43
To do…
Use the command…
Remarks
2.
Create a NAS ID profile and
enter NAS ID profile view.
aaa nas-id profile
profile-name
Required.
3.
Configure a NAS ID-VLAN
binding.
nas-id
nas-identifier
bind vlan
vlan-id
Required.
By default, no NAS ID-VLAN
binding exists.
Configuring a switch as a RADIUS server
RADIUS server functions configuration task list
Task Remarks
Required
Required
Configuring a RADIUS user
Create a RADIUS user and configure a set of attributes for the user on a switch that serves as the
RADIUS server. The user attributes include the password, authorization attribute, expiration time, and
user description. After completing this task, the specified RADIUS user can use the username and
password for RADIUS authentication on the switch.
To configure a RADIUS user:
To do…
Use the command…
Remarks
1.
Enter system view.
system-view
—
2.
Create a RADIUS user and
enter RADIUS server user
view.
radius-server user
user-name
Required.
No RADIUS user exists by
default.
3.
Configure a password for
the RADIUS user.
password
[
cipher
|
simple
]
password
Optional.
By default, no password is
specified.
4.
Configure the authorization
attribute for the RADIUS
user.
authorization-attribute
{
acl
acl-number
|
vlan
vlan-id
} *
Optional.
Not
configured by default.
5.
Set the expiration time for
the RADIUS user.
expiration-date
time
Optional.
By default, no expiration
time is set, and the system
does not check users’
expiration time.
6.
Configure a description for
the RADIUS user
description
text
Optional.
Not configured by default.
Use the
authorization-attribute
command to specify an authorization ACL and authorized VLAN, which
is assigned by the RADIUS server to the RADIUS client (the NAS) after the RADIUS user passes
authentication. The NAS then uses the assigned ACL and VLAN to control user access. If the assigned
Содержание A5830 Series
Страница 207: ...199 Figure 62 SFTP client interface ...