07-Security Command Reference

HomeSupportReference GuidesCommand ReferencesH3C WX Series Access Controllers Command References(R3308 R2308)-6W10707-Security Command Reference
01-AAA Commands
Title Size Download
01-AAA Commands 560.44 KB

Contents

AAA configuration commands 1

General AAA configuration commands 1

aaa nas-id profile· 1

access-limit enable· 1

accounting command· 2

accounting default 3

accounting lan-access 3

accounting login· 4

accounting optional 5

accounting portal 6

accounting ppp· 7

authentication default 7

authentication lan-access 8

authentication login· 9

authentication portal 10

authentication ppp· 11

authentication super 12

authorization command· 12

authorization default 13

authorization lan-access 14

authorization login· 15

authorization portal 16

authorization ppp· 17

authorization-attribute user-profile· 18

cut connection· 19

display connection· 20

display domain· 22

domain· 24

domain default enable· 25

domain if-unknown· 26

eap-profile· 26

idle-cut enable· 27

ip pool 28

local-server authentication eap-profile· 29

method· 29

user-credentials 30

nas-id bind vlan· 31

self-service-url enable· 32

session-time include-idle-time· 32

ssl-server-policy· 33

state (ISP domain view) 34

Local user configuration commands 34

access-limit 34

authorization-attribute (local user view/user group view) 35

bind-attribute· 37

display local-user 38

display user-group· 40

expiration-date (local user view) 41

group· 42

group-attribute allow-guest 42

local-user 43

local-user password-display-mode· 44

password· 44

service-type· 45

state (local user view) 46

user-group· 47

validity-date· 47

RADIUS configuration commands 48

accounting-on enable· 48

attribute 25 car 49

data-flow-format (RADIUS scheme view) 50

display radius scheme· 50

display radius statistics 53

display stop-accounting-buffer (for RADIUS) 56

eap offload· 57

key (RADIUS scheme view) 58

nas device-id· 59

nas-backup-ip· 60

nas-ip (RADIUS scheme view) 61

primary accounting (RADIUS scheme view) 62

primary authentication (RADIUS scheme view) 64

radius client 66

radius log packet 67

radius nas-backup-ip· 67

radius nas-ip· 68

radius scheme· 69

radius trap· 70

reset radius statistics 70

reset stop-accounting-buffer (for RADIUS) 71

retry· 72

retry realtime-accounting· 72

retry stop-accounting (RADIUS scheme view) 73

secondary accounting (RADIUS scheme view) 74

secondary authentication (RADIUS scheme view) 76

security-policy-server 78

server-type· 79

state primary· 79

state secondary· 80

stop-accounting-buffer enable (RADIUS scheme view) 81

timer quiet (RADIUS scheme view) 82

timer realtime-accounting (RADIUS scheme view) 83

timer response-timeout (RADIUS scheme view) 84

user-name-format (RADIUS scheme view) 84

HWTACACS configuration commands 85

data-flow-format (HWTACACS scheme view) 85

display hwtacacs 86

display stop-accounting-buffer (for HWTACACS) 89

hwtacacs nas-ip· 90

hwtacacs scheme· 91

key (HWTACACS scheme view) 91

nas-ip (HWTACACS scheme view) 92

primary accounting (HWTACACS scheme view) 93

primary authentication (HWTACACS scheme view) 94

primary authorization· 94

reset hwtacacs statistics 95

reset stop-accounting-buffer (for HWTACACS) 96

retry stop-accounting (HWTACACS scheme view) 96

secondary accounting (HWTACACS scheme view) 97

secondary authentication (HWTACACS scheme view) 98

secondary authorization· 98

stop-accounting-buffer enable (HWTACACS scheme view) 99

timer quiet (HWTACACS scheme view) 100

timer realtime-accounting (HWTACACS scheme view) 100

timer response-timeout (HWTACACS scheme view) 101

user-name-format (HWTACACS scheme view) 102

LDAP configuration commands 103

authentication-server 103

authorization-server 103

display ldap scheme· 104

group-parameters 106

ldap scheme· 107

login-dn· 108

login-password· 108

protocol-version· 109

server-timeout 110

server-type· 111

user-parameters 111

 


General AAA configuration commands

aaa nas-id profile

Syntax

aaa nas-id profile profile-name

undo aaa nas-id profile profile-name

View

System view

Default level

2: System level

Parameters

profile-name: Name of the NAS ID profile, a case-insensitive string of 1 to 16 characters.

Description

Use aaa nas-id profile to create a NAS ID profile and enter its view. A NAS ID profile maintains the bindings between NAS IDs and VLANs.

Use undo aaa nas-id profile to remove a NAS ID profile.

Related commands: nas-id bind vlan.

Examples

# Create a NAS ID profile named aaa.

<Sysname> system-view

[Sysname] aaa nas-id profile aaa

[Sysname-nas-id-prof-aaa]

access-limit enable

Syntax

access-limit enable max-user-number

undo access-limit enable

View

ISP domain view

Default level

2: System level

Parameters

max-user-number: Maximum number of users that the ISP domain can accommodate, in the range of 1 to 2147483646.

Description

Use access-limit enable to enable limitation of the number of users in an ISP domain and set the allowed maximum number. After the number of users reaches the allowed maximum number, no more users will be accepted.

Use undo access-limit enable to restore the default.

By default, there is no limit to the number of users in an ISP domain.

System resources are limited, and user connections may compete for network resources when there are many users. Setting a proper limit to the number of users helps provide reliable system performance.

Related commands: display domain.

Examples

# Set a limit of 500 user connections for ISP domain aabbcc.net.

<Sysname> system-view

[Sysname] domain aabbcc.net

[Sysname-isp-aabbcc.net] access-limit enable 500

accounting command

Syntax

accounting command hwtacacs-scheme hwtacacs-scheme-name

undo accounting command

View

ISP domain view

Default level

2: System level

Parameters

hwtacacs-scheme hwtacacs-scheme-name: Specifies an HWTACACS scheme by its name, a case-insensitive string of 1 to 32 characters.

Description

Use accounting command to specify the command line accounting method.

Use undo accounting command to restore the default.

By default, the default accounting method for the ISP domain is used for command line accounting.

The specified HWTACACS scheme must have been configured.

Command line accounting can use only a HWTACACS scheme.

Related commands: accounting default and hwtacacs scheme.

Examples

# Configure ISP domain test to use HWTACACS scheme hwtac for command line accounting.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] accounting command hwtacacs-scheme hwtac

accounting default

Syntax

accounting default { hwtacacs-scheme hwtacacs-scheme-name [ local ] | local | none | radius-scheme radius-scheme-name [ local ] }

undo accounting default

View

ISP domain view

Default level

2: System level

Parameters

hwtacacs-scheme hwtacacs-scheme-name: Specifies an HWTACACS scheme by its name, a case-insensitive string of 1 to 32 characters.

local: Performs local accounting.

none: Does not perform any accounting.

radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters.

Description

Use accounting default to configure the default accounting method for an ISP domain.

Use undo accounting default to restore the default.

By default, the default accounting method of an ISP domain is local.

The specified RADIUS or HWTACACS scheme must have been configured.

The default accounting method will be used for all users for whom no specific accounting methods are configured.

Local accounting is only for monitoring and controlling the number of local user connections; it does not provide the statistics function that the accounting feature generally provides.

Related commands: local-user, hwtacacs scheme, and radius scheme.

Examples

# Configure the default accounting method for ISP domain test to use RADIUS accounting scheme rd and use local accounting as the backup.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] accounting default radius-scheme rd local

accounting lan-access

Syntax

accounting lan-access { local | none | radius-scheme radius-scheme-name [ local | none ] }

undo accounting lan-access

View

ISP domain view

Default level

2: System level

Parameters

local: Performs local accounting.

none: Does not perform any accounting.

radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters.

Description

Use accounting lan-access to configure the accounting method for LAN users.

Use undo accounting lan-access to restore the default.

By default, the default accounting method for the ISP domain is used for LAN users.

The specified RADIUS scheme must have been configured.

Related commands: local-user, accounting default, and radius scheme.

Examples

# Configure ISP domain test to use local accounting for LAN users.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] accounting lan-access local

# Configure ISP domain test to use RADIUS accounting scheme rd for LAN users and use local accounting as the backup.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] accounting lan-access radius-scheme rd local

accounting login

Syntax

accounting login { hwtacacs-scheme hwtacacs-scheme-name [ local ] | local | none | radius-scheme radius-scheme-name [ local ] }

undo accounting login

View

ISP domain view

Default level

2: System level

Parameters

hwtacacs-scheme hwtacacs-scheme-name: Specifies an HWTACACS scheme by its name, a case-insensitive string of 1 to 32 characters.

local: Performs local accounting.

none: Does not perform any accounting.

radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters.

Description

Use accounting login to configure the accounting method for login users (users logging in through the console or AUX port or accessing through Telnet).

Use undo accounting login to restore the default.

By default, the default accounting method for the ISP domain is used for login users.

The specified RADIUS or HWTACACS scheme must have been configured.

Accounting is not supported for login users who use FTP.

Related commands: local-user, accounting default, hwtacacs scheme, and radius scheme.

Examples

# Configure ISP domain test to use local accounting for login users.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] accounting login local

# Configure ISP domain test to use RADIUS accounting scheme rd for login users and use local accounting as the backup.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] accounting login radius-scheme rd local

accounting optional

Syntax

accounting optional

undo accounting optional

View

ISP domain view

Default level

2: System level

Parameters

None

Description

Use accounting optional to enable the accounting optional feature.

Use undo accounting optional to disable the feature.

By default, the feature is disabled.

After you configure the accounting optional command for a domain, a user who would otherwise be disconnected can continue to use the network resources when no accounting server is available or the communication with the current accounting server fails. However, the device no longer sends real-time accounting updates for the user. The accounting optional feature applies to scenarios where accounting is not important.

 

 

NOTE:

After you configure the accounting optional command, the setting configured by the access-limit command in local user view is not effective.

 

Examples

# Enable the accounting optional feature for users in domain test.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] accounting optional

accounting portal

Syntax

accounting portal { local | none | radius-scheme radius-scheme-name [ local ] }

undo accounting portal

View

ISP domain view

Default level

2: System level

Parameters

local: Performs local accounting.

none: Does not perform any accounting.

radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters.

Description

Use accounting portal to configure the accounting method for portal users.

Use undo accounting portal to restore the default.

By default, the default accounting method for the ISP domain is used for portal users.

The specified RADIUS scheme must have been configured.

Related commands: local-user, accounting default, and radius scheme.

Examples

# Configure ISP domain test to use local accounting for portal users.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] accounting portal local

# Configure ISP domain test to use RADIUS scheme rd for accounting on portal users and use local accounting as the backup.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] accounting portal radius-scheme rd local

accounting ppp

Syntax

accounting ppp { hwtacacs-scheme hwtacacs-scheme-name [ local ] | local | none | radius-scheme radius-scheme-name [ local ] }

undo accounting ppp

View

ISP domain view

Default level

2: System level

Parameters

hwtacacs-scheme hwtacacs-scheme-name: Specifies an HWTACACS scheme by its name, a case-insensitive string of 1 to 32 characters.

local: Performs local accounting.

none: Does not perform any accounting.

radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters.

Description

Use accounting ppp to configure the accounting method for PPP users.

Use undo accounting ppp to restore the default.

By default, the default accounting method for the ISP domain is used for PPP users.

The specified RADIUS or HWTACACS scheme must have been configured.

Related commands: local-user, accounting default, hwtacacs scheme, and radius scheme.

Examples

# Configure ISP domain test to use local accounting for PPP users.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] accounting ppp local

# Configure ISP domain test to use RADIUS accounting scheme rd for PPP users and use local accounting as the backup.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] accounting ppp radius-scheme rd local

authentication default

Syntax

authentication default { hwtacacs-scheme hwtacacs-scheme-name [ local ] | ldap-scheme ldap-scheme-name [ local ] | local | none | radius-scheme radius-scheme-name [ local ] }

undo authentication default

View

ISP domain view

Default level

2: System level

Parameters

hwtacacs-scheme hwtacacs-scheme-name: Specifies an HWTACACS scheme by its name, a case-insensitive string of 1 to 32 characters.

ldap-scheme ldap-scheme-name: Specifies an LDAP scheme by its name, a case-insensitive string of 1 to 32 characters.

local: Performs local authentication.

none: Does not perform any authentication.

radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters.

Description

Use authentication default to configure the default authentication method for an ISP domain.

Use undo authentication default to restore the default.

By default, the default authentication method of an ISP domain is local.

The specified RADIUS, HWTACACS, or LDAP scheme must have been configured.

The default authentication method will be used for all users for whom no specific authentication methods are configured.

Related commands: local-user, hwtacacs scheme, radius scheme, and ldap scheme.

Examples

# Configure the default authentication method for ISP domain test to use RADIUS authentication scheme rd and use local authentication as the backup.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authentication default radius-scheme rd local

authentication lan-access

Syntax

authentication lan-access { local | none | radius-scheme radius-scheme-name [ local | none ] }

undo authentication lan-access

View

ISP domain view

Default level

2: System level

Parameters

local: Performs local authentication.

none: Does not perform any authentication.

radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters.

Description

Use authentication lan-access to configure the authentication method for LAN users.

Use undo authentication lan-access to restore the default.

By default, the default authentication method for the ISP domain is used for LAN users.

The specified RADIUS scheme must have been configured.

Related commands: local-user, authentication default, and radius scheme.

Examples

# Configure ISP domain test to use local authentication for LAN users.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authentication lan-access local

# Configure ISP domain test to use RADIUS authentication scheme rd for LAN users and use local authentication as the backup.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authentication lan-access radius-scheme rd local

authentication login

Syntax

authentication login { hwtacacs-scheme hwtacacs-scheme-name [ local ] | ldap-scheme ldap-scheme-name [ local ] | local | none | radius-scheme radius-scheme-name [ local ] }

undo authentication login

View

ISP domain view

Default level

2: System level

Parameters

hwtacacs-scheme hwtacacs-scheme-name: Specifies an HWTACACS scheme by its name, a case-insensitive string of 1 to 32 characters.

ldap-scheme ldap-scheme-name: Specifies an LDAP scheme by its name, a case-insensitive string of 1 to 32 characters.

local: Performs local authentication.

none: Does not perform any authentication.

radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters.

Description

Use authentication login to configure the authentication method for login users (users logging in through the console or AUX port or accessing through Telnet or FTP).

Use undo authentication login to restore the default.

By default, the default authentication method for the ISP domain is used for login users.

The specified RADIUS, HWTACACS, or LDAP scheme must have been configured.

Related commands: local-user, authentication default, hwtacacs scheme, radius scheme, and ldap scheme.

Examples

# Configure ISP domain test to use local authentication for login users.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authentication login local

# Configure ISP domain test to use RADIUS authentication scheme rd for login users and use local authentication as the backup.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authentication login radius-scheme rd local

authentication portal

Syntax

authentication portal { ldap-scheme ldap-scheme-name [ local ] | local | none | radius-scheme radius-scheme-name [ local ] }

undo authentication portal

View

ISP domain view

Default level

2: System level

Parameters

ldap-scheme ldap-scheme-name: Specifies an LDAP scheme by its name, a case-insensitive string of 1 to 32 characters.

local: Performs local authentication.

none: Does not perform any authentication.

radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters.

Description

Use authentication portal to configure the authentication method for portal users.

Use undo authentication portal to restore the default.

By default, the default authentication method for the ISP domain is used for portal users.

The specified LDAP or RADIUS scheme must have been configured.

Only PAP is supported for LDAP authentication of portal users.

Related commands: local-user, authentication default, ldap scheme, and radius scheme.

Examples

# Configure ISP domain test to use local authentication for portal users.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authentication portal local

# Configure ISP domain test to use RADIUS scheme rd for authentication of portal users and use local authentication as the backup.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authentication portal radius-scheme rd local

authentication ppp

Syntax

authentication ppp { hwtacacs-scheme hwtacacs-scheme-name [ local ] | local | none | radius-scheme radius-scheme-name [ local ] }

undo authentication ppp

View

ISP domain view

Default level

2: System level

Parameters

hwtacacs-scheme hwtacacs-scheme-name: Specifies an HWTACACS scheme by its name, a case-insensitive string of 1 to 32 characters.

local: Performs local authentication.

none: Does not perform any authentication.

radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters.

Description

Use authentication ppp to configure the authentication method for PPP users.

Use undo authentication ppp to restore the default.

By default, the default authentication method for the ISP domain is used for PPP users.

The specified RADIUS or HWTACACS scheme must have been configured.

Related commands: local-user, authentication default, hwtacacs scheme, and radius scheme.

Examples

# Configure ISP domain test to use local authentication for PPP users.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authentication ppp local

# Configure ISP domain test to use RADIUS authentication scheme rd for PPP users and use local authentication as the backup.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authentication ppp radius-scheme rd local

authentication super

Syntax

authentication super { hwtacacs-scheme hwtacacs-scheme-name | radius-scheme radius-scheme-name }

undo authentication super

View

ISP domain view

Default level

2: System level

Parameters

hwtacacs-scheme hwtacacs-scheme-name: Specifies an HWTACACS scheme by its name, a case-insensitive string of 1 to 32 characters.

radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters.

Description

Use authentication super to configure the authentication method for user privilege level switching.

Use undo authentication super to restore the default.

By default, the default authentication method for the ISP domain is used for user privilege level switching authentication.

The specified RADIUS or HWTACACS authentication scheme must have been configured.

Related commands: hwtacacs scheme and radius scheme; super authentication-mode (Fundamentals Command Reference).

Examples

# Configure ISP domain test to use HWTACACS scheme tac for user privilege level switching authentication.

<Sysname> system-view

[Sysname] super authentication-mode scheme

[Sysname] domain test

[Sysname-domain-test] authentication super hwtacacs-scheme tac

authorization command

Syntax

authorization command { hwtacacs-scheme hwtacacs-scheme-name [ local | none ] | local | none }

undo authorization command

View

ISP domain view

Default level

2: System level

Parameters

hwtacacs-scheme hwtacacs-scheme-name: Specifies an HWTACACS scheme by its name, a case-insensitive string of 1 to 32 characters.

local: Performs local authorization.

none: Does not perform any authorization exchange. In this case, an authenticated user can access only commands of Level 0.

Description

Use authorization command to configure the command line authorization method.

Use undo authorization command to restore the default.

By default, the default authorization method for the ISP domain is used for command line authorization.

The specified HWTACACS scheme must have been configured.

With command line authorization configured, a user who has logged in to the device can execute only the commands with a level lower than or equal to that of the local user.

Related commands: local-user, authorization default, and hwtacacs scheme.

Examples

# Configure ISP domain test to use local command line authorization.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authorization command local

# Configure ISP domain test to use HWTACACS scheme hwtac for command line authorization and use local authorization as the backup.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authorization command hwtacacs-scheme hwtac local

authorization default

Syntax

authorization default { hwtacacs-scheme hwtacacs-scheme-name [ local ] | ldap-scheme ldap-scheme-name [ local ] | local | none | radius-scheme radius-scheme-name [ local ] }

undo authorization default

View

ISP domain view

Default level

2: System level

Parameters

hwtacacs-scheme hwtacacs-scheme-name: Specifies an HWTACACS scheme by its name, a case-insensitive string of 1 to 32 characters.

ldap-scheme ldap-scheme-name: Specifies an LDAP scheme by its name, a case-insensitive string of 1 to 32 characters.

local: Performs local authorization.

none: Does not perform any authorization exchange. After passing authentication, non-login users can access the network, FTP users can access the root directory of the device, and other login users can access only the commands of Level 0.

radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters.

Description

Use authorization default to configure the default authorization method for an ISP domain.

Use undo authorization default to restore the default.

By default, the default authorization method for the ISP domain of an ISP domain is local.

The specified RADIUS, HWTACACS, or LDAP scheme must have been configured.

The default authorization method will be used for all users for whom no specific authorization methods are configured.

The RADIUS authorization configuration takes effect only when the authentication method and authorization method of the ISP domain use the same RADIUS scheme.

Related commands: local-user, hwtacacs scheme, radius scheme, and ldap scheme.

Examples

# Configure the default authorization method for ISP domain test to use RADIUS authorization scheme rd and use local authorization as the backup.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authorization default radius-scheme rd local

authorization lan-access

Syntax

authorization lan-access { local | none | radius-scheme radius-scheme-name [ local | none ] }

undo authorization lan-access

View

ISP domain view

Default level

2: System level

Parameters

local: Performs local authorization.

none: Does not perform any authorization exchange. In this case, an authenticated LAN user can access the network directly.

radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters.

Description

Use authorization lan-access to configure the authorization method for LAN users.

Use undo authorization lan-access to restore the default.

By default, the default authorization method for the ISP domain is used for LAN users.

The specified RADIUS scheme must have been configured.

The RADIUS authorization configuration takes effect only when the authentication method and authorization method of the ISP domain use the same RADIUS scheme.

Related commands: local-user, authorization default, and radius scheme.

Examples

# Configure ISP domain test to use local authorization for LAN users.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authorization lan-access local

# Configure ISP domain test to use RADIUS authorization scheme rd for LAN users and use local authorization as the backup.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authorization lan-access radius-scheme rd local

authorization login

Syntax

authorization login { hwtacacs-scheme hwtacacs-scheme-name [ local ] | ldap-scheme ldap-scheme-name [ local ] | local | none | radius-scheme radius-scheme-name [ local ] }

undo authorization login

View

ISP domain view

Default level

2: System level

Parameters

hwtacacs-scheme hwtacacs-scheme-name: Specifies an HWTACACS scheme by its name, a case-insensitive string of 1 to 32 characters.

ldap-scheme ldap-scheme-name: Specifies an LDAP scheme by its name, a case-insensitive string of 1 to 32 characters.

local: Performs local authorization.

none: Does not perform any authorization exchange. After passing authentication, FTP users can access the root directory of the device, and other login users can access only the commands of Level 0.

radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters.

Description

Use authorization login to configure the authorization method for login users (users logging in through the console or AUX port or accessing through Telnet or FTP).

Use undo authorization login to restore the default.

By default, the default authorization method for the ISP domain is used for login users.

The specified RADIUS, HWTACACS, or LDAP scheme must have been configured.

The RADIUS authorization configuration takes effect only when the authentication method and authorization method of the ISP domain use the same RADIUS scheme.

Related commands: local-user, authorization default, hwtacacs scheme, radius scheme, and ldap scheme.

Examples

# Configure ISP domain test to use local authorization for login users.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authorization login local

# Configure ISP domain test to use RADIUS authorization scheme rd for login users and use local authorization as the backup.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authorization login radius-scheme rd local

authorization portal

Syntax

authorization portal { local | none | radius-scheme radius-scheme-name [ local ] }

undo authorization portal

View

ISP domain view

Default level

2: System level

Parameters

local: Performs local authorization.

none: Does not perform any authorization exchange. In this case, an authenticated portal user can access the network directly.

radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters.

Description

Use authorization portal to configure the authorization method for portal users.

Use undo authorization portal to restore the default.

By default, the default authorization method for the ISP domain is used for portal users.

The specified RADIUS scheme must have been configured.

The RADIUS authorization configuration takes effect only when the authentication method and authorization method of the ISP domain use the same RADIUS scheme.

Related commands: local-user, authorization default, and radius scheme.

Examples

# Configure ISP domain test to use local authorization for portal users.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authorization portal local

# Configure ISP domain test to use RADIUS scheme rd for authorization of portal users and use local authorization as the backup.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authorization portal radius-scheme rd local

authorization ppp

Syntax

authorization ppp { hwtacacs-scheme hwtacacs-scheme-name [ local ] | local | none | radius-scheme radius-scheme-name [ local ] }

undo authorization ppp

View

ISP domain view

Default level

2: System level

Parameters

hwtacacs-scheme hwtacacs-scheme-name: Specifies an HWTACACS scheme by its name, a case-insensitive string of 1 to 32 characters.

local: Performs local authorization.

none: Does not perform any authorization exchange. In this case, an authenticated PPP user can access the network directly.

radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters.

Description

Use authorization ppp to configure the authorization method for PPP users.

Use undo authorization ppp to restore the default.

By default, the default authorization method for the ISP domain is used for PPP users.

The specified RADIUS or HWTACACS scheme must have been configured.

The RADIUS authorization configuration takes effect only when the authentication method and authorization method of the ISP domain use the same RADIUS scheme.

Related commands: local-user, authorization default, hwtacacs scheme, and radius scheme.

Examples

# Configure ISP domain test to use local authorization for PPP users.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authorization ppp local

# Configure ISP domain test to use RADIUS authorization scheme rd for PPP users and use local authorization as the backup.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authorization ppp radius-scheme rd local

authorization-attribute user-profile

Syntax

authorization-attribute user-profile profile-name

undo authorization-attribute user-profile

View

ISP domain view

Default level

3: Manage level

Parameters

profile-name: Name of the user profile, a case-sensitive string of 1 to 31 characters. For more information about user profile configuration, see Security Configuration Guide.

Description

Use authorization-attribute user-profile to specify the default authorization user profile for an ISP domain.

Use undo authorization-attribute user-profile to restore the default.

By default, an ISP domain has no default authorization user profile.

After a user of an ISP domain passes authentication, if the server (or the access device in the case of local authentication) does not authorize any user profile to the ISP domain, the system uses the user profile specified by the authorization-attribute user-profile command as that of the ISP domain.

If you configure the authorization-attribute user-profile command repeatedly, only the last one takes effect.

Examples

# Specify the default authorization user profile for domain test as profile1.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] authorization-attribute user-profile profile1

cut connection

Syntax

cut connection { access-type { dot1x | mac-authentication | portal } | all | domain isp-name | interface interface-type interface-number | ip ip-address | mac mac-address | ucibindex ucib-index | user-name user-name | vlan vlan-id }

View

System view

Default level

2: System level

Parameters

access-type: Specifies the user connections of the specified access type.

·     dot1x: Indicates 802.1X authentication.

·     mac-authentication: Indicates MAC address authentication.

·     portal: Indicates portal authentication.

all: Specifies all user connections.

domain isp-name: Specifies the user connections of an ISP domain. The isp-name argument refers to the name of an existing ISP domain and is a string of 1 to 24 characters.

interface interface-type interface-number: Specifies the user connections on an interface. Only Layer 2 Ethernet interfaces and WLAN virtual interfaces are supported.

ip ip-address: Specifies the user connections for an IP address.

mac mac-address: Specifies the user connections for a MAC address, with mac-address in the format H-H-H.

ucibindex ucib-index: Specifies the user connection that uses the connection index. The value range is from 0 to 4294967295.

user-name user-name: Specifies the user connections that use the username. The user-name argument is a case-sensitive string of 1 to 80 characters. For a username entered without a domain name, the system assumes that the user is in the default domain or the mandatory authentication domain.

vlan vlan-id: Specifies the user connections of a VLAN, where the vlan-id argument ranges from 1 to 4094.

Description

Use cut connection to tear down the specified user connections forcibly.

This command applies to only LAN access, portal, and PPP user connections.

For 802.1X users whose usernames carry the version number or contain spaces, you cannot cut the connections by username.

For 802.1X users whose usernames use a slash (/) or backslash (\) as the domain name delimiter, you cannot cut their connections by username. For example, the cut connection user-name aaa\bbb command cannot cut the connections of the user aaa\bbb.

An interface that is configured with a mandatory authentication domain treats users of the corresponding access type as users in the mandatory authentication domain. For example, if you configure an 802.1X mandatory authentication domain on an interface, the interface uses the domain's AAA methods for all its 802.1X users. To cut connections of such users, use the cut connection domain isp-name command and specify the mandatory authentication domain.

Related commands: display connection and service-type.

Examples

# Tear down all connections of ISP domain test.

<Sysname> system-view

[Sysname] cut connection domain test

display connection

Syntax

display connection [ access-type { dot1x | mac-authentication | portal } | domain isp-name | interface interface-type interface-number | ip ip-address | mac mac-address | ucibindex ucib-index | user-name user-name | vlan vlan-id ] [ | { begin | exclude | include } regular-expression ]

View

Any view

Default level

1: Monitor level

Parameters

access-type: Specifies the user connections of the specified access type.

·     dot1x: Indicates 802.1X authentication.

·     mac-authentication: Indicates MAC address authentication.

·     portal: Indicates portal authentication.

domain isp-name: Specifies the user connections of an ISP domain. The isp-name argument refers to the name of an existing ISP domain and is a case-insensitive string of 1 to 24 characters.

interface interface-type interface-number: Specifies the user connections on an interface. Only Layer 2 Ethernet interfaces and WLAN virtual interfaces are supported.

ip ip-address: Specifies the user connections of an IP address.

mac mac-address: Specifies the user connections of a MAC address, with mac-address in the format H-H-H.

ucibindex ucib-index: Specifies the user connection that uses the connection index. The value range is from 0 to 4294967295.

user-name user-name: Specifies the user connections that use the username. The user-name argument is a case-sensitive string of 1 to 80 characters. For a username entered without a domain name, the system assumes that the user is in the default domain name or the mandatory authentication domain.

vlan vlan-id: Specifies the user connections of a VLAN, where the vlan-id argument ranges from 1 to 4094.

|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.

begin: Displays the first line that matches the specified regular expression and all lines that follow.

exclude: Displays all lines that do not match the specified regular expression.

include: Displays all lines that match the specified regular expression.

regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.

Description

Use display connection to display information about AAA user connections.

This command does not display information about FTP user connections.

With no parameter specified, this command displays brief information about all AAA user connections.

If you specify the ucibindex ucib-index option, this command displays detailed information. Otherwise, this command displays brief information.

If an interface is configured with a mandatory authentication domain (for example, an 802.1X mandatory authentication domain), users accessing the interface through the specified access type are treated as users in the mandatory authentication domain. To display connections of such users, specify the mandatory authentication domain for the display connection domain isp-name command.

For 802.1X users whose usernames use a slash (/) or backslash (\) as the domain name delimiter, you cannot query the connections by username. For example, the display connection user-name aaa\bbb command cannot display the connections of the user aaa\bbb.

Related commands: cut connection.

Examples

# Display information about all AAA user connections.

<Sysname> display connection

 

Index=1   ,Username=telnet@system

IP=10.0.0.1

 Total 1 connection(s) matched.

# Display information about AAA user connections using the index of 0.

<Sysname> display connection ucibindex 0

Index=0   , Username=telnet@system

IP=10.0.0.1

IPv6=N/A

Access=Admin   ,AuthMethod=PAP

Port Type=Virtual ,Port Name=N/A

Initial VLAN=999, Authorized VLAN=20

ACL Group=Disable

User Profile=N/A

CAR=Disable

Priority=Disable

Start=2009-07-16 10:53:03 ,Current=2009-07-16 10:57:06 ,Online=00h04m03s

 Total 1 connection matched.

# Display information about AAA user connections using the index of 1. The authentication response packet contains the username test1, which is used for accounting.

<Sysname> display connection ucibindex 1

Index=0   , Username=test@system

IP=10.0.0.1

IPv6=N/A

Access=Admin   ,AuthMethod=PAP

Port Type=Virtual ,Port Name=N/A

Initial VLAN=999, Authorization VLAN=20

ACL Group=Disable

User Profile=N/A

CAR=Disable

Priority=Disable

Accounting Username=test1

Start=2009-07-16 10:53:03 ,Current=2009-07-16 10:57:06 ,Online=00h04m03s

 Total 1 connection matched.

Table 1 Command output

Field

Description

Username

Username of the connection, in the format username@domain.

MAC

MAC address of the user.

IP

IPv4 address of the user.

IPv6

IPv6 address of the user.

Access

User access type.

ACL Group

Authorization ACL group. If no authorization ACL group is assigned, this field displays Disable.

User Profile

Authorization user profile.

CAR(kbps)

Authorized CAR parameters.

Accounting Username

Accounting username delivered from the server.

UpPeakRate

Uplink peak rate.

DnPeakRate

Downlink peak rate.

UpAverageRate

Uplink average rate.

DnAverageRate

Downlink average rate.

 

display domain

Syntax

display domain [ isp-name ] [ | { begin | exclude | include } regular-expression ]

View

Any view

Default level

1: Monitor level

Parameters

isp-name: Name of an existing ISP domain, a string of 1 to 24 characters.

|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.

begin: Displays the first line that matches the specified regular expression and all lines that follow.

exclude: Displays all lines that do not match the specified regular expression.

include: Displays all lines that match the specified regular expression.

regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.

Description

Use display domain to display the configuration of ISP domains.

If you do not specify any ISP domain, the command displays the configuration of all ISP domains.

Related commands: access-limit enable, domain, and state.

Examples

# Display the configuration of all ISP domains.

<Sysname> display domain

0  Domain : system

   State :  Active

   Access-limit :  Disabled

   Accounting method : Required

   Default authentication scheme      : local

   Default authorization scheme       : local

   Default accounting scheme          : local

   Domain User Template:

   Idle-cut : Disabled

   Self-service : Disabled

   Authorization attributes :

 

1  Domain : test

   State : Active

   Access-limit : Disabled

   Accounting method : Required

   Default authentication scheme      : local

   Default authorization scheme       : local

   Default accounting scheme          : local

   Lan-access authentication scheme   : radius:test, local

   Lan-access authorization scheme    : hwtacacs:hw, local

   Lan-access accounting scheme       : local

   Domain User Template:

   Idle-cut : Disabled

   Self-service : Disabled

   Authorization attributes :

    User-profile : profile1

 

Default Domain Name: system

Total 2 domain(s).

Table 2 Command output

Field

Description

Domain

ISP domain name.

State

Status of the ISP domain: active or blocked. Users in an active ISP domain can request network services, and users in a blocked ISP domain cannot.

Access-limit

Limit on the number of user connections. If there is no limit on the number, this field displays Disable.

Accounting method

Indicates whether accounting is required. If accounting is required, when no accounting server is available or communication with the accounting server fails, user connections will be torn down. Otherwise, users can continue to use network services.

Default authentication scheme

Default authentication method.

Default authorization scheme

Default authorization method.

Default accounting scheme

Default accounting method.

Lan-access authentication scheme

Authentication method for LAN users.

Lan-access authorization scheme

Authorization method for LAN users.

Lan-access accounting scheme

Accounting method for LAN users.

Domain User Template

Indicates some functions and attributes set for users in the domain.

Idle-cut

Indicates whether the idle cut function is enabled. With the idle cut function enabled for a domain, the system logs out any user in the domain whose traffic is less than the specified minimum traffic during the idle timeout period.

Self-service

Indicates whether the self service function is enabled. With the self service function enabled, users can launch a browser and enter the self service URL in the address bar to access the self service pages and perform self service operations.

Authorization attributes

Default authorization attributes for the ISP domain.

User-profile

Default authorization user profile.

 

domain

Syntax

domain isp-name

undo domain isp-name

View

System view

Default level

3: Manage level

Parameters

isp-name: ISP domain name, a case-insensitive string of 1 to 24 characters that contains no slash (/), backslash (\), colon (:), asterisk (*), question mark (?), left angle bracket (<), right angle bracket (>), or at sign (@).

Description

Use domain isp-name to create an ISP domain and enter ISP domain view.

Use undo domain to remove an ISP domain.

By default, there is a system predefined ISP domain named system in the system.

All ISP domains are in active state when they are created.

The system predefined ISP domain system cannot be deleted; you can only modify its configuration.

 

 

NOTE:

To delete the ISP domain that is used as the default ISP domain, you must change it to a non-default ISP domain first by using the undo domain default enable command.

 

Related commands: state and display domain.

Examples

# Create ISP domain test, and enter ISP domain view.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test]

domain default enable

Syntax

domain default enable isp-name

undo domain default enable

View

System view

Default level

3: Manage level

Parameters

isp-name: Name of the ISP domain, a case-insensitive string of 1 to 24 characters.

Description

Use domain default enable to specify the default ISP domain. Users without any domain name carried in the usernames are considered to be in the default domain.

Use undo domain default enable to restore the default.

By default, the default ISP domain is the system predefined ISP domain system.

There can be only one default ISP domain.

The specified domain must already exist. Otherwise, users without any domain name carried in the username cannot pass authentication.

To delete the ISP domain that is used as the default ISP domain, you must change it to a non-default ISP domain first by using the domain default disable command.

Related commands: domain, state, and display domain.

Examples

# Create a new ISP domain named test, and configure it as the default ISP domain.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] quit

[Sysname] domain default enable test

domain if-unknown

Syntax

domain if-unknown isp-name

undo domain if-unknown

View

System view

Default level

3: Manage level

Parameters

isp-name: Specifies an ISP domain name, a case-insensitive string of 1 to 24 characters that cannot contain the slash (/), backslash (\), colon (:), asterisk (*), question mark (?), left angle bracket (<), right angle bracket (>), quotation marks ("), or at sign (@).

Description

Use domain if-unknown to specify an ISP domain for users with unknown domain names.

Use undo domain if-unknown to restore the default.

By default, no ISP domain is specified for users with unknown domain names.

The device chooses an authentication domain for each user in the following order:

·     The authentication domain specified for the access module

·     The ISP domain in the username

·     The default ISP domain of the device

·     The ISP domain specified for users with unknown domain names

If all the domains are unavailable, user authentication fails.

 

 

NOTE:

Support for the authentication domain configuration depends on the access module. You can specify an authentication domain for 802.1X, portal, or MAC address authentication.

 

Related commands: domain default enable.

Examples

# Specify the ISP domain test for users with unknown domain names.

<Sysname> system-view

[Sysname] domain if-unknown test

eap-profile

Syntax

eap-profile profile-name

undo eap-profile profile-name

View

System view

Default level

2: System level

Parameters

profile-name: Name of the EAP profile, a case-insensitive string of 1 to 16 characters.

Description

Use eap-profile to create an EAP profile and enter EAP profile view.

Use undo eap-profile to remove an EAP profile.

An EAP profile is a collection of local EAP authentication settings, including the authentication method to be used and, for some authentication methods, the SSL server policy to be referenced.

Related commands: eap method and ssl-server-policy.

Examples

# Create an EAP profile and enter its view.

<Sysname> system-view

[Sysname] eap-profile aprf1

[Sysname-eap-prof-aprf1]

idle-cut enable

Syntax

idle-cut enable minute [ flow ]

undo idle-cut enable

View

ISP domain view

Default level

2: System level

Parameters

minute: Idle timeout interval, in the range of 1 to 600 minutes.

flow: Minimum traffic during the idle timeout period, which is in the range of 1 to 10240000 bytes and defaults to 10240.

Description

Use idle-cut enable to enable the idle cut function and set the relevant parameters. With the idle cut function enabled for a domain, the device checks the traffic of each online user in the domain at the idle timeout interval, and logs out any user in the domain whose traffic during the idle timeout interval is less than the specified minimum traffic.

Use undo idle-cut enable to restore the default.

By default, the function is disabled.

You can also set the idle timeout interval on the server to make the server log out users whose traffic during the idle timeout interval is less than 10240 bytes, but your setting on the server takes effect only when you disable the idle cut function on the device.

In a portal stateful failover scenario, use an idle cut interval that is greater than five minutes to make sure data of online users can be backed up.

Related commands: domain.

Examples

# Enable the idle cut function and set the idle timeout interval to 50 minutes and the traffic threshold to 1024 bytes for ISP domain test.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] idle-cut enable 50 1024

ip pool

Syntax

ip pool pool-number low-ip-address [ high-ip-address ]

undo ip pool pool-number

View

System view, ISP domain view

Default level

2: System level

Parameters

pool-number: Address pool number, in the range of 0 to 99.

low-ip-address and high-ip-address: Start and end IP addresses of the address pool. Up to 1024 addresses are allowed for an address pool. If you do not specify the end IP address, there is only one IP address in the pool, namely the start IP address.

Description

Use ip pool to configure an address pool for assigning addresses to PPP users.

Use undo ip pool to delete an address pool.

By default, no IP address pool is configured for PPP users.

An IP address pool configured in system view is used to assign IP addresses to PPP users who do not need to be authenticated. To specify the address pool used for assigning an IP address to the peer device, use the remote address command in interface view.

An IP address pool configured in ISP domain view is used to assign IP addresses to the ISP domain's PPP users who must be authenticated. Configure IP address pools for ISP domains in scenarios where an interface serves a great amount of PPP users but the address resources are inadequate. For example, a GigabitEthernet interface running PPPoE can accommodate up to 4096 users. However, only one address pool with up to 1024 addresses can be configured on its virtual template (VT). This is obviously far from what is required. To address the issue, configure address pools for ISP domains and assign addresses from them to the PPP users by domain.

Related commands: remote address (Layer 2 Command Reference).

Examples

# Configure the IP address pool 0 with the address range of 129.102.0.1 to 129.102.0.10.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] ip pool 0 129.102.0.1 129.102.0.10

local-server authentication eap-profile

Syntax

local-server authentication eap-profile profile-name

undo local-server authentication eap-profile

View

System view

Default level

2: System level

Parameters

profile-name: Name of an existing EAP profile, a case-insensitive string of 1 to 16 characters.

Description

Use local-server authentication eap-profile to specify the EAP profile for the local authentication server to use.

Use undo local-server authentication eap-profile to remove the configuration.

Related commands: eap-profile.

Examples

# Specify the EAP profile for the local authentication server to use as aprf1.

<Sysname> system-view

[Sysname] local-server authentication eap-profile aprf1

method

Syntax

method { md5 | peap-gtc | peap-mschapv2 | tls }

undo method { md5 | peap-gtc | peap-mschapv2 | tls }

View

EAP profile view

Default level

2: System level

Parameters

md5: Specifies the Message Digest 5 (MD5) authentication method.

peap-gtc: Specifies the Protected Extensible Authentication Protocol (PEAP) together with the GTC for authentication in TLS tunnels.

peap-mschapv2: Specifies the Protected Extensible Authentication Protocol (PEAP) together with the MSCHAPv2 for authentication in TLS tunnels.

tls: Specifies the Transport Layer Security (TLS) authentication method.

Description

Use method to specify the EAP authentication method.

Use undo method to remove the configuration.

By default, no EAP authentication method is specified for an EAP profile.

You can specify more than one EAP authentication method for an EAP profile. An authentication method specified earlier has a higher priority. peap-gtc and peap-mschapv2 cannot be simultaneously configured for an EAP profile.

When used for EAP authentication of an EAP client, the local server first negotiates the EAP authentication method with the EAP client. During negotiation, the local server prefers the authentication method with the highest priority among the ones specified for it. If the client supports the authentication method, the negotiation succeeds and they proceed with the authentication process. Otherwise, the local server tries the one with the next highest priority until a supported one is found, or if none of the authentication methods are found supported, the local server sends an EAP-Failure packet to the client for notification of the authentication failure.

Examples

# Create an EAP profile and specify authentication methods MD5 and PEAP-MSCHAPv2 for the profile, with PEAP-MSCHAPv2 has a higher priority.

<Sysname> system-view

[Sysname] eap-profile aprf1

[System-eap-prof-aprf1] method peap-mschapv2

[System-eap-prof-aprf1] method md5

user-credentials

Syntax

user-credentials { ldap-scheme ldap-scheme-name [ local ] | local }

undo user-credentials

View

EAP profile view

Default level

2: System level

Parameters

ldap-scheme: Uses the LDAP database.

ldap-scheme-name: Specifies an LDAP scheme by its name, a case-insensitive string of 1 to 32 characters

local: Uses the local user database.

Description

Use user-credentials to specify the database to be used for user credential verification in local EAP authentication.

Use undo user-credentials to restore the default setting.

By default, the local user database is used.

Examples

# Configure EAP profile aprf1 to use the local user database for local EAP authentication.

<Sysname> system-view

[Sysname] eap-profile aprf1

[Sysname-eap-prof-aprf1] user-credentials local

# Configure EAP profile aprf2 to use the LDAP database and the LDAP scheme test for local EAP authentication and use the local user database as the backup.

<Sysname> system-view

[Sysname] ldap scheme test

[Sysname-ldap-test] quit

[Sysname] eap-profile aprf2

[Sysname-eap-prof-aprf2] user-credentials ldap-scheme test local

nas-id bind vlan

Syntax

nas-id nas-identifier bind vlan vlan-id

undo nas-id nas-identifier bind vlan vlan-id

View

NAS ID profile view

Default level

2: System level

Parameters

nas-identifier: NAS ID, a case-sensitive string of 1 to 20 characters

vlan-id: ID of the VLAN to be bound with the NAS ID, in the range of 1 to 4094.

Description

Use nas-id bind vlan to bind a NAS ID with a VLAN.

Use undo nas-id bind vlan to remove a NAS ID-VLAN binding.

By default, no NAS ID-VLAN binding exists.

In a NAS ID profile view, you can configure multiple NAS ID–VLAN bindings.

A NAS ID can be bound with more than one VLAN, but one VLAN can be bound with only one NAS ID. If you bind a VLAN with different NAS IDs, only the last binding takes effect.

Related commands: aaa nas-id profile.

Examples

# Bind NAS ID 222 with VLAN 2.

<Sysname> system-view

[Sysname] aaa nas-id profile aaa

[Sysname-nas-id-prof-aaa] nas-id 222 bind vlan 2

self-service-url enable

Syntax

self-service-url enable url-string

undo self-service-url enable

View

ISP domain view

Default level

2: System level

Parameters

url-string: URL of the self-service server, a string of 1 to 64 characters. It must start with http:// and contain no question mark. This URL was specified by the RADIUS server administrator during RADIUS server installation.

Description

Use self-service-url enable to enable the self-service server location function and specify the URL of the self-service server.

Use undo self-service-url enable to restore the default.

By default, the self-service server location function is disabled.

With the self-service function, users can manage and control their accounts and passwords. Only the RADIUS server systems provided by IMC support the self-service function.

Examples

# For ISP domain test, enable the self-service server location function and specify the URL of the self-service server for changing user password to http://10.153.89.94/selfservice.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] self-service-url enable http://10.153.89.94/selfservice

session-time include-idle-time

Syntax

session-time include-idle-time

undo session-time include-idle-time

View

ISP domain view

Default level

2: System level

Parameters

None

Description

Use session-time include-idle-time to include the idle cut time in the user online time to be uploaded to the server.

Use undo session-time include-idle-time to restore the default.

By default, the user online time uploaded to the server excludes the idle cut time.

The device uploads to the server the online user time when a user is logged off. However, the online user time of an abnormally logged-off user can contain an idle timeout interval or a detection interval when the idle cut function or online portal user detection is enabled. You can configure the device to include or exclude the idle cut time before the device uploads the online user time to the server according to your accounting policy.

Related commands: idle-cut enable.

Examples

# Configure the device to include the idle cut time in the user online time uploaded to the server for ISP domain test.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] session-time include-idle-time

ssl-server-policy

Syntax

ssl-server-policy policy-name

undo ssl-server-policy

View

EAP profile view

Default level

2: System level

Parameters

policy-name: SSL server policy name, a case-insensitive string of 1 to 16 characters.

Description

Use ssl-server-policy to specify an SSL server policy for the EAP authentication.

Use undo ssl-server-policy to remove the configuration.

By default, no SSL server policy is specified for an EAP profile.

The SSL server policy and the relevant PKI domain settings must have been configured before you specify the policy for an EAP profile. Otherwise, the command does not take effect.

For information about related configurations, see Security Configuration Guide.

Examples

# Create an EAP profile and specify an SSL server policy for it.

<Sysname> system-view

[Sysname] eap-profile aprf1

[System-eap-prof-aprf1] ssl-server-policy tls-server

state (ISP domain view)

Syntax

state { active | block }

undo state

View

ISP domain view

Default level

2: System level

Parameters

active: Places the ISP domain in active state to allow the users in the ISP domain to request network services.

block: Places the ISP domain in blocked state to prevent users in the ISP domain from requesting network services.

Description

Use state to set the status of an ISP domain.

Use undo state to restore the default.

By default, an ISP domain is in active state.

By blocking an ISP domain, you disable users of the domain that are offline from requesting network services. The online users are not affected.

Examples

# Place the current ISP domain test to the state of blocked.

<Sysname> system-view

[Sysname] domain test

[Sysname-isp-test] state block

Local user configuration commands

access-limit

Syntax

access-limit max-user-number

undo access-limit

View

Local user view

Default level

3: Manage level

Parameters

max-user-number: Maximum number of concurrent users of the current local user account, in the range of 1 to 1024.

Description

Use access-limit to limit the number of concurrent users of a local user account.

Use undo access-limit to remove the limitation.

By default, there is no limit to the number of users who concurrently use the same local user account.

This command takes effect only when local accounting is used for the user account.

This limit is not effective for FTP users because accounting is not available for FTP users.

Related commands: display local-user.

Examples

# Limit the maximum number of concurrent users of local user account abc to 5.

<Sysname> system-view

[Sysname] local-user abc

[Sysname-luser-abc] access-limit 5

authorization-attribute (local user view/user group view)

Syntax

authorization-attribute { acl acl-number | callback-number callback-number | idle-cut minute | level level | user-profile profile-name | user-role { guest | guest-manager | security-audit } | vlan vlan-id | work-directory directory-name } *

undo authorization-attribute { acl | callback-number | idle-cut | level | user-profile | user-role | vlan | work-directory } *

View

Local user view, user group view

Default level

3: Manage level

Parameters

acl acl-number: Specifies the authorization ACL. The ACL number must be in the range of 2000 to 5999. After passing authentication, a local user is authorized to access the network resources specified by this ACL.

callback-number callback-number: Specifies the authorized PPP callback number. The callback-number argument is a case-sensitive string of 1 to 64 characters. After a local user passes authentication, the device uses this number to call the user.

idle-cut minute: Sets the idle timeout interval. With the idle cut function enabled, an online user whose idle period exceeds the specified idle timeout interval will be logged out. The minute argument indicates the idle timeout interval, in the range of 1 to 120 minutes.

level level: Specifies the user level, which can be 0 for visit level, 1 for monitor level, 2 for system level, and 3 for manage level. A smaller number means a lower level. This parameter determines the command level for login users whose user interfaces perform AAA authentication. By default, the user level is 0, and users can use only commands of level 0 after login.

user-profile profile-name: Specifies the authorization user profile. The profile-name argument is a case-sensitive string of 1 to 32 characters. It can consist of English letters, digits, and underscores (_), and must start with an English letter. After a user passes authentication and gets online, the device uses the settings in the user profile to restrict the access behavior of the user. For more information about user profiles, see Security Configuration Guide.

user-role: Specifies the role for the local user. This keyword is available in only local user view. Users playing different roles can access different levels of commands. If you specify no role for a local user, the access right of the user after login depends on other authorization attributes. Supported roles include:

·     guest: A guest user account is usually created through the Web interface.

·     guest-manager: After passing authentication, a guest manager can only use the Web interface to access guest-related pages to, for example, create, modify, or change guest user accounts.

·     security-audit: After passing authentication, a security log administrator can manage security log files, for example, save security log files. For more information about the commands that a security log administrator can use, see Network Management and Monitoring Command Reference.

vlan vlan-id: Specifies the authorized VLAN. The vlan-id argument is in the range of 1 to 4094. After passing authentication, a local user can access the resources in this VLAN.

work-directory directory-name: Specifies the work directory, if the user or users use the FTP or SFTP service. The directory-name argument is a case-insensitive string of 1 to 135 characters. The directory must already exist. By default, an FTP or SFTP user can access the root directory of the device.

Description

Use authorization-attribute to configure authorization attributes for the local user or user group. After the local user or a local user of the user group passes authentication, the device will assign these attributes to the user.

Use undo authorization-attribute to remove authorization attributes and restore the defaults.

By default, no authorization attribute is configured for a local user or user group.

Every configurable authorization attribute has its definite application environments and purposes. Consider the service types of users when assigning authorization attributes.

Authorization attributes configured for a user group are effective for all local users in the group. You can group local users to improve configuration and management efficiency.

An authorization attribute configured in local user view takes precedence over the same attribute configured in user group view. If an authorization attribute is configured in user group view but not in local user view, the setting in user group view takes effect.

If only one user is playing the role of security log administrator in the system, you cannot delete the user account, or remove or change the user's role, unless you configure another user as a security log administrator first.

A local user can play only one role at a moment. If you perform the role configuration repeatedly, only the last role configuration takes effect.

Examples

# Configure the authorized VLAN of local user abc as VLAN 2.

<Sysname> system-view

[Sysname] local-user abc

[Sysname-luser-abc] authorization-attribute vlan 2

# Configure the authorized VLAN of user group abc as VLAN 3.

<Sysname> system-view

[Sysname] user-group abc

[Sysname-ugroup-abc] authorization-attribute vlan 3

bind-attribute

Syntax

bind-attribute { call-number call-number [ : subcall-number ] | ip ip-address | location port slot-number subslot-number port-number | mac mac-address | vlan vlan-id } *

undo bind-attribute { call-number | ip | location | mac | vlan } *

View

Local user view

Default level

3: Manage level

Parameters

call-number call-number: Specifies a calling number for ISDN user authentication, where the call-number argument is a string of 1 to 64 characters. This option is applicable to only PPP users.

subcall-number: Specifies the sub-calling number. The total length of the calling number and the sub-calling number cannot be more than 62 characters.

ip ip-address: Specifies the IP address of the user. This option is applicable to only 802.1X users.

location port slot-number subslot-number port-number: Specifies the port to which the user is bound, where the slot-number argument is in the range of 0 to 255, the subslot-number argument is in the range of 0 to 15, and the port-number argument is in the range of 0 to 255. This option is applicable to only LAN users.

mac mac-address: Specifies the MAC address of the user in the format H-H-H. This option is applicable to only LAN users.

vlan vlan-id: Specifies the VLAN to which the user belongs, where the vlan-id argument is in the range of 1 to 4094. This option is applicable to only LAN users.

Description

Use bind-attribute to configure binding attributes for a local user.

Use undo bind-attribute to remove binding attributes of a local user.

By default, no binding attribute is configured for a local user.

Binding attributes are checked upon authentication of a local user. If the binding attributes of a local user do not match the configured ones, the user fails the checking and the authentication.

Binding attribute checking does not take the service types of the users into account. A configured binding attribute is effective for all types of users. Be cautious when deciding which binding attributes should be configured for which type of local users. For example, an IP address binding is applicable to only 802.1X authentication that supports IP address upload. If you configure an IP address binding for an authentication method that does not support IP address upload, for example, MAC authentication, the local authentication will fail.

Examples

# Configure the bound IP of local user abc as 3.3.3.3.

<Sysname> system-view

[Sysname] local-user abc

[Sysname-luser-abc] bind-attribute ip 3.3.3.3

display local-user

Syntax

display local-user [ idle-cut { disable | enable } | service-type { ftp | lan-access | portal | ppp | ssh | telnet | terminal | web } | state { active | block } | user-name user-name | vlan vlan-id ] [ | { begin | exclude | include } regular-expression ]

View

Any view

Default level

1: Monitor level

Parameters

idle-cut { disable | enable }: Specifies local users with the idle cut function disabled or enabled.

service-type: Specifies the local users who use a specified type of service.

·     ftp: FTP users.

·     lan-access: Users accessing the network through Ethernet, such as 802.1X users.

·     portal: Portal users.

·     ppp: PPP users.

·     ssh: SSH users.

·     telnet: Telnet users.

·     terminal: Users logging in through the console port or AUX port.

·     web: Web users.

state { active | block }: Specifies local users in the state of active or blocked. A local user in active state can access network services, but a local user in blocked state cannot.

user-name user-name: Specifies all local users using the specified username. The username is a case-sensitive string of 1 to 55 characters and does not contain the domain name.

vlan vlan-id: Specifies all local users in a VLAN. The VLAN ID ranges from 1 to 4094.

|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.

begin: Displays the first line that matches the specified regular expression and all lines that follow.

exclude: Displays all lines that do not match the specified regular expression.

include: Displays all lines that match the specified regular expression.

regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.

Description

Use display local-user to display configuration and statistics about local users.

If you do not specify any parameter, the command displays information about all local users.

Related commands: local-user.

Examples

# Display information about all local users.

<Sysname> display local-user

The contents of local user abc:

 State:                    Active

 ServiceType:              lan-access

 Access-limit:             Enabled           Current AccessNum: 0

 Max AccessNum:            300

 User-group:               system

 Bind attributes:

  IP address:              1.2.3.4

  Bind location:           0/4/1 (SLOT/SUBSLOT/PORT)

  MAC address:             0001-0002-0003

  Vlan ID:                 100

 Authorization attributes:

  Idle TimeOut:            10(min)

  Work Directory:          flash:/

  User Privilege:          3

  Acl ID:                  2000

  Vlan ID:                 100

  User Profile:            prof1

 Expiration date:          12:12:12-2018/09/16

Total 1 local user(s) matched.

Table 3 Command output

Field

Description

State

Status of the local user: active or blocked.

ServiceType

Service types that the local user can use, including FTP, LAN, PPP, portal, SSH, Telnet, and terminal.

Access-limit

Limit on the number of user connections that use the current username.

Current AccessNum

Current number of user connections that use the current username.

Max AccessNum

Maximum number of user connections that use the current username.

Bind attributes

Binding attributes of the local user.

VLAN ID

VLAN to which the user is bound.

Calling Number

Calling number of the ISDN user.

Authorization attributes

Authorization attributes of the local user.

Idle TimeOut

Idle timeout interval of the user, in minutes.

Callback-number

Authorized PPP callback number of the local user.

Work Directory

Directory that the FTP user can access.

VLAN ID

Authorized VLAN of the local user.

User Profile

User profile for local user authorization.

Expiration date

Expiration time of the local user.

 

display user-group

Syntax

display user-group [ group-name ] [ | { begin | exclude | include } regular-expression ]

View

Any view

Default level

2: System level

Parameters

group-name: User group name, a case-insensitive string of 1 to 32 characters.

|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.

begin: Displays the first line that matches the specified regular expression and all lines that follow.

exclude: Displays all lines that do not match the specified regular expression.

include: Displays all lines that match the specified regular expression.

regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.

Description

Use display user-group to display user group configuration. If you do not specify any user group name, the command displays information about all user groups.

Related commands: user-group.

Examples

# Display the configuration of user group abc.

<Sysname> display user-group abc

The contents of user group abc:

 Authorization attributes:

  Idle-cut:                120(min)

  Work Directory:          FLASH:

  Level:                   1

  Acl Number:              2000

  Vlan ID:                 1

  User-Profile:            1

  Callback-number:         1

 Password aging:           Enabled (1 days)

 Password length:          Enabled (4 characters)

 Password composition:     Enabled (1 types,  1 characters per type)

Total 1 user group(s) matched.

Table 4 Command output

Field

Description

Idle-cut

Idle timeout interval, in minutes.

Work Directory

Directory that FTP/SFTP users in the group can access.

Level

Level of the local users in the group.

ACL Number

Authorization ACL for the local users in the group.

VLAN ID

Authorized VLAN for the local users in the group.

User-Profile

User profile for local user authorization.

Callback-number

Authorized PPP callback number for the local users in the group.

Password aging

Password aging time for the local users in the group.

Password length

Minimum password length for the local users in the group.

Password composition

Password composition policy of the local users in the group.

 

expiration-date (local user view)

Syntax

expiration-date time

undo expiration-date

View

Local user view

Default level

3: Manage level

Parameters

time: Expiration time of the local user, in the format HH:MM:SS-MM/DD/YYYY, HH:MM:SS-YYYY/MM/DD, MM/DD/YYYY-HH:MM:SS, or YYYY/MM/DD-HH:MM:SS. HH:MM:SS indicates the time, where HH ranges from 0 to 23, and MM and SS range from 0 to 59. MM/DD/YYYY or YYYY/MM/DD indicates the date, where YYYY ranges from 2000 to 2035, MM ranges from 1 to 12, and the range of DD depends on the month. Except for the zeros in 00:00:00, leading zeros can be omitted. For example, 2:2:0-2008/2/2 equals 02:02:00-2008/02/02.

Description

Use expiration-date to set the expiration time of a local user.

Use undo expiration-date to remove the configuration.

By default, a local user has no expiration time and no time validity checking is performed.

When some users need to access the network temporarily, create a guest account and specify a validity time and an expiration time for the account to control the validity of the account. When a user uses the guest account for local authentication and passes the authentication, the access device checks whether the current system time is between the validity time and the expiration time. If so, it permits the user to access the network. Otherwise, it denies the access request of the user.

Related commands: validity-date.

Examples

# Set the expiration time of user abc to 12:10:20 on May 31, 2008.

<Sysname> system-view

[Sysname] local-user abc

[Sysname-luser-abc] expiration-date 12:10:20-2008/05/31

group

Syntax

group group-name

undo group

View

Local user view

Default level

3: Manage level

Parameters

group-name: User group name, a case-insensitive string of 1 to 32 characters.

Description

Use group to assign a local user to a user group.

Use undo group to restore the default.

By default, a local user belongs to the system default user group system.

Examples

# Assign local user 111 to user group abc.

<Sysname> system-view

[Sysname] local-user 111

[Sysname-luser-111] group abc

group-attribute allow-guest

Syntax

group-attribute allow-guest

undo group-attribute allow-guest

View

User group view

Default level

3: Manage level

Parameters

None

Description

Use group-attribute allow-guest to set the guest attribute for a user group so that guest users created by a guest manager through the Web interface can join the group.

Use undo group-attribute allow-guest to restore the default.

By default, the guest attribute is not set for a user group, and guest users created by a guest manager through the Web interface cannot join the group.

The guest attribute is set for the system predefined user group system by default, and you cannot remove the attribute for the user group.

Examples

# Set the guest attribute for user group test.

<Sysname> system-view

[Sysname] user-group test

[Sysname-ugroup-test] group-attribute allow-guest

local-user

Syntax

local-user user-name

undo local-user { user-name | all [ service-type { ftp | lan-access | portal | ppp | ssh | telnet | terminal | web } ] }

View

System view

Default level

3: Manage level

Parameters

user-name: Name for the local user, a case-sensitive string of 1 to 55 characters that does not contain the domain name. It cannot contain any backslash (\), slash (/), vertical bar (|), colon (:), asterisk (*), question mark (?), left angle bracket (<), right angle bracket (>), or at sign (@), and cannot be a, al, or all.

all: Specifies all users.

service-type: Specifies the users of a type.

·     ftp: FTP users.

·     lan-access: Users accessing the network through an Ethernet, such as 802.1X users.

·     portal: Portal users.

·     ppp: PPP users.

·     ssh: SSH users.

·     telnet: Telnet users.

·     terminal: Users logging in through the console or AUX port.

·     web: Web users.

Description

Use local-user to add a local user and enter local user view.

Use undo local-user to remove the specified local users.

By default, no local user is configured.

The AC supports up to 1024 local users.

Related commands: display local-user and service-type.

Examples

# Add a local user named user1.

<Sysname> system-view

[Sysname] local-user user1

[Sysname-luser-user1]

local-user password-display-mode

Syntax

local-user password-display-mode { auto | cipher-force }

undo local-user password-display-mode

View

System view

Default level

2: System level

Parameters

auto: Displays the password of a local user in the mode that is specified for the user by using the password command.

cipher-force: Displays the passwords of all local users in cipher text.

Description

Use local-user password-display-mode to set the password display mode for all local users.

Use undo local-user password-display-mode to restore the default.

By default, the password display mode is auto.

If you configure the local-user password-display-mode cipher-force command, all existing local user passwords will be displayed in cipher text, regardless of the configuration of the password command. If you also save the configuration and restart the device, all existing local user passwords will always be displayed in cipher text, no matter how you configure the local-user password-display-mode command or the password command. The passwords configured after you restore the display mode to auto by using the local-user password-display-mode auto command, however, are displayed as defined by the password command.

Related commands: display local-user and password.

Examples

# Specify to display the passwords of all users in cipher text.

<Sysname> system-view

[Sysname] local-user password-display-mode cipher-force

password

Syntax

password { cipher | simple } password

undo password

View

Local user view

Default level

2: System level

Parameters

cipher: Displays the password in cipher text.

simple: Displays the password in plain text.

password: Password for the local user, case-sensitive. It must be in plain text if you specify the simple keyword and can be in plain or cipher text if you specify the cipher keyword. A password in plain text must be a string of 1 to 63 characters that contains no blank space, for example, aabbcc. A password in cipher text must be a string of 24 or 88 characters, for example, _(TT8F]Y\5SQ=^Q`MAF4<1!!.

Description

Use password to configure a password for a local user and specify whether to display the password in cipher text or plain text.

Use undo password to delete the password of a local user.

If you configure the local-user password-display-mode cipher-force command, all existing local user passwords will be displayed in cipher text, regardless of the configuration of the password command. If you also save the configuration and restart the device, all existing local user passwords will always be displayed in cipher text, no matter how you configure the local-user password-display-mode command or the password command. The passwords configured after you restore the display mode to auto by using the local-user password-display-mode auto command, however, are displayed as defined by the password command.

With the cipher keyword specified, a password of up to 16 characters in plain text is encrypted into a password of 24 characters in cipher text, and a password of 16 to 63 characters in plain text is encrypted into a password of 88 characters in cipher text. For a password of 24 characters, if the system can decrypt the password, the system treats it as a password in cipher text. Otherwise, the system treats it as a password in plain text.

Related commands: display local-user and local-user password-display-mode.

Examples

# Set the password of local user user1 to 123456 and set the display mode to plain text.

<Sysname> system-view

[Sysname] local-user user1

[Sysname-luser-user1] password simple 123456

service-type

Syntax

service-type { ftp | lan-access | { ssh | telnet | terminal } * | portal | ppp | web }

undo service-type { ftp | lan-access | { ssh | telnet | terminal } * | portal | ppp | web }

View

Local user view

Default level

3: Manage level

Parameters

ftp: Authorizes the user to use the FTP service. The user can use the root directory of the FTP server by default.

lan-access: Authorizes the user to use the LAN access service. Such users are mainly Ethernet users, for example, 802.1X users.

ssh: Authorizes the user to use the SSH service.

telnet: Authorizes the user to use the Telnet service.

terminal: Authorizes the user to use the terminal service, allowing the user to login from the console or AUX port.

portal: Authorizes the user to use the portal service.

ppp: Authorizes the user to use the PPP service.

web: Authorizes the user to use the Web service.

Description

Use service-type to specify the service types that a user can use.

Use undo service-type to delete one or all service types configured for a user.

By default, no service type is specified for local users.

You can execute the service-type command repeatedly to specify multiple service types for a user.

Examples

# Authorize user user1 to use the Telnet service.

<Sysname> system-view

[Sysname] local-user user1

[Sysname-luser-user1] service-type telnet

state (local user view)

Syntax

state { active | block }

undo state

View

Local user view

Default level

2: System level

Parameters

active: Places the local user in active state to allow the local user to request network services.

block: Places the local user in blocked state to prevent the local user from requesting network services.

Description

Use state to set the status of a local user.

Use undo state to restore the default.

By default, a local user is in active state.

By blocking a user, you disable the user from requesting network services. No other users are affected.

Related commands: local-user.

Examples

# Place local user user1 to the blocked state.

<Sysname> system-view

[Sysname] local-user user1

[Sysname-luser-user1] state block

user-group

Syntax

user-group group-name

undo user-group group-name

View

System view

Default level

3: Manage level

Parameters

group-name: User group name, a case-insensitive string of 1 to 32 characters.

Description

Use user-group to create a user group and enter its view.

Use undo user-group to remove a user group.

A user group consists of a group of local users and has a set of local user attributes. You can configure local user attributes for a user group to implement centralized management of user attributes for the local users in the group. Configurable user attributes include password control attributes and authorization attributes.

A user group with one or more local users cannot be removed.

The system predefined user group system cannot be removed but you can change its configurations.

Related commands: display user-group.

Examples

# Create a user group named abc and enter its view.

<Sysname> system-view

[Sysname] user-group abc

[Sysname-ugroup-abc]

validity-date

Syntax

validity-date time

undo validity-date

View

Local user view

Default level

3: Manage level

Parameters

time: Validity time of the local user, in the format HH:MM:SS-MM/DD/YYYY, HH:MM:SS-YYYY/MM/DD, MM/DD/YYYY-HH:MM:SS, or YYYY/MM/DD-HH:MM:SS. HH:MM:SS indicates the time, where HH ranges from 0 to 23, and MM and SS range from 0 to 59. MM/DD/YYYY or YYYY/MM/DD indicates the date, where YYYY ranges from 2000 to 2035, MM ranges from 1 to 12, and the range of DD depends on the month. Except for the zeros in 00:00:00, leading zeros can be omitted. For example, 2:2:0-2008/2/2 equals 02:02:00-2008/02/02.

Description

Use validity-date to set the validity time of a local user.

Use undo validity-date to remove the configuration.

By default, a local user has no validity time and no time validity checking is performed.

When some users need to access the network temporarily, create a guest account and specify a validity time and an expiration time for the account to control the validity of the account. When a user uses the guest account for local authentication and passes the authentication, the access device checks whether the current system time is between the validity time and the expiration time. If so, it permits the user to access the network. Otherwise, it denies the access request of the user.

Related command: expiration-date.

Examples

# Set the validity time of user abc to 12:10:20 on April 30, 2008, and the expiration time to 12:10:20 on May 31, 2008.

<Sysname> system-view

[Sysname] local-user abc

[Sysname-luser-abc] validity-date 12:10:20-2008/04/30

[Sysname-luser-abc] expiration-date 12:10:20-2008/05/31

RADIUS configuration commands

accounting-on enable

Syntax

accounting-on enable [ interval seconds | send send-times ] *

undo accounting-on enable

View

RADIUS scheme view

Default level

2: System level

Parameters

seconds: Time interval for retransmitting an accounting-on packet in seconds, ranging from 1 to 15. The default setting is 3 seconds.

send-times: Maximum number of accounting-on packet transmission attempts, ranging from 1 to 255. The default setting is 50.

Description

Use accounting-on enable to configure the accounting-on feature. This feature enables the device to, after rebooting, automatically send an accounting-on message to the RADIUS server to log out online users.

Use undo accounting-on enable to disable the accounting-on feature.

By default, the accounting-on feature is disabled.

Parameters set with the accounting-on enable command take effect immediately.

 

 

NOTE:

After executing the accounting-on enable command, issue the save command to make sure that the command takes effect after the device reboots. For information about the save command, see Fundamentals Command Reference.

 

Related commands: radius scheme.

Examples

# Enable the accounting-on feature for RADIUS authentication scheme radius1, set the retransmission interval to 5 seconds, and set the transmission attempts to 15.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] accounting-on enable interval 5 send 15

attribute 25 car

Syntax

attribute 25 car

undo attribute 25 car

View

RADIUS scheme view

Default level

2: System level

Parameters

None

Description

Use attribute 25 car to specify to interpret the RADIUS class attribute (attribute 25) as CAR parameters.

Use undo attribute 25 car to restore the default.

By default, RADIUS attribute 25 is not interpreted as CAR parameters.

Related commands: display radius scheme and display connection.

Examples

# Specify to interpret RADIUS attribute 25 as CAR parameters.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] attribute 25 car

data-flow-format (RADIUS scheme view)

Syntax

data-flow-format { data { byte | giga-byte | kilo-byte | mega-byte } | packet { giga-packet | kilo-packet | mega-packet | one-packet } } *

undo data-flow-format { data | packet }

View

RADIUS scheme view

Default level

2: System level

Parameters

data { byte | giga-byte | kilo-byte | mega-byte }: Specifies the unit for data flows, which can be byte, kilobyte, megabyte, or gigabyte.

packet { giga-packet | kilo-packet | mega-packet | one-packet }: Specifies the unit for data packets, which can be one-packet, kilo-packet, mega-packet, or giga-packet.

Description

Use data-flow-format to set the traffic statistics unit for data flows or packets.

Use undo data-flow-format to restore the default.

By default, the unit for data flows is byte and that for data packets is one-packet.

The unit for data flows and that for packets must be consistent with those on the RADIUS server. Otherwise, accounting cannot be performed correctly.

Related commands: display radius scheme.

Examples

# Set the traffic statistics unit for data flows and that for packets to kilobytes and kilo-packets, respectively, in RADIUS scheme radius1.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] data-flow-format data kilo-byte packet kilo-packet

display radius scheme

Syntax

display radius scheme [ radius-scheme-name ] [ | { begin | exclude | include } regular-expression ]

View

Any view

Default level

2: System level

Parameters

radius-scheme-name: RADIUS scheme name.

|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.

begin: Displays the first line that matches the specified regular expression and all lines that follow.

exclude: Displays all lines that do not match the specified regular expression.

include: Displays all lines that match the specified regular expression.

regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.

Description

Use display radius scheme to display the configuration of RADIUS schemes.

If you do not specify any RADIUS scheme, the command displays the configuration of all RADIUS schemes.

Related commands: radius scheme.

Examples

# Display the configuration of all RADIUS schemes.

<Sysname> display radius scheme

------------------------------------------------------------------

SchemeName  : radius1

  Index : 0                           Type : extended

  Primary Auth Server:

    IP: 1.1.1.1                                  Port: 1812   State: active

    Encryption Key : TElnZvIq9pI=

    Probe username : test

    Probe interval : 60

  Primary Acct Server:

    IP: 1.1.1.1                                  Port: 1813   State: active

    Encryption Key : TElnZvIq9pI=

    Probe username : test

    Probe interval : 60

  Second Auth Server:

    IP: 1.1.2.1                                  Port: 1812   State: active

    Encryption Key : N/A

    Probe username : test

    Probe interval : 60

    IP: 1.1.3.1                                  Port: 1812   State: active

    Encryption Key : N/A

  Second Acct Server:

    IP: 1.1.2.1                                  Port: 1813   State: block

    Encryption Key : N/A

    Probe username : test

    Probe interval : 60

  Auth Server Encryption Key : 4v4P3kE6gIs=

  Acct Server Encryption Key : 4v4P3kE6gIs=

  Accounting-On packet disable, send times : 50 , interval : 3s

  Interval for timeout(second)                            : 3

  Retransmission times for timeout                        : 3

  Interval for realtime accounting(minute)                : 12

  Retransmission times of realtime-accounting packet      : 5

  Retransmission times of stop-accounting packet          : 500

  Quiet-interval(min)                                     : 5

  Username format                                         : without-domain

  Data flow unit                                          : Byte

  Packet unit                                             : one

  NAS-IP address                                          : 1.1.1.1

  Attribute 25                                            : car

------------------------------------------------------------------

Total 1 RADIUS scheme(s).

Table 5 Command output

Field

Description

SchemeName

Name of the RADIUS scheme.

Index

Index number of the RADIUS scheme.

Type

Type of the RADIUS server: extended or standard.

Primary Auth Server

Information about the primary authentication server.

Primary Acct Server

Information about the primary accounting server.

Second Auth Server

Information about the secondary authentication server.

Second Acct Server

Information about the secondary accounting server.

IP

IP address of the server.

Port

Service port of the server. If no port configuration is performed, the default port number is displayed.

State

Status of the server: active or blocked.

Encryption Key

Shared key for authentication or accounting packets, in cipher text or plain text. If no shared key is configured, this field displays N/A.

This shared key is used only when no specific shared key is specified for the RADIUS server.

Auth Server Encryption Key

Shared key of authentication packets, in cipher text or plain text.

Acct Server Encryption Key

Shared key of accounting packets, in cipher text or plain text.

Probe username

Username used for server status detection.

Probe interval

Server status detection interval, in minutes.

Accounting-On packet disable

The accounting-on feature is disabled.

send times

Retransmission times of accounting-on packets.

interval

Interval at which the device retransmits accounting-on packets.

Interval for timeout(second)

RADIUS server response timeout period, in seconds.

Retransmission times for timeout

Maximum number of attempts for transmitting a RADIUS packet to a single RADIUS server.

Interval for realtime accounting(minute)

Interval for real-time accounting, in minutes.

Retransmission times of realtime-accounting packet

Maximum number of accounting attempts.

Retransmission times of stop-accounting packet

Maximum number of stop-accounting attempts.

Quiet-interval(min)

Quiet interval for the primary server.

Username format

Format of the usernames to be sent to the RADIUS server.

Data flow unit

Unit for data flows sent to the RADIUS server.

Packet unit

Unit for packets sent to the RADIUS server.

NAS-IP address

Source IP address for RADIUS packets to be sent.

Backup-NAS-IP address

Backup source IP address for RADIUS packets to be sent.

Support for this output information depends on the device model. For more information, see About the WX Series Access Controllers Configuration Guides.

Attribute 25

Interprets RADIUS attribute 25 as the CAR parameters.

 

display radius statistics

Syntax

display radius statistics [ | { begin | exclude | include } regular-expression ]

View

Any view

Default level

2: System level

Parameters

|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.

begin: Displays the first line that matches the specified regular expression and all lines that follow.

exclude: Displays all lines that do not match the specified regular expression.

include: Displays all lines that match the specified regular expression.

regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.

Description

Use display radius statistics to display statistics about RADIUS packets.

Related commands: radius scheme.

Examples

# Display statistics about RADIUS packets.

<Sysname> display radius statistics

state statistic(total=1024):

     DEAD = 1024     AuthProc = 0        AuthSucc = 0

AcctStart = 0         RLTSend = 0         RLTWait = 0

 AcctStop = 0          OnLine = 0            Stop = 0

Received and Sent packets statistic:

Sent PKT total   = 1547     Received PKT total = 23

Resend Times     Resend total

1                508

2                508

Total            1016

RADIUS received packets statistic:

Code =  2   Num = 15       Err = 0

Code =  3   Num = 4        Err = 0

Code =  5   Num = 4        Err = 0

Code = 11   Num = 0        Err = 0

 

Running statistic:

RADIUS received messages statistic:

Auth request             Num = 24       Err = 0        Succ = 24

Account request          Num = 4        Err = 0        Succ = 4

Account off request      Num = 503      Err = 0        Succ = 503

PKT auth timeout         Num = 15       Err = 5        Succ = 10

PKT acct_timeout         Num = 1509     Err = 503      Succ = 1006

Realtime Account timer   Num = 0        Err = 0        Succ = 0

PKT response             Num = 23       Err = 0        Succ = 23

Accounting on response   Num = 0        Err = 0        Succ = 0

Session ctrl pkt         Num = 0        Err = 0        Succ = 0

Normal author request    Num = 0        Err = 0        Succ = 0

Set policy result        Num = 0        Err = 0        Succ = 0

Accounting on request    Num = 0        Err = 0        Succ = 0

Accounting on response  Num = 0        Err = 0        Succ = 0

Distribute request       Num = 0        Err = 0        Succ = 0

RADIUS sent messages statistic:

Auth accept              Num = 10

Auth reject              Num = 14

Auth continue            Num = 0

Account success          Num = 4

Account failure          Num = 3

Server ctrl req          Num = 0

RecError_MSG_sum = 0

SndMSG_Fail_sum  = 0

Timer_Err        = 0

Alloc_Mem_Err    = 0

State Mismatch   = 0

Other_Error      = 0

 

No-response-acct-stop packet = 1

Discarded No-response-acct-stop packet for buffer overflow = 0

Table 6 Command output

Field

Description

state statistic(total=1024)

User statistics, by state.

The value range varies by device. For more information, see About the WX Series Access Controllers Command References.

DEAD

Number of idle users.

The value range varies by device. For more information, see About the WX Series Access Controllers Command References.

AuthProc

Number of users waiting for authentication.

AuthSucc

Number of users who have passed authentication.

AcctStart

Number of users for whom accounting has been started.

RLTSend

Number of users for whom the system sends real-time accounting packets.

RLTWait

Number of users waiting for real-time accounting.

AcctStop

Number of users in the state of accounting waiting stopped.

OnLine

Number of online users.

Stop

Number of users in the state of stop.

Received and Sent packets statistic

Statistics for packets received and sent by the RADIUS module.

Sent PKT total

Number of packets sent.

Received PKT total

Number of packets received.

Resend Times

Number of transmission attempts.

Resend total

Number of packets retransmitted.

Total

Total number of packets retransmitted.

RADIUS received packets statistic

Statistics for packets received by the RADIUS module.

Code

Packet type.

Num

Total number of packets.

Err

Number of packets that the device failed to process.

Succ

Number of messages that the device successfully processed.

Running statistic

Statistics for RADIUS messages received and sent by the RADIUS module.

RADIUS received messages statistic

Statistics for received RADIUS messages.

Auth request

Number of normal authentication requests.

Account request

Number of accounting requests.

Account off request

Number of stop-accounting requests.

PKT auth timeout

Number of authentication timeout messages.

PKT acct_timeout

Number of accounting timeout messages.

Realtime Account timer

Number of real-time accounting requests.

PKT response

Number of responses from servers.

Session ctrl pkt

Number of session control messages.

Normal author request

Number of normal authorization requests.

Set policy result

Number of responses to the Set policy packets.

Accounting on request

Number of accounting-on requests.

Accounting on response

Number of accounting-on responses.

Distribute request

Number of distributed requests.

Auth accept

Number of accepted authentication packets.

Auth reject

Number of rejected authentication packets.

Auth continue

Number of continue-authentication packets.

Account success

Number of accounting succeeded packets.

Account failure

Number of accounting failed packets.

Server ctrl req

Number of server control requests.

RecError_MSG_sum

Number of received packets in error.

SndMSG_Fail_sum

Number of packets that failed to be sent out.

Timer_Err

Number of packets for indicating timer startup failures.

Alloc_Mem_Err

Number of packets for indication memory allocation failures.

State Mismatch

Number of packets for indicating mismatching status.

Other_Error

Number of packets for indicating other types of errors.

No-response-acct-stop packet

Number of times that no response was received for stop-accounting packets.

Discarded No-response-acct-stop packet for buffer overflow

Number of stop-accounting packets that were buffered but then discarded due to full memory.

 

display stop-accounting-buffer (for RADIUS)

Syntax

display stop-accounting-buffer { radius-scheme radius-scheme-name | session-id session-id | time-range start-time stop-time | user-name user-name } [ | { begin | exclude | include } regular-expression ]

View

Any view

Default level

2: System level

Parameters

radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters.

session-id session-id: Specifies a session by its ID. The ID is a string of 1 to 50 characters.

time-range start-time stop-time: Specifies a time range by its start time and end time in the format HH:MM:SS-MM/DD/YYYY or HH:MM:SS-YYYY/MM/DD.

user-name user-name: Specifies a user by the username, a case-sensitive string of 1 to 80 characters. Whether the user-name argument should include the domain name depends on the setting configured by the user-name-format command for the RADIUS scheme.

|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.

begin: Displays the first line that matches the specified regular expression and all lines that follow.

exclude: Displays all lines that do not match the specified regular expression.

include: Displays all lines that match the specified regular expression.

regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.

Description

Use display stop-accounting-buffer to display information about the stop-accounting requests buffered in the device.

 

 

NOTE:

If the device sends a stop-accounting request to a RADIUS server but receives no response, it retransmits it up to a certain number of times (defined by the retry command). If the device still receives no response, it considers the stop-accounting attempt a failure, buffers the request, and makes another stop-accounting attempt. The maximum number of the stop-accounting attempts is defined by the retry stop-accounting command. If all attempts fail, the device discards the request.

 

Related commands: reset stop-accounting-buffer, stop-accounting-buffer enable, user-name-format, retry, and retry stop-accounting.

Examples

# Display information about the stop-accounting requests buffered for user abc.

<Sysname> display stop-accounting-buffer user-name abc

RDIdx Session-ID               user name                  Happened time

1    1000326232325010          abc                       23:27:16-08/31/2006

1    1000326232326010          abc                       23:33:01-08/31/2006

Total 2 record(s) Matched

eap offload

Syntax

eap offload method peap-mschapv2

undo eap offload method peap-mschapv2

View

RADIUS scheme view

Default level

2: System level

Parameters

method peap-mschapv2: Specifies the EAP authentication method. Only PEAP-MSCHAPv2 authentication is supported.

Description

Use eap offload to enable the EAP offload feature.

Use undo eap offload to disable the EAP offload feature.

By default, the EAP offload feature is disabled, and the device forwards received EAP authentication requests in pass-through mode, rather than performing offload operations.

Because some RADIUS servers do not support EAP authentication, it is necessary to enable the EAP offload feature for a RADIUS scheme that uses such a RADIUS server. Later, the access device will process received EAP authentication requests from its clients before forwarding the requests to the RADIUS server for authentication.

Examples

# Enable the EAP offload feature for RADIUS scheme radius1.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] eap offload method peap-mschapv2

key (RADIUS scheme view)

Syntax

key { accounting | authentication } [ cipher | simple ] key

undo key { accounting | authentication }

View

RADIUS scheme view

Default level

2: System level

Parameters

accounting: Sets the shared key for RADIUS accounting packets.

authentication: Sets the shared key for RADIUS authentication/authorization packets.

cipher: Sets and displays the key in cipher text.

simple: Sets and displays the key in plain text.

key: Shared key, case-sensitive. Follow the following guidelines:

·     With the cipher keyword specified, the key must be a ciphertext string of 12, 24, 32, 44, 64, 76, 88, 96, 108, 120, 128, 140, 152, 160, 172, or 184 characters, for example, _(TT8F]Y\5SQ=^Q`MAF4<1!!.

·     With the simple keyword specified, the key must be a plaintext string of 1 to 128 characters, for example aabbcc.

·     With neither the cipher keyword nor the cipher keyword specified, the key must be a plaintext string of 1 to 64 characters, and the key will be displayed in cipher text.

Description

Use key to set the shared key for RADIUS authentication/authorization or accounting packets.

Use undo key to restore the default.

By default, no shared key is configured.

The shared keys specified during the configuration of the RADIUS servers, if any, take precedence.

The shared keys configured on the device must match those configured on the RADIUS servers.

Related commands: display radius scheme.

Examples

# For RADIUS scheme radius1, set the shared key for authentication/authorization packets to the ciphertext string IT8Q4sHnitM= and specify to display the key in cipher text.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] key authentication cipher IT8Q4sHnitM=

[Sysname-radius-radius1] display this

#

radius scheme radius1

 key authentication cipher IT8Q4sHnitM=

#

# For RADIUS scheme radius1, set the shared key for accounting packets to the plaintext string ok and specify to display the key in plain text.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] key accounting simple ok

[Sysname-radius-radius1] display this

#

radius scheme radius1

 key accounting simple ok

#

# For RADIUS scheme radius1, set the shared key for accounting packets to the plaintext string ok and specify to display the key in cipher text.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] key accounting ok

[Sysname-radius-radius1] display this

#

radius scheme radius1

 key accounting cipher aMjIsi9yePg=

#

nas device-id

Syntax

nas device-id device-id

undo nas device-id

View

System view

Default level

2: System level

Parameters

device-id: Device ID for the device, which can be 1 or 2.

Description

Use nas device-id to specify the device ID to be used in stateful failover mode. Two devices operating in stateful failover mode use the device IDs of 1 and 2 respectively.

Use undo nas device-id to restore the default.

By default, a device operates in standalone mode and has no device ID.

Configuring or changing the device ID of a device logs out all online users of the device.

The two devices operating in stateful failover mode must use the device IDs of 1 and 2 respectively.

The device ID is the symbol for stateful failover mode. A device operating in standalone mode does not require any device ID.

 

 

NOTE:

Support for this command depends on the device model. For more information, see About the WX Series Access Controllers Command References.

 

Examples

# Configure the device, which will operate in stateful failover mode, to use the device ID of 1.

<Sysname> system-view

[Sysname] nas device-id 1

Warning: This command will cut all user connections on this device. Continue? [Y

/N]

The other device for stateful failover must be configured to use the device ID of 2.

nas-backup-ip

Syntax

nas-backup-ip ip-address

undo nas-backup-ip

View

RADIUS scheme view

Default level

2: System level

Parameters

ip-address: Backup source IP address for outgoing RADIUS packets. It must be the source IP address for outgoing RADIUS packets that is configured on the other device for stateful failover and cannot be 0.0.0.0, 255.255.255.255, a class D address, a class E address, or a loopback address.

Description

Use nas-backup-ip to specify a backup source IP address for outgoing RADIUS packets in a stateful failover scenario.

Use undo nas-backup-ip to restore the default.

By default, a RADIUS scheme is configured with no backup source IP address for outgoing RADIUS packets.

With a backup source IP address configured for outgoing RADIUS packets, a device for stateful failover sends this address to the RADIUS server if it is the active device. When the active device fails, the RADIUS server can send unsolicited RADIUS packets to the standby device.

A RADIUS scheme can have only one backup source IP address. If you specify a new backup source IP address for the same RADIUS scheme, the new one overwrites the old one.

 

 

NOTE:

·     The setting configured by the nas-backup-ip command in RADIUS scheme view is only for the RADIUS scheme, whereas the setting configured by the radius nas-backup-ip command in system view is for all RADIUS schemes. The setting in RADIUS scheme view takes precedence.

·     Support for this command depends on the device model. For more information, see About the WX Series Access Controllers Command References.

 

Related commands: nas-ip and radius nas-ip.

Examples

# For a device operating in stateful failover mode, set the source IP address and backup source IP address for outgoing RADIUS packets to 2.2.2.2 and 3.3.3.3, respectively.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] nas-ip 2.2.2.2

[Sysname-radius-radius1] nas-backup-ip 3.3.3.3

On the backup device, you must set the source IP address and backup source IP address for outgoing RADIUS packets to 3.3.3.3 and 2.2.2.2, respectively.

nas-ip (RADIUS scheme view)

Syntax

nas-ip { ip-address | ipv6 ipv6-address }

undo nas-ip

View

RADIUS scheme view

Default level

2: System level

Parameters

ip-address: IPv4 address in dotted decimal notation. It must be an address of the device and cannot be 0.0.0.0, 255.255.255.255, a class D address, a class E address, or a loopback address.

ipv6 ipv6-address: Specifies an IPv6 address. It must be an address of the device and must be a unicast address that is neither a loopback address nor a link-local address.

Description

Use nas-ip to specify a source IP address for outgoing RADIUS packets.

Use undo nas-ip to restore the default.

By default, the source IP address of an outgoing RADIUS packet is that configured by the radius nas-ip command in system view. If the radius nas-ip command is not configured, the source IP address is the IP address of the outbound interface.

The source IP address of RADIUS packets that a NAS sends must match the IP address of the NAS that is configured on the RADIUS server. A RADIUS server identifies a NAS by its IP address. Upon receiving a RADIUS packet, a RADIUS server checks whether the source IP address of the packet is the IP address of any managed NAS. If yes, the server processes the packet. If not, the server drops the packet.

The source IP address specified for outgoing RADIUS packets must be of the same IP version as the IP addresses of the RADIUS servers in the RADIUS scheme. Otherwise, the source IP address configuration does not take effect.

A RADIUS scheme can have only one source IP address for outgoing RADIUS packets. If you specify a new source IP address for the same RADIUS scheme, the new one overwrites the old one.

 

 

NOTE:

The setting configured by the nas-ip command in RADIUS scheme view is only for the RADIUS scheme, whereas that configured by the radius nas-ip command in system view is for all RADIUS schemes. The setting in RADIUS scheme view takes precedence.

 

Related commands: radius nas-ip.

Examples

# Set the source IP address for outgoing RADIUS packets to 10.1.1.1.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] nas-ip 10.1.1.1

primary accounting (RADIUS scheme view)

Syntax

primary accounting { ip-address | ipv6 ipv6-address } [ port-number | key [ cipher | simple ] key | probe username name [ interval interval ] ] *

undo primary accounting

View

RADIUS scheme view

Default level

2: System level

Parameters

ip-address: IPv4 address of the primary accounting server.

ipv6 ipv6-address: IPv6 address of the primary accounting server.

port-number: Service port number of the primary accounting server, a UDP port number in the range of 1 to 65535. The default setting is 1813.

key [ cipher | simple ] key: Specifies the shared key (case-sensitive) for exchanging accounting packets with the primary RADIUS accounting server. Follow these guidelines:

·     With the cipher keyword specified, the key must be a ciphertext string of 12, 24, 32, 44, 64, 76, 88, or 96 characters, for example, _(TT8F]Y\5SQ=^Q`MAF4<1!!, and the key will be displayed in cipher text.

·     With the simple keyword specified, the key must be a plaintext string of 1 to 64 characters, for example aabbcc, and the key will be displayed in plain text.

·     With neither the cipher keyword nor the cipher keyword specified, the key must be a plaintext string of 1 to 64 characters, and the key will be displayed in cipher text.

·     This shared key must be the same as that configured on the RADIUS server.

probe: Enables the device to detect the status of the primary RADIUS accounting server.

username name: Specifies the username in the accounting request for server status detection.

interval interval: Specifies the detection interval. The value ranges from 1 to 3600, in minutes. The default setting is 10 minutes.

Description

Use primary accounting to specify the primary RADIUS accounting server.

Use undo primary accounting to remove the configuration.

By default, no primary RADIUS accounting server is specified.

The IP addresses of the accounting servers and those of the authentication/authorization servers must be of the same IP version.

The IP addresses of the primary and secondary accounting servers must be different from each other. Otherwise, the configuration fails.

If you change the primary accounting server when the device has already sent a start-accounting request to the server, the communication with the primary server will time out, and the device will look for a server in active state from the new primary server on.

If you remove an accounting server being used by users, the device no longer sends real-time accounting requests or stop-accounting requests for the users, and does not buffer the stop-accounting requests.

 

 

NOTE:

The shared key configured by this command takes precedence over that configured by using the key accounting [ cipher | simple ] key command.

 

You can use the probe username name [ interval interval ] option to configure status detection settings for a primary RADIUS accounting server. With the configuration, the device sends the server a simulated accounting request carrying the specified username at random time in each specified detection interval. The server is considered to be reachable if it returns a response. Otherwise, device considers the accounting server as unreachable and generates a "server unreachable" trap in any of the following cases:

·     When the device also sends at least one real accounting request and does not receive any response to a real or simulated request within one detection interval.

·     When the device does not send any real accounting request and does not receive any response to a real or simulated request for three successive intervals.

If an accounting response is received from the accounting server in unreachable state, the device immediately generates a "server reachable" trap, and starts a new detection interval.

When the server status detection function is enabled, the quiet timer specified by the timer quiet command does not take effect.

Related commands: key.

Examples

# For RADIUS scheme radius1, set the IP address of the primary accounting server to 10.110.1.2, the UDP port to 1813, and the shared key to the plaintext string IT8Q4sHnitM=, and specify to display the key in cipher text.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] primary accounting 10.110.1.2 1813 key cipher IT8Q4sHnitM=

# For RADIUS scheme radius1, set the username for status detection of the primary accounting server to test, and set the detection interval to 120 minutes.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] primary accounting 10.110.1.2 probe username test interval 120

primary authentication (RADIUS scheme view)

Syntax

primary authentication { ip-address | ipv6 ipv6-address } [ port-number | key [ cipher | simple ] key | probe username name [ interval interval ] ] *

undo primary authentication

View

RADIUS scheme view

Default level

2: System level

Parameters

ip-address: IPv4 address of the primary authentication/authorization server.

ipv6 ipv6-address: IPv6 address of the primary authentication/authorization server.

port-number: Service port number of the primary authentication/authorization server, a UDP port number in the range of 1 to 65535. The default setting is 1812.

key [ cipher | simple ] key: Specifies the shared key (case-sensitive) for exchanging authentication and authorization packets with the primary RADIUS authentication/authorization server. Follow these guidelines:

·     With the cipher keyword specified, the key must be a ciphertext string of 12, 24, 32, 44, 64, 76, 88, or 96 characters, for example, _(TT8F]Y\5SQ=^Q`MAF4<1!!, and the key will be displayed in cipher text.

·     With the simple keyword specified, the key must be a plaintext string of 1 to 64 characters, for example aabbcc, and the key will be displayed in plain text.

·     With neither the cipher keyword nor the cipher keyword specified, the key must be a plaintext string of 1 to 64 characters, and the key will be displayed in cipher text.

·     This shared key must be the same as that configured on the RADIUS server.

probe: Enables the device to detect the status of the primary RADIUS authentication/authorization server.

username name: Specifies the username in the authentication request for server status detection.

interval interval: Specifies the detection interval. The value ranges from 1 to 3600, in minutes. The default setting is 10 minutes.

Description

Use primary authentication to specify the primary RADIUS authentication/authorization server.

Use undo primary authentication to remove the configuration.

By default, no primary RADIUS authentication/authorization server is specified.

The IP addresses of the authentication/authorization servers and those of the accounting servers must be of the same IP version.

The IP addresses of the primary and secondary authentication/authorization servers must be different from each other. Otherwise, the configuration fails.

If you remove the primary authentication server when an authentication process is in progress, the communication with the primary server will time out, and the device will look for a server in active state from the new primary server on.

 

 

NOTE:

The shared key configured by this command takes precedence over that configured by using the key authentication [ cipher | simple ] key command.

 

You can use the probe username name [ interval interval ] option to configure status detection settings for a primary RADIUS authentication/authorization server. With the configuration, the device sends the server a simulated authentication request carrying the specified username at random time in each specified detection interval. The server is considered to be reachable if it returns a response. Otherwise, device considers the server as unreachable and generates a "server unreachable" trap in any of the following cases:

·     When the device also sends at least one real authentication request and does not receive any response to a real or simulated request within one detection interval.

·     When the device does not send any real authentication request and does not receive any response to a real or simulated request for three successive intervals.

If an authentication response is received from the authentication server in unreachable state, the device immediately generates a "server reachable" trap, and starts a new detection interval.

When the server status detection function is enabled, the quiet timer specified by the timer quiet command does not take effect.

Related commands: key.

Examples

# For RADIUS scheme radius1, set the IP address of the primary authentication/authorization server to 10.110.1.1, the UDP port to 1812, and the shared key to the plaintext string hello, and specify to display the key in cipher text.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] primary authentication 10.110.1.1 1812 key hello

# For RADIUS scheme radius1, set the username for status detection of the primary authentication/authorization server to test, and set the detection interval to 120 minutes.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] primary authentication 10.110.1.1 probe username test interval 120

radius client

Syntax

radius client enable

undo radius client

View

System view

Default level

2: System level

Parameters

None

Description

Use radius client enable to enable the RADIUS listening port of a RADIUS client.

Use undo radius client to disable the RADIUS listening port of a RADIUS client.

By default, the RADIUS listening port is enabled.

When the listening port of the RADIUS client is disabled:

·     No more stop-accounting requests of online users cannot be sent out or buffered, and the RADIUS server can no longer receive logoff requests from online users. After a user goes offline, the RADIUS server still has the user's record during a certain period of time.

·     The buffered accounting packets cannot be sent out and are deleted from the buffer when the configured maximum number of attempts is reached, affecting the precision of user accounting.

·     If local authentication, authorization, or accounting is configured as the backup, the device performs local authentication, authorization, or accounting instead after the RADIUS request fails. Local accounting is only for monitoring and controlling the number of local user connections; it does not provide the statistics function that the accounting feature generally provides.

Examples

# Enable the listening port of the RADIUS client.

<Sysname> system-view

[Sysname] radius client enable

radius log packet

Syntax

radius log packet

undo radius log packet

View

System view

Default level

2: System level

Parameters

None

Description

Use radius log packet to enable logging of RADIUS packets.

Use undo radius log packet to disable logging of RADIUS packets.

By default, logging of RADIUS packets is disabled.

Examples

# Enable logging of RADIUS packets.

<Sysname> system-view

[Sysname] radius log packet

radius nas-backup-ip

Syntax

radius nas-backup-ip ip-address

undo radius nas-backup-ip

View

System view

Default level

2: System level

Parameters

ip-address: Backup source IP address for outgoing RADIUS packets. It must be the source IP address for outgoing RADIUS packets that is configured on the backup device for stateful failover and cannot be 0.0.0.0, 255.255.255.255, a class D address, a class E address, or a loopback address.

Description

Use radius nas-backup-ip to specify a backup source IP address for outgoing RADIUS packets.

Use undo radius nas-backup-ip to restore the default.

By default, a device is configured with no backup source IP address for outgoing RADIUS packets.

With a backup source IP address configured for outgoing RADIUS packets, a device for stateful failover sends this address to the RADIUS server if it is the active device. When the active device fails, the RADIUS server can send unsolicited RADIUS packets to the backup device.

You can specify up to one public-network backup source IP address and 15 private-network backup source IP addresses. A newly specified public-network backup source IP address overwrites the previous one.

 

 

NOTE:

·     The setting configured by the nas-backup-ip command in RADIUS scheme view is only for the RADIUS scheme, whereas that configured by the radius nas-backup-ip command in system view is for all RADIUS schemes. The setting in RADIUS scheme view takes precedence.

·     Support for this command depends on the device model. For more information, see About the WX Series Access Controllers Command References.

 

Related commands: nas-backup-ip.

Examples

# For the device operating in stateful failover mode, specify the source IP address and backup source IP address for RADIUS packets as 2.2.2.2 and 3.3.3.3, respectively.

<Sysname> system-view

[Sysname] radius nas-ip 2.2.2.2

[Sysname] radius nas-backup-ip 3.3.3.3

On the backup device, you must specify the source IP address and backup source IP address for RADIUS packets as 3.3.3.3 and 2.2.2.2, respectively.

radius nas-ip

Syntax

radius nas-ip { ip-address | ipv6 ipv6-address }

undo radius nas-ip { ip-address | ipv6 ipv6-address }

View

System view

Default level

2: System level

Parameters

ip-address: IPv4 address in dotted decimal notation. It must be an address of the device and cannot be 0.0.0.0, 255.255.255.255, a class D address, a class E address, or a loopback address.

ipv6 ipv6-address: Specifies an IPv6 address. It must be a unicast address of the device that is neither a loopback address nor a link-local address.

Description

Use radius nas-ip to specify a source address for outgoing RADIUS packets.

Use undo radius nas-ip to remove the configuration.

By default, the source IP address of an outgoing RADIUS packet is the IP address of the outbound interface.

You can specify up to one public-network source IP address and 15 private-network source IP addresses. A newly specified public-network source IP address overwrites the previous one.

The source IP address of RADIUS packets that a NAS sends must match the IP address of the NAS that is configured on the RADIUS server. A RADIUS server identifies a NAS by its IP address. Upon receiving a RADIUS packet, a RADIUS server checks whether the source IP address of the packet is the IP address of any managed NAS. If yes, the server processes the packet. If not, the server drops the packet.

 

 

NOTE:

The setting configured by the nas-ip command in RADIUS scheme view is only for the RADIUS scheme, whereas that configured by the radius nas-ip command in system view is for all RADIUS schemes. The setting in RADIUS scheme view takes precedence.

 

Related commands: nas-ip.

Examples

# Set the IP address for the device to use as the source address of the RADIUS packets to 129.10.10.1.

<Sysname> system-view

[Sysname] radius nas-ip 129.10.10.1

radius scheme

Syntax

radius scheme radius-scheme-name

undo radius scheme radius-scheme-name

View

System view

Default level

3: Manage level

Parameters

radius-scheme-name: RADIUS scheme name, a case-insensitive string of 1 to 32 characters.

Description

Use radius scheme to create a RADIUS scheme and enter RADIUS scheme view.

Use undo radius scheme to delete a RADIUS scheme.

By default, no RADIUS scheme is defined.

A RADIUS scheme can be referenced by more than one ISP domain at the same time.

A RADIUS scheme referenced by ISP domains cannot be removed.

Related commands: display radius scheme.

Examples

# Create a RADIUS scheme named radius1 and enter RADIUS scheme view.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1]

radius trap

Syntax

radius trap { accounting-server-down | authentication-error-threshold | authentication-server-down }

undo radius trap { accounting-server-down | authentication-error-threshold | authentication-server-down }

View

System view

Default level

2: System level

Parameters

accounting-server-down: Sends traps when the reachability of the accounting server changes.

authentication-error-threshold: Sends traps when the number of authentication failures exceed the specified threshold. The threshold is represented by the ratio of the number of failed request transmission attempts to the total number of transmission attempts. It ranges from 1 to 100 and defaults to 30. This threshold can only be configured through the MIB.

authentication-server-down: Sends traps when the reachability of the authentication server changes.

Description

Use radius trap to enable the trap function for RADIUS.

Use undo radius trap to disable the trap function for RADIUS.

By default, the trap function is disabled for RADIUS.

With the trap function for RADIUS, a NAS sends a trap message in the following cases:

·     The status of a RADIUS server changes. If a NAS sends a request but receives no response before the maximum number of attempts is exceeded, it places the server to the blocked state and sends a trap message. If a NAS receives a response from a RADIUS server it considered unreachable, it considers that the RADIUS server is reachable again and also sends a trap message.

·     The ratio of the number of failed transmission attempts to the total number of authentication request transmission attempts reaches the threshold.

Examples

# Enable the device to send traps in response to accounting server reachability changes.

<Sysname> system-view

[Sysname] radius trap accounting-server-down

reset radius statistics

Syntax

reset radius statistics

View

User view

Default level

2: System level

Parameters

None

Description

Use reset radius statistics to clear RADIUS statistics.

Related commands: display radius statistics.

Examples

# Clear RADIUS statistics.

<Sysname> reset radius statistics

reset stop-accounting-buffer (for RADIUS)

Syntax

reset stop-accounting-buffer { radius-scheme radius-scheme-name | session-id session-id | time-range start-time stop-time | user-name user-name }

View

User view

Default level

2: System level

Parameters

radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters.

session-id session-id: Specifies a session by its ID, a string of 1 to 50 characters.

time-range start-time stop-time: Specifies a time range by its start time and end time in the format HH:MM:SS-MM/DD/YYYY or HH:MM:SS-YYYY/MM/DD.

user-name user-name: Specifies a username. The username is a case-sensitive string of 1 to 80 characters. The format of the user-name argument (whether the domain name must be included) must comply with that specified in the RADIUS scheme.

Description

Use reset stop-accounting-buffer to clear the buffered stop-accounting requests for which no responses have been received.

Related commands: stop-accounting-buffer enable and display stop-accounting-buffer.

Examples

# Clear the buffered stop-accounting requests for user user0001@test.

<Sysname> reset stop-accounting-buffer user-name user0001@test

# Clear the buffered stop-accounting requests in the time range from 0:0:0 to 23:59:59 on August 31, 2006.

<Sysname> reset stop-accounting-buffer time-range 0:0:0-08/31/2006 23:59:59-08/31/2006

retry

Syntax

retry retry-times

undo retry

View

RADIUS scheme view

Default level

2: System level

Parameters

retry-times: Maximum number of RADIUS packet transmission attempts, in the range of 1 to 20.

Description

Use retry to set the maximum number of attempts for transmitting a RADIUS packet to a single RADIUS server.

Use undo retry to restore the default.

By default, the maximum number of RADIUS packet transmission attempts is 3.

Because RADIUS uses UDP packets to transmit data, the communication is not reliable. If the device does not receive a response to its request from the RADIUS server within the response timeout period, it retransmits the RADIUS request. If the number of transmission attempts exceeds the limit but the device still receives no response from the RADIUS server, the device considers the request a failure.

The maximum number of packet transmission attempts multiplied by the RADIUS server response timeout period cannot be greater than 75.

Related commands: radius scheme and timer response-timeout.

Examples

# Set the maximum number of RADIUS request transmission attempts to 5 for RADIUS scheme radius1.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] retry 5

retry realtime-accounting

Syntax

retry realtime-accounting retry-times

undo retry realtime-accounting

View

RADIUS scheme view

Default level

2: System level

Parameters

retry-times: Maximum number of accounting attempts, in the range of 1 to 255.

Description

Use retry realtime-accounting to set the maximum number of accounting attempts.

Use undo retry realtime-accounting to restore the default.

By default, the maximum number of accounting attempts is 5.

A RADIUS server usually checks whether a user is online by using a timeout timer. If it receives no real-time accounting request for a user in the timeout period from the NAS, it considers that there may be line or device failures and stops accounting for the user. This may happen when some unexpected failure occurs. To cooperate with this feature of the RADIUS server, the NAS needs to keep pace with the server in disconnecting the user. The maximum number of accounting attempts, together with some other parameters, enables the NAS to promptly disconnect the user.

 

 

NOTE:

The maximum number of accounting attempts, together with some other parameters, controls how the NAS sends accounting request packets.

Suppose that the RADIUS server response timeout period is three seconds (set with the timer response-timeout command), the maximum number of RADIUS packet transmission attempts is three (set with the retry command), the real-time accounting interval is 12 minutes (set with the timer realtime-accounting command), and the maximum number of accounting attempts is five (set with the retry realtime-accounting command). In this case, the device generates an accounting request every 12 minutes, and retransmits the request if it sends the request but receives no response within three seconds. If the device receives no response after transmitting the request three times, it considers the accounting attempt a failure, and makes another accounting attempt. If five consecutive accounting attempts fail, the device cuts the user connection.

 

Related commands: retry, timer response-timeout, and timer realtime-accounting.

Examples

# Set the maximum number of accounting attempts to 10 for RADIUS scheme radius1.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] retry realtime-accounting 10

retry stop-accounting (RADIUS scheme view)

Syntax

retry stop-accounting retry-times

undo retry stop-accounting

View

RADIUS scheme view

Default level

2: System level

Parameters

retry-times: Maximum number of stop-accounting attempts, in the range of 10 to 65535.

Description

Use retry stop-accounting to set the maximum number of stop-accounting attempts.

Use undo retry stop-accounting to restore the default.

By default, the maximum number of stop-accounting attempts is 500.

 

 

NOTE:

The maximum number of stop-accounting attempts, together with some other parameters, controls how the NAS deals with stop-accounting request packets.

Suppose that the RADIUS server response timeout period is three seconds (set with the timer response-timeout command), the maximum number of transmission attempts is five (set with the retry command), and the maximum number of stop-accounting attempts is 20 (set with the retry stop-accounting command). For each stop-accounting request, if the device receives no response within three seconds, it retransmits the request. If it receives no responses after retransmitting the request five times, it considers the stop-accounting attempt a failure, buffers the request, and makes another stop-accounting attempt. If 20 consecutive attempts fail, the device discards the request.

 

Related commands: retry, retry stop-accounting, timer response-timeout, and display stop-accounting-buffer.

Examples

# Set the maximum number of stop-accounting attempts to 1000 for RADIUS scheme radius1.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] retry stop-accounting 1000

secondary accounting (RADIUS scheme view)

Syntax

secondary accounting { ipv4-address | ipv6 ipv6-address } [ port-number | key [ cipher | simple ] key | probe username name [ interval interval ] ] *

undo secondary accounting [ ipv4-address | ipv6 ipv6-address ]

View

RADIUS scheme view

Default level

2: System level

Parameters

ipv4-address: IPv4 address of the secondary accounting server, in dotted decimal notation.

ipv6 ipv6-address: IPv6 address of the secondary accounting server.

port-number: Service port number of the secondary accounting server, a UDP port number in the range of 1 to 65535. The default setting is 1813.

key [ cipher | simple ] key: Specifies the shared key (case-sensitive) for exchanging accounting packets with the secondary RADIUS accounting server. Follow these guidelines:

·     With the cipher keyword specified, the key must be a ciphertext string of 12, 24, 32, 44, 64, 76, 88, or 96 characters, for example, _(TT8F]Y\5SQ=^Q`MAF4<1!!, and the key will be displayed in cipher text.

·     With the simple keyword specified, the key must be a plaintext string of 1 to 64 characters, for example aabbcc, and the key will be displayed in plain text.

·     With neither the cipher keyword nor the cipher keyword specified, the key must be a plaintext string of 1 to 64 characters, and the key will be displayed in cipher text.

·     This shared key must be the same as that configured on the RADIUS server.

probe: Enables the device to detect the status of the secondary RADIUS accounting server.

username name: Specifies the username in the accounting request for server status detection.

interval interval: Specifies the detection interval. The value ranges from 1 to 3600, in minutes. The default setting is 10 minutes.

Description

Use secondary accounting to specify secondary RADIUS accounting servers for a RADIUS scheme.

Use undo secondary accounting to remove a secondary RADIUS accounting server.

By default, no secondary RADIUS accounting server is specified.

You can configure up to 16 secondary RADIUS accounting servers for a RADIUS scheme by executing this command repeatedly. After the configuration, if the primary server fails, the device looks for a secondary server in active state (a secondary RADIUS accounting server configured earlier has a higher priority) and tries to communicate with it.

The IP addresses of the accounting servers and those of the authentication/authorization servers must be of the same IP version.

The IP addresses of the primary and secondary accounting servers must be different from each other. Otherwise, the configuration fails.

If you remove a secondary accounting server when the device has already sent a start-accounting request to the server, the communication with the secondary server will time out, and the device will look for a server in active state from the primary server on.

If you remove an accounting server being used by online users, the device no longer sends real-time accounting requests or stop-accounting requests for the users, and does not buffer the stop-accounting requests.

 

 

NOTE:

The shared key configured by this command takes precedence over that configured by using the key accounting [ cipher | simple ] key command.

 

You can use the probe username name [ interval interval ] option to configure status detection settings for a secondary RADIUS accounting server. With the configuration, the device sends the server a simulated accounting request carrying the specified username at random time in each specified detection interval. The server is considered to be reachable if it returns a response. Otherwise, device considers the accounting server as unreachable and generates a "server unreachable" trap in any of the following cases:

·     When the device also sends at least one real accounting request and does not receive any response to a real or simulated request within one detection interval.

·     When the device does not send any real accounting request and does not receive any response to a real or simulated request for three successive intervals.

If an accounting response is received from the accounting server in unreachable state, the device immediately generates a "server reachable" trap, and starts a new detection interval.

When the server status detection function is enabled, the quiet timer specified by the timer quiet command does not take effect.

Related commands: key and state.

Examples

# For RADIUS scheme radius1, set the IP address of the secondary accounting server to 10.110.1.1, the UDP port to 1813, and the shared key to the ciphertext string IT8Q4sHnitM=, and specify to display the key in cipher text.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] secondary accounting 10.110.1.1 1813 key cipher IT8Q4sHnitM=

# For RADIUS scheme radius2, specify two secondary accounting servers with the server IP addresses of 10.110.1.1 and 10.110.1.2 and the UDP port number of 1813. Set the shared keys to plaintext string hello, and specify to display the keys in cipher text.

<Sysname> system-view

[Sysname] radius scheme radius2

[Sysname-radius-radius2] secondary accounting 10.110.1.1 1813 key hello

[Sysname-radius-radius2] secondary accounting 10.110.1.2 1813 key hello

# For RADIUS scheme radius1, set the username for status detection of the secondary accounting server (10.110.1.1) to test, and set the detection interval to 120 minutes.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] secondary accounting 10.110.1.1 probe username test interval 120

secondary authentication (RADIUS scheme view)

Syntax

secondary authentication { ipv4-address | ipv6 ipv6-address } [ port-number | key [ cipher | simple ] key | probe username name [ interval interval ] ] *

undo secondary authentication [ ipv4-address | ipv6 ipv6-address ]

View

RADIUS scheme view

Default level

2: System level

Parameters

ipv4-address: IPv4 address of the secondary authentication/authorization server, in dotted decimal notation.

ipv6 ipv6-address: IPv6 address of the secondary authentication/authorization server.

port-number: Service port number of the secondary authentication/authorization server, a UDP port number in the range of 1 to 65535. The default setting is 1812.

key [ cipher | simple ] key: Specifies the shared key (case-sensitive) for exchanging authentication/authorization packets with the secondary RADIUS authentication/authorization server. Follow these guidelines:

·     With the cipher keyword specified, the key must be a ciphertext string of 12, 24, 32, 44, 64, 76, 88, or 96 characters, for example, _(TT8F]Y\5SQ=^Q`MAF4<1!!, and the key will be displayed in cipher text.

·     With the simple keyword specified, the key must be a plaintext string of 1 to 64 characters, for example aabbcc, and the key will be displayed in plain text.

·     With neither the cipher keyword nor the cipher keyword specified, the key must be a plaintext string of 1 to 64 characters, and the key will be displayed in cipher text.

·     This shared key must be the same as that configured on the RADIUS server.

probe: Enables the device to detect the status of the secondary RADIUS authentication/authorization server.

username name: Specifies the username in the authentication request for server status detection.

interval interval: Specifies the detection interval. The value ranges from 1 to 3600, in minutes. The default setting is 10 minutes.

Description

Use secondary authentication to specify secondary RADIUS authentication/authorization servers for a RADIUS scheme.

Use undo secondary authentication to remove a secondary RADIUS authentication/authorization server.

By default, no secondary RADIUS authentication/authorization server is specified.

You can configure up to 16 secondary RADIUS authentication/authorization servers for a RADIUS scheme by executing this command repeatedly. After the configuration, if the primary server fails, the device looks for a secondary server in active state (a secondary RADIUS authentication/authorization server configured earlier has a higher priority) and tries to communicate with it.

The IP addresses of the authentication/authorization servers and those of the accounting servers must be of the same IP version.

The IP addresses of the primary and secondary authentication/authorization servers must be different from each other. Otherwise, the configuration fails.

If you remove a secondary authentication server in use in the authentication process, the communication with the secondary server will time out, and the device will look for a server in active state from the primary server on.

 

 

NOTE:

The shared key configured by this command takes precedence over that configured by using the key accounting [ cipher | simple ] key command.

 

You can use the probe username name [ interval interval ] option to configure status detection settings for a secondary RADIUS authentication/authorization server. With the configuration, the device sends the server a simulated authentication request carrying the specified username at random time in each specified detection interval. The server is considered to be reachable if it returns a response. Otherwise, device considers the server as unreachable and generates a "server unreachable" trap in any of the following cases:

·     When the device also sends at least one real authentication request and does not receive any response to a real or simulated request within one detection interval.

·     When the device does not send any real authentication request and does not receive any response to a real or simulated request for three successive intervals.

If an authentication response is received from the authentication server in unreachable state, the device immediately generates a "server reachable" trap, and starts a new detection interval.

When the server status detection function is enabled, the quiet timer specified by the timer quiet command does not take effect.

Related commands: key, radius scheme, and state.

Examples

# For RADIUS scheme radius1, set the IP address of the secondary authentication/authorization server to 10.110.1.2, the UDP port to 1812, and the shared key to the ciphertext string IT8Q4sHnitM=, and specify to display the key in cipher text.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] secondary authentication 10.110.1.2 1812 key cipher IT8Q4sHnitM=

# Specify two secondary authentication/authorization servers for RADIUS scheme radius2, with the server IP addresses of 10.110.1.1 and 10.110.1.2, and the UDP port number of 1813. Set the shared keys to plaintext string hello and specify to display the key in plain text.

<Sysname> system-view

[Sysname] radius scheme radius2

[Sysname-radius-radius2] secondary authentication 10.110.1.1 1812 key simple hello

[Sysname-radius-radius2] secondary authentication 10.110.1.2 1812 key simple hello

# For RADIUS scheme radius1, set the username for status detection of the secondary authentication/authorization server (10.110.1.1) to test, and set the detection interval to 120 minutes.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] secondary authentication 10.110.1.1 probe username test interval 120

security-policy-server

Syntax

security-policy-server ip-address

undo security-policy-server { ip-address | all }

View

RADIUS scheme view

Default level

2: System level

Parameters

ip-address: Specifies a security policy server by its IP address.

all: Specifies all security policy servers.

Description

Use security-policy-server to specify a security policy server for a RADIUS scheme.

Use undo security-policy-server to remove one or all security policy servers for a RADIUS scheme.

By default, no security policy server is specified for a RADIUS scheme.

You can specify up to eight security policy servers for a RADIUS scheme.

You can change security policy servers for a RADIUS scheme only when no user is using the scheme.

Examples

# Specify security policy server 10.110.1.2 for RADIUS scheme radius1.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] security-policy-server 10.110.1.2

server-type

Syntax

server-type { extended | standard }

undo server-type

View

RADIUS scheme view

Default level

2: System level

Parameters

extended: Specifies the extended RADIUS server (generally running on IMC), which requires the RADIUS client and RADIUS server to interact according to the procedures and packet formats provisioned by the proprietary RADIUS protocol.

standard: Specifies the standard RADIUS server, which requires the RADIUS client and RADIUS server to interact according to the procedures and packet format of the standard RADIUS protocol (RFC 2865 and 2866 or their successors).

Description

Use server-type to configure the RADIUS server type.

Use undo server-type to restore the default.

By default, the supported RADIUS server type is standard.

Examples

# Configure the RADIUS server type of RADIUS scheme radius1 as standard.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] server-type standard

state primary

Syntax

state primary { accounting | authentication } { active | block }

View

RADIUS scheme view

Default level

2: System level

Parameters

accounting: Sets the status of the primary RADIUS accounting server.

authentication: Sets the status of the primary RADIUS authentication/authorization server.

active: Specifies the active state, the normal operation state.

block: Specifies the blocked state, the out-of-service state.

Description

Use state primary to set the status of a primary RADIUS server.

By default, the primary RADIUS server specified for a RADIUS scheme is in active state.

During an authentication or accounting process, the device first tries to communicate with the primary server if the primary server is in active state. If the primary server is unavailable, the device changes the status of the primary server to blocked, starts a quiet timer for the server, and then tries to communicate with a secondary server in active state (a secondary RADIUS server configured earlier has a higher priority). When the quiet timer of the primary server times out, the status of the server changes to active automatically. If you set the status of the server to blocked before the quiet timer times out, the status of the server cannot change back to active automatically unless you set the status to active manually.

When the primary server and secondary servers are both in blocked state, the device communicates with the primary server.

Related commands: display radius scheme and state secondary.

Examples

# Set the status of the primary server in RADIUS scheme radius1 to blocked.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] state primary authentication block

state secondary

Syntax

state secondary { accounting | authentication } [ ip ipv4-address | ipv6 ipv6-address ] { active | block }

View

RADIUS scheme view

Default level

2: System level

Parameters

accounting: Sets the status of the secondary RADIUS accounting server.

authentication: Sets the status of the secondary RADIUS authentication/authorization server.

ip ipv4-address: Specifies the IPv4 address of the secondary RADIUS server.

ipv6 ipv6-address: Specifies the IPv6 address of the secondary RADIUS server.

active: Specifies the active state, the normal operation state.

block: Specifies the blocked state, the out-of-service state.

Description

Use state secondary to set the status of a secondary RADIUS server.

By default, every secondary RADIUS server specified in a RADIUS scheme is in active state.

If no IP address is specified, this command changes the status of all configured secondary servers for authentication/authorization or accounting.

If the device finds that a secondary server in active state is unreachable, the device changes the status of the secondary server to blocked, starts a quiet timer for the server, and continues to try to communicate with the next secondary server in active state (a secondary RADIUS server configured earlier has a higher priority). When the quiet timer of a server times out, the status of the server changes to active automatically. If you set the status of the server to blocked before the quiet timer times out, the status of the server cannot change back to active automatically unless you set the status to active manually. If all configured secondary servers are unreachable, the device considers the authentication or accounting attempt a failure.

Related commands: display radius scheme and state primary.

Examples

# Set the status of all the secondary servers in RADIUS scheme radius1 to blocked.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] state secondary authentication block

stop-accounting-buffer enable (RADIUS scheme view)

Syntax

stop-accounting-buffer enable

undo stop-accounting-buffer enable

View

RADIUS scheme view

Default level

2: System level

Parameters

None

Description

Use stop-accounting-buffer enable to enable the device to buffer stop-accounting requests to which no responses are received.

Use undo stop-accounting-buffer enable to disable the buffering function.

By default, the device buffers stop-accounting requests to which no responses are received.

Stop-accounting requests affect the charge to users. A NAS must make its best effort to send every stop-accounting request to the RADIUS accounting servers. For each stop-accounting request getting no response in the specified period of time, the NAS buffers and resends the packet until it receives a response or the number of transmission attempts reaches the configured limit. In the latter case, the NAS discards the packet. However, if you have removed the accounting server, stop-accounting messages are not buffered.

Related commands: reset stop-accounting-buffer and display stop-accounting-buffer.

Examples

# Enable the device to buffer the stop-accounting requests to which no responses are received.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] stop-accounting-buffer enable

timer quiet (RADIUS scheme view)

Syntax

timer quiet minutes

undo timer quiet

View

RADIUS scheme view

Default level

2: System level

Parameters

minutes: Server quiet period in minutes, ranging from 0 to 255. If you set this argument to 0, when the device needs to send an authentication or accounting request but finds that the current server is unreachable, it does not change the server's status that it maintains. It simply sends the request to the next server in active state. As a result, when the device needs to send a request of the same type for another user, it still tries to send the request to the current server because the current server is in active state.

Description

Use timer quiet to set the server quiet timer. This timer controls whether the device changes the status of an unreachable server from active to blocked, and how long the device keeps an unreachable server in blocked state.

Use undo timer quiet to restore the default.

By default, the server quiet period is 5 minutes.

If you determine that the primary server is unreachable because the device's port connected to the server is out of service temporarily or the server is busy, you can set the server quiet period to 0 so that the device uses the primary server whenever possible.

Be sure to set the server quiet timer properly. Too short a quiet timer may result in frequent authentication or accounting failures because the device has to repeatedly try to communicate with an unreachable server that is in active state.

Related commands: display radius scheme.

Examples

# Set the quiet timer for the servers to 10 minutes.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] timer quiet 10

timer realtime-accounting (RADIUS scheme view)

Syntax

timer realtime-accounting minutes

undo timer realtime-accounting

View

RADIUS scheme view

Default level

2: System level

Parameters

minutes: Real-time accounting interval in minutes, zero or a multiple of 3 in the range of 3 to 60.

Description

Use timer realtime-accounting to set the real-time accounting interval.

Use undo timer realtime-accounting to restore the default.

By default, the real-time accounting interval is 12 minutes.

For real-time accounting, a NAS must transmit the accounting information of online users to the RADIUS accounting server periodically. This command sets the interval.

When the real-time accounting interval on the device is zero, the device sends online user accounting information to the RADIUS accounting server at the real-time accounting interval configured on the server (if any), or does not send online user accounting information.

Different real-time accounting intervals impose different performance requirements on the NAS and the RADIUS server. A shorter interval helps achieve higher accounting precision but requires higher performance. Use a longer interval when there are a large number of users (1000 or more).

Table 7 Recommended real-time accounting intervals

Number of users

Real-time accounting interval (in minutes)

1 to 99

3

100 to 499

6

500 to 999

12

1000 or more

15 or longer

 

Related commands: retry realtime-accounting.

Examples

# Set the real-time accounting interval to 51 minutes for RADIUS scheme radius1.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] timer realtime-accounting 51

timer response-timeout (RADIUS scheme view)

Syntax

timer response-timeout seconds

undo timer response-timeout

View

RADIUS scheme view

Default level

2: System level

Parameters

seconds: RADIUS server response timeout period in seconds, in the range of 1 to 10.

Description

Use timer response-timeout to set the RADIUS server response timeout timer.

Use undo timer response-timeout to restore the default.

By default, the RADIUS server response timeout period is 3 seconds.

If a NAS receives no response from the RADIUS server in a period of time after sending a RADIUS request (authentication/authorization or accounting request), it resends the request so that the user has more opportunity to obtain the RADIUS service. The NAS uses the RADIUS server response timeout timer to control the transmission interval.

The maximum number of RADIUS packet transmission attempts multiplied by the RADIUS server response timeout period cannot be greater than 75.

Related commands: retry.

Examples

# Set the RADIUS server response timeout timer to 5 seconds for RADIUS scheme radius1.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] timer response-timeout 5

user-name-format (RADIUS scheme view)

Syntax

user-name-format { keep-original | with-domain | without-domain }

View

RADIUS scheme view

Default level

2: System level

Parameters

keep-original: Sends the username to the RADIUS server as it is input.

with-domain: Includes the ISP domain name in the username sent to the RADIUS server.

without-domain: Excludes the ISP domain name from the username sent to the RADIUS server.

Description

Use user-name-format to specify the format of the username to be sent to a RADIUS server.

By default, the ISP domain name is included in the username.

A username is generally in the format userid@isp-name, of which isp-name is used by the device to determine the ISP domain to which a user belongs. Some earlier RADIUS servers, however, cannot recognize a username including an ISP domain name. Before sending a username including a domain name to such a RADIUS server, the device must remove the domain name. This command allows you to specify whether to include a domain name in a username to be sent to a RADIUS server.

If a RADIUS scheme defines that the username is sent without the ISP domain name, do not apply the RADIUS scheme to more than one ISP domain, avoiding the confused situation where the RADIUS server regards two users in different ISP domains but with the same userid as one.

For 802.1X users using EAP authentication, the user-name-format command configured for a RADIUS scheme does not take effect and the device does not change the usernames from clients before forwarding them to the RADIUS server.

If the RADIUS scheme is used for roaming wireless users, specify the keep-original keyword. Otherwise, authentication of the wireless users may fail.

Related commands: radius scheme.

Examples

# Specify the device to remove the domain name in the username sent to the RADIUS servers for the RADIUS scheme radius1.

<Sysname> system-view

[Sysname] radius scheme radius1

[Sysname-radius-radius1] user-name-format without-domain

HWTACACS configuration commands

data-flow-format (HWTACACS scheme view)

Syntax

data-flow-format { data { byte | giga-byte | kilo-byte | mega-byte } | packet { giga-packet | kilo-packet | mega-packet | one-packet } } *

undo data-flow-format { data | packet }

View

HWTACACS scheme view

Default level

2: System level

Parameters

data { byte | giga-byte | kilo-byte | mega-byte }: Specifies the unit for data flows, which can be byte, kilobyte, megabyte, or gigabyte.

packet { giga-packet | kilo-packet | mega-packet | one-packet }: Specifies the unit for data packets, which can be one-packet, kilo-packet, mega-packet, or giga-packet.

Description

Use data-flow-format to set the traffic statistics unit for data flows or packets.

Use undo data-flow-format to restore the default.

By default, the unit for data flows is byte and that for data packets is one-packet.

The unit for data flows and that for packets must be consistent with those on the HWTACACS server. Otherwise, accounting cannot be performed correctly.

Related commands: display hwtacacs.

Examples

# Set the traffic statistics unit for data flows and that for packets to kilobytes and kilo-packets, respectively, in HWTACACS scheme hwt1.

<Sysname> system-view

[Sysname] hwtacacs scheme hwt1

[Sysname-hwtacacs-hwt1] data-flow-format data kilo-byte packet kilo-packet

display hwtacacs

Syntax

display hwtacacs [ hwtacacs-scheme-name [ statistics ] ] [ | { begin | exclude | include } regular-expression ]

View

Any view

Default level

2: System level

Parameters

hwtacacs-scheme-name: HWTACACS scheme name.

statistics: Displays the statistics for the HWTACACS servers specified in the HWTACACS scheme. Without this keyword, the command displays the configuration of the HWTACACS scheme.

|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.

begin: Displays the first line that matches the specified regular expression and all lines that follow.

exclude: Displays all lines that do not match the specified regular expression.

include: Displays all lines that match the specified regular expression.

regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.

Description

Use display hwtacacs to display the configuration of HWTACACS schemes or the statistics for the HWTACACS servers specified in HWTACACS schemes.

If no HWTACACS scheme is specified, the command displays the configuration of all HWTACACS schemes.

If no slot number is specified, the command displays the configuration of the HWTACACS scheme on the main processing unit.

If no IRF member ID is specified, the command displays the configuration of the HWTACACS schemes on all members of an IRF virtual device.

Related commands: hwtacacs scheme.

Examples

# Display the configuration of HWTACACS scheme gy.

<Sysname> display hwtacacs gy

  --------------------------------------------------------------------

HWTACACS-server template name     : gy

  Primary-authentication-server     : 172.31.1.11:49

  Primary-authorization-server      : 172.31.1.11:49

  Primary-accounting-server         : 172.31.1.11:49

  Secondary-authentication-server   : 0.0.0.0:0

  Secondary-authorization-server    : 0.0.0.0:0

  Secondary-accounting-server       : 0.0.0.0:0

  Current-authentication-server     : 172.31.1.11:49

  Current-authorization-server      : 172.31.1.11:49

  Current-accounting-server         : 172.31.1.11:49

  NAS-IP-address                    : 0.0.0.0

  key authentication                : 790131

  key authorization                 : 790131

  key accounting                    : 790131

  Quiet-interval(min)               : 5

  Realtime-accounting-interval(min) : 12

  Response-timeout-interval(sec)    : 5

  Acct-stop-PKT retransmit times    : 100

  Username format                   : with-domain

  Data traffic-unit                 : B

  Packet traffic-unit               : one-packet

  -------------------------------------------------------------------- 

Table 8 Command output

Field

Description

HWTACACS-server template name

Name of the HWTACACS scheme.

Primary-authentication-server

IP address and port number of the primary authentication server. If no primary authentication server is specified, this field displays 0.0.0.0:0.

This rule is also applicable to the following eight fields.

Primary-authorization-server

IP address and port number of the primary authorization server.

Primary-accounting-server

IP address and port number of the primary accounting server.

Secondary-authentication-server

IP address and port number of the secondary authentication server.

Secondary-authorization-server

IP address and port number of the secondary authorization server.

Secondary-accounting-server

IP address and port number of the secondary accounting server.

Current-authentication-server

IP address and port number of the currently used authentication server.

Current-authorization-server

IP address and port number of the currently used authorization server.

Current-accounting-server

IP address and port number of the currently used accounting server.

NAS-IP-address

IP address of the NAS. If no NAS is specified, this field displays 0.0.0.0.

key authentication

Key for authentication.

key authorization

Key for authorization.

key accounting

Key for accounting.

Acct-stop-PKT retransmit times

Number of stop-accounting packet transmission attempts.

Data traffic-unit

Unit for data flows.

Packet traffic-unit

Unit for data packets.

 

# Display the statistics for the servers specified in HWTACACS scheme gy.

<Sysname> display hwtacacs gy statistics

---[HWTACACS template gy primary authentication]---

HWTACACS server open number: 10

HWTACACS server close number: 10

HWTACACS authen client access request packet number: 10

HWTACACS authen client access response packet number: 6

HWTACACS authen client unknown type number: 0

HWTACACS authen client timeout number: 4

HWTACACS authen client packet dropped number: 4

HWTACACS authen client access request change password number: 0

HWTACACS authen client access request login number: 5

HWTACACS authen client access request send authentication number: 0

HWTACACS authen client access request send password number: 0

HWTACACS authen client access connect abort number: 0

HWTACACS authen client access connect packet number: 5

HWTACACS authen client access response error number: 0

HWTACACS authen client access response failure number: 0

HWTACACS authen client access response follow number: 0

HWTACACS authen client access response getdata number: 0

HWTACACS authen client access response getpassword number: 5

HWTACACS authen client access response getuser number: 0

HWTACACS authen client access response pass number: 1

HWTACACS authen client access response restart number: 0

HWTACACS authen client malformed access response number: 0

HWTACACS authen client round trip time(s): 5

---[HWTACACS template gy primary authorization]---

HWTACACS server open number: 1

HWTACACS server close number: 1

HWTACACS author client request packet number: 1

HWTACACS author client response packet number: 1

HWTACACS author client timeout number: 0

HWTACACS author client packet dropped number: 0

HWTACACS author client unknown type number: 0

HWTACACS author client request EXEC number: 1

HWTACACS author client request PPP number: 0

HWTACACS author client request VPDN number: 0

HWTACACS author client response error number: 0

HWTACACS author client response EXEC number: 1

HWTACACS author client response PPP number: 0

HWTACACS author client response VPDN number: 0

HWTACACS author client round trip time(s): 3

---[HWTACACS template gy primary accounting]---

HWTACACS server open number: 0

HWTACACS server close number: 0

HWTACACS account client request packet number: 0

HWTACACS account client response packet number: 0

HWTACACS account client unknown type number: 0

HWTACACS account client timeout number: 0

HWTACACS account client packet dropped number: 0

HWTACACS account client request command level number: 0

HWTACACS account client request connection number: 0

HWTACACS account client request EXEC number: 0

HWTACACS account client request network number: 0

HWTACACS account client request system event number: 0

HWTACACS account client request update number: 0

HWTACACS account client response error number: 0

HWTACACS account client round trip time(s): 0

display stop-accounting-buffer (for HWTACACS)

Syntax

hwtacacs-scheme-name [ | { begin | exclude | include } regular-expression ]

View

Any view

Default level

2: System level

Parameters

hwtacacs-scheme hwtacacs-scheme-name: Specifies an HWTACACS scheme by its name, a case-insensitive string of 1 to 32 characters.

|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.

begin: Displays the first line that matches the specified regular expression and all lines that follow.

exclude: Displays all lines that do not match the specified regular expression.

include: Displays all lines that match the specified regular expression.

regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.

Description

Use display stop-accounting-buffer to display information about the stop-accounting requests buffered in the device.

Related commands: reset stop-accounting-buffer, stop-accounting-buffer enable, and retry stop-accounting.

Examples

# Display information about the buffered stop-accounting requests for HWTACACS scheme hwt1.

<Sysname> display stop-accounting-buffer hwtacacs-scheme hwt1

Total 0 record(s) Matched

hwtacacs nas-ip

Syntax

hwtacacs nas-ip ip-address

undo hwtacacs nas-ip ip-address

View

System view

Default level

2: System level

Parameters

ip-address: IP address in dotted decimal notation. It must be an address of the device and cannot be 0.0.0.0, 255.255.255.255, a class D address, a class E address, or a loopback address.

Description

Use hwtacacs nas-ip to specify a source IP address for outgoing HWTACACS packets.

Use undo hwtacacs nas-ip to remove the configuration.

By default, the source IP address of a packet sent to the server is the IP address of the outbound interface.

The source IP address of HWTACACS packets that a NAS sends must match the IP address of the NAS that is configured on the HWTACACS server. An HWTACACS server identifies a NAS by IP address. Upon receiving an HWTACACS packet, an HWTACACS server checks whether the source IP address of the packet is the IP address of any managed NAS. If yes, the server processes the packet. If not, the server drops the packet.

You can specify up to one public-network source IP address and 15 private-network source IP addresses. A newly specified public-network source IP address overwrites the previous one.

 

 

NOTE:

The setting configured by the nas-ip command in HWTACACS scheme view is only for the HWTACACS scheme, whereas that configured by the hwtacacs nas-ip command in system view is for all HWTACACS schemes. The setting in HWTACACS scheme view takes precedence.

 

Related commands: nas-ip.

Examples

# Set the IP address for the device to use as the source address of the HWTACACS packets to 129.10.10.1.

<Sysname> system-view

[Sysname] hwtacacs nas-ip 129.10.10.1

hwtacacs scheme

Syntax

hwtacacs scheme hwtacacs-scheme-name

undo hwtacacs scheme hwtacacs-scheme-name

View

System view

Default level

3: Manage level

Parameters

hwtacacs-scheme-name: HWTACACS scheme name, a case-insensitive string of 1 to 32 characters.

Description

Use hwtacacs scheme to create an HWTACACS scheme and enter HWTACACS scheme view.

Use undo hwtacacs scheme to delete an HWTACACS scheme.

By default, no HWTACACS scheme exists.

An HWTACACS scheme can be referenced by more than one ISP domain at the same time.

An HWTACACS scheme referenced by ISP domains cannot be removed.

You cannot delete an HWTACACS scheme with online users.

Examples

# Create an HWTACACS scheme named hwt1 and enter HWTACACS scheme view.

<Sysname> system-view

[Sysname] hwtacacs scheme hwt1

[Sysname-hwtacacs-hwt1]

key (HWTACACS scheme view)

Syntax

key { accounting | authentication | authorization } key

undo key { accounting | authentication | authorization }

View

HWTACACS scheme view

Default level

2: System level

Parameters

accounting: Sets the shared key for HWTACACS accounting packets.

authentication: Sets the shared key for HWTACACS authentication packets.

authorization: Sets the shared key for HWTACACS authorization packets.

key: Shared key, a case-sensitive string of 1 to 64 characters.

Description

Use key to set the shared key for HWTACACS authentication, authorization, or accounting packets.

Use undo key to remove the configuration.

By default, no shared key is configured.

The shared keys configured on the device must match those configured on the HWTACACS servers.

Related commands: display hwtacacs.

Examples

# Set the shared key for HWTACACS accounting packets to hello for HWTACACS scheme hwt1.

<Sysname> system-view

[Sysname] hwtacacs scheme hwt1

[Sysname-hwtacacs-hwt1] key accounting hello

nas-ip (HWTACACS scheme view)

Syntax

nas-ip ip-address

undo nas-ip

View

HWTACACS scheme view

Default level

2: System level

Parameters

ip-address: IP address in dotted decimal notation. It must be an address of the device and cannot be 0.0.0.0, 255.255.255.255, a class D address, a class E address, or a loopback address.

Description

Use nas-ip to specify a source address for outgoing HWTACACS packets.

Use undo nas-ip to restore the default.

By default, the source IP address of an outgoing HWTACACS packet is configured by the hwtacacs nas-ip command in system view; if the hwtacacs nas-ip command is not configured, the source IP address is the IP address of the outbound interface.

The source IP address of HWTACACS packets that a NAS sends must match the IP address of the NAS that is configured on the HWTACACS server. An HWTACACS server identifies a NAS by IP address. Upon receiving an HWTACACS packet, an HWTACACS server checks whether the source IP address of the packet is the IP address of any managed NAS. If yes, the server processes the packet. If not, the server drops the packet.

If you configure the command repeatedly, only the last configuration takes effect.

 

 

NOTE:

The setting configured by the nas-ip command in HWTACACS scheme view is only for the HWTACACS scheme, whereas that configured by the hwtacacs nas-ip command in system view is for all HWTACACS schemes. The setting in HWTACACS scheme view takes precedence.

 

Related commands: hwtacacs nas-ip.

Examples

# Set the source address for outgoing HWTACACS packets to 10.1.1.1.

<Sysname> system-view

[Sysname] hwtacacs scheme hwt1

[Sysname-hwtacacs-hwt1] nas-ip 10.1.1.1

primary accounting (HWTACACS scheme view)

Syntax

primary accounting ip-address [ port-number ]

undo primary accounting

View

HWTACACS scheme view

Default level

2: System level

Parameters

ip-address: IP address of the primary HWTACACS accounting server, in dotted decimal notation. The default setting is 0.0.0.0.

port-number: Service port number of the primary HWTACACS accounting server. It ranges from 1 to 65535 and defaults to 49.

Description

Use primary accounting to specify the primary HWTACACS accounting server.

Use undo primary accounting to remove the configuration.

By default, no primary HWTACACS accounting server is specified.

The IP addresses of the primary and secondary accounting servers must be different. Otherwise, the configuration fails.

If you configure the command repeatedly, only the last configuration takes effect.

You can remove an accounting server only when it is not used by any active TCP connection to send accounting packets. Removing an accounting server affects only accounting processes that occur after the remove operation.

Related commands: display hwtacacs.

Examples

# Specify the IP address and port number of the primary accounting server for HWTACACS scheme test1 as 10.163.155.12 and 49.

<Sysname> system-view

[Sysname] hwtacacs scheme test1

[Sysname-hwtacacs-test1] primary accounting 10.163.155.12 49

primary authentication (HWTACACS scheme view)

Syntax

primary authentication ip-address [ port-number ]

undo primary authentication

View

HWTACACS scheme view

Default level

2: System level

Parameters

ip-address: IP address of the primary HWTACACS authentication server, in dotted decimal notation. The default setting is 0.0.0.0.

port-number: Service port number of the primary HWTACACS authentication server. It ranges from 1 to 65535 and defaults to 49.

Description

Use primary authentication to specify the primary HWTACACS authentication server.

Use undo primary authentication to remove the configuration.

By default, no primary HWTACACS authentication server is specified.

The IP addresses of the primary and secondary authentication servers must be different. Otherwise, the configuration fails.

If you configure the command repeatedly, only the last configuration takes effect.

You can remove an authentication server only when it is not used by any active TCP connection to send authentication packets. Removing an authentication server affects only authentication processes that occur after the remove operation.

Related commands: display hwtacacs.

Examples

# Specify the IP address and port number of the primary authentication server for HWTACACS scheme hwt1 as 10.163.155.13 and 49.

<Sysname> system-view

[Sysname] hwtacacs scheme hwt1

[Sysname-hwtacacs-hwt1] primary authentication 10.163.155.13 49

primary authorization

Syntax

primary authorization ip-address [ port-number ]

undo primary authorization

View

HWTACACS scheme view

Default level

2: System level

Parameters

ip-address: IP address of the primary HWTACACS authorization server, a valid unicast address in dotted decimal notation. The default setting is 0.0.0.0.

port-number: Service port number of the primary HWTACACS authorization server. It ranges from 1 to 65535 and defaults to 49.

Description

Use primary authorization to specify the primary HWTACACS authorization server.

Use undo primary authorization to remove the configuration.

By default, no primary HWTACACS authorization server is specified.

The IP addresses of the primary and secondary authorization servers must be different. Otherwise, the configuration fails.

If you configure the command repeatedly, only the last configuration takes effect.

You can remove an authorization server only when it is not used by any active TCP connection to send authorization packets. Removing an authorization server affects only authorization processes that occur after the remove operation.

Related commands: display hwtacacs.

Examples

# Configure the IP address and port number of the primary authorization server for HWTACACS scheme hwt1 as 10.163.155.13 and 49.

<Sysname> system-view

[Sysname] hwtacacs scheme hwt1

[Sysname-hwtacacs-hwt1] primary authorization 10.163.155.13 49

reset hwtacacs statistics

Syntax

reset hwtacacs statistics { accounting | all | authentication | authorization }

View

User view

Default level

1: Monitor level

Parameters

accounting: Clears HWTACACS accounting statistics.

all: Clears all HWTACACS statistics.

authentication: Clears HWTACACS authentication statistics.

authorization: Clears HWTACACS authorization statistics.

Description

Use reset hwtacacs statistics to clear HWTACACS statistics.

Related commands: display hwtacacs.

Examples

# Clear all HWTACACS statistics.

<Sysname> reset hwtacacs statistics all

reset stop-accounting-buffer (for HWTACACS)

Syntax

reset stop-accounting-buffer hwtacacs-scheme hwtacacs-scheme-name

View

User view

Default level

2: System level

Parameters

hwtacacs-scheme hwtacacs-scheme-name: Specifies an HWTACACS scheme by its name, a case-insensitive string of 1 to 32 characters.

Description

Use reset stop-accounting-buffer to clear the buffered stop-accounting requests that get no responses.

Related commands: stop-accounting-buffer enable and display stop-accounting-buffer.

Examples

# Clear the buffered stop-accounting requests for HWTACACS scheme hwt1.

<Sysname> reset stop-accounting-buffer hwtacacs-scheme hwt1

retry stop-accounting (HWTACACS scheme view)

Syntax

retry stop-accounting retry-times

undo retry stop-accounting

View

HWTACACS scheme view

Default level

2: System level

Parameters

retry-times: Maximum number of stop-accounting request transmission attempts, in the range of 1 to 300.

Description

Use retry stop-accounting to set the maximum number of stop-accounting request transmission attempts.

Use undo retry stop-accounting to restore the default.

By default, the maximum number of stop-accounting request transmission attempts is 100.

Related commands: reset stop-accounting-buffer and display stop-accounting-buffer.

Examples

# Set the maximum number of stop-accounting request transmission attempts to 50.

<Sysname> system-view

[Sysname] hwtacacs scheme hwt1

[Sysname-hwtacacs-hwt1] retry stop-accounting 50

secondary accounting (HWTACACS scheme view)

Syntax

secondary accounting ip-address [ port-number ]

undo secondary accounting

View

HWTACACS scheme view

Default level

2: System level

Parameters

ip-address: IP address of the secondary HWTACACS accounting server, in dotted decimal notation. The default setting is 0.0.0.0.

port-number: Service port number of the secondary HWTACACS accounting server. It ranges from 1 to 65535 and defaults to 49.

Description

Use secondary accounting to specify the secondary HWTACACS accounting server.

Use undo secondary accounting to remove the configuration.

By default, no secondary HWTACACS accounting server is specified.

The IP addresses of the primary and secondary accounting servers must be different. Otherwise, the configuration fails.

If you configure the command repeatedly, only the last configuration takes effect.

You can remove an accounting server only when it is not used by any active TCP connection to send accounting packets. Removing an accounting server affects only accounting processes that occur after the remove operation.

Related commands: display hwtacacs.

Examples

# Specify the IP address and port number of the secondary accounting server for HWTACACS scheme hwt1 as 10.163.155.12 with TCP port number 49.

<Sysname> system-view

[Sysname] hwtacacs scheme hwt1

[Sysname-hwtacacs-hwt1] secondary accounting 10.163.155.12 49

secondary authentication (HWTACACS scheme view)

Syntax

secondary authentication ip-address [ port-number ]

undo secondary authentication

View

HWTACACS scheme view

Default level

2: System level

Parameters

ip-address: IP address of the secondary HWTACACS authentication server, in dotted decimal notation. The default setting is 0.0.0.0.

port-number: Service port number of the secondary HWTACACS authentication server. It ranges from 1 to 65535 and defaults to 49.

Description

Use secondary authentication to specify the secondary HWTACACS authentication server.

Use undo secondary authentication to remove the configuration.

By default, no secondary HWTACACS authentication server is specified.

The IP addresses of the primary and secondary authentication servers must be different. Otherwise, the configuration fails.

If you configure the command repeatedly, only the last configuration takes effect.

You can remove an authentication server only when it is not used by any active TCP connection to send authentication packets is using it. Removing an authentication server affects only authentication processes that occur after the remove operation.

Related commands: display hwtacacs.

Examples

# Specify the IP address and port number of the secondary authentication server for HWTACACS scheme hwt1 as 10.163.155.13 with TCP port number 49.

<Sysname> system-view

[Sysname] hwtacacs scheme hwt1

[Sysname-hwtacacs-hwt1] secondary authentication 10.163.155.13 49

secondary authorization

Syntax

secondary authorization ip-address [ port-number ]

undo secondary authorization

View

HWTACACS scheme view

Default level

2: System level

Parameters

ip-address: IP address of the secondary HWTACACS authorization server, in dotted decimal notation. The default setting is 0.0.0.0.

port-number: Service port number of the secondary HWTACACS authorization server. It ranges from 1 to 65535 and defaults to 49.

Description

Use secondary authorization to specify the secondary HWTACACS authorization server.

Use undo secondary authorization to remove the configuration.

By default, no secondary HWTACACS authorization server is specified.

The IP addresses of the primary and secondary authorization servers cannot be the same. Otherwise, the configuration fails.

If you configure the command repeatedly, only the last configuration takes effect.

You can remove an authorization server only when it is not used by any active TCP connection to send authorization packets. Removing an authorization server affects only authorization processes that occur after the remove operation.

Related commands: display hwtacacs.

Examples

# Configure the secondary authorization server 10.163.155.13 with TCP port number 49.

<Sysname> system-view

[Sysname] hwtacacs scheme hwt1

[Sysname-hwtacacs-hwt1] secondary authorization 10.163.155.13 49

stop-accounting-buffer enable (HWTACACS scheme view)

Syntax

stop-accounting-buffer enable

undo stop-accounting-buffer enable

View

HWTACACS scheme view

Default level

2: System level

Parameters

None

Description

Use stop-accounting-buffer enable to enable the device to buffer stop-accounting requests to which no responses are received.

Use undo stop-accounting-buffer enable to disable the buffering function.

By default, the device buffers stop-accounting requests to which no responses are received.

Stop-accounting requests affect the charge to users. A NAS must make its best effort to send every stop-accounting request to the HWTACACS accounting servers. For each stop-accounting request getting no response in the specified period of time, the NAS buffers and resends the packet until it receives a response or the number of transmission attempts reaches the configured limit. In the latter case, the NAS discards the packet.

Related commands: reset stop-accounting-buffer and display stop-accounting-buffer.

Examples

# In HWTACACS scheme hwt1, enable the device to buffer the stop-accounting requests getting no responses.

<Sysname> system-view

[Sysname] hwtacacs scheme hwt1

[Sysname-hwtacacs-hwt1] stop-accounting-buffer enable

timer quiet (HWTACACS scheme view)

Syntax

timer quiet minutes

undo timer quiet

View

HWTACACS scheme view

Default level

2: System level

Parameters

minutes: Primary server quiet period, in minutes. It ranges from 1 to 255.

Description

Use timer quiet to set the quiet timer for the primary server. When the primary server is found unreachable, the device changes the status of the server from active to blocked and keeps the server in blocked state until this timer expires.

Use undo timer quiet to restore the default.

By default, the primary server quiet period is 5 minutes.

Related commands: display hwtacacs.

Examples

# Set the quiet timer for the primary server to 10 minutes.

<Sysname> system-view

[Sysname] hwtacacs scheme hwt1

[Sysname-hwtacacs-hwt1] timer quiet 10

timer realtime-accounting (HWTACACS scheme view)

Syntax

timer realtime-accounting minutes

undo timer realtime-accounting

View

HWTACACS scheme view

Default level

2: System level

Parameters

minutes: Real-time accounting interval in minutes, zero or a multiple of 3 in the range of 3 to 60. A value of zero means "Do not send online user accounting information to the HWTACACS server."

Description

Use timer realtime-accounting to set the real-time accounting interval.

Use undo timer realtime-accounting to restore the default.

By default, the real-time accounting interval is 12 minutes.

For real-time accounting, a NAS must transmit the accounting information of online users to the HWTACACS accounting server periodically. This command is for setting the interval.

Consider the performance of the NAS and the HWTACACS server when you set the real-time accounting interval. A shorter interval requires higher performance. Use a longer interval when there are a large number of users (more than 1000, inclusive).

Table 9 Recommended real-time accounting intervals

Number of users

Real-time accounting interval (in minutes)

1 to 99

3

100 to 499

6

500 to 999

12

1000 or more

15 or more

 

Examples

# Set the real-time accounting interval to 51 minutes for HWTACACS scheme hwt1.

<Sysname> system-view

[Sysname] hwtacacs scheme hwt1

[Sysname-hwtacacs-hwt1] timer realtime-accounting 51

timer response-timeout (HWTACACS scheme view)

Syntax

timer response-timeout seconds

undo timer response-timeout

View

HWTACACS scheme view

Default level

2: System level

Parameters

seconds: HWTACACS server response timeout period in seconds, in the range of 1 to 300.

Description

Use timer response-timeout to set the HWTACACS server response timeout timer.

Use undo timer response-timeout to restore the default.

By default, the HWTACACS server response timeout time is 5 seconds.

HWTACACS is based on TCP. When the server response timeout timer or the TCP timeout timer times out, the device is disconnected from the HWTACACS server.

Related commands: display hwtacacs.

Examples

# Set the HWTACACS server response timeout timer to 30 seconds for HWTACACS scheme hwt1.

<Sysname> system-view

[Sysname] hwtacacs scheme hwt1

[Sysname-hwtacacs-hwt1] timer response-timeout 30

user-name-format (HWTACACS scheme view)

Syntax

user-name-format { keep-original | with-domain | without-domain }

View

HWTACACS scheme view

Default level

2: System level

Parameters

keep-original: Sends the username to the HWTACACS server as it is input.

with-domain: Includes the ISP domain name in the username sent to the HWTACACS server.

without-domain: Excludes the ISP domain name from the username sent to the HWTACACS server.

Description

Use user-name-format to specify the format of the username to be sent to an HWTACACS server.

By default, the ISP domain name is included in the username.

A username is generally in the format userid@isp-name, of which isp-name is used by the device to determine the ISP domain to which a user belongs. Some earlier HWTACACS servers, however, cannot recognize a username including an ISP domain name. Before sending a username including a domain name to such an HWTACACS server, the device must remove the domain name. This command allows you to specify whether to include a domain name in a username to be sent to an HWTACACS server.

If an HWTACACS scheme defines that the username is sent without the ISP domain name, do not apply the HWTACACS scheme to more than one ISP domain, avoiding the confused situation where the HWTACACS server regards two users in different ISP domains but with the same userid as one.

If the HWTACACS scheme is used for wireless users, specify the keep-original keyword. Otherwise, authentication of the wireless users may fail.

Examples

# Specify the device to remove the ISP domain name in the username sent to the HWTACACS servers for the HWTACACS scheme hwt1.

<Sysname> system-view

[Sysname] hwtacacs scheme hwt1

[Sysname-hwtacacs-hwt1] user-name-format without-domain

LDAP configuration commands

authentication-server

Syntax

authentication-server ip-address [ port-number ]

undo authentication-server

View

LDAP scheme view

Default level

2: System level

Parameters

ip-address: IP address of the LDAP authentication server.

port-number: TCP port number of the LDAP authentication server, in the range of 1 to 65535. It defaults to 389.

Description

Use authentication-server to specify an LDAP authentication server.

Use undo authentication-server to cancel the specified LDAP authentication server.

By default, no LDAP authentication server is specified.

The LDAP server port specified on the device must be consistent with that configured on the LDAP server.

If you change the IP address and port number of the LDAP authentication server, the change is effective only to the LDAP authentications after your change.

Related commands: display ldap scheme.

Examples

# Specify the IP address of the LDAP authentication server as 192.168.0.10, and port number as 4300.

<Sysname> system-view

[Sysname] ldap scheme ldap1

[Sysname-ldap-ldap1] authentication-server 192.168.0.10 4300

authorization-server

Syntax

authorization-server ip-address [ port-number ]

undo authorization-server

View

LDAP scheme view

Default level

2: System level

Parameters

ip-address: IP address of the LDAP authorization server.

port-number: Port number of the LDAP authorization server, in the range of 1 to 65535. It defaults to 389.

Description

Use authorization-server to specify an LDAP authorization server.

Use undo authorization-server to cancel the specified LDAP authorization server.

By default, no LDAP authorization server is specified.

The LDAP server port specified on the device must be consistent with that configured on the LDAP server.

If you change the IP address and port number of the authorization server, the change is effective only to the LDAP authorizations after your change.

Related commands: display ldap scheme.

Examples

# Specify the IP address of the LDAP authorization server as 192.168.0.10, and port number as 4300.

<Sysname> system-view

[Sysname] ldap scheme ldap1

[Sysname-ldap-ldap1] authorization-server 192.168.0.10 4300

display ldap scheme

Syntax

display ldap scheme [ scheme-name ] [ | { begin | exclude | include } regular-expression ]

View

Any view

Default level

2: System level

Parameters

scheme-name: LDAP scheme name.

|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.

begin: Displays the first line that matches the specified regular expression and all lines that follow.

exclude: Displays all lines that do not match the specified regular expression.

include: Displays all lines that match the specified regular expression.

regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.

Description

Use display ldap scheme to display the configuration of an LDAP scheme.

If no LDAP scheme is specified, this command displays the configuration of all schemes.

Related commands: ldap scheme.

Examples

# Display the configuration of all LDAP schemes.

<Sysname> display ldap scheme

------------------------------------------------------------------

  Scheme name  = default

  Index = 0

  Authentication IP   = 1.1.1.1          Port = 390

  Authorization IP    = 0.0.0.0          Port = 389

 

  LDAP protocol version : LDAPv3

  LDAP server type      : Microsoft

 

  Server timeout interval : 10 (seconds)

  Login account DN        : (not configured)

  Login account password  : (not configured)

 

  User searching parameters:

    Base DN              : (not configured)

    Search scope         : all-level

    User object class    : (not configured)

    Username attribute   : cn

    Username format      : without-domain

    User group attribute : (not configured)

 

  Group searching parameters:

    Base DN              : (not configured)

    Search scope         : all-level

    Group object class   : (not configured)

    Member attribute     : (not configured)

    Groupname attribute  : cn

 

------------------------------------------------------------------

Total 1 LDAP scheme(s).

Table 10 Command output

Field

Description

Scheme name

LDAP scheme name.

Index

LDAP scheme index.

Authentication IP/Port

IP address/port number of the authentication server. If no authentication server is specified, the IP address is 0.0.0.0 and the port number is the default.

Authorization IP/Port

IP address/port number of the authorization server. If no authorization server is specified, the IP address is 0.0.0.0 and the port number is the default.

LDAP protocol version

LDAP version number: LDAPv2 or LDAPv3.

LDAP server type

LDAP server manufacturer: IBM, Microsoft, or Sun.

Server timeout interval

LDAP server timeout period, in seconds.

Login account DN

DN of the administrator.

Login account password

Password of the administrator.

User searching parameters

User search parameters.

Base DN

Base DN for user search.

Search scope

User DN search scope, including:

·     All-level—All sub-directories.

·     Single-level—Sub-directories of the next lower level under the directory of the base DN.

User object class

Customized user object class.

Username attribute

Customized user account attribute.

Username format

Username format, including:

·     With-domain—The username sent to the server contains the domain name.

·     Without-domain—The username sent to the server does not contain the domain name.

User group attribute

User group attribute on the server.

Group searching parameters

User group search parameters.

 

group-parameters

Syntax

group-parameters { group-name-attribute { name-attribute | cn | uid } | group-object-class object-class-name | member-name-attribute attribute-name | search-base-dn base-dn | search-scope { all-level | single-level } }

undo group-parameters { group-name-attribute | group-object-class | member-name-attribute | search-base-dn | search-scope }

View

LDAP scheme view

Default level

2: System level

Parameters

group-name-attribute { name-attribute | cn | uid }: Specifies the user group name attribute for group search. The name-attribute argument refers to a customized group name attribute value, a case-insensitive string of 1 to 64 characters. The cn keyword means that the user group name attribute is common name, and the uid keyword means that the user group name attribute is user ID.

group-object-class object-class-name: Specifies the group object class for group search. The object-class-name argument refers to a class name, a case-insensitive string of 1 to 64 characters.

member-name-attribute attribute-name: Specifies the member name attribute of the group to search for. The attribute-name argument refers to member name attribute value, a case-insensitive string of 1 to 64 characters.

search-base-dn base-dn: Specifies the base DN for group search. The base-dn argument refers to a DN value, a case-insensitive string of 1 to 255 characters.

search-scope { all-level | single-level }: Specifies the group search scope. The all-level keyword means that the search goes through all sub-directories of the base DN, and the single-level keyword means that the search goes through only the next lower level sub-directories of the base DN.

Description

Use group-parameters to configure LDAP group attributes.

Use undo group-parameters to cancel configurations of LDAP group attributes.

By default, the search base DN is not specified, the group name attribute is cn, the search scope is all-level, the customized group object class is not specified, and the customized member name attribute is not specified.

You can use the command repeatedly to configure multiple LDAP group attributes.

Some LDAP server vendors have default values defined for the group object class and member name attribute. If no default values are defined or you want to change the settings, use the group-parameters command.

Related commands: display ldap scheme and login-dn.

Examples

# Configure the user group search to go through only the next lower level sub-directories of the base DN.

<Sysname> system-view

[Sysname] ldap scheme ldap1

[Sysname-ldap-ldap1] group-parameters search-scope single-level

ldap scheme

Syntax

ldap scheme ldap-scheme-name

undo ldap scheme ldap-scheme-name

View

System view

Default level

3: Manage level

Parameters

ldap-scheme-name: LDAP scheme name, a case-insensitive string of 1 to 32 characters.

Description

Use ldap scheme to create an LDAP scheme and enter its view.

Use undo ldap scheme to remove an LDAP scheme.

By default, no LDAP scheme is created.

LDAP protocol configurations are made in LDAP schemes. Each LDAP scheme must define at least the IP address of the LDAP authentication server or authorization server, and the administrator DN and administrator password.

One LDAP scheme can be referenced by multiple ISP domains.

The undo ldap scheme command cannot remove an LDAP scheme that is being referenced by ISPs.

Related commands: display ldap scheme.

Examples

# Create an LDAP scheme named ldap1 and enter its view.

<Sysname> system-view

[Sysname] ldap scheme ldap1

[Sysname-ldap-ldap1]

login-dn

Syntax

login-dn dn-string

undo login-dn

View

LDAP scheme view

Default level

2: System level

Parameters

dn-string: Administrator DN for binding with the server, a case-insensitive string of 1 to 255 characters.

Description

Use login-dn to specify the administrator DN.

Use undo login-dn to cancel the specified administrator DN.

By default, no administrator DN is specified.

The administrator DN specified on the device must be consistent with that configured on the LDAP server.

If you change the administrator DN, the change is effective only to the LDAP authentication and authorization after your change.

Related commands: display ldap scheme.

Examples

# Specify the administrator DN as uid=test, ou=people, o=example, c=city.

<Sysname> system-view

[Sysname] ldap scheme ldap1

[Sysname-ldap-ldap1] login-dn uid=test,ou=people,o=example,c=city

login-password

Syntax

login-password [ ciper | simple ] password

undo login-password

View

LDAP scheme view

Default level

2: System level

Parameters

cipher password: Specifies a password in cipher text, a case-sensitive string of 1 to 184 characters and will be displayed in cipher text.

simple password: Specifies a password in plain text, a case-sensitive string of 1 to 128 characters and will be displayed in plain text.

If neither the cipher keyword nor the simple keyword is specified, the password must be in plain text but will be displayed in cipher text.

Description

Use login-password to configure the administrator password for binding with the LDAP server during LDAP authentication.

Use undo login-password to restore the default.

By default, no administrator password is configured.

This command is effective only after the login-dn command is configured.

Related commands: display ldap scheme and login-dn.

Examples

# Configure the administrator password to abcdefg in plain text, specifying to display it in plain text.

<Sysname> system-view

[Sysname] ldap scheme ldap1

[Sysname-ldap-ldap1] login-password simple abcdefg

# Configure the administrator password to /tbw94rb4yDN1Ez5vkK1pw== in cipher text, specifying to display it in cipher text.

<Sysname> system-view

[Sysname] ldap scheme ldap1

[Sysname-ldap-ldap1] login-password cipher /tbw94rb4yDN1Ez5vkK1pw==

# Specify the administrator password to plain-text abcdefg, which is to be displayed in cipher text.

<Sysname> system-view

[Sysname] ldap scheme ldap1

[Sysname-ldap-ldap1] login-password abcdefg

protocol-version

Syntax

protocol-version { v2 | v3 }

undo protocol-version

View

LDAP scheme view

Default level

2: System level

Parameters

v2: Specifies the LDAP version as LDAPv2.

v3: Specifies the LDAP version as LDAPv3.

Description

Use protocol-version to specify the LDAP version supported in LDAP authentication.

Use undo protocol-version to restore the default.

By default, the LDAP version is LDAPv3.

The LDAP version specified on the device must be consistent with that specified on the LDAP server.

If you change the LDAP version on the server, the change is effective only to the LDAP authentication and authorization after your change.

A Microsoft LDAP server supports only LDAPv3.

Related commands: display ldap scheme.

Examples

# Specify the LDAP version as LDAPv2.

<Sysname> system-view

[Sysname] ldap scheme ldap1

[Sysname-ldap-ldap1] protocol-version v2

server-timeout

Syntax

server-timeout time-interval

undo server-timeout

View

LDAP scheme view

Default level

2: System level

Parameters

time-interval: LDAP server timeout period, in the range of 5 to 20 seconds.

Description

Use server-timeout to set the LDAP server timeout period, the maximum time that the devices waits for the LDAP server's replies during authentication or authorization.

Use undo server-timeout to restore the default.

By default, the LDAP server timeout period is 10 seconds.

If you change the connection timeout period, the change is effective only to the LDAP authentication and authorization after your change.

Related commands: display ldap scheme.

Examples

# Set the LDAP server timeout period to 15 seconds.

<Sysname> system-view

[Sysname] ldap scheme ldap1

[Sysname-ldap-scheme-ldap1] server-timeout 15

server-type

Syntax

server-type { ibm | microsoft | sun }

undo server-type

View

LDAP scheme view

Default level

2: System level

Parameters

ibm: Specifies the LDAP server manufacturer of IBM.

microsoft: Specifies the LDAP server manufacturer of Microsoft.

sun: Specifies the LDAP server manufacturer of Sun.

Description

Use server-type to specify the LDAP server vendor.

Use undo server-type to restore the default.

By default, the LDAP server type is Microsoft.

The LDAP server type specified on the device must be consistent with that specified on the server.

If you change the server type, the change is effective only to the LDAP authentication and authorization after you change.

Related commands: display ldap scheme.

Examples

# Specify the LDAP server type as IBM.

<Sysname> system-view

[Sysname] ldap scheme ldap1

[Sysname-ldap-ldap1] server-type ibm

user-parameters

Syntax

user-parameters { search-base-dn base-dn | search-scope { all-level | single-level } | user-group-attribute attribute-name | user-name-attribute { name-attribute | cn | uid } | user-name-format { with-domain | without-domain } | user-object-class object-class-name }

undo user-parameters { search-base-dn | search-scope | user-group-attribute | user-name-attribute | user-name-format | user-object-class }

View

LDAP scheme view

Default level

2: System level

Parameters

search-base-dn base-dn: Specifies the base DN for user search. The base-dn argument refers to a DN value, a case-insensitive string of 1 to 255 characters.

search-scope { all-level | single-level }: Specifies user search scope. The all-level keyword means that the search goes through all sub-directories of the base DN, and the single-level keyword means that the search goes through only the next lower level of sub-directories of the base DN.

user-group-attribute attribute-name: Specify the user group attribute. The attribute-name argument refers to an attribute name, a case-insensitive string of 1 to 64 characters.

user-name-attribute { name-attribute | cn | uid }: Specifies the username attribute. The name-attribute argument refers to an attribute value, a case-insensitive string of 1 to 64 characters. The cn keyword means that the user account attribute is common name, and the uid keyword means that the user account attribute is user ID.

user-name-format { with-domain | without-domain }: Specifies the format of the username to be sent to the server. The with-domain keyword means that the username contains the domain name, and the without-domain keyword means that the username does not contain the domain name.

user-object-class object-class-name: Specifies the user object class for user search. The object-class-name argument refers to a class value, a case-insensitive string of 1 to 64 characters.

Description

Use user-parameters to configure LDAP user attributes.

Use undo user-parameters to cancel configurations of LDAP user attributes.

By default, no search base DN is not specified, the search scope is all-level, the customized user group attribute is not specified, the user account attribute is cn, the username format is without-domain, and the customized user object class is not specified.

You can use the command repeatedly to configure multiple LDAP user attributes.

Some LDAP server vendors have default values defined for the user group attribute and user object class. In this case, you do not need to configure them on the device. If no default values are defined or you want to change the settings on the device, use the user-parameters command. Make sure that the settings on the device are consistent with those on the server.

Microsoft LDAP server has a default value for the user group attribute, but IBM and Sun servers have no default value for the attribute.

Generally, the name of a user is in the format userid@isp-name, where the string after the at sign (@) is the domain name. In the directory tree of the LDAP server, however, a user identification (which could be cn or uid) may not contain an ISP domain name. If usernames on the LDAP server do not contain domain names, specify the without-domain keyword so that the device removes domain names from usernames before sending them to the server.

Related commands: display ldap scheme.

Examples

# Set the user search scope to single-level.

<Sysname> system-view

[Sysname] ldap scheme ldap1

[Sysname-ldap-ldap1] user-parameters search-scope single-level

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网