802.1X Authentication by iMC Configuration Example

H3C WX Series AC + Fit AP 802.1X Authentication by iMC
Configuration Example
Keywords: 802.1X, RADIUS, EAPOL
Abstract: This document presents a configuration example of using H3C WX Series ACs and Fit APs for
802.1X authentication through an iMC server.
Acronyms:
Acronym
Full spelling
AC
Access control
AP
Access point
ESS
Extended Service Set
WLAN
Wireless Local Area Network
SSID
Service set identifier
AAA
Authentication, Authorization, and Accounting
iMC
Intelligent Management Center
EAP
Extensible Authentication Protocol
EAPOL
Extensible Authentication Protocol over LAN
RADIUS
Remote Authentication Dial-In User Service
Table of Contents
Feature Overview ···················································································································· 3
Application Scenarios ············································································································· 3
Configuration Guidelines ········································································································· 3
802.1X Authentication by iMC Configuration Example·································································· 3
Network Requirements ········································································································ 3
Configuration Considerations ································································································ 4
Software Version Used ········································································································ 4
Configuration Procedures ····································································································· 4
Configuring the AC ······································································································· 4
Configuring the iMC System ··························································································· 8
Verification ······················································································································ 11
References ··························································································································· 13
Protocols and Standards ···································································································· 13
Related Documentation ····································································································· 13
Feature Overview
802.1X is a port-based network access control protocol defined by IEEE. It controls packet forwarding
by setting the status of ports
Application Scenarios
802.1X provides only a method for user access authentication. It implements user access
authentication by simply opening/closing the access ports. Its simplicity makes it applicable to WLANs
and point-to-point physical and logical ports for access authentication. However, for IP-based
Metropolitan Area Networks (MANs), which feature broad bandwidth, 802.1X is quite limited.
Configuration Guidelines

In this example, 802.1X is configured on the wireless interface.

The parameters of the primary authentication and accounting servers, the server type, and the
shared keys configured for the RADIUS scheme must be identical to those configured on the
RADIUS servers respectively. If an iMC server is used, be sure to set the server type to extended
so that the WX5002 can identify the proprietary settings on the iMC server.

When configuring the domain, be sure to associate a RADIUS scheme to the domain.

Use the dot1x authentication-method command to specify the 802.1x authentication method to
be used globally. In WLANs, if the Windows client is used for 802.1X authentication, the 802.1x
authentication method must be EAP. This is because the Windows client supports only EAP.
802.1X Authentication by iMC Configuration Example
Network Requirements
This configuration example uses WX5002 access controllers and WA2100 wireless LAN access
points.
With the prevalence of network applications, more and more core services depend on network
platforms. However, the traditional shared networks are facing more and more security problems. In
this configuration example, access control is deployed at the access layer of the network to prevent
access of illegal users. This not only solves the security problems, but also saves the precious
bandwidth.
In this example, configure 802.1X authentication on port WLAN-ESS 10 of the AC to control access of
clients connected through the AP.
Figure 1 Network diagram for 802.1X authentication by iMC
20.1.1.200
8.1.1.1
8.1.1.16
AP
AC
Radius server
Client
Configuration Considerations
To configure remote 802.1X authentication, complete these tasks:

Create the RADIUS scheme for 802.1X authentication.

Create the domain for 802.1X authentication and reference the RADIUS scheme in the domain.

Enable 802.1X authentication in system view.

Enable 802.1X on the port that requires authentication.
Software Version Used
<AC> display version
H3C Comware Platform Software
Comware Software, Version 5.00, 0001
Copyright (c) 2004-2007 Hangzhou H3C Tech. Co., Ltd. All rights reserved.
H3C WX5002-128 uptime is 0 week, 2 days, 17 hours, 3 minutes
CPU type: BCM MIPS 1250 700MHz
512M bytes DDR SDRAM Memory
32M bytes Flash Memory
Pcb
Version:
Logic
Version: 1.0
Basic BootROM
A
Version:
1.13
Extend BootROM Version:
1.14
[SLOT 1]CON
(Hardware)A,
(Driver)1.0,
(Cpld)1.0
[SLOT 1]GE1/0/1
(Hardware)A,
(Driver)1.0,
(Cpld)1.0
[SLOT 1]GE1/0/2
(Hardware)A,
(Driver)1.0,
(Cpld)1.0
[SLOT 1]M-E1/0/1
(Hardware)A,
(Driver)1.0,
(Cpld)1.0.
Configuration Procedures
Configuring the AC
Configuration on the AC
<AC> display current-configuration
#
version 5.00, 0001
#
sysname AC
#
domain default enable imc
#
port-security enable
#
dot1x authentication-method eap
#
vlan 1
#
vlan 2
#
radius scheme h3c
server-type extended
primary authentication 8.1.1.16
primary accounting 8.1.1.16
key authentication h3c
key accounting h3c
#
domain imc
authentication default radius-scheme h3c
authorization default radius-scheme h3c
accounting default radius-scheme h3c
access-limit disable
state active
#
wlan service-template 10 crypto
ssid joe_dot1x
bind WLAN-ESS 10
authentication-method open-system
cipher-suite tkip
security-ie wpa
service-template enable
#
wlan rrm
11a mandatory-rate 6 12 24
11a supported-rate 9 18 36 48 54
11b mandatory-rate 1 2
11b supported-rate 5.5 11
11g mandatory-rate 1 2 5.5 11
11g supported-rate 6 9 12 18 24 36 48 54
#
interface NULL0
#
interface LoopBack0
#
interface Vlan-interface1
ip address 20.1.1.200 255.255.255.0
#
interface Vlan-interface2
ip address 8.1.1.1 255.255.255.0
#
interface GigabitEthernet1/0/1
#
interface GigabitEthernet1/0/2
port access vlan 2
#
interface M-Ethernet1/0/1
#
interface WLAN-ESS10
port-security port-mode userlogin-secure-ext
port-security tx-key-type 11key
undo dot1x multicast-trigger
#
wlan ap ap1 model WA2100
serial-id h3c000fe258e820
radio 1 type 11g
channel 1
max-power 3
service-template 10
radio enable
#
dhcp enable
#
load xml-configuration
#
user-interface aux 0
user-interface vty 0 4
#
return
<AC>
Configuration procedures
1)
Create the RADIUS scheme.
# Create RADIUS scheme h3c and enter its view.
[AC] radius scheme h3c
# Specify the IP address of the primary authentication server as 8.1.1.16.
[AC-radius-h3c] primary authentication 8.1.1.16
# Specify the IP address of the primary accounting server as 8.1.1.16.
[AC-radius-h3c] primary accounting 8.1.1.16
# Specify the shared key for authentication exchange as h3c.
[AC-radius-h3c] key authentication h3c
# Specify the shared key for accounting exchange as h3c.
[AC-radius-h3c] key accounting h3c
# Set the RADIUS server type to extended.
[AC-radius-h3c] server-type extended
2)
Create the domain.
# Create domain imc and enter its view.
[AC] domain imc
# Specify to use RADIUS scheme h3c for authentication of LAN users.
[AC-isp-imc] authentication lan-access radius-scheme h3c
# Specify to use RADIUS scheme h3c for authorization of LAN users.
[AC-isp-imc] authorization lan-access radius-scheme h3c
# Specify to use RADIUS scheme h3c for accounting of LAN users.
[AC-isp-imc] accounting lan-access radius-scheme h3c
3)
Enable 802.1X globally.
[AC] port-security enable
4)
Set the authentication method for 802.!X users to EAP.
[AC] dot1x authentication-method eap
5)
Configure port WLAN-ESS 10.
# Create port WLAN-ESS 10 and enter its view.
[AC] interface WLAN-ESS 10
# Set the port security mode to userLoginSecureExt.
[AC-WLAN-ESS10] port-security port-mode userlogin-secure-ext
# Enable key negotiation of the 11key type.
[AC-WLAN-ESS10] port-security tx-key-type 11key
6)
Configure the WLAN service template.
# Create a WLAN service template of the crypto type and enter its view.
[AC] wlan service-template 10 crypto
# Set the SSID of the service template to joe_dot1x.
[AC-wlan-st-10] ssid joe_dot1x
# Bind port WLAN-ESS 10 with service template 10.
[AC-wlan-st-10] bind WLAN-ESS 10
# Enable open system authentication.
[AC-wlan-st-10] authentication-method open-system
# Specify to use the TKIP encryption suite.
[AC-wlan-st-10] cipher-suite tkip
# Enable the WPA IE in the beacon and probe responses.
[AC-wlan-st-10] security-ie wpa
# Enable the service template.
[AC-wlan-st-10] service-template enable
Configuring the iMC System
iMC version:
Follow these steps to configure the access device:
1)
On the Service tab of the iMC web interface, select Access Service > Access Device from the
navigation tree and then click Add, as shown in the following figure:
2)
On the Add Access Device page, click Add Manually.
3)
In the pop-up window, configure the IP address range of the access device (setting both the start
IP address and end IP address to the IP address of the access device in this example) and then
click OK.
4)
Perform configurations as shown in the following figure and click OK.
5)
The access device is added successfully, as shown in the following figure:
Follow these steps to configure the service policy:
1)
On the Service tab of the iMC web interface, select Access Service > Service Configuration
from the navigation tree and then click Add, as shown in the following figure:
2)
On the Add Service Configuration page, perform the configurations shown in the following
figure:
Follow these steps to configure an account user:
1)
On the User tab of the iMC web interface, select User Management > Add User from the
navigation tree and then add a user as shown in the following figure:
2)
Name the user joe-peap and configure the identity number as required. Then click OK.
3)
On the Add User Result page that appears, select Add Access User and perform the
configurations shown in the following figure:
Verification

Before passing 802.1X authentication, you cannot use PC1 to access the Internet.

Run the 802.!X client on PC1. After passing 802.1X authentication, you can use PC1 to access
the Internet. The wireless client needs to be configured properly according to the authentication
method used (PEAP or TLS).
1)
Add the SSID.
2)
Configure the wireless network attributes, add the SSID, and select the encryption method and
authentication method.
3)
In the Authentication dialog box, select PEAP as the EAP type and click Properties. Uncheck
Validate server certificate, and click Configure. Then, uncheck Automatically use my
Windows logon name and password (and domain if any) and click OK.
References
Protocols and Standards

RFC 2284, PPP Extensible Authentication Protocol (EAP)

IEEE 802.1X, Port-Based Network Access Control
Related Documentation

802.1X Configuration and MAC Authentication Configuration in the Security Volume of H3C WX
Series Access Controllers

802.1X Commands and MAC Authentication Commands in the Security Volume of H3C WX
Series Access Controllers

User Manual
User Manual
WLAN Security Configuration in the WLAN Volume of H3C WX Series Access Controllers
User
Manual

WLAN Security Commands in the WLAN Volume of H3C WX Series Access Controllers
Manual
User