HP 12500 Series Configuration Manual page 44

Routing
Table of Contents

Advertisement

The NAS checks the validity of received control packets and accepts only control packets from known
servers. To use a security policy server that is independent of the AAA servers, you must configure the IP
address of the security policy server on the NAS. To implement all EAD functions, configure both the IP
address of the IMC security policy server and that of the IMC Platform on the NAS.
To configure the IP address of the security policy server for a scheme:
Step
1.
Enter system view.
2.
Enter RADIUS scheme
view.
3.
Specify a security policy
server.
NOTE:
You can specify up to eight security policy servers for a RADIUS scheme.
Configuring interpretation of RADIUS class attribute as CAR parameters
According to RFC 2865, a RADIUS server assigns the RADIUS class attribute (attribute 25) to a RADIUS
client. However, the RFC only requires the RADIUS client to send the attribute to the accounting server on
an "as is" basis; it does not require the RADIUS client to interpret the attribute. Some RADIUS servers use
the class attribute to deliver the assigned committed access rate (CAR) parameters. In this case, the
switches need to interpret the attribute to implement user-based traffic monitoring and controlling. To
support such applications, configure the switches to interpret the class attribute as the CAR parameters.
To configure a switch to interpret the RADIUS class attribute as CAR parameters:
Step
1.
Enter system view.
2.
Enter RADIUS scheme view.
3.
Interpret the class attribute as
CAR parameters.
Enabling the trap function for RADIUS
With the trap function, a NAS sends a trap message when either of the following events occurs:
The status of a RADIUS server changes. If a NAS receives no response to an accounting or
authentication request before the specified maximum number of RADIUS request transmission
attempts is exceeded, it considers the server unreachable, sets the status of the server to block and
sends a trap message. If the NAS receives a response from a RADIUS server that it considers
unreachable, the NAS considers that the RADIUS server is reachable again, sets the status of the
server to active, and sends a trap message.
The ratio of the number of failed transmission attempts to the total number of authentication request
transmission attempts reaches the threshold. This threshold ranges from 1% to 100% and defaults to
30%. This threshold can only be configured through the MIB.
The failure ratio is generally small. If a trap message is triggered because the failure ratio is higher than
the threshold, troubleshoot the configuration on and the communication between the NAS and the
RADIUS server.
Command
system-view
radius scheme radius-scheme-name
security-policy-server ip-address
Command
system-view
radius scheme
radius-scheme-name
attribute 25 car
34
Remarks
N/A
N/A
No security policy server is
specified by default.
Remarks
N/A
N/A
By default, RADIUS attribute 25 is not
interpreted as CAR parameters.

Advertisement

Table of Contents
loading

Table of Contents