HP 6125G HP 6125G & 6125G/XG Blade Switches Security Configuration Gui - Page 40

Enabling the trap function for RADIUS, Enabling the RADIUS listening port of the RADIUS client

Page 40 highlights

NOTE: Whether interpretation of RADIUS class attribute as CAR parameters is supported depends on two factors: • Whether the switch supports CAR parameters assignment. • Whether the RADIUS server supports assigning CAR parameters through the class attribute. Enabling the trap function for RADIUS With the trap function, a NAS sends a trap message when either of the following events occurs: • The status of a RADIUS server changes. If a NAS receives no response to an accounting or authentication request before the specified maximum number of RADIUS request transmission attempts is exceeded, it considers the server unreachable, sets the status of the server to block and sends a trap message. If the NAS receives a response from a RADIUS server that it considers unreachable, the NAS considers that the RADIUS server is reachable again, sets the status of the server to active, and sends a trap message. • The ratio of the number of failed transmission attempts to the total number of authentication request transmission attempts reaches the threshold. This threshold ranges from 1% to 100% and defaults to 30%. This threshold can only be configured through the MIB. The failure ratio is generally small. If a trap message is triggered because the failure ratio is higher than the threshold, troubleshoot the configuration on and the communication between the NAS and the RADIUS server. To enable the trap function for RADIUS: Step 1. Enter system view. 2. Enable the trap function for RADIUS. Command system-view radius trap { accounting-server-down | authentication-error-threshold | authentication-server-down } Remarks N/A Disabled by default. Enabling the RADIUS listening port of the RADIUS client Only after you enable the RADIUS listening port of a RADIUS client, can the client receive and send RADIUS packets. If RADIUS is not required, disable the RADIUS listening port to avoid attacks that exploit RADIUS packets. To enable the RADIUS listening port of a RADIUS client: Step 1. Enter system view. 2. Enable the RADIUS listening port of a RADIUS client. Command system-view radius client enable Remarks N/A Optional. Enabled by default. Setting the DSCP value for RADIUS protocol packets An IP packet originally uses an eight-bit field to identify the service type, which is known as "Type of Service (ToS)" in IPv4 or "traffic class" in IPv6. RFC 2474 redefines the first six bits of the field as a differentiated services code point, called the DSCP field. Network devices use the DSCP value to determine the class of each packet for transmission. Different transmission priorities can be assigned to packet classes. 30

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285

30
NOTE:
Whether interpretation of RADIUS class attribute as CAR parameters is supported depends on two factors:
Whether the switch supports CAR parameters assignment.
Whether the RADIUS server supports assigning CAR parameters through the class attribute.
Enabling the trap function for RADIUS
With the trap function, a NAS sends a trap message when either of the following events occurs:
The status of a RADIUS server changes. If a NAS receives no response to an accounting or
authentication request before the specified maximum number of RADIUS request transmission
attempts is exceeded, it considers the server unreachable, sets the status of the server to
block
and
sends a trap message. If the NAS receives a response from a RADIUS server that it considers
unreachable, the NAS considers that the RADIUS server is reachable again, sets the status of the
server to
active
, and sends a trap message.
The ratio of the number of failed transmission attempts to the total number of authentication request
transmission attempts reaches the threshold. This threshold ranges from 1% to 100% and defaults to
30%. This threshold can only be configured through the MIB.
The failure ratio is generally small. If a trap message is triggered because the failure ratio is higher than
the threshold, troubleshoot the configuration on and the communication between the NAS and the
RADIUS server.
To enable the trap function for RADIUS:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enable the trap
function for RADIUS.
radius trap
{
accounting-server-down
|
authentication-error-threshold
|
authentication-server-down
}
Disabled by default.
Enabling the RADIUS listening port of the RADIUS client
Only after you enable the RADIUS listening port of a RADIUS client, can the client receive and send
RADIUS packets. If RADIUS is not required, disable the RADIUS listening port to avoid attacks that exploit
RADIUS packets.
To enable the RADIUS listening port of a RADIUS client:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enable the RADIUS listening
port of a RADIUS client.
radius client enable
Optional.
Enabled by default.
Setting the DSCP value for RADIUS protocol packets
An IP packet originally uses an eight-bit field to identify the service type, which is known as "Type of
Service (ToS)" in IPv4 or "traffic class" in IPv6. RFC 2474 redefines the first six bits of the field as a
differentiated services code point, called the DSCP field. Network devices use the DSCP value to
determine the class of each packet for transmission. Different transmission priorities can be assigned to
packet classes.