10-Security Configuration Examples

HomeSupportSwitchesH3C S12500 Switch SeriesConfigure & DeployConfiguration ExamplesH3C S12500 Configuration Examples-Release1825P01-6W10010-Security Configuration Examples
03-S12500_IPv6_Portal_Authentication_Configuration_Examples

Introduction

This document provides IPv6 portal configuration examples.

Portal authentication, also called Web authentication, provides a flexible network access control method through Web interfaces.

Prerequisites

The configuration examples in this document were created and verified in a lab environment, and all the devices were started with the factory default configuration. When you are working on a live network, make sure you understand the potential impact of every command on your network.

This document assumes that you have basic knowledge of H3C portal authentication.

General configuration restrictions and guidelines

When you configure IPv6 portal authentication, follow these restrictions and guidelines:

·     If a QoS policy has been configured in a VLAN, on a member interface in a VLAN, or globally, do not configure portal authentication for the VLAN or on the interface. Otherwise, portal authentication does not take effect.

·     A portal authentication client is identified by its IP address. Network address translation can cause portal authentication failure. To avoid a failure, make sure no NAT device is configured between the portal authentication client, the access device, the portal server, and the AAA server.

Example: Configuring cross-subnet IPv6 portal authentication

Network requirements

As shown in Figure 1, the clients in department A access the core network of the company through Device A.

Configure portal authentication on Device A to control network access of the clients. Before passing portal authentication, a client can access only the portal server and all Web access requests are redirected to the portal server. After portal authentication, a client can access other internal resources of the company and Internet resources.

Use a RADIUS server as the AAA server for portal users.

Configure a shared key on both Device A and the RADIUS sever for secure packet exchange.

Figure 1 Network diagram

 

Table 1 shows the VLAN and IP address assignment.

Table 1 VLAN and IP address assignment

Device

Interface

IP address

Device A

VLAN-interface 5 (GE 9/0/24)

2193::1/64

Device A

VLAN-interface 6 (GE 9/0/16)

2001::1234/64

192.168.3.1/24

 

Requirements analysis

To authenticate the clients through portal in Department A, configure a portal server and enable portal authentication on Device A.

To implement AAA for users through the RADIUS server, configure a RADIUS scheme and specify the AAA servers on Device A. Apply the scheme to the authentication domain to which the portal users belong.

The shared key can ensure secure password exchange between Device A and the RADIUS server, and also prevents the response packets from the RADIUS server from being tampered with.

Software version used

The configuration examples were created and verified on S12500-CMW520-R1825P01.

Configuration restrictions and guidelines

When you configure cross-subnet IPv6 portal authentication, follow these restrictions and guidelines:

·     Before configuring IPv6 portal authentication, perform the following operations to make sure the device supports IPv6 ACLs and IPv6 forwarding.

¡     Enable IPv6 forwarding.

¡     Use the acl ipv6 enable command to enable IPv6 ACL for the cards suffixed with EC1 and EF.

¡     Use the acl mode advanced command to enable IPv6 ACL for the cards suffixed with EB and EC2.

·     Only RADIUS servers support AAA for portal users. Make sure you configure routes on the RADIUS server to the authentication port and the user's IP subnet.

·     To implement cross-subnet portal authentication, configure the authentication mode as layer3. To implement direct portal authentication, configure the authentication mode as direct. IPv6 portal authentication does not support re-DHCP authentication mode.

Configuration procedures

1.     Complete configurations on the RADIUS server and the portal server, for example, adding users. (Details not shown.)

2.     Configure IPv6 forwarding and IPv6 ACL:

# Enable IPv6 forwarding globally.

<DeviceA> system-view

[DeviceA]ipv6

[DeviceA]quit

# Enable IPv6 ACL.

<DeviceA> system-view

[DeviceA]acl ipv6 enable

[DeviceA]quit

3.     Configure interface addresses:

# Assign GigabitEthernet 9/0/24 to VLAN 5, and assign an IPv6 address to VLAN-interface 5.

<DeviceA> system-view

[DeviceA]vlan 5

[DeviceA-vlan5]port GigabitEthernet 9/0/24

[DeviceA-vlan5]quit

[DeviceA]interface GigabitEthernet 9/0/24

[DeviceA-GigabitEthernet9/0/24]undo shutdown

[DeviceA-GigabitEthernet9/0/24]quit

[DeviceA]interface Vlan-interface 5

[DeviceA-Vlan-interface5]undo shutdown

[DeviceA-Vlan-interface5]ipv6 address 2193::1 64

[DeviceA-Vlan-interface5]quit

[DeviceA]quit

# Assign GigabitEthernet 9/0/16 to VLAN 6, and assign an IPv6 address to VLAN-interface 6.

<DeviceA> system-view

[DeviceA]vlan 6

[DeviceA-vlan6]port GigabitEthernet 9/0/16

[DeviceA-vlan6]quit

[DeviceA]interface GigabitEthernet 9/0/16

[DeviceA-GigabitEthernet9/0/16]undo shutdown

[DeviceA-GigabitEthernet9/0/16]quit

[DeviceA]interface Vlan-interface 6

[DeviceA-Vlan-interface6]undo shutdown

[DeviceA-Vlan-interface6]ipv6 address 2001::1234 64

[DeviceA-Vlan-interface6]quit

[DeviceA]quit

4.     Configure a RADIUS scheme:

# Create a RADIUS scheme and enter its view.

<DeviceA> system-view

[DeviceA]radius scheme imc

New Radius scheme

# Configure the RADIUS scheme parameters, including the RADIUS server IP address, shared key, username format, and server type.

[DeviceA-radius-imc]primary authentication 192.168.3.13

[DeviceA-radius-imc]primary accounting 192.168.3.13

[DeviceA-radius-imc]key authentication imc

[DeviceA-radius-imc]key accounting imc

[DeviceA-radius-imc]user-name-format without-domain

[DeviceA-radius-imc]server-type extended

[DeviceA-radius-imc]quit

[DeviceA] quit

5.     Configure an authentication domain:

# Create an ISP domain named H3C.com, and specify the RADIUS scheme for the domain.

<DeviceA> system-view

[DeviceA] domain H3C.com

[DeviceA-isp-H3C.com] authentication portal radius-scheme imc

[DeviceA-isp-H3C.com] accounting portal radius-scheme imc

[DeviceA-isp-H3C.com] authorization portal radius-scheme imc

[DeviceA-isp-H3C.com] quit

[DeviceA] quit

6.     Configure portal authentication:

# Configure a portal server as follows:

¡     Name: portal_v6

¡     IPv6 address: 2001::2

¡     Key: portal

¡     Port number: 50100

¡     URL: http://[2001::2]:8080/portal

<DeviceA>system-view

System View: return to User View with Ctrl+Z.

[DeviceA]portal server portal_v6 ipv6 2001::2 key portal url http://[2001::2]:8080/portal

# Enable portal authentication on VLAN-interface 5, and specify the configured authentication domain and the NAS-IP on the interface.

<DeviceA> system-view

[DeviceA] interface Vlan-interface 5

[DeviceA-Vlan-interface5] portal server portal_v6 method layer3

[DeviceA-Vlan-interface5] portal nas-ip ipv6 2001::1234

 [DeviceA-Vlan-interface5] portal domain ipv6 H3C.com

[DeviceA-Vlan-interface5] quit

[DeviceA] quit

Verifying the configuration

Before passing portal authentication, verify that Client A, Client B, and Client C can ping the server IP 2001::2, but cannot ping the gateway IP address 2193::1 or subnet IP 2001::1234.

After passing portal authentication, verify that Client A, Client B, and Client C can ping the server IP 2001::2, the gateway IP address 2193::1, and the subnet IP 2001::1234.

Configuration files

<Sysname>display current-configuration

#

 version 5.20.101, Demo 1824

#

 sysname Sysname

#

 domain default enable system

#

 ipv6

#

 portal server portal_v6 ipv6 2001::2 key cipher $c$3$RTeW9Do7i/oJ044lGqRsCoKGCf

jfpLt4Qw== url http://[2001::2]:8080/portal

#

 xbar load-single

#

 forward-path check enable

 acl ipv6 enable

 acl mode advanced

 undo vpn popgo

 system working mode standard

 hardware-failure-detection chip isolate

 hardware-failure-detection board isolate

 hardware-failure-detection forwarding isolate

#

vlan 1

#

vlan 5 to 6

#

radius scheme imc

 server-type extended

 primary authentication 192.168.3.13

 primary accounting 192.168.3.13

 key authentication cipher $c$3$SEu0jaO8p8BCI5xC9lPVIdN3zPzvXUk=

 key accounting cipher $c$3$KiW/1TrX38ql2PEgH3C36bfRdraI34og=

 user-name-format without-domain

#

domain H3C.com

 authentication portal radius-scheme imc

 authorization portal radius-scheme imc

 accounting portal radius-scheme imc

 access-limit disable

 state active

 idle-cut disable

 self-service-url disable

domain system

 access-limit disable

 state active

 idle-cut disable

 self-service-url disable

#

user-group system

 group-attribute allow-guest

#

 stp enable

#

interface NULL0

#

interface Vlan-interface5

 ipv6 address 2193::1/64

 portal server portal_v6 method layer3

 portal domain ipv6 H3C.com

 portal nas-ip ipv6 2001::1234

#

interface Vlan-interface6

 ipv6 address 2001::1234/64

 ip address 192.168.3.1 255.255.255.0

#

 

interface GigabitEthernet9/0/16

 port link-mode bridge

 port access vlan 6

#

interface GigabitEthernet9/0/24

 port link-mode bridge

 port access vlan 5

#

interface M-Ethernet0/0/0

#

 load xml-configuration

#

 load tr069-configuration

#

user-interface con 0

user-interface aux 0

 authentication-mode none

 user privilege level 3

user-interface vty 0 17

#

return

Related documentation

·     H3C S12500 Routing Switch Series Security Configuration Guide

·     H3C S12500 Routing Switch Series Security Command Reference

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网