Configuring Radius - 3Com Switch 4800G 24-Port Configuration Manual

Switch 4800g family 24-port, pwr 24-port, 48-port, pwr 48-port, 24-port sfp
Hide thumbs Also See for Switch 4800G 24-Port:
Table of Contents

Advertisement

Tearing down User
Connections Forcibly

Configuring RADIUS

Creating a RADIUS
Scheme
Specifying the RADIUS
Authentication/Authoriz
ation Servers
The attribute ip command only applies to authentications that support IP
address passing, such as 802.1x. If you configure the command to
authentications that do not support IP address passing, such as MAC address
authentication, the local authentication will fail.
The attribute port command binds a port by its number only, regardless of
the port type.
The idle-cut command configured under ISP view applies to lan-access users
only.
Follow these steps to tear down user connections forcibly:
To do...
Enter system view
Tear down AAA user
connections forcibly
The RADIUS protocol is configured scheme by scheme. After creating a RADIUS
scheme, you need to configure the IP addresses and UDP ports of the RADIUS
servers for the scheme. The servers include authentication/authorization servers
and accounting servers, or from another point of view, primary servers and
secondary servers. In another words, the attributes of a RADIUS scheme mainly
include IP addresses of primary and secondary servers, shared key, and RADIUS
server type.
Actually, the RADIUS protocol configurations only set the parameters necessary for
the information interaction between a NAS and a RADIUS server. For these
settings to take effect, you must reference the RADIUS scheme containing those
settings in ISP domain view. For information about the commands for referencing
a scheme, refer to "Configuring AAA" on page 758.
Before performing other RADIUS configurations, follow these steps to create a
RADIUS scheme and enter RADIUS scheme view:
To do...
Enter system view
Create a RADIUS scheme and
enter RADIUS scheme view
n
A RADIUS scheme can be referenced by more than one ISP domain at the same
time.
Follow these steps to specify the RADIUS authentication/authorization servers:
To do...
Enter system view
Use the command...
system-view
cut connection { access-type { dot1x |
mac-authentication | portal } | all | domain
isp-name | interface interface-type
interface-number | ip ip-address | mac
mac-address | ucibindex ucib-index | user-name
user-name | vlan vlan-id } [ slot slot-number ]
Use the command...
system-view
radius scheme
radius-scheme-name
Use the command...
system-view
Configuring RADIUS
765
Remarks
-
Required
Applies to only
LAN access user
connections at
present.
Remarks
-
Optional
Not defined by default
Remarks
-

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents