6-37
RADIUS Authentication, Authorization, and Accounting
Commands Authorization
Enabling Authorization
To configure authorization for controlling access to the CLI commands, enter
this command at the CLI.
For example, to enable the RADIUS protocol as the authorization method:
When the NAS sends the RADIUS server a valid username and password, the
RADIUS server sends an Access-Accept packet that contains two attributes
—the command list and the command exception flag. When an authenticated
user enters a command on the switch, the switch examines the list of com-
mands delivered in the RADIUS Access-Accept packet as well as the command
exception flag, which indicates whether the user has permission to execute
the commands in the list. See
Configuring the RADIUS Server
After the Access-Accept packet is deliver, the command list resides on the
switch. Any changes to the user’s command list on the RADIUS server are not
seen until the user is authenticated again.
Syntax:
[no] aaa authorization <commands> <radius | none>
Configures authorization for controlling access to CLI
commands. When enabled, the switch checks the list of commands
supplied by the RADIUS server during user authentication to
determine if a command entered by the user can be executed.
radius:
The NAS requests authorization information from the
RADIUS server. Authorization rights are assigned by user or
group.
none
:
The NAS does not request authorization information.
HP Switch(config)# aaa authorization commands radius
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......