Compare Products
Hide
VS
Please rate this document.
Please leave your suggestions here.
200 characters leftIf Ruijie may contact you for more details, please leave your contact information here.
* I understand and agree to Terms of Use and acknowledge Ruijie's Privacy Policy.
Thank you for your feedback!
1. Project handover: Obtain the pre-sales solution information of the project from thepre-sales personnel, to understand the main planning of the customer network. Considerthe available project implementation solution based on the equipment list andequipment delivery status.
2. Confirmation of implementation environment: Ensure that preparation of the peripheral environment for projectimplementation is completed, including equipment room construction, power supply (UPS or mains), and cabling of opticalfibers/network cables, to guarantee the implementation progress.
Beforethe implementation, it is necessary to fully understand the customer's onsiteservice application requirements and network construction/reconstructionrequirements. Collect information based on the customer's routine service usageand fully understand the customer's basic and special service requirements, toidentify risks and make plans in advance based on the demarcation andlimitation of the solution. A full understanding of information can providenecessary basis for the development of the implementation solution.
Theinformation to be collected falls into the following categories:
1. Network status:
l Network topology information: includes the actual topology of thelive network, locations of network equipment and servers, configurations oflive network equipment (for in-depth analysis of the live network), and IPaddress and route planning information of live network equipment (routeplanning and routing table details).
2. Service application status:
l The following table describes the current service application, userscale, and network system operation & maintenance (O&M).
Level-1 Directory | Level-2 Directory | Refined Service | Information to Be Collected |
Service application status | Office service | OA, mail, FTP, DNS, and DHCP | Information about whether the OA, mail, and FTP applications have extranet access requirements, have traffic guarantee, and allow access to the intranet or VPN environment |
Scientific research & teaching | Scientific research websites | Routing mode of scientific research websites or resource queries | |
Multimedia teaching and office | Information about whether the conventional client or virtual space system based on the cloud host is used in the multimedia classroom | ||
Online education | Information about whether the campus network provides online education resources, whether the traffic is transmitted over the CERNET or the networks of the three major operators, and whether the bandwidth is largely consumed | ||
Entertainment | Browser-based entertainment, WeChat, QQ, Taobao, games, and videos | Major online behavior of students, whether rate limiting is performed on students, and whether content-accelerated devices are deployed for high-bandwidth applications | |
Campus multicast | 720p/1080p | Number of video program sources in campus network multicast applications, whether the definition standard is HD or ultra HD, and whether video freezing exists at peak hours | |
IPv6 | Resource requirements for accessing CERNETII | Information about whether the campus network provides IPv6 resource services, whether an egress exists on CERNET II, which IPv6 resource services are available, and whether a network node exists for IPv6-based independent interworking with other campus networks. | |
User scale | User type | Leader, teaching staff and relative, student, and visitor | Information about whether the campus network user types are missing, how to assign IP addresses for these users, access mode, and accounting mode |
User count | Scale | Number of users in the campus network and number of online users on the authentication server at peak hours | |
Client type | Smart clients, such as the computer, mobile phone, and tablet | With more access clients and more diversified client types, the number of online users at peak hours poses higher pressure on the core and egress devices. Customers are concerned about security control, authorization, authentication, IP address assignment, behavior auditing, and location of clients. | |
All-in-one cards and dumb clients, such as the printer, water meter, and environment monitoring instrument | |||
Video monitoring and multimedia experiment equipment | |||
Network system O&M status | Information center | Information system and network sources | Information about whether the school has an independent information center, how responsibilities are divided between the information center and network center, and major concerns of the information center and network center |
Network center | O&M system integration | Information about whether a unified network management platform is configured for routine O&M and device management, and whether there are secondary development requirements for working with other application systems in the school | |
Establishment and maintenance status | Self-establishment & self-maintenance, external establishment & external maintenance, and co-establishment & co-maintenance | Campus network types and information about how to maintain campus networks |
3. Basic configuration of the server: includes the server's CPU, memory, disks, network (check theprovided server hardware based on the SAM+ system environment preparations todetermine whether the SAM+ and ePortal requirements are met), operating systemand database versions (check the operating system and database versions basedon the SAM+ system environment preparations to check whether the operatingsystem and database meet the installation requirements), and SAM+ softwareversion purchased by the customer (check whether the software version matcheswith the dongle and meets the project application requirements).
4. Earlier requirements from the customer: Find out the requirements (check the function support status in thescenario based on the higher education industry solution), evaluate whether therequirements can be met ahead of time, and check whether the requirements arewithin the scope of the solution.
5. Requirements for interconnecting with livenetwork equipment: Consider compatibility forinterconnecting with the equipment of other vendors, such as the STP, APaggregation, and SAM+ system.
6. User scale in the campus network: includes the number of areas, teaching buildings, dormitorybuildings, Web authenticated users, 802.1x authenticated users, and MABauthenticated users.
7. User groups of the customer: includes the access authentication and accounting requirements fordifferent types of user groups (mainly access control and accounting policies,preparing for the subsequent access control and associated accounting policiesof user groups).
8. Operation mode of the customer: includes the user registration/deregistration process, paymentmode, and reconciliation mode, which affect the whole network operation.
9. Special service application
l Confirm the processing requirements for the all-in-one cardclients, monitoring clients, and dumb clients with the customer by checking:
l Whether the all-in-one cards are deployed in a private network,which requirements are imposed on solution deployment, whether IP addresses arefixed or automatically obtained, and whether IP address segments or VLANs areconsistent or randomly set.
l Whether the door status control system is deployed in a privatenetwork and which deployment requirements are posed in the solution scenario.
l Whether the printer application is shared at layer 2 or layer 3.
l Whether a MAC forgery scenario occurs.
Area | Deployment and Feature Description |
Core area | Two RG-N18000 switches form a VSU, both connecting to the egress area in the upstream direction. One MSC-ED card is inserted into each RG-N18000 to implement user traffic accounting and control. As the user gateway and authentication NAS device on the whole network, the RG-N18000 simultaneously supports Web authentication, wired 802.1x authentication, and MAB authentication. |
Server area | A SAM+ server and an ePortal server are configured. The SAM+ server collects statistics on the user traffic from the MSC based on the accounting policy. |
Aggregation area | A layer-2 transparent transmission device is connected to the upstream core devices in master/slave VSU mode via dual links. A trunk interface is configured in the aggregation area, but it is only used for layer-2 transparent transmission. |
Access area | A protection port is configured to implement layer-2 isolation. VLAN segments need to be independently planned for special services (such as door status control, all-in-on card, and video monitoring) to distinguish from user service VLANs. |
1. Method
Run the show cpu command inprivileged EXEC mode to check the running status of the CPU:
HXJF-N18K#show cpu
===============================================
[Slot 1: M18000-24GT20SFP4XS-ED, Cpu0]
CPU Using Rate Information
CPU utilization in five seconds:9.3%
CPU utilization in one minute:9.3%
CPU utilization in five minutes:9.3%
2. Criteria
(1) In the healthystate, the value of CPU utilization in five minutes should be less than30%. Pay attention to risks if the CPU usage exceeds 60%.
(2) If a great numberof configurations are made, a great deal of information is displayed, or thedebugging command is configured on the device, the CPU usage may soar instantaneously(normal symptom). Stop the related operation or run the undebug allcommand.
1. Method
HXJF-N18K#show memory
2. Criteria
p.p1 {margin: 0.0px 0.0px 0.0px0.0px; text-align: justify; font: 10.5px Helvetica} span.s1 {font-kerning:none}
Thememory usage should be less than 60%. Bearing more services may increase thememory usage. Pay attention to risks if the memory usage exceeds 80% and tendsto continuously rise.
1. Method
HXJF-N18K#show log
2. Criteria
p.p1 {margin: 0.0px 0.0px 0.0px0.0px; text-align: justify; font: 10.5px Helvetica} span.s1 {font-kerning:none}
Checkwhether exceptions exist in logs, such as frequent up/down state switches ofthe interface, down state of the dynamic protocol, and alarms of higherseverity.
1. Method
Runthe show run command in privilege EXEC mode to check the switchconfigurations:
HXJF-N18K#show run
Pay attention to the following mandatorycommands:
auth-mode gateway //Enablethe gateway mode.
ip radius source-interface (radiusinterface) //Configure an interconnection interface for communicationbetween the RG-N18000 and server.
ip portal source-interface (portal interface)
offline-detect interval 15 threshold0 //Configure no-traffic go-offline.
aaa authorizationip-auth-mode mixed //Configure IP-based AAA authorization.
radius-server attribute nas-port-idformat qinq //Mandatory for the QinQ scenario
qinq termination pe-vlan 100-101 //Configure QinQ VLAN tag termination.
qinq termination ce-vlan 200 to 300
2. Criteria
Checkwhether the deployed functions are consistent with the implementation solution,and whether the functions can be optimized.
1. Method
Enablethe service manager on the SAM+ server to check the running status:
2. Criteria
Fora standalone server, no error is prompted in the service manager. As shown inthe preceding figure, normal prompt information includes: the system is startedsuccessfully, the SAM+ softdog type and validity period are checked, journalsare recorded successfully, and a total of xxx users are processed.
Inthe healthy state, the CPU usage should be less than 30%, and the memory usageless than 60%.
1. Method
(1) Enter the SAM+management page and choose Operation > Log to check O&Mlogs.
(2) Enterthe database backup directory to check sizes of backup files and disk space.
2. Criteria
(1) Ensure that thedatabase shrinks properly.
(2) Ensure thatdatabase index fragments are organized properly.
(3) Ensure that thedatabase is integral.
(4) Ensure thatdatabase parameters are normal.
(5) Ensure that theautomatic database backup is normal.
(6) Ensure thatdatabase files are properly backed up. Ensure sufficient backup disk space toavoid backup failures.
Checkwhether the deployed functions are consistent with the implementation solution,and whether the functions can be implemented and optimized. For example:
1. Checkwhether the number of online authenticated users meets the expectation.
2. Checkwhether accuracy of traffic control meets the expectation.
3. Checkwhether the accounting policies are correct for different user types (such asthe school director, teaching staff and their relatives, and student).
4. Checkwhether an account can log in on multiple clients.
5. Checkwhether different access modes match with different accounting policies.
6. Check whetherthe DHCP check in Web authentication succeeds.
7. Checkwhether users can log in via MAB authentication after the first Webauthentication login.
Performa thorough check on the network running status, including the equipment checkperformed in the normal network running state and the function verificationafter network implementation:
1. Run the showcommand to check the running status of core device functions. For the regularoperation commands, refer to the basic information check and spot check ofaccess devices.
2. Run the traceroutecommand to check the network connectivity and whether data forwarding paths arecorrect. This check aims to test the consistency between the forward and returnpaths in the route design.
Accordingto the configured function verification solution, perform linkconnection/disconnection and switch restart to test the application services,such as the connectivity test and download speed test, so as to verify thenetwork reliability design.
3. Run the pingcommand to test the network delay and processing of large packets.
4. Checkfunctions one by one according to the solution scenarios.
5. Checkthe actual service running status of users at peak hours.
1. Checkthe running status of the RG-N18000 at peak hours.
Ruijie#show cpu //The average CPU usage of the switch should be less than 30% in normalcases.
Ruijie#show cpu-protect mboard
Ruijie#show cpu-protect //Check whether the protocol rate exceeds theexpectation and protocol packets are dropped, to assist in locating the causefor high CPU usage.
Ruijie#show memory //The memory usage of the switch shouldbe less than 60% in normal cases.
Ruijie#show arp counter //Check the ARP aging time and whether the number of ARPentries is normal.
Ruijie#show mac-address-table count//Check the number of MAC address tables on the network.
Ruijie#show ip route //Check the routing table scale on thelive network.
Ruijie#show web-auth user all //Display Web authenticated users.
Ruijie#show dot1x sum //Display 802.1x authenticated users.
2. Checkthe running status of the SAM+ server at peak hours.
Check the number of authenticated userson the SAM+ server, and whether the CPU usage and memory usage are normal.
Guide for Checking Important FunctionalIndicators of the RG-N18000 on Simplistic Network for the Back-to-School Season
show cpu
show cpu | inc postgres
Check the CPU usage of the managementmodule and line card, which should not be greater than 50%.
Check whether the CPU usage of anindependent process approaches 12.5%. If yes, risks may exist and independentanalysis and evaluation are required.
Check the CPU usage of the postgresprocess, which should not stay high.
show memory
Check the memory usage, which should notbe greater than 50%.
show int counters rate up
show int usage up
Check the port utilization, which shouldnot be greater than 80%.
show interface counters errors
Check for the types of error frames.
show interface link-state-changestatistics
Check whether a port becomes up and downrepeatedly for more than 100 times.
show rldp loop-detect-log
Check for loop logs.
show version slots
Check whether the line card is normal.
show temperature
Check whether the temperature is normal.
show fan
show switch virtual topology
show switch virtual link port
Check whether the VSU topology and porttraffic are normal.
show cpu-protect
Check whether the number of packets destinedfor the CPU is normal, whether the rate of important packets is normal, andwhether packet loss occurs.
Pay attention to the following packettypes: arp, dhcp, dot1x, web-auth, web-auths, and rldp.
show logging
Check whether logs are abnormal.
show ip dhcp binding
show ip dhcp pool
show ip dhcp conflict
Check the total number of IP addressesallocated via DHCP and the number allocated IP addresses in each address pool.
Check the status of conflict-incurredfailures.
show arp count
debug bridge mac
show mac count
undebug all
Check the number of static ARP/MACaddresses, which should be equal to the total number of authenticated users.
Check the number of ARP addresses, whichshould be equal to that of IP addresses allocated via DHCP (in the case withoutstatic IP addresses).
show ipv6 neighbors statistics
Check the number of ND entries:
Entries: not greater than three times the numberof ARP entries.
Probe: not greater than 1000.
Incomplete: not greater than 1000.
show web-auth portal
show radius server
Check whether the status of the portalserver is Enable.
Check whether the status of the RADIUSserver is Active.
If the timeouts values of Authen/Authorare high, the authentication may take a long time or the authentication fails.
If the timeouts value of Accountis high, check whether abnormal logs exist on the SAM+ server.
show dot1x
show dot1x authmng abnormal
Check the number of 802.1x users.
Check for abnormal events in 802.1xauthentication.
show web-auth user all
show web-auth authmng abnormal
Check the number of Web authenticatedusers.
Check for abnormal events in Webauthentication.
show run | in off
Check whether only the VLAN-basedno-traffic go-offline period is configured.
show direct-vlan
Check whether the number ofauthentication-free VLANs exceeds 50.
show run | inc remote-span
show run | inc mac-loopback
show monitor
show switch virtual link port
show int usage up
Check whether one-to-many mirroring isconfigured and whether a VSL has approximately full bandwidth.
If yes, it is necessary to takecountermeasures, for example, change the mirroring mode (one-to-one mirroringto the layer-2 switch and flooding to multiple egresses), and change the VSL to40 Gbps.
If no countermeasure is available,contact the TAC and R&D engineers.
show version slot
show agg sum
Check whether an AP across line cards andchassis exists, and whether a VAC solution is used. If a VAC solution is usedand the CPU usage of a line card exceeds 70%, contact the TAC and R&Dengineers.
DLUT-CORE-N18014#show dot1x authmngstatistic
show 802.1x authentication information:
DOT1X current onlinenumber:..................18446744073709551615.
DOT1X historical max onlinenumber:...........0.
DOT1X aggregate online number:................0.
802.1x authentication statistics:
authenticationnumber:........................2322.
authenticationsuccess:.......................0.
authentication successrate:..................0%.
aaa reject : 49
user logoff : 0
conflict account : 0
valid ip mab : 0
adjust authentication successrate:...........0%.
request id timeout :2258-------------->
request timeout :14--------------->
aaa timeout : 1------------------>
other timeout : 0-----------------> The network or server is unstable according tothe preceding four timeout items.
ipam not allowed :0---------------> AM rules are not met.
ip band width fall :0-----------------> IP/bandwidth authorization fails.
set scc fall : 0------------------> SCC setting fails due to bottom layer errors.
author vlan fail : 0
vid modify : 0
prot user limit :0--------------------> The number of users is limited due to configurationerrors.
total user limit :0------------------> The total number of users is limited due toconfiguration errors.
acct cache deny :0--------------------> Accounting results are cached slowly due to theunstable server or network.
other security type :0--------------------> Other security functions are configured generally.
close auth switch :0-------------------> 802.1x authentication is disabled globally.
deny non-rg client :0---------------------> Non-Ruijie clients are filtered out.
mab vlan deny : 0---------------------> The VLAN does not comply with MAB VLANconfigurations.
valid ip : 0--------------------> No IP address is obtained.
set acl fail : 0
port down : 0
not allow user :0
authentication success rssiavgvalue:.........0dBm.
authentication fail rssiavgvalue:............0dBm.
802.1x offline statistics:
offline_total:................................295.
user logoff : 0
server kickout user : 0
no flow : 0-------------------> The user goes offline due to notraffic.
no ip : 0-------------------> The user is forced to gooffline because it fails to obtain an IP address.
session timeout :0-------------------> The available online period times out.
flux out : 0-------------------> The traffic is used up.
svr kickout user : 0
hello timeout : 0-------------------> The client detection times out.
scc rollback : 0-------------------> SCC setting fails due to bottom layer errors.
mac rollback : 0-------------------> MAC setting fails due to bottom layer errors.
ip bandwith fail :0-------------------> Authorization fails. Check whether any configurationerror exists.
mng no port control :0------------------->
mng author change : 0
mng allow user change : 0
mng direct vlan change : 0
mng clear cli : 0
mng ipam change :0
mng staitc mac :0
mng filter mac :0
mng set mumab : 0
mng mab vlan change : 0
mng ip acct change : 0
mng ctrl mode : 0
mng vlan change :0-------------------> The preceding items indicate that configurations arechanged.
port move : 295
vlan move : 0
port-vlan move :0------------------> The preceding items indicate that migration occurs.
invalid ip : 0
port down : 0
gsn fail : 0
mab to 1x : 0-------------------> MAB authentication is replaced by802.1x authentication. Check whether 802.1x authentication is used by the user.
mab to guest vlan : 0
dhcp author fail : 0
db recover fail :0
adb author fail :0--------------------> The preceding VLAN authorization items are generallynot configured in the simplistic network environment.
recover to scc fail :0---------------------> SCC setting fails possibly due to bottom layererrors.
ha recover fail :0----------------------> Hot backup recovery fails possibly due toprocessing logic errors in 802.1x authentication.
ip mab unset ip :0
s mab change : 0
offline_by_auth:.............................0.
request idtimeout :0
request timeout :0
aaa timeout : 0
other timeout : 0
aaa reject : 0
ipam not allowed : 0
ip band widthfall : 0
set scc fall : 0
user logoff : 0
author vlan fail : 0
vid modify : 0
prot user limit :0
total user limit : 0
acct cache deny :0
other securitytype : 0
close auth switch : 0
deny non-rgclient : 0
mabvlan deny : 0
valid ip : 0
setacl fail : 0
port down : 0
not allow user :0
conflict account : 0
valid ip mab : 0-----------------> The preceding items indicate failure statisticscollected during the authentication.
DLUT-CORE-N18014#show web-auth authmngstatistics
Show web authentication information:
current online number:..................................3087. --- Number of current online users
historical max onlinenumber:...........................5071. --- Historical maximum number ofonline users
aggregate onlinenumber:................................344156. --- Total number ofaccumulative online users
Web authentication redirect statistics:
HTTP packet processing:
number ofusers:.......................................12973993 ---Number of users whose HTTP packets are processed
number of HTTP packetsreceived:.......................1543216156 --- Number ofHTTP packets received
redirection time consumption forsuccessful users: --- Time consumption for redirection
average timeconsumption:..............................58ms.
aggregate timeconsumption:............................39285499875ms.
number of less than half onesecond:...................663809946(98.738%).
number of between half and onesecond:.................2082988(0.310%).
number of more than one second:........................6402954.
Web authentication statistic: --Statistics related to Web authentication
authentication processing:
number of authenticationrequests received:............784127.
number of reauthenticationrequests received:..........225537.
number of errorpassword:..............................391339.
number of authenticationfailures:.....................48632(6.202%).
AAAtimeout:..........................................46736(96.101%). --- AAA authentication times out due to the unstable network or server.
authentication statustimeout:........................1(0.002%). --- Authentication device timeout
fail to setSCC:......................................0(0.000%). --- SCC setting fails due to bottom layer errors.
accountingreject:....................................0(0.000%). --- Rejection from the accounting server
accounting dev timeout:...............................0(0.000%). --- Accounting device timeout
userunexist:.........................................1154(2.373%). --- The user does not exist.
portaltimeout:.......................................0(0.000%). --- Portal server timeout
DHCPreleasepkt:......................................0(0.000%). --- No statistics are collected for the following four items. Neglectthem.
stamove:.............................................0(0.000%).
clearuser:...........................................0(0.000%).
configchange:........................................0(0.000%).
other:................................................741.
Authentication time consumption forsuccessful users:
average timeconsumption:..............................94ms. ---- Timeconsumption for authentication
aggregate timeconsumption:............................32609811ms.
number of less than onesecond:........................341995(99.372%).
number of between one andthree second:................667(0.194%).
number of more than threesecond:......................1494(0.434%).
number of less than onesecond(exclude server):........344121(99.990%).
number of between one andthree second(exclude server):6(0.002%).
number of more than threesecond(exclude server):......29(0.008%).
Web authentication offlineinformation: ---- Statistics related to Web usergo-offline
number of offlinecount:................................341069.
number of abnormaloffline(rate):......................408(0.119%).
number of portaltimeout:.............................408(100.000%). --- The user goesoffline because the portal server does not respond, which is possibly resultedfrom an unstable network or server.
number of setfail:...................................0(0.000%). --- SCCsetting fails due to bottom layer errors.
number of linkchange:................................0. --- No statistics are collected.
noflow:...............................................277797. --- The user goes offline due to no traffic.
kickoff:..............................................23745. --- The user is forced to go offline by the server.
dhcprelease:..........................................8971. --- The user goes offline due to DHCP release.
STAdelete:............................................0. --- The user is forced to go offline.
STA move:..............................................0. --- The user goes offline due toclient migration.
activeoffline:........................................15817. --- The user goes offline actively.
session timeout:.......................................9975. --- The user goes offline because theavailable online period times out.
cliclear:.............................................0. --- The user goes offline because the CLI commandis cleared.
nocontrol:............................................0. --- The user goes offline because control isdisabled.
interfacedefault:.....................................0. --- The interface is the default one.
interface destroy:.....................................0. --- The interface is destroyed.
interface addap:......................................0. --- The interface is added to an AP.
delap:................................................0. --- The interface is deleted from an AP.
dhcp ipcheck:.........................................0. --- The user goes offline due to DHCP IP check.
vlanchange:...........................................0. --- The user goes offline due to VLAN changes.
intfvlanchange:.......................................0. --- The user goes offline due to layer-3 VLANconfiguration changes.
other:.................................................4356.
aggregate onlinetime:..................................444256014min
average online time ofuser:............................1304min ---Average online duration of the user
Station-move:
movecount:.............................................969637. --- Number of migrations
movefail:..............................................3550. --- Number of migration failures
Other important processstatistics: --- Timeconsumption statistics of all modules are listed below.
Auth: --- Time consumptionfor Web authentication
average timeconsumption:...............................71ms.
aggregate timeconsumption:.............................24669338ms.
number of less than onesecond:.........................342103(99.403%).
number of more than onesecond:.........................2053.
AAA authentication: --- Time consumption for AAA authentication
average timeconsumption:...............................2ms.
aggregate timeconsumption:.............................1013078ms.
number of less than onesecond:.........................344154(99.999%).
number of more than onesecond:.........................2.
Radius authentication: --- Time consumption for RADIUS authentication
average timeconsumption:...............................0ms.
aggregate timeconsumption:.............................78760ms.
number of less than onesecond:.........................344156(100.000%).
number of more than onesecond:.........................0.
Radius server authentication: --- Timeconsumption for RADIUS server authentication
average timeconsumption:...............................55ms.
aggregate timeconsumption:.............................19158014ms.
number of less than onesecond:.........................342113(99.406%).
number of more than one second:.........................2043.
SCC: --- Timeconsumption for SCC setting
average timeconsumption:...............................0ms.
aggregate timeconsumption:.............................9349ms.
number of less than onesecond:.........................344156(100.000%).
number of more than onesecond:.........................0.
Accounting: --- Time consumption for accounting
average timeconsumption:...............................23ms.
aggregate timeconsumption:.............................7930055ms.
number of less than onesecond:.........................344050(99.969%).
number of more than onesecond:.........................106.
AAA accounting: --- Time consumption for AAA accounting
average timeconsumption:...............................3ms.
aggregate timeconsumption:.............................1081861ms.
number of less than onesecond:.........................344154(99.999%).
number of more than onesecond:.........................2.
Radius accounting: --- Time consumption for RADIUS accounting
average time consumption:...............................1ms.
aggregate timeconsumption:.............................630452ms.
number of less than onesecond:.........................344127(99.992%).
number of more than onesecond:.........................29.
Radius server accounting: --- Time consumption for RADIUS server accounting
average timeconsumption:...............................2ms.
aggregate timeconsumption:.............................828579ms.
number of less than one second:.........................344081(99.978%).
number of more than onesecond:.........................75.
Portal: --- Time consumption of the portalserver
average time consumption:...............................0ms.
aggregate timeconsumption:.............................0ms.
number of less than onesecond:.........................344156(100.000%).
number of more than onesecond:.........................0.
Device Type | Product Type | Product Model | Quantity of Clients Supported in Authentication |
RG-N18000 | Supervisor module | CM | 600 for Web authentication; 3000 for 802.1x authentication |
RG-N18000 | Supervisor module | CM II | 60000 |
N18007 | Supervisor module | CM | 600 for Web authentication; 3000 for 802.1x authentication |
N18007 | Supervisor module | CM II | 60000 |
N18007 | Supervisor module | CM II-LITE | 15000 |
Device Type | Product Type | Product Model | Quantity of Supported Online Dual-stack Clients (ARP) |
RG-N18000/N18007 | Line card | ED card | 60000 |
RG-N18000/N18007 | Line card | DB card | 30000 |
Device Type | Product Type | Product Model | Quantity of Inner VLANs Supported in QinQ Scenarios |
RG-N18000/N18007 | Line card | ED card | 511 |
RG-N18000/N18007 | Line card | DB card | 61 |
Device Type | Product Type | Product Model | Quantity of Supported MAC Tables |
RG-N18000/N18007 | Line card | ED card | 128000 |
RG-N18000/N18007 | Line card | DB card | 96000 |
Device Type | Product Type | Product Model | Supported DHCPv4 Capacity |
RG-N18000 | Supervisor module | CM | 8000 |
RG-N18000 | Supervisor module | CM II | 90000 |
N18007 | Supervisor module | CM | 8000 |
N18007 | Supervisor module | CM II | 90000 |
N18007 | Supervisor module | CM II-LITE | 90000 |
Device Type | Product Type | Product Model | Supported DHCP Snooping Capacity |
RG-N18000 | Supervisor module | CM | 8000 |
RG-N18000 | Supervisor module | CM II | 90000 |
N18007 | Supervisor module | CM | 8000 |
N18007 | Supervisor module | CM II | 90000 |
N18007 | Supervisor module | CM II-LITE | 90000 |
Device Type | Product Type | Product Model | Supported DHCPv6 Capacity |
RG-N18000 | Supervisor module | CM | 8000 |
RG-N18000 | Supervisor module | CM II | 90000 |
N18007 | Supervisor module | CM | 8000 |
N18007 | Supervisor module | CM II | 90000 |
N18007 | Supervisor module | CM II-LITE | 90000 |
Device Type | Product Model | Whether Flexible QinQ Supported | Recommended Version | Description |
Aggregation | S5750 series (hardware V1.0) | Yes | 10.4(3)p4 release(161753) | Only 768 outer VIDs are supported for inner/outer VID mapping. |
Aggregation | S5750 series (hardware V2.0) | Yes | 10.4(3)p4 release(161753) | N/A |
Aggregation | S5750E series | Yes | 10.4(3b18)p2,Release(207466) | N/A |
Aggregation | S29E | Yes | 10.4(2b12)p2 release(180357) | N/A |
Aggregation | S2910XS-E series | Yes | S2910_RGOS 11.4(1)B1 | N/A |
Aggregation | S6200 | Yes | 10.4(5b1) release(150539) | N/A |
Aggregation | S5760 series | No | N/A | The device needs to be replaced. |
Aggregation | S26 series | No | N/A | The device needs to be replaced. |
Aggregation | S7610 | No | N/A | The device needs to be replaced. |
Aggregation | S7604 | No | N/A | The device needs to be replaced. |
Aggregation | S35 | No | N/A | The device needs to be replaced. |
Aggregation | NBS5526XG | No | N/A | The device needs to be replaced. |
Level-1 Specifications | Level-2 Specifications | Level-3 Specifications | RG-N18000 (ED) | RG-N18000 (DB) |
Authentication capacity | Web authentication | Web user capacity | 60,000 for dual-stack | 30,000 for dual-stack |
802.1x authentication | 802.1x user capacity | 60,000 for dual-stack | 30,000 for dual-stack | |
Web MAB authentication | Web MAB authentication capacity | 60,000 for dual-stack | 30,000 for dual-stack | |
IPv4 application protocol features | DHCP server | Quantity of users supported by the DHCP server | 256K | 256K |
DHCP relay | Quantity of supported servers | N/A | N/A | |
DHCP snooping | Capacity of software-bound database | 256K | 256K | |
Layer-2 features | MAC address | Quantity of global MAC addresses (the maximum quantity of MAC addresses supported by the MAC address table need to be learned in full mesh mode) |
|
|
Quantity of static MAC addresses | 10000 | 10000 | ||
Quantity of filtered MAC addresses | 10000 | 10000 | ||
MAC address learning rate | 2000/S | 2000/S | ||
| Quantity of clients | Quantity of clients (for IPv4/IPv6 dual-stack, each client is assigned with an IPv6 address and an IPv4 address) | CM: 5000 for the case with only 802.1x authentication | CM: 5000 for the case with only 802.1x authentication |
Layer 3 Features | ARP | ARP entry capacity (the maximum quantity of ARP entries supported by the ARP table need to be learned in full mesh mode) | Default mode: 170,000 (sharing resources with ND) | Default mode: 85000 (sharing resources with ND) |
ARP learning rate | CM I: 3000/s; CM II: 10,000/s | CM I: 3000/s; CM II: 10,000/s | ||
ND | ND entry capacity (the maximum quantity of ND entries supported by the ND table need to be learned in full mesh mode) | CM: 5000 | CM: 5000 | |
ND learning rate | CM I: 1500/s; CM II: 5000/s | CM I: 1500/s; CM II: 5000/s | ||
IPv4 | Quantity of IP addresses set on each layer-3 interface | 4000 | 4000 | |
Capacity of IPv4 hardware routing table (the maximum quantity of routing entries supported by the routing table need to be learned in full mesh mode) | Default mode: 12,000 | Default mode: 384000 | ||
Capacity of static routing table | The default value is 1024. A command can be used to configure a maximum of 10,000 routes. | The default value is 1024. A command can be used to configure a maximum of 10,000 routes. | ||
Quantity of equal-cost routes supported by each route | 32 | 32 | ||
Quantity of routes supporting equal-cost routing | 64 | 64 | ||
Quantity of weighted next-hop routes supported by each route | 8 (Weight = 4) | 8 (Weight = 4) | ||
Multicast routing table | 16000 | 16000 | ||
IPv6 | Quantity of IPv6 addresses set on each layer-3 interface | 1000 at most | 1000 at most | |
Capacity of IPV6 hardware routing table (network routes) (the maximum quantity of routing entries supported by the routing table need to be learned in full mesh mode) | Default mode: 6000 | Default mode: 1000 | ||
Capacity of routing table supporting the subnet mask length of 65–128 (If no description is made, the capacity is not limited by the subnet mask length and the hardware routing table capacity prevails.) | Default mode: 1000 | Default mode: 4000 | ||
Capacity of static IPv6 routing table | 1000 | 1000 | ||
Quantity of IPv6 tunnel interfaces | 127 | 127 | ||
Multicast routing table | 8000 | 8000 | ||
PBRv4 | Quantity of supported policy-based routes | 1500–7000 | 1500–7000 | |
Quantity of equal-cost routes supported by each policy-based route | 32 | 32 | ||
PBR v6 | Quantity of supported policy-based routes | 1500–3000 | 1500–3000 | |
Quantity of equal-cost routes supported by each policy-based route | 32 | 32 | ||
ACL | ACE capacity | Maximum number of inbound ACE entries associated with the SVI | 7000 | 7000 |
Maximum number of inbound ACE entries associated with the physical port/AP | 7000 | 7000 | ||
Maximum number of outbound ACE entries associated with the SVI (simulated based on inbound ACE entries, limited, and with inbound entries occupied) | N/A | N/A | ||
Maximum number of outbound ACE entries associated with the SVI (actual outbound ACE entries) | 1000 | 1000 | ||
Maximum number of outbound ACE entries associated with the physical port/AP (simulated based on inbound ACE entries) | N/A | N/A | ||
Maximum number of outbound ACE entries associated with the physical port/AP (actual outbound ACE entries) | 1000 | 1000 |
Thesimplistic network access isolation solution employs one VLAN for each accessswitch, and allows locating the specific access switch according to the VLANID. In addition, this solution provides layer-2 isolation for all users,effectively preventing layer-2 broadcast packet attacks and ARP and DHCPspoofing attacks.
1. The coreRG-N18000 serves as the gateway and authentication NAS device on the whole network:
l A maximum of 60,000 online dual-stack clients are supported incoordination with ED cards, and a maximum of 30,000 online clients aresupported in coordination with DB cards or both of ED and DB cards.
l Web authentication, wired 802.1x authentication, and MABauthentication are simultaneously supported. Wireless 802.1x authentication isnot supported currently, because it needs to bedeployed on the AC.
l Wireless 802.1x VLANs, AP management VLANs, and other specialservice VLANs requiring no authentication (such as door status control,all-in-one card, and video monitoring) are configured as authentication-freeVLANs.
l As the core layer-2 gateway, the RG-N18000can support the super VLAN function to perform aggregation gatewayconfigurations for sub VLANs. One super VLAN can be deployed for each area, forexample, one super VLAN for the office area of the xx campus and one super VLANfor the student dormitory area of the xx campus.
l The ARP proxy function is enabled on the super VLAN gateway of the coredevice by default, to guarantee layer-3 communication between sub VLANs anddecrease ARP flooding traffic.
l The port protection function needs to be configured on the downlinkinterface of the core device (by running the switchport protectedcommand), to prevent layer-2 broadcast between the same VLANs in differentareas. In addition, unused VLANs need to be pruned to minimize the broadcastdomain.
l The SVI of the super VLAN gateway needs tobe set to OSPF passive if OSPF is configured.
2. Theaggregation device serves as layer-2 transparent transmission device:
l The VLAN and trunk interfaces areconfigured for layer-2 transparent transmission only.
l The SVI of the user gateway needs to be set to OSPF passive if theconventional 3-layer network is deployed and OSPF is configured on theaggregation device.
l The port protection function needs to beconfigured on the downlink interface of the aggregation device (by running the switchportprotected command), to prevent layer-2 broadcast between the same VLANs in differentareas. In addition, unused VLANs need to be pruned to minimize the broadcastdomain.
l The storm suppression function isconfigured to suppress broadcast packets at 1000 pps and multicast packets at1000 pps. In addition, this function needs to be adjusted according to the livenetwork applications. For example, if multicast services exist on the livenetwork, do not configure multicast packet suppression and suppress broadcastpackets at 1000 pps.
3. Theaccess device provides user-based layer-2 isolation:
l The same VLAN is configured on all interfaces of each accessswitch, and different VLANs are configured for different access switches.
l The port protection function needs to beconfigured on the interfaces of each switch (by running the switchport protectedcommand), to implement layer-2 VLAN isolation.
l Different VLANs need to be configured fordifferent access switches, with incremental VLAN IDs.
l VLAN segments need to be independently planned for special services(such as door status control, all-in-on card, and video monitoring) todistinguish from user service VLANs, to facilitate authentication-free VLANconfiguration on the core device for special services.
l RDLP is enabledon the interface of the access device connected to the clients, and an anti-looppolicy is configured to shut down a port upon a loop.
l The storm suppression function is enabled on the interfaces of the access deviceconnected to the clients, to suppress broadcast packets at 300 pps andmulticast packets at 300 pps. In addition, this function needs to be adjustedaccording to the live network applications. For example, if multicast servicesexist on the live network, do not configure multicast packet suppression andsuppress broadcast packets at 1000 pps.
1. In the case ofnetwork construction, an access cascading scenario exists in the live networkand flexible QinQ is not supported on the aggregation device.
Suggestionfor the wired network scenario: It is recommended to deploy access isolation,configure one VLAN for each switch, and configure one super VLAN for each area(such as the office area of the xx campus, library of the xx campus, andstudent dormitory area of the xx campus).
2. In the case of networkreconstruction, it is unclear whether devices are interconnected and whetherflexible QinQ is supported.
Suggestionfor the wired network scenario: It is recommended to deploy access isolation,configure one VLAN for each switch, and configure one super VLAN for each area(such as the office area of the xx campus, library of the xx campus, andstudent dormitory area of the xx campus).
Configure one VLAN (sub VLAN) for theaccess switch of each floor, and one super VLAN for each area (such as thestudent dormitory area of the xx campus).
Reserve VLANs (30% or more) for each areafor further network change or expansion.
Reference templates:
Wired network VLAN/IP planning for thestudent dormitory area:
Device Model | Device Type | Location | Management Address | Sub VLAN | Super VLAN | Network Segment (planned according to rules, with the actual subnet mask length being /16) | Gateway | Network Management VLAN | Video Monitoring VLAN | All-in-one Card VLAN | Door Status Control VLAN |
S2928G | Floor access switch | 1/F, building 1, student dormitory area | 192.168.132.1 | 1001 | 4000 | 172.16.0.0/24 | 172.16.15.254/16 | 100 | 101 | 102 | 103 |
S2928G | Floor access switch | 2/F, building 1, student dormitory area | 192.168.132.2 | 1002 |
|
|
|
|
|
|
|
S2928G | Floor access switch | 1/F, building 2, student dormitory area | 192.168.132.3 | 1003 |
| 172.16.1.0/24 | 172.16.15.254/16 |
|
|
|
|
S2928G | Floor access switch | 2/F, building 2, student dormitory area | 192.168.132.4 | 1004 |
|
|
|
|
|
|
|
S2928G | Floor access switch | 1/F, building 3, student dormitory area | 192.168.132.5 | 1005 |
| 172.16.2.0/24 | 172.16.15.254/16 |
|
|
|
|
S2928G | Floor access switch | 2/F, building 3, student dormitory area | 192.168.132.6 | 1006 |
|
|
|
|
|
|
|
S2928G | Floor access switch | 1/F, building 4, student dormitory area | 192.168.132.7 | 1007 |
| 172.16.3.0/24 | 172.16.15.254/16 |
|
|
|
|
S2928G | Floor access switch | 2/F, building 4, student dormitory area | 192.168.132.8 | 1008 |
|
|
|
|
|
|
|
S2928G | Floor access switch | 1/F, building 5, student dormitory area | 192.168.132.9 | 1009 |
| 172.16.4.0/24 | 172.16.15.254/16 |
|
|
|
|
S2928G | Floor access switch | 2/F, building 5, student dormitory area | 192.168.132.10 | 1010 |
|
|
|
|
|
|
|
S2928G | Floor access switch | 1/F, building 6, student dormitory area | 192.168.132.11 | 1011 |
| 172.16.5.0/24 | 172.16.15.254/16 |
|
|
|
|
S2928G | Floor access switch | 2/F, building 6, student dormitory area | 192.168.132.12 | 1012 |
|
|
|
|
|
|
|
S2928G | Floor access switch | 1/F, building 7, student dormitory area | 192.168.132.13 | 1013 |
| 172.16.6.0/24 | 172.16.15.254/16 |
|
|
|
|
S2928G | Floor access switch | 2/F, building 7, student dormitory area | 192.168.132.14 | 1014 |
|
|
|
|
|
|
|
S2928G | Floor access switch | 1/F, building 8, student dormitory area | 192.168.132.15 | 1015 |
| 172.16.7.0/24 | 172.16.15.254/16 |
|
|
|
|
S2928G | Floor access switch | 2/F, building 8, student dormitory area | 192.168.132.16 | 1016 |
|
|
|
|
|
|
|
S2928G | Floor access switch | 1/F, building 9, student dormitory area | 192.168.132.17 | 1017 |
| 172.16.8.0/24 | 172.16.15.254/16 |
|
|
|
|
S2928G | Floor access switch | 2/F, building 9, student dormitory area | 192.168.132.18 | 1018 |
|
|
|
|
|
|
|
S2928G | Floor access switch | 1/F, building 10, student dormitory area | 192.168.132.19 | 1019 |
| 172.16.9.0/24 | 172.16.15.254/16 |
|
|
|
|
S2928G | Floor access switch | 2/F, building 10, student dormitory area | 192.168.132.20 | 1020 |
|
|
|
|
|
|
|
S2928G | Floor access switch | 1/F, building 11, student dormitory area | 192.168.132.21 | 1021 |
| 172.16.10.0/24 | 172.16.15.254/16 |
|
|
|
|
S2928G | Floor access switch | 2/F, building 11, student dormitory area | 192.168.132.22 | 1022 |
|
|
|
|
|
|
|
1. The simplisticnetwork wireless isolation solution employs one super VLAN for each area (forexample, a super VLAN for the office area of the xx campus), and two sub VLANsfor each building in the area (one for wireless Web authentication and theother for wireless 802.1x authentication). This solution helps you locatewireless users to a specific building based on the VLAN, and enables wirelessuser isolation to prevent layer-2 broadcast packet attacks and ARP and DHCPspoofing attacks.
2. Thissolution also supports super VLANs based on the SSID, for example, one superVLAN separately for 802.1x authenticated student users, 802.1x authenticatedteacher users, Web authenticated student users, and Web authenticated teacherusers. This solution employs sub VLANs based on the area, building, and floorto control the scope of the broadcast domain.
1. Thecore RG-N18000 serves as the gateway and authentication NAS device on the wholenetwork:
l A maximum of 60,000 online dual-stack clients (a maximum of 90,000 onlineclients in theory) are supported in coordination with ED cards, and a maximumof 30,000 online clients are supported in coordination with DB cards or both ofED and DB cards.
l Web authentication, wired 802.1x authentication, and MABauthentication are simultaneously supported. Wireless 802.1x authentication isnot supported currently, because it needs to be deployed on the AC.
l Wireless 802.1x VLANs and AP management VLANs are configured asauthentication-free VLANs.
l As the core layer-2 gateway, the RG-N18000 can support the superVLAN function to perform aggregation gateway configurations for sub VLANs. Onesuper VLAN can be deployed for each area, for example, one super VLAN for theoffice area of the xx campus and one super VLAN for the student dormitory areaof the xx campus.
l The ARP proxy function is enabled on the super VLAN gateway of thecore device by default, to guarantee layer-3 communication between sub VLANsand decrease ARP flooding traffic.
l The port isolation function needs to be configured on the downlinkinterface of the core device, to prevent layer-2 broadcast between the sameVLANs in different areas. In addition, unused VLANs need to be pruned tominimize the broadcast domain.
2. The ACserves as wireless controller in fit mode to perform the basic wirelessconfigurations and simplistic network planning configurations:
l The basic wireless configuration mode is set to support centralizedforwarding or local forwarding.
l Wireless user isolation is configured to prevent an overlargewireless user broadcast domain in a VLAN.
l The ARP proxy function is disabled on the AC, so that the RG-N18000serves as the ARP proxy, to prevent failures in migration of wirelessauthenticated users.
l One super VLAN is configured for each area, for example, one superVLAN for the office area of the xx campus.
l Two sub VLANs are configured for the AP of each building, one forwireless Web authentication and the other for wireless 802.1x authentication.
l SSIDs are set based on the operator and authentication mode, forexample, SSID 1 for operator A - Web authentication, SSID 2 for operator A -802.1x authentication, SSID 3 for operator B - Web authentication, and SSID 4for operator B - 802.1x authentication.
The wireless simplistic network uses thewireless isolation solution.
l Configure one super VLAN for each area, for example, one super VLANfor the office area of the xx campus.
l Configure two sub VLANs for the AP of each building, one forwireless Web authentication and the other for wireless 802.1x authentication.
l Set SSIDs based on the operator and authentication mode, forexample, SSID 1 for operator A - Web authentication,SSID 2 for operator A - 802.1x authentication, SSID 3 for operator B - Webauthentication, and SSID 4 for operator B - 802.1x authentication.
l Reserve VLANs (30% or more) for each areafor further network change or expansion.
Reference templates:
Wired network VLAN/IP planning for thestudent dormitory area:
Location | AP Management VLAN | AP Management Segment | Gateway | Web Authentication Sub VLAN | 802.1x Authentication Sub VALN | Super VLAN | Network Segment | Gateway | Web Authentication SSID | 802.1x Authentication SSID |
Building 1, student dormitory area | 900 | 192.168.16.0/20 | 192.168.31.254 | 3001 | 3501 | 4201 | 172.16.64.0/20 | 172.16.79.254/20 | web-auth | 802.1x-auth |
Building 2, student dormitory area | 900 | 192.168.16.0/20 | 192.168.31.254 | 3002 | 3502 | 4201 | 172.16.64.0/20 | 172.16.79.254/20 | web-auth | 802.1x-auth |
Building 3, student dormitory area | 900 | 192.168.16.0/20 | 192.168.31.254 | 3003 | 3503 | 4201 | 172.16.64.0/20 | 172.16.79.254/20 | web-auth | 802.1x-auth |
Building 4, student dormitory area | 900 | 192.168.16.0/20 | 192.168.31.254 | 3004 | 3504 | 4201 | 172.16.64.0/20 | 172.16.79.254/20 | web-auth | 802.1x-auth |
Building 5, student dormitory area | 900 | 192.168.16.0/20 | 192.168.31.254 | 3005 | 3505 | 4201 | 172.16.64.0/20 | 172.16.79.254/20 | web-auth | 802.1x-auth |
Building 6, student dormitory area | 900 | 192.168.16.0/20 | 192.168.31.254 | 3006 | 3506 | 4201 | 172.16.64.0/20 | 172.16.79.254/20 | web-auth | 802.1x-auth |
Building 7, student dormitory area | 900 | 192.168.16.0/20 | 192.168.31.254 | 3007 | 3507 | 4201 | 172.16.64.0/20 | 172.16.79.254/20 | web-auth | 802.1x-auth |
Building 8, student dormitory area | 900 | 192.168.16.0/20 | 192.168.31.254 | 3008 | 3508 | 4201 | 172.16.64.0/20 | 172.16.79.254/20 | web-auth | 802.1x-auth |
Building 9, student dormitory area | 900 | 192.168.16.0/20 | 192.168.31.254 | 3009 | 3509 | 4201 | 172.16.64.0/20 | 172.16.79.254/20 | web-auth | 802.1x-auth |
Building 10, student dormitory area | 900 | 192.168.16.0/20 | 192.168.31.254 | 3010 | 3510 | 4201 | 172.16.64.0/20 | 172.16.79.254/20 | web-auth | 802.1x-auth |
Building 10, student dormitory area | 900 | 192.168.16.0/20 | 192.168.31.254 | 3011 | 3511 | 4201 | 172.16.64.0/20 | 172.16.79.254/20 | web-auth | 802.1x-auth |
Principles:
Inthe simplistic network solution, the core device acts as the gateway of theentire network, and controls access authentication. Users can be normallyauthenticated and go online only after the authentication mode is set togateway authentication mode and dot1x or Web authentication is enabled.
Otherwise, when the number of 802.1x/Webauthenticated users reach about 2000, the system prompts that the TCAM table isfull and 802.1x/Web authentication is abnormal.
Incomparison to the conventional network, the simplistic network in gateway modehas the following features:
1. Anauthenticated client is automatically bound with a static ARP address on theRG-N18000.
2. TheRG-N18000 automatically enables the ARP proxy function on the SVI interface ofa super VLAN. The ARP proxy can be disabled on a sub VLAN. (Valid toauthenticated users)
3. TheRG-N18000 does not actively send ARP requests to a sub VLAN of a super VLANconfigured on an interface with authentication under control. Instead, theRG-N18000 actively sends ARP requests to authentication-free VLANs and commonVLANs.
4. Ingateway mode of the simplistic network, the ip source-guard command doesnot take effect.
Configuration commands:
auth-modegateway //Configured in global configuration mode.
Precautions:
Thiscommand takes effect only after it is configured and saved and the device isrestarted. After the device is restarted, run the show run command tocheck whether the configuration takes effect.
Configuration example
Configuration Steps | Set the authentication mode to the gateway authentication mode on the core gateway Switch A. |
Switch A | SwitchA(config)#auth-mode gateway Please save config and reload system. SwitchA(config)#exit *Nov 7 10:13:27: %SYS-5-CONFIG_I: Configured from console by console SwitchA#reload Reload system?(Y/N)y SwitchA# |
Verification | Run the show running command to check whether the configuration takes effect. |
Switch A | SwitchA(config)#show running-config | include auth-mode auth-mode gateway SwitchA#debug scc st ================== sccd server info ================= rdnd role : 2/2. ready notify : CLI LSM BRIDGE SS ACLK BRIDGE-READY TCPIP VFW aclk-socket info: async - 8, sync - 9, alive - 7. snd_cnt:692. rcv_cnt:692 data sync info : depend/ready(0x201e/0x201e) aclk(req:0) ss(req:0) mac(req:0) current scc mode: GATE MODE, new mode(GATE MODE). ability: 0x3f. offline-status : open, interval:6 min, threshold:0 bytes. station move : close. dot1x cpp : set. author mode:D1xAuthorMixed. proc status : svrid:75 todo-cnt:0 ret-cnt:0. max wait : client:9, cost:16(ms) max proc : client:11, svrid:72, tlvtype:105, ss-cnt:0, aclk-cnt:0 rv:0. cost:748(ms). cnt-stat : web-query-add-arp:[0], web-query-del-arp:[0]. : add-arp:[2], del-arp:[1]. : add-mac:[2], del-mac:[1]. |
Principles:
The super VLAN technology is used toimplement flat layer 2 networks for gateways. Super VLAN is also called VLANaggregation. The aggregated VLAN range is called sub VLAN of the super VLAN. Asuper VLAN has the following features:
Each sub VLAN has the same functions ascommon VLANs. Different sub VLANs belong to different broadcast domains, andcannot access each other due to layer-2 isolation.
The SVI address of a super VLAN serves asthe gateway address of the sub VLAN of the super VLAN.
When a sub VLAN requires layer-3communication, the IP address of the virtual interface of the super VLAN isused as the gateway address for addressing and forwarding.
When sub VLANs need to access each other,the ARP proxy and ND proxy of the super VLAN need to be configured.
Note: When super VLANs and sub VLANs areconfigured in the simplistic network solution, super VLAN IDs are used only onSVIs, while sub VLAN IDs are used for AM rules, QinQ VLAN tag termination, anddirect VLANs that need the VLAN ID range.
Configuration commands:
vlan(supervlan) //Createa VLAN.
supervlan //Definethe VLAN as a super VLAN.
subvlan(subvlan-list) //Definethe sub VLAN range for the super VLAN.
name(supervlan-name) //Namethe super VLAN.
intvlan (supervlan) //Createthe gateway SVI for the super VLAN.
ipaddress (ip/netmask) //Definethe gateway address and mask.
Precautions:
An SVIand an IP gateway need to be configured for a super VLAN. Otherwise,communication is not supported between sub VLANs or between sub VLANs and otherVLANs.
The ARPproxy is enabled by default. If the ARP proxy is disabled on a super VLAN orsub VLAN, users of sub VLANs cannot perform inter-VLAN communication.
Configuration example
Configuration Steps | Configure a super VLAN on the core switch. (Omitted) On the access switch, configure common VLANs corresponding to sub VLANs of the core switch. |
A | SwitchA#configure terminal Enter configuration commands, one per line. End with CNTL/Z. SwitchA(config)#vlan 2 SwitchA(config-vlan)#exit SwitchA(config)#vlan 10 SwitchA(config-vlan)#exit SwitchA(config)#vlan 20 SwitchA(config-vlan)#exit SwitchA(config)#vlan 30 SwitchA(config-vlan)#exit SwitchA(config)#vlan 2 SwitchA(config-vlan)#supervlan SwitchA(config-vlan)#subvlan 10,20,30 SwitchA(config-vlan)#exit SwitchA(config)#interface vlan 2 SwitchA(config-if-VLAN 2)#ip address 192.168.1.1 255.255.255.0 SwitchA(config)#interface range gigabitEthernet 0/1,0/5,0/9 SwitchA(config-if-range)#switchport mode trunk
|
|
|
Verification | Check whether the source device (192.168.1.10) and the destination device (192.168.1.60) can ping each other successfully. |
A | SwitchA(config-if-range)# show supervlan supervlan id supervlan arp-proxy subvlan id subvlan arp-proxy subvlan ip range ------------ ------------------- ---------- ----------------- --------- 2 ON 10 ON 192.168.1.10 - 192.168.1.50 20 ON 192.168.1.60 - 192.168.1.100 30 ON 192.168.1.110 - 192.168.1.150
|
Principles:
Thesimplistic network solution implements layer-2 user isolation by usingprotected ports. A protected port can prevent layer-2 forwarding within oneVLAN of the same switch. When ports are configured as protected ports,protected ports of the same VLAN cannot communicate with each other but aprotected port can normally communicate with a non-protected port.
Configuration commands:
switchportprotected //Configured in interface configuration mode.
Precautions:
N/A
Configuration example
Ruijie(config)#interfaceGigabitEthernet 0/1
Ruijie(config-if-GigabitEthernet0/1)# switchport protected
Principles:
Theinterface index of each port is unique. You can run the show interfacecommand to display the Index field. After the device restarts, theinterface index of the device may change. As a result, the area divisionfunction of SAM+ will fail. It is recommended to enable the interface indexuniqueness function. After this function is configured, interface indexes arepermanently recorded by the device. They do not change even if the device isrestarted or a line card is removed and then inserted.
Configuration commands:
Ruijie(config)#snmp-server if-indexpersist //Enableinterface index uniqueness.
Precautions:
N/A
Configuration example
N/A
Principles:
Some users on SAM+ may fail to go offlinenormally due to exceptions. For this, SAM+ automatically checks online userswith the NAS at 02:00 A.M. every day, to delete information about fake onlineusers.
Configuration commands:
snmp-server host (radiusip) informs version 2c (key) //ConfigureSNMP for communicating with SAM+.
Precautions:
Configurerelated information on SAM+.
Configuration example
N/A
Principles:
The DHCP snooping feature provides thefollowing functions in simplistic networks:
1. A simplistic networkadopts the flat layer-2 gateway architecture. DHCP snooping can prevent DHCPspoofing within the same VLAN of the DHCP downlink interface. (In theory, DHCPspoofing does not exist in the simplistic network solution and DHCP snoopingmainly provides layer-2 protection. In simplistic networks, port protectionneeds to be enabled on interfaces of the same VLAN on core devices and accessdevices, to isolate layer-2 broadcast domains and prevent DHCP spoofing.)
2. DHCP snooping provides IPaddress authorization for 802.1x authentication or MAC Address Bypass (MAB)Authentication by using a DHCP snooping table, provided that the AAA IPauthorization function is enabled, the dot1x valid-ip-acct enable and dot1xmac-auth-bypass valid-ip-auth commands are executed, and DHCP is configuredto dynamically assign IP addresses to authenticated users.
Configuration commands:
ip dhcpsnooping //Mandatory.The command is used for DHCP snooping and IP authorization for 802.1xauthentication.
ip dhcp snoopingcheck-giaddr //Mandatory. It is configured toprevent the RG-N18000 with DHCP snooping enabled from discarding DHCP relaypackets from aggregation devices.
ip dhcp snooping arp-detect //Optional.Enable fast ARP address reclaiming of DHCP snooping. The ARP address reclaimingis performed once per second during ARP aging and can be performed five timesat most.
interface gi2/3/8 //Optional.It is configured in scenarios in which the DHCP server is not deployed on theRG-N18000 and the DHCP server communicates with the RG-N18000 at layer 2.
description link-to-dhcpserver
ip dhcp snoopingtrust //Configure a DHCP trusted porton the layer-2 port of the interconnected DHCP server.
Precautions:
When the IP DHCP snooping feature isconfigured, the ip dhcp snooping check-giaddr command must be executed,so that the RG-N18000 with DHCP snooping enabled can process DHCP relay packetsfrom aggregation devices. The ip dhcp snooping check-giaddr command hasno drawbacks. Therefore, it is recommended to enable the command by default.
Configuration example
N/A
Principles:
Fast address reclaiming reclaims addressesof DHCP snooping entries rapidly, to prevent an overlarge DHCP snooping bindingtable caused by generation of multiple address entries by the same clientduring wireless user migration.
This function can be associated with the ARPmodule. When an ARP entry corresponding to an IP address in the DHCP snoopingtable is about to age, ARP detection is started. If no response is receivedwithin the detection count, the DHCP snooping entry of the IP address isdeleted.
Configuration commands:
ip dhcp snooingarp-detect //Optional. Enablefast ARP address reclaiming of DHCP snooping. The ARP address reclaiming isperformed once per second during ARP aging and can be performed five times atmost.
Precautions:
N/A
Configuration example
N/A
Principles:
Principles of a DHCP server in asimplistic network scenario are similar to those in a universal scenario.Identical parts of the principles are not described here.
Differences are as follows:
1. The recommended DHCPlease time is 2 hours. The purpose is to rapidly reclaim DHCP address resourcesthat are not in use, to prevent IP address resources of the gateway from beingfully occupied in areas with heavy traffic.
2. When the DHCP leaseperiod of the client expires or the RG-N18000 receives a DHCP release packet,the RG-N18000 kicks the client offline during authentication.
This prevents a problem that, when the DHCPserver assigns the IP address originally obtained by the client to a newclient, the IP address is still corresponding to the original client in theauthentication entry and stays in the online state, and the new client cannotbe authenticated.
Configuration commands:
DSW-18KX_LX(config)#ip dhcp pool4000 //Setthe DHCP address pool for the wired network in the dormitory area.
DSW-18KX_LX(dhcp-config)#lease 0 20 //Mandatory.Set the lease time to 2 hours.
DSW-18KX_LX(dhcp-config)#network172.16.0.0 255.255.240.0
DSW-18KX_LX(dhcp-config)#dns-server202.115.32.39 202.115.32.36
DSW-18KX_LX(dhcp-config)#default-router172.16.15.254
Precautions:
It is recommended to set the DHCP serverlease period to 2 hours.
When the DHCP lease period of the clientexpires or the RG-N18000 receives a DHCP release packet, the RG-N18000 kicksthe client offline during authentication.
It is recommended to set the period forno-traffic go-offline detection to be shorter than the lease period of DHCPserver.
Configuration example
N/A
Principles:
Fast address reclaiming is configured toenable the DHCP server to detect whether a user is offline. If a user goesoffline and does not go online again within a period of time, the DHCP serverreclaims the IP address assigned to the user.
The principles are described as follows: TheDHCP server, based on IP addresses in the DHCP server table, conducts keepalivedetection via the ARP module. If identifying that a user goes offline and doesnot go online again within a period of time (5 minutes by default), the DHCP serverreclaims the IP address assigned to the user.
If the DHCP server function is configured onthe RG-N18000, the fast address reclaiming function is mandatory.
Configuration commands:
ip dhcp serverarp-detect //Enable fast address reclaimingof the DHCP server. If identifying that a user goes offline and does not goonline again within a period of time (5 minutes by default), the DHCP serverreclaims the IP address assigned to the user.
Precautions:
N/A
Configuration example
N/A
Principles:
AM rules can be used to divide the DHCPaddress segment based on the VLAN+port of the RG-N18000, but the DHCP addresssegment must exist in the DHCP address pool. The address segment assigned byusing AM rules must be smaller than or equal to the DHCP address pool. Example:
DHCP address pool: network 192.168.0.0255.255.0.0
AM rule: match ip 192.168.1.0 255.255.255.0Gi5/3 vlan 1005
In the simplistic network environment, thegateway is deployed via super VLAN. Generally, the gateway is deployed in thefollowing manners:
Scenario 1 (AM rules not required): Sub VLANof each dormitory building or sub VLANs of some dormitory buildings form onesuper VLAN. The network segment corresponding to the gateway of the super VLANis small (for example, several type C addresses). Each super VLAN iscorresponding to one DHCP address pool. The network segments corresponding tothe IP addresses obtained by students are refined and easily managed.
Scenario 2 (AM rules not required): SubVLANs of the entire campus network form one super VLAN. The network segmentcorresponding to the gateway of the super VLAN is relatively large (forexample, several type B addresses). Each super VLAN is corresponding to oneDHCP address pool. The network segments corresponding to the IP addressesobtained by students are scattered and disordered and hard to manage. Theschool does not raise a requirement on provision of different policies on SAM+or egress based on source IP addresses, for example, Internet access areacontrol and PBR.
Scenario 3 (AM rules required): Sub VLANs ofthe entire campus network form one super VLAN. The network segmentcorresponding to the gateway of the super VLAN is relatively large (forexample, several type B addresses). Each super VLAN is corresponding to oneDHCP address pool. The network segments corresponding to the IP addressesobtained by students are scattered and disordered and hard to manage. Theschool requires refined management, and requires precise identification on userareas based on IP addresses, to implement requirements, for example, Internetaccess area control and PBR.
Scenario 4 (AM rules required): sub VLANs ofthe entire campus network form one super VLAN, and multiple secondary addressesare configured for the gateway of the super VLAN. In this scenario, AM rulesmust be configured. Otherwise, DHCP addresses cannot be assigned according tosecondary addresses. (By default, the DHCP software assigns only the networksegment to which the main gateway address belongs.)
Note 1: AMrules support the DHCP server and DHCP relay modes. In DHCP relay mode, the AMrules can be used only in scenario 4. The gateway has multiple secondaryaddresses. The AM rules are used to notify the DHCP server of the addresssegment to be used. In this scenario, the DHCP server must configure an addresspool for each secondary address of the RG-N18000. Otherwise, the AM rules donot take effect. Example:
Configuration of the RG-N18000: iphelper-address 1.1.1.1 (Configure the DHCP relay on the RG-N18000.)
int vlan 4000
ip add 192.168.1.1 255.255.255.0
ip add 192.168.2.1 255.255.255.0secondary
ip add 192.168.3.1 255.255.255.0secondary
AM rules: address-manage
match ip 192.168.1.0 255.255.255.0Gi5/3 vlan 1005
match ip 192.168.2.0 255.255.255.0Gi5/3 vlan 1006
match ip 192.168.3.0 255.255.255.0Gi5/3 vlan 1007
DHCP server: network 192.168.1.0255.255.255.0 //Multiple small address poolsare configured. The network segment of each address pool is corresponding tothe gateway address of one super VLAN.
network 192.168.2.0 255.255.255.0
network 192.168.3.0 255.255.255.0
Note 2:
1. AM rulesare in strict mode by default when enabled. AM rules are described as follows:
After an AM rule is created, when a clientrequests an IP address via the RG-N18000, the client whose DHCP packets do notmatch the AM rule will not be assigned an IP address. Pay attention to thiscase during network reconstruction.
When Internet access packets from a clienthaving a static IP address pass through the RG-N18000, if the static IP addressdoes not match the created AM rule, the packets are allowed to pass. When thestatic IP address matches the AM rule but does not match the specified networksegment, the client will fail the authentication and the Internet access willbe rejected.
If a network segment is divided intoexcessively small network segments according to the created AM rule in wirelessscenarios, IP addresses may not match the AM rule after wireless migration, andpackets are discarded, causing migration failures. For example, the IP addresssegment for wireless super VLAN 3000 is 172.18.0.0/16. Two AM rules areconfigured: 172.18.1.0/24 for sub VLAN 2001, and 172.18.2.0/24 for sub VLAN2002. When a client obtains an IP address in sub VLAN 2001 and then is migratedto sub VLAN 2002, because the original IP address does not match the AM rule ofsub VLAN 2002, the client needs to obtain a new IP address and be authenticatedbefore it can access the network.
2. (Optional)AM rules can be configured in loose mode, and are described as follows(recommended):
For DHCP packets matching an AM rule, IPaddresses in an address segment configured in the AM rule are assigned toclients. DHCP packets that match no AM rule can apply for addresses accordingto the conventional logic of the DHCP address pool. The DHCP packets are notdiscarded.
Packets from static IP addresses are notdiscarded.
Packets from user IP addresses that do notmatch the AM rules are not discarded during wireless migration.
Note3: The AMrule matching sequence is as follows:
More detailed AM rules are preferential formatching. In code implementation, AM rules containing the port parameters arematched with a higher priority. For example:
address-manage
match ip 192.168.1.0 255.255.255.0 vlan400
match ip 192.168.2.0 255.255.255.0Gi1/3 vlan 400(preferential for matching)
Configuration commands:
AM rules support VLAN-based andVLAN+port-based IP address assignment.
address-manage//Enable the addressmanagement function.
match ip 10.1.5.0 255.255.255.0 gi5/3vlan 1005//Configure VLAN+port-based IP address assignment.
match ip 10.1.6.0 255.255.255.0 vlan1006//Configure VLAN-based IP address assignment.
match ip default 172.16.128.0255.255.128.0//Assign IP addresses from the default address segment to clientsthat do not match the AM rule.
match ip loose//Configure the loosemode for the AM rule (recommended). For details, see the above-mentioned Note 2.
address-manage //Enableaddress management.
clear match ip//Access the addressmanagement configuration mode to disable AM rules globally.
Precautions:
When both the DHCP relay and AM rules areenabled, multiple small address pools must be configured on the DHCP server.
The strict mode is adopted by default afterAM rules are enabled on the RG-N18000. In this mode, no IP address is assignedto areas that do not match AM rules in the live network. Pay attention to thiscase during network reconstruction. It is recommended to configure the loosemode for AM rules.
VLANs configured in AM rules map to outersub VLANs in QinQ solutions and map to sub VLANs in access isolation solutions.
Configuration example
N/A
Scenario
The stateless IPv6 address acquisition ismainly applied on the layer-3 switch serving as the LAN user gateway. It isused when the IPv4/IPv6 dual-stack service needs to be enabled and users ofdownlink hosts need to access IPv6 resources. An IPv6 address contains up to128 bits, and therefore the configuration is complex, and errors are prone tooccur. It is expected that hosts can obtain IPv6 prefixes and gatewayinformation without configuration, and IPv6 plug-and-play can be implemented.In this case, the stateless IPv6 address assignment function can be enabled onthe user gateway, to assign IPv6 address prefixes and gateway information todownlink hosts.
In another case, a DHCPv6 server is deployedin a network, and IPv6 addresses and parameter information are assigned todownlink hosts in stateful mode. However, DHCPv6 is incapable of assigninggateway address information, lifetime, and other parameters. Therefore, thestateless IPv6 address assignment function needs to be enabled on the switch.
Currently, IPv6 addresses are mainly appliedto campus networks on a large scale, and are seldom used in other sectors.
Description
An IPv6 address consists of a prefix and a64-bit interface ID that is automatically generated from a 48-bit MAC addressand is usually called EUI-64 address.
The prefix of an IPv6 address identifies thenetwork between a host and a router. The prefix required by a host is actuallythe gateway prefix. A protocol can be run between the gateway switch and a hostto automatically obtain the prefix. The Router Solicitation and RouterAdvertisement (RA) of the Neighbor Discovery Protocol (NDP) can be used, wherethe former is used to discover a gateway and urge the gateway to send the RAcontaining the prefix to the host.
The RA contains the prefix, lifetime,default gateway, and other information. It cannot deliver the IPv6 address ofthe DNS server.
The RA function is disabled by default. Youcan run the no ipv6 nd suppress-ra command in interface configurationmode to enable it.
æ Network requirements
A customer requests that IPv6 prefixes beobtained in stateless mode and interface addresses be obtained according to theEUI-64, to form IPv6 addresses.
Obtaining IPv6 addresses in stateless modecan be easily configured.
The IPv6 protocol stack is enabled onWindows 7 clients by default. For Windows XP clients, run the IPv6 installcommand in the Run window to enable the IPv6 protocol and restart theclients.
æ Network topology
æ Configuration key points
1. Configure an IPv6 address on the core switch.
2. Enable the RA and O-bit flag on the user gateway.
3. Configure a DHCPv6 server and call it in interface configurationmode.
æ Configuration steps
1. Configurean IPv6 address for an interface and enable IPv6 on the interface.
Ruijie#conf t
Ruijie(config)#interfacegigabitEthernet 1/1
Ruijie(config-if-GigabitEthernet1/1)#no switchport
Ruijie(config-if-GigabitEthernet1/1)#ipv6 enable
Ruijie(config-if-GigabitEthernet1/1)#ipv6 address 2001:250:2003:2000::1/64 ------>Configurean IPv6 address for the interface.
2. Enablethe RA function on the interface, set the O-bit flag to enable the host toobtain DNS, domain name, and other information, and call the address pool.
Ruijie(config-if-GigabitEthernet1/1)#no ipv6 nd suppress-ra ------>Enable theRA function.
Ruijie(config-if-GigabitEthernet1/1)#ipv6 nd other-config-flag ----->Set the O-bit flag to enable thehost to obtain other information.
Ruijie(config-if-GigabitEthernet1/1)# ipv6 dhcp pool ruijie ----->Call the address pool in interfaceconfiguration mode.
3. Configurean IPv6 server, including the domain name, prefix, and DNS server.
Ruijie(config)#ipv6 dhcp poolruijie ----->Create an IPv6 address pool.
Ruijie(dhcp-config)#domain-name www.example.com.cn ----->Configurethe domain name to be assigned to the client.
Ruijie(dhcp-config)#dns-server2003::1 ----->Configurethe DNS server to be assigned to the client.
Ruijie(dhcp-config)#exit
æ Verification
Check the IPv6 address obtained by a client.
Note: In the figure above, another IPv6address is a temporary address automatically generated by the system. Theinterface address of the temporary address is randomly generated.
The probability of reconnecting to the localaddress by using the randomly derivative interface ID is very low. Therefore,clients running Windows Vista or Windows Server 2008 can send router requestsby using the derivative local address, without waiting for completion of theDuplicate Address Detection (DAD). This is called optimistic DAD. The routerdiscovery and DAD are performed simultaneously, which reduces time required forthe interface initialization process. In the generation of this temporaryaddress, however, data packets are sent to the network, which occupies networkresources, affects the network health, and hinders IPv6 user uniquenesscontrol. Therefore, it is recommended to disable this function. To do so, clickStart > Run. In the Run window, enter netsh, intipv6 and set privacy state=disable in sequence, as shown in thefigure below.
For more information about temporaryaddresses, see http://technet.microsoft.com/zh-cn/magazine/2007.08.cableguy.aspx.
Network requirements
A switch is used as a DHCPv6 client, toobtain an IPv6 address from the DHCPv6 server, as well as the DNS serveraddress, domain name, and other network parameters.
Note: If a PC expects to obtain a dynamicIPv6 address, the host must has a DHCPv6 client.
Windows 7, Windows Vista, and Windows Server2008 each have a built-in DHCPv6 client.
Windows XP and Windows Server 2003 have nobuilt-in DHCPv6 client. Users need to install the DHCPv6 client or enable theIPv6 protocol stack.
Network topology
Configuration key points
1. Configure the RG-N18000 switch as the DHCPv6 server and set itsaddress to 2001::1/64.
2. Enable the DHCPv6 server to assign 2001::X/64 to the DHCPv6 client.
3. Set the address of the DNS server to 2003::1/64.
4. The domain name of the DHCPv6 client is www.example.com.cn.
Configuration steps
DHCPv6 server configuration:
1. Enablethe IPv6 routing function.
Ruijie>enable
Ruijie#configure terminal
Ruijie(config)#ipv6unicast-routing----->Enable the IPv6 routing function.
Ruijie(config)#end
2. Configure an IPv6 address for an interface and enable the IPv6function on the interface.
Ruijie#conf t
Ruijie(config)#
Ruijie(config)#interfacegigabitEthernet 1/24
Ruijie(config-if-GigabitEthernet1/24)#no switchport
Ruijie(config-if-GigabitEthernet1/24)#ipv6 address 2001::1/64 ----->Configure an IPv6address for the interface.
Ruijie(config-if-GigabitEthernet1/24)#ipv6 enable ----->Enablethe IPv6 function on the interface.
Ruijie(config-if-GigabitEthernet1/24)#end
3. Enablethe RA function and set the M-bit flag and O-bit flag.
a. The DHCPv6server does not assign a gateway address to the client. The RA function needsto be enabled on the device.
b. Set the managedaddress configuration flag bit in the RA packet to 1. This flag bitdetermines whether the host receiving the RA packet uses the stateful automaticconfiguration to obtain an IP address. By default, the flag bit is not set to 1in the RA packet.
c. Set the otherstateful configuration flag bit in the RA packet. This flag bit determineswhether the host receiving the RA packet uses the stateful automaticconfiguration to obtain information other than addresses. By default, the flagbit is not set to 1 in the RA packet.
Ruijie>enable
Ruijie#configure terminal
Ruijie(config)#interfacegigabitEthernet 1/24
Ruijie(config-if-GigabitEthernet1/24)#no ipv6 nd suppress-ra ----->Enable theRA function.
Ruijie(config-if-GigabitEthernet1/24)#ipv6 nd managed-config-flag----->Set the M-bit flag of the RA.
Ruijie(config-if-GigabitEthernet1/24)#ipv6 nd other-config-flag----->Set the O-bit flag of the RA.
Ruijie(config-if-GigabitEthernet1/24)#ipv6 nd prefix 2001::/64 no-autoconfig ----->Specify thatthe RA prefix cannot be used for stateless automatic configuration.
Ruijie(config-if-GigabitEthernet1/24)#end
4. Configurean IPv6 server, including the domain name, prefix, and DNS server.
Ruijie(config)#ipv6 dhcp poolruijie ----->Create an IPv6 address pool.
Ruijie(dhcp-config)#domain-namewww.example.com.cn ----->Configurethe domain name to be assigned to the client.
Ruijie(dhcp-config)#dns-server2003::1 ----->Configurethe DNS server to be assigned to the client.
Ruijie(dhcp-config)#iana-addressprefix 2001::/64 ----->Apply the IPv6prefix pool.
Ruijie(dhcp-config)#exit
5. Enable the DHCPv6 server function on the interface.
Ruijie(config)#interfacegigabitEthernet 1/24
Ruijie(config-if-GigabitEthernet1/24)#ipv6 dhcp server ruijie ----->Enable the IPv6 function onthe interface.
Ruijie(config-if-GigabitEthernet1/24)#end
Verification
1. Check information about the address pool of the DHCPv6 server.
Ruijie #show ipv6 dhcp pool
DHCPv6 pool: ruijie
IANA addressrange: 2001::1/64 -> 2001::FFFF:FFFF:FFFF:FFFF/64
preferredlifetime 3600, valid lifetime 3600
DNS server:2003::1
Domain name: www.example.com.cn
Information about the address pool of theDHCPv6 server shows the name of the DHCPv6 address pool, name of the prefix pool,DNS, and domain name.
2. Check the binding table on the DHCPv6 server.
Ruijie #sho ipv6 dhcp binding
Client DUID:00:03:00:01:00:1a:a9:15:46:e2
IANA: iaid100001, T1 1800, T2 2880
Address:2001::2
preferredlifetime 3600, valid lifetime 3600
expires atAug 25 2014 16:35 (3571 seconds)
The binding table shows the clientDUID and prefix.
3. Check information obtained from the DHCPv6 server.
Ruijie #show ipv6 dhcp interfacegigabitEthernet 5/1
GigabitEthernet 5/1 is in client mode
State is IDLE
next packet will be send in : 1744 seconds
List of known servers:
DUID: 00:03:00:01:14:14:4b:1b:54:6c
Reachable via address: FE80::1614:4BFF:FE1B:546D
Preference: 0
Configuration parameters:
IA NA: IA ID 0x186a1, T1 1800, T2 2880
Address: 2001::2
preferred lifetime 3600, valid lifetime 3600
expires at Jan 1 1970 7:38 (3544 seconds)
DNS server: 2003::1
Domain name: www.example.com.cn
Rapid-Commit:disable
4. Check the status of the IP address obtained by the interface.
Ruijie #show ipv6 int g5/1
interface GigabitEthernet 5/1 is Up,ifindex: 1
address(es):
Mac Address:00:1a:a9:15:46:e3
INET6:FE80::21A:A9FF:FE15:46E3, subnet is FE80::/64
INET6:2001::2 [ DEPRECATED ], subnet is 2001::/64
validlifetime 3526 sec
Joined group address(es):
FF01::1
FF02::1
FF02::2
FF02::1:FF00:2
FF02::1:FF15:46E3
MTU is1500 bytes
ICMP error messages limited toone every 100 milliseconds
ICMP redirects are enabled
ND DAD is enabled, number ofDAD attempts: 1
ND reachable time is 30000milliseconds
ND advertised reachable timeis 0 milliseconds
ND retransmit interval is 1000milliseconds
ND advertised retransmit intervalis 0 milliseconds
ND router advertisements aresent every 200 seconds<160--240>
ND router advertisements livefor 1800 seconds
Scenario
A dedicated DHCPv6 server running Windows2003 or 2008 is deployed in the network center to assign IPv6 address prefixesand network parameters to hosts in the campus network, to implement centralizedmanagement and maintenance. The DHCP relay function needs to be enabled on allIPv4/v6 dual-stack layer-3 switches, to forward packets between DHCPv6 clientsand the DHCPv6 server. In this way, DHCPv6 clients can obtain IPv6 addressesand configuration parameters even if the DHCPv6 clients and the DHCPv6 serverare not connected through local links.
In another case, a DHCPv6 server is deployedin the network, and IPv6 addresses and parameter information are assigned toclients in stateful mode. However, DHCPv6 is incapable of assigning gatewayinformation, lifetime, and other parameters. Therefore, the stateless IPv6address assignment function needs to be enabled on the switch, so that hostscan obtain gateway information.
Description
The DHCPv6 application model consists of theserver, client, and relay. The client and server obtain configurationparameters in request-response mode. The relay can transparently bridge clientsand the server that are not connected through local links. The packetinteraction and parameter maintenance of DHCPv6 are basically the same as thoseof DHCPv4, but DHCPv6 adjusts the packet structure and processing based on newnetworks.
æ Network requirements
User PCs are used as DHCPv6 clients toobtain IPv6 addresses from the DHCPv6 server running Windows 2008. After IPv6addresses are obtained, the PCs can ping the DHCPv6 server successfully. TheRG-N18000 serves as the DHCPv6 relay.
æ Network topology
æ Configuration key points
Complete the following configuration on theDHCPv6 server:
1. Configure an IPv6 address and gateway for the DHCPv6 server.
2. Configure scope information.
3. Configure log information.
4. Enable the IPv6 routing function on the DHCPv6 relay, create anIPv6 address, and configure the DHCPv6 relay.
æ Configuration steps
DHCP agent configuration:
1. Enable the IPv6 routing function.
Ruijie>enable
Ruijie#configure terminal
Ruijie(config)#ipv6 unicast-routing ----->Enablethe IPv6 routing function.
Ruijie(config)#end
2. Configure an IPv6 address for an interface of the DHCPv6 server andenable the IPv6 function on the interface.
Ruijie(config)#int g0/13
Ruijie(config-if-GigabitEthernet0/13)#no switchport
Ruijie(config-if-GigabitEthernet0/13)#ipv6enable ----->Enablethe IPv6 function on the interface.
Ruijie(config-if-GigabitEthernet0/13)#ipv6 address 2001::2/64 ----->Configure an IPv6 addressfor the interface.
Ruijie(config-if-GigabitEthernet0/13)#end
3. Create a VLAN for the DHCPv6 client and configure the VLAN on aninterface.
Ruijie(config)#vlan2
Ruijie(config-vlan)#exit
Ruijie(config)#int g0/14
Ruijie(config-if-GigabitEthernet0/14)#switchport mode access
Ruijie(config-if-GigabitEthernet0/14)#switchport access vlan 2
Ruijie(config-if-GigabitEthernet0/14)#end
Ruijie#
4. Configure the gateway IPv6 address for the DHCPv6 client and enablethe DHCPv6 relay function.
Ruijie#conf t
Ruijie(config)#interface vlan 2
Ruijie(config-if-VLAN 2)# ipv6address 2001:1::1/64
Ruijie(config-if-VLAN 2)# ipv6 enable
Ruijie(config-if-VLAN 2)#ipv6 ndprefix 2001:1::/64 no-autoconfig ----->Specify that the RAprefix cannot be used for stateless automatic configuration.
Ruijie(config-if-VLAN 2)# ipv6 dhcprelay destination 2001::1 ----->Configure the DHCPv6 relay and set itsnext hop to the interface of the server that is connected to the RG-N18000.
Ruijie(config-if-VLAN 2)# no ipv6 ndsuppress-ra ----->Enable the RAfunction.
Ruijie(config-if-VLAN 2)# ipv6 ndmanaged-config-flag ----->Set the M-bit flag of the RA.
Ruijie(config-if-VLAN 2)# ipv6 ndother-config-flag ----->Set the O-bitflag of the RA.
Ruijie(config-if-VLAN 2)# end
Enablingthe RA function and setting the M-bit flag and O-bit flag:
a. TheDHCPv6 server does not assign a gateway address to the client. The RA functionneeds to be enabled on the device.
b. Setthe managed address configuration flag bit in the RA packet to 1. Thisflag bit determines whether the host receiving the RA packet uses the statefulautomatic configuration to obtain an IP address. By default, the flag bit isnot set to 1 in the RA packet.
c. Set the otherstateful configuration flag bit in the RA packet. This flag bit determineswhether the host receiving the RA packet uses the stateful automaticconfiguration to obtain information other than addresses. By default, the flagbit is not set to 1 in the RA packet.
Principles:
Authentication-free VLANs enable users inthe specified VLANs to access the Internet without authentication.
The number of authentication-free VLANsis limited. Pay attention to the limit.
The number of authentication-free VLANscannot exceed 100 in consideration that performance resources are greatlyexhausted due to broadcast packet duplication in sub VLANs or in PE-CE VLANs.Countermeasures need to be taken to prevent the RG-N18000 from sendingexcessive ARP requests, which affects the CPU usage of the device and causesprotocol flapping (such as OSPF flapping), packet loss, and networkinterruption at a high probability. When the number of authentication-freeVLANs cannot meet service requirements, security channels are recommended. In asimplistic network, the ARP proxy function is enabled on the RG-N18000 servingas the network-wide gateway by default. Once ARP request scanning attacksoccur, the RG-N18000 acts a proxy to flood ARP packets to authentication-freeVLANs, resulting in great overhead in the CPU of the RG-N18000.
In a simplistic network, the following VLANsare usually configured as authentication-free VLANs (for reference only):
1. Special serviceVLANs (such as VLANs for all-in-one cards, video monitoring, and door statuscontrol systems, server VLANs, and other non-user VLANs)
2. NMS VLANs (switchNMS VLANs and wireless NMS VLANs)
3. VLANscorresponding to AC 802.1x authentication. Wireless 802.1x authentication mustbe carried out on the AC, and authentication exemption is required to avoidre-authentication.
4. Privilege userVLANs (such as VLANs for school principals and other directors).
If dumb clients (which do not activelysend ARP packets) exist on the network, such as printers of some types and doorstatus control systems, only authentication-free VLANs can be used to exemptauthentication. This is because the RG-N18000 does not actively send ARPrequest packets to sub VLANs and therefore cannot learn the ARP information ofthe dumb clients.
Configuration commands:
direct-vlan 400, 600,800-820 //Configure VLANs 400,600, and 800–820 as authentication-free VLANs. Users in these VLANs can accessthe network without authentication.
Note: The VLAN IDs used in the direct-vlancommand are IDs of sub VLANs.
Precautions:
Authentication-free VLANs are exempted onlyfrom checks related to access authentication, but still need to undergo checksspecified in security ACLs. If a specific user or VLAN is disallowed in asecurity ACL, the specific user or users in the specific VLAN cannot access thenetwork. For users in authentication-free VLANs to access the network withoutauthentication, ensure that the VLANs or users in the VLANs are not blocked byACLs.
The number of authentication-free VLANscannot exceed 100. Otherwise, the ARP proxy function may enable the RG-N18000to send excessive ARP packets, resulting in CPU overload of the RG-N18000.
Configuration example
N/A
Principles:
Beforeusers are authenticated, provide some site resources for users to log in ordownload data. This is called destination IP-based authentication exemption. Inthe simplistic network solution, this feature can be usually applied to:
1. Downloadthe SU client and exempt the download server from authentication.
2. Providepublic authentication-free resources in a campus network.
3. Allowunauthenticated users to access the portal server and enable the portal serverto direct to the authentication page. (In the current version, users candirectly access the portal server without authentication after the Webauthentication template is configured.)
Configuration commands:
http redirectdirect-site x.x.x.x [Mask is optionally configured.] //Configuredin global configuration mode. The server with the address x.x.x.x. isconfigured as an authentication-free site.
Precautions:
Amaximum of 50 authentication-free site entries can be configured.
Configuration example
N/A
Principles:
Authentication-freesource IP addresses can be configured, so that users with the specified sourceIP addresses can access the Internet without authentication.
Theapplication scenario is similar to that of authentication-free VLANs. Thedifference lies in that authentication is exempted based on differentdimensions, and can be performed as required.
Configuration commands:
web-authdirect-host x.x.x.x [The mask isoptional.] //Configured in globalconfiguration mode. The source IP address of x.x.x.x. is used as anauthentication-free site.
Precautions:
Amaximum of 1000 authentication-free entries can be configured (the totalmaximum number of entries that can be configured for both authentication-freesource addresses and security channels is 1000).
Configuration example
N/A
Principles:
1. Thesecurity channel can invoke ACLs and is configured globally or based on ports,enabling ACL-based authentication exemption. ACLs support flexible ACEs.Therefore, the security channel can be used to accurately controlauthentication-free user groups by allowing packets with the specifiedsource/destination MAC address, source/destination IP address, or the protocolID above layer 4 without authentication. The security channel further avoidsexcessive CPU usage caused by ARP packets as in the authentication-free VLANfeature, and therefore is recommended.
2. Thesecurity channel must be configured on an interface or globally. If it isconfigured on both the interface and globally, the priority sequence is asfollows: interface > global.
3. Anexcluded interface of the security channel is optional. After an excludedinterface is configured, the global security channel is invalid to thisexcluded interface.
5. Themaximum number of entries that can be configured is 1000 for ED and EF cardsand 100 for DB cards (the total maximum number of entries that can beconfigured for both authentication-free source addresses and security channelsis 1000). If the ED and DB cards are both used, the entry capacity may bereduced to 100.
Configuration commands:
ACL-relatedconfiguration is omitted here.
security global access-group {acl-id | acl-name } //Applya security channel in global configuration mode.
security access-group {acl-id | acl-name } //Applya security channel in interface configuration mode.
security uplink enable//Configure asecurity channel excluded port in interface configuration mode. The globalsecurity channel does not take effect on this interface.
Precautions:
An ACLuses the permit statement to set the authentication-free entry, and uses thedeny statement to block an entry.
Ifthe security channel is configured on both an interface and globally, thepriority sequence is as follows: interface > global.
Inan environment with only 802.1x authentication, this command is required toallow critical protocol packets such as ARP and DHCP packets.
Ruijie(config)# expert access-listextended 2700
Ruijie(config-exp-nacl)#10 permit arpany any any any any
Ruijie(config-exp-nacl)#20 permit udpany any any any eq bootpc
Ruijie(config-exp-nacl)#30 permit udpany any any any eq bootps
Ruijie(config)# security globalaccess-group 2700
Configuration example
æ Scenario
Configuration Steps:
Configure an Expert extended ACL namedexp_ext_esc.
Add an ACE to the ACL to allow thedestination host 10.1.1.2.
Add an ACE to the ACL to allow DHCP packets.
Add an ACE to the ACL to allow ARP packets.
On the interface of the 802.1xauthentication controlled area, configure the ACL exp_ext_esc as a securitychannel.
Runthe following commands on SW1:
sw1(config)#expert access-listextended exp_ext_esc
sw1(config-exp-nacl)# permit ip anyany host 10.1.1.2 any
sw1(config-exp-nacl)# permit 0x0806any any any any any
sw1(config-exp-nacl)# permit udp anyany any any eq 67
sw1(config-exp-nacl)# permit udp anyany any any eq 68
sw1(config)#int gigabitEthernet 0/1
sw1(config-if-GigabitEthernet 0/1)#security access-group exp_ext_esc
Verification:
Ona client of the Sales Department, ping the server of the Sales Department andcheck whether the ping operation is successful.
Onclients of R&D Department 1 and R&D Department 2, ping the server of theSales Department and check whether the ping operations are successful.
sw1#show access-lists
expert access-list extendedexp_ext_esc
10 permit ip any any host 10.1.1.2any
20 permit arp any any any any any
30 permit tcp any any any any eq 67
40 permit tcp any any any any eq 68……
sw1#show running-config interfacegigabitEthernet 0/1
Building configuration...
Current configuration : 59 bytes
interface GigabitEthernet 0/1
security access-group exp_ext_esc
Principles:
Aftercontrol of Web authentication and 802.1x authentication is enabled oninterfaces of the RG-N18000, all DNS packets are allowed to pass before userauthentication by default (Web authentication allows DNS packets as specified inthe protocol while 802.1x authentication allows DNS packets by using securechannels). Based on the vulnerability of allowing DNS packets prior toauthentication, the fee evasion software in the market encapsulates all packetsinto DNS packets, to implement Internet access without paying fees. Thefree-DNS mode can be configured to select DNS packets that are allowed to passprior to authentication, so as to prevent user fee evasion.
Configuration commands:
1. Configurethe free-DNS mode.
free-dns ip-address ip-mask
2. Deletethe free-DNS mode.
no free-dns ip-address ip-mask
3. Precautions:
Free-DNSis valid only before user authentication. All DNS packets are allowed to passafter user authentication.
4. Configurationexample
N/A
Principles:
Authenticationroles are described as follows:
Client:Ruijie SU client or an open-source client.
NAS:controls the network connection status of a client based on its currentauthentication status. The device serves as an agent between clients and thesever. It request usernames from clients, checks the authentication informationfrom the server, and forwards the information to the clients.
RADIUSserver: corresponding to Ruijie SAM+ system, which provides the authenticationservice for users.
Thefigure below shows the authentication flow.
Configuration commands:
aaa new-model//Enable the AAAfunction.
aaa accounting network (listname) start-stop group(group name) //AAAreference configuration. The actual service deployment prevails.
aaa authentication dot1x (listname) group (group name)//802.1x template reference configuration forAAA. The actual service deployment prevails.
aaa authentication login default local //Usethe local username/password to log in to the AAA device.
aaa group server radius (groupname) //Configurean AAA server group, which is applicable to multi-RADIUS scenarios.
server (radiusip)//Configure an AAA server group, which is applicable to multi-RADIUSscenarios.
radius-server host (radiusip) key 7 (radius key) //Configure the IP address and key forthe AAA server, which are applicable to single-RADIUS scenarios.
aaa accounting update periodic30 //Set the interval forAAA accounting update to 30s.
aaa accountingupdate //Configure AAA accounting update.
aaa authorization ip-auth-modemixed //Set the IP address authorization mode of 802.1xclients to the mixed mode. The IP addresses can be obtained via polling inmultiple ways (DHCP/RADIUS).
no aaa logenable //Disable the AAA log function.
dot1x valid-ip-acctenable//Mandatory. The accounting update packets are used to upload the user IPaddress to SAM+. If the 802.1x authentication module does not have IP entriesof the user, the user is forced to go offline 5 minutes later, to preventusers at the IP address 0.0.0.0 on SAM+. The configuration of this command willdrop users out of the network. It is not recommended to run this command in servicepeak hours.
dot1x accounting (listname) //Optional. This command is required whenthe 802.1x accounting list name for AAA is not set to default.
dot1x authentication (listname) //Optional. This command is required whenthe 802.1x authentication list name for AAA is not set to default.
interface range GigabitEthernet0/2-3 //Configure the interface for enabling 802.1xauthentication.
dot1xport-control auto//Enable 802.1x authentication on the interface.
snmp-server host x.x.x.x(server IPaddress) informs version 2c xx(community name)
snmp-server community xx(communityname) rw
Precautions:
Thelist name configured in aaa authentication dot1x (list name) group(group name) should be consistent with that in dot1x authentication(list name).
Whenonly 802.1x authentication is enabled on an interface, security channels mustbe configured to allow DHCP packets to pass. Otherwise, users cannot obtain IPaddresses. For specific configuration, see the security channel configuration.
Configuration example
Scenario | |
|
|
Configuration Steps | Register the IP address of the device with the RADIUS server and configure the key for the device to communicate with the server. Create an account on the RADIUS server. Enable AAA on the device. Configure RADIUS parameters on the device. Enable 802.1x authentication on interfaces of the device. The following shows relevant configurations on the device. For the configurations of the server, see the server configuration guide. |
| ruijie# configure terminal ruijie (config)# aaa new-model ruijie (config)# aaa accounting network radius start-stop group default ruijie (config)# aaa authentication dot1x radius group default ruijie (config)# aaa authentication login default local ruijie (config)# aaa accounting update periodic 30 ruijie (config)# aaa accounting update ruijie (config)# aaa authorization ip-auth-mode mixed ruijie (config)# no aaa log enable ruijie (config)# radius-server host 192.168.32.120 key 7 ruijie ruijie (config)# interface FastEthernet 0/1 ruijie (config-if)# dot1x port-control auto |
|
|
Verification | Test whether authentication can be performed normally and whether network access behavior changes after authentication. Create an account on the server, for example, username:test,password:test. An unauthenticated client fails to ping 192.168.32.120. Start Supplicant on the client and enter the username for authentication. After the client is authenticated, it can ping 192.168.32.120 successfully. |
Principles:
Auser opens the Internet Explorer (IE) and accesses a website to initiate anHTTP request.
TheNAS intercepts the HTTP request from the client, and forcibly forwards the HTTPrequest to the portal server. It also adds some relevant parameters to theportal URL. For the parameters, see CHAP authentication.
Theportal server pushes the Web authentication page to the client.
Theuser enters the username and password on the authentication page and submitsthem to the portal server.
Theportal server sends the username and password to the NAS to initiateauthentication.
TheNAS sends the username and password to the RADIUS server, which checks whetherthe user is valid and returns the Radius access-accept/reject message to theNAS.
TheNAS returns the authentication result to the portal server.
Theportal server pushes the authentication result page to the user based on theauthentication result.
Theportal server notifies the NAS that the authentication result packet has beenreceived.
TheNAS sends the accounting start packet.
Note:Web authentication acceleration supports direct access to the portal page forauthentication, without redirection.
Differencefrom the 1st-generation portal: The authentication is completed by the NAS andRADIUS server, which greatly reduces the load of the portal server.
Insimplistic network environments, static ARP addresses are automatically boundafter Web authentication succeeds, which is different from that in conventionalsolutions.
Configuration commands:
aaanew-model //Enable the AAA function.
aaa accounting network (listname) start-stop group(groupname) //AAA reference configuration. Theactual service deployment prevails.
aaa authentication web-auth (listname) group(groupname) //Webauthentication template reference configuration for AAA. The actual servicedeployment prevails.
aaa authentication login defaultlocal //Use the local username/password tolog in to the AAA device.
aaa group server radius (groupname) //Configurean AAA server group, which is applicable to multi-RADIUS scenarios.
server (radiusip) //Configurean AAA server group, which is applicable to multi-RADIUS scenarios.
radius-server host (radiusip) key 7 (radiuskey) //Configure the IP address andkey for the AAA server, which are applicable to single-RADIUS scenarios.
aaa accounting update periodic30 //Set the interval forAAA accounting update to 30s.
aaa accountingupdate //ConfigureAAA accounting update.
aaa authorization ip-auth-modemixed //Set the IP address authorization mode of 802.1xclients to the mixed mode. The IP addresses can be obtained via polling inmultiple ways (DHCP/RADIUS).
no aaa logenable //Disable the AAA log function.
web-auth templateeportalv2 //Create a Webauthentication template.
ip 202.204.193.32 //Setthe IP address of the portal server.
url http://202.204.193.32/eportal/index.jsp //Setthe URL of the portal server.
authentication (listname) //Optional. This command is required whenthe authentication list name for AAA is not set to default.
accounting (listname) //Optional. This command isrequired when the accounting list name for AAA is not set to default.
web-auth portal keyuniversity //Optional. Configure the key.
interface range GigabitEthernet0/2-3 //Configure the interface for enabling Webauthentication.
web-authenableeportalv2 //Enable Web authentication on the interface.
web-authvlan-control 2000-3000 //Enable VLAN-basedWeb authentication control. This command is used in a scenario in which both802.1x authentication and Web authentication are enabled on the same port ofthe RG-N18000, and some VLANs need to support only 802.1x authenticationcontrol. Such VLANs can be excluded from the Web authentication VLAN range.
snmp-server host x.x.x.x(server IP address) informsversion 2c xx(community name)
snmp-server community xx(communityname) rw
Precautions:
TheAAA method list must be consistent with the Web authentication method list.
Configuration example
Scenario | |
|
|
Configuration Steps | Register the IP address of the device with the RADIUS server and configure the key for the device to communicate with the server. Create an account on the RADIUS server. Enable AAA on the device. Configure RADIUS parameters on the device. Enable Web authentication on interfaces of the device. The following shows relevant configurations on the device. For the configurations of the server, see the server configuration guide. |
| ruijie# configure terminal ruijie (config)# aaa new-model ruijie (config)# aaa accounting network radius start-stop group default ruijie (config)# aaa authentication web-auth radius group default ruijie (config)# aaa authentication login default local ruijie (config)# aaa accounting update periodic 30 ruijie (config)# aaa accounting update ruijie (config)# no aaa log enable ruijie (config)# radius-server host 192.168.32.120 key 7 ruijie ruijie (config)# web-auth template eportalv2 ruijie (config)# ip 202.204.193.32 ruijie (config)# urlhttp://202.204.193.32/eportal/index.jsp ruijie (config)# interface FastEthernet 0/1 ruijie (config-if)# web-auth enable eportalv2 snmp-server host 192.168.21.120 informs version 2c xx (community name) snmp-server community XX(community name) rw
|
|
|
Verification | Test whether authentication can be performed normally and whether network access behavior changes after authentication. Create an account on the server, for example, username:test,password:test. An unauthenticated client fails to ping 192.168.32.120. The client browser automatically redirects to the Web authentication page. Enter the username for authentication. After the client is authenticated, it can ping 192.168.32.120successfully. |
Principles:
802.1xauthentication and MAB authentication do not support IP address identification.Ruijie extends the authentication application, which supports MAC+IP binding.This function is called IP authorization. There are four IP authorizationmodes:
SUauthorization: IP addresses are provided by the Supplicant. This mode needs tobe used in combination with Ruijie Supplicant.
RADIUSauthorization: IP addresses are delivered to the device by the RADIUS serverafter clients are authenticated.
DHCP-serverauthorization: An authenticated client initiates a DHCP request to obtain an IPaddress. After an IP address is obtained, the system binds the IP address withthe MAC address of the client. This mode is applicable to dynamic IP environments.
Mixedauthorization: The system performs MAC+IP binding for authenticated clients inthe sequence of Supplicant authorization, RADIUS authorization, and DHCP-serverauthorization. If the Supplicant provides an IP address, the authenticatedclient uses it preferentially; if the Supplicant does not provide an IPaddress, the IP address provided by the RADIUS server is used; if the RADIUSserver does not provide an IP address, the IP address provided by the DHCPserver is used.
Note:Mixed authorization is recommended to all scenarios.
Configuration commands:
aaa authorizationip-auth-mode mixed//Configured in global configuration mode.
Precautions:
The configuration of this command is irrelevant to whether IPaddresses can be uploaded to SAM+. The functions of this command are asfollows: If no IP address is authorized to a user, there is no entry of the IPaddress and the user cannot be charged or brought offline upon no traffic. Thiscommand can be used in combination with valid ip acct to bring users whodo not meet authorization configuration requirements offline.
Configuration example
N/A
Principles:
MABauthentication, one of the main authentication modes in the simplistic networksolution, is applicable to wireless users in office areas of campus networks.With the MAB authentication model and high-performance authenticationprocessing capacity of the RG-N18000, MAB authentication enables the RG-N18000to learn the MAC address of a client when the client accesses the network, sothat teachers do not need to repeatedly entering their usernames and passwordswhen using wireless clients for Web authentication, to prevent deterioratinguser experience. The RG-N18000 uses the MAC address of the client as theusername and password to send an authentication request to SAM+ to complete theauthentication as a proxy. The user cannot perceive the authentication in thisprocess.
Thefollowing is the MAB authentication process:
Enablethe client MAB authentication on SAM+ by accessing the access controldirectory.
AfterWeb authentication succeeds for the first time, a user can select MABauthentication on the authentication success page.
Whenthe user chooses to enable MAB authentication, the MAC address of the userclient is registered with SAM+.
Afterthe client connects to the network, the RG-N18000 serving as a NAS, identifiesthe MAC address of the client, and uses the MAC address as the username andpassword to initiate authentication to SAM+.
SAM+determines validity of the MAC address and returns the authenticationsuccess/failure message to the NAS.
Ifthe authentication is successful, the NAS sends the accounting start packet.
Configuration commands:
Note:MAB authentication takes effect only after each user is WEB authenticated forthe first time. In addition, MAB authentication belongs to the 802.1xauthentication system. Therefore, both Web authentication and 802.1x authenticationneed to be configured for MAB authentication.
æ Configuring global AAA parameters
aaanew-model //Enable the AAA function.
aaa accounting network (listname) start-stop group(groupname) //AAA reference configuration. Theactual service deployment prevails.
aaa authentication dot1x (listname) group (groupname) //802.1xtemplate reference configuration for AAA. The actual service deploymentprevails.
aaa authenticationweb-auth (list name) group(groupname) //Webauthentication template reference configuration for AAA. The actual servicedeployment prevails.
aaa authentication login defaultlocal //Use the local username/password tolog in to the AAA device.
aaa group server radius (groupname) //Configurean AAA server group, which is applicable to multi-RADIUS scenarios.
server (radiusip) //Configurean AAA server group, which is applicable to multi-RADIUS scenarios.
radius-server host (radiusip) key 7 (radius key) //Configurethe IP address and key for the AAA server, which are applicable tosingle-RADIUS scenarios.
aaa accounting update periodic30 //Set the interval forAAA accounting update to 30s.
aaa accounting update //ConfigureAAA accounting update.
no aaa logenable //Disable the AAA log function.
æ Configuring 802.1x parameters and enabling 802.1x authentication onthe interface
dot1x accounting (listname) //Optional. This command is required whenthe 802.1x accounting list name for AAA is not set to default.
dot1x authentication (listname) //Optional. This command is required whenthe 802.1x authentication list name for AAA is not set to default.
interface range GigabitEthernet 0/2-3 //Configurethe interface for enabling 802.1x authentication.
dot1x port-control auto//Enable802.1x authentication on the interface.
æ Configuring Web authentication parameters and enabling Webauthentication on the interface
web-auth template eportalv2
ip 202.204.193.32 //Setthe IP address of the portal server.
url http://202.204.193.32/eportal/index.jsp //Setthe URL of the portal server.
authentication (listname) //Optional. This command is required whenthe authentication list name for AAA is not set to default.
accounting (listname) //Optional. This command isrequired when the accounting list name for AAA is not set to default.
web-auth portal key university //Optional.Configure the key.
interface range GigabitEthernet0/2-3 //Configure the interface for enabling Webauthentication.
web-auth enable eportalv2////EnableWeb authentication on the interface.
æ Configuring MAB authentication parameters and enabling MABauthentication on the interface
aaa authorization ip-auth-modemixed //Mandatory. Set the IP address authorization modeof 802.1x clients to the mixed mode. The IP addresses can be obtained viapolling in multiple ways (DHCP/RADIUS).
ip dhcpsnooping //Mandatory.An IP address needs to be obtained via the DHCP snooping module for MABauthentication. Otherwise, a user with the IP address of 0.0.0.0 appears onSAM.
dot1x mac-auth-bypassvalid-ip-auth //Mandatory.The DHCP module instructs the MAB module to start authentication. Clients mustobtain IP addresses before starting MAB authentication. Otherwise, the MABauthentication is blocked to prevent clients with the IP address of 0.0.0.0 onSAM+. The configuration of this command will drop users out of the network. Itis not recommended to run this command in service peak hours.
dot1x valid-ip-acctenable //Mandatory.The accounting update packets are used to upload the user IP address to SAM+.If the 802.1x authentication module does not have an IP entry of the user, theuser is kicked offline 5 minutes later, to prevent users at the IPaddress 0.0.0.0 on SAM+. The configuration of this command will drop users outof the network. It is not recommended to run this command in service peakhours.
dot1x mac-auth-bypassmulti-user //Mandatory.Enable MAB authentication on the interface.
dot1x mac-auth-bypassvlan (vlan-list) //Optional.Configure this command in interface configuration mode to enable VLAN-based MABauthentication.
dot1x multi-mab quiet-period0 //Optional.Configure the quiet period for MAB authentication. In this period, after aclient fails the authentication, MAB authentication cannot be restarted beforethe MAC entry of the client ages on the RG-N18000. In this way, SAM+ does notgenerate logs of users who are not registered with SAM+. However, after failingthe MAB authentication at the first time, the client needs to wait for its MACentry on the RG-N18000 to age before it can trigger MAB authentication again.Configure this function as required.
Precautions:
MABauthentication takes effect only after relevant configurations are completed onSAM+. For details, see MAB authentication configuration in "SAM+Configuration".
MABauthentication takes effect only after it is selected on the authenticationpage.
MABauthentication takes effect after a client is MAB authenticated for the firsttime.
MABauthentication supports only dynamic DHCP users. It does not support static IPusers. The RG-N18000 transfers IP addresses from the DHCP snooping module toSAM+, and therefore information about static IP users does not exist in theDHCP snooping module.
802.1xauthentication has a higher priority than MAB authentication. Therefore, if aclient is MAB authenticated and then uses the client software to perform 802.1xauthentication, the MAB authentication entry will be deleted.
AfterMAB authentication is enabled, avoid configuring User Preemption orsetting Concurrent Logins Limit to 1. Otherwise, two clientsusing the same username will preempt a MAB authentication resource and bedropped out of the network.
Configuration example
Seedescription about the configuration commands.
Principles:
MABauthentication, one of the main authentication modes in the simplistic networksolution, is applicable to wireless users in office areas of campus networks.With the MAB authentication model and high-performance authenticationprocessing capacity of the RG-N18000, MAB authentication enables the RG-N18000to learn the MAC address of a client when the client accesses the network, sothat teachers do not need to repeatedly entering their usernames and passwordswhen using wireless clients for Web authentication, to prevent deterioratinguser experience. The RG-N18000 uses the MAC address of the client as theusername and password to send an authentication request to SAM+ to complete theauthentication as a proxy. The user cannot perceive the authentication in thisprocess.
Thefollowing is the MAB authentication process:
Enablethe client MAB authentication on SAM+ by accessing the access controldirectory.
AfterWeb authentication succeeds for the first time, a user can select MABauthentication on the authentication success page.
Whenthe user chooses to enable MAB authentication, the MAC address of the userclient is registered with SAM+.
Afterthe client connects to the network, the RG-N18000 serving as a NAS, identifiesthe MAC address of the client, and uses the MAC address as the username andpassword to initiate authentication to SAM+.
SAM+determines validity of the MAC address and returns the authenticationsuccess/failure message to the NAS.
Ifthe authentication is successful, the NAS sends the accounting start packet.
Configuration commands:
Note:MAB authentication takes effect only after each user is WEB authenticated forthe first time. In addition, MAB authentication belongs to the 802.1xauthentication system. Therefore, both Web authentication and 802.1xauthentication need to be configured for MAB authentication.
æ Configuring global AAA parameters
aaanew-model //Enable the AAA function.
aaa accounting network (listname) start-stop group(group name) //AAAreference configuration. The actual service deployment prevails.
aaa authentication dot1x (listname) group (groupname) //802.1xtemplate reference configuration for AAA. The actual service deploymentprevails.
aaa authenticationweb-auth (list name) group(groupname) //Webauthentication template reference configuration for AAA. The actual servicedeployment prevails.
aaa authentication login defaultlocal //Use the local username/password tolog in to the AAA device.
aaa group server radius (groupname) //Configurean AAA server group, which is applicable to multi-RADIUS scenarios.
server (radiusip) //Configurean AAA server group, which is applicable to multi-RADIUS scenarios.
radius-server host (radiusip) key 7 (radiuskey) //Configure the IP address andkey for the AAA server, which are applicable to single-RADIUS scenarios.
aaa accounting update periodic30 //Set the interval forAAA accounting update to 30s.
aaa accountingupdate //ConfigureAAA accounting update.
no aaa logenable //Disable the AAA log function.
æ Configuring 802.1x parameters and enabling 802.1x authentication onthe interface
dot1x accounting (listname) //Optional. This command is required whenthe 802.1x accounting list name for AAA is not set to default.
dot1x authentication (listname) //Optional. This command is required whenthe 802.1x authentication list name for AAA is not set to default.
interface range GigabitEthernet0/2-3 //Configure the interface for enabling 802.1xauthentication.
dot1x port-control auto//Enable802.1x authentication on the interface.
æ Configuring Web authentication parameters and enabling Webauthentication on the interface
web-auth templateeportalv2
ip 202.204.193.32 //Setthe IP address of the portal server.
url http://202.204.193.32/eportal/index.jsp //Setthe URL of the portal server.
authentication (listname) //Optional. This command is required whenthe authentication list name for AAA is not set to default.
accounting (listname) //Optional. This command isrequired when the accounting list name for AAA is not set to default.
web-auth portal keyuniversity //Optional. Configure the key.
interface range GigabitEthernet0/2-3 //Configure the interface for enabling Webauthentication.
web-auth enable eportalv2////EnableWeb authentication on the interface.
æ Configuring MAB authentication parameters and enabling MABauthentication on the interface
aaa authorization ip-auth-modemixed //Mandatory. Set the IP address authorization modeof 802.1x clients to the mixed mode. The IP addresses can be obtained viapolling in multiple ways (DHCP/RADIUS).
ip dhcpsnooping //Mandatory.An IP address needs to be obtained via the DHCP snooping module for MABauthentication. Otherwise, a user with the IP address of 0.0.0.0 appears onSAM.
dot1x mac-auth-bypassvalid-ip-auth //Mandatory.The DHCP module instructs the MAB module to start authentication. Clients mustobtain IP addresses before starting MAB authentication. Otherwise, the MABauthentication is blocked to prevent clients with the IP address of 0.0.0.0 onSAM+. The configuration of this command will drop users out of the network. Itis not recommended to run this command in service peak hours.
dot1x valid-ip-acctenable //Mandatory.The accounting update packets are used to upload the user IP address to SAM+.If the 802.1x authentication module does not have an IP entry of the user, theuser is kicked offline 5 minutes later, to prevent users at the IPaddress 0.0.0.0 on SAM+. The configuration of this command will drop users outof the network. It is not recommended to run this command in service peakhours.
dot1x mac-auth-bypassmulti-user //Mandatory.Enable MAB authentication on the interface.
dot1x mac-auth-bypassvlan (vlan-list) //Optional.Configure this command in interface configuration mode to enable VLAN-based MABauthentication.
dot1x multi-mab quiet-period 0 //Optional.Configure the quiet period for MAB authentication. In this period, after aclient fails the authentication, MAB authentication cannot be restarted beforethe MAC entry of the client ages on the RG-N18000. In this way, SAM+ does notgenerate logs of users who are not registered with SAM+. However, after failingthe MAB authentication at the first time, the client needs to wait for its MACentry on the RG-N18000 to age before it can trigger MAB authentication again.Configure this function as required.
Precautions:
MABauthentication takes effect only after relevant configurations are completed onSAM+. For details, see MAB authentication configuration in "SAM+Configuration".
MABauthentication takes effect only after it is selected on the authenticationpage.
MABauthentication takes effect after a client is MAB authenticated for the firsttime.
MABauthentication supports only dynamic DHCP users. It does not support static IPusers. The RG-N18000 transfers IP addresses from the DHCP snooping module toSAM+, and therefore information about static IP users does not exist in theDHCP snooping module.
802.1xauthentication has a higher priority than MAB authentication. Therefore, if aclient is MAB authenticated and then uses the client software to perform 802.1xauthentication, the MAB authentication entry will be deleted.
AfterMAB authentication is enabled, avoid configuring User Preemption orsetting Concurrent Logins Limit to 1. Otherwise, two clientsusing the same username will preempt a MAB authentication resource and bedropped out of the network.
Configuration example
Seedescription about the configuration commands.
Principles:
Whendetecting that a client generates no traffic in a period of time, the coredevice RG-N18000 used in simplistic networks actively forces the client to gooffline, thereby preventing invalid charging.
No-trafficgo-offline can be enabled based on VLANs. In simplistic networks, VLANsrepresent different planned areas, and areas can be selected to enable/disablethis function.
Thefamily area of a campus network uses a router as a proxy to completeauthentication for Internet access. After the traffic keepalive function isglobally enabled on the RG-N18000, if a client in the family area does notaccess the Internet within a period of time, the client is forced to go offlineand needs to be re-authenticated. Therefore, the traffic keepalive function isnot recommended for this area. The
VLAN-basedno-traffic go-offline can be configured for control.
Implementationprinciples:
Toimplement no-traffic go-offline, the system traverses the MAC address table ofthe device and compares the MAC address table with MAC addresses in the entriesof authenticated users. If the MAC address of an authenticated user in the MACaddress table has aged, the system determines that the user has no traffic andkicks the user offline. Note: The time consumed for traversing the MAC addresstable causes an error of 3–5 minutes to the original period for no-trafficgo-offline detection. If the original period for no-traffic go-offlinedetection is set to 15 minutes, it actually takes 18 to 20 minutes to kickclients offline.
Configuration commands:
offline-detect interval 15 threshold0 //If no traffic from a user isdetected within 15 minutes, the user is kicked offline. The RG-N18000 checkswhether there is user traffic matching the MAC address table for judgment.
offline-detect interval infinitythreshold 0 vlan 300 //Set the no-traffic go-offline detection period toan infinite large value for VLAN 300. If the no-traffic go-offline function isglobally enabled, run this command to disable this function for some VLANs.
VLAN-based no-traffic go-offline isapplicable only to router dialup scenarios, in which routers are online forlong. It cannot be applied to common client scenarios. Otherwise, the onlineduration on SAM+ will be inaccurate and affects the charging results.
Precautions:
Onlyno-traffic go-offline is supported currently, and low-traffic go-offline is notsupported.
Whenthe DHCP lease period of the client expires or the RG-N18000 receives a DHCPrelease packet, the RG-N18000 kicks the client offline during authentication.
Itis recommended to set the period for no-traffic go-offline detection to beshorter than the lease period of DHCP server.
Thefunction involves the traversal of the MAC address table, which increases thedetection period by 3–5 minutes based on original parameter configuration. Ifthe original period for no-traffic go-offline detection is set to 15 minutes,it actually takes 18 to 20 minutes to kick clients offline.
Configuration example
N/A
Principles:
Notethat independent IPv6 authentication is not supported in simplistic networks.The IPv6 authentication mode is determined according to the IPv4 authenticationresult. Three modes are available:
Compatible:If IPv4 authentication fails, IPv6 packets cannot be forwarded; if IPv4authentication succeeds, IPv6 packets can be forwarded.
Strict:IPv6 packets cannot be forwarded regardless of whether IPv4 authenticationsucceeds.
Loose:IPv6 packets can be forwarded regardless of whether IPv4 authenticationsucceeds.
Note:In simplistic networks, the RG-N18000 uses the strict mode by default, whichwill result in the failure to forward IPv6 packets. Change the mode to thecompatible mode.
Configuration commands:
Ruijie(config)#address-bind ipv6-modecompatible //Compatible mode
Ruijie(config)#address-bind ipv6-modestrict //Strict mode
Ruijie(config)#address-bind ipv6-modeloose //Loose mode
Precautions:
Note:In simplistic networks, the RG-N18000 uses the strict mode by default, whichwill result in the failure to forward IPv6 packets. Change the mode to thecompatible mode.
Configuration example
N/A
Principles:
Afterconfiguration, the source port of the device for communicating with the RADIUSserver is any specified port.
Afterconfiguration, the source port of the device for communicating with the portalserver is any specified port.
Configuration commands:
ip portalsource-interface loopback 0
ip radius source-interface lookback0
Precautions:
Onlyone source port of the RADIUS server can be configured.
Onlyone source port of the portal server can be configured.
Configuration example
N/A
Principles:
Scenario1: When an online authenticated client migrates across super VLANs, migrationof authenticated users must be enabled. Otherwise, the original authenticationentry still exists and the client cannot be authenticated after moving toanother VLAN/port.
Scenario2: An online client migrates across different sub VLANs of the same super VLANand the IP address keeps unchanged before and after migration. After migrationof authenticated users is configured, the user is exempted from authenticationbefore and after migration (the portal page does not pop up). It prevents userexperience deterioration caused by frequent re-authentication.
Scenario3: An online client migrates across super VLANs, and even if migration ofauthenticated users is configured, the client needs to be re-authenticatedbefore accessing the network (the portal page pops up).
Scenario4 (spoofing scenario): User A is authenticated in VLAN A. User B uses the sameMAC address as User A and logs in by using the same username/password or MACaddress to simulate migration. In such spoofing scenarios, the RG-N18000 sendsan ARP detection packet to User A in VLAN A. If the RG-N18000 receives an ARPresponse from User A, it determines that spoofing occurs and rejects migration.
Note:VLANs here refer to sub VLANs.
Configuration commands:
station-movepermit//Mandatory. The overall switch for migration of authenticated usersmust be enabled, so that migration of Web and 802.1x authenticated usersbecomes available. When an authenticated user triggers migration, thepre-migration authentication entry is automatically deleted and thepost-migration authentication entry is automatically added.
web-authstation-move auto//Mandatory. After migration of Web authenticated users isenabled, when an authenticated user triggers migration, the Web authenticationmodule automatically deletes the pre-migration authentication entry andautomatically adds the post-migration authentication entry.
web-auth station-moveinfo-update //Mandatory. When migration of Webauthenticated users is enabled, the accounting update packet is used to notifythe RADIUS server of the latest value of the user VID/port.
Precautions:
VLANchanges after user migration refer to sub VLAN changes.
Ifa user migrates across super VLANs, that is, the IP address changes aftermigration, the migration cannot be completed.
Configuration example
N/A
Principles:
Theportal escape mechanism exempts new users from authentication when the portalserver on the live network becomes unavailable.
Configuration commands:
web-auth portal-check interval 3timeout 3 retransmit 10 //Set the detection interval to3s, timeout duration to 3s, and retransmission count to 10.
web-auth portal-escape[nokick] //Whenportal escape takes effect and the nokick attribute is set, an online user willnot be kicked offline. If the nokick attribute is deleted, an online user willbe kicked offline.
Precautions:
Theportal detection needs to be configured.
Ifmultiple Portal servers are configured, the escape function takes effect onlywhen all the Portal servers are unavailable.
Thisfunction is valid only to Portal servers.
Configuration example
N/A
Principles:
Afterthe RADIUS escape function is configured, users can still be authenticated andaccess the Internet even if the RADIUS server malfunctions.
Configuration commands:
radius-serverhost (radius ip) test username ruijieidle-time 2key (radius key) //Mandatory. Use this command tokeep the detection between the device and the RADIUS server alive. TheRG-N18000 sends a detection packet with the username/password beingruijie/ruijie (the username can be user-defined, but the password is alwaysruijie) to the RADIUS server for authentication. If the authenticationsucceeds, it indicates that the RADIUS is still alive. radius key hereis not the user password. Instead, it is the key set by SAM+ server forinteraction with the RG-N18000.
radius-serverdead-criteria time 120 tries 12//Mandatory. The timeout duration is 120s. Ifthe RG-N18000 does not receive a response after an authentication request isretransmitted for 12 times, the RG-N18000 determines to escape. This functionprevents authentication jitter caused by oversensitivity of escape detection.
Theaccount (user name: ruijie; password: ruijie) needs to be configured andactivated on SAM+. This is mandatory.
web-auth radius-escape//Globallyconfigured to enable RADIUS escape for Web authentication.
dot1x critical//Configured on theinterface to enable RADIUS escape for dot1x authentication.
dot1x critical recovery actionreinitialize //Configured on theinterface, so that after the RADIUS server is recovered, the user that usesdot1x escape is kicked offline for re-authentication.
Precautions:
Theaccount needs to be configured and activated on the SAM server. For example,the username and password are both ruijie. Otherwise, a great number of spamlogs from inexistent accounts are generated.
Tocancel the escape detection command no radius-server host (radiusip) test username ruijie idle-time 2 key (radiuskey), delete it, and then configure the radius-server host (radiusip) key 7 (radius key) command. Otherwise, theRADIUS server is unreachable.
Configuration example
N/A
Principles:
Inconventional network solutions, an AC serving as the NAS for wireless userauthentication obtains SSIDs of wireless users via the association modulebetween the AC and APs and uploads the SSIDs to SAM+ server. In addition,policies are configured on SAM+ server/portal server to implement the mappingbetween SSIDs and authentication pages pushed by the portal server, so thatdifferent authentication pages are displayed for different ISPs or users.
Insimplistic networks, the core device RG-N18000 cannot associate with APs toobtain SSIDs of wireless users. To address this defect, you can manuallyconfigure the VLAN-based SSID mapping function on the RG-N18000, so that SSIDsare uploaded to SAM+ server via authentication packets, thereby meeting therequirements of different ISPs or user groups for different authenticationpages.
Configuration commands:
Ruijie(config)#web-authmapping map-ssid vlan100 ssid ChinaNet //Definethe mapping template name, mapped VLAN ID, and mapped SSID name.
Ruijie(config-if-GigabitEthernet 0/1)#web-auth apply-mapping map-ssid //Apply themapping template to the interface.
Precautions:
Multiplemappings can be configured. If a user is out of the mapping range, the portalserver is used for authentication by default.
VLANscannot overlap with each other.
Configuration example
See description about the configurationcommands.
Note:This function is supported only in N18000_RGOS 11.0(1)B3P3 and later versions.
Principles:
StaticIP address MAB authentication is MAB authentication triggered by using ARPpackets. It needs to be used in combination with the quiet function as well asfast MAC binding entries of SAM+ server.
1. Thefast MAC binding information of users need to be added to SAM+ server.
2. Thisfunction needs to be used in combination with the quiet function.
Configuration commands:
dot1xmac-auth-bypass static-ip-segment 1.1.1.0 255.255.255.0 unforced //SendARP packets from the static IP address segment to trigger MAB authentication.MAB authentication can be initiated based on only IP address segments.
dot1xmulti-mab quiet-period 300 //Enable 802.1x quiet function and setthe quiet period to 300s. In this period, MAB authentication cannot beperformed, but Web authentication and 802.1x authentication are available.
dot1x pending-user authen-num 24 //Optional. Set the default rate of MABauthentication triggered by ARP packets to 24 users/second. It is notrecommended to change the default value.
Precautions:
1. Thestatic IP address MAP authentication needs to be used together with the quietfunction. Otherwise, users who fail the authentication performs authenticationrepeatedly, imposing great pressure on SAM+ and incurring exceptions. Therecommended quiet period is 5 minutes.
2. StaticIP address MAB authentication takes effect only when fast MAC binding entriesare configured on SAM+. If no fast MAC binding entry is available on SAM+,manually bind MAC addresses. MAC addresses cannot be configured in Webauthentication mode (if a static IP address is within the IP address segmentrange configured by using the dot1x mac-auth-bypass static-ip-segmentcommand, the Web authentication page does not pop up and redirection cannot beperformed).
Configuration example
interface GigabitEthernet 1/1 //Enable MAB authentication on the interface.
switchportprotected
switchportmode trunk
switchporttrunk allowed vlan only 2-50,3000-3001
dot1xport-control auto
dot1xmac-auth-bypass multi-user
web-authenable eportalv2
dot1xmac-auth-bypass static-ip-segment 10.20.50.0 255.255.255.0 //Configuredglobally send ARP packets from the static IP address segment to trigger MAB authentication.
dot1xmulti-mab quiet-period 300 //Enable the 802.1x quiet function andset the quiet period to 300s.
Aftera user is authenticated, SAM+ automatically binds the MAC address of the userand enables static IP address MAB authentication upon next user login.
Note:This function is supported only in N18000_RGOS 11.0(1)B3P3 and later versions.
Principles:
Afterthe quiet function is configured, users who fail the authentication are addedto the quiet queue and do not initiate authentication. They can initiateauthentication after the quiet period expires.
Configuration commands:
dot1x multi-mab quiet-period300 //Enable the 802.1x quiet function and set the quiet period to300s.
Precautions:
Thequiet function does not need to be configured if static IP address MABauthentication is not required. Otherwise, the function may affectauthentication performance and cause high CPU usage of line cards.
Configuration example
N/A
Note:This function is supported only in N18000_RGOS 11.0(1)B3P3 and later versions.
Principles:
Bydefault, 802.1x authentication has a higher priority than MAB authentication,and 802.1x authentication preempts resources of MAB authentication. If it isrequired that 802.1x authentication not preempt resources of MAB authenticationand they have the same priority, configure this command on an interface. Afterconfiguration, 802.1x authentication does not preempt resources of MABauthentication and 802.1x authentication will fail if a MAB authenticated useris online.
Configuration commands:
Precautions:
Beforethe function is configured, do not enable Windows-embedded 802.1x authenticationwhen MAB authentication is used. By default, 802.1x authentication preempts MABauthentication resources. As a result, a MAB authenticated user is kickedoffline.
Configuration example
N/A
Principles:
TheQinQ VLAN tag termination enables the routing forwarding module to receive andsend packets with dual VLAN tags.
CE-vlan//QinQinner VLAN tag. VLANs must be consecutive, for example, 101–150.
PE-vlan//QinQouter VLAN tag (sub VLAN).
Note:The modified CE-VLAN configuration will overwrite original configuration.Improper configuration will cause network interruption.
Example:Original configuration: qinq termination ce-vlan 200 to 300
Newconfiguration: qinq termination ce-vlan 301 to 310
Theoriginal configuration will be overwritten as follows: qinq termination ce-vlan301 to 310
Configuration commands:
ConfiguringCE-VLANs
Command
qinqtermination ce-vlan start-vid to end-vid
ParameterDescription
start-vidindicates the minimum CE-VLAN ID.
end-vidindicates the maximum CE-VLAN ID.
Defaults
Bydefault, user VLANs have no QinQ VLAN tag termination.
CommandMode
Globalconfiguration mode
UsageGuide
Thereis no CE-VLAN by default.
ConfiguringPE-VLANs
Command
qinqtermination pe-vlan [ add | remove ] vlan-list
ParameterDescription
vlan-list: Indicates the VLAN list in the range of 1 to 4094.
Defaults
Bydefault, ISP VLANs have no QinQ VLAN tag termination.
CommandMode
Globalconfiguration mode
UsageGuide
ISPVLANs with QinQ VLAN tag termination can be configured in incremental mode.
Precautions:
QinQVLAN tag termination is performed only in the case of routing and forwarding,and layer-2 forwarding enables only transparent transmission through tunnels.
Ifusers of different CE-VLANs need to communicate with each other, the local ARPproxy (enabled by default) needs to be enabled on the SVI corresponding to thePE-VLAN.
EDcards support 511 CE-VLANs by default.
DBcards support 61 CE-VLANs by default.
Itis recommended to reduce the number of CE-VLANs to be created duringdeployment, for example, if only 50 CE-VLANs are used on the live network, runthe qinq termination ce-vlan 101 to 151 command to create requiredVLANs. Avoid creating 511 CE-VLANs at a time. More CE-VLANs will result in highCPU usage of the RG-N18000.
Determinewhether a client with a single VLAN tag exists on the RG-N18000. If yes, theVLAN ID of the client cannot be the same as that of the PE-VLAN (outer VLAN)configured in QinQ VLAN tag termination command.
Case:
Thefollowing command is executed to configure the outer VLAN range for QinQ VLANtag termination on the RG-N18000: qinq termination pe-vlan 100-101.
Afterpackets from a client with a single VLAN tag reach the RG-N18000, the RG-N18000performs the following processing:
1. Determinewhether the VLAN ID is 100, and if yes, enter the QinQ processing logic.
2. Checkwhether there is no inner VLAN ID from parsed packets, and if yes, discard thepackets.
Asa result, packets from the client with a single VLAN tag (VLAN ID = 100) cannotbe forwarded. After the VLAN ID is changed to a value other than 100 and101, packets from the client can be forwarded normally.
Configuration example
ConfigurationSteps
EnableQinQ VLAN tag termination on the core switch and configure the PE-VLAN/CE-VLAN.
SwitchA#configure terminal
Enter one configuration command ineach line, ended with CNTL/Z.
Ruijie(config)#qinq terminationpe-vlan 100-101
Ruijie(config)#qinq terminationce-vlan 200 to 300
Verification
Ruijie(config)#show qinq termination
CE-VLAN: 200–300
PE-VLAN: 100 and101
Principles:
Theconfiguration of NAS-port-ID encapsulation format for RADIUS packets ismandatory in QinQ isolation scenarios in simplistic networks. RADIUS packetsare encapsulated in a format that combines the interface name of the client andthe inner and outer VIDs in a specified manner. SAM+ reads dual VLAN IDs basedon the nas-port-id field.
Configuration commands:
radius-server attribute nas-port-idformat qinq //Configured in global configuration mode.
Precautions:
Thisfunction is mandatory in QinQ isolation scenarios.
Configuration example
Ruijie(config)# radius-serverattribute nas-port-id format qinq
1. By default,the Rapid Link Detection Protocol (RLDP) is enabled on the core deviceRG-N18000 of N18000_RGOS 11.0(1)B3P1 and later versions, to generatealarms for VLAN loops and make records. Therefore, do not disable RLDP.
2. Pay attentionto RLDP loop logs.
3. Run the showrldp log command to display relevant logs.
1. Configure theSpanning Tree Protocol (STP) on the access device to assist RLDP loopprevention. Enable the Rapid Spanning Tree Protocol (RSTP) globally, and enableBPDU filter on the uplink interface of the access device, and BPDU guard on thedownlink interface. Example:
S2928-student(config)#spanning-tree //EnableSTP.
S2928-student(config)#spanning-tree mode rstp //EnableRSTP, to prevent low convergence speed of interfaces.
S2928-student(config)#spanning-tree portfast bpduguard default //BPDUguard is enabled on PortFast interfaces by default.
S2928-student(config)#int ran gi 0/1-23
S2928-student(config-if-range)#spanning-tree portfast //PortFastis enabled on the downlink interface and BPDU guard takes effect on thedownlink interface. Once BPDU packets are received, the system considers that aloop occurs. Therefore, disable the downlink interface.
S2928-student(config-if-range)#interface gi0/24
S2928-student(config-if- GigabitEthernet 0/24)#spanning-tree bpdufilter enable //EnableBPDU filter on the uplink interface, which does not send BPDU packets toexternal devices, so that no topology is established and no root bridge iselected, and loops are prevented on a single device.
S2928-student(config-if-AggregatePort 1))#exit
Note: This function is supported only in N18000_RGOS11.0(1)B3P3.
Principles:
Ifthe packet sending/receiving fails or an exception occurs during routinemaintenance, you can specify the packet capture point, direction, as well aspacket characteristics. Then, start packet capture and check whether packetsare transmitted to/from the device to pinpoint the cause for the failure.
Configuration commands:
1. Createa packet capture rule.
packet capture rule rule-name [src-macsmac][dst-mac dmac] [etype type | ip |arp ][src-ip sip sip-mask] [dst-ip dip dip-mask][src-ipv6 sipv6 sipv6-prefix] [dst-ipv6 dipv6 dipv6-prefix][protocol protocol|tcp | udp] [src-port sport ][dst-port dport]
2. Specifythe packet capture point.
packet capture point capture-point-namerule rule-name location {interfaceinterface-name| vlan vlan-id | control-plane} {in | out | both}
3. Enable/Disablethe packet capture rule.
packet capture {start | stop}
Precautions:
1. Thisfunction is not risky theoretically. Nevertheless, it is not recommended to useit in service peak hours and non-fault cases. If the packet capture period isset to XX minutes in the software, the software stops packet capture after theperiod expires.
2. If thepacket capture rate is higher than the data write speed of the device, packetscannot be completely written into the device. It is recommended to configure moreaccurate packet capture matching rules. The system CPU supports a packetcapture rate up to 1000 pps in idle hours and 600 pps when the CPU usage is65%. If the system CPU usage exceeds 70% (including 70%), packet capture is notstarted even if it is configured.
Configuration example
1. Thefollowing example captures the RADIUS authentication packets exchanged betweena client (100.0.30.77) and SAM+ and those exchanged between the RG-N18000(192.168.3.1) and SAM+.
CapturedRADIUS packets need to be saved in the tmp directory (or the usb0directory in actual application). This directory does not need to be copied.
packet capture rule testdown filteripv4_sip 100.0.30.77 0.0.0.0
packet capture rule testup filteripv4_sip 192.168.3.1 0.0.0.0 v4_protocol udp ipv4_dport eq 1812
packet capture point testup ruletestup location interface gigabitEthernet 1/1/2 both
packet capture point testdown ruletestdown location interface gigabitEthernet 1/1/15 both
packet capture file tmp://test.pcap
packet capture file usb0://test.pacp?
buffer-size Buffer size ofpacket info //Define the size of the file for storing capturedpackets. The default size is 2 MB.
packet-num Number ofpackets //Define the number of packets to be captured.The default value is 1024.
timeout Timeout of minutes //Define thepacket capture duration. The default value is 10 min.
packet capture start
show packet capture status
packet capture stop
2. Thescreenshot below shows the ping packets sent by the client (100.0.30.77) andRADIUS packets sent by the device.
3. If thecaptured packets are stored in the TMP directory, you can run thefollowing commands to copy them to another directory:
Ruijie#run-system-shell
cd /tmp
/tmp # mvxxx.pacp /tmp/vsd/0/ xxx.pacp
Start theTFTP software on the client and run the commands to copy information aboutcaptured packets to the client.
copy tmp:/xxx.pacp tftp://xxx.xxx.xxx.xxx/xxx.pacp //Selectoob_tftp for the MGMT port.
Basic information
æ Fault symptom
On-sitetopology:
Acustomer mirrors the egress traffic to multiple servers in one-to-many mode.Two 10 Gbps VSLs are configured but the interface traffic of one VSL is aboutto reach the limit.
æ Fault analysis
1. Possiblecauses
Withone-to-many mirroring, the traffic of the MAC self-loop port is flooded to aVSL via remote VLAN. There is no measure for balancing the layer-2 trafficflooded to the VSLs.
2. Causelocating
Thetraffic of one VSL is about to reach the limit, that is, 10 Gbps. Data istransmitted from RG-N18000 2 to RG-N18000 1.
Itis found that the traffic in the inbound direction of RG-N18000 2 is not heavybut the traffic of the mirroring self-loop port is about 10 Gbps.
Theself-loop port belongs to VLAN 1581.
3. Detailedanalysis
a.Related configuration
vlan1581
name_VLANstudent egress remote mirroring
remote-span
!
interfaceTenGigabitEthernet 2/7/3
descriptionto- mirroring port
switchportaccess vlan 1581
spanning-treebpdufilter enable
ipdhcp snooping trust
nfpparp-guard enable
nfppicmp-guard enable
!
interfaceTenGigabitEthernet 2/7/4
descriptionto- destination mirroring port- source ten2/7/7&2/7/1
nomac-address-learning
switchportaccess vlan 1581
ipdhcp snooping trust
mac-loopback
!
interfaceTenGigabitEthernet 2/7/8
descriptionlink_to_ASME1000_moniter
nomac-address-learning
switchportmode trunk
switchporttrunk native vlan 1581
switchporttrunk allowed vlan only 1581
!
monitorsession 4 remote-source
monitorsession 4 destination remote vlan 1581 interface TenGigabitEthernet 2/7/4 switch
monitorsession 4 source interface TenGigabitEthernet 2/7/7 both
b.Principle analysis
One-to-manymirroring is configured on the RG-N18000, to mirror the traffic of the outboundport Te2/7/7 to port Te2/7/3 and port Te2/7/8.
l lCreate remoteVLAN 1581 on the device.
l lSpecify thedevice as the RSPAN source device, configure the outbound port Te2/7/7 as themirroring source port. Select a down port (port Te2/7/4) as the mirroringoutput port, add the port to the remote VLAN, and configure MAC self-loop byrunning the mac-loopback command in interface configuration mode.
l lAdd portTe2/7/3 and port Te2/7/8 to the remote VLAN.
Inthis scenario, the traffic of the VLAN is flooded to all chips. The traffic ofthe MAC self-loop port is flooded to the VSL port regardless of whetherRG-N18000 1 has a port included in VLAN 1581.
æ Solution
1. Optimizationsolution
a.Increase the VSL bandwidth.
Changethe VSL port to 40G port. Line cards with 40G ports include 16XS2QXS-BD.
Forone-to-many mirroring requirement, a layer-2 switch can be added to mirror thetraffic of the mirroring source port to the layer-2 switch in one-to-one mode,and then the layer-2 switch floods the traffic to multiple destination portsover the same VLAN on the layer-2 switch.
Note:In the topology above, the source ports are Ten 2/7/7 and Ten 1/7/1, and thedestination port is AP 1.
Configurationsteps:
l = Add port Ten 1/7/1 and port Ten 2/7/1 of RG-N18000 1 to AP 1.
l = Configure local mirroring on the RG-N18000, and specify port Ten2/7/7 and AP1 as the source port and destination port of mirroringrespectively.
l = Add port Ten 0/1 and port Ten 0/2 of the S6220 to AP 1.
AddAP1, port Ten0/3, and port Ten0/4 of the S6220 to VLAN 100.
RG-N18000:
Ruijie# configure
Ruijie(config)#interfaceaggregatePort 1
Ruijie(config-if-AggregatePort1)#exit
Ruijie(config)#interfacetenGigabitEthernet 1/7/1
Ruijie(config-if-TenGigabitEthernet1/7/1)#port-group 1
Ruijie(config)#interfacetenGigabitEthernet 2/7/1
Ruijie(config-if-TenGigabitEthernet2/7/1)#port-group 1
Ruijie(config)# monitor session 1source interface tenGigabitEthernet 2/7/7
Ruijie(config)# monitor session 1destination interface aggregatePort 1
S6220:
Ruijie(config)#interfaceaggregatePort 1
Ruijie(config-if-AggregatePort1)#switchport access vlan 100
Ruijie(config-if-AggregatePort1)#exit
Ruijie(config)#interfacetenGigabitEthernet 0/1
Ruijie(config-if-TenGigabitEthernet0/1)#port-group1
Ruijie(config)#interfacetenGigabitEthernet 0/2
Ruijie(config-if-TenGigabitEthernet0/2)#port-group 1
Ruijie(config)#interfacetenGigabitEthernet 0/3
Ruijie(config-if-TenGigabitEthernet0/3)# switchport access vlan 100
Ruijie(config)#interfacetenGigabitEthernet 0/4
Ruijie(config-if-TenGigabitEthernet0/4)# switchport access vlan 100
Thorough solution
N/A
Add the NAS (RG-N18000) on SAM+.
The NAS-relevant parameters added on SAM+must be consistent with the actual settings of the NAS. Otherwise, anauthentication exception occurs.
l The address for the RG-N18000 to interwork with SAM+ must becorrect on SAM+. For example, if the source port for communicating with SAM+ isconfigured on the RG-N18000 by running the ip radius source-interface loopback0 command, the IP address of the loopback0 interface of the RG-N18000 needsto be entered in the Device IP Address column of SAM+.
l The key for interworking with the RG-N18000 needs to be consistent.
l The SNMP community for interworking with the RG-N18000 needs to beconsistent.
1. Log into the SAM+ management page.
2. Choose System> Device Management.
3. Click Addto add a device.
4. SetNAS-relevant parameters and ensure that the key parameters are consistent withthe actual settings of the NAS. Then, click Save.
1. Checkwhether the SAM+ server can ping the device successfully. If yes, it indicatesthat their communication is normal (ensure that ping packets are notintercepted by the firewall).
Configure access control to restrictInternet access behavior of users.
The Internet access behavior of accessusers needs to be confirmed with customers and access control needs to beconfigured based on actual conditions.
1. Log into the SAM+ management page.
2. Choose AccessControl > Access Control.
3. Click Addto add access control.
4. Onthe Access Control Information tab page, enter the access control name,for example, "dot1x", and set other parameters based on actualconditions.
5. Onthe User Information Check tab page, select Wired 1X Access andconfigure whether to bind accounts with IP/MAC addresses based on actualconditions. Then, click Save.
Verify that access control is addedsuccessfully.
Configure billing policies based onbilling requirements of access users, to pay for Internet access.
Billing requirements of access users needto be confirmed with customers and billing policies need to be configured basedon actual conditions.
1. Log into the SAM+ management page.
2. Choose Billing> Billing Policy.
3. Select MonthlyBilling Policy and click Add.
4. Enterthe billing policy name, for example, "dot1x", set Period Typeto 30 Days or Month, and set Rate (MYR), for example, 30Yuan/month. Then, click Save.
Verify that the billing policy is addedsuccessfully.
Configure user templates based on userattributes for later account creation.
It is recommended to classify usertemplates with the same attribute into a group and give concise and intuitivenames to the templates, for example, student monthly billing template orteacher monthly billing template.
1. Log into the SAM+ management page.
2. Choose User> User Template.
3. Click Add.
4. In the AddUser Template dialog box, enter the template name, for example,"dot1x", and click Save.
Verify that the user template is addedsuccessfully.
Configure a user plan to cover accesslimits of authenticated users, including the area, time range, access control,and billing policy. A user plan is akin to a phone service package.
A plan covers all control options andfees for access users. Be sure to clearly confirm plans with customers beforeconfiguration.
1. In theconfigured user template "dot1x", click Add Plan.
2. Enterthe plan name, for example, "dot1x", select a configured billingpolicy or Not Charging based on actual requirements, and then click Save.
3. ClickModify Plan and modify the access area, access time range, accesscontrol, and billing mode.
4. Modifythe rule based on actual conditions. The figure below shows that the accessarea of authenticated users is unlimited, access control is set to"dot1x", the access time range is unlimited, and billing is performedbased on the plan "dot1x".
Verify that the plan meets customerrequirements.
Add authenticated users with the sameattribute to the same group, and define a response user template and plan forthe user group to prepare for later account creation.
It is recommended to group access usersby attribute, for example, group users on campus networks into "studentuser group" or "teacher user group".
1. Log into the SAM+ management page.
2. Choose User> User Group.
3. Click Add.
4. Enter the user group name, for example,"dot1x", and select the default user template and default plan. Then,click Save.
Verify that the user group is addedsuccessfully.
Create accounts in the SAM+ system.
1. Theaccount creation process generally requires users to go to business halls andapply for accounts by using their ID cards.
2. Accountswith the names same as those on their ID cards are registered during accountcreation.
3. Auser group and a user template need to be selected during account creation asplanned.
1. Log into the SAM+ management page.
2. Choose User> User Management.
3. Click CreateAccount in the left pane.
4. Enterthe username and password, select a user group, user template, and plan. Then,click Save.
1. Inthe left pane of the User Management page, click User Search. Inthe displayed right pane, click Search. The added user is displayed.
Collect fees from newly created users, sothat they can be authenticated, be charged, and access the Internet.
The payment operation involves fees.Ensure that paid fees are consistent with the fees recorded in the system.
1. Log into the SAM+ management page.
2. Choose Billing> Fees Management.
3. Thenewly created user has insufficient balance. Click the icon in the Paymentcolumn.
4. Collectthe fees, record the fees actually paid by the user in the system, and click Payment.
1. Verifythat the fees are paid successfully.
2. Verifythat the fees are corrected and the account is in the normal state. As shown inthe figure below, 123 Yuan is deducted from the user account "dot1x"for the current month, and the account has 246 Yuan balance, and is in thenormal state.
Add ACs on SAM+.
The AC parameters added on SAM+ must beconsistent with the actual settings of the AC. Otherwise, an authenticationexception will occur.
1. Log into the SAM+ management page.
2. Choose System> Device Management.
3. Click Addto add a device.
4. SetAC parameters and ensure that the key parameters are consistent with the actualsettings of the AC. Then, click Save.
1. Checkwhether the SAM+ server can ping the device successfully. If yes, it indicatesthat their communication is normal (ensure that ping packets are notintercepted by the firewall).
Configure access control to restrictInternet access behavior of users.
The Internet access behavior of accessusers needs to be confirmed with customers and access control needs to beconfigured based on actual conditions.
1. Log into the SAM+ management page.
2. Choose AccessControl > Access Control.
3. Click Addto add access control.
4. Onthe Access Control Information tab page, enter the access control name,for example, "wireless1x", and set other parameters based on actualconditions.
5. Onthe User Information Check tab page, select Wireless 1X Accessand configure whether to bind accounts with IP/MAC addresses based on actualconditions. Then, click Save.
Verify that access control is addedsuccessfully.
Configure billing policies based onbilling requirements of access users, to pay for Internet access.
Billing requirements of access users needto be confirmed with customers and billing policies need to be configured basedon actual conditions.
1. Log into the SAM+ management page.
2. Choose Billing> Billing Policy.
3. Select MonthlyBilling Policy and click Add.
4. Enterthe billing policy name, for example, "wireless_month", set PeriodType to 30 Days or Month, and set Rate (MYR), forexample, 30 Yuan/month. Then, click Save.
Verify that the billing policy is addedsuccessfully.
Configure user templates based on userattributes for later account creation.
It is recommended to classify usertemplates with the same attribute into a group and give concise and intuitivenames to the templates, for example, student monthly billing template orteacher monthly billing template.
1. Log into the SAM+ management page.
2. Choose User> User Template.
3. Click Add.
4. Enterthe template name, for example, "wireles_month", and click Save.
Verify that the user template is addedsuccessfully.
Configure a user plan to cover accesslimits of authenticated users, including the area, time range, access control,and billing policy. A user plan is akin to a phone service package.
A plan covers all control options andfees for access users. Be sure to clearly confirm plans with customers beforeconfiguration.
1. In theconfigured user template "wireless_month", click Add Plan.
2. Enterthe plan name, for example, "wireless_month", select a configuredbilling policy or Not Charging based on actual requirements, and thenclick Save.
3. Click ModifyPlan and modify the access area, access time range, access control, andbilling mode.
4. Modifythe rule based on actual conditions. The figure below shows that the accessarea of authenticated users is unlimited, access control is set to"wireless1x", the access time range is unlimited, and billing isperformed based on the plan "wireless_month".
Verify that the plan meets customerrequirements.
Addauthenticated users with the same attribute to the same group, and define aresponse user template and plan for the user group to prepare for later accountcreation.
Itis recommended to group access users by attribute, for example, group users oncampus networks into "student user group" or "teacher usergroup".
1. Log into the SAM+ management page.
2. Choose User> User Group.
3. Click Add.
4. Enterthe user group name, for example, "wireless_month", and select thedefault user template and default plan. Then, click Save.
Verify that the user group is addedsuccessfully.
Create accounts for users in the SAM+system.
1. Theaccount creation process generally requires users to go to business halls andapply for accounts by using their ID cards.
2. Accountswith the names same as those on their ID cards are registered during accountcreation.
3. A usergroup and a user template need to be selected during account creation asplanned.
1. Log into the SAM+ management page.
2. Choose User> User Management.
3. Click CreateAccount in the left pane.
4. Enterthe username and password, select a user group, user template, and plan. Then,click Save.
1. Inthe left pane of the User Management page, click User Search. Inthe displayed right pane, click Search. The added user is displayed.
Collect fees from newly created users, sothat they can be authenticated, be charged, and access the Internet.
The payment operation involves fees.Ensure that paid fees are consistent with the fees recorded in the system.
1. Log into the SAM+ management page.
2. Choose Billing> Fees Management.
3. Thenewly created user has insufficient balance. Click the icon in the Paymentcolumn.
4. Collectthe fees, record the fees actually paid by the user in the system, and click Payment.
1. Verifythat the fees are paid successfully.
2. Verifythat the fees are corrected and the account is in the normal state. As shown inthe figure below, 123 Yuan is deducted from the user account"wireless1x" for the current month, and the account has 123 Yuanbalance, and is in the normal state.
Add the NAS (RG-N18000) on SAM+.
The NAS-relevant parameters added on SAM+must be consistent with the actual settings of the NAS. Otherwise, anauthentication exception occurs.
l The address for the RG-N18000 to interwork with SAM+ must becorrect on SAM+. For example, if the source port for communicating with SAM+ isconfigured on the RG-N18000 by running the ip radius source-interface loopback0 command, the IP address of the loopback0interface of the RG-N18000 needs to be entered in the Device IP Addresscolumn of SAM+.
l The key for interworking with the RG-N18000 needs to be consistent.
l The SNMP community for interworking withthe RG-N18000 needs to be consistent.
1. Log into the SAM+ management page.
2. Choose System> Device Management.
3. Click Addto add a device.
4. SetNAS-relevant parameters and ensure that the key parameters are consistent withthe actual settings of the NAS. Then, click Save.
1. Checkwhether the SAM+ server can ping the device successfully. If yes, it indicatesthat their communication is normal (ensure that ping packets are notintercepted by the firewall).
Add information about the ePortal Serveron SAM+.
The ePortal parameters added on SAM+ mustbe consistent with the actual settings of the ePortal server. Otherwise, anauthentication exception occurs.
1. Log into the SAM+ management page.
2. Choose System> Device Management.
3. Click Addto add a device.
4. Addthe ePortal server and ensure that the key parameters are consistent with theactual settings of the ePortal server. Then, click Save.
1. Checkwhether the SAM+ server can ping ePortal successfully. If yes, it indicatesthat their communication is normal (ensure that ping packets are notintercepted by the firewall).
2. On theSAM+ server, log in to the ePortal system in HTTP mode and check whether youcan log in successfully. If yes, it indicates that their communication isnormal.
Set parameters of the ePortal server sothat it can communicate with the SAM+ and NAS normally.
The parameters on the ePortal server mustbe consistent with those on the SAM+ and NAS.
1. Login to the ePortal management page, click System Settings, and enter theSAM+ address, RADIUS key, and authentication and accounting ports in the RADIUSServer area. Ensure that the parameters are consistent with those on theSAM+ server.
2. SetSNMP parameters in Device Communication Settings.
Informs Community: SNMP community nameused for receiving traps from the device. It must be consistent with thecommunity name configured on the device.
SNMP Community: community name of thevirtual SNMP agent maintained on the ePortal system. It is used to process SNMPpackets between the ePortal system and the RADIUS server.
Check parameters and verify that relevantparameters are consistent with those on SAM+ and the NAS.
Add the NAS on the ePortal server.
The NAS parameters added on the ePortalserver must be consistent with those on the NAS.
1. Login to the ePortal management page, click Device Management, select 2nd-GenerationWeb Authentication Access Device from the Device Type drop-downlist, and enter the IP address and relevant parameters of the Webauthentication access device. Keep these parameters consistent with those onthe NAS. Then, click Save.
1. Checkwhether the ePortal server can ping the device successfully. If yes, theircommunication is normal (ensure that ping packets are not intercepted by thefirewall).
Configure access control to restrictInternet access behavior of users.
The Internet access behavior of accessusers needs to be confirmed with customers and access control needs to beconfigured based on actual conditions.
1. Log into the SAM+ management page.
2. Choose AccessControl > Access Control.
3. Click Addto add access control.
4. Onthe Access Control Information tab page, enter the access control name,for example, "wired_web", and set other parameters based on actualconditions.
5. Onthe User Information Check tab page, select Wired Web Portal Accessand configure whether to bind accounts with IP/MAC addresses based on actualconditions. Then, click Save.
Verify that access control is addedsuccessfully.
Configure billing policies based onbilling requirements of access users, to pay for Internet access.
Billing requirements of access users needto be confirmed with customers and billing policies need to be configured basedon actual conditions.
1. Log into the SAM+ management page.
2. Choose Billing> Billing Policy.
3. Select MonthlyBilling Policy and click Add.
4. Enterthe billing policy name, for example, "wired_month", set PeriodType to 30 Days or Month, and set Rate (MYR), forexample, 30 Yuan/month. Then, click Save.
Verify that the billing policy is addedsuccessfully.
Configure user templates based on userattributes for later account creation.
It is recommended to classify usertemplates with the same attribute into a group and give concise and intuitivenames to the templates, for example, student monthly billing template orteacher monthly billing template.
1. Log into the SAM+ management page.
2. Choose User> User Template.
3. Click Add.
4. Enterthe template name, for example, "wired_month", and click Save.
Verify that the user template is addedsuccessfully.
Configure a user plan to cover accesslimits of authenticated users, including the area, time range, access control,and billing policy. A user plan is akin to a phone service package.
A plan covers all control options andfees for access users. Be sure to clearly confirm plans with customers beforeconfiguration.
1. In theconfigured user template "wired_month", click Add Plan.
2. Enterthe plan name, for example, "wired_month", select a configuredbilling policy or Not Charging based on actual requirements, and thenclick Save.
3. Click ModifyPlan and modify the access area, access time range, access control, andbilling mode.
4. Modifythe rule based on actual conditions. The figure below shows that the accessarea of authenticated users is unlimited, access control is set to"wired_web", the access time range is unlimited, and billing isperformed based on the plan"wired_month".
Verify that the plan meets customerrequirements.
Addauthenticated users with the same attribute to the same group, and define aresponse user template and plan for the user group to prepare for later accountcreation.
Itis recommended to group access users by attribute, for example, group users oncampus networks into "student user group" or "teacher usergroup".
1. Log into the SAM+ management page.
2. Choose User> User Group.
3. Click Add.
4. Enterthe user group name, for example, "wireless_month", and select thedefault user template and default plan. Then, click Save.
Verify that the user group is added successfully.
Create accounts for users in the SAM+system.
1. Theaccount creation process generally requires users to go to business halls andapply for accounts by using their ID cards.
2. Accountswith the names same as those on their ID cards are registered during accountcreation.
3. A usergroup and a user template need to be selected during account creation asplanned.
1. Log into the SAM+ management page.
2. Choose User> User Management.
3. Click CreateAccount in the left pane.
4. Enterthe username and password, select a user group, user template, and plan. Then,click Save.
1. Inthe left pane of the User Management page, click User Search. Inthe displayed right pane, click Search. The added user is displayed.
Collect fees from newly created users, sothat they can be authenticated, be charged, and access the Internet.
The payment operation involves fees.Ensure that paid fees are consistent with the fees recorded in the system.
1. Log into the SAM+ management page.
2. Choose Billing> Fees Management.
3. Thenewly created user has insufficient balance. Click the icon in the Paymentcolumn.
4. Collectthe fees, record the fees actually paid by the user in the system, and click Payment.
1. Verifythat the fees are paid successfully.
2. Verifythat the fees are corrected and the account is in the normal state. As shown inthe figure below, 123 Yuan is deducted from the user account"wireless1x" for the current month, and the account has 246 Yuanbalance, and is in the normal state.
Enable MAB authentication in automaticmode on SAM+.
The process of MAC binding in automaticmode is as follows (Web authentication is required for initial access):
In automatic mode, users do not need toselect Smart Login on the authentication page, which is different fromthe operation in manual mode.
Basic settings of Web authentication needto be completed to implement MAB authentication, and details are not describedhere.
For basic settings of Web authenticationon SAM+, see "RG-N18000 — Web Authentication (Wired & Wireless)"in "Common Scenario — Authentication" in "SAM+ and ePortalConfiguration."
1. Choose AccessControl > Access Control > Modify > UserInformation Check, and select MAC Fast Access.
2. ChooseAccess Control > Access Control > Modify > AccessControl Information, and select Automatic Binding MAC authenticationinformation quickly.
1. Whena user uses a mobile phone to connect to an SSID with MAC authenticationenabled, Web authentication needs to be completed for initial access.
2. OnSAM+, choose User > MAC Authentication and check whetherinformation about the MAB authenticated user has been learned.
3. Afterthe user goes offline, enable the user to connect to the SSID with MACauthentication enabled, and check online user records on SAM+.
Enable MAB authentication in manual modeon SAM+.
The process of MAC binding in manual modeis as follows (Web authentication is required for initial access):
In manual mode, users need toselect Smart Login on the authentication page, which is different fromthe operation in automatic mode.
Basic settings of Web authentication needto be completed to implement MAB authentication, and details are not describedhere.
For basic settings of Web authenticationon SAM+, see "RG-N18000 — Web Authentication (Wired & Wireless)"in "Common Scenario — Authentication" in "SAM+ and ePortalConfiguration."
1. Choose AccessControl > Access Control > Modify > UserInformation Check, and select MAC Fast Access.
2. ChooseAccess Control > Access Control > Modify > AccessControl Information, ensure that Automatic Binding MAC authenticationinformation quickly is deselected.
1. Whena user uses a mobile phone to connect to a SSID with MAC authenticationenabled, Web authentication needs to be completed for initial access, and EnableMAB Authentication needs to be checked.
2. OnSAM+, choose User > MAC Authentication and check whetherinformation about the MAB authenticated user has been learned.
3. Afterthe user goes offline, enable the user to connect to the SSID with MACauthentication enabled, and check online user records on SAM+.
TheMAC binding validity period (0–365 days) can be configured for a plan. Afterthe validity period expires, MAC addresses are automatically unbound and theMAB authentication permission for the user is canceled.
N/A
N/A
Insome projects involving the networks of multiple ISPs, schools may requestdifferent Web authentication pages be pushed based on the SSIDs of the ISPnetworks.
TheePortal system allows displaying different authentication pages based on SSIDsor user groups.
In the simplistic network solution, thecore device RG-N18000 cannot associate with APs to obtain SSIDs of users whoadopt wireless authentication and the VLAN-based SSID mapping function isrequired.
For the configuration of the VLAN-basedSSID mapping on the RG-N18000, see "Web Authentication — IP/VLAN-basedSSID Mapping" in "Common Scenario — Authentication" in"RG-N18000 Configuration."
1. InPage Management, customize authentication pages for user PCs and mobilephones based on customer requirements (one authentication page for the SSID ofeach ISP).
2. Completethe mapping between different SSIDs and customization pages.
Verify that the different customizedauthentication pages are displayed when users connect to different SSIDs.
1. Layer-2network requirements
l Deploy the access isolation solution to implement layer-2 isolationof users on the whole network.
l Deploy centralized forwarding on the wireless network.
l Enable IPv6 on the whole network, so that IPv6 users can access thenetwork only after IPv4 authentication succeeds.
l Use the core device as the wired/wireless gateway andauthentication NAS on the whole network, to provide unified management, andsupport a maximum of 20,000 online clients.
2. Requirementsrelated to authentication types
l In the office area, deploy wired and wireless Web authenticationand MAB authentication.
l In the student dormitory area, deploy wired 802.1x authentication,wireless 802.1x authentication, and wireless Web authentication.
l In the visitor area, deploy QR code authentication.
l In the headmaster office and other school director offices, deployauthentication exemption.
l Exempt re-authentication for users who move in the same area.
l In the dormitory area and office area, deploy no-traffic go-offlineso that clients automatically go offline when the clients generate no trafficin 15 minutes.
3. Requirementsrelated to authentication access control (Note: Access time control is onlyused for testing, and the actual deployment is subject to the onsitesituation.)
l In the student dormitory area, network access is allowed only at10:30–10:32.
l In the teaching area, network access is prohibited for studentusers at 9:00–12:00 and 14:00–16:00.
l In the office area, student users cannot be authenticated.
4. Addressmanagement requirements (Note: Address segment assignment is only used for casedemonstration, and the actual deployment is subject to the onsite situation.)
l For the wired network, configure a private address with a 20-bitsubnet mask for each area, and a private address with a 24-bit subnet mask foreach building:
Officearea: 10.1.16.0/20 (building 1: 10.1.16.0/24, building 2: 10.1.17.0/24 ...building 5: 10.1.20.0/24)
Studentdormitory area: 10.1.32.0/20 (building 1: 10.1.32.0/20, building 2:10.1.33.0/20 ... building 5: 10.1.36.0/20)
l For the wireless network:
Officearea: 10.1.16.0/20 (building 1 for 802.1x authentication: 10.1.21.0/24,building 1 for Web authentication: 10.1.22.0/24, building 2 for 802.1xauthentication: 10.1.23.0/24, and building 2 for Web authentication:10.1.24.0/24)
Studentdormitory area: 10.1.32.0/20 (building 1 for 802.1x authentication:10.1.37.0/24, building 1 for Web authentication: 10.1.38.0/24, building 2 for802.1x authentication: 10.1.39.0/24, and building 2 for Web authentication:10.1.40.0/24)
(Note:One super VLAN is set in each area for both wired and wireless networks. Youcan also set one super VLAN in each area for the wireless network according toactual situations.)
l Special services need independent network segments:
Doorstatus control service: 10.0.10.0/24
All-in-onecard service: 10.0.11.0/24
Videomonitoring service: 10.0.12.0/24
Wireddevice NMS: 10.0.1.0/24
APmanagement address: 10.0.2.0/24
5. Otherrequirements
l Only the network in the new campus is reconstructed. In the networkin the old campus, layer-3 protocols are still used to connect to theRG-N18000, and the aggregation device serves as the user gateway and DHCPrelay, and is interconnected with the RG-N18000 via OSPF.
l Configure the escape function on the RADIUS server and ePortalserver, to avoid affecting the users' online services if either server is down.
l Configure VLAN pruning to avoid broadcast floods.
l Configure passive ports for routing optimization to avoidunnecessary protocol overheads of the CPU.
1. TheRG-N18000 does not support 802.1x authentication. Therefore, configure thewireless 802.1x NAS function on the AC.
2. IPv6does not support direct authentication. Therefore, configure IPv6authentication to compatible mode, so that IPv6 users can access the networkafter successful IPv4 authentication.
3. To avoidre-authentication for users who move in the same area, configure the migrationfunction for authenticated users on the RG-N18000.
4. EnableAM rules to plan IP addresses for buildings in each area.
5. DHCPrelay is enabled on the aggregation device of the original network. To preventDHCP packets from being dropped by the DHCP snooping module on the RG-N18000,run the ip dhcp snooping check-giaddr command on the RG-N18000.
6. Configurethe escape function on the RG-N18000 for the RADIUS server and portal server.
7. ConfigureVLAN pruning for the downlink trunk port of the RG-N18000.
Thefollowing tables list VLAN/IP plans for the wired and wireless networks in thestudent dormitory area (plans for other areas are the same).
Wirednetwork VLAN/IP planning for the student dormitory area:
Device Model | Device type | Position | Management Address | Sub VLAN | Super VLAN | IP Address Segment | Gateway | Network Management VLAN | Door Status Control VLAN | All-in-One Card VLAN | Video Monitoring VLAN |
S2928G | Floor access switch | 1F, building 1, student dormitory area | 10.0.1.10 | 200 | 2001 | 10.1.32.0 | 10.1.32.254 | 3000 | 3010 | 3011 | 3012 |
S2928G | Floor access switch | 2F, building 1, student dormitory area | 10.0.1.11 | 201 | 2001 | 10.1.33.0 | 10.1.32.254 | 3000 | 3010 | 3011 | 3012 |
S2928G | Floor access switch | 1F, building 2, student dormitory area | 10.0.1.12 | 202 | 2001 | 10.1.34.0 | 10.1.32.254 | 3000 | 3010 | 3011 | 3012 |
S2928G | Floor access switch | 2F, building 2, student dormitory area | 10.0.1.13 | 203 | 2001 | 10.1.35.0 | 10.1.32.254 | 3000 | 3010 | 3011 | 3012 |
S2928G | Floor access switch | 1F, building 3, student dormitory area | 10.0.1.14 | 204 | 2001 | 10.1.36.0 | 10.1.32.254 | 3000 | 3010 | 3011 | 3012 |
Wirelessnetwork VLAN/IP planning for the student dormitory area:
Location | AP Management VLAN | AP Management Network Segment | Gateway | Sub VLAN of Web Authentication | IP Address Segment of Web Authentication | Sub VLAN of 802.1x Authentication | IP Address Segment of 802.1x Authentication | Super VLAN | Gateway | SSID of Web Authentication | SSID of 802.1x Authentication |
Building 1, student dormitory area | 3001 | 10.0.2.0/24 | 10.0.2.254 | 301 | 10.1.37.0/24 | 351 | 10.1.38.0/24 | 2001 | 10.1.32.254 | su-web | su-1x |
Building 2, student dormitory area | 3001 | 10.0.2.0/24 | 10.0.2.254 | 302 | 10.1.39.0/24 | 352 | 10.1.40.0/24 | 2001 | 10.1.32.254 | su-web | su-1x |
Building 3, student dormitory area | 3001 | 10.0.2.0/24 | 10.0.2.254 | 303 | 10.1.41.0/24 | 353 | 10.1.42.0/24 | 2001 | 10.1.32.254 | su-web | su-1x |
Building 4, student dormitory area | 3001 | 10.0.2.0/24 | 10.0.2.254 | 304 | 10.1.43.0/24 | 355 | 10.1.44.0/24 | 2001 | 10.1.32.254 | su-web | su-1x |
Building 5, student dormitory area | 3001 | 10.0.2.0/24 | 10.0.2.254 | 305 | 10.1.45.0/24 | 356 | 10.1.46.0/24 | 2001 | 10.1.32.254 | su-web | su-1x |
OverallVLAN/IP planning
Area | Service | Common VLAN | Super VLAN | Sub VLAN | IP | Gateway |
Egress | Device interconnection | N/A |
|
| 10.0.0.0/24 | 10.0.0.1 |
Server area | VM | N/A |
|
| 172.29.2.0/24 | 172.29.2.253 |
Wired NMS | Device NMS | 3000 |
|
| 10.0.1.0/24 | 10.0.1.254 |
Wireless AP | AP management | 3001 |
|
| 10.0.2.0/24 | 10.0.2.254 |
Authentication-free area | Door Status Control VLAN | 3010 |
|
| 10.0.10.0/24 | 10.0.10.254 |
All-in-one card | 3011 |
|
| 10.0.11.0 | 10.0.11.254 | |
Monitoring | 3012 |
|
| 10.0.12.0/24 | 10.0.12.254 | |
Office area | Wired 802.1x authentication and Web authentication |
| 2000 | 1–99 | 10.1.16.0/24 | 10.1.16.254/20 |
Wireless 802.1x authentication |
| 100–149 | 10.1.18.0/24 | |||
Wireless Web authentication |
| 150–199 | 10.1.19.0/24 | |||
Dormitory area | Wired 802.1x authentication and Web authentication |
| 2001 | 200–299 | 10.1.32.0/24 | 10.1.32.254/20 |
Wireless 802.1x authentication |
| 300–349 | 10.1.34.0/24 | |||
Wireless Web authentication |
| 350–399 | 10.1.35.0/24 |
1.Configuring network communication in the egress area
Configurean uplink port on the RG-N18000, perform layer-3 configuration for the uplinkport, configure routes, and check whether the external network communication isnormal on the RG-N18000. The configuration commands are omitted.
2.Completing basic settings on the RG-N18000
DSW-18KX_LX(config)#auth-modegateway//Configure the gateway mode and restart the device.
DSW-18KX_LX(config)#snmp-server host172.29.2.9 informs version 2c ruijie //Configure SNMP interactionbetween the RG-N18000 and SAM+.
DSW-18KX_LX(config)#snmp-serverif-index persist//Set the port index to be permanently unique.
DSW-18KX_LX(config)#servicedhcp//Enable the DHCP service on the core device.
DSW-18KX_LX(config)#ip dhcp snooping//Mandatory.This command is required for IP authorization for 802.1X authentication and MABauthentication.
DSW-18KX_LX(config)#ip dhcp snoopingcheck-giaddr//Configure a compatible command for DHCP snooping and relay, toprevent DHCP packets from being dropped by the DHCP snooping module on theRG-N18000.
DSW-18KX_LX(config)#aaa group serverradius SAM
DSW-18KX_LX(config-gs-radius)# server172.29.2.9
DSW-18KX_LX(config)#aaa new-model
DSW-18KX_LX(config)#aaa accountingupdate periodic 30
DSW-18KX_LX(config)#aaa accountingupdate
DSW-18KX_LX(config)#aaa accountingnetwork default start-stop group SAM
DSW-18KX_LX(config)#aaaauthentication login default none
DSW-18KX_LX(config)#aaaauthentication dot1x default group SAM
DSW-18KX_LX(config)#aaa authenticationweb-auth default group SAM
DSW-18KX_LX(config)#aaa authorizationip-auth-mode mixed //ConfigureIP authorization to the mixed mode.
DSW-18KX_LX(config)#dot1x accountingdefault//Enable the 802.1x accounting list.
DSW-18KX_LX(config)#dot1x authenticationdefault //Enable the 802.1xauthentication list.
DSW-18KX_LX(config)#ip radiussource-interface GigabitEthernet 1/24 //Configure the sourceinterface for the device to communicate with the RADIUS server. The deviceaddress added to SAM+ should be the address of this interface.
DSW-18KX_LX(config)#ip portalsource-interface GigabitEthernet 1/24 //Configure the sourceinterface for the device to communicate with the ePortal server. The deviceaddress added to the ePortal server should be the address of this interface.
DSW-18KX_LX(config)#ip dhcp snoopingarp-detect //Enable fast ARP address reclaiming ofDHCP snooping. The ARP address reclaiming is performed once per second duringARP aging and can be performed five times at most.
DSW-18KX_LX(config)#ip dhcp serverarp-detect//Enable fast address reclaiming of the DHCP server. If identifyingthat a user goes offline and does not go online again within a period of time(5 minutes by default), the DHCP server reclaims the IP address assigned to theuser.
DSW-18KX_LX(config)#no aaa log enable
DSW-18KX_LX(config)#web-auth templateeportalv2
DSW-18KX_LX(config.tmplt.eportalv2)#ip172.29.2.8
DSW-18KX_LX(config.tmplt.eportalv2)#url http://172.29.2.8/eportal/index.jsp
DSW-18KX_LX(config.tmplt.eportalv2)#exit
DSW-18KX_LX(config)#web-auth portalkey su
DSW-18KX_LX(config)#http redirectdirect-site 192.168.9.12 //Configure the addressof the RG-SU server as an authentication-free address.
DSW-18KX_LX(config)#web-authdirect-host10.1.16.200 //Configure theclient of a school director as an authentication-free client.
DSW-18KX_LX(config)#dot1xmac-auth-bypass valid-ip-auth //Mandatory. The DHCP module instructs theMAB module to start authentication. Clients must obtain IP addresses beforestarting MAB authentication.
DSW-18KX_LX(config)#dot1xvalid-ip-acct enable //Mandatory. The accounting updatepackets are used to upload the user IP address to SAM+. If the 802.1xauthentication module does not have an IP entry of the user, the user is kickedoffline 5 minutes later.
DSW-18KX_LX(config)#direct-vlan100-149,300-349,3000-3001,3010-3012 //ConfigureVLANs for wireless 802.1x authentication, monitoring, device management, andwireless AP management as authentication-free VLANs.
DSW-18KX_LX(config)#web-authportal-check interval 3 timeout 3 retransmit10 //Configure portal escape.
DSW-18KX_LX(config)#web-authportal-escape nokick
DSW-18KX_LX(config)#radius-serverhost 172.29.2.9 test username ruijie idle-time 2 key ruijie
DSW-18KX_LX(config)#radius-serverdead-criteria time 120 tries 12 //Configure an IPaddress for the RADIUS server and enable the RADIUS escape test function.
DSW-18KX_LX(config)#web-authradius-escape //Globally enable RADIUS escape in Webauthentication mode.
DSW-18KX_LX(config)#address-bindipv6-mode compatible//Set IPv6 authentication to the compatible mode.
DSW-18KX_LX(config)#station-movepermit //Enable migration of 802.1x authenticatedclients.
DSW-18KX_LX(config)#web-authstation-move auto //Enable migration of Webauthenticated clients.
DSW-18KX_LX(config)#web-authstation-move info-update
DSW-18KX_LX(config)#no dot1xstation-move arp-detect //It is recommended to disable ARPdetection after migration of 802.1x authenticated clients, because the ARPdetection will cause broadcast packet floods.
DSW-18KX_LX(config)#http redirectport 443 //Because this configuration consumesdevice resources, it is recommended to discuss with the customer about whetherto enable the configuration if a great number of users need authentication.
DSW-18KX_LX(config)#cpu-protect typeweb-auths bandwidth 2000 //Configure the HTTPS optimization command. HTTPSinvolves socket encryption and decryption, consuming a great deal of processingresources. 11.0(1)B2T11 and later versions separate HTTPS from HTTP for the useof CPU resources. If HTTPS redirection is enabled, configure CPP rate limitingfor HTTPS.
DSW-18KX_LX(config)#offline-detectinterval 15 threshold 0 //Set the no-trafficgo-offline detection period to 15 minutes.
DSW-18KX_LX(config)#snmp-server host172.29.2.9 informs version 2c ruijie //Configure SNMP.
DSW-18KX_LX(config)#snmp-server host172.29.2.9 traps su
DSW-18KX_LX(config)#snmp-servercommunity su rw
3.Configuring VLANs on the RG-N18000
DSW-18KX_LX(config)#vlan range 1-399
DSW-18KX_LX(config-vlan-range)#exit
DSW-18KX_LX(config)#vlan 2000
DSW-18KX_LX(config-vlan-range)#supervlan//Configurea super VLAN in the office area.
DSW-18KX_LX(config-vlan-range)#subvlan1-199 //Associate sub VLANs with the super VLAN.
DSW-18KX_LX(config-vlan-range)#exit
DSW-18KX_LX(config)#vlan 2001
DSW-18KX_LX(config-vlan-range)#supervlan//Configurea super VLAN in the dormitory area.
DSW-18KX_LX(config-vlan-range)#subvlan200-399 //Associate sub VLANs with the super VLAN.
DSW-18KX_LX(config-vlan-range)#exit
DSW-18KX_LX(config)#vlan 3000
DSW-18KX_LX(config-vlan)# nameDeManagement
DSW-18KX_LX(config)#vlan 3001
DSW-18KX_LX(config-vlan)#nameAPManagement
DSW-18KX_LX(config)#vlan 3010
DSW-18KX_LX(config-vlan)# name MenJin
DSW-18KX_LX(config)#vlan 3011
DSW-18KX_LX(config-vlan)#nameYiKaTong
DSW-18KX_LX(config)#vlan 3012
DSW-18KX_LX(config-vlan)#nameJianKong
4.Configuring the IPv4/IPv6 gateway and DHCPv4/DHCPv6
DSW-18KX_LX(config)#ipv6 dhcp poolDHCPv6 //Create a DHCPv6 addresspool for the DNS server.
DSW-18KX_LX(dhcp-config)# domain-namescu6.edu.cn
DSW-18KX_LX(dhcp-config)# dns-server2001:250:2003::8
DSW-18KX_LX(dhcp-config)# dns-server2001:250:2003::9
DSW-18KX_LX(config)#ip dhcp poolsushe-pool//Configure a DHCP address pool in the dormitory area.
DSW-18KX_LX(dhcp-config)#lease 0 20//Mandatory. Set the lease period to 2 hours.
DSW-18KX_LX(dhcp-config)#network10.1.32.0 255.255.240.0
DSW-18KX_LX(dhcp-config)#dns-server202.115.32.39 202.115.32.36
DSW-18KX_LX(dhcp-config)#default-router10.1.32.254
DSW-18KX_LX(config)#ip dhcp pool bangong-pool//Configurea DHCP address pool in the office area.
DSW-18KX_LX(dhcp-config)#lease 0 20//Mandatory. Set the lease period to 2 hours.
DSW-18KX_LX(dhcp-config)#network10.1.16.0 255.255.240.0
DSW-18KX_LX(dhcp-config)#dns-server10.1.16.0 255.255.240.0
DSW-18KX_LX(dhcp-config)#default-router10.1.16.254
DSW-18KX_LX(config)#ip dhcp poolap-pool//Configure a DHCP address pool for wireless AP management.
DSW-18KX_LX(dhcp-config)#option 138ip 10.10.1.1
DSW-18KX_LX(dhcp-config)#network10.0.2.0 255.255.255.0
DSW-18KX_LX(dhcp-config)#default-router10.0.2.254
DSW-18KX_LX(config)#int vlan2000//Configure the gateway address for the super VLAN in the office area.
DSW-18KX_LX(config-if-VLAN 2000)#ipaddress 10.1.16.254/20
DSW-18KX_LX(config-if-VLAN 2000)#ipv6enable
DSW-18KX_LX(config-if-VLAN 2000)#ipv6address 2001:250:2003:2000::1/64
DSW-18KX_LX(config-if-VLAN 2000)#noipv6 nd suppress-ra
DSW-18KX_LX(config-if-VLAN 2000)#ipv6nd other-config-flag
DSW-18KX_LX(config-if-VLAN 2000)#ipv6dhcp server DHCPv6
DSW-18KX_LX(config)#int vlan2001//Configure the gateway address for the super VLAN in the dormitory area.
DSW-18KX_LX(config-if-VLAN 2001)#ipaddress 172.16.32.254/20
DSW-18KX_LX(config-if-VLAN 2001)#ipv6enable
DSW-18KX_LX(config-if-VLAN 2001)#ipv6address 2001:250:2003:2001::1/64
DSW-18KX_LX(config-if-VLAN 2001)#noipv6 nd suppress-ra
DSW-18KX_LX(config-if-VLAN 2001)#ipv6nd other-config-flag
DSW-18KX_LX(config-if-VLAN 2001)#ipv6dhcp server DHCPv6
DSW-18KX_LX(config)#interfaceGigabitEthernet 1/1//Configure the port of the core RG-N18000 for connecting tothe egress device.
DSW-18KX_LX(config-if-GigabitEthernet1/1)# no switchport
DSW-18KX_LX(config-if-GigabitEthernet1/1)#ip address 10.0.0.2 255.255.255.0
DSW-18KX_LX(config)#int vlan3000//Configure the gateway address for device management.
DSW-18KX_LX(config-if-VLAN 3000)#ipaddress 10.0.1.254/24
DSW-18KX_LX(config)#int vlan3001//Configure the gateway address for the wireless AP device.
DSW-18KX_LX(config-if-VLAN 3001)#ipaddress 10.0.2.254/24
DSW-18KX_LX(config)#int vlan3010//Configure the gateway address for door status control.
DSW-18KX_LX(config-if-VLAN 3010)#ipaddress 11.0.10.254/24
DSW-18KX_LX(config)#int vlan3011//Configure the gateway address for the all-in-one card service.
DSW-18KX_LX(config-if-VLAN 3011)#ipaddress 10.0.11.254/24
DSW-18KX_LX(config)#int vlan3012//Configure the gateway address for the monitoring service.
DSW-18KX_LX(config-if-VLAN 3012)#ipaddress 10.0.12.254/24
DSW-18KX_LX(config)#address-manage //EnableAM rules to perform refined matching of address segments.
DSW-18KX_LX(config-address-manage)#matchip 10.1.16.0 255.255.255.0 Gi1/2 vlan 2
DSW-18KX_LX(config-address-manage)#matchip 10.1.17.0 255.255.255.0 Gi1/2 vlan 3
DSW-18KX_LX(config-address-manage)#matchip 10.1.32.0 255.255.255.0 Gi1/3 vlan 200
DSW-18KX_LX(config-address-manage)#matchip 10.1.33.0 255.255.255.0 Gi1/3 vlan 201
DSW-18KX_LX(config-address-manage)#matchip 10.0.2.0 255.255.255.0 vlan 3001
DSW-18KX_LX(config-address-manage)#matchip 10.1.18.0 255.255.255.0 Gi1/4 vlan 100
DSW-18KX_LX(config-address-manage)#matchip 10.1.19.0 255.255.255.0 Gi1/4 vlan 150
DSW-18KX_LX(config-address-manage)#matchip 10.1.34.0 255.255.255.0 Gi1/4 vlan 300
DSW-18KX_LX(config-address-manage)#matchip 10.1.35.0 255.255.255.0 Gi1/4 vlan 350
DSW-18KX_LX(config-address-manage)#matchip loose //It is recommended to configurethe loose mode.
... AM rules can be created one byone based on the preceding VLAN/IP planning tables. Note: Once AM rules areenabled, port/VLAN mapping needs to be performed for the network segments to beassigned on the whole network, including the network in the old campus that isnot reconstructed (the corresponding port is the port of the RG-N18000 forconnecting to the aggregation device of the old campus network; thecorresponding VLAN is the VLAN of the SVI on the RG-N18000 for connecting tothe aggregation device of the old campus network).
5.Enabling authentication on the port of the RG-N18000
DSW-18KX_LX(config)#intGigabitEthernet 1/2//Configure the interface for connecting to the aggregationdevice in the office area.
DSW-18KX_LX(config-if-GigabitEthernet1/2)#switchport mode trunk
DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x port-control auto //Enable802.1x authentication control on an interface.
DSW-18KX_LX(config-if-GigabitEthernet1/2)#web-auth enable eportalv2//Enable Web authentication on an interface.
DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x mac-auth-bypass multi-user //Enable multi-user MAB authentication onan interface.
DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x mac-auth-bypass vlan 1-99 //Enable MAB authentication forVLANs 1–99.
DSW-18KX_LX(config-if-GigabitEthernet1/2)#switchport trunk allowed vlan only 1-199,3000-3001,3010-3012
DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x critical//Configure RADIUS escape in 802.1x authentication mode onan interface.
DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x critical recovery actionreinitialize //Enable an escaped user toperform re-authentication after RADIUS escape is recovered.
DSW-18KX_LX(config-if-GigabitEthernet1/2)#switchport protected //Configure portprotection on an interface.
DSW-18KX_LX(config)#intGigabitEthernet 1/3//Configure the interface for connecting to the aggregationdevice in the dormitory area.
DSW-18KX_LX(config-if-GigabitEthernet1/3)#switchport mode trunk
DSW-18KX_LX(config-if-GigabitEthernet1/3)#dot1x port-control auto //Enable802.1x authentication control on an interface.
DSW-18KX_LX(config-if-GigabitEthernet1/3)#web-auth enable eportalv2//Enable Web authentication on an interface.
DSW-18KX_LX(config-if-GigabitEthernet1/3)#switchport trunk allowed vlan only 200-399,3000-3001,3010-3012
DSW-18KX_LX(config-if-GigabitEthernet1/3)#dot1x critical//Configure RADIUS escape in 802.1x authentication mode onan interface.
DSW-18KX_LX(config-if-GigabitEthernet1/3)#dot1x critical recovery actionreinitialize //Enable an escaped user toperform re-authentication after RADIUS escape is recovered.
DSW-18KX_LX(config-if-GigabitEthernet1/3)#switchport protected //Configure portprotection on an interface.
DSW-18KX_LX(config)#intGigabitEthernet 1/4//Configure the interface for connecting to the wirelesscontroller.
DSW-18KX_LX(config-if-GigabitEthernet1/4)#switchport mode trunk
DSW-18KX_LX(config-if-GigabitEthernet1/4)#dot1x port-control auto //Enable802.1x authentication control on an interface.
DSW-18KX_LX(config-if-GigabitEthernet1/4)#dot1x mac-auth-bypass multi-user //Enable multi-user MAB authentication onan interface.
DSW-18KX_LX(config-if-GigabitEthernet1/4)#dot1x mac-auth-bypass vlan 150-199//Enable MAB authentication for VLANs150–199 (wireless Web authentication in the office area).
DSW-18KX_LX(config-if-GigabitEthernet1/4)#web-auth enable eportalv2//Enable Web authentication on an interface.
DSW-18KX_LX(config-if-GigabitEthernet1/4)#switchport trunk allowed vlan only 100-199,300-399,3000
DSW-18KX_LX(config)#intGigabitEthernet 1/44//Configure the port for connecting to the server area.
DSW-18KX_LX(config-if-GigabitEthernet1/44)#no switchport
DSW-18KX_LX(config-if-GigabitEthernet1/44)#description linkto-SAM&eportalSERVER
DSW-18KX_LX(config-if-GigabitEthernet1/44)#ip address 172.29.2.253 255.255.255.0
6.Optimizing VLAN pruning on the downlink port of the RG-N18000
7.Performing routing related configurations
DSW-18KX_LX(config)#router ospf 1
DSW-18KX_LX(config-router)#redistributeconnected
DSW-18KX_LX(config-router)#passive-interfac vlan2000 //Mandatory. Configure a passive port to to reduce CPUoverheads.
DSW-18KX_LX(config-router)#passive-interfac vlan2001 //Mandatory. Configure a passive port to to reduce CPUoverheads.
DSW-18KX_LX(config-router)#passive-interfac vlan3000 //Mandatory. Configure a passive port to to reduce CPUoverheads.
DSW-18KX_LX(config-router)#passive-interfac vlan3001 //Mandatory. Configure a passive port to to reduce CPUoverheads.
DSW-18KX_LX(config-router)#passive-interfac vlan3010 //Mandatory. Configure a passive port to to reduce CPUoverheads.
DSW-18KX_LX(config-router)#passive-interfac vlan3011 //Mandatory. Configure a passive port to to reduce CPUoverheads.
DSW-18KX_LX(config-router)#passive-interfac vlan3012 //Mandatory. Configure a passive port to to reduce CPUoverheads.
S5750-student(config)#vlan range 200-399,3000-3001,3010-3012 //Configurethe VLAN range for the access device in the student dormitory area, as well asthe monitoring and management VLANs.
S5750-student(config)#intGigabitEthernet 0/24 //Configure the uplink port of the aggregation deviceas a trunk port for transparent transmission.
S5750-student(config-if-GigabitEthernet0/24)#switchport mode trunk
S5750-student(config-if-GigabitEthernet0/24)#switchport trunk allowed vlan remove 1-199,400-2999,3002-3009,3013-4094
S5750-student(config)#intGigabitEthernet 0/23//Configure the downlink port of the aggregation device asa trunk port for transparent transmission.
S5750-student(config-if-GigabitEthernet0/23)#switchport mode trunk
S5750-student(config-if-GigabitEthernet0/23)#switchport trunk allowed vlan remove 1-199,400-2999,3002-3009,3013-4094
S2928G-student1-1(config)#vlan range200-399,3000-3001,3010-3012 //Configure the VLANrange for the access device in the student dormitory area, as well as themonitoring and management VLANs.
S2928G-student1-1(config)#spanning-tree//EnableSTP.
S2928G-student1-1(config)#spanning-treemode rstp //Enable RSTP to avoid overlow portconvergence speed.
S2928G-student1-1(config)#spanning-treeportfast bpduguard default //Enable BPDU guard for allPortFast ports by default.
S2928G-student1-1(config)#errdisablerecovery interval 300//Configure the recovery interval after a port is disabledby RLDP.
S2928G-student1-1(config)#int rangegi0/1-22
S2928G-student1-1(config-if-range)#switchportaccess vlan 200 //Create an access port and assign it tothe corresponding VLAN.
S2928G-student1-1(config-if-range)#switchportprotected//Mandatory. Configure port protection.
S2928G-student1-1(config-if-range)#spanning-treeportfast //Enable PortFast on all downlinkinterfaces, which validates BPDU guard at the same time. Once a BPDU packet isreceived, the access switch regards that a loop occurs and shuts down the interfaces.
S2928G-student1-1(config-if-range)#rldpport loop-detect shutdown-port //Mandatory. ConfigureRLDP to prevent loops.
S2928G-student1-1(config)#intgi0/23//Configure the port for connecting to the AP.
S2928G-student1-1(config-if-GigabitEthernet0/23)# switchport access vlan 3001
S2928G-student1-1(config-if-GigabitEthernet0/23)#rldp port loop-detect shutdown-port
S2928G-student1-1(config)#intgi0/24//Configure the uplink port of the access device as a trunk port fortransparent transmission.
S2928G-student1-1(config-if-GigabitEthernet0/24)#switchport mode trunk
S2928G-student1-1(config-if-GigabitEthernet0/24)#spanning-tree bpdufilter enable//Enable a BPDU filter for the uplinkport, so that loop protection is provided only on single devices, and BDPUpackets are not transmitted externally, no topology is created, and no rootbridge is elected.
S2928G-student1-1(config-if-GigabitEthernet0/24)# switchport trunk allowed vlan only 200-399,3000-3001,3010-3012
1.Adding an RG-N18000 on SAM+
2.Adding an AC on SAM+
3.Adding ePortal on SAM+
4.Adding SAM+ on ePortal
5.Adding an RG-N18000 on ePortal
6.Configuring access control
(1)It is not necessary to enable MAB authentication for access control in thedormitory area.
(2)It is necessary to enable MAB authentication for access control in the officearea.
(3)The office area allows MAC fast access. To allow login using the native 802.1xauthenticated client, select Smart Device 1X Access.
7.Configuring accounting policies
(1)Monthly accounting policy in the dormitory area
(2)Monthly accounting policy in the office area
8.Configuring user templates
(1)User template in the dormitory area
(2)User template in the office area
9.Configuring user plans
(1)User plan in the dormitory area
(2)User plan in the office area
10.Configuring user groups
11.Registering users
12.Payment
13.Controlling the access period
14.Associating the access period with the user template
15.Verifying login failure of student users beyond the access period (10:34)
1. Layer-2network requirements
l Deploy the access isolation solution to implement layer-2 isolationof users on the whole network.
l Deploy centralized forwarding on the wireless network.
l Enable IPv6 on the whole network, so that IPv6 users can access thenetwork only after IPv4 authentication succeeds.
l Use the core device as the wired/wireless gateway andauthentication NAS on the whole network, to provide unified management, andsupport a maximum of 20,000 online clients.
2. Requirementsrelated to authentication types
l In the office area, deploy wired and wireless Web authenticationand MAB authentication.
l In the student dormitory area, deploy wired 802.1x authentication,wireless 802.1x authentication, and wireless Web authentication.
l In the visitor area, deploy QR code authentication.
l In the headmaster office and other school director offices, deployauthentication exemption.
l Exempt re-authentication for users who move in the same area.
l In the dormitory area and office area, deploy no-traffic go-offlineso that clients automatically go offline when the clients generate no trafficin 15 minutes.
3. Requirementsrelated to authentication access control (Note: Access time control is onlyused for testing, and the actual deployment is subject to the onsitesituation.)
l In the student dormitory area, network access is allowed only at10:30–10:32.
l In the teaching area, network access is prohibited for studentusers at 9:00–12:00 and 14:00–16:00.
l In the office area, student users cannot be authenticated.
4. Addressmanagement requirements (Note: Address segment assignment is only used for casedemonstration, and the actual deployment is subject to the onsite situation.)
l For the wired network, configure a private address with a 20-bitsubnet mask for each area, and a private address with a 24-bit subnet mask foreach building:
Officearea: 10.1.16.0/20 (building 1: 10.1.16.0/24, building 2: 10.1.17.0/24 ...building 5: 10.1.20.0/24)
Studentdormitory area: 10.1.32.0/20 (building 1: 10.1.32.0/20, building 2:10.1.33.0/20 ... building 5: 10.1.36.0/20)
l For the wireless network:
Officearea: 10.1.16.0/20 (building 1 for 802.1x authentication: 10.1.21.0/24,building 1 for Web authentication: 10.1.22.0/24, building 2 for 802.1xauthentication: 10.1.23.0/24, and building 2 for Web authentication:10.1.24.0/24)
Studentdormitory area: 10.1.32.0/20 (building 1 for 802.1x authentication:10.1.37.0/24, building 1 for Web authentication: 10.1.38.0/24, building 2 for802.1x authentication: 10.1.39.0/24, and building 2 for Web authentication:10.1.40.0/24)
(Note:One super VLAN is set in each area for both wired and wireless networks. Youcan also set one super VLAN in each area for the wireless network according toactual situations.)
l Special services need independent network segments:
Doorstatus control service: 10.0.10.0/24
All-in-onecard service: 10.0.11.0/24
Videomonitoring service: 10.0.12.0/24
Wireddevice NMS: 10.0.1.0/24
APmanagement address: 10.0.2.0/24
5. Otherrequirements
l Only the network in the new campus is reconstructed. In the networkin the old campus, layer-3 protocols are still used to connect to theRG-N18000, and the aggregation device serves as the user gateway and DHCPrelay, and is interconnected with the RG-N18000 via OSPF.
l Configure the escape function on the RADIUS server and ePortalserver, to avoid affecting the users' online services if either server is down.
l Configure VLAN pruning to avoid broadcast floods.
l Configure passive ports for routing optimization to avoidunnecessary protocol overheads of the CPU.
1. TheRG-N18000 does not support 802.1x authentication. Therefore, configure thewireless 802.1x NAS function on the AC.
2. IPv6does not support direct authentication. Therefore, configure IPv6authentication to compatible mode, so that IPv6 users can access the networkafter successful IPv4 authentication.
3. To avoidre-authentication for users who move in the same area, configure the migrationfunction for authenticated users on the RG-N18000.
4. EnableAM rules to plan IP addresses for buildings in each area.
5. DHCPrelay is enabled on the aggregation device of the original network. To preventDHCP packets from being dropped by the DHCP snooping module on the RG-N18000,run the ip dhcp snooping check-giaddr command on the RG-N18000.
6. Configurethe escape function on the RG-N18000 for the RADIUS server and portal server.
7. ConfigureVLAN pruning for the downlink trunk port of the RG-N18000.
Thefollowing tables list VLAN/IP plans for the wired and wireless networks in thestudent dormitory area (plans for other areas are the same).
Wirednetwork VLAN/IP planning for the student dormitory area:
Device Model | Device type | Position | Management Address | Sub VLAN | Super VLAN | IP Address Segment | Gateway | Network Management VLAN | Door Status Control VLAN | All-in-One Card VLAN | Video Monitoring VLAN |
S2928G | Floor access switch | 1F, building 1, student dormitory area | 10.0.1.10 | 200 | 2001 | 10.1.32.0 | 10.1.32.254 | 3000 | 3010 | 3011 | 3012 |
S2928G | Floor access switch | 2F, building 1, student dormitory area | 10.0.1.11 | 201 | 2001 | 10.1.33.0 | 10.1.32.254 | 3000 | 3010 | 3011 | 3012 |
S2928G | Floor access switch | 1F, building 2, student dormitory area | 10.0.1.12 | 202 | 2001 | 10.1.34.0 | 10.1.32.254 | 3000 | 3010 | 3011 | 3012 |
S2928G | Floor access switch | 2F, building 2, student dormitory area | 10.0.1.13 | 203 | 2001 | 10.1.35.0 | 10.1.32.254 | 3000 | 3010 | 3011 | 3012 |
S2928G | Floor access switch | 1F, building 3, student dormitory area | 10.0.1.14 | 204 | 2001 | 10.1.36.0 | 10.1.32.254 | 3000 | 3010 | 3011 | 3012 |
Wirelessnetwork VLAN/IP planning for the student dormitory area:
Location | AP Management VLAN | AP Management Network Segment | Gateway | Sub VLAN of Web Authentication | IP Address Segment of Web Authentication | Sub VLAN of 802.1x Authentication | IP Address Segment of 802.1x Authentication | Super VLAN | Gateway | SSID of Web Authentication | SSID of 802.1x Authentication |
Building 1, student dormitory area | 3001 | 10.0.2.0/24 | 10.0.2.254 | 301 | 10.1.37.0/24 | 351 | 10.1.38.0/24 | 2001 | 10.1.32.254 | su-web | su-1x |
Building 2, student dormitory area | 3001 | 10.0.2.0/24 | 10.0.2.254 | 302 | 10.1.39.0/24 | 352 | 10.1.40.0/24 | 2001 | 10.1.32.254 | su-web | su-1x |
Building 3, student dormitory area | 3001 | 10.0.2.0/24 | 10.0.2.254 | 303 | 10.1.41.0/24 | 353 | 10.1.42.0/24 | 2001 | 10.1.32.254 | su-web | su-1x |
Building 4, student dormitory area | 3001 | 10.0.2.0/24 | 10.0.2.254 | 304 | 10.1.43.0/24 | 355 | 10.1.44.0/24 | 2001 | 10.1.32.254 | su-web | su-1x |
Building 5, student dormitory area | 3001 | 10.0.2.0/24 | 10.0.2.254 | 305 | 10.1.45.0/24 | 356 | 10.1.46.0/24 | 2001 | 10.1.32.254 | su-web | su-1x |
OverallVLAN/IP planning
Area | Service | Common VLAN | Super VLAN | Sub VLAN | IP | Gateway |
Egress | Device interconnection | N/A |
|
| 10.0.0.0/24 | 10.0.0.1 |
Server area | VM | N/A |
|
| 172.29.2.0/24 | 172.29.2.253 |
Wired NMS | Device NMS | 3000 |
|
| 10.0.1.0/24 | 10.0.1.254 |
Wireless AP | AP management | 3001 |
|
| 10.0.2.0/24 | 10.0.2.254 |
Authentication-free area | Door Status Control VLAN | 3010 |
|
| 10.0.10.0/24 | 10.0.10.254 |
All-in-one card | 3011 |
|
| 10.0.11.0 | 10.0.11.254 | |
Monitoring | 3012 |
|
| 10.0.12.0/24 | 10.0.12.254 | |
Office area | Wired 802.1x authentication and Web authentication |
| 2000 | 1–99 | 10.1.16.0/24 | 10.1.16.254/20 |
Wireless 802.1x authentication |
| 100–149 | 10.1.18.0/24 | |||
Wireless Web authentication |
| 150–199 | 10.1.19.0/24 | |||
Dormitory area | Wired 802.1x authentication and Web authentication |
| 2001 | 200–299 | 10.1.32.0/24 | 10.1.32.254/20 |
Wireless 802.1x authentication |
| 300–349 | 10.1.34.0/24 | |||
Wireless Web authentication |
| 350–399 | 10.1.35.0/24 |
1.Configuring network communication in the egress area
Configurean uplink port on the RG-N18000, perform layer-3 configuration for the uplinkport, configure routes, and check whether the external network communication isnormal on the RG-N18000. The configuration commands are omitted.
2.Completing basic settings on the RG-N18000
DSW-18KX_LX(config)#auth-modegateway//Configure the gateway mode and restart the device.
DSW-18KX_LX(config)#snmp-server host172.29.2.9 informs version 2c ruijie //Configure SNMP interactionbetween the RG-N18000 and SAM+.
DSW-18KX_LX(config)#snmp-serverif-index persist//Set the port index to be permanently unique.
DSW-18KX_LX(config)#servicedhcp//Enable the DHCP service on the core device.
DSW-18KX_LX(config)#ip dhcp snooping//Mandatory.This command is required for IP authorization for 802.1X authentication and MABauthentication.
DSW-18KX_LX(config)#ip dhcp snoopingcheck-giaddr//Configure a compatible command for DHCP snooping and relay, toprevent DHCP packets from being dropped by the DHCP snooping module on theRG-N18000.
DSW-18KX_LX(config)#aaa group serverradius SAM
DSW-18KX_LX(config-gs-radius)# server172.29.2.9
DSW-18KX_LX(config)#aaa new-model
DSW-18KX_LX(config)#aaa accountingupdate periodic 30
DSW-18KX_LX(config)#aaa accountingupdate
DSW-18KX_LX(config)#aaa accountingnetwork default start-stop group SAM
DSW-18KX_LX(config)#aaaauthentication login default none
DSW-18KX_LX(config)#aaaauthentication dot1x default group SAM
DSW-18KX_LX(config)#aaa authenticationweb-auth default group SAM
DSW-18KX_LX(config)#aaa authorizationip-auth-mode mixed //ConfigureIP authorization to the mixed mode.
DSW-18KX_LX(config)#dot1x accountingdefault//Enable the 802.1x accounting list.
DSW-18KX_LX(config)#dot1x authenticationdefault //Enable the 802.1xauthentication list.
DSW-18KX_LX(config)#ip radiussource-interface GigabitEthernet 1/24 //Configure the sourceinterface for the device to communicate with the RADIUS server. The deviceaddress added to SAM+ should be the address of this interface.
DSW-18KX_LX(config)#ip portalsource-interface GigabitEthernet 1/24 //Configure the sourceinterface for the device to communicate with the ePortal server. The deviceaddress added to the ePortal server should be the address of this interface.
DSW-18KX_LX(config)#ip dhcp snoopingarp-detect //Enable fast ARP address reclaiming ofDHCP snooping. The ARP address reclaiming is performed once per second duringARP aging and can be performed five times at most.
DSW-18KX_LX(config)#ip dhcp serverarp-detect//Enable fast address reclaiming of the DHCP server. If identifyingthat a user goes offline and does not go online again within a period of time(5 minutes by default), the DHCP server reclaims the IP address assigned to theuser.
DSW-18KX_LX(config)#no aaa log enable
DSW-18KX_LX(config)#web-auth templateeportalv2
DSW-18KX_LX(config.tmplt.eportalv2)#ip172.29.2.8
DSW-18KX_LX(config.tmplt.eportalv2)#url http://172.29.2.8/eportal/index.jsp
DSW-18KX_LX(config.tmplt.eportalv2)#exit
DSW-18KX_LX(config)#web-auth portalkey su
DSW-18KX_LX(config)#http redirectdirect-site 192.168.9.12 //Configure the addressof the RG-SU server as an authentication-free address.
DSW-18KX_LX(config)#web-authdirect-host10.1.16.200 //Configure theclient of a school director as an authentication-free client.
DSW-18KX_LX(config)#dot1xmac-auth-bypass valid-ip-auth //Mandatory. The DHCP module instructs theMAB module to start authentication. Clients must obtain IP addresses beforestarting MAB authentication.
DSW-18KX_LX(config)#dot1xvalid-ip-acct enable //Mandatory. The accounting updatepackets are used to upload the user IP address to SAM+. If the 802.1xauthentication module does not have an IP entry of the user, the user is kickedoffline 5 minutes later.
DSW-18KX_LX(config)#direct-vlan100-149,300-349,3000-3001,3010-3012 //ConfigureVLANs for wireless 802.1x authentication, monitoring, device management, andwireless AP management as authentication-free VLANs.
DSW-18KX_LX(config)#web-authportal-check interval 3 timeout 3 retransmit10 //Configure portal escape.
DSW-18KX_LX(config)#web-authportal-escape nokick
DSW-18KX_LX(config)#radius-serverhost 172.29.2.9 test username ruijie idle-time 2 key ruijie
DSW-18KX_LX(config)#radius-serverdead-criteria time 120 tries 12 //Configure an IPaddress for the RADIUS server and enable the RADIUS escape test function.
DSW-18KX_LX(config)#web-authradius-escape //Globally enable RADIUS escape in Webauthentication mode.
DSW-18KX_LX(config)#address-bindipv6-mode compatible//Set IPv6 authentication to the compatible mode.
DSW-18KX_LX(config)#station-movepermit //Enable migration of 802.1x authenticatedclients.
DSW-18KX_LX(config)#web-authstation-move auto //Enable migration of Webauthenticated clients.
DSW-18KX_LX(config)#web-authstation-move info-update
DSW-18KX_LX(config)#no dot1xstation-move arp-detect //It is recommended to disable ARPdetection after migration of 802.1x authenticated clients, because the ARPdetection will cause broadcast packet floods.
DSW-18KX_LX(config)#http redirectport 443 //Because this configuration consumesdevice resources, it is recommended to discuss with the customer about whetherto enable the configuration if a great number of users need authentication.
DSW-18KX_LX(config)#cpu-protect typeweb-auths bandwidth 2000 //Configure the HTTPS optimization command. HTTPSinvolves socket encryption and decryption, consuming a great deal of processingresources. 11.0(1)B2T11 and later versions separate HTTPS from HTTP for the useof CPU resources. If HTTPS redirection is enabled, configure CPP rate limitingfor HTTPS.
DSW-18KX_LX(config)#offline-detectinterval 15 threshold 0 //Set the no-trafficgo-offline detection period to 15 minutes.
DSW-18KX_LX(config)#snmp-server host172.29.2.9 informs version 2c ruijie //Configure SNMP.
DSW-18KX_LX(config)#snmp-server host172.29.2.9 traps su
DSW-18KX_LX(config)#snmp-servercommunity su rw
3.Configuring VLANs on the RG-N18000
DSW-18KX_LX(config)#vlan range 1-399
DSW-18KX_LX(config-vlan-range)#exit
DSW-18KX_LX(config)#vlan 2000
DSW-18KX_LX(config-vlan-range)#supervlan//Configurea super VLAN in the office area.
DSW-18KX_LX(config-vlan-range)#subvlan1-199 //Associate sub VLANs with the super VLAN.
DSW-18KX_LX(config-vlan-range)#exit
DSW-18KX_LX(config)#vlan 2001
DSW-18KX_LX(config-vlan-range)#supervlan//Configurea super VLAN in the dormitory area.
DSW-18KX_LX(config-vlan-range)#subvlan200-399 //Associate sub VLANs with the super VLAN.
DSW-18KX_LX(config-vlan-range)#exit
DSW-18KX_LX(config)#vlan 3000
DSW-18KX_LX(config-vlan)# nameDeManagement
DSW-18KX_LX(config)#vlan 3001
DSW-18KX_LX(config-vlan)#nameAPManagement
DSW-18KX_LX(config)#vlan 3010
DSW-18KX_LX(config-vlan)# name MenJin
DSW-18KX_LX(config)#vlan 3011
DSW-18KX_LX(config-vlan)#nameYiKaTong
DSW-18KX_LX(config)#vlan 3012
DSW-18KX_LX(config-vlan)#nameJianKong
4.Configuring the IPv4/IPv6 gateway and DHCPv4/DHCPv6
DSW-18KX_LX(config)#ipv6 dhcp poolDHCPv6 //Create a DHCPv6 addresspool for the DNS server.
DSW-18KX_LX(dhcp-config)# domain-namescu6.edu.cn
DSW-18KX_LX(dhcp-config)# dns-server2001:250:2003::8
DSW-18KX_LX(dhcp-config)# dns-server2001:250:2003::9
DSW-18KX_LX(config)#ip dhcp poolsushe-pool//Configure a DHCP address pool in the dormitory area.
DSW-18KX_LX(dhcp-config)#lease 0 20//Mandatory. Set the lease period to 2 hours.
DSW-18KX_LX(dhcp-config)#network10.1.32.0 255.255.240.0
DSW-18KX_LX(dhcp-config)#dns-server202.115.32.39 202.115.32.36
DSW-18KX_LX(dhcp-config)#default-router10.1.32.254
DSW-18KX_LX(config)#ip dhcp pool bangong-pool//Configurea DHCP address pool in the office area.
DSW-18KX_LX(dhcp-config)#lease 0 20//Mandatory. Set the lease period to 2 hours.
DSW-18KX_LX(dhcp-config)#network10.1.16.0 255.255.240.0
DSW-18KX_LX(dhcp-config)#dns-server10.1.16.0 255.255.240.0
DSW-18KX_LX(dhcp-config)#default-router10.1.16.254
DSW-18KX_LX(config)#ip dhcp poolap-pool//Configure a DHCP address pool for wireless AP management.
DSW-18KX_LX(dhcp-config)#option 138ip 10.10.1.1
DSW-18KX_LX(dhcp-config)#network10.0.2.0 255.255.255.0
DSW-18KX_LX(dhcp-config)#default-router10.0.2.254
DSW-18KX_LX(config)#int vlan2000//Configure the gateway address for the super VLAN in the office area.
DSW-18KX_LX(config-if-VLAN 2000)#ipaddress 10.1.16.254/20
DSW-18KX_LX(config-if-VLAN 2000)#ipv6enable
DSW-18KX_LX(config-if-VLAN 2000)#ipv6address 2001:250:2003:2000::1/64
DSW-18KX_LX(config-if-VLAN 2000)#noipv6 nd suppress-ra
DSW-18KX_LX(config-if-VLAN 2000)#ipv6nd other-config-flag
DSW-18KX_LX(config-if-VLAN 2000)#ipv6dhcp server DHCPv6
DSW-18KX_LX(config)#int vlan2001//Configure the gateway address for the super VLAN in the dormitory area.
DSW-18KX_LX(config-if-VLAN 2001)#ipaddress 172.16.32.254/20
DSW-18KX_LX(config-if-VLAN 2001)#ipv6enable
DSW-18KX_LX(config-if-VLAN 2001)#ipv6address 2001:250:2003:2001::1/64
DSW-18KX_LX(config-if-VLAN 2001)#noipv6 nd suppress-ra
DSW-18KX_LX(config-if-VLAN 2001)#ipv6nd other-config-flag
DSW-18KX_LX(config-if-VLAN 2001)#ipv6dhcp server DHCPv6
DSW-18KX_LX(config)#interfaceGigabitEthernet 1/1//Configure the port of the core RG-N18000 for connecting tothe egress device.
DSW-18KX_LX(config-if-GigabitEthernet1/1)# no switchport
DSW-18KX_LX(config-if-GigabitEthernet1/1)#ip address 10.0.0.2 255.255.255.0
DSW-18KX_LX(config)#int vlan3000//Configure the gateway address for device management.
DSW-18KX_LX(config-if-VLAN 3000)#ipaddress 10.0.1.254/24
DSW-18KX_LX(config)#int vlan3001//Configure the gateway address for the wireless AP device.
DSW-18KX_LX(config-if-VLAN 3001)#ipaddress 10.0.2.254/24
DSW-18KX_LX(config)#int vlan3010//Configure the gateway address for door status control.
DSW-18KX_LX(config-if-VLAN 3010)#ipaddress 11.0.10.254/24
DSW-18KX_LX(config)#int vlan3011//Configure the gateway address for the all-in-one card service.
DSW-18KX_LX(config-if-VLAN 3011)#ipaddress 10.0.11.254/24
DSW-18KX_LX(config)#int vlan3012//Configure the gateway address for the monitoring service.
DSW-18KX_LX(config-if-VLAN 3012)#ipaddress 10.0.12.254/24
DSW-18KX_LX(config)#address-manage //EnableAM rules to perform refined matching of address segments.
DSW-18KX_LX(config-address-manage)#matchip 10.1.16.0 255.255.255.0 Gi1/2 vlan 2
DSW-18KX_LX(config-address-manage)#matchip 10.1.17.0 255.255.255.0 Gi1/2 vlan 3
DSW-18KX_LX(config-address-manage)#matchip 10.1.32.0 255.255.255.0 Gi1/3 vlan 200
DSW-18KX_LX(config-address-manage)#matchip 10.1.33.0 255.255.255.0 Gi1/3 vlan 201
DSW-18KX_LX(config-address-manage)#matchip 10.0.2.0 255.255.255.0 vlan 3001
DSW-18KX_LX(config-address-manage)#matchip 10.1.18.0 255.255.255.0 Gi1/4 vlan 100
DSW-18KX_LX(config-address-manage)#matchip 10.1.19.0 255.255.255.0 Gi1/4 vlan 150
DSW-18KX_LX(config-address-manage)#matchip 10.1.34.0 255.255.255.0 Gi1/4 vlan 300
DSW-18KX_LX(config-address-manage)#matchip 10.1.35.0 255.255.255.0 Gi1/4 vlan 350
DSW-18KX_LX(config-address-manage)#matchip loose //It is recommended to configurethe loose mode.
... AM rules can be created one byone based on the preceding VLAN/IP planning tables. Note: Once AM rules areenabled, port/VLAN mapping needs to be performed for the network segments to beassigned on the whole network, including the network in the old campus that isnot reconstructed (the corresponding port is the port of the RG-N18000 forconnecting to the aggregation device of the old campus network; thecorresponding VLAN is the VLAN of the SVI on the RG-N18000 for connecting tothe aggregation device of the old campus network).
5.Enabling authentication on the port of the RG-N18000
DSW-18KX_LX(config)#intGigabitEthernet 1/2//Configure the interface for connecting to the aggregationdevice in the office area.
DSW-18KX_LX(config-if-GigabitEthernet1/2)#switchport mode trunk
DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x port-control auto //Enable802.1x authentication control on an interface.
DSW-18KX_LX(config-if-GigabitEthernet1/2)#web-auth enable eportalv2//Enable Web authentication on an interface.
DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x mac-auth-bypass multi-user //Enable multi-user MAB authentication onan interface.
DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x mac-auth-bypass vlan 1-99 //Enable MAB authentication forVLANs 1–99.
DSW-18KX_LX(config-if-GigabitEthernet1/2)#switchport trunk allowed vlan only 1-199,3000-3001,3010-3012
DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x critical//Configure RADIUS escape in 802.1x authentication mode onan interface.
DSW-18KX_LX(config-if-GigabitEthernet1/2)#dot1x critical recovery actionreinitialize //Enable an escaped user toperform re-authentication after RADIUS escape is recovered.
DSW-18KX_LX(config-if-GigabitEthernet1/2)#switchport protected //Configure portprotection on an interface.
DSW-18KX_LX(config)#intGigabitEthernet 1/3//Configure the interface for connecting to the aggregationdevice in the dormitory area.
DSW-18KX_LX(config-if-GigabitEthernet1/3)#switchport mode trunk
DSW-18KX_LX(config-if-GigabitEthernet1/3)#dot1x port-control auto //Enable802.1x authentication control on an interface.
DSW-18KX_LX(config-if-GigabitEthernet1/3)#web-auth enable eportalv2//Enable Web authentication on an interface.
DSW-18KX_LX(config-if-GigabitEthernet1/3)#switchport trunk allowed vlan only 200-399,3000-3001,3010-3012
DSW-18KX_LX(config-if-GigabitEthernet1/3)#dot1x critical//Configure RADIUS escape in 802.1x authentication mode onan interface.
DSW-18KX_LX(config-if-GigabitEthernet1/3)#dot1x critical recovery actionreinitialize //Enable an escaped user toperform re-authentication after RADIUS escape is recovered.
DSW-18KX_LX(config-if-GigabitEthernet1/3)#switchport protected //Configure portprotection on an interface.
DSW-18KX_LX(config)#intGigabitEthernet 1/4//Configure the interface for connecting to the wirelesscontroller.
DSW-18KX_LX(config-if-GigabitEthernet1/4)#switchport mode trunk
DSW-18KX_LX(config-if-GigabitEthernet1/4)#dot1x port-control auto //Enable802.1x authentication control on an interface.
DSW-18KX_LX(config-if-GigabitEthernet1/4)#dot1x mac-auth-bypass multi-user //Enable multi-user MAB authentication onan interface.
DSW-18KX_LX(config-if-GigabitEthernet1/4)#dot1x mac-auth-bypass vlan 150-199//Enable MAB authentication for VLANs150–199 (wireless Web authentication in the office area).
DSW-18KX_LX(config-if-GigabitEthernet1/4)#web-auth enable eportalv2//Enable Web authentication on an interface.
DSW-18KX_LX(config-if-GigabitEthernet1/4)#switchport trunk allowed vlan only 100-199,300-399,3000
DSW-18KX_LX(config)#intGigabitEthernet 1/44//Configure the port for connecting to the server area.
DSW-18KX_LX(config-if-GigabitEthernet1/44)#no switchport
DSW-18KX_LX(config-if-GigabitEthernet1/44)#description linkto-SAM&eportalSERVER
DSW-18KX_LX(config-if-GigabitEthernet1/44)#ip address 172.29.2.253 255.255.255.0
6.Optimizing VLAN pruning on the downlink port of the RG-N18000
7.Performing routing related configurations
DSW-18KX_LX(config)#router ospf 1
DSW-18KX_LX(config-router)#redistributeconnected
DSW-18KX_LX(config-router)#passive-interfac vlan2000 //Mandatory. Configure a passive port to to reduce CPUoverheads.
DSW-18KX_LX(config-router)#passive-interfac vlan2001 //Mandatory. Configure a passive port to to reduce CPUoverheads.
DSW-18KX_LX(config-router)#passive-interfac vlan3000 //Mandatory. Configure a passive port to to reduce CPUoverheads.
DSW-18KX_LX(config-router)#passive-interfac vlan3001 //Mandatory. Configure a passive port to to reduce CPUoverheads.
DSW-18KX_LX(config-router)#passive-interfac vlan3010 //Mandatory. Configure a passive port to to reduce CPUoverheads.
DSW-18KX_LX(config-router)#passive-interfac vlan3011 //Mandatory. Configure a passive port to to reduce CPUoverheads.
DSW-18KX_LX(config-router)#passive-interfac vlan3012 //Mandatory. Configure a passive port to to reduce CPUoverheads.
S5750-student(config)#vlan range 200-399,3000-3001,3010-3012 //Configurethe VLAN range for the access device in the student dormitory area, as well asthe monitoring and management VLANs.
S5750-student(config)#intGigabitEthernet 0/24 //Configure the uplink port of the aggregation deviceas a trunk port for transparent transmission.
S5750-student(config-if-GigabitEthernet0/24)#switchport mode trunk
S5750-student(config-if-GigabitEthernet0/24)#switchport trunk allowed vlan remove 1-199,400-2999,3002-3009,3013-4094
S5750-student(config)#intGigabitEthernet 0/23//Configure the downlink port of the aggregation device asa trunk port for transparent transmission.
S5750-student(config-if-GigabitEthernet0/23)#switchport mode trunk
S5750-student(config-if-GigabitEthernet0/23)#switchport trunk allowed vlan remove 1-199,400-2999,3002-3009,3013-4094
S2928G-student1-1(config)#vlan range200-399,3000-3001,3010-3012 //Configure the VLANrange for the access device in the student dormitory area, as well as themonitoring and management VLANs.
S2928G-student1-1(config)#spanning-tree//EnableSTP.
S2928G-student1-1(config)#spanning-treemode rstp //Enable RSTP to avoid overlow portconvergence speed.
S2928G-student1-1(config)#spanning-treeportfast bpduguard default //Enable BPDU guard for allPortFast ports by default.
S2928G-student1-1(config)#errdisablerecovery interval 300//Configure the recovery interval after a port is disabledby RLDP.
S2928G-student1-1(config)#int rangegi0/1-22
S2928G-student1-1(config-if-range)#switchportaccess vlan 200 //Create an access port and assign it tothe corresponding VLAN.
S2928G-student1-1(config-if-range)#switchportprotected//Mandatory. Configure port protection.
S2928G-student1-1(config-if-range)#spanning-treeportfast //Enable PortFast on all downlinkinterfaces, which validates BPDU guard at the same time. Once a BPDU packet isreceived, the access switch regards that a loop occurs and shuts down the interfaces.
S2928G-student1-1(config-if-range)#rldpport loop-detect shutdown-port //Mandatory. ConfigureRLDP to prevent loops.
S2928G-student1-1(config)#intgi0/23//Configure the port for connecting to the AP.
S2928G-student1-1(config-if-GigabitEthernet0/23)# switchport access vlan 3001
S2928G-student1-1(config-if-GigabitEthernet0/23)#rldp port loop-detect shutdown-port
S2928G-student1-1(config)#intgi0/24//Configure the uplink port of the access device as a trunk port fortransparent transmission.
S2928G-student1-1(config-if-GigabitEthernet0/24)#switchport mode trunk
S2928G-student1-1(config-if-GigabitEthernet0/24)#spanning-tree bpdufilter enable//Enable a BPDU filter for the uplinkport, so that loop protection is provided only on single devices, and BDPUpackets are not transmitted externally, no topology is created, and no rootbridge is elected.
S2928G-student1-1(config-if-GigabitEthernet0/24)# switchport trunk allowed vlan only 200-399,3000-3001,3010-3012
1.Adding an RG-N18000 on SAM+
2.Adding an AC on SAM+
3.Adding ePortal on SAM+
4.Adding SAM+ on ePortal
5.Adding an RG-N18000 on ePortal
6.Configuring access control
(1)It is not necessary to enable MAB authentication for access control in thedormitory area.
(2)It is necessary to enable MAB authentication for access control in the officearea.
(3)The office area allows MAC fast access. To allow login using the native 802.1xauthenticated client, select Smart Device 1X Access.
7.Configuring accounting policies
(1)Monthly accounting policy in the dormitory area
(2)Monthly accounting policy in the office area
8.Configuring user templates
(1)User template in the dormitory area
(2)User template in the office area
9.Configuring user plans
(1)User plan in the dormitory area
(2)User plan in the office area
10.Configuring user groups
11.Registering users
12.Payment
13.Controlling the access period
14.Associating the access period with the user template
15.Verifying login failure of student users beyond the access period (10:34)
Ablank page is displayed, or a prompt indicating that no device is registered isdisplayed during Web authentication.
1. Theclient cannot obtain an IP address, and fails to send HTTP packets.
2. Theclient obtains an unavailable DNS server, and the domain name fails to be parsed.
3. Theredirection parameter, portal key, and source interface configured on theRG-N18000 are inconsistent with those on ePortal.
4. The DHCPcheck in Web authentication is enabled on an interface and a static IP addressis used, resulting in redirection failures.
5. HTTPpackets are lost and cannot reach the RG-N18000, and the RG-N18000 fails toperform redirection.
6. Packetscannot reach the Web process, and the RG-N18000 fails to perform redirection.
7. Theclient cannot communicate with the portal server via packets because of channelexceptions, such as unreachable routes and security device filtering.
8. TheePortal server works abnormally, sending no response packets.
9. If anon-SAM+ server is adopted, the possible cause is that the URL does not meetserver requirements and therefore, the Web authentication page does not pop up.
10. The user uses a static IPaddress, but has the DHCP check in Web authentication configured: web-authdhcp-check or web-auth dhcp-check vlan xxx.
11. In version 11.0(1)B3P3,the Web authentication page cannot be displayed and redirection cannot beperformed if a static IP address is within the MAB authentication addressrange.
1. Checkwhether the client obtains a correct IP address.
2. Open thebrowser, enter http://www.ruijie.com.cn and http://183.1.1.1 (the IP addressmust not exist in the intranet) separately, and observe whether the browserredirects to the URL.
Ifthe browser fails to redirect to the entered website but redirects to theentered IP address, check whether the DNS resolution is normal.
Ifthe redirection fails after the website and IP address are entered or no pagepops up after redirection, proceed to the following step.
3. Checkwhether the configurations on the RG-N18000 and ePortal are correct.
Checkwhether the redirection configuration is correct on the RG-N18000, and whetherthe web-auth portal key and IP portal source interface commandson the RG-N18000 are consistent with those on the ePortal.
web-auth template eportalv2 //Create a Web authentication template.
ip 202.204.193.32 //IP address of the ePortal server
urlhttp://202.204.193.32/eportal/index.jsp //URL of the ePortalserver.
web-auth portal key ruijie //Encrypt the URL. There must be no space at the end of the command.
ip portal source-interfaceGigabitEthernet 1/24 //The IP address of the interface is 35.0.0.1configured on the ePortal. Ensure that the route is reachable.
Checkwhether Web authentication is correctly configured on the interface. Ensurethat both 802.1x authentication and Web authentication are enabled on a VLAN.
interface range GigabitEthernet 0/1 //Configure the interface for enabling Web authentication.
web-auth enable eportalv2 //Enable Web authentication on theinterface.
web-auth vlan-control 2000-3000 //Enable VLAN-based Web authentication.
Checkwhether the configuration on ePortal is consistent with that on the RG-N18000.See the figure below.
4. Checkwhether DHCP check in Web authentication is enabled on the interface, whetherIP DHCP snooping is enabled, and whether the IP address is obtaineddynamically. The DHCP check in Web authentication needs to be associated withDHCP snooping entries. If no DHCP snooping binding table is available, the Webauthentication redirection will fail.
Commandfor DHCP check in Web authentication: web-auth dhcp-check or web-authdhcp-check vlan xxx
5. Run the showversion command to check whether the RG-N18000 is of version 11.0(1)B3P3.If yes, check whether static IP address MAB authentication is enabled. If astatic IP address is within the IP segment range configured by using the dot1xmac-auth-bypass static-ip-segment command, the Web authentication page doesnot pop up and redirection cannot be performed.
6. If thesystem still fails to redirect to the URL after the steps above are performed,check whether the RG-N18000 receives the packets.
show mac-address-table | include***(MAC address of the user)
show arp | include ****(MAC addressof the user)
If no output of the precedingcommands is displayed, it indicates that the RG-N18000 does not receive thepackets. If relevant entries are displayed, perform ACL counting or packetcapture for confirmation.
ip access-list extended YYY
10 permit ip host 192.168.1.1 any //192.168.1.1 is the user IP address.
20 permit ip any any
interface gigabitEthernet 1/1
ip access-group YYY in //Applythe ACL to the faulty port.
ip access-list counter YYY //Display the packet count.
show access-list //Check whether relevant packet statistics are collected.
Example:
7. Normally,if the system still fails to redirect to the URL after the steps above areperformed, collect debugging information on the RG-N18000 based on faultinformation, and contact the TAC for handling.
8. If thesystem successfully redirects to the URL but the authentication page does notpop up, check the connectivity between the client and ePortal.
Forexample, to run the ping command, disable the firewall on the ePortal serverand ensure that the firewall on the intermediate link allows access.
9. If theconnectivity between the client and ePortal is normal, enable packet capture onboth the client and ePortal, record the URL to which the client redirects aswell as the logs on the ePortal server, and contact the ePortal R&Dengineers for handling.
Runthe following commands to collect information on the RG-N18000:
terminal length 0
show ver detail
show run
show mac-address-table | include***(MAC address of the user)
show arp | include ****(MAC addressof the user)
show ip dhcp snooping
show ip dhcp snooping binding | inH.H.H
debug web-auth cli
show web-auth user name ***
debug web show
debug web stat
debug scc stat
undebug all
show log
terminal no length
Thefigure below shows the information collected on the ePortal server.
TheWeb authentication page can be popped up in the following steps:
Step1: The client exchanges HTTP packets with the RG-N18000, which pushes theredirection URL to the client. The client browser redirects to the redirectionURL.
Step2: The client accesses the redirection URL and exchanges packets with theePortal server.
Therefore,if the client fails to redirect to the URL, the failure occurs between theclient and the RG-N18000; if the client redirects to the URL but no page popsup, the failure occurs between the client and the ePortal.
AWeb authentication prompt shows that the authentication fails or the connectionto the authentication server times out.
1. Theverification conditions of SAM+ are not met.
2. The interconnectionconfigurations between the RG-N18000, ePortal, and SAM+ are inconsistent.
3. Theconnectivity between the RG-N18000 and ePortal or between the RG-N18000 andSAM+ is abnormal. As a result, packets cannot be exchanged normally.
4. Portalor RADIUS packets cannot be properly processed due to internal errors of theRG-N18000.
5. TheePortal server or SAM+ server malfunctions, causing failures in processing orresponding to packets.
6. TheRADIUS server is faulty, and both the escape function and the none mode of AAAare configured on the RG-N18000.
1. Payattention to the authentication failure prompt on the client page and that onthe SAM+ server. Perform basic fault locating based on the prompts and checkwhether the verification conditions of SAM+ are met.
Forexample, if prompts on the client and SAM+ clearly show that the Webauthentication service is not allowed in this area or information verificationfails, check the area, service, and access control and make adjustments accordinglyon SAM+.
2. Checkthe device configurations, mainly the RADIUS server configuration, RADIUS key,configurations on SAM+ and ePortal, and IP RADIUS source interface.
aaanew-model //Enable the AAA function.
aaa authentication login default local //Use the local username/password for login to the AAA device.
radius-server host 172.18.157.32 key ruijie //Configure the IP address and key forthe AAA server, which are applicable to the scenarios with a single RADIUSserver.
aaa accounting network defaultstart-stop group radius //AAA reference configuration. Theactual service deployment prevails.
aaa authentication web-auth defaultgroup radius //Reference configuration forAAA Web template. The actual service deployment prevails.
aaa accountingupdate //Configure AAA accounting update.
aaa accounting update periodic 15 //Set the interval for AAA accounting update to 15min.
aaa authorization ip-auth-modemixed //Set the IP address authorization mode of 802.1xclients to the mixed mode. The IP addresses can be obtained via polling inmultiple ways (DHCP/RADIUS).
no aaa log enable //Disable the AAA log function.
web-auth templateeportalv2 //Create a Web authenticationtemplate.
ip 172.18.157.33 //IP address of the ePortal server.
urlhttp://172.18.157.33/eportal/index.jsp //URL of the ePortalserver.
authentication default //Optional. This command is required when theauthentication list name for AAA is not set to default.
accounting default //Optional. This command is requiredwhen the accounting list name for AAA is not set to default.
web-auth portal key ruijie //Mandatory. Configure the Web portal key.
ip radius source-interfaceGigabitEthernet 1/24 //Configure the source interface for the device tocommunicate with the RADIUS server. The device address added to SAM+ should bethe address of this interface.
ip portal source-interfaceGigabitEthernet 1/24 //Configure the source interface for the device tocommunicate with the ePortal server. The device address added to the ePortalserver should be the address of this interface.
interface range GigabitEthernet0/2-3 //Configure the interface for enabling Web authentication.
web-auth enableeportalv2 //Enable Web authentication on the interface.
web-authvlan-control 2000-3000 //Enable VLAN-based Webauthentication.
snmp-server host 172.18.157.32informs version 2c ruijie
snmp-server community ruijie rw
3. Ping theserver from the RG-N18000 (the ping operation is forbidden if the firewall isenabled on the server). The operation aims to check the connectivity betweenthe IP address of the source interface and the server. If the connectivity testfails, check the network status.
4. If theRG-N18000 is unreachable to the server, check whether the network is normal andthen check whether SAM+ is faulty. If SAM+ is faulty, check whether the escapefunction is configured on the RG-N18000.
Checkwhether the none mode of AAA is configured in the following case: The SAM+server is faulty, and the escape function is configured, but the escapefunction does not take effect and a message is displayed during authentication,indicating that the authentication times out and the device does not respond.
Thenone mode of AAA enables users to access the Internet without authenticationwhen the RADIUS server is unreachable, provided that "radius-servertimeout xxx" is displayed. RADIUS packetsare sent at an interval of 5s by default and the default retransmission countis 3. The none mode of AAA is applied 20 seconds later. By default, the packetfrom ePortal times out when ePortal fails to receive a response within 9seconds. As a result, the none mode of AAA is not applied when the packet fromePortal times out. The user escape function also fails.
Handlingsuggestions: 1. Delete the none mode of AAA.
2.Run the following command to set the RADIUS detection duration to a valuesmaller than the timeout duration (9s) of packets of ePortal: radius-servertimeout 2
5. If theconfiguration is correct and the association is normal, run the followingcommands on the RG-N18000 to collect information:
debug scc stat
debug web-auth cli
sh web user ip ***(ip) -- Checkwhether a user using this IP address is online.
sh web syslog ip***(ip) --Display the historical Internet access records ofthe IP address.
show web-auth authmng abnormal
show radius timeout record – DisplayRADIUS server timeout records.
show radius authstat -- Display statistics relevant to RADIUSauthentication. When a fault occurs, run this command several times to checkstatistical changes.
show radius acct stat ---Display RADIUS accounting statistics. When a fault occurs, run this commandseveral times to check statistical changes.
Captureuser authentication packets on the client, ePortal, and SAM+, and submit themto the TAC for handling.
terminal length 0
show ver detail
show run
debug scc stat
debug web cli
show mac-address-table | include***(MAC address of the user)
show arp | include ****(MAC addressof the user)
show ip dhcp snooping
show ip dhcp snooping binding | in****(user MAC address)
sh web user ip ******* (user IP address)
sh web syslog ip ******* (user IPaddress)
show web-auth authmng abnormal
show radius timeout record
show radius auth stat
show radius acct stat
show log
terminal no length
Webauthenticated users are dropped out of the network, cannot access the network,or are prompted for re-authentication.
1. TheSAM+ server forces users to go offline, or users go offline due to the changein RG-N18000 configurations.
2. Usersgo offline due to user preemption behavior.
3. Usersgo offline because the accounting updates on the RG-N18000 do not matchconfigurations on the SAM+ server.
4. Usersgenerate no traffic within a period of time (code 4, idle timeout).
5. Usersgo offline for data migration because the environment is abnormal (such as aloop).
1. Goto the SAM+ system and access Operation > Online User on theWeb management page, locate the user, view the go-offline cause prompt, andfind out the possible go-offline causes preliminarily.
Note: The user go-offline promptsprovided on SAM+ are accurate, but there may be some errors due to complexnetwork environments.
2. If the device prompts that the user go-offlineis caused by no traffic detected, as shown in the figure below, it indicatesthat SAM+ receives the TCP2009 no traffic notification from the traffic auditdevice (such as the RSR77, ACE, or EG) and forces the RG-N18000 to bring theuser offline.
Note:As shown in the figure, the prompt displayed on the RG-N18000 shows that theuser is forced to go offline.
Ifthe device prompts that the go-offline cause is code4 (idle value timeout), asshown in the figure below, it indicates that the code value in the accountingstop packet of the RG-N18000 is 4, representing that the RG-N18000 forces theuser to go offline because no user traffic is detected.
Checkthe go-offline time and the RG-N18000 configuration based on relevant prompts.
offline-detect interval 15 threshold0 //If no traffic from a user isdetected within 15 minutes, the user is brought offline. The RG-N18000 performsjudgment by checking whether there is user traffic matching entries in the MACaddress table.
offline-detect interval 15 threshold0 vlan 1000-1500 //Optional. Enable theno-traffic go-offline function for VLANs 1000 to 1500.
Ifthe user is brought offline before the go-offline detection interval set on theRG-N18000 expires, the no-traffic go-offline function is initiated by anotherdevice. In this case, check the traffic detection function on other associateddevices.
Forexample, the configurations on the RSR77 are as follows:
sam-acct user keepalive-detect enable //Enable the keepalive detection function (enabled by default).
sam-acct user keepalive-detect 900 //Force a user to go offline if no traffic from theuser is detected within 900 seconds (900 seconds by default).
3. If theserver prompts that the user is brought offline due to preemption, check the systemsettings and attributes of accounts, whether the MAC address uniqueness limitis configured, and whether the number of clients is limited.
4. Checkwhether the accounting update configuration on the RG-N18000 is consistent withthat on SAM+.
aaa accounting update //Configure AAA accounting update.
aaa accounting update periodic 15 //Set the interval for AAA accounting update to 15min.
aaa accounting network defaultstart-stop group radius //AAA reference configuration. The actualservice deployment prevails.
web-auth template eportalv2
ip 172.18.157.33
urlhttp://172.18.157.33/eportal/index.jsp
authentication default
accounting default //Enable the accounting update function.
5. If theserver prompts that the user is brought offline due to migration (VLANmigration, port migration, or VLAN & port migration), check the usergo-offline cause on the device. If the device also prompts that the user isbrought offline due to migration, as shown in the figure below, check the MACaddress of the user.
Runthe show mac-address-table address *** and show arp *** commandson the device to check whether the VID or port associated with the MAC addresschanges. If yes, proceed to the following step.
Basedon the new VID or port, locate the earliest device that learns the MAC addressand pinpoint the cause for MAC address drift.
Aloop or IP address spoofing occurs on the downlink device.
Runthe following commands to collect information on the RG-N18000:
terminal length 0
show ver detail
show run
show mac-address-table | include***(MAC address of the user)
show arp | include ****(MAC addressof the user)
show ip dhcp snooping
show ip dhcp snooping binding | in****(user MAC address)
debug scc stat
debug web cli
sh web user ip ***(ip)
sh web syslog ip ***(ip) ---
show web-auth authmng abnormal
debug scc pgsql st --- Displayrelevant statistics of the database.
undebug all
show log
terminal no length
802.1xauthentication fails or 802.1x authenticated users are dropped out of thenetwork.
1. Theconfigurations for interconnection between the RG-N18000 and SAM+ server areincorrect. As a result, the RG-N18000 fails to send packets to the SAM+ server,or the SAM+ server fails to process received packets.
2. Thechannel between the RG-N18000 and SAM+ server is abnormal, and RADIUS packetscannot be sent to the SAM+ server.
3. Thechannel between the client and the RG-N18000 is abnormal, and EAP packetscannot be sent to the RG-N18000.
4. Theconfigurations are incorrect on the RG-N18000, and the RG-N18000 fails toprocess or respond to packets.
5. Usersfail to obtain correct IP addresses.
6. Softwarefailures occur on the RG-N18000 or SAM+ server, and authentication packetscannot be properly sent or processed.
7. VLANports are migrated, and a prompt about active user go-offline is displayed evenif the user does not go offline actively (11.0(1)B3P2 and earlier versions).
1. On theclient and SAM+, access Operation > Log, collect relevantauthentication failure prompts, and make basic judgment based on the prompts.
2. If thesystem is stuck in the connection to the authentication server or a promptabout an authentication server connection failure is displayed during clientauthentication, check whether 802.1x authentication configurations on theRG-N18000 and SAM+ are correct. If a prompt is provided on SAM+, follow theprompt to complete the configuration. If no prompt is provided on SAM+, checkwhether the RADIUS server is configured correctly.
aaa new-model
radius-server host 192.168.32.120 key7 ruijie
ip radius source-interfacegigabitEthernet 1/24
aaa accounting network defaultstart-stop group radius
aaa authentication dot1x defaultgroup radius
aaa accounting update periodic15
aaa accounting update
dot1x accounting default
dot1x authentication default
aaa authorization ip-auth-mode mixed
no aaa log enable
interface FastEthernet 0/1
dot1x port-control auto
expert access-list extended 2700
10 permit arp any any
20 permit udp any any any anyeq bootpc
30 permit udp any any any anyeq bootps
security global access-group 2700
3. Checkwhether the connectivity between the IP address of the source interface of theRG-N18000 and SAM+ is normal.
4. Ifthe authentication is stuck in the phase of authentication server searching ora prompt is displayed, indicating that searching for an authentication serverfails, check whether the link between the client and the RG-N18000 is normaland whether the 802.1x authentication function is configured on a downlink portconnected to the RG-N18000.
Checkwhether EAP packets are filtered out because 802.1x authentication is enabledon the access-layer S21 series switch, or whether EAP packets are not forwardedbecause the switch connects to a TP-LINK device.
5. Ifthe fault persists after the steps above are performed, run the followingcommand to collect go-online/offline records, and capture packets on the clientand the SAM+ server.
Showdot1x user diag mac xxx
Asshown in the figure above:
create pae: Indicates that a user is created.
pktstart: Indicates authentication initiated by the start packet from the client.
acct start: Indicates that the authentication is successful andaccounting starts.
acct stop: Indicates that the user goes offline and the accounting stoppacket is sent.
Show dot1xauthmng statistics
Show dot1x authmngmab statistics
sh ip dhcpsnooping binding
6. Checkwhether an IP address can be obtained normally.
expert access-list extended 2700
10 permit arp any any
20 permit udp any any any anyeq bootpc
30 permit udp any any any anyeq bootps
security global access-group 2700
Afterverifying that the configuration above is normal, if an IP address still failsto be obtained, check possible causes and rectify the fault by following thehandling procedure of a DHCP fault.
7. If theauthentication still fails after the configuration above is adopted, collectinformation on the RG-N18000, enable packet capture on both the client andSAM+, and send the information and captured packets to the TAC for handling.
Run the following commands to collectinformation on the RG-N18000:
terminal length 0
show ver detail
show run
show mac-address-table | include***(MAC address of the user)
show arp | include ****(MAC addressof the user)
show ip dhcp snooping
show ip dhcp snooping binding | in****(user MAC address)
show dot1x user diag mac xxx
show dot1x authmng abnormal | in xxx
show dot1x authmng statistic
show dot1x authmng mab statistic
show dot1x user mac xxx
show dot1x
deb dot1x dump gl
show log
terminal no length
Thedirectory for storing logs to be collected on SAM+ is as follows:
NetworkDropout During 802.1x Authentication
1. Usersgenerate no traffic within a period of time.
2. Theclient version is not compatible with the SAM+ server version.
3. VLANports are migrated, and a prompt about active user go-offline is displayed evenif the user does not go offline actively (11.0(1)B3P2 and earlier versions).
1. Go tothe SAM+ system and access Operation > Online User on the Web managementpage, locate the user, view the go-offline cause prompt, and find out thepossible go-offline causes preliminarily.
Note:The user go-offline prompts provided on SAM+ are accurate, but there may besome errors due to complex network environments.
2. If thedevice prompts that the user go-offline is caused by no traffic detected, asshown in the figure below, it indicates that SAM+ receives the TCP2009 no trafficnotification from the traffic audit device (such as the RSR77 or ACE).
Ifthe device prompts that the go-offline cause is code4 (idle value timeout), asshown in the figure below, it indicates that the code value in the accountingstop packet of the RG-N18000 is 4, representing that the RG-N18000 forces theuser to go offline because no user traffic is detected.
Checkthe go-offline time and the RG-N18000 configuration based on relevant prompts.
offline-detect interval 15 threshold0 //If no traffic from a user isdetected within 15 minutes, the user is brought offline. The RG-N18000 performsjudgment by checking whether there is user traffic matching entries in the MACaddress table.
offline-detect interval 15 threshold0 vlan 1000-1500 //Optional. Enable theno-traffic go-offline function for VLANs 1000 to 1500.
Ifthe user is brought offline before the go-offline detection interval set on theRG-N18000 expires, the no-traffic go-offline function is initiated by anotherdevice. In this case, check the traffic detection function on other associateddevices.
Forexample, the configurations on the RSR77 are as follows:
sam-acct user keepalive-detectenable //Enable the keepalive detection function(enabled by default).
sam-acct user keepalive-detect900 //Force a user to go offline ifno traffic from the user is detected within 900 seconds (900 seconds bydefault).
3. TheRG-N18000 sends the EAP failure packet to the client during user VLAN or portmigration. After receiving the packet, the client actively initiates ago-offline request.
Runthe show dot1x authmng abnormal command to display the user go-offlinecause. If it is determined that the fault is caused by port or VLAN migration,run the show mac-address-table and show arp commands to displaythe migration information and find out the cause for migration (loop or othercauses) to rectify the fault.
Commoncauses:
"user logoff" :\--->>The client logs out.
"server kickout user" :\--->>The server kicks the user off the network.
"no flow" : \---.>>Notraffic is detected.
"port move" :\--->>Port migration occurs.
"vlan move" :\--->>VLAN migration occurs.
"port-vlan move" :\--->>Both port migration and VLAN migration occur.
"invalid ip" :\--->>No valid IP address is available.
Runthe following commands to collect information on the RG-N18000:
terminal length 0
show ver detail
show run
show mac-address-table | include***(MAC address of the user)
show arp | include ****(MAC addressof the user)
show ip dhcp snooping
show ip dhcp snooping binding | in****(user MAC address)
show dot1x user diag mac xxx
show dot1x authmng abnormal | in xxx
show dot1x authmng statistic
show dot1x authmng mab statistic
show dot1x user mac xxx
show dot1x
deb dot1x dump gl
show log
terminal no length
Thedirectory for storing logs to be collected on SAM+ is as follows:
MABperception-free authentication fails.
1. MAB perception-freeauthentication is not enabled on the SAM+ server, and the SAM+ server fails tolearn MAC addresses of clients.
2. TheRG-N18000 is incorrectly configured, and fails to initiate MAB perception-freeauthentication.
3. Usersfail to obtain correct IP addresses, not meeting the mechanism of dot1xmac-auth-bypass valid-ip-auth.
4. Thedevice fails to learn the corresponding MAC address, and does not initiate MABauthentication.
5. Softwarefailures occur on the RG-N18000 or SAM+ server, and MAB perception-freeauthentication is not initiated or processed properly.
1. On theclient and SAM+, access Operation > Log, collect relevantauthentication failure prompts, and make basic judgment based on the prompts. Asshown in the figure below, the RG-N18000 initiates MAB authentication but thereis no MAB authentication entry on the SAM+ server. As a result, the MABauthentication fails.
Asshown in the figure below, access User > MAC Authenticationand check whether binding entries of the username corresponding to the MACaddress exist.
Checkwhether MAC fast authentication is checked for access control.
2. If SAM+has no authentication failure entry of the MAC address, MAB authenticationinteraction exceptions may be caused by improper configuration on theRG-N18000.
aaanew-model //Enable the AAA function.
aaa accounting network defaultstart-stop group radius //AAA referenceconfiguration. The actual service deployment prevails.
aaa authentication dot1x defaultgroup radius //Referenceconfiguration for AAA 802.1x authentication template. The actual servicedeployment prevails.
aaa authentication web-auth defaultgroup radius //Referenceconfiguration for AAA Web authentication template. The actual servicedeployment prevails.
aaa authentication login defaultlocal //Use the local username/password for loginto the AAA device.
radius-server host 172.18.157.32 keyruijie //Configure the IP address andkey for the AAA server, which are applicable to the scenarios with a singleRADIUS server.
aaa accounting update periodic15 //Set the internal for AAAaccounting update to 15 min.
aaa accountingupdate //Configure AAA accounting update.
no aaa log enable //Disable the AAA log function.
dot1x accountingdefault //Optional. This command is required when theaccounting list name for AAA is not set to default.
dot1x authenticationdefault //Optional. This command is required when the802.1x authentication list name for AAA is not set to default.
web-auth template eportalv2
ip 172.18.157.33 //IP address of the ePortalserver
url http://172.18.157.33/eportal/index.jsp //URL of the ePortal server.
authentication default //Optional. This command is required when theauthentication list name for AAA is not set to default.
accounting default //Optional. This command is required whenthe accounting list name for AAA is not set to default.
web-auth portal key ruijie //Mandatory. Configure the key for encrypting the URL for interconnectionwith ePortal.
aaa authorization ip-auth-modemixed //Mandatory. Set the IP address authorization mode of802.1x clients to the mixed mode. The IP addresses can be obtained via pollingin multiple ways (DHCP/RADIUS).
ip dhcpsnooping //Mandatory. An IP address needs to be obtained via the DHCP snooping modulefor MAB authentication. Otherwise, a user with the IP address of 0.0.0.0appears on SAM+.
dot1x mac-auth-bypassvalid-ip-auth //The DHCPmodule instructs the MAB module to start authentication. The configuration ofthis command will drop users out of the network. It is not recommended to runthis command in service peak hours.
dot1x valid-ip-acctenable //Mandatory.The accounting update packets are used to upload the user IP address to SAM+.If the 802.1x authentication module does not have an IP entry of the user, theuser is kicked offline 5 minutes later.
interface range GigabitEthernet0/2-3 //Enable 802.1x authentication on the interface.
web-auth enableeportalv2 //Enable Web authentication on the interface.
dot1x port-control auto //Enable 802.1x authentication on the interface.
dot1x mac-auth-bypassmulti-user //Mandatory. Enable MAB authentication on the interface.
dot1x mac-auth-bypassvlan(vlan-list) //Optional. Configure this command in interface configuration mode to enableVLAN-based MAB authentication.
3. Afterthe dot1x mac-auth-bypass valid-ip-auth command is configured, dynamicusers must obtain IP addresses and relevant entries exist in the DHCP snoopingbinding table before MAB authentication can be initiated for them.
Runthe show ip dhcp snooping binding or show ip dhcp snooping binding |include 192.168.1.1 command to check whether relevant entries aredisplayed.
Ifno, check whether the IP address is proper and whether the DHCP process isnormal.
Ifthe user IP address is static and there is no DHCP interaction, statically bindentries on the RG-N18000 to trigger MAB authentication. See the followingcommand.
dot1xaddress-binding mac 9048.9a8e.a033 ip 10.0.100.188
4. If theconfiguration is correct, run the show mac-address-table command tocheck whether the MAC address is learned successfully. If yes but MABauthentication is not initiated, contact the TAC for handling. If no, enablepacket capture to check whether the RG-N18000 receives packets. If yes, contactthe TAC for handling.
5. If thecause cannot be pinpointed after the operations above are performed, thesoftware of the RG-N18000 may be faulty, which result in the failure toinitiate MAB authentication, or the software of SAM+ may be faulty, whichresult in the failure in processing of MAB authentication. Collect informationon the RG-N18000, enable packet capture on both the client and SAM+, and sendthe information and captured packets to the TAC for handling.
Runthe following commands to collect information on the RG-N18000:
terminal length 0
show ver detail
show run
show mac-address-table | include ***(MAC address of theuser)
show arp | include ****(MAC address of the user)
show ip dhcp snooping
show ip dhcp snooping binding | in ****(MAC address ofthe user)
show dot1x user diag mac xxx
show dot1x authmng abnormal | in xxx
show dot1x authmng statistic
show dot1x authmng mab statistic
show dot1x user mac xxx
deb web-auth mab user-show
show dot1x
deb dot1x dump gl
show log
terminal no length
Thedirectory for storing logs to be collected on SAM+ is as follows:
Thedevice fails to dynamically obtain IP addresses or the dynamically obtained IPaddresses are abnormal.
1. The DHCPaddress pool and sub VLANs are not associated with a super VLAN, and AM rulesare incomplete, resulting in IP address allocation failures.
2. Addressesin the address pool are exhausted, and no IP address can be allocated.
3. Only802.1x authentication is configured on interfaces and no security channel isconfigured.
4. Theintermediate channel fails or ACL configurations are incorrect, and DHCPpackets cannot reach the RG-N18000.
5. DHCPsnooping is enabled on the downstream switch and the upstream port is not addedto the list of trusted ports, and therefore DHCP response packets are dropped.
6. Theclient is faulty, and DHCP packets cannot be sent or received DHCP packetscannot be processed.
7. The DHCPrelay is incorrectly configured on the RG-N18000, or the channel between thegateway and DHCP server is abnormal.
8. TheRG-N18000 serves as a DHCP relay, packets between the RG-N18000 and the serverare transmitted at layer 2, and the client is not in the same VLAN as theserver. As a result, the RG-N18000 does not send packets to the clientaccording to the DHCP snooping binding table.
9. The DHCP server performance is abnormal,resulting in packet processing or response failures.
10. DHCP packets aredropped at the IP layer (founded by displaying the TCP/IP CPU usage).
1. Checkwhether the DHCP, super VLAN, gateway interface, and AM rules are correctlyconfigured.
Themain DHCP configuration is as follows:
ip dhcp pool bangong
lease 0 2 0
network 10.1.32.0 255.255.240.0 //The mask here contains 20 bits.
dns-server 192.168.58.110
default-router 10.1.32.254
Note:If the subnet mask of an address in the DHCP address pool contains 20 bits butthat of the IP address configured for the gateway interface does not, DHCPneeds to be configured based on the network segment to which the subnet mask ofthe gateway IP address belongs.
Themain super VLAN configuration is as follows:
vlan 2001
Super VLAN
subvlan 200-399 //Associate the sub VLANs with the super VLAN.
name susheZONE
Note:The VLAN of each interface on the client connected to the access switch is asub VLAN, which needs to be associated with the super VLAN.
Themain AM rule configuration is as follows:
address-manage //Enable the address management function.
match ip 10.1.5.0255.255.255.0 gi5/3 vlan 1005 //ConfigureVLAN+port-based matching mode.
match ip192.168.2.0 255.255.255.0 Gi5/3 vlan 1006
match ip192.168.3.0 255.255.255.0 Gi5/3 vlan 1007
match ip loose //Set the AM rule to loosemode. If the loose mode is not configured, clients that do not match the AMrules cannot obtain IP addresses.
Note:The matching of AM rules is matching the interface and VLAN configured in theAM rules, for example, the Gi5/3 interface and VLAN 1005 above. If it isconfirmed that DHCP packets are from the Gi5/3 interface and VLAN 1005, theDHCP packets match the AM rules. In this case, the IP address obtained by theuser must be in the range of 10.1.5.0 to 10.1.5.255 regardless of whether inloose or strict mode. If no AM rule is matched or IP addresses in the range of10.1.5.0 to 10.1.5.255 are all assigned, no IP address can be obtainedregardless of whether in loose mode or strict mode. If no AM rule is matched,it indicates that neither the interface (for example, Gi5/3) nor VLAN (forexample, VLAN 1005) is matched. If no AM rule is matched in loose mode, an IPaddress outside the DHCP address pool is assigned.
2. Runthe show command to check whether IP addresses in the DHCP address poolare used up.
Collectbasic DHCP information and check whether IP addresses in the DHCP address poolare used up.
showip dhcp pool
Note:If the value in the Percentage column is greater than 80%, addresses inthe DHCP address pool are to be used up.
showip dhcp server statistics
Note:Focus on the value of the DHCPDELINE field. A larger value indicatesmore IP address conflicts in the network. This field shows the total number ofIP address conflicts since startup. It is recommended to refresh the fieldevery 10 minutes to check whether the value increases greatly. If yes, an IPaddress conflict occurs.
show ip dhcp snooping binding | in H.H.H
Note:Pay attention to the value of DHCP snooping binding entries. If DHCP snoopingis enabled and the number of entries exceeds the specified limit (256,000), nonew DHCP snooping binding entry can be generated. If an entry is displayed, itindicates the MAC address is associated with an IP address.
3. Run the showip dhcp server agent mac xx.xx.xx command to display the packetexchange for a client to acquire an IP address.
4. Checkwhether only 802.1x authentication is configured on interfaces, and no securitychannel is configured.
Configure asecurity channel if none is configured.
expert access-list extended 2700
10 permit arp any any
20 permit udp any any any any eq bootpc
30 permit udp any any any any eq bootps
security global access-group 2700
5. Checkwhether DHCP packets sent by the client normally reach the RG-N18000.
Manuallyconfigure an IP address to ping the gateway to check the connectivity (the pingoperation fails if authentication is enabled). Alternatively, run the debugcommand to check whether the RG-N18000 receives the packets, and if no, checkthe intermediate network.
debugip dhcp filter mac H.H.H //Run this command so that only packets of aspecific MAC address are displayed.
debugip dhcp server all
Searchlogs by keywords:
%DHCPD-7-DEBUG:recv dhcp packet from 10.8.8.1 mac 0010.184a.ae10 ifx(4296), l2_port(50),vlan(200), vrf(3) inner_vid (0) vni(0), len=300
--->>Thislog shows that the DHCP request from the user is received.
%DHCPD-7-DEBUG:send dhcp packet to 10.8.8.1, len=324, ret =324, success!
%DHCPD-7-DEBUG:make ack success, send packet
--->>Thislog shows that the ACK packet is sent to the user.
6. Checkwhether the DHCP snooping trust port is correctly configured on the downlinkswitch.
switch#show ip dhcp snooping //Display the DHCP snooping configuration.
Switch DHCP snooping status : ENABLE
DHCP snooping Verification of hwaddrstatus : DISABLE
DHCP snooping database write-delaytime : 0 seconds
DHCP snooping option 82 status : DISABLE
DHCP snooping Support bootp bindstatus : DISABLE
Interface Trusted Rate limit (pps)
------------------------ ------- ----------------
GigabitEthernet 1/2 YES unlimited
Default No unlimited
Note:Check whether relevant uplink ports are configured as trusted ports and whethera rate limit is configured on downlink ports.
7. Enablethe debug function on the RG-N18000, and check the packet interaction based onACL counting (capture packets on the downlink port of the RG-N18000 ifcondition permit) and packet capture on the client.
expertaccess-list extended exp1
20permit udp any host 1111.1111.1111 any any range bootps bootpc (Replace"1111.1111.1111" with the user MAC address.)
90permit etype-any any any
100permit ip any any any any
intte1/1 (faulty port)
expertaccess-group exp1 in
exit
expertaccess-list counter exp1
showaccess-list --(Check whether packet statistics are collected.)
Thedigit enclosed in the red rectangle indicates that 10 DHCP packets arereceived.
Ifthe client sends out packets but the RG-N18000 does not receive the packets,check whether the intermediate network is reachable.
Ifthe RG-N18000 receives the packets but no relevant log output or response logis generated for the debug command, contact the TAC for handling.
Ifthe RG-N18000 returns a response but the client does not receive it, checkwhether the intermediate network is reachable (check whether ACL or DHCPsnooping is configured).
8. If DHCPrelay is configured on the RG-N18000, packet interaction between the gateway IPaddress of the access client and the DHCP server is abnormal due to unreachableroute or firewall errors.
Onthe RG-N18000, ping the DHCP server from the source IP address, to checkwhether the DHCP server is reachable.
9. TheRG-N18000 serves as a DHCP relay, packets between the RG-N18000 and the serverare transmitted at layer 2, and the client is not in the same VLAN as theserver. As a result, the RG-N18000 does not send packets to the clientaccording to the DHCP snooping binding table.
The principles are described as follows:
1. Theclient is configured on VLAN 60 and the WDS server is configured on VLAN 2.
2. Theclient with the IP address of 192.168.60.2 from VLAN 60 sends the DHCP-Requestpacket to the WDS server with the IP address of 192.168.0.65. When the packetpasses through the DHCP snooping module of the core device, a temporary entrycontaining the MAC address + VLAN 60 is recorded.
3. Whenthe WDS server from VLAN 2 responds to the client with the DHCP-ACK packet, thecore device uses MAC address + VLAN 2 for matching in the DHCP snooping tablebut fails to find the temporary entry. As a result, the packet is directly sentto SVI2 and the client fails to receive the DHCP-ACK packet.
Solution: Run the no ip dhcp snooping vlan 2 (serverVLAN) command on the core device.
10. Capture packets for interaction between theclient and the RG-N18000. Capture packets of the RG-N18000 and the DHCP server.
Runthe following commands to collect information on the RG-N18000:
debug ip dhcp filter mac H.H.H //Run this command so that only packets of a specific MAC address aredisplayed.
debug ip dhcp server all
terminal length 0
show ver detail
show run
show ip dhcp pool
show ip dhcp server statistics
show arp | include ***
sho mac-address-table | include ***
show ip dhcp snooping binding
show ip dhcp snooping binding | inH.H.H
show ip dhcp server agent macxx.xx.xx (supported in version 11.0(1)B3P3)
show nfpp dhcp-guard host
show ip dhcp relay-statistics
show ip dhcp conflict
show log
show interface counters rate
show interface counters summary
terminal no length
Auser fails to access the Internet or the Internet access is stalling afterauthentication.
1. Theauthentication fails or the user goes offline immediately after successfulauthentication.
2. A loopin the downlink device causes random packet loss between the client and thegateway.
3. A staticIP address is configured for the client and AM rules are configured. Packetsare discarded when no AM rule is met.
4. Packetsare discarded due to improper routing of the RG-N18000 or intermediate device.
5. Somepackets are discarded due to very high CPU usage of the device, and incorrectVLAN tags are added to packets due to software bugs.
1. On theRG-N18000, run the show web-auth user name *** and show dot1x username*** commands to check whether the user is online. In addition, access Operation> Online User on SAM+ to check whether there are online users.
Ifthe user is offline, rectify the fault based on authentication symptoms byreferring to authentication failure troubleshooting procedures. If the user isonline, proceed to the following step.
2. Checkthe port rate or logs and check whether there are loops. If a loop exists,rectify the fault by referring to the loop locating manual.
Seethe Procedure for Layer-2 Loop Problem Locating in Simplistic Networks.
3. If theIP address is manually configured, check the AM configuration.
Inloose mode, data forwarding is allowed for manually configured normal IPaddresses regardless of whether the IP addresses are within the AM range.
Instrict mode, data forwarding is allowed for manually configured IP addressesthat are within the AM range.
4. Checkrelevant routing entries on the RG-N18000 to check whether more detailed routesare learned from other devices.
5. Locatethe packet loss point based on ACL-based packet counting or packet capture.
EnableACL-based packet counting on the RG-N18000 (enable packet capture fortroubleshooting if conditions permits).
expertaccess-list extended exp1
20permit arp host 1111.1111.1111 any //Check whether ARP packets arereceived. Replace "1111.1111.1111" with the user MAC address.
40permit icmp host 1.1.1.1 any any any //Check whether the ICMP packetsare received. Replace "1.1.1.1" with the user IP address.
90permit etype-any any any
100permit ip any any any any
intte1/2/1 //te1/2/1 is the ingress ofthe RG-N18000.
expertaccess-group exp1 in
expertaccess-list counter exp1 //Enable packet counting for an ACL namedexp1.
TheACL-based packet count above shows whether ARP packets or ICMP packets arelost.
Ifthe RG-N18000 does not receive the ARP packets or ICMP packets, check whetherthe access and aggregation links of the downlink port are faulty.
Ifthe RG-N18000 receives the ARP packets or ICMP packets, check whether ACLs orAM rules for filtering out ARP or ICMP packets are configured.
Ifno filtering is configured, run the debug arp ip + user IP addresscommand to check whether ARP packets are sent to the IP layer. Run the un alcommand to disable the debug function, as shown in the figure below.
IfARP packets are not sent to the IP layer or the RG-N18000 does not send out theresponse from the IP layer, contact the TAC to rectify the fault by using theframe path method.
6. If theping result shows that no packet loss occurs but it is slow in opening websitesand some websites even cannot be opened, check whether only some websites orall websites have the same problem. If only some websites encounter thisproblem, such websites may be faulty.
Ifmost websites and even some famous websites have this problem, connect theclient to the uplink device of the RG-N18000 for testing. If the faultpersists, check the uplink device or enable packet capture on the border routerto check whether packets are sent out and whether responses are received.
Ifthe Internet access is normal, check whether the RG-N18000 receives andforwards packets normally based on the ACL-based packet counting or packetcapture in the inbound direction of the uplink interface or outbound directionof the downlink interface of the RG-N18000.
expert access-list extended exp1
20 permit ip host 1.1.1.1 any anyany (Replace "1.1.1.1" with the actual website IPaddress.)
90 permit etype-any any any
100 permit ip any any any any
int te1/2/1 //Uplink interface of the RG-N18000
expert access-group exp1 in
int te1/2/1 //Downlink interface of the RG-N18000
expert access-group exp1 out
expert access-list counter exp1
show access-lists
Note:Compare the inbound packets and outbound packets counted based on ACLs to checkwhether the RG-N18000 forwards packets normally.
7. Ifpacket exchange is normal and an MSC card is configured, check whether PBR isconfigured and whether the configured uplink and downlink paths are consistent.See the figure below.
Forspecific configuration, see the Typical Configuration Cases of MSC Cards inSimplistic Networks.
Ifthe configured paths are inconsistent, the MSC card discards packets becausethe packets fail the TCP connection validity check.
Ifthe configuration is free of errors, compare whether the number of packetsreceived by the downlink interface of the RG-N8000 is consistent with that sentby the uplink interface of the RG-N18000 by using the ACL-based packet countingmethod.
1. Recordfault symptoms clearly, including the fault scope, packet loss frequency, faultpattern, and whether the network is changed before the fault.
2. Clarifythe network topology so that the TAC learns about the environment, which isconducive to troubleshooting.
1. Recordfault symptoms clearly, including the fault scope, packet loss frequency, faultpattern, and whether the network is changed before the fault.
2. Clarifythe network topology so that the TAC learns about the environment, which is conduciveto troubleshooting.
3. Locatethe packet loss point based on ACL-based packet counting or packet capture.
4. Checkthe configuration or work with the TAC to pinpoint the packet loss cause.
ACLstatistics scripts for:
1. ARP-basedpacket statistics
2. ICMP-basedpacket statistics
3. IP-basedpacket statistics
4. TCP-basedpacket statistics
5. UDP-basedpacket statistics
6. MAC-basedpacket statistics
1. ARP-basedpacket statistics
expertaccess-list extended exp1
20 permit arp host1111.1111.1111 any (Check whether ARP packets are received. Replace"1111.1111.1111" with the actual user MAC address.)
90 permit etype-any anyany
100 permit ip any anyany any
exit
int te1/2/1 (te1/2/1is the ingress of the RG-N18000.)
expert access-group exp1in
exit
expert access-list counter exp1
show access-lists
2. ICMP-basedpacket statistics
expertaccess-list extended exp1
40 permit icmp host1.1.1.1 any any any (Check whether ICMP packets are received.Replace "1.1.1.1" with the actual user IPaddress.)
90 permit etype-any anyany
100 permit ip any anyany any
exit
intte1/2/1 (te1/2/1is the ingress of the RG-N18000.)
expert access-group exp1in
exit
expert access-list counter exp1
show access-lists
3. IP-basedpacket statistics
expert access-list extended exp1
20 permit iphost 1.1.1.1 any any any (Replace "1.1.1.1" with the actualuser IP address.)
90 permit etype-any any any
100 permit ip any any any any
exit
intte1/2/1 (faulty port)
expert access-group exp1 in
exit
expert access-list counter exp1
show access-list --(Check whether packet statistics are collected.)
4. TCP-basedpacket statistics
expert access-list extended exp1
20permit tcp host 1.1.1.1 any any any (Replace "1.1.1.1" with theactual user IP address.)
90 permit etype-any any any
100 permit ip any any any any
exit
intte1/2/1 (faulty port)
expert access-group exp1 in
exit
expert access-list counter exp1
show access-list --(Check whether packet statistics are collected.)
5. UDP-basedpacket statistics
expert access-list extended exp1
20permit udp host 1.1.1.1 any any any (Replace "1.1.1.1" with theactual user IP address.)
90 permit etype-any any any
100 permit ip any any any any
exit
intte1/2/1 (faulty port)
expert access-group exp1 in
exit
expert access-list counter exp1
show access-list --(Check whether packet statistics are collected.)
6. MAC-basedpacket statistics
mac access-list extended mac1
20 permit host 1111.1111.1111 any
100 permit any any
exit
int te1/2/1
expert access-group mac1 in
exit
mac access-list counter mac1
showaccess-lists show access-list --(Check whether packet statistics are collected.)
Runthe following command to check RLDP logs to preliminarily locate the ports andVLANs experiencing the loop: show rldp loop-detect-log,
Runthe rldp reset and show rldp commands several times and check theneighbor field. Check whether the VLANs and ports change each time afterthe rldp reset command is executed, in an effort to determine the looptype (see the figure below).
TheVLANs and ports causing the loop can be determined after the operations aboveare performed. If the VLANs and ports keep unchanged after the rldp resetcommand is executed several times, the possible topology is as follows:
Operationsteps
1. Find outthe aggregation switch experiencing the loop based on the ports and find outthe access switch based on the VLANs.
2. Run thefollowing command to check whether port traffic statistics is abnormal on theaggregation switch and access switch. If yes, rectify the fault step by stepbased on the abnormal traffic. show interface counters rate [up]
3. If thecondition permits, enable the RLDP function on the aggregation switch andaccess switch (the enabling of RLDP will shut down the loop ports) to checkwhether a loop is detected.
4. Run the showmac-address-table vlan xx command multiple times to check whetherMAC addresses in the MAC address table have drifted. If MAC addresses havedrifted, a loop occurs on the drift source and destination ports. If no MACaddress drift exists on the access switch, check whether it occurs on theaggregation switch.
TheVLANs and ports causing the loop can be determined after the operations aboveare performed. If the VLANs keep unchanged but the ports change after the rldpreset command is executed several times, the possible topology is as follows:
Operationsteps
1. Run the rldpreset and show rldp commands several times and check the neighborfield to find out the ports and VLANs of all loops.
2. Run the showmac | in vlan command on the aggregation switches at both ends and checkwhether entries of the same MAC address exist.
3. If yes,the interface corresponding to the MAC address is a loop interface.
TheVLANs and ports causing the loop can be determined after the operations aboveare performed. If VLANs are different but ports are the same after the rldpreset command is executed several times, the possible topology is asfollows:
Operationsteps
1. Find outthe aggregation switch experiencing the loop based on the ports and find outthe access switch based on the VLANs.
2. Run the showmac | in vlan command to display the MAC address tables of VLANs on the twoaccess switches and check whether entries of the same MAC address exist.
Possibletopology:
Operationsteps
1. Run the rldpreset and show rldp commands several times and check the neighborfield to find out all ports and VLANs experiencing the loop.
2. Run the showrldp command and check the neighbor field. Check whether theneighbor ports are on the same downlink port of the core switch. 3. Run the showmac | in vlan command on the aggregation switches at both ends and checkwhether entries of the same MAC address exist.
Possibletopology:
Operationsteps
1. Run the showrldp command and check the neighbor field. Check whether theneighbor ports are on the same downlink port of the core switch.
2. Checkwhether MAC address drift occurs on the aggregation switch or check the porttraffic statistics.
Runthe show interface counters summary up command to check traffic statistics ofaccess ports.
Nouser traffic information is found when the real-time traffic of the gateway isqueried on SAM+.
1. Configurationsfor interconnecting with SAM+ are improper on the RG-N18000. As a result, IPFIXpackets are exchanged abnormally.
2. Thegateway policy name added to SAM+ is inconsistent with that added to theRG-N18000. As a result, the user group synchronization between the SAM+ and theRG0N18000 fails.
3. The PBRis configured incorrectly on the RG-N18000 and MSC, and therefore, traffic isnot diverted to the MSC.
1. Checkwhether the interconnection configurations of the RG-N18000 and SAM+ arecorrect.
RG-N18000configuration: The authentication and accounting mode is set to IPFIX.
dot1xacct-method ipfix //Set the 802.1x authentication and accounting mode toIPFIX, to upload traffic information to the SAM+ server (192.168.1.6 indicatesthe source interface, which can be a layer-3 interface or VLAN, or configuredas required.)
Checkwhether the SAM+ configuration is correct.
Thegateway policy name is mandatory, so that the gateway policy can be deliveredto the RG-N18000 and the RG-N18000 can synchronize user information to the MSC.Pay attention to the following items when configuring the gateway policy:
Thegateway policy name should be consistent with that configured on the MSC card,for example, default.
2. Checkthe PBR configuration.
Usethe client to access an extranet and run the show ip fpm flows | include(IP) command on the MSC card to check the values of SendBytes and RecvBytesand whether traffic is increasing. If the values are 0 or the traffic isnot increasing, check the PBR configuration.
RG-N18000
ip access-list extended pbr-download
10 permit ip any 10.20.0.00.0.255.255//The network segment is a network segment whose traffic needs to bediverted to the MSC.
ip access-list extended pbr-upload
10 permit ip 10.20.0.00.0.255.255 any//The network segment is a network segment whose traffic needsto be diverted to the MSC.
route-map pbr-upload permit 10
match ip address pbr-upload
set ip policy load-balancesrc-ip
set ip policy no-ttl-decrease
set ip next-hop10.0.3.2 //LAN address of the MSC card.
!
route-map pbr-download permit 10
match ip address pbr-download
set ip policy load-balancedst-ip
set ip policy no-ttl-decrease
set ip next-hop 10.0.4.2 //WANaddress of the MSC card.
HXJH-18K(config)#int vlan2001 //Invoke PBR-upload on the downlink interface.
HXJH-18K(config-if-VLAN 2001)#ippolicy route-map pbr-upload
HXJH-18K(config)#intgi1/23 //Invoke PBR-download on the uplink interface.
HXJH-18K(config-if-GigabitEthernet1/23)# ip policy route-map pbr-download
MSC configuration:
ip access-list standardPBR-ACL //Matching needs to be performed on all user traffic.
10 permit any
route-map port2-WAN permit 10
match ip address user-data
set ip next-hop10.0.3.1 //Set the next hop of data flows of the WAN port to the IPaddress of the WAN port on the RG-N18000.
route-map port1-LAN permit 10
matchip address user-data
set ip next-hop10.0.4.1 //Set the next hop of the data flows from the LAN port to the IPaddress of the WAN port on the RG-N18000.
MSC(config)#int tenGigabitEthernet0/1
MSC(config-if-TenGigabitEthernet0/1)# ip policy route-map port1-LAN
MSC(config)#int tenGigabitEthernet0/2
MSC(config-if-TenGigabitEthernet0/2)# ip policy route-map port2-WAN
Anetwork access exception occurs after traffic goes through the MSC card.
1. Checkwhether the PBR is configured correctly. Incorrect PBR configuration may resultin incorrect traffic diversion.
2. Thenumber of ACEs on the RG-N18000 exceeds the limit. As a result, a PBR diversionexception occurs.
3. TheIP connection count exceeds the upper limit, causing failures in opening somewebsites.
4. Packetscannot be processed and are discarded due to poor MSC performance.
1. Checkwhether the PBR is configured correctly. Incorrect PBR configuration may resultin incorrect traffic diversion.
Usethe client to access an extranet and run the show ip fpm flows | include(IP) command on the MSC card to check the values of SendBytes and RecvBytesand whether the traffic is increasing. If the values are 0 or thetraffic is not increasing, check the PBR configuration.
2. Thenumber of ACEs exceeds the limit. As a result, a PBR diversion exceptionoccurs.
DeletePBR configuration from the interface and reconfigure the PBR (exercise cautionwhen performing this operation), or configure an ACL that can be invoked by anyinterface, and check whether the number of ACEs exceeds the limit. If relevantlogs are produced, it indicates that the number of ACEs exceeds the limit.
3. TheIP connection count exceeds the upper limit, causing failures in opening somewebsites.
Ifseveral people in a dormitory share one IP address for Internet access, the IPquantity upper limit is small and some connections will be blocked. If a PC,mobile phone, or server has multiple external connections, the Internet accesswill be affected.
Locate the MSC card connected to the faulty client and run the showflow-pre-mgr ip-info [ip-address] command on the MSC card tocheck the IP connection quantity. In the figure below, the IP connectionquantities of the first two IP addresses reach the upper limit and thecorresponding clients may experience similar access exceptions. See the figurebelow.
4. Packetscannot be processed and are discarded due to poor MSC performance.
Runthe show interface command to check the value of no buffer. Ifthe value increases rapidly, it indicates that the performance is poor. If thevalue is not zero but increases occasionally, the performance is acceptable.
Ruijie Networks websites use cookies to deliver and improve the website experience.
See our cookie policy for further details on how we use cookies and how to change your cookie settings.
Cookie Manager
When you visit any website, the website will store or retrieve the information on your browser. This process is mostly in the form of cookies. Such information may involve your personal information, preferences or equipment, and is mainly used to enable the website to provide services in accordance with your expectations. Such information usually does not directly identify your personal information, but it can provide you with a more personalized network experience. We fully respect your privacy, so you can choose not to allow certain types of cookies. You only need to click on the names of different cookie categories to learn more and change the default settings. However, blocking certain types of cookies may affect your website experience and the services we can provide you.
Through this type of cookie, we can count website visits and traffic sources in order to evaluate and improve the performance of our website. This type of cookie can also help us understand the popularity of the page and the activity of visitors on the site. All information collected by such cookies will be aggregated to ensure the anonymity of the information. If you do not allow such cookies, we will have no way of knowing when you visited our website, and we will not be able to monitor website performance.
This type of cookie is necessary for the normal operation of the website and cannot be turned off in our system. Usually, they are only set for the actions you do, which are equivalent to service requests, such as setting your privacy preferences, logging in, or filling out forms. You can set your browser to block or remind you of such cookies, but certain functions of the website will not be available. Such cookies do not store any personally identifiable information.
Contact Us
How can we help you?