5-27
RADIUS Authentication, Authorization and Accounting
Configuring RADIUS Accounting
■
If access to a RADIUS server fails during a session, but after the client
has been authenticated, the switch continues to assume the server is
available to receive accounting data. Thus, if server access fails during
a session, it will not receive accounting data transmitted from the
switch.
Steps for Configuring RADIUS Accounting
1.
Configure the switch for accessing a RADIUS server.
You can configure a list of up to three RADIUS servers (one primary, two
backup). The switch operates on the assumption that a server can operate
in both accounting and authentication mode. (Refer to the documentation
for your RADIUS server application.)
•
Use the same
radius-server host
command that you would use to
configure RADIUS authentication. Refer to “2. Configure the Switch
To Access a RADIUS Server” on page 5-10.
•
Provide the following:
–
A RADIUS server IP address.
–
Optional—a UDP destination port for authentication requests.
Otherwise the switch assigns the default UDP port (1812; recom-
mended).
–
Optional—if you are also configuring the switch for RADIUS
authentication, and need a unique encryption key for use during
authentication sessions with the RADIUS server you are desig-
nating, configure a server-specific key. This key overrides the
global encryption key you can also configure on the switch, and
must match the encryption key used on the specified RADIUS
server. For more information, refer to the
key <
key-string
>
param-
eter on page 5-10. (Default: null)
2.
Configure accounting types and the controls for sending reports to the
RADIUS server.
•
Accounting types:
exec (page 5-26), network (page 5-25), or system
(page 5-26)
•
Trigger for sending accounting reports to a RADIUS server:
At
session start and stop or only at session stop
3.
(Optional) Configure session blocking and interim updating options
•
Updating:
Periodically update the accounting data for sessions-in-
progress
•
Suppress accounting:
Block the accounting session for any
unknown user with no username access to the switch
Содержание ProCurve 2510-24
Страница 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Страница 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Страница 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 316: ...8 Index ...
Страница 317: ......