R2511-HP MSR Router Series Security Configuration Guide(V5)
330
Figure 102 Network diagram
Configuration prerequisites and guidelines
• Configure IP addresses for the host, routers, and servers as shown in Figure 102 and make sure that
routes are available between devices.
• Configure the RADIUS server correctly to provide authentication/authorization functions for users.
• Make sure the IP address of the portal device added on the portal server is the IP address of the
interface connecting users (20.20.20.1 in this example), and the IP address group associated with
the portal device is the network segment where the users reside (8.8.8.0/24 in this example).
Configuration procedure
1. Configure a RADIUS scheme:
# Create a RADIUS scheme named rs1 and enter its view.
<RouterA> system-view
[RouterA] radius scheme rs1
# Set the server type for the RADIUS scheme. When using the IMC server, set the server type to
extended.
[RouterA-radius-rs1] server-type extended
# Specify the primary authentication/authorization server, and configure the keys for
communication with the servers.
[RouterA-radius-rs1] primary authentication 192.168.0.112
[RouterA-radius-rs1] key authentication simple radius
[RouterA-radius-rs1] user-name-format without-domain
# Configure the IP address of the security policy server.
[RouterA-radius-rs1] security-policy-server 192.168.0.113
[RouterA-radius-rs1] quit
2. Configure an authentication domain:
# Create an ISP domain named dm1 and enter its view.
[RouterA] domain dm1
# Configure AAA methods for the ISP domain.
[RouterA-isp-dm1] authentication portal radius-scheme rs1
[RouterA-isp-dm1] authorization portal radius-scheme rs1
[RouterA-isp-dm1] quit
Router A
Host
8.8.8.2/24
Eth1/2
20.20.20.1/24
Portal server
192.168.0.111/24
Radius server
192.168.0.112/24
Eth1/1
192.168.0.100/24
Router B
Eth1/2
8.8.8.1/24
Eth1/1
20.20.20.2/24
Security policy server
192.168.0.113/24










