10-User Access and Authentication

HomeSupportReference GuidesMIB CompanionH3C Wireless Products MIB Reference(R54xx)-6W10010-User Access and Authentication
05-HH3C-RADIUS-MIB
Title Size Download
05-HH3C-RADIUS-MIB 218.68 KB

HH3C-RADIUS-MIB

About this MIB

Use this MIB to obtain and configure RADIUS server settings.

MIB file name

hh3c-radius.mib

Root object

iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).hh3c(25506).hh3cCommon(2).hh3cRadius(13)

Scalar objects

hh3cRadiusAuthErrThreshold (1.3.6.1.4.1.25506.2.13.1.3.1)

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cRadiusAuthErrThreshold (1.3.6.1.4.1.25506.2.13.1.3.1)

read-write

Unsigned32

Unsigned32 (1..100)

Authentication failure alarm threshold.

As per the MIB.

 

hh3cRadiusStatAccReq (1.3.6.1.4.1.25506.2.13.6.1)

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cRadiusStatAccReq (1.3.6.1.4.1.25506.2.13.6.1)

read-only

Counter64

Standard MIB values.

Number of RADIUS accounting requests sent to the RADIUS server, including start-accounting requests and real-time accounting requests.

As per the MIB.

 

hh3cRadiusStatAccAck (1.3.6.1.4.1.25506.2.13.6.2)

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cRadiusStatAccAck (1.3.6.1.4.1.25506.2.13.6.2)

read-only

Counter64

Standard MIB values.

Number of RADIUS accounting responses received from the RADIUS server.

As per the MIB.

 

hh3cRadiusStatLogoutReq (1.3.6.1.4.1.25506.2.13.6.3)

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cRadiusStatLogoutReq (1.3.6.1.4.1.25506.2.13.6.3)

read-only

Counter64

Standard MIB values.

Number of logout requests sent to the RADIUS server.

As per the MIB.

 

hh3cRadiusStatLogoutAck (1.3.6.1.4.1.25506.2.13.6.4)

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cRadiusStatLogoutAck (1.3.6.1.4.1.25506.2.13.6.4)

read-only

Counter64

Standard MIB values.

Number of logout responses received from the RADIUS server.

As per the MIB.

 

hh3cRadiusServerFirstTrapTime (1.3.6.1.4.1.25506.2.13.7.1)

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cRadiusServerFirstTrapTime (1.3.6.1.4.1.25506.2.13.7.1)

accessible-for-notify

Timeticks

Standard MIB values.

Time when the trap was generated.

As per the MIB.

 

hh3cRadiusAccCacheMaxPackets (1.3.6.1.4.1.25506.2.13.8.1.1)

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cRadiusAccCacheMaxPackets (1.3.6.1.4.1.25506.2.13.8.1.1)

accessible-for-notify

Integer32

256..2147483647

Maximum number of buffered accounting packets.

As per the MIB.

 

hh3cRadiusAccCacheUpperValue (1.3.6.1.4.1.25506.2.13.8.1.2)

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cRadiusAccCacheUpperValue (1.3.6.1.4.1.25506.2.13.8.1.2)

accessible-for-notify

Integer32

1..100

Upper threshold for accounting packet buffering, in percentage.

As per the MIB.

 

hh3cRadiusAccCacheLowerValue (1.3.6.1.4.1.25506.2.13.8.1.3)

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cRadiusAccCacheLowerValue (1.3.6.1.4.1.25506.2.13.8.1.3)

accessible-for-notify

Integer32

0..99

Lower threshold for accounting packet buffering, in percentage.

As per the MIB.

 

hh3cRadiusAccCacheMemoryUsage (1.3.6.1.4.1.25506.2.13.8.1.4)

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cRadiusAccCacheMemoryUsage (1.3.6.1.4.1.25506.2.13.8.1.4)

accessible-for-notify

Integer32

0..100

Current memory usage, in percentage.

As per the MIB.

 

hh3cRadiusAccCachePackets (1.3.6.1.4.1.25506.2.13.8.1.5)

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cRadiusAccCachePackets (1.3.6.1.4.1.25506.2.13.8.1.5)

accessible-for-notify

Integer32

256..2147483647

Current number of buffered packets.

As per the MIB.

 

Tabular objects

hh3cRdAccInfoTable

About this table

Use this table to configure or obtain RADIUS accounting scheme settings. Each RADIUS scheme contains a primary accounting server, a secondary accounting server, and other settings.

Support for operations

CreateSupported

Edit/ModifySupported

DeleteSupported

ReadSupported

Columns

The table index is hh3cRdAccGroupName.

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cRdAccNasIpAddr (1.3.6.1.4.1.25506.2.13.1.2.1.30)

read-create

IpAddress

Standard MIB values.

NAS IPv4 address.

As per the MIB.

hh3cRdAccNasIpv6Addr (1.3.6.1.4.1.25506.2.13.1.2.1.31)

read-create

Ipv6Address

Standard MIB values.

NAS IPv6 address.

As per the MIB.

hh3cRdAccRealTimeUnit

(1.3.6.1.4.1.25506.2.13.1.2.1.32)

read-create

INTEGER

minute(0),

second(1)

Interval for sending real-time accounting packets.

As per the MIB.

 

hh3cRdSecondaryAuthServerTable

About this table

Use this table to configure or obtain secondary RADIUS authentication server settings.

Support for operations

CreateSupported

Edit/ModifySupported

DeleteSupported

ReadSupported

Columns

The table indexes are hh3cRdGroupName, hh3cRdSecondaryAuthIpAddrType, hh3cRdSecondaryAuthIpAddr, hh3cRdSecondaryAuthVpnNam, and hh3cRdSecondaryAuthUdpPort.

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cRdSecondaryAuthIpAddrType (1.3.6.1.4.1.25506.2.13.1.4.1.1)

not-accessible

InetAddressType

Standard MIB values.

Type of the IP address for a secondary authentication server.

As per the MIB.

hh3cRdSecondaryAuthIpAddr (1.3.6.1.4.1.25506.2.13.1.4.1.2)

not-accessible

InetAddress

OCTET STRING (0..255)

IP address of the secondary authentication server.

As per the MIB.

hh3cRdSecondaryAuthVpnName (1.3.6.1.4.1.25506.2.13.1.4.1.3)

not-accessible

DisplayString

OCTET STRING (0..31)

Name of the VPN to which the secondary authentication server belongs.

As per the MIB.

hh3cRdSecondaryAuthUdpPort (1.3.6.1.4.1.25506.2.13.1.4.1.4)

not-accessible

Integer32

Integer32 (1..65535)

Port number of the secondary authentication server.

As per the MIB.

hh3cRdSecondaryAuthState (1.3.6.1.4.1.25506.2.13.1.4.1.5)

read-create

INTEGER

active(1),

block(2)

Status of the secondary authentication server.

As per the MIB.

hh3cRdSecondaryAuthKey (1.3.6.1.4.1.25506.2.13.1.4.1.6)

read-create

DisplayString

OCTET STRING (0..64)

Shared key for communication with the secondary authentication server.

The shared key is a string of 0 to 64 characters.

In dayou OEM version, the shared key string must be nine characters long or longer and must contain digits, uppercase letters, lowercase letters, and special characters.

When read, this object returns a zero-length string.

hh3cRdSecondaryAuthRowStatus

(1.3.6.1.4.1.25506.2.13.1.4.1.7)

read-create

RowStatus

Standard MIB values.

Row status.

The following values are supported:

active(1).

createAndGo(4).

destroy(6).

 

hh3cRdSecondaryAccServerTable

About this table

Use this table to configure or obtain secondary RADIUS accounting server settings.

Support for operations

CreateSupported

Edit/ModifySupported

DeleteSupported

ReadSupported

Columns

The table indexes are hh3cRdAccGroupName, hh3cRdSecondaryAccIpAddrType, hh3cRdSecondaryAccIpAddr, hh3cRdSecondaryAccVpnName, and hh3cRdSecondaryAccUdpPort.

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cRdSecondaryAccIpAddrType (1.3.6.1.4.1.25506.2.13.1.5.1.1)

not-accessible

InetAddressType

Standard MIB values.

Type of the IP address for a secondary accounting server.

As per the MIB.

hh3cRdSecondaryAccIpAddr (1.3.6.1.4.1.25506.2.13.1.5.1.2)

not-accessible

InetAddress

OCTET STRING (0..255)

IP address of the secondary accounting server.

As per the MIB.

hh3cRdSecondaryAccVpnName (1.3.6.1.4.1.25506.2.13.1.5.1.3)

not-accessible

DisplayString

OCTET STRING (0..31)

Name of the VPN to which the secondary accounting server belongs.

As per the MIB.

hh3cRdSecondaryAccUdpPort (1.3.6.1.4.1.25506.2.13.1.5.1.4)

not-accessible

Integer32

Integer32 (1..65535)

Port number of the secondary accounting server.

As per the MIB.

hh3cRdSecondaryAccState (1.3.6.1.4.1.25506.2.13.1.5.1.5)

read-create

INTEGER

active(1),

block(2)

Status of the secondary accounting server.

As per the MIB.

hh3cRdSecondaryAccKey (1.3.6.1.4.1.25506.2.13.1.5.1.6)

read-create

DisplayString

OCTET STRING (0..64)

Shared key for communication with the secondary accounting server.

The shared key is a string of 0 to 64 characters.

In dayou OEM version, the shared key string must be nine characters long or longer and must contain digits, uppercase letters, lowercase letters, and special characters.

When read, this object returns a zero-length string.

hh3cRdSecondaryAccRowStatus

(1.3.6.1.4.1.25506.2.13.1.5.1.7)

read-create

RowStatus

Standard MIB values.

Row status.

The following values are supported:

active(1).

createAndGo(4).

destroy(6).

 

hh3cRadiusAccServerTable

About this table

This table collects packet statistics by RADIUS accounting server, which is not implemented by standard MIBs.

Support for operations

CreateNot supported

Edit/ModifyNot supported

DeleteNot supported

ReadSupported

Columns

The table index is radiusAccServerIndex.

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cRadiusAccClientStartRequests (1.3.6.1.4.1.25506.2.13.2.1.1.1.1)

read-only

Counter32

Standard MIB values.

Number of start-accounting requests sent to the RADIUS server.

As per the MIB.

hh3cRadiusAccClientStartResponses (1.3.6.1.4.1.25506.2.13.2.1.1.1.2)

read-only

Counter32

Standard MIB values.

Number of start-accounting requests received from the RADIUS server.

As per the MIB.

hh3cRadiusAccClientInterimRequests (1.3.6.1.4.1.25506.2.13.2.1.1.1.3)

read-only

Counter32

Standard MIB values.

Number of real-time accounting request sent to the RADIUS server.

As per the MIB.

hh3cRadiusAccClientInterimResponses (1.3.6.1.4.1.25506.2.13.2.1.1.1.4)

read-only

Counter32

Standard MIB values.

Number of real-time accounting requests received from the RADIUS server.

As per the MIB.

hh3cRadiusAccClientStopRequests (1.3.6.1.4.1.25506.2.13.2.1.1.1.5)

read-only

Counter32

Standard MIB values.

Number of stop-accounting request sent to the RADIUS server.

As per the MIB.

hh3cRadiusAccClientStopResponses (1.3.6.1.4.1.25506.2.13.2.1.1.1.6)

read-only

Counter32

Standard MIB values.

Number of stop-accounting requests received from the RADIUS server.

As per the MIB.

 

hh3cRadiusAuthServerTable

About this table

This table collects authentication failure statistics by RADIUS authentication server, which is not implemented by standard MIBs.

Support for operations

CreateNot supported

Edit/ModifyNot supported

DeleteNot supported

ReadSupported

Columns

The table index is radiusAuthServerIndex.

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cRadiusAuthFailureTimes (1.3.6.1.4.1.25506.2.13.4.1.1.1.1)

read-only

Counter32

Standard MIB values.

Number of authentication failures.

As per the MIB.

hh3cRadiusAuthTimeoutTimes (1.3.6.1.4.1.25506.2.13.4.1.1.1.2)

read-only

Counter32

Standard MIB values.

Number of authentication timeouts.

As per the MIB.

hh3cRadiusAuthRejectTimes (1.3.6.1.4.1.25506.2.13.4.1.1.1.3)

read-only

Counter32

Standard MIB values.

Number of authentication rejections.

As per the MIB.

 

Notifications

hh3cRadiusAuthServerUpTrap

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.13.3.0.1

Authentication server up

Recovery

Major

N/A (N/A)

OFF

 

Notification triggers

This notification is generated when the status of an authentication server changes from blocked to active.

This notification has issues in SNMPv2 and later versions. It has been replaced with hh3cRadiusAuthenticationServerUpTrap (1.3.6.1.4.1.25506.2.13.3.0.4) in SNMPv2 and later versions.

If the radius trap-version v1 command is used on the device and authentication server up notification is enabled, notification hh3cRadiusAuthServerUpTrap is generated. If the radius trap-version v2 command is used on the device and authentication server up notification is enabled, notification hh3cRadiusAuthenticationServerUpTrap is generated.

System impact

No negative impact on the system.

Status control

ON

CLI: Use both the snmp-agent trap enable radius authentication-server-up and radius trap-version v1 commands.

OFF

CLI: Use either the undo snmp-agent trap enable radius authentication-server-up command or the radius trap-version v2 command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.2.1.67.1.2.1.1.3.1.2 (radiusAuthServerAddress)

IP address of an authentication server.

radiusAuthServerIndex

IP Address

Standard MIB values.

1.3.6.1.2.1.67.1.2.1.1.3.1.3 (radiusAuthClientServerPortNumber)

Port number of the authentication server.

radiusAuthServerIndex

INTEGER

1.. 65535

 

Recommended action

No action is required.

hh3cRadiusAccServerUpTrap

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.13.3.0.2

Accounting server up

Recovery

Major

N/A (N/A)

OFF

 

Notification triggers

This notification is generated when the status of an accounting server changes from blocked to active.

This notification has issues in SNMPv2 and later versions. It has been replaced with hh3cRadiusAccountingServerUpTrap (1.3.6.1.4.1.25506.2.13.3.0.5) in SNMPv2 and later versions.

If the radius trap-version v1 command is used on the device and accounting server up notification is enabled, notification hh3cRadiusAccServerUpTrap is generated. If the radius trap-version v2 command is used on the device and accounting server up notification is enabled, notification hh3cRadiusAccountingServerUpTrap is generated.

System impact

No negative impact on the system.

Status control

ON

CLI: Use both the snmp-agent trap enable radius accounting-server-up and radius trap-version v1 commands.

OFF

CLI: Use either the undo snmp-agent trap enable radius accounting-server-up command or the radius trap-version v2 command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.2.1.67.2.2.1.1.3.1.2 (radiusAccServerAddress)

IP address of an accounting server.

radiusAccServerIndex

IP Address

Standard MIB values.

1.3.6.1.2.1.67.2.2.1.1.3.1.3 (radiusAccClientServerPortNumber)

Port number of the accounting server.

radiusAccServerIndex

INTEGER

1.. 65535

 

Recommended action

No action is required.

hh3cRadiusAuthErrTrap

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.13.3.0.3

Authentication failure alarm threshold crossing.

Informational

Major

N/A (N/A)

OFF

 

Notification triggers

This notification is generated when the ratio of the authentication failures to the total authentication requests reaches the authentication failure alarm threshold.

System impact

The system is might being attacked.

Status control

ON

CLI: Use the snmp-agent trap enable radius authentication-error-threshold command.

OFF

CLI: Use the undo snmp-agent trap enable radius authentication-error-threshold command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.2.1.67.1.2.1.1.3.1.2 (radiusAuthServerAddress)

IP address of an authentication server.

radiusAuthServerIndex

IP Address

Standard MIB values.

1.3.6.1.2.1.67.1.2.1.1.3.1.3 (radiusAuthClientServerPortNumber)

Port number of the authentication server.

radiusAuthServerIndex

INTEGER

1.. 65535

 

Recommended action

To resolve this issue, contact the administrator for help.

hh3cRadiusAuthenticationServerUpTrap

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.13.3.0.4

Authentication server up

Recovery

Major

N/A (N/A)

OFF

 

Notification triggers

This notification is generated when the status of an authentication server changes from blocked to active.

This notification replaces hh3cRadiusAuthServerUpTrap (1.3.6.1.4.1.25506.2.13.3.0.1) in SNMPv2 and later versions.

If the radius trap-version v2 command is used on the device and authentication server up notification is enabled, notification hh3cRadiusAuthenticationServerUpTrap is generated. If the radius trap-version v1 command is used on the device and authentication server up notification is enabled, notification hh3cRadiusAuthServerUpTrap is generated.

System impact

No negative impact on the system.

Status control

ON

CLI: Use both the snmp-agent trap enable radius authentication-server-up and radius trap-version v2 commands.

OFF

CLI: Use either the undo snmp-agent trap enable radius authentication-server-up command or the radius trap-version v1 command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.2.1.67.1.2.1.1.3.1.2 (radiusAuthServerAddress)

IP address of an authentication server.

radiusAuthServerIndex

IP Address

Standard MIB values.

1.3.6.1.2.1.67.1.2.1.1.3.1.3 (radiusAuthClientServerPortNumber)

Port number of the authentication server.

radiusAuthServerIndex

INTEGER

1.. 65535

 

Recommended action

No action is required.

hh3cRadiusAccountingServerUpTrap

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.13.3.0.5

Accounting server up

Recovery

Major

N/A (N/A)

OFF

 

Notification triggers

This notification is generated when the status of an accounting server changes from blocked to active.

This notification replaces hh3cRadiusAccServerUpTrap (1.3.6.1.4.1.25506.2.13.3.0.2) in SNMPv2 and later versions.

If the radius trap-version v2 command is used on the device and accounting server up notification is enabled, notification hh3cRadiusAccountingServerUpTrap is generated. If the radius trap-version v1 command is used on the device and accounting server up notification is enabled, notification hh3cRadiusAccServerUpTrap is generated.

System impact

No negative impact on the system.

Status control

ON

CLI: Use both the snmp-agent trap enable radius accounting-server-up and radius trap-version v2 commands.

OFF

CLI: Use either the undo snmp-agent trap enable radius accounting-server-up command or the radius trap-version v1 command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.2.1.67.2.2.1.1.3.1.2 (radiusAccServerAddress)

IP address of an accounting server.

radiusAccServerIndex

IP Address

Standard MIB values.

1.3.6.1.2.1.67.2.2.1.1.3.1.3 (radiusAccClientServerPortNumber)

Port number of the accounting server.

radiusAccServerIndex

INTEGER

1.. 65535

 

Recommended action

No action is required.

hh3cRadiusAuthenticationServerDownTrap

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.13.3.0.6

Authentication server down

Error

Major

1.3.6.1.4.1.25506.2.13.3.0.4 (hh3cRadiusAuthenticationServerUpTrap)

OFF

 

Notification triggers

This notification is generated when the status of an authentication server changes from active to blocked.

This notification replaces hh3cRadiusAuthServerDownTrap (1.3.6.1.4.1.25506.2.13.3.1) in SNMPv2 and later versions.

If the radius trap-version v2 command is used on the device and authentication server down notification is enabled, notification hh3cRadiusAuthenticationServerDownTrap is generated. If the radius trap-version v1 command is used on the device and authentication server down notification is enabled, notification hh3cRadiusAuthServerDownTrap is generated.

System impact

If no secondary authentication servers exist, users cannot perform authentication to come online.

Status control

ON

CLI: Use both the snmp-agent trap enable radius authentication-server-down and radius trap-version v2 commands.

OFF

CLI: Use either the undo snmp-agent trap enable radius authentication-server-down command or the radius trap-version v1 command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.2.1.67.1.2.1.1.3.1.2 (radiusAuthServerAddress)

IP address of an authentication server.

radiusAuthServerIndex

IP Address

Standard MIB values.

1.3.6.1.2.1.67.1.2.1.1.3.1.3 (radiusAuthClientServerPortNumber)

Port number of the authentication server.

radiusAuthServerIndex

INTEGER

1.. 65535

 

Recommended action

To resolve this issue:

1.Use the display interface command to view whether the interface connected to the authentication server is up:

  - If no, troubleshoot the physical links.

  - If yes, go to step 2.

2.Use the ping command to check whether the RADIUS server is reachable:

  - If no, first check the network reachability between the device and the RADIUS server, and then check whether firewalls exist in the network. Make sure the RADIUS server is reachable.

  - If yes, go to step 3.

3.Use the display current-configuration command to view whether the RADIUS server's configurations are correct:

  - If no, modify the RADIUS server's configurations. For more information about RADIUS server configurations, see AAA commands in Security Command Reference and AAA configuration in Security Configuration Guide of the device.

  - If yes, go to step 4.

4.If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

hh3cRadiusAccountingServerDownTrap

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.13.3.0.7

Accounting server down

Error

Major

1.3.6.1.4.1.25506.2.13.3.0.5 (hh3cRadiusAccountingServerUpTrap)

OFF

 

Notification triggers

This notification is generated when the status of an accounting server changes from active to blocked.

This notification replaces hh3cRadiusAccServerDownTrap (1.3.6.1.4.1.25506.2.13.3.2) in SNMPv2 and later versions.

If the radius trap-version v2 command is used on the device and accounting server down notification is enabled, notification hh3cRadiusAccountingServerDownTrap is generated. If the radius trap-version v1 command is used on the device and accounting server down notification is enabled, notification hh3cRadiusAccServerDownTrap is generated.

System impact

The server is unreachable and users cannot come online.

Status control

ON

CLI: Use both the snmp-agent trap enable radius accounting-server-down and radius trap-version v2 commands.

OFF

CLI: Use either the undo snmp-agent trap enable radius accounting-server-down command or the radius trap-version v1 command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.2.1.67.2.2.1.1.3.1.2 (radiusAccServerAddress)

IP address of an accounting server.

radiusAccServerIndex

IP Address

Standard MIB values.

1.3.6.1.2.1.67.2.2.1.1.3.1.3 (radiusAccClientServerPortNumber)

Port number of an accounting server.

radiusAccServerIndex

INTEGER

1.. 65535

 

Recommended action

To resolve this issue:

1.Use the display interface command to view whether the interface connected to the accounting server is up:

  - If no, troubleshoot the physical links.

  - If yes, go to step 2.

2.Use the ping command to check whether the RADIUS server is reachable:

  - If no, first check the network reachability between the device and the RADIUS server, and then check whether firewalls exist in the network. Make sure the RADIUS server is reachable.

  - If yes, go to step 3.

3.Use the display current-configuration command to view whether the RADIUS server's configurations are correct:

  - If no, modify the RADIUS server's configurations. For more information about RADIUS server configurations, see AAA commands in Security Command Reference and AAA configuration in Security Configuration Guide of the device.

  - If yes, go to step 4.

4.If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

hh3cRadiusAuthServerDownTrap

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.13.3.1

Authentication server down

Error

Major

1.3.6.1.4.1.25506.2.13.3.0.1 (hh3cRadiusAuthServerUpTrap)

OFF

 

Notification triggers

This notification is generated when the status of an authentication server changes from active to blocked.

This notification has issues in SNMPv2 and later versions. It has been replaced with hh3cRadiusAuthenticationServerDownTrap (1.3.6.1.4.1.25506.2.13.3.0.6) in SNMPv2 and later versions.

If the radius trap-version v1 command is used on the device and authentication server down notification is enabled, notification hh3cRadiusAuthServerDownTrap is generated. If the radius trap-version v2 command is used on the device and authentication server down notification is enabled, notification hh3cRadiusAuthenticationServerDownTrap is generated.

System impact

If no secondary authentication servers exist, users cannot perform authentication to come online.

Status control

ON

CLI: Use both the snmp-agent trap enable radius authentication-server-down and radius trap-version v1 commands.

OFF

CLI: Use either the undo snmp-agent trap enable radius authentication-server-down command or the radius trap-version v2 command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.2.1.67.1.2.1.1.3.1.2 (radiusAuthServerAddress)

IP address of an authentication server.

radiusAuthServerIndex

IP Address

Standard MIB values.

1.3.6.1.2.1.67.1.2.1.1.3.1.3 (radiusAuthClientServerPortNumber)

Port number of the authentication server.

radiusAuthServerIndex

INTEGER

1.. 65535

 

Recommended action

To resolve this issue:

1.Use the display interface command to view whether the interface connected to the authentication server is up:

  - If no, troubleshoot the physical links.

  - If yes, go to step 2.

2.Use the ping command to check whether the RADIUS server is reachable:

  - If no, first check the network reachability between the device and the RADIUS server, and then check whether firewalls exist in the network. Make sure the RADIUS server is reachable.

  - If yes, go to step 3.

3.Use the display current-configuration command to view whether the RADIUS server's configurations are correct:

  - If no, modify the RADIUS server's configurations. For more information about RADIUS server configurations, see AAA commands in Security Command Reference and AAA configuration in Security Configuration Guide of the device.

  - If yes, go to step 4.

4.If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

hh3cRadiusAccServerDownTrap

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.13.3.2

Accounting server down

Error

Major

1.3.6.1.4.1.25506.2.13.3.0.2 (hh3cRadiusAccServerUpTrap)

OFF

 

Notification triggers

This notification is generated when the status of an accounting server changes from active to blocked.

This notification has issues in SNMPv2 and later versions. It has been replaced with hh3cRadiusAccountingServerDownTrap (1.3.6.1.4.1.25506.2.13.3.0.7) in SNMPv2 and later versions.

If the radius trap-version v1 command is used on the device and accounting server down notification is enabled, notification hh3cRadiusAccServerDownTrap is generated. If the radius trap-version v2 command is used on the device and accounting server down notification is enabled, notification hh3cRadiusAccountingServerDownTrap is generated.

System impact

The server is unreachable and users cannot come online.

Status control

ON

CLI: Use both the snmp-agent trap enable radius accounting-server-down and radius trap-version v1 commands.

OFF

CLI: Use either the undo snmp-agent trap enable radius accounting-server-down command or the radius trap-version v2 command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.2.1.67.2.2.1.1.3.1.2 (radiusAccServerAddress)

IP address of an accounting server.

radiusAccServerIndex

IP Address

Standard MIB values.

1.3.6.1.2.1.67.2.2.1.1.3.1.3 (radiusAccClientServerPortNumber)

Port number of an accounting server.

radiusAccServerIndex

INTEGER

1.. 65535

 

Recommended action

To resolve this issue:

1.Use the display interface command to view whether the interface connected to the accounting server is up:

  - If no, troubleshoot the physical links.

  - If yes, go to step 2.

2.Use the ping command to check whether the RADIUS server is reachable:

  - If no, first check the network reachability between the device and the RADIUS server, and then check whether firewalls exist in the network. Make sure the RADIUS server is reachable.

  - If yes, go to step 3.

3.Use the display current-configuration command to view whether the RADIUS server's configurations are correct:

  - If no, modify the RADIUS server's configurations. For more information about RADIUS server configurations, see AAA commands in Security Command Reference and AAA configuration in Security Configuration Guide of the device.

  - If yes, go to step 4.

4.If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网