253
Configuring Web-Based Authentication
Monitoring and Maintaining Web-Based Authentication
Monitoring and Maintaining Web-Based Authentication
Configuration Examples for Configuring Web-Based
Authentication
Enabling and Displaying Web-Based Authentication: Examples
This example shows how to verify the configuration:
Switch#
show ip admission configuration
Authentication Proxy Banner not configured
Authentication global cache time is 60 minutes
Authentication global absolute time is 0 minutes
Authentication global init state time is 2 minutes
Authentication Proxy Watch-list is disabled
Authentication Proxy Rule Configuration
Auth-proxy name webauth1
http list not specified inactivity-time 60 minutes
Authentication Proxy Auditing is disabled
Max Login attempts per user is 5
Enabling AAA: Example
This example shows how to enable AAA:
Switch(config)#
aaa new-model
Switch(config)#
aaa authentication login default group radius
Switch(config)#
aaa authorization auth-proxy default group radius
Configuring the RADIUS Server Parameters: Example
This example shows how to configure the RADIUS server parameters on a switch:
Switch(config)#
ip radius source-interface Vlan80
Switch(config)#
radius-server host 172.l20.39.46 test username user1
Switch(config)#
radius-server key rad123
Switch(config)#
radius-server dead-criteria tries 2
Command
Purpose
clear ip auth-proxy cache
{
*
|
host ip address
}
Clears authentication proxy entries from the switch.
clear ip admission cache
{
*
|
host ip address
}
Clears IP admission cache entries from the switch.
Command
Purpose
show authentication sessions
Displays the web-based authentication settings.
show ip admission configuration
Displays the authentication proxy configuration.
show ip admission cache
Displays the list of authentication entries.
Summary of Contents for IE 4000
Page 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Page 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Page 108: ...104 Configuring Switch Clusters Additional References ...
Page 128: ...124 Performing Switch Administration Additional References ...
Page 130: ...126 Configuring PTP ...
Page 140: ...136 Configuring CIP Additional References ...
Page 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Page 192: ...188 Configuring Switch Based Authentication Additional References ...
Page 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Page 298: ...294 Configuring VLANs Additional References ...
Page 336: ...332 Configuring STP Additional References ...
Page 408: ...404 Configuring DHCP Additional References ...
Page 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Page 490: ...486 Configuring SPAN and RSPAN Additional References ...
Page 502: ...498 Configuring Layer 2 NAT ...
Page 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Page 930: ...926 Configuring IP Unicast Routing Related Documents ...
Page 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Page 978: ...974 Dying Gasp ...
Page 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Page 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Page 996: ...992 Ethernet CFM ...
Page 1066: ...1062 Using an SD Card SD Card Alarms ...