When EIA and third-party vendor equipment cooperate to perform authentication, in some special scenarios, EIA needs to deliver proprietary attributes supported by vendor equipment.
Example: A site uses a Cisco device to cooperate with EIA. It needs to issue a Class attribute in the authentication success message to Cisco device. After checking, this attribute is proprietary. It must use the EIA proprietary attributes distribution function to complete the requirement. The specific configuration is as follows:
1. Add proprietary attributes, fill in attribute name, attribute ID, attribute type, maximum length and description The attribute ID, attribute type and maximum length must be filled in according to the attribute information provided by the manufacturer. The attribute name and description can be filled in by themselves.
2. Add a proprietary attributes policy, which cite the proprietary attribute ‘class’ created above, and choose to deliver it through "Authentication Successful Packet" to carry specific attribute values in the packet.
3. Create an access service, call the created proprietary attributes policy, and then apply for the service with the access account.
4. Add an access device and select the access device type as Cisco (General).
1. Before creating a proprietary attribute policy, you must obtain detailed Radius attribute descriptions of third-party devices from the equipment manufacturers.
2. The access device type must be the same as the device type which has been added proprietary attributes.
该案例对您是否有帮助:
您的评价:1
若您有关于案例的建议,请反馈:
No comments
✖
案例意见反馈
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作