[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
答复: a question about Management Authorization -01 document
> Li Chunxiu writes...
> > In the RADIUS NAS Management Authorization Draft,the added attribute
> > Management-Privilege-Level is an integer-valued attribute for use with
> > CLI access methods, I have a question about it, does it apply to the
> > Framed-Management-Protocol?
> The Management-Privilege-Level attribute was added to address a review
> comment and a long standing use case.
> In the -01 draft, we made it clear that the Management-Policy-Id attribute
> was to be a flat, simple name of local scope, and that the field was not
to
> be overloaded with other kinds of elements, all in the name of good
> interoperability. To address a need that might have tempted vendors to
> overload the Management-Policy-Id attribute and to provide a way to
> provision a long standing CLI management parameter, we added the new
> attribute.
> The use case is that of integer valued-privilege level for CLI usages, as
> exemplified by the "enable' levels in Cisco's IOS. This use is common in
> other vendor's products, as well.
> I don't see any reason that the Management-Privilege-Level attribute could
> not be made applicable to Framed-Management sessions, but I don't see any
> compelling reason for doing so. Having it available as a matter of
protocol
> symmetry might be nice, but is there actually a use case that it would
> support?
>
> > For example, in access control of SNMP protocol or Netconf protocol, is
> > it necessary to use the Management-Privilege-Level attribute?
>
> It seems to me that the named policy of Management-Policy-Id would be
> sufficient for uses such as SNMP or Netconf. Can you suggest a situation
> where it would be desirable to have an integer-valued parameter for
> provisioning access control via either of these methods?
>
Here is a situation:
1.NETCONF access, defined by a policy:
* Service-Type (6) = Framed-Management (xx)
* Framed-Management-Protocol (xx) = NETCONF(3)
* Management-Policy-Id (xx) = " Read-only group1"
2. NETCONF access, defined by a policy:
* Service-Type (6) = Framed-Management (xx)
* Framed-Management-Protocol (xx) = NETCONF(3)
* Management-Policy-Id (xx) = "group1 Read-only"
3. NETCONF access, defined by a policy, with the Management-Privilege-Level
attribute:
* Service-Type (6) = Framed-Management (xx)
* Framed-Management-Protocol (xx) = NETCONF(3)
* Management-Policy-Id (xx) = "group1 "
* Management-Privilege-Level (xx) = 15
Comment:15 denotes Read-only
16 denotes create ... ...
I think the 3rd example using the Management-Privilege-Level attribute
clarifies the use methods of Management-Privilege-Level attribute.
What is your opinion?
Regards,
Li chunxiu
--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>