It is recommended to implement the separation of management and data/customer traffic in your Huawei Service Routers (e.g. NE40E Series). Traffic passing through the management plane should be exclusively for management or administrative access purposes only like SSH, SNMP, NTP and AAA. These are the steps on hardening the security on Huawei Routers. Management instance can be configured using these commands: ip vpn-instance STRING<1-31> description TEXT<1-242> ipv4-family Here’s the recommended configuration or practices for these management services. Configure Authentication, Authorization…
Tag: <span>authentication</span>
Configuring Huawei Router to authenticate (also including authorization and accounting) to Tacacs+ server 10.10.10.10 – Tacacs+/ACS/ISE/AAA server#1 10.10.10.11 – Tacacs+/ACS/ISE/AAA server#2 20.20.20.2 – Loopback/source IP Configure the tacacs server profile or template hwtacacs-server template <PROFILENAME> hwtacacs-server authentication <TACACS IP#1> hwtacacs-server authentication <TACACS IP#2> secondary hwtacacs-server authorization <TACACS IP#1> hwtacacs-server authorization <TACACS IP#2> secondary hwtacacs-server accounting <TACACS IP#1> hwtacacs-server accounting <TACACS IP#2> secondary hwtacacs-server source-ip <SOURCE IP> hwtacacs-server shared-key cipher <TACACS KEY> hwtacacs-server user-name original Sample Config: hwtacacs-server template freenetworktutorials …
Leave a Comment