#
portal free-rule 0 destination ip x.x.x.x 255.255.255.255
portal free-rule 1 destination ip any tcp 53
portal free-rule 2 destination ip any udp 53
#
portal web-server newpt
url http://x.x.x.x/a79.htm
url-parameter wlanacip value x.x.x.x
url-parameter wlanacname value WX3510X
url-parameter wlanuserip source-address
url-parameter wlanusermac source-mac
#
portal server newpt
ip x.x.x.x key cipher $c$3$wTvKuyMyXot438JnzqVBF6s/Z9aX1hVooU1rzg==
port 2000
server-type cmcc
5、收集debugging portal event和debugging portal packet和debugging radius packet,以及也有配合抓包分析,发现设备已收到REQ_AUTH报文
但是查看debug信息中在req_auth报文后就没后续radius 报文交互了
*Jun 27 17:21:35:555 2022 H3C PORTAL/7/PACKET: Portal received 46 bytes of packet[Type=req_auth(3), ErrCode=0, IP=x.x.x.x].
*Jun 27 17:21:35:555 2022 H3C PORTAL/7/PACKET: Portal original packet:
02 03 01 00 85 77 00 00 ac 11 01 0a 00 00 00 02
d9 90 55 1f d6 cf ac e7 e1 b1 39 8e 30 1f 9e 24
01 09 2c 30 2c 74 65 73 74 02 05 31 32 33
怀疑是两端的portal协议类型不一致导致。设备侧配置的是CMCC,是属于portal1.0,向现场确认后反馈第三方服务器侧用的是portal2.0,所以导致认证失败。