3Com Switch 8800 Advanced Software V5 Configuration Guide
888 CHAPTER 70: AAA, RADIUS AND HWTACACS CONFIGURATION
8 The HWTACACS server sends back the authorization response, indicating that the
user is authorized now.
9 Knowing that the user is now authorized, the HWTACACS client pushes the
configuration interface of the router or switch to the user.
10 The HWTACACS client sends a start-accounting request to the HWTACACS server.
11 The HWTACACS server sends back an accounting response, indicating that it has
received the start-accounting request.
12 When the user logs off, the HWTACACS client sends a stop-accounting request to
the HWTACACS server.
13 The HWTACACS server sends back a stop-accounting packet, indicating that the
stop-accounting request has been received.
Configuration Task
List
AAA configuration task list
RADIUS configuration task list
Task Remarks
“Creating an ISP Domain” on page 889 Required
“Configuring ISP Domain Attributes”
on page 890
Optional
“Configuring an AAA Authentication
Scheme for an ISP Domain” on page
890
Required
For local authentication, refer to “Configuring Local
User Attributes” on page 895.
For RADIUS authentication, refer to “Configuring
RADIUS” on page 897.
For HWTACACS authentication, refer to
“Configuring HWTACACS” on page 904
“Configuring an AAA Authorization
Scheme for an ISP Domain” on page
892
Optional
“Configuring an AAA Accounting
Scheme for an ISP Domain” on page
893
Optional
“Configuring Local User Attributes” on
page 895
Optional
“Tearing down User Connections
Forcibly” on page 897
Optional
Task Remarks
“Creating a RADIUS Scheme” on page 898 Required
“Specifying the RADIUS
Authentication/Authorization Servers” on
page 898
Required
“Configuring the RADIUS Accounting
Servers and Relevant Parameters” on page
899
Optional
“Setting the Shared Key for RADIUS
Packets” on page 900
Required