Cisco Nexus 9K Series switches support the CLI command, aaa authentication login ascii-authentication, only
for , but not for RADIUS. Ensure that you have disabled aaa authentication login ascii-authentication
switch so that the default authentication, PAP, is enabled. Otherwise, you will see syslog errors.
Note
RADIUS Server Configuration Process
1.
Establish the RADIUS server connections to the Cisco NX-OS device.
2.
Configure the RADIUS secret keys for the RADIUS servers.
3.
If needed, configure RADIUS server groups with subsets of the RADIUS servers for AAA authentication
methods.
4.
If needed, configure any of the following optional parameters:
• Dead-time interval
• RADIUS server specification allowed at user login
• Timeout interval
• TCP port
5.
(Optional) If RADIUS distribution is enabled, commit the RADIUS configuration to the fabric.
Related Topics
Configuring RADIUS Server Hosts
, on page 44
Configuring Global RADIUS Keys
, on page 46
Configuring RADIUS Server Hosts
To access a remote RADIUS server, you must configure the IP address or hostname of a RADIUS server.
You can configure up to 64 RADIUS servers.
By default, when you configure a RADIUS server IP address or hostname of the Cisco NX-OS device, the
RADIUS server is added to the default RADIUS server group. You can also add the RADIUS server to another
RADIUS server group.
Note
Before you begin
Ensure that the server is already configured as a member of the server group.
Ensure that the server is configured to authenticate RADIUS traffic.
Ensure that the Cisco NX-OS device is configured as a RADIUS client of the AAA servers.
SUMMARY STEPS
1.
configure terminal
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x
44
Configuring RADIUS
RADIUS Server Configuration Process