HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 39
Configuring the IP addresses of the security policy servers, Displaying and maintaining RADIUS
View all HP 6125XLG manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 39 highlights
Step 3. Enable accounting-on. Command accounting-on enable [ interval seconds | send send-times ] * Remarks By default, the accounting-on feature is disabled. Configuring the IP addresses of the security policy servers The NAS verifies the validity of received control packets and accepts only control packets from known servers. To use a security policy server that is independent of the AAA servers, configure the IP address of the security policy server on the NAS. The security policy server is the management and control center of the HP EAD solution. To implement all EAD functions, configure both the IP address of the security policy server and that of the IMC Platform on the NAS. To configure the IP address of a security policy server for a scheme: Step 1. Enter system view. 2. Enter RADIUS scheme view. 3. Specify a security policy server. Command system-view Remarks N/A radius scheme radius-scheme-name N/A security-policy-server { ipv4-address | ipv6 ipv6-address } [ vpn-instance vpn-instance-name ] By default, no security policy server is specified for a scheme. You can specify up to eight security policy servers for a RADIUS scheme. Displaying and maintaining RADIUS Execute display commands in any view and reset commands in user view. Task Display the RADIUS scheme configuration. Display RADIUS packet statistics. Clear RADIUS statistics. Command display radius scheme [ radius-scheme-name ] display radius statistics reset radius statistics Configuring HWTACACS schemes Configuration task list Tasks at a glance (Required.) Creating an HWTACACS scheme (Required.) Specifying the HWTACACS authentication servers (Optional.) Specifying the HWTACACS authorization servers (Optional.) Specifying the HWTACACS accounting servers (Required.) Specifying the shared keys for secure HWTACACS communication 30