if you specify the
radius
keyword followed by the
none
keyword when configuring
authentication, AAA initially attempts to use RADIUS authentication. If no RADIUS
servers are available, AAA uses no authentication. The JUNOSe software currently
supports
radius
and
none
as accounting methods and
radius
,
none
, and
local
as
authentication methods. See “Configuring Local Authentication Servers” on page 40
for information about local authentication.
You can configure authentication and accounting methods based on the following
types of subscribers:
■
ATM 1483
■
Tunnels (for example, L2TP tunnels)
■
PPP
■
RADIUS relay server
■
IP subscriber management interfaces
NOTE:
IP subscriber management interfaces are static or dynamic interfaces that
are created or managed by the JUNOSe software’s subscriber management feature.
Supporting Exchange of Extensible Authentication Protocol Messages
Extensible Authentication Protocol (EAP) is a protocol that supports multiple methods
for authenticating a peer before allowing network layer protocols to transmit over
the link. JUNOSe software supports the exchange of EAP messages between JUNOSe
applications, such as PPP, and an external RADIUS authentication server.
The JUNOSe software’s AAA service accepts and passes EAP messages between the
JUNOSe application and the router’s internal RADIUS authentication server. The
internal RADIUS authentication server, which is a RADIUS client, provides EAP
pass-through—the RADIUS client accepts the EAP messages from AAA, and sends
the messages to the external RADIUS server for authentication. The RADIUS client
then passes the response from the external RADIUS authentication server back to
the AAA service, which then sends a response to the JUNOSe application. The AAA
service and the internal RADIUS authentication service do not process EAP
information—both simply act as pass-through devices for the EAP message.
The router’s local authentication server and authentication servers do not
support the exchange of EAP messages. These type of servers deny access if they
receive an authentication request from AAA that includes an EAP message. EAP
messages do not affect the
none
authentication configuration, which always grants
access.
The local RADIUS authentication server uses the following RADIUS attributes when
exchanging EAP messages with the external RADIUS authentication server:
20
■
Configuring RADIUS Authentication and Accounting Servers
JUNOSe 11.0.x Broadband Access Configuration Guide
Summary of Contents for JUNOSE 11.0.X MULTICAST ROUTING
Page 6: ...vi...
Page 28: ...xxviii Table of Contents JUNOSe 11 0 x Broadband Access Configuration Guide...
Page 36: ...xxxvi List of Tables JUNOSe 11 0 x Broadband Access Configuration Guide...
Page 42: ...2 Managing Remote Access JUNOSe 11 0 x Broadband Access Configuration Guide...
Page 204: ...164 Managing RADIUS and TACACS JUNOSe 11 0 x Broadband Access Configuration Guide...
Page 292: ...252 Monitoring RADIUS Relay Server JUNOSe 11 0 x Broadband Access Configuration Guide...
Page 336: ...296 RADIUS Client Terminate Reasons JUNOSe 11 0 x Broadband Access Configuration Guide...
Page 368: ...328 Managing L2TP JUNOSe 11 0 x Broadband Access Configuration Guide...
Page 444: ...404 PPP Accounting Statistics JUNOSe 11 0 x Broadband Access Configuration Guide...
Page 494: ...454 Managing DHCP JUNOSe 11 0 x Broadband Access Configuration Guide...
Page 510: ...470 DHCP Local Server Configuration Tasks JUNOSe 11 0 x Broadband Access Configuration Guide...
Page 556: ...516 Configuring DHCP Relay Proxy JUNOSe 11 0 x Broadband Access Configuration Guide...
Page 616: ...576 Managing the Subscriber Environment JUNOSe 11 0 x Broadband Access Configuration Guide...
Page 674: ...634 Managing Subscriber Services JUNOSe 11 0 x Broadband Access Configuration Guide...
Page 767: ...Part 7 Index Index on page 729 Index 727...
Page 768: ...728 Index JUNOSe 11 0 x Broadband Access Configuration Guide...