12-Security Configuration Guide

HomeSupportRoutersCR16000-F SeriesConfigure & DeployConfiguration GuidesH3C CR16000-F Routers Configuration Guides-Release795x-6W10012-Security Configuration Guide
18-DAE proxy configuration
Title Size Download
18-DAE proxy configuration 49.13 KB

Configuring DAE proxy

About DAE proxy

The DAE proxy feature enables the device to act as the DAE proxy to forward DAE requests and responses between DAE clients and DAE servers.

DAE

Dynamic Authorization Extensions (DAE) to RADIUS is used to disconnect user sessions or change authorization information for online users. It uses the client/server model.

·          A DAE client resides on a RADIUS server or a separate host. It initiates DAE requests.

·          A DAE server is typically a NAS device. It receives DAE requests from DAE clients and sends DAE responses to DAE clients.

DAE packets deliver online user information. The users can be uniquely identified by session ID, and are matched by username, user IP address, or session ID. For more information about DAE packets, see Table 1.

Table 1 DAE packet categories and types

Category

Function

DAE request

DAE response

Disconnect Message (DM)

Disconnect sessions of online users.

Disconnect-Request (DM_REQ)

·         Disconnect-Acknowledgment (DM_ACK)

·         Disconnect-Negative Acknowledgment (DM_NAK)

Change of Authorization (CoA) message

Change authorization information of online users.

CoA-Request (COA_REQ)

·         CoA-Acknowledgment (COA_ACK)

·         CoA-Negative Acknowledgment (COA_NAK)

 

How DAE proxy works

DAE proxy uses a fixed UDP port to listen to DAE requests from DAE clients and forward DAE responses to DAE clients. At the same time, DAE proxy dynamically enables ephemeral UDP ports to forward DAE requests to DAE servers and receive DAE responses from DAE servers.

The following describes how DAE proxy works:

1.        After a user passes authentication and comes online, the DAE client might send a DAE request to the DAE proxy.

2.        The DAE proxy searches for the shared key for the source IP address and VPN instance in the request, and uses the key to verify the Authenticator field.

¡  If the shared key is not found or the verification fails, the DAE proxy discards the request.

¡  If the verification succeeds, the DAE proxy creates an ephemeral port to forward the request to the DAE servers in the same VPN as the DAE client.

3.        The DAE server resolves the request and deletes user information or changes user authorization information as required. Then, the DAE server encapsulates the processing result in a response and sends the response to the DAE proxy.

4.        Upon receiving the response at the ephemeral port, the DAE proxy performs the following tasks:

a.    Searches for the shared key by the IP address and VPN instance of the DAE client.

b.    Uses the shared key to recalculate and replace the Authenticator field in the response.

c.    Sends the response to the DAE client.

DAE proxy waits 10 seconds for the response after it forwards a request. When the timer expires, the DAE proxy ignores the response and does not send any responses to the DAE client.

Protocols and standards

RFC 5176, Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS)

Prerequisites

Before you configure DAE proxy, perform the following tasks:

·          Perform the following tasks on the DAE server:

¡  Configure DAE client information.

¡  (Optional.) Specify the DAE request listening port. This port must be the same as the DAE server listening port configured on the DAE proxy.

¡  (Optional.) Configure a trusted IP address for the RADIUS DAE client.

For more information about DAE server configuration, see AAA configuration in Security Configuration Guide.

Procedure

1.        Enter system view.

system-view

2.        Enable DAE proxy and enter DAE proxy view.

radius dynamic-author proxy

3.        Configure a DAE client.

client { ip ipv4-address | ipv6 ipv6-address } [ vpn-instance vpn-instance-name ] [ key { cipher | simple } string ]

By default, no DAE clients are configured.

You can configure multiple DAE clients. The DAE proxy forwards DAE requests from only DAE clients that are configured by using this command.

4.        Specify the UDP port for listening to DAE requests from DAE clients.

listen-port port-number

By default, the listening port for DAE requests is 3799.

To prevent loss of DAE requests, disable DAE proxy before you change the listening port.

5.        Configure a DAE server.

server { ip ipv4-address | ipv6 ipv6-address } [ vpn-instance vpn-instance-name ]

By default, no DAE servers are configured.

You can configure multiple DAE servers. The DAE proxy forwards DAE requests to and receives DAE responses from only DAE servers that are configured by using this command.

6.        Configure the DAE server listening port.

server port dest-port

By default, the DAE server listening port is 3799.

To prevent loss of DAE response packets, disable DAE proxy before you modify this port setting.

Display and maintenance commands for DAE proxy

Execute display commands in any view and reset commands in user view.

 

Task

Command

Display DAE proxy settings and statistics.

display radius dynamic-author proxy

Clear DAE proxy statistics.

reset radius dynamic-author proxy statistics

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网