1-32To do… Use the command… RemarksEnter system view system-view —Enter RADIUS scheme view radius schemeradius-scheme-name —Set the RADIUS serverresponse timeout timertimer response-timeoutsecondsOptional3 seconds by defaultSet the quiet timer for theprimary server timer quiet minutes Optional5 minutes by defaultSet the real-time accountingintervaltimer realtime-accountingminutesOptional12 minutes by defaultz The maximum number of retransmission attempts of RADIUS packets multiplied by the RADIUSserver response timeout period cannot be greater than 75. This product is also the upper limit of thetimeout time of different access modules.z For an access module, the maximum number of retransmission attempts multiplied by the RADIUSserver response timeout period must be smaller than the timeout time. Otherwise, stop-accountingmessages cannot be buffered, and the primary/secondary server switchover cannot take place.For example, as the timeout time of voice access is 10 seconds, the product of the two parameterscannot exceed 10 seconds; as the timeout time of Telnet access is 30 seconds, the product of thetwo parameters cannot exceed 30 seconds. For detailed information about timeout time of aspecific access module, refer to the corresponding part in the Access Volume.z To configure the maximum number of retransmission attempts of RADIUS packets, refer to thecommand retry in the command manual.Specifying a Security Policy ServerThe core of the EAD solution is integration and cooperation, and the security policy server system is themanagement and control center. As a collection of software, the security policy server system can runon Windows and Linux to provide functions such as user management, security policy management,security status assessment, security cooperation control, and security event audit.This task allows you to configure the IP address of a security policy server. If the security policy serverand the RADIUS server reside on the same host, you can omit this task. When the device receives acontrol packet from the security policy server, it checks whether the source IP address of the packet isthe IP address of the security policy server or RADIUS server. If not, the device considers the packetinvalid.Follow these steps to specify a security policy server:To do… Use the command… RemarksEnter system view system-view —Enter RADIUS scheme view radius schemeradius-scheme-name —