![Allen-Bradley 1783-WAPAK9 Скачать руководство пользователя страница 424](http://html1.mh-extra.com/html/allen-bradley/1783-wapak9/1783-wapak9_user-manual_2900827424.webp)
424
Rockwell Automation Publication 1783-UM006A-EN-P - May 2014
Chapter 14
Configuring RADIUS and Servers
Configuring the Access Point
to Use Vendor-specific
RADIUS Attributes
The Internet Engineering Task Force (IETF) draft standard specifies a method
for communicating vendor-specific information between the access point and the
RADIUS server by using the vendor-specific attribute (attribute 26). Vendor-
specific attributes (VSAs) allow vendors to support their own extended attributes
not suitable for general use.
The Cisco RADIUS implementation supports one vendor-specific option by
using the format recommended in the specification. Cisco’s vendor ID is 9, and
the supported option has vendor type 1, that is named cisco-avpair. The value is a
string with this format:
protocol : attribute sep value *
Protocol is a value of the Cisco protocol attribute for a particular type of
authorization. Attribute and value are an appropriate AV pair defined in the
Cisco specification, and sep is = for mandatory attributes and the
asterisk (*) for optional attributes. This lets a full set of features available for
authorization to also be used for RADIUS.
For example, the following AV pair activates Cisco’s multiple named ip address
pools feature during IP authorization (during PPP’s IPCP address assignment):
cisco-avpair= ”ip:addr-pool=first“
The following example shows how to provide a user logging in from an access
point with immediate access to privileged EXEC commands:
cisco-avpair= ”shell:priv-lvl=15“
Other vendors have their own unique vendor IDs, options, and associated VSAs.
For more information about vendor IDs and VSAs, refer to RFC 2138, “Remote
Authentication Dial-In User Service (RADIUS).”
Beginning in privileged EXEC mode, follow these steps to configure the access
point to recognize and use VSAs:
1.
Enter global configuration mode.
configure terminal
2.
Enable the access point to recognize and use VSAs as defined by RADIUS
IETF attribute 26.
•
(Optional) Use the accounting keyword to limit the set of recognized
vendor-specific attributes to only accounting attributes.
•
(Optional) Use the authentication keyword to limit the set of
recognized vendor-specific attributes to only authentication attributes.
Содержание 1783-WAPAK9
Страница 240: ...240 Rockwell Automation Publication 1783 UM006A EN P May 2014 Chapter 6 Administering the WAP Access Notes...
Страница 300: ...300 Rockwell Automation Publication 1783 UM006A EN P May 2014 Chapter 8 Configuring Multiple SSIDs Notes...
Страница 440: ...440 Rockwell Automation Publication 1783 UM006A EN P May 2014 Chapter 14 Configuring RADIUS and TACACS Servers Notes...
Страница 456: ...456 Rockwell Automation Publication 1783 UM006A EN P May 2014 Chapter 15 Configuring VLANs...
Страница 476: ...476 Rockwell Automation Publication 1783 UM006A EN P May 2014 Chapter 16 Configuring QoS Notes...
Страница 482: ...482 Rockwell Automation Publication 1783 UM006A EN P May 2014 Chapter 17 Configuring Filters...
Страница 489: ...Rockwell Automation Publication 1783 UM006A EN P May 2014 489 Configuring Filters Chapter 17...
Страница 520: ...520 Rockwell Automation Publication 1783 UM006A EN P May 2014 Chapter 19 Configuring SNMP Notes...
Страница 572: ...572 Rockwell Automation Publication 1783 UM006A EN P May 2014 Chapter 21 Troubleshooting Notes...
Страница 578: ...578 Rockwell Automation Publication 1783 UM006A EN P May 2014 Appendix A Protocol Filters Notes...
Страница 594: ...594 Rockwell Automation Publication 1783 UM006A EN P May 2014 Appendix C Error and Event Messages Notes...
Страница 600: ...600 Rockwell Automation Publication 1783 UM006A EN P May 2014 Glossary Notes...
Страница 610: ...610 Rockwell Automation Publication 1783 UM006A EN P May 2014 Index Notes...
Страница 611: ......