Configuring direct portal authentication

Network requirements

As shown in Figure 42:

Figure 42: Network diagram

Configuration prerequisites

Configure IP addresses for the host, switch, and servers as shown in Figure 42 and make sure they can reach each other.

Configure the RADIUS server properly to provide authentication and accounting functions for users.

Configuring the portal server (IMC PLAT 5.0)

This example assumes that the portal server runs on IMC PLAT 5.0(E0101) and IMC UAM 5.0(E0101).

# Configure the portal server.

Log in to IMC and select the Service tab. Then, select User Access Manager > Portal Service Management > Server from the navigation tree to enter the portal server configuration page, as shown in Figure 43.

Figure 43: Portal server configuration

# Configure the IP address group.

Select User Access Manager > Portal Service Management > IP Group from the navigation tree to enter the portal IP address group configuration page. Then, click Add to enter the page shown in Figure 44.

Figure 44: Adding an IP address group

# Add a portal device.

Select User Access Manager > Portal Service Management > Device from the navigation tree to enter the portal device configuration page. Then, click Add to enter the page shown in Figure 45.

Figure 45: Adding a portal device

# Associate the portal device with the IP address group.

As shown in Figure 46, click the icon in the Port Group Information Management column of device NAS to enter the port group configuration page.

Figure 46: Device list

On the port group configuration page, click Add to enter the page shown in Figure 47. Perform the following configurations:

Figure 47: Adding a port group

# Select User Access Manager > Service Parameters > Validate System Configuration from the navigation tree to validate the configurations.

Configuring the switch

  • Configure a RADIUS scheme:

  • # Create a RADIUS scheme named rs1 and enter its view.

    <Switch> system-view
    [Switch] radius scheme rs1
    

    # Set the server type for the RADIUS scheme. When using the IMC server, set the server type to extended.

    [Switch-radius-rs1] server-type extended
    

    # Specify the primary authentication server and primary accounting server, and configure the keys for communication with the servers.

    [Switch-radius-rs1] primary authentication 192.168.0.112
    [Switch-radius-rs1] primary accounting 192.168.0.112
    [Switch-radius-rs1] key authentication simple radius
    [Switch-radius-rs1] key accounting simple radius
    

    # Specify that the ISP domain name should not be included in the username sent to the RADIUS server.

    [Switch-radius-rs1] user-name-format without-domain
    [Switch-radius-rs1] quit
    
  • Configure an authentication domain:

  • # Create an ISP domain named dm1 and enter its view.

    [Switch] domain dm1
    

    # Configure AAA methods for the ISP domain.

    [Switch-isp-dm1] authentication portal radius-scheme rs1
    [Switch-isp-dm1] authorization portal radius-scheme rs1
    [Switch-isp-dm1] accounting portal radius-scheme rs1
    [Switch-isp-dm1] quit
    

    # Configure dm1 as the default ISP domain for all users. Then, if a user enters the username without the ISP domain at logon, the authentication and accounting methods of the default domain are used for the user.

    [Switch] domain default enable dm1
    
  • Configure portal authentication:

  • # Configure a portal server on the switch, making sure the IP address, port number and URL match those of the actual portal server.

    [Switch] portal server newpt ip 192.168.0.111 key simple portal port 50100 url http://192.168.0.111:8080/portal
    

    # Enable portal authentication on the interface connecting the host.

    [Switch] interface vlan-interface 100
    [Switch–Vlan-interface100] portal server newpt method direct
    [Switch–Vlan-interface100] quit