Role |
Product Model |
Description |
---|---|---|
AAA server |
Huawei server or third-party AAA server |
Performs authentication, accounting, and authorization for users. |
Portal server |
Huawei server or third-party Portal server |
Receives authentication requests from Portal clients, provides free portal services and the web authentication page, and exchanges client authentication information with authentication access devices. This component is required only in external Portal authentication mode. |
When Huawei's Agile Controller-Campus functions as the server, the version required is V100R001, V100R002, V100R003.
When Huawei's iMaster NCE-Campus functions as a server, its version must be V300R019C10.
If a Huawei switch needs to function as a DHCP server and assign IP addresses to terminals based on the static MAC-IP binding relationship delivered by the Agile Controller-Campus, the switch must run V200R009C00 or a later version, and the Agile Controller-Campus must run V100R002, V100R003.
Policy Association is a basic feature of a switch and is not under license control.
Prior to V200R011C10, the authentication control device and authentication access device must run the same version.
Software Version |
Models That Can Function as Authentication Control Devices |
Models That Can Function as Authentication Access Devices |
---|---|---|
V200R011C10 and later |
|
|
V200R011C00 |
|
|
V200R010C00 |
|
|
V200R009C00 |
|
|
V200R008C00 |
|
|
V200R007C00 |
|
|
For details about software mappings, visit Hardware Query Tool and search for the desired product model.
The information about the network is as follows:
By default, the S5730-HI, S5731-H, S5731S-H, S5732-H24S6Q, S5732-H48S6Q, S6730S-H, and S6730-H work in authentication control device mode, and the S5732-H24UM2CC, S5732-H48UM2CC, S6730-S, S6730S-S, S6720-SI, S6720S-SI, S6720-EI, and S6720S-EI work in authentication access device mode. The switch models mentioned above can function as the authentication control device or authentication access device, you can run the [ undo ] as-mode disable command to change their working mode. In addition, for the switch models that support the WLAN function, when they work in authentication access device mode, the WLAN function becomes unavailable.
Only policy association between the authentication control device and authentication access devices is supported, and configuration association is not supported.
Policy association is applicable only to wired users. When users are online, MAC address migration is not supported. When users switch from one authentication access device or access interface to another, they may fail to go online. In this case, you can reduce the offline detection interval. The recommended interval is 15 to 30 seconds if no hub is used. In this way, the system can quickly detect that a user goes offline from the original interface and enable the user to go online through the new interface. A configuration example is as follows: Run the link-down offline delay 0 command in the authentication profile of the authentication access device to set the user logout delay to zero when the interface link is faulty. Then, run the user-detect interval 10 retry 2 command in the system view to enable the online detection function so that the user can go online quickly.
The control point can be configured on a Layer 2 physical interface or VLANIF interface. When the VLANIF interface is configured as the NAC authentication interface, the VLANIF interface and its mapping physical interface must be configured as control points. And NAC authentication cannot be configured on the physical interface.
Policy association is supported only in the NAC unified mode.
Policy association is not supported on an IPv6 network in V200R013 and earlier versions, in which authentication cannot be triggered through DHCPv6 or ND packets.
Only the S7700, S9700, S12700, and S12700E series switches support PPPoE authentication. However, the switches do not support PPPoE authentication in the policy association solution.
Only the S600-E, S2700, S5700, and S6700 series switches support built-in Portal authentication. However, the switches do not support built-in Portal authentication in the policy association solution.
Policy association does not support Layer 3 Portal authentication, and access mode multi-share.
It is recommended that either all interfaces of the authentication access device have policy association configured or all the interfaces have local authentication configured.
In policy association, the user authentication method depends on the authentication method and sequence configured on the authentication control device.
In policy association, users cannot go online when NAC authentication is configured on the authentication control device, not on the authentication access device. It is recommended that authentication users and non-authentication users be divided into different VLANs in networking and the authentication free rules be configured based on the VLANs to allow the access of authentication-free users.
In policy association, to enable users to obtain some network rights before authentication succeeds, perform the following operations: Run the free-rule rule-id destination any source any command on the authentication access device to enable all network access rights for the users. Then run the authentication event action authorize command on the authentication control device to configure the network access rights for the users before authentication succeeds.