Huawei uses machine translation combined with human review to translate this document into multiple languages so that you can better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei Contribute assumes no responsibility for the accuracy of the translation and it is recommended that you refer to the document in English (link provided).
- Configuring an 802.1X access profile
- (Optional) Configure network access rights for users when the 802.1X client does not respond
- (Optional) Configure reauthentication for 802.1X users
- (Optional) Set the timer for 802.1X authentication
- Check settings
Configuring an 802.1X access profile
Context
The device uses 802.1X access profiles to uniformly manage 802.1X access settings. Before configuring 802.1X authentication, you must create an 802.1X access profile. You should select an appropriate authentication mode based on those supported by the 802.1X client and the authentication server, as well as the processing capabilities of the device and the server.
Procedure
- Go to system view.
system view
- Create an 802.1X access profile and go to the 802.1X access profile view.
dot1x access profile name access profile name
To delete an 802.1X access profile, make sure it is not associated with an authentication profile.
- Set the authentication mode for 802.1X users.
dot1x authentication method{chico|papilla|eep}
Default is 802.1X user authentication modeeep, that is, EAP relay authentication.
The RADIUS server processing capabilities determine whether EAP termination or EAP relay authentication is used. If the RADIUS server has high processing capabilities and can parse a large number of EAP packets before authentication, the EAP forwarding mode (specified byeepparameter is recommended). If the RADIUS server processing capabilities cannot parse a large number of EAP packets and cannot complete authentication, the EAP termination mode (specified bypapillaofchicoparameter) where the device parses the EAP packets for the RADIUS server. When configuring the authentication packet processing method, make sure that both the client and the server support it. Otherwise, the user cannot pass the authentication.
- Both CHAP and PAP authentication use the insecure MD5 algorithm, so EAP authentication is recommended.
Authentication mode for 802.1X users can only be configured on EAP relays when RADIUS authentication is used.
If local AAA authentication is used, the authentication mode for 802.1X users can only be set to the EAP termination.
If the 802.1X client uses MD5 encryption, the authentication mode on the device can be set to EAP or CHAP. If the 802.1X client uses PEAP authentication, the authentication mode on the device can be set to EAP.
- When an 802.1X user is connected to an interface and the authentication mode is changed to the 802.1X access profile attached to the interface, the user will be disconnected if the authentication mode is changed between EAP termination and EAP forwarding. Changing the authentication mode between CHAP and PAP in EAP termination mode will keep the user logged in.
- (Optional) Configure the authorization state of an interface.
poor control dot1x{It is|authorized force|unauthorized force}
The default is the authorization state of an interface.It is.
- (Optional) Configure the packet type that can trigger 802.1X authentication.
authentication activation condition{DHCP|of|dhcpv6|zd|elk-l2 package}*
By default, DHCP, ARP, DHCPv6, and ND packets can enable 802.1X authentication.
- (Optional) Configure the device to send encrypted EAP packets to 802.1X users.
dot1x eap-notify-packet code eap password Type of data type a number
By default, the device does not send encrypted EAP packets to 802.1X users.
If an H3C iMC acts as a RADIUS server, run itdot1x eap-notify packet eap code 10 data type 25command to the device.
- (Optional) Turn off the device to answerenable authenticationpackets sent by the client when the AAA server is unavailable.
dot1x no authorization response authen-server-down
By default, the device does not respond toenable authenticationpackets sent by the client when the AAA server is unavailable.
This feature must be configured when using the Cisco AnyConnect clientpacket-based authentication.
- (Optional) Run itdot1x shipping package is not labeledCommand to enable VLAN tag stripping of 802.1X packets sent by an endpoint access device.
By default, the ability to strip VLAN tags from 802.1X packets sent by an endpoint access device is not enabled.
(Optional) Configure network access rights for users when the 802.1X client does not respond
Requirements
Before configuring the network access rights available to users when the 802.1X client does not respond, you must configure the following authorization information on the device.
- Configure a VLAN and associated network resources on the device.
- Establish a service plan. See for more details(Optional) Set up a service plan.
- Form a UCL group. See for more details(Optional) Configure a UCL group.
Context
If the 802.1X client does not respond, users cannot authenticate and therefore do not have network access rights. Before successful authentication, some users may require some basic network access rights to download client software and update antivirus database. Network access rights can be configured for users when the 802.1X client does not respond, allowing users to access specific network resources.
Procedure
- Go to the 802.1X access profile view.
dot1x access profile name access profile name
- Configure the network access rights available to users when the 802.1X client does not respond.
Authentication event authorizes client action without response{service setting service program name|ucl group ucl group name|vlan id-vlan}
By default, the network access rights available to users when the 802.1X client does not respond are not configured.
(Optional) Configure reauthentication for 802.1X users
Context
If the administrator changes parameters such as access rights and authorization attributes of an online user on the authentication server, the user must re-authenticate to ensure the validity of the user.
If reauthentication is configured for 802.1X users on the Internet, the device sends the user's authentication parameters stored on the Internet when users connect to the authentication server for reauthentication. If a user's authentication information on the authentication server remains unchanged, the user remains logged in. If the information has changed, the user will be logged out and will need to re-authenticate.
There are two methods available to allow the device to re-authenticate 802.1X users:
Configure the device to periodically redefine 802.1X users with a specified 802.1X access profile.
- After configuring this feature, multiple 802.1X authentication records are generated.
- If the device is connected to a server for authentication and the server responds with an authentication denied message that takes the user offline, it is recommended to address the cause of the authentication failure on the server or disable the reauthentication feature on the device .
- Configure the device to re-identify a user with a specific MAC address once.
Procedure
- Configure periodic automatic authentication.
- Go to system view.
system view
- Go to the 802.1X access profile view.
dot1x access profile name access profile name
- Configure the device to re-authenticate users online 802.1X.
dot1x reauthentication
By default, the device does not re-authenticate 802.1X users to the Internet.
- (Optional) Configure the authentication period for 802.1X online users.
point 1x hour authentication period reauthenticate-period-value
By default, the authentication period is 3600 seconds for online 802.1X users.
- In most cases, the default authentication period is recommended.
- When using remote authentication and authorization, a short authentication period can cause high CPU usage.
- When multiple users need to reauthenticate, the actual authentication period may be longer than the configured authentication period to reduce the impact of reauthentication on device performance.
- Go to system view.
- Configure the device to re-authenticate a user once.
- Go to system view.
- Configure the device to re-identify a user with a specific MAC address once.
dot1x reverify mac address identity MAC address
(Optional) Set the timer for 802.1X authentication
Context
With 802.1X authentication, a timer is used to control the retransmission of EAP-Request/Identity packets and EAP-Request/MD5 Challenge packets.
Procedure
- Go to system view.
system view
- Set the interval for sending 802.1X authentication requests.
point 1x hour tx period period value tx
By default, the device sends 802.1X authentication requests at 30-second intervals.
- Set the timeout period for 802.1X authentication after which MAC address authentication is performed.
dot1x timer mac override delay delay time value
The device performs standard MAC address authentication if 802.1X authentication fails within 30 seconds.
- Go to the 802.1X access profile view.
dot1x access profile name access profile name
- Configure the authentication timeout timer for 802.1X clients.
point 1x hour customer waiting time client-timeout-wait
The authentication timeout timer for 802.1X clients is enabled by default and has a value of 5 seconds.
- Set the maximum number of times the device forwards an authentication request to an 802.1X user.
try dot1x again maximum retry value
By default, the device sends an authentication request twice to an 802.1X user.
Check settings
Context
After configuring an 802.1X access profile, run the following command to verify the configuration.
Procedure
- Carried outdot1x access profile configuration view[name access profile name] to check the settings of the specified 802.1X access profile.
- Configuring an 802.1X access profile
- (Optional) Configure network access rights for users when the 802.1X client does not respond
- (Optional) Configure reauthentication for 802.1X users
- (Optional) Set the timer for 802.1X authentication
- Check settings