397
Configuring a user profile
Overview
A user profile provides a configuration template to save predefined configurations, such as a Quality
of Service (QoS) policy. Different user profiles are applicable to different application scenarios.
The user profile implements service applications on a per-user basis. Every time a user accesses the
device, the device automatically applies the configurations in the user profile that is associated only
with this user.
User-based traffic policing is more flexible than interface-based traffic policing. In interface-based
traffic policing, if a user moves between ports to access a device, you must remove the policy from
the previous port and then configure the same policy on the port being used to restrict user behaviors.
The configuration task is tedious and error prone.
The user profile supports working with PPPoE, 802.1X and portal authentications and restricts
authenticated users' behaviors as follows:
1. After the authentication server verifies a user, the server sends the device the name of the user
profile associated with the user.
{ If the profile is enabled, the device applies the configurations in the user profile, and allows
user access based on all valid configurations.
{ If the user profile is disabled, the device denies the user access.
2. After the user logs out, the device automatically disables the configurations in the user profile,
and the restrictions on the user access are removed.
Configuration restrictions and guidelines
When you configure a user profile, follow these restrictions and guidelines:
• The QoS policies applied in user profile view support only the remark, car, and filter actions.
• MSR routers support only portal authentication for user profiles.
User profile configuration task list
Task Remarks
Creating a user profile
Required.
Performing configurations in user profile view
Required.
Enabling a user profile
Required.
Creating a user profile
Before you create a user profile, complete the following tasks:
• Configure authentication parameters on the device.
• Perform configurations on the client, the device, and the authentication server, for example,
username, password, authentication scheme, domain, and binding a user profile with a user.
To create a user profile: