H3C Technologies H3C SecPath F1000-E User Manual
Page 194
184
Follow these guidelines when you configure RADIUS accounting servers:
•
The IP addresses of the primary and secondary accounting servers must be different from each other.
Otherwise, the configuration fails.
•
All servers for authentication/authorization and accountings, primary or secondary, must use IP
addresses of the same IP version.
•
If you delete an accounting server that is serving users, the firewall can no longer send real-time
accounting requests and stop-accounting requests for the users to that server, or buffer the
stop-accounting requests.
•
You can specify a RADIUS accounting server as the primary accounting server for one scheme and
simultaneously as a secondary accounting server for another scheme.
•
RADIUS does not support accounting for FTP users.
To specify RADIUS accounting servers and set relevant parameters for a scheme:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter RADIUS scheme view.
radius scheme radius-scheme-name N/A
3.
Specify RADIUS accounting
servers.
•
Specify the primary RADIUS
accounting server:
primary accounting { ip-address |
ipv6 ipv6-address } [ port-number
| key [ cipher | simple ] key |
vpn-instance vpn-instance-name ]
*
•
Specify a secondary RADIUS
accounting server:
secondary accounting { ip-address
| ipv6 ipv6-address }
[ port-number | key [ cipher |
simple ] key | vpn-instance
vpn-instance-name ] *
Configure at least one
command.
No accounting server is
specified by default.
In FIPS mode, the firewall
supports only ciphertext shared
keys of at least 8 characters
comprising case-sensitive
letters, numbers, and special
characters.
4.
Set the maximum number of
real-time accounting attempts. retry realtime-accounting retry-times
Optional
The default setting is 5.
5.
Enable buffering of
stop-accounting requests to
which no responses are
received.
stop-accounting-buffer enable
Optional
Enabled by default.
6.
Set the maximum number of
stop-accounting attempts.
retry stop-accounting retry-times
Optional
The default setting is 500.
Specifying the shared keys for authenticating RADIUS packets
The RADIUS client and RADIUS server use the MD5 algorithm to encrypt packets exchanged between
them and use shared keys to authenticate the packets. They must use the same shared key for the same
type of packets.
A shared key configured in this task is for all servers of the same type (accounting or authentication) in
the scheme, and has a lower priority than a shared key configured individually for a RADIUS server.
To specify shared keys for authenticating RADIUS packets:
- H3C SecPath F5000-A5 Firewall H3C SecPath F1000-A-EI H3C SecPath F1000-E-SI H3C SecPath F1000-S-AI H3C SecPath F5000-S Firewall H3C SecPath F5000-C Firewall H3C SecPath F100-C-SI H3C SecPath F1000-C-SI H3C SecPath F100-A-SI H3C SecBlade FW Cards H3C SecBlade FW Enhanced Cards H3C SecPath U200-A U200-M U200-S H3C SecPath U200-CA U200-CM U200-CS