Ead configuration – H3C Technologies H3C S3100 Series Switches User Manual

Page 452

Advertising
background image

3-2

Figure 3-1 Typical network application of EAD

Virus patch server

Supplicant

Authentication server

Security policy server

After a client passes the authentication, the security Client (software installed on the client PC) interacts

with the security policy server to check the security status of the client. If the client is not compliant with

the security standard, the security policy server issues an ACL to the switch, which then inhibits the

client from accessing any parts of the network except for the virus/patch server.

After the client is patched and compliant with the required security standard, the security policy server

reissues an ACL to the switch, which then assigns access right to the client so that the client can access

more network resources.

EAD Configuration

The EAD configuration includes:

z

Configuring the attributes of access users (such as user name, user type, and password). For local

authentication, you need to configure these attributes on the switch; for remote authentication, you

need to configure these attributes on the AAA sever.

z

Configuring a RADIUS scheme.

z

Configuring the IP address of the security policy server.

z

Associating the ISP domain with the RADIUS scheme.

EAD is commonly used in RADIUS authentication environment.

This section mainly describes the configuration of security policy server IP address. For other related

configuration, refer to

AAA Overview

.

Table 3-1 EAD configuration

Operation

Command

Remarks

Enter system view

system-view

Enter RADIUS scheme view

radius scheme
radius-scheme-name

Configure the RADIUS server
type to extended

server-type extended

Required

Configure the IP address of a
security policy server

security-policy-server
ip-address

Required

Each RADIUS scheme supports
up to eight IP addresses of
security policy servers.

Advertising