![3Com OfficeConnect WX1200 Command Reference Manual Download Page 495](http://html1.mh-extra.com/html/3com/officeconnect-wx1200/officeconnect-wx1200_command-reference-manual_3121270495.webp)
set radius server
495
key
string
— Password (shared secret key) the WX switch uses to
authenticate to the RADIUS server. You must provide the same
password that is defined on the RADIUS server. The password can be
1 to 32 characters long, with no spaces or tabs.
author-password
password
— Password used for authorization to a
RADIUS server for MAC users. Specify a password of up to
32 alphanumeric characters with no spaces or tabs.
Defaults
— Default values are listed below:
auth-port
— UDP port 1812
acct-port
— UDP port 1813
timeout
— 5 seconds
retransmit
— 3 (the total number of attempts, including the first
attempt)
deadtime
— 0 (zero) minutes (The WX switch does not designate
unresponsive RADIUS servers as unavailable.)
key
— No key
author-password
— When using RADIUS for authentication, a MAC
user’s MAC address is also used as the default authorization password
for that user, and no global authorization password is set. A last-resort
user’s default authorization password is
3Com
.
Access
— Enabled.
History
—Introduced in MSS Version 3.0.
Usage
— For a given RADIUS server, the first instance of this command
must set both the server name and the IP address and can include any or
all of the other optional parameters. Subsequent instances of this
command can be used to set optional parameters for a given RADIUS
server.
To configure the server as a remote authenticator for the WX switch, you
must add it to a server group with the
set server group
command.
Do not use the same name for a RADIUS server and a RADIUS server
group.
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...