F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices Access Control Configuration Guide-6PW100
228
authorization information to users after successful authorization. Authorization method configuration is
optional in AAA configuration.
AAA supports the following authorization methods:
• No authorization (none)—The NAS performs no authorization exchange. After passing
authentication, non-login users can access the network, FTP users can access the root directory of
the NAS, and other login users have Level 0 (visiting) access. Support for AUX logins depends on
the device model. For more information, see Getting Started Guide.
• Local authorization (local)—The NAS performs authorization according to the user attributes
configured for users.
• Remote authorization (scheme)—The NAS cooperates with a RADIUS or HWTACACS server to
authorize users. RADIUS authorization is bound with RADIUS authentication. RADIUS authorization
can work only after RADIUS authentication is successful, and the authorization information is
carried in the Access-Accept message. HWTACACS authorization is separate from HWTACACS
authentication, and the authorization information is carried in the authorization response after
successful authentication. You can configure local authorization or no authorization as the backup
method. The backup method will be used when the remote server is not available.
Before configuring authorization methods, complete the following tasks:
• For HWTACACS authorization, configure the HWTACACS scheme to be referenced first. For
RADIUS authorization, the RADIUS authorization scheme must be the same as the RADIUS
authentication scheme. Otherwise, it does not take effect.
• Determine the access type or service type to be configured. With AAA, you can configure an
authorization scheme for each access type and service type to limit the authorization protocols that
can be used for access.
• Determine whether to configure an authorization method for all access types or service types.
When configuring authorization methods, follow these guidelines:
• To configure RADIUS authorization, you must also configure RADIUS authentication, and reference
the same RADIUS scheme for RADIUS authentication and authorization. If the RADIUS
authorization configuration is invalid or RADIUS authorization fails, the RADIUS authentication also
fails. If RADIUS authorization fails, the server sends an error message to the NAS, indicating that
the server itself is not responding.
• You can configure a default authorization method for an ISP domain. This method will be used for
all users who support the authentication method and have no specific authorization method
configured.
• You can configure local authorization (local) or no authorization (none) as the backup for remote
authorization that is used when the remote authorization server is unavailable.
• Local authorization (local) and no authorization (none) cannot have a backup method.
To configure authorization methods for an ISP domain:
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Enter ISP domain view. domain isp-name N/A
3. Specify the default
authorization method for
all types of users.
authorization default { hwtacacs-scheme
hwtacacs-scheme-name [ local ] | local |
none | radius-scheme radius-scheme-name
[ local ] }
Optional.
The default authorization
method is local for all types of
users.