177
Configuring Switch-Based Authentication
How to Configure Switch-Based Authentication
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
Configuring CoA on the Switch
5.
radius-server deadtime
minutes
Specifies the number of minutes a RADIUS server, which is not responding
to authentication requests, to be skipped, thus avoiding the wait for the
request to timeout before trying the next configured server. The default is
0; the range is 1 to 1440 minutes.
6.
radius-server vsa send
[
accounting
|
authentication
]
Enables the switch to recognize and use VSAs as defined by RADIUS IETF
attribute 26.
(Optional)
accounting
—Limits the set of recognized vendor-specific
attributes to only accounting attributes.
(Optional)
authentication
—Limits the set of recognized
vendor-specific attributes to only authentication attributes.
If you enter this command without keywords, both accounting and
authentication vendor-specific attributes are used.
7.
end
Returns to privileged EXEC mode.
Command
Purpose
Command
Purpose
1.
configure terminal
Enters global configuration mode.
2.
radius-server host
{
hostname
|
ip-address
}
non-standard
Specifies the IP address or hostname of the remote
RADIUS server host and identifies that it is using a
vendor-proprietary implementation of RADIUS.
3.
radius-server key
string
Specifies the shared secret text string used between
the switch and the vendor-proprietary RADIUS
server. The switch and the RADIUS server use this
text string to encrypt passwords and exchange
responses.
Note:
The key is a text string that must match the
encryption key used on the RADIUS server. Leading
spaces are ignored, but spaces within and at the end
of the key are used. If you use spaces in your key, do
not enclose the key in quotation marks unless the
quotation marks are part of the key.
4.
end
Returns to privileged EXEC mode.
5.
show running-config
Verifies your settings.
6.
copy running-config startup-config
(Optional) Saves your entries in the configuration file.
Command
Purpose
1.
configure terminal
Enters global configuration mode.
2.
aaa new-model
Enables AAA.
3.
aaa server radius dynamic-author
Configures the switch as an authentication, authorization, and accounting
(AAA) server to facilitate interaction with an external policy server.
Summary of Contents for IE 4000
Page 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Page 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Page 108: ...104 Configuring Switch Clusters Additional References ...
Page 128: ...124 Performing Switch Administration Additional References ...
Page 130: ...126 Configuring PTP ...
Page 140: ...136 Configuring CIP Additional References ...
Page 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Page 192: ...188 Configuring Switch Based Authentication Additional References ...
Page 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Page 298: ...294 Configuring VLANs Additional References ...
Page 336: ...332 Configuring STP Additional References ...
Page 408: ...404 Configuring DHCP Additional References ...
Page 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Page 490: ...486 Configuring SPAN and RSPAN Additional References ...
Page 502: ...498 Configuring Layer 2 NAT ...
Page 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Page 930: ...926 Configuring IP Unicast Routing Related Documents ...
Page 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Page 978: ...974 Dying Gasp ...
Page 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Page 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Page 996: ...992 Ethernet CFM ...
Page 1066: ...1062 Using an SD Card SD Card Alarms ...