Operation Manual - Security Quidway S3000-EI Series Ethernet Switches
Operation Manual - Security Quidway S3000-EI Series Ethernet Switches
I. Configuring
erform the following configuration in ISP domain view.
y mode
he dynamic VLAN with RADIUS server configuration includes:
mode
Configuring name of the delive
VLAN delivery m
red VLAN
ode
P
Table 2-9 Configuring VLAN deliver
Operation Command
Configure VLAN delivery mode as integer vlan-assignment-mode integer
Configure VLAN delivery mode as string vlan-assignment-mode string
By default, the integer mode is selected, that is, the switch supports the RADIUS server
deliv eger VLAN ID.
II. Configuring name
P wing
Table 2-10 Configuring name of the delivered VLAN
ering the int
of the delivered VLAN
configuration in VLAN view. erform the follo
Operation Command
Configure name of the delivered VLAN name string
Remove the configured VLAN name undo name
Operation Manual - Security
Quidway S3000-EI Series Ethernet Switches
Chapter 2 AAA and RADIUS Protocol
Configuration
Huawei Technologies Proprietary
2-10
tc.
interaction between NAS and RADIUS Server. To make these
a
RAD
conf
n key
Setting response timeout timer of RADIUS server
Setting retransmission times of RADIUS request packet
ng the selection of RADIUS accounting option
r
Setting local RADIUS authentication server
mong the above tasks, creating RADIUS scheme and setting IP address of RADIUS
rformed as per your
2.3.1 Crea
col configurations are performed on the per
ng other RADIUS protocol
configurations, it is compulsory to create the RADIUS scheme and enter its view to set
its IP address.
You can use the following commands to create/delete a RADIUS scheme.
Perform the following configurations in system view.
2.3 Configuring RADIUS Protocol
For the Quidway Series Switches, the RADIUS protocol is configured on the per
RADIUS scheme basis. In real networking environment, a RADIUS scheme can be an
independent RADIUS server or a set of primary/second RADIUS servers with the same
configuration but two different IP addresses. Accordingly, attributes of every RADIUS
scheme include IP addresses of primary and second servers, shared key and RADIUS
server type e
Actually, RADIUS protocol configuration only defines some necessary parameters
using for information
par meters effective, it is necessary to configure, in the view, an ISP domain to use the
IUS scheme and specify it to use RADIUS AAA schemes. For more about the
iguration commands, refer to the AAA Configuration section above.
RADIUS protocol configuration includes:
Creating/Deleting a RADIUS scheme
Setting IP Address and Port Number of RADIUS Server
Setting RADIUS packet encryptio
Enabli
Setting a real-time accounting interval
Setting maximum times of real-time accounting request failing to be responded
Enabling/Disabling stopping accounting request buffer
Setting the maximum retransmitting times of stopping accounting request
Setting the Supported Type of RADIUS Server
Setting RADIUS server state
Setting username format transmitted to RADIUS server
Setting the unit of data flow that transmitted to RADIUS serve
A
server are required, while other takes are optional and can be pe
requirements.
ting/Deleting a RADIUS scheme
As mentioned above, RADIUS proto
RADIUS scheme basis. Therefore, before performi
Operation Manual - Security
Quidway S3000-EI Series Ethernet Switches
Chapter 2 AAA and RADIUS Protocol
Configuration
Huawei Technologies Proprietary
2-11
eme Table 2-11 Creating/Deleting a RADIUS sch
Operation Command
Create a RADIUS scheme and
enter its view
radius scheme radius-scheme-name
Delete a RADIUS scheme undo radius scheme radius-scheme-name
Several ISP domains can use a RADIUS scheme at the same time. You can configure
up to 16 RADIUS schemes, including the default scheme named as system.
med system whose attributes are all
default values. The default attribute values will be introduced in the following text.
2.3.2 Setting IP Address and Port Number of RADIUS Server
After creating a RADIUS e, you are supposed to set IP d UDP port
numbers for the RADIUS servers, includin /second
a ccounting servers. So you can configure up
to ort numbers. However, at least you have to set
ne group of IP address and UDP port number for each pair of primary/second servers
re the normal AAA operation.
figure the IP address and port number for
By default, the system has a RADIUS scheme na
schem addresses an
g primary
uthentication/authorization servers and a
4 groups of IP addresses and UDP p
o
to ensu
You can use the following commands to con
RADIUS servers.
Perform the following configurations in RADIUS scheme view.
Table 2-12 Setting IP Address and Port Number of RADIUS Server
Operation Command
Set IP address and port number of primary
RADIUS authen
primary authentication
tication/authorization server. ip-address [ port-number ]
Restore IP address and port number of
primary RADIUS authentication/authorization
or server to the default values.
undo primary authentication
Set IP address and port number of primary
RADIUS accounting server.
primary accounting ip-address
[ port-number ]
Restore IP address and port number of
primary RADIUS accounting server or server undo primary accounting
to the default values.
Set IP address and port number of secondary secondary authentication
port-number ] RADIUS authentication/authorization server. ip-address [
R store IP address and port number e of
c secondary authentication se ond RADIUS authentication/authorization undo
or server to the default values.
Operation Manual - Security
Quidway S3000-EI Series Ethernet Switches
Chapter 2 AAA and RADIUS Protocol
Configuration
Huawei Technologies Proprietary
2-12
Operation Command
Set IP address and port number of second
RADIUS accounting server.
secondar
ip-address
y accounting
[ port-number ]
R store IP address and port number of e
c o secondary accounting se ond RADIUS accounting server or server und
to the default values.
In real networking environments, the above parameters shall be set according to the
authorization server and second accounting server and the other one as
second authentication/authorization server and primary accounting server, or you may
that every server serves as a primary and
fferent UDP ports to receive/transmit authentication/authorization and
accounting packets, you shall set two different ports accordingly. Suggested by
nting port
gested ones.
(Especially for some earlier RADIUS Servers, authentication/authorization port number
1646.)
The RADIUS t settings on Quidway Series e supposed to be
c RADIUS server. Normally, RADIUS accounting
s 13 and the authenti .
B ses of nd
nting servers are 0.0.0.0, authentication/authorization service port is 1812 and
ccounting service UDP port is 1813.
2.3.3 Sett
ey.
Only when the keys are identical can both ends to accept the packets from each other
You can use the following commands to set the encryption key for RADIUS packets.
specific requirements. For example, you may specify 4 groups of different data to map
4 RADIUS servers, or specify one of the two servers as primary
authentication/
also set 4 groups of exactly same data so
second AAA server.
To guarantee the normal interaction between NAS and RADIUS server, you are
supposed to guarantee the normal routes between RADIUS server and NAS before
setting IP address and UDP port of the RADIUS server. In addition, because RADIUS
protocol uses di
RFC2138/2139, authentication/authorization port number is 1812 and accou
number is 1813. However, you may use values other than the sug
is often set to 1645 and accounting port number is
service por Switches ar
onsistent with the port settings on
ervice port is 18 cation/authorization service port is 1812
y default, all the IP addres primary/second authentication/authorization a
accou
a
ing RADIUS Packet Encryption Key
RADIUS client (switch system) and RADIUS server use MD5 algorithm to encrypt the
exchanged packets. The two ends verify the packet through setting the encryption k
end and give response.
Perform the following configurations in RADIUS scheme view.
Operation Manual - Security
Quidway S3000-EI Series Ethernet Switches
Chapter 2 AAA and RADIUS Protocol
Configuration
Huawei Technologies Proprietary
2-13
Table 2-13 Setting RADIUS packet encryption key
Operation Command
Set RADIUS authentication/authorization packet
encryption key
key authentication string
Restore the default RADIUS
authentication/authorization packet encryption key.
undo key authentication
Set RADIUS accounting packet key key accounting string
Restore the defa accounting packet key und nting ult RADIUS o key accou
By default, ackets
a
2.3.4 Setting Response Ti
A uthorization or a st packet has been
tr eceived the response from RADIUS
s t er.
Y se timeout timer of RADIUS server
P s
T
the keys of RADIUS authentication/authorization and accounting p
re all huawei.
meout Timer of RADIUS Server
fter RADIUS (authentication/a ccounting) reque
ansmitted for a period of time, if NAS has not r
erver, it has to retransmit the request to guaran ee RADIUS service for the us
ou can use the following command to set respon
erform the following configurations in RADIUS
.
cheme view.
able 2-14 Setting response timeout timer of RADIUS server
Operation Command
Set response timeout timer of RADIUS server timer seconds
Restore the response timeout timer of RADIUS
undo timer
server to
default value
y default, timeout timer of RADIUS server is 3 seconds.
2.3.5 Sett
d.
B
ing Retransmission Times of RADIUS Request Packet
Since RADIUS protocol uses UDP packet to carry the data, the communication process
is not reliable. If the RADIUS server has not responded NAS before timeout, NAS has
to retransmit RADIUS request packet. If it transmits more than the specified retry-times,
NAS considers the communication with the primary and secondary RADIUS servers
has been disconnecte
You can use the following command to set retransmission times of RADIUS request
packet.
Perform the following configurations in RADIUS scheme view.
Operation Manual - Security
Quidway S3000-EI Series Ethernet Switches
Chapter 2 AAA and RADIUS Protocol
Configuration
Huawei Technologies Proprietary
2-14
Table 2-15 Setting retransmission times of RADIUS request packet
Operation Command
Set retransmission times of RADIUS request packet retry retry-times
Restore the default value of retransmission times undo retry
By default, RADIUS request packet will be retransmitted up to three times.
2.3.6 Ena
RADIUS accounting server fails when the
accounting optional is configured, the user can still use the network resource,
Perform the following configurations in RADIUS scheme view.
bling The Selection Of Radius Accounting Option
If no RADIUS server is available or if
otherwise, the user will be disconnected.
Table 2-16 Enabling the selection of RADIUS accounting option
Operation Command
Enable the selection of RADIUS accounting option accounting optional
Disable the selection of RADIUS accounting
undo accounting optional
option
mand in RADIUS scheme will no
longer send real-time a date packet or offline accoun
T e
a es this RADIUS scheme.
B
2.3.7 Settin erval
T et a terval.
fter the attribute is set, NAS will transmit the accounting information of online users to
llowing command to set a real-time accounting interval.
Perform the following configurations in RADIUS scheme view.
The user configured with accounting optional com
ccounting up ting packet.
he accounting optional command in RADIUS scheme
ccounting that us
view is only effective on th
y default, selection of RADIUS accounting option is disabled.
g a Real-time Accounting Int
o implement real-time accounting, it is necessary to s real-time accounting in
A
the RADIUS server regularly.
You can use the fo
Table 2-17 Setting a real-time accounting interval
Operation Command
Set a real-time accounting interval timer realtime-accounting minutes
Restore the default value of the interval undo timer realtime-accounting
Operation Manual - Security
Quidway S3000-EI Series Ethernet Switches
Chapter 2 AAA and RADIUS Protocol
Configuration
Huawei Technologies Proprietary
2-15
erval in minutes. The
value shall be a multiple of 3.
r. The
smaller the value is, the erformances of NAS and RA uired.
W than 1000, ggest a
larg value to the number of
u
able 2-18 Recommended ratio of minutes to number of users
The parameter minutes specifies the real-time accounting int
The value of minutes is related to the performance of NAS and RADIUS serve
higher the p DIUS are req
hen there are a large amount of users (more inclusive), we su
er value. The following table recommends the ratio of minute
sers.
T
Number of users Real-time accounting interval (minute)
1 to 99 3
100 to 499 6
500 to 999 12
1000 15
By default, minute is set to 12 minutes.
2.3.8 Sett
be Respo
timer. If the RADIUS
server has not received the real-time accounting packet from NAS for long, it will
, it is necessary to
disconnect the user a nd on RADIUS server synch n some
u u um times of
real t
h fro erver for some
pecified times.
ccounting
request failing to be responded
ing Maximum Times of Real-time Accounting Request Failing to
nded
RADIUS server usually checks if a user is online with timeout
consider that there is device failure and stop accounting. Accordingly
t NAS end a ronously whe
npredictable failure exists. Quidway Series Switches s
-time accounting request failing to be responded. NAS will disconne
pport to set maxim
ct the user if i
as not received real-time accounting response m RADIUS s
s
You can use the following command to set the maximum times of real-time a
Perform the following configurations in RADIUS scheme view.
Table 2-19 Setting maximum times of real-time accounting request failing to be
responded
Operation Command
Set maximum times of real-time accounting request
failing to be responded
retry realtim
retry-tim
e-accounting
es
Restore the maximum times to the default value
undo retry
realtime-accounting
Operation Manual - Security
Quidway S3000-EI Series Ethernet Switches
Chapter 2 AAA and RADIUS Protocol
Configuration
Huawei Technologies Proprietary
2-16
erver connection will
timeout in T and the r ounting interval of NAS is t, the art of the
result from dividing T by t is the value of count. Therefore, when ap d
th
B n 5
times
2.3.9 Enabling/Disabling Stopping Accounting Request Buffer
ffect the
essage to RADIUS accounting server.
Accordingly, if the message from Quidway Series Switches to RADIUS accounting
buffer and retransmit it
until the server responds or discards the messages after transmitting for specified times.
g to save the message or not. If save,
use the command to set the maximum retransmission times.
stopping accounting request buffer
How to calculate the value of retry-times? Suppose that RADIUS s
eal-time acc n the integer p
plied, T is suggeste
e numbers which can be divided exactly by t.
y default, the real-time accounting request can fail t
.
o be responded no more tha
Because the stopping accounting request concerns account balance and will a
amount of charge, which is very important for both the subscribers and the ISP, NAS
shall make its best effort to send the m
server has not been responded, switch shall save it in the local
The following command can be used for settin
Perform the following configurations in RADIUS scheme view.
Table 2-20 Enabling/Disabling
Operation Command
Enable stopping accounting request buffer stop-accounting-buffer enable
Disable stopping accounting request buffer
ccounting-buffer
able
undo stop-a
en
B quest
2.3.10 Sett g ing
Request
y important for both the subscribers and the ISP, NAS
Perform the following configurations in RADIUS scheme view.
y default, the stopping accounting re will be saved in the buffer.
ing the Maximum Retransmittin Times of Stopping Account
Because the stopping accounting request concerns account balance and will affect the
amount of charge, which is ver
shall make its best effort to send the message to RADIUS accounting server.
Accordingly, if the message from Quidway Series Switch to RADIUS accounting server
has not been responded, switch shall save it in the local buffer and retransmit it until the
server responds or discards the messages after transmitting for specified times. Use
the command to set the maximum retransmission times.
Operation Manual - Security
Quidway S3000-EI Series Ethernet Switches
Chapter 2 AAA and RADIUS Protocol
Configuration
Huawei Technologies Proprietary
2-17
T etting the maxim retransmitting times of stopping accounting request able 2-21 S um
Operation Command
Set the
stopping a
maximum retran g times of
ccounting request
retry stop-accounting
retry-times
smittin
Restore the maximum retransmitting times of
undo retry stop-accounting stopping accounting request to the default
value
By default, the stopping accounting request can be retransmitted for up to 500 times.
2.3.11 Se
Table 2-22 Setting the supported type of RADIUS server
tting the Supported Type of RADIUS Server
Quidway Series Switches support the standard RADIUS protocol and the extended
RADIUS service platforms, such as IP Hotel, 201+ and Portal, independently
developed by Huawei.
You can use the following command to set the supported types of RADIUS servers.
Perform the following configurations in RADIUS scheme view.
Operation Command
Setting the Supported Type of server-type { huawei | iphotel | portal |
RADIUS Server standard }
Restore the Supported Type of
RADIUS Server to the default setting
undo server-type
By default, the newly creat US scheme supports the server of standard type,
w f
huawei type.
2.3.12 Setting RADIUS Server State
For the primary and second servers (no matter it is an authentication/authorization
ne. When the second one fails to
set the primary server to be active manually, in order that NAS can
communicate with it right after the troubleshooting.
When the primary and second servers are both active or block, NAS will send the
packets to the primary server only.
ed RADI
hile the "system" RADIUS scheme created by the system supports the server o
server or accounting server), if the primary is disconnected to NAS for some fault, NAS
will automatically turn to exchange packets with the second server. However, after the
primary one recovers, NAS will not resume the communication with it at once, instead,
it continues communicating with the second o
communicate, NAS will turn to the primary one again. The following commands can be
used to
Operation Manual - Security
Quidway S3000-EI Series Ethernet Switches
Chapter 2 AAA and RADIUS Protocol
Configuration
Huawei Technologies Proprietary
2-18
Perform the following configurations in RADIUS scheme view.
Table 2-23 Setting RADIUS server state
Operation Command
Set the state of primary RADIUS
server
state primary { accounting |
authentication } { block | active }
Set the state of second RADIUS
server
state secondary{ accounting |
authentication } { block | active }
By default, the state of each server in RADIUS scheme is active.
2.3.13 Setting Username Format Transmitted to RADIUS Server
As mentioned above, the supplicants are generally named in -name format.
The part following @ is the ISP domain name. Quidway Series Switches will put the
u to me
earli
you have to remove the d e s e username to the RADIUS
erver. The following command of switch decides whether the username to be sent to
RADIUS server carries ISP domain name or not.
userid@isp
sers into different ISP domains according the domain names. However, so
er RADIUS servers reject the username incl
omain name befor
uding ISP domain name. In this case,
ending th
s
Perform the following configurations in RADIUS scheme view.
Table 2-24 Setting username format transmitted to RADIUS server
Operation Command
Set Username Format Transmitted to { |
RADIUS Server
user-name-format with-domain
without-domain }
Note:
If a RADIUS scheme is configured not to allow usernames including ISP domain names,
the RADIUS scheme shall not be simultaneously used in more than one ISP domain.
Otherwise, the RADIUS server will regard two users in different ISP domains as the
luding their respective
domain names.)
same user by mistake, if they have the same username (exc
B
s name; as for the "s US scheme created by
th s excludes the ISP domain name.
y default, as for the newly created RADIUS sche
ervers includes an ISP domain
me, the username sent to RADIUS
ystem" RADI
e system, the username sent to RADIUS server
Operation Manual - Security
Quidway S3000-EI Series Ethernet Switches
Chapter 2 AAA and RADIUS Protocol
Configuration
Huawei Technologies Proprietary
2-19
2.3.14 Se
ent to RADIUS server.
Perform the following configurations in RADIUS scheme view.
tting the Unit of Data Flow that Transmitted to RADIUS Server
The following command defines the unit of the data flow s
Table 2-25 Setting the unit of data flow transmitted to RADIUS server
Operation Command
Set the unit of data flow
transmitted to RADIUS server
kilo-byte | mega-byte } packet { giga-packet |
data-flow-format data { byte | giga-byte |
kilo-packet | mega-packet | one-packet }
Restore the unit to the default
undo data-flow-format
setting
B
2.3.15 Con cation Server
RADIUS service, which adopts authentication/authorization/accounting servers to
anage users, is widely used in Quidway series switches. Besides, local
Perform the following commands in system view to create/delete local RADIUS
y default, the default data unit is byte and the default data packet unit is one packet.
figuring Local RADIUS Authenti
m
authentication/authorization service is also used in these products and it is called local
RADIUS authentication server function, i.e. realize basic RADIUS function on the
switch.
authentication server.
Table 2-26 Creating/Deleting local RADIUS authentication server
Operation Command
Create local RADIUS authentication
server
local-server nas-ip ip-address key
password
Delete local RADIUS authentication
server
undo local-server nas-ip ip-address
By default, the IP address of local RADIUS authentication server is 127.0.0.1 and the
ation server function, note that,
d that for accounting is
1646.
ver command must be the same as that of
the RADIUS authentication/authorization packet co he command key
authentication in RADIUS scheme view.
password is Huawei.
When using local RADIUS authentic
1) The number of UDP port used for authentication is 1645 an
2) The password configured by local-ser
nfigured by t
Operation Manual - Security
Quidway S3000-EI Series Ethernet Switches
Chapter 2 AAA and RADIUS Protocol
Configuration
Huawei Technologies Proprietary
2-20
2.4 Disp S
fter the above configuration, execute display command in any view to display the
running of the AAA and RADIUS configuration, and to verify the effect of the
AAA and RADIUS
statistics, etc. Execute debugging command in user view to debug AAA and RADIUS.
Table 2-27 Displaying and debugging AAA and RADIUS protocol
laying and Debugging AAA and RADIU Protocol
A
configuration. Execute reset command in user view to reset
Operation Command
Display the configuration
information of the specified or
all the ISP domains.
display domain [ isp-name ]
Display related information of
users connection
display connection [ access-type dot1x |
domain isp-name | interface portnum | ip
ip-address | mac mac-address | radius-scheme
radius-scheme-name | vlan vlanid | ucibindex
ucib-index | user-name user-name ]
Display related information of
the local user
{ disable | enable } | service-type
lan-access | ssh } | state { ac
display local-user [ domain isp-name | idle-cut
{ telnet | ftp |
tive | block } |
user-name user-name d] | vlan vlan-i
Display the statistics of local
RADIUS authentication server
display local-server statistics
Display the configuration
information of all the RADIUS
schemes or a specified one
display radius [ radius-scheme-name ]
Display the statistics of RADIUS
packets
display radius statistics
Display the stopping accounting
requests saved in buffer without
response (from system view)
display stop-accounting-buffer
{ radius-scheme radius-scheme-name |
session-id session-id | time-range start-time
stop-time | user-name user-name }
Delete the stopping accounting
requests saved in buffer without
response (from system view)
reset stop-accounting-buffer { radius-scheme
radius-scheme-name | session-id session-id |
time-range start-time stop-time | user-name
user-name }
Reset the statistics of RADIUS
server.
reset radius statistics
Enable RADIUS packet
debugging radius packet
debugging
Disable RADIUS packet
debugging
undo debugging radius packet
Enable debugging of local debugging local-server { all | error | event
RADIUS authentication server packet }
Operation Manual - Security
Quidway S3000-EI Series Ethernet Switches
Chapter 2 AAA and RADIUS Protocol
Configuration
Huawei Technologies Proprietary
2-21
Operation Command
Disable of local
RADIUS authentication server
undo debugging er { all | error | debugging local-serv
event packet }
2.5 AAA and RADIUS Protoc Examples
or the hybrid configuration example of AAA/RADIUS protocol and 802.1x protocol,
Server
ol Configuration
F
refer to Configuration Example in 802.1x Configuration. It will not be detailed here.
2.5.1 Configuring FTP/Telnet User Authentication at Remote RADIUS
Note:
Configuring Telnet user authentication at the remote server is similar to configuring
FTP users. The following description is based on Telnet users.
I. ments
to achieve through
proper configuration that the RADIUS server authenticates the Telnet users to be
registered.
O n
se address is 10.110.91.164. The pa anging messages between
th me
from username and sends the left part to the RADIUS server.
Networking Require
In the environment as illustrated in the following figure, it is required
ne RADIUS server (as authentication s
rver IP
erver) is connected to the switch a d the
ssword for exch
e switch and the authentication server is "expert. The switch cuts off domain na
Operation Manual - Security
Quidway S3000-EI Series Ethernet Switches
Chapter 2 AAA and RADIUS Protocol
Configuration
Huawei Technologies Proprietary
2-22
II. Networking Topology
Authentication Servers
( IP address:10.110.91.164 )
Internet
Switch
telnet user
Internet
F
III. Configurtion Schedule
# Add a Telnet user.
O