RADIUS proxy authentication is configured on a BRAS to forward RADIUS packets between a RADIUS client and a RADIUS server to authenticate user information
If there is more than one authentication or accounting server in a RADIUS server group, you can configure a RADIUS server selection algorithm to implement load balancing or master/backup for these servers.
The RADIUS attributes supported by a Huawei device and a RADIUS server may be different. Python scripts can be loaded to implement flexible interoperation of RADIUS attributes.
You can configure the Class attribute to carry or not to carry the committed access rate (CAR) value to ensure the communication between the NetEngine 8000 F and RADIUS servers from different vendors.
When the NetEngine 8000 F connects to multiple RADIUS servers, you can configure the source interface of each RADIUS server on the NetEngine 8000 F to identify the route between the NetEngine 8000 F and each RADIUS server.
If you do not want to use the default extended source interface to send and receive RADIUS packets, you can change the default extended source interface of a RADIUS server.
This section describes how to configure formats for the RADIUS attribute Calling-Station-Id (31) to adapt to different vendors' devices and different RADIUS servers.
To prevent RADIUS packets sent by the NetEngine 8000 F from being discarded in the case of network congestion, you can set DSCP values for the RADIUS packets.
A BRAS can be configured to use an IPv6 address pool delivered by a RADIUS server using the Framed-Ipv6-Pool attribute and IPv6 address pools configured in the domain to assign IPv6 addresses to users.
You can configure CAR for whitelisted RADIUS sessions to limit the rate at which packets of the whitelisted RADIUS sessions are sent to the RADIUS server. This configuration prevents non-whitelisted RADIUS sessions from preempting bandwidth if the RADIUS server encounters a traffic burst.