< Home

Configuring Kerberos Snooping

Context

In a Kerberos authentication scenario, you can enable Kerberos snooping on the device to control network access rights of users. The device allows only DHCP, DNS, ARP, and Kerberos protocol packets to pass through before user authentication is successful. Only authenticated users can access network network resources.

Ensure that the pre-connection function has been enabled using the authentication pre-authen-access enable command. Otherwise, Kerberos snooping cannot be implemented.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Run kerberos-snooping-profile name profile-name

    A Kerberos snooping profile is created and the Kerberos snooping profile view is displayed.

  3. Run server-ip server-ip-address &<1-10>

    The IP address of a Kerberos server is configured.

    By default, no Kerberos server IP address is configured on the device.

  4. Run port port-number

    The port number used by a Kerberos server to send packets is configured.

    By default, a Kerberos server uses port 88 to send packets.

  5. Run quit

    Return to the system view.

  6. Run authentication-profile name authentication-profile-name

    An authentication profile is created and the authentication profile view is displayed.

  7. Run kerberos-snooping-profile profile-name

    The Kerberos snooping profile is bound to the authentication profile.

  8. Run quit

    Return to the system view.

  9. Run interface interface-type interface-number

    The interface view is displayed.

  10. Run authentication-profile authentication-profile-name

    The authentication profile is applied to the interface.

    Kerberos snooping can be used only on Layer 2 physical interfaces.

Verifying the Configuration

Run the display kerberos-snooping-profile [ name profile-name ] command to check the configuration of the Kerberos snooping profile.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >