Home > 3Com > Router > 3Com Router User Manual

3Com Router User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual 3Com Router User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 19 3Com manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 762
    							Configuring AAA and RADIUS537
    The pool-number ranges from 0 to 99. Addresses in each address pool must be 
    consecutive, and each address pool can have at most 256 addresses.
    Assigning an IP Address 
    for a PPP UserFor a user accessing the Internet through remote PPP dialing, the system either 
    specifies an address or allocates an unoccupied address selected from a local 
    address pool to the user.
    Perform the following configurations in interface view.
    Ta b l e 605   Assign IP Address for PPP User
    By default pool-number is 0. 
    Configuring a Local User 
    DatabaseWhen a user dials in to access the network, user information is looked up 
    according to the following steps in the local user database:
    1Information about the user is sought in the local database. If the information is 
    present, the login of the user is permitted.
    2If the user information is not in the local database and if the RADIUS server 
    authentication is configured, the user information is sent to the RADIUS server for 
    authentication. If authentication succeeds, the user can log on normally. 
    Otherwise, the user is rejected.
    3If the user information is not in the local database and the RADIUS server 
    authentication is not configured, the login of the user is rejected.
    Various configuration tasks conducted in the local user database can be nested or 
    combined and all local user databases can be configured in one command.
    Perform the following configurations in system view.
    Configure a User and Password
    The user and the local authentication password can be configured in the local 
    database
    Ta b l e 606   Configure Ordinary User and Password
    user-name can be a 1-32-bit character string or number. Password can be a 
    1-16-bit character string or number.
    Configure Callback User
    In the callback technique, first the client, on the user side, originates a call and 
    requires callback from the server. The server receives the call and decides whether 
    to call back.
    OperationCommand
    Assign IP address for PPP userremote address { ip-address | pool [ 
    pool-number ] }
    Cancel IP address of PPP userundo remote address
    OperationCommand
    Configure the user and passwordlocal-user user-name [ password { 
    simple | cipher } password ] ...
    Delete the userundo local-user user-name 
    						
    							538CHAPTER 38: CONFIGURING AAA AND RADIUS PROTOCOL
    The Callback technique enhances security. In the processing of a Callback, the 
    server calls the client according to the call number configured locally. This avoids 
    security risks caused by leakage of user name or password. The server can also 
    classify call-in requests according to its configuration as refuse call, accept call (no 
    call back) or accept callback. This serves to exert different limitations upon 
    different clients and take initiative in ensuring resource access when there are 
    incoming calls.
    The callback technique has the following advantages:
    ■Saves communication expenses, especially when the call charge rates of two 
    directions are different)
    ■Changes the call charge bearer
    ■Combines call charge lists
    The security devices in 3Com routers support the callback technique that is divided 
    into ISDN caller authentication callback and callback participated in by PPP.
    ISDN caller authentication callback does not involve PPP, it directly authenticates 
    whether the call-in number matches with the number configured by the server. 
    Hence, only the server end needs a corresponding configuration and the client 
    needs no modification.
    Ta b l e 607   Configure Callback User and the Callback Number
    A RADIUS server can be configured with callback-number, equivalent to number, 
    which is defined locally. If 
    aaa authentication-scheme ppp default radius is 
    configured then number, which is configured locally, is invalid and the number to 
    be transmitted to PPP will be decided by callback-number set on RADIUS server. If 
    aaa authentication-scheme ppp default radius local is configured, local 
    authentication is used only when the RADIUS server does not respond, and here 
    number defined locally can work. If 
    aaa authentication-scheme ppp default 
    none
     is configured, number defined locally does not work.
    Configure User with Caller Number
    After users with caller numbers are configured, the call-in caller numbers of users 
    calling in can be authenticated in order.   At present, only ISDN users can be 
    configured to be such type of users.
    Ta b l e 608   Configure User with Caller Number
    Configure FTP User and the Usable Directory
    An FTP user and the FTP directory available for the user can be configured in the 
    local database. The function is reserved temporarily for future extension.
    OperationCommand
    Configure the callback user and the 
    callback numberlocal-user user [ callback-number 
    number ] ...
    Delete the callback user and the callback 
    numberundo local-user user
    OperationCommand
    Configure a user with caller numberlocal-user user [ call-number number 
    ] [ :sub-number ] ...
    Delete a user with caller numberundo local-user user-name 
    						
    							Configuring AAA and RADIUS539
    Ta b l e 609   Configure FTP User and the Usable Directory
    Authorize a User with Usable Service Types 
    The services, which can be used by a user, are authorized in the local database. 
    Presently there are five service types, which are listed as follows:
    ■exec refers to operations that include logging in to the router and configuring 
    it via Telnet or other means (such as Console port, AUX port, X25PAD call, etc). 
    ■exec-administrator: Authorized “administrator” user can use EXEC. EXEC 
    refers to the operation of logging into the router by means of Telnet or through 
    console port, AUX port and X.25PAD.
    ■exec-guest: Authorized “guest” user can use EXEC.
    ■exec-operator: Authorized “operator” user can use EXEC.
    ■ftp refers to operations that include logon to the router via file transmission so 
    as to share corresponding services.
    ■ppp refers to remote dial-in service used by the user.
    When a single service is authorized to a user, it is only necessary to configure any 
    one of the parameters of 
    exec, ftp, and ppp after the service type. When 
    multiple services are authorized to a user, it is necessary to configure over 2 types 
    of the above-mentioned parameters, other than to use this command repeatedly, 
    because the new service type will overwrite the old one, not to pack the service 
    type.
    Ta b l e 610   Configure Authorizing a User with Usable Service Types
    By default users are authorized to use services of PPP type. 
    Configure RADIUS 
    ServerPerform the following configurations in system view.
    Configure IP Address, Authentication Port Number and Accounting Port 
    Number of the Server Host
    At most 3 RADIUS servers can be configured for a user.
    RADIUS follows the principles below to select authentication and accounting 
    server:
    ■Servers are used in the sequence in which they are configured.
    OperationCommand
    Configure an FTP user and the usable 
    directorylocal-user user [ ftp-directory 
    directory ] ...
    Delete an FTP user and the usable 
    directoryundo local-user user
    OperationCommand
    Configure authorizing a user with usable 
    serviceslocal-user user [ service-type { 
    exec-administrator | exec-guest | 
    exec-operator | ftp | ppp } ... ] ...
    Delete authorizing a user with usable 
    servicesundo local-user user-name 
    						
    							540CHAPTER 38: CONFIGURING AAA AND RADIUS PROTOCOL
    ■When the RADIUS server used first does not respond, the succeeding servers 
    are used in sequence.
    When the authentication or accounting port number is configured to 0, the client 
    does not use the authentication or accounting function provided by the server.
    Ta b l e 611   Configure IP Address, Authentication Port Number and Accounting Port 
    Number 
    The default authentication port number is 1812. When configured as 0, this server 
    is not used as an authentication server. The default accounting port number is 
    1813. When configured as 0, this server is not used as an accounting server.
    Configure RADIUS Server Shared Secret
    The shared secret is used to encrypt user password and generate a response 
    authenticator. When RADIUS sends authentication messages, MD5 encryption is 
    applied to important information such as passwords, so the security of the 
    authentication information transmission in the network can be insured. To insure 
    the identification validity of the two parties, the secret key of the router must be 
    the same as the one set on the RADIUS server, so that it can pass the 
    authentication of the RADIUS server. 
    Ta b l e 612   Configure RADIUS Server Shared Secret
    By default, no key is configured for the RADIUS server.
    Configure the Time Interval at Which the Request Packet is Sent Before the 
    RADIUS Server Fails
    To determine whether a RADIUS server is invalid, the router will send 
    authentication request packets to the RADIUS server periodically.
    Ta b l e 613   Configure the Time Interval at which the Request Packet is Sent Before RADIUS 
    Server Fails
    By default, the timeout interval is 10 seconds. The range is from 1 to 65535 
    seconds.
    OperationCommand
    Configure IP address (or host name), 
    authentication port number and 
    accounting port number of RADIUS server 
    host.radius server { hostname | ip-address 
    } [authentication-port port-number ] 
    [accounting-port port-number ]
    Cancel RADIUS server with designated 
    host address or host nameundo radius server { hostname | 
    ip-address }
    OperationCommand
    Configure shared secret of RADIUS serverradius shared-key string
    Delete shared secret of RADIUS serverundo radius shared-key
    OperationCommand
    Configure the time interval at which the 
    authentication request packet is sentradius timer response-timeout 
    seconds
    Restore default value of the time interval 
    at which the authentication request 
    packet is sentundo radius timer response-timeout 
    						
    							Configuring AAA and RADIUS541
    Configure the Request Retransmission Times 
    If the RADIUS server fails to respond, the router sends the authentication request 
    packet again periodically. If no RADIUS server response is received after the 
    configured value of timeout, the authentication request packet needs to be 
    transmitted again. The user can set the maximum number of times for the request 
    retransmission, when the number of request retransmission exceed it, the system 
    will consider the server fails to work normally and set it to dead.
    Ta b l e 614   Configure the Times of Request Retransmission 
    By default, the times of request retransmission are three and the number ranges 
    from 1 to 255.
    Configure the Time Interval at Which the Inquiry Packet is Sent 
    After the first RADIUS server breaks down (due to line failure between NAS and 
    the server or RADIUS process failure, the system sets this server to dead, and 
    periodically queries whether it can work normally or not. If the server is found to 
    work normally, then after the currently used server breaks down, the system will 
    automatically uses the first one.
    Ta b l e 615   Configure the Time Interval for the Inquiry Packet 
    By default, the inquiry packet is sent at intervals of 5 minutes after the RADIUS 
    server fails, and the interval ranges from 1 to 255 minutes.
    Configure the Time Interval at Which the Real-Time Accounting Packet is 
    Sent to the RADIUS Server
    After a user passes authentication, NAS sends the users real-time accounting 
    information to the RADIUS server periodically. If the real-time accounting request 
    fails, the user is handled according to the 
    aaa accounting-scheme optional 
    command. If the 
    aaa accounting-scheme optional command has been 
    configured, the user can continue to use the network services, otherwise, NAS 
    disconnects the user.
    Usually, the server sends the accounting packet only according to the access time 
    and disconnection time. But for higher reliability, the time interval at which the 
    real-time accounting packet is sent to the RADIUS server can be configured.
    Ta b l e 616   Configure the Time Interval
    OperationCommand
    Configure the times of request 
    retransmission radius retry times
    Restore default value of times of request 
    retransmissionundo radius retry
    OperationCommand
    Configure the time interval at which the 
    inquiry packet is sent after RADIUS server 
    breaks downradius timer quiet minutes
    Restore default value of time interval at 
    which the inquiry packet is sent undo radius timer quiet
    OperationCommand 
    						
    							542CHAPTER 38: CONFIGURING AAA AND RADIUS PROTOCOL
    By default, the real-time accounting packet is sent to the RADIUS server at an 
    interval of 0 minutes, indicating that real-time accounting is disabled. The interval 
    ranges from 0 to 32767 minutes.
    Displaying and 
    Debugging AAA and 
    RADIUSUse the debugging and display commands in all modes.
    Ta b l e 617   Display and debug AAA and RADIUS
    AAA and RADIUS 
    Configuration 
    Examples This section provides examples of using AAA and Radius within a network, with a 
    suggested procedure for each configuration
    Accessing User 
    Authentication Case 1The RADIUS server is used for authentication. 129.7.66.66 acts as the first 
    authentication and accounting server, and 129.7.66.67 as the second 
    authentication and accounting server, both using default authentication port 
    number 1812 and default accounting port number 1813.
    Configure the time interval at which the 
    real-time accounting packet is sent to 
    RADIUS serverradius timer 
    realtime-accounting-scheme minutes
    Restore default value of the time interval 
    at which the real-time accounting packet 
    is sentundo radius timer 
    realtime-accounting
    OperationCommand
    Display status of dial-in usersdisplay aaa user
    View local user databasedisplay user
    Enable RADIUS event debuggingdebugging radius event
    Enable RADIUS packet debuggingdebugging radius packet
    Enable RADIUS primitive language 
    debuggingdebugging radius primitive 
    						
    							AAA and RADIUS Configuration Examples 543
    Figure 169   Networking diagram of typical AAA and RADIUS configuration
    1Enable AAA and configure default authentication method list of PPP user.
    [Router]aaa-enable
    [Router]aaa authentication-scheme ppp default radius 
    2Configure IP address and port of RADIUS server.
    [Router]radius server 129.7.66.66 
    [Router]radius server 129.7.66.67 
    3Configure RADIUS server shared secret, retransmission times, and accounting 
    option
    [Router] radius shared-key this-is-my-secret
    [Router] radius retry 2
    [Router] aaa accounting-scheme optional
    [Router] radius timer response-timeout 5
    Accessing User 
    Authentication Case 2129.7.66.66 acts as the first authentication and accounting server, port numbers 
    being 1000 and 1001 respectively.
    129.7.66.67 acts as the second authentication and accounting server, port 
    numbers being 1812 and 1813 respectively.
    Authenticate by the local database first, and if there is no response, use the 
    RADIUS server.
    Charge all users in real time. The real-time accounting packet is sent at the interval 
    of 5 minutes.
    See Figure 169.
    1Enable AAA and configure default authentication method list of PPP user.
    [Router] aaa-enable
    [Router] aaa authentication-scheme ppp default radius
    2Configure local-first authentication
    [Router] aaa authentication-scheme local-first
    Router2 Router1
    ModemModemISDN\PSTN
    Network to
    be accessed lqz lst
    RADTUS authentication server
    129.7.66.66
    RADTUS accounting server
    129.7.66.67
    RADTUS authentication & accounting server
    129.7.66.68 
    						
    							544CHAPTER 38: CONFIGURING AAA AND RADIUS PROTOCOL
    3Configure RADIUS server
    [Router] radius server 129.7.66.66 authentication-port 1000 
    accounting-port 1001 
    [Router] radius server 129.7.66.67
    4Configure RADIUS server shared secret, retransmission times, and time length of 
    timeout timer
    [Router] radius shared-key this-is-my-secret
    [Router] radius retry 2
    5Configure real-time accounting with interval of 5 minutes
    [Router] radius timer realtime-accounting 5
    Authenticating an FTP 
    Use
    r
    The authentication server is 129.7.66.66, numbers of ports being 1812 and 1813.
    Authenticate and charge FTP users using RADIUS server first, and if there is no 
    response, do not authenticate or charge them.
    See Figure 169.
    1Enable AAA and configure default authentication method list of FTP user.
    [Router]aaa-enable
    [Router]aaa authentication-scheme login default radius none
    2Enable FTP server
    [Router]ftp-server enable
    3Configure user abc and authorize the user to use FTP service.
    [Router] local-user abc service-type ftp password simple hello
    4Configure RADIUS server IP address and port, using default port number
    [Router]radius server 129.7.66.66
    5Configure RADIUS server shared secret, retransmission times, timeout and RADIUS 
    server dead time.
    [Router] rad shared-key this-is-my-secret
    [Router] radius retry 4
    [Router] radius timer response-timeout 2
    [Router] radius timer quiet 1
    Troubleshooting AAA 
    and RADIUS Local user authentication is always rejected
    Follow the steps below.
    1Check whether correct password has been configured in local-user command.
    2Check whether the authorized service-type is correct.
    3When RADIUS server accounting is used, and the command aaa 
    accounting-scheme optional
     is not configured, check whether the RADIUS 
    server can be pinged through. Also check whether the address, port number and 
    key of RADIUS server configured on the router for accounting are identical with 
    those on the RADIUS server in use.
    4If the operation above does not work, use the radius server command to 
    reconfigure the RADIUS server. Because of the communication failure with the 
    RADIUS server mentioned. RADIUS server is considered by the system as  
    						
    							Troubleshooting AAA and RADIUS 545
    unavailable. Moreover as the radius timer quiet command has not been 
    configured (defaulted as 5 minutes), or a relative long dead-time has been 
    configured, the system does not know that the server has recovered. Use 
    undo 
    radius server
     command to delete the original RADIUS server, and reconfigure it 
    by 
    radius server command to activate the server immediately.
    5If none of the above operations work, check whether the RADIUS server has been 
    configured correctly, and whether the modification has been activated
    A users RADIUS authentication is always rejected
    Follow the steps below.
    1Check whether the user name, password and service type are set correctly on 
    RADIUS server.
    2Check whether the RADIUS server can be pinged through Check whether the 
    address, port number and key of RADIUS server configured on the router are 
    identical with those of the RADIUS server in use.
    3Use the radius server command to reconfigure the RADIUS server. Because of 
    the communication failure with the server, RADIUS server may be considered by 
    the system as unavailable by the system. And as the 
    radius timer quiet 
    command has not been configured (defaulted as 5 minutes), or a relative long 
    dead-time has been configured, the system does not know that the server has 
    recovered. Use 
    undo radius server command to delete the original RADIUS 
    server, and reconfigure it by 
    radius server command to activate the server 
    immediately.
    4Check whether the RADIUS server has been configured correctly, and whether the 
    modification made just now has been activated.
    A connected user cannot be seen in display aaa user
    Follow the steps below.:
    1Check whether AAA has been enabled.
    2Check whether the authentication methods contain none, because users using 
    none method will not be displayed in the command 
    display aaa user.
    No authentication is configured, yet users are still authenticated
    Follow the step below:
    1AAA has been enabled, and the default authentication method in AAA default 
    authentication method list is “local”. To disable the authentication, 
    aaa 
    authentication-scheme ppp default none
     should be configured. Meanwhile, it 
    should be noted that 
    undo aaa authentication-scheme ppp default can 
    delete the default method; it can only restore the local authentication. 
    						
    							546CHAPTER 38: CONFIGURING AAA AND RADIUS PROTOCOL 
    						
    All 3Com manuals Comments (0)

    Related Manuals for 3Com Router User Manual