Setting Up A RADIUS Server
657
2
Update the dictionary for Switch login
a
In
/usr/local/etc/raddb
create a new file called
dictionary.3Com
containing the following information:
VENDOR 3Com 43
ATTRIBUTE 3Com-User-Access-Level 1 Integer 3Com
VALUE 3Com-User-Access-Level Monitor 1
VALUE 3Com-User-Access-Level Manager 2
VALUE 3Com-User-Access-Level Administrator 3
b
Edit the existing file
dictionary
in
/usr/local/etc/raddb
to add the
following line:
$INCLUDE dictionary.3Com
The new file
dictionary.3Com
will be used in configuring the FreeRADIUS
server
3
Locate the existing file
users
in
/usr/local/etc/raddb
and for each user
authorized to administer the Switch 5500:
a
Add an entry for Switch Login. For example
user-name Auth-Type = System, 3Com-User-Access-Level =
Administrator
This indicates that the server should return the 3Com vendor specific attribute
3Com-User-Access-Level
in the Access-Accept message for that user.
b
Add an entry for Network Login. For example
user-name Auth-Type := Local, User-Password == "password"
4
Run the FreeRADIUS server with
radiusd
, to turn on debugging. so you can see
any problems that may occur with the authentication:
cd /usr/local/sbin
./radiusd -sfxxyz -l stdout
Setting Up Auto VLAN and QOS using FreeRADIUS
It is slightly more complex to set up auto VLAN and QoS using FreeRADIUS, as the
dictionary file needs to be specially updated.
1
Update the
dictionary.tunnel
file with the following lines:
ATTRIBUTE
Tunnel-Type 64 integerhas_tag
ATTRIBUTE
Tunnel-Medium-Type 65 integerhas_tag
ATTRIBUTE
Tunnel-Private-Group-Id 81 stringhas_tag
VALUE
Tunnel-Type VLAN 13
VALUE
Tunnel-Medium-Type TMT802 6
2
Locate the file
users
in
/usr/local/etc/raddb
and add the return list attributes
to the user. For example:
bob
Auth-Type := Local, User-Password == "bob"
Tunnel-Medium-Type = TMT802,
Tunnel-Private-Group-Id = 2,
Tunnel-Type = VLAN,
Filter-Id = "profile=student"
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...