3C-radius-wkf5315] key authentication simple expert

[H3C-radius-wkf5315] key accounting simple expert

# Include the domain names in usernames sent to the RADIUS server.

[H3C-radius-wkf5315] user-name-format with-domain

# Configure the service type as extended to better support UAM and EAD.

[H3C-radius-wkf5315] server-type extended

[H3C-radius-wkf5315] quit

4.     Configure an ISP domain.

# Configure the domain name to be the same as the service suffix in UAM.

[H3C] domain 5315

# Use RADIUS scheme wkf5315 to authenticate PPP users.

[H3C-isp-5315] authentication ppp radius-scheme wkf5315

[H3C-isp-5315] authorization ppp radius-scheme wkf5315

[H3C-isp-5315] accounting ppp radius-scheme wkf5315

# Create an IP address pool.

[H3C] ip pool 1 200.1.1.2 200.1.1.100

5.     Configure a VT interface.

# Create a VT interface, and configure CHAP authentication for PPP users by using domain 5315.

[H3C] interface Virtual-Template 1

[H3C-Virtual-Template1] ppp authentication-mode chap domain 5315

# Configure the local IP address, which must be within the same network as the L2TP peer but cannot belong to the address pool of the peer.

[H3C-Virtual-Template1] ip address 200.1.1.1 255.255.255.0

# Specify an IP address pool for PPP users.

[H3C-Virtual-Template1] remote address pool 1

6.     Configure L2TP.

# Enable L2TP, and create an L2TP group.

[H3C] l2tp enable

[H3C] l2tp-group 1 mode lns

# Specify a VT interface for receiving calls from L2TP users, and configure the tunnel name as iNode.

[H3C-l2tp1] allow l2tp virtual-template 1 remote iNode

# Configure an authentication key for the L2TP tunnel.

[H3C-l2tp1] tunnel password simple 123456

[H3C-l2tp1] quit

7.     Configure an IPsec proposal.

# Create an IPsec transform set named tran1.

[H3C] ipsec transform-set tran1

# Specify the encapsulation mode as tunnel.

[H3C-ipsec-transform-set-tran1] encapsulation-mode tunnel

# Specify the security protocol as AH for the IPsec proposal.

[H3C-ipsec-transform-set-tran1] protocol ah

# Specify the authentication algorithm for AH to MD5.

[H3C-ipsec-transform-set-tran1] ah authentication-algorithm md5

[H3C-ipsec-transform-set-tran1] quit

8.     Configure an IKE proposal.

# Create an IKE proposal. For successful tunnel establishment, at least one proposal on both sides must match.

[H3C] ike proposal 1

# Specify pre-share as the authentication method for the IKE proposal.

[H3C-ike-proposal-1] authentication-method pre-share

# Set the authentication algorithm to MD5.

[H3C-ike-proposal-1] authentication-algorithm md5

# Set the encryption algorithm to DES-CBC.

[H3C-ike-proposal-1] encryption-algorithm des-cbc

# Specify a DH group for key negotiation in phase 1.

[H3C-ike-proposal-1] dh group1

# Set the IPsec SA lifetime to 86400 seconds.

[H3C-ike-proposal-1] sa duration 86400

[H3C-ike-proposal-1] quit

9.     Configure an IKE keychain.

# Create an IKE keychain named keychain1.

[H3C] ike keychain keychain1

# Specify a plain text of 123 as the pre-shared key to be used with the remote peer at 190.19.19.0/24.

[H3C-ike-keychain-keychain1] pre-shared-key address 190.19.19.0 24 key simple 123

[H3C-ike-keychain-keychain1] quit

10.     Configure an IKE profile.

# Create an IKE profile named wang.

[H3C] ike profile wang

# Specify that IKE negotiation operates in main mode.

[H3C-ike-profile-wang] exchange-mode main

# Configure the local ID as IP address 190.19.19.1.

[H3C-ike-profile-wang] local-identity address 190.19.19.1

# Configure a peer ID with the identity type as IP address in the range of 190.19.19.2 to 190.19.19.254.

[H3C-ike-profile-wang] match remote identity address 190.19.19.2 190.19.19.254

# Specify an IKE keychain named keychain1.

[H3C-ike-profile-wang] keychain keychain1

# Specify an IKE proposal named 1.

[H3C-ike-profile-wang] proposal 1

[H3C-ike-profile-wang] quit

11.     Configure an ACL.

# Create ACL 3000.

[H3C] acl number 3000

# Define an ACL rule to identify the IP traffic to be protected by IPsec.

[H3C-acl-adv-3000] rule 0 permit ip

[H3C-acl-adv-3000] quit

12.     Configure an IPsec policy template.

# Create an IPsec policy template named 1.

[H3C] ipsec policy-template tempolicy 1

# Specify the IPsec transform set, IKE profile, and ACL for the IPsec policy template.

[H3C-ipsec-policy-template tempolicy-1] transform-set tran1

[H3C-ipsec-policy-template tempolicy-1] ike-profile wang

[H3C-ipsec-policy-template tempolicy-1] security acl 3000

[H3C-ipsec-policy-template tempolicy-1] quit

13.     Create an IKE-based IPsec policy entry named vpnpolicy and sequence number 1 by using IPsec policy template tempolicy.

[H3C] ipsec policy vpnpolicy 1 isakmp template tempolicy

14.     Enable IPsec on the LNS interface that connects to the user network.

# Enter the view of Ethernet 3/1 that connects to the user network.

[H3C] interface Ethernet 3/1

# Configure the interface to operate in Layer 3 mode, and enable the DHCP relay agent on it.

[H3C-Ethernet3/1] port link-mode route

[H3C-Ethernet3/1] ip address 190.19.19.1 255.255.255.0

[H3C-Ethernet3/1] dhcp select relay

[H3C-Ethernet3/1] dhcp relay server-select 0

# Enable the IPsec policy.

[H3C-Ethernet3/1] ipsec apply policy vpnpolicy

If the PCs run Windows Vista or later, configure the IPsec proposal and IKE profile as follows:

1.     Configure an IKE profile.

# Create an IKE profile named wang.

[H3C] ike profile wang

# Specify the IKE negotiation mode as aggressive.

[H3C-ike-profile-wang] exchange-mode aggressive

# Configure the local ID with the identity type of FQDN name and the value of LNS.

[H3C-ike-profile-wang] local-identity fqdn LNS

# Configure a peer ID with the identity type of FQDN name and the value of LAC.

[H3C-ike-profile-wang] match remote identity fqdn LAC

# Specify an IKE keychain named keychain1.

[H3C-ike-profile-wang] keychain keychain1

# Specify an IKE proposal named 1.

[H3C-ike-profile-wang] proposal 1

[H3C-ike-profile-wang] quit

2.     Configure an IPsec proposal.

# Create an IPsec transform set named tran1.

[H3C] ipsec transform-set tran1

# Specify the encapsulation mode as tunnel.

[H3C-ipsec-transform-set-tran1] encapsulation-mode tunnel

# Specify the security protocol as ESP for the IPsec proposal.

[H3C-ipsec-transform-set-tran1] protocol esp

# Specify the authentication algorithm for ESP to MD5.

[H3C-ipsec-transform-set-tran1] esp authentication-algorithm md5

# Specify the encryption algorithm for ESP to DES-CBC.

[H3C-ipsec-transform-set-tran1] esp encryption-algorithm des-cbc

[H3C-ipsec-transform-set-tran1] quit

Configuring IMC UAM as the RADIUS server

Adding the LNS as an access device

1.     Click the User tab.

2.     From the navigation tree, select User Access Policy > Access Device Management > Access Device, as shown in Figure 2.

Figure 2 Accessing the access device list page

 

3.     Click Add.

The Add Access Device page opens, as shown in Figure 3.

Figure 3 Adding an access device

 

4.     Manually add the LNS.

You can add an access device by clicking the Select button or the Add Manually button in the Device List area. Follow these guidelines to configure an IP address for an access device:

¡     If you configure a RADIUS scheme with the nas ip command being executed on the device, the IP address of the access device in UAM must be the same as that configured by the nas ip command.

¡     If you configure a RADIUS scheme without the nas ip command being executed on the device, the IP address of the access device in UAM must be the IP address of the device's interface that connects to UAM.

The IP address cannot be modified if the device is selected from the IMC platform. It can be modified if the device is added manually.

To manually add the LNS:

a.     Click Add Manually in the Device List area.

The page for adding an access device manually opens, as shown in Figure 4.

Figure 4 Configuring the IP address for the access device

 

b.     Enter the IP address of the access device.

c.     Click OK to return to the page for adding an access device.

5.     In the Access Configuration area, configure the following common parameters, as shown in Figure 5:

¡     Authentication Port—Enter the authentication port. The value must be the same as that configured on the LNS at the CLI. The default port for UAM and the LNS is 1812.

¡     Accounting Port—Enter the accounting port. The value must be the same as that configured on the LNS at the CLI. The default port for UAM and the LNS is 1813.

 

 

NOTE:

The device supports only UAM that acts as both the authentication server and accounting server.

 

¡     Service Type—Select LAN Access Service or Device Management Service from the list. LAN access service is used for network access and device management service is used for the administrator to log in to and manage devices.

¡     Access Device Type—Select an access device type from the list. The type can be standard, predefined in UAM, or administrator-defined. You can select STANDARD(Standard) for devices that support standard RADIUS protocols. Predefined access device types include H3C(General), 3COM(General), HUAWEI(General), CISCO(General), RG(General), HP(MSM), HP(Comware), MICROSOFT(General), JUNIPER(General), and HP(ProCurve).

¡     Service Group—Select a service group to which the LNS belongs. You can organize access devices into different service groups for distributed management.

¡     Shared Key/Confirm Shared Key—Enter the shared key twice for UAM to authenticate the LNS. The value must be the same as that configured on the LNS at the CLI.

¡     Access Device Group—Select the access device group to which you want to add the LNS. If you do not want to add the LNS to any access device group, select two hyphens (--) from the list.

Figure 5 Configuring common parameters

 

6.     Click OK.

On the page that opens, click the Back to Access Device List link to view the added access device in the Access Device List, as shown in Figure 6.

Figure 6 Viewing the added access device

 

Adding an access policy

1.     Click the User tab.

2.     From the navigation tree, select User Access Policy > Access Device Management, as shown in Figure 7.

Figure 7 Accessing the access policy list page

 

3.     Click Add.

The page for adding an access policy opens, as shown in Figure 8.

Figure 8 Adding an access policy

 

4.     Enter the access policy name.

5.     Click OK.

On the page that opens, view the added access policy, as shown in Figure 9.

Figure 9 Viewing the added access policy

 

Adding an access service

An access service is a group of policies for user authentication and authorization.

1.     Click the User tab.

2.     From the navigation tree, select User Access Policy > Access Service, as shown in Figure 10.

Figure 10 The access service list page

 

3.     Click Add.

The Add Access Service page opens, as shown in Figure 11.

Figure 11 Adding an access service

 

4.     Configure basic information:

¡     Service Name—Enter the unique name of the service.

¡     Service Suffix—Enter the service suffix 5315. UAM uses the service suffix to identify the name of the domain to be used for endpoint authentication. The username and service suffix entered by the endpoint user are related to the authentication domain. The service suffix configuration varies, as shown in Table 1.

¡     Service GroupSelect a service group or Ungrouped from the list. You can add services to different service groups to facilitate management.

¡     Default Access Policy—Select the previously added access policy.

¡     Other parametersUse the default values.

Table 1 Service suffix and other configurations

Authentication username

Authentication domain on the access device

Commands configured on the access device

Service suffix in UAM

X@Y

Y

user-name-format with-domain

Y

user-name-format without-domain

None

X

[Default Domain]

(Default domain on the access device)

user-name-format with-domain

[Default Domain]

user-name-format without-domain

None

 

5.     Click OK.

On the page that opens, view the added access service, as shown in Figure 12.

Figure 12 Viewing the added access service

 

Adding an access user

1.     Click the User tab.

2.     Select Access User > All Access Users from the navigation tree, as shown in Figure 13.

Figure 13 Accessing the access user list page

 

3.     Click Add.

The Add Access User page opens, as shown in Figure 14.

Figure 14 Adding an access user

 

4.     Configure the name of the platform user to which the access user is attached.

You can use one of the following methods:

¡     Click Select. In the window that opens, click Query, and select an existing platform user, as shown in Figure 15. Click OK.

Figure 15 Selecting an existing platform user

 

¡     Click Add User to add a new platform user, and configure the username, identity number, and other parameters, as shown in Figure 16. Click OK.

Figure 16 Adding a new platform user

 

5.     Enter the unique account name of the access user.

6.     Enter the same password in the Password and Confirm Password fields.

7.     Select the previously added access service in the Access Service list.

8.     Use the default values for other parameters.

Figure 17 shows the page after configurations.

Figure 17 Viewing the access account settings

 

9.     Click OK.

On the page that opens, view the added access user, as shown in Figure 18.

Figure 18 Viewing the added access user

 

Verifying the configuration

1.     Install the iNode client with the L2TP/IPsec VPN feature enabled.

The version of the iNode client must be compatible with IMC UAM. For more information about compatibility, see the UAM readme file.

2.     Configure the properties of the L2TP IPsec VPN connection.

a.     Open the iNode client, and click the L2TP IPsec VPN connection area to expand this area, as shown in Figure 19.

Figure 19 The main interface

 

b.     Access the Properties windows of the L2TP IPsec VPN connection by using one of the following methods:

-     Click the icon  in the connection area, and select Properties from the menu, as shown in Figure 20.

Figure 20 Accessing the connection Properties window

 

-     Click the Manage  icon  in the iNode main window, right-click the L2TP IPsec VPN connection icon in the Management Plat window, and select Properties from the menu, as shown in Figure 21.

Figure 21 Accessing the connection Properties window

 

3.     Configure basic settings for the L2TP IPsec VPN connection, as shown in Figure 22.

Make sure the basic settings are configured in the same way as those configured for the IKE peer on the LNS.

Figure 22 Configuring VPN connection basic settings

 

4.     Click Advanced, and configure advanced properties for the connection according to the specified negotiation mode, as shown in Figure 23, Figure 24, Figure 25, Figure 26, and Figure 27.

Make sure the advanced settings are configured in the same way as those configured on the LNS.

¡     In main negotiation mode

Figure 23 Configuring the L2TP settings

 

Figure 24 Configuring the IPsec settings

 

Figure 25 Configuring the IKE settings

 

¡     In aggressive negotiation mode

Figure 26 Configuring the IPsec settings

 

Figure 27 Configuring the IKE settings

 

5.     Perform L2TP/IPsec VPN authentication.

a.     Click the L2TP IPsec VPN connection area.

b.     Enter the username and password, and click Connect, as shown in Figure 28.

Figure 28 Entering the username and password

 

The authentication starts. The authentication information shows that the connection has been established, as shown in Figure 29.

Figure 29 Verifying the authentication success

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网