![H3C SR8800-F Скачать руководство пользователя страница 74](http://html2.mh-extra.com/html/h3c/sr8800-f/sr8800-f_configuration-manual_4025863074.webp)
58
Step Command
Remarks
3.
Specify the user address
type in the ISP domain.
user-address-type
{
ds-lite
|
ipv6
|
nat64
|
private-ds
|
private-ipv4
|
public-ds
|
public-ipv4
}
By default, no user address type is
specified.
Specifying the service type for users in an ISP domain
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter ISP domain view.
domain
isp-name
N/A
3.
Specify the service type for
users in the ISP domain.
service-type
{
hsi
|
stb
|
voip
}
By default, the service type is
hsi
.
Applying an ITA policy to users in an ISP domain
IMPORTANT:
This feature takes effect only on CSPEX cards.
The attribute allows the device to perform accounting at different charge rates for user data based on
destination addresses. The ITA policy assigned from an AAA server takes precedence over the ITA
policy in an ISP domain.
To apply an ITA policy to users in an ISP domain:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter ISP domain view.
domain
isp-name
N/A
3.
Apply an ITA policy to users
in the ISP domain.
ita-policy
policy-name
By default, no ITA policy is
applied.
Configuring authentication methods for an ISP domain
Restrictions and guidelines
When configuring authentication methods, follow these guidelines:
•
If the authentication method uses a RADIUS scheme and the authorization method does not
use a RADIUS scheme, AAA accepts only the authentication result from the RADIUS server.
The Access-Accept message from the RADIUS server also includes the authorization
information, but the device ignores the information.
•
If an HWTACACS scheme is specified, the device uses the entered username for role
authentication. If a RADIUS scheme is specified, the device uses the username
$enabn$
on
the RADIUS server for role authentication. The variable
n
represents a user role level. For more
information about user role authentication, see
Fundamentals Configuration Guide
.
When the primary authentication method is local, the following rules apply to the authentication of a
user:
•
The device uses the backup authentication methods in sequence only if local authentication is
invalid for one of the following reasons:
{
An exception occurs in the AAA process.
{
The user disconnects from the device.