HP A 5120 Manual
Here you can view all the pages of manual HP A 5120 Manual. The HP manuals for Switch are available online for free. You can easily download all the documents as PDF.
Page 21
11 from the clients within the management range. A shared key is used to ensure secure communication between a RADIUS client and the RADIUS server. RADIUS authentication and authorization. RADIUS accounting is not supported. Upon receiving a RADIUS packet, a device working as the RADIUS server checks whether the sending client is under its management. If yes, it verifies the packet validity by using the shared key, checks whether there is an account with the...
Page 22
12 No. Attribute Description 12 Framed-MTU Maximum transmission unit (MTU) for the data link between the user and NAS. For example, with 802.1X EAP authentication, NAS uses this attribute to notify the server of the MTU for EAP packets, so as to avoid oversized EAP packets. 14 Login-IP-Host IP address of the NAS interface that the user accesses. 15 Login-Service Type of the service that the user uses for login. 18 Reply-Message Text to be displayed to the user, which can be used by the server to...
Page 23
13 No. Attribute Description 80 Message- Authenticator Used for authentication and checking of authentication packets to prevent spoofing Access-Requests. This attribute is used when RADIUS supports EAP authentication. 87 NAS-Port-Id String for describing the port of the NAS that is authenticating the user. HP proprietary RADIUS sub-attributes No. Sub-attribute Description 1 Input-Peak-Rate Peak rate in the direction from the user to the NAS, in bps. 2 Input-Average-Rate Average rate in the...
Page 24
14 No. Sub-attribute Description 62 User_HeartBeat Hash value assigned after an 802.1X user passes authentication, which is a 32-byte string. This attribute is stored in the user list on the device and is used for verifying the handshake messages from the 802.1X user. This attribute exists in only Access-Accept and Accounting-Request packets. 140 User_Group User groups assigned after the SSL VPN user passes authentication. A user may belong to more than one user group. In this case, the user...
Page 25
15 Figure 9 AAA configuration diagram Table 4 AAA configuration task list Task Remarks Configuring AAA schemes Configuring local users Required Complete at least one task. Configuring RADIUS schemes Configuring HWTACACS schemes Configuring AAA methods for ISP domains Creating an ISP domain Required Configuring ISP domain attributes Optional Configuring AAA authentication methods for an ISP domain Required Complete at least one task. Configuring AAA authorization methods for an ISP...
Page 26
16 Configuring AAA schemes Configuring local users For local authentication, you must create local users and configure user attributes on the device in advance. The local users and attributes are stored in the local user database on the device. A local user is uniquely identified by a username. Configurable local user attributes are as follows: Service type Types of services that the user can use. Local authentication checks the service types of a local user....
Page 27
17 You can configure an authorization attribute in user group view or local user view, making the attribute effective for all local users in the group or only for the local user. The setting of an authorization attribute in local user view takes precedence over that in user group view. Local user configuration task list Task Remarks Configuring local user attributes Required Configuring user group attributes Optional Displaying and maintaining local users and local user groups...
Page 28
18 To do… Use the command… Remarks Configure the password composition policy password-control composition type-number type-number [ type-length type-length ] Optional By default, the setting for the user group is used. If there is no such setting for the user group, the global setting is used. Specify the service types for the local user service-type { ftp | lan-access | { ssh | telnet | terminal } * | portal } Required By default, no service is authorized to a local user. Configure...
Page 29
19 NOTE: For more information about password control attribute commands, see the chapter “Password control configuration.” On a device supporting the password control feature, local user passwords are not displayed, and the local-user password-display-mode command is not effective. With the local-user password-display-mode cipher-force command configured, a local user password is always displayed in cipher text, regardless of the configuration of the password command. In this case, if you...
Page 30
20 To do… Use the command… Remarks Configure the authorization attributes for the user group authorization-attribute { acl acl- number | callback-number callback-number | idle-cut minute | level level | user-profile profile-name | vlan vlan-id | work-directory directory-name } * Optional By default, no authorization attribute is configured for a user group. Displaying and maintaining local users and local user groups To do… Use the command… Remarks Display local user information...