Enabling the trap function for radius – H3C Technologies H3C SecPath F1000-E User Manual
Page 201
191
Configuring the IP address of the security policy server
The core of the H3C EAD solution is integration and cooperation, and the security policy server is the
management and control center. Using a collection of software, the security policy server provides
functions such as user management, security policy management, security status assessment, security
cooperation control, and security event audit.
The NAS checks the validity of received control packets and accepts only control packets from known
servers. To use a security policy server that is independent of the AAA servers, you must configure the IP
address of the security policy server on the NAS. To implement all EAD functions, configure both the IP
address of the IMC security policy server and that of the IMC Platform on the NAS.
To configure the IP address of the security policy server for a scheme:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter RADIUS scheme
view.
radius scheme radius-scheme-name
N/A
3.
Specify a security policy
server.
security-policy-server ip-address
No security policy server is
specified by default.
NOTE:
You can specify up to eight security policy servers for a RADIUS scheme.
Configuring interpretation of RADIUS class attribute as CAR parameters
According to RFC 2865, a RADIUS server assigns the RADIUS class attribute (attribute 25) to a RADIUS
client. However, the RFC only requires the RADIUS client to send the attribute to the accounting server on
an "as is" basis. It does not require the RADIUS client to interpret the attribute. Some RADIUS servers use
the class attribute to deliver the assigned committed access rate (CAR) parameters. In this case, the
access devices must interpret the attribute to implement user-based traffic monitoring and controlling. To
support such applications, configure the access devices to interpret the class attribute as the CAR
parameters.
To configure the firewall to interpret the RADIUS class attribute as CAR parameters:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter RADIUS scheme view.
radius scheme
radius-scheme-name
N/A
3.
Interpret the class attribute as
CAR parameters.
attribute 25 car
By default, RADIUS attribute 25 is not
interpreted as CAR parameters.
NOTE:
Whether interpretation of RADIUS class attribute as CAR parameters is supported depends on two factors:
•
Whether the firewall supports CAR parameters assignment.
•
Whether the RADIUS server supports assigning CAR parameters through the class attribute.
Enabling the trap function for RADIUS
With the trap function, a NAS sends a trap message when either of the following events occurs:
- H3C SecPath F5000-A5 Firewall H3C SecPath F1000-A-EI H3C SecPath F1000-E-SI H3C SecPath F1000-S-AI H3C SecPath F5000-S Firewall H3C SecPath F5000-C Firewall H3C SecPath F100-C-SI H3C SecPath F1000-C-SI H3C SecPath F100-A-SI H3C SecBlade FW Cards H3C SecBlade FW Enhanced Cards H3C SecPath U200-A U200-M U200-S H3C SecPath U200-CA U200-CM U200-CS