1-32
To do…
Use the command…
Remarks
Enter system view
system-view
—
Enter RADIUS scheme view
radius scheme
radius-scheme-name
—
Set the RADIUS server
response timeout timer
timer response-timeout
seconds
Optional
3 seconds by default
Set the quiet timer for the
primary server
timer quiet
minutes
Optional
5 minutes by default
Set the real-time accounting
interval
timer realtime-accounting
minutes
Optional
12 minutes by default
z
The maximum number of retransmission attempts of RADIUS packets multiplied by the RADIUS
server response timeout period cannot be greater than 75. This product is also the upper limit of the
timeout time of different access modules.
z
For an access module, the maximum number of retransmission attempts multiplied by the RADIUS
server response timeout period must be smaller than the timeout time. Otherwise, stop-accounting
messages cannot be buffered, and the primary/secondary server switchover cannot take place.
For example, as the timeout time of voice access is 10 seconds, the product of the two parameters
cannot exceed 10 seconds; as the timeout time of Telnet access is 30 seconds, the product of the
two parameters cannot exceed 30 seconds. For detailed information about timeout time of a
specific access module, refer to the corresponding part in the
Access Volume.
z
To configure the maximum number of retransmission attempts of RADIUS packets, refer to the
command
retry
in the command manual.
Specifying a Security Policy Server
The core of the EAD solution is integration and cooperation, and the security policy server system is the
management and control center. As a collection of software, the security policy server system can run
on Windows and Linux to provide functions such as user management, security policy management,
security status assessment, security cooperation control, and security event audit.
This task allows you to configure the IP address of a security policy server. If the security policy server
and the RADIUS server reside on the same host, you can omit this task. When the device receives a
control packet from the security policy server, it checks whether the source IP address of the packet is
the IP address of the security policy server or RADIUS server. If not, the device considers the packet
invalid.
Follow these steps to specify a security policy server:
To do…
Use the command…
Remarks
Enter system view
system-view
—
Enter RADIUS scheme view
radius scheme
radius-scheme-name
—
Содержание S7902E
Страница 82: ...1 4 DeviceA interface tunnel 1 DeviceA Tunnel1 service loopback group 1 ...
Страница 200: ...1 11 DeviceB display vlan dynamic No dynamic vlans exist ...
Страница 494: ...ii Displaying and Maintaining Tunneling Configuration 1 45 Troubleshooting Tunneling Configuration 1 45 ...
Страница 598: ...ii ...
Страница 1757: ...4 9 ...
Страница 1770: ...6 4 ...
Страница 2017: ...2 11 Figure 2 3 SFTP client interface ...
Страница 2062: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 2238: ...1 16 DeviceA cfd linktrace service instance 1 mep 1001 target mep 4002 ...
Страница 2442: ...2 4 Set the interval for sending Syslog or trap messages to 20 seconds Device mac address information interval 20 ...