522
C
HAPTER
22: C
ONFIGURING
C
OMMUNICATION
WITH
RADIUS
During the holddown, it is as if the
dead
RADIUS server does not exist.
MSS skips over any dead RADIUS servers to the next
live
server, or on to
the next method if no more live servers are available, depending on your
configuration. For example, if a RADIUS server group is the primary
authentication method and
local
is the secondary method, MSS fails over
to the local method if all RADIUS servers in the server group are
unresponsive and have entered the dead time.
For failover authentication or authorization to work promptly, 3Com
recommends that you change the dead time to a value other than 0.
With the default setting, the dead time is never invoked and MSS does
not hold down requests to unresponsive RADIUS servers. Instead, MSS
attempts to send each new authentication or authorization request to a
server even if the server is thought to be unresponsive. This behavior can
cause authentication or authorization failures on clients because MSS
does not fail over to the local method soon enough and the clients
eventually time out.
Configuring Global
RADIUS Defaults
You can change RADIUS values globally and set a global password (key)
with the following command. The key
string
is the shared secret that the
WX switch uses to authenticate itself to the RADIUS server.
set radius
{
deadtime
minutes
|
encrypted-key
string
|
key
string
|
retransmit
number
|
timeout
seconds
}
(To override global settings for individual RADIUS servers, use the
set
radius server
command. See “Configuring Individual RADIUS Servers”
on page 523.)
For example, the following commands set the dead-time timer to
10 minutes and set the password to
r8gney
for all RADIUS servers in the
WX configuration:
WX1200#
set radius deadtime 10
success: change accepted.
WX1200#
set radius key r8gney
success: change accepted.
To reset global RADIUS server settings to their factory defaults, use the
following command:
clear radius
{
deadtime
|
key
|
retransmit
|
timeout
}
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...