Role |
Product Model |
Description |
---|---|---|
AAA server |
Huawei server or third-party AAA server |
Performs authentication, accounting, and authorization for users. |
Portal server |
Huawei server or third-party Portal server |
Receives authentication requests from Portal clients, provides free portal services and the web authentication page, and exchanges client authentication information with access devices. This component is required only in external Portal authentication mode. |
When Huawei's Agile Controller-Campus functions as a server, its version must be V100R001, V100R002, V100R003.
When Huawei's iMaster NCE-Campus functions as a server, its version must be V300R019C10.
When a Huawei switch functions as a DHCP server and assigns IP addresses to terminals based on the static MAC-IP bindings delivered by the Agile Controller-Campus, the switch must run V200R009C00 or a later version, and the Agile Controller-Campus must run V100R002, V100R003.
NAC unified mode is a basic feature of a switch and is not under license control.
All models of S2720, S5700, and S6700 series switches support NAC unified mode.
For details about software mappings, visit Hardware Query Tool and search for the desired product model.
If the S2720-EI (V200R009C00 and V200R010C00), S2750-EI, S5700-10P-LI-AC, or S5700-10P-PWR-LI-AC functions as a Layer 3 gateway and NAC is enabled on physical interfaces configured with Layer 3 services, you must run the command assign forward-mode ipv4-hardware to enable Layer 3 hardware forwarding for IPv4 packets.
In V200R005, when NAC is configured on the main interface, service functions on its sub-interface are affected.
In versions earlier than V200R007C00, the switch can directly process protocol packets sent to it before a user is successfully authenticated, and no authentication-free rule is required. In versions ranging from V200R007C00 to V200R011C10, an authentication-free rule must be configured when DNS protocol packets are sent to the S5720-HI for processing.
If authentication triggered by any packet is not configured, the ARP packets with the source IP address being 0.0.0.0 cannot trigger MAC address authentication.
In the centralized SVF scenario, in versions earlier than V200R019C10, user access profiles must be bound to the same authentication profile at any time. In V200R019C10 and later versions, user access profiles can be bound to different authentication profiles. However, if these user access profiles are bound to ASs on the same cascade port, the authentication profiles must be the same.
Authorization by the authentication server prior to authorization by an authentication domain. If the attribute authorized by the authentication server and that authorized by the authentication domain conflict, the attribute authorized by the authentication server takes effect. If the attribute authorized by the authentication server and that authorized by the authentication domain do not conflict, both attributes take effect.
One example is that, when user VLAN 20 is configured in service scheme A on the switch and service scheme A is bound to a user authentication domain, but the authentication server assigns VLAN 10 to authenticated users, the authenticated users are added to VLAN 10.
Another example is that, when traffic policing is configured in service scheme B on the switch and service scheme B is bound to a user authentication domain, but the authentication server assigns VLAN 10 to authenticated users, the authenticated users are added to VLAN 10 and traffic policing also takes effect for these users.
In versions earlier than V200R011C10, if the direct forwarding mode is used, the device does not support UCL group-based authorization for wireless users.
Interconnection with a Cisco ISE server through Central Web Authentication (CWA) is not supported.
The IPv6 forcible URL template or URL push function is supported. In case of HTTPS packets, the IPv6 forcible URL template or URL push function must be used together with redirect ACLs.
An IPv6 address can be configured for the Portal server, and an IPv4 address must also be specified because the device cannot exchange IPv6 Portal packets with the Portal server.
The IPv6 traffic statistic collection function is supported. IPv6 traffic statistics and IPv4 traffic statistics can be collected separately or together.
IPv6 free mobility is not supported.
S2720-EI, S2750-EI, S5700-LI, S5700S-LI, S5710-C-LI, S5710-X-LI, S5720-LI, S5720S-LI, S5700-SI, S5720-SI, S5720S-SI, S5720I-SI, S5730-SI, S5730S-EI, S6720-LI, S6720S-LI, S6720-SI, and S6720S-SI do not support IPv6 Portal authentication.
For wireless users, you can configure attributes for APs when the device works as an AC. In versions earlier than V200R011C10, the configurations are not delivered to APs in real time, and are delivered to APs only after you run the commit command in the WLAN view. In V200R011C10 and later versions, the switch delivers the configurations to APs every 5 seconds.
During LNP negotiation, NAC users cannot go online before the interface link type becomes stable. If the interface link type is negotiated again and the negotiation result changes, the online NAC users are forced to go offline.
When a switch connects to the Agile Controller-Campus V1, MAC address-prioritized Portal authentication can still be performed after the user clicks Deregister on the login page. The user goes offline after the MAC address expires on the Agile Controller-Campus V1.
When a switch connects to the Agile Controller-Campus V3 and MAC address-prioritized Portal authentication is performed, a user logs out after clicking Deregister on the login page. If MAC address-prioritized Portal authentication needs to be performed again, the user needs to reconnect to the network through Portal authentication.