18
Tasks at a glance
(Optional.)
Configuring AAA schemes
This section includes information on configuring local users, RADIUS schemes, HWTACACS
schemes, and LDAP schemes.
Configuring local users
To implement local authentication, authorization, and accounting, create local users and configure
user attributes on the device. The local users and attributes are stored in the local user database on
the device. A local user is uniquely identified by the combination of a username and a user type.
Local users are classified into the following types:
•
Device management user
—User who logs in to the device for device management.
•
Network access user
—User who accesses network resources through the device.
The following shows the configurable local user attributes:
•
Service
type
—Services that the user can use. Local authentication checks the service types of
a local user. If none of the service types is available, the user cannot pass authentication.
Service types include FTP, HTTP, HTTPS, LAN access, portal, SSH, Telnet, and terminal.
•
User
state
—There are two user states: active and blocked. A user in active state can request
network services. A user in blocked state cannot request authentication, authorization, and
accounting services, but it can request to stop the accounting service in use.
•
Upper limit of concurrent logins using the same user name
—Maximum number of users
who can concurrently access the device by using the same user name. When the number
reaches the upper limit, no more local users can access the device by using the user name.
•
User
group
—Each local user belongs to a local user group and has all attributes of the group.
The attributes include the password control attributes and authorization attributes. For more
information about local user group, see "
Configuring user group attributes
•
Binding
attributes
—Binding attributes control the scope of users, and are checked during
local authentication of a user. If the attributes of a user do not match the binding attributes
configured for the local user account, the user cannot pass authentication. Binding attributes
include the IP address, access port, MAC address, and native VLAN. For support and usage
information about binding attributes, see "
Configuring local user attributes
•
Authorization
attributes
—Authorization attributes are assigned to a user after the user
passes local authentication. For support information about authorization attributes, see
"
Configuring local user attributes
Configure the authorization attributes based on the service type of local users.
You can configure an authorization attribute in user group view or local user view. The setting of
an authorization attribute in local user view takes precedence over the attribute setting in user
group view.
{
The attribute configured in user group view takes effect on all local users in the user group.
{
The attribute configured in local user view takes effect only on the local user.
•
Password control attributes
—Password control attributes help control password security for
device management users. Password control attributes include password aging time, minimum
password length, password composition checking, password complexity checking, and login
attempt limit.
You can configure a password control attribute in system view, user group view, or local user
view. A password control attribute with a smaller effective range has a higher priority. For more