H3C Technologies H3C SecPath F1000-E User Manual
Page 193
183
Specifying the RADIUS authentication/authorization servers
You can specify one primary authentication/authorization server and up to 16 secondary
authentication/authorization servers for a RADIUS scheme so that the NAS can find a server for user
authentication/authorization when using the scheme. When the primary server is not available, a
secondary server is used. In a scenario where redundancy is not required, specify only the primary
server.
In RADIUS, user authorization information is piggybacked in authentication responses sent to RADIUS
clients. It is neither allowed nor needed to specify a separate RADIUS authorization server.
Follow these guidelines when you configure RADIUS authentication/authorization servers:
•
The IP addresses of the primary and secondary authentication/authorization servers for a scheme
must be different from each other. Otherwise, the configuration fails.
•
All servers for authentication/authorization and accountings, primary or secondary, must use IP
addresses of the same IP version.
•
You can specify a RADIUS authentication/authorization server as the primary
authentication/authorization server for one scheme and simultaneously as a secondary
authentication/authorization server for another scheme.
To specify RADIUS authentication/authorization servers for a RADIUS scheme:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter RADIUS scheme view. radius scheme radius-scheme-name N/A
3.
Specify RADIUS
authentication/authorizatio
n servers.
•
Specify the primary RADIUS
authentication/authorization server:
primary authentication { ip-address |
ipv6 ipv6-address } [ port-number |
key [ cipher | simple ] key |
vpn-instance vpn-instance-name ] *
•
Specify a secondary RADIUS
authentication/authorization server:
secondary authentication { ip-address
| ipv6 ipv6-address } [ port-number |
key [ cipher | simple ] key |
vpn-instance vpn-instance-name ] *
Configure at least one
command.
No
authentication/authorization
server is specified by default.
In FIPS mode, the firewall
supports only ciphertext
shared keys of at least 8
characters comprising
case-sensitive letters,
numbers, and special
characters.
Specifying the RADIUS accounting servers and the relevant parameters
You can specify one primary accounting server and up to 16 secondary accounting servers for a RADIUS
scheme. When the primary server is not available, a secondary server is used. When redundancy is not
required, specify only the primary server.
By setting the maximum number of real-time accounting attempts for a scheme, you make the firewall
disconnect users for whom no accounting response is received before the number of accounting attempts
reaches the limit.
When the firewall receives a connection teardown request from a host or a connection teardown
notification from an administrator, it sends a stop-accounting request to the accounting server. You can
enable buffering of non-responded stop-accounting requests to allow the firewall to buffer and resend a
stop-accounting request until it receives a response or the number of stop-accounting attempts reaches
the configured limit. In the latter case, the firewall discards the packet.
- H3C SecPath F5000-A5 Firewall H3C SecPath F1000-A-EI H3C SecPath F1000-E-SI H3C SecPath F1000-S-AI H3C SecPath F5000-S Firewall H3C SecPath F5000-C Firewall H3C SecPath F100-C-SI H3C SecPath F1000-C-SI H3C SecPath F100-A-SI H3C SecBlade FW Cards H3C SecBlade FW Enhanced Cards H3C SecPath U200-A U200-M U200-S H3C SecPath U200-CA U200-CM U200-CS