Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation

Configuring an EX Series Switch to Use Junos Pulse Access Control Service for Network Access Control (CLI Procedure)

You can connect the switch to Junos Pulse Access Control Service to set up a centralized, end-to-end network access control (NAC) system, which allows you to control who is admitted to the network and what resources those users are allowed to access.

The Access Control Service functions both as an authentication server (RADIUS server) and as a centralized policy management server.

Before you begin configuring the switch to connect to the Access Control Service:

Note: Specify the same IP address for the authentication server, the RADIUS server, and the infranet controller (NAC device). These components refer to the same Access Control Service.

To configure the switch to work with the Access Control Service:

  1. Configure the switch to use the Access Control Service for authentication and authorization:
    [edit ethernet-switching-options]
    user@switch# set uac-policy
  2. Configure the access profile to specify the Access Control Service. The access profile contains the authentication and authorization configuration that aids in handling authentication and authorization requests, including the authentication method and sequence, and the Access Control Service address:
    1. Configure radius as the authentication method to be used when attempting to authenticate a user. For each login attempt, the software tries the authentication methods in order, starting with the first one, until the password matches:
      [edit access profile]
      user@switch# set profile-name authentication-order radius
    2. Specify the IP address of the authentication server:

      Note: Specify the same IP address that you use for the RADIUS server and the NAC device.

      [edit access profile]
      user@switch# set profile-name radius authentication-server ip-address
  3. Configure the RADIUS server to use the same IP address that you specified for the authentication server:
    [edit access]
    user@switch# set radius-server ip-address
  4. Configure the password to use for connecting the switch with the RADIUS server:

    Note: The password specified here is used for RADIUS communications between the switch and the Access Control Service. It does not need to match the password that is specified on the Access Control Service through the administrative interface on the Access Control Service.

    [edit access]
    user@switch# set radius-server secret password
  5. Configure the address of the Access Control Service MAG Series or the IC Series NAC device:

    Note: Specify the hostname and IP address of the NAC device. This is the same IP address that you used for specifying the authentication server.

    [edit services united-access-control infranet-controller hostname]
    user@switch# set address ip-address
  6. Configure the switch’s management Ethernet interface for the NAC device:
    [edit services united-access-control infranet-controller hostname]
    user@switch# set interface me0.0
  7. Configure the password for connecting the switch to the Access Control Service NAC device:

    Note: This password must match the password specified on the Access Control Service though its administrative interface. It is used for Junos UAC Enforcer Protocol (JUEP) communications between the switch and the Access Control Service.

    [edit services united-access-control infranet-controller hostname]
    user@switch# set password password
  8. Configure the amount of time that switch waits to receive a response from the Access Control Service:
    [edit services united-access-control]
    user@switch# set timeout seconds
  9. Specify the time between continuity-check messages for the switch’s connection with the Access Control Service:
    [edit services united-access-control]
    user@switch# set interval seconds
  10. Specify an action for the switch to take if a timeout occurs for the connection between the switch and the Access Control Service:
    [edit services united-access-control]
    user@switch# set timeout-action action
  11. Specify the name of the access profile to use for 802.1X, MAC RADIUS, or captive portal authentication:

    Note: Use the same access profile that you configured previously (step 2).

    [edit protocols dot1x]
    user@switch# set authenticator authentication-profile-name profile-name
  12. Configure the 802.1X interface that the switch will use for communicating with the Access Control Service:
    [edit protocols dot1x]
    user@switch# set authenticator interface interface-name

Published: 2012-12-06