08-Third-Party Server Configuration Examples

HomeSupportDoc SetsDoc PackagesH3C Wireless Products All-in-One-6W10108-Third-Party Server Configuration Examples
02-Cisco ISE Server Configuration Examples
Title Size Download
02-Cisco ISE Server Configuration Examples 3.50 MB

 

H3C Access Controllers

Access Authentication by Cisco ISE Server

Configuration Examples

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Copyright © 2023 New H3C Technologies Co., Ltd. All rights reserved.

No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of New H3C Technologies Co., Ltd.

Except for the trademarks of New H3C Technologies Co., Ltd., any trademarks that may be mentioned in this document are the property of their respective owners.

The information in this document is subject to change without notice.



Introduction

The following information provides examples for configuring H3C access controllers to use a Cisco ISE server to authenticate wireless clients. The examples include configuring Cisco ISE-based 802.1X authentication, MAC authentication, portal authentication, and SSH login HWTACACS authentication.

Software versions used

The following configuration examples were created and verified on the following hardware and software versions:

·     Cisco ISE server running 2.3.0.298.

·     H3C access controller running R5428 or later.

Example: Configuring Cisco ISE-based 802.1X PEAP authentication

Network configuration

As shown in Figure 1, the AP is connected to the AC over the switch and the client accesses the wireless network through the AP.

Configure the devices and server to meet the following requirements:

·     The client must pass 802.1X PEAP authentication to access the wireless network.

·     The ISE server assigns an authorization ACL and an authorization VLAN to the client after the client passes 802.1X PEAP authentication.

Figure 1 Network diagram

 

Procedures

IMPORTANT

IMPORTANT:

This configuration example only covers the major settings related to authenticating the client by 802.1X authentication on the Cisco ISE server. For information about the network connectivity settings, see the manuals for the devices and server.

Make sure the devices and server have network connectivity.

 

Configuring the AC

1.     Configure the AC to use EAP relay to authenticate the 802.1X client.

<AC> system-view

[AC] dot1x authentication-method eap

2.     Configure a RADIUS scheme:

# Create RADIUS scheme ise.

[AC] radius scheme ise

# Specify the ISE server at 8.1.1.18 as the primary authentication server and specify a shared key for secure communication with the server. Make sure the shared key is the same as the shared secret configured on the ISE server.

[AC-radius-ise] primary authentication 8.1.1.18 key cipher $c$3$FpBySjKd6TF17QmPAQ83vNM+mNuZHUw=

# Exclude the domain name from usernames sent to the ISE server.

[AC-radius-ise] user-name-format without-domain

# Specify 191.120.1.56 as the NAS IP address of RADIUS packets sent to the ISE server. Make sure the NAS IP address is the same as that specified on the ISE server for the AC.

[AC-radius-ise] nas-ip 191.120.1.56

[AC-radius-ise] quit

3.     Configure an ISP domain:

# Create ISP domain ise.

[AC] domain ise

# Configure the ISP domain to use RADIUS scheme ise for LAN user authentication and authorization.

[AC-isp-ise] authentication lan-access radius-scheme ise

[AC-isp-ise] authorization lan-access radius-scheme ise

[AC-isp-ise] quit

4.     Configure a service template:

# Create service template ise.

[AC] wlan service-template ise

# Set the SSID of the service template to 000AAA-MACAU.

[AC-wlan-st-ise] ssid 000AAA-MACAU

# Assign clients coming online through the service template to VLAN 71.

[AC-wlan-st-ise] vlan 71

# Set the AKM mode to 802.1X.

[AC-wlan-st-ise] akm mode dot1x

# Specify the AES-CCMP cipher suite, and enable the RSN IE in beacon and probe responses.

[AC-wlan-st-ise] cipher-suite ccmp

[AC-wlan-st-ise] security-ie rsn

# Set the authentication mode to 802.1X authentication and specify authentication domain ise.

[AC-wlan-st-ise] client-security authentication-mode dot1x

[AC-wlan-st-ise] dot1x domain ise

# Enable the service template.

[AC-wlan-st-ise] service-template enable

[AC-wlan-st-ise] quit

5.     Configure a manual AP:

# Configure an AP named ax and specify its model and serial ID.

[AC] wlan ap ax model WA6528

[AC-wlan-ap-ax] serial-id 219801A1LH8188E00011

# Enable radio 1 and bind service template ise to the radio.

[AC-wlan-ap-ax] radio 1

[AC-wlan-ap-ax-radio-1] radio enable

[AC-wlan-ap-ax-radio-1] service-template ise

[AC-wlan-ap-ax-radio-1] quit

[AC-wlan-ap-ax] quit

6.     Configure advanced ACL 3100 and a rule to deny the client from accessing 8.1.1.5.

[AC] acl advanced 3100

[AC-acl-ipv4-adv-3100] rule 1 deny ip destination 8.1.1.5 0

[AC-acl-ipv4-adv-3100] quit

7.     Configure authorization VLAN settings:

# Create VLAN 4094 and VLAN-interface 4094, and assign an IP address to the VLAN interface.

[AC] vlan 4094

[AC-vlan4094] quit

[AC] interface vlan-interface 4094

[AC-Vlan-interface4094] ip address 191.94.0.1 24

[AC-Vlan-interface4094] quit

# Configure DHCP address pool vlan4094 for VLAN 4094.

[AC] dhcp server ip-pool vlan4094

[AC-dhcp-pool-vlan4094] network 191.94.0.0 mask 255.255.255.0

[AC-dhcp-pool-vlan4094] gateway-list 191.94.0.1

[AC-dhcp-pool-vlan4094] dns-list 191.94.0.1

[AC-dhcp-pool-vlan4094] quit

Configuring the ISE server

1.     Create a user group:

a.     On the top navigation bar, select Administration > Identity Management > Groups.

b.     From the left navigation pane, select User Identity Groups.

c.     Click Add.

d.     On the page that opens, set the name to LDF.

e.     Click Submit.

Figure 2 Creating a user group

 

2.     Create a network access user:

a.     On the top navigation bar, select Administration > Identity Management > Identities.

b.     From the left navigation pane, select Users.

c.     Click Add.

d.     On the page that opens, set the name to ldf00001 and password to Ldf123456, and bind the user to user group LDF.

Make sure the password contains uppercase letters, lowercase letters, and digits.

e.     Click Submit.

Figure 3 Creating a network access user

 

3.     Add the AC to the server as a network access device:

a.     On the top navigation bar, select Administration > Network Resources > Network Devices.

b.     Click Add.

c.     Set the name to AC, specify IP address 191.120.1.56, select RADIUS Authentication Settings, and set the shared secret to H3cc.

Make sure the IP address is the same as the NAS IP address of RADIUS packets on the AC.

Make sure the shared secret is the same as the shared key configured on the AC.

d.     Save the configuration.

Figure 4 Adding the AC to the server

 

4.     Configure authentication protocols:

a.     On the top navigation bar, select Policy > Policy Elements > Results.

b.     From the left navigation pane, select Authentication > Allowed Protocols.

c.     Create an allowed protocols service named 1x, and select Allow EAP-TLS and Allow PEAP.

d.     Save the configuration.

Figure 5 Creating an allowed protocols service

 

5.     Configuring an authorization ACL:

a.     On the top navigation bar, select Policy > Policy Elements > Results.

b.     From the left navigation pane, select Authorization > Authorization Profiles.

c.     Click Add.

d.     In the Authorization Profile area, set the name to acl_3100 and select Cisco from the Network Device Profile field. In the Advanced Attributes Settings area, select attribute Radius:Filter-ID and set the attribute value to 3100 (an ACL number).

e.     Save the configuration.

Figure 6 Configuring an authorization ACL

 

6.     Configuring an authorization VLAN:

a.     On the top navigation bar, select Policy > Policy Elements > Results.

b.     From the left navigation pane, select Authorization > Authorization Profiles.

c.     Click Add.

d.     In the Authorization Profile area, set the name to vlan_4094 and select Cisco from the Network Device Profile field. In the Custom Tasks area, select the VLAN option and enter 4094 in the ID/Name field.

e.     Save the configuration.

Figure 7 Configuring an authorization VLAN

 

7.     Configure an authentication and authorization policy set:

a.     On the top navigation bar, select Policy > Policy Sets.

b.     Click the plus icon + under Policy Sets.

c.     Set the policy set name to 1x. Set the conditions name to 1x, select Wired_Dot1x or Wireless Dot1x as the conditions, and select 1x from the Allowed Protocols/Server Sequence list.

Figure 8 Configuring an authentication and authorization policy set

 

d.     Click the icon in the View column for the authentication and authorization policy set.

e.     In the Authorization Policy area, add an authorization policy named acl_vlan. In the Results > Profiles column for the authorization policy, select profiles acl_3100 and vlan_4094.

Figure 9 Configuring an authorization policy

 

f.     Save the configuration.

Verifying the configuration

1.     On the top navigation bar, select Operations > RADIUS > Live Logs. View live log information for online clients.

Figure 10 Viewing live log information for online clients

 

2.     On the top navigation bar, select Operations > RADIUS > Live Sessions. View live session information for online clients.

Figure 11 Viewing live session information for online clients

 

Configuration files

#

vlan 4094

#

dhcp server ip-pool vlan4094

 network 191.94.0.0 mask 255.255.255.0

 gateway-list 191.94.0.1

 dns-list 191.94.0.1

#

interface vlan-interface 4094

 ip address 191.94.0.1 24

#

acl advanced 3100

 rule 1 deny ip destination 8.1.1.5 0

#

radius scheme ise

 primary authentication 8.1.1.19 key cipher $c$3$FpBySjKd6TF17QmPAQ83vNM+mNuZHUw=

 user-name-format without-domain

 nas-ip 191.120.1.56

#

domain ise

 authentication lan-access radius-scheme ise

 authorization lan-access radius-scheme ise

#

wlan service-template ise

 ssid 000AAA-MACAU

 vlan 71

 akm mode dot1x

 cipher-suite ccmp

 security-ie rsn

 client-security authentication-mode dot1x

 dot1x domain ise

 service-template enable

#

wlan ap ax model WA6528

 serial-id 219801A1LH8188E00011

 radio 1

  radio enable

  service-template ise

#

 dot1x authentication-method eap

Example: Configuring Cisco ISE-based MAC authentication

Network configuration

As shown in Figure 12, the AP is connected to the AC over the switch and the client accesses the wireless network through the AP.

To control the client's access to the network resources, configure the devices and server to meet the following requirements:

·     The client must pass MAC authentication to access the wireless network.

·     The client and AP use the PSK AKM mode to secure data packets between them.

·     The ISE server assigns an authorization ACL and an authorization VLAN to the client after the client passes MAC authentication.

Figure 12 Network diagram

 

Procedures

IMPORTANT

IMPORTANT:

This configuration example only covers the major settings related to authenticating the client by MAC authentication on the Cisco ISE server. For information about the network connectivity settings, see the manuals for the devices and server.

Make sure the devices and server have network connectivity.

 

Configuring the AC

1.     Configure a RADIUS scheme:

# Create RADIUS scheme ise.

<AC> system-view

[AC] radius scheme ise

# Specify the ISE server at 8.1.1.18 as the primary authentication server and specify a shared key for secure communication with the server. Make sure the shared key is the same as the shared secret configured on the ISE server.

[AC-radius-ise] primary authentication 8.1.1.18 key cipher $c$3$FpBySjKd6TF17QmPAQ83vNM+mNuZHUw=

# Exclude the domain name from usernames sent to the ISE server.

[AC-radius-ise] user-name-format without-domain

# Specify 191.120.1.56 as the NAS IP address of RADIUS packets sent to the ISE server. Make sure the NAS IP address is the same as that specified on the ISE server for the AC.

[AC-radius-ise] nas-ip 191.120.1.56

[AC-radius-ise] quit

2.     Configure an ISP domain:

# Create ISP domain ise.

[AC] domain ise

# Configure the ISP domain to use RADIUS scheme ise as the default methods for user authentication and authorization.

[AC-isp-ise] authentication default radius-scheme ise

[AC-isp-ise] authorization default radius-scheme ise

[AC-isp-ise] quit

3.     Configure a service template:

# Create service template isemac2.

[AC] wlan service-template isemac2

# Specify an SSID for the service template.

[AC-wlan-st-isemac2] ssid 000AAAMACAU-MAC-CCMP-WPA

# Assign clients coming online through the service template to VLAN 71.

[AC-wlan-st-isemac2] vlan 71

# Set the PSK AKM mode and specify a PSK.

[AC-wlan-st-isemac2] akm mode psk

[AC-wlan-st-isemac2] preshared-key pass-phrase cipher $c$3$XYqokG6I8YoOymukIyvxoJuzFoB+oVJD6exoqw==

# Specify the AES-CCMP cipher suite, and enable the RSN IE in beacon and probe responses.

[AC-wlan-st-isemac2] cipher-suite ccmp

[AC-wlan-st-isemac2] security-ie rsn

# Set the access authentication mode to MAC authentication and specify authentication domain ise.

[AC-wlan-st-isemac2] client-security authentication-mode mac

[AC-wlan-st-isemac2] mac-authentication domain ise

# Enable the service template.

[AC-wlan-st-isemac2] service-template enable

[AC-wlan-st-isemac2] quit

4.     Configure a manual AP:

# Configure an AP named ax and specify its model and serial ID.

[AC] wlan ap ax model WA6528

[AC-wlan-ap-ax] serial-id 219801A1LH8188E00011

# Specify VLAN 1 for the AP.

[AC-wlan-ap-ax] vlan 1

# Enable radio 1 and bind service template isemac2 to the radio.

[AC-wlan-ap-ax] radio 1

[AC-wlan-ap-ax-radio-1] radio enable

[AC-wlan-ap-ax-radio-1] service-template isemac2

[AC-wlan-ap-ax-radio-1] quit

[AC-wlan-ap-ax] quit

5.     Configure advanced ACL 3100 and a rule to deny the client from accessing 8.1.1.5.

[AC] acl advanced 3100

[AC-acl-ipv4-adv-3100] rule 1 deny ip destination 8.1.1.5 0

[AC-acl-ipv4-adv-3100] quit

6.     Configure authorization VLAN settings:

# Create VLAN 4094 and VLAN-interface 4094, and assign an IP address to the VLAN interface.

[AC] vlan 4094

[AC-vlan4094] quit

[AC] interface vlan-interface 4094

[AC-Vlan-interface4094] ip address 191.94.0.1 24

[AC-Vlan-interface4094] quit

# Configure DHCP address pool vlan4094 for VLAN 4094.

[AC] dhcp server ip-pool vlan4094

[AC-dhcp-pool-vlan4094] network 191.94.0.0 mask 255.255.255.0

[AC-dhcp-pool-vlan4094] gateway-list 191.94.0.1

[AC-dhcp-pool-vlan4094] dns-list 191.94.0.1

[AC-dhcp-pool-vlan4094] quit

Configuring the ISE server

1.     Create a user group:

a.     On the top navigation bar, select Administration > Identity Management > Groups.

b.     From the left navigation pane, select User Identity Groups.

c.     Click Add.

d.     On the page that opens, set the name to LDF.

e.     Click Submit.

Figure 13 Creating a user group

 

2.     Create a network access user:

a.     On the top navigation bar, select Administration > Identity Management > Identities.

b.     From the left navigation pane, select Users.

c.     Click Add.

d.     On the page that opens, set the name to ldf00001 and password to Ldf123456, and bind the user to user group LDF.

Make sure the password contains uppercase letters, lowercase letters, and digits.

e.     Click Submit.

Figure 14 Creating a network access user

 

3.     Add the AC to the server as a network access device:

a.     On the top navigation bar, select Administration > Network Resources > Network Devices.

b.     Click Add.

c.     On the page that opens, set the name to AC, specify IP address 191.120.1.56, select RADIUS Authentication Settings, and set the shared secret to H3cc.

Make sure the IP address is the same as the NAS IP address of RADIUS packets on the AC.

Make sure the shared secret is the same as the shared key configured on the AC.

d.     Save the configuration.

Figure 15 Adding the AC to the server

 

4.     Configure authentication protocols:

a.     On the top navigation bar, select Policy > Policy Elements > Results.

b.     From the left navigation pane, select Authentication > Allowed Protocols.

c.     Create an allowed protocols service named mab. In the Authentication Bypass area, select Process Host Lookup. In the Authentication Protocols area, select Allow PAP/ASCII and Allow CHAP.

d.     Save the configuration.

Figure 16 Configuring authentication protocols

 

5.     Configuring an authorization ACL:

a.     On the top navigation bar, select Policy > Policy Elements > Results.

b.     From the left navigation pane, select Authorization > Authorization Profiles.

c.     Click Add.

d.     In the Authorization Profile area, set the name to acl_3100 and select Cisco from the Network Device Profile field. In the Advanced Attributes Settings area, select attribute Radius:Filter-ID and set the attribute value to 3100 (an ACL number).

e.     Save the configuration.

Figure 17 Configuring an authorization ACL

 

6.     Configuring an authorization VLAN:

a.     On the top navigation bar, select Policy > Policy Elements > Results.

b.     From the left navigation pane, select Authorization > Authorization Profiles.

c.     Click Add.

d.     In the Authorization Profile area, set the name to vlan_4094 and select Cisco from the Network Device Profile field. In the Custom Tasks area, select the VLAN option and enter 4094 in the ID/Name field.

e.     Save the configuration.

Figure 18 Configuring an authorization VLAN

 

7.     Configure an authentication and authorization policy set:

a.     On the top navigation bar, select Policy > Policy Sets.

b.     Click the plus icon + under Policy Sets.

c.     Set the policy set name to mab, set the conditions name to mab, and select mab from the Allowed Protocols/Server Sequence list.

Figure 19 Configuring an authentication and authorization policy set

 

d.     Select Wired_MAB or Wireless_MAB as the conditions.

Figure 20 Configuring conditions

 

a.     Click the icon in the View column for the authentication and authorization policy set.

b.     In the Authorization Policy area, add an authorization policy named Authorization Rule 1. In the Results > Profiles column for the authorization policy, select profiles acl_3100 and vlan_4094.

Figure 21 Adding an authorization policy

 

g.     Save the configuration.

Verifying the configuration

1.     On the client, connect to the wireless network and enter the configured username and password. (Details not shown.)

2.     On the AC, verify that the user has come online and the server has assigned the authorization ACL and VLAN to the user.

Figure 22 Viewing online user information

 

Configuration files

#

vlan 4094

#

dhcp server ip-pool vlan4094

 network 191.94.0.0 mask 255.255.255.0

 gateway-list 191.94.0.1

 dns-list 191.94.0.1

#

interface vlan-interface 4094

 ip address 191.94.0.1 24

#

acl advanced 3100

 rule 1 deny ip destination 8.1.1.5 0

#

radius scheme ise

 primary authentication 8.1.1.19 key cipher $c$3$FpBySjKd6TF17QmPAQ83vNM+mNuZHUw=

 user-name-format without-domain

 nas-ip 191.120.1.56

#

domain ise

 authentication default radius-scheme ise

 authorization default radius-scheme ise

#

wlan ap ax model WA6528

 serial-id 219801A1LH8188E00011

#

wlan service-template isemac2

 ssid 000AAAMACAU-MAC-CCMP-WPA

 vlan 71

 akm mode psk

 preshared-key pass-phrase cipher $c$3$XYqokG6I8YoOymukIyvxoJuzFoB+oVJD6exoqw==

 cipher-suite ccmp

 security-ie rsn

 client-security authentication-mode mac

 mac-authentication domain ise

 service-template enable

#

wlan ap ax model WA6528

 serial-id 219801A1LH8188E00011

 vlan 1

 radio 1

  radio enable

  service-template isemac2

Example: Configuring Cisco ISE-based portal authentication

Network configuration

As shown in Figure 23, the AP is connected to the AC over the switch and the client accesses the wireless network through the AP.

Configure the devices and server to meet the following requirements:

·     The client must pass direct portal authentication to access the wireless network.

·     The ISE server acts as the portal and RADIUS servers.

Figure 23 Network diagram

 

Restrictions and guidelines

Make sure file ise_h3c.zip has been stored in the root directory of the storage medium on the AC.

Procedures

IMPORTANT

IMPORTANT:

This configuration example only covers the major settings related to authenticating the client by portal authentication on the Cisco ISE server. For information about the network connectivity settings, see the manuals for the devices and server.

Make sure the devices and server have network connectivity.

 

Configuring the AC

1.     Configure an ISP domain:

# Create ISP domain ise.

<H3C> system-view

[H3C] domain ise

# Configure the ISP domain to use RADIUS scheme ise for portal user authentication, authorization, and accounting.

[H3C-isp-ise] authentication portal radius-scheme ise

[H3C-isp-ise] authorization portal radius-scheme ise

[H3C-isp-ise] accounting portal radius-scheme ise

[H3C-isp-ise] quit

2.     Configure a RADIUS scheme:

# Create RADIUS scheme ise.

[H3C] radius scheme ise

# Specify the ISE server at 100.18.0.200 as the primary authentication and accounting servers and specify a shared key for secure communication with the ISE server. Make sure the shared key is the same as the shared secret configured on the ISE server.

[H3C-radius-ise]primary authentication 100.18.0.200 key simple 12345678

[H3C-radius-ise]primary accounting 100.18.0.200 key simple 12345678

# Exclude the domain name from usernames sent to the ISE server.

[H3C-radius-ise]user-name-format without-domain

3.     Configure portal authentication:

# Enable automatic logout for wireless portal users.

[H3C] portal user-logoff after-client-offline enable

# Specify VLAN-interface 1000 on the AC for clients to access during third-party authentication.

[H3C] portal client-gateway interface vlan-interface 1000

# Permit packets destined for the AC.

[H3C] portal free-rule 2 destination ip 6.6.4.10 255.255.255.255

# Permit packets destined for the RADIUS server.

[H3C] portal free-rule 5 destination ip 100.18.0.200 255.255.255.255

# Configure the Web server.

 

 

NOTE:

For more information about the URL of the Web server, see portal settings in "Configuring the ISE server."

 

[H3C] portal web-server ise

[H3C-portal-websvr-ise] url https://100.18.0.200:8443/portal/PortalSetup.action?portal=f0ae43f0-7159-11e7-a355-005056aba474

[H3C-portal-websvr-ise] server-type ise

# Create an HTTP-based local portal Web service and an HTTPS-based local portal Web service. Specify file ise_h3c.zip as the default authentication page file for local portal authentication. Make sure the file has been stored in the root directory of the storage medium on the AC.

[H3C] portal local-web-server http

[H3C-portal-local-websvr-http] default-logon-page ise_h3c.zip

[H3C] portal local-web-server https

[H3C-portal-local-websvr-https] default-logon-page ise_h3c.zip

4.     Configure and enable a service template.

[H3C] wlan service-template iseportal

[H3C-wlan-st-iseportal] ssid h3c-ise-portal

[H3C-wlan-st-iseportal] portal enable method direct

[H3C-wlan-st-iseportal] portal domain ise

[H3C-wlan-st-iseportal] portal bas-ip 6.6.4.10

[H3C-wlan-st-iseportal] portal apply web-server ise

[H3C-wlan-st-iseportal] service-template enable

[H3C-wlan-st-iseportal] quit

5.     Configure a manual AP and bind the service template to radio 1 on the AP.

[H3C] wlan ap ap1 model WA6330

[H3C-wlan-ap-ap1] serial-id 219801A23V8209E0043Y

[H3C-wlan-ap-ap1] radio 1

[H3C-wlan-ap-ap1-radio-1] service-template iseportal vlan 234

[H3C-wlan-ap-ap1-radio-1] radio enable

[H3C-wlan-ap-ap1-radio-1] quit

[H3C-wlan-ap-ap1] quit

Configuring the ISE server

1.     Create a device profile:

a.     On the top navigation bar, select Administration > Network Resources > Network Device Profiles.

b.     Click Add.

c.     Set the device profile name to H3C, select Other as the vendor, and select RADIUS in the Supported Protocols area.

d.     Save the configuration.

Figure 24 Creating a device profile

 

2.     Add the AC to the server as a network access device:

a.     On the top navigation bar, select Administration > Network Resources > Network Devices.

b.     Click Add.

c.     On the page that opens, set the name to AC, select device profile H3C, specify IP address 6.6.4.10, select RADIUS Authentication Settings, and set the shared secret to 12345678.

Make sure the IP address is the same as the NAS IP address of RADIUS packets on the AC.

Make sure the shared secret is the same as the shared key configured on the AC.

d.     Click Submit.

Figure 25 Adding the AC to the server

 

3.     Create a user group:

a.     On the top navigation bar, select Administration > Identity Management > Groups.

b.     From the left navigation pane, select User Identity Groups.

c.     Click Add.

d.     On the page that opens, set the name to H3C.

e.     Click Submit.

Figure 26 Creating a user group

 

4.     Create a network access user:

a.     On the top navigation bar, select Administration > Identity Management > Identities.

b.     From the left navigation pane, select Users.

c.     Click Add.

d.     On the page that opens, set the name to h3c001 and password to H3c123456, and bind the user to user group H3C.

Make sure the password contains uppercase letters, lowercase letters, and digits.

e.     Click Submit.

Figure 27 Creating a network access user

 

5.     Configure authentication protocols:

a.     On the top navigation bar, select Policy > Policy Elements > Results.

b.     From the left navigation pane, select Authentication > Allowed Protocols.

c.     Click Default Network Access and select Allow CHAP.

d.     Save the configuration.

Figure 28 Configuring authentication protocols

 

6.     Configure portal settings:

a.     On the top navigation bar, select Work Centers > Guest Access > Portals & Components.

b.     From the left navigation pane, select Guest Portals.

c.     On the page that opens, click Self-Registered Guest Portal (default). Use the default settings, and then click Portal test URL. The address in the address bar of the window that opens is the address of the Web server.

Figure 29 Configuring portal settings

 

Verifying the configuration

# On a mobile phone, connect to the wireless service with SSID h3c-ise-portal. When the Cisco authentication login page opens, enter the correct username and password, and then click Sign On. On the page that opens, click Continue. Verify that the login succeeds.

Figure 30 Verifying the configuration

 

 

# On the AC, display online portal user information.

[H3C] display portal user all

Total portal users: 1

Username: h3c001

  AP name: ap1

  Radio ID: 1

  SSID: h3c-ise-portal

  Portal server: N/A

  State: Online

  VPN instance: N/A

  MAC               IP                      VLAN    Interface

  9cbc-f0e7-50f0  10.249.56.169         234     WLAN-BSS1/0/4

  Authorization information:

    DHCP IP pool: N/A

    User profile: N/A

    Session group profile: N/A

    ACL number: N/A

    Inbound CAR: N/A

    Outbound CAR: N/A

             Web URL: N/A

Configuration files

#

vlan 234

#

vlan 1000

#

wlan service-template iseportal

 ssid h3c-ise-portal

 portal enable method direct

 portal domain ise

 portal bas-ip 6.6.4.10

 portal apply web-server ise

 service-template enable

#

interface Vlan-interface1000

 ip address 6.6.4.10 255.255.255.0

#

radius scheme ise

 primary authentication 100.18.0.200 key cipher $c$3$oTPE3ir9uYI718iL9tFmRoaoDu7

DmtlZ2gZC

 primary accounting 100.18.0.200 key cipher $c$3$/Vcna21JU94hHKqWvBTrACCGhUm8iPi

B5Vp7

 user-name-format without-domain

 nas-ip 6.6.4.10

#

domain ise

 authentication portal radius-scheme ise

 authorization portal radius-scheme ise

 accounting portal radius-scheme ise

#

 portal user-logoff after-client-offline enable

 portal client-gateway interface Vlan-interface1000

 portal free-rule 2 destination ip 6.6.4.10 255.255.255.255

 portal free-rule 5 destination ip 100.18.0.200 255.255.255.255

#

portal web-server ise

 url https://100.18.0.200:8443/portal/PortalSetup.action?portal=f0ae43f0-7159-11e7-a355-005056aba474

 server-type ise

#

portal local-web-server http

 default-logon-page ise_h3c.zip

#

portal local-web-server https

 default-logon-page ise_h3c.zip

#

wlan ap ap1 model WA6330

 serial-id 219801A23V8209E0043Y

 radio 1

  radio enable

  service-template iseportal vlan 234

 radio 2

 radio 3

#

Example: Configuring Cisco ISE-based HWTACACS authentication for SSH login

Network configuration

As shown in Figure 31, the PC is connected to the AC over the switch. The ISE server performs HWTACACS authentication for the client when the client logs in to the AC through SSH.

The client has the following permissions after it logs in to the AC through SSH:

·     Has the permissions of the level-1 user role.

·     Cannot access the display cpu-usage command.

Figure 31 Network diagram

 

Procedures

IMPORTANT

IMPORTANT:

This configuration example only covers the major settings related to authenticating SSH login by HWTACACS authentication on the Cisco ISE server. For information about the network connectivity settings, see the manuals for the devices and server.

Make sure the devices and server have network connectivity.

 

Configuring the AC

1.     Configure an HWTACACS scheme:

# Create HWTACACS scheme tac.

<AC> system-view

[AC] hwtacacs scheme tac

# Specify the ISE server at 8.1.1.19 as the primary authentication, authorization, and accounting servers and specify a shared key for secure communication with the ISE server. Make sure the shared key is the same as the shared secret configured on the ISE server.

[AC-hwtacacs-tac] primary authentication 8.1.1.19 key cipher $c$3$8zfqwa07HmNhvjWvEeixw5NGEGo82r/htRg=

[AC-hwtacacs-tac] primary authorization 8.1.1.19 key cipher $c$3$fARZu6PskfKoULCy46SHq0hVbNHakBUPleE=

[AC-hwtacacs-tac] primary accounting 8.1.1.19 key cipher $c$3$tBnfBlfHnO9YHBko2ZjMpzpuRqSyN3wdDPA=

# Exclude the domain name from usernames sent to the ISE server.

[AC-hwtacacs-tac] user-name-format without-domain

# Specify 191.2.1.56 as the NAS IP address of HWTACACS packets sent to the ISE server. Make sure the NAS IP address is the same as that specified on the ISE server for the AC.

[AC-hwtacacs-tac] nas-ip 191.2.1.56

[AC-hwtacacs-tac] quit

2.     Configure an ISP domain:

# Create ISP domain system.

[AC] domain system

# Configure the ISP domain to use HWTACACS scheme tac for login user authentication and authorization and to not perform accounting for login users.

[AC-isp-system] authentication login hwtacacs-scheme tac

[AC-isp-system] authorization login hwtacacs-scheme tac

[AC-isp-system] accounting login none

# Configure the ISP domain to use HWTACACS scheme tac for command authorization and accounting.

[AC-isp-system] authorization command hwtacacs-scheme tac

[AC-isp-system] accounting command hwtacacs-scheme tac

[AC-isp-system] quit

3.     Create local RSA and DSA key pairs and enable the SSH server.

[AC] public-key local create rsa

[AC] public-key local create dsa

[AC] ssh server enable

4.     Enable the default role feature.

[AC] role default-role enable

5.     Enable command authorization and accounting.

[AC] line vty 0 31

[AC-line-vty0-31] authentication-mode scheme

[AC-line-vty0-31] command authorization

[AC-line-vty0-31] command accounting

[AC-line-vty0-31] quit

Configuring the ISE server

1.     Create a network access user:

a.     On the top navigation bar, select Work Centers > Device Administration > Identities.

b.     From the left navigation pane, select Users.

c.     Click Add.

d.     On the page that opens, set the name to ldflogin and password to Ldf654321.

Make sure the password contains uppercase letters, lowercase letters, and digits.

e.     Click Submit.

Figure 32 Creating a network access user

 

2.     Add the AC to the server as a network access device:

a.     On the top navigation bar, select Work Centers > Device Administration > Network Resources.

b.     From the left navigation pane, select Network Devices.

c.     Click Add.

d.     On the page that opens, set the name to AC2, specify IP address 191.2.1.56, select TACACS Authentication Settings, and set the shared secret to H3cc.

Make sure the IP address is the same as the NAS IP address of HWTACACS packets on the AC.

Make sure the shared secret is the same as the shared key configured on the AC.

e.     Save the configuration.

Figure 33 Adding the AC to the server

 

3.     Configure authentication protocols:

a.     On the top navigation bar, select Work Centers > Device Administration > Policy Elements.

b.     From the left navigation pane, select Results > Allowed Protocols.

c.     Use the default allowed protocols service named Default Device Admin.

Figure 34 Configuring authentication protocols

 

4.     Configure a TACACS profile:

a.     On the top navigation bar, select Work Centers > Device Administration > Policy Elements.

b.     From the left navigation pane, select Results > TACACS Profiles.

c.     Click Add.

d.     On the page that opens, set the name to ldftacas, select Default Privilege, and set the default privilege to level 1.

e.     Save the configuration.

Figure 35 Configuring a TACACS profile

 

5.     Configure a TACACS command set:

a.     On the top navigation bar, select Work Centers > Device Administration > Policy Elements.

b.     From the left navigation pane, select Results > TACACS Command Sets.

c.     Click Add.

d.     On the page that opens, set the name to ldftacacs. In the Commands area, select Permit any command that is not listed below and deny the display cpu-usage command.

e.     Save the configuration.

Figure 36 Configuring a TACACS command set

 

6.     Configure an authentication and authorization policy set:

a.     On the top navigation bar, select Work Centers > Device Administration > Device Admin Policy Sets.

b.     Click the plus icon + under Policy Sets.

c.     Set the policy set name to a.

Figure 37 Configuring an authentication and authorization policy set

 

d.     Click the icon in the View column for the authentication and authorization policy set named a.

e.     In the Authorization Policy area, add an authorization policy named Authorization Rule 1. In the Results > Command Sets column for the authorization policy, select command set ldftacacs. In the Results > Shell Profiles column for the authorization policy, select TACACS profile ldftacas.

Figure 38 Adding an authorization policy

 

f.     Save the configuration.

7.     Enable device access authentication service:

a.     On the top navigation bar, select Administration > System > Deployment.

b.     Select the ISE node, and then click Edit.

Figure 39 Selecting the ISE node and clicking Edit

 

c.     On the page that opens, select the Enable Device Admin Service option and save the configuration.

Figure 40 Editing the ISE node

 

Verifying the configuration

1.     Verify that the client can log in to the AC through SSH after it provides the correct username and password. (Details not shown.)

2.     Verify that the client can access only commands permitted by the level-1 role. For example, the client can access the display memory command. Verify that the client cannot access the display cpu-usage command.

Figure 41 Verifying the access permissions

 

Configuration files

#

hwtacacs scheme tac

 primary authentication 8.1.1.19 key cipher $c$3$8zfqwa07HmNhvjWvEeixw5NGEGo82r/htRg=

 primary authorization 8.1.1.19 key cipher $c$3$fARZu6PskfKoULCy46SHq0hVbNHakBUPleE=

 primary accounting 8.1.1.19 key cipher $c$3$tBnfBlfHnO9YHBko2ZjMpzpuRqSyN3wdDPA=

 user-name-format without-domain

 nas-ip 191.2.1.56

#

domain system

 authentication login hwtacacs-scheme tac

 authorization login hwtacacs-scheme tac

 accounting login none

 authorization command hwtacacs-scheme tac

 accounting command hwtacacs-scheme tac

#

public-key local create rsa

#

public-key local create dsa

#

ssh server enable

#

role default-role enable

#

line vty 0 31

 authentication-mode scheme

 command authorization

 command accounting

Example: Configuring Cisco ISE-based LDAP authentication

Network configuration

As shown in Figure 42:

·     The AC is connected to core switch Switch 2, and it can reach the ISE server and the LDAP server.

·     The AP is connected to access switch Switch 1.

·     The AC uses the usernames and passwords stored on the LDAP server to authenticate 802.1X users when the users access the network.

Figure 42 Network diagram

 

Restrictions and guidelines

·     Use the serial ID labeled on the AP's rear panel to specify an AP.

·     Make sure the LDAP server has been set up. In this example, the Active Directory of Microsoft Windows Server 2012 is used to illustrate the basic LDAP server configuration.

Procedures

Configuring the AC

1.     Configure a RADIUS scheme:

# Create RADIUS scheme imc and enter its view.

[AC] radius scheme ise

# Specify the server at 192.168.106.200 as the primary authentication server and set the shared key to a plaintext string of 12345678.

[AC-radius-ise] primary authentication 192.168.106.200 key simple 12345678

# Specify the server at 192.168.106.200 as the primary accounting server and set the shared key to a plaintext string of 12345678.

[AC-radius-ise] primary accounting 192.168.106.200 key simple 12345678

# Exclude the domain name from the usernames sent to the server.

[AC-radius-ise] user-name-format without-domain

# Specify IP address 192.168.105.36 as the source IP address of outgoing RADIUS packets.

[AC-radius-ise] nas-ip 192.168.105.36

[AC-radius-ise] quit

2.     Configure the AC to use EAP relay to authenticate 802.1X clients.

[AC] dot1x authentication-method eap

3.     Configure an ISP domain:

# Create ISP domain ise and enter its view.

[AC] domain ise

# Configure the ISP domain to use RADIUS scheme ise for LAN user authentication and authorization and not perform accounting for LAN users.

[AC-isp-ise] authentication lan-access radius-scheme ise

[AC-isp-ise] authorization lan-access radius-scheme ise

[AC-isp-ise] accounting lan-access none

[AC-isp-ise] quit

4.     Configure a service template:

# Create service template h3c-ise-ldap and enter its view.

[AC] wlan service-template h3c-ise-ldap

# Set the SSID of the service template to h3c-ise-ldap.

[AC-wlan-st-h3c-ise-ldap] ssid h3c-ise-ldap

# Set the AKM mode to 802.1X authentication.

[AC-wlan-st-h3c-ise-ldap] akm mode dot1x

# Assign clients that come online through the service template to VLAN 33.

[AC-wlan-st-h3c-ise-ldap] vlan 33

# Set the cipher suite to CCMP and enable the RSN-IE in beacon and probe responses.

[AC-wlan-st-h3c-ise-ldap] cipher-suite ccmp

[AC-wlan-st-h3c-ise-ldap] security-ie rsn

# Set the access authentication mode to 802.1X authentication.

[AC-wlan-st-h3c-ise-ldap] client-security authentication-mode dot1x

# Specify ISP domain ise as the 802.1X authentication domain.

[AC-wlan-st-h3c-ise-ldap] dot1x domain ise

# Enable the service template.

[AC-wlan-st-h3c-ise-ldap] service-template enable

[AC-wlan-st-h3c-ise-ldap] quit

5.     Bind service template h3c-ise-ldap to radio 1 on manual AP ap1.

[AC] wlan ap ap1 model WA6622

[AC-wlan-ap-ap1] radio 1

[AC-wlan-ap-ap1] radio enable

[AC-wlan-ap-ap1] service-template h3c-ise-ldap

Configuring the LDAP server (adding a user account)

1.     On the LDAP server, select Start > Control Panel > Administrative Tools.

2.     Double-click Active Directory Users and Computers.

The Active Directory Users and Computers window is displayed.

Figure 43 Active Directory Users and Computers window

 

3.     From the navigation pane, click Users under the test.com node.

Figure 44 Users window

 

4.     Right-click Users, and select New > User from the shortcut menu to display the dialog box for adding a user.

Figure 45 Opening the dialog box for adding a user

 

5.     In the dialog box, set the first name, full name, and user logon name to h3c, and then click Next.

Figure 46 Entering the first name, full name, and user logon name

 

6.     In the dialog box that opens, configure and confirm the password of the user, select options as needed, and click Next.

Figure 47 Setting the user's password

 

7.     Finish creating the user.

Figure 48 Finishing creating the user

 

8.     From the navigation pane, click Users under the test.com node. In the right pane, right-click user h3c and select Properties.

Figure 49 Selecting the Properties option for the user

 

9.     In the dialog box that opens, click the Member Of tab, and then click Add.

Figure 50 Opening the dialog box for adding the user to a user group

 

10.     In the Select Groups dialog box, enter Users in the Enter the object names to select field, and click OK.

User h3c is added to group Users.

Figure 51 Adding user h3c to group Users

 

Configuring the ISE server

1.     Create a network device profile:

a.     On the top navigation bar, select Administration > Network Resources > Network Device Profiles.

b.     Select HPWireless, and then click Duplicate to open the page for adding a network device profile.

Figure 52 Network Device Profiles page

 

c.     Set the profile name to HPWireless_copy-2022, select RADIUS in the Supported Protocols area, and then click Save.

Figure 53 Configuring the network device profile

 

2.     Add the AC to the server as a network access device:

a.     On the top navigation bar, select Administration > Network Resources > Network Devices.

b.     Click Add.

c.     On the page that opens, set the name to 3510, specify IP address 192.168.105.36, and select device profile HPWireless_copy-2022.

Make sure the IP address on the ISE server is the same as the source IP address of outgoing RADIUS packets configured in the RADIUS scheme on the AC.

Figure 54 Adding the AC to the server as a network access device

 

d.     Configure the shared secret. Make sure the shared secret is the same as the shared key configured in the RADIUS scheme on the AC.

Figure 55 Configuring the shared secret

 

3.     Add the LDAP server to the ISE server:

a.     On the top navigation bar, click Administration > Identity Management > External Identity Sources.

b.     From the left navigation pane, select LDAP.

c.     Click Add.

Figure 56 Opening the page for adding an LDAP server

 

d.     On the General tab, configure the LDAP server name and select Novell eDirectory from the schema list.

Figure 57 Configuring the LDAP server name

 

e.     Click the Connection tab. On this tab, enter the IP address and port number of the LDAP server. By default, the port number is 389. You do not need to change the port number. Select Authenticated Access in the Access field, set the admin DN to cn=administrator,cn=users,dc=test,dc=com, and configure the password of the administrator on the LDAP server as the password.

Figure 58 Configuring LDAP server parameters

 

f.     Click Test Bind to Server to test the connectivity between the ISE server and the LDAP server. The ISE server will display a message to indicate whether the binding is successful.

Figure 59 Testing the connectivity between the ISE server and the LDAP server

 

g.     Click the Directory Organization tab, and enter DC=test,DC=com in both the Subject Search Base and Group Search Base fields.

Figure 60 Directory Organization tab

 

4.     Configure authentication protocols:

a.     On the top navigation bar, select Policy > Policy Elements > Results.

b.     From the left navigation pane, select Authentication > Allowed Protocols.

c.     Click Add.

Figure 61 Adding an allowed protocol service

 

d.     Set the name to ldap, and select only PAP/ASCII and PEAP-GTC from the authentication protocol list, as shown in Figure 62 and Figure 63.

Figure 62 Configuring a name for the allowed protocol service and selecting allowed authentication protocols

 

Figure 63 Selecting allowed authentication protocols

 

5.     Configure an authentication and authorization policy set:

a.     On the top navigation bar, select Policy > Policy Sets.

b.     Click the plus icon + under Policy Sets.

c.     Set the policy set name to ldap, set the Conditions field to wireless-connect, and select ldap from the Allowed Protocols/Server Sequence list.

d.     Click Save.

Figure 64 Configuring an authentication and authorization policy set

 

e.     In the Conditions Studio dialog box, select wireless-connect as the conditions. In the Editor area, set the Radius·NAS-Port-Type field to Wireless-IEEE 802.11 to match wireless access users.

Figure 65 Configuring match conditions

 

f.     Click the icon in the View column for the authentication and authorization policy set.

Figure 66 Opening the page for configuring authentication and authorization settings

 

g.     In the Authentication Policy (1) area, select ad (LDAP server name) in the Use column. The ISE server will use the LDAP server as the database for identity authentication. For more information about the LDAP server configuration, see step 3.

Figure 67 Specifying the LDAP server as the identity authentication database

 

h.     In the Authorization Policy (1) area, set the results to PermitAccess, and then click Save.

Figure 68 Configuring the authorization results

 

Verifying the configuration

# Use a wireless endpoint to connect to the wireless network. On the endpoint, use username h3c to initiate 802.1X authentication.

The configuration for connecting to the wireless network varies by endpoint operating system.

·     On an Android endpoint, select PEAP as the EAP method and select GTC for phase 2 authentication in addition to entering the username and password.

·     On an IOS or MAC OS endpoint, you only need to enter the username and password.

·     On a Windows endpoint, you need to install the iNode client, configure wireless connection settings, and select the EAP-GTC authentication method from 802.1X properties, in addition to entering the username and password.

# On the AC, display online 802.1X user information.

[AC] display dot1x connection

Total connections: 1

User MAC address                   : b4a5-acd5-135d

AP name                            : ap1

Radio ID                           : 1

SSID                               : h3c-ise-ldap

BSSID                              : f474-88c3-60a5

Username                           : h3c

Anonymous username                 : N/A

Authentication domain              : ise

IPv4 address                       : 174.33.0.3

Authentication method              : EAP

Initial VLAN                       : 33

Authorization VLAN                 : 33

Authorization ACL number           : N/A

Authorization user profile         : N/A

Authorization CAR                  : N/A

Authorization URL                  : N/A

Authorization IPv6 URL             : N/A

Termination action                 : N/A

Session timeout last from          : N/A

Session timeout period             : N/A

Online from                        : 2022/07/28 19:34:24 

Online duration                    : 0h 3m 42s

# On the ISE server, view authentication success logs to verify that the endpoint has passed authentication through the username and password stored on the LDAP server.

Figure 69 Viewing authentication success logs on the ISE server (1)

 

Figure 70 Viewing authentication success logs on the ISE server (2)

 

Configuration files

#

wlan service-template h3c-ise-ldap

 ssid h3c-ise-ldap

 akm mode dot1x

 vlan 33

 cipher-suite ccmp

 security-ie rsn

 client-security authentication-mode dot1x

 dot1x domain ise

 service-template enable

#

interface Vlan-interface1000

 ip address 6.6.4.10 255.255.255.0

#

radius scheme ise

 primary authentication 192.168.106.200 key simple 12345678

 primary accounting 192.168.106.200 key simple 12345678

 user-name-format without-domain

 dot1x authentication-method eap

 nas-ip 192.168.105.36

#

domain ise

 authentication lan-access radius-scheme ise

 authorization lan-access radius-scheme ise

 accounting lan-access none

#

wlan ap ap1 model WA6622

 serial-id 219801A23V8209E0043Y

 radio 1

  radio enable

  service-template h3c-ise-ldap

 radio 2

 radio 3

#

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网