188 
[Switch] acl advanced 3001 
[Switch-acl-ipv4-adv-3001] rule permit ip 
[Switch-acl-ipv4-adv-3001] quit 
 
 
NOTE: 
Make sure you specify ACL 3000 as the isolation ACL and ACL 3001 as the security ACL on the 
security policy server. 
 
4.  Configure DHCP relay and authorized ARP: 
# Configure DHCP relay. 
[Switch] dhcp enable 
[Switch] dhcp relay client-information record 
[Switch] interface vlan-interface 100 
[Switch–Vlan-interface100] ip address 20.20.20.1 255.255.255.0 
[Switch–Vlan-interface100] ip address 10.0.0.1 255.255.255.0 sub 
[Switch-Vlan-interface100] dhcp select relay 
[Switch-Vlan-interface100] dhcp relay server-address 192.168.0.112 
# Enable authorized ARP. 
[Switch-Vlan-interface100] arp authorized enable 
[Switch-Vlan-interface100] quit 
5.  Configure portal authentication: 
# Configure a portal authentication server. 
[Switch] portal server newpt 
[Switch-portal-server-newpt] ip 192.168.0.111 key simple portal 
[Switch-portal-server-newpt] port 50100 
[Switch-portal-server-newpt] quit 
# Configure a portal Web server. 
[Switch] portal web-server newpt 
[Switch-portal-websvr-newpt] url http://192.168.0.111:8080/portal 
[Switch-portal-websvr-newpt] quit 
# Enable re-DHCP portal authentication on VLAN-interface 100. 
[Switch] interface vlan-interface 100 
[Switch–Vlan-interface100] portal enable method redhcp 
# Reference the portal Web server newpt on VLAN-interface 100. 
[Switch–Vlan-interface100] portal apply web-server newpt 
# Configure the BAS-IP as 20.20.20.1 for portal packets sent from VLAN-interface 100 to the 
portal authentication server. 
[Switch–Vlan-interface100] portal bas-ip 20.20.20.1 
[Switch–Vlan-interface100] quit 
Verifying the configuration 
# Verify that the portal configuration has taken effect. 
[Switch] display portal interface vlan-interface 100 
 Portal information of Vlan-interface100 
     NAS-ID profile: Not configured 
     Authorization : Strict checking  
     ACL           : Disabled 
     User profile  : Disabled 
 IPv4: