512
C
HAPTER
49: AAA & RADIUS & HWTACACS C
ONFIGURATION
4
The Authenticator field (16 bytes) is used to verify the packet returned from the
RADIUS server; it is also used in the password hiding algorithm. There are two
kinds of authenticators: Request and Response.
5
The Attribute field contains special authentication, authorization, and accounting
information to provide the configuration details of a request or response packet.
This field is represented by a field triplet (Type, Length and Value):
■
The Type field (one byte) specifies the type of the attribute. Its value ranges
from 1 to 255. Table 396 lists the attributes that are commonly used in RADIUS
authentication and authorization.
■
The Length field (one byte) specifies the total length of the Attribute field in
bytes (including the Type, Length and Value fields).
■
The Value field (up to 253 bytes) contains the information about the attribute.
Its content and format are determined by the Type and Length fields.
The RADIUS protocol takes good scalability. Attribute 26 (Vender-Specific) defined
in this protocol allows a device vendor to extend RADIUS to implement functions
that are not defined in standard RADIUS.
Figure 130 depicts the structure of attribute 26. The Vendor-ID field representing
the code of the vendor occupies four bytes. The first byte is 0, and the other three
bytes are defined in RFC1700. Here, the vendor can encapsulate multiple
Table 396
RADIUS attributes
Value of the
Type field
Attribute type
Value of the
Type field
Attribute type
1 User-Name 23
Framed-IPX-Network
2 User-Password
24
State
3 CHAP-Password
25
Class
4 NAS-IP-Address
26
Vendor-Specific
5 NAS-Port
27
Session-Timeout
6 Service-Type 28
Idle-Timeout
7 Framed-Protocol
29
Termination-Action
8 Framed-IP-Address
30
Called-Station-Id
9 Framed-IP-Netmask
31
Calling-Station-Id
10 Framed-Routing
32 NAS-Identifier
11 Filter-ID
33 Proxy-State
12 Framed-MTU 34 Login-LAT-Service
13 Framed-Compression
35 Login-LAT-Node
14 Login-IP-Host 36 Login-LAT-Group
15 Login-Service 37 Framed-AppleTalk-Link
16 Login-TCP-Port 38 Framed-AppleTalk-Network
17 (unassigned) 39 Framed-AppleTalk-Zone
18 Reply-Message 40-59
(reserved
for
accounting)
19 Callback-Number
60 CHAP-Challenge
20 Callback-ID
61 NAS-Port-Type
21 (unassigned) 62 Port-Limit
22 Framed-Route 63 Login-LAT-Port
Summary of Contents for Switch 7757
Page 32: ...32 CHAPTER 1 CLI OVERVIEW...
Page 70: ...70 CHAPTER 5 LOGGING IN USING MODEM...
Page 76: ...76 CHAPTER 7 LOGGING IN THROUGH NMS...
Page 86: ...86 CHAPTER 9 CONFIGURATION FILE MANAGEMENT...
Page 120: ...120 CHAPTER 13 ISOLATE USER VLAN CONFIGURATION...
Page 126: ...126 CHAPTER 14 SUPER VLAN...
Page 136: ...136 CHAPTER 16 IP PERFORMANCE CONFIGURATION...
Page 152: ...152 CHAPTER 17 IPX CONFIGURATION...
Page 164: ...164 CHAPTER 19 QINQ CONFIGURATION...
Page 172: ...172 CHAPTER 21 SHARED VLAN CONFIGURATION...
Page 182: ...182 CHAPTER 22 PORT BASIC CONFIGURATION...
Page 198: ...198 CHAPTER 24 PORT ISOLATION CONFIGURATION...
Page 208: ...208 CHAPTER 25 PORT SECURITY CONFIGURATION...
Page 224: ...224 CHAPTER 27 DLDP CONFIGURATION...
Page 232: ...232 CHAPTER 28 MAC ADDRESS TABLE MANAGEMENT...
Page 240: ...240 CHAPTER 29 CENTRALIZED MAC ADDRESS AUTHENTICATION CONFIGURATION...
Page 280: ...280 CHAPTER 30 MSTP CONFIGURATION...
Page 348: ...348 CHAPTER 35 IS IS CONFIGURATION...
Page 408: ...408 CHAPTER 39 802 1X CONFIGURATION...
Page 412: ...412 CHAPTER 40 HABP CONFIGURATION...
Page 422: ...422 CHAPTER 41 MULTICAST OVERVIEW...
Page 426: ...426 CHAPTER 42 GMRP CONFIGURATION...
Page 480: ...480 CHAPTER 47 PIM CONFIGURATION...
Page 506: ...506 CHAPTER 48 MSDP CONFIGURATION...
Page 552: ...552 CHAPTER 51 TRAFFIC ACCOUNTING CONFIGURATION...
Page 570: ...570 CHAPTER 53 HA CONFIGURATION...
Page 582: ...582 CHAPTER 54 ARP CONFIGURATION SwitchA arp protective down recover interval 200...
Page 622: ...622 CHAPTER 58 DHCP RELAY AGENT CONFIGURATION...
Page 684: ...684 CHAPTER 61 QOS CONFIGURATION...
Page 718: ...718 CHAPTER 63 CLUSTER...
Page 738: ...738 CHAPTER 67 UDP HELPER CONFIGURATION...
Page 752: ...752 CHAPTER 69 RMON CONFIGURATION...
Page 772: ...772 CHAPTER 70 NTP CONFIGURATION...
Page 796: ...796 CHAPTER 72 FILE SYSTEM MANAGEMENT...
Page 802: ...802 CHAPTER 73 BIMS CONFIGURATION...
Page 814: ...814 CHAPTER 74 FTP AND TFTP CONFIGURATION...
Page 830: ...830 CHAPTER 75 INFORMATION CENTER...
Page 836: ...836 CHAPTER 76 DNS CONFIGURATION...
Page 852: ...852 CHAPTER 77 BOOTROM AND HOST SOFTWARE LOADING...
Page 858: ...858 CHAPTER 78 BASIC SYSTEM CONFIGURATION DEBUGGING...