44
3. Return to system view.
quit
N/A
4. (Optional.)
default ISP domain.
domain default enable
isp-name
By default, the default ISP domain is the
system-defined ISP domain
system
.
5. (Optional.) Specify an ISP
users that
nonexistent domains.
domain if-unknown
isp-domain-name
By default, no ISP domain is specified to
accommodate users that are assigned
to nonexistent domains.
Th
is feature is available in Release
1122P02 and later.
Configuring ISP domain attributes
In an ISP domain, you can configure the following attributes:
• Domain status—By placing the ISP domain in active or blocked state, you allow or deny
network service requests from users in the domain.
• Default authorization user profile—When a user passes authentication, it typically obtains an
authorization user profile from the local or remote server. If the user does not obtain any user
profile from the server, the device authorizes the default user profile of the ISP domain to the
user. The device will restrict the user behavior based on the profile.
An ISP domain attribute applies to all users in the domain.
To configure ISP domain attributes:
1. Enter system view.
N/A
2. Enter ISP domain view.
isp-name
N/A
3. Place the ISP domain in
active or blocked state.
state
{
active
|
block
}
By default, an ISP domain is in
active
state, and users in the
domain can request network
services.
4. Specify an authorization user
profile for authenticated
users in the ISP domain.
authorization-attribute
user-profile
profile-name
By default, no user profile is
specified.
The
user-profile
effect only on LAN users.
Configuring authentication methods for an ISP domain
Configuration prerequisites
Before configuring authentication methods, complete the following tasks:
1. Determine the access type or service type to be configured. With AAA, you can configure an
authentication method for each access type and service type.
2. Determine whether to configure the default authentication method for all access types or
service types. The default authentication method applies to all access users. However, the
method has a lower priority than the authentication method that is specified for an access type
or service type.
Configuration guidelines
When configuring authentication methods, follow these guidelines: