3com S7906E Instruccion De Instalación

Descargar
Página de 2621
 
1-32 
To do… 
Use the command… 
Remarks 
Enter system view 
system-view 
— 
Enter RADIUS scheme view 
radius scheme 
radius-scheme-name 
— 
Set the RADIUS server 
response timeout timer 
timer response-timeout 
seconds 
Optional 
3 seconds by default 
Set the quiet timer for the 
primary server 
timer quiet minutes 
Optional 
5 minutes by default 
Set the real-time accounting 
interval 
timer realtime-accounting 
minutes 
Optional 
12 minutes by default 
 
 
The maximum number of retransmission attempts of RADIUS packets multiplied by the RADIUS 
server response timeout period cannot be greater than 75. This product is also the upper limit of the 
timeout time of different access modules.  
For an access module, the maximum number of retransmission attempts multiplied by the RADIUS 
server response timeout period must be smaller than the timeout time. Otherwise, stop-accounting 
messages cannot be buffered, and the primary/secondary server switchover cannot take place. 
For example, as the timeout time of voice access is 10 seconds, the product of the two parameters 
cannot exceed 10 seconds; as the timeout time of Telnet access is 30 seconds, the product of the 
two parameters cannot exceed 30 seconds. For detailed information about timeout time of a 
specific access module, refer to the corresponding part in the Access Volume. 
To configure the maximum number of retransmission attempts of RADIUS packets, refer to the 
command retry in the command manual. 
 
Specifying a Security Policy Server 
The core of the EAD solution is integration and cooperation, and the security policy server system is the 
management and control center. As a collection of software, the security policy server system can run 
on Windows and Linux to provide functions such as user management, security policy management, 
security status assessment, security cooperation control, and security event audit. 
This task allows you to configure the IP address of a security policy server. If the security policy server 
and the RADIUS server reside on the same host, you can omit this task. When the device receives a 
control packet from the security policy server, it checks whether the source IP address of the packet is 
the IP address of the security policy server or RADIUS server. If not, the device considers the packet 
invalid. 
Follow these steps to specify a security policy server: 
To do… 
Use the command… 
Remarks 
Enter system view 
system-view 
— 
Enter RADIUS scheme view 
radius scheme 
radius-scheme-name 
—