Example: Configuring 802.1X with EAD assistant (with DHCP server)

Network configuration

As shown in Figure 42:

Deploy an EAD solution for the intranet to meet the following requirements:

Figure 42: Network diagram

Procedure

  1. Make sure the Web server and the authentication servers have been configured correctly. (Details not shown.)

  2. Configure an IP address for each interface. (Details not shown.)

  3. Configure the DHCP server:

    # Enable DHCP.

    <Device> system-view
    [Device] dhcp enable
    

    # Enable the DHCP server on VLAN-interface 2.

    [Device] interface vlan-interface 2
    [Device-Vlan-interface2] dhcp select server
    [Device-Vlan-interface2] quit
    

    # Create DHCP address pool 0.

    [Device] dhcp server ip-pool 0
    

    # Specify subnet 192.168.1.0/24 in DHCP address pool 0.

    [Device-dhcp-pool-0] network 192.168.1.0 mask 255.255.255.0
    

    # Specify the gateway address 192.168.1.1 in DHCP address pool 0.

    [Device-dhcp-pool-0] gateway-list 192.168.1.1
    [Device-dhcp-pool-0] quit
    
  4. Configure a RADIUS scheme:

    # Create RADIUS scheme 2000 and enter RADIUS scheme view.

    [Device] radius scheme 2000
    

    # Specify the server at 10.1.1.1 as the primary authentication server, and set the authentication port to 1812.

    [Device-radius-2000] primary authentication 10.1.1.1 1812
    

    # Specify the server at 10.1.1.2 as the primary accounting server, and set the accounting port to 1813.

    [Device-radius-2000] primary accounting 10.1.1.2 1813
    

    # Set the shared key to abc in plain text for secure communication between the authentication server and the device.

    [Device-radius-2000] key authentication simple abc
    

    # Set the shared key to abc in plain text for secure communication between the accounting server and the device.

    [Device-radius-2000] key accounting simple abc
    

    # Exclude the ISP domain names from the usernames sent to the RADIUS server.

    [Device-radius-2000] user-name-format without-domain
    [Device-radius-2000] quit
    
  5. Configure an ISP domain:

    # Create ISP domain bbb and enter ISP domain view.

    [Device] domain bbb
    

    # Apply RADIUS scheme 2000 to the ISP domain for authentication, authorization, and accounting.

    [Device-isp-bbb] authentication lan-access radius-scheme 2000
    [Device-isp-bbb] authorization lan-access radius-scheme 2000
    [Device-isp-bbb] accounting lan-access radius-scheme 2000
    [Device-isp-bbb] quit
    
  6. Configure 802.1X:

    # Configure the free IP.

    [Device] dot1x ead-assistant free-ip 192.168.2.0 24
    

    # Configure the redirect URL for client software download.

    [Device] dot1x ead-assistant url http://192.168.2.3
    

    # Enable the EAD assistant feature.

    [Device] dot1x ead-assistant enable
    

    # Enable 802.1X on HundredGigE 1/0/1.

    [Device] interface hundredgige 1/0/1
    [Device-HundredGigE1/0/1] dot1x
    [Device-HundredGigE1/0/1] quit
    

    # Enable 802.1X globally.

    [Device] dot1x
    

Verifying the configuration

# Verify the 802.1X configuration.

[Device] display dot1x

# Verify that you can ping an IP address on the free IP subnet from a host.

C:\>ping 192.168.2.3

Pinging 192.168.2.3 with 32 bytes of data:

Reply from 192.168.2.3: bytes=32 time<1ms TTL=128
Reply from 192.168.2.3: bytes=32 time<1ms TTL=128
Reply from 192.168.2.3: bytes=32 time<1ms TTL=128
Reply from 192.168.2.3: bytes=32 time<1ms TTL=128

Ping statistics for 192.168.2.3:
    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum = 0ms, Average = 0ms

The output shows that you can access the free IP subnet before passing 802.1X authentication.

# Verify that you are redirected to the Web server when you enter in your Web browser an IP address not on the free IP. (Details not shown.)