446Configuring AAA for Network Users

Assigning Authorization Attributes

Authorization attributes can be assigned to users in the local database or on remote servers. The attributes, which include access control list (ACL) filters, VLAN membership, encryption type, session time-out period, and other session characteristics, let you control how and when users access the network. When a user or group is authenticated, the local database or RADIUS server passes the authorization attributes to WSS Software to characterize the user’s session.

The VLAN attribute is required. WSS Software can authorize a user to access the network only if the VLAN to place the user on is specified.

Table 32 on page 446 lists the authorization attributes supported by WSS Software. (For brief descriptions of all the RADIUS attributes and Nortel vendor-specific attributes supported by WSS Software, as well as the vendor ID and types for Nortel VSAs configured on a RADIUS server, see “Supported RADIUS Attributes,” on page 599.)

Table 32: Authentication Attributes for Local Users

Attribute

Description

Valid Values

encryption-typeType of encryption required for access by the client. Clients who attempt to use an unauthorized encryption method are rejected.

One of the following numbers that identifies an encryption algorithm:

1—AES_CCM (Advanced Encryption Standard using Counter with CBC-MAC)

2—Reserved

4—TKIP (Temporal Key Integrity Protocol)

8—WEP_104 (the default) (Wired-Equivalent Privacy protocol using 104 bits of key strength)

16—WEP_40 (Wired-Equivalent Privacy protocol using 40 bits of key strength)

32—NONE (no encryption)

64—Static WEP

 

 

In addition to these values, you can specify a sum of

 

 

them for a combination of allowed encryption types.

 

 

For example, to specify WEP_104 and WEP_40, use

 

 

24.

 

 

 

end-date

Date and time after which the

Date and time, in the following format:

 

user is no longer allowed to be

YY/MM/DD-HH:MM

 

on the network.

You can use end-datealone or with start-date. You

 

 

 

 

also can use start-date, end-date, or both in

 

 

conjunction with time-of-day.

 

 

 

320657-A

Page 446
Image 446
Nortel Networks 2300 manual Assigning Authorization Attributes, End-date