3Com Switch 4200G Configuration Guide
RADIUS Configuration 179
■ If the configured authentication method is none or requires a password, the
command level that a user can access after login is determined by the level of the
user interface
Cutting Down User
Connections Forcibly
RADIUS Configuration The RADIUS protocol configuration is performed on a RADIUS scheme basis. In an
actual network environment, you can either use a single RADIUS server or two
RADIUS servers (primary and secondary servers with the same configuration but
different IP addresses) in a RADIUS scheme. After creating a new RADIUS scheme, you
should configure the IP address and UDP port number of each RADIUS server you
want to use in this scheme. These RADIUS servers fall into two types:
authentication/authorization, and accounting. And for each kind of server, you can
configure two servers in a RADIUS scheme: primary server and secondary server. A
RADIUS scheme has the following attributes: IP addresses of the primary and
secondary servers, shared keys, and types of the RADIUS servers.
In an actual network environment, you can configure the above parameters as
required. But you should configure at least one authentication/authorization server
and one accounting server, and at the same time, you should keep the RADIUS service
port settings on the switch consistent with those on the RADIUS servers.
Actually, the RADIUS protocol configuration only defines the parameters used for
information exchange between the switch and the RADIUS servers. To make these
parameters take effect, you must reference the RADIUS scheme configured with these
parameters in an ISP domain view. For specific configuration commands, refer to “AAA
Configuration”.
Creating a RADIUS
Scheme
The RADIUS protocol configuration is performed on a RADIUS scheme basis. You
should first create a RADIUS scheme and enter its view before performing other
RADIUS protocol configurations.
CAUTION: A RADIUS scheme can be referenced by multiple ISP domains
simultaneously.
Table 141 Cut down user connection forcibly
Operation Command Description
Enter system view system-view —
Cut down user connections
forcibly
cut connection { all | access-type
{ dot1x | mac-authentication } |
domain domain-name | interface
interface-type interface-number | ip
ip-address | mac mac-address |
radius-scheme radius-scheme-name |
vlan vlan-id | ucibindex ucib-index |
user-name user-name }
Required
Table 142 Create a RADIUS scheme
Operation Command Description
Enter system view system-view —
Create a RADIUS scheme and
enter its view
radius scheme
radius-scheme-name
Required
By default, a RADIUS scheme named
“system” has already been created
in the system.