Compare Products

Hide

Clear All

VS

Home> Support> Downloads>

Ruijie SCN Solution Implementation Cookbook (V1.1)

2020-02-15 View:
Please rate this document

Please rate this document.

* This field is required.

Please leave your suggestions here.

200 characters left

If Ruijie may contact you for more details, please leave your contact information here.

* I understand and agree to Terms of Use and acknowledge Ruijie's Privacy Policy.

* This field is required.
Send Feedback

Thank you for your feedback!

Catalog


     Solution Implementation Procedure

1.1     Preparation Before Implementation

1.1.1    Customer Information Collection

1.1.1.1    Confirmation of Project Progress

1.     Project handover: Obtain the pre-sales solution information of the project from thepre-sales personnel, to understand the main planning of the customer network. Considerthe available project implementation solution based on the equipment list andequipment delivery status.

2.     Confirmation of implementation environment: Ensure that preparation of the peripheral environment for projectimplementation is completed, including equipment room construction, power supply (UPS or mains), and cabling of opticalfibers/network cables, to guarantee the implementation progress.

1.1.1.2    Survey and Collection of Customer RequirementInformation

Beforethe implementation, it is necessary to fully understand the customer's onsiteservice application requirements and network construction/reconstructionrequirements. Collect information based on the customer's routine service usageand fully understand the customer's basic and special service requirements, toidentify risks and make plans in advance based on the demarcation andlimitation of the solution. A full understanding of information can providenecessary basis for the development of the implementation solution.

Theinformation to be collected falls into the following categories:

1.     Network status:

l  Network topology information: includes the actual topology of thelive network, locations of network equipment and servers, configurations oflive network equipment (for in-depth analysis of the live network), and IPaddress and route planning information of live network equipment (routeplanning and routing table details).

2.     Service application status:

l  The following table describes the current service application, userscale, and network system operation & maintenance (O&M).

Level-1 Directory

Level-2 Directory

Refined Service

Information to Be Collected

Service application status

Office service

OA, mail, FTP, DNS, and DHCP

Information about whether the OA, mail, and FTP applications have extranet access requirements, have traffic guarantee, and allow access to the intranet or VPN environment

Scientific research & teaching

Scientific research websites

Routing mode of scientific research websites or resource queries

Multimedia teaching and office

Information about whether the conventional client or virtual space system based on the cloud host is used in the multimedia classroom

Online education

Information about whether the campus network provides online education resources, whether the traffic is transmitted over the CERNET or the networks of the three major operators, and whether the bandwidth is largely consumed

Entertainment

Browser-based entertainment, WeChat, QQ, Taobao, games, and videos

Major online behavior of students, whether rate limiting is performed on students, and whether content-accelerated devices are deployed for high-bandwidth applications

Campus multicast

720p/1080p

Number of video program sources in campus network multicast applications, whether the definition standard is HD or ultra HD, and whether video freezing exists at peak hours

IPv6

Resource requirements for accessing CERNETII

Information about whether the campus network provides IPv6 resource services, whether an egress exists on CERNET II, which IPv6 resource services are available, and whether a network node exists for IPv6-based independent interworking with other campus networks.

User scale

User type

Leader, teaching staff and relative, student, and visitor

Information about whether the campus network user types are missing, how to assign IP addresses for these users, access mode, and accounting mode

User count

Scale

Number of users in the campus network and number of online users on the authentication server at peak hours

Client type

Smart clients, such as the computer, mobile phone, and tablet

With more access clients and more diversified client types, the number of online users at peak hours poses higher pressure on the core and egress devices. Customers are concerned about security control, authorization, authentication, IP address assignment, behavior auditing, and location of clients.

All-in-one cards and dumb clients, such as the printer, water meter, and environment monitoring instrument

Video monitoring and multimedia experiment equipment

Network system O&M status

Information center

Information system and network sources

Information about whether the school has an independent information center, how responsibilities are divided between the information center and network center, and major concerns of the information center and network center

Network center

O&M system integration

Information about whether a unified network management platform is configured for routine O&M and device management, and whether there are secondary development requirements for working with other application systems in the school

Establishment and maintenance status

Self-establishment & self-maintenance, external establishment & external maintenance, and co-establishment & co-maintenance

Campus network types and information about how to maintain campus networks

3.     Basic configuration of the server: includes the server's CPU, memory, disks, network (check theprovided server hardware based on the SAM+ system environment preparations todetermine whether the SAM+ and ePortal requirements are met), operating systemand database versions (check the operating system and database versions basedon the SAM+ system environment preparations to check whether the operatingsystem and database meet the installation requirements), and SAM+ softwareversion purchased by the customer (check whether the software version matcheswith the dongle and meets the project application requirements).

4.     Earlier requirements from the customer: Find out the requirements (check the function support status in thescenario based on the higher education industry solution), evaluate whether therequirements can be met ahead of time, and check whether the requirements arewithin the scope of the solution.

5.     Requirements for interconnecting with livenetwork equipment: Consider compatibility forinterconnecting with the equipment of other vendors, such as the STP, APaggregation, and SAM+ system.

6.     User scale in the campus network: includes the number of areas, teaching buildings, dormitorybuildings, Web authenticated users, 802.1x authenticated users, and MABauthenticated users.

7.     User groups of the customer: includes the access authentication and accounting requirements fordifferent types of user groups (mainly access control and accounting policies,preparing for the subsequent access control and associated accounting policiesof user groups).

8.     Operation mode of the customer: includes the user registration/deregistration process, paymentmode, and reconciliation mode, which affect the whole network operation.

9.     Special service application

l   Confirm the processing requirements for the all-in-one cardclients, monitoring clients, and dumb clients with the customer by checking:

l  Whether the all-in-one cards are deployed in a private network,which requirements are imposed on solution deployment, whether IP addresses arefixed or automatically obtained, and whether IP address segments or VLANs areconsistent or randomly set.

l   Whether the door status control system is deployed in a privatenetwork and which deployment requirements are posed in the solution scenario.

l   Whether the printer application is shared at layer 2 or layer 3.

l   Whether a MAC forgery scenario occurs.

1.2     Deployment Model Selection

1.2.1    Layer 2 Access Isolation

1.2.1.1    Scenario Description

Area

Deployment and Feature Description

Core area

Two RG-N18000 switches form a VSU, both connecting to the egress area in the upstream direction. One MSC-ED card is inserted into each RG-N18000 to implement user traffic accounting and control. As the user gateway and authentication NAS device on the whole network, the RG-N18000 simultaneously supports Web authentication, wired 802.1x authentication, and MAB authentication.

Server area

A SAM+ server and an ePortal server are configured. The SAM+ server collects statistics on the user traffic from the MSC based on the accounting policy.

Aggregation area

A layer-2 transparent transmission device is connected to the upstream core devices in master/slave VSU mode via dual links. A trunk interface is configured in the aggregation area, but it is only used for layer-2 transparent transmission.

Access area

A protection port is configured to implement layer-2 isolation. VLAN segments need to be independently planned for special services (such as door status control, all-in-on card, and video monitoring) to distinguish from user service VLANs.

1.2.1.2    Scenario Topology

1.3     Check After Implementation

1.3.1    Software Information Check on the RG-N18000

1.3.1.1    Checking the CPU Usage

1.      Method

Run the show cpu command inprivileged EXEC mode to check the running status of the CPU:

HXJF-N18K#show cpu

===============================================

[Slot 1: M18000-24GT20SFP4XS-ED, Cpu0]

CPU Using Rate Information

CPU utilization in five seconds:9.3%

CPU utilization in one minute:9.3%

CPU utilization in five minutes:9.3%

2.      Criteria

(1)    In the healthystate, the value of CPU utilization in five minutes should be less than30%. Pay attention to risks if the CPU usage exceeds 60%.

(2)    If a great numberof configurations are made, a great deal of information is displayed, or thedebugging command is configured on the device, the CPU usage may soar instantaneously(normal symptom). Stop the related operation or run the undebug allcommand.

1.3.1.2    Checking the Memory Usage

1.      Method

HXJF-N18K#show memory 

2.      Criteria

p.p1 {margin: 0.0px 0.0px 0.0px0.0px; text-align: justify; font: 10.5px Helvetica} span.s1 {font-kerning:none}

Thememory usage should be less than 60%. Bearing more services may increase thememory usage. Pay attention to risks if the memory usage exceeds 80% and tendsto continuously rise.

1.3.1.3    Checking Logs

1.      Method

HXJF-N18K#show log 

2.      Criteria

p.p1 {margin: 0.0px 0.0px 0.0px0.0px; text-align: justify; font: 10.5px Helvetica} span.s1 {font-kerning:none}

Checkwhether exceptions exist in logs, such as frequent up/down state switches ofthe interface, down state of the dynamic protocol, and alarms of higherseverity.

1.3.1.4    Checking Configuration Information

1.      Method

Runthe show run command in privilege EXEC mode to check the switchconfigurations:

HXJF-N18K#show run

Pay attention to the following mandatorycommands:

auth-mode gateway   //Enablethe gateway mode.

ip radius source-interface (radiusinterface)  //Configure an interconnection interface for communicationbetween the RG-N18000 and server.
ip portal source-interface (portal interface)

offline-detect interval 15 threshold0 //Configure no-traffic go-offline. 

aaa authorizationip-auth-mode mixed   //Configure IP-based AAA authorization.

radius-server attribute nas-port-idformat qinq    //Mandatory for the QinQ scenario

qinq termination pe-vlan 100-101   //Configure QinQ VLAN tag termination.

qinq termination ce-vlan 200 to 300

2.      Criteria

Checkwhether the deployed functions are consistent with the implementation solution,and whether the functions can be optimized.

1.3.2    Software Information Check on the SAM+ Server

1.3.2.1    Monitoring the Management Status

1.      Method

Enablethe service manager on the SAM+ server to check the running status:

2.      Criteria

Fora standalone server, no error is prompted in the service manager. As shown inthe preceding figure, normal prompt information includes: the system is startedsuccessfully, the SAM+ softdog type and validity period are checked, journalsare recorded successfully, and a total of xxx users are processed.

1.3.2.2    Checking the CPU and Memory Usage

Inthe healthy state, the CPU usage should be less than 30%, and the memory usageless than 60%.

1.3.2.3    Checking O&M Logs

1.      Method

(1)    Enter the SAM+management page and choose Operation > Log to check O&Mlogs.

(2)    Enterthe database backup directory to check sizes of backup files and disk space.

2.      Criteria

(1)    Ensure that thedatabase shrinks properly.

(2)    Ensure thatdatabase index fragments are organized properly.

(3)    Ensure that thedatabase is integral.

(4)    Ensure thatdatabase parameters are normal.

(5)    Ensure that theautomatic database backup is normal.

(6)    Ensure thatdatabase files are properly backed up. Ensure sufficient backup disk space toavoid backup failures.

1.3.2.4    Checking Solution Functions  

Checkwhether the deployed functions are consistent with the implementation solution,and whether the functions can be implemented and optimized. For example:

1.      Checkwhether the number of online authenticated users meets the expectation.

2.      Checkwhether accuracy of traffic control meets the expectation.

3.      Checkwhether the accounting policies are correct for different user types (such asthe school director, teaching staff and their relatives, and student).

4.      Checkwhether an account can log in on multiple clients.

5.      Checkwhether different access modes match with different accounting policies.

6.      Check whetherthe DHCP check in Web authentication succeeds.

7.      Checkwhether users can log in via MAB authentication after the first Webauthentication login.

1.3.3    Overall Network Running Check

1.3.3.1    Checking the Network Running Status

Performa thorough check on the network running status, including the equipment checkperformed in the normal network running state and the function verificationafter network implementation:

1.      Run the showcommand to check the running status of core device functions. For the regularoperation commands, refer to the basic information check and spot check ofaccess devices.

2.      Run the traceroutecommand to check the network connectivity and whether data forwarding paths arecorrect. This check aims to test the consistency between the forward and returnpaths in the route design.

Accordingto the configured function verification solution, perform linkconnection/disconnection and switch restart to test the application services,such as the connectivity test and download speed test, so as to verify thenetwork reliability design.

3.      Run the pingcommand to test the network delay and processing of large packets.

4.      Checkfunctions one by one according to the solution scenarios.

5.      Checkthe actual service running status of users at peak hours.

1.3.3.2    Checking the Device and System Running Statusesat Peak Hours

1.      Checkthe running status of the RG-N18000 at peak hours.

Ruijie#show cpu      //The average CPU usage of the switch should be less than 30% in normalcases. 

Ruijie#show cpu-protect mboard   

Ruijie#show cpu-protect           //Check whether the protocol rate exceeds theexpectation and protocol packets are dropped, to assist in locating the causefor high CPU usage. 

Ruijie#show memory               //The memory usage of the switch shouldbe less than 60% in normal cases.

Ruijie#show arp counter         //Check the ARP aging time and whether the number of ARPentries is normal.

Ruijie#show mac-address-table count//Check the number of MAC address tables on the network.

Ruijie#show ip route               //Check the routing table scale on thelive network.

Ruijie#show web-auth user all    //Display Web authenticated users.

Ruijie#show dot1x sum              //Display 802.1x authenticated users.

2.      Checkthe running status of the SAM+ server at peak hours.

Check the number of authenticated userson the SAM+ server, and whether the CPU usage and memory usage are normal.

1.3.4    Check Points for Important Time Guarantee

Guide for Checking Important FunctionalIndicators of the RG-N18000 on Simplistic Network for the Back-to-School Season

1.3.4.1    Regular Information Check

1.3.4.1.1    CPU
1.3.4.1.1.1    Command

show cpu

show cpu | inc postgres

1.3.4.1.1.2    Check Point

Check the CPU usage of the managementmodule and line card, which should not be greater than 50%.

Check whether the CPU usage of anindependent process approaches 12.5%. If yes, risks may exist and independentanalysis and evaluation are required.

Check the CPU usage of the postgresprocess, which should not stay high.

mk:@MSITStore:D:\Cloud\Work\workstation\SAM+%20project\SCN%20TAC\01%20极简网络解决方案%20渠道工程师学习包\01%20培训学习包\06%20极简网络解决方案%20实施一本通\01%20极简网络解决方案一本通%20V2.9.chm::/5a34a6eb-3744-4004-92f4-d181aaa15e45_files/53170661.png

1.3.4.1.2    Memory
1.3.4.1.2.1    Command

show memory

1.3.4.1.2.2    Check Point

Check the memory usage, which should notbe greater than 50%.

1.3.4.1.3    Interface Traffic
1.3.4.1.3.1    Command

show int counters rate up

show int usage up

1.3.4.1.3.2    Check Point

Check the port utilization, which shouldnot be greater than 80%.

1.3.4.1.4    Error Frame
1.3.4.1.4.1    Command

show interface counters errors

1.3.4.1.4.2    Check Point

Check for the types of error frames.

1.3.4.1.5    Port Up/Down
1.3.4.1.5.1    Command

show interface link-state-changestatistics

1.3.4.1.5.2    Check Point

Check whether a port becomes up and downrepeatedly for more than 100 times.

1.3.4.1.6    Loop
1.3.4.1.6.1    Command

show rldp loop-detect-log

1.3.4.1.6.2    Check Point

Check for loop logs.

1.3.4.1.7    Line Card
1.3.4.1.7.1    Command

show version slots

1.3.4.1.7.2    Check Point

Check whether the line card is normal.

1.3.4.1.8    Temperature
1.3.4.1.8.1    Command

show temperature

1.3.4.1.8.2    Check Point

Check whether the temperature is normal.

1.3.4.1.9    Fan
1.3.4.1.9.1    Command

show fan

1.3.4.1.9.2    Check Point

1.3.4.1.10  VSU
1.3.4.1.10.1  Command

show switch virtual topology

show switch virtual link port

1.3.4.1.10.2  Check Point

Check whether the VSU topology and porttraffic are normal.

mk:@MSITStore:D:\Cloud\Work\workstation\SAM+%20project\SCN%20TAC\01%20极简网络解决方案%20渠道工程师学习包\01%20培训学习包\06%20极简网络解决方案%20实施一本通\01%20极简网络解决方案一本通%20V2.9.chm::/5a34a6eb-3744-4004-92f4-d181aaa15e45_files/53428736.png

1.3.4.1.11  Packets Destined for the CPU
1.3.4.1.11.1  Command

show cpu-protect

1.3.4.1.11.2  Check Point

Check whether the number of packets destinedfor the CPU is normal, whether the rate of important packets is normal, andwhether packet loss occurs.

Pay attention to the following packettypes: arp, dhcp, dot1x, web-auth, web-auths, and rldp.

1.3.4.1.12  Log
1.3.4.1.12.1  Command

show logging

1.3.4.1.12.2  Check Point

Check whether logs are abnormal.

1.3.4.2    Information Check Specific to SimplisticNetwork

1.3.4.2.1    DHCP Allocation and Conflict-incurred Failure
1.3.4.2.1.1    Command

show ip dhcp binding

show ip dhcp pool

show ip dhcp conflict

1.3.4.2.1.2    Check Point

Check the total number of IP addressesallocated via DHCP and the number allocated IP addresses in each address pool.

Check the status of conflict-incurredfailures.

1.3.4.2.2    Number of ARP/MAC Addresses
1.3.4.2.2.1    Command

show arp count

debug bridge mac

show mac count

undebug all

1.3.4.2.2.2    Check Point

Check the number of static ARP/MACaddresses, which should be equal to the total number of authenticated users.

Check the number of ARP addresses, whichshould be equal to that of IP addresses allocated via DHCP (in the case withoutstatic IP addresses).

1.3.4.2.3    ND Entry
1.3.4.2.3.1    Command

show ipv6 neighbors statistics

1.3.4.2.3.2    Check Point

Check the number of ND entries:

Entries: not greater than three times the numberof ARP entries.

Probe: not greater than 1000.

Incomplete: not greater than 1000.

1.3.4.2.4    Status of RADIUS Server and Portal Server
1.3.4.2.4.1    Command

show web-auth portal

show radius server

1.3.4.2.4.2    Check Point

Check whether the status of the portalserver is Enable.

Check whether the status of the RADIUSserver is Active.

If the timeouts values of Authen/Authorare high, the authentication may take a long time or the authentication fails.

If the timeouts value of Accountis high, check whether abnormal logs exist on the SAM+ server.

1.3.4.2.5    Number of 802.1x Authenticated Users andFailure Events
1.3.4.2.5.1    Command

show dot1x

show dot1x authmng abnormal

1.3.4.2.5.2    Check Point

Check the number of 802.1x users.

Check for abnormal events in 802.1xauthentication.

1.3.4.2.6    Number of Web Authenticated Users and FailureEvents
1.3.4.2.6.1    Command

show web-auth user all

show web-auth authmng abnormal

1.3.4.2.6.2    Check Point

Check the number of Web authenticatedusers.

Check for abnormal events in Webauthentication.

1.3.4.2.7    No-traffic Go-offline
1.3.4.2.7.1    Command

show run | in off

1.3.4.2.7.2    Check Point

Check whether only the VLAN-basedno-traffic go-offline period is configured.

1.3.4.2.8    Number of Authentication-free VLANs
1.3.4.2.8.1    Command

show direct-vlan

1.3.4.2.8.2    Check Point

Check whether the number ofauthentication-free VLANs exceeds 50.

1.3.4.2.9    One-to-Many Mirroring
1.3.4.2.9.1    Command

show run | inc remote-span

show run | inc mac-loopback

show monitor

show switch virtual link port

show int usage up

1.3.4.2.9.2    Check Point

Check whether one-to-many mirroring isconfigured and whether a VSL has approximately full bandwidth.

If yes, it is necessary to takecountermeasures, for example, change the mirroring mode (one-to-one mirroringto the layer-2 switch and flooding to multiple egresses), and change the VSL to40 Gbps.

If no countermeasure is available,contact the TAC and R&D engineers.

1.3.4.2.10  AP Across Line Cards and Chassis
1.3.4.2.10.1  Command

show version slot

show agg sum

1.3.4.2.10.2  Check Point

Check whether an AP across line cards andchassis exists, and whether a VAC solution is used. If a VAC solution is usedand the CPU usage of a line card exceeds 70%, contact the TAC and R&Dengineers.

1.3.5    Network Authentication Health Check AfterProject Cutover

1.3.5.1    802.1x Authentication

DLUT-CORE-N18014#show dot1x authmngstatistic 

show 802.1x authentication information:

DOT1X current onlinenumber:..................18446744073709551615.

DOT1X historical max onlinenumber:...........0.

DOT1X aggregate online number:................0.

802.1x authentication statistics:

authenticationnumber:........................2322.

authenticationsuccess:.......................0.

authentication successrate:..................0%.

  aaa reject                            : 49

  user logoff                            : 0

  conflict account                       : 0

  valid ip mab                          : 0

adjust authentication successrate:...........0%.

  request id timeout                     :2258-------------->

  request timeout                         :14--------------->

  aaa timeout                            : 1------------------>

  other timeout                          : 0-----------------> The network or server is unstable according tothe preceding four timeout items.

  ipam not allowed                       :0---------------> AM rules are not met.

  ip band width fall                     :0-----------------> IP/bandwidth authorization fails.

  set scc fall                          : 0------------------> SCC setting fails due to bottom layer errors.

  author vlan fail                       : 0

  vid modify                            : 0

  prot user limit                         :0--------------------> The number of users is limited due to configurationerrors.

  total user limit                       :0------------------> The total number of users is limited due toconfiguration errors.

  acct cache deny                         :0--------------------> Accounting results are cached slowly due to theunstable server or network.

  other security type                     :0--------------------> Other security functions are configured generally.

  close auth switch                       :0-------------------> 802.1x authentication is disabled globally.

  deny non-rg client                     :0---------------------> Non-Ruijie clients are filtered out.

  mab vlan deny                          : 0---------------------> The VLAN does not comply with MAB VLANconfigurations.

  valid ip                              : 0--------------------> No IP address is obtained.

  set acl fail                          : 0

  port down                              : 0

  not allow user                         :0

authentication success rssiavgvalue:.........0dBm.

authentication fail rssiavgvalue:............0dBm.

802.1x offline statistics:

offline_total:................................295.

  user logoff                            : 0

  server kickout user                     : 0

  no flow                                : 0-------------------> The user goes offline due to notraffic.

  no ip                                  : 0-------------------> The user is forced to gooffline because it fails to obtain an IP address.

  session timeout                         :0-------------------> The available online period times out.

  flux out                              : 0-------------------> The traffic is used up.

  svr kickout user                       : 0

  hello timeout                          : 0-------------------> The client detection times out.

  scc rollback                          : 0-------------------> SCC setting fails due to bottom layer errors.

  mac rollback                          : 0-------------------> MAC setting fails due to bottom layer errors.

  ip bandwith fail                       :0-------------------> Authorization fails. Check whether any configurationerror exists.

  mng no port control                     :0------------------->

  mng author change                       : 0

  mng allow user change                   : 0

  mng direct vlan change                 : 0

  mng clear cli                          : 0

  mng ipam change                         :0

  mng staitc mac                         :0

  mng filter mac                         :0

  mng set mumab                          : 0

  mng mab vlan change                     : 0

  mng ip acct change                     : 0

  mng ctrl mode                          : 0

  mng vlan change                         :0-------------------> The preceding items indicate that configurations arechanged.

  port move                              : 295  

  vlan move                              : 0

  port-vlan move                         :0------------------> The preceding items indicate that migration occurs.

  invalid ip                            : 0

  port down                              : 0

  gsn fail                              : 0

  mab to 1x                              : 0-------------------> MAB authentication is replaced by802.1x authentication. Check whether 802.1x authentication is used by the user.

  mab to guest vlan                       : 0

  dhcp author fail                       : 0

  db recover fail                         :0

  adb author fail                         :0--------------------> The preceding VLAN authorization items are generallynot configured in the simplistic network environment.

  recover to scc fail                     :0---------------------> SCC setting fails possibly due to bottom layererrors.

  ha recover fail                         :0----------------------> Hot backup recovery fails possibly due toprocessing logic errors in 802.1x authentication.

  ip mab unset ip                         :0

  s mab change                          : 0

 offline_by_auth:.............................0.

    request idtimeout                    :0

    request timeout                       :0

    aaa timeout                          : 0

    other timeout                        : 0

    aaa reject                          : 0

    ipam not allowed                     : 0

    ip band widthfall                    : 0

    set scc fall                        : 0

    user logoff                          : 0

    author vlan fail                     : 0

    vid modify                          : 0

    prot user limit                       :0

    total user limit                     : 0

    acct cache deny                       :0

    other securitytype                    : 0

    close auth switch                     : 0

    deny non-rgclient                    : 0

    mabvlan deny                         : 0

    valid ip                            : 0

    setacl fail                         : 0

    port down                            : 0

    not allow user                       :0

    conflict account                     : 0

    valid ip mab                        : 0-----------------> The preceding items indicate failure statisticscollected during the authentication.

1.3.5.2    MAB Authentication (Same as 802.1x Authentication)

1.3.5.3    Web Authentication

DLUT-CORE-N18014#show web-auth authmngstatistics

Show web authentication information:

current online number:..................................3087. --- Number of current online users

historical max onlinenumber:...........................5071.  --- Historical maximum number ofonline users

aggregate onlinenumber:................................344156.  --- Total number ofaccumulative online users

Web authentication redirect statistics:

HTTP packet processing:

  number ofusers:.......................................12973993      ---Number of users whose HTTP packets are processed

  number of HTTP packetsreceived:.......................1543216156    ---  Number ofHTTP packets received

redirection time consumption forsuccessful users:                   --- Time consumption for redirection

  average timeconsumption:..............................58ms.

  aggregate timeconsumption:............................39285499875ms.

  number of less than half onesecond:...................663809946(98.738%).

  number of between half and onesecond:.................2082988(0.310%).

  number of more than one second:........................6402954.

Web authentication statistic:                                          --Statistics related to Web authentication

authentication processing:

  number of authenticationrequests received:............784127.

  number of reauthenticationrequests received:..........225537.

  number of errorpassword:..............................391339.

  number of authenticationfailures:.....................48632(6.202%).

  AAAtimeout:..........................................46736(96.101%). ---  AAA authentication times out due to the unstable network or server.

  authentication statustimeout:........................1(0.002%).        --- Authentication device timeout

  fail to setSCC:......................................0(0.000%).       ---  SCC setting fails due to bottom layer errors.

  accountingreject:....................................0(0.000%).       ---  Rejection from the accounting server 

  accounting dev timeout:...............................0(0.000%).       ---  Accounting device timeout

  userunexist:.........................................1154(2.373%).   ---  The user does not exist.

  portaltimeout:.......................................0(0.000%).       ---  Portal server timeout

  DHCPreleasepkt:......................................0(0.000%).       ---  No statistics are collected for the following four items. Neglectthem.

  stamove:.............................................0(0.000%).

  clearuser:...........................................0(0.000%).

  configchange:........................................0(0.000%).

 other:................................................741.             

Authentication time consumption forsuccessful users:

  average timeconsumption:..............................94ms.    ----  Timeconsumption for authentication

  aggregate timeconsumption:............................32609811ms.

  number of less than onesecond:........................341995(99.372%).

  number of between one andthree second:................667(0.194%).

  number of more than threesecond:......................1494(0.434%).

  number of less than onesecond(exclude server):........344121(99.990%).

  number of between one andthree second(exclude server):6(0.002%).

  number of more than threesecond(exclude server):......29(0.008%).

 

Web authentication offlineinformation:                           ---- Statistics related to Web usergo-offline

number of offlinecount:................................341069.

  number of abnormaloffline(rate):......................408(0.119%).

  number of portaltimeout:.............................408(100.000%).  --- The user goesoffline because the portal server does not respond, which is possibly resultedfrom an unstable network or server.

  number of setfail:...................................0(0.000%).      --- SCCsetting fails due to bottom layer errors.

  number of linkchange:................................0.             --- No statistics are collected.

  noflow:...............................................277797.         --- The user goes offline due to no traffic.

  kickoff:..............................................23745.         --- The user is forced to go offline by the server.

  dhcprelease:..........................................8971.           --- The user goes offline due to DHCP release.

  STAdelete:............................................0.             --- The user is forced to go offline.

  STA move:..............................................0.             --- The user goes offline due toclient migration.

  activeoffline:........................................15817.         --- The user goes offline actively.

  session timeout:.......................................9975.           --- The user goes offline because theavailable online period times out.

  cliclear:.............................................0.             --- The user goes offline because the CLI commandis cleared.

  nocontrol:............................................0.             --- The user goes offline because control isdisabled.

  interfacedefault:.....................................0.             --- The interface is the default one.

  interface destroy:.....................................0.             --- The interface is destroyed.

  interface addap:......................................0.             --- The interface is added to an AP.

  delap:................................................0.             --- The interface is deleted from an AP.

  dhcp ipcheck:.........................................0.             --- The user goes offline due to DHCP IP check.

  vlanchange:...........................................0.             --- The user goes offline due to VLAN changes.

  intfvlanchange:.......................................0.             --- The user goes offline due to layer-3 VLANconfiguration changes.

 other:.................................................4356.

aggregate onlinetime:..................................444256014min

average online time ofuser:............................1304min          ---Average online duration of the user

Station-move:

movecount:.............................................969637.         --- Number of migrations

movefail:..............................................3550.           --- Number of migration failures

 

Other important processstatistics:                                     --- Timeconsumption statistics of all modules are listed below.

Auth:                                                                 --- Time consumptionfor Web authentication

average timeconsumption:...............................71ms.

aggregate timeconsumption:.............................24669338ms.

number of less than onesecond:.........................342103(99.403%).

number of more than onesecond:.........................2053.

 

AAA authentication:                                                   --- Time consumption for AAA authentication

average timeconsumption:...............................2ms.

aggregate timeconsumption:.............................1013078ms.

number of less than onesecond:.........................344154(99.999%).

number of more than onesecond:.........................2.

 

Radius authentication:                                                 --- Time consumption for RADIUS authentication

average timeconsumption:...............................0ms.

aggregate timeconsumption:.............................78760ms.

number of less than onesecond:.........................344156(100.000%).

number of more than onesecond:.........................0.

 

Radius server authentication:                                          --- Timeconsumption for RADIUS server authentication

average timeconsumption:...............................55ms.

aggregate timeconsumption:.............................19158014ms.

number of less than onesecond:.........................342113(99.406%).

number of more than one second:.........................2043.

 

SCC:                                                                   --- Timeconsumption for SCC setting

average timeconsumption:...............................0ms.

aggregate timeconsumption:.............................9349ms.

number of less than onesecond:.........................344156(100.000%).

number of more than onesecond:.........................0.

 

Accounting:                                                         --- Time consumption for accounting

average timeconsumption:...............................23ms.

aggregate timeconsumption:.............................7930055ms.

number of less than onesecond:.........................344050(99.969%).

number of more than onesecond:.........................106.

 

AAA accounting:                                                     --- Time consumption for AAA accounting

average timeconsumption:...............................3ms.

aggregate timeconsumption:.............................1081861ms.

number of less than onesecond:.........................344154(99.999%).

number of more than onesecond:.........................2.

 

Radius accounting:                                                   --- Time consumption for RADIUS accounting

average time consumption:...............................1ms.

aggregate timeconsumption:.............................630452ms.

number of less than onesecond:.........................344127(99.992%).

number of more than onesecond:.........................29.

 

Radius server accounting:                                           --- Time consumption for RADIUS server accounting

average timeconsumption:...............................2ms.

aggregate timeconsumption:.............................828579ms.

number of less than one second:.........................344081(99.978%).

number of more than onesecond:.........................75.

 

Portal:                                                             --- Time consumption of the portalserver    

average time consumption:...............................0ms.

aggregate timeconsumption:.............................0ms.

number of less than onesecond:.........................344156(100.000%).

number of more than onesecond:.........................0.

 



     Solution Components and Parameters

2.1     Parameters of Switch Products

2.1.1    Specifications of Core Devices

Device Type

Product Type

Product Model

Quantity of Clients Supported in Authentication

RG-N18000

Supervisor module

CM

600 for Web authentication; 3000 for 802.1x authentication

RG-N18000

Supervisor module

CM II

60000

N18007

Supervisor module

CM

600 for Web authentication; 3000 for 802.1x authentication

N18007

Supervisor module

CM II

60000

N18007

Supervisor module

CM II-LITE

15000

Device Type

Product Type

Product Model

Quantity of Supported Online Dual-stack Clients (ARP)

RG-N18000/N18007

Line card

ED card

60000

RG-N18000/N18007

Line card

DB card

30000

Device Type

Product Type

Product Model

Quantity of Inner VLANs Supported in QinQ Scenarios

RG-N18000/N18007

Line card

ED card

511

RG-N18000/N18007

Line card

DB card

61

Device Type

Product Type

Product Model

Quantity of Supported MAC Tables

RG-N18000/N18007

Line card

ED card

128000

RG-N18000/N18007

Line card

DB card

96000

Device Type

Product Type

Product Model

Supported DHCPv4 Capacity

RG-N18000

Supervisor module

CM

8000

RG-N18000

Supervisor module

CM II

90000

N18007

Supervisor module

CM

8000

N18007

Supervisor module

CM II

90000

N18007

Supervisor module

CM II-LITE

90000

Device Type

Product Type

Product Model

Supported DHCP Snooping Capacity

RG-N18000

Supervisor module

CM

8000

RG-N18000

Supervisor module

CM II

90000

N18007

Supervisor module

CM

8000

N18007

Supervisor module

CM II

90000

N18007

Supervisor module

CM II-LITE

90000

Device Type

Product Type

Product Model

Supported DHCPv6 Capacity

RG-N18000

Supervisor module

CM

8000

RG-N18000

Supervisor module

CM II

90000

N18007

Supervisor module

CM

8000

N18007

Supervisor module

CM II

90000

N18007

Supervisor module

CM II-LITE

90000

2.1.2    Specifications of Aggregation Devices

Device Type

Product Model

Whether Flexible QinQ Supported

Recommended Version

Description

Aggregation

S5750 series (hardware V1.0)

Yes

10.4(3)p4 release(161753)

Only 768 outer VIDs are supported for inner/outer VID mapping.

Aggregation

S5750 series (hardware V2.0)

Yes

10.4(3)p4 release(161753)

N/A

Aggregation

S5750E series

Yes

10.4(3b18)p2,Release(207466)

N/A

Aggregation

S29E

Yes

10.4(2b12)p2 release(180357)

N/A

Aggregation

S2910XS-E series

Yes

S2910_RGOS 11.4(1)B1

N/A

Aggregation

S6200

Yes

10.4(5b1) release(150539)

N/A

Aggregation

S5760 series

No

N/A

The device needs to be replaced.

Aggregation

S26 series

No

N/A

The device needs to be replaced.

Aggregation

S7610

No

N/A

The device needs to be replaced.

Aggregation

S7604

No

N/A

The device needs to be replaced.

Aggregation

S35

No

N/A

The device needs to be replaced.

Aggregation

NBS5526XG

No

N/A

The device needs to be replaced.

2.1.3    Capacity Specifications

Level-1 Specifications

Level-2 Specifications

Level-3 Specifications

RG-N18000 (ED)

RG-N18000 (DB)

Authentication capacity

Web authentication

Web user capacity

60,000 for dual-stack

30,000 for dual-stack

802.1x authentication

802.1x user capacity

60,000 for dual-stack

30,000 for dual-stack

Web MAB authentication

Web MAB authentication capacity

60,000 for dual-stack

30,000 for dual-stack

IPv4 application protocol features

DHCP server

Quantity of users supported by the DHCP server

256K

256K

DHCP relay

Quantity of supported servers

N/A

N/A

DHCP snooping

Capacity of software-bound database

256K

256K

Layer-2 features

MAC address

Quantity of global MAC addresses (the maximum quantity of MAC addresses supported by the MAC address table need to be learned in full mesh mode)

 

 

Quantity of static MAC addresses

10000

10000

Quantity of filtered MAC addresses

10000

10000

MAC address learning rate

2000/S

2000/S

 

Quantity of clients

Quantity of clients (for IPv4/IPv6 dual-stack, each client is assigned with an IPv6 address and an IPv4 address)

CM: 5000 for the case with only 802.1x authentication
1000 for the case with only Web authentication
CM II: 60,000 (recommended) in default mode

CM: 5000 for the case with only 802.1x authentication
1000 for the case with only Web authentication
CM II: 45,000 (recommended) in default mode.

Layer 3 Features

ARP

ARP entry capacity (the maximum quantity of ARP entries supported by the ARP table need to be learned in full mesh mode)

Default mode: 170,000 (sharing resources with ND)

Default mode: 85000 (sharing resources with ND)

ARP learning rate

CM I: 3000/s; CM II: 10,000/s

CM I: 3000/s; CM II: 10,000/s

ND

ND entry capacity (the maximum quantity of ND entries supported by the ND table need to be learned in full mesh mode)

CM: 5000
CM II: 75,000 in default mode (sharing resources with ARP).

CM: 5000
CM II: 60000 in default mode (sharing resources with ARP).

ND learning rate

CM I: 1500/s; CM II: 5000/s

CM I: 1500/s; CM II: 5000/s

IPv4

Quantity of IP addresses set on each layer-3 interface

4000

4000

Capacity of IPv4 hardware routing table (the maximum quantity of routing entries supported by the routing table need to be learned in full mesh mode)

Default mode: 12,000

Default mode: 384000

Capacity of static routing table

The default value is 1024. A command can be used to configure a maximum of 10,000 routes.

The default value is 1024. A command can be used to configure a maximum of 10,000 routes.

Quantity of equal-cost routes supported by each route

32

32

Quantity of routes supporting equal-cost routing

64

64

Quantity of weighted next-hop routes supported by each route

8 (Weight = 4)
4 (Weight = 8)
Weight x Route

count ≤ 32

8 (Weight = 4)
4 (Weight = 8)
Weight x Route

count ≤ 32

Multicast routing table

16000

16000

IPv6

Quantity of IPv6 addresses set on each layer-3 interface

1000 at most

1000 at most

Capacity of IPV6 hardware routing table (network routes) (the maximum quantity of routing entries supported by the routing table need to be learned in full mesh mode)

Default mode: 6000

Default mode: 1000

Capacity of routing table supporting the subnet mask length of 65–128 (If no description is made, the capacity is not limited by the subnet mask length and the hardware routing table capacity prevails.)

Default mode: 1000

Default mode: 4000

Capacity of static IPv6 routing table

1000

1000

Quantity of IPv6 tunnel interfaces

127

127

Multicast routing table

8000

8000

PBRv4

Quantity of supported policy-based routes

1500–7000

1500–7000

Quantity of equal-cost routes supported by each policy-based route

32

32

PBR v6

Quantity of supported policy-based routes

1500–3000

1500–3000

Quantity of equal-cost routes supported by each policy-based route

32

32

ACL

ACE capacity

Maximum number of inbound ACE entries associated with the SVI

7000

7000

Maximum number of inbound ACE entries associated with the physical port/AP

7000

7000

Maximum number of outbound ACE entries associated with the SVI (simulated based on inbound ACE entries, limited, and with inbound entries occupied)

N/A

N/A

Maximum number of outbound ACE entries associated with the SVI (actual outbound ACE entries)

1000

1000

Maximum number of outbound ACE entries associated with the physical port/AP (simulated based on inbound ACE entries)

N/A

N/A

Maximum number of outbound ACE entries associated with the physical port/AP (actual outbound ACE entries)

1000

1000

 



     Typical Scenarios

3.1     Access Isolation Scenario

3.1.1    Overall Solution

3.1.1.1    Solution Description

Thesimplistic network access isolation solution employs one VLAN for each accessswitch, and allows locating the specific access switch according to the VLANID. In addition, this solution provides layer-2 isolation for all users,effectively preventing layer-2 broadcast packet attacks and ARP and DHCPspoofing attacks.

1.      The coreRG-N18000 serves as the gateway and authentication NAS device on the whole network:

l  A maximum of 60,000 online dual-stack clients are supported incoordination with ED cards, and a maximum of 30,000 online clients aresupported in coordination with DB cards or both of ED and DB cards.

l  Web authentication, wired 802.1x authentication, and MABauthentication are simultaneously supported. Wireless 802.1x authentication isnot supported currently, because it needs to bedeployed on the AC.

l  Wireless 802.1x VLANs, AP management VLANs, and other specialservice VLANs requiring no authentication (such as door status control,all-in-one card, and video monitoring) are configured as authentication-freeVLANs.

l  As the core layer-2 gateway, the RG-N18000can support the super VLAN function to perform aggregation gatewayconfigurations for sub VLANs. One super VLAN can be deployed for each area, forexample, one super VLAN for the office area of the xx campus and one super VLANfor the student dormitory area of the xx campus.

l  The ARP proxy function is enabled on the super VLAN gateway of the coredevice by default, to guarantee layer-3 communication between sub VLANs anddecrease ARP flooding traffic.

l  The port protection function needs to be configured on the downlinkinterface of the core device (by running the switchport protectedcommand), to prevent layer-2 broadcast between the same VLANs in differentareas. In addition, unused VLANs need to be pruned to minimize the broadcastdomain.

l  The SVI of the super VLAN gateway needs tobe set to OSPF passive if OSPF is configured.

2.      Theaggregation device serves as layer-2 transparent transmission device:

l  The VLAN and trunk interfaces areconfigured for layer-2 transparent transmission only.

l  The SVI of the user gateway needs to be set to OSPF passive if theconventional 3-layer network is deployed and OSPF is configured on theaggregation device.

l  The port protection function needs to beconfigured on the downlink interface of the aggregation device (by running the switchportprotected command), to prevent layer-2 broadcast between the same VLANs in differentareas. In addition, unused VLANs need to be pruned to minimize the broadcastdomain.

l  The storm suppression function isconfigured to suppress broadcast packets at 1000 pps and multicast packets at1000 pps. In addition, this function needs to be adjusted according to the livenetwork applications. For example, if multicast services exist on the livenetwork, do not configure multicast packet suppression and suppress broadcastpackets at 1000 pps.

3.      Theaccess device provides user-based layer-2 isolation:

l  The same VLAN is configured on all interfaces of each accessswitch, and different VLANs are configured for different access switches.

l  The port protection function needs to beconfigured on the interfaces of each switch (by running the switchport protectedcommand), to implement layer-2 VLAN isolation.

l  Different VLANs need to be configured fordifferent access switches, with incremental VLAN IDs.

l  VLAN segments need to be independently planned for special services(such as door status control, all-in-on card, and video monitoring) todistinguish from user service VLANs, to facilitate authentication-free VLANconfiguration on the core device for special services.

l  RDLP is enabledon the interface of the access device connected to the clients, and an anti-looppolicy is configured to shut down a port upon a loop.

l  The storm suppression function is enabled on the interfaces of the access deviceconnected to the clients, to suppress broadcast packets at 300 pps andmulticast packets at 300 pps. In addition, this function needs to be adjustedaccording to the live network applications. For example, if multicast servicesexist on the live network, do not configure multicast packet suppression andsuppress broadcast packets at 1000 pps.

3.1.1.2    Solution Topology

3.1.1.3    Recommended Scenario

1.    In the case ofnetwork construction, an access cascading scenario exists in the live networkand flexible QinQ is not supported on the aggregation device.

Suggestionfor the wired network scenario: It is recommended to deploy access isolation,configure one VLAN for each switch, and configure one super VLAN for each area(such as the office area of the xx campus, library of the xx campus, andstudent dormitory area of the xx campus).

2.    In the case of networkreconstruction, it is unclear whether devices are interconnected and whetherflexible QinQ is supported.

Suggestionfor the wired network scenario: It is recommended to deploy access isolation,configure one VLAN for each switch, and configure one super VLAN for each area(such as the office area of the xx campus, library of the xx campus, andstudent dormitory area of the xx campus).

3.1.2    VLAN/IP Planning

3.1.2.1    Planning Idea

Configure one VLAN (sub VLAN) for theaccess switch of each floor, and one super VLAN for each area (such as thestudent dormitory area of the xx campus).

Reserve VLANs (30% or more) for each areafor further network change or expansion.

Reference templates:

Wired network VLAN/IP planning for thestudent dormitory area:

Device Model

Device Type

Location

Management Address

Sub VLAN

Super VLAN

Network Segment (planned according to rules, with the actual subnet mask length being /16)

Gateway

Network Management VLAN

Video Monitoring VLAN

All-in-one Card VLAN

Door Status Control VLAN

S2928G

Floor access switch

1/F, building 1, student dormitory area

192.168.132.1

1001

4000

172.16.0.0/24

172.16.15.254/16

100

101

102

103

S2928G

Floor access switch

2/F, building 1, student dormitory area

192.168.132.2

1002

 

 

 

 

 

 

 

S2928G

Floor access switch

1/F, building 2, student dormitory area

192.168.132.3

1003

 

172.16.1.0/24

172.16.15.254/16

 

 

 

 

S2928G

Floor access switch

2/F, building 2, student dormitory area

192.168.132.4

1004

 

 

 

 

 

 

 

S2928G

Floor access switch

1/F, building 3, student dormitory area

192.168.132.5

1005

 

172.16.2.0/24

172.16.15.254/16

 

 

 

 

S2928G

Floor access switch

2/F, building 3, student dormitory area

192.168.132.6

1006

 

 

 

 

 

 

 

S2928G

Floor access switch

1/F, building 4, student dormitory area

192.168.132.7

1007

 

172.16.3.0/24

172.16.15.254/16

 

 

 

 

S2928G

Floor access switch

2/F, building 4, student dormitory area

192.168.132.8

1008

 

 

 

 

 

 

 

S2928G

Floor access switch

1/F, building 5, student dormitory area

192.168.132.9

1009

 

172.16.4.0/24

172.16.15.254/16

 

 

 

 

S2928G

Floor access switch

2/F, building 5, student dormitory area

192.168.132.10

1010

 

 

 

 

 

 

 

S2928G

Floor access switch

1/F, building 6, student dormitory area

192.168.132.11

1011

 

172.16.5.0/24

172.16.15.254/16

 

 

 

 

S2928G

Floor access switch

2/F, building 6, student dormitory area

192.168.132.12

1012

 

 

 

 

 

 

 

S2928G

Floor access switch

1/F, building 7, student dormitory area

192.168.132.13

1013

 

172.16.6.0/24

172.16.15.254/16

 

 

 

 

S2928G

Floor access switch

2/F, building 7, student dormitory area

192.168.132.14

1014

 

 

 

 

 

 

 

S2928G

Floor access switch

1/F, building 8, student dormitory area

192.168.132.15

1015

 

172.16.7.0/24

172.16.15.254/16

 

 

 

 

S2928G

Floor access switch

2/F, building 8, student dormitory area

192.168.132.16

1016

 

 

 

 

 

 

 

S2928G

Floor access switch

1/F, building 9, student dormitory area

192.168.132.17

1017

 

172.16.8.0/24

172.16.15.254/16

 

 

 

 

S2928G

Floor access switch

2/F, building 9, student dormitory area

192.168.132.18

1018

 

 

 

 

 

 

 

S2928G

Floor access switch

1/F, building 10, student dormitory area

192.168.132.19

1019

 

172.16.9.0/24

172.16.15.254/16

 

 

 

 

S2928G

Floor access switch

2/F, building 10, student dormitory area

192.168.132.20

1020

 

 

 

 

 

 

 

S2928G

Floor access switch

1/F, building 11, student dormitory area

192.168.132.21

1021

 

172.16.10.0/24

172.16.15.254/16

 

 

 

 

S2928G

Floor access switch

2/F, building 11, student dormitory area

192.168.132.22

1022

 

 

 

 

 

 

 

3.2     Wireless Isolation Scenario

3.2.1    Overall Solution

3.2.1.1    Solution Description

1.      The simplisticnetwork wireless isolation solution employs one super VLAN for each area (forexample, a super VLAN for the office area of the xx campus), and two sub VLANsfor each building in the area (one for wireless Web authentication and theother for wireless 802.1x authentication). This solution helps you locatewireless users to a specific building based on the VLAN, and enables wirelessuser isolation to prevent layer-2 broadcast packet attacks and ARP and DHCPspoofing attacks.

2.      Thissolution also supports super VLANs based on the SSID, for example, one superVLAN separately for 802.1x authenticated student users, 802.1x authenticatedteacher users, Web authenticated student users, and Web authenticated teacherusers. This solution employs sub VLANs based on the area, building, and floorto control the scope of the broadcast domain.

 

1.      Thecore RG-N18000 serves as the gateway and authentication NAS device on the wholenetwork:

l  A maximum of 60,000 online dual-stack clients (a maximum of 90,000 onlineclients in theory) are supported in coordination with ED cards, and a maximumof 30,000 online clients are supported in coordination with DB cards or both ofED and DB cards.

l  Web authentication, wired 802.1x authentication, and MABauthentication are simultaneously supported. Wireless 802.1x authentication isnot supported currently, because it needs to be deployed on the AC.

l  Wireless 802.1x VLANs and AP management VLANs are configured asauthentication-free VLANs.

l  As the core layer-2 gateway, the RG-N18000 can support the superVLAN function to perform aggregation gateway configurations for sub VLANs. Onesuper VLAN can be deployed for each area, for example, one super VLAN for theoffice area of the xx campus and one super VLAN for the student dormitory areaof the xx campus.

l  The ARP proxy function is enabled on the super VLAN gateway of thecore device by default, to guarantee layer-3 communication between sub VLANsand decrease ARP flooding traffic.

l  The port isolation function needs to be configured on the downlinkinterface of the core device, to prevent layer-2 broadcast between the sameVLANs in different areas. In addition, unused VLANs need to be pruned tominimize the broadcast domain.

2.      The ACserves as wireless controller in fit mode to perform the basic wirelessconfigurations and simplistic network planning configurations:

l  The basic wireless configuration mode is set to support centralizedforwarding or local forwarding.

l  Wireless user isolation is configured to prevent an overlargewireless user broadcast domain in a VLAN.

l  The ARP proxy function is disabled on the AC, so that the RG-N18000serves as the ARP proxy, to prevent failures in migration of wirelessauthenticated users.

l  One super VLAN is configured for each area, for example, one superVLAN for the office area of the xx campus.

l  Two sub VLANs are configured for the AP of each building, one forwireless Web authentication and the other for wireless 802.1x authentication.

l  SSIDs are set based on the operator and authentication mode, forexample, SSID 1 for operator A - Web authentication, SSID 2 for operator A -802.1x authentication, SSID 3 for operator B - Web authentication, and SSID 4for operator B - 802.1x authentication.

3.2.1.2    Solution Topology

3.2.1.3    Recommended Scenario

The wireless simplistic network uses thewireless isolation solution.

3.2.2    VLAN/IP Planning

3.2.2.1    Planning Idea

l  Configure one super VLAN for each area, for example, one super VLANfor the office area of the xx campus.

l  Configure two sub VLANs for the AP of each building, one forwireless Web authentication and the other for wireless 802.1x authentication.

l  Set SSIDs based on the operator and authentication mode, forexample, SSID 1 for operator A - Web authentication,SSID 2 for operator A - 802.1x authentication, SSID 3 for operator B - Webauthentication, and SSID 4 for operator B - 802.1x authentication.

l  Reserve VLANs (30% or more) for each areafor further network change or expansion.

 

Reference templates:

Wired network VLAN/IP planning for thestudent dormitory area:

Location

AP Management VLAN

AP Management Segment

Gateway

Web Authentication

Sub VLAN

802.1x Authentication Sub VALN

Super VLAN

Network Segment

Gateway

Web Authentication

SSID

802.1x Authentication

SSID

Building 1, student dormitory area

900

192.168.16.0/20

192.168.31.254

3001

3501

4201

172.16.64.0/20

172.16.79.254/20

web-auth

802.1x-auth

Building 2, student dormitory area

900

192.168.16.0/20

192.168.31.254

3002

3502

4201

172.16.64.0/20

172.16.79.254/20

web-auth

802.1x-auth

Building 3, student dormitory area

900

192.168.16.0/20

192.168.31.254

3003

3503

4201

172.16.64.0/20

172.16.79.254/20

web-auth

802.1x-auth

Building 4, student dormitory area

900

192.168.16.0/20

192.168.31.254

3004

3504

4201

172.16.64.0/20

172.16.79.254/20

web-auth

802.1x-auth

Building 5, student dormitory area

900

192.168.16.0/20

192.168.31.254

3005

3505

4201

172.16.64.0/20

172.16.79.254/20

web-auth

802.1x-auth

Building 6, student dormitory area

900

192.168.16.0/20

192.168.31.254

3006

3506

4201

172.16.64.0/20

172.16.79.254/20

web-auth

802.1x-auth

Building 7, student dormitory area

900

192.168.16.0/20

192.168.31.254

3007

3507

4201

172.16.64.0/20

172.16.79.254/20

web-auth

802.1x-auth

Building 8, student dormitory area

900

192.168.16.0/20

192.168.31.254

3008

3508

4201

172.16.64.0/20

172.16.79.254/20

web-auth

802.1x-auth

Building 9, student dormitory area

900

192.168.16.0/20

192.168.31.254

3009

3509

4201

172.16.64.0/20

172.16.79.254/20

web-auth

802.1x-auth

Building 10, student dormitory area

900

192.168.16.0/20

192.168.31.254

3010

3510

4201

172.16.64.0/20

172.16.79.254/20

web-auth

802.1x-auth

Building 10, student dormitory area

900

192.168.16.0/20

192.168.31.254

3011

3511

4201

172.16.64.0/20

172.16.79.254/20

web-auth

802.1x-auth

 



     Configuration of Important Functions

4.1     RG-N18000 Configuration

4.1.1    Common Scenario — Gateway

4.1.1.1    [Mandatory] Gateway Mode

Principles:

Inthe simplistic network solution, the core device acts as the gateway of theentire network, and controls access authentication. Users can be normallyauthenticated and go online only after the authentication mode is set togateway authentication mode and dot1x or Web authentication is enabled.

Otherwise, when the number of 802.1x/Webauthenticated users reach about 2000, the system prompts that the TCAM table isfull and 802.1x/Web authentication is abnormal.

Incomparison to the conventional network, the simplistic network in gateway modehas the following features:

1.    Anauthenticated client is automatically bound with a static ARP address on theRG-N18000.

2.    TheRG-N18000 automatically enables the ARP proxy function on the SVI interface ofa super VLAN. The ARP proxy can be disabled on a sub VLAN. (Valid toauthenticated users)

3.    TheRG-N18000 does not actively send ARP requests to a sub VLAN of a super VLANconfigured on an interface with authentication under control. Instead, theRG-N18000 actively sends ARP requests to authentication-free VLANs and commonVLANs.

4.    Ingateway mode of the simplistic network, the ip source-guard command doesnot take effect.

Configuration commands:

auth-modegateway    //Configured in global configuration mode.

Precautions:

Thiscommand takes effect only after it is configured and saved and the device isrestarted. After the device is restarted, run the show run command tocheck whether the configuration takes effect.

Configuration example

Configuration Steps

Set the authentication mode to the gateway authentication mode on the core gateway Switch A.

Switch A

SwitchA(config)#auth-mode gateway

Please save config and reload system.

SwitchA(config)#exit

*Nov  7 10:13:27: %SYS-5-CONFIG_I: Configured from console by console

SwitchA#reload

Reload system?(Y/N)y

SwitchA#

Verification

Run the show running command to check whether the configuration takes effect.

Switch A

SwitchA(config)#show running-config | include auth-mode

auth-mode gateway

SwitchA#debug scc st

================== sccd server info =================

rdnd role       : 2/2.

ready notify    : CLI LSM BRIDGE SS ACLK BRIDGE-READY TCPIP VFW

aclk-socket info: async - 8, sync - 9, alive - 7. snd_cnt:692. rcv_cnt:692

data sync info  : depend/ready(0x201e/0x201e) aclk(req:0) ss(req:0) mac(req:0)

current scc mode: GATE MODE, new mode(GATE MODE).

ability: 0x3f.

offline-status  : open, interval:6 min, threshold:0 bytes.

station move    : close.

dot1x cpp       : set.   author mode:D1xAuthorMixed.

proc status     : svrid:75 todo-cnt:0 ret-cnt:0.

max wait        : client:9, cost:16(ms)

max proc        : client:11, svrid:72, tlvtype:105, ss-cnt:0, aclk-cnt:0 rv:0. cost:748(ms).

cnt-stat        : web-query-add-arp:[0], web-query-del-arp:[0].

: add-arp:[2], del-arp:[1].

: add-mac:[2], del-mac:[1].

4.1.1.2    [Mandatory] super VLAN

Principles:

The super VLAN technology is used toimplement flat layer 2 networks for gateways. Super VLAN is also called VLANaggregation. The aggregated VLAN range is called sub VLAN of the super VLAN. Asuper VLAN has the following features:

Each sub VLAN has the same functions ascommon VLANs. Different sub VLANs belong to different broadcast domains, andcannot access each other due to layer-2 isolation.

The SVI address of a super VLAN serves asthe gateway address of the sub VLAN of the super VLAN.

When a sub VLAN requires layer-3communication, the IP address of the virtual interface of the super VLAN isused as the gateway address for addressing and forwarding.

When sub VLANs need to access each other,the ARP proxy and ND proxy of the super VLAN need to be configured.

Note: When super VLANs and sub VLANs areconfigured in the simplistic network solution, super VLAN IDs are used only onSVIs, while sub VLAN IDs are used for AM rules, QinQ VLAN tag termination, anddirect VLANs that need the VLAN ID range.

Configuration commands:

vlan(supervlan)              //Createa VLAN.

 supervlan              //Definethe VLAN as a super VLAN.

 subvlan(subvlan-list)              //Definethe sub VLAN range for the super VLAN.

 name(supervlan-name)              //Namethe super VLAN.

 

intvlan  (supervlan)              //Createthe gateway SVI for the super VLAN.

ipaddress (ip/netmask)              //Definethe gateway address and mask.

Precautions:

An SVIand an IP gateway need to be configured for a super VLAN. Otherwise,communication is not supported between sub VLANs or between sub VLANs and otherVLANs.

The ARPproxy is enabled by default. If the ARP proxy is disabled on a super VLAN orsub VLAN, users of sub VLANs cannot perform inter-VLAN communication.

Configuration example

 

Configuration Steps

Configure a super VLAN on the core switch. (Omitted)

On the access switch, configure common VLANs corresponding to sub VLANs of the core switch.

A

SwitchA#configure terminal

Enter configuration commands, one per line.  End with CNTL/Z.

SwitchA(config)#vlan 2

SwitchA(config-vlan)#exit

SwitchA(config)#vlan 10

SwitchA(config-vlan)#exit

SwitchA(config)#vlan 20

SwitchA(config-vlan)#exit

SwitchA(config)#vlan 30

SwitchA(config-vlan)#exit

SwitchA(config)#vlan 2

SwitchA(config-vlan)#supervlan

SwitchA(config-vlan)#subvlan 10,20,30

SwitchA(config-vlan)#exit

SwitchA(config)#interface vlan 2

SwitchA(config-if-VLAN 2)#ip address 192.168.1.1 255.255.255.0

SwitchA(config)#interface range gigabitEthernet 0/1,0/5,0/9

SwitchA(config-if-range)#switchport mode trunk

 

 

 

Verification

Check whether the source device (192.168.1.10) and the destination device (192.168.1.60) can ping each other successfully.

A

SwitchA(config-if-range)# show supervlan

supervlan id  supervlan arp-proxy  subvlan id  subvlan arp-proxy  subvlan ip range

------------  -------------------  ----------  -----------------  ---------

           2          ON          10             ON         192.168.1.10 - 192.168.1.50

                                  20             ON          192.168.1.60 - 192.168.1.100

                                  30             ON          192.168.1.110 - 192.168.1.150

 

4.1.1.3    [Mandatory] Protected Port Isolation

Principles:

Thesimplistic network solution implements layer-2 user isolation by usingprotected ports. A protected port can prevent layer-2 forwarding within oneVLAN of the same switch. When ports are configured as protected ports,protected ports of the same VLAN cannot communicate with each other but aprotected port can normally communicate with a non-protected port.

Configuration commands:

switchportprotected    //Configured in interface configuration mode.

Precautions:

N/A

Configuration example

Ruijie(config)#interfaceGigabitEthernet 0/1

Ruijie(config-if-GigabitEthernet0/1)# switchport protected

4.1.1.4    [Mandatory] Interface Index Uniqueness

Principles:

Theinterface index of each port is unique. You can run the show interfacecommand to display the Index field. After the device restarts, theinterface index of the device may change. As a result, the area divisionfunction of SAM+ will fail. It is recommended to enable the interface indexuniqueness function. After this function is configured, interface indexes arepermanently recorded by the device. They do not change even if the device isrestarted or a line card is removed and then inserted.

Configuration commands:

Ruijie(config)#snmp-server if-indexpersist           //Enableinterface index uniqueness.

Precautions:

N/A

Configuration example

N/A

4.1.1.5    [Mandatory] Regular User Synchronization

Principles:

Some users on SAM+ may fail to go offlinenormally due to exceptions. For this, SAM+ automatically checks online userswith the NAS at 02:00 A.M. every day, to delete information about fake onlineusers.

Configuration commands:

snmp-server host (radiusip) informs version 2c (key)       //ConfigureSNMP for communicating with SAM+.

Precautions:

Configurerelated information on SAM+.

Configuration example

N/A

4.1.2    Common Scenario — Address Management

4.1.2.1    [Mandatory] DHCP Snooping

Principles:

The DHCP snooping feature provides thefollowing functions in simplistic networks:

1.      A simplistic networkadopts the flat layer-2 gateway architecture. DHCP snooping can prevent DHCPspoofing within the same VLAN of the DHCP downlink interface. (In theory, DHCPspoofing does not exist in the simplistic network solution and DHCP snoopingmainly provides layer-2 protection. In simplistic networks, port protectionneeds to be enabled on interfaces of the same VLAN on core devices and accessdevices, to isolate layer-2 broadcast domains and prevent DHCP spoofing.)

2.      DHCP snooping provides IPaddress authorization for 802.1x authentication or MAC Address Bypass (MAB)Authentication by using a DHCP snooping table,  provided that the AAA IPauthorization function is enabled, the dot1x valid-ip-acct enable and dot1xmac-auth-bypass valid-ip-auth commands are executed, and DHCP is configuredto dynamically assign IP addresses to authenticated users.

Configuration commands:

ip dhcpsnooping             //Mandatory.The command is used for DHCP snooping and IP authorization for 802.1xauthentication.

ip dhcp snoopingcheck-giaddr     //Mandatory. It is configured toprevent the RG-N18000 with DHCP snooping enabled from discarding DHCP relaypackets from aggregation devices.

ip dhcp snooping arp-detect     //Optional.Enable fast ARP address reclaiming of DHCP snooping. The ARP address reclaimingis performed once per second during ARP aging and can be performed five timesat most.

 

interface gi2/3/8                   //Optional.It is configured in scenarios in which the DHCP server is not deployed on theRG-N18000 and the DHCP server communicates with the RG-N18000 at layer 2.

 description link-to-dhcpserver

 ip dhcp snoopingtrust       //Configure a DHCP trusted porton the layer-2 port of the interconnected DHCP server.

Precautions:

When the IP DHCP snooping feature isconfigured, the ip dhcp snooping check-giaddr command must be executed,so that the RG-N18000 with DHCP snooping enabled can process DHCP relay packetsfrom aggregation devices. The ip dhcp snooping check-giaddr command hasno drawbacks. Therefore, it is recommended to enable the command by default.

Configuration example

N/A

4.1.2.2    [Mandatory] Fast Address Reclaiming of DHCPSnooping

Principles:

Fast address reclaiming reclaims addressesof DHCP snooping entries rapidly, to prevent an overlarge DHCP snooping bindingtable caused by generation of multiple address entries by the same clientduring wireless user migration.

This function can be associated with the ARPmodule. When an ARP entry corresponding to an IP address in the DHCP snoopingtable is about to age, ARP detection is started. If no response is receivedwithin the detection count, the DHCP snooping entry of the IP address isdeleted.

Configuration commands:

ip dhcp snooingarp-detect        //Optional. Enablefast ARP address reclaiming of DHCP snooping. The ARP address reclaiming isperformed once per second during ARP aging and can be performed five times atmost.

Precautions:

N/A

Configuration example

N/A

4.1.2.3    [Optional] DHCP Server

Principles:

Principles of a DHCP server in asimplistic network scenario are similar to those in a universal scenario.Identical parts of the principles are not described here.

Differences are as follows:

1.      The recommended DHCPlease time is 2 hours. The purpose is to rapidly reclaim DHCP address resourcesthat are not in use, to prevent IP address resources of the gateway from beingfully occupied in areas with heavy traffic.

2.      When the DHCP leaseperiod of the client expires or the RG-N18000 receives a DHCP release packet,the RG-N18000 kicks the client offline during authentication.

This prevents a problem that, when the DHCPserver assigns the IP address originally obtained by the client to a newclient, the IP address is still corresponding to the original client in theauthentication entry and stays in the online state, and the new client cannotbe authenticated.

Configuration commands:

DSW-18KX_LX(config)#ip dhcp pool4000              //Setthe DHCP address pool for the wired network in the dormitory area.

DSW-18KX_LX(dhcp-config)#lease 0 20               //Mandatory.Set the lease time to 2 hours.

DSW-18KX_LX(dhcp-config)#network172.16.0.0 255.255.240.0

DSW-18KX_LX(dhcp-config)#dns-server202.115.32.39 202.115.32.36

DSW-18KX_LX(dhcp-config)#default-router172.16.15.254

Precautions:

It is recommended to set the DHCP serverlease period to 2 hours.

When the DHCP lease period of the clientexpires or the RG-N18000 receives a DHCP release packet, the RG-N18000 kicksthe client offline during authentication.

It is recommended to set the period forno-traffic go-offline detection to be shorter than the lease period of DHCPserver.

Configuration example

N/A

4.1.2.4     [Optional] Fast Address Reclaiming ofDHCP Server

Principles:

Fast address reclaiming is configured toenable the DHCP server to detect whether a user is offline. If a user goesoffline and does not go online again within a period of time, the DHCP serverreclaims the IP address assigned to the user.

The principles are described as follows: TheDHCP server, based on IP addresses in the DHCP server table, conducts keepalivedetection via the ARP module. If identifying that a user goes offline and doesnot go online again within a period of time (5 minutes by default), the DHCP serverreclaims the IP address assigned to the user.

If the DHCP server function is configured onthe RG-N18000, the fast address reclaiming function is mandatory.

Configuration commands:

ip dhcp serverarp-detect      //Enable fast address reclaimingof the DHCP server. If identifying that a user goes offline and does not goonline again within a period of time (5 minutes by default), the DHCP serverreclaims the IP address assigned to the user.

Precautions:

N/A

Configuration example

N/A

4.1.2.5    [Optional] AM Rules

Principles:

AM rules can be used to divide the DHCPaddress segment based on the VLAN+port of the RG-N18000, but the DHCP addresssegment must exist in the DHCP address pool. The address segment assigned byusing AM rules must be smaller than or equal to the DHCP address pool. Example:

DHCP address pool: network 192.168.0.0255.255.0.0

AM rule: match ip 192.168.1.0 255.255.255.0Gi5/3 vlan 1005

In the simplistic network environment, thegateway is deployed via super VLAN. Generally, the gateway is deployed in thefollowing manners:

Scenario 1 (AM rules not required): Sub VLANof each dormitory building or sub VLANs of some dormitory buildings form onesuper VLAN. The network segment corresponding to the gateway of the super VLANis small (for example, several type C addresses). Each super VLAN iscorresponding to one DHCP address pool. The network segments corresponding tothe IP addresses obtained by students are refined and easily managed.

Scenario 2 (AM rules not required): SubVLANs of the entire campus network form one super VLAN. The network segmentcorresponding to the gateway of the super VLAN is relatively large (forexample, several type B addresses). Each super VLAN is corresponding to oneDHCP address pool. The network segments corresponding to the IP addressesobtained by students are scattered and disordered and hard to manage. Theschool does not raise a requirement on provision of different policies on SAM+or egress based on source IP addresses, for example, Internet access areacontrol and PBR.

Scenario 3 (AM rules required): Sub VLANs ofthe entire campus network form one super VLAN. The network segmentcorresponding to the gateway of the super VLAN is relatively large (forexample, several type B addresses). Each super VLAN is corresponding to oneDHCP address pool. The network segments corresponding to the IP addressesobtained by students are scattered and disordered and hard to manage. Theschool requires refined management, and requires precise identification on userareas based on IP addresses, to implement requirements, for example, Internetaccess area control and PBR.

Scenario 4 (AM rules required): sub VLANs ofthe entire campus network form one super VLAN, and multiple secondary addressesare configured for the gateway of the super VLAN. In this scenario, AM rulesmust be configured. Otherwise, DHCP addresses cannot be assigned according tosecondary addresses. (By default, the DHCP software assigns only the networksegment to which the main gateway address belongs.)

Note 1: AMrules support the DHCP server and DHCP relay modes. In DHCP relay mode, the AMrules can be used only in scenario 4. The gateway has multiple secondaryaddresses. The AM rules are used to notify the DHCP server of the addresssegment to be used. In this scenario, the DHCP server must configure an addresspool for each secondary address of the RG-N18000. Otherwise, the AM rules donot take effect. Example:

Configuration of the RG-N18000: iphelper-address 1.1.1.1 (Configure the DHCP relay on the RG-N18000.)

int vlan 4000

ip add 192.168.1.1 255.255.255.0

ip add 192.168.2.1 255.255.255.0secondary

ip add 192.168.3.1 255.255.255.0secondary

AM rules: address-manage

match ip 192.168.1.0 255.255.255.0Gi5/3 vlan 1005

match ip 192.168.2.0 255.255.255.0Gi5/3 vlan 1006

match ip 192.168.3.0 255.255.255.0Gi5/3 vlan 1007

DHCP server: network 192.168.1.0255.255.255.0      //Multiple small address poolsare configured. The network segment of each address pool is corresponding tothe gateway address of one super VLAN.

network 192.168.2.0 255.255.255.0

network 192.168.3.0 255.255.255.0

Note 2:

1.      AM rulesare in strict mode by default when enabled. AM rules are described as follows:

After an AM rule is created, when a clientrequests an IP address via the RG-N18000, the client whose DHCP packets do notmatch the AM rule will not be assigned an IP address. Pay attention to thiscase during network reconstruction.

When Internet access packets from a clienthaving a static IP address pass through the RG-N18000, if the static IP addressdoes not match the created AM rule, the packets are allowed to pass. When thestatic IP address matches the AM rule but does not match the specified networksegment, the client will fail the authentication and the Internet access willbe rejected.

If a network segment is divided intoexcessively small network segments according to the created AM rule in wirelessscenarios, IP addresses may not match the AM rule after wireless migration, andpackets are discarded, causing migration failures. For example, the IP addresssegment for wireless super VLAN 3000 is 172.18.0.0/16. Two AM rules areconfigured: 172.18.1.0/24 for sub VLAN 2001, and 172.18.2.0/24 for sub VLAN2002. When a client obtains an IP address in sub VLAN 2001 and then is migratedto sub VLAN 2002, because the original IP address does not match the AM rule ofsub VLAN 2002, the client needs to obtain a new IP address and be authenticatedbefore it can access the network.

2.      (Optional)AM rules can be configured in loose mode, and are described as follows(recommended):

For DHCP packets matching an AM rule, IPaddresses in an address segment configured in the AM rule are assigned toclients. DHCP packets that match no AM rule can apply for addresses accordingto the conventional logic of the DHCP address pool. The DHCP packets are notdiscarded.

Packets from static IP addresses are notdiscarded.

Packets from user IP addresses that do notmatch the AM rules are not discarded during wireless migration.

Note3: The AMrule matching sequence is as follows:

More detailed AM rules are preferential formatching. In code implementation, AM rules containing the port parameters arematched with a higher priority. For example:

address-manage

match ip 192.168.1.0 255.255.255.0 vlan400  

match ip 192.168.2.0 255.255.255.0Gi1/3 vlan 400(preferential for matching)

Configuration commands:

AM rules support VLAN-based andVLAN+port-based IP address assignment.

address-manage//Enable the addressmanagement function.

match ip 10.1.5.0 255.255.255.0 gi5/3vlan 1005//Configure VLAN+port-based IP address assignment.

match ip 10.1.6.0 255.255.255.0 vlan1006//Configure VLAN-based IP address assignment.

match ip default 172.16.128.0255.255.128.0//Assign IP addresses from the default address segment to clientsthat do not match the AM rule.

match ip loose//Configure the loosemode for the AM rule (recommended). For details, see the above-mentioned Note 2.

 

address-manage       //Enableaddress management.

clear match ip//Access the addressmanagement configuration mode to disable AM rules globally.

Precautions:

When both the DHCP relay and AM rules areenabled, multiple small address pools must be configured on the DHCP server.

The strict mode is adopted by default afterAM rules are enabled on the RG-N18000. In this mode, no IP address is assignedto areas that do not match AM rules in the live network. Pay attention to thiscase during network reconstruction. It is recommended to configure the loosemode for AM rules.

VLANs configured in AM rules map to outersub VLANs in QinQ solutions and map to sub VLANs in access isolation solutions.

Configuration example

N/A

4.1.2.6    [Optional] Stateless IPv6 Address Acquisition

Scenario

The stateless IPv6 address acquisition ismainly applied on the layer-3 switch serving as the LAN user gateway. It isused when the IPv4/IPv6 dual-stack service needs to be enabled and users ofdownlink hosts need to access IPv6 resources. An IPv6 address contains up to128 bits, and therefore the configuration is complex, and errors are prone tooccur. It is expected that hosts can obtain IPv6 prefixes and gatewayinformation without configuration, and IPv6 plug-and-play can be implemented.In this case, the stateless IPv6 address assignment function can be enabled onthe user gateway, to assign IPv6 address prefixes and gateway information todownlink hosts.

In another case, a DHCPv6 server is deployedin a network, and IPv6 addresses and parameter information are assigned todownlink hosts in stateful mode. However, DHCPv6 is incapable of assigninggateway address information, lifetime, and other parameters. Therefore, thestateless IPv6 address assignment function needs to be enabled on the switch.

Currently, IPv6 addresses are mainly appliedto campus networks on a large scale, and are seldom used in other sectors.

Description

An IPv6 address consists of a prefix and a64-bit interface ID that is automatically generated from a 48-bit MAC addressand is usually called EUI-64 address.

The prefix of an IPv6 address identifies thenetwork between a host and a router. The prefix required by a host is actuallythe gateway prefix. A protocol can be run between the gateway switch and a hostto automatically obtain the prefix. The Router Solicitation and RouterAdvertisement (RA) of the Neighbor Discovery Protocol (NDP) can be used, wherethe former is used to discover a gateway and urge the gateway to send the RAcontaining the prefix to the host.

The RA contains the prefix, lifetime,default gateway, and other information. It cannot deliver the IPv6 address ofthe DNS server.

The RA function is disabled by default. Youcan run the no ipv6 nd suppress-ra command in interface configurationmode to enable it.

æ  Network requirements

A customer requests that IPv6 prefixes beobtained in stateless mode and interface addresses be obtained according to theEUI-64, to form IPv6 addresses.

Obtaining IPv6 addresses in stateless modecan be easily configured.

The IPv6 protocol stack is enabled onWindows 7 clients by default. For Windows XP clients, run the IPv6 installcommand in the Run window to enable the IPv6 protocol and restart theclients.

æ  Network topology

æ  Configuration key points

1.      Configure an IPv6 address on the core switch.

2.      Enable the RA and O-bit flag on the user gateway.

3.      Configure a DHCPv6 server and call it in interface configurationmode.

æ  Configuration steps

1.      Configurean IPv6 address for an interface and enable IPv6 on the interface.

Ruijie#conf t

Ruijie(config)#interfacegigabitEthernet 1/1

Ruijie(config-if-GigabitEthernet1/1)#no switchport

Ruijie(config-if-GigabitEthernet1/1)#ipv6 enable

Ruijie(config-if-GigabitEthernet1/1)#ipv6 address 2001:250:2003:2000::1/64   ------>Configurean IPv6 address for the interface.

2.      Enablethe RA function on the interface, set the O-bit flag to enable the host toobtain DNS, domain name, and other information, and call the address pool.

Ruijie(config-if-GigabitEthernet1/1)#no ipv6 nd suppress-ra     ------>Enable theRA function.

Ruijie(config-if-GigabitEthernet1/1)#ipv6 nd other-config-flag ----->Set the O-bit flag to enable thehost to obtain other information.

Ruijie(config-if-GigabitEthernet1/1)# ipv6 dhcp pool ruijie ----->Call the address pool in interfaceconfiguration mode. 

3.      Configurean IPv6 server, including the domain name, prefix, and DNS server.

Ruijie(config)#ipv6 dhcp poolruijie     ----->Create an IPv6 address pool.

Ruijie(dhcp-config)#domain-name www.example.com.cn   ----->Configurethe domain name to be assigned to the client.

Ruijie(dhcp-config)#dns-server2003::1              ----->Configurethe DNS server to be assigned to the client.

Ruijie(dhcp-config)#exit

æ  Verification 

Check the IPv6 address obtained by a client.

Note: In the figure above, another IPv6address is a temporary address automatically generated by the system. Theinterface address of the temporary address is randomly generated.

The probability of reconnecting to the localaddress by using the randomly derivative interface ID is very low. Therefore,clients running Windows Vista or Windows Server 2008 can send router requestsby using the derivative local address, without waiting for completion of theDuplicate Address Detection (DAD). This is called optimistic DAD. The routerdiscovery and DAD are performed simultaneously, which reduces time required forthe interface initialization process. In the generation of this temporaryaddress, however, data packets are sent to the network, which occupies networkresources, affects the network health, and hinders IPv6 user uniquenesscontrol. Therefore, it is recommended to disable this function. To do so, clickStart > Run. In the Run window, enter netsh, intipv6 and set privacy state=disable in sequence, as shown in thefigure below.

For more information about temporaryaddresses, see http://technet.microsoft.com/zh-cn/magazine/2007.08.cableguy.aspx.

4.1.2.7    [Optional] Stateful IPv6 Address AutomaticAcquisition

Network requirements

A switch is used as a DHCPv6 client, toobtain an IPv6 address from the DHCPv6 server, as well as the DNS serveraddress, domain name, and other network parameters.

Note: If a PC expects to obtain a dynamicIPv6 address, the host must has a DHCPv6 client.

Windows 7, Windows Vista, and Windows Server2008 each have a built-in DHCPv6 client.

Windows XP and Windows Server 2003 have nobuilt-in DHCPv6 client. Users need to install the DHCPv6 client or enable theIPv6 protocol stack.

Network topology

Configuration key points

1.      Configure the RG-N18000 switch as the DHCPv6 server and set itsaddress to 2001::1/64.

2.      Enable the DHCPv6 server to assign 2001::X/64 to the DHCPv6 client.

3.      Set the address of the DNS server to 2003::1/64.

4.      The domain name of the DHCPv6 client is www.example.com.cn.

Configuration steps  

DHCPv6 server configuration:

1.      Enablethe IPv6 routing function.

Ruijie>enable

Ruijie#configure terminal

Ruijie(config)#ipv6unicast-routing----->Enable the IPv6 routing function.

Ruijie(config)#end

2.      Configure an IPv6 address for an interface and enable the IPv6function on the interface.

Ruijie#conf t

Ruijie(config)#

Ruijie(config)#interfacegigabitEthernet 1/24

Ruijie(config-if-GigabitEthernet1/24)#no switchport

Ruijie(config-if-GigabitEthernet1/24)#ipv6 address 2001::1/64   ----->Configure an IPv6address for the interface.

Ruijie(config-if-GigabitEthernet1/24)#ipv6 enable             ----->Enablethe IPv6 function on the interface.

Ruijie(config-if-GigabitEthernet1/24)#end

3.      Enablethe RA function and set the M-bit flag and O-bit flag.

a.      The DHCPv6server does not assign a gateway address to the client. The RA function needsto be enabled on the device.

b.      Set the managedaddress configuration flag bit in the RA packet to 1. This flag bitdetermines whether the host receiving the RA packet uses the stateful automaticconfiguration to obtain an IP address. By default, the flag bit is not set to 1in the RA packet.

c.      Set the otherstateful configuration flag bit in the RA packet. This flag bit determineswhether the host receiving the RA packet uses the stateful automaticconfiguration to obtain information other than addresses. By default, the flagbit is not set to 1 in the RA packet.

Ruijie>enable

Ruijie#configure terminal

Ruijie(config)#interfacegigabitEthernet 1/24

Ruijie(config-if-GigabitEthernet1/24)#no ipv6 nd suppress-ra     ----->Enable theRA function.

Ruijie(config-if-GigabitEthernet1/24)#ipv6 nd managed-config-flag----->Set the M-bit flag of the RA.

Ruijie(config-if-GigabitEthernet1/24)#ipv6 nd other-config-flag----->Set the O-bit flag of the RA.

Ruijie(config-if-GigabitEthernet1/24)#ipv6 nd prefix 2001::/64 no-autoconfig  ----->Specify thatthe RA prefix cannot be used for stateless automatic configuration.

Ruijie(config-if-GigabitEthernet1/24)#end

4.      Configurean IPv6 server, including the domain name, prefix, and DNS server.

Ruijie(config)#ipv6 dhcp poolruijie     ----->Create an IPv6 address pool.

Ruijie(dhcp-config)#domain-namewww.example.com.cn   ----->Configurethe domain name to be assigned to the client.

Ruijie(dhcp-config)#dns-server2003::1              ----->Configurethe DNS server to be assigned to the client.

Ruijie(dhcp-config)#iana-addressprefix 2001::/64      ----->Apply the IPv6prefix pool.

Ruijie(dhcp-config)#exit

5.      Enable the DHCPv6 server function on the interface.

Ruijie(config)#interfacegigabitEthernet 1/24

Ruijie(config-if-GigabitEthernet1/24)#ipv6 dhcp server ruijie  ----->Enable the IPv6 function onthe interface.

Ruijie(config-if-GigabitEthernet1/24)#end

Verification 

1.      Check information about the address pool of the DHCPv6 server.

Ruijie #show ipv6 dhcp pool

DHCPv6 pool: ruijie

     IANA addressrange: 2001::1/64 -> 2001::FFFF:FFFF:FFFF:FFFF/64

     preferredlifetime 3600, valid lifetime 3600

     DNS server:2003::1

     Domain name: www.example.com.cn

Information about the address pool of theDHCPv6 server shows the name of the DHCPv6 address pool, name of the prefix pool,DNS, and domain name.

2.      Check the binding table on the DHCPv6 server.

Ruijie #sho ipv6 dhcp binding

Client  DUID:00:03:00:01:00:1a:a9:15:46:e2

     IANA: iaid100001, T1 1800, T2 2880

     Address:2001::2

     preferredlifetime 3600, valid lifetime 3600

     expires atAug 25 2014 16:35 (3571 seconds)

The binding table shows the clientDUID and prefix.

3.      Check information obtained from the DHCPv6 server.

Ruijie #show ipv6 dhcp interfacegigabitEthernet 5/1

           GigabitEthernet 5/1 is in client mode

           State is IDLE

           next packet will be send in : 1744 seconds

           List of known servers:

           DUID: 00:03:00:01:14:14:4b:1b:54:6c

           Reachable via address: FE80::1614:4BFF:FE1B:546D

           Preference: 0

           Configuration parameters:

           IA NA: IA ID 0x186a1, T1 1800, T2 2880

           Address: 2001::2

           preferred lifetime 3600, valid lifetime 3600

           expires at Jan 1 1970 7:38 (3544 seconds)

           DNS server: 2003::1

           Domain name: www.example.com.cn

  Rapid-Commit:disable

4.      Check the status of the IP address obtained by the interface.

Ruijie #show ipv6 int g5/1

interface GigabitEthernet 5/1 is Up,ifindex: 1

  address(es):

    Mac Address:00:1a:a9:15:46:e3

    INET6:FE80::21A:A9FF:FE15:46E3, subnet is FE80::/64

    INET6:2001::2 [ DEPRECATED ], subnet is 2001::/64

      validlifetime 3526 sec

  Joined group address(es):

    FF01::1

    FF02::1

    FF02::2

    FF02::1:FF00:2

    FF02::1:FF15:46E3

  MTU is1500 bytes

  ICMP error messages limited toone every 100 milliseconds

  ICMP redirects are enabled

  ND DAD is enabled, number ofDAD attempts: 1

  ND reachable time is 30000milliseconds

  ND advertised reachable timeis 0 milliseconds

  ND retransmit interval is 1000milliseconds

  ND advertised retransmit intervalis 0 milliseconds

  ND router advertisements aresent every 200 seconds<160--240>

  ND router advertisements livefor 1800 seconds

4.1.2.8    [Optional] DHCPv6 Relay

Scenario

A dedicated DHCPv6 server running Windows2003 or 2008 is deployed in the network center to assign IPv6 address prefixesand network parameters to hosts in the campus network, to implement centralizedmanagement and maintenance. The DHCP relay function needs to be enabled on allIPv4/v6 dual-stack layer-3 switches, to forward packets between DHCPv6 clientsand the DHCPv6 server. In this way, DHCPv6 clients can obtain IPv6 addressesand configuration parameters even if the DHCPv6 clients and the DHCPv6 serverare not connected through local links.

In another case, a DHCPv6 server is deployedin the network, and IPv6 addresses and parameter information are assigned toclients in stateful mode. However, DHCPv6 is incapable of assigning gatewayinformation, lifetime, and other parameters. Therefore, the stateless IPv6address assignment function needs to be enabled on the switch, so that hostscan obtain gateway information.

Description

The DHCPv6 application model consists of theserver, client, and relay. The client and server obtain configurationparameters in request-response mode. The relay can transparently bridge clientsand the server that are not connected through local links. The packetinteraction and parameter maintenance of DHCPv6 are basically the same as thoseof DHCPv4, but DHCPv6 adjusts the packet structure and processing based on newnetworks.

æ  Network requirements

User PCs are used as DHCPv6 clients toobtain IPv6 addresses from the DHCPv6 server running Windows 2008. After IPv6addresses are obtained, the PCs can ping the DHCPv6 server successfully. TheRG-N18000 serves as the DHCPv6 relay.

æ  Network topology

æ  Configuration key points

Complete the following configuration on theDHCPv6 server:

1.      Configure an IPv6 address and gateway for the DHCPv6 server.

2.      Configure scope information.

3.      Configure log information.

4.      Enable the IPv6 routing function on the DHCPv6 relay, create anIPv6 address, and configure the DHCPv6 relay.

æ  Configuration steps  

DHCP agent configuration:

1.      Enable the IPv6 routing function.

Ruijie>enable

Ruijie#configure terminal

Ruijie(config)#ipv6 unicast-routing   ----->Enablethe IPv6 routing function.

Ruijie(config)#end

2.      Configure an IPv6 address for an interface of the DHCPv6 server andenable the IPv6 function on the interface.

Ruijie(config)#int g0/13

Ruijie(config-if-GigabitEthernet0/13)#no switchport

Ruijie(config-if-GigabitEthernet0/13)#ipv6enable             ----->Enablethe IPv6 function on the interface.

Ruijie(config-if-GigabitEthernet0/13)#ipv6 address 2001::2/64    ----->Configure an IPv6 addressfor the interface.

Ruijie(config-if-GigabitEthernet0/13)#end

3.      Create a VLAN for the DHCPv6 client and configure the VLAN on aninterface.

Ruijie(config)#vlan2   

Ruijie(config-vlan)#exit

Ruijie(config)#int g0/14

Ruijie(config-if-GigabitEthernet0/14)#switchport mode access

Ruijie(config-if-GigabitEthernet0/14)#switchport access vlan 2

Ruijie(config-if-GigabitEthernet0/14)#end

Ruijie#

4.      Configure the gateway IPv6 address for the DHCPv6 client and enablethe DHCPv6 relay function.

Ruijie#conf t

Ruijie(config)#interface vlan 2

Ruijie(config-if-VLAN 2)# ipv6address 2001:1::1/64

Ruijie(config-if-VLAN 2)# ipv6 enable

Ruijie(config-if-VLAN 2)#ipv6 ndprefix 2001:1::/64  no-autoconfig  ----->Specify that the RAprefix cannot be used for stateless automatic configuration.

Ruijie(config-if-VLAN 2)# ipv6 dhcprelay destination 2001::1 ----->Configure the DHCPv6 relay and set itsnext hop to the interface of the server that is connected to the RG-N18000.

Ruijie(config-if-VLAN 2)# no ipv6 ndsuppress-ra       ----->Enable the RAfunction.

Ruijie(config-if-VLAN 2)# ipv6 ndmanaged-config-flag  ----->Set the M-bit flag of the RA.

Ruijie(config-if-VLAN 2)# ipv6 ndother-config-flag      ----->Set the O-bitflag of the RA.

Ruijie(config-if-VLAN 2)# end

 

Enablingthe RA function and setting the M-bit flag and O-bit flag:

a.      TheDHCPv6 server does not assign a gateway address to the client. The RA functionneeds to be enabled on the device.

b.      Setthe managed address configuration flag bit in the RA packet to 1. Thisflag bit determines whether the host receiving the RA packet uses the statefulautomatic configuration to obtain an IP address. By default, the flag bit isnot set to 1 in the RA packet.

c.      Set the otherstateful configuration flag bit in the RA packet. This flag bit determineswhether the host receiving the RA packet uses the stateful automaticconfiguration to obtain information other than addresses. By default, the flagbit is not set to 1 in the RA packet.

4.1.3    Common Scenario — Authentication-free Access

4.1.3.1    [Optional] Authentication-free VLAN

Principles:

Authentication-free VLANs enable users inthe specified VLANs to access the Internet without authentication.

The number of authentication-free VLANsis limited. Pay attention to the limit.

The number of authentication-free VLANscannot exceed 100 in consideration that performance resources are greatlyexhausted due to broadcast packet duplication in sub VLANs or in PE-CE VLANs.Countermeasures need to be taken to prevent the RG-N18000 from sendingexcessive ARP requests, which affects the CPU usage of the device and causesprotocol flapping (such as OSPF flapping), packet loss, and networkinterruption at a high probability. When the number of authentication-freeVLANs cannot meet service requirements, security channels are recommended. In asimplistic network, the ARP proxy function is enabled on the RG-N18000 servingas the network-wide gateway by default. Once ARP request scanning attacksoccur, the RG-N18000 acts a proxy to flood ARP packets to authentication-freeVLANs, resulting in great overhead in the CPU of the RG-N18000.

In a simplistic network, the following VLANsare usually configured as authentication-free VLANs (for reference only):

1.     Special serviceVLANs (such as VLANs for all-in-one cards, video monitoring, and door statuscontrol systems, server VLANs, and other non-user VLANs)

2.     NMS VLANs (switchNMS VLANs and wireless NMS VLANs)

3.     VLANscorresponding to AC 802.1x authentication. Wireless 802.1x authentication mustbe carried out on the AC, and authentication exemption is required to avoidre-authentication.

4.     Privilege userVLANs (such as VLANs for school principals and other directors).

If dumb clients (which do not activelysend ARP packets) exist on the network, such as printers of some types and doorstatus control systems, only authentication-free VLANs can be used to exemptauthentication. This is because the RG-N18000 does not actively send ARPrequest packets to sub VLANs and therefore cannot learn the ARP information ofthe dumb clients.

Configuration commands:

direct-vlan 400, 600,800-820        //Configure VLANs 400,600, and 800–820 as authentication-free VLANs. Users in these VLANs can accessthe network without authentication.

Note: The VLAN IDs used in the direct-vlancommand are IDs of sub VLANs.

Precautions:

Authentication-free VLANs are exempted onlyfrom checks related to access authentication, but still need to undergo checksspecified in security ACLs. If a specific user or VLAN is disallowed in asecurity ACL, the specific user or users in the specific VLAN cannot access thenetwork. For users in authentication-free VLANs to access the network withoutauthentication, ensure that the VLANs or users in the VLANs are not blocked byACLs.

The number of authentication-free VLANscannot exceed 100. Otherwise, the ARP proxy function may enable the RG-N18000to send excessive ARP packets, resulting in CPU overload of the RG-N18000.

Configuration example

N/A

4.1.3.2    [Optional] Authentication-free sites

Principles:

Beforeusers are authenticated, provide some site resources for users to log in ordownload data. This is called destination IP-based authentication exemption. Inthe simplistic network solution, this feature can be usually applied to:

1.      Downloadthe SU client and exempt the download server from authentication.

2.      Providepublic authentication-free resources in a campus network.

3.      Allowunauthenticated users to access the portal server and enable the portal serverto direct to the authentication page. (In the current version, users candirectly access the portal server without authentication after the Webauthentication template is configured.)

Configuration commands:

http redirectdirect-site  x.x.x.x [Mask is optionally configured.]       //Configuredin global configuration mode. The server with the address x.x.x.x. isconfigured as an authentication-free site.

Precautions:

Amaximum of 50 authentication-free site entries can be configured. 

Configuration example

N/A

4.1.3.3    [Optional] Source IP-based authenticationexemption

Principles:

Authentication-freesource IP addresses can be configured, so that users with the specified sourceIP addresses can access the Internet without authentication.

Theapplication scenario is similar to that of authentication-free VLANs. Thedifference lies in that authentication is exempted based on differentdimensions, and can be performed as required.

Configuration commands:

web-authdirect-host  x.x.x.x [The mask isoptional.]       //Configured in globalconfiguration mode. The source IP address of x.x.x.x. is used as anauthentication-free site.

Precautions:

Amaximum of 1000 authentication-free entries can be configured (the totalmaximum number of entries that can be configured for both authentication-freesource addresses and security channels is 1000). 

Configuration example

N/A

4.1.3.4    [Optional] Security channels

Principles:

1.      Thesecurity channel can invoke ACLs and is configured globally or based on ports,enabling ACL-based authentication exemption. ACLs support flexible ACEs.Therefore, the security channel can be used to accurately controlauthentication-free user groups by allowing packets with the specifiedsource/destination MAC address, source/destination IP address, or the protocolID above layer 4 without authentication. The security channel further avoidsexcessive CPU usage caused by ARP packets as in the authentication-free VLANfeature, and therefore is recommended.

2.      Thesecurity channel must be configured on an interface or globally. If it isconfigured on both the interface and globally, the priority sequence is asfollows: interface > global.

3.      Anexcluded interface of the security channel is optional. After an excludedinterface is configured, the global security channel is invalid to thisexcluded interface.

5.      Themaximum number of entries that can be configured is 1000 for ED and EF cardsand 100 for DB cards (the total maximum number of entries that can beconfigured for both authentication-free source addresses and security channelsis 1000). If the ED and DB cards are both used, the entry capacity may bereduced to 100.

Configuration commands:

ACL-relatedconfiguration is omitted here.

security global access-group {acl-id acl-name }          //Applya security channel in global configuration mode.

security access-group {acl-id acl-name }                   //Applya security channel in interface configuration mode.

security uplink enable//Configure asecurity channel excluded port in interface configuration mode. The globalsecurity channel does not take effect on this interface.

Precautions:

An ACLuses the permit statement to set the authentication-free entry, and uses thedeny statement to block an entry.

Ifthe security channel is configured on both an interface and globally, thepriority sequence is as follows: interface > global.

Inan environment with only 802.1x authentication, this command is required toallow critical protocol packets such as ARP and DHCP packets.

Ruijie(config)# expert access-listextended 2700

Ruijie(config-exp-nacl)#10 permit arpany any any any any 

Ruijie(config-exp-nacl)#20 permit udpany any any any eq bootpc

Ruijie(config-exp-nacl)#30 permit udpany any any any eq bootps

Ruijie(config)# security globalaccess-group 2700

Configuration example

æ  Scenario

Configuration Steps:

Configure an Expert extended ACL namedexp_ext_esc.

Add an ACE to the ACL to allow thedestination host 10.1.1.2.

Add an ACE to the ACL to allow DHCP packets.

Add an ACE to the ACL to allow ARP packets.

On the interface of the 802.1xauthentication controlled area, configure the ACL exp_ext_esc as a securitychannel.

Runthe following commands on SW1:

sw1(config)#expert access-listextended exp_ext_esc

sw1(config-exp-nacl)# permit ip anyany host 10.1.1.2 any

sw1(config-exp-nacl)# permit 0x0806any any any any any

sw1(config-exp-nacl)# permit udp anyany any any eq 67

sw1(config-exp-nacl)# permit udp anyany any any eq 68

sw1(config)#int gigabitEthernet 0/1

sw1(config-if-GigabitEthernet 0/1)#security access-group exp_ext_esc

Verification:

Ona client of the Sales Department, ping the server of the Sales Department andcheck whether the ping operation is successful.

Onclients of R&D Department 1 and R&D Department 2, ping the server of theSales Department and check whether the ping operations are successful.

sw1#show access-lists

expert access-list extendedexp_ext_esc

10 permit ip any any host 10.1.1.2any

20 permit arp any any any any any

30 permit tcp any any any any eq 67

40 permit tcp any any any any eq 68……

sw1#show running-config interfacegigabitEthernet 0/1

Building configuration...

Current configuration : 59 bytes

interface GigabitEthernet 0/1

security access-group exp_ext_esc

4.1.3.5    [Optional] Free-DNS (Fee Evasion Prevention)

Principles:

Aftercontrol of Web authentication and 802.1x authentication is enabled oninterfaces of the RG-N18000, all DNS packets are allowed to pass before userauthentication by default (Web authentication allows DNS packets as specified inthe protocol while 802.1x authentication allows DNS packets by using securechannels). Based on the vulnerability of allowing DNS packets prior toauthentication, the fee evasion software in the market encapsulates all packetsinto DNS packets, to implement Internet access without paying fees. Thefree-DNS mode can be configured to select DNS packets that are allowed to passprior to authentication, so as to prevent user fee evasion.

Configuration commands:

1.      Configurethe free-DNS mode.

free-dns ip-address ip-mask
2.      Deletethe free-DNS mode.

no free-dns ip-address ip-mask
3.      Precautions:

Free-DNSis valid only before user authentication. All DNS packets are allowed to passafter user authentication.

4.      Configurationexample

N/A

4.1.4    Common Scenario — Authentication

4.1.4.1    [Optional] 802.1x Authentication

Principles:

Authenticationroles are described as follows:

Client:Ruijie SU client or an open-source client.

NAS:controls the network connection status of a client based on its currentauthentication status. The device serves as an agent between clients and thesever. It request usernames from clients, checks the authentication informationfrom the server, and forwards the information to the clients.

RADIUSserver: corresponding to Ruijie SAM+ system, which provides the authenticationservice for users.

Thefigure below shows the authentication flow.

Configuration commands:

aaa new-model//Enable the AAAfunction.

aaa accounting network (listname) start-stop group(group name)      //AAAreference configuration. The actual service deployment prevails.

aaa authentication dot1x (listname) group (group name)//802.1x template reference configuration forAAA. The actual service deployment prevails.

aaa authentication login default local      //Usethe local username/password to log in to the AAA device.

aaa group server radius (groupname)           //Configurean AAA server group, which is applicable to multi-RADIUS scenarios.

  server (radiusip)//Configure an AAA server group, which is applicable to multi-RADIUSscenarios.

radius-server host (radiusip) key 7 (radius key) //Configure the IP address and key forthe AAA server, which are applicable to single-RADIUS scenarios.

aaa accounting update periodic30         //Set the interval forAAA accounting update to 30s.

aaa accountingupdate //Configure AAA accounting update.

aaa authorization ip-auth-modemixed    //Set the IP address authorization mode of 802.1xclients to the mixed mode. The IP addresses can be obtained via polling inmultiple ways (DHCP/RADIUS).

no aaa logenable   //Disable the AAA log function.

 

dot1x valid-ip-acctenable//Mandatory. The accounting update packets are used to upload the user IPaddress to SAM+. If the 802.1x authentication module does not have IP entriesof the user, the user is forced to go offline 5 minutes later,  to preventusers at the IP address 0.0.0.0 on SAM+. The configuration of this command willdrop users out of the network. It is not recommended to run this command in servicepeak hours.

dot1x accounting (listname)     //Optional. This command is required whenthe 802.1x accounting list name for AAA is not set to default.

dot1x authentication (listname)     //Optional. This command is required whenthe 802.1x authentication list name for AAA is not set to default.

interface range GigabitEthernet0/2-3  //Configure the interface for enabling 802.1xauthentication. 

    dot1xport-control auto//Enable 802.1x authentication on the interface.

snmp-server host x.x.x.x(server IPaddress) informs version 2c xx(community name)

snmp-server community xx(communityname) rw

Precautions:

Thelist name configured in aaa authentication dot1x (list name) group(group name) should be consistent with that in dot1x authentication(list name).

Whenonly 802.1x authentication is enabled on an interface, security channels mustbe configured to allow DHCP packets to pass. Otherwise, users cannot obtain IPaddresses. For specific configuration, see the security channel configuration.

Configuration example

Scenario

 

 

Configuration Steps

Register the IP address of the device with the RADIUS server and configure the key for the device to communicate with the server.

Create an account on the RADIUS server.

Enable AAA on the device.

Configure RADIUS parameters on the device.

Enable 802.1x authentication on interfaces of the device.

The following shows relevant configurations on the device. For the configurations of the server, see the server configuration guide.

 

ruijie# configure terminal

ruijie (config)# aaa new-model

ruijie (config)# aaa accounting network radius start-stop group default

ruijie (config)# aaa authentication dot1x radius group default

ruijie (config)# aaa authentication login default local

ruijie (config)# aaa accounting update periodic 30

ruijie (config)# aaa accounting update

ruijie (config)# aaa authorization ip-auth-mode mixed

ruijie (config)# no aaa log enable

ruijie (config)# radius-server host 192.168.32.120 key 7 ruijie

ruijie (config)# interface FastEthernet 0/1

ruijie (config-if)# dot1x port-control auto

 

 

Verification

Test whether authentication can be performed normally and whether network access behavior changes after authentication.

Create an account on the server, for example, username:test,password:test.

An unauthenticated client fails to ping 192.168.32.120.

Start Supplicant on the client and enter the username for authentication. After the client is authenticated, it can ping 192.168.32.120 successfully.

4.1.4.2    [Mandatory] Web Authentication

Principles:

Auser opens the Internet Explorer (IE) and accesses a website to initiate anHTTP request.

TheNAS intercepts the HTTP request from the client, and forcibly forwards the HTTPrequest to the portal server. It also adds some relevant parameters to theportal URL. For the parameters, see CHAP authentication.

Theportal server pushes the Web authentication page to the client.

Theuser enters the username and password on the authentication page and submitsthem to the portal server.

Theportal server sends the username and password to the NAS to initiateauthentication.

TheNAS sends the username and password to the RADIUS server, which checks whetherthe user is valid and returns the Radius access-accept/reject message to theNAS.

TheNAS returns the authentication result to the portal server.

Theportal server pushes the authentication result page to the user based on theauthentication result.

Theportal server notifies the NAS that the authentication result packet has beenreceived.

TheNAS sends the accounting start packet.

Note:Web authentication acceleration supports direct access to the portal page forauthentication, without redirection.

Differencefrom the 1st-generation portal: The authentication is completed by the NAS andRADIUS server, which greatly reduces the load of the portal server.

Insimplistic network environments, static ARP addresses are automatically boundafter Web authentication succeeds, which is different from that in conventionalsolutions.

Configuration commands:

aaanew-model      //Enable the AAA function.

aaa accounting network (listname) start-stop group(groupname)      //AAA reference configuration. Theactual service deployment prevails.

aaa authentication web-auth (listname) group(groupname)          //Webauthentication template reference configuration for AAA. The actual servicedeployment prevails.

aaa authentication login defaultlocal      //Use the local username/password tolog in to the AAA device.

aaa group server radius (groupname)           //Configurean AAA server group, which is applicable to multi-RADIUS scenarios.

  server (radiusip)                                //Configurean AAA server group, which is applicable to multi-RADIUS scenarios.

radius-server host (radiusip) key 7 (radiuskey)       //Configure the IP address andkey for the AAA server, which are applicable to single-RADIUS scenarios.

aaa accounting update periodic30         //Set the interval forAAA accounting update to 30s.

aaa accountingupdate               //ConfigureAAA accounting update.

aaa authorization ip-auth-modemixed    //Set the IP address authorization mode of 802.1xclients to the mixed mode. The IP addresses can be obtained via polling inmultiple ways (DHCP/RADIUS).

no aaa logenable   //Disable the AAA log function.

 

web-auth templateeportalv2       //Create a Webauthentication template.

ip 202.204.193.32                 //Setthe IP address of the portal server.

url http://202.204.193.32/eportal/index.jsp   //Setthe URL of the portal server.

authentication  (listname)     //Optional. This command is required whenthe authentication list name for AAA is not set to default.

accounting  (listname)       //Optional. This command isrequired when the accounting list name for AAA is not set to default.

web-auth portal keyuniversity     //Optional. Configure the key.

interface range GigabitEthernet0/2-3  //Configure the interface for enabling Webauthentication. 

    web-authenableeportalv2             //Enable Web authentication on the interface.

    web-authvlan-control 2000-3000     //Enable VLAN-basedWeb authentication control. This command is used in a scenario in which both802.1x authentication and Web authentication are enabled on the same port ofthe RG-N18000, and some VLANs need to support only 802.1x authenticationcontrol. Such VLANs can be excluded from the Web authentication VLAN range.

snmp-server host x.x.x.x(server IP address) informsversion 2c xx(community name)

snmp-server community xx(communityname) rw

Precautions:

TheAAA method list must be consistent with the Web authentication method list.

Configuration example

Scenario

 

 

Configuration Steps

Register the IP address of the device with the RADIUS server and configure the key for the device to communicate with the server.

Create an account on the RADIUS server.

Enable AAA on the device.

Configure RADIUS parameters on the device.

Enable Web authentication on interfaces of the device.

The following shows relevant configurations on the device. For the configurations of the server, see the server configuration guide.

 

ruijie# configure terminal

ruijie (config)# aaa new-model

ruijie (config)# aaa accounting network radius start-stop group default

ruijie (config)# aaa authentication web-auth radius group default

ruijie (config)# aaa authentication login default local

ruijie (config)# aaa accounting update periodic 30

ruijie (config)# aaa accounting update

ruijie (config)# no aaa log enable

ruijie (config)# radius-server host 192.168.32.120 key 7 ruijie

ruijie (config)# web-auth template eportalv2  

ruijie (config)# ip 202.204.193.32

ruijie (config)# urlhttp://202.204.193.32/eportal/index.jsp

ruijie (config)# interface FastEthernet 0/1

ruijie (config-if)# web-auth enable eportalv2

snmp-server host 192.168.21.120 informs version 2c xx (community name)

snmp-server community XX(community name) rw

 

 

 

Verification

Test whether authentication can be performed normally and whether network access behavior changes after authentication.

Create an account on the server, for example, username:test,password:test.

An unauthenticated client fails to ping 192.168.32.120.

The client browser automatically redirects to the Web authentication page. Enter the username for authentication. After the client is authenticated, it can ping 192.168.32.120successfully.

4.1.4.3    [Mandatory] AAA IP Authorization

Principles:

802.1xauthentication and MAB authentication do not support IP address identification.Ruijie extends the authentication application, which supports MAC+IP binding.This function is called IP authorization. There are four IP authorizationmodes:

SUauthorization: IP addresses are provided by the Supplicant. This mode needs tobe used in combination with Ruijie Supplicant.

RADIUSauthorization: IP addresses are delivered to the device by the RADIUS serverafter clients are authenticated.

DHCP-serverauthorization: An authenticated client initiates a DHCP request to obtain an IPaddress. After an IP address is obtained, the system binds the IP address withthe MAC address of the client. This mode is applicable to dynamic IP environments.

Mixedauthorization: The system performs MAC+IP binding for authenticated clients inthe sequence of Supplicant authorization, RADIUS authorization, and DHCP-serverauthorization. If the Supplicant provides an IP address, the authenticatedclient uses it preferentially; if the Supplicant does not provide an IPaddress, the IP address provided by the RADIUS server is used; if the RADIUSserver does not provide an IP address, the IP address provided by the DHCPserver is used.

Note:Mixed authorization is recommended to all scenarios.

Configuration commands:

aaa authorizationip-auth-mode mixed//Configured in global configuration mode.

Precautions:

The configuration of this command is irrelevant to whether IPaddresses can be uploaded to SAM+. The functions of this command are asfollows: If no IP address is authorized to a user, there is no entry of the IPaddress and the user cannot be charged or brought offline upon no traffic. Thiscommand can be used in combination with valid ip acct to bring users whodo not meet authorization configuration requirements offline.

Configuration example

N/A

4.1.4.4    [Optional] MAB Authentication

Principles:

MABauthentication, one of the main authentication modes in the simplistic networksolution, is applicable to wireless users in office areas of campus networks.With the MAB authentication model and high-performance authenticationprocessing capacity of the RG-N18000, MAB authentication enables the RG-N18000to learn the MAC address of a client when the client accesses the network, sothat teachers do not need to repeatedly entering their usernames and passwordswhen using wireless clients for Web authentication, to prevent deterioratinguser experience. The RG-N18000 uses the MAC address of the client as theusername and password to send an authentication request to SAM+ to complete theauthentication as a proxy. The user cannot perceive the authentication in thisprocess.

Thefollowing is the MAB authentication process:

Enablethe client MAB authentication on SAM+ by accessing the access controldirectory.

AfterWeb authentication succeeds for the first time, a user can select MABauthentication on the authentication success page.

Whenthe user chooses to enable MAB authentication, the MAC address of the userclient is registered with SAM+.

Afterthe client connects to the network, the RG-N18000 serving as a NAS, identifiesthe MAC address of the client, and uses the MAC address as the username andpassword to initiate authentication to SAM+.

SAM+determines validity of the MAC address and returns the authenticationsuccess/failure message to the NAS.

Ifthe authentication is successful, the NAS sends the accounting start packet.

Configuration commands:

Note:MAB authentication takes effect only after each user is WEB authenticated forthe first time. In addition, MAB authentication belongs to the 802.1xauthentication system. Therefore, both Web authentication and 802.1x authenticationneed to be configured for MAB authentication.

æ  Configuring global AAA parameters

aaanew-model      //Enable the AAA function.

aaa accounting network (listname) start-stop group(groupname)      //AAA reference configuration. Theactual service deployment prevails.

aaa authentication dot1x (listname) group (groupname)          //802.1xtemplate reference configuration for AAA. The actual service deploymentprevails.

aaa authenticationweb-auth (list name) group(groupname)          //Webauthentication template reference configuration for AAA. The actual servicedeployment prevails.

aaa authentication login defaultlocal      //Use the local username/password tolog in to the AAA device.

aaa group server radius (groupname)           //Configurean AAA server group, which is applicable to multi-RADIUS scenarios.

server (radiusip)                                //Configurean AAA server group, which is applicable to multi-RADIUS scenarios.

radius-server host (radiusip) key 7 (radius key)       //Configurethe IP address and key for the AAA server, which are applicable tosingle-RADIUS scenarios.

aaa accounting update periodic30         //Set the interval forAAA accounting update to 30s.

aaa accounting update               //ConfigureAAA accounting update.

no aaa logenable      //Disable the AAA log function.

æ  Configuring 802.1x parameters and enabling 802.1x authentication onthe interface

dot1x accounting (listname)     //Optional. This command is required whenthe 802.1x accounting list name for AAA is not set to default.

dot1x authentication (listname)     //Optional. This command is required whenthe 802.1x authentication list name for AAA is not set to default.

interface range GigabitEthernet 0/2-3  //Configurethe interface for enabling 802.1x authentication. 

dot1x port-control auto//Enable802.1x authentication on the interface.

æ  Configuring Web authentication parameters and enabling Webauthentication on the interface

web-auth template eportalv2  

ip 202.204.193.32                 //Setthe IP address of the portal server.

url http://202.204.193.32/eportal/index.jsp   //Setthe URL of the portal server.

authentication  (listname)     //Optional. This command is required whenthe authentication list name for AAA is not set to default.

accounting  (listname)       //Optional. This command isrequired when the accounting list name for AAA is not set to default.

web-auth portal key university     //Optional.Configure the key.

interface range GigabitEthernet0/2-3  //Configure the interface for enabling Webauthentication. 

web-auth enable eportalv2////EnableWeb authentication on the interface.

æ  Configuring MAB authentication parameters and enabling MABauthentication on the interface

aaa authorization ip-auth-modemixed    //Mandatory. Set the IP address authorization modeof 802.1x clients to the mixed mode. The IP addresses can be obtained viapolling in multiple ways (DHCP/RADIUS).

ip dhcpsnooping              //Mandatory.An IP address needs to be obtained via the DHCP snooping module for MABauthentication. Otherwise, a user with the IP address of 0.0.0.0 appears onSAM.

dot1x mac-auth-bypassvalid-ip-auth          //Mandatory.The DHCP module instructs the MAB module to start authentication. Clients mustobtain IP addresses before starting MAB authentication. Otherwise, the MABauthentication is blocked to prevent clients with the IP address of 0.0.0.0 onSAM+. The configuration of this command will drop users out of the network. Itis not recommended to run this command in service peak hours.

dot1x valid-ip-acctenable           //Mandatory.The accounting update packets are used to upload the user IP address to SAM+.If the 802.1x authentication module does not have an IP entry of the user, theuser is kicked offline 5 minutes later,  to prevent users at the IPaddress 0.0.0.0 on SAM+. The configuration of this command will drop users outof the network. It is not recommended to run this command in service peakhours.

dot1x mac-auth-bypassmulti-user                   //Mandatory.Enable MAB authentication on the interface.

dot1x mac-auth-bypassvlan (vlan-list)              //Optional.Configure this command in interface configuration mode to enable VLAN-based MABauthentication.

dot1x multi-mab quiet-period0             //Optional.Configure the quiet period for MAB authentication. In this period, after aclient fails the authentication, MAB authentication cannot be restarted beforethe MAC entry of the client ages on the RG-N18000. In this way, SAM+ does notgenerate logs of users who are not registered with SAM+. However, after failingthe MAB authentication at the first time, the client needs to wait for its MACentry on the RG-N18000 to age before it can trigger MAB authentication again.Configure this function as required.

Precautions:

MABauthentication takes effect only after relevant configurations are completed onSAM+. For details, see MAB authentication configuration in "SAM+Configuration".

MABauthentication takes effect only after it is selected on the authenticationpage.

MABauthentication takes effect after a client is MAB authenticated for the firsttime.

MABauthentication supports only dynamic DHCP users. It does not support static IPusers. The RG-N18000 transfers IP addresses from the DHCP snooping module toSAM+, and therefore information about static IP users does not exist in theDHCP snooping module.

802.1xauthentication has a higher priority than MAB authentication. Therefore, if aclient is MAB authenticated and then uses the client software to perform 802.1xauthentication, the MAB authentication entry will be deleted.

AfterMAB authentication is enabled, avoid configuring User Preemption orsetting Concurrent Logins Limit to 1. Otherwise, two clientsusing the same username will preempt a MAB authentication resource and bedropped out of the network.

Configuration example

Seedescription about the configuration commands.

4.1.4.5    [Optional] MAB Authentication

Principles:

MABauthentication, one of the main authentication modes in the simplistic networksolution, is applicable to wireless users in office areas of campus networks.With the MAB authentication model and high-performance authenticationprocessing capacity of the RG-N18000, MAB authentication enables the RG-N18000to learn the MAC address of a client when the client accesses the network, sothat teachers do not need to repeatedly entering their usernames and passwordswhen using wireless clients for Web authentication, to prevent deterioratinguser experience. The RG-N18000 uses the MAC address of the client as theusername and password to send an authentication request to SAM+ to complete theauthentication as a proxy. The user cannot perceive the authentication in thisprocess.

Thefollowing is the MAB authentication process:

Enablethe client MAB authentication on SAM+ by accessing the access controldirectory.

AfterWeb authentication succeeds for the first time, a user can select MABauthentication on the authentication success page.

Whenthe user chooses to enable MAB authentication, the MAC address of the userclient is registered with SAM+.

Afterthe client connects to the network, the RG-N18000 serving as a NAS, identifiesthe MAC address of the client, and uses the MAC address as the username andpassword to initiate authentication to SAM+.

SAM+determines validity of the MAC address and returns the authenticationsuccess/failure message to the NAS.

Ifthe authentication is successful, the NAS sends the accounting start packet.

Configuration commands:

Note:MAB authentication takes effect only after each user is WEB authenticated forthe first time. In addition, MAB authentication belongs to the 802.1xauthentication system. Therefore, both Web authentication and 802.1xauthentication need to be configured for MAB authentication.

æ  Configuring global AAA parameters

aaanew-model      //Enable the AAA function.

aaa accounting network (listname) start-stop group(group name)      //AAAreference configuration. The actual service deployment prevails.

aaa authentication dot1x (listname) group (groupname)          //802.1xtemplate reference configuration for AAA. The actual service deploymentprevails.

aaa authenticationweb-auth (list name) group(groupname)          //Webauthentication template reference configuration for AAA. The actual servicedeployment prevails.

aaa authentication login defaultlocal      //Use the local username/password tolog in to the AAA device.

aaa group server radius (groupname)           //Configurean AAA server group, which is applicable to multi-RADIUS scenarios.

server (radiusip)                                //Configurean AAA server group, which is applicable to multi-RADIUS scenarios.

radius-server host (radiusip) key 7 (radiuskey)       //Configure the IP address andkey for the AAA server, which are applicable to single-RADIUS scenarios.

aaa accounting update periodic30         //Set the interval forAAA accounting update to 30s.

aaa accountingupdate               //ConfigureAAA accounting update.

no aaa logenable      //Disable the AAA log function.

æ  Configuring 802.1x parameters and enabling 802.1x authentication onthe interface

dot1x accounting (listname)     //Optional. This command is required whenthe 802.1x accounting list name for AAA is not set to default.

dot1x authentication (listname)     //Optional. This command is required whenthe 802.1x authentication list name for AAA is not set to default.

interface range GigabitEthernet0/2-3  //Configure the interface for enabling 802.1xauthentication. 

dot1x port-control auto//Enable802.1x authentication on the interface.

æ  Configuring Web authentication parameters and enabling Webauthentication on the interface

web-auth templateeportalv2  

ip 202.204.193.32                 //Setthe IP address of the portal server.

url http://202.204.193.32/eportal/index.jsp   //Setthe URL of the portal server.

authentication  (listname)     //Optional. This command is required whenthe authentication list name for AAA is not set to default.

accounting  (listname)       //Optional. This command isrequired when the accounting list name for AAA is not set to default.

web-auth portal keyuniversity     //Optional. Configure the key.

interface range GigabitEthernet0/2-3  //Configure the interface for enabling Webauthentication. 

web-auth enable eportalv2////EnableWeb authentication on the interface.

æ  Configuring MAB authentication parameters and enabling MABauthentication on the interface

aaa authorization ip-auth-modemixed    //Mandatory. Set the IP address authorization modeof 802.1x clients to the mixed mode. The IP addresses can be obtained viapolling in multiple ways (DHCP/RADIUS).

ip dhcpsnooping              //Mandatory.An IP address needs to be obtained via the DHCP snooping module for MABauthentication. Otherwise, a user with the IP address of 0.0.0.0 appears onSAM.

dot1x mac-auth-bypassvalid-ip-auth          //Mandatory.The DHCP module instructs the MAB module to start authentication. Clients mustobtain IP addresses before starting MAB authentication. Otherwise, the MABauthentication is blocked to prevent clients with the IP address of 0.0.0.0 onSAM+. The configuration of this command will drop users out of the network. Itis not recommended to run this command in service peak hours.

dot1x valid-ip-acctenable           //Mandatory.The accounting update packets are used to upload the user IP address to SAM+.If the 802.1x authentication module does not have an IP entry of the user, theuser is kicked offline 5 minutes later,  to prevent users at the IPaddress 0.0.0.0 on SAM+. The configuration of this command will drop users outof the network. It is not recommended to run this command in service peakhours.

dot1x mac-auth-bypassmulti-user                   //Mandatory.Enable MAB authentication on the interface.

dot1x mac-auth-bypassvlan (vlan-list)              //Optional.Configure this command in interface configuration mode to enable VLAN-based MABauthentication.

dot1x multi-mab quiet-period 0             //Optional.Configure the quiet period for MAB authentication. In this period, after aclient fails the authentication, MAB authentication cannot be restarted beforethe MAC entry of the client ages on the RG-N18000. In this way, SAM+ does notgenerate logs of users who are not registered with SAM+. However, after failingthe MAB authentication at the first time, the client needs to wait for its MACentry on the RG-N18000 to age before it can trigger MAB authentication again.Configure this function as required.

Precautions:

MABauthentication takes effect only after relevant configurations are completed onSAM+. For details, see MAB authentication configuration in "SAM+Configuration".

MABauthentication takes effect only after it is selected on the authenticationpage.

MABauthentication takes effect after a client is MAB authenticated for the firsttime.

MABauthentication supports only dynamic DHCP users. It does not support static IPusers. The RG-N18000 transfers IP addresses from the DHCP snooping module toSAM+, and therefore information about static IP users does not exist in theDHCP snooping module.

802.1xauthentication has a higher priority than MAB authentication. Therefore, if aclient is MAB authenticated and then uses the client software to perform 802.1xauthentication, the MAB authentication entry will be deleted.

AfterMAB authentication is enabled, avoid configuring User Preemption orsetting Concurrent Logins Limit to 1. Otherwise, two clientsusing the same username will preempt a MAB authentication resource and bedropped out of the network.

Configuration example

Seedescription about the configuration commands.

4.1.4.6    [Mandatory] No-traffic Go-offline

Principles:

Whendetecting that a client generates no traffic in a period of time, the coredevice RG-N18000 used in simplistic networks actively forces the client to gooffline, thereby preventing invalid charging.

No-trafficgo-offline can be enabled based on VLANs. In simplistic networks, VLANsrepresent different planned areas, and areas can be selected to enable/disablethis function.

Thefamily area of a campus network uses a router as a proxy to completeauthentication for Internet access. After the traffic keepalive function isglobally enabled on the RG-N18000, if a client in the family area does notaccess the Internet within a period of time, the client is forced to go offlineand needs to be re-authenticated. Therefore, the traffic keepalive function isnot recommended for this area. The

VLAN-basedno-traffic go-offline can be configured for control.

Implementationprinciples:

Toimplement no-traffic go-offline, the system traverses the MAC address table ofthe device and compares the MAC address table with MAC addresses in the entriesof authenticated users. If the MAC address of an authenticated user in the MACaddress table has aged, the system determines that the user has no traffic andkicks the user offline. Note: The time consumed for traversing the MAC addresstable causes an error of 3–5 minutes to the original period for no-trafficgo-offline detection. If the original period for no-traffic go-offlinedetection is set to 15 minutes, it actually takes 18 to 20 minutes to kickclients offline.

Configuration commands:

offline-detect interval 15 threshold0        //If no traffic from a user isdetected within 15 minutes, the user is kicked offline. The RG-N18000 checkswhether there is user traffic matching the MAC address table for judgment.

offline-detect interval infinitythreshold 0 vlan 300  //Set the no-traffic go-offline detection period toan infinite large value for VLAN 300. If the no-traffic go-offline function isglobally enabled, run this command to disable this function for some VLANs.

VLAN-based no-traffic go-offline isapplicable only to router dialup scenarios, in which routers are online forlong. It cannot be applied to common client scenarios. Otherwise, the onlineduration on SAM+ will be inaccurate and affects the charging results.

Precautions:

Onlyno-traffic go-offline is supported currently, and low-traffic go-offline is notsupported.

Whenthe DHCP lease period of the client expires or the RG-N18000 receives a DHCPrelease packet, the RG-N18000 kicks the client offline during authentication.

Itis recommended to set the period for no-traffic go-offline detection to beshorter than the lease period of DHCP server.

Thefunction involves the traversal of the MAC address table, which increases thedetection period by 3–5 minutes based on original parameter configuration. Ifthe original period for no-traffic go-offline detection is set to 15 minutes,it actually takes 18 to 20 minutes to kick clients offline.

Configuration example

N/A

4.1.4.7    [Mandatory] IPv6 Authentication Mode

Principles:

Notethat independent IPv6 authentication is not supported in simplistic networks.The IPv6 authentication mode is determined according to the IPv4 authenticationresult. Three modes are available:

Compatible:If IPv4 authentication fails, IPv6 packets cannot be forwarded; if IPv4authentication succeeds, IPv6 packets can be forwarded.

Strict:IPv6 packets cannot be forwarded regardless of whether IPv4 authenticationsucceeds.

Loose:IPv6 packets can be forwarded regardless of whether IPv4 authenticationsucceeds.

Note:In simplistic networks, the RG-N18000 uses the strict mode by default, whichwill result in the failure to forward IPv6 packets. Change the mode to thecompatible mode.

Configuration commands:

Ruijie(config)#address-bind ipv6-modecompatible     //Compatible mode

Ruijie(config)#address-bind ipv6-modestrict        //Strict mode

Ruijie(config)#address-bind ipv6-modeloose      //Loose mode

Precautions:

Note:In simplistic networks, the RG-N18000 uses the strict mode by default, whichwill result in the failure to forward IPv6 packets. Change the mode to thecompatible mode.

Configuration example

N/A

4.1.4.8    [Mandatory] Source Port for Communicating withthe RADIUS/Portal Server

Principles:

Afterconfiguration, the source port of the device for communicating with the RADIUSserver is any specified port.

Afterconfiguration, the source port of the device for communicating with the portalserver is any specified port.

Configuration commands:

ip portalsource-interface loopback 0

ip radius source-interface lookback0

Precautions:

Onlyone source port of the RADIUS server can be configured.

Onlyone source port of the portal server can be configured.

Configuration example

N/A

4.1.4.9    [Mandatory] Migration of Authenticated Users

Principles:

Scenario1: When an online authenticated client migrates across super VLANs, migrationof authenticated users must be enabled. Otherwise, the original authenticationentry still exists and the client cannot be authenticated after moving toanother VLAN/port.

Scenario2: An online client migrates across different sub VLANs of the same super VLANand the IP address keeps unchanged before and after migration. After migrationof authenticated users is configured, the user is exempted from authenticationbefore and after migration (the portal page does not pop up). It prevents userexperience deterioration caused by frequent re-authentication.

Scenario3: An online client migrates across super VLANs, and even if migration ofauthenticated users is configured, the client needs to be re-authenticatedbefore accessing the network (the portal page pops up).

Scenario4 (spoofing scenario): User A is authenticated in VLAN A. User B uses the sameMAC address as User A and logs in by using the same username/password or MACaddress to simulate migration. In such spoofing scenarios, the RG-N18000 sendsan ARP detection packet to User A in VLAN A. If the RG-N18000 receives an ARPresponse from User A, it determines that spoofing occurs and rejects migration.

Note:VLANs here refer to sub VLANs.

Configuration commands:

station-movepermit//Mandatory. The overall switch for migration of authenticated usersmust be enabled, so that migration of Web and 802.1x authenticated usersbecomes available. When an authenticated user triggers migration, thepre-migration authentication entry is automatically deleted and thepost-migration authentication entry is automatically added.

web-authstation-move auto//Mandatory. After migration of Web authenticated users isenabled, when an authenticated user triggers migration, the Web authenticationmodule automatically deletes the pre-migration authentication entry andautomatically adds the post-migration authentication entry.

web-auth station-moveinfo-update       //Mandatory. When migration of Webauthenticated users is enabled, the accounting update packet is used to notifythe RADIUS server of the latest value of the user VID/port.

Precautions:

VLANchanges after user migration refer to sub VLAN changes.

Ifa user migrates across super VLANs, that is, the IP address changes aftermigration, the migration cannot be completed.

Configuration example

N/A

4.1.5    Common Scenario — Authentication OptimizationConfiguration

4.1.5.1    [Optional] Portal Escape

Principles:

Theportal escape mechanism exempts new users from authentication when the portalserver on the live network becomes unavailable.

Configuration commands:

web-auth portal-check interval 3timeout 3 retransmit 10    //Set the detection interval to3s, timeout duration to 3s, and retransmission count to 10.

web-auth portal-escape[nokick]          //Whenportal escape takes effect and the nokick attribute is set, an online user willnot be kicked offline. If the nokick attribute is deleted, an online user willbe kicked offline.

Precautions:

Theportal detection needs to be configured.

Ifmultiple Portal servers are configured, the escape function takes effect onlywhen all the Portal servers are unavailable.

Thisfunction is valid only to Portal servers.

Configuration example

N/A

4.1.5.2    [Optional] RADIUS Escape

Principles:

Afterthe RADIUS escape function is configured, users can still be authenticated andaccess the Internet even if the RADIUS server malfunctions.

Configuration commands:

radius-serverhost (radius ip) test username ruijieidle-time 2key (radius key)    //Mandatory. Use this command tokeep the detection between the device and the RADIUS server alive. TheRG-N18000 sends a detection packet with the username/password beingruijie/ruijie (the username can be user-defined, but the password is alwaysruijie) to the RADIUS server for authentication. If the authenticationsucceeds, it indicates that the RADIUS is still alive. radius key hereis not the user password. Instead, it is the key set by SAM+ server forinteraction with the RG-N18000.

radius-serverdead-criteria time 120 tries 12//Mandatory. The timeout duration is 120s. Ifthe RG-N18000 does not receive a response after an authentication request isretransmitted for 12 times, the RG-N18000 determines to escape. This functionprevents authentication jitter caused by oversensitivity of escape detection.

Theaccount (user name: ruijie; password: ruijie) needs to be configured andactivated on SAM+. This is mandatory.

web-auth radius-escape//Globallyconfigured to enable RADIUS escape for Web authentication.

dot1x critical//Configured on theinterface to enable RADIUS escape for dot1x authentication.

dot1x critical recovery actionreinitialize       //Configured on theinterface, so that after the RADIUS server is recovered, the user that usesdot1x escape is kicked offline for re-authentication.

Precautions:

Theaccount needs to be configured and activated on the SAM server. For example,the username and password are both ruijie. Otherwise, a great number of spamlogs from inexistent accounts are generated.

Tocancel the escape detection command no radius-server host (radiusip) test username ruijie idle-time 2 key (radiuskey), delete it, and then configure the radius-server host (radiusipkey 7 (radius key) command. Otherwise, theRADIUS server is unreachable.

 

Configuration example

N/A

4.1.5.3    [Optional] Web Authentication — IP/VLAN-basedSSID Mapping

Principles:

Inconventional network solutions, an AC serving as the NAS for wireless userauthentication obtains SSIDs of wireless users via the association modulebetween the AC and APs and uploads the SSIDs to SAM+ server. In addition,policies are configured on SAM+ server/portal server to implement the mappingbetween SSIDs and authentication pages pushed by the portal server, so thatdifferent authentication pages are displayed for different ISPs or users.

Insimplistic networks, the core device RG-N18000 cannot associate with APs toobtain SSIDs of wireless users. To address this defect, you can manuallyconfigure the VLAN-based SSID mapping function on the RG-N18000, so that SSIDsare uploaded to SAM+ server via authentication packets, thereby meeting therequirements of different ISPs or user groups for different authenticationpages.

Configuration commands:

Ruijie(config)#web-authmapping map-ssid vlan100 ssid ChinaNet        //Definethe mapping template name, mapped VLAN ID, and mapped SSID name.

Ruijie(config-if-GigabitEthernet 0/1)#web-auth apply-mapping map-ssid     //Apply themapping template to the interface.

Precautions:

Multiplemappings can be configured. If a user is out of the mapping range, the portalserver is used for authentication by default.

VLANscannot overlap with each other.

Configuration example

See description about the configurationcommands.

4.1.5.4    [Optional]Static IP Address MAB Authentication

Note:This function is supported only in N18000_RGOS 11.0(1)B3P3 and later versions.

Principles:

StaticIP address MAB authentication is MAB authentication triggered by using ARPpackets. It needs to be used in combination with the quiet function as well asfast MAC binding entries of SAM+ server.

1.      Thefast MAC binding information of users need to be added to SAM+ server.

2.      Thisfunction needs to be used in combination with the quiet function.

Configuration commands:

dot1xmac-auth-bypass static-ip-segment 1.1.1.0 255.255.255.0  unforced //SendARP packets from the static IP address segment to trigger MAB authentication.MAB authentication can be initiated based on only IP address segments.

dot1xmulti-mab quiet-period 300  //Enable 802.1x quiet function and setthe quiet period to 300s. In this period, MAB authentication cannot beperformed, but Web authentication and 802.1x authentication are available.

dot1x pending-user authen-num  24   //Optional. Set the default rate of MABauthentication triggered by ARP packets to 24 users/second. It is notrecommended to change the default value.

Precautions:

1.      Thestatic IP address MAP authentication needs to be used together with the quietfunction. Otherwise, users who fail the authentication performs authenticationrepeatedly, imposing great pressure on SAM+ and incurring exceptions. Therecommended quiet period is 5 minutes.

2.      StaticIP address MAB authentication takes effect only when fast MAC binding entriesare configured on SAM+. If no fast MAC binding entry is available on SAM+,manually bind MAC addresses. MAC addresses cannot be configured in Webauthentication mode (if a static IP address is within the IP address segmentrange configured by using the dot1x mac-auth-bypass static-ip-segmentcommand, the Web authentication page does not pop up and redirection cannot beperformed).

Configuration example

interface GigabitEthernet 1/1  //Enable MAB authentication on the interface.

switchportprotected 

switchportmode trunk 

switchporttrunk allowed vlan only 2-50,3000-3001

 dot1xport-control auto 

dot1xmac-auth-bypass multi-user

web-authenable eportalv2

dot1xmac-auth-bypass static-ip-segment 10.20.50.0 255.255.255.0 //Configuredglobally send ARP packets from the static IP address segment to trigger MAB authentication.

dot1xmulti-mab quiet-period 300  //Enable the 802.1x quiet function andset the quiet period to 300s.

Aftera user is authenticated, SAM+ automatically binds the MAC address of the userand enables static IP address MAB authentication upon next user login.

 

4.1.5.5    [Optional] 802.1x Authentication Quiet Function

Note:This function is supported only in N18000_RGOS 11.0(1)B3P3 and later versions.

Principles:

Afterthe quiet function is configured, users who fail the authentication are addedto the quiet queue and do not initiate authentication. They can initiateauthentication after the quiet period expires.

Configuration commands:

dot1x multi-mab quiet-period300  //Enable the 802.1x quiet function and set the quiet period to300s.

Precautions:

Thequiet function does not need to be configured if static IP address MABauthentication is not required. Otherwise, the function may affectauthentication performance and cause high CPU usage of line cards.

Configuration example

N/A

4.1.5.6    [Mandatory] Preventing 802.1x Authenticationfrom Preempting MAB Authentication Resources

Note:This function is supported only in N18000_RGOS 11.0(1)B3P3 and later versions.

Principles:

Bydefault, 802.1x authentication has a higher priority than MAB authentication,and 802.1x authentication preempts resources of MAB authentication. If it isrequired that 802.1x authentication not preempt resources of MAB authenticationand they have the same priority, configure this command on an interface. Afterconfiguration, 802.1x authentication does not preempt resources of MABauthentication and 802.1x authentication will fail if a MAB authenticated useris online.

Configuration commands:

Precautions: 

Beforethe function is configured, do not enable Windows-embedded 802.1x authenticationwhen MAB authentication is used. By default, 802.1x authentication preempts MABauthentication resources. As a result, a MAB authenticated user is kickedoffline.

Configuration example

N/A

4.1.6    QinQ Isolation Scenarios

4.1.6.1    [Mandatory] QinQ VLAN Tag Termination

Principles:

TheQinQ VLAN tag termination enables the routing forwarding module to receive andsend packets with dual VLAN tags.

CE-vlan//QinQinner VLAN tag. VLANs must be consecutive, for example, 101–150.

PE-vlan//QinQouter VLAN tag (sub VLAN).

Note:The modified CE-VLAN configuration will overwrite original configuration.Improper configuration will cause network interruption.

Example:Original configuration: qinq termination ce-vlan 200 to 300

Newconfiguration: qinq termination ce-vlan 301 to 310

Theoriginal configuration will be overwritten as follows: qinq termination ce-vlan301 to 310

Configuration commands:

ConfiguringCE-VLANs

Command

qinqtermination ce-vlan start-vid to end-vid

ParameterDescription

start-vidindicates the minimum CE-VLAN ID.

end-vidindicates the maximum CE-VLAN ID.

Defaults

Bydefault, user VLANs have no QinQ VLAN tag termination.

CommandMode

Globalconfiguration mode

UsageGuide

Thereis no CE-VLAN by default.

 

ConfiguringPE-VLANs

Command

qinqtermination pe-vlan [ add | remove ] vlan-list

ParameterDescription

vlan-list: Indicates the VLAN list in the range of 1 to 4094.

Defaults

Bydefault, ISP VLANs have no QinQ VLAN tag termination.

CommandMode

Globalconfiguration mode

UsageGuide

ISPVLANs with QinQ VLAN tag termination can be configured in incremental mode.

Precautions:

QinQVLAN tag termination is performed only in the case of routing and forwarding,and layer-2 forwarding enables only transparent transmission through tunnels.

Ifusers of different CE-VLANs need to communicate with each other, the local ARPproxy (enabled by default) needs to be enabled on the SVI corresponding to thePE-VLAN.

EDcards support 511 CE-VLANs by default.

DBcards support 61 CE-VLANs by default.

Itis recommended to reduce the number of CE-VLANs to be created duringdeployment, for example, if only 50 CE-VLANs are used on the live network, runthe qinq termination ce-vlan 101 to 151 command to create requiredVLANs. Avoid creating 511 CE-VLANs at a time. More CE-VLANs will result in highCPU usage of the RG-N18000.

Determinewhether a client with a single VLAN tag exists on the RG-N18000. If yes, theVLAN ID of the client cannot be the same as that of the PE-VLAN (outer VLAN)configured in QinQ VLAN tag termination command.

Case:

Thefollowing command is executed to configure the outer VLAN range for QinQ VLANtag termination on the RG-N18000: qinq termination pe-vlan 100-101.

Afterpackets from a client with a single VLAN tag reach the RG-N18000, the RG-N18000performs the following processing:

1.      Determinewhether the VLAN ID is 100, and if yes, enter the QinQ processing logic.

2.      Checkwhether there is no inner VLAN ID from parsed packets, and if yes, discard thepackets.

Asa result, packets from the client with a single VLAN tag (VLAN ID = 100) cannotbe forwarded. After the VLAN ID is changed to a value other than 100 and101, packets from the client can be forwarded normally.

Configuration example

ConfigurationSteps

EnableQinQ VLAN tag termination on the core switch and configure the PE-VLAN/CE-VLAN.

SwitchA#configure terminal

Enter one configuration command ineach line, ended with CNTL/Z.

Ruijie(config)#qinq terminationpe-vlan 100-101

Ruijie(config)#qinq terminationce-vlan 200 to 300

Verification

Ruijie(config)#show qinq termination

CE-VLAN:     200–300

PE-VLAN:     100 and101

4.1.6.2    [Mandatory] Transparent Transmission of RADIUSPackets in QinQ Format

Principles:

Theconfiguration of NAS-port-ID encapsulation format for RADIUS packets ismandatory in QinQ isolation scenarios in simplistic networks. RADIUS packetsare encapsulated in a format that combines the interface name of the client andthe inner and outer VIDs in a specified manner. SAM+ reads dual VLAN IDs basedon the nas-port-id field.

Configuration commands:

radius-server attribute nas-port-idformat qinq    //Configured in global configuration mode.

Precautions:

Thisfunction is mandatory in QinQ isolation scenarios.

Configuration example

Ruijie(config)# radius-serverattribute nas-port-id format qinq

4.1.7    Anti-Loop Configuration for Simplistic Networks

4.1.7.1    [Mandatory] Anti-Loop Configuration on the CoreDevice

1.     By default,the Rapid Link Detection Protocol (RLDP) is enabled on the core deviceRG-N18000 of N18000_RGOS 11.0(1)B3P1 and later versions, to generatealarms for VLAN loops and make records. Therefore, do not disable RLDP.

2.     Pay attentionto RLDP loop logs.

3.     Run the showrldp log command to display relevant logs.

4.1.7.2    [Mandatory] Anti-loop Configuration on AccessDevices

1.     Configure theSpanning Tree Protocol (STP) on the access device to assist RLDP loopprevention. Enable the Rapid Spanning Tree Protocol (RSTP) globally, and enableBPDU filter on the uplink interface of the access device, and BPDU guard on thedownlink interface. Example:

S2928-student(config)#spanning-tree             //EnableSTP.

S2928-student(config)#spanning-tree mode rstp     //EnableRSTP, to prevent low convergence speed of interfaces.

S2928-student(config)#spanning-tree portfast bpduguard default    //BPDUguard is enabled on PortFast interfaces by default.

S2928-student(config)#int ran gi 0/1-23    

S2928-student(config-if-range)#spanning-tree portfast     //PortFastis enabled on the downlink interface and BPDU guard takes effect on thedownlink interface. Once BPDU packets are received, the system considers that aloop occurs. Therefore, disable the downlink interface.

 S2928-student(config-if-range)#interface gi0/24    

 S2928-student(config-if- GigabitEthernet 0/24)#spanning-tree bpdufilter enable     //EnableBPDU filter on the uplink interface, which does not send BPDU packets toexternal devices, so that no topology is established and no root bridge iselected, and loops are prevented on a single device.

S2928-student(config-if-AggregatePort 1))#exit

4.1.8    RG-N18000 Optimization Functions

4.1.8.1    [Optional] Fast Packet Capture

Note: This function is supported only in N18000_RGOS11.0(1)B3P3.

Principles:

Ifthe packet sending/receiving fails or an exception occurs during routinemaintenance, you can specify the packet capture point, direction, as well aspacket characteristics. Then, start packet capture and check whether packetsare transmitted to/from the device to pinpoint the cause for the failure.

 

Configuration commands:

1.      Createa packet capture rule.

packet capture rule rule-name  [src-macsmac][dst-mac dmac]  [etype type | ip |arp ][src-ip sip sip-mask] [dst-ip dip dip-mask][src-ipv6 sipv6 sipv6-prefix] [dst-ipv6 dipv6 dipv6-prefix][protocol protocol|tcp | udp] [src-port sport ][dst-port dport]

2.      Specifythe packet capture point.

packet capture point capture-point-namerule rule-name location {interfaceinterface-name| vlan vlan-id | control-plane} {in | out | both}

3.      Enable/Disablethe packet capture rule.

packet capture {start | stop}

Precautions:

1.      Thisfunction is not risky theoretically. Nevertheless, it is not recommended to useit in service peak hours and non-fault cases. If the packet capture period isset to XX minutes in the software, the software stops packet capture after theperiod expires.

2.      If thepacket capture rate is higher than the data write speed of the device, packetscannot be completely written into the device. It is recommended to configure moreaccurate packet capture matching rules. The system CPU supports a packetcapture rate up to 1000 pps in idle hours and 600 pps when the CPU usage is65%. If the system CPU usage exceeds 70% (including 70%), packet capture is notstarted even if it is configured.

Configuration example

1.      Thefollowing example captures the RADIUS authentication packets exchanged betweena client (100.0.30.77) and SAM+ and those exchanged between the RG-N18000(192.168.3.1) and SAM+.

CapturedRADIUS packets need to be saved in the tmp directory (or the usb0directory in actual application). This directory does not need to be copied.

packet capture rule testdown filteripv4_sip 100.0.30.77 0.0.0.0

packet capture rule testup filteripv4_sip 192.168.3.1 0.0.0.0 v4_protocol udp ipv4_dport eq 1812

packet capture point testup ruletestup location interface gigabitEthernet 1/1/2 both

packet capture point testdown ruletestdown location interface gigabitEthernet 1/1/15 both

packet capture file tmp://test.pcap

packet capture file usb0://test.pacp?

buffer-size  Buffer size ofpacket info   //Define the size of the file for storing capturedpackets. The default size is 2 MB.

packet-num   Number ofpackets      //Define the number of packets to be captured.The default value is 1024.

timeout     Timeout of minutes       //Define thepacket capture duration. The default value is 10 min.

packet capture start 

show packet capture status

packet capture stop

2.      Thescreenshot below shows the ping packets sent by the client (100.0.30.77) andRADIUS packets sent by the device.

3.      If thecaptured packets are stored in the TMP directory, you can run thefollowing commands to copy them to another directory:

    Ruijie#run-system-shell

       cd /tmp

       /tmp # mvxxx.pacp /tmp/vsd/0/ xxx.pacp

       Start theTFTP software on the client and run the commands to copy information aboutcaptured packets to the client.

copy tmp:/xxx.pacp tftp://xxx.xxx.xxx.xxx/xxx.pacp   //Selectoob_tftp for the MGMT port.

4.1.8.2    Analysis of VSL Traffic Faults in the Case ofOne-to-Many Mirroring

Basic information

æ  Fault symptom

On-sitetopology:

Acustomer mirrors the egress traffic to multiple servers in one-to-many mode.Two 10 Gbps VSLs are configured but the interface traffic of one VSL is aboutto reach the limit.

æ  Fault analysis

1.      Possiblecauses

Withone-to-many mirroring, the traffic of the MAC self-loop port is flooded to aVSL via remote VLAN. There is no measure for balancing the layer-2 trafficflooded to the VSLs.

2.      Causelocating

Thetraffic of one VSL is about to reach the limit, that is, 10 Gbps. Data istransmitted from RG-N18000 2 to RG-N18000 1.

Itis found that the traffic in the inbound direction of RG-N18000 2 is not heavybut the traffic of the mirroring self-loop port is about 10 Gbps.

Theself-loop port belongs to VLAN 1581.

3.      Detailedanalysis

a.Related configuration

vlan1581

 name_VLANstudent egress remote mirroring

 remote-span

!

interfaceTenGigabitEthernet 2/7/3

 descriptionto- mirroring port

 switchportaccess vlan 1581

 spanning-treebpdufilter enable

 ipdhcp snooping trust

 nfpparp-guard enable

 nfppicmp-guard enable

!

interfaceTenGigabitEthernet 2/7/4

 descriptionto- destination mirroring port- source ten2/7/7&2/7/1

 nomac-address-learning

 switchportaccess vlan 1581

 ipdhcp snooping trust

 mac-loopback

!

interfaceTenGigabitEthernet 2/7/8

 descriptionlink_to_ASME1000_moniter

 nomac-address-learning

 switchportmode trunk

 switchporttrunk native vlan 1581

 switchporttrunk allowed vlan only 1581

!

monitorsession 4 remote-source

monitorsession 4 destination remote vlan 1581 interface TenGigabitEthernet 2/7/4 switch

monitorsession 4 source interface TenGigabitEthernet 2/7/7 both

 

b.Principle analysis

One-to-manymirroring is configured on the RG-N18000, to mirror the traffic of the outboundport Te2/7/7 to port Te2/7/3 and port Te2/7/8.

l  lCreate remoteVLAN 1581 on the device.

l  lSpecify thedevice as the RSPAN source device, configure the outbound port Te2/7/7 as themirroring source port. Select a down port (port Te2/7/4) as the mirroringoutput port, add the port to the remote VLAN, and configure MAC self-loop byrunning the mac-loopback command in interface configuration mode.

l  lAdd portTe2/7/3 and port Te2/7/8 to the remote VLAN.

Inthis scenario, the traffic of the VLAN is flooded to all chips. The traffic ofthe MAC self-loop port is flooded to the VSL port regardless of whetherRG-N18000 1 has a port included in VLAN 1581.

æ  Solution

1.      Optimizationsolution

a.Increase the VSL bandwidth.

Changethe VSL port to 40G port. Line cards with 40G ports include 16XS2QXS-BD.

Forone-to-many mirroring requirement, a layer-2 switch can be added to mirror thetraffic of the mirroring source port to the layer-2 switch in one-to-one mode,and then the layer-2 switch floods the traffic to multiple destination portsover the same VLAN on the layer-2 switch.

 Note:In the topology above, the source ports are Ten 2/7/7 and Ten 1/7/1, and thedestination port is AP 1.

Configurationsteps:

l  = Add port Ten 1/7/1 and port Ten 2/7/1 of RG-N18000 1 to AP 1.

l  = Configure local mirroring on the RG-N18000, and specify port Ten2/7/7 and AP1 as the source port and destination port of mirroringrespectively.

l  = Add port Ten 0/1 and port Ten 0/2 of the S6220 to AP 1.

AddAP1, port Ten0/3, and port Ten0/4 of the S6220 to VLAN 100. 

RG-N18000:

Ruijie# configure 

Ruijie(config)#interfaceaggregatePort 1

Ruijie(config-if-AggregatePort1)#exit

Ruijie(config)#interfacetenGigabitEthernet 1/7/1

Ruijie(config-if-TenGigabitEthernet1/7/1)#port-group 1

Ruijie(config)#interfacetenGigabitEthernet 2/7/1

Ruijie(config-if-TenGigabitEthernet2/7/1)#port-group 1

Ruijie(config)# monitor session 1source interface tenGigabitEthernet 2/7/7 

Ruijie(config)# monitor session 1destination interface aggregatePort 1

S6220:

Ruijie(config)#interfaceaggregatePort 1

Ruijie(config-if-AggregatePort1)#switchport access vlan 100

Ruijie(config-if-AggregatePort1)#exit

Ruijie(config)#interfacetenGigabitEthernet 0/1

Ruijie(config-if-TenGigabitEthernet0/1)#port-group1

Ruijie(config)#interfacetenGigabitEthernet 0/2

Ruijie(config-if-TenGigabitEthernet0/2)#port-group 1

Ruijie(config)#interfacetenGigabitEthernet 0/3

Ruijie(config-if-TenGigabitEthernet0/3)# switchport access vlan 100

Ruijie(config)#interfacetenGigabitEthernet 0/4

Ruijie(config-if-TenGigabitEthernet0/4)# switchport access vlan 100

 

Thorough solution

N/A


4.2     SAM+ and ePortal Configuration

4.2.1    [Optional] Wired RG-N18000—802.1XAuthentication

4.2.1.1    Adding the RG-N18000 on SAM

4.2.1.1.1    Function requirements

Add the NAS (RG-N18000) on SAM+.

4.2.1.1.2    Configuration key points

The NAS-relevant parameters added on SAM+must be consistent with the actual settings of the NAS. Otherwise, anauthentication exception occurs.

l  The address for the RG-N18000 to interwork with SAM+ must becorrect on SAM+. For example, if the source port for communicating with SAM+ isconfigured on the RG-N18000 by running the ip radius source-interface loopback0 command, the IP address of the loopback0 interface of the RG-N18000 needsto be entered in the Device IP Address column of SAM+.

l  The key for interworking with the RG-N18000 needs to be consistent.

l  The SNMP community for interworking with the RG-N18000 needs to beconsistent.

4.2.1.1.3    Configuration steps

1.      Log into the SAM+ management page.

2.      Choose System> Device Management.

3.      Click Addto add a device.

4.      SetNAS-relevant parameters and ensure that the key parameters are consistent withthe actual settings of the NAS. Then, click Save.

4.2.1.1.4    Verification

1.      Checkwhether the SAM+ server can ping the device successfully. If yes, it indicatesthat their communication is normal (ensure that ping packets are notintercepted by the firewall).

4.2.1.2    Access Control Configuration

4.2.1.2.1    Function requirements

Configure access control to restrictInternet access behavior of users.

4.2.1.2.2    Configuration key points

The Internet access behavior of accessusers needs to be confirmed with customers and access control needs to beconfigured based on actual conditions.

4.2.1.2.3    Configuration steps

1.      Log into the SAM+ management page.

2.      Choose AccessControl > Access Control.

3.      Click Addto add access control.

4.      Onthe Access Control Information tab page, enter the access control name,for example, "dot1x", and set other parameters based on actualconditions.

5.      Onthe User Information Check tab page, select Wired 1X Access andconfigure whether to bind accounts with IP/MAC addresses based on actualconditions. Then, click Save.

4.2.1.2.4    Verification

Verify that access control is addedsuccessfully.

4.2.1.3    Billing Policy Configuration

4.2.1.3.1    Function requirements

Configure billing policies based onbilling requirements of access users, to pay for Internet access.

4.2.1.3.2    Configuration key points

Billing requirements of access users needto be confirmed with customers and billing policies need to be configured basedon actual conditions.

4.2.1.3.3    Configuration steps (monthly milling)

1.      Log into the SAM+ management page.

2.      Choose Billing> Billing Policy.

3.      Select MonthlyBilling Policy and click Add.

4.      Enterthe billing policy name, for example, "dot1x", set Period Typeto 30 Days or Month, and set Rate (MYR), for example, 30Yuan/month. Then, click Save.

4.2.1.3.4    Verification

Verify that the billing policy is addedsuccessfully.

 

4.2.1.4    User Template Configuration

4.2.1.4.1    Function requirements

Configure user templates based on userattributes for later account creation.

4.2.1.4.2    Configuration key points

It is recommended to classify usertemplates with the same attribute into a group and give concise and intuitivenames to the templates, for example, student monthly billing template orteacher monthly billing template.

4.2.1.4.3    Configuration steps

1.      Log into the SAM+ management page.

2.      Choose User> User Template.

3.      Click Add.

4.      In the AddUser Template dialog box, enter the template name, for example,"dot1x", and click Save.

4.2.1.4.4    Verification

Verify that the user template is addedsuccessfully.

4.2.1.5    User Plan Configuration

4.2.1.5.1    Function requirements

Configure a user plan to cover accesslimits of authenticated users, including the area, time range, access control,and billing policy. A user plan is akin to a phone service package.

4.2.1.5.2    Configuration key points

A plan covers all control options andfees for access users. Be sure to clearly confirm plans with customers beforeconfiguration.

4.2.1.5.3    Configuration steps

1.      In theconfigured user template "dot1x", click Add Plan.

2.      Enterthe plan name, for example, "dot1x", select a configured billingpolicy or Not Charging based on actual requirements, and then click Save.

3.      ClickModify Plan and modify the access area, access time range, accesscontrol, and billing mode.

4.      Modifythe rule based on actual conditions. The figure below shows that the accessarea of authenticated users is unlimited, access control is set to"dot1x", the access time range is unlimited, and billing is performedbased on the plan "dot1x".

4.2.1.5.4    Verification

Verify that the plan meets customerrequirements.

4.2.1.6    User Group Configuration

4.2.1.6.1    Function requirements

Add authenticated users with the sameattribute to the same group, and define a response user template and plan forthe user group to prepare for later account creation.

4.2.1.6.2    Configuration key points

It is recommended to group access usersby attribute, for example, group users on campus networks into "studentuser group" or "teacher user group".

4.2.1.6.3    Configuration steps

1.      Log into the SAM+ management page.

2.      Choose User> User Group.

3.      Click Add.

4.      Enter the user group name, for example,"dot1x", and select the default user template and default plan. Then,click Save.

4.2.1.6.4    Verification

Verify that the user group is addedsuccessfully.

4.2.1.7    Account Creation

4.2.1.7.1    Function requirements

Create accounts in the SAM+ system.

4.2.1.7.2    Configuration key points

1.      Theaccount creation process generally requires users to go to business halls andapply for accounts by using their ID cards.

2.      Accountswith the names same as those on their ID cards are registered during accountcreation.

3.      Auser group and a user template need to be selected during account creation asplanned.

4.2.1.7.3    Configuration steps

1.      Log into the SAM+ management page.

2.      Choose User> User Management.

3.      Click CreateAccount in the left pane.

4.      Enterthe username and password, select a user group, user template, and plan. Then,click Save.

4.2.1.7.4    Verification

1.      Inthe left pane of the User Management page, click User Search. Inthe displayed right pane, click Search. The added user is displayed.

4.2.1.8    Payment

4.2.1.8.1    Function requirements

Collect fees from newly created users, sothat they can be authenticated, be charged, and access the Internet.

4.2.1.8.2    Configuration key points

The payment operation involves fees.Ensure that paid fees are consistent with the fees recorded in the system.

4.2.1.8.3    Configuration steps

1.      Log into the SAM+ management page.

2.      Choose Billing> Fees Management.

3.      Thenewly created user has insufficient balance. Click the icon in the Paymentcolumn.

4.      Collectthe fees, record the fees actually paid by the user in the system, and click Payment.

4.2.1.8.4    Verification

1.      Verifythat the fees are paid successfully.

2.      Verifythat the fees are corrected and the account is in the normal state. As shown inthe figure below, 123 Yuan is deducted from the user account "dot1x"for the current month, and the account has 246 Yuan balance, and is in thenormal state.

4.2.2    [Optional] Wireless AC — 802.1x Authentication

4.2.2.1    Adding an AC on SAM+

4.2.2.1.1    Function requirements

Add ACs on SAM+.

4.2.2.1.2    Configuration key points

The AC parameters added on SAM+ must beconsistent with the actual settings of the AC. Otherwise, an authenticationexception will occur.

4.2.2.1.3    Configuration steps

1.      Log into the SAM+ management page.

2.      Choose System> Device Management.

3.      Click Addto add a device.

4.      SetAC parameters and ensure that the key parameters are consistent with the actualsettings of the AC. Then, click Save.

4.2.2.1.4    Verification

1.      Checkwhether the SAM+ server can ping the device successfully. If yes, it indicatesthat their communication is normal (ensure that ping packets are notintercepted by the firewall).

4.2.2.2    Access Control Configuration

4.2.2.2.1    Function requirements

Configure access control to restrictInternet access behavior of users.

4.2.2.2.2    Configuration key points

The Internet access behavior of accessusers needs to be confirmed with customers and access control needs to beconfigured based on actual conditions.

4.2.2.2.3    Configuration steps

1.      Log into the SAM+ management page.

2.      Choose AccessControl > Access Control.

3.      Click Addto add access control.

4.      Onthe Access Control Information tab page, enter the access control name,for example, "wireless1x", and set other parameters based on actualconditions.

5.      Onthe User Information Check tab page, select Wireless 1X Accessand configure whether to bind accounts with IP/MAC addresses based on actualconditions. Then, click Save.

4.2.2.2.4    Verification

Verify that access control is addedsuccessfully.

4.2.2.3    Billing Policy Configuration

4.2.2.3.1    Function requirements

Configure billing policies based onbilling requirements of access users, to pay for Internet access.

4.2.2.3.2    Configuration key points

Billing requirements of access users needto be confirmed with customers and billing policies need to be configured basedon actual conditions.

4.2.2.3.3    Configuration steps (monthly milling)

1.      Log into the SAM+ management page.

2.      Choose Billing> Billing Policy.

3.      Select MonthlyBilling Policy and click Add.

4.      Enterthe billing policy name, for example, "wireless_month", set PeriodType to 30 Days or Month, and set Rate (MYR), forexample, 30 Yuan/month. Then, click Save.

4.2.2.3.4    Verification

Verify that the billing policy is addedsuccessfully.

4.2.2.4    User Template Configuration

4.2.2.4.1    Function requirements

Configure user templates based on userattributes for later account creation.

4.2.2.4.2    Configuration key points

It is recommended to classify usertemplates with the same attribute into a group and give concise and intuitivenames to the templates, for example, student monthly billing template orteacher monthly billing template.

4.2.2.4.3    Configuration steps

1.      Log into the SAM+ management page.

2.      Choose User> User Template.

3.      Click Add.

4.      Enterthe template name, for example, "wireles_month", and click Save.

4.2.2.4.4    Verification

Verify that the user template is addedsuccessfully.

4.2.2.5    User Plan Configuration

4.2.2.5.1    Function requirements

Configure a user plan to cover accesslimits of authenticated users, including the area, time range, access control,and billing policy. A user plan is akin to a phone service package.

4.2.2.5.2    Configuration key points

A plan covers all control options andfees for access users. Be sure to clearly confirm plans with customers beforeconfiguration.

4.2.2.5.3    Configuration steps

1.      In theconfigured user template "wireless_month", click Add Plan.

2.      Enterthe plan name, for example, "wireless_month", select a configuredbilling policy or Not Charging based on actual requirements, and thenclick Save.

3.      Click ModifyPlan and modify the access area, access time range, access control, andbilling mode.

4.      Modifythe rule based on actual conditions. The figure below shows that the accessarea of authenticated users is unlimited, access control is set to"wireless1x", the access time range is unlimited, and billing isperformed based on the plan "wireless_month".

4.2.2.5.4    Verification

Verify that the plan meets customerrequirements.

4.2.2.6    User Group Configuration

4.2.2.6.1    Function requirements

Addauthenticated users with the same attribute to the same group, and define aresponse user template and plan for the user group to prepare for later accountcreation.

4.2.2.6.2    Configuration key points

Itis recommended to group access users by attribute, for example, group users oncampus networks into "student user group" or "teacher usergroup".

4.2.2.6.3    Configuration steps

1.      Log into the SAM+ management page.

2.      Choose User> User Group.

3.      Click Add.

4.      Enterthe user group name, for example, "wireless_month", and select thedefault user template and default plan. Then, click Save.

4.2.2.6.4    Verification

Verify that the user group is addedsuccessfully.

4.2.2.7    Account Creation

4.2.2.7.1    Function requirements

Create accounts for users in the SAM+system.

4.2.2.7.2    Configuration key points

1.      Theaccount creation process generally requires users to go to business halls andapply for accounts by using their ID cards.

2.      Accountswith the names same as those on their ID cards are registered during accountcreation.

3.      A usergroup and a user template need to be selected during account creation asplanned.

4.2.2.7.3    Configuration steps

1.      Log into the SAM+ management page.

2.      Choose User> User Management.

3.      Click CreateAccount in the left pane.

4.      Enterthe username and password, select a user group, user template, and plan. Then,click Save.

4.2.2.7.4    Verification

1.      Inthe left pane of the User Management page, click User Search. Inthe displayed right pane, click Search. The added user is displayed.

 

4.2.2.8    Payment

4.2.2.8.1    Function requirements

Collect fees from newly created users, sothat they can be authenticated, be charged, and access the Internet.

4.2.2.8.2    Configuration key points

The payment operation involves fees.Ensure that paid fees are consistent with the fees recorded in the system.

4.2.2.8.3    Configuration steps

1.      Log into the SAM+ management page.

2.      Choose Billing> Fees Management.

3.      Thenewly created user has insufficient balance. Click the icon in the Paymentcolumn.

4.      Collectthe fees, record the fees actually paid by the user in the system, and click Payment.

4.2.2.8.4    Verification

1.      Verifythat the fees are paid successfully.

2.      Verifythat the fees are corrected and the account is in the normal state. As shown inthe figure below, 123 Yuan is deducted from the user account"wireless1x" for the current month, and the account has 123 Yuanbalance, and is in the normal state.

4.2.3    [Optional] RG-N18000 — Web Authentication(Wired & Wireless)

4.2.3.1    Adding the RG-N18000 on SAM+ (2)

4.2.3.1.1    Function requirements

Add the NAS (RG-N18000) on SAM+.

4.2.3.1.2    Configuration key points

The NAS-relevant parameters added on SAM+must be consistent with the actual settings of the NAS. Otherwise, anauthentication exception occurs.

l  The address for the RG-N18000 to interwork with SAM+ must becorrect on SAM+. For example, if the source port for communicating with SAM+ isconfigured on the RG-N18000 by running the ip radius source-interface loopback0 command, the IP address of the loopback0interface of the RG-N18000 needs to be entered in the Device IP Addresscolumn of SAM+.

l  The key for interworking with the RG-N18000 needs to be consistent.

l  The SNMP community for interworking withthe RG-N18000 needs to be consistent.

4.2.3.1.3    Configuration steps

1.      Log into the SAM+ management page.

2.      Choose System> Device Management.

3.      Click Addto add a device.

4.      SetNAS-relevant parameters and ensure that the key parameters are consistent withthe actual settings of the NAS. Then, click Save.

4.2.3.1.4    Verification

1.      Checkwhether the SAM+ server can ping the device successfully. If yes, it indicatesthat their communication is normal (ensure that ping packets are notintercepted by the firewall).

4.2.3.2    Adding the ePortal Server on SAM+

4.2.3.2.1    Function requirements

Add information about the ePortal Serveron SAM+.

4.2.3.2.2    Configuration key points

The ePortal parameters added on SAM+ mustbe consistent with the actual settings of the ePortal server. Otherwise, anauthentication exception occurs.

4.2.3.2.3    Configuration steps

1.      Log into the SAM+ management page.

2.      Choose System> Device Management.

3.      Click Addto add a device.

4.      Addthe ePortal server and ensure that the key parameters are consistent with theactual settings of the ePortal server. Then, click Save.

4.2.3.2.4    Verification

1.      Checkwhether the SAM+ server can ping ePortal successfully. If yes, it indicatesthat their communication is normal (ensure that ping packets are notintercepted by the firewall).

2.     On theSAM+ server, log in to the ePortal system in HTTP mode and check whether youcan log in successfully. If yes, it indicates that their communication isnormal.

4.2.3.3    Adding SAM+ on the ePortal Server

4.2.3.3.1    Function requirements

Set parameters of the ePortal server sothat it can communicate with the SAM+ and NAS normally.

4.2.3.3.2    Configuration key points

The parameters on the ePortal server mustbe consistent with those on the SAM+ and NAS.

4.2.3.3.3    Configuration steps

1.      Login to the ePortal management page, click System Settings, and enter theSAM+ address, RADIUS key, and authentication and accounting ports in the RADIUSServer area. Ensure that the parameters are consistent with those on theSAM+ server.

2.      SetSNMP parameters in Device Communication Settings.

Informs Community: SNMP community nameused for receiving traps from the device. It must be consistent with thecommunity name configured on the device.

SNMP Community: community name of thevirtual SNMP agent maintained on the ePortal system. It is used to process SNMPpackets between the ePortal system and the RADIUS server.

4.2.3.3.4    Verification

Check parameters and verify that relevantparameters are consistent with those on SAM+ and the NAS.

4.2.3.4    Adding the RG-N18000 on the ePortal Server

4.2.3.4.1    Function requirements

Add the NAS on the ePortal server.

4.2.3.4.2    Configuration key points

The NAS parameters added on the ePortalserver must be consistent with those on the NAS.

4.2.3.4.3    Configuration steps

1.      Login to the ePortal management page, click Device Management, select 2nd-GenerationWeb Authentication Access Device from the Device Type drop-downlist, and enter the IP address and relevant parameters of the Webauthentication access device. Keep these parameters consistent with those onthe NAS. Then, click Save.

4.2.3.4.4    Verification

1.      Checkwhether the ePortal server can ping the device successfully. If yes, theircommunication is normal (ensure that ping packets are not intercepted by thefirewall).

4.2.3.5    Access Control Configuration

4.2.3.5.1    Function requirements

Configure access control to restrictInternet access behavior of users.

4.2.3.5.2    Configuration key points

The Internet access behavior of accessusers needs to be confirmed with customers and access control needs to beconfigured based on actual conditions.

4.2.3.5.3    Configuration steps

1.      Log into the SAM+ management page.

2.      Choose AccessControl > Access Control.

3.      Click Addto add access control.

4.      Onthe Access Control Information tab page, enter the access control name,for example, "wired_web", and set other parameters based on actualconditions.

5.      Onthe User Information Check tab page, select Wired Web Portal Accessand configure whether to bind accounts with IP/MAC addresses based on actualconditions. Then, click Save.

4.2.3.5.4    Verification

Verify that access control is addedsuccessfully.

4.2.3.6    Billing Policy Configuration

4.2.3.6.1    Function requirements

Configure billing policies based onbilling requirements of access users, to pay for Internet access.

4.2.3.6.2    Configuration key points

Billing requirements of access users needto be confirmed with customers and billing policies need to be configured basedon actual conditions.

4.2.3.6.3    Configuration steps (monthly milling)

1.      Log into the SAM+ management page.

2.      Choose Billing> Billing Policy.

3.      Select MonthlyBilling Policy and click Add.

4.      Enterthe billing policy name, for example, "wired_month", set PeriodType to 30 Days or Month, and set Rate (MYR), forexample, 30 Yuan/month. Then, click Save.

4.2.3.6.4    Verification

Verify that the billing policy is addedsuccessfully.

4.2.3.7    User Template Configuration

4.2.3.7.1    Function requirements

Configure user templates based on userattributes for later account creation.

4.2.3.7.2    Configuration key points

It is recommended to classify usertemplates with the same attribute into a group and give concise and intuitivenames to the templates, for example, student monthly billing template orteacher monthly billing template.

4.2.3.7.3    Configuration steps

1.      Log into the SAM+ management page.

2.      Choose User> User Template.

3.      Click Add.

4.      Enterthe template name, for example, "wired_month", and click Save.

4.2.3.7.4    Verification

Verify that the user template is addedsuccessfully.

4.2.3.8    User Plan Configuration

4.2.3.8.1    Function requirements

Configure a user plan to cover accesslimits of authenticated users, including the area, time range, access control,and billing policy. A user plan is akin to a phone service package.

4.2.3.8.2    Configuration key points

A plan covers all control options andfees for access users. Be sure to clearly confirm plans with customers beforeconfiguration.

4.2.3.8.3    Configuration steps

1.      In theconfigured user template "wired_month", click Add Plan.

2.      Enterthe plan name, for example, "wired_month", select a configuredbilling policy or Not Charging based on actual requirements, and thenclick Save.

3.      Click ModifyPlan and modify the access area, access time range, access control, andbilling mode.

4.      Modifythe rule based on actual conditions. The figure below shows that the accessarea of authenticated users is unlimited, access control is set to"wired_web", the access time range is unlimited, and billing isperformed based on the plan"wired_month".

4.2.3.8.4    Verification

Verify that the plan meets customerrequirements.

4.2.3.9    User Group Configuration

4.2.3.9.1    Function requirements

Addauthenticated users with the same attribute to the same group, and define aresponse user template and plan for the user group to prepare for later accountcreation.

4.2.3.9.2    Configuration key points

Itis recommended to group access users by attribute, for example, group users oncampus networks into "student user group" or "teacher usergroup".

4.2.3.9.3    Configuration steps

1.      Log into the SAM+ management page.

2.      Choose User> User Group.

3.      Click Add.

4.      Enterthe user group name, for example, "wireless_month", and select thedefault user template and default plan. Then, click Save.

4.2.3.9.4    Verification

Verify that the user group is added successfully.

4.2.3.10 Account Creation

4.2.3.10.1  Function requirements

Create accounts for users in the SAM+system.

4.2.3.10.2  Configuration key points

1.      Theaccount creation process generally requires users to go to business halls andapply for accounts by using their ID cards.

2.      Accountswith the names same as those on their ID cards are registered during accountcreation.

3.      A usergroup and a user template need to be selected during account creation asplanned.

4.2.3.10.3  Configuration steps

1.      Log into the SAM+ management page.

2.      Choose User> User Management.

3.      Click CreateAccount in the left pane.

4.      Enterthe username and password, select a user group, user template, and plan. Then,click Save.

4.2.3.10.4  Verification

1.      Inthe left pane of the User Management page, click User Search. Inthe displayed right pane, click Search. The added user is displayed.

 

 

4.2.3.11 Payment

4.2.3.11.1  Function requirements

Collect fees from newly created users, sothat they can be authenticated, be charged, and access the Internet.

4.2.3.11.2  Configuration key points

The payment operation involves fees.Ensure that paid fees are consistent with the fees recorded in the system.

4.2.3.11.3  Configuration steps

1.      Log into the SAM+ management page.

2.      Choose Billing> Fees Management.

3.      Thenewly created user has insufficient balance. Click the icon in the Paymentcolumn.

4.      Collectthe fees, record the fees actually paid by the user in the system, and click Payment.

4.2.3.11.4  Verification

1.      Verifythat the fees are paid successfully.

2.      Verifythat the fees are corrected and the account is in the normal state. As shown inthe figure below, 123 Yuan is deducted from the user account"wireless1x" for the current month, and the account has 246 Yuanbalance, and is in the normal state.

4.2.4     [Optional] MABAuthentication

4.2.4.1    [Optional] MAB Authentication in Automatic Mode

4.2.4.1.1    Function requirements

Enable MAB authentication in automaticmode on SAM+.

The process of MAC binding in automaticmode is as follows (Web authentication is required for initial access):

In automatic mode, users do not need toselect Smart Login on the authentication page, which is different fromthe operation in manual mode.

4.2.4.1.2    Configuration key points

Basic settings of Web authentication needto be completed to implement MAB authentication, and details are not describedhere.

For basic settings of Web authenticationon SAM+, see "RG-N18000 — Web Authentication (Wired & Wireless)"in "Common Scenario — Authentication" in "SAM+ and ePortalConfiguration."

4.2.4.1.3    Configuration steps

1.      Choose AccessControl > Access Control > Modify > UserInformation Check, and select MAC Fast Access.

2.      ChooseAccess Control > Access Control > Modify > AccessControl Information, and select Automatic Binding MAC authenticationinformation quickly.

4.2.4.1.4    Verification

1.      Whena user uses a mobile phone to connect to an SSID with MAC authenticationenabled, Web authentication needs to be completed for initial access.

2.      OnSAM+, choose User > MAC Authentication and check whetherinformation about the MAB authenticated user has been learned.

3.      Afterthe user goes offline, enable the user to connect to the SSID with MACauthentication enabled, and check online user records on SAM+.

4.2.4.2    [Optional] MAB Authentication in Manual Mode

4.2.4.2.1    Function requirements

Enable MAB authentication in manual modeon SAM+.

The process of MAC binding in manual modeis as follows (Web authentication is required for initial access):

In manual mode, users need toselect Smart Login on the authentication page, which is different fromthe operation in automatic mode.

4.2.4.2.2    Configuration key points

Basic settings of Web authentication needto be completed to implement MAB authentication, and details are not describedhere.

For basic settings of Web authenticationon SAM+, see "RG-N18000 — Web Authentication (Wired & Wireless)"in "Common Scenario — Authentication" in "SAM+ and ePortalConfiguration."

4.2.4.2.3    Configuration steps

1.      Choose AccessControl > Access Control > Modify > UserInformation Check, and select MAC Fast Access.

2.      ChooseAccess Control > Access Control > Modify > AccessControl Information, ensure that Automatic Binding MAC authenticationinformation quickly is deselected.

4.2.4.2.4    4. Verification

1.      Whena user uses a mobile phone to connect to a SSID with MAC authenticationenabled, Web authentication needs to be completed for initial access, and EnableMAB Authentication needs to be checked.

 

2.      OnSAM+, choose User > MAC Authentication and check whetherinformation about the MAB authenticated user has been learned.

3.      Afterthe user goes offline, enable the user to connect to the SSID with MACauthentication enabled, and check online user records on SAM+.

4.2.4.3    [Optional] Binding Validity Setting of MABAuthentication

4.2.4.3.1    Function requirements

TheMAC binding validity period (0–365 days) can be configured for a plan. Afterthe validity period expires, MAC addresses are automatically unbound and theMAB authentication permission for the user is canceled.

4.2.4.3.2    Configuration key points

N/A

4.2.4.3.3    Configuration steps

4.2.4.3.4    Verification

N/A

4.2.5    [Optional] SSID-based Authentication PagePushing

4.2.5.1    Function requirements

Insome projects involving the networks of multiple ISPs, schools may requestdifferent Web authentication pages be pushed based on the SSIDs of the ISPnetworks.

TheePortal system allows displaying different authentication pages based on SSIDsor user groups.

4.2.5.2    Configuration key points

In the simplistic network solution, thecore device RG-N18000 cannot associate with APs to obtain SSIDs of users whoadopt wireless authentication and the VLAN-based SSID mapping function isrequired.

For the configuration of the VLAN-basedSSID mapping on the RG-N18000, see "Web Authentication — IP/VLAN-basedSSID Mapping" in "Common Scenario — Authentication" in"RG-N18000 Configuration."

4.2.5.3    Configuration steps

1.      InPage Management, customize authentication pages for user PCs and mobilephones based on customer requirements (one authentication page for the SSID ofeach ISP).

2.      Completethe mapping between different SSIDs and customization pages.

4.2.5.4    Verification

Verify that the different customizedauthentication pages are displayed when users connect to different SSIDs.

 



     Simplistic Network Configuration Examples(Important)

5.1     Configuration Examples of Access IsolationSolution + Wireless Isolation Solution

5.1.1    Customer Requirements

1.      Layer-2network requirements

l  Deploy the access isolation solution to implement layer-2 isolationof users on the whole network.

l  Deploy centralized forwarding on the wireless network.

l  Enable IPv6 on the whole network, so that IPv6 users can access thenetwork only after IPv4 authentication succeeds.

l  Use the core device as the wired/wireless gateway andauthentication NAS on the whole network, to provide unified management, andsupport a maximum of 20,000 online clients.

2.      Requirementsrelated to authentication types

l  In the office area, deploy wired and wireless Web authenticationand MAB authentication.

l  In the student dormitory area, deploy wired 802.1x authentication,wireless 802.1x authentication, and wireless Web authentication.

l  In the visitor area, deploy QR code authentication.

l  In the headmaster office and other school director offices, deployauthentication exemption.

l  Exempt re-authentication for users who move in the same area.

l  In the dormitory area and office area, deploy no-traffic go-offlineso that clients automatically go offline when the clients generate no trafficin 15 minutes.

3.      Requirementsrelated to authentication access control (Note: Access time control is onlyused for testing, and the actual deployment is subject to the onsitesituation.)

l  In the student dormitory area, network access is allowed only at10:30–10:32.

l  In the teaching area, network access is prohibited for studentusers at 9:00–12:00 and 14:00–16:00.

l  In the office area, student users cannot be authenticated.

4.      Addressmanagement requirements (Note: Address segment assignment is only used for casedemonstration, and the actual deployment is subject to the onsite situation.)

l  For the wired network, configure a private address with a 20-bitsubnet mask for each area, and a private address with a 24-bit subnet mask foreach building:

Officearea: 10.1.16.0/20 (building 1: 10.1.16.0/24, building 2: 10.1.17.0/24 ...building 5: 10.1.20.0/24)

Studentdormitory area: 10.1.32.0/20 (building 1: 10.1.32.0/20, building 2:10.1.33.0/20 ... building 5: 10.1.36.0/20)

l  For the wireless network:

Officearea: 10.1.16.0/20 (building 1 for 802.1x authentication: 10.1.21.0/24,building 1 for Web authentication: 10.1.22.0/24, building 2 for 802.1xauthentication: 10.1.23.0/24, and building 2 for Web authentication:10.1.24.0/24)

Studentdormitory area: 10.1.32.0/20 (building 1 for 802.1x authentication:10.1.37.0/24, building 1 for Web authentication: 10.1.38.0/24, building 2 for802.1x authentication: 10.1.39.0/24, and building 2 for Web authentication:10.1.40.0/24)

(Note:One super VLAN is set in each area for both wired and wireless networks. Youcan also set one super VLAN in each area for the wireless network according toactual situations.)

l  Special services need independent network segments:

Doorstatus control service: 10.0.10.0/24

All-in-onecard service: 10.0.11.0/24

Videomonitoring service: 10.0.12.0/24 

Wireddevice NMS: 10.0.1.0/24

APmanagement address: 10.0.2.0/24

5.      Otherrequirements

l  Only the network in the new campus is reconstructed. In the networkin the old campus, layer-3 protocols are still used to connect to theRG-N18000, and the aggregation device serves as the user gateway and DHCPrelay, and is interconnected with the RG-N18000 via OSPF.

l  Configure the escape function on the RADIUS server and ePortalserver, to avoid affecting the users' online services if either server is down.

l  Configure VLAN pruning to avoid broadcast floods.

l  Configure passive ports for routing optimization to avoidunnecessary protocol overheads of the CPU.

5.1.2    Topology

5.1.3    Configuration Precautions

1.      TheRG-N18000 does not support 802.1x authentication. Therefore, configure thewireless 802.1x NAS function on the AC.

2.      IPv6does not support direct authentication. Therefore, configure IPv6authentication to compatible mode, so that IPv6 users can access the networkafter successful IPv4 authentication.

3.      To avoidre-authentication for users who move in the same area, configure the migrationfunction for authenticated users on the RG-N18000.

4.      EnableAM rules to plan IP addresses for buildings in each area.

5.      DHCPrelay is enabled on the aggregation device of the original network. To preventDHCP packets from being dropped by the DHCP snooping module on the RG-N18000,run the ip dhcp snooping check-giaddr command on the RG-N18000.

6.      Configurethe escape function on the RG-N18000 for the RADIUS server and portal server.

7.      ConfigureVLAN pruning for the downlink trunk port of the RG-N18000.

5.1.4    VLAN/IP Planning on the Live Network

Thefollowing tables list VLAN/IP plans for the wired and wireless networks in thestudent dormitory area (plans for other areas are the same).

Wirednetwork VLAN/IP planning for the student dormitory area:

Device Model

Device type

Position

Management Address

Sub VLAN

Super VLAN

IP Address Segment

Gateway

Network Management VLAN

Door Status Control VLAN

All-in-One Card VLAN

Video Monitoring VLAN

S2928G

Floor access switch

1F, building 1, student dormitory area

10.0.1.10

200

2001

10.1.32.0

10.1.32.254

3000

3010

3011

3012

S2928G

Floor access switch

2F, building 1, student dormitory area

10.0.1.11

201

2001

10.1.33.0

10.1.32.254

3000

3010

3011

3012

S2928G

Floor access switch

1F, building 2, student dormitory area

10.0.1.12

202

2001

10.1.34.0

10.1.32.254

3000

3010

3011

3012

S2928G

Floor access switch

2F, building 2, student dormitory area

10.0.1.13

203

2001

10.1.35.0

10.1.32.254

3000

3010

3011

3012

S2928G

Floor access switch

1F, building 3, student dormitory area

10.0.1.14

204

2001

10.1.36.0

10.1.32.254

3000

3010

3011

3012

Wirelessnetwork VLAN/IP planning for the student dormitory area:

Location

AP Management VLAN

AP Management Network Segment

Gateway

Sub VLAN of Web Authentication

IP Address Segment of Web Authentication

Sub VLAN of 802.1x Authentication

IP Address Segment of 802.1x Authentication

Super VLAN

Gateway

SSID of Web Authentication

SSID of 802.1x Authentication

Building 1, student dormitory area

3001

10.0.2.0/24

10.0.2.254

301

10.1.37.0/24

351

10.1.38.0/24

2001

10.1.32.254

su-web

su-1x

Building 2, student dormitory area

3001

10.0.2.0/24

10.0.2.254

302

10.1.39.0/24

352

10.1.40.0/24

2001

10.1.32.254

su-web

su-1x

Building 3, student dormitory area

3001

10.0.2.0/24

10.0.2.254

303

10.1.41.0/24

353

10.1.42.0/24

2001

10.1.32.254

su-web

su-1x

Building 4, student dormitory area

3001

10.0.2.0/24

10.0.2.254

304

10.1.43.0/24

355

10.1.44.0/24

2001

10.1.32.254

su-web

su-1x

Building 5, student dormitory area

3001

10.0.2.0/24

10.0.2.254

305

10.1.45.0/24

356

10.1.46.0/24

2001

10.1.32.254

su-web

su-1x

OverallVLAN/IP planning

Area

Service

Common VLAN

Super VLAN

Sub VLAN

IP

Gateway

Egress

Device interconnection

N/A

 

 

10.0.0.0/24

10.0.0.1

Server area

VM

N/A

 

 

172.29.2.0/24

172.29.2.253

Wired NMS

Device NMS

3000

 

 

10.0.1.0/24

10.0.1.254

Wireless AP

AP management

3001

 

 

10.0.2.0/24

10.0.2.254

Authentication-free area

Door Status Control VLAN

3010

 

 

10.0.10.0/24

10.0.10.254

All-in-one card

3011

 

 

10.0.11.0

10.0.11.254

Monitoring

3012

 

 

10.0.12.0/24

10.0.12.254

Office area

Wired 802.1x authentication and Web authentication

 

2000

1–99

10.1.16.0/24

10.1.16.254/20

Wireless 802.1x authentication

 

100–149

10.1.18.0/24

Wireless Web authentication

 

150–199

10.1.19.0/24

Dormitory area

Wired 802.1x authentication and Web authentication

 

2001

200–299

10.1.32.0/24

10.1.32.254/20

Wireless 802.1x authentication

 

300–349

10.1.34.0/24

Wireless Web authentication

 

350–399

10.1.35.0/24

5.1.5    Configuration Reference Commands on the CoreRG-N18000

1.Configuring network communication in the egress area

Configurean uplink port on the RG-N18000, perform layer-3 configuration for the uplinkport, configure routes, and check whether the external network communication isnormal on the RG-N18000. The configuration commands are omitted.

2.Completing basic settings on the RG-N18000

DSW-18KX_LX(config)#auth-modegateway//Configure the gateway mode and restart the device.

DSW-18KX_LX(config)#snmp-server host172.29.2.9 informs version 2c ruijie  //Configure SNMP interactionbetween the RG-N18000 and SAM+.

DSW-18KX_LX(config)#snmp-serverif-index persist//Set the port index to be permanently unique.

DSW-18KX_LX(config)#servicedhcp//Enable the DHCP service on the core device.

DSW-18KX_LX(config)#ip dhcp snooping//Mandatory.This command is required for IP authorization for 802.1X authentication and MABauthentication.

DSW-18KX_LX(config)#ip dhcp snoopingcheck-giaddr//Configure a compatible command for DHCP snooping and relay, toprevent DHCP packets from being dropped by the DHCP snooping module on theRG-N18000.

DSW-18KX_LX(config)#aaa group serverradius SAM

DSW-18KX_LX(config-gs-radius)# server172.29.2.9

DSW-18KX_LX(config)#aaa new-model

DSW-18KX_LX(config)#aaa accountingupdate periodic 30

DSW-18KX_LX(config)#aaa accountingupdate

DSW-18KX_LX(config)#aaa accountingnetwork default start-stop group SAM

DSW-18KX_LX(config)#aaaauthentication login default none

DSW-18KX_LX(config)#aaaauthentication dot1x default group SAM

DSW-18KX_LX(config)#aaa authenticationweb-auth default group SAM

DSW-18KX_LX(config)#aaa authorizationip-auth-mode mixed        //ConfigureIP authorization to the mixed mode.

DSW-18KX_LX(config)#dot1x accountingdefault//Enable the 802.1x accounting list.

DSW-18KX_LX(config)#dot1x authenticationdefault        //Enable the 802.1xauthentication list.

DSW-18KX_LX(config)#ip radiussource-interface GigabitEthernet 1/24  //Configure the sourceinterface for the device to communicate with the RADIUS server. The deviceaddress added to SAM+ should be the address of this interface.

DSW-18KX_LX(config)#ip portalsource-interface GigabitEthernet 1/24  //Configure the sourceinterface for the device to communicate with the ePortal server. The deviceaddress added to the ePortal server should be the address of this interface.

DSW-18KX_LX(config)#ip dhcp snoopingarp-detect     //Enable fast ARP address reclaiming ofDHCP snooping. The ARP address reclaiming is performed once per second duringARP aging and can be performed five times at most.

DSW-18KX_LX(config)#ip dhcp serverarp-detect//Enable fast address reclaiming of the DHCP server. If identifyingthat a user goes offline and does not go online again within a period of time(5 minutes by default), the DHCP server reclaims the IP address assigned to theuser.

DSW-18KX_LX(config)#no aaa log enable

DSW-18KX_LX(config)#web-auth templateeportalv2  

DSW-18KX_LX(config.tmplt.eportalv2)#ip172.29.2.8

DSW-18KX_LX(config.tmplt.eportalv2)#url http://172.29.2.8/eportal/index.jsp

DSW-18KX_LX(config.tmplt.eportalv2)#exit

DSW-18KX_LX(config)#web-auth portalkey su

DSW-18KX_LX(config)#http redirectdirect-site 192.168.9.12     //Configure the addressof the RG-SU server as an authentication-free address.

DSW-18KX_LX(config)#web-authdirect-host10.1.16.200        //Configure theclient of a school director as an authentication-free client.

DSW-18KX_LX(config)#dot1xmac-auth-bypass valid-ip-auth //Mandatory. The DHCP module instructs theMAB module to start authentication. Clients must obtain IP addresses beforestarting MAB authentication.

DSW-18KX_LX(config)#dot1xvalid-ip-acct enable   //Mandatory. The accounting updatepackets are used to upload the user IP address to SAM+. If the 802.1xauthentication module does not have an IP entry of the user, the user is kickedoffline 5 minutes later.

DSW-18KX_LX(config)#direct-vlan100-149,300-349,3000-3001,3010-3012      //ConfigureVLANs for wireless 802.1x authentication, monitoring, device management, andwireless AP management as authentication-free VLANs.

DSW-18KX_LX(config)#web-authportal-check interval 3 timeout 3 retransmit10    //Configure portal escape.

DSW-18KX_LX(config)#web-authportal-escape nokick

DSW-18KX_LX(config)#radius-serverhost 172.29.2.9 test username ruijie idle-time 2 key ruijie 

DSW-18KX_LX(config)#radius-serverdead-criteria time 120 tries 12     //Configure an IPaddress for the RADIUS server and enable the RADIUS escape test function.

DSW-18KX_LX(config)#web-authradius-escape    //Globally enable RADIUS escape in Webauthentication mode.

DSW-18KX_LX(config)#address-bindipv6-mode compatible//Set IPv6 authentication to the compatible mode.

DSW-18KX_LX(config)#station-movepermit    //Enable migration of 802.1x authenticatedclients.

DSW-18KX_LX(config)#web-authstation-move auto    //Enable migration of Webauthenticated clients.

DSW-18KX_LX(config)#web-authstation-move info-update

DSW-18KX_LX(config)#no dot1xstation-move arp-detect   //It is recommended to disable ARPdetection after migration of 802.1x authenticated clients, because the ARPdetection will cause broadcast packet floods.

DSW-18KX_LX(config)#http redirectport 443     //Because this configuration consumesdevice resources, it is recommended to discuss with the customer about whetherto enable the configuration if a great number of users need authentication.

DSW-18KX_LX(config)#cpu-protect typeweb-auths bandwidth 2000 //Configure the HTTPS optimization command. HTTPSinvolves socket encryption and decryption, consuming a great deal of processingresources. 11.0(1)B2T11 and later versions separate HTTPS from HTTP for the useof CPU resources. If HTTPS redirection is enabled, configure CPP rate limitingfor HTTPS.

DSW-18KX_LX(config)#offline-detectinterval 15 threshold 0      //Set the no-trafficgo-offline detection period to 15 minutes.

DSW-18KX_LX(config)#snmp-server host172.29.2.9 informs version 2c ruijie  //Configure SNMP.

DSW-18KX_LX(config)#snmp-server host172.29.2.9 traps su

DSW-18KX_LX(config)#snmp-servercommunity su rw

3.Configuring VLANs on the RG-N18000

DSW-18KX_LX(config)#vlan range 1-399

DSW-18KX_LX(config-vlan-range)#exit

DSW-18KX_LX(config)#vlan 2000

DSW-18KX_LX(config-vlan-range)#supervlan//Configurea super VLAN in the office area.

DSW-18KX_LX(config-vlan-range)#subvlan1-199     //Associate sub VLANs with the super VLAN.

DSW-18KX_LX(config-vlan-range)#exit

DSW-18KX_LX(config)#vlan 2001

DSW-18KX_LX(config-vlan-range)#supervlan//Configurea super VLAN in the dormitory area.

DSW-18KX_LX(config-vlan-range)#subvlan200-399     //Associate sub VLANs with the super VLAN.

DSW-18KX_LX(config-vlan-range)#exit

DSW-18KX_LX(config)#vlan 3000

DSW-18KX_LX(config-vlan)# nameDeManagement

DSW-18KX_LX(config)#vlan 3001

DSW-18KX_LX(config-vlan)#nameAPManagement

DSW-18KX_LX(config)#vlan 3010

DSW-18KX_LX(config-vlan)# name MenJin

DSW-18KX_LX(config)#vlan 3011

DSW-18KX_LX(config-vlan)#nameYiKaTong

DSW-18KX_LX(config)#vlan 3012

DSW-18KX_LX(config-vlan)#nameJianKong

4.Configuring the IPv4/IPv6 gateway and DHCPv4/DHCPv6

DSW-18KX_LX(config)#ipv6 dhcp poolDHCPv6        //Create a DHCPv6 addresspool for the DNS server.

DSW-18KX_LX(dhcp-config)# domain-namescu6.edu.cn

DSW-18KX_LX(dhcp-config)# dns-server2001:250:2003::8

DSW-18KX_LX(dhcp-config)# dns-server2001:250:2003::9

DSW-18KX_LX(config)#ip dhcp poolsushe-pool//Configure a DHCP address pool in the dormitory area.

DSW-18KX_LX(dhcp-config)#lease 0 20//Mandatory. Set the lease period to 2 hours.

DSW-18KX_LX(dhcp-config)#network10.1.32.0 255.255.240.0

DSW-18KX_LX(dhcp-config)#dns-server202.115.32.39 202.115.32.36

DSW-18KX_LX(dhcp-config)#default-router10.1.32.254

DSW-18KX_LX(config)#ip dhcp pool bangong-pool//Configurea DHCP address pool in the office area.

DSW-18KX_LX(dhcp-config)#lease 0 20//Mandatory. Set the lease period to 2 hours.

DSW-18KX_LX(dhcp-config)#network10.1.16.0 255.255.240.0

DSW-18KX_LX(dhcp-config)#dns-server10.1.16.0 255.255.240.0

DSW-18KX_LX(dhcp-config)#default-router10.1.16.254

DSW-18KX_LX(config)#ip dhcp poolap-pool//Configure a DHCP address pool for wireless AP management.

DSW-18KX_LX(dhcp-config)#option 138ip 10.10.1.1

DSW-18KX_LX(dhcp-config)#network10.0.2.0 255.255.255.0

DSW-18KX_LX(dhcp-config)#default-router10.0.2.254

DSW-18KX_LX(config)#int vlan2000//Configure the gateway address for the super VLAN in the office area.

DSW-18KX_LX(config-if-VLAN 2000)#ipaddress 10.1.16.254/20

DSW-18KX_LX(config-if-VLAN 2000)#ipv6enable

DSW-18KX_LX(config-if-VLAN 2000)#ipv6address 2001:250:2003:2000::1/64

DSW-18KX_LX(config-if-VLAN 2000)#noipv6 nd suppress-ra

DSW-18KX_LX(config-if-VLAN 2000)#ipv6nd other-config-flag

DSW-18KX_LX(config-if-VLAN 2000)#ipv6dhcp server DHCPv6

DSW-18KX_LX(config)#int vlan2001//Configure the gateway address for the super VLAN in the dormitory area.

DSW-18KX_LX(config-if-VLAN 2001)#ipaddress 172.16.32.254/20

DSW-18KX_LX(config-if-VLAN 2001)#ipv6enable

DSW-18KX_LX(config-if-VLAN 2001)#ipv6address 2001:250:2003:2001::1/64

DSW-18KX_LX(config-if-VLAN 2001)#noipv6 nd suppress-ra

DSW-18KX_LX(config-if-VLAN 2001)#ipv6nd other-config-flag

DSW-18KX_LX(config-if-VLAN 2001)#ipv6dhcp server DHCPv6

DSW-18KX_LX(config)#interfaceGigabitEthernet 1/1//Configure the port of the core RG-N18000 for connecting tothe egress device.

DSW-18KX_LX(config-if-GigabitEthernet1/1)# no switchport

DSW-18KX_LX(config-if-GigabitEthernet1/1)#ip address 10.0.0.2 255.255.255.0

DSW-18KX_LX(config)#int vlan3000//Configure the gateway address for device management.

DSW-18KX_LX(config-if-VLAN 3000)#ipaddress 10.0.1.254/24

DSW-18KX_LX(config)#int vlan3001//Configure the gateway address for the wireless AP device.

DSW-18KX_LX(config-if-VLAN 3001)#ipaddress 10.0.2.254/24

DSW-18KX_LX(config)#int vlan3010//Configure the gateway address for door status control.

DSW-18KX_LX(config-if-VLAN 3010)#ipaddress 11.0.10.254/24

DSW-18KX_LX(config)#int vlan3011//Configure the gateway address for the all-in-one card service.

DSW-18KX_LX(config-if-VLAN 3011)#ipaddress 10.0.11.254/24

DSW-18KX_LX(config)#int vlan3012//Configure the gateway address for the monitoring service.

DSW-18KX_LX(config-if-VLAN 3012)#ipaddress 10.0.12.254/24

DSW-18KX_LX(config)#address-manage      //EnableAM rules to perform refined matching of address segments.

DSW-18KX_LX(config-address-manage)#matchip 10.1.16.0 255.255.255.0 Gi1/2 vlan 2

DSW-18KX_LX(config-address-manage)#matchip 10.1.17.0 255.255.255.0 Gi1/2 vlan 3

DSW-18KX_LX(config-address-manage)#matchip 10.1.32.0 255.255.255.0 Gi1/3 vlan 200

DSW-18KX_LX(config-address-manage)#matchip 10.1.33.0 255.255.255.0 Gi1/3 vlan 201

DSW-18KX_LX(config-address-manage)#matchip 10.0.2.0 255.255.255.0 vlan 3001

DSW-18KX_LX(config-address-manage)#matchip 10.1.18.0 255.255.255.0 Gi1/4 vlan 100

DSW-18KX_LX(config-address-manage)#matchip 10.1.19.0 255.255.255.0 Gi1/4 vlan 150

DSW-18KX_LX(config-address-manage)#matchip 10.1.34.0 255.255.255.0 Gi1/4 vlan 300

DSW-18KX_LX(config-address-manage)#matchip 10.1.35.0 255.255.255.0 Gi1/4 vlan 350

DSW-18KX_LX(config-address-manage)#matchip loose      //It is recommended to configurethe loose mode.

... AM rules can be created one byone based on the preceding VLAN/IP planning tables. Note: Once AM rules areenabled, port/VLAN mapping needs to be performed for the network segments to beassigned on the whole network, including the network in the old campus that isnot reconstructed (the corresponding port is the port of the RG-N18000 forconnecting to the aggregation device of the old campus network; thecorresponding VLAN is the VLAN of the SVI on the RG-N18000 for connecting tothe aggregation device of the old campus network).

5.Enabling authentication on the port of the RG-N18000

DSW-18KX_LX(config)#intGigabitEthernet 1/2//Configure the interface for connecting to the aggregationdevice in the office area.

DSW-18KX_LX(config-if-GigabitEthernet1/2)#switchport mode trunk

DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x port-control auto       //Enable802.1x authentication control on an interface.

DSW-18KX_LX(config-if-GigabitEthernet1/2)#web-auth enable eportalv2//Enable Web authentication on an interface.

DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x mac-auth-bypass multi-user //Enable multi-user MAB authentication onan interface.

DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x mac-auth-bypass vlan 1-99  //Enable MAB authentication forVLANs 1–99.

DSW-18KX_LX(config-if-GigabitEthernet1/2)#switchport trunk allowed vlan only 1-199,3000-3001,3010-3012

DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x critical//Configure RADIUS escape in 802.1x authentication mode onan interface.

DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x critical recovery actionreinitialize      //Enable an escaped user toperform re-authentication after RADIUS escape is recovered.

DSW-18KX_LX(config-if-GigabitEthernet1/2)#switchport protected     //Configure portprotection on an interface.

DSW-18KX_LX(config)#intGigabitEthernet 1/3//Configure the interface for connecting to the aggregationdevice in the dormitory area.

DSW-18KX_LX(config-if-GigabitEthernet1/3)#switchport mode trunk

DSW-18KX_LX(config-if-GigabitEthernet1/3)#dot1x port-control auto       //Enable802.1x authentication control on an interface.

DSW-18KX_LX(config-if-GigabitEthernet1/3)#web-auth enable eportalv2//Enable Web authentication on an interface.

DSW-18KX_LX(config-if-GigabitEthernet1/3)#switchport trunk allowed vlan only 200-399,3000-3001,3010-3012

DSW-18KX_LX(config-if-GigabitEthernet1/3)#dot1x critical//Configure RADIUS escape in 802.1x authentication mode onan interface.

DSW-18KX_LX(config-if-GigabitEthernet1/3)#dot1x critical recovery actionreinitialize      //Enable an escaped user toperform re-authentication after RADIUS escape is recovered.

DSW-18KX_LX(config-if-GigabitEthernet1/3)#switchport protected     //Configure portprotection on an interface.

DSW-18KX_LX(config)#intGigabitEthernet 1/4//Configure the interface for connecting to the wirelesscontroller.

DSW-18KX_LX(config-if-GigabitEthernet1/4)#switchport mode trunk

DSW-18KX_LX(config-if-GigabitEthernet1/4)#dot1x port-control auto       //Enable802.1x authentication control on an interface.

DSW-18KX_LX(config-if-GigabitEthernet1/4)#dot1x mac-auth-bypass multi-user //Enable multi-user MAB authentication onan interface.

DSW-18KX_LX(config-if-GigabitEthernet1/4)#dot1x mac-auth-bypass vlan 150-199//Enable MAB authentication for VLANs150–199 (wireless Web authentication in the office area).

DSW-18KX_LX(config-if-GigabitEthernet1/4)#web-auth enable eportalv2//Enable Web authentication on an interface.

DSW-18KX_LX(config-if-GigabitEthernet1/4)#switchport trunk allowed vlan only 100-199,300-399,3000

DSW-18KX_LX(config)#intGigabitEthernet 1/44//Configure the port for connecting to the server area.

DSW-18KX_LX(config-if-GigabitEthernet1/44)#no switchport

DSW-18KX_LX(config-if-GigabitEthernet1/44)#description linkto-SAM&eportalSERVER

DSW-18KX_LX(config-if-GigabitEthernet1/44)#ip address 172.29.2.253 255.255.255.0

6.Optimizing VLAN pruning on the downlink port of the RG-N18000

7.Performing routing related configurations

DSW-18KX_LX(config)#router ospf 1

DSW-18KX_LX(config-router)#redistributeconnected

DSW-18KX_LX(config-router)#passive-interfac  vlan2000   //Mandatory. Configure a passive port to to reduce CPUoverheads.

DSW-18KX_LX(config-router)#passive-interfac  vlan2001   //Mandatory. Configure a passive port to to reduce CPUoverheads.

DSW-18KX_LX(config-router)#passive-interfac  vlan3000   //Mandatory. Configure a passive port to to reduce CPUoverheads.

DSW-18KX_LX(config-router)#passive-interfac  vlan3001   //Mandatory. Configure a passive port to to reduce CPUoverheads.

DSW-18KX_LX(config-router)#passive-interfac  vlan3010   //Mandatory. Configure a passive port to to reduce CPUoverheads.

DSW-18KX_LX(config-router)#passive-interfac  vlan3011   //Mandatory. Configure a passive port to to reduce CPUoverheads.

DSW-18KX_LX(config-router)#passive-interfac  vlan3012   //Mandatory. Configure a passive port to to reduce CPUoverheads.

5.1.6    Aggregation Configuration Reference Commandsfor the Dormitory Area

S5750-student(config)#vlan range 200-399,3000-3001,3010-3012      //Configurethe VLAN range for the access device in the student dormitory area, as well asthe monitoring and management VLANs.

S5750-student(config)#intGigabitEthernet 0/24 //Configure the uplink port of the aggregation deviceas a trunk port for transparent transmission.

S5750-student(config-if-GigabitEthernet0/24)#switchport mode trunk

S5750-student(config-if-GigabitEthernet0/24)#switchport trunk allowed vlan remove 1-199,400-2999,3002-3009,3013-4094

S5750-student(config)#intGigabitEthernet 0/23//Configure the downlink port of the aggregation device asa trunk port for transparent transmission.

S5750-student(config-if-GigabitEthernet0/23)#switchport mode trunk

S5750-student(config-if-GigabitEthernet0/23)#switchport trunk allowed vlan remove 1-199,400-2999,3002-3009,3013-4094

5.1.7    Access Configuration Reference Commands for theDormitory Area

S2928G-student1-1(config)#vlan range200-399,3000-3001,3010-3012     //Configure the VLANrange for the access device in the student dormitory area, as well as themonitoring and management VLANs.

S2928G-student1-1(config)#spanning-tree//EnableSTP.

S2928G-student1-1(config)#spanning-treemode rstp     //Enable RSTP to avoid overlow portconvergence speed.

S2928G-student1-1(config)#spanning-treeportfast bpduguard default    //Enable BPDU guard for allPortFast ports by default.

S2928G-student1-1(config)#errdisablerecovery interval 300//Configure the recovery interval after a port is disabledby RLDP.

S2928G-student1-1(config)#int rangegi0/1-22

S2928G-student1-1(config-if-range)#switchportaccess vlan 200    //Create an access port and assign it tothe corresponding VLAN.

S2928G-student1-1(config-if-range)#switchportprotected//Mandatory. Configure port protection.

S2928G-student1-1(config-if-range)#spanning-treeportfast     //Enable PortFast on all downlinkinterfaces, which validates BPDU guard at the same time. Once a BPDU packet isreceived, the access switch regards that a loop occurs and shuts down the interfaces.

S2928G-student1-1(config-if-range)#rldpport loop-detect shutdown-port    //Mandatory. ConfigureRLDP to prevent loops.

S2928G-student1-1(config)#intgi0/23//Configure the port for connecting to the AP.

S2928G-student1-1(config-if-GigabitEthernet0/23)# switchport access vlan 3001

S2928G-student1-1(config-if-GigabitEthernet0/23)#rldp port loop-detect shutdown-port

S2928G-student1-1(config)#intgi0/24//Configure the uplink port of the access device as a trunk port fortransparent transmission.

S2928G-student1-1(config-if-GigabitEthernet0/24)#switchport mode trunk

S2928G-student1-1(config-if-GigabitEthernet0/24)#spanning-tree bpdufilter enable//Enable a BPDU filter for the uplinkport, so that loop protection is provided only on single devices, and BDPUpackets are not transmitted externally, no topology is created, and no rootbridge is elected.

S2928G-student1-1(config-if-GigabitEthernet0/24)# switchport trunk allowed vlan only 200-399,3000-3001,3010-3012

5.1.8    SAM + and ePortal Related Configurations

1.Adding an RG-N18000 on SAM+

2.Adding an AC on SAM+

3.Adding ePortal on SAM+

4.Adding SAM+ on ePortal

5.Adding an RG-N18000 on ePortal

6.Configuring access control

(1)It is not necessary to enable MAB authentication for access control in thedormitory area.

(2)It is necessary to enable MAB authentication for access control in the officearea.

(3)The office area allows MAC fast access. To allow login using the native 802.1xauthenticated client, select Smart Device 1X Access.

  

7.Configuring accounting policies

(1)Monthly accounting policy in the dormitory area

(2)Monthly accounting policy in the office area

8.Configuring user templates

(1)User template in the dormitory area

(2)User template in the office area

9.Configuring user plans

(1)User plan in the dormitory area

(2)User plan in the office area

10.Configuring user groups

11.Registering users

12.Payment

 

13.Controlling the access period

14.Associating the access period with the user template

15.Verifying login failure of student users beyond the access period (10:34)

 

 



     Simplistic Network Configuration Examples(Important)

6.1     Configuration Examples of Access IsolationSolution + Wireless Isolation Solution

6.1.1    Customer Requirements

1.      Layer-2network requirements

l  Deploy the access isolation solution to implement layer-2 isolationof users on the whole network.

l  Deploy centralized forwarding on the wireless network.

l  Enable IPv6 on the whole network, so that IPv6 users can access thenetwork only after IPv4 authentication succeeds.

l  Use the core device as the wired/wireless gateway andauthentication NAS on the whole network, to provide unified management, andsupport a maximum of 20,000 online clients.

2.      Requirementsrelated to authentication types

l  In the office area, deploy wired and wireless Web authenticationand MAB authentication.

l  In the student dormitory area, deploy wired 802.1x authentication,wireless 802.1x authentication, and wireless Web authentication.

l  In the visitor area, deploy QR code authentication.

l  In the headmaster office and other school director offices, deployauthentication exemption.

l  Exempt re-authentication for users who move in the same area.

l  In the dormitory area and office area, deploy no-traffic go-offlineso that clients automatically go offline when the clients generate no trafficin 15 minutes.

3.      Requirementsrelated to authentication access control (Note: Access time control is onlyused for testing, and the actual deployment is subject to the onsitesituation.)

l  In the student dormitory area, network access is allowed only at10:30–10:32.

l  In the teaching area, network access is prohibited for studentusers at 9:00–12:00 and 14:00–16:00.

l  In the office area, student users cannot be authenticated.

4.      Addressmanagement requirements (Note: Address segment assignment is only used for casedemonstration, and the actual deployment is subject to the onsite situation.)

l  For the wired network, configure a private address with a 20-bitsubnet mask for each area, and a private address with a 24-bit subnet mask foreach building:

Officearea: 10.1.16.0/20 (building 1: 10.1.16.0/24, building 2: 10.1.17.0/24 ...building 5: 10.1.20.0/24)

Studentdormitory area: 10.1.32.0/20 (building 1: 10.1.32.0/20, building 2:10.1.33.0/20 ... building 5: 10.1.36.0/20)

l  For the wireless network:

Officearea: 10.1.16.0/20 (building 1 for 802.1x authentication: 10.1.21.0/24,building 1 for Web authentication: 10.1.22.0/24, building 2 for 802.1xauthentication: 10.1.23.0/24, and building 2 for Web authentication:10.1.24.0/24)

Studentdormitory area: 10.1.32.0/20 (building 1 for 802.1x authentication:10.1.37.0/24, building 1 for Web authentication: 10.1.38.0/24, building 2 for802.1x authentication: 10.1.39.0/24, and building 2 for Web authentication:10.1.40.0/24)

(Note:One super VLAN is set in each area for both wired and wireless networks. Youcan also set one super VLAN in each area for the wireless network according toactual situations.)

l  Special services need independent network segments:

Doorstatus control service: 10.0.10.0/24

All-in-onecard service: 10.0.11.0/24

Videomonitoring service: 10.0.12.0/24 

Wireddevice NMS: 10.0.1.0/24

APmanagement address: 10.0.2.0/24

5.      Otherrequirements

l  Only the network in the new campus is reconstructed. In the networkin the old campus, layer-3 protocols are still used to connect to theRG-N18000, and the aggregation device serves as the user gateway and DHCPrelay, and is interconnected with the RG-N18000 via OSPF.

l  Configure the escape function on the RADIUS server and ePortalserver, to avoid affecting the users' online services if either server is down.

l  Configure VLAN pruning to avoid broadcast floods.

l  Configure passive ports for routing optimization to avoidunnecessary protocol overheads of the CPU.

6.1.2    Topology

6.1.3    Configuration Precautions

1.      TheRG-N18000 does not support 802.1x authentication. Therefore, configure thewireless 802.1x NAS function on the AC.

2.      IPv6does not support direct authentication. Therefore, configure IPv6authentication to compatible mode, so that IPv6 users can access the networkafter successful IPv4 authentication.

3.      To avoidre-authentication for users who move in the same area, configure the migrationfunction for authenticated users on the RG-N18000.

4.      EnableAM rules to plan IP addresses for buildings in each area.

5.      DHCPrelay is enabled on the aggregation device of the original network. To preventDHCP packets from being dropped by the DHCP snooping module on the RG-N18000,run the ip dhcp snooping check-giaddr command on the RG-N18000.

6.      Configurethe escape function on the RG-N18000 for the RADIUS server and portal server.

7.      ConfigureVLAN pruning for the downlink trunk port of the RG-N18000.

6.1.4    VLAN/IP Planning on the Live Network

Thefollowing tables list VLAN/IP plans for the wired and wireless networks in thestudent dormitory area (plans for other areas are the same).

Wirednetwork VLAN/IP planning for the student dormitory area:

Device Model

Device type

Position

Management Address

Sub VLAN

Super VLAN

IP Address Segment

Gateway

Network Management VLAN

Door Status Control VLAN

All-in-One Card VLAN

Video Monitoring VLAN

S2928G

Floor access switch

1F, building 1, student dormitory area

10.0.1.10

200

2001

10.1.32.0

10.1.32.254

3000

3010

3011

3012

S2928G

Floor access switch

2F, building 1, student dormitory area

10.0.1.11

201

2001

10.1.33.0

10.1.32.254

3000

3010

3011

3012

S2928G

Floor access switch

1F, building 2, student dormitory area

10.0.1.12

202

2001

10.1.34.0

10.1.32.254

3000

3010

3011

3012

S2928G

Floor access switch

2F, building 2, student dormitory area

10.0.1.13

203

2001

10.1.35.0

10.1.32.254

3000

3010

3011

3012

S2928G

Floor access switch

1F, building 3, student dormitory area

10.0.1.14

204

2001

10.1.36.0

10.1.32.254

3000

3010

3011

3012

Wirelessnetwork VLAN/IP planning for the student dormitory area:

Location

AP Management VLAN

AP Management Network Segment

Gateway

Sub VLAN of Web Authentication

IP Address Segment of Web Authentication

Sub VLAN of 802.1x Authentication

IP Address Segment of 802.1x Authentication

Super VLAN

Gateway

SSID of Web Authentication

SSID of 802.1x Authentication

Building 1, student dormitory area

3001

10.0.2.0/24

10.0.2.254

301

10.1.37.0/24

351

10.1.38.0/24

2001

10.1.32.254

su-web

su-1x

Building 2, student dormitory area

3001

10.0.2.0/24

10.0.2.254

302

10.1.39.0/24

352

10.1.40.0/24

2001

10.1.32.254

su-web

su-1x

Building 3, student dormitory area

3001

10.0.2.0/24

10.0.2.254

303

10.1.41.0/24

353

10.1.42.0/24

2001

10.1.32.254

su-web

su-1x

Building 4, student dormitory area

3001

10.0.2.0/24

10.0.2.254

304

10.1.43.0/24

355

10.1.44.0/24

2001

10.1.32.254

su-web

su-1x

Building 5, student dormitory area

3001

10.0.2.0/24

10.0.2.254

305

10.1.45.0/24

356

10.1.46.0/24

2001

10.1.32.254

su-web

su-1x

OverallVLAN/IP planning

Area

Service

Common VLAN

Super VLAN

Sub VLAN

IP

Gateway

Egress

Device interconnection

N/A

 

 

10.0.0.0/24

10.0.0.1

Server area

VM

N/A

 

 

172.29.2.0/24

172.29.2.253

Wired NMS

Device NMS

3000

 

 

10.0.1.0/24

10.0.1.254

Wireless AP

AP management

3001

 

 

10.0.2.0/24

10.0.2.254

Authentication-free area

Door Status Control VLAN

3010

 

 

10.0.10.0/24

10.0.10.254

All-in-one card

3011

 

 

10.0.11.0

10.0.11.254

Monitoring

3012

 

 

10.0.12.0/24

10.0.12.254

Office area

Wired 802.1x authentication and Web authentication

 

2000

1–99

10.1.16.0/24

10.1.16.254/20

Wireless 802.1x authentication

 

100–149

10.1.18.0/24

Wireless Web authentication

 

150–199

10.1.19.0/24

Dormitory area

Wired 802.1x authentication and Web authentication

 

2001

200–299

10.1.32.0/24

10.1.32.254/20

Wireless 802.1x authentication

 

300–349

10.1.34.0/24

Wireless Web authentication

 

350–399

10.1.35.0/24

6.1.5    Configuration Reference Commands on the CoreRG-N18000

1.Configuring network communication in the egress area

Configurean uplink port on the RG-N18000, perform layer-3 configuration for the uplinkport, configure routes, and check whether the external network communication isnormal on the RG-N18000. The configuration commands are omitted.

2.Completing basic settings on the RG-N18000

DSW-18KX_LX(config)#auth-modegateway//Configure the gateway mode and restart the device.

DSW-18KX_LX(config)#snmp-server host172.29.2.9 informs version 2c ruijie  //Configure SNMP interactionbetween the RG-N18000 and SAM+.

DSW-18KX_LX(config)#snmp-serverif-index persist//Set the port index to be permanently unique.

DSW-18KX_LX(config)#servicedhcp//Enable the DHCP service on the core device.

DSW-18KX_LX(config)#ip dhcp snooping//Mandatory.This command is required for IP authorization for 802.1X authentication and MABauthentication.

DSW-18KX_LX(config)#ip dhcp snoopingcheck-giaddr//Configure a compatible command for DHCP snooping and relay, toprevent DHCP packets from being dropped by the DHCP snooping module on theRG-N18000.

DSW-18KX_LX(config)#aaa group serverradius SAM

DSW-18KX_LX(config-gs-radius)# server172.29.2.9

DSW-18KX_LX(config)#aaa new-model

DSW-18KX_LX(config)#aaa accountingupdate periodic 30

DSW-18KX_LX(config)#aaa accountingupdate

DSW-18KX_LX(config)#aaa accountingnetwork default start-stop group SAM

DSW-18KX_LX(config)#aaaauthentication login default none

DSW-18KX_LX(config)#aaaauthentication dot1x default group SAM

DSW-18KX_LX(config)#aaa authenticationweb-auth default group SAM

DSW-18KX_LX(config)#aaa authorizationip-auth-mode mixed        //ConfigureIP authorization to the mixed mode.

DSW-18KX_LX(config)#dot1x accountingdefault//Enable the 802.1x accounting list.

DSW-18KX_LX(config)#dot1x authenticationdefault        //Enable the 802.1xauthentication list.

DSW-18KX_LX(config)#ip radiussource-interface GigabitEthernet 1/24  //Configure the sourceinterface for the device to communicate with the RADIUS server. The deviceaddress added to SAM+ should be the address of this interface.

DSW-18KX_LX(config)#ip portalsource-interface GigabitEthernet 1/24  //Configure the sourceinterface for the device to communicate with the ePortal server. The deviceaddress added to the ePortal server should be the address of this interface.

DSW-18KX_LX(config)#ip dhcp snoopingarp-detect     //Enable fast ARP address reclaiming ofDHCP snooping. The ARP address reclaiming is performed once per second duringARP aging and can be performed five times at most.

DSW-18KX_LX(config)#ip dhcp serverarp-detect//Enable fast address reclaiming of the DHCP server. If identifyingthat a user goes offline and does not go online again within a period of time(5 minutes by default), the DHCP server reclaims the IP address assigned to theuser.

DSW-18KX_LX(config)#no aaa log enable

DSW-18KX_LX(config)#web-auth templateeportalv2  

DSW-18KX_LX(config.tmplt.eportalv2)#ip172.29.2.8

DSW-18KX_LX(config.tmplt.eportalv2)#url http://172.29.2.8/eportal/index.jsp

DSW-18KX_LX(config.tmplt.eportalv2)#exit

DSW-18KX_LX(config)#web-auth portalkey su

DSW-18KX_LX(config)#http redirectdirect-site 192.168.9.12     //Configure the addressof the RG-SU server as an authentication-free address.

DSW-18KX_LX(config)#web-authdirect-host10.1.16.200        //Configure theclient of a school director as an authentication-free client.

DSW-18KX_LX(config)#dot1xmac-auth-bypass valid-ip-auth //Mandatory. The DHCP module instructs theMAB module to start authentication. Clients must obtain IP addresses beforestarting MAB authentication.

DSW-18KX_LX(config)#dot1xvalid-ip-acct enable   //Mandatory. The accounting updatepackets are used to upload the user IP address to SAM+. If the 802.1xauthentication module does not have an IP entry of the user, the user is kickedoffline 5 minutes later.

DSW-18KX_LX(config)#direct-vlan100-149,300-349,3000-3001,3010-3012      //ConfigureVLANs for wireless 802.1x authentication, monitoring, device management, andwireless AP management as authentication-free VLANs.

DSW-18KX_LX(config)#web-authportal-check interval 3 timeout 3 retransmit10    //Configure portal escape.

DSW-18KX_LX(config)#web-authportal-escape nokick

DSW-18KX_LX(config)#radius-serverhost 172.29.2.9 test username ruijie idle-time 2 key ruijie 

DSW-18KX_LX(config)#radius-serverdead-criteria time 120 tries 12     //Configure an IPaddress for the RADIUS server and enable the RADIUS escape test function.

DSW-18KX_LX(config)#web-authradius-escape    //Globally enable RADIUS escape in Webauthentication mode.

DSW-18KX_LX(config)#address-bindipv6-mode compatible//Set IPv6 authentication to the compatible mode.

DSW-18KX_LX(config)#station-movepermit    //Enable migration of 802.1x authenticatedclients.

DSW-18KX_LX(config)#web-authstation-move auto    //Enable migration of Webauthenticated clients.

DSW-18KX_LX(config)#web-authstation-move info-update

DSW-18KX_LX(config)#no dot1xstation-move arp-detect   //It is recommended to disable ARPdetection after migration of 802.1x authenticated clients, because the ARPdetection will cause broadcast packet floods.

DSW-18KX_LX(config)#http redirectport 443     //Because this configuration consumesdevice resources, it is recommended to discuss with the customer about whetherto enable the configuration if a great number of users need authentication.

DSW-18KX_LX(config)#cpu-protect typeweb-auths bandwidth 2000 //Configure the HTTPS optimization command. HTTPSinvolves socket encryption and decryption, consuming a great deal of processingresources. 11.0(1)B2T11 and later versions separate HTTPS from HTTP for the useof CPU resources. If HTTPS redirection is enabled, configure CPP rate limitingfor HTTPS.

DSW-18KX_LX(config)#offline-detectinterval 15 threshold 0      //Set the no-trafficgo-offline detection period to 15 minutes.

DSW-18KX_LX(config)#snmp-server host172.29.2.9 informs version 2c ruijie  //Configure SNMP.

DSW-18KX_LX(config)#snmp-server host172.29.2.9 traps su

DSW-18KX_LX(config)#snmp-servercommunity su rw

3.Configuring VLANs on the RG-N18000

DSW-18KX_LX(config)#vlan range 1-399

DSW-18KX_LX(config-vlan-range)#exit

DSW-18KX_LX(config)#vlan 2000

DSW-18KX_LX(config-vlan-range)#supervlan//Configurea super VLAN in the office area.

DSW-18KX_LX(config-vlan-range)#subvlan1-199     //Associate sub VLANs with the super VLAN.

DSW-18KX_LX(config-vlan-range)#exit

DSW-18KX_LX(config)#vlan 2001

DSW-18KX_LX(config-vlan-range)#supervlan//Configurea super VLAN in the dormitory area.

DSW-18KX_LX(config-vlan-range)#subvlan200-399     //Associate sub VLANs with the super VLAN.

DSW-18KX_LX(config-vlan-range)#exit

DSW-18KX_LX(config)#vlan 3000

DSW-18KX_LX(config-vlan)# nameDeManagement

DSW-18KX_LX(config)#vlan 3001

DSW-18KX_LX(config-vlan)#nameAPManagement

DSW-18KX_LX(config)#vlan 3010

DSW-18KX_LX(config-vlan)# name MenJin

DSW-18KX_LX(config)#vlan 3011

DSW-18KX_LX(config-vlan)#nameYiKaTong

DSW-18KX_LX(config)#vlan 3012

DSW-18KX_LX(config-vlan)#nameJianKong

4.Configuring the IPv4/IPv6 gateway and DHCPv4/DHCPv6

DSW-18KX_LX(config)#ipv6 dhcp poolDHCPv6        //Create a DHCPv6 addresspool for the DNS server.

DSW-18KX_LX(dhcp-config)# domain-namescu6.edu.cn

DSW-18KX_LX(dhcp-config)# dns-server2001:250:2003::8

DSW-18KX_LX(dhcp-config)# dns-server2001:250:2003::9

DSW-18KX_LX(config)#ip dhcp poolsushe-pool//Configure a DHCP address pool in the dormitory area.

DSW-18KX_LX(dhcp-config)#lease 0 20//Mandatory. Set the lease period to 2 hours.

DSW-18KX_LX(dhcp-config)#network10.1.32.0 255.255.240.0

DSW-18KX_LX(dhcp-config)#dns-server202.115.32.39 202.115.32.36

DSW-18KX_LX(dhcp-config)#default-router10.1.32.254

DSW-18KX_LX(config)#ip dhcp pool bangong-pool//Configurea DHCP address pool in the office area.

DSW-18KX_LX(dhcp-config)#lease 0 20//Mandatory. Set the lease period to 2 hours.

DSW-18KX_LX(dhcp-config)#network10.1.16.0 255.255.240.0

DSW-18KX_LX(dhcp-config)#dns-server10.1.16.0 255.255.240.0

DSW-18KX_LX(dhcp-config)#default-router10.1.16.254

DSW-18KX_LX(config)#ip dhcp poolap-pool//Configure a DHCP address pool for wireless AP management.

DSW-18KX_LX(dhcp-config)#option 138ip 10.10.1.1

DSW-18KX_LX(dhcp-config)#network10.0.2.0 255.255.255.0

DSW-18KX_LX(dhcp-config)#default-router10.0.2.254

DSW-18KX_LX(config)#int vlan2000//Configure the gateway address for the super VLAN in the office area.

DSW-18KX_LX(config-if-VLAN 2000)#ipaddress 10.1.16.254/20

DSW-18KX_LX(config-if-VLAN 2000)#ipv6enable

DSW-18KX_LX(config-if-VLAN 2000)#ipv6address 2001:250:2003:2000::1/64

DSW-18KX_LX(config-if-VLAN 2000)#noipv6 nd suppress-ra

DSW-18KX_LX(config-if-VLAN 2000)#ipv6nd other-config-flag

DSW-18KX_LX(config-if-VLAN 2000)#ipv6dhcp server DHCPv6

DSW-18KX_LX(config)#int vlan2001//Configure the gateway address for the super VLAN in the dormitory area.

DSW-18KX_LX(config-if-VLAN 2001)#ipaddress 172.16.32.254/20

DSW-18KX_LX(config-if-VLAN 2001)#ipv6enable

DSW-18KX_LX(config-if-VLAN 2001)#ipv6address 2001:250:2003:2001::1/64

DSW-18KX_LX(config-if-VLAN 2001)#noipv6 nd suppress-ra

DSW-18KX_LX(config-if-VLAN 2001)#ipv6nd other-config-flag

DSW-18KX_LX(config-if-VLAN 2001)#ipv6dhcp server DHCPv6

DSW-18KX_LX(config)#interfaceGigabitEthernet 1/1//Configure the port of the core RG-N18000 for connecting tothe egress device.

DSW-18KX_LX(config-if-GigabitEthernet1/1)# no switchport

DSW-18KX_LX(config-if-GigabitEthernet1/1)#ip address 10.0.0.2 255.255.255.0

DSW-18KX_LX(config)#int vlan3000//Configure the gateway address for device management.

DSW-18KX_LX(config-if-VLAN 3000)#ipaddress 10.0.1.254/24

DSW-18KX_LX(config)#int vlan3001//Configure the gateway address for the wireless AP device.

DSW-18KX_LX(config-if-VLAN 3001)#ipaddress 10.0.2.254/24

DSW-18KX_LX(config)#int vlan3010//Configure the gateway address for door status control.

DSW-18KX_LX(config-if-VLAN 3010)#ipaddress 11.0.10.254/24

DSW-18KX_LX(config)#int vlan3011//Configure the gateway address for the all-in-one card service.

DSW-18KX_LX(config-if-VLAN 3011)#ipaddress 10.0.11.254/24

DSW-18KX_LX(config)#int vlan3012//Configure the gateway address for the monitoring service.

DSW-18KX_LX(config-if-VLAN 3012)#ipaddress 10.0.12.254/24

DSW-18KX_LX(config)#address-manage      //EnableAM rules to perform refined matching of address segments.

DSW-18KX_LX(config-address-manage)#matchip 10.1.16.0 255.255.255.0 Gi1/2 vlan 2

DSW-18KX_LX(config-address-manage)#matchip 10.1.17.0 255.255.255.0 Gi1/2 vlan 3

DSW-18KX_LX(config-address-manage)#matchip 10.1.32.0 255.255.255.0 Gi1/3 vlan 200

DSW-18KX_LX(config-address-manage)#matchip 10.1.33.0 255.255.255.0 Gi1/3 vlan 201

DSW-18KX_LX(config-address-manage)#matchip 10.0.2.0 255.255.255.0 vlan 3001

DSW-18KX_LX(config-address-manage)#matchip 10.1.18.0 255.255.255.0 Gi1/4 vlan 100

DSW-18KX_LX(config-address-manage)#matchip 10.1.19.0 255.255.255.0 Gi1/4 vlan 150

DSW-18KX_LX(config-address-manage)#matchip 10.1.34.0 255.255.255.0 Gi1/4 vlan 300

DSW-18KX_LX(config-address-manage)#matchip 10.1.35.0 255.255.255.0 Gi1/4 vlan 350

DSW-18KX_LX(config-address-manage)#matchip loose      //It is recommended to configurethe loose mode.

... AM rules can be created one byone based on the preceding VLAN/IP planning tables. Note: Once AM rules areenabled, port/VLAN mapping needs to be performed for the network segments to beassigned on the whole network, including the network in the old campus that isnot reconstructed (the corresponding port is the port of the RG-N18000 forconnecting to the aggregation device of the old campus network; thecorresponding VLAN is the VLAN of the SVI on the RG-N18000 for connecting tothe aggregation device of the old campus network).

5.Enabling authentication on the port of the RG-N18000

DSW-18KX_LX(config)#intGigabitEthernet 1/2//Configure the interface for connecting to the aggregationdevice in the office area.

DSW-18KX_LX(config-if-GigabitEthernet1/2)#switchport mode trunk

DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x port-control auto       //Enable802.1x authentication control on an interface.

DSW-18KX_LX(config-if-GigabitEthernet1/2)#web-auth enable eportalv2//Enable Web authentication on an interface.

DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x mac-auth-bypass multi-user //Enable multi-user MAB authentication onan interface.

DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x mac-auth-bypass vlan 1-99  //Enable MAB authentication forVLANs 1–99.

DSW-18KX_LX(config-if-GigabitEthernet1/2)#switchport trunk allowed vlan only 1-199,3000-3001,3010-3012

DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x critical//Configure RADIUS escape in 802.1x authentication mode onan interface.

DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x critical recovery actionreinitialize      //Enable an escaped user toperform re-authentication after RADIUS escape is recovered.

DSW-18KX_LX(config-if-GigabitEthernet1/2)#switchport protected     //Configure portprotection on an interface.

DSW-18KX_LX(config)#intGigabitEthernet 1/3//Configure the interface for connecting to the aggregationdevice in the dormitory area.

DSW-18KX_LX(config-if-GigabitEthernet1/3)#switchport mode trunk

DSW-18KX_LX(config-if-GigabitEthernet1/3)#dot1x port-control auto       //Enable802.1x authentication control on an interface.

DSW-18KX_LX(config-if-GigabitEthernet1/3)#web-auth enable eportalv2//Enable Web authentication on an interface.

DSW-18KX_LX(config-if-GigabitEthernet1/3)#switchport trunk allowed vlan only 200-399,3000-3001,3010-3012

DSW-18KX_LX(config-if-GigabitEthernet1/3)#dot1x critical//Configure RADIUS escape in 802.1x authentication mode onan interface.

DSW-18KX_LX(config-if-GigabitEthernet1/3)#dot1x critical recovery actionreinitialize      //Enable an escaped user toperform re-authentication after RADIUS escape is recovered.

DSW-18KX_LX(config-if-GigabitEthernet1/3)#switchport protected     //Configure portprotection on an interface.

DSW-18KX_LX(config)#intGigabitEthernet 1/4//Configure the interface for connecting to the wirelesscontroller.

DSW-18KX_LX(config-if-GigabitEthernet1/4)#switchport mode trunk

DSW-18KX_LX(config-if-GigabitEthernet1/4)#dot1x port-control auto       //Enable802.1x authentication control on an interface.

DSW-18KX_LX(config-if-GigabitEthernet1/4)#dot1x mac-auth-bypass multi-user //Enable multi-user MAB authentication onan interface.

DSW-18KX_LX(config-if-GigabitEthernet1/4)#dot1x mac-auth-bypass vlan 150-199//Enable MAB authentication for VLANs150–199 (wireless Web authentication in the office area).

DSW-18KX_LX(config-if-GigabitEthernet1/4)#web-auth enable eportalv2//Enable Web authentication on an interface.

DSW-18KX_LX(config-if-GigabitEthernet1/4)#switchport trunk allowed vlan only 100-199,300-399,3000

DSW-18KX_LX(config)#intGigabitEthernet 1/44//Configure the port for connecting to the server area.

DSW-18KX_LX(config-if-GigabitEthernet1/44)#no switchport

DSW-18KX_LX(config-if-GigabitEthernet1/44)#description linkto-SAM&eportalSERVER

DSW-18KX_LX(config-if-GigabitEthernet1/44)#ip address 172.29.2.253 255.255.255.0

6.Optimizing VLAN pruning on the downlink port of the RG-N18000

7.Performing routing related configurations

DSW-18KX_LX(config)#router ospf 1

DSW-18KX_LX(config-router)#redistributeconnected

DSW-18KX_LX(config-router)#passive-interfac  vlan2000   //Mandatory. Configure a passive port to to reduce CPUoverheads.

DSW-18KX_LX(config-router)#passive-interfac  vlan2001   //Mandatory. Configure a passive port to to reduce CPUoverheads.

DSW-18KX_LX(config-router)#passive-interfac  vlan3000   //Mandatory. Configure a passive port to to reduce CPUoverheads.

DSW-18KX_LX(config-router)#passive-interfac  vlan3001   //Mandatory. Configure a passive port to to reduce CPUoverheads.

DSW-18KX_LX(config-router)#passive-interfac  vlan3010   //Mandatory. Configure a passive port to to reduce CPUoverheads.

DSW-18KX_LX(config-router)#passive-interfac  vlan3011   //Mandatory. Configure a passive port to to reduce CPUoverheads.

DSW-18KX_LX(config-router)#passive-interfac  vlan3012   //Mandatory. Configure a passive port to to reduce CPUoverheads.

6.1.6    Aggregation Configuration Reference Commandsfor the Dormitory Area

S5750-student(config)#vlan range 200-399,3000-3001,3010-3012      //Configurethe VLAN range for the access device in the student dormitory area, as well asthe monitoring and management VLANs.

S5750-student(config)#intGigabitEthernet 0/24 //Configure the uplink port of the aggregation deviceas a trunk port for transparent transmission.

S5750-student(config-if-GigabitEthernet0/24)#switchport mode trunk

S5750-student(config-if-GigabitEthernet0/24)#switchport trunk allowed vlan remove 1-199,400-2999,3002-3009,3013-4094

S5750-student(config)#intGigabitEthernet 0/23//Configure the downlink port of the aggregation device asa trunk port for transparent transmission.

S5750-student(config-if-GigabitEthernet0/23)#switchport mode trunk

S5750-student(config-if-GigabitEthernet0/23)#switchport trunk allowed vlan remove 1-199,400-2999,3002-3009,3013-4094

6.1.7    Access Configuration Reference Commands for theDormitory Area

S2928G-student1-1(config)#vlan range200-399,3000-3001,3010-3012     //Configure the VLANrange for the access device in the student dormitory area, as well as themonitoring and management VLANs.

S2928G-student1-1(config)#spanning-tree//EnableSTP.

S2928G-student1-1(config)#spanning-treemode rstp     //Enable RSTP to avoid overlow portconvergence speed.

S2928G-student1-1(config)#spanning-treeportfast bpduguard default    //Enable BPDU guard for allPortFast ports by default.

S2928G-student1-1(config)#errdisablerecovery interval 300//Configure the recovery interval after a port is disabledby RLDP.

S2928G-student1-1(config)#int rangegi0/1-22

S2928G-student1-1(config-if-range)#switchportaccess vlan 200    //Create an access port and assign it tothe corresponding VLAN.

S2928G-student1-1(config-if-range)#switchportprotected//Mandatory. Configure port protection.

S2928G-student1-1(config-if-range)#spanning-treeportfast     //Enable PortFast on all downlinkinterfaces, which validates BPDU guard at the same time. Once a BPDU packet isreceived, the access switch regards that a loop occurs and shuts down the interfaces.

S2928G-student1-1(config-if-range)#rldpport loop-detect shutdown-port    //Mandatory. ConfigureRLDP to prevent loops.

S2928G-student1-1(config)#intgi0/23//Configure the port for connecting to the AP.

S2928G-student1-1(config-if-GigabitEthernet0/23)# switchport access vlan 3001

S2928G-student1-1(config-if-GigabitEthernet0/23)#rldp port loop-detect shutdown-port

S2928G-student1-1(config)#intgi0/24//Configure the uplink port of the access device as a trunk port fortransparent transmission.

S2928G-student1-1(config-if-GigabitEthernet0/24)#switchport mode trunk

S2928G-student1-1(config-if-GigabitEthernet0/24)#spanning-tree bpdufilter enable//Enable a BPDU filter for the uplinkport, so that loop protection is provided only on single devices, and BDPUpackets are not transmitted externally, no topology is created, and no rootbridge is elected.

S2928G-student1-1(config-if-GigabitEthernet0/24)# switchport trunk allowed vlan only 200-399,3000-3001,3010-3012

6.1.8    SAM + and ePortal Related Configurations

1.Adding an RG-N18000 on SAM+

2.Adding an AC on SAM+

3.Adding ePortal on SAM+

4.Adding SAM+ on ePortal

5.Adding an RG-N18000 on ePortal

6.Configuring access control

(1)It is not necessary to enable MAB authentication for access control in thedormitory area.

(2)It is necessary to enable MAB authentication for access control in the officearea.

(3)The office area allows MAC fast access. To allow login using the native 802.1xauthenticated client, select Smart Device 1X Access.

  

7.Configuring accounting policies

(1)Monthly accounting policy in the dormitory area

(2)Monthly accounting policy in the office area

8.Configuring user templates

(1)User template in the dormitory area

(2)User template in the office area

9.Configuring user plans

(1)User plan in the dormitory area

(2)User plan in the office area

10.Configuring user groups

11.Registering users

12.Payment

 

13.Controlling the access period

14.Associating the access period with the user template

15.Verifying login failure of student users beyond the access period (10:34)

 

 



     Common Troubleshooting for Simplistic Networks

7.1     Authentication Page Display Failure During WebAuthentication

7.1.1    Symptom

Ablank page is displayed, or a prompt indicating that no device is registered isdisplayed during Web authentication.

7.1.2    Possible Causes

1.      Theclient cannot obtain an IP address, and fails to send HTTP packets.

2.      Theclient obtains an unavailable DNS server, and the domain name fails to be parsed.

3.      Theredirection parameter, portal key, and source interface configured on theRG-N18000 are inconsistent with those on ePortal.

4.      The DHCPcheck in Web authentication is enabled on an interface and a static IP addressis used, resulting in redirection failures.

5.      HTTPpackets are lost and cannot reach the RG-N18000, and the RG-N18000 fails toperform redirection.

6.      Packetscannot reach the Web process, and the RG-N18000 fails to perform redirection.

7.      Theclient cannot communicate with the portal server via packets because of channelexceptions, such as unreachable routes and security device filtering.

8.      TheePortal server works abnormally, sending no response packets.

9.      If anon-SAM+ server is adopted, the possible cause is that the URL does not meetserver requirements and therefore, the Web authentication page does not pop up.

10.   The user uses a static IPaddress, but has the DHCP check in Web authentication configured: web-authdhcp-check or web-auth dhcp-check vlan xxx.

11.   In version 11.0(1)B3P3,the Web authentication page cannot be displayed and redirection cannot beperformed if a static IP address is within the MAB authentication addressrange.

7.1.3    Handling Steps

1.      Checkwhether the client obtains a correct IP address.

2.      Open thebrowser, enter http://www.ruijie.com.cn and http://183.1.1.1 (the IP addressmust not exist in the intranet) separately, and observe whether the browserredirects to the URL.

Ifthe browser fails to redirect to the entered website but redirects to theentered IP address, check whether the DNS resolution is normal.

Ifthe redirection fails after the website and IP address are entered or no pagepops up after redirection, proceed to the following step.

3.      Checkwhether the configurations on the RG-N18000 and ePortal are correct.

Checkwhether the redirection configuration is correct on the RG-N18000, and whetherthe web-auth portal key and IP portal source interface commandson the RG-N18000 are consistent with those on the ePortal.

web-auth template eportalv2      //Create a Web authentication template.

ip 202.204.193.32                //IP address of the ePortal server

urlhttp://202.204.193.32/eportal/index.jsp    //URL of the ePortalserver.

web-auth portal key ruijie   //Encrypt the URL. There must be no space at the end of the command.

ip portal source-interfaceGigabitEthernet 1/24  //The IP address of the interface is 35.0.0.1configured on the ePortal. Ensure that the route is reachable.

Checkwhether Web authentication is correctly configured on the interface. Ensurethat both 802.1x authentication and Web authentication are enabled on a VLAN.

interface range GigabitEthernet 0/1 //Configure the interface for enabling Web authentication.  

web-auth enable eportalv2             //Enable Web authentication on theinterface.

web-auth vlan-control 2000-3000    //Enable VLAN-based Web authentication.

Checkwhether the configuration on ePortal is consistent with that on the RG-N18000.See the figure below.

4.      Checkwhether DHCP check in Web authentication is enabled on the interface, whetherIP DHCP snooping is enabled, and whether the IP address is obtaineddynamically. The DHCP check in Web authentication needs to be associated withDHCP snooping entries. If no DHCP snooping binding table is available, the Webauthentication redirection will fail.

Commandfor DHCP check in Web authentication: web-auth dhcp-check or web-authdhcp-check vlan xxx

5.      Run the showversion command to check whether the RG-N18000 is of version 11.0(1)B3P3.If yes, check whether static IP address MAB authentication is enabled. If astatic IP address is within the IP segment range configured by using the dot1xmac-auth-bypass static-ip-segment command, the Web authentication page doesnot pop up and redirection cannot be performed.

6.      If thesystem still fails to redirect to the URL after the steps above are performed,check whether the RG-N18000 receives the packets.

show mac-address-table | include***(MAC address of the user)

show arp | include ****(MAC addressof the user)

If no output of the precedingcommands is displayed, it indicates that the RG-N18000 does not receive thepackets. If relevant entries are displayed, perform ACL counting or packetcapture for confirmation.

ip access-list extended YYY

10 permit ip host 192.168.1.1 any   //192.168.1.1 is the user IP address.

20 permit ip any any 

interface gigabitEthernet   1/1 

ip access-group YYY in  //Applythe ACL to the faulty port.

ip access-list counter YYY   //Display the packet count.

show access-list    //Check whether relevant packet statistics are collected.

 

Example:

7.      Normally,if the system still fails to redirect to the URL after the steps above areperformed, collect debugging information on the RG-N18000 based on faultinformation, and contact the TAC for handling.

8.      If thesystem successfully redirects to the URL but the authentication page does notpop up, check the connectivity between the client and ePortal.

Forexample, to run the ping command, disable the firewall on the ePortal serverand ensure that the firewall on the intermediate link allows access.

9.      If theconnectivity between the client and ePortal is normal, enable packet capture onboth the client and ePortal, record the URL to which the client redirects aswell as the logs on the ePortal server, and contact the ePortal R&Dengineers for handling.

7.1.4    Fault Information Collection

Runthe following commands to collect information on the RG-N18000:

terminal length 0

show ver detail

show run

show mac-address-table | include***(MAC address of the user)

show arp | include ****(MAC addressof the user)

show ip dhcp snooping

show ip dhcp snooping binding | inH.H.H

debug web-auth cli  

show web-auth user name ***  

debug web show  

debug web stat 

debug scc stat

undebug all

show log

terminal no length

Thefigure below shows the information collected on the ePortal server.

7.1.5    Fault Summary and Notes

TheWeb authentication page can be popped up in the following steps:

Step1: The client exchanges HTTP packets with the RG-N18000, which pushes theredirection URL to the client. The client browser redirects to the redirectionURL.

Step2: The client accesses the redirection URL and exchanges packets with theePortal server.

Therefore,if the client fails to redirect to the URL, the failure occurs between theclient and the RG-N18000; if the client redirects to the URL but no page popsup, the failure occurs between the client and the ePortal.

7.2     Web Authentication Failure

7.2.1    Symptom

AWeb authentication prompt shows that the authentication fails or the connectionto the authentication server times out.

7.2.2    Possible Causes

1.      Theverification conditions of SAM+ are not met.

2.      The interconnectionconfigurations between the RG-N18000, ePortal, and SAM+ are inconsistent.

3.      Theconnectivity between the RG-N18000 and ePortal or between the RG-N18000 andSAM+ is abnormal. As a result, packets cannot be exchanged normally.

4.      Portalor RADIUS packets cannot be properly processed due to internal errors of theRG-N18000.

5.      TheePortal server or SAM+ server malfunctions, causing failures in processing orresponding to packets.

6.      TheRADIUS server is faulty, and both the escape function and the none mode of AAAare configured on the RG-N18000.

7.2.3    Handling Steps

1.      Payattention to the authentication failure prompt on the client page and that onthe SAM+ server. Perform basic fault locating based on the prompts and checkwhether the verification conditions of SAM+ are met.

Forexample, if prompts on the client and SAM+ clearly show that the Webauthentication service is not allowed in this area or information verificationfails, check the area, service, and access control and make adjustments accordinglyon SAM+.

2.      Checkthe device configurations, mainly the RADIUS server configuration, RADIUS key,configurations on SAM+ and ePortal, and IP RADIUS source interface.

aaanew-model      //Enable the AAA function.

aaa authentication login default local     //Use the local username/password for login to the AAA device.

radius-server host 172.18.157.32 key ruijie        //Configure the IP address and key forthe AAA server, which are applicable to the scenarios with a single RADIUSserver.

aaa accounting network defaultstart-stop group radius      //AAA reference configuration. Theactual service deployment prevails.

aaa authentication web-auth defaultgroup radius          //Reference configuration forAAA Web template. The actual service deployment prevails.

aaa accountingupdate              //Configure AAA accounting update.

aaa accounting update periodic 15        //Set the interval for AAA accounting update to 15min.

aaa authorization ip-auth-modemixed    //Set the IP address authorization mode of 802.1xclients to the mixed mode. The IP addresses can be obtained via polling inmultiple ways (DHCP/RADIUS).

no aaa log enable  //Disable the AAA log function.

web-auth templateeportalv2       //Create a Web authenticationtemplate.

   ip 172.18.157.33              //IP address of the ePortal server.

   urlhttp://172.18.157.33/eportal/index.jsp    //URL of the ePortalserver.

   authentication default     //Optional. This command is required when theauthentication list name for AAA is not set to default.

   accounting default       //Optional. This command is requiredwhen the accounting list name for AAA is not set to default.

web-auth portal key ruijie    //Mandatory. Configure the Web portal key.

ip radius source-interfaceGigabitEthernet 1/24   //Configure the source interface for the device tocommunicate with the RADIUS server. The device address added to SAM+ should bethe address of this interface.

ip portal source-interfaceGigabitEthernet 1/24   //Configure the source interface for the device tocommunicate with the ePortal server. The device address added to the ePortalserver should be the address of this interface.

interface range GigabitEthernet0/2-3  //Configure the interface for enabling Web authentication. 

    web-auth enableeportalv2             //Enable Web authentication on the interface.

    web-authvlan-control 2000-3000     //Enable VLAN-based Webauthentication.

snmp-server host 172.18.157.32informs version 2c ruijie

snmp-server community ruijie rw

3.      Ping theserver from the RG-N18000 (the ping operation is forbidden if the firewall isenabled on the server). The operation aims to check the connectivity betweenthe IP address of the source interface and the server. If the connectivity testfails, check the network status.

4.      If theRG-N18000 is unreachable to the server, check whether the network is normal andthen check whether SAM+ is faulty. If SAM+ is faulty, check whether the escapefunction is configured on the RG-N18000.

Checkwhether the none mode of AAA is configured in the following case: The SAM+server is faulty, and the escape function is configured, but the escapefunction does not take effect and a message is displayed during authentication,indicating that the authentication times out and the device does not respond.

Thenone mode of AAA enables users to access the Internet without authenticationwhen the RADIUS server is unreachable, provided that "radius-servertimeout          xxx" is displayed. RADIUS packetsare sent at an interval of 5s by default and the default retransmission countis 3. The none mode of AAA is applied 20 seconds later. By default, the packetfrom ePortal times out when ePortal fails to receive a response within 9seconds. As a result, the none mode of AAA is not applied when the packet fromePortal times out. The user escape function also fails.

Handlingsuggestions: 1. Delete the none mode of AAA.

2.Run the following command to set the RADIUS detection duration to a valuesmaller than the timeout duration (9s) of packets of ePortal: radius-servertimeout 2

5.      If theconfiguration is correct and the association is normal, run the followingcommands on the RG-N18000 to collect information:

debug scc stat

debug web-auth cli

sh web user ip ***(ip)  -- Checkwhether a user using this IP address is online.

sh web syslog ip***(ip)    --Display the historical Internet access records ofthe IP address.

show web-auth authmng abnormal

show radius timeout record – DisplayRADIUS server timeout records.

show radius authstat     -- Display statistics relevant to RADIUSauthentication. When a fault occurs, run this command several times to checkstatistical changes.

show radius acct stat  ---Display RADIUS accounting statistics. When a fault occurs, run this commandseveral times to check statistical changes.

Captureuser authentication packets on the client, ePortal, and SAM+, and submit themto the TAC for handling.

7.2.4    Fault Information Collection

terminal length 0

show ver detail

show run

debug scc stat

debug web cli

show mac-address-table | include***(MAC address of the user)

show arp | include ****(MAC addressof the user)

show ip dhcp snooping

show ip dhcp snooping binding | in****(user MAC address)

sh web user ip ******* (user IP address) 

sh web syslog ip ******* (user IPaddress)

show web-auth authmng abnormal  

show radius timeout record 

show radius auth stat    

show radius acct stat  

show log

terminal no length 

7.2.5    Fault Summary and Notes

7.3     Network Dropout During Web Authentication

7.3.1    Symptom

Webauthenticated users are dropped out of the network, cannot access the network,or are prompted for re-authentication.

7.3.2    Possible Causes

1.      TheSAM+ server forces users to go offline, or users go offline due to the changein RG-N18000 configurations.

2.      Usersgo offline due to user preemption behavior.

3.      Usersgo offline because the accounting updates on the RG-N18000 do not matchconfigurations on the SAM+ server.

4.      Usersgenerate no traffic within a period of time (code 4, idle timeout).

5.      Usersgo offline for data migration because the environment is abnormal (such as aloop).

7.3.3    Handling Steps

1.      Goto the SAM+ system and access Operation > Online User on theWeb management page, locate the user, view the go-offline cause prompt, andfind out the possible go-offline causes preliminarily.

Note: The user go-offline promptsprovided on SAM+ are accurate, but there may be some errors due to complexnetwork environments.

2.      If the device prompts that the user go-offlineis caused by no traffic detected, as shown in the figure below, it indicatesthat SAM+ receives the TCP2009 no traffic notification from the traffic auditdevice (such as the RSR77, ACE, or EG) and forces the RG-N18000 to bring theuser offline.

 

Note:As shown in the figure, the prompt displayed on the RG-N18000 shows that theuser is forced to go offline.

Ifthe device prompts that the go-offline cause is code4 (idle value timeout), asshown in the figure below, it indicates that the code value in the accountingstop packet of the RG-N18000 is 4, representing that the RG-N18000 forces theuser to go offline because no user traffic is detected.

 

Checkthe go-offline time and the RG-N18000 configuration based on relevant prompts.

offline-detect interval 15 threshold0        //If no traffic from a user isdetected within 15 minutes, the user is brought offline. The RG-N18000 performsjudgment by checking whether there is user traffic matching entries in the MACaddress table.

offline-detect interval 15 threshold0 vlan 1000-1500      //Optional. Enable theno-traffic go-offline function for VLANs 1000 to 1500.

Ifthe user is brought offline before the go-offline detection interval set on theRG-N18000 expires, the no-traffic go-offline function is initiated by anotherdevice. In this case, check the traffic detection function on other associateddevices.

Forexample, the configurations on the RSR77 are as follows:

sam-acct user keepalive-detect enable     //Enable the keepalive detection function (enabled by default).

sam-acct user keepalive-detect 900       //Force a user to go offline if no traffic from theuser is detected within 900 seconds (900 seconds by default).

3.      If theserver prompts that the user is brought offline due to preemption, check the systemsettings and attributes of accounts, whether the MAC address uniqueness limitis configured, and whether the number of clients is limited.

4.      Checkwhether the accounting update configuration on the RG-N18000 is consistent withthat on SAM+.

aaa accounting update              //Configure AAA accounting update.

aaa accounting update periodic 15        //Set the interval for AAA accounting update to 15min.

aaa accounting network defaultstart-stop group radius     //AAA reference configuration. The actualservice deployment prevails.

web-auth template eportalv2

ip 172.18.157.33

urlhttp://172.18.157.33/eportal/index.jsp

authentication default

accounting default   //Enable the accounting update function.

5.      If theserver prompts that the user is brought offline due to migration (VLANmigration, port migration, or VLAN & port migration), check the usergo-offline cause on the device. If the device also prompts that the user isbrought offline due to migration, as shown in the figure below, check the MACaddress of the user.

Runthe show mac-address-table address *** and show arp *** commandson the device to check whether the VID or port associated with the MAC addresschanges. If yes, proceed to the following step.

Basedon the new VID or port, locate the earliest device that learns the MAC addressand pinpoint the cause for MAC address drift.

Aloop or IP address spoofing occurs on the downlink device.

7.3.4    Fault Information Collection

Runthe following commands to collect information on the RG-N18000:

terminal length 0

show ver detail

show run

show mac-address-table | include***(MAC address of the user)

show arp | include ****(MAC addressof the user)

show ip dhcp snooping

show ip dhcp snooping binding | in****(user MAC address)

debug scc stat

debug web cli

sh web user ip ***(ip)

sh web syslog ip ***(ip) ---

show web-auth authmng abnormal  

debug scc pgsql st  --- Displayrelevant statistics of the database.

undebug all

show log

terminal no length

7.3.5    Fault Summary and Notes

7.4     802.1x Authentication Failure

7.4.1    Symptom

802.1xauthentication fails or 802.1x authenticated users are dropped out of thenetwork.

7.4.2    Possible Causes

1.      Theconfigurations for interconnection between the RG-N18000 and SAM+ server areincorrect. As a result, the RG-N18000 fails to send packets to the SAM+ server,or the SAM+ server fails to process received packets.

2.      Thechannel between the RG-N18000 and SAM+ server is abnormal, and RADIUS packetscannot be sent to the SAM+ server.

3.      Thechannel between the client and the RG-N18000 is abnormal, and EAP packetscannot be sent to the RG-N18000.

4.      Theconfigurations are incorrect on the RG-N18000, and the RG-N18000 fails toprocess or respond to packets.

5.      Usersfail to obtain correct IP addresses.

6.      Softwarefailures occur on the RG-N18000 or SAM+ server, and authentication packetscannot be properly sent or processed.

7.      VLANports are migrated, and a prompt about active user go-offline is displayed evenif the user does not go offline actively (11.0(1)B3P2 and earlier versions).

7.4.3    Handling Steps

1.      On theclient and SAM+, access Operation > Log, collect relevantauthentication failure prompts, and make basic judgment based on the prompts.

2.      If thesystem is stuck in the connection to the authentication server or a promptabout an authentication server connection failure is displayed during clientauthentication, check whether 802.1x authentication configurations on theRG-N18000 and SAM+ are correct. If a prompt is provided on SAM+, follow theprompt to complete the configuration. If no prompt is provided on SAM+, checkwhether the RADIUS server is configured correctly.

aaa new-model

radius-server host 192.168.32.120 key7 ruijie

ip radius source-interfacegigabitEthernet 1/24

aaa accounting network defaultstart-stop group radius

aaa authentication dot1x defaultgroup radius

aaa accounting update periodic15

aaa accounting update

dot1x accounting default

dot1x authentication default

aaa authorization ip-auth-mode mixed

no aaa log enable

interface FastEthernet 0/1

   dot1x port-control auto

expert access-list extended 2700

  10 permit arp any any 

  20 permit udp any any any anyeq bootpc 

  30 permit udp any any any anyeq bootps 

security global access-group 2700

3.      Checkwhether the connectivity between the IP address of the source interface of theRG-N18000 and SAM+ is normal.

4.      Ifthe authentication is stuck in the phase of authentication server searching ora prompt is displayed, indicating that searching for an authentication serverfails, check whether the link between the client and the RG-N18000 is normaland whether the 802.1x authentication function is configured on a downlink portconnected to the RG-N18000.

Checkwhether EAP packets are filtered out because 802.1x authentication is enabledon the access-layer S21 series switch, or whether EAP packets are not forwardedbecause the switch connects to a TP-LINK device.

5.      Ifthe fault persists after the steps above are performed, run the followingcommand to collect go-online/offline records, and capture packets on the clientand the SAM+ server.

Showdot1x user diag mac xxx

         Asshown in the figure above:

        create pae: Indicates that a user is created.

         pktstart: Indicates authentication initiated by the start packet from the client.

        acct start: Indicates that the authentication is successful andaccounting starts.

        acct stop: Indicates that the user goes offline and the accounting stoppacket is sent.

     Show dot1xauthmng statistics

     Show dot1x authmngmab statistics

     sh ip dhcpsnooping binding

6.      Checkwhether an IP address can be obtained normally.

expert access-list extended 2700

  10 permit arp any any 

  20 permit udp any any any anyeq bootpc 

  30 permit udp any any any anyeq bootps 

security global access-group 2700

Afterverifying that the configuration above is normal, if an IP address still failsto be obtained, check possible causes and rectify the fault by following thehandling procedure of a DHCP fault.

7.      If theauthentication still fails after the configuration above is adopted, collectinformation on the RG-N18000, enable packet capture on both the client andSAM+, and send the information and captured packets to the TAC for handling.

7.4.4    Fault Information Collection

Run the following commands to collectinformation on the RG-N18000:

terminal length 0

show ver detail

show run     

show mac-address-table | include***(MAC address of the user)

show arp | include ****(MAC addressof the user)

show ip dhcp snooping

show ip dhcp snooping binding | in****(user MAC address)

show dot1x user diag mac xxx

show dot1x authmng abnormal | in xxx

show dot1x authmng statistic

show dot1x authmng mab statistic

show dot1x user mac xxx

show dot1x

deb dot1x dump gl

show log

terminal no length

Thedirectory for storing logs to be collected on SAM+ is as follows:

7.4.5    Fault Summary and Notes

7.5     Network Dropout During 802.1x Authentication

7.5.1    Symptom

NetworkDropout During 802.1x Authentication

7.5.2    Possible Causes

1.      Usersgenerate no traffic within a period of time.

2.      Theclient version is not compatible with the SAM+ server version.

3.      VLANports are migrated, and a prompt about active user go-offline is displayed evenif the user does not go offline actively (11.0(1)B3P2 and earlier versions).

7.5.3    Handling Steps

1.      Go tothe SAM+ system and access Operation > Online User on the Web managementpage, locate the user, view the go-offline cause prompt, and find out thepossible go-offline causes preliminarily.

Note:The user go-offline prompts provided on SAM+ are accurate, but there may besome errors due to complex network environments.

2.      If thedevice prompts that the user go-offline is caused by no traffic detected, asshown in the figure below, it indicates that SAM+ receives the TCP2009 no trafficnotification from the traffic audit device (such as the RSR77 or ACE).

 

Ifthe device prompts that the go-offline cause is code4 (idle value timeout), asshown in the figure below, it indicates that the code value in the accountingstop packet of the RG-N18000 is 4, representing that the RG-N18000 forces theuser to go offline because no user traffic is detected.

 

Checkthe go-offline time and the RG-N18000 configuration based on relevant prompts.

offline-detect interval 15 threshold0        //If no traffic from a user isdetected within 15 minutes, the user is brought offline. The RG-N18000 performsjudgment by checking whether there is user traffic matching entries in the MACaddress table.

offline-detect interval 15 threshold0 vlan 1000-1500      //Optional. Enable theno-traffic go-offline function for VLANs 1000 to 1500.

 

Ifthe user is brought offline before the go-offline detection interval set on theRG-N18000 expires, the no-traffic go-offline function is initiated by anotherdevice. In this case, check the traffic detection function on other associateddevices.

Forexample, the configurations on the RSR77 are as follows:

sam-acct user keepalive-detectenable      //Enable the keepalive detection function(enabled by default).

sam-acct user keepalive-detect900        //Force a user to go offline ifno traffic from the user is detected within 900 seconds (900 seconds bydefault).

3.      TheRG-N18000 sends the EAP failure packet to the client during user VLAN or portmigration. After receiving the packet, the client actively initiates ago-offline request.

Runthe show dot1x authmng abnormal command to display the user go-offlinecause. If it is determined that the fault is caused by port or VLAN migration,run the show mac-address-table and show arp commands to displaythe migration information and find out the cause for migration (loop or othercauses) to rectify the fault.

Commoncauses:

"user logoff" :\--->>The client logs out.

"server kickout user" :\--->>The server kicks the user off the network.

"no flow" : \---.>>Notraffic is detected.

"port move" :\--->>Port migration occurs.

"vlan move" :\--->>VLAN migration occurs.

"port-vlan move" :\--->>Both port migration and VLAN migration occur.

"invalid ip" :\--->>No valid IP address is available.

7.5.4    Fault Information Collection

Runthe following commands to collect information on the RG-N18000:

terminal length 0

show ver detail

show run     

show mac-address-table | include***(MAC address of the user)

show arp | include ****(MAC addressof the user)

show ip dhcp snooping

show ip dhcp snooping binding | in****(user MAC address)

show dot1x user diag mac xxx

show dot1x authmng abnormal | in xxx

show dot1x authmng statistic

show dot1x authmng mab statistic

show dot1x user mac xxx

show dot1x

deb dot1x dump gl

show log

terminal no length

Thedirectory for storing logs to be collected on SAM+ is as follows:

7.5.5    Fault Summary and Notes

7.6     MAB Authentication Failure

7.6.1    Symptom

MABperception-free authentication fails.

7.6.2    Possible Causes

1.      MAB perception-freeauthentication is not enabled on the SAM+ server, and the SAM+ server fails tolearn MAC addresses of clients.

2.      TheRG-N18000 is incorrectly configured, and fails to initiate MAB perception-freeauthentication.

3.      Usersfail to obtain correct IP addresses, not meeting the mechanism of dot1xmac-auth-bypass valid-ip-auth.

4.      Thedevice fails to learn the corresponding MAC address, and does not initiate MABauthentication.

5.      Softwarefailures occur on the RG-N18000 or SAM+ server, and MAB perception-freeauthentication is not initiated or processed properly.

7.6.3    Handling Steps

1.      On theclient and SAM+, access Operation > Log, collect relevantauthentication failure prompts, and make basic judgment based on the prompts. Asshown in the figure below, the RG-N18000 initiates MAB authentication but thereis no MAB authentication entry on the SAM+ server. As a result, the MABauthentication fails.

Asshown in the figure below, access User > MAC Authenticationand check whether binding entries of the username corresponding to the MACaddress exist.

Checkwhether MAC fast authentication is checked for access control.

2.      If SAM+has no authentication failure entry of the MAC address, MAB authenticationinteraction exceptions may be caused by improper configuration on theRG-N18000.

aaanew-model      //Enable the AAA function.

aaa accounting network defaultstart-stop group radius      //AAA referenceconfiguration. The actual service deployment prevails.

aaa authentication dot1x defaultgroup radius        //Referenceconfiguration for AAA 802.1x authentication template. The actual servicedeployment prevails.

aaa authentication web-auth defaultgroup  radius         //Referenceconfiguration for AAA Web authentication template. The actual servicedeployment prevails.

aaa authentication login defaultlocal      //Use the local username/password for loginto the AAA device.

radius-server host 172.18.157.32 keyruijie        //Configure the IP address andkey for the AAA server, which are applicable to the scenarios with a singleRADIUS server.

aaa accounting update periodic15         //Set the internal for AAAaccounting update to 15 min.

aaa accountingupdate              //Configure AAA accounting update.

no aaa log enable     //Disable the AAA log function.

dot1x accountingdefault     //Optional. This command is required when theaccounting list name for AAA is not set to default.

dot1x authenticationdefault     //Optional. This command is required when the802.1x authentication list name for AAA is not set to default.

 web-auth template eportalv2  

    ip 172.18.157.33                //IP address of the ePortalserver

    url http://172.18.157.33/eportal/index.jsp   //URL of the ePortal server.

    authentication default     //Optional. This command is required when theauthentication list name for AAA is not set to default.

    accounting default       //Optional. This command is required whenthe accounting list name for AAA is not set to default.

web-auth portal key ruijie   //Mandatory. Configure the key for encrypting the URL for interconnectionwith ePortal.

aaa authorization ip-auth-modemixed    //Mandatory. Set the IP address authorization mode of802.1x clients to the mixed mode. The IP addresses can be obtained via pollingin multiple ways (DHCP/RADIUS).

ip dhcpsnooping             //Mandatory. An IP address needs to be obtained via the DHCP snooping modulefor MAB authentication. Otherwise, a user with the IP address of 0.0.0.0appears on SAM+.

dot1x mac-auth-bypassvalid-ip-auth          //The DHCPmodule instructs the MAB module to start authentication. The configuration ofthis command will drop users out of the network. It is not recommended to runthis command in service peak hours.

dot1x valid-ip-acctenable           //Mandatory.The accounting update packets are used to upload the user IP address to SAM+.If the 802.1x authentication module does not have an IP entry of the user, theuser is kicked offline 5 minutes later.

interface range GigabitEthernet0/2-3  //Enable 802.1x authentication on the interface.

    web-auth enableeportalv2    //Enable Web authentication on the interface.

    dot1x port-control auto      //Enable 802.1x authentication on the interface.

    dot1x mac-auth-bypassmulti-user                  //Mandatory. Enable MAB authentication on the interface.

    dot1x mac-auth-bypassvlan(vlan-list)             //Optional. Configure this command in interface configuration mode to enableVLAN-based MAB authentication.

3.      Afterthe dot1x mac-auth-bypass valid-ip-auth command is configured, dynamicusers must obtain IP addresses and relevant entries exist in the DHCP snoopingbinding table before MAB authentication can be initiated for them.

Runthe show ip dhcp snooping binding or show ip dhcp snooping binding |include 192.168.1.1 command to check whether relevant entries aredisplayed.

Ifno, check whether the IP address is proper and whether the DHCP process isnormal.

Ifthe user IP address is static and there is no DHCP interaction, statically bindentries on the RG-N18000 to trigger MAB authentication. See the followingcommand.

dot1xaddress-binding mac 9048.9a8e.a033 ip 10.0.100.188

4.      If theconfiguration is correct, run the show mac-address-table command tocheck whether the MAC address is learned successfully. If yes but MABauthentication is not initiated, contact the TAC for handling. If no, enablepacket capture to check whether the RG-N18000 receives packets. If yes, contactthe TAC for handling.

5.      If thecause cannot be pinpointed after the operations above are performed, thesoftware of the RG-N18000 may be faulty, which result in the failure toinitiate MAB authentication, or the software of SAM+ may be faulty, whichresult in the failure in processing of MAB authentication. Collect informationon the RG-N18000, enable packet capture on both the client and SAM+, and sendthe information and captured packets to the TAC for handling.    

7.6.4    Fault Information Collection

Runthe following commands to collect information on the RG-N18000:

terminal length 0
show ver detail
show run     
show mac-address-table | include ***(MAC address of theuser)
show arp | include ****(MAC address of the user)
show ip dhcp snooping
show ip dhcp snooping binding | in ****(MAC address ofthe user)
show dot1x user diag mac xxx
show dot1x authmng abnormal | in xxx
show dot1x authmng statistic
show dot1x authmng mab statistic
show dot1x user mac xxx

deb web-auth mab user-show
show dot1x

deb dot1x dump gl
show log

terminal no length

Thedirectory for storing logs to be collected on SAM+ is as follows:

7.6.5    Fault Summary and Notes

7.7     Exception/Failure in Dynamic Acquisition of IPAddresses

7.7.1    Symptom

Thedevice fails to dynamically obtain IP addresses or the dynamically obtained IPaddresses are abnormal.

7.7.2    Possible Causes

1.      The DHCPaddress pool and sub VLANs are not associated with a super VLAN, and AM rulesare incomplete, resulting in IP address allocation failures.

2.      Addressesin the address pool are exhausted, and no IP address can be allocated.

3.      Only802.1x authentication is configured on interfaces and no security channel isconfigured.

4.      Theintermediate channel fails or ACL configurations are incorrect, and DHCPpackets cannot reach the RG-N18000.

5.      DHCPsnooping is enabled on the downstream switch and the upstream port is not addedto the list of trusted ports, and therefore DHCP response packets are dropped.

6.      Theclient is faulty, and DHCP packets cannot be sent or received DHCP packetscannot be processed.

7.      The DHCPrelay is incorrectly configured on the RG-N18000, or the channel between thegateway and DHCP server is abnormal.

8.      TheRG-N18000 serves as a DHCP relay, packets between the RG-N18000 and the serverare transmitted at layer 2, and the client is not in the same VLAN as theserver. As a result, the RG-N18000 does not send packets to the clientaccording to the DHCP snooping binding table.
9.      The DHCP server performance is abnormal,resulting in packet processing or response failures.

10.    DHCP packets aredropped at the IP layer (founded by displaying the TCP/IP CPU usage).

7.7.3    Handling Steps

1.      Checkwhether the DHCP, super VLAN, gateway interface, and AM rules are correctlyconfigured.

Themain DHCP configuration is as follows:

ip dhcp pool bangong

lease 0 2 0 

network 10.1.32.0 255.255.240.0  //The mask here contains 20 bits.

dns-server 192.168.58.110 

default-router 10.1.32.254

Note:If the subnet mask of an address in the DHCP address pool contains 20 bits butthat of the IP address configured for the gateway interface does not, DHCPneeds to be configured based on the network segment to which the subnet mask ofthe gateway IP address belongs.

Themain super VLAN configuration is as follows:

vlan 2001

Super VLAN

subvlan 200-399         //Associate the sub VLANs with the super VLAN.

name susheZONE

Note:The VLAN of each interface on the client connected to the access switch is asub VLAN, which needs to be associated with the super VLAN.

Themain AM rule configuration is as follows:

address-manage                                                     //Enable the address management function.

     match ip 10.1.5.0255.255.255.0 gi5/3 vlan 1005          //ConfigureVLAN+port-based matching mode.

     match ip192.168.2.0 255.255.255.0 Gi5/3 vlan 1006

     match ip192.168.3.0 255.255.255.0 Gi5/3 vlan 1007

     match ip loose                                                       //Set the AM rule to loosemode. If the loose mode is not configured, clients that do not match the AMrules cannot obtain IP addresses.

Note:The matching of AM rules is matching the interface and VLAN configured in theAM rules, for example, the Gi5/3 interface and VLAN 1005 above. If it isconfirmed that DHCP packets are from the Gi5/3 interface and VLAN 1005, theDHCP packets match the AM rules. In this case, the IP address obtained by theuser must be in the range of 10.1.5.0 to 10.1.5.255 regardless of whether inloose or strict mode. If no AM rule is matched or IP addresses in the range of10.1.5.0 to 10.1.5.255 are all assigned, no IP address can be obtainedregardless of whether in loose mode or strict mode. If no AM rule is matched,it indicates that neither the interface (for example, Gi5/3) nor VLAN (forexample, VLAN 1005) is matched. If no AM rule is matched in loose mode, an IPaddress outside the DHCP address pool is assigned.

2.      Runthe show command to check whether IP addresses in the DHCP address poolare used up.

Collectbasic DHCP information and check whether IP addresses in the DHCP address poolare used up.

showip dhcp pool

Note:If the value in the Percentage column is greater than 80%, addresses inthe DHCP address pool are to be used up.

showip dhcp server statistics  

Note:Focus on the value of the DHCPDELINE field. A larger value indicatesmore IP address conflicts in the network. This field shows the total number ofIP address conflicts since startup. It is recommended to refresh the fieldevery 10 minutes to check whether the value increases greatly. If yes, an IPaddress conflict occurs.

show ip dhcp snooping binding | in H.H.H

Note:Pay attention to the value of DHCP snooping binding entries. If DHCP snoopingis enabled and the number of entries exceeds the specified limit (256,000), nonew DHCP snooping binding entry can be generated. If an entry is displayed, itindicates the MAC address is associated with an IP address.

3.      Run the showip dhcp server agent mac xx.xx.xx command to display the packetexchange for a client to acquire an IP address.

4.      Checkwhether only 802.1x authentication is configured on interfaces, and no securitychannel is configured.
Configure asecurity channel if none is configured.

expert access-list extended 2700

10 permit arp any any 

20 permit udp any any any any eq bootpc 

30 permit udp any any any any eq bootps 

security global access-group 2700 

5.      Checkwhether DHCP packets sent by the client normally reach the RG-N18000.

Manuallyconfigure an IP address to ping the gateway to check the connectivity (the pingoperation fails if authentication is enabled). Alternatively, run the debugcommand to check whether the RG-N18000 receives the packets, and if no, checkthe intermediate network.

debugip dhcp filter mac H.H.H   //Run this command so that only packets of aspecific MAC address are displayed.

debugip dhcp server all

Searchlogs by keywords:

%DHCPD-7-DEBUG:recv dhcp packet from 10.8.8.1 mac 0010.184a.ae10 ifx(4296), l2_port(50),vlan(200), vrf(3) inner_vid (0) vni(0), len=300 

--->>Thislog shows that the DHCP request from the user is received.

%DHCPD-7-DEBUG:send dhcp packet to 10.8.8.1, len=324, ret =324, success!

%DHCPD-7-DEBUG:make ack success, send packet

--->>Thislog shows that the ACK packet is sent to the user.

6.      Checkwhether the DHCP snooping trust port is correctly configured on the downlinkswitch.

switch#show ip dhcp snooping   //Display the DHCP snooping configuration.

Switch DHCP snooping status                    :   ENABLE

DHCP snooping Verification of hwaddrstatus     :   DISABLE

DHCP snooping database write-delaytime         :   0 seconds

DHCP snooping option 82 status                 :   DISABLE

DHCP snooping Support bootp bindstatus         :   DISABLE

Interface                      Trusted        Rate limit (pps)

------------------------       -------         ----------------

GigabitEthernet 1/2            YES            unlimited       

Default                               No              unlimited  

Note:Check whether relevant uplink ports are configured as trusted ports and whethera rate limit is configured on downlink ports.

7.      Enablethe debug function on the RG-N18000, and check the packet interaction based onACL counting (capture packets on the downlink port of the RG-N18000 ifcondition permit) and packet capture on the client.

expertaccess-list extended exp1

20permit udp any host 1111.1111.1111 any any range bootps bootpc (Replace"1111.1111.1111" with the user MAC address.)

90permit etype-any any any

100permit ip any any any any

intte1/1 (faulty port)

expertaccess-group exp1 in

exit

expertaccess-list counter exp1

showaccess-list  --(Check whether packet statistics are collected.)

Thedigit enclosed in the red rectangle indicates that 10 DHCP packets arereceived.

Ifthe client sends out packets but the RG-N18000 does not receive the packets,check whether the intermediate network is reachable.

Ifthe RG-N18000 receives the packets but no relevant log output or response logis generated for the debug command, contact the TAC for handling.

Ifthe RG-N18000 returns a response but the client does not receive it, checkwhether the intermediate network is reachable (check whether ACL or DHCPsnooping is configured).

8.      If DHCPrelay is configured on the RG-N18000, packet interaction between the gateway IPaddress of the access client and the DHCP server is abnormal due to unreachableroute or firewall errors.

Onthe RG-N18000, ping the DHCP server from the source IP address, to checkwhether the DHCP server is reachable.

9.      TheRG-N18000 serves as a DHCP relay, packets between the RG-N18000 and the serverare transmitted at layer 2, and the client is not in the same VLAN as theserver. As a result, the RG-N18000 does not send packets to the clientaccording to the DHCP snooping binding table.

The principles are described as follows:

1.      Theclient is configured on VLAN 60 and the WDS server is configured on VLAN 2.

2.      Theclient with the IP address of 192.168.60.2 from VLAN 60 sends the DHCP-Requestpacket to the WDS server with the IP address of 192.168.0.65. When the packetpasses through the DHCP snooping module of the core device, a temporary entrycontaining the MAC address + VLAN 60 is recorded.

3.      Whenthe WDS server from VLAN 2 responds to the client with the DHCP-ACK packet, thecore device uses MAC address + VLAN 2 for matching in the DHCP snooping tablebut fails to find the temporary entry. As a result, the packet is directly sentto SVI2 and the client fails to receive the DHCP-ACK packet. 

Solution: Run the no ip dhcp snooping vlan 2 (serverVLAN) command on the core device.

10.    Capture packets for interaction between theclient and the RG-N18000. Capture packets of the RG-N18000 and the DHCP server.

7.7.4    Fault Information Collection

Runthe following commands to collect information on the RG-N18000:

debug ip dhcp filter mac H.H.H  //Run this command so that only packets of a specific MAC address aredisplayed.

debug ip dhcp server all

terminal length 0

show ver detail

show run

show ip dhcp pool

show ip dhcp server statistics

show arp | include ***

sho mac-address-table | include ***

show ip dhcp snooping binding

show ip dhcp snooping binding | inH.H.H

show ip dhcp server agent macxx.xx.xx   (supported in version 11.0(1)B3P3)

show nfpp dhcp-guard host

show ip dhcp relay-statistics 

show ip dhcp conflict

show log

show interface counters rate

show interface counters summary

terminal no length

7.7.5    Fault Summary and Notes

7.8     Failure to Access the Internet or InternetAccess Stalling After Authentication

7.8.1    Symptom

Auser fails to access the Internet or the Internet access is stalling afterauthentication.

7.8.2    Possible Causes

1.      Theauthentication fails or the user goes offline immediately after successfulauthentication.

2.      A loopin the downlink device causes random packet loss between the client and thegateway.

3.      A staticIP address is configured for the client and AM rules are configured. Packetsare discarded when no AM rule is met.

4.      Packetsare discarded due to improper routing of the RG-N18000 or intermediate device.

5.      Somepackets are discarded due to very high CPU usage of the device, and incorrectVLAN tags are added to packets due to software bugs.

7.8.3    Handling Steps

1.      On theRG-N18000, run the show web-auth user name *** and show dot1x username*** commands to check whether the user is online. In addition, access Operation> Online User on SAM+ to check whether there are online users.

Ifthe user is offline, rectify the fault based on authentication symptoms byreferring to authentication failure troubleshooting procedures. If the user isonline, proceed to the following step.

2.      Checkthe port rate or logs and check whether there are loops. If a loop exists,rectify the fault by referring to the loop locating manual.

Seethe Procedure for Layer-2 Loop Problem Locating in Simplistic Networks.

3.      If theIP address is manually configured, check the AM configuration.

Inloose mode, data forwarding is allowed for manually configured normal IPaddresses regardless of whether the IP addresses are within the AM range.

Instrict mode, data forwarding is allowed for manually configured IP addressesthat are within the AM range.

4.      Checkrelevant routing entries on the RG-N18000 to check whether more detailed routesare learned from other devices.

5.      Locatethe packet loss point based on ACL-based packet counting or packet capture.

EnableACL-based packet counting on the RG-N18000 (enable packet capture fortroubleshooting if conditions permits).

expertaccess-list extended exp1

20permit arp host 1111.1111.1111 any   //Check whether ARP packets arereceived. Replace "1111.1111.1111" with the user MAC address.

40permit icmp host 1.1.1.1 any any any   //Check whether the ICMP packetsare received. Replace "1.1.1.1" with the user IP address.

90permit etype-any any any

100permit ip any any any any

intte1/2/1            //te1/2/1 is the ingress ofthe RG-N18000.

expertaccess-group exp1 in

expertaccess-list counter exp1    //Enable packet counting for an ACL namedexp1.

TheACL-based packet count above shows whether ARP packets or ICMP packets arelost.

Ifthe RG-N18000 does not receive the ARP packets or ICMP packets, check whetherthe access and aggregation links of the downlink port are faulty.

Ifthe RG-N18000 receives the ARP packets or ICMP packets, check whether ACLs orAM rules for filtering out ARP or ICMP packets are configured.

Ifno filtering is configured, run the debug arp ip + user IP addresscommand to check whether ARP packets are sent to the IP layer. Run the un alcommand to disable the debug function, as shown in the figure below.

IfARP packets are not sent to the IP layer or the RG-N18000 does not send out theresponse from the IP layer, contact the TAC to rectify the fault by using theframe path method.

6.      If theping result shows that no packet loss occurs but it is slow in opening websitesand some websites even cannot be opened, check whether only some websites orall websites have the same problem. If only some websites encounter thisproblem, such websites may be faulty.

Ifmost websites and even some famous websites have this problem, connect theclient to the uplink device of the RG-N18000 for testing. If the faultpersists, check the uplink device or enable packet capture on the border routerto check whether packets are sent out and whether responses are received.

Ifthe Internet access is normal, check whether the RG-N18000 receives andforwards packets normally based on the ACL-based packet counting or packetcapture in the inbound direction of the uplink interface or outbound directionof the downlink interface of the RG-N18000.

expert access-list extended exp1

20 permit ip host 1.1.1.1 any anyany    (Replace "1.1.1.1" with the actual website IPaddress.)

90 permit etype-any any any

100 permit ip any any any any

int te1/2/1              //Uplink interface of the RG-N18000

expert access-group exp1 in

int te1/2/1              //Downlink interface of the RG-N18000

expert access-group exp1 out

expert access-list counter exp1

show access-lists 

Note:Compare the inbound packets and outbound packets counted based on ACLs to checkwhether the RG-N18000 forwards packets normally.

7.      Ifpacket exchange is normal and an MSC card is configured, check whether PBR isconfigured and whether the configured uplink and downlink paths are consistent.See the figure below.

Forspecific configuration, see the Typical Configuration Cases of MSC Cards inSimplistic Networks.

Ifthe configured paths are inconsistent, the MSC card discards packets becausethe packets fail the TCP connection validity check.

Ifthe configuration is free of errors, compare whether the number of packetsreceived by the downlink interface of the RG-N8000 is consistent with that sentby the uplink interface of the RG-N18000 by using the ACL-based packet countingmethod.

7.8.4    Fault Information Collection

1.      Recordfault symptoms clearly, including the fault scope, packet loss frequency, faultpattern, and whether the network is changed before the fault.

2.      Clarifythe network topology so that the TAC learns about the environment, which isconducive to troubleshooting.

7.8.5    Fault Summary and Notes

1.      Recordfault symptoms clearly, including the fault scope, packet loss frequency, faultpattern, and whether the network is changed before the fault.

2.      Clarifythe network topology so that the TAC learns about the environment, which is conduciveto troubleshooting.

3.      Locatethe packet loss point based on ACL-based packet counting or packet capture.

4.      Checkthe configuration or work with the TAC to pinpoint the packet loss cause.

7.9     ACL Statistics Scripts of the TroubleshootingTool

ACLstatistics scripts for:

1.      ARP-basedpacket statistics

2.      ICMP-basedpacket statistics

3.      IP-basedpacket statistics

4.      TCP-basedpacket statistics

5.      UDP-basedpacket statistics

6.      MAC-basedpacket statistics

 

1.      ARP-basedpacket statistics

expertaccess-list extended exp1

   20 permit arp host1111.1111.1111 any   (Check whether ARP packets are received. Replace"1111.1111.1111" with the actual user MAC address.)

   90 permit etype-any anyany

   100 permit ip any anyany any

   exit

int te1/2/1           (te1/2/1is the ingress of the RG-N18000.)

   expert access-group exp1in

   exit

expert access-list counter exp1

show access-lists

2.      ICMP-basedpacket statistics

expertaccess-list extended exp1

   40 permit icmp host1.1.1.1 any any any  (Check whether ICMP packets are received.Replace "1.1.1.1" with the actual user IPaddress.)    

   90 permit etype-any anyany

   100 permit ip any anyany any

   exit

intte1/2/1           (te1/2/1is the ingress of the RG-N18000.)

   expert access-group exp1in

   exit

expert access-list counter exp1

show access-lists

3.      IP-basedpacket statistics

expert access-list extended exp1

      20 permit iphost 1.1.1.1 any any any  (Replace "1.1.1.1" with the actualuser IP address.)

      90 permit etype-any any any

100 permit ip any any any any

        exit

         intte1/2/1 (faulty port)

             expert access-group exp1 in

          exit

           expert access-list counter exp1

           show access-list  --(Check whether packet statistics are collected.)

4.      TCP-basedpacket statistics

expert access-list extended exp1

        20permit tcp host 1.1.1.1 any any any  (Replace "1.1.1.1" with theactual user IP address.)

      90 permit etype-any any any

100 permit ip any any any any

        exit

         intte1/2/1 (faulty port)

             expert access-group exp1 in

          exit

           expert access-list counter exp1

           show access-list  --(Check whether packet statistics are collected.)

5.      UDP-basedpacket statistics

expert access-list extended exp1

        20permit udp host 1.1.1.1 any any any  (Replace "1.1.1.1" with theactual user IP address.)

      90 permit etype-any any any

100 permit ip any any any any

        exit

         intte1/2/1 (faulty port)

             expert access-group exp1 in

          exit

           expert access-list counter exp1

           show access-list  --(Check whether packet statistics are collected.)

6.      MAC-basedpacket statistics

mac access-list extended mac1

      20 permit host 1111.1111.1111 any   

      100 permit any any

      exit

int te1/2/1

      expert access-group mac1 in

      exit

mac access-list counter mac1

showaccess-lists           show access-list  --(Check whether packet statistics are collected.)

7.10 Layer-2 Loop Problem Locating in SimplisticNetworks

7.10.1 Check RLDP logs.

Runthe following command to check RLDP logs to preliminarily locate the ports andVLANs experiencing the loop: show rldp loop-detect-log,

7.10.2 Find out the ports and VLANs that encounter theloop.

Runthe rldp reset and show rldp commands several times and check theneighbor field. Check whether the VLANs and ports change each time afterthe rldp reset command is executed, in an effort to determine the looptype (see the figure below).

7.10.3 Take measures based on the following cases:

7.10.3.1 Same VLAN and same port

TheVLANs and ports causing the loop can be determined after the operations aboveare performed. If the VLANs and ports keep unchanged after the rldp resetcommand is executed several times, the possible topology is as follows:

Operationsteps

1.      Find outthe aggregation switch experiencing the loop based on the ports and find outthe access switch based on the VLANs.

2.      Run thefollowing command to check whether port traffic statistics is abnormal on theaggregation switch and access switch. If yes, rectify the fault step by stepbased on the abnormal traffic. show interface counters rate [up]

3.      If thecondition permits, enable the RLDP function on the aggregation switch andaccess switch (the enabling of RLDP will shut down the loop ports) to checkwhether a loop is detected.

4.      Run the showmac-address-table vlan xx command multiple times to check whetherMAC addresses in the MAC address table have drifted. If MAC addresses havedrifted, a loop occurs on the drift source and destination ports. If no MACaddress drift exists on the access switch, check whether it occurs on theaggregation switch.

7.10.3.2 Same VLAN but different ports

TheVLANs and ports causing the loop can be determined after the operations aboveare performed. If the VLANs keep unchanged but the ports change after the rldpreset command is executed several times, the possible topology is as follows:

Operationsteps

1.      Run the rldpreset and show rldp commands several times and check the neighborfield to find out the ports and VLANs of all loops.

2.      Run the showmac | in vlan command on the aggregation switches at both ends and checkwhether entries of the same MAC address exist.

3.      If yes,the interface corresponding to the MAC address is a loop interface.

7.10.3.3 Different VLANs but same port

TheVLANs and ports causing the loop can be determined after the operations aboveare performed. If VLANs are different but ports are the same after the rldpreset command is executed several times, the possible topology is asfollows:

Operationsteps

1.      Find outthe aggregation switch experiencing the loop based on the ports and find outthe access switch based on the VLANs.

2.      Run the showmac | in vlan command to display the MAC address tables of VLANs on the twoaccess switches and check whether entries of the same MAC address exist.

7.10.3.4 Different VLANs and different ports

Possibletopology:

Operationsteps

1.      Run the rldpreset and show rldp commands several times and check the neighborfield to find out all ports and VLANs experiencing the loop.

2.      Run the showrldp command and check the neighbor field. Check whether theneighbor ports are on the same downlink port of the core switch. 3. Run the showmac | in vlan command on the aggregation switches at both ends and checkwhether entries of the same MAC address exist.

7.10.3.5 Trunk port loop

Possibletopology:

Operationsteps

1.      Run the showrldp command and check the neighbor field. Check whether theneighbor ports are on the same downlink port of the core switch.

2.      Checkwhether MAC address drift occurs on the aggregation switch or check the porttraffic statistics. 

7.10.3.6 Hub loop

Runthe show interface counters summary up command to check traffic statistics ofaccess ports.

7.11 Failure to Query Real-time Traffic of the UserGateway on SAM+ in MSC Card Scenarios

7.11.1 Symptom

Nouser traffic information is found when the real-time traffic of the gateway isqueried on SAM+.

7.11.2 Possible Causes

1.      Configurationsfor interconnecting with SAM+ are improper on the RG-N18000. As a result, IPFIXpackets are exchanged abnormally.

2.      Thegateway policy name added to SAM+ is inconsistent with that added to theRG-N18000. As a result, the user group synchronization between the SAM+ and theRG0N18000 fails.

3.      The PBRis configured incorrectly on the RG-N18000 and MSC, and therefore, traffic isnot diverted to the MSC.

7.11.3 Handling Steps

1.      Checkwhether the interconnection configurations of the RG-N18000 and SAM+ arecorrect.

RG-N18000configuration: The authentication and accounting mode is set to IPFIX.

dot1xacct-method ipfix //Set the 802.1x authentication and accounting mode toIPFIX, to upload traffic information to the SAM+ server (192.168.1.6 indicatesthe source interface, which can be a layer-3 interface or VLAN, or configuredas required.)

Checkwhether the SAM+ configuration is correct.

Thegateway policy name is mandatory, so that the gateway policy can be deliveredto the RG-N18000 and the RG-N18000 can synchronize user information to the MSC.Pay attention to the following items when configuring the gateway policy:

Thegateway policy name should be consistent with that configured on the MSC card,for example, default.

2.      Checkthe PBR configuration.

Usethe client to access an extranet and run the show ip fpm flows | include(IP) command on the MSC card to check the values of SendBytes and RecvBytesand whether traffic is increasing. If the values are 0 or the traffic isnot increasing, check the PBR configuration.

RG-N18000

ip access-list extended pbr-download

 10 permit ip any 10.20.0.00.0.255.255//The network segment is a network segment whose traffic needs to bediverted to the MSC.

ip access-list extended pbr-upload

 10 permit ip 10.20.0.00.0.255.255 any//The network segment is a network segment whose traffic needsto be diverted to the MSC.

 

route-map pbr-upload permit 10

 match ip address pbr-upload

 set ip policy load-balancesrc-ip

 set ip policy no-ttl-decrease

 set ip next-hop10.0.3.2 //LAN address of the MSC card.

!

route-map pbr-download permit 10

 match ip address pbr-download

 set ip policy load-balancedst-ip

 set ip policy no-ttl-decrease

 set ip next-hop 10.0.4.2 //WANaddress of the MSC card.

 

HXJH-18K(config)#int vlan2001 //Invoke PBR-upload on the downlink interface.

HXJH-18K(config-if-VLAN 2001)#ippolicy route-map pbr-upload

 

HXJH-18K(config)#intgi1/23 //Invoke PBR-download on the uplink interface.

HXJH-18K(config-if-GigabitEthernet1/23)# ip policy route-map pbr-download

 

MSC configuration:

ip access-list standardPBR-ACL //Matching needs to be performed on all user traffic.

 10 permit any

 

route-map port2-WAN permit 10

 match ip address user-data

 set ip next-hop10.0.3.1 //Set the next hop of data flows of the WAN port to the IPaddress of the WAN port on the RG-N18000.

 

route-map port1-LAN permit 10

 matchip address user-data

 set ip next-hop10.0.4.1 //Set the next hop of the data flows from the LAN port to the IPaddress of the WAN port on the RG-N18000.

 

MSC(config)#int tenGigabitEthernet0/1

MSC(config-if-TenGigabitEthernet0/1)# ip policy route-map port1-LAN

 

MSC(config)#int tenGigabitEthernet0/2

MSC(config-if-TenGigabitEthernet0/2)# ip policy route-map port2-WAN

7.12 Network Access Exception After Traffic GoesThrough the MSC Card

7.12.1 Symptom

Anetwork access exception occurs after traffic goes through the MSC card.

7.12.2 Possible Causes

1.      Checkwhether the PBR is configured correctly. Incorrect PBR configuration may resultin incorrect traffic diversion.

2.      Thenumber of ACEs on the RG-N18000 exceeds the limit. As a result, a PBR diversionexception occurs.

3.      TheIP connection count exceeds the upper limit, causing failures in opening somewebsites.

4.      Packetscannot be processed and are discarded due to poor MSC performance.

7.12.3 Handling Steps

1.      Checkwhether the PBR is configured correctly. Incorrect PBR configuration may resultin incorrect traffic diversion.

Usethe client to access an extranet and run the show ip fpm flows | include(IP) command on the MSC card to check the values of SendBytes and RecvBytesand whether the traffic is increasing. If the values are 0 or thetraffic is not increasing, check the PBR configuration.

2.      Thenumber of ACEs exceeds the limit. As a result, a PBR diversion exceptionoccurs.

DeletePBR configuration from the interface and reconfigure the PBR (exercise cautionwhen performing this operation), or configure an ACL that can be invoked by anyinterface, and check whether the number of ACEs exceeds the limit. If relevantlogs are produced, it indicates that the number of ACEs exceeds the limit.

3.      TheIP connection count exceeds the upper limit, causing failures in opening somewebsites.

Ifseveral people in a dormitory share one IP address for Internet access, the IPquantity upper limit is small and some connections will be blocked. If a PC,mobile phone, or server has multiple external connections, the Internet accesswill be affected.
Locate the MSC card connected to the faulty client and run the showflow-pre-mgr ip-info  [ip-address] command on the MSC card tocheck the IP connection quantity. In the figure below, the IP connectionquantities of the first two IP addresses reach the upper limit and thecorresponding clients may experience similar access exceptions. See the figurebelow.

4.      Packetscannot be processed and are discarded due to poor MSC performance.

Runthe show interface command to check the value of no buffer. Ifthe value increases rapidly, it indicates that the performance is poor. If thevalue is not zero but increases occasionally, the performance is acceptable.

 

Ruijie Networks websites use cookies to deliver and improve the website experience.

See our cookie policy for further details on how we use cookies and how to change your cookie settings.

Cookie Manager

When you visit any website, the website will store or retrieve the information on your browser. This process is mostly in the form of cookies. Such information may involve your personal information, preferences or equipment, and is mainly used to enable the website to provide services in accordance with your expectations. Such information usually does not directly identify your personal information, but it can provide you with a more personalized network experience. We fully respect your privacy, so you can choose not to allow certain types of cookies. You only need to click on the names of different cookie categories to learn more and change the default settings. However, blocking certain types of cookies may affect your website experience and the services we can provide you.

  • Performance cookies

    Through this type of cookie, we can count website visits and traffic sources in order to evaluate and improve the performance of our website. This type of cookie can also help us understand the popularity of the page and the activity of visitors on the site. All information collected by such cookies will be aggregated to ensure the anonymity of the information. If you do not allow such cookies, we will have no way of knowing when you visited our website, and we will not be able to monitor website performance.

  • Essential cookies

    This type of cookie is necessary for the normal operation of the website and cannot be turned off in our system. Usually, they are only set for the actions you do, which are equivalent to service requests, such as setting your privacy preferences, logging in, or filling out forms. You can set your browser to block or remind you of such cookies, but certain functions of the website will not be available. Such cookies do not store any personally identifiable information.

Accept All

View Cookie Policy Details

Contact Us

Contact Us

How can we help you?

Contact Us

Get an Order help

Contact Us

Get a tech support

Technical Support
Technical Support
Get in Touch
Get in Touch