- Table of Contents
-
- 07-Security Configuration Guide
- 00-Preface
- 01-Security Overview
- 02-AAA Configuration
- 03-802.1X Configuration
- 04-MAC Authentication Configuration
- 05-Portal Configuration
- 06-Port Security Configuration
- 07-User Profile Configuration
- 08-Password Control Configuration
- 09-Public Key Configuration
- 10-PKI Configuration
- 11-SSH Configuration
- 12-SSL Configuration
- 13-SSL VPN Configuration
- 14-TCP Attack Protection Configuration
- 15-ARP Attack Protection Configuration
- 16-IPsec Configuration
- 17-ALG Configuration
- 18-Firewall Configuration
- 19-Session Management Configuration
- 20-Web Filtering Configuration
- 21-User Isolation Configuration
- 22-Source IP Address Verification Configuration
- 23-FIPS Configuration
- 24-Protocol Packet Rate Limit Configuration
- 25-Attack detection and protection configuration
- Related Documents
-
Title | Size | Download |
---|---|---|
07-User Profile Configuration | 88.62 KB |
User profile configuration task list
Performing configurations in user profile view
Displaying and maintaining user profile
Configuring a user profile
Overview
A user profile provides a configuration template to save predefined configurations, such as a Committed Access Rate (CAR) policy or a Quality of Service (QoS) policy.
The user profile implements service applications on a per-user basis. Every time a user accesses the device, the device automatically applies the configurations in the user profile that are associated only with this user.
User-based traffic policing is more flexible than interface-based traffic policing. In interface-based traffic policing, if a user moves between ports to access a device, you must remove the policy from the previous port, and then configure the same policy on the port being used to restrict user behaviors. The configuration task is tedious and error prone.
The user profile supports working with PPPoE, 802.1X authentication, MAC authentication, and portal authentication, and restricts authenticated users' behaviors as follows:
1. After the authentication server verifies a user, the server sends the device the name of the user profile associated with the user.
¡ If the profile is enabled, the device applies the configurations in the user profile, and allows user access based on all valid configurations.
¡ If the user profile is disabled, the device denies the user access.
2. After the user logs out, the device automatically disables the configurations in the user profile, and the restrictions on the user access are removed.
User profile configuration task list
Task |
Remarks |
Required. |
|
Required. |
|
Required. |
Creating a user profile
Before you create a user profile, complete the following tasks:
· Configure authentication parameters on the device.
· Perform configurations on the client, the device, and the authentication server. For example, configure the username, password, authentication scheme, domain, and bind the user profile with a user.
To create a user profile:
Step |
Command |
Remarks |
1. Enter system view. |
system-view |
N/A |
2. Create a user profile, and enter its view. |
user-profile profile-name |
You can use the command to enter the view of an existing user profile. |
Performing configurations in user profile view
After a user profile is created, perform configurations in user profile view. The configuration made in user profile view takes effect when the user profile is enabled and a user using the user profile goes online.
Supported configurations include QoS policies, WLAN configurations, and firewall configurations. The QoS policies applied in user profile view support only the remark, car, and filter actions.
For more information about QoS policies, see ACL and QoS Configuration Guide.
For more information about WLAN configuration, see WLAN Configuration Guide.
For more information about firewall configuration, see "Configuring firewall."
Enabling a user profile
Enable a user profile so that configurations in the profile can be applied by the device to restrict user behaviors. If the device detects that the user profile is disabled, the device denies the associated user, even if the user has been verified by the authentication server.
You can only edit or remove the configurations in a disabled user profile.
Disabling a user profile logs out the users that are using the user profile.
To enable a user profile:
Step |
Command |
Remarks |
1. Enter system view. |
system-view |
N/A |
2. Enable a user profile. |
user-profile profile-name enable |
A user profile is disabled by default. |
Displaying and maintaining user profile
Task |
Command |
Remarks |
Display information about all the created user profiles. |
display user-profile [ | { begin | exclude | include } regular-expression ] |
Available in any view. |