27
RADIUS scheme configuration task list
Task Remarks
Creating a RADIUS scheme
Required.
Specifying the RADIUS authentication/authorization servers
Required.
Specifying the RADIUS accounting servers and the relevant parameters
Optional.
Specifying the shared keys for secure RADIUS communication
Optional.
Specifying a VPN for the RADIUS scheme
Optional.
Setting the username format and traffic statistics units
Optional.
Setting the supported RADIUS server type
Optional.
Setting the maximum number of RADIUS request transmission attempts
Optional.
Setting the status of RADIUS servers
Optional.
Specifying the source IP address for outgoing RADIUS packets
Optional.
Setting RADIUS timers
Optional.
Configuring RADIUS accounting-on
Optional.
Configuring the IP address of the security policy server
Optional.
Configuring interpretation of the RADIUS class attribute as CAR parameters
Optional.
Enabling the trap function for RADIUS
Optional.
Enabling the RADIUS client service
Optional.
Displaying and maintaining RADIUS
Optional.
Creating a RADIUS scheme
Before you perform other RADIUS configurations, first create a RADIUS scheme and enter RADIUS
scheme view. A RADIUS scheme can be referenced by multiple ISP domains at the same time.
To create a RADIUS scheme and enter RADIUS scheme view:
Step Command Remarks
1. Enter system view.
system-view
N/A
2. Create a RADIUS scheme
and enter RADIUS scheme
view.
radius scheme
radius-scheme-name
By default, no RADIUS scheme is
created.
Specifying the RADIUS authentication/authorization servers
In RADIUS, user authorization information is piggybacked in authentication responses sent to
RADIUS clients. It is neither allowed nor needed to specify a separate RADIUS authorization server.
You can specify one primary authentication/authorization server and up to 16 secondary
authentication/authorization servers for a RADIUS scheme. When the primary server is not available,
a secondary server is used. In a scenario where redundancy is not required, specify only the primary
server.
A RADIUS authentication/authorization server can function as the primary
authentication/authorization server for one scheme and a secondary authentication/authorization
server for another scheme at the same time.