Portal authentication is also called web authentication. Generally, Portal authentication websites are also called Portal websites.
When an unauthenticated user accesses the Internet, the device forcibly redirects the user to a specific site. The user then can access resources in the specific site for free. When the user needs to access resources outside the specific site, the user must pass authentication on the Portal authentication website first.
A user can access a known Portal authentication website and enter a user name and password for authentication. This mode is called active authentication. If a user attempts to access other external networks through HTTP, the device forcibly redirects the user to the Portal authentication website for Portal authentication. This mode is called forcible authentication.
The device uses Huawei proprietary Portal protocol to perform Portal authentication. Huawei proprietary Portal protocol is compatible with the Portal 2.0 protocol of China Mobile Communications Corporation (CMCC), and supports basic functions of the Portal 2.0 protocol.
A Portal server can be an external Portal server, or a built-in Portal server.
Using an external Portal server
As shown in Figure 1, typical networking of a Portal authentication system consists of four entities: authentication client, access device, Portal server, and authentication/accounting server.
The access device with the built-in Portal server implements all Portal server functions. In this case, the Portal authentication system only includes three entities: authentication client, access device, and authentication/accounting server, as shown in Figure 2.
The built-in Portal server provides Portal authentication, without the need to deploy an extra Portal server.
The built-in Portal server implements basic functions of the Portal server, including web-based login and logout. It cannot replace the independent Portal server or extensions.
Different Portal authentication modes can be used in different networking modes. Portal authentication is classified into Layer 2 and Layer 3 authentication according to the network layer on which it is implemented.
The authentication client and access device are directly connected (or only Layer 2 devices exist between the authentication client and an access device). The device can learn a user's MAC address, and uses an IP address and a MAC address to identify the user. Portal authentication is configured as Layer 2 authentication.
Layer 2 authentication is simple and highly secure. However, it requires that the user reside on the same subnet as the access device, which makes the networking inflexible.
Figure 3 illustrates the packet interaction process when the user goes online and Layer 2 authentication is used.
When the device is deployed at the aggregation or core layer, Layer 3 forwarding devices exist between the authentication client and device. In this case, the device may not obtain the MAC address of the authentication client. Therefore, only the IP address identifies the user. Portal authentication is configured as Layer 3 authentication.
The Layer 3 authentication process is the same as the Layer 2 authentication process. Networking of Layer 3 authentication is flexible, which facilitates remote control. However, only an IP address can be used to identify a user, so Layer 3 authentication has low security.
The device does not support Layer 3 authentication of the built-in Portal server.
If the Portal server fails or communication is interrupted due to a network failure between the device and Portal server, new Portal authentication users cannot go online, and online Portal users cannot go offline normally. User information on the Portal server and the device may be different, resulting in accounting errors.
With the Portal detection and survival function, even if the network fails or the Portal server cannot function properly, the device still allows users with certain access rights to use the network normally, and reports failures using logs and traps. Meanwhile, the user information synchronization mechanism ensures that user information on the Portal server matches that on the device, preventing accounting errors.
The device can authorize users based on the user group. After users are authenticated, the authentication server groups users together. Each user group is bound to an ACL so that users in the same user group share an ACL.