![HP HP ProCurve Series 6600 Access Security Manual Download Page 279](http://html.mh-extra.com/html/hp/hp-procurve-series-6600/hp-procurve-series-6600_access-security-manual_163101279.webp)
6-45
RADIUS Authentication, Authorization, and Accounting
Commands Authorization
6.
Right click and then select
New > key
. Add the vendor Id number that
you determined in step 4 (100 in the example).
7.
Restart all Cisco services.
8.
The newly created HP RADIUS VSA appears only when you configure an
AAA client (NAS) to use the HP VSA RADIUS attributes. Select Network
Configuration and add (or modify) an AAA entry. In the Authenticate
Using field choose RADIUS(HP) as an option for the type of security
control protocol.
9.
Select
Restar
t to effect the change. The HP RADIUS VSA
attributes will appear in Cisco ACS configurations, for example, “Interface
Configuration”, “Group Setup”, “User Setup”.
To enable the processing of the HP-Command-String VSA for RADIUS
accounting:
1.
Select
System Configuration
.
2.
Select
Logging
.
3.
Select
CSV RADIUS Accounting
. In the Select Columns to Log section,
add the HP-Command-String attribute to the Logged Attributes list.
4.
Select
Submit
.
5.
Select
Network Configuration
. In the AAA Clients section, select an
entry in the AAA Client Hostname column. You will go to the AAA Client
Setup screen.
6.
Check the box for
Log Update/Watchdog Packets from this AAA
Client
.
7.
Click
Restart
. You should be able to see the HP-Command-
String attribute in the RADIUS accounting reports.
You can enter the commands you wish to allow or deny with the special
characters used in standard regular expressions (c, ., \, [list], [^list], *, ^, $).
Commands must be between 1-249 characters in length.
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......