Introduction to AAA Services
241
Figure 79
RADIUS message format
1
The Code field (one byte) decides the type of RADIUS message, as shown in
Table 178.
2
The Identifier field (one byte) is used to match requests and responses. It changes
whenever the content of the Attributes field changes, and whenever a valid
response has been received for a previous request, but remains unchanged for
message retransmission.
Code
Attribute
Identifier
0
7
Length
Authenticator
7
15
31
Table 178
Description of the major values of the Code field
Code
Message type
Message description
1
Access-Request
Direction: client->server.
The client transmits this message to the server to
determine if the user can access the network.
This message carries user information. It must contain
the User-Name attribute and may contain the
following attributes: NAS-IP-Address, User-Password
and NAS-Port.
2
Access-Accept
Direction: server->client.
The server transmits this message to the client if all
the attribute values carried in the Access-Request
message are acceptable (that is, the user passes the
authentication).
3
Access-Reject
Direction: server->client.
The server transmits this message to the client if any
attribute value carried in the Access-Request message
is unacceptable (that is, the user fails the
authentication).
4
Accounting-Request
Direction: client->server.
The client transmits this message to the server to
request the server to start or end the accounting
(whether to start or to end the accounting is
determined by the Acct-Status-Type attribute in the
message).
This message carries almost the same attributes as
those carried in the Access-Request message.
5
Accounting-Response
Direction: server->client.
The server transmits this message to the client to
notify the client that it has received the
Accounting-Request message and has correctly
recorded the accounting information.
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...