............................................................................................................................................................................................................................................................
Understanding and Creating Attribute Sets
Using the 8950 AAA Policy Assistant in Server
Management Tool
9-16
365-360-001R6.0
Issue 1, December 2008
............................................................................................................................................................................................................................................................
Understanding and Creating Attribute Sets
About Attribute Set
8950 AAA uses two key actions during Access-Request processing to authorize users and
configure user sessions upon successful authentications: performing authorization checks
and session provisioning. Attributes contain the information used to support these actions.
Other RADIUS servers generally require that you set this type of information as part of
each user’s profile. With the PolicyAssistant it is possible to create an attribute set for a
policy which contains the information that the server applies to all users of the policy.
Authorization checks are logical tests of information that accompany a user’s access
request or that are known about the request (for example, the date and time a request is
received) against a set of authorization rules. The server tests the information it receives
against verification attributes, also called check-items, stored in an attribute set or possibly
a user’s profile. By including appropriate verification attributes in a policy, a variety of
rules can be enforced. For example, users might be permitted to use ISDN connections,
required to dial-in to a particular phone number, or use a specific access protocol, such as
PPP.
Table 9-9
lists attributes commonly used as verification attributes.
Figure 9-9 Sample List of Verification Attributes
Attribute Name
Description of Use of this
Attribute as a Verification
Attribute
Example
NAS-IP-Address
Limits access to requests sent from
a NAS at this IP Address
NAS-IP-Address =
10.0.1.2
Service-Type
Only allow requests of this service
type
Service-Type = Framed-
Protocol
Framed-Protocol
Only allows requests that only use
the specified Framed-Protocol
Framed-Protocol = PPP
Called-Station-Id
Limits access to sessions that were
made through this phone number.
Called-Station-Id =
5105551212
NAS-Port-Type
Only accept this type of
connection. (i.e., ISDN or Async—
Analog).
NAS-Port-Type = Async
Expiration
Rejects Access-Requests placed
after the specified date.
Expiration = “Mar 27
2005”
Activation
Rejects Access-Requests placed
before the specified date.
Activation = “Dec 25
2005”
Summary of Contents for 8950 AAA
Page 8: ...Contents v i i i 365 360 001R6 0 Issue 1 December 2008...
Page 18: ...1 2 365 360 001R6 0 Issue 1 December 2008...
Page 24: ...RADIUS Terms Explained Introduction to 8950 AAA 1 6 365 360 001 R6 0 Issue 1 December 2008...
Page 186: ...USSv2 Configuration Configuring 8950 AAA USSv2 10 8 365 360 001R6 0 Issue 1 December 2008...
Page 218: ...II 2 365 360 001R6 0 Issue 1 December 2008...
Page 224: ...Stats Collector Panel Stats Collector 14 6 365 360 001R6 0 Issue 1 December 2008...
Page 230: ...The Configure Reports Panel Configuring Reports 15 6 365 360 001R6 0 Issue 1 December 2008...
Page 232: ...III 2 365 360 001R6 0 Issue 1 December 2008...
Page 276: ...Log Rules Message Logging 16 44 365 360 001R6 0 Issue 1 December 2008...
Page 278: ...IV 2 365 360 001R6 0 Issue 1 December 2008...
Page 326: ...Advanced Using LiveAdministrator 18 16 365 360 001R6 0 Issue 1 December 2008...
Page 328: ...V 2 365 360 001R6 0 Issue 1 December 2008...
Page 400: ...VI 2 365 360 001R6 0 Issue 1 December 2008...
Page 426: ...VII 2 365 360 001R6 0 Issue 1 December 2008...
Page 460: ...VIII 2 365 360 001R6 0 Issue 1 December 2008...
Page 474: ...Glossary GL 10 365 360 001R6 0 Issue 1 December 2008...