When EIA and third-party vendor equipment cooperate to perform authentication, in some special scenarios, EIA needs to deliver proprietary attributes supported by vendor equipment.
Example: A site uses a Cisco device to cooperate with EIA. It needs to issue a Class attribute in the authentication success message to Cisco device. After checking, this attribute is proprietary. It must use the EIA proprietary attributes distribution function to complete the requirement. The specific configuration is as follows:
1. Add proprietary attributes, fill in attribute name, attribute ID, attribute type, maximum length and description The attribute ID, attribute type and maximum length must be filled in according to the attribute information provided by the manufacturer. The attribute name and description can be filled in by themselves.
2. Add a proprietary attributes policy, which cite the proprietary attribute ‘class’ created above, and choose to deliver it through "Authentication Successful Packet" to carry specific attribute values in the packet.
3. Create an access service, call the created proprietary attributes policy, and then apply for the service with the access account.
4. Add an access device and select the access device type as Cisco (General).
1. Before creating a proprietary attribute policy, you must obtain detailed Radius attribute descriptions of third-party devices from the equipment manufacturers.
2. The access device type must be the same as the device type which has been added proprietary attributes.