H3C S9500 Command Manual-Release1648[v1.24]-07 Security Volume

HomeSupportSwitchesH3C S9500 Series SwitchesReference GuidesCommand ReferencesH3C S9500 Command Manual-Release1648[v1.24]-07 Security Volume
03-AAA RADIUS HWTACACS Commands
Title Size Download
03-AAA RADIUS HWTACACS Commands 308.69 KB

Table of Contents

Chapter 1 AAA, RADIUS, and HWTACACS Protocol Configuration Commands. 1-1

1.1 AAA Configuration Commands. 1-1

1.1.1 access-limit 1-1

1.1.2 accounting optional 1-2

1.1.3 attribute. 1-2

1.1.4 cut connection. 1-4

1.1.5 display connection. 1-5

1.1.6 display domain. 1-7

1.1.7 display local-user 1-8

1.1.8 domain. 1-10

1.1.9 idle-cut 1-11

1.1.10 ip pool 1-12

1.1.11 level 1-13

1.1.12 local-user 1-14

1.1.13 local-user password-display-mode. 1-14

1.1.14 name. 1-15

1.1.15 password. 1-16

1.1.16 scheme. 1-17

1.1.17 radius-scheme. 1-18

1.1.18 self-service-url 1-19

1.1.19 service-type. 1-20

1.1.20 state. 1-21

1.1.21 vlan-assignment-mode. 1-22

1.2 RADIUS Protocol Configuration Commands. 1-23

1.2.1 accounting optional 1-23

1.2.2 data-flow-format 1-24

1.2.3 debugging radius. 1-25

1.2.4 display local-server 1-26

1.2.5 display radius. 1-26

1.2.6 display radius nas-ip. 1-28

1.2.7 display radius statistics. 1-29

1.2.8 display stop-accounting-buffer 1-31

1.2.9 key. 1-32

1.2.10 local-server 1-33

1.2.11 local-server nas-ip. 1-34

1.2.12 nas-ip. 1-35

1.2.13 primary accounting. 1-35

1.2.14 primary authentication. 1-36

1.2.15 radius client 1-37

1.2.16 radius nas-ip. 1-38

1.2.17 radius scheme. 1-39

1.2.18 reset radius statistics. 1-40

1.2.19 reset stop-accounting-buffer 1-40

1.2.20 retry. 1-42

1.2.21 retry realtime-accounting. 1-42

1.2.22 retry stop-accounting. 1-43

1.2.23 secondary accounting. 1-44

1.2.24 secondary authentication. 1-45

1.2.25 security-policy-server 1-46

1.2.26 server-type. 1-46

1.2.27 state. 1-47

1.2.28 stop-accounting-buffer enable. 1-49

1.2.29 timer quiet 1-49

1.2.30 timer realtime-accounting. 1-50

1.2.31 timer response-timeout 1-51

1.2.32 user-name-format 1-52

1.2.33 vpn-instance. 1-53

1.3 HWTACACS Configuration Commands. 1-54

1.3.1 data-flow-format 1-54

1.3.2 debugging hwtacacs. 1-55

1.3.3 display hwtacacs. 1-55

1.3.4 display stop-accounting-buffer hwtacacs-scheme. 1-56

1.3.5 hwtacacs nas-ip. 1-57

1.3.6 hwtacacs scheme. 1-58

1.3.7 key. 1-59

1.3.8 nas-ip. 1-59

1.3.9 primary accounting. 1-60

1.3.10 primary authentication. 1-61

1.3.11 primary authorization. 1-62

1.3.12 reset hwtacacs statistics. 1-63

1.3.13 reset stop-accounting-buffer 1-63

1.3.14 retry stop-accounting. 1-64

1.3.15 secondary accounting. 1-65

1.3.16 secondary authentication. 1-66

1.3.17 secondary authorization. 1-66

1.3.18 timer quiet 1-67

1.3.19 timer realtime-accounting. 1-68

1.3.20 timer response-timeout 1-69

1.3.21 user-name-format 1-70

 


Chapter 1  AAA, RADIUS, and HWTACACS Protocol Configuration Commands

1.1  AAA Configuration Commands

1.1.1  access-limit

Syntax

access-limit { disable | enable max-user-number }

undo access-limit

View

ISP domain view

Parameters

disable: No limit to the supplicant number in the current ISP domain.

enable max-user-number: Specifies the maximum supplicant number in the current ISP domain, ranging from 1 to 2,312.

Description

Use the access-limit command to configure a limit to the amount of supplicants in the current ISP domain.

Use the undo access-limit command to restore the limit to the default setting.

By default, there is no limit to the amount of supplicants in the current ISP domain.

This command limits the amount of supplicants contained in the current ISP domain. The supplicants may contend with each other for the network resources. So setting a suitable limit to the amount will guarantee the reliable performance for the existing supplicants.

Examples

# Set a limit of 500 supplicants for the ISP domain, H3C163.net.

<H3C> system-view

System View: return to User View with Ctrl+Z.

[H3C] domain H3C163.net

New Domain added.

[H3C-isp-H3C163.net]

[H3C-isp-H3C163.net] access-limit enable 500

1.1.2  accounting optional

Syntax

accounting optional

undo accounting optional

View

ISP domain view

Parameters

None

Description

Use the accounting optional command to enable accounting to be optional.

Use the undo accounting optional command to disable accounting to be optional.

By default, accounting is not optional. By executing the accounting optional command, you can enable users to utilize the network resources even when no accounting server is available or the switch fails to communicate with the accounting server. Users are denied if you do not execute this command under the same circumstance. This command is used when you want the server to authenticate without charging.

Examples

# Enable accounting option for domain user named H3C163.net.

<H3C> system-view

System View: return to User View with Ctrl+Z.

[H3C] domain H3C163.net

[H3C-isp-H3C163.net] accounting optional

1.1.3  attribute

Syntax

attribute { ip ip-address | mac mac-address | idle-cut second | access-limit max-user-number | vlan vlanid | location { nas-ip ip-address port portnum | port portnum } }*

undo attribute { ip | mac | idle-cut | access-limit | vlan | location }*

View

Local user view

Parameters

ip: Specifies the IP address of a user.

mac mac-address: Specifies the MAC address of a user. Where, mac-address takes on the hexadecimal format of X-X-X.

idle-cut second: Allows/Disallows the local users to enable the idle-cut function. (The specific data for this function depends on the configuration of the ISP domain where the users locate.) The argument minute defines the idle-cut time, which is in the range of 60 to 7,200 seconds.

access-limit max-user-number: Specifies the maximum number who access the device by using the current user name. The argument max-user-number is in the range of 1 to 2048.

vlan vlanid: Sets the VLAN attribute of user, in other words, the VLAN to which a user belong. The argument vlanid is an integer in the range of 1 to 4094.

location: Sets the port binding attribute of user.

nas-ip ip-address: IP address of the access server in the event of binding a remote port with a user. The argument ip-address is an IP address in dotted decimal format and defaults to 127.0.0.1 (which represents the local machine).

port portnum: Sets the port with which a user is bound. The argument portnum is represented by “SlotNumber SubSlotNumber PortNumber”. If the bound port has no SubSlotNumber, the value 0 can be used as the SubSlotNumber.

 

&  Note:

When you are setting a port with which you are bound, this setting takes effect only when the slot number, the subslot number and the port number exist.

 

Description

Use the attribute command to configure some attributes for specified local user.

Use the undo attribute command to cancel the attributes that have been defined for this local user.

As for attributes of the users that are of local LAN service type, user IP address and MAC address attribute are valid only when the ISP domain authentication scheme is a local authentication scheme, or the ISP domain authentication scheme is a RADIUS authentication scheme and the type of the RADIUS scheme is extended.

It should be noted that the argument nas-ip must be defined for a user bound with a remote port, which is unnecessary, however, in the event of a user bound with a local port.

Related commands: display local-user.

 

&  Note:

Among the attribute options in local user view, only access-limit is applicable to telnet and ssh terminal users. Other attributes, such as port binding, VLAN binding and IP binding, are not applicable to terminal users.

 

Examples

# Configure the IP address 10.110.50.1 to the user test1.

<H3C> system-view

System View: return to User View with Ctrl+Z.

[H3C] local-user test1

[H3C-luser-test1] attribute ip 10.110.50.1

1.1.4  cut connection

Syntax

cut connection { all | access-type { dot1x | gcm | mac-authentication } | domain domain-name | interface interface-type interface-number | ip ip-address | mac mac-address | radius-scheme radius-scheme-name | vlan vlanid | ucibindex ucib-index | user-name user-name }

View

System view

Parameters

all : Configures to disconnect all connection.

access-type dot1x: Configures to disconnect the user connections that are of specified access category.

dot1x: Specifies 802.1x users.

gcm: Specifies GCM users.

mac-authentication: Specifies users authenticated by MAC addresses.

domain domain-name: Configures to cut the connection according to ISP domain. domain-name specifies the ISP domain name with a character string not exceeding 24 characters. The specified ISP domain shall have been created.

mac mac-address: Configures to cut the connection of the supplicant whose MAC address is mac-address. The argument mac-address is in the hexadecimal format (x-x-x).

radius-scheme radius-server-name: Configures to cut the connection according to RADIUS scheme name. radius-server-name specifies the RADIUS server name with a character string not exceeding 32 characters.

interface interface-type interface-num: Configures to cut the connection according to the port.

ip ip-address: Configures to cut the connection according to IP address.

vlan vlanid: Configures to cut the connection according to VLAN ID. Here, vlanid ranges from 1 to 4094.

ucibindex ucib-index: Configures to cut the connection according to ucib-index. Here, ucib-index ranges from 0 to 2311.

user-name user-name: Configures to cut the connection according to user name . user-name is the argument specifying the username. It is a character string not exceeding 32 characters, excluding “/”, “:”, “*”, “?”, “<” and “>”. The @ character can only be used once in one username. The pure username (the part before @, namely the user ID) cannot exceed 55 characters.

Description

Use the cut connection command to disconnect a user or a category of users by force.

Related commands: display connection.

Examples

# Cut all the connections in the ISP domain, H3C163.net.

<H3C> system-view

System View: return to User View with Ctrl+Z.

[H3C] cut connection domain H3C163.net

[H3C] cut connection domain H3C163.net

1.1.5  display connection

Syntax

display connection [ access-type { dot1x | gcm } | domain domain-name | hwtacacs-scheme hwtacacs-scheme-name | interface interface-type interface-number | ip ip-address | mac mac-address | radius-scheme radius-scheme-name | vlan vlanid | ucibindex ucib-index | user-name user-name ]

View

Any view

Parameters

access-type dot1x: Configures to display the user connections that are of the specified access category.

dot1x: Specifies 802.1x access mode.

gcm: Specifies GCM access mode.

domain domain-name: Configures to display all the users in an ISP domain. domain-name specifies the ISP domain name with a character string not exceeding 24 characters. The specified ISP domain shall have been created.

hwtacacs-scheme hwtacacs-scheme-name: Displays all the user connections of the hwtacacs scheme named hwtacacs -scheme-name. hwtacacs -scheme-name is a string of no more than 32 characters.

mac mac-address: Configures to display the supplicant whose MAC address is mac-address. The argument mac-address is in the hexadecimal format (x-x-x).

radius-scheme radius-server-name: Configures to display the supplicant according to RADIUS server name. radius-server-name specifies the RADIUS server name with a character string not exceeding 32 characters.

interface interface-type interface-number: Configures to display the supplicant according the port.

ip ip-address: Configures to display the user specified with IP address.

vlan vlanid: Configures to display the user specified with VLAN ID. Here, vlanid ranges from 1 to 4094.

ucibindex ucib-index: Configures to display the user specified with ucib-index. Here, ucib-index ranges from 0 to 2311.

user-name user-name: Configures to display a user specifies with user-name. user-name is the argument specifying the username. It is a character string not exceeding 32 characters, excluding “/”, “:”, “*”, “?”, “<” and “>”. The @ character can only be used once in one username. The pure username (the part before @, namely the user ID) cannot exceed 24 characters.

Description

Use the display connection command to view the relevant information of all the supplicants or the specified one(s). The output can help you with the user connection diagnosis and troubleshooting.

If no parameter is specified, this command displays the related information about all connected users.

Related commands: cut connection.

Examples

# Display the relevant information of all the users.

<H3C> display connection

Total 0 connections matched ,0 listed.

1.1.6  display domain

Syntax

display domain [ isp-name ]

View

Any view

Parameters

isp-name: Specifies the ISP domain name, with a character string not exceeding 24 characters. The specified ISP domain shall have been created.

Description

Use the display domain command to view the configuration of a specified ISP domain or display the summary information of all ISP domains.

By default, this command displays the summary information about all the ISP domains in the system.

This command is used to output the configuration of a specified ISP domain or display the summary information of all ISP domains. If an ISP domain is specified, the configuration information will be displayed exactly the same, concerning the content and format, as the displayed information of the display domain command. The output information can help with ISP domain diagnosis and troubleshooting.

Related commands: access-limit, domain, radius-scheme, state, display domain.

Examples

# Display the summary information of all ISP domains of the system.

<H3C> display domain

0  Domain = system

   State = Active

   Scheme = LOCAL

   Access-limit = Disable

   Vlan-assignment-mode = Integer

   Accounting required

   Accounting-mode = Time

   Domain User Template:

   Idle-cut = Disable

   Self-service = Disable

Default Domain Name: system

Total 1 domain(s).1 listed.

1.1.7  display local-user

Syntax

display local-user [ domain isp-name | idle-cut { enable | disable } | service-type { ftp | lan-access | ppp | ssh | telnet | terminal } | state { active | block } | user-name user-name | vlan vlanid ]

View

Any view

Parameters

domain isp-name: Configures to display all the local users in the specified ISP domain. isp-name specifies the ISP domain name with a character string not exceeding 24 characters. The specified ISP domain shall have been created.

idle-cut: Configures to display the local users according to the state of idle-cut function. disable means that the user disables the idle-cut function and enable means the user enables the function. This parameter only takes effect on the users configured as Lan-access type. For other types of users, the display local-user idle-cut enable and display local-user idle-cut disable commands will not display any information.

service-type: Configures to display local user of a specified type.

ftp means that the specified user type is FTP.

lan-access means that the specified user type is Lan-access which mainly refers to Ethernet accessing users, 802.1x supplicants for example.

ppp: Specifies PPP users.

ssh: Specifies SSH users.

telnet: Specifies Telnet users.

terminal: Specifies terminal users.

state { active | block }: Configures to display the local users in the specified state. active means that the system allows the user requesting network service and block means the system does not allow the user requesting network service.

user-name user-name: Configures to display a local user specified with user-name . user-name is the argument specifying the username. It is a character string not exceeding 32 characters, excluding “/”, “:”, “*”, “?”, “<” and “>”. The @ character can only be used once in one username. The pure username (the part before @, namely the user ID) cannot exceed 55 characters.

vlan vlanid: Configures to display the local users belonged to specified VLAN. vlanid is the integer, ranging from 1 to 4094.

Description

Use the display local-user command to view the relevant information about all the local users or the specified one(s).

The output can help you with the fault diagnosis and troubleshooting related to local user.

By default, this command displays the relevant information about all the local users.

Related commands: local-user.

Examples

# Display the relevant information of all the local users.

<H3C> display local-user

The contents of local user user1:

 State:          Active            ServiceType Mask: None

 Idle Cut:       Disable

 AccessLimit:    Disable           Current AccessNum: 0

 Bind location:  Disable

 Vlan ID:        Disable

 IP address:     Disable

 MAC address:    Disable

 

Total 1 local user(s) Matched,1 listed.

Table 1-1 Description on the fields of the display local-user command

Field

Description

State

State

Service Type Mask

Service type mask

Idle Cut

Idle cut switch

AccessLimit

Limit on the number of access connections

Current AccessNum

Number of current accesses

Bind location

Whether to be bound with port

VLAN ID

VLAN that the user belongs to

IP address

IP address of the user

MAC address

MAC address of the user

 

1.1.8  domain

Syntax

domain { isp-name | default { disable | enable isp-name } }

undo domain isp-name

View

System view

Parameters

isp-name: Specifies an ISP domain name. The name is expressed with a character string not exceeding 24 characters, excluding “/”, “: ”, “*”, “? ”, “<”, and “>”.

default enable isp-name: Enables the default ISP domain specified by isp-name.

default disable: Disables the configuration of the default ISP. Restores the default ISP domain to system.

Description

Use the domain command to configure an ISP domain or enter the view of an existing ISP domain.

Use the undo domain command to cancel a specified ISP domain.

By default, a domain named as system has been created in the system. The attributes of system are all default values.

ISP domain is a group of users belonging to the same ISP. Generally, for a username in the userid@isp-name format, taking [email protected] as an example, the isp-name (that is, H3C163.net) following the @ is the ISP domain name. When H3C Series Switches control user access, as for an ISP user whose username is in userid@isp-name format, the system will take userid part as username for identification and take isp-name part as domain name.

The purpose of introducing ISP domain settings is to support the application environment with several ISP domains. In this case, an access device may have supplicants from different ISP domains. Because the attributes of ISP users, such as username and password structures, service types, may be different, it is necessary to separate them by setting ISP domains. In ISP domain view, you can configure a complete set of exclusive ISP domain attributes for each ISP domain, which includes AAA schemes (RADIUS scheme group applied and so forth.)

For a switch, each supplicant belongs to an ISP domain. The system supports to configure up to 16 ISP domains.

When this command is used, if the specified ISP domain does not exist, the system will create a new ISP domain. All the ISP domains are in the active state when they are created.

Related commands: access-limit, radius-scheme, state, display domain.

Examples

# Create a new ISP domain, H3C163.net, and enters its view.

<H3C> system-view

System View: return to User View with Ctrl+Z.

[H3C] domain H3C163.net

New Domain added.

[H3C-isp-H3C163.net]

1.1.9  idle-cut

Syntax

idle-cut { disable | enable minute flow }

View

ISP domain view

Parameters

disable: means disabling the user to use idle-cut function.

enable: means enabling the user to use idle-cut function.

minute: Specifies the maximum idle time, ranging from 1 to 120 and measured in minutes.

flow: Minimum data traffic, ranging from 1 to 10,240,000 and measured in bytes.

Description

Use the idle-cut command to configure the user template in the current ISP domain.

By default, after an ISP domain is created, this attribute in user template is disable, that is, the user Idle-cut is disabled.

The user template is a set of default user attributes. If a user requesting for the network service does not have some required attributes, the corresponding attributes in the template will be endeavored to him as default ones. The user template of the switch you are using may only provide user Idle-cut settings. After a user is authenticated, if the Idle-cut is configured to enable or disable by neither the user nor the RADIUS server, the user will adopt the Idle-cut state in the template.

Because a user template only works in one ISP domain, it is necessary to configure user template attributes for users from different ISP domain respectively.

Related commands: domain.

Examples

# Enable the user in the current ISP domain, H3C163.net, to use the Idle-cut attribute specified in the user template (that is, enabling the user to use the Idle-cut function). The maximum idle time is 50 minutes and the minimum data traffic is 500 bytes.

[H3C-isp-H3C163.net] idle-cut enable 50 500

1.1.10  ip pool

Syntax

ip pool pool-number low-ip-address [ high-ip-address ]

undo ip pool pool-number

View

System view, ISP domain view

Parameters

pool-number: Address pool number ranging from 0 to 99.

low-ip-address and high-ip-address: Two ends of the IP address pool. The number of IP addresses in an address pool cannot exceed 1024. If you do not provide the high-ip-address argument, then the address pool only contains the one specified by the low-ip-address argument.

Description

Use the ip pool command to create a local IP address pool for PPP users.

Use the undo ip pool command to remove a specified local address pool.

By default, no local IP address pool is created.

After creating an IP address pool in system view, you can use the remote address command to assign IP addresses in it to PPP users.

The IP addresses in an IP address pool created in ISP domain view are mainly for PPP users of the ISP domain. This kind of IP address pools is suitable for ports with many PPP users connected to them and the available IP address these ports provide are not sufficient. For example, a PPPoE-enabled Ethernet port can accommodate up to 4,095 users, but its Virtual Template can have only one IP address pool configured, which contains up to only 1,024 IP addresses. By configuring an ISP domain address pool for the Ethernet port, PPP users of the ISP can obtain their IP addresses from the IP address pool, through which the tension of the port address pool can be eased.

Examples

# Create a local IP address pool ranging from 129.102.0.1 to 129.102.0.10.

<H3C> system-view

System View: return to User View with Ctrl+Z.

[H3C] domain H3C163.net

[H3C-isp-H3C163.net] ip pool 0 129.102.0.1 129.102.0.10

1.1.11  level

Syntax

level level

undo level

View

Local user view

Parameters

level: User priority, an integer ranging from 0 to 3.

Description

Use the level command to set user priority.

Use the undo level command to restore the default user priority.

By default, the user priority is 0.

Related commands: local user.

 

&  Note:

If you specify not to authenticate or to authenticate by passwords, the levels of the commands available to an authenticated user are determined by the priority of the user interface. If a user needs to provide user name and password to pass the authentication, the levels of the commands available to an authenticated user are determined by the priority of the user.

 

Examples

# Set the user priority to 3.

<H3C> system-view

System View: return to User View with Ctrl+Z.

[H3C] local-user test1

[H3C-luser-test1] level 3

1.1.12  local-user

Syntax

local-user { username | password-display-mode { auto | cipher-force } }

undo local-user { username | all [ service-type { ftp | lan-access | telnet | ppp | ssh | terminal } ] | password-display-mode }

View

System view

Parameters

username : Name of the user.

password-display-mode { auto | cipher-force }: Specifies the password display mode. auto means displaying the password in user-specified mode; cipher-force means displaying password in cipher text by force.

all [ service-type { ftp | lan-access | telnet | ppp | ssh | terminal } ]: Deletes all local users or a type of local users. ftp means deleting all local FTP users, lan-access means deleting all local Lan-access users, telnet means deleting all local Telnet users, ppp means deleting all local PPP views, ssh means deleting all local SSH views, and terminal means deleting all the terminals.

Description

Use the local-user command to configure a local user and enter the local user view.

Use the undo local-user command to remove specified local user(s).

By default, the user database of the system is empty. If the client user wants to access FTP Server (S9500 devices) through FTP, this configuration is required.

Related commands: display local-user, service-type.

Examples

# Add a local user named test1.

<H3C> system-view

System View: return to User View with Ctrl+Z.

[H3C] local-user test1

[H3C-luser-test1]

1.1.13  local-user password-display-mode

Syntax

local-user password-display-mode { cipher-force | auto }

undo local-user password-display-mode

View

System view

Parameters

cipher-force: Forced Cipher mode specifies that the passwords of all the accessed users must be displayed in cipher text.

auto: The auto mode specifies that a user is allowed to use the password command to set a password display mode.

Description

Use the local-user password-display-mode command to configure the password display mode of all the accessing users.

Use the undo local-user password-display-mode command to cancel the password display mode that has been set for all the accessing users.

If cipher-force has been adopted, the user efforts of specifying to display passwords in simple text will render useless.

The default password display mode for all the access users is cipher-force.

Related commands: display local-user, password.

Examples

# Force all the accessing users to display passwords in cipher text.

<H3C> system-view

System View: return to User View with Ctrl+Z.

[H3C] local-user password-display-mode cipher-force

1.1.14  name

Syntax

name string

undo name

View

VLAN view

Parameters

string: Name of the delivered VLAN. The name can contain up to 32 characters.

Description

Use the name command to configure the name of a delivered VLAN.

Use the undo name command to remove the name configured for a delivered VLAN.

By default, a delivered VLAN has no name.

The name command works with the function of dynamic VLAN delivering. For information about dynamic VLAN delivering, refer to the vlan-assignment-mode command.

Related commands: dot1x guest-vlan, vlan-assignment-mode.

Examples

# Set the name of VLAN 100 to test.

<H3C> system-view

System View: return to User View with Ctrl+Z.

[H3C] vlan 100

[H3C-vlan100] name test

1.1.15  password

Syntax

password [ simple | cipher ] password

undo password

View

Local user view

Parameters

simple: Specifies to display passwords in simple text.

cipher: Specifies to display passwords in cipher text.

password: Defines a password. For simple mode, the password must be a plain-text string, which can contain up to 63 characters, for example, aabbcc. For cipher mode, the password can be either a plain-text string or cipher-text string, which can contain up to 88 characters.

Description

Use the password command to configure a password display mode for local users.

Use the undo password command to cancel the specified password display mode.

If local-user password-display-mode cipher-force has been adopted, the user efforts of using the password command to set the password display mode to simple text (simple) will render useless.

Related commands: display local-user.

Examples

# Set the user test1 to display the password in simple text, given the password is 20030422.

<H3C> system-view

System View: return to User View with Ctrl+Z.

[H3C] local-user test1

[H3C-luser-test1] password simple 20030422

1.1.16  scheme

Syntax

scheme { radius-scheme radius-scheme-name [ local ] | hwtacacs-scheme hwtacacs-scheme-name [ local ] | local | none }

undo scheme { radius-scheme | hwtacacs-scheme | none }

View

ISP domain view

Parameters

radius-scheme-name: RADIUS scheme name, a string no longer than 32 characters in length.

hwtacacs-scheme-name: HWTACACS scheme name, a string no longer than 32 characters in length.

local: Specifies to use the AAA service provided by the local device.

none: Specifies no specific AAA service, permitting all AAA requests.

Description

Use the scheme command to configure the AAA scheme used in the current ISP domain.

Use the undo scheme command to restore the default domain AAA scheme.

By default, an AAA scheme specifies to perform local authentications.

The scheme command specifies a RADIUS/HWTACACS scheme for the current ISP domain. The specified scheme must be an existing scheme.

If you have configured the radius-scheme radius-scheme-name local or hwtacacs-scheme hwtacacs-scheme-name local command, the local AAA (local) scheme will be used as the secondary AAA scheme which will be used only when the Radius Server or the TACACS Server fails. If you want to use the local or none scheme as the primary AAA scheme, you cannot configure the RADIUS or HWTACACS scheme in the command.

All AAA schemes except for the RADIUS scheme support command line authorization.

Related commands: radius scheme, hwtacacs scheme.

Examples

# With H3C163.net as the current ISP domain, specify to adopt the RADIUS scheme named extended.

<H3C> system-view

System View: return to User View with Ctrl+Z.

[H3C] domain H3C163.net

New Domain added.

[H3C-isp-H3C163.net]

[H3C-isp-H3C163.net] scheme radius-scheme extended

# Specify the ISP domain named test to adopt the scheme named rd, with local authentication as the secondary AAA Scheme.

[H3C-isp-test] scheme radius-scheme rd local

# Specify the ISP domain named test to adopt scheme hwtac, with local as the secondary AAA scheme.

[H3C-isp-test] scheme hwtacacs-scheme hwtac local

1.1.17  radius-scheme

Syntax

radius-scheme radius-scheme-name

View

ISP domain view

Parameters

radius-scheme-name: RADIUS scheme name, a string no longer than 32 characters in length.

Description

Use the radius-scheme command to specify the RADIUS scheme to be referenced by the current ISP domain.

By default, a newly created ISP domain uses local AAA scheme instead of RADIUS scheme.

Note that the specified RADIUS scheme must have been configured by using the scheme command.

Related commands: radius scheme, display radius.

Examples

# Specify the RADIUS scheme test for the current ISP domain H3C163.net to reference.

[H3C-isp-H3C163.net] radius-scheme test

1.1.18  self-service-url

Syntax

self-service-url enable url-string

self-service-url disable

View

ISP domain view

Parameters

url-string: The URL (uniform resource locator) of the Web page on a self-service server. The Web page is used to modify passwords. This argument is a string that is of 1 to 64 characters in length. Do not provide character of “?” in this argument. If an URL contains "?", replace it with "|" when inputting the URL in the command line.

Description

Use the self-service-url enable command to configure self-service server uniform resource locator (URL).

Use the self-service-url disable command to remove the configuration of self-service server URL.

By default, self-service server URL is not configured on a switch.

This command must be incorporated with a RADIUS server (such as a CAMS server) that supports self-service. Self-service means that users can manage their accounts and card numbers by themselves. And a server with the self-service software installed is called a self-service server.

Once this function is enabled on a switch, users can locate the self-service server through the following operations:

l           Select "Change user password" on the 802.1x client.

l           After the client opens the default explorer (IE or NetScape), it locates the specified URL page used to change the user password on the self-service server.

l           Change user password on this page.

The "Change user password" option is available only when the user passes the authentication; otherwise, this option is in grey and unavailable.

Examples

# Specify the URL of the Web page used to change password on the self-service server to be http://10.153.89.94/selfservice/modPasswd1x.jsp|userName.

[H3C] domain system

[H3C-isp-system] self-service-url enable http://10.153.89.94/selfservice/modP

asswd1x.jsp|userName

1.1.19  service-type

Syntax

service-type { ftp [ ftp-directory directory ] | lan-access | ppp [call-number call-number | callback-nocheck | callback-number callback-number ] | ssh [ level level | telnet | terminal ] | telnet [ level level | ssh | terminal ] | terminal [ level level | ssh | telnet ] }

undo service-type { ftp [ ftp-directory directory ] | lan-access | ppp [call-number call-number | callback-nocheck | callback-number callback-number ] | ssh [ level level | telnet | terminal ] | telnet [ level level | ssh | terminal ] | terminal [ level level | ssh | telnet ] }

View

Local user view

Parameters

ftp: Specifies user types as FTP.

ftp-directory directory: Specifies the directory of FTP users, directory is a character string of up to 64 characters.

lan-access: Specifies user type to Lan-access, which mainly refers to Ethernet accessing users, 802.1x supplicants for example.

ppp: Specifies PPP users.

call-number: Sets the phone number of the caller.

callback-nocheck: Specifies nocheck when the Modem calls back.

callback-number: Sets the callback number for callback user.

ssh: Specifies SSH users.

telnet: Specifies user type as Telnet.

level level: Specifies the level of Telnet or SSH users. The argument level is an integer in the range of 0 to 3 and defaults to 0.

terminal: Specifies user type as Terminal.

 

&  Note:

l      When you configure service types telnet, ssh, and terminal, later configuration will overwrite the previous one. In this case, to configure the two or three of them at the same time, you must specify the desired service types in one command at one time.

l      When configuring login path for an FTP user, ensure that the path is available in the standby board. Otherwise, the user may not be able to log in after an active/standby switchover.

 

Description

Use the service-type command to configure a service type for a particular user.

Use the undo service-type command to cancel the specified service type for the user.

Examples

# Set to provide the Lan-access service for the user test1.

[H3C-luser-test1] service-type lan-access

1.1.20  state

Syntax

state { active | block }

View

ISP domain view, Local user view

Parameters

active: Configures the current ISP domain (ISP domain view)/current user (local user view) as being in active state, that is, the system allows the users in the domain (ISP domain view) or the current user (local user view) to request network service.

block: Configures the current ISP domain (ISP domain view)/current user (local user view) as being in block state, that is, the system does not allow the users in the domain (ISP domain view) or the current user (local user view) to request network service.

Description

Use the state command to configure the state of the current ISP domain/ current user.

By default, after an ISP domain is created, it is in the active state (in ISP domain view).

A local user will be active (in local user view) upon its creation.

In ISP domain view, every ISP can either be in Active or Block state. If an ISP domain is configured to be Active, the users in it can request for network service, while in Block state, its users cannot request for any network service, which will not affect the users currently online.

Related commands: domain.

Examples

# Set the current ISP domain H3C163.net to be in the block state. The supplicants in this domain cannot request for the network service.

[H3C-isp-H3C163.net] state block

# Set the user test1 to be in the block state.

[H3C-luser-test1] state block

1.1.21  vlan-assignment-mode

Syntax

vlan-assignment-mode { integer | string }

View

ISP domain view

Parameters

integer: Specify the VLAN delivery mode to be integer.

string: Specify the VLAN delivery mode to be string.

Description

Use the vlan-assignment-mode command to specify the VLAN delivery mode (integer or string).

By default, the integer mode is used, that is, the switch supports the RADIUS server delivering VLAN IDs in integer form.

Dynamic VLAN delivering aims to control the network resources available to a user. With this function enabled, a switch adds the ports connecting to authenticated users to specified VLANs according to the attribute values delivered by the RADIUS server. In actual use, ports are usually set to operate in port-based mode in order to work together with Guest VLAN. A port operating in MAC address-based mode can only have one host connected to it. Currently, the VLAN IDs delivered by RADIUS servers can be of integer or string type.

l           As for a VLAN ID that is of integer type, a switch adds the port to the corresponding VLAN according to the VLAN ID delivered by the RADIUS authentication server. If the VLAN does not exist, the switch creates the VLAN first and then adds the port to the VLAN.

l           As for a VLAN ID that is of string type, a switch compares the VLAN ID delivered by the RADIUS authentication server with the names of the VLANs existing on the switch. If a matching entry is found, the switch adds the port into the corresponding VLAN. Otherwise, the delivery fails and the user fails to pass the authentication.

 

&  Note:

l      When configuring a VLAN delivering mode, keep the mode configured on the switch consistent with the mode configured on the Radius Server.

l      For the string delivery mode, the value range of the VLAN name supported by the switch is 1-32 characters. If the name configured on the Radius Server exceeds 32 characters, the delivery will fail.

l      For the string delivery mode, a string that contains numerals only is first interpreted as a number. That is, if the VLAN name delivered by the RADIUS server contains only numerals (such as “1024”), and the equivalent integer is within the range 1 to 4,094, the switch takes the VLAN name as an integer and add the authenticated port to the VLAN identified by the integer (In this case, the switch will add the port to VLAN 1024). If the equivalent integer is not within the range 1 to 4,094 (such as string “12345”), the RADIUS server fails to deliver the VLAN name; if the all-numeral string contains space, such as “   12    345”, the first block of non-spaced numbers in the string will be converted into its equivalent integer, namely, integer 12 in this example.

l      Hybrid ports and Trunk ports do not support VLAN delivering; only Access ports support VLAN delivering.

 

Related commands: name, dot1x guest-vlan.

Examples

# Specify the dynamic VLAN delivery mode to be string.

[H3C-isp-H3C163.net] vlan-assignment-mode string

1.2  RADIUS Protocol Configuration Commands

1.2.1  accounting optional

Syntax

accounting optional

undo accounting optional

View

RADIUS scheme view

Parameters

None

Description

Use the accounting optional command to enable the RADIUS accounting option.

Use the undo accounting optional command to disable the RADIUS accounting option.

By default, selection of RADIUS accounting option is disabled.

If no RADIUS server is available or if RADIUS accounting server fails when the accounting optional is configured, the user can still use the network resource, otherwise, the user will be disconnected.

The user configured with accounting optional command in RADIUS scheme will no longer send real-time accounting update packet or stop accounting packet.

The accounting optional command in RADIUS scheme view is only effective on the accounting that uses this RADIUS scheme.

Examples

# Enable the selection of RADIUS accounting of the RADIUS scheme named as CAMS.

[H3C-radius-cams] accounting optional

1.2.2  data-flow-format

Syntax

data-flow-format data { byte | giga-byte | kilo-byte | mega-byte } packet { giga-packet | kilo-packet | mega-packet | one-packet }

undo data-flow-format

View

RADIUS scheme view

Parameters

data: Sets data unit.

byte: Sets 'byte' as the unit of data flow.

giga-byte: Sets 'giga-byte' as the unit of data flow.

kilo-byte: Sets 'kilo-byte' as the unit of data flow.

mega-byte: Sets 'mega-byte' as the unit of data flow.

packet: Sets data packet unit.

giga-packet: Sets 'giga-packet' as the unit of packet flow.

kilo-packet: Sets 'kilo-packet' as the unit of packet flow.

mega-packet: Sets 'mega-packet' as the unit of packet flow.

one-packet: Sets 'one-packet' as the unit of packet flow.

Description

Use the data-flow-format command to configure the unit of data flow that send to RADIUS Server.

Use the undo data-flow-format command to restore the unit to the default setting.

By default, the data unit is byte and the data packet unit is one-packet.

Related command, see display radius.

Examples

# Set the unit of data flow that is sent to RADIUS Server test is kilo-byte and the data packet unit is kilo-packet.

[H3C-radius-test] data-flow-format data kilo-byte packet kilo-packet

1.2.3  debugging radius

Syntax

debugging radius packet

undo debugging radius packet

View

User view

Parameters

packet: Enables packet debugging

Description

Use the debugging radius command to enable RADIUS packet debugging.

Use the undo debugging radius command to disable RADIUS packet debugging.

By default, RADIUS packet debugging is disabled.

Examples:

# Enable RADIUS packet debugging.

<H3C> debugging radius packet

1.2.4  display local-server

Syntax

display local-server { statistics | nas-ip }

View

Any view

Parameters

None

Description

Use the display local-server statistics command to view the statistics of local RADIUS scheme.

Use the display local-server nas-ip command to view the Nas-ip that is allowed to access the Local-server.

Related commands: local-server.

Examples

# Display the statistics of local RADIUS scheme.

<H3C> display local-server statistics

The localserver packet statistics:

Receive:                  0           Send:                     0

Discard:                  0           Receive Packet Error:     0

Auth Reveive:             0           Auth Send:                0

Acct Receive:             0           Acct Send:                0

1.2.5  display radius

Syntax

display radius [ radius-server-name ]

View

Any view

Parameters

radius-server-name: Specifies the RADIUS scheme name with a character string not exceeding 32 characters. Display all RADIUS scheme when the parameter is not set.

Description

Use the display radius command to view the configuration information of all RADIUS scheme or a specified one.

By default, this command outputs the configuration information about the specified or all the RADIUS schemes.

Related commands: radius scheme.

Examples

# Display the configuration information of all the RADIUS schemes.

<H3C> display radius

------------------------------------------------------------------

SchemeName  =system                           Index=0    Type=extended

Primary Auth IP  =127.0.0.1       Port=1645   State=active

Primary Acct IP  =127.0.0.1       Port=1646   State=active

Second  Auth IP  =0.0.0.0          Port=1812   State=block

Second  Acct IP  =0.0.0.0          Port=1813   State=block

Auth Server Encryption Key= Not configured

Acct Server Encryption Key= Not configured

TimeOutValue(in second)=3 RetryTimes=3 RealtimeACCT(in minute)=12

Permitted send realtime PKT failed counts       =5

Retry sending times of noresponse acct-stop-PKT =500

Username format                                 =without-domain

Data flow unit                                  =Byte

Packet unit                                     =1

------------------------------------------------------------------

Total 1 RADIUS scheme(s). 1 listed

Table 1-2 Description on the fields of the display radius command

Field

Description

SchemeName

The name of Radius Scheme

Index

The index of Radius Scheme

Type

The type of Radius Scheme

Primary Auth IP/ Port/ State

The IP address of the primary authentication server/the number of the access port/the current state of the server

Primary Acct IP/ Port/ State

The IP address of the primary accounting server/the number of the access port/the current state of the server

Second Auth IP/ Port/ State

The IP address of the secondary authentication server/the number of the access port/the current state of the server

Second Acct IP/ Port/ State

The IP address of the secondary accounting server/the number of the access port/the current state of the server

Auth Server Encryption Key

The login password of the authentication server

Acct Server Encryption Key

The login password of the accounting server

TimeOutValue (seconds)

Response timeout value of the RADIUS server

Retry Times

The maximum transmitting times of RADIUS request packet.

Permitted send realtime PKT failed counts

The maximum times of sending real-time no-response accounting packet

Retry sending times of noresponse acct-stop-PKT

The maximum retry times of buffered no-response accounting stop packet

Username format

The format of the username

Data flow unit

The unit of data flow

Packet unit

The unit of packets

 

1.2.6  display radius nas-ip

Syntax

display radius nas-ip

View

Any view

Parameters

None

Description

Use the display radius nas-ip command to display all the global NAS-IP information configured in system view, including the global NAS-IP information of public network and private network. When the NAS-IP information of global private network is displayed, the name of the VPN which the NAS-IP belongs to is also displayed.

Related commands: radius nas-ip.

Examples

# Display all NAS-IP information.

<H3C> display radius nas-ip

Radius VPN nas-ip:    192.168.1.1   vpn-instance:vpn1

Radius VPN nas-ip:    192.168.2.1   vpn-instance:vpn2

Radius global nas-ip: 192.168.3.1

1.2.7  display radius statistics

Syntax

display radius statistics

View

Any view

Parameters

None

Description

Use the display radius statistics command to display the statistics information of RADIUS packet.

The displayed packet information can help with RADIUS diagnosis and troubleshooting.

Related commands: radius scheme.

Examples

# Display the statistics information of RADIUS packets.

<H3C> display radius statistics

state statistic(total=4120):

DEAD=4120     AuthProc=0        AuthSucc=0

AcctStart=0         RLTSend=0         RLTWait=0

 AcctStop=0          OnLine=0            Stop=0

 StateErr=0

 

Receive and Send packets statistic:

Send PKT total  :0        Receive PKT total:0

RADIUS received packets statistic:

Code= 2,Num=0       ,Err=0

Code= 3,Num=0       ,Err=0

Code= 5,Num=0       ,Err=0

Code=11,Num=0       ,Err=0

Code=22,Num=0       ,Err=0

 

Running statistic:

RADIUS received messages statistic:

Normal auth request             ,Num=0       ,Err=0       ,Succ=0

EAP auth request                ,Num=0       ,Err=0       ,Succ=0

Account request                 ,Num=0       ,Err=0       ,Succ=0

Account off request             ,Num=0       ,Err=0       ,Succ=0

Leaving request                 ,Num=0       ,Err=0       ,Succ=0

PKT auth timeout                ,Num=0       ,Err=0       ,Succ=0

PKT acct_timeout                ,Num=0       ,Err=0       ,Succ=0

Realtime Account                ,Num=2317    ,Err=0       ,Succ=2317

PKT response                    ,Num=0       ,Err=0       ,Succ=0

EAP reauth_request              ,Num=0       ,Err=0       ,Succ=0

PORTAL access                   ,Num=0       ,Err=0       ,Succ=0

Update ack                      ,Num=0       ,Err=0       ,Succ=0

PORTAL access ack               ,Num=0       ,Err=0       ,Succ=0

Session ctrl pkt                ,Num=0       ,Err=0       ,Succ=0

RADIUS send messages statistic:

Normal auth accept              ,Num=0

Normal auth reject              ,Num=0

EAP auth accept                 ,Num=0

EAP auth reject                 ,Num=0

EAP auth replying               ,Num=0

EAP reauth accept               ,Num=0

EAP_reauth_reject               ,Num=0

Account success                 ,Num=0

Account failure                 ,Num=0

Account off ack                 ,Num=0

Update request                  ,Num=0

Leaving ack                     ,Num=0

Cut req                         ,Num=0

RecError_MSG_sum:0        SndMSG_Fail_sum :0

Timer_Err       :0        Alloc_Mem_Err   :0

State Mismatch  :0        Other_Error     :0

 

No-response-acct-stop packet=0

Discarded No-response-acct-stop packet=0

Table 1-3 Description on the fields of the display radius statistics command

Field

Description

state statistic(total=4120)

State statistics (total=2312)

DEAD

Dead state

AuthProc

Processing authentication

AuthSucc

Authentication successful

AcctStart

Starting accounting

RLTSend

Sending real time accounting

RLTWait

Waiting for real time accounting

AcctStop

Stop waiting for accounting

OnLine

Online

Stop

Stop

StateErr

State error

 

1.2.8  display stop-accounting-buffer

Syntax

display stop-accounting-buffer { radius-scheme radius-scheme-name | session-id session-id | time-range start-time stop-time | user-name user-name }

View

Any view

Parameters

radius-scheme radius-server-name: Configures to display the saved stopping accounting requests according to RADIUS scheme name. radius-server-name specifies the RADIUS scheme name with a character string not exceeding 32 characters.

session-id session-id: Configures to display the saved stopping accounting requests according to the Session ID. session-id specifies the Session ID with a character string not exceeding 50 characters.

time-range start-time stop-time: Configures to display the saved stopping accounting requests according to the saving time. start-time specifies the start time of the saving time range and stop-time specifies the stop time of the saving time range. The time is expressed in the format hh:mm:ss-yyyy/mm/dd. When this parameter is specified, all the stopping accounting requests saved in the time range since start-time to stop-time will be displayed.

user-name user-name: Configures to display the saved stopping accounting requests according to the username. User-name specifies the username, a character string not exceeding 32 characters, excluding “/”, “:”, “*”, “?”, “<” and “>”. The @ character can only be used once in one username. The pure username (the part before @, namely the user ID) cannot exceed 24 characters.

Description

Use the display stop-accounting-buffer command to view the stopping accounting requests, which have not been responded and saved in the buffer. You can select to display the packets sent to a certain RADIUS scheme, or display the packets according to user Session ID or username. You may also display the request packets saved during a specified time range. The displayed packet information can help with diagnosis and troubleshooting.

After transmitting the stopping accounting requests, if there is no response from the RADIUS scheme, the switch will save the packet in the buffer and retransmit it for several times, which is set through the retry stop-accounting command.

Related commands: reset stop-accounting-buffer, stop-accounting-buffer enable.

Examples

# Display the stopping accounting requests saved in the system buffer since 0:0:0 to 23:59:59 on August 31, 2006.

<H3C> display stop-accounting-buffer time-range 0:0:0-2006/08/31 23:59:59-2006/08/31

Total find    0 record

1.2.9  key

Syntax

key { accounting | authentication } string

undo key { accounting | authentication }

View

RADIUS scheme view

Parameters

accounting: Configures to set the encryption key for RADIUS accounting packet.

authentication: Configures to set the encryption key for RADIUS authentication/authorization packet.

string: Specifies the key with a character string not exceeding 16 characters. By default, the key is null.

Description

Use the key command to configure encryption key for RADIUS authentication/authorization or accounting packet.

Use the undo key command to restore the default key.

RADIUS client (switch system) and RADIUS scheme use MD5 algorithm to encrypt the exchanged packets. The two ends verify the packet through setting the encryption key. Only when the keys are identical can both ends accept the packets from each other and give responses. So it is necessary to ensure that the key set on the switch and that for the RADIUS scheme are identical. If the authentication/authorization and accounting are performed on two different servers with different encryption keys, you are supposed to set two encryption keys respectively.

Related commands: primary accounting, primary authentication, radius-scheme.

Examples

# Set the authentication/authorization key of the RADIUS scheme test to hello.

[H3C-radius-test] key authentication hello

# Set the accounting packet key of the RADIUS scheme test to ok.

[H3C-radius-test] key accounting ok

1.2.10  local-server

Syntax

local-server enable

undo local-server

View

System view

Parameters

None

Description

Use the local-server enable command to enable the local RADIUS server and enable port 1645 and 1646. You must use this command to enable ports before using local RADIUS servers.

Use the undo local-server command to disable the local RADIUS server. Port 1645 and port 1646 are disabled, and RADIUS servers are unavailable in this case.

By default, local RADIUS servers are enabled, and port 1645 and port 1646 are enabled too.

Examples

# Enable the local RADIUS server.

<H3C> system-view

[H3C] local-server enable

1.2.11  local-server nas-ip

Syntax

local-server nas-ip ip-address key password

undo local-server nas-ip ip-address

View

System view

Parameters

nas-ip ip-address: Sets Nas-IP address of access server. ip-address is expressed in the format of dotted decimal. By default, there is a local server with the NAS-IP address of 127.0.0.1.

key password: Sets password of logon user. password is a character string containing up to 16 characters.

Description

Use the local-server command to configure the parameters of local RADIUS server.

Use the undo local-server command to cancel a local RADIUS server.

RADIUS service, which adopts authentication/authorization/accounting servers to manage users, is widely used in H3C series switches. Besides, local authentication/authorization service is also used in these products and it is called local RADIUS function, i.e. realize basic RADIUS function on the switch.

 

  Caution:

l      When using local RADIUS server function, remember the number of UDP port used for authentication is 1645 and that for accounting is 1646.

l      The password configured by this command must be the same as that of the RADIUS authentication/authorization packet configured by the command key authentication in RADIUS scheme view.

l      When operating as a local RADIUS server, an H3C S9500 Series Routing Switch supports CHAP and PAP authentications but not EAP MD5-challenge authentication.

 

H3C series switches support up to 16 local RADIUS scheme.

Related commands: radius-scheme, state.

Examples

# Set the IP address of local RADIUS scheme to 10.110.1.2 and the password to test.

[H3C] local-server nas-ip 10.110.1.2 key test

1.2.12  nas-ip

Syntax

nas-ip ip-address

undo nas-ip

View

RADIUS scheme view

Parameters

ip-address: Source IP address which is expressed in the format of dotted decimal notation.

Description

Use the nas-ip command to configure the source IP address which NAS switch uses to send RADIUS packets. In this case, all the packets sent to Radius server carry the same source IP address.

Use the undo nas-ip command to undo the configuration.

By specifying the source IP address used in sending Radius packets, you can avoid unreachability of packets back from the server when the physical interface fails. It is recommended to use the Loopback interface address.

By default, the source IP address of packets is the IP address of the VLAN interface to which the port connecting with the server belongs.

Related commands: display radius, radius nas-ip

Examples

# Configure the IP address that NAS (switch) uses to send RADIUS packets as 10.1.1.1.

[H3C] radius scheme test1

[H3C-radius-test1] nas-ip 10.1.1.1

1.2.13  primary accounting

Syntax

primary accounting ip-address [ port-number ]

undo primary accounting

View

RADIUS scheme view

Parameters

ip-address: IP address, in dotted decimal format.

port-number: Specifies UDP port number. ranging from 1 to 65535.

Description

Use the primary accounting command to configure the IP address and port number for the primary accounting server.

Use the undo primary accounting command to restore the default IP address and port number of the primary RADIUS accounting server. By default, the primary accounting server of the RADIUS scheme created by the system, whose name is system, uses IP address of 127.0.0.1 and UDP port of 1646. The primary accounting server of a newly created RADIUS scheme uses IP address of 0.0.0.0 and UDP port of 1813.

After creating a new RADIUS scheme, you need to set the IP address and the UDP port for the RADIUS servers the scheme contains, such as authentication/authorization server and accounting server. Besides, you can set primary and secondary server for each kind of server. Although, in actual use, these settings depend on specific demands, at least one authentication/authorization server and one accounting server is required. Make sure the port settings on the switch about RADIUS service are identical to those on the RADIUS servers.

Related commands: key, radius nas-ip, state.

Examples

# Set the IP address of the primary accounting server of RADIUS scheme test to 10.110.1.2 and the UDP port 1813 to provide RADIUS accounting service.

[H3C-radius-test] primary accounting 10.110.1.2 1813

1.2.14  primary authentication

Syntax

primary authentication ip-address [ port-number ]

undo primary authentication

View

RADIUS scheme view

Parameters

ip-address: IP address, in dotted decimal format.

port-number: Specifies UDP port number. ranging from 1 to 65535.

Description

Use the primary authentication command to configure the IP address and port number for the primary RADIUS authentication/authorization.

Use the undo primary authentication command to restore the default IP address and port number of the primary RADIUS authentication/authorization.

By default, the primary authentication server of the RADIUS scheme created by the system, whose name is system, uses IP address of 127.0.0.1 and UDP port of 1645. The secondary authentication server uses IP address of 0.0.0.0 and UDP port of 1812. The primary and secondary authentication server of a newly created RADIUS scheme uses IP address of 0.0.0.0 and UDP port of 1812.

After creating a RADIUS scheme, you are supposed to set IP addresses and UDP port numbers for the RADIUS servers, including primary/secondary authentication/authorization servers and accounting servers. In real networking environments, the above parameters shall be set according to the specific requirements. However, at least you have to set one authentication/authorization server and an accounting server. Besides, ensure that the RADIUS service port settings on the switch are consistent with the port settings on the RADIUS server.

Related commands: key, radius-scheme, state.

Examples

# Set the IP address of the primary authentication/authorization server of RADIUS scheme test to 10.110.1.1 and the UDP port 1812 to provide RADIUS authentication/authorization service.

[H3C-radius-test] primary authentication 10.110.1.1 1812

1.2.15  radius client

Syntax

radius client enable

undo radius client

View

System view

Parameters

None

Description

Use the radius client enable command to enable the port 1812. To use RADIUS authentication, make sure the port is enabled.

Use the undo radius client to disable the port 1812. You can use this command to disable ports when you do not use RADIUS authentication. The system does not receive (or respond to) UDP packets whose destination port is the port 1812 after the port 1812 is disabled.

The port 1812 is enabled by default.

Currently the RADIUS service of the system adopts the port 1812 as the source port in authentication and accounting packets, so the system cannot receive RADIUS response packets any more if the port 1812 is disabled. Thus, RADIUS service is disabled.

Examples

# Disable the port 1812.

<H3C> system-view

[H3C] undo radius client

1.2.16  radius nas-ip

Syntax

radius nas-ip ip-address [ vpn-instance vpn-instance-name ]

undo radius nas-ip [ vpn-instance vpn-instance-name ]

View

System view

Parameters

ip-address: Source IP address expressed in the format of dotted decimal notation. It must be a legal unicast address.

vpn-instance-name: VPN instance name, which is a string of 1 to 19 characters.

Description

Use the radius nas-ip command to configure the nas-ip of the global public network. Only one public network nas-ip can be configured globally.

Use the radius nas-ip ip-address vpn-instance command to configure the nas-ip of the global private network. Only one nas-ip can be configured for each private network and a maximum of 16 private networks can be configured.

Use the undo radius nas-ip command to cancel the nas-ip configuration for global public network.

Use the undo radius nas-ip vpn-instance command to cancel the nas-ip configuration for a private network.

Related commands: display radius nas-ip.

Examples

# Configure the source IP address that the switch uses to send RADIUS packets as 129.10.10.1.

<H3C> system-view

[H3C] radius nas-ip 129.10.10.1

1.2.17  radius scheme

Syntax

radius scheme radius-server-name

undo radius scheme radius-server-name

View

System view

Parameters

radius-server-name: Specifies the RADIUS scheme name with a character string not exceeding 32 characters.

Description

Use the radius scheme command to configure a RADIUS scheme and enter its view.

Use the undo radius scheme command to delete the specified RADIUS scheme.

By default, RADIUS scheme named as system has been created in the system. The attributes of system are all default values.

RADIUS protocol configuration is performed on a per-RADIUS-scheme basis. Every RADIUS scheme shall at least have the specified IP address and UDP port number of the RADIUS authentication/authorization/accounting server and some necessary parameters exchanged with the RADIUS client end (switch system). So it is necessary to create the RADIUS scheme and enter its view before performing other RADIUS protocol configurations.

A RADIUS scheme can be used by several ISP domains at the same time. You can configure up to 16 RADIUS schemes, including the default scheme named as system.

Although the undo radius scheme command can remove a specified RADIUS scheme, the default one cannot be removed. Note that a scheme currently in use by the online user cannot be removed.

Related commands: display radius, display radius statistics, key, retry realtime-accounting, radius-scheme, reset stop-accounting-buffer, retry, timer realtime-accounting, state, stop-accounting-buffer enable, user-name-format.

Examples

# Create a RADIUS scheme named test and enters its view.

[H3C] radius scheme test

[H3C-radius-test]

1.2.18  reset radius statistics

Syntax

reset radius statistics

View

User view

Parameters

None

Description

Use the reset radius statistics command to clear the statistic information related to the RADIUS protocol.

Related commands: display radius.

Examples

# Clear the RADIUS protocol statistics.

<H3C> reset radius statistics

1.2.19  reset stop-accounting-buffer

Syntax

reset stop-accounting-buffer { radius-scheme radius-scheme-name | session-id session-id | time-range start-time stop-time | user-name user-name }

View

User view

Parameters

radius-scheme radius-server-name: Configures to delete the stopping accounting requests from the buffer according to the specified RADIUS scheme. radius-server-name specifies the RADIUS scheme name with a character string not exceeding 32 characters.

session-id session-id: Configures to delete the stopping accounting requests from the buffer according to the specified session ID. session-id specifies the Session ID with a character string not exceeding 50 characters.

time-range start-time stop-time: Configures to delete the stopping accounting requests from the buffer according to the saving time. Start-time specifies the start time of the saving time range and stop-time specifies the stop time of the saving time range. The time is expressed in the format hh:mm:ss-yyyy/mm/dd. When this parameter is set, all the stopping accounting requests saved since start-time to stop-time will be deleted.

user-name user-name: Configures to delete the stopping accounting requests from the buffer according to the username. User-name specifies the username, a character string not exceeding 32 characters, excluding “/”, “:”, “*”, “?”, “<” and “>”. The @ character can only be used once in one username. The pure username (the part before @, namely the user ID) cannot exceed 24 characters.

Description

Use the reset stop-accounting-buffer command to reset the stopping accounting requests, which are saved in the buffer and have not been responded.

After transmitting the stopping accounting requests, if there is no response from the RADIUS scheme, the switch will save the packet in the buffer and retransmit it for several times, which is set through the retry stop-accounting command.

This command is used to delete the stopping accounting requests from the switch buffer. You can select to delete the packets transmitted to a specified RADIUS scheme, or according to the Session-id or username, or delete the packets transmitted during the specified time-range.

Related commands: display stop-accounting-buffer hwtacacs-scheme, reset stop-accounting-buffer, stop-accounting-buffer enable.

Examples

# Delete the stop-accounting requests saved in the system buffer by the user, [email protected].

<H3C> reset stop-accounting-buffer user-name [email protected]

# Delete the stop-accounting requests saved in the system buffer since 0:0:0 to 23:59:59 on August 31, 2006.

<H3C> reset stop-accounting-buffer time-range 0:0:0-2006/08/31 23:59:59-2006/08/31

1.2.20  retry

Syntax

retry retry-times

undo retry

View

RADIUS scheme view

Parameters

retry-times: Specifies the maximum times of retransmission, ranging from 1 to 20. By default, the value is 3.

Description

Use the retry command to configure retransmission times of RADIUS request packet.

Use the undo retry command to restore the retransmission times to default value.

Because RADIUS protocol uses UDP packets to carry the data, its communication process is not reliable. If the RADIUS server has not responded NAS until timeout, NAS has to retransmit RADIUS request packet. Suppose the maximum retransmission times is N. If the number of accumulative transmissions is more than N-[N/2] but the primary RADIUS server still gives no answer, the NAS will consider that it has lost the communication with the current RADIUS server and then turn to transmit the request to another RADIUS server.

Setting a suitable retry-time according to the network situation can speed up the system response.

Related commands: radius scheme.

Examples

# Set to retransmit the RADIUS request packet no more than 5 times in the RADIUS scheme test.

[H3C-radius-test] retry 5

1.2.21  retry realtime-accounting

Syntax

retry realtime-accounting retry-times

undo retry realtime-accounting

View

RADIUS scheme view

Parameters

retry-times: Specifies the maximum times of real-time accounting request failing to be responded, ranging from 1 to 255. By default, the accounting request can fail to be responded up to 5 times.

Description

Use the retry realtime-accounting command to configure the maximum times of real-time accounting request failing to be responded.

Use the undo retry realtime-accounting command to restore the maximum times of real-time accounting request failing to be responded to the default value.

RADIUS server usually checks if a user is online with timeout timer. If the RADIUS server has not received the real-time accounting packet from NAS, it will consider that there is line or device failure and stop accounting. Accordingly, it is necessary to disconnect the user at NAS end and on RADIUS server synchronously when some unexpected failure occurs. H3C Series Switches support to set maximum times of real-time accounting request failing to be responded. NAS will disconnect the user if it has not received real-time accounting response from RADIUS server for some specified times.

How to calculate the value of count? Suppose RADIUS server connection will timeout in T and the real-time accounting interval of NAS is t, then the integer part of the result from dividing T by t is the value of count. Therefore, when applied, T is suggested the numbers which can be divided exactly by t.

Related commands: radius scheme, timer realtime-accounting.

Examples

# Allow the real-time accounting request failing to be responded for up to 10 times.

[H3C-radius-test] retry realtime-accounting 10

1.2.22  retry stop-accounting

Syntax

retry stop-accounting retry-times

undo retry stop-accounting

View

RADIUS scheme view

Parameters

retry-times: Maximal retransmission times of a buffered stop-accounting request, ranging from 10 to 65535. By default, the value is 500.

Description

Use the retry stop-accounting command to configure the maximal retransmission times after a stop-accounting request is saved into the buffer due to getting no response.

Use the undo retry stop-accounting command to restore the retransmission times to the default value.

Because the stopping accounting request concerns account balance and will affect the amount of charge, which is very important for both the user and ISP, NAS shall make its best effort to send the message to RADIUS accounting server. Accordingly, if the message from the switch to RADIUS accounting server has not been responded, the switch shall save it in the local buffer and retransmit it until the server responds or discard the messages after transmitting for specified times.

Related commands: display stop-accounting-buffer hwtacacs scheme, radius scheme, reset stop-accounting-buffer,.

Examples

#Perform the following configuration such that the switch can retransmit a buffered stop-accounting request to the server configured for the RADIUS scheme test for up to 1000 times

[H3C-radius-test] retry stop-accounting 1000

1.2.23  secondary accounting

Syntax

secondary accounting ip-address [ port-number ]

undo secondary accounting

View

RADIUS scheme view

Parameters

ip-address: IP address, in dotted decimal format. By default, the IP address of secondary accounting server is at 0.0.0.0.

port-number: Specifies the UDP port number, ranging from 1 to 65535. By default, the accounting service is provided via UDP 1813.

Description

Use the secondary accounting command to configure the IP address and port number for the secondary RADIUS accounting server.

Use the undo secondary accounting command to restore the IP address and port number to default values.

For detailed information, read the description of the primary accounting command.

Related commands: key, radius scheme, state.

Examples

# Set the IP address of the secondary accounting server of RADIUS scheme test to 10.110.1.1 and the UDP port 1813 to provide RADIUS accounting service.

[H3C-radius-test] secondary accounting 10.110.1.1 1813

1.2.24  secondary authentication

Syntax

secondary authentication ip-address [ port-number ]

undo secondary authentication

View

RADIUS scheme view

Parameters

ip-address: IP address, in dotted decimal format. By default, the IP address of secondary authentication/authorization server is 0.0.0.0.

port-number: Specifies the UDP port number, ranging from 1 to 65535. By default, the authentication/authorization service is provided via UDP 1812.

Description

Use the secondary authentication command to configure the IP address and port number for the secondary RADIUS authentication/authorization server.

Use the undo secondary authentication command to restore the IP address and port number to default values.

For detailed information, read the description of the primary authentication command.

Related commands: key, radius scheme, state.

Examples

# Set the IP address of the secondary authentication/authorization server of RADIUS scheme test, to 10.110.1.2 and the UDP port 1812 to provide RADIUS authentication/authorization service.

[H3C-radius-test] secondary authentication 10.110.1.2 1812

1.2.25  security-policy-server

Syntax

security-policy-server ip-address

undo security-policy-server { ip-address | all }

View

RADIUS scheme view

Parameters

ip-address: IP address of the security policy server.

all: All security policy servers.

Description

Use the security-policy-server command to specify a security policy server.

Use the undo security-policy-server command to remove one or all security policy servers.

By default, no security policy server is specified.

Note that:

l           If more than one VLAN interface of an access device is enabled with Portal, the interfaces may use different security policy servers. You can specify up to eight security policy servers for a RADIUS scheme.

l           The specified security policy server must be a security policy server or RADIUS server that is correctly configured and working normally. Otherwise, the device will regard it as an illegal server.

Related commands: radius nas-ip.

Examples

# For RADIUS scheme test, set the IP address of a security policy server to 10.110.1.2.

[H3C-radius-test] security-policy-server 10.110.1.2

1.2.26  server-type

Syntax

server-type { extended | portal | standard }

undo server-type

View

RADIUS scheme view

Parameters

extended: Configures the switch system to support the extended RADIUS scheme, which requires the RADIUS client (switch system) and RADIUS server to interact according to the private RADIUS protocol regulation and Huawei private packet format.

portal: RADIUS server cooperating with iTellin Portal system.

standard: Configures the switch system to support the RADIUS server of Standard type, which requires the RADIUS client end (switch system) and RADIUS server to interact according to the regulation and packet format of standard RADIUS protocol (RFC 2138/2139 or newer).

Description

Use the server-type command to configure the RADIUS scheme type supported by the switch.

Use the undo server-type command to restore the RADIUS scheme type to the default value.

The default RADIUS server type of a newly created RADIUS scheme is standard. The RADIUS server type of the default RADIUS scheme (with a name of “system”), which is created by the system, is extended

H3C S9500 Series Routing Switches support standard RADIUS protocol and the extended RADIUS service platform IP Hotel, 201+ and Portal independently developed by Huawei. This command is used to select the supported RADIUS scheme type.

Related commands: radius scheme.

Examples

# Set RADIUS scheme type of RADIUS scheme test to extended.

[H3C-radius-test] server-type extended

 

&  Note:

If RADIUS authentication is adopted for FTP user, you need to set server-type to extended in the corresponding RADIUS scheme, so that the extended RADIUS protocol is used. Otherwise, user directory attributes cannot be obtained correctly.

 

1.2.27  state

Syntax

state { primary | secondary } { accounting | authentication } { block | active }

View

RADIUS scheme view

Parameters

primary: Configures to set the state of the primary RADIUS server.

secondary: Configures to set the state of the secondary RADIUS server.

accounting: Configures to set the state of RADIUS accounting server.

authentication: Configures to set the state of RADIUS authentication/authorization.

block: Configures the RADIUS server to be in the state of block.

active: Configures the RADIUS server to be active, namely the normal operation state.

Description

Use the state command to configure the state of RADIUS server.

By default, for the RADIUS scheme named system, which the system creates by default, the primary RADIUS server is in the state of active, and the secondary RADIUS server is in the state of block. For a new RADIUS scheme, the RADIUS server is in the state of block if an IP address is not configured for the server; the RADIUS server is in the state of active if an IP address is configured for the server.

For the primary and secondary servers (no matter an authentication/authorization or an accounting server), if the primary server is disconnected to NAS for some fault, NAS will automatically turn to exchange packets with the secondary server. However, after the primary one recovers, NAS will not resume the communication with it at once, instead, it continues communicating with the secondary one. When the secondary one fails to communicate, NAS will turn to the primary one again. This command is used to set the primary server to be active manually, in order that NAS can communicate with it right after the troubleshooting.

When the primary and secondary servers are all active or block, NAS will send the packets to the primary server firstly. If NAS fails to connect the primary servers, it will send the packets to the secondary server.

Related commands: primary accounting, primary authentication, radius scheme, secondary accounting, secondary authentication.

Examples

# Set the status of the secondary authentication server of RADIUS scheme test to active.

[H3C-radius-test] state secondary authentication active

1.2.28  stop-accounting-buffer enable

Syntax

stop-accounting-buffer enable

undo stop-accounting-buffer enable

View

RADIUS scheme view

Parameters

None

Description

Use the stop-accounting-buffer enable command to configure to save the stopping accounting requests without response in the switch system buffer.

Use the undo stop-accounting-buffer enable command to cancel the function of saving the stopping accounting requests without response in the switch system buffer.

By default, enable to save the stopping accounting requests in the buffer.

Because the stopping accounting request concerns account balance and will affect the amount of charge, which is very important for both the user and ISP, NAS shall make its best effort to send the message to RADIUS accounting server. Accordingly, if the message from the switch to RADIUS accounting server has not been responded, the switch shall save it in the local buffer and retransmit it until the server responds or discard the messages after transmitting for specified times.

Related commands: display stop-accounting-buffer hwtacacs scheme, radius scheme, reset stop-accounting-buffer.

Examples

# Enable the switch to buffer the stop-accounting requests that get no answer from the server configured for the RADIUS scheme test.

[H3C-radius-test] stop-accounting-buffer enable

1.2.29  timer quiet

Syntax

timer quiet minutes

undo timer quiet

View

RADIUS scheme view

Parameters

minutes: The parameter ranges from 1 to 255 in minutes. By default, the primary server waits for 5 minutes before it resumes the Active state.

Description

Use the timer quiet command to configure the time that the primary server takes to resume the Active state.

Use the undo timer quiet command to restore the default configuration.

This command is designed to inhibit the switch from processing user request packets for a period of time when the communication between the switch and the server is interrupted. After the switch has waited for a period of time that is equal to or greater than the time set by this command, it restarts sending user request packets to the server.

Related commands: display radius

Examples

# Set the quiet timer of the primary server to 10 minutes.

[H3C] radius scheme test1

[H3C-radius-test1] timer quiet 10

1.2.30  timer realtime-accounting

Syntax

timer realtime-accounting minute

undo timer realtime-accounting

View

RADIUS scheme view

Parameters

minute: Real-time accounting interval, ranging from 3 to 60 and measured in minutes. It must be a multiple of 3.By default, the value is 12.

Description

Use the timer realtime-accounting command to configure the real-time accounting interval.

Use the undo timer realtime-accounting command to restore the default interval.

To implement real-time accounting, it is necessary to set a real-time accounting interval. After the attribute is set, NAS will transmit the accounting information of online users to the RADIUS server regularly.

The value of minute is related to the performance of NAS and RADIUS server. The smaller the value is, the higher the requirement for NAS and RADIUS server is. When there are a large amount of users (more than 1000, inclusive), we suggest a larger value. The following table recommends the ratio of minute value to number of users.

Table 1-4 Recommended ratio of minute to number of users

Number of users

Real-time accounting interval (in minutes)

1 to 99

3

100 to 499

6

500 to 999

12

≥1000

≥15

 

Related commands: retry realtime-accounting, radius-scheme.

Examples

# Set the real-time accounting interval of RADIUS scheme test to 51 minutes.

[H3C-radius-test] timer realtime-accounting 51

1.2.31  timer response-timeout

Syntax

timer response-timeout seconds

undo timer response-timeout

View

RADIUS scheme view

Parameters

seconds: The value range is 1 to 10 in seconds. The default response timeout value of the RADIUS server is 3 seconds.

Description

Use the timer response-timeout command to set the response-timeout value of RADIUS server.

Use the undo timer response-timeout command to restore the default configuration.

Related commands: display radius.

Examples

# Set the response timeout value of the RADIUS server to 5 seconds.

[H3C] radius scheme test1

[H3C-radius-test1] timer response-timeout 5

 

&  Note:

When a RADIUS server (such as CAMS) uses extended RADIUS protocol to dynamically assign upstream rate to each user, you must use self-defined flow template with the SMAC field on the access ports of users. Otherwise, traffic limit cannot be performed properly for each user.

 

1.2.32  user-name-format

Syntax

user-name-format { with-domain | without-domain }

View

RADIUS scheme view

Parameters

with-domain: Specifies to send the username with domain name to RADIUS server.

without-domain: Specifies to send the username without domain name to RADIUS server.

Description

Use the user-name-format command to configure the username format to be sent to RADIUS server.

By default, as for the newly created RADIUS scheme, the username sent to RADIUS servers includes an ISP domain name; as for the default RADIUS scheme system, the username sent to RADIUS servers excludes the ISP domain name.

The supplicants are generally named in userid@isp-name format. The part following “@” is the ISP domain name. The switch will put the users into certain ISP domains according to the domain names. However, some earlier RADIUS servers reject the username including ISP domain name. In this case, the username will be sent to the RADIUS server after its domain name is removed. Accordingly, the switch provides this command to decide whether the username to be sent to RADIUS server carries ISP domain name or not.

 

&  Note:

If a RADIUS scheme is configured to reject usernames including ISP domain names, the RADIUS scheme shall not be simultaneously used in more than one ISP domains. Otherwise, the RADIUS server will regard two users in different ISP domains as the same user by mistake, if they have the same username (excluding their respective domain names.)

 

Related commands: radius-scheme.

Examples

# Specify that no domain name is taken along with the username to the RADIUS server.

[H3C-radius-test] user-name-format without-domain

1.2.33  vpn-instance

Syntax

vpn-instance vpn-name

undo vpn-instance

View

RADIUS scheme view

Parameters

vpn-name: The name of the VPN instance, which is a string of 1 to 19 characters.

Description

Use the vpn-instance command to configure the VPN that the RADIUS scheme belongs to.

Use the undo vpn-instance command to cancel the VPN configuration.

The VPN in this command must exist and must be assigned with a route distinguisher (RD). One RADIUS scheme can only be bound to one VPN.

 

&  Note:

The nas-ip configured must belong to the VLAN bound to the specified VPN after a VPN is specified by the RADIUS scheme; otherwise the packets cannot be sent. Also pay attention to this point when configuring global RADIUS nas-ip.

 

Related commands: radius-scheme.

Examples

# Specify the VPN to which the RADIUS server belongs in the RADIUS scheme test as vpn1.

[H3C-radius-test] vpn-instance vpn1

1.3  HWTACACS Configuration Commands

1.3.1  data-flow-format

Syntax

data-flow-format { data { byte | giga-byte | kilo-byte | mega-byte } } | { packet { giga-packet | kilo-packet | mega-packet | one-packet } }

undo data-flow-format { data | packet }

View

HWTACACS view

Parameters

data: Sets data unit.

byte: Sets byte as the data unit.

giga-byte: Sets giga-byte as the data unit.

kilo-byte: Sets kilo-byte as the data unit.

mega-byte: Sets mega-byte as the data unit.

packet: Sets packet unit.

giga-packet: Sets giga-packet as the packet unit.

kilo-packet: Sets kilo-packet as the packet unit.

mega-packet: Sets mega-packet as the packet unit.

one-packet: Sets one-packet as the packet unit.

Description

Use the data-flow-format command to configure the units of data flow to TACACS Server.

Use the undo data-flow-format command to restore the default units.

By default, the data unit is byte and the packet unit is one-packet.

Related commands: display hwtacacs.

Examples

# Set the data unit of data flow to TACACS Server test to kilo-byte and the packet unit to kilo-packet.

[H3C-hwtacacs-test] data-flow-format data kilo-byte packet kilo-packet

1.3.2  debugging hwtacacs

Syntax

debugging hwtacacs { all | error | event | message | receive-packet | send-packet }

undo debugging hwtacacs { all | error | event | message | receive-packet | send-packet }

View

User view

Parameters

all: Enables all HWTACACS debugging.

error: Enables error debugging.

event: Enables event debugging.

message: Enables message debugging.

receive-packet: Enables incoming packet debugging.

send-packet: Enables outgoing packet debugging.

Description

Use the debugging hwtacacs command to enable HWTACACS debugging.

Use the undo debugging hwtacacs command to disable HWTACACS debugging.

By default, HWTACACS debugging is disabled.

Examples

# Enable the event debugging of HWTACACS.

<H3C> debugging hwtacacs event

1.3.3  display hwtacacs

Syntax

display hwtacacs [ hwtacacs-scheme-name ]

View

Any view

Parameters

hwtacacs-scheme-name: Scheme name of the HWTACACS server, a string of 1 to 32 case-insensitive characters, excluding "?". If this argument is null, configuration information of all HWTACACS schemes are displayed.

Description

Use the display hwtacacs command to view configuration information of one or all HWTACACS schemes.

By default, configuration information of all HWTACACS schemes is displayed.

Related commands: hwtacacs scheme.

Examples

# Display the configuration information of the HWTACACS scheme gy.

<H3C> display hwtacacs gy

--------------------------------------------------------------------  HWTACACS-server template name   : gy

  Primary-authentication-server   : 172.31.1.11:49

  Primary-authorization-server    : 172.31.1.11:49

  Primary-accounting-server       : 172.31.1.11:49

  Secondary-authentication-server : 0.0.0.0:0

  Secondary-authorization-server  : 0.0.0.0:0

  Secondary-accounting-server     : 0.0.0.0:0

  Current-authentication-server   : 172.31.1.11:49

  Current-authorization-server    : 172.31.1.11:49

  Current-accounting-server       : 172.31.1.11:49

  Source-IP-address               : 0.0.0.0

  key authentication              : 790131

  key authorization               : 790131

  key accounting                  : 790131

  Quiet-interval(min)             : 5

  Response-timeout-Interval(sec)  : 5

  Domain-included                 : No

  Traffic-unit                    : B

  Packet traffic-unit             : one-packet

-------------------------------------------------------------

Total 1,1 printed

1.3.4  display stop-accounting-buffer hwtacacs-scheme

Syntax

display stop-accounting-buffer hwtacacs-scheme hwtacacs-scheme-name

View

Any view

Parameters

hwtacacs-scheme hwtacacs-scheme-name: Displays information on buffered stop-accounting requests related to the HWTACACS scheme specified by hwtacacs-scheme-name, a character string not exceeding 32 characters, excluding “?”.

Description

Use the display stop-accounting-buffer command to display the information on the stop-accounting requests buffered in the switch.

Related commands: reset stop-accounting-buffer, stop-accounting-buffer enable.

Examples

# Display information on the buffered stop-accounting requests related to the HWTACACS scheme test.

<H3C> display stop-accounting-buffer hwtacacs-scheme test

%No accounting stop packet exists.

1.3.5  hwtacacs nas-ip

Syntax

hwtacacs nas-ip ip-address

undo hwtacacs nas-ip

View

System view

Parameters

ip-address: IP address of a specified source, which is that of the local host and cannot be a broadcast address of class A, B or C, a class D address, an all-zero address, or an address begins with 127.

Description

Use the hwtacacs nas-ip command to specify the source address of the HWTACACS packet sent from NAS.

Use the undo hwtacacs nas-ip command to restore the default setting.

By specifying the source address of the HWTACACS packet, you can avoid unreachable packets as returned from the server upon interface failure. The source address is normally recommended to be a loopback interface address.

For the hwtacacs nas-ip command, the HWTACACS view takes precedence over the system view.

By default, the source address is not specified, that is, the address of the interface sending the packet serves as the source address.

This command specifies only one source address; therefore, the newly configured source address may overwrite the original one.

Examples

# Configure the switch to send hwtacacs packets from 129.10.10.1.

[H3C] hwtacacs nas-ip 129.10.10.1

1.3.6  hwtacacs scheme

Syntax

hwtacacs scheme hwtacacs-scheme-name

undo hwtacacs scheme hwtacacs-scheme-name

View

System view

Parameters

hwtacacs-scheme-name: Name of a HWTACACS scheme, a character string not exceeding 32 characters.

Description

Use the hwtacacs scheme command to enter the HWTACACS view. If you specified a nonexistent scheme, a new HWTACACS scheme will be created.

Use the undo hwtacacs scheme command to delete a HWTACACS scheme.

Examples

# Create a HWTACACS scheme named test1 and enter the HWTACACS view.

[H3C] hwtacacs scheme test1

[H3C-hwtacacs-test1]

1.3.7  key

Syntax

key { accounting | authentication | authorization } string

undo key { accounting | authentication | authorization } string

View

HWTACACS view

Parameters

accounting: Shared key of the accounting server.

authentication: Shared key of the authentication server.

authorization: Shared key of the authorization server.

string: Shared key, a string up to 16 characters excluding the characters “?”.

Description

Use the key command to configure a shared key for HWTACACS authentication, authorization or accounting.

Use the undo key command to delete the configuration.

By default, no key is set.

The HWTACACS client (the switch system) and HWTACACS server use MD5 algorithm to encrypt the exchanged packets. The two ends verify packets using a shared key. Only when the same key is used can both ends accept the packets from each other and give responses. So it is necessary to ensure that the same key is set on the switch and the HWTACACS server. If the authentication/authorization and accounting are performed on two server devices with different shared keys, you must set one shared key for each.

Related commands: display hwtacacs.

Examples

# Use hello as the shared key for HWTACACS accounting.

[H3C] hwtacacs scheme test1

[H3C-hwtacacs-test1] key accounting hello

1.3.8  nas-ip

Syntax

nas-ip ip-address

undo nas-ip

View

HWTACACS view

Parameters

ip-address: Source IP address, in dotted decimal format.

Description

Use the nas-ip command to set the source IP address for HWTACACS packets sent from the NAS (switch), such that all the packets sent to the TACACS server carry the same source IP address.

Use the undo nas-ip command to delete the configuration.

Specifying the source address for sending HWTACACS packet avoids the unreachability of packet returned from the server when the physical interface fails. Generally, the Loopback interface address is recommended.

By default, the source IP address of the packets is the IP address of the interface of the VLAN to which the port connecting the server belongs.

Related commands: display hwtacacs, hwtacacs nas-ip.

Examples

# Configure the source IP address for HWTACACS packets sent from the NAS (switch) to 10.1.1.1.

[H3C] hwtacacs scheme test1

[H3C-hwtacacs-test1] nas-ip 10.1.1.1

1.3.9  primary accounting

Syntax

primary accounting ip-address [ port-number ]

undo primary accounting

View

HWTACACS view

Parameters

ip-address: IP address of the server, a valid unicast address in dotted decimal format.

port-number: Port number of the server, which is in the range 1 to 65535 and defaults to 49.

Description

Use the primary accounting command to configure a primary TACACS accounting server.

Use the undo primary accounting command to delete the configured primary TACACS accounting server.

By default, the IP address of the TACACS accounting server is all zeros.

You are not allowed to assign the same IP address to both primary and secondary accounting servers.

If you repeatedly use this command, the latest configuration overwrites the previous one.

You can remove a TACACS scheme accounting server only when no Active TCP connection used to send accounting packets is now using the server, and the removal impacts only packets forwarded afterwards.

Examples

# Configure a primary accounting server.

[H3C] hwtacacs scheme test1

[H3C-hwtacacs-test1] primary accounting 10.163.155.12 49

1.3.10  primary authentication

Syntax

primary authentication ip-address [ port-number ]

undo primary authentication

View

HWTACACS view

Parameters

ip-address: IP address of the server, a valid unicast address in dotted decimal format.

port-number: Port number of the server, which is in the range 1 to 65535 and defaults to 49.

Description

Use the primary authentication command to configure a primary TACACS authentication server.

Use the undo primary authentication command to delete the configured authentication server.

By default, the IP address of the TACACS authentication server is all zeros.

You are not allowed to assign the same IP address to both primary and secondary authentication servers.

If you repeatedly use this command, the latest configuration overwrites the previous one.

You can remove a TACACS scheme authentication server only when no Active TCP connection used to send authentication packets uses the server, and the removal impacts only packets forwarded afterwards.

Related commands: display hwtacacs.

Examples

# Configure a primary authentication server.

[H3C] hwtacacs scheme test1

[H3C-hwtacacs-test1] primary authentication 10.163.155.13 49

1.3.11  primary authorization

Syntax

primary authorization ip-address [ port-number ]

undo primary authorization

View

HWTACACS view

Parameters

ip-address: IP address of the server, a valid unicast address in dotted decimal format.

port-number: Port number of the server, which is in the range 1 to 65535 and defaults to 49.

Description

Use the primary authorization command to configure a primary TACACS authorization server.

Use the undo primary authorization command to delete the configured primary authorization server.

By default, the IP address of the TACACS authorization server is all zeros.

You are not allowed to assign the same IP address to both primary and secondary authorization servers.

If you repeatedly use this command, the latest configuration overwrites the previous one.

You can remove a TACACS scheme authorization server only when no Active TCP connection used to send authorization packets is now using the server, and the removal impacts only packets forwarded afterwards.

Related commands: display hwtacacs.

Examples

# Configure a primary authorization server.

[H3C] hwtacacs scheme test1

[H3C-hwtacacs-test1] primary authorization 10.163.155.13 49

1.3.12  reset hwtacacs statistics

Syntax

reset hwtacacs statistics { accounting | authentication | authorization | all }

View

User view

Parameters

accounting: Clears all the HWTACACS accounting statistics.

authentication: Clears all the HWTACACS authentication statistics.

authorization: Clears all the HWTACACS authorization statistics.

all: Clears all statistics.

Description

Use the reset hwtacacs statistics command to clear HWTACACS protocol statistics.

Related commands: display hwtacacs.

Examples

# Clear all HWTACACS protocol statistics.

<H3C> reset hwtacacs statistics

1.3.13  reset stop-accounting-buffer

Syntax

reset stop-accounting-buffer hwtacacs-scheme hwtacacs-scheme-name

View

User view

Parameters

hwtacacs-scheme hwtacacs-scheme-name: Configures to delete the stop-accounting requests from the buffer according to the specified HWTACACS scheme name. The hwtacacs-scheme-name specifies the HWTACACS scheme name with a character string not exceeding 32 characters, excluding“?”.

Description

Use the reset stop-accounting-buffer command to clear the stop-accounting requests that have no response and are buffered on the switch.

Related commands: display stop-accounting-buffer hwtacacs scheme, stop-accounting-buffer enable, reset stop-accounting-buffer..

Examples

# Delete the buffered stop-accounting requests that are related to the HWTACACS scheme test.

<H3C> reset stop-accounting-buffer hwtacacs-scheme test

1.3.14  retry stop-accounting

Syntax

retry stop-accounting retry-times

undo retry stop-accounting

View

HWTACACS view

Parameters

retry-times: The maximum number of stop-accounting request attempts. It is in the range 1 to 300 and defaults to 100.

Description

Use the retry stop-accounting command to enable stop-accounting packet retransmission and configure the maximum number of stop-accounting request attempts.

Use the undo retry stop-accounting command to restore the default setting.

By default, stop-accounting packet retransmission is enabled and up to 100 packets are allowed to be transmitted for each request.

Related commands: display stop-accounting-buffer hwtacacs scheme, hwtacacs scheme, reset stop-accounting-buffer.

Examples

# Enable stop-accounting packet retransmission and allow up to 50 packets to be transmitted for each request.

[H3C] retry stop-accounting 50

1.3.15  secondary accounting

Syntax

secondary accounting ip-address [ port-number ]

undo secondary accounting

View

HWTACACS view

Parameters

ip-address: IP address of the server, a valid unicast address in dotted decimal format.

port-number: Port number of the server, which is in the range 1 to 65535 and defaults to 49.

Description

Use the secondary accounting command to configure a secondary TACACS accounting server.

Use the undo secondary accounting command to delete the configured secondary TACACS accounting server.

By default, IP address of TACACS accounting server is all zeros.

You are not allowed to assign the same IP address to both primary and secondary accounting servers.

If you repeatedly use this command, the latest configuration overwrites the previous one.

You can remove a TACACS scheme accounting server only when no Active TCP connection used to send accounting packets is now using the server, and the removal impacts only packets forwarded afterwards.

Examples

# Configure a secondary accounting server.

[H3C] hwtacacs scheme test1

[H3C-hwtacacs-test1] secondary accounting 10.163.155.12 49

1.3.16  secondary authentication

Syntax

secondary authentication ip-address [ port-number ]

undo secondary authentication

View

HWTACACS view

Parameters

ip-address: IP address of the server, a valid unicast address in dotted decimal format.

port-number: Port number of the server, which is in the range 1 to 65535 and defaults to 49.

Description

Use the secondary authentication command to configure a secondary TACACS authentication server.

Use the undo secondary authentication command to delete the configured secondary authentication server.

By default, IP address of TACACS authentication server is all zeros.

You are not allowed to assign the same IP address to both primary and secondary authentication servers.

If you repeatedly use this command, the latest configuration overwrites the previous one.

You can remove a TACACS scheme authentication server only when no Active TCP connection used to send authentication packets is now using the server, and the removal impacts only packets forwarded afterwards.

Related commands: display hwtacacs.

Examples

# Configure a secondary authentication server.

[H3C] hwtacacs scheme test1

[H3C-hwtacacs-test1] secondary authentication 10.163.155.13 49

1.3.17  secondary authorization

Syntax

secondary authorization ip-address [ port-number ]

undo secondary authorization

View

HWTACACS view

Parameters

ip-address: IP address of the server, a legal unicast address in dotted decimal format.

port-number: Port number of the server, ranging from 1 to 65535. By default, it is 49.

Description

Use the secondary authorization command to configure a secondary TACACS authorization server.

Use the .undo secondary authorization command to delete the configured secondary authorization server.

By default, IP address of TACACS authorization server is all zeros.

You are not allowed to assign the same IP address to both primary and secondary authorization servers.

If you repeatedly use this command, the latest configuration overwrites the previous one.

You can remove a TACACS scheme authorization server only when no Active TCP connection used to send authorization packets is now using the server, and the removal impacts only packets forwarded afterwards.

Related commands: display hwtacacs.

Examples

# Configure the secondary authorization server.

[H3C] hwtacacs scheme test1

[H3C-hwtacacs-test1] secondary authorization 10.163.155.13 49

1.3.18  timer quiet

Syntax

timer quiet minutes

undo timer quiet

View

HWTACACS view

Parameters

minutes: Ranges from 1 to 255 minutes. By default, the primary server must wait five minutes before it resumes the active state.

Description

Use the timer quiet command to set the waiting time before the primary server resumes the active state.

Use the undo timer quiet command to restore the default configuration.

This command is designed to inhibit the switch from processing user request packets for a time when the communication between the switch and the server is interrupted. After the switch waits for a time that is equal or greater than the time set by this command, it re-attempts to send packets to the server.

Related commands: display hwtacacs.

Examples

# Set the quiet timer for the primary server to 10 minutes.

[H3C] hwtacacs scheme test1

[H3C-hwtacacs-test1] timer quiet 10

1.3.19  timer realtime-accounting

Syntax

timer realtime-accounting minutes

undo timer realtime-accounting

View

HWTACACS view

Parameters

minutes: Real-time accounting interval, which is in the range of 3 to 60 minutes and must be a multiple of 3. By defaults, it is 12 minutes.

Description

Use the timer realtime-accounting command to set the real-time accounting interval.

Use the undo timer realtime-accounting command to restore the default interval.

The setting of real-time accounting interval is necessary for real-time accounting. After an interval is set, the NAS transmits the accounting information of online users to the TACACS accounting server periodically.

The setting of real-time accounting interval somewhat depends on the performance of the NAS and the TACACS server: a shorter interval requires higher device performance. You are therefore recommended to adopt a longer interval when there are a large number of users (more than 1000, inclusive). The following table lists the numbers of users and the recommended intervals.

Table 1-5 Number of users and recommended interval

Number of users

Real-time accounting interval ( in minutes)

1 – 99

3

100 – 499

6

500 – 999

12

¦1000

¦15

 

Examples

# Set the real-time accounting interval of the HWTACACS scheme test to 51 minutes.

[H3C-hwtacacs-test] timer realtime-accounting 51

1.3.20  timer response-timeout

Syntax

timer response-timeout seconds

undo timer response-timeout

View

HWTACACS view

Parameters

seconds: TACACS server response timeout time, which is in the range of 1 to 300 seconds and defaults to 5 seconds.

Description

Use the timer response-timeout command to set the TACACS server response timeout time.

Use the undo timer response-timeout command to restore the default setting.

 

&  Note:

Since HWTACACS is implemented based on TCP, server response timeout or TCP timeout may terminate the connection to the TACACS server.

 

Related commands: display hwtacacs.

Examples

# Set the TACACS server response timeout time to 30 seconds.

[H3C] hwtacacs scheme test1

[H3C-hwtacacs-test1] timer response-timeout 30

1.3.21  user-name-format

Syntax

user-name-format { with-domain | without-domain }

View

HWTACACS view

Parameters

with-domain: Specifies that the domain name is taken along with the username that will be sent to the TACACS server.

without-domain: Specifies that no domain name is taken along with the username that will be sent to the TACACS server.

Description

Use the user-name-format command to set the username format acceptable to the TACACS server.

For a HWTACACS scheme, each username sent to a TACACS server contains a domain name by default.

Username is usually in the “userid@isp-name” format, with the ISP domain name following “@”. The switch uses domain names to group users to different ISP domains. While some earlier TACACS servers do not accept the username with domain name. In this case, you must remove the domain name before sending a username to the server.

 

&  Note:

When you specify that no ISP domain name is contained in usernames for a HWTACACS scheme, this scheme cannot be used in two or more ISP domains at the same time; otherwise, errors may occur because the TACACS server considers users in different ISP domains but with the same name as one user.

 

Related commands: display hwtacacs.

Examples

# Specify that no domain name is taken along with the username to the HWTACACS server.

[H3C-hwtacacs-test] user-name-format without-domain

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网