Operation Manual – AAA & RADIUS & HWTACACS & EAD
Quidway S3900 Series Ethernet Switches-Release 1510 Chapter 2 EAD Configuration
Huawei Technologies Proprietary
2-2
The security client (software installed on PC) checks the security status of a client that
just passes the authentication, and interacts with the security policy server. If the client
is not compliant with the security standard, the security policy server issues ACL control
packets to the switch, which then grants the client to access the virus patch server only.
After the client is patched and compliant with the required security standard, the
security policy server reissues an ACL to the switch to assign the access right to the
client.
2.3 EAD Configuration
The EAD configuration includes the following:
z Configuring the attributes, such as the user name, user type, and password for
access users. If local authentication is performed, you need to configure these
attributes on the switch; if remote authentication is performed, you need to
configure these attributes on AAA sever.
z Configuring RADIUS scheme.
z Configuring IP address for the security policy server.
z Associating domain with RADIUS scheme.
EAD is implemented typically in RADIUS scheme.
This section mainly describes configuration of IP address for the security policy server.
For other related information, refer to
Chapter 1 “AAA & RADIUS & HWTACACS
Configuration”.
Table 2-1 EAD configuration
Operation Command Description
Enter system view
system-view
—
Enter RADIUS scheme
view
radius scheme
radius-scheme-name
—
Configure the RADIUS
server type to huawei
server-type huawei
Required
Configure the IP address
for the security policy
server
security-policy-server
ip-address
Required
Each RADIUS scheme
can support up to 8 IP
addresses of security
policy servers.
2.4 EAD Configuration Example
I. Network requirements
In Figure 2-2: