Operation Manual – AAA RADIUS HWTACACS
H3C S5500-EI Series Ethernet Switches
Chapter 1 AAA/RADIUS/HWTACACS
Configuration
1-23
Note:
z
With the
local-user password-display-mode
cipher-force
command configured,
a local user password is always displayed in cipher text, regardless of the
configuration of the
password
command. In this case, if you use the
save
command to save the configuration, all existing local user passwords will still be
displayed in cipher text after the device restarts, even if you restore the display
mode to
auto
.
z
Local authentication checks the service types of a local user. If the service types are
not available, the user cannot pass authentication. During authorization, a user with
no service type configured is authorized with no service by default.
z
If you specify an authentication method that requires the username and password,
including local authentication, RADIUS authentication and HWTACACS
authentication, the level of the commands that a user can use after logging in
depends on the priority of the user, or the priority of user interface level as with other
authentication methods. For an SSH user using RSA public key authentication, the
commands that can be used depend on the level configured on the user interface.
For details regarding authentication method and command level, refer to
Login
Configuration
and
System Maintaining and Debugging Configuration
respectively
.
z
Both the
service-type
and
level
commands can be used to specify user priority.
The one used later has the final effect.
z
The
attribute ip
command only applies to authentications that support IP address
passing, such as 802.1x. If you configure the command to authentications that do
not support IP address passing, such as MAC address authentication, the local
authentication will fail.
z
The
attribute port
command binds a port by its number only, regardless of the port
type.
z
The
idle-cut
command
configured under ISP view applies to lan-access users only.
1.3.8 Tearing down User Connections Forcibly
Follow these steps to tear down user connections forcibly:
To do…
Use the command…
Remarks
Enter system view
system-view
—
Tear down AAA user
connections forcibly
cut connection
{
access-type
{
dot1x
|
mac-authentication
|
portal
} |
all
|
domain isp-name
|
interface interface-type
interface-number
|
ip
ip-address
|
mac
mac-address
|
ucibindex ucib-index
|
user-name user-name
|
vlan
vlan-id
} [
slot
slot-number
]
Required
Applies to
only LAN
access user
connections
at present.