6-68
RADIUS Authentication, Authorization, and Accounting
Changing RADIUS-Server Access Order
Figure 6-32. Search Order for Accessing a RADIUS Server
To exchange the positions of the addresses so that the server at 10.10.10.3 will
be the first choice and the server at 10.10.10.1 will be the last, you would do
the following:
1.
Delete 10.10.10.3 from the list. This opens the third (lowest) position in
the list.
2.
Delete 10.10.10.1 from the list. This opens the first (highest) position in
the list.
3.
Re-enter 10.10.10.3. Because the switch places a newly entered address
in the highest-available position, this address becomes first in the list.
4.
Re-enter 10.10.10.1. Because the only position open is the third position,
this address becomes last in the list.
HP Switch# show radius
Status and Counters - General RADIUS Information
Deadtime(min) : 0
Timeout(secs) : 5
Retransmit Attempts : 3
Global Encryption Key :
Dynamic Authorization UDP Port : 3799
Source IP Selection : Outgoing Interface
Auth Acct DM/ Time
Server IP Addr Port Port CoA Window Encryption Key OOBM
--------------- ---- ---- --- ------ -------------------------------- ----
10.10.10.1 1812 1813 No 300 No
10.10.10.2 1812 1813 No 300 No
10.10.10.3 1812 1813 No 300 No
RADIUS server IP addresses listed in the order
in which the switch will try to access them. In this
case, the server at IP address 10.10.10.1 is first.
Note:
If the switch successfully accesses the
first server, it does not try to access any other
servers in the list, even if the client is denied
access by the first server.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......