EasyManuals Logo

H3C MSR Series Command Reference

H3C MSR Series
1187 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #188 background imageLoading...
Page #188 background image
165
Parameters
chap: Configures the access device to perform Extensible Authentication Protocol (EAP) termination
and use the Challenge Handshake Authentication Protocol (CHAP) to communicate with the
RADIUS server.
eap: Configures the access device to relay EAP packets, and supports any of the EAP authentication
methods to communicate with the RADIUS server.
pap: Configures the access device to perform EAP termination and use the Password Authentication
Protocol (PAP) to communicate with the RADIUS server.
Usage guidelines
The access device terminates or relays EAP packets.
In EAP termination modeThe access device re-encapsulates and sends the authentication
data from the client in standard RADIUS packets to the RADIUS server. The device performs
either CHAP or PAP authentication with the RADIUS server. In this mode the RADIUS server
supports only MD5-Challenge EAP authentication, and the username and password EAP
authentication initiated by an iNode client.
PAP transports usernames and passwords in plain text. The authentication method applies
to scenarios that do not require high security. To use PAP, the client can be an H3C iNode
802.1X client.
CHAP transports username in plaintext and encrypted password over the network. CHAP is
more secure than PAP.
In EAP relay modeThe access device relays EAP messages between the client and the
RADIUS server. The EAP relay mode supports multiple EAP authentication methods, such as
MD5-Challenge, EAP-TL, and PEAP. To use this mode, make sure the RADIUS server meets
the following requirements:
Supports the EAP-Message and Message-Authenticator attributes.
Uses the same EAP authentication method as the client.
If this mode is used, the user-name-format command configured in RADIUS scheme view
does not take effect. For more information about the user-name-format command, see
"RADIUS commands."
If RADIUS authentication is used, you must configure the access device to use the same
authentication method (PAP, CHAP, or EAP) as the RADIUS server.
Examples
# Enable the access device to terminate EAP packets and perform PAP authentication with the
RADIUS server.
<Sysname> system-view
[Sysname] dot1x authentication-method pap
Related commands
display dot1x
dot1x auth-fail vlan
Use dot1x auth-fail vlan to configure an 802.1X Auth-Fail VLAN on a port.
Use undo dot1x auth-fail vlan to restore the default.
Syntax
dot1x auth-fail vlan authfail-vlan-id
undo dot1x auth-fail vlan

Table of Contents

Other manuals for H3C MSR Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the H3C MSR Series and is the answer not in the manual?

H3C MSR Series Specifications

General IconGeneral
CategoryNetwork Router
IPv6 SupportYes
DimensionsVaries by model
WeightVaries by model
Product TypeModular Router
PortsVaries by model
WAN InterfacesVaries by model
FirewallYes
QoSYes
Wireless SupportVaries by model
USB PortsVaries by model
Console PortYes
Power SupplyVaries by model
RedundancyVaries by model
Operating Temperature0°C to 45°C
Storage Temperature-40°C to 70°C
Humidity5% to 95% non-condensing
SeriesMSR
CertificationsCE, FCC, RoHS

Related product manuals