73
Usage guidelines
The device replaces the attribute in packets that match a RADIUS attribute conversion rule with the
destination RADIUS attribute in the rule.
The conversion rules take effect only when the RADIUS attribute translation feature is enabled.
When you configure RADIUS attribute conversion rules, follow these restrictions and guidelines:
•
The source and destination RADIUS attributes in a rule must use the same data type.
•
The source and destination RADIUS attributes in a rule cannot use the same name.
•
A source RADIUS attribute can be converted only by one criterion, packet type or direction.
•
One source RADIUS attribute cannot be converted to multiple destination attributes.
If you do not specify a source RADIUS attribute, the
undo
attribute
convert
command deletes all
RADIUS attribute conversion rules.
Examples
# In RADIUS scheme
radius1
, configure a RADIUS attribute conversion rule to replace the
Hw-Server-String attribute of received RADIUS packets with the Ab-User-Roles attribute.
<Sysname> system-view
[Sysname] radius scheme radius1
[Sysname-radius-radius1] attribute convert Hw-Server-String to Ab-User-Roles received
Related commands
attribute translate
attribute reject (RADIUS DAS view)
Use
attribute reject
to configure a RADIUS attribute rejection rule.
Use
undo attribute reject
to delete RADIUS attribute rejection rules.
Syntax
attribute reject attr-name
{ {
coa-ack
|
coa-request
} * | {
received
|
sent
} * }
undo
attribute
reject
[
attr-name
]
Default
No RADIUS attribute rejection rules exist.
Views
RADIUS DAS view
Predefined user roles
network-admin
mdc-admin
Parameters
attr-name
: Specifies a RADIUS attribute by its name, a case-insensitive string of 1 to 63 characters.
The attribute must be supported by the system.
coa-ack
: Specifies the CoA acknowledgment packets.
coa-request
: Specifies the CoA request packets.
received
: Specifies the received DAE packets.
sent
: Specifies the sent DAE packets.