No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

VRP3.10-53XX Version and VRP3.10-22XX Version of NE40&NE80 Connect RADIUS and Make Authority Authentication for Telnet Users and They are not Valid

Publication Date:  2012-07-27 Views:  33 Downloads:  0
Issue Description
      VRP3.10-53XX version and VRP3.10-22XX version of NE40/NE80 connect RADIUS and make authority authentication for telnet users. They are not valid.
Alarm Information
Null
Handling Process
      Operate the following process  in attribute dictionary of RADIUS server:
Add huawei VERNDOR ID in attribute dictionary
VENDOR Huawei 2011
Add ATTRIBUTE EXEC-Privilege 2   integer Huawei in No 26 attribute of attribute dictionary.
When configuring TELNET users on the server, designate service-type as login, login-service as telnet and EXEC-Privilege as 3 (or other value).
Root Cause
1. Collect debug information on S8016 and it is as follows:
*3/20/2006 10:25:11-AAA-2-[M17]:receive radius packet from
219.150.172.251:1812
  code=2 id=165 length=38
    c7 73 7c f9 d2 d0 2f 0
    2f a0 58 da ee dc 13 14
    attribute(26)(Vendor-Specific): 0x0 0x0 0x7 0xdb 0x1d 0x6  0x0 0x0 0x0
0x3
    attribute(28)(Idle-TimeOut): 0x12c .
2. Level 3 in RFC standards of radius is attribute of high level, but default  of S8016 in ascending order is 0-2.
      
Suggestions
Null

END