1-21
management of user attributes for the local users in the group. Currently, you can configure password
control attributes and authorization attributes for a user group.
By default, every newly added local user belongs to the user group of system and bears all attributes
of the group. User group system is automatically created by the device.
Follow these steps to configure the attributes for a user group:
To do… Use the command… Remarks
Enter system view system-view —
Create a user group and enter user
group view
user-group group-name Required
Configure the authorization
attributes for the user group
authorization-attribute { acl
acl-number | callback-number
callback-number | idle-cut minute |
level level | user-profile profile-name |
vlan vlan-id | work-directory
directory-name } *
Optional
By default, no
authorization
attribute is
configured for a
user group.
Tearing down User Connections Forcibly
Follow these steps to tear down user connections forcibly:
To do… Use the command… Remarks
Enter system view system-view —
Tear down AAA user
connections forcibly
cut connection { access-type
{ dot1x | mac-authentication }
| all | domain isp-name |
interface interface-type
interface-number | ip
ip-address | mac mac-address
| ucibindex ucib-index |
user-name user-name | vlan
vlan-id } [ slot slot-number ]
Required
Applies to only LAN access
user connections at present
Displaying and Maintaining AAA
To do… Use the command… Remarks
Display the configuration
information of a specified ISP
domain or all ISP domains
display domain [ isp-name ] Available in any view
Display information about
specified or all user connections
display connection [access-type
{ dot1x | mac-authentication } |
domain isp-name | interface
interface-type interface-number | ip
ip-address | mac mac-address |
ucibindex ucib-index | user-name
user-name | vlan vlan-id ] [ slot
slot-number ]
Available in any view