当前位置:   article > 正文

【割接梳理】Cisco设备替换为Huawei/H3C的安全准入(AAA/Radius/Dot1X/MAC绑定)配置梳理_authentication mode multi-authen

authentication mode multi-authen

背景:

某局点需要将数台Cisco Catalyst 2960接入交换机替换为Huawei S5731/H3C S5130交换机。

本人的职责是负责检查及补充由Cisco翻译后的Huawei/H3C配置,现场支持设备割接。

Cisco Catalyst 2960(IOS 12.2)安全准入相关(现有)配置梳理:

  1. aaa new-model //启用AAA认证
  2. !
  3. aaa authentication login default line none //创建缺省登录认证列表;采用line password
  4. aaa authentication dot1x default group radius none //AAA缺省通过802.1X,使用radius认证服务
  5. aaa authorization network default group radius //AAA缺省通过radius网络授权
  6. !
  7. no ip domain-lookup
  8. ip domain-name xxxx.com
  9. vtp mode transparent
  10. !
  11. dot1x system-auth-control //全局启用802.1X
  12. dot1x guest-vlan supplicant //允许客户端切换到guest-vlan
  13. dot1x critical eapol
  14. !
  15. interface GigabitEthernet1/0/1 //普通Dot1x接口
  16. switchport access vlan A
  17. switchport mode access
  18. authentication event no-response action authorize vlan B //设置逃生Vlan
  19. authentication host-mode multi-auth
  20. //端口配置多认证模式:
  21. 不支持vlan切换(按需配置),
  22. 单主机模式,
  23. multi-host多主机模式(其中一台认证通过全放行),
  24. multi-domain多域模式(IP电话场景应用)
  25. authentication port-control auto
  26. //当端口接入设备时自动进行认证
  27. mab eap //端口开启MAB认证功能
  28. dot1x pae authenticator //端口使能802.1x认证
  29. spanning-tree portfast
  30. !
  31. interface GigabitEthernet1/0/45 //MAC绑定接口
  32. switchport access vlan A
  33. switchport mode access
  34. switchport port-security
  35. switchport port-security mac-address sticky
  36. switchport port-security mac-address sticky 1111.2222.3333 vlan access
  37. authentication event no-response action authorize vlan B
  38. //如上,只允许MAC地址为1111.2222.3333的终端接入并做认证
  39. spanning-tree portfast
  40. !
  41. radius-server host 192.168.x.y auth-port 1812 acct-port 1813 key 7 0701224E4Fxxxx
  42. radius-server host 192.168.x.z auth-port 1812 acct-port 1813 key 7 020807590Axxxx
  43. radius-server retransmit 2
  44. radius-server timeout 3
  45. radius-server deadtime 3
  46. radius-server vsa send authentication
  47. !

H3C S5130(Comware_V7)安全准入相关(预)配置梳理:

本割接预配置脚本由局点方提供,需要笔者进行梳理。

  1. #
  2. dot1x //全局使能dot1x功能
  3. dot1x authentication-method eap //设备采用eap中继认证方式
  4. #
  5. mac-authentication //全局使能MAC地址认证
  6. mac-authentication domain XXXX.com //指定MAC地址认证用户使用的认证域
  7. #
  8. interface GigabitEthernet1/0/1 //普通Dot1x接口
  9. port access vlan A
  10. stp edged-port
  11. dot1x
  12. mac-authentication
  13. #
  14. interface GigabitEthernet1/0/32 //MAC绑定接口
  15. port access vlan A
  16. stp edged-port
  17. mac-address static 1111-2222-3333 vlan A
  18. #
  19. radius scheme XXXX.com
  20. primary authentication 192.168.x.y
  21. primary accounting 192.168.x.y
  22. secondary authentication 192.168.x.z
  23. secondary accounting 192.168.x.z
  24. key authentication cipher XXXXXXXXXX
  25. key accounting cipher XXXXXXXXXX
  26. user-name-format without-domain
  27. #
  28. radius scheme system
  29. user-name-format without-domain
  30. #
  31. domain XXXX.com
  32. authentication lan-access radius-scheme XXXX.com local
  33. authorization lan-access radius-scheme XXXX.com local
  34. accounting lan-access radius-scheme XXXX.com local
  35. #
  36. domain default enable XXXX.com
  37. #
  38. return

Huawei S5731(VRP 7)安全准入相关(预)配置梳理:

本割接预配置脚本由局点方提供,需要笔者进行梳理。

  1. #
  2. authentication-profile name auth-new
  3. dot1x-access-profile dot1x-test
  4. mac-access-profile mac-auth
  5. access-domain XXXX.cn force
  6. authentication-profile name default_authen_profile
  7. authentication-profile name dot1x-test
  8. dot1x-access-profile dot1x-test
  9. mac-access-profile mac_access_profile
  10. authentication mode multi-authen max-user 50
  11. access-domain XXXX.cn force
  12. authentication-profile name dot1x_authen_profile
  13. authentication-profile name dot1xmac_authen_profile
  14. authentication-profile name mac-auth
  15. mac-access-profile mac_access_profile
  16. authentication mode multi-authen max-user 100
  17. access-domain XXXX.cn force
  18. authentication-profile name mac_authen_profile
  19. authentication-profile name multi_authen_profile
  20. authentication-profile name portal_authen_profile
  21. #
  22. radius-server template XX-test
  23. radius-server shared-key cipher xxxxxxxxxx
  24. radius-server authentication 192.168.x.y 1812 weight 80
  25. radius-server authentication 192.168.x.z 1812 weight 80
  26. radius-server accounting 192.168.x.y 1813 weight 80
  27. radius-server accounting 192.168.x.z 1813 weight 80
  28. #
  29. aaa
  30. domain XXXX.cn
  31. authentication-scheme acs
  32. accounting-scheme default
  33. radius-server XX-test
  34. #
  35. interface GigabitEthernet0/0/1
  36. port link-type access
  37. port default vlan A
  38. stp edged-port enable
  39. authentication-profile dot1x-test
  40. #
  41. interface GigabitEthernet0/0/7
  42. port link-type access
  43. port default vlan A
  44. stp edged-port enable
  45. port-security enable
  46. port-security mac-address sticky
  47. #
  48. dot1x-access-profile name dot1x-test
  49. dot1x-access-profile name dot1x_access_profile
  50. #
  51. mac-access-profile name mac-auth
  52. mac-access-profile name mac_access_profile

梳理:

  1. H3C/Huawei设备上似乎没有配置接口的逃生功能,即类似Cisco上,在Radius服务器无响应时,将该接口划入Vlan B,保障其未认证时也能够访问一定资源。
  2. Huawei设备的MAC绑定接口下没有指定明确的MAC地址。

针对如上两项编写脚本:

H3C:

  1. interface GigabitEthernet1/0/x
  2. port access vlan A
  3. stp edged-port
  4. dot1x
  5. mac-authentication
  6. dot1x guest-vlan B ----新增内容----
  7. #
  8. interface GigabitEthernet1/0/y
  9. port access vlan A
  10. stp edged-port
  11. mac-address static 1111-2222-3333 vlan A
  12. dot1x guest-vlan B ----新增内容----

Huawei:

  1. interface GigabitEthernet0/0/1
  2. port link-type access
  3. port default vlan A
  4. stp edged-port enable
  5. authentication-profile dot1x-test
  6. authentication critical-vlan B ----新增内容----
  7. authentication critical eapol-success ----新增内容----
  8. #
  9. interface GigabitEthernet0/0/7
  10. port link-type access
  11. port default vlan A
  12. stp edged-port enable
  13. port-security enable
  14. port-security mac-address sticky
  15. authentication critical-vlan B ----新增内容----
  16. authentication critical eapol-success ----新增内容----
  17. port-security mac-address 2222-3333-4444 vlan B ----新增内容----

暂时就这样好了,有什么事情现场再说好了(^^)

声明:本文内容由网友自发贡献,不代表【wpsshop博客】立场,版权归原作者所有,本站不承担相应法律责任。如您发现有侵权的内容,请联系我们。转载请注明出处:https://www.wpsshop.cn/w/weixin_40725706/article/detail/180109
推荐阅读
相关标签
  

闽ICP备14008679号