Got it

Huawei - Cisco (802.1x Function)

Latest reply: Oct 3, 2021 18:56:47 292 13 12 0 0

Hello everyone! 


Today, I would like to bring you a 802.1x authentication function comparison between Huawei's vs. Cisco.

Even though our intranet system is down, we still need protection and security!

In my scenario, a user with invalid username and password will be banned from entering the system!

Those with a valid username and password will be included in the intranet system with permission!

Prerequisites:

IP routing between Switch and Radius Server is normal

Radius authentication function working on Switch is normal


Let's work together on the CLI screen one by one!


Huawei command                                                                                           Cisco command

                                        Globally enable 802.1x authentication function                                                           

<Quidway>system-view                                                                             Cisco# configure terminal                               

Enter system view, return user view with Ctrl+Z.

[Quidway] dot1x                                                                                         Cisco(config)# dot1x system-auth-control

Specify the port connected to the client that is to be enabled for 802.1x authentication

[Quidway] interface GigabitEthernet1/0/1                                            Cisco(config)# interface GigabitEthernet1/0/1

[Quidway-GigabitEthernet1/0/1] port link-type access                       Cisco(config-if)# switchport mode access
[Quidway-GigabitEthernet1/0/1] dot1x                                                 Cisco(config-if)# dot1x port-control auto
[Quidway-GigabitEthernet1/0/1] quit                                                    Cisco(config-if)# exit
Configure 802.1x authentication method as radius (commonly the domain default used to authenticate the access user)
[Quidway-aaa] authentication-scheme default                                    Cisco(config)# aaa new-model
[Quidway-aaa-authen-default] authentication-mode radius             Cisco(config)# aaa authentication dot1x default group radius-
[Quidway-aaa-authen-default] quit
[Quidway-aaa] accounting-scheme default

[Quidway-aaa-accounting-default] accounting-mode radius

Configuration complete

Now we save our configuration.

Huawei command                                                                                           Cisco command

[Quidway-aaa-accounting-default]quit                                                        Cisco(config)#exit

[Quidway-aaa] quit                                                                                          Cisco#write-memory

[Quidway] quit                                                                                                  Cisco#end

<Quidway>save

The current configuration will be written to the device.

Are you sure to continue?[Y/N]y

Now saving the current configuration to the slot 0...

Save the configuration successfully.

<Quidway>

that's it!


Thanks!

The post is synchronized to: Author group

Good!
Thanks for sharing.
View more
  • x
  • convention:

Great share!
View more
  • x
  • convention:

Good comparison. thanks for sharing.
View more
  • x
  • convention:

Interesting content, well done.
View more
  • x
  • convention:

Great topic share on 802.1x authentication function comparison between Huawei's vs. Cisco.
View more
  • x
  • convention:

Nice post. Keep up the good work!
View more
  • x
  • convention:

gzzz
Admin Created Sep 28, 2021 15:10:48

good.
View more
  • x
  • convention:

BAZ
MVE Author Created Sep 28, 2021 17:39:37

Great comparison
View more
  • x
  • convention:

Nice post. Keep up the good work!
View more
  • x
  • convention:

12
Back to list

Comment

You need to log in to comment to the post Login | Register

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.