Operations 6 min read

Configuring Huawei Router to Connect LAN to Internet via ADSL Modem Using PPPoE and RADIUS

This guide details the step‑by‑step configuration of a Huawei router (RouterA) to access the Internet through an ADSL modem using PPPoE client mode, and the setup of a second router (RouterB) as a PPPoE server with RADIUS authentication, including necessary interface, routing, and NAT settings for a small‑business LAN.

Practical DevOps Architecture
Practical DevOps Architecture
Practical DevOps Architecture
Configuring Huawei Router to Connect LAN to Internet via ADSL Modem Using PPPoE and RADIUS

This article presents a practical network configuration example for small‑business environments where a Huawei router (RouterA) connects a LAN to the Internet via an ADSL modem using a permanent PPPoE link, while a second router (RouterB) provides PPPoE server and RADIUS services.

1. Network requirements : LAN hosts access the Internet through RouterA, which uses PPPoE client mode to connect to the DSLAM. The ADSL account credentials are username net1980 and password 123456 . RouterB acts as a PPPoE server on interface atm2/0/0 , offering RADIUS authentication and accounting.

2. Configuration steps for RouterA (PPPoE client) :

[Quidway] dialer-rule 1 ip permit

[Quidway] interface dialer 1

[Quidway-Dialer1] dialer user net1980

[Quidway-Dialer1] dialer-group 1

[Quidway-Dialer1] dialer bundle 1

[Quidway-Dialer1] ip address ppp-negotiate

[Quidway-Dialer1] ppp pap local-user huawei password cipher 123456

[Quidway] interface ethernet 2/0/0

[Quidway-Ethernet2/0/0] pppoe-client dial-bundle-number 1

[Quidway-Ethernet2/0/0] interface ethernet 0/0/0

[Quidway-Ethernet0/0/0] ip address 192.168.1.1 255.255.255.0

[Quidway] ip route-static 0.0.0.0 0 dialer 1

If LAN hosts use private IP addresses, NAT must be configured on the router (configuration omitted for brevity).

3. Configuration steps for RouterB (PPPoE server on ATM interface) :

[RouterA] interface atm2/0/0

[RouterA-Atm1/0/0] pvc 0/32

[RouterA-atm-pvc-Atm1/0/0-0/32] map bridge virtual-ethernet 1

[RouterA-atm-pvc-Atm1/0/0-0/32] quit

[RouterA-Atm1/0/0] interface virtual-ethernet 1

[RouterA-Virtual-Ethernet1] pppoe-server bind virtual-template 1

[RouterA-Virtual-Ethernet1] mac-address 0022-0022-00c1

[router-Virtual-Ethernet1/0/0] interface virtual-template 1

[router-Virtual-Template1] ppp authentication-mode pap domain system

[router-Virtual-Template1] remote address pool 1

[router-Virtual-Template1] ip address 1.1.1.1 255.0.0.0

[router] domain system

[router -isp-domain] scheme radius-scheme cams

[router -isp-domain] ip pool 1 1.1.1.2 1.1.1.10

[Quidway] radius scheme cams

[Quidway-radius-cams] primary authentication 10.110.91.146 1812

[Quidway-radius-cams] primary accounting 10.110.91.146 1813

[Quidway-radius-cams] key authentication expert

[Quidway-radius-cams] key accounting expert

[Quidway-radius-cams] server-type Huawei

[Quidway-radius-cams] user-name-format with-domain

[Quidway-radius-cams] quit

These configurations enable RouterA to obtain Internet connectivity via PPPoE without client software on LAN hosts, and RouterB to provide PPPoE services with centralized RADIUS authentication, suitable for small‑office networks.

Routernetwork configurationHuaweiRADIUSPPPoE
Practical DevOps Architecture
Written by

Practical DevOps Architecture

Hands‑on DevOps operations using Docker, K8s, Jenkins, and Ansible—empowering ops professionals to grow together through sharing, discussion, knowledge consolidation, and continuous improvement.

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.