Binding authentication uses the physical information of user connections to automatically generate usernames and passwords for authentication, without requiring users to manually input usernames or passwords. This authentication mode is mainly used in DHCP and static access scenarios.
In binding authentication, user terminals send IP packets to a BRAS to trigger the start of the authentication process, or a BRAS initiates authentication after detecting that users are online using ARP. The BRAS generates usernames and passwords based on the user location information, such as the slot IDs, card IDs, port numbers, VLAN IDs, and DHCP Option 82 information. The BRAS then authenticates the users by itself or sends the usernames and passwords to an AAA server for authentication. Users are not aware of the binding authentication process, simplifying user access and improving service security.
The following describes the binding authentication processes for a DHCP user and a static user, respectively.
Figure 1 shows the binding authentication process for a DHCP user.
1. The user starts the terminal (or runs the ipconfig command to release the IP address in use and applies for a new IP address) and sends a DHCP Discover packet.
2. After receiving the packet, the BRAS uses the VLAN ID of the access interface to generate a username and password in binding mode for authentication.
3. The BRAS communicates with the RADIUS server to complete RADIUS authentication.
4. The standard DHCP process starts. The BRAS selects an unassigned IP address from the IP address pool and sends a DHCP Offer packet that carries the leased IP address and other settings to the user.
5. The user sends a DHCP Request packet to the BRAS. The packet carries the desired IP address.
6. The BRAS sends a DHCP ACK packet to the user. The packet carries the assigned IP address and other parameter configurations. After obtaining the IP address, the user goes online successfully.
7. The BRAS periodically sends ARP packets to detect the user's online status and maintain the link connection status. If the user fails to respond within the time limit (for example, if the user powers off the terminal, removes the network cable, or proactively releases the assigned IP address), the BRAS considers the user offline.
8. The BRAS logs out the user and completes accounting.
9. If RADIUS accounting is used, the BRAS logs out the user and completes RADIUS accounting with the RADIUS server.
Figure 2 shows the binding authentication process for a static user.
In binding authentication mode, if a username template is bound to the BAS interface through which users go online, the system generates usernames based on the username template. If no username template is bound to the user access interface but a mode for generating pure usernames is configured in the AAA view, the system generates pure usernames based on the configured mode. If neither of the preceding configurations is available, the system generates usernames based on the default configuration. Interface-specific configuration applies only to the interface, whereas the default configuration and the configuration in the AAA view take effect globally.
The system then generates a username based on the pure username, default authentication domain configured on the BAS interface, and domain name delimiter and position configured in the system. The username can be in either of the following formats: pure username+domain name delimiter+domain name (if the system is configured to place the domain name behind the domain name delimiter) or domain name+domain name delimiter+pure username (if the system is configured to place the domain name before the domain name delimiter).
The BRAS can be configured to use any of the following methods to automatically generate a password for an IPoE user. By default, the BRAS uses a VLAD ID to automatically generate a password for an IPoE user.
Advantages:
Disadvantages: