F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices Access Control Configuration Guide-6PW100

177
Figure 132 Network diagram
396BConfiguration prerequisites
Configure IP addresses for the host, firewall, and servers as shown in 686HFigure 132 and make sure they
can reach each other before extended portal is enabled.
Configure the RADIUS server properly to provide authentication and accounting functions for users.
397BConfiguration procedure
1. Configure a RADIUS scheme:
# Create a RADIUS scheme named rs1 and enter its view.
<Firewall> system-view
[Firewall] radius scheme rs1
# Set the server type for the RADIUS scheme. When using the IMC server, set the server type to
extended.
[Firewall-radius-rs1] server-type extended
# Specify the primary authentication server and primary accounting server, and configure the keys
for communication with the servers.
[Firewall-radius-rs1] primary authentication 192.168.0.112
[Firewall-radius-rs1] primary accounting 192.168.0.112
[Firewall-radius-rs1] key accounting radius
[Firewall-radius-rs1] key authentication radius
[Firewall-radius-rs1] user-name-format without-domain
# Configure the IP address of the security policy server.
[Firewall-radius-rs1] security-policy-server 192.168.0.113
[Firewall-radius-rs1] quit
2. Configure an authentication domain:
# Create an ISP domain named dm1 and enter its view.
[Firewall] domain dm1
# Configure AAA methods for the ISP domain.
[Firewall-isp-dm1] authentication portal radius-scheme rs1
[Firewall-isp-dm1] authorization portal radius-scheme rs1
[Firewall-isp-dm1] accounting portal radius-scheme rs1
[Firewall-isp-dm1] quit