Forgot password?
 Register now

Welcome to use this form to feedback your problems with Ruijie Community

The category of your feedback

Your Feedback

Your Email address (optional):

How to configure 802.1x authentication on Ruijie Switch Reply

GTAC-Daisy

Level 1

How to configure 802.1x authentication on Ruijie Switch
3217 0 2022-5-18 17:09:43
Original
Features
Secure channel: Generally, after 1X authentication is deployed, data packets from unauthenticated user ports are discarded. The secure channel allows user’s access designated websites unauthenticated. It can be deployed to facilitate client distribution, backdoor reservation for leaders and terminals that do not support authentication (for example, printers and all-purpose terminals).
Emergency channel: In an 1X authentication scenario with only one Radius server, all users fail to access the Internet once the Radius server fails, services will be seriously affected. In that case, authentication configuration must be cancelled on all the ports one by one to recover services. If an emergency channel is deployed, the switch allows users access the Internet without authentication when authentication fails multiple times or the Radius server is considered dead.

I. Networking Requirements
1. The 1X function is enabled on the core server for resource access authentication on managed users.
2. Authenticated users can access all resources while unauthenticated users can access only certain Intranet resources.
3. Authentication-free access to intranet resources is enabled for some users (PC2).
4. When the active Radius server fails to function normally, user authentication is switched to the backup Radius server. When both active and standby Radius servers fail, managed users can access resources without authentication (through an emergency channel).

II. Network Topology

III. Configuration Tips
1. On the core server, enable AAA and configure the Radius server and key associated parameters.
2. On the Radius server, configure the related parameters. (In this example, the SAM is used as the Radius server.)
3. Configure a professional ACL to implement server access before user authentication.
4. The core switch, managed users, and the Radius server can be on different network segments, so long as the core switch can properly communicate with the Radius server and the clients can reach the controlled ports on the core switch via the access switch.
5. Configure the parameters for the communication between the switch and the Radius server to deploy an emergency channel.

IV. Configuration Steps
Configure the core server.
1.        Basic dot1x configuration
Ruijie>enable
Ruijie#configure terminal
Ruijie(config)#aaa new-model    ------>trun on aaa switch

Ruijie(config)#radius-server host 192.168.33.244   ------>configure radius server

Ruijie(config)#radius-server host 192.168.33.245   ------>configure backup radius server

Ruijie(config)#radius-server key ruijie      ------>configure radius key

Ruijie(config)#aaa authentication dot1x ruijie group radius  none  ------> Define an IEEE802.1x authentication method list.

Ruijie(config)#aaa accounting network ruijie start-stop group radius   ------> Define the AAA network accounting method list.

Ruijie(config)#aaa accounting update periodic 15   ------> Set the account update function.

Ruijie(config)#dot1x authentication ruijie       ------> 802.1X to select the authentication method list

Ruijie(config)#dot1x accounting ruijie            ------> 802.1X to select the accounting method list

Ruijie(config)#interface gigabitEthernet 1/2
Ruijie(config-if-GigabitEthernet 1/2)#switchport mode trunk
Ruijie(config-if-GigabitEthernet 1/2)#dot1x port-control auto       ------> Enable 802.1X authentication on the interface

Ruijie(config-if-GigabitEthernet 1/2)#ip add 192.168.33.161 255.255.255.0    ------> configure switch ip address

Ruijie(config-if-GigabitEthernet 1/2)#end
Ruijie#write   ------> save configuration


2.        Enable the secure channel function
Ruijie(config)#expert access-list extended ruijie
Ruijie(config-exp-nacl)#permit arp any any any any any  ------>make the ip and arp packets free authentication

Ruijie(config-exp-nacl)#permit ip any any host 192.168.33.61 any ------> To allow access to the home page of the site before authentication

Ruijie(config-exp-nacl)#permit ip any any host 192.168.33.62 any ------> To allow access to the home page of the site before authentication

Ruijie(config-exp-nacl)#permit ip any any host 192.168.33.244 any ------> To allow access to the home page of the site before authentication

Ruijie(config-exp-nacl)#permit host 192.168.33.163 host 001a.a9c4.062f any any------> This host implements authentication free

Ruijie(config-exp-nacl)#exit
Ruijie(config)#security global access-group ruijie

1x free authentication description
There are two ways to achieve user authentication: (1) configure the security channel to put the IP or MAC address; 2, configure the free VLAN authentication will be the corresponding VLAN users free of authentication
Plan 1:Configure security channel,there are three methods:

Method 1:permit host ip address
expert access-list extended no1x
10 permit arp any any  any any any
20  permit ip host 192.168.1.23 any anyany   ------->permit host ip address

security global access-group no1x

method 2:permit host mac address
expert access-list extended no1x
10 permit arp any any  any any any
30 permit ip any host 0010.123c.513d any any   ------->permit hots mac address

security global access-group no1x

method 3:permit ip+mac
expert access-list extended no1x
10 permit arp any any  any any any
40  permit ip host 192.168.1.23 host 0010.123c.513d any any   ------->permit ip and mac address

security global access-group no1x

Plan 2:Configure direct-vlan
Configuration command:direct-vlan 1-20// direct-vlan can take effect on both 1x authentication and web authentication

Notes:
If the secure channel (in priority over 1x authentication) is enabled, user ARP packets must be allowed to pass. In this way, users can communicate with the gateway. As the secure channel has higher priority, the anti ARP spoofing function will become invalid.
Solution: Do not permit all ARP packets. Permit only ARP packets destined for the gateway. In this way, ARP check is implemented and ARP spoofing among users are prevented. However, ARP spoofing is not completely prevented, because users can still spoof another user on the gateway.
Ruijie(config)#expert access-list extended permit1x
Ruijie(config-exp-nacl)#permit ip any any host 192.168.1.254 any          ------> To allow access to the home page of the site before authentication

Ruijie(config-exp-nacl)#permit arp any any any any any   ------> Allow ARP message interaction between a user and a gateway

Ruijie(config)#security global access-group permit1x
Ruijie(config-exp-nacl)#permit arp any any any any host 192.168.33.1

3.      
You can change the time parameter between the switch and the Radius server to switch the authentication method. For example, the configuration "aaa authentication dot1x ruijie group radius none
" indicates that authentication by the active Radius server is implemented first, is switched to the backup Radius server if the active Radius server does not respond in a specified period, and is switched to none authentication mode if both the active and backup Radius servers fail to respond.
Ruijie(config)#radius-server timeout 2       ------> Specify the waiting time before the router resend request (2 s by default)

Ruijie(config)#radius-server retransmit 2   ------> Specify the times of sending requests before the router confirms Radius invalid (3 by default)

Ruijie(config)#radius-server dead-criteria time 6 tries 3     ------>define the dead-criteria time and tries of the server

Ruijie(config)#radius-server deadtime 5    ------> Specify the waiting time before the server is considered dead in case of no response to the request sent by the device (5 minutes by default).

Ruijie(config)#dot1x timeout server-timeout 20  

dot1x timeout indicates the timeout period of 1x authentication. The parameter is independent from the Radius timeout period (radius timeout*). However, radius timeout* (retransmit+1) must be smaller than dot1x timeout server-timeout. Otherwise, the emergency channel does not take effect. In this example, 2*(2+1)=6s, which is smaller than 20s, and therefore, the emergency channel is effective.

V. Verification
1. Before authentication, users can access the resources inside the secure channel, but can not access the resources inside the non secure channel
The same can also be verified, the security channel is free to authenticate users of IP and MAC, the user can also communicate properly.

2、When the radius server hangs, the user can achieve escape function

Check the user info.
4.      
open debug radius event, you can see the entire process of an escape function:
Ruijie#debug radius event
Ruijie#*Mar 16 18:07:20: %7: [radius] aaa req authentication to group radius
*Mar 16 18:07:20: %7:  __rds_add_attr  type = 24 len = 0
*Mar 16 18:07:20: %7: [radius] 16 send
*Mar 16 18:07:20: %7: pkt len 676 code 1 id 16
*Mar 16 18:07:20: %7: calcu msg auth ok
*Mar 16 18:07:20: %7: [radius] radius access requests(12).   ------> sent access-request for the first time

*Mar 16 18:07:22: %7: [radius] user 16 retry
*Mar 16 18:07:22: %7: [radius] 16 send
*Mar 16 18:07:22: %7: pkt len 676 code 1 id 16
*Mar 16 18:07:22: %7: calcu msg auth ok
*Mar 16 18:07:22: %7: [radius] radius access requests retransmissions(18) timeout(18). ------>timeout for the first time after 2 seconds

*Mar 16 18:07:24: %7: [radius] user 16 retry
*Mar 16 18:07:24: %7: [radius] 16 send
*Mar 16 18:07:24: %7: pkt len 676 code 1 id 16
*Mar 16 18:07:24: %7: calcu msg auth ok
*Mar 16 18:07:24: %7: [radius] radius access requests retransmissions(19) timeout(19).   ------> timeout for the second time after 4 seconds

*Mar 16 18:07:26: %7: [radius] user 16 retry
*Mar 16 18:07:26: %7: [rds_user] rds delete user, state 2, atype 0
*Mar 16 18:07:26: %7: [rds_user] rds free user id 7, pkid 16   ------> timeout for the third time after 6 seconds

*Mar 16 18:07:26: %AAA-7-FAILOVER: Failing over from 'dot1x' for client 0021.cccf.6f70 on Interface GigabitEthernet 0/1.
*Mar 16 18:07:26: %7: [radius] aaa req accounting to group radius
*Mar 16 18:07:26: %7: [accounting] acct len 116
*Mar 16 18:07:26: %7:  __rds_add_attr  type = 25 len = 0
*Mar 16 18:07:26: %7: [radius] 17 send
*Mar 16 18:07:26: %7: [radius] radius acc requests(5) and pending(3).
*Mar 16 18:07:28: %7: [radius] user 17 retry
*Mar 16 18:07:28: %7: [radius] 17 send
*Mar 16 18:07:28: %7: [radius] radius acc retransmissions(5) timeout(5).
*Mar 16 18:07:30: %7: [radius] user 17 retry
*Mar 16 18:07:30: %7: [radius] 17 send
*Mar 16 18:07:30: %7: [radius] radius acc retransmissions(6) timeout(6).
*Mar 16 18:07:32: %7: [radius] user 17 retry
*Mar 16 18:07:32: %7: [rds_user] rds delete user, state 2, atype 2
*Mar 16 18:07:32: %7: [rds_user] rds free user id 7, pkid 17
RG-S2910-10GT2SFP-UP-H

There are no replies.
Releated Posts
Product Model

Share this topic to

Cancel

This site contains user submitted content, comments and opinions and is for informational purposes only. Ruijie may provide or recommend responses as a possible solution based on the information provided; every potential issue may involve several factors not detailed in the conversations captured in an electronic forum and Ruijie can therefore provide no guarantee as to the efficacy of any proposed solutions on the community forums. Ruijie disclaims any and all liability for the acts, omissions and conduct of any third parties in connection with or related to your use of the site. All postings and use of the content on this site are subject to the Ruijie Community Terms of Use.

More ways to get help: Visit Support Videos, call us via Service Hotline, Facebook or Live Chat.

©2000-2023 Ruijie Networks Co,Ltd