6-53
RADIUS Authentication, Authorization, and Accounting
Accounting Services
Configuring RADIUS Accounting
N o t e
This section assumes you have already:
■
Configured RADIUS authentication on the switch for one or more
access methods
■
Configured one or more RADIUS servers to support the switch
If you have not already done so, refer to “General RADIUS Setup Procedure”
in the “RADIUS Authentication and Accounting” chapter of the
Access Secu-
rity Guide
for your switch.
Steps for Configuring RADIUS Accounting
1.
Configure the switch for accessing a RADIUS server.
You can configure a list of up to three RADIUS servers (one primary, two
backup). The switch operates on the assumption that a server can operate
in both accounting and authentication mode. (Refer to the documentation
for your RADIUS server application.)
•
Use the same
radius-server host
command that you would use to
configure RADIUS authentication. Refer to “1. Configure the Switch
To Access a RADIUS Server” on page 6-54.
RADIUS Accounting Commands
Page
[no] radius-server host <
ip-address
>
[acct-port <
port-number
>]
[key <
key-string
>]
[no] aaa accounting < exec | network | system > < start-stop | stop-only> radius
[no] aaa accounting commands < stop-only | interim-update > radius
aaa accounting session-id < unique | common >
[no] aaa accounting update
periodic < 1 - 525600 > (
in minutes
)
[no] aaa accounting suppress null-username
show accounting
show accounting sessions
show radius accounting
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......