HCIP-Security-CTSS V3.0 Lab Guide
HCIP-Security-CTSS V3.0 Lab Guide
Huawei e-Learning
https://ilearningx.huawei.com/portal/#/portal/ebg/51
Huawei Certification
http://support.huawei.com/learning/NavigationAction!createNavi?navId=_31
&lang=en
Find Training
http://support.huawei.com/learning/NavigationAction!createNavi?navId=_trai
ningsearch&lang=en
More Information
Huawei learning APP
Overview
Description
Common Icons
Device Introduction
Experiment Environment Preparation
Checking Whether All Devices Are Available
Experiment topology
Basic Configurations
Preconfigured Scripts for Devices
1
1.1
1.1.1
1.1.2
1.1.3
1.2
1.2.1
1.2.2
1.3
1.3.1
1.3.2
2
2.1
2.1.1
2.1.2
2.1.3
2.2
2.2.1
2.2.2
2.3
2.3.1
2.3.2
3
3.1
3.1.1
3.1.2
3.1.3
3.1.4
3.2
3.2.1
3.2.2
3.3
3.3.1
3.3.2
3.4
3.4.1
3.4.2
3.4.3
4
4.1
4.1.1
4.1.2
4.1.3
4.2
4.2.1
4.2.2
4.3
4.3.1
4.4
4.4.1
5
5.1
5.1.1
5.1.2
5.1.3
5.1.4
5.1.5
5.2
5.2.1
5.2.2
5.3
5.3.1
5.3.2
5.3.3
5.4
5.4.1
5.4.2
5.5
5.5.1
6
6.1
6.1.1
6.1.2
6.1.3
6.1.4
6.1.5
6.2
6.2.1
6.2.2
6.3
6.3.1
6.3.2
6.3.3
6.4
6.4.1
6.4.2
6.4.3
6.5
6.5.1
7
7.1
7.1.1
7.1.2
7.1.3
7.1.4
7.1.5
7.2
7.2.1
7.2.2
7.3
7.3.1
7.3.2
7.3.3
7.4
7.4.1
7.4.2
7.5
7.5.1
8
8.1
8.1.1
8.1.2
8.1.3
8.1.4
8.1.5
8.2
8.2.1
8.2.2
8.3
8.3.1
8.3.2
8.3.3
8.4
8.4.1
8.4.2
8.4.3
8.5
8.5.1
9
9.1
9.1.1
9.1.2
9.1.3
9.1.4
9.1.5
9.2
9.2.1
9.2.2
9.3
9.3.1
9.3.2
9.3.3
9.4
9.4.1
9.4.2
9.4.3
9.5
9.5.1
10
10.1
10.1.1
10.1.2
10.1.3
10.1.4
10.1.5
10.2
10.2.1
10.2.2
10.3
10.3.1
10.3.2
10.4
10.4.1
10.4.2
10.5
10.5.1
11
11.1
11.1.1
11.1.2
11.1.3
11.1.4
11.1.5
11.2
11.2.1
11.2.2
11.3
11.3.1
11.3.2
11.3.3
11.4
11.4.1
11.4.2
11.5
11.5.1
12
12.1
12.1.1
12.1.2
12.1.3
12.1.4
12.1.5
12.2
12.2.1
12.2.2
12.3
12.3.1
12.3.2
12.3.3
12.4
12.4.1
12.4.2
12.4.3
12.5
12.5.1
13
13.1
13.1.1
13.1.2
13.1.3
13.1.4
13.1.5
13.2
13.2.1
13.2.2
13.3
13.3.1
13.3.2
13.3.3
13.4
13.4.1
13.4.2
13.5
13.5.1
14
14.1
14.1.1
14.1.2
14.1.3
14.1.4
14.1.5
14.2
14.2.1
14.2.2
14.3
14.3.1
14.4
14.4.1
14.4.2
14.5
14.5.1
15
15.1
15.1.1
15.1.2
15.1.3
15.1.4
15.1.5
15.2
15.2.1
15.2.2
15.3
15.3.1
15.4
15.4.1
15.4.2
15.4.3
15.4.4
16
16.1
16.1.1
16.1.2
16.1.3
16.1.4
16.1.5
16.2
16.2.1
16.2.2
16.3
16.4
16.4.1
16.4.2
17
17.1
17.1.1
17.1.2
17.1.3
17.1.4
17.1.5
17.2
17.2.1
17.2.2
17.3
17.3.1
17.4
17.4.1
17.4.2
1 Agile Controller-Campus Installation
(Windows Platform)
1.1 Introduction
1.1.2 Objectives
1.1.3 Networking and Service Description
1.2 Configuration Procedure
Agile_Controller-Campus_V100R003C30SPC100_SM_SC_Install_Windows
Agile_Controller_Campus_V100R003C30SPC100_SQLServer_2012_R2_std_en.zip
Step 2
1.3 Verification
2.1 Introduction
2.1.2 Objectives
2.1.3 Networking and Service Description
2.2 Configuration Procedure
Step 2
3.1 Introduction
3.1.2 Objectives
3.1.3 Networking and Service Description
[SW4]vlan batch 13 to 14
[SW4]interface GigabitEthernet0/0/5
[SW4-GigabitEthernet0/0/5]port link-type trunk
[SW4-GigabitEthernet0/0/5]port trunk pvid vlan 13
[SW4-GigabitEthernet0/0/5]port trunk allow-pass vlan 13
[SW4-GigabitEthernet0/0/5]quit
[SW4]interface GigabitEthernet0/0/6
[SW4-GigabitEthernet0/0/6]port link-type trunk
[SW4-GigabitEthernet0/0/6]port trunk allow-pass vlan 13 to 14
[SW4]interface Vlanif13
[SW4-Vlanif13]ip address 10.1.13.34 255.255.255.0
[AC6005]vlan batch 13 to 14
[AC6005]interface GigabitEthernet0/0/1
[AC6005-GigabitEthernet0/0/1]port link-type trunk
[AC6005-GigabitEthernet0/0/1]port trunk allow-pass vlan 13 to 14
[AC6005]interface Vlanif13
[AC6005-Vlanif13]ip address 10.1.13.254 255.255.255.0
[AC6005]interface Vlanif14
[AC6005-Vlanif14]ip address 10.1.14.254 255.255.255.0
[AC6005]ospf 1
[AC6005-ospf-1]area 0
[AC6005-ospf-1-area-0.0.0.0]network 10.1.13.0 0.0.0.255
[AC6005-ospf-1-area-0.0.0.0]network 10.1.14.0 0.0.0.255
[AC6005]dhcp enable
[AC6005]interface Vlanif13
[AC6005-Vlanif13]dhcp select interface
[AC6005]interface Vlanif14
[AC6005-Vlanif14]dhcp select interface
[AC6005-Vlanif14]dhcp server dns-list 114.114.114.114 10.1.14.254
<AC6005>ping 10.1.31.78
PING 10.1.31.78: 56 data bytes, press CTRL_C to break
Reply from 10.1.31.78: bytes=56 Sequence=1 ttl=126 time=1 ms
Reply from 10.1.31.78: bytes=56 Sequence=2 ttl=126 time=1 ms
Reply from 10.1.31.78: bytes=56 Sequence=3 ttl=126 time=1 ms
Reply from 10.1.31.78: bytes=56 Sequence=4 ttl=126 time=1 ms
Reply from 10.1.31.78: bytes=56 Sequence=5 ttl=126 time=1 ms
--- 10.1.31.78 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 1/1/1 ms
[AC6005]wlan
[AC6005-wlan-view]regulatory-domain-profile name domain1
[AC6005-wlan-regulatory-domain-prof-domain1]country-code CN
[AC6005-wlan-regulatory-domain-prof-domain1]quit
[AC6005-wlan-view]quit
[AC6005]wlan
[AC6005-wlan-view]ap-group name ap-group1
[AC6005-wlan-ap-group-ap-group1]regulatory-domain-profile domain1
Warning: Modifying the country code will clear channel, power and antenna
gain configurations of the radio and reset the AP. Continue?[Y/N]:y
[AC6005-wlan-ap-group-guest1]quit
[AC6005]wlan
[AC6005-wlan-view]ap auth-mode mac-auth
[AC6005-wlan-view]ap-mac 4cfa-cabf-d520 ap-id 0 ap-sn 21500826412SG8919936
[AC6005-wlan-ap-0]ap-group ap-group1
[AC6005-wlan-ap-0]ap-name ap0
<AC6005>display ap all
Total AP information:
nor : normal [1]
--------------------------------------------------------------
ID MAC Name Group IP Type State STA Uptime
--------------------------------------------------------------
0 4cfa-cabf-d520 ap0 ap-group1 10.1.13.253 AP4030DN nor 0 12S
--------------------------------------------------------------
[AC6005]aaa
[AC6005-aaa]authentication-scheme radius
[AC6005-aaa-authen-radius]authentication-mode radius
[AC6005-aaa]accounting-scheme radius
[AC6005-aaa-accounting-radius]accounting-mode radius
[AC6005]web-auth-server Portal_auth
[AC6005-web-auth-server-Portal_auth]server-ip 10.1.31.78
[AC6005-web-auth-server-Portal_auth]port 50200
[AC6005-web-auth-server-Portal_auth]shared-key cipher Huawei@123
[AC6005-web-auth-server-Portal_auth]url-template urlTemplate_0
Step 2
[AC6005]test-aaa VIP01 Huawei@123 radius-template radius pap
Info: Account test succeed.
Step 3
Step 4
3.3 Verification
4.1 Introduction
4.1.2 Objectives
4.1.3 Networking and Service Description
4.2 Configuration Procedure
[SW4-aaa]aaa
[SW4-aaa]authentication-scheme radius
[SW4-aaa-authen-radius]authentication-mode radius
[SW4-aaa-authen-radius]quit
[SW4-aaa]accounting-scheme radius
[SW4-aaa-accounting-radius]accounting-mode radius
[SW4-aaa-accounting-radius]quit
[SW4-aaa]domain default
[SW4-aaa-domain-default]authentication-scheme radius
[SW4-aaa-domain-default]accounting-scheme radius
[SW4-aaa-domain-default]radius-server radius
5.1 Introduction
5.1.2 Objectives
5.1.3 Networking and Service Description
Server Zone
Development Employees
PC1
5.1.4 Prerequisites
[SW4-aaa]aaa
[SW4-aaa]authentication-scheme radius
[SW4-aaa-authen-radius]authentication-mode radius
[SW4-aaa-authen-radius]quit
[SW4-aaa]accounting-scheme radius
[SW4-aaa-accounting-radius]accounting-mode radius
[SW4-aaa-accounting-radius]quit
[SW4-aaa]domain default
[SW4-aaa-domain-default]authentication-scheme radius
[SW4-aaa-domain-default]accounting-scheme radius
[SW4-aaa-domain-default]radius-server radius
[SW4]dot1x authentication-method eap
[SW4]interface GigabitEthernet 0/0/1
[SW4-GigabitEthernet0/0/1]authentication dot1x
Step 2
[SW4]test-aaa user1 Huawei@123 radius-template radius pap
[SW4]
Info: Account user1 succeed.
5.3 Verification
PC1>ping 10.1.32.74
Pinging 10.1.32.74 with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
[SW4]display access-user
----------------------------------------------------------------------------
UserID Username IP address MAC Status
-------------------------------------------------------------
31 user1 10.1.11.101 000c-29f0-d33e Success
-------------------------------------------------------------
Total: 1, printed: 1
Basic:
User ID : 31
User name : user1
Domain-name : default
User MAC : 000c-29f5-45d8
User IP address : 10.1.11.101
User vpn-instance : -
User access Interface : GigabitEthernet0/0/1
User vlan event : Success
QinQVlan/UserVlan : 0/11
User access time : 2017/10/12 19:33:14
User accounting session ID : SW400001000000011948d94000017
Option82 information : -
User access type : 802.1x
Terminal Device Type : Data Terminal
Dynamic ACL desc(Effective) :
No. 0: acl 10001 dest-ip 10.1.32.74 dest-ipmask 32 deny
No. 1: acl 10002 dest-ip 10.1.32.75 dest-ipmask 32 deny
No. 2: acl 10003 dest-ip 10.1.32.73 dest-ipmask 32 permit
No. 3: acl 10100 dest-ip 0.0.0.0 dest-ipmask 0 deny
AAA:
User authentication type : 802.1x authentication
Current authentication method : RADIUS
Current authorization method : -
Current accounting method : RADIUS
5.3.3 Check User Authentication Information on the Agile Controller-
Campus
5.4 Reference Configuration
interface GigabitEthernet0/0/1
port link-type access
port default vlan 10
#
interface GigabitEthernet0/0/6
port link-type access
port default vlan 31
interface GigabitEthernet0/0/7
port link-type access
port default vlan 32
#
ospf 1 router-id 33.33.33.33
area 0.0.0.0
network 10.1.10.0 0.0.0.255
network 10.1.31.0 0.0.0.255
network 10.1.32.0 0.0.0.255
aaa
authentication-scheme radius
authentication-mode radius
accounting-scheme radius
accounting-mode radius
domain default
authentication-scheme radius
accounting-scheme radius
radius-server radius
#
interface Vlanif10
ip address 10.1.10.34 255.255.255.0
#
interface Vlanif11
ip address 10.1.11.34 255.255.255.0
#
interface GigabitEthernet0/0/1
port link-type access
port default vlan 11
authentication dot1x
interface GigabitEthernet0/0/7
port link-type access
port default vlan 10
#
ospf 1 router-id 34.34.34.34
area 0.0.0.0
network 10.1.10.0 0.0.0.255
network 10.1.11.0 0.0.0.255
#
authentication free-rule 1 destination ip 10.1.31.78 mask 255.255.255.255
#
5.5 Question
6.1 Introduction
6.1.2 Objectives
6.1.3 Networking and Service Description
6.1.4 Prerequisites
[SW4]interface Vlanif13
[SW4-Vlanif13]ip address 10.1.13.34 255.255.255.0
Step 2
[AC6005]vlan batch 13 to 14
[AC6005]interface GigabitEthernet0/0/1
[AC6005-GigabitEthernet0/0/1]port link-type trunk
[AC6005-GigabitEthernet0/0/1]port trunk allow-pass vlan 13 to 14
[AC6005]interface Vlanif13
[AC6005-Vlanif13]ip address 10.1.13.254 255.255.255.0
[AC6005]interface Vlanif14
[AC6005-Vlanif14]ip address 10.1.14.254 255.255.255.0
[AC6005]ospf 1
[AC6005-ospf-1]area 0
[AC6005-ospf-1-area-0.0.0.0]network 10.1.13.0 0.0.0.255
[AC6005-ospf-1-area-0.0.0.0]network 10.1.14.0 0.0.0.255
[AC6005]dhcp enable
[AC6005]interface Vlanif13
[AC6005-Vlanif13]dhcp select interface
[AC6005]interface Vlanif14
[AC6005-Vlanif14]dhcp select interface
<AC6005>ping 10.1.31.78
PING 10.1.31.78: 56 data bytes, press CTRL_C to break
Reply from 10.1.31.78: bytes=56 Sequence=1 ttl=126 time=1 ms
Reply from 10.1.31.78: bytes=56 Sequence=2 ttl=126 time=1 ms
Reply from 10.1.31.78: bytes=56 Sequence=3 ttl=126 time=1 ms
Reply from 10.1.31.78: bytes=56 Sequence=4 ttl=126 time=1 ms
Reply from 10.1.31.78: bytes=56 Sequence=5 ttl=126 time=1 ms
Step 3
[AC6005]wlan
[AC6005-wlan-view]regulatory-domain-profile name domain1
[AC6005-wlan-regulatory-domain-prof-domain1]country-code CN
[AC6005-wlan-regulatory-domain-prof-domain1]quit
[AC6005-wlan-view]quit
[AC6005]wlan
[AC6005-wlan-view]ap-group name ap-group1
[AC6005-wlan-ap-group-ap-group1]regulatory-domain-profile domain1
Warning: Modifying the country code will clear channel, power and antenna
gain configurations of the radio and reset the AP. Continue?[Y/N]:y
[AC6005-wlan-ap-group-guest1]quit
[AC6005]capwap source interface vlanif 13
Step 4
[AC6005]wlan
[AC6005-wlan-view]ap auth-mode mac-auth
[AC6005-wlan-view]ap-mac 4cfa-cabf-d520 ap-id 0 ap-sn 21500826412SG8919936
[AC6005-wlan-ap-0]ap-group ap-group1
[AC6005-wlan-ap-0]ap-name ap0
<AC6005>display ap all
Total AP information:
nor : normal [1]
-----------------------------------------------------------------------------
ID MAC Name Group IP Type State STA Uptime
-----------------------------------------------------------------------------
0 4cfa-cabf-d520 ap0 ap-group1 10.1.13.253 AP4030DN nor 0 12S
-----------------------------------------------------------------------------
Step 5
[AC6005]wlan
[AC6005-wlan-view]security-profile name development_employee
[AC6005-wlan-sec-prof-development_employee]security wpa2 dot1x aes
warning: This action may cause service interruption. Continue?[Y/N]y
[AC6005]wlan
[AC6005-wlan-view]ssid-profile name development_employee
[AC6005-wlan-ssid-prof-development_employee]ssid development_employee
Warning: This action may cause service interruption. Continue?[Y/N]y
[AC6005]wlan
[AC6005-wlan-view]vap-profile name development_employee
[AC6005-wlan-vap-prof-development_employee]forward-mode tunnel
Warning: This action may cause service interruption. Continue?[Y/N]y
[AC6005-wlan-vap-prof-development_employee]security-profile
development_employee
[AC6005-wlan-vap-prof-development_employee]service-vlan vlan-id 14
[AC6005-wlan-vap-prof-development_employee]ssid-profile development_employee
[AC6005]wlan
[AC6005-wlan-view]ap-group name ap-group1
[AC6005-wlan-ap-group-ap-group1]vap-profile development_employee wlan 1 radio
all
Step 6
[AC6005]aaa
[AC6005-aaa]authentication-scheme radius
[AC6005-aaa-authen-radius]authentication-mode radius
[AC6005-aaa]accounting-scheme radius
[AC6005-aaa-accounting-radius]accounting-mode radius
Step 7
,
[AC6005]test-aaa user1 Admin@123 radius-template radius pap
Info: Account test succeed.
6.3 Verification
<AC6005>display access-user
-------------------------------------------------------------
UserID Username IP address MAC Status
-------------------------------------------------------------
28 user1 10.1.14.253 3c91-57ae-fcb9 Success
-------------------------------------------------------------
Total: 1, printed: 1
AAA:
User authentication type : 802.1x authentication
Current authentication method : RADIUS
Current authorization method : -
Current accounting method : RADIUS
interface Vlanif10
ip address 10.1.10.33 255.255.255.0
#
interface Vlanif31
ip address 10.1.31.33 255.255.255.0
#
interface Vlanif32
ip address 10.1.32.33 255.255.255.0
#
interface GigabitEthernet0/0/1
port link-type access
port default vlan 10
#
interface GigabitEthernet0/0/6
port link-type access
port default vlan 31
#
interface GigabitEthernet0/0/7
port link-type access
port default vlan 32
#
ospf 1
area 0.0.0.0
network 10.1.10.0 0.0.0.255
network 10.1.32.0 0.0.0.255
network 10.1.31.0 0.0.0.255
#
return
wlan
traffic-profile name default
security-profile name default
security-profile name default-wds
security wpa2 psk pass-
phrase %^%#U9#%Tu'P(2wIMm8Kxx<!~.KEH7LW:7+h!"/UzOeA%^%aes
security-profile name default-mesh
security wpa2 psk pass-
phrase %^%#CdsG$Qj:@C}x~S#.5]*Wh8RN*:[r4$"XY]5`A5LP%^%aes
security-profile name development_employee
security wpa2 dot1x aes
ssid-profile name default
ssid-profile name development_employee
ssid development_employee
vap-profile name default
vap-profile name development_employee
forward-mode tunnel
service-vlan vlan-id 14
ssid-profile development_employee
security-profile development_employee
authentication-profile dot1x_authen_profile
wds-profile name default
mesh-handover-profile name default
mesh-profile name default
regulatory-domain-profile name default
regulatory-domain-profile name domain1
air-scan-profile name default
rrm-profile name default
radio-2g-profile name default
radio-5g-profile name default
wids-profile name default
ap-system-profile name default
provision-ap
port-link-profile name default
wired-port-profile name default
ap-group name default
ap-group name ap-group1
regulatory-domain-profile domain1
radio 0
vap-profile development_employee wlan 1
radio 1
vap-profile development_employee wlan 1
ap-id 0 type-id 43 ap-mac 4cfa-cabf-d520 ap-sn 21500826412SG8919936
ap-name ap0
ap-group ap-group1
#
return
#
6.5 Question
7.1 Introduction
7.1.2 Objectives
7.1.3 Networking and Service Description
7.1.4 Prerequisites
Configure a
[SW4-aaa]aaa
[SW4-aaa]authentication-scheme radius
[SW4-aaa-authen-radius]authentication-mode radius
[SW4-aaa-authen-radius]quit
[SW4-aaa]accounting-scheme radius
[SW4-aaa-accounting-radius]accounting-mode radius
[SW4-aaa-accounting-radius]quit
[SW4-aaa]domain default
[SW4-aaa-domain-default]authentication-scheme radius
[SW4-aaa-domain-default]accounting-scheme radius
[SW4-aaa-domain-default]radius-server radius
Step 2
,
[SW4]test-aaa user1 Huawei@123 radius-template radius pap
[SW4]
Info: Account user1 succeed.
7.3 Verification
PC1>ping 10.1.32.73
PC1>ping 10.1.32.74
PC1>ping 10.1.32.75
[SW4]display access-user
-------------------------------------------------------------
UserID Username IP address MAC Status
-------------------------------------------------------------
34 000c29f0d33e 10.1.11.101 000c-29f0-d33e Success
-------------------------------------------------------------
Total: 1, printed: 1
Basic:
User ID : 34
User name : 000c29f545d8
Domain-name : default
User MAC : 000c-29f5-45d8
User IP address : 10.1.11.101
User vpn-instance : -
User access Interface : GigabitEthernet0/0/1
User vlan event : Success
QinQVlan/UserVlan : 0/11
User access time : 2017/10/13 15:28:22
User accounting session ID : SW400001000000011830694000017
Option82 information : -
User access type : MAC
Terminal Device Type : Data Terminal
Dynamic ACL desc(Effective) :
No. 0: acl 10001 dest-ip 10.1.32.73 dest-ipmask 32 deny
No. 1: acl 10002 dest-ip 10.1.32.74 dest-ipmask 32 permit
No. 2: acl 10003 dest-ip 10.1.32.75 dest-ipmask 32 permit
No. 3: acl 10100 dest-ip 0.0.0.0 dest-ipmask 0 deny
Session Timeout : 1800(s)
Termination Action : RE-AUTHENTICATION
AAA:
User authentication type : MAC authentication
Current authentication method : RADIUS
Current authorization method : -
Current accounting method : RADIUS
interface GigabitEthernet0/0/1
port link-type access
port default vlan 10
#
interface GigabitEthernet0/0/6
port link-type access
port default vlan 31
interface GigabitEthernet0/0/7
port link-type access
port default vlan 32
#
ospf 1 router-id 33.33.33.33
area 0.0.0.0
network 10.1.10.0 0.0.0.255
network 10.1.31.0 0.0.0.255
network 10.1.32.0 0.0.0.255
aaa
authentication-scheme radius
authentication-mode radius
accounting-scheme radius
accounting-mode radius
domain default
authentication-scheme radius
accounting-scheme radius
radius-server radius
#
interface Vlanif10
ip address 10.1.10.34 255.255.255.0
#
interface Vlanif11
ip address 10.1.11.34 255.255.255.0
#
interface GigabitEthernet0/0/1
port link-type access
port default vlan 11
authentication mac-authen
#
interface GigabitEthernet0/0/7
port link-type access
port default vlan 10
#
ospf 1 router-id 34.34.34.34
area 0.0.0.0
network 10.1.10.0 0.0.0.255
network 10.1.11.0 0.0.0.255
#
authentication free-rule 1 destination ip 10.1.31.78 mask 255.255.255.255
#
7.5 Questions
8 MAC Address Authentication in a Wireless
Environment
8.1 Introduction
8.1.2 Objectives
8.1.3 Networking and Service Description
8.1.4 Prerequisites
[SW4]vlan batch 13 to 14
[SW4]interface GigabitEthernet0/0/5
[SW4-GigabitEthernet0/0/5]port link-type trunk
[SW4-GigabitEthernet0/0/5]port trunk pvid vlan 13
[SW4-GigabitEthernet0/0/5]port trunk allow-pass vlan 13
[SW4-GigabitEthernet0/0/5]quit
[SW4]interface GigabitEthernet0/0/6
[SW4-GigabitEthernet0/0/6]port link-type trunk
[SW4-GigabitEthernet0/0/6]port trunk allow-pass vlan 13 to 14
[SW4]interface Vlanif13
[SW4-Vlanif13]ip address 10.1.13.34 255.255.255.0
Step 2
[AC6005]vlan batch 13 to 14
[AC6005]interface GigabitEthernet0/0/1
[AC6005-GigabitEthernet0/0/1]port link-type trunk
[AC6005-GigabitEthernet0/0/1]port trunk allow-pass vlan 13 to 14
[AC6005]interface Vlanif13
[AC6005-Vlanif13]ip address 10.1.13.254 255.255.255.0
[AC6005]interface Vlanif14
[AC6005-Vlanif14]ip address 10.1.14.254 255.255.255.0
[AC6005]ospf 1
[AC6005-ospf-1]area 0
[AC6005-ospf-1-area-0.0.0.0]network 10.1.13.0 0.0.0.255
[AC6005-ospf-1-area-0.0.0.0]network 10.1.14.0 0.0.0.255
[AC6005]dhcp enable
[AC6005]interface Vlanif13
[AC6005-Vlanif13]dhcp select interface
[AC6005]interface Vlanif14
[AC6005-Vlanif14]dhcp select interface
<AC6005>ping 10.1.31.78
PING 10.1.31.78: 56 data bytes, press CTRL_C to break
Reply from 10.1.31.78: bytes=56 Sequence=1 ttl=126 time=1 ms
Reply from 10.1.31.78: bytes=56 Sequence=2 ttl=126 time=1 ms
Reply from 10.1.31.78: bytes=56 Sequence=3 ttl=126 time=1 ms
Reply from 10.1.31.78: bytes=56 Sequence=4 ttl=126 time=1 ms
Reply from 10.1.31.78: bytes=56 Sequence=5 ttl=126 time=1 ms
[AC6005]wlan
[AC6005-wlan-view]regulatory-domain-profile name domain1
[AC6005-wlan-regulatory-domain-prof-domain1]country-code CN
[AC6005-wlan-regulatory-domain-prof-domain1]quit
[AC6005-wlan-view]quit
[AC6005]wlan
[AC6005-wlan-view]ap-group name ap-group1
[AC6005-wlan-ap-group-ap-group1]regulatory-domain-profile domain1
Warning: Modifying the country code will clear channel, power and antenna
gain configurations of the radio and reset the AP. Continue?[Y/N]:y
[AC6005-wlan-ap-group-guest1]quit
[AC6005]wlan
[AC6005-wlan-view]ap auth-mode mac-auth
[AC6005-wlan-view]ap-mac 4cfa-cabf-d520 ap-id 0 ap-sn 21500826412SG8919936
Warning: This operation maybe cause AP reset. If the country code changes, it
will clear channel, power and antenna gain configurations of the radio,
Whether to continue? [Y/N]y
[AC6005-wlan-ap-0]ap-group ap-group1
[AC6005-wlan-ap-0]ap-name ap0
<AC6005>display ap all
Total AP information:
nor : normal [1]
-----------------------------------------------------------------------------
ID MAC Name Group IP Type State STA Uptime
-----------------------------------------------------------------------------
0 4cfa-cabf-d520 ap0 ap-group1 10.1.13.253 AP4030DN nor 0 12S
-----------------------------------------------------------------------------
[AC6005]aaa
[AC6005-aaa]authentication-scheme radius
[AC6005-aaa-authen-radius]authentication-mode radius
[AC6005-aaa]accounting-scheme radius
[AC6005-aaa-accounting-radius]accounting-mode radius
Step 3
<AC6005>display mac-authen
Quiet period is 60s
Authentication fail times before quiet is 1
Maximum users: 2048
Current users: 1
Global default domain is default
AAA:
User authentication type : MAC authentication
Current authentication method : RADIUS
Current authorization method : -
Current accounting method : RADIUS
interface Vlanif10
ip address 10.1.10.33 255.255.255.0
#
interface Vlanif31
ip address 10.1.31.33 255.255.255.0
#
interface Vlanif32
ip address 10.1.32.33 255.255.255.0
#
interface GigabitEthernet0/0/1
port link-type access
port default vlan 10
#
interface GigabitEthernet0/0/6
port link-type access
port default vlan 31
#
interface GigabitEthernet0/0/7
port link-type access
port default vlan 32
#
ospf 1
area 0.0.0.0
network 10.1.10.0 0.0.0.255
network 10.1.32.0 0.0.0.255
network 10.1.31.0 0.0.0.255
#
return
8.4.3 AC Configuration
sysname AC
#
router id 41.41.41.41
#
vlan batch 13 to 14 4090
#
authentication-profile name dot1x_authen_profile
authentication-profile name mac_authen_profile
mac-access-profile mac_access_profile
authentication-scheme radius
accounting-scheme radius
radius-server radius
authentication-profile name portal_authen_profile
authentication-profile name macportal_authen_profile
#
dot1x-access-profile name dot1x_access_profile
mac-access-profile name mac_access_profile
#
dhcp enable
#
diffserv domain default
#
radius-server template default
radius-server template radius
radius-server shared-key cipher Huawei@123
radius-server authentication 10.1.31.78 1812 weight 80
radius-server accounting 10.1.31.78 1813 weight 80
radius-server authorization 10.1.31.78 shared-key cipher Huawei@123
#
aaa
authentication-scheme default
authentication-scheme radius
authentication-mode radius
authorization-scheme default
accounting-scheme default
accounting-scheme radius
accounting-mode radius
domain default
domain default_admin
local-user admin password irreversible-cipher %^%#FX&{Uzh&dL*+oBZAZ.YP,NR#:-
Q}PM!6yk62R^B&$K]}%\oh=Cl@6v!dP#&>%^%#
local-user admin privilege level 15
local-user admin service-type telnet terminal ssh http
#
interface Vlanif13
ip address 10.1.13.254 255.255.255.0
dhcp select interface
#
interface Vlanif14
ip address 10.1.14.254 255.255.255.0
dhcp select interface
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 13 to 14
#
interface LoopBack0
ip address 41.41.41.41 255.255.255.255
#
ospf 1
area 0.0.0.0
network 10.1.13.0 0.0.0.255
network 10.1.14.0 0.0.0.255
#
capwap source interface vlanif13
#
wlan
traffic-profile name default
security-profile name default
security-profile name default-wds
security wpa2 psk pass-
phrase %^%#U9#%Tu'P(2wIMm8Kxx<!~.KEH7LW:7+h!"/UzOeA%^%aes
security-profile name default-mesh
security wpa2 psk pass-
phrase %^%#CdsG$Qj:@C}x~S#.5]*Wh8RN*:[r4$"XY]5`A5LP%^%aes
security-profile name mac_access
ssid-profile name default
ssid-profile name mac_access
ssid mac_access
vap-profile name default
vap-profile name mac_access
forward-mode tunnel
service-vlan vlan-id 14
ssid-profile mac_access
security-profile mac_access
authentication-profile mac_authen_profile
wds-profile name default
mesh-handover-profile name default
mesh-profile name default
regulatory-domain-profile name default
regulatory-domain-profile name domain1
air-scan-profile name default
rrm-profile name default
radio-2g-profile name default
radio-5g-profile name default
wids-profile name default
ap-system-profile name default
provision-ap
port-link-profile name default
wired-port-profile name default
ap-group name default
ap-group name ap-group1
regulatory-domain-profile domain1
radio 1
vap-profile development_employee wlan 1
vap-profile mac_access wlan 2
ap-id 0 type-id 43 ap-mac 4cfa-cabf-d520 ap-sn 21500826412SG8919936
ap-name ap0
ap-group ap-group1
#
Return
8.5 Questions
9.1 Introduction
9.1.2 Objectives
9.1.3 Networking and Service Description
9.1.4 Prerequisites
[SW3]acl 2000
[SW3-acl-basic-2000]rule 5 permit source 10.1.11.0 0.0.0.255
Step 2
Step 3
9.3 Verification
interface Vlanif10
ip address 10.1.10.33 255.255.255.0
#
interface Vlanif20
ip address 10.1.20.33 255.255.255.0
#
interface Vlanif21
ip address 10.1.21.33 255.255.255.0
#
interface Vlanif31
ip address 10.1.31.33 255.255.255.0
#
interface Vlanif32
ip address 10.1.32.33 255.255.255.0
#
interface Vlanif33
ip address 10.1.33.33 255.255.255.0
#
interface GigabitEthernet0/0/1
port link-type access
port default vlan 10
traffic-redirect inbound acl 2000 ip-nexthop 10.1.21.13
#
interface GigabitEthernet0/0/2
port link-type access
port default vlan 21
#
interface GigabitEthernet0/0/3
port link-type access
port default vlan 20
#
interface GigabitEthernet0/0/6
port link-type access
port default vlan 31
#
interface GigabitEthernet0/0/7
port link-type access
port default vlan 32
#
interface GigabitEthernet0/0/8
port link-type access
port default vlan 33
#
ospf 1 router-id 33.33.33.33
area 0.0.0.0
network 10.1.10.0 0.0.0.255
network 10.1.31.0 0.0.0.255
network 10.1.32.0 0.0.0.255
network 10.1.33.0 0.0.0.255
9.5 Questions
10.1 Introduction
10.1.2 Objectives
10.1.3 Networking and Service Description
10.1.4 Prerequisites
interface Vlanif10
ip address 10.1.10.33 255.255.255.0
#
interface Vlanif31
ip address 10.1.31.33 255.255.255.0
#
interface Vlanif32
ip address 10.1.32.33 255.255.255.0
#
interface Vlanif33
ip address 10.1.33.33 255.255.255.0
#
interface GigabitEthernet0/0/1
port link-type access
port default vlan 10
#
interface GigabitEthernet0/0/6
port link-type access
port default vlan 31
#
interface GigabitEthernet0/0/7
port link-type access
port default vlan 32
#
interface GigabitEthernet0/0/8
port link-type access
port default vlan 33
#
ospf 1 router-id 33.33.33.33
area 0.0.0.0
network 10.1.10.0 0.0.0.255
network 10.1.31.0 0.0.0.255
network 10.1.32.0 0.0.0.255
network 10.1.33.0 0.0.0.255
11.1 Introduction
11.1.2 Objectives
11.1.3 Networking and Service Description
11.1.4 Prerequisites
[SW4-aaa]aaa
[SW4-aaa]authentication-scheme radius
[SW4-aaa-authen-radius]authentication-mode radius
[SW4-aaa-authen-radius]quit
[SW4-aaa]accounting-scheme radius
[SW4-aaa-accounting-radius]accounting-mode radius
[SW4-aaa-accounting-radius]quit
[SW4-aaa]domain default
[SW4-aaa-domain-default]authentication-scheme radius
[SW4-aaa-domain-default]accounting-scheme radius
[SW4-aaa-domain-default]radius-server radius
[SW4]web-auth-server portal_auth
[SW4-web-auth-server-portal_auth]server-ip 10.1.31.78
[SW4-web-auth-server-portal_auth]port 50200
[SW4-web-auth-server-portal_auth]shared-key cipher Huawei@123
[SW4-web-auth-server-portal_auth]url http://10.1.31.78:8080/portal
-----------------------------------------------------------------------------
Web-auth-server Name : portal_auth
IP-address : 10.1.31.78
Shared-key : %^%#;,K8.wry`4cx/q"WEMv,zFxV2rq#J2._"w$|lHJI%^%
Source-IP : -
Port / PortFlag : 50200 / NO
URL : http://10.1.31.78:8080/portal
URL Template :
Redirection : Enable
Sync : Disable
Sync Seconds : 0
Sync Max-times : 0
Detect : Disable
Detect Seconds : 60
Detect Max-times : 3
Detect Critical-num : 0
Detect Action :
Bound Vlanif :
VPN Instance :
Bound Interface :
Bound L2 Interface : GigabitEthernet0/0/1
-----------------------------------------------------------------------------
1 Web authentication server(s) in total
Step 2
,
[SW4]test-aaa user1 Huawei@123 radius-template radius pap
[SW4]
Info: Account user1 succeed.
Step 3
11.3 Verification
<SW4>display access-user
----------------------------------------------------------------------------
UserID Username IP address MAC Status
----------------------------------------------------------------------------
42 1832034456 10.1.11.101 000c-29f5-45d8 Success
----------------------------------------------------------------------------
Total: 1, printed: 1
AAA:
User authentication type : WEB authentication
Current authentication method : RADIUS
Current authorization method : -
Current accounting method : RADIUS
interface GigabitEthernet0/0/1
port link-type access
port default vlan 10
#
interface GigabitEthernet0/0/6
port link-type access
port default vlan 31
interface GigabitEthernet0/0/7
port link-type access
port default vlan 32
#
ospf 1 router-id 33.33.33.33
area 0.0.0.0
network 10.1.10.0 0.0.0.255
network 10.1.31.0 0.0.0.255
network 10.1.32.0 0.0.0.255
web-auth-server portal_auth
server-ip 10.1.31.79
port 50200
shared-key cipher Huawei@123
url http://10.1.31.79:8080/portal
#
aaa
authentication-scheme radius
authentication-mode radius
accounting-scheme radius
accounting-mode radius
domain default
authentication-scheme radius
accounting-scheme radius
radius-server radius
#
interface Vlanif10
ip address 10.1.10.34 255.255.255.0
#
interface Vlanif11
ip address 10.1.11.34 255.255.255.0
#
interface GigabitEthernet0/0/1
port link-type access
port default vlan 11
authentication portal
web-auth-server portal_auth direct
#
interface GigabitEthernet0/0/7
port link-type access
port default vlan 10
#
ospf 1 router-id 34.34.34.34
area 0.0.0.0
network 10.1.10.0 0.0.0.255
network 10.1.11.0 0.0.0.255
#
authentication free-rule 1 destination ip 10.1.31.79 mask 255.255.255.255
#
11.5 Questions
12.1 Introduction
12.1.2 Objectives
12.1.3 Networking and Service Description
12.1.4 Prerequisites
[SW4]vlan batch 13 to 14
[SW4]interface GigabitEthernet0/0/5
[SW4-GigabitEthernet0/0/5]port link-type trunk
[SW4-GigabitEthernet0/0/5]port trunk pvid vlan 13
[SW4-GigabitEthernet0/0/5]port trunk allow-pass vlan 13
[SW4-GigabitEthernet0/0/5]quit
[SW4]interface GigabitEthernet0/0/6
[SW4-GigabitEthernet0/0/6]port link-type trunk
[SW4-GigabitEthernet0/0/6]port trunk allow-pass vlan 13 to 14
[SW4]interface Vlanif13
[SW4-Vlanif13]ip address 10.1.13.34 255.255.255.0
Step 2
[AC6005]vlan batch 13 to 14
[AC6005]interface GigabitEthernet0/0/1
[AC6005-GigabitEthernet0/0/1]port link-type trunk
[AC6005-GigabitEthernet0/0/1]port trunk allow-pass vlan 13 to 14
[AC6005]interface Vlanif13
[AC6005-Vlanif13]ip address 10.1.13.254 255.255.255.0
[AC6005]interface Vlanif14
[AC6005-Vlanif14]ip address 10.1.14.254 255.255.255.0
[AC6005]ospf 1
[AC6005-ospf-1]area 0
[AC6005-ospf-1-area-0.0.0.0]network 10.1.13.0 0.0.0.255
[AC6005-ospf-1-area-0.0.0.0]network 10.1.14.0 0.0.0.255
[AC6005]interface Vlanif13
[AC6005-Vlanif13]dhcp select interface
[AC6005]interface Vlanif14
[AC6005-Vlanif14]dhcp select interface
<AC6005>ping 10.1.31.79
PING 10.1.31.79: 56 data bytes, press CTRL_C to break
Reply from 10.1.31.79: bytes=56 Sequence=1 ttl=126 time=1 ms
Reply from 10.1.31.79: bytes=56 Sequence=2 ttl=126 time=1 ms
Reply from 10.1.31.79: bytes=56 Sequence=3 ttl=126 time=1 ms
Reply from 10.1.31.79: bytes=56 Sequence=4 ttl=126 time=1 ms
Reply from 10.1.31.79: bytes=56 Sequence=5 ttl=126 time=1 ms
[AC6005]wlan
[AC6005-wlan-view]regulatory-domain-profile name domain1
[AC6005-wlan-regulatory-domain-prof-domain1]country-code CN
[AC6005-wlan-regulatory-domain-prof-domain1]quit
[AC6005-wlan-view]quit
[AC6005]wlan
[AC6005-wlan-view]ap-group name ap-group1
[AC6005-wlan-ap-group-ap-group1]regulatory-domain-profile domain1
Warning: Modifying the country code will clear channel, power and antenna
gain configurations of the radio and reset the AP. Continue?[Y/N]:y
[AC6005-wlan-ap-group-guest1]quit
[AC6005]wlan
[AC6005-wlan-view]ap auth-mode mac-auth
[AC6005-wlan-view]ap-mac 4cfa-cabf-d520 ap-id 0 ap-sn 21500826412SG8919936
[AC6005-wlan-ap-0]ap-group ap-group1
[AC6005-wlan-ap-0]ap-name ap0
<AC6005>display ap all
Total AP information:
nor : normal [1]
-----------------------------------------------------------------------------
ID MAC Name Group IP Type State STA Uptime
-----------------------------------------------------------------------------
0 4cfa-cabf-d520 ap0 ap-group1 10.1.13.253 AP4030DN nor 0 12S
-----------------------------------------------------------------------------
Step 3
[AC6005]aaa
[AC6005-aaa]authentication-scheme radius
[AC6005-aaa-authen-radius]authentication-mode radius
[AC6005-aaa]accounting-scheme radius
[AC6005-aaa-accounting-radius]accounting-mode radius
[AC6005]web-auth-server Portal_auth
[AC6005-web-auth-server-Portal_auth]server-ip 10.1.31.79
[AC6005-web-auth-server-Portal_auth]port 50200
[AC6005-web-auth-server-Portal_auth]shared-key cipher Huawei@123
[AC6005-web-auth-server-Portal_auth]url-template Portal_auth
[AC6005]wlan
[AC6005-wlan-view]vap-profile name portal_authen
[AC6005-wlan-vap-prof-portal_authen]authentication-profile
macportal_authen_profile
Warning: This action may cause service interruption. Continue?[Y/N]y
Step 4
[AC6005]test-aaa user1 Admin@123 radius-template radius pap
Info: Account test succeed.
12.3 Verification
Basic:
User ID : 59
User name : developer1
User MAC : 3c91-57ae-fcb9
User IP address : 10.1.14.253
User vpn-instance : -
User IPv6 address : -
User access Interface : Wlan-Dbss1
User vlan event : Success
QinQVlan/UserVlan : 0/14
User access time : 2017/10/29 01:30:36
User accounting session ID : AC600500000000000014a52a6d000059
Option82 information : -
User access type : WEB
AP name : ap0
Radio ID : 0
AP MAC : 4cfa-cabf-d520
SSID : portal_authen
Online time : 141(s)
Web-server IP address : 10.1.31.79
Dynamic ACL desc(Effective) :
No. 0: acl 10001 dest-ip 10.1.92.80 dest-ipmask 32 permit
No. 1: acl 10100 dest-ip 0.0.0.0 dest-ipmask 0 deny
AAA:
User authentication type : WEB authentication
Current authentication method : RADIUS
Current authorization method : -
Current accounting method : RADIUS
interface Vlanif10
ip address 10.1.10.33 255.255.255.0
#
interface Vlanif31
ip address 10.1.31.33 255.255.255.0
#
interface Vlanif32
ip address 10.1.32.33 255.255.255.0
#
interface GigabitEthernet0/0/1
port link-type access
port default vlan 10
#
interface GigabitEthernet0/0/6
port link-type access
port default vlan 31
#
interface GigabitEthernet0/0/7
port link-type access
port default vlan 32
#
ospf 1
area 0.0.0.0
network 10.1.10.0 0.0.0.255
network 10.1.32.0 0.0.0.255
network 10.1.31.0 0.0.0.255
#
Return
ospf 1
area 0.0.0.0
network 10.1.13.0 0.0.0.255
network 10.1.14.0 0.0.0.255
#
undo snmp-agent
#
stelnet server enable
undo telnet ipv6 server enable
ssh server secure-algorithms cipher aes256_ctr aes128_ctr aes256_cbc aes128
3des
ssh server secure-algorithms hmac sha2_256 sha2_256_96 sha1 sha1_96 md5
md5_96
ssh client secure-algorithms cipher aes256_ctr aes128_ctr aes256_cbc aes128
3des
ssh client secure-algorithms hmac sha2_256 sha2_256_96 sha1 sha1_96 md5
md5_96
#
capwap source interface vlanif13
#
wlan
traffic-profile name default
security-profile name default
security-profile name default-wds
security wpa2 psk pass-
phrase %^%#U9#%Tu'P(2wIMm8Kxx<!~.KEH7LW:7+h!"/UzOeA%^%aes
security-profile name default-mesh
security wpa2 psk pass-
phrase %^%#CdsG$Qj:@C}x~S#.5]*Wh8RN*:[r4$"XY]5`A5LP%^%aes
security-profile name portal_authen
ssid-profile name default
ssid-profile name portal_authen
ssid portal_authen
vap-profile name default
vap-profile name portal_authen
forward-mode tunnel
service-vlan vlan-id 14
ssid-profile portal_authen
security-profile portal_authen
authentication-profile macportal_authen_profile
wds-profile name default
mesh-handover-profile name default
mesh-profile name default
regulatory-domain-profile name default
regulatory-domain-profile name domain1
air-scan-profile name default
rrm-profile name default
radio-2g-profile name default
radio-5g-profile name default
wids-profile name default
ap-system-profile name default
provision-ap
port-link-profile name default
wired-port-profile name default
ap-group name default
ap-group name ap-group1
regulatory-domain-profile domain1
radio 0
vap-profile portal_authen wlan 3
radio 1
vap-profile portal_authen wlan 3
ap-id 0 type-id 43 ap-mac 4cfa-cabf-d520 ap-sn 21500826412SG8919936
ap-name ap0
ap-group ap-group1
#
Return
12.5 Questions
13.1 Introduction
13.1.2 Objectives
13.1.3 Networking and Service Description
13.1.4 Prerequisites
——
——
[SW4-aaa]aaa
[SW4-aaa]authentication-scheme radius
[SW4-aaa-authen-radius]authentication-mode radius
[SW4-aaa-authen-radius]quit
[SW4-aaa]accounting-scheme radius
[SW4-aaa-accounting-radius]accounting-mode radius
[SW4-aaa-accounting-radius]quit
[SW4-aaa]domain default
[SW4-aaa-domain-default]authentication-scheme radius
[SW4-aaa-domain-default]accounting-scheme radius
[SW4-aaa-domain-default]radius-server radius
[SW4]web-auth-server portal_auth
[SW4-web-auth-server-portal_auth]server-ip 10.1.31.79
[SW4-web-auth-server-portal_auth]port 50200
[SW4-web-auth-server-portal_auth]shared-key cipher Huawei@123
[SW4-web-auth-server-portal_auth]url http://10.1.31.79:8080/portal
Step 2
Choose
a
13.3 Verification
Basic:
User ID : 51
User name : VIP
Domain-name : default
User MAC : 000c-29f5-45d8
User IP address : 10.1.11.101
User vpn-instance : -
User access Interface : GigabitEthernet0/0/1
User vlan event : Success
QinQVlan/UserVlan : 0/11
User access time : 2017/10/30 13:19:21
User accounting session ID : SW400001000000011abe03d000051
Option82 information : -
User access type : 802.1x
Terminal Device Type : Data Terminal
Dynamic group index(Effective) : 1
Dynamic group name(Effective) : VIP
User inbound CAR CIR(Kbps) : 2048
User inbound CAR PIR(Kbps) : 2048
User inbound CAR CBS(Byte) : 385024
User inbound CAR PBS(Byte) : 385024
User inbound data flow(Packet) : 6,126
User inbound data flow(Byte) : 428,937
User outbound CAR CIR(Kbps) : 4096
User outbound CAR PIR(Kbps) : 4096
User outbound CAR CBS(Byte) : 770048
User outbound CAR PBS(Byte) : 770048
User outbound data flow(Packet) : 0
User outbound data flow(Byte) : 0
AAA:
User authentication type : 802.1x authentication
Current authentication method : RADIUS
Current authorization method : -
Current accounting method : RADIUS
13.5 Question
14.1 Introduction
14.1.2 Objectives
14.1.3 Networking and Service Description
14.1.4 Prerequisites
——
[SW4-aaa]aaa
[SW4-aaa]authentication-scheme radius
[SW4-aaa-authen-radius]authentication-mode radius
[SW4-aaa-authen-radius]quit
[SW4-aaa]accounting-scheme radius
[SW4-aaa-accounting-radius]accounting-mode radius
[SW4-aaa-accounting-radius]quit
[SW4-aaa]domain default
[SW4-aaa-domain-default]authentication-scheme radius
[SW4-aaa-domain-default]accounting-scheme radius
[SW4-aaa-domain-default]radius-server radius
Step 2
[SW4]test-aaa user1 Huawei@123 radius-template radius pap
[SW4]
Info: Account user1 succeed.
14.3 Verification
[SW4]display access-user
----------------------------------------------------------------------------
UserID Username IP address MAC Status
----------------------------------------------------------------------------
24 tony 10.1.11.250 000c-293d-08d5 Pre-authen
----------------------------------------------------------------------------
Total: 1, printed: 1
Basic:
User ID : 24
User name : tony
Domain-name : -
User MAC : 000c-293d-08d5
User IP address : 10.1.11.250
User vpn-instance : -
User access Interface : GigabitEthernet0/0/1
User vlan event : Pre-authen
QinQVlan/UserVlan : 0/11
User access time : 2017/10/31 10:13:22
Option82 information : -
User access type : None
Terminal Device Type : Data Terminal
AAA:
User authentication type : No authentication
Current authentication method : -
Current authorization method : Local
Current accounting method : None
<SW4>display access-user
----------------------------------------------------------------------------
UserID Username IP address MAC Status
----------------------------------------------------------------------------
24 tony 10.1.11.250 000c-293d-08d5 Success
----------------------------------------------------------------------------
Total: 1, printed: 1
Basic:
User ID : 24
User name : tony
Domain-name : default
User MAC : 000c-293d-08d5
User IP address : 10.1.11.250
User vpn-instance : -
User access Interface : GigabitEthernet0/0/1
User vlan event : Success
QinQVlan/UserVlan : 0/11
User access time : 2017/10/31 10:57:12
User accounting session ID : SW400001000000011f58573000024
Option82 information : -
User access type : 802.1x
Terminal Device Type : Data Terminal
Dynamic ACL desc(Effective) :
No. 0: acl 10001 dest-ip 10.1.32.74 dest-ipmask 32 permit
No. 1: acl 10002 dest-ip 10.1.92.80 dest-ipmask 32 permit
No. 2: acl 10100 dest-ip 0.0.0.0 dest-ipmask 0 deny
AAA:
User authentication type : 802.1x authentication
Current authentication method : RADIUS
Current authorization method : -
Current accounting method : RADIUS
15.1 Introduction
15.1.2 Objectives
Step 2
<SW3>system-view
[SW3]snmp-agent
[SW3]snmp-agent sys-info version v2c
[SW3]snmp-agent mib-view included iso-view iso
[SW3]snmp-agent community read Huawei@123 mib-view iso-view
[SW3]snmp-agent community write Admin@123 mib-view iso-view
[SW3]snmp-agent target-host trap address udp-domain 172.21.20.77 params
securityname adminnms v2c
[SW3]snmp-agent trap enable
Warning: All switches of SNMP trap/notification will be open. Continue?
[Y/N]:y
<SW4>system-view
[SW4]snmp-agent
[SW4]snmp-agent sys-info version v2c
[SW4]snmp-agent mib-view included isoview iso
[SW4]snmp-agent community read Huawei@123 mib-view iso-view
[SW4]snmp-agent community write Admin@123 mib-view iso-view
[SW4]snmp-agent target-host trap address udp-domain 172.21.20.77 params
securityname adminnms v2c
[SW4]snmp-agent trap enable
Warning: All switches of SNMP trap/notification will be open. Continue?
[Y/N]:y
<AC6005>system-view
[AC6005]snmp-agent
[AC6005]snmp-agent sys-info version v2c
[AC6005]snmp-agent mib-view iso-view include iso
[AC6005]snmp-agent community read Huawei@123 mib-view iso-view
[AC6005]snmp-agent community write Admin@123 mib-view iso-view
[AC6005]snmp-agent target-host trap-paramsname trapnms v2c securityname
adminnms
[AC6005]snmp-agent target-host trap-hostname nms address 172.21.20.77 trap-
paramsname trapnms
[AC6005]snmp-agent trap enable
Info: All switches of SNMP trap/notification will be open. Continue? [Y/N]:y
<FW3>system-view
[FW3]interface GigabitEthernet 0/0/0
[FW3-GigabitEthernet0/0/0]service-manage enable
[FW3-GigabitEthernet0/0/0]service-manage snmp permit
[FW3-GigabitEthernet0/0/0]service-manage telnet permit
[FW3-GigabitEthernet0/0/0]quit
[FW3]snmp-agent
[FW3]snmp-agent sys-info version v2c
[FW3]snmp-agent mib-view included iso-view iso
[FW3]snmp-agent community read Huawei@123 mib-view iso-view
[FW3]snmp-agent community write Admin@123 mib-view iso-view
[FW3]snmp-agent target-host trap address udp-domain 172.21.20.77 params
securityname adminnms v2c
[FW3]snmp-agent trap enable
Warning: All switches of SNMP trap/notification will be open. Continue?
[Y/N]:y
Step 3
Step 4
15.3 Verification
15.4.3 AC Configuration
#
sysname AC
#
vlan batch 13 to 14 4090
#
lldp enable
#
interface Vlanif4090
ip address 172.21.20.41 255.255.0.0
#
interface GigabitEthernet0/0/8
port link-type access
port default vlan 4090
#
snmp-agent local-engineid 800007DB03C81FBE7FD79A
snmp-agent community
read %^%#rlveFQu@];EY>lQ1Z[PLjvC%*G%4g>_.L=G[esW0+t"MRRCKq%{"CQKAT6D;#V'3T_Y/
!E2M[_MpN]n<%^%# mib-view iso-view
snmp-agent community write %^%#|5^w#nlqH>Mp2w-NZ:S7(^qXO%U)-
3@IpDX56EF@GW]9Cdv8n+o9fQ>$QCBQI5CS/o<::L4@=B<CaGV6%^%# mib-view iso-view
snmp-agent sys-info version v2c
snmp-agent target-host trap-hostname nms address 172.21.20.77 udp-port 162
trap-paramsname trapnms
snmp-agent target-host trap-paramsname trapnms v2c
securityname %^%#{}z`Q+s/VFVi*W5;<9WEpS"q4t4vmC|&5eOKA^G(%^%#
snmp-agent mib-view iso-view include iso
snmp-agent trap enable
snmp-agent
#
user-interface vty 0 4
authentication-mode password
user privilege level 15
set authentication password cipher %^%#GR-cPe|,4M%*[BSDdghX@iDlXp/|q-
Od"}DIak(S'2A$1;Ozb0eLP+0z(q~!%^%#
protocol inbound all
user-interface vty 16 20
protocol inbound all
$
Return
16.1 Introduction
16.1.2 Objectives
16.1.4 Prerequisites
16.1.5 Experiment Plan
<FW1>system-view
[FW1]interface GigabitEthernet 0/0/0
[FW1-GigabitEthernet0/0/0]service-manage enable
[FW1-GigabitEthernet0/0/0]service-manage snmp permit
[FW1-GigabitEthernet0/0/0]service-manage telnet permit
[FW1-GigabitEthernet0/0/0]quit
[FW1]snmp-agent
[FW1]snmp-agent sys-info version v2c
[FW1]snmp-agent mib-view included iso-view iso
[FW1]snmp-agent community read Huawei@123 mib-view iso-view
[FW1]snmp-agent community write Admin@123 mib-view iso-view
[FW1]snmp-agent target-host trap address udp-domain 172.21.20.77 params
securityname adminnms v2c
[FW1]snmp-agent trap enable
Warning: All switches of SNMP trap/notification will be open. Continue?
[Y/N]:y
<FW2>system-view
[FW2]interface GigabitEthernet 0/0/0
[FW2-GigabitEthernet0/0/0]service-manage enable
[FW2-GigabitEthernet0/0/0]service-manage snmp permit
[FW2-GigabitEthernet0/0/0]service-manage telnet permit
[FW2-GigabitEthernet0/0/0]quit
[FW2]snmp-agent
[FW2]snmp-agent sys-info version v2c
[FW2]snmp-agent mib-view included iso-view iso
[FW2]snmp-agent community read Huawei@123 mib-view iso-view
[FW2]snmp-agent community write Admin@123 mib-view iso-view
[FW2]snmp-agent target-host trap address udp-domain 172.21.20.77 params
securityname adminnms v2c
[FW2]snmp-agent trap enable
Warning: All switches of SNMP trap/notification will be open. Continue?
[Y/N]:y
[FW3]aaa
[FW3-aaa]manager-user netconfuser
[FW3-aaa-manager-user-netconfuser]password cipher Huawei@123
[FW3-aaa-manager-user-netconfuser]service-type api
[FW3-aaa-manager-user-netconfuser]level 15
[FW3-aaa-manager-user-netconfuser]quit
[FW3-aaa]quit
[FW3]api
[FW3-api]api netconf port 1025
[FW3-api]api netconf enable
[FW3-api]quit
Step 3
Business > Security Business > Secure Center
Step 4
C:\Users\admin>ping 10.1.20.33
16.3 Verification
C:\Users\admin>ping 10.1.20.33
17.1 Introduction
17.1.2 Objectives
Loopback0 Loopback0
10.1.100.100/24 10.1.200.100/24
17.1.4 Prerequisites
<FW3>system-view
[FW3]interface GigabitEthernet 1/0/1
[FW3-GigabitEthernet1/0/1]shutdown
[FW3-GigabitEthernet1/0/1]quit
Step 2
<FW3>system-view
[FW3]interface GigabitEthernet 0/0/0
[FW3-GigabitEthernet0/0/0]service-manage enable
[FW3-GigabitEthernet0/0/0]service-manage snmp permit
[FW3-GigabitEthernet0/0/0]service-manage netconf permit
[FW3-GigabitEthernet0/0/0]quit
[FW3]snmp-agent
[FW3]snmp-agent sys-info version v2c
[FW3]snmp-agent mib-view included iso-view iso
[FW3]snmp-agent community read Huawei@123 mib-view iso-view
[FW3]snmp-agent community write Admin@123 mib-view iso-view
[FW3]snmp-agent target-host trap address udp-domain 172.21.20.77 params
securityname adminnms v2c
[FW3]snmp-agent trap enable
Warning: All switches of SNMP trap/notification will be open. Continue?
[Y/N]:y
Step 3
Step 4
Business > Security Business > IPSec VPN Management
After the successful discovery, you can click Back on the upper right of the page to return to the
service group.
17.3 Verification
interface LoopBack0
ip address 10.1.100.100 255.255.255.0
#
firewall zone dmz
set priority 50
add interface GigabitEthernet1/0/2
#
ip route-static 10.1.200.0 255.255.255.0 10.1.61.12
#
security-policy
rule name IPSec
source-address 10.1.100.0 255.255.255.0
destination-address 10.1.200.0 255.255.255.0
action permit
rule name IKE
source-zone local
destination-zone dmz
action permit
#
snmp-agent
snmp-agent local-engineid 800007DB032C9D1E2BEC4E
snmp-agent community read
cipher %^%#l[:y4pLX*,:rN$:%LZB)wR#l9RZ[C8hBRo([8[(/kG8SY:cj-F-@^+Uu@Tu2t&x:F-
lIs0dz>;G6LEl"%^%# mib-view iso-view
snmp-agent community write
cipher %^%#ei}rKjLw,BBrPdO\Wi}5)~6O>:ZLhP!:mx>e5;.21;TvX^4I-
RZj0YQ/hc,<n&lp::wE)-v[ul0"@K9T%^%# mib-view iso-view
snmp-agent sys-info version v2c v3
snmp-agent target-host trap address udp-domain 172.21.20.77 params
securityname cipher %^%#,N#:NHR(T@_d/J*GHi[7(NqUQ_YcWFbZBM58JR"U%^%# v2c
snmp-agent mib-view included iso-view iso
snmp-agent trap enable
#
user-interface vty 0 4
authentication-mode aaa
user privilege level 15
protocol inbound all
#
return
Huawei e-Learning
https://ilearningx.huawei.com/portal/#/portal/ebg/51
Huawei Certification
http://support.huawei.com/learning/NavigationAction!createNavi?navId=_31
&lang=en
Find Training
http://support.huawei.com/learning/NavigationAction!createNavi?navId=_trai
ningsearch&lang=en
More Information
Huawei learning APP