44Step Command Remarks6. Specify the accountingmethod for login users.accounting login { hwtacacs-schemehwtacacs-scheme-name [ radius-schemeradius-scheme-name ] [ local ] [ none ] |local [ none ] | none | radius-schemeradius-scheme-name [ hwtacacs-schemehwtacacs-scheme-name ] [ local ] [ none ] }By default, the defaultaccounting method is usedfor login users.The none keyword is notsupported in FIPS mode.Enabling the session-control featureA RADIUS server running on IMC can send a dynamic authorization change request or a disconnectrequest by using a session-control packet. This task enables the device to receive RADIUS session-controlpackets on UDP port 1812.To enable the session-control feature:Step Command Remarks1. Enter system view. system-view N/A2. Enable the session-controlfeature. radius session-control enable By default, the session-controlfeature is disabled.Displaying and maintaining AAAExecute the display command in any view.Task CommandDisplay the configuration of ISP domains. display domain [ isp-name ]AAA configuration examplesUnless otherwise noted, devices in the configuration examples are operating in non-FIPS mode.AAA for SSH users by an HWTACACS serverNetwork requirementsAs shown in Figure 11, configure the switch to use the HWTACACS server for SSH user authentication,authorization, and accounting.Set the shared keys for secure HWTACACS communication to expert. Configure the switch to sendusernames without domain names to the HWTACACS server.Configure the switch to assign the default user role network-operator to SSH users after they passauthentication.