Terminal Access Configuration
Terminal Access Configuration
Context
                  The terminal access gateway supports management of access authentication for
                  terminal users such as PPPoE, IPoE, and L2TP terminal users. It supports access of
                  100 to 500 terminals of a small-sized enterprise to the NMS, and applies to
                  scenarios of terminal address assignment and terminal user authentication.
                  As shown in Figure 4-1, the Router is the enterprise's egress gateway in the
                  broadband network. It also acts as a terminal access to provide basic access
                  methods and broadband access network management functions for users. The
                  terminal access allows Ethernet access using LAN switches, WLAN access using
                  APs, and asymmetric digital subscriber line (ADSL) access using digital subscriber
                  line access multiplexers (DSLAMs).
Figure 4-1 Connecting to the Router using different broadband access modes
                          Access user
                        (Portal, PPPoE)                               Ethernet
                                                                       access
                                                            LAN
                                                           Switch
                              Portal                                                             Internet
                            access user                               WLAN
                                                             AP       access     Router
                                                                                 Authenticatio
                                                                                 n
                                                                       ADSL      Authenticatio
                             PPPoE
                                                                       access    n
                           access user
                                                                                 Accounting
                                                           DSLAM                 Management
Access network
Figure 4-2 Connecting to the Router using different broadband access modes
                          Access user
                        (Portal, PPPoE)                               Ethernet
                                                                       access
                                                            LAN
                                                           Switch
                              Portal                                                             Internet
                            access user                               WLAN
                                                             AP       access     Router
                                                                                 Authenticatio
                                                                                 n
                                                                       ADSL      Authenticatio
                             PPPoE
                                                                       access    n
                           access user
                                                                                 Accounting
                                                           DSLAM                 Management
Access network
● PPPoE authentication
                        In Figure 4-3, PPPoE users connect to the Internet through PPPoE dial-up (in
                        Ethernet or ADSL access mode). When PPPoE users use client software on
                        their terminals to perform PPPoE dial-up, the Router functions as the PPPoE
                        server to perform PPP authentication for the PPPoE users, and user
                        information such as the user names and passwords are authenticated on the
                        AAA server. After the PPPoE users are authenticated, the Router assigns IP
                        addresses to the users so that they can access the Internet.
AAA server
                                                               Access
                                                              network
                                          Remote
                                          terminal                             Router
                        In addition to allocating IP addresses to PPPoE clients through the global address pool, the
                        device can also allocate IP addresses to users through domains. That is, an IP address pool
                        is bound to an AAA scheme and the AAA scheme is bound to a domain. When the users in
                        the domain go online, the device allocates IP addresses to the users. The priority of IP
                        addresses allocated through domains is higher than the priority of IP addresses allocated
                        through the global address pool.
                        #
                        ip pool pool1
                         gateway-list 192.168.1.1
                         network 192.168.1.0 mask 255.255.255.0
                        #
                        aaa
                         service-scheme sch1
                          ip-pool pool1
                         domain huawei
                          service-scheme sch1
                        #
                  ●     Portal authentication
                        Portal authentication (web authentication): When a user attempts to access
                        an address before authentication, the Router redirects the access request to
                        the forcible Portal server. The user enters the user name and password on the
                        authentication page. After the Router exchanges information with the remote
                        terminal, user information such as the user name and password is
                        authenticated on the AAA server.
                        In Figure 4-4, web users log in to the authentication page of the Portal server
                        to access the Internet (in Ethernet or WLAN access mode). After a web user
                        obtains a static IP address or uses DHCP to obtain an IP address, the Portal
                        authentication website is pushed to the user for Portal authentication. The
                        web user can access the Internet only after the authentication succeeds.
AAA server
                                                              Access
                                                             network
                                           Remote
                                                                            Router       Portal server
                                           terminal
                                               1. Obtain an IP address
                           Enter the website
                           using the browser
                                               2. Log in to the Portal server
                                               forcibly
                        Enter the user name
                           and password
                                               3. Connect to the Internet after
                                               the authentication succeeds
NOTE
                  The preceding two authentication modes require AAA authentication schemes to complete user
                  authentication. AAA is configured on the Router so that the Router can work with the AAA
                  server. After users enter their user names and passwords, the Router receives the user
                  authentication information and sends it to the AAA server for authentication. If the
                  authentication succeeds, the users can access the Internet.
                  In Terminal access configuration, you can configure local or RADIUS authentication in an AAA
                  authentication scheme on the Terminal access. For details on AAA authentication scheme
                  configuration, see 1 AAA Configuration in the Huawei AR Series Access Routers Configuration
                  Guide - Security.
                  The Router delivers bandwidth to access users through the AAA server. Therefore, you should
                  understand the RADIUS attributes supported by the Router. For details see 1.2.4.8 RADIUS
                  Attributes in the Huawei AR Series Access Routers Configuration Guide - Security.
                  In PPPoE authentication, the PPPoE server assigns IP addresses to users using the address
                  negotiation function of the PPP protocol. In Portal authentication, static IP addresses or DHCP
                  must be configured for users before the authentication.
                  ● For details on how to configure static IP addresses, see IP Address Configuration in the
                    Huawei AR Series Access Routers Configuration Guide - IP Service.
                  ● For details on how to obtain IP addresses using DHCP, see DHCP Configuration in the
                    Huawei AR Series Access Routers Configuration Guide - IP Service.
                            for free. When users access external networks, the Router charges the
                            users based on the access traffic.
                            For the DAA configuration, see 2.7 Configuring DAA in the Huawei AR
                            Series Access Routers Configuration Guide - Security.
                  ●     Controlling access user bandwidth
                        – When selecting an AAA authentication scheme in local mode:
                            Create a QoS profile on the Router to specify the uplink and downlink
                            traffic limits for each user and bind the QoS profile to the AAA service
                            scheme. After that, access users in different domains have different
                            bandwidths.
                            i.     Create a QoS profile to specify the uplink and downlink traffic limits.
                                   <Huawei> system-view
                                   [Huawei] qos-profile profile1
                                   [Huawei-qos-profile-profile1] car cir 200 pir 300 cbs 1500 pbs 3500 outbound
                                   [Huawei-qos-profile-profile1] car cir 200 pir 300 cbs 1500 pbs 3500 inbound
                                   [Huawei-qos-profile-profile1] quit
                            ii.    Create an AAA service scheme and bind the QoS profile to the
                                   scheme.
                                   [Huawei] aaa
                                   [Huawei-aaa] service-scheme scheme1
                                   [Huawei-aaa-service-scheme1] qos-profile profile1
                                   [Huawei-aaa-service-scheme1] quit
                            iii.   Create an AAA domain and bind the AAA service scheme to the
                                   domain.
                                   [Huawei-aaa] domain huawei
                                   [Huawei-aaa-domain-huawei] service-scheme scheme1
                   User 1
                                                                                             Internet
                                                                   Eth2/0/1
                                                                   VLANIF20
                                                                   192.168.2.29/24
                                    Access     Eth2/0/0
                       ……
                                   Network    VLANIF10
                                        192.168.1.20/ 24 Router
                                                                                             Intranet
                   User N
                                                                                         192.168.100.0/24
Configuration Roadmap
                  The configuration roadmap is as follows:
                  1.    Configure the AAA authentication and accounting schemes in RADIUS mode
                        to ensure information exchange between the Router and RADIUS server.
                  2.    Configure Portal authentication to authenticate access users.
                  3.    Configure DAA. After that, the Router does not charge users for intranet
                        (192.168.100.0/24) access, and charges the users based on duration when
                        they access external networks.
                  4.    Configure the device to force unauthorized users with the IP address
                        192.168.1.3/24 to go offline.
Procedure
         Step 1 Create VLANs and configure interfaces to allow the VLANs to ensure network
                communication.
                  # Create VLAN 10 and VLAN 20.
                  <Huawei> system-view
                  [Huawei] sysname Router
                  [Router] vlan batch 10 20
                  # Create VLANIF 10 and VLANIF 20, and assign IP addresses to the VLANIF
                  interfaces so that reachable routes can be set up between the terminals, Router,
                  and enterprise internal servers.
                  [Router] interface vlanif 10
                  [Router-Vlanif10] ip address 192.168.1.20 24
                  [Router-Vlanif10] quit
                  [Router] interface vlanif 20
                  [Router-Vlanif20] ip address 192.168.2.29 24
                  [Router-Vlanif20] quit
         Step 2 Create and configure a RADIUS server template, AAA authentication and
                accounting schemes, and an authentication domain.
                        NOTE
Ensure that the shared key in the RADIUS server template is the same as on the RADIUS server.
                  # Create an AAA scheme, configure the authentication scheme auth, and set the
                  authentication mode to RADIUS authentication.
                  [Router] aaa
                  [Router-aaa] authentication-scheme auth
                  [Router-aaa-authen-auth] authentication-mode radius
                  [Router-aaa-authen-auth] quit
                  # Configure the accounting scheme abc in the AAA scheme and set the
                  accounting mode to RADIUS accounting.
                  [Router-aaa] accounting-scheme abc
                  [Router-aaa-accounting-abc] accounting-mode radius
                  [Router-aaa-accounting-abc] quit
                  # Configure the AAA domain isp1, and apply the authentication scheme auth,
                  accounting scheme abc, and RADIUS server template rd1 to the domain.
                  [Router-aaa] domain isp1
                  [Router-aaa-domain-isp1] authentication-scheme auth
                  [Router-aaa-domain-isp1] accounting-scheme abc
                  [Router-aaa-domain-isp1] radius-server rd1
                  [Router-aaa-domain-isp1] quit
                  [Router-aaa] quit
                  # Set the shared key that the device uses to exchange information with the Portal
                  server to Huawei@1234 in cipher text.
                  [Router-web-auth-server-abc] shared-key cipher Huawei@1234
NOTE
                  If the Portal server does not support detection, you do not need to configure this command.
                  When you run the user-sync command, make sure that the Portal server supports this function.
                  Otherwise, the users will go offline.
                  # Configure the authentication profile p1, bind the Portal access profile web1.
                  [Router] authentication-profile name p1
                  [Router-authen-profile-p1] portal-access-profile web1
                  [Router-authen-profile-p1] quit
                  # Configure the traffic identification rule ACL 3000 to identify the traffic destined
                  for the internal network segment 192.168.100.0/24.
                  [Router] acl 3000
                  [Router-acl-adv-3000] rule 5 permit ip destination 192.168.100.0 0.0.0.255
                  [Router-acl-adv-3000] quit
                  # Configure accounting for all the traffic that does not match ACL 3000.
                  ●     For traffic of tariff level 1, traffic statistics collection is disabled and
                        accounting is not performed.
                  ●     For other traffic, the device collects traffic statistics and sends the statistics to
                        the RADIUS accounting server.
                  [Router] aaa
                  [Router-aaa] domain isp1
                  [Router-aaa-domain-isp1] statistic enable
                  [Router-aaa-domain-isp1] quit
         Step 5 Force the access users with the IP address 192.168.1.3 to go offline.
                  [Router-aaa] cut access-user ip-address 192.168.1.3
                  [Router-aaa] quit
                  [Router] quit
                  -------------------------------------------------------------------------------
                    Web-auth-server Name : abc
                    IP-address            : 192.168.2.20
                    Shared-key              : %^%#s@<60z+%'"EJI#4KOij5M)"m&9%"k:63Vl+xTc"K%^%#
                    Source-IP            :-
                    Port / PortFlag         : 50200 / NO
                    URL                : http://192.168.2.20:8080/webagent
                    URL Template                :
                    Redirection            : Enable
                    Sync              : Enable
                    Sync Seconds              : 300
                    Sync Max-times                :3
                    Detect              : Enable
                    Detect Seconds              : 60
                    Detect Max-times               :3
                    Detect Critical-num : 0
                    Detect Action            : log
                    Bound Vlanif             : 10
                    VPN Instance              :
                    Bound Interface             :
                  -------------------------------------------------------------------------------
                    1 Web authentication server(s) in total
                  Run the display traffic-group name command to check information about the
                  traffic group huawei.
                  <Router> display traffic-group name huawei
                   ----------------------------------------------------------------------------
                   Acl-id             Tariff-level
                   ----------------------------------------------------------------------------
                   3000                   1
                   ----------------------------------------------------------------------------
                   Total: 1
                  # After the user goes online, run the display access-user command to check
                  traffic statistics at each tariff level.
----End
Configuration Files
                  Configuration files on Router
                  #
                   sysname Router
                  #
                  vlan batch 10 20
                  #
                  authentication-profile name p1
                   portal-access-profile web1
                  #
                  domain isp1
                  #
                  radius-server template rd1
                   radius-server shared-key cipher %^%#s@<60z+%'"EJI#4KOij5M)"m&9%"k:63Vl+xTc"K%^%#
                   radius-server authentication 192.168.2.30 1812 weight 80
                   radius-server accounting 192.168.2.30 1813 weight 80
                  #
                  acl number 3000
                   rule 5 permit ip destination 192.168.100.0 0.0.0.255
                  #
                  web-auth-server abc
                   server-ip 192.168.2.20
                   port 50200
                   shared-key cipher %^%#s@<60z+%'"EJI#4KOij5M)"m&9%"k:63Vl+xTc"K%^%#
                   url http://192.168.2.20:8080/webagent
                                                                       RADIUS Server
                                                                        192.168.2.30
                      User 1
                                                                                        Internet
                                                             Eth2/0/1
                                                             VLANIF20
                                                             192.168.2.29/24
                                  Access
                                                Eth2/0/0
                       ……
                                  Networ
                                               VLANIF10
                                    k
                                                           Router
                                                                                        Intranet
                      User N
                                                                                    192.168.100.0/24
Configuration Roadmap
                  The configuration roadmap is as follows:
                  1.    Configure the AAA authentication and accounting schemes in RADIUS mode
                        to ensure information exchange between the Router and RADIUS server.
                  2.    Configure the PPPoE server to perform PPP authentication on access users.
                  3.    Configure DAA. After that, the Router does not charge users for intranet
                        access, and charges the users based on duration when they access external
                        networks.
                  4.    Configure the device to force unauthorized users with the IP address
                        192.168.1.3/24 to go offline.
Procedure
         Step 1 Create VLANs and configure interfaces to allow the VLANs to ensure network
                communication.
                  # Create VLAN 10 and VLAN 20.
                  <Huawei> system-view
                  [Huawei] sysname Router
                  [Router] vlan batch 10 20
                  # Create VLANIF 10 and VLANIF 20, and assign IP address to the VLANIF20
                  interface so that reachable routes can be set up between the terminals, Router,
                  and enterprise internal servers.
                  [Router] interface vlanif 10
                  [Router-Vlanif10] quit
                  [Router] interface vlanif 20
                  [Router-Vlanif20] ip address 192.168.2.29 24
                  [Router-Vlanif20] quit
         Step 2 Create and configure a RADIUS server template, an AAA authentication scheme,
                accounting scheme and an authentication domain.
                        NOTE
Ensure that the shared key in the RADIUS server template is the same as on the RADIUS server.
                  # Create an AAA scheme, configure the authentication scheme auth, and set the
                  authentication mode to RADIUS authentication.
                  [Router] aaa
                  [Router-aaa] authentication-scheme auth
                  [Router-aaa-authen-auth] authentication-mode radius
                  [Router-aaa-authen-auth] quit
                  # Configure the accounting scheme abc in the AAA scheme and set the
                  accounting mode to RADIUS accounting.
                  [Router-aaa] accounting-scheme abc
                  [Router-aaa-accounting-abc] accounting-mode radius
                  [Router-aaa-accounting-abc] quit
                  # Configure the AAA domain isp1, and apply the authentication scheme auth,
                  accounting scheme abc, and RADIUS server template rd1 to the domain.
                  [Router-aaa] domain isp1
                  [Router-aaa-domain-isp1] authentication-scheme auth
                  [Router-aaa-domain-isp1] accounting-scheme abc
                  [Router-aaa-domain-isp1] radius-server rd1
                  [Router-aaa-domain-isp1] quit
                  [Router-aaa] quit
                  # Configure a global address pool so that the PPPoE server can dynamically assign
                  IP addresses to access users.
                  [Router] ip pool pool1
                  [Router-ip-pool-pool1] network 192.168.1.0 mask 255.255.255.0
                  [Router-ip-pool-pool1] gateway-list 192.168.1.1
                  [Router-ip-pool-pool1] quit
                  # Configure the traffic identification rule ACL 3000 to identify the traffic destined
                  for the internal network segment 192.168.100.0/24.
                  [Router] acl 3000
                  [Router-acl-adv-3000] rule 5 permit ip destination 192.168.100.0 0.0.0.255
                  [Router-acl-adv-3000] quit
                  # Configure accounting for all the traffic that does not match ACL 3000.
                  ●     For traffic of tariff level 1, traffic statistics collection is disabled and
                        accounting is not performed.
                  ●     For other traffic, the device collects traffic statistics and sends the statistics to
                        the RADIUS accounting server.
                  [Router] aaa
                  [Router-aaa] domain isp1
                  [Router-aaa-domain-isp1] statistic enable
                  [Router-aaa-domain-isp1] quit
         Step 5 Force the access users with the IP address 192.168.1.3 to go offline.
                  [Router-aaa] cut access-user ip-address 192.168.1.3
                  [Router-aaa] quit
                  [Router] quit
                  # Run the display pppoe-server session all command to check the PPPoE session
                  status and configuration. The command output shows that the PPPoE session
                  status is Up and the session configuration is correct.
                  Run the display traffic-group name command to check information about the
                  traffic group huawei.
                  <Router> display traffic-group name huawei
                   ----------------------------------------------------------------------------
                   Acl-id             Tariff-level
                   ----------------------------------------------------------------------------
                   3000                   1
                   ----------------------------------------------------------------------------
                   Total: 1
                  # After the user goes online, run the display access-user command to check the
                  IP address and traffic statistics of online users.
----End
Configuration Files
                  Configuration files on Router
                  #
                   sysname Router
                  #
                  vlan batch 10 20
                  #
                  domain isp1
                  #
                  radius-server template rd1
                   radius-server shared-key cipher %#%#s@<60z+%'"EJI#4KOij5M)"m&9%"k:63Vl+xTc"K%#%#
                   radius-server authentication 192.168.2.30 1812 weight 80
                   radius-server accounting 192.168.2.30 1813 weight 80
                  #
                  acl number 3000
                   rule 5 permit ip destination 192.168.100.0 0.0.0.255
                  #
                  ip pool pool1
                   gateway-list 192.168.1.1
                   network 192.168.1.0 mask 255.255.255.0
                  #
                  aaa
                   authentication-scheme auth
                    authentication-mode radius
                   accounting-scheme abc
                    accounting-mode radius
                   domain isp1
                    authentication-scheme auth
                    accounting-scheme abc
                    radius-server rd1
                    statistic enable
                  #
                  interface Vlanif10
                   pppoe-server bind Virtual-Template 1
                  #
                  interface Vlanif20
                   ip address 192.168.2.29 255.255.255.0
                  #
                  interface Ethernet2/0/0
                   port link-type trunk
                   undo port trunk allow-pass vlan 1
                   port trunk allow-pass vlan 10
                  #
                  interface Ethernet2/0/1