Security | 92779 RADIUS_EAP_MSG80 RADIUS_MSG_AUTHENTICATOR81 RADIUS_TUNNEL_PRIVATE_GROUP_ID95 NAS_IPv6_ADDRESSRADIUS exec-authorization stores a user-shell profile and that is applied during user login. You may namethe relevant named-lists with either a unique name or the default name. When authorization is enabled bythe RADIUS server, the server returns the following information to the client:• Idle time• ACL configuration information• Auto-command• Privilege levelAfter gaining authorization for the first time, you may configure these attributes.Idle TimeEvery session line has its own idle-time. If the idle-time value is not changed, the default value of 30minutes is used. RADIUS specifies idle-time allow for a user during a session before timeout. When a userlogs in, the lower of the two idle-time values (configured or default) is used. The idle-time value is updatedif both of the following happens:• The administrator changes the idle-time of the line on which the user has logged in• The idle-time is lower than the RADIUS-returned idle-timeACLThe RADIUS server can specify an ACL. If an ACL is configured on the RADIUS server, and if that ACLis present, user may be allowed access based on that ACL. If the ACL is absent, authorization fails, and amessage is logged indicating the this.RADIUS can specify an ACL for the user if both of the following are true:• If an ACL is absent• There is a very long delay for an entry, or a denied entry because of an ACL, and a message is loggedNote: RADIUS authentication/authorization is done for every login. There is no difference betweenfirst-time login and subsequent logins.Note: The ACL name must be a string. Only standard ACLs in authorization (both RADIUS and TACACS)are supported. Authorization is denied in cases using Extended ACLs.