In a Kerberos authentication scenario, you can enable Kerberos snooping on the device to control network access rights of users. The device allows only DHCP, DNS, ARP, and Kerberos protocol packets to pass through before user authentication is successful. Only authenticated users can access network network resources.
Ensure that the pre-connection function has been enabled using the authentication pre-authen-access enable command. Otherwise, Kerberos snooping cannot be implemented.
The system view is displayed.
A Kerberos snooping profile is created and the Kerberos snooping profile view is displayed.
The IP address of a Kerberos server is configured.
By default, no Kerberos server IP address is configured on the device.
The port number used by a Kerberos server to send packets is configured.
By default, a Kerberos server uses port 88 to send packets.
Return to the system view.
An authentication profile is created and the authentication profile view is displayed.
The Kerberos snooping profile is bound to the authentication profile.
Return to the system view.
The interface view is displayed.
The authentication profile is applied to the interface.
Kerberos snooping can be used only on Layer 2 physical interfaces.