User guide
E
XTREME
W
ARE
S
OFTWARE
U
SER
G
UIDE
3-17
A
UTHENTICATING
U
SERS
files. The client configuration file (
ClientCfg.txt
) defines the authorized source
machine, source name, and access level. The user configuration file (
users
) defines
username, password, and service type information.
ClientCfg.txt
#Client Name Key [type] [version] [prefix]
#---------------- --------------- -------------- --------- --------
#10.1.2.3:256 test type = nas v2 pfx
#pm1 %^$%#*(&!(*&)+ type=nas pm1.
#pm2 :-):-(;^):-}! type nas pm2.
#merit.edu/homeless hmoemreilte.ses
#homeless testing type proxy v1
#xyz.merit.edu moretesting type=Ascend:NAS v1
#anyoldthing:1234 whoknows? type=NAS+RAD_RFC+ACCT_RFC
10.202.1.3 andrew-linux type=nas
10.203.1.41 eric type=nas
10.203.1.42 eric type=nas
10.0.52.14 samf type=nas
users
user Password = ""
Filter-Id = "unlim"
admin Password = "", Service-Type = Administrative
Filter-Id = "unlim"
eric Password = "", Service-Type = Administrative
Filter-Id = "unlim"
albert Password = "password", Service-Type = Administrative
Filter-Id = "unlim"
samuel Password = "password", Service-Type = Administrative
Filter-Id = "unlim"
RADIUS P
ER
-C
OMMAND
C
ONFIGURATION
E
XAMPLE
Building on the example configuration above, you can use RADIUS to perform
per-command authentication to differentiate user capabilities. To do so, use the
Extreme-modified RADIUS Merit software that is available from the Extreme Networks
web server at http://www.extremenetworks.com/extreme/support/otherapps.htm or
by contacting Extreme Networks technical support. The software is available in