1-21
management of user attributes for the local users in the group. Currently, you can configure password
control attributes and authorization attributes for a user group.
By default, every newly added local user belongs to the user group of system and bears all attributes
of the group. User group system is automatically created by the device.
Follow these steps to configure the attributes for a user group:
To do…
Use the command…
Remarks
Enter system view
system-view
—
Create a user group and enter user
group view
user-group group-name
Required
Configure the authorization
attributes for the user group
authorization-attribute
{
acl
acl-number
|
callback-number
callback-number
|
idle-cut
minute
|
level
level
|
user-profile
profile-name
|
vlan
vlan-id
|
work-directory
directory-name
} *
Optional
By default, no
authorization
attribute is
configured for a
user group.
Tearing down User Connections Forcibly
Follow these steps to tear down user connections forcibly:
To do…
Use the command…
Remarks
Enter system view
system-view
—
Tear down AAA user
connections forcibly
cut connection
{
access-type
{
dot1x
|
mac-authentication
}
|
all
|
domain isp-name
|
interface interface-type
interface-number
|
ip
ip-address
|
mac mac-address
|
ucibindex ucib-index
|
user-name user-name
|
vlan
vlan-id
} [
slot slot-number
]
Required
Applies to only LAN access
user connections at present
Displaying and Maintaining AAA
To do…
Use the command…
Remarks
Display the configuration
information of a specified ISP
domain or all ISP domains
display domain
[
isp-name
]
Available in any view
Display information about
specified or all user connections
display
connection
[
access-type
{
dot1x
|
mac-authentication
} |
domain
isp-name
|
interface
interface-type interface-number
|
ip
ip-address
|
mac mac-address
|
ucibindex ucib-index
|
user-name
user-name
|
vlan
vlan-id
] [
slot
slot-number
]
Available in any view