In this section:
The
Since 3.1 release,
Since the RADIUS protocol does not provide a means to assign users to a group, the implementation currently hard codes every RADIUS authenticated user to the Administrator group.
The
To configure RADIUS authentication for
When a user is authenticated via RADIUS, the user is assigned to a group provided by the RADIUS server as part of the ACCESS_ACCEPT packet.
For
0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | Vendor-Id +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Vendor-Id (cont) | Vendor type | Vendor length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Attribute-Specific... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
The Vendor-Id is a SMI Network Management Private Enterprise Code of the vendor Sonus as specified in RFC 2865.
If the RADIUS server does not provide a group or provides a group name which is not present in the
The
radiusServer
and retryCriteria
parameters to radiusAuthentication
configuration object.When more than one RADIUS server is configured and RADIUS authentication is attempted, the server configured with the least priority value is tried first. If fallback is configured, the inverse priority order is followed to pick the next server for authentication. SBC allows a configurable number of retries and time-outs before retry.
Once the
retryTimer
) before resending the ACCESS_REQUEST. After a configurable number of failed attempts (retryCount
), the RADIUS server is marked as unavailable, or out of service (OOS) for a configured amount of time (oosDuration
), and the SBC includes statistics to check the status of a RADIUS server, as well as the time when an unavailable server automatically becomes available again. See "radiusAuthentication" statistic details at Show Table OAM or Show Status OAM pages.
To enable remote authentication:
Change to the Configuration mode:
> configure private
Execute the following command:
% set system admin <system name> localAuthenticationEnabled false externalAuthenticationEnabled true
To configure the remote RADIUS Server:
Logon to
Change to the Configuration mode:
> configure private
Execute the following command:
% set oam radiusAuthentication radiusServer <server name> mgmtInterfaceGroup <string> priority <#> radiusNasIp <x.x.x.x> radiusServerIp <x.x.x.x> radiusServerPort <#> radiusSharedSecret <8-128> state <disabled | enabled> retryCriteria oosDuration <# minutes> retryCount <#> retryTimer <# milliseconds>
Each SBC user is provided a private home directory for SFTP and files used by the CLI (refer to "Unique Home Directories" section on the page Managing SBC Core Users and Accounts). When using Radius authentication, users are only known to the Radius server and therefore do not have private home directories on the SBC. To create these home directories, you must also create Radius users on the SBC (refer to Local Authentication - CLI).
The supports all alphabetical, numeric, and special characters for setting the radiusSharedSecret
key.
The following characters in the key must be escaped while setting a radiusSharedSecret
for configuring a RADIUS server:
For example,
set oam radiusAuthentication radiusServer s1 radiusSharedSecret radiussecret#radiussecret radiusSharedSecret will get the value of radiussecret set oam radiusAuthentication radiusServer s1 radiusSharedSecret radiussecret\#radiussecret radiusSharedSecret will get the value of radiussecret#radiussecret set oam radiusAuthentication radiusServer s1 radiusSharedSecret "radiussecret#radiussecret" radiusSharedSecret will get the value of radiussecret#radiussecret set oam radiusAuthentication radiusServer s1 radiusSharedSecret "radiusradius radiusSharedSecret will get the value of radiusradius set oam radiusAuthentication radiusServer s1 radiusSharedSecret \"radiusradius radiusSharedSecret will get the value of "radiusradius set oam radiusAuthentication radiusServer s1 radiusSharedSecret radiusradius" radiusSharedSecret will get the value of radiusradius" set oam radiusAuthentication radiusServer s1 radiusSharedSecret "radiusradius" radiusSharedSecret will get the value of radiusradius set oam radiusAuthentication radiusServer s1 radiusSharedSecret radius"ra"dius radiusSharedSecret will get the value of radius"ra"dius set oam radiusAuthentication radiusServer s1 radiusSharedSecret "radius\"radius" radiusSharedSecret will get the value of radius"radius set oam radiusAuthentication radiusServer s1 radiusSharedSecret radius"radius radiusSharedSecret will get the value of radius"radius set oam radiusAuthentication radiusServer s1 radiusSharedSecret radius\\radius radiusSharedSecret will get the value of radius\radius
If the secret text used by the user is 38f@Rj382mjrG$2h25v@#5j283hc@5j2, the user can use one of the following rules to configure the secret key:
set oam radiusAuthentication radiusServer s1 radiusSharedSecret "38f@Rj382mjrG$2h25v@#5j283hc@5j2" radiusSharedSecret will get the value of 38f@Rj382mjrG$2h25v@#5j283hc@5j2 set oam radiusAuthentication radiusServer s1 radiusSharedSecret 38f@Rj382mjrG$2h25v@\#5j283hc@5j2 radiusSharedSecret will get the value of 38f@Rj382mjrG$2h25v@#5j283hc@5j2