1-29
To do…
Use the command…
Remarks
Set the real-time accounting
interval
timer realtime-accounting
minutes
Optional
12 minutes by default
z
The maximum number of retransmission attempts of RADIUS packets multiplied by the RADIUS
server response timeout period cannot be greater than 75. This product is also the upper limit of the
timeout time of different access modules.
z
For an access module, the maximum number of retransmission attempts multiplied by the RADIUS
server response timeout period must be smaller than the timeout time. Otherwise, stop-accounting
messages cannot be buffered, and the primary/secondary server switchover cannot take place.
For example, as the timeout time of voice access is 10 seconds, the product of the two parameters
cannot exceed 10 seconds; as the timeout time of Telnet access is 30 seconds, the product of the
two parameters cannot exceed 30 seconds. For detailed information about timeout time of a
specific access module, refer to the corresponding part in the
Access Volume.
z
To configure the maximum number of retransmission attempts of RADIUS packets, refer to the
command
retry
in the command manual.
Specifying a Security Policy Server
The core of the EAD solution is integration and cooperation, and the security policy server system is the
management and control center. As a collection of software, the security policy server system can run
on Windows and Linux to provide functions such as user management, security policy management,
security status assessment, security cooperation control, and security event audit.
This task allows you to configure the IP address of a security policy server. If the security policy server
and the RADIUS server reside on the same host, you can omit this task. When the device receives a
control packet from the security policy server, it checks whether the source IP address of the packet is
the IP address of the security policy server or RADIUS server. If not, the device considers the packet
invalid.
Follow these steps to specify a security policy server:
To do…
Use the command…
Remarks
Enter system view
system-view
—
Create a RADIUS
scheme and enter its
view
radius scheme
radius-scheme-name
Required
By default, no RADIUS scheme is
present.
Specify a security policy
server
security-policy-server
ip-address
Optional
Not specified by default
Содержание 4500G PWR 24-Port
Страница 200: ...1 5 ProviderB GigabitEthernet1 0 2 undo stp enable ProviderB GigabitEthernet1 0 2 bpdu tunnel dot1q stp ...
Страница 252: ...1 7 Clearing ARP entries from the ARP table may cause communication failures ...
Страница 362: ...i Table of Contents 1 Dual Stack Configuration 1 1 Dual Stack Overview 1 1 Configuring Dual Stack 1 1 ...
Страница 407: ...1 8 1 1 ms 1 ms 1 ms 1 1 6 1 2 1 ms 1 ms 1 ms 1 1 4 1 3 1 ms 1 ms 1 ms 1 1 2 2 Trace complete ...
Страница 786: ...1 16 3 In the case of PIM SM use the display current configuration command to check the BSR and RP information ...
Страница 1387: ...1 23 ...
Страница 1443: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 1720: ...ii Single Device Upgrade 3 4 IRF System Upgrade 3 5 ...