R3721-F3210-F3171-HP High-End Firewalls Access Control Configuration Guide-6PW101
134
# Specify the primary authentication server and primary accounting server, and configure the keys
for communication with the servers.
[Firewall-radius-rs1] primary authentication 192.168.0.113
[Firewall-radius-rs1] primary accounting 192.168.0.113
[Firewall-radius-rs1] key authentication radius
[Firewall-radius-rs1] key accounting radius
# Specify that the ISP domain name should not be included in the username sent to the RADIUS
server.
[Firewall-radius-rs1] user-name-format without-domain
[Firewall-radius-rs1] quit
2. Configure an authentication domain on the Firewall.
# Create an ISP domain named dm1 and enter its view.
[Firewall] domain dm1
# Configure AAA methods for the ISP domain.
[Firewall-isp-dm1] authentication portal radius-scheme rs1
[Firewall-isp-dm1] authorization portal radius-scheme rs1
[Firewall-isp-dm1] accounting portal radius-scheme rs1
[Firewall-isp-dm1] quit
# Configure dm1 as the default ISP domain for all users. Then, if a user enters a username without
any ISP domain at logon, the authentication and accounting methods of the default domain will be
used for the user.
[Firewall] domain default enable dm1
3. Configure portal authentication on the Firewall.
# Configure the portal server as follows:
{ Name: newpt
{ IP address: 192.168.0.111
{ Key: portal
{ Port number: 50100
{ U R L : h t t p : / / 19 2.16 8 . 0 .111:8080/portal.
[Firewall] portal server newpt ip 192.168.0.111 key portal port 50100 url
http://192.168.0.111:8080/portal
# Configure the Firewall as a DHCP relay agent, and enable the IP address check function.
[Firewall] dhcp enable
[Firewall] dhcp relay server-group 0 ip 192.168.0.112
[Firewall] interface GigabitEthernet 0/2
[Firewall–GigabitEthernet0/2] ip address 20.20.20.1 255.255.255.0
[Firewall–GigabitEthernet0/2] ip address 10.0.0.1 255.255.255.0 sub
[Firewall-GigabitEthernet0/2] dhcp select relay
[Firewall-GigabitEthernet0/2] dhcp relay server-select 0
[Firewall-GigabitEthernet0/2] dhcp relay address-check enable
# Enable re-DHCP portal authentication on the interface connecting the host.
[Firewall–GigabitEthernet0/2] portal server newpt method redhcp
[Firewall–GigabitEthernet0/2] quit