6-6
RADIUS Authentication, Authorization, and Accounting
Configuring the Switch for RADIUS Authentication
Configuring the Switch for RADIUS
Authentication
• Determine an acceptable timeout period for the switch to wait for a server to respond to a request. HP recommends
that you begin with the default (five seconds).
• Determine how many times you want the switch to try contacting a RADIUS server before trying another RADIUS
server or quitting. (This depends on how many RADIUS servers you have configured the switch to access.)
• Determine whether you want to bypass a RADIUS server that fails to respond to requests for service. To shorten
authentication time, you can set a bypass period in the range of 1 to 1440 minutes for non-responsive servers. This
requires that you have multiple RADIUS servers accessible for service requests.
• Optional: Determine whether the switch access level (Manager or Operator) for authenticated clients can be set by
a Service Type value the RADIUS server includes in its authentication message to the switch. (Refer to “2. Enable the
(Optional) Access Privilege Option” on page 6-12.)
• Configure RADIUS on the server(s) used to support authentication on the switch.
RADIUS Authentication Commands
Page
aaa authentication
console | telnet | ssh | web | < enable | login <local | radius>>
web-based | mac-based <chap-radius | peap-radius>
[ local | none | authorized]
[login privilege-mode]*
[no] radius-server host <
IP-address
>
[auth-port <
port-number
>]
[acct-port <
port-number
>]
[dyn-authorization]
[key <
server-specific key-string
>]
[no] radius-server key <
global key-string
>
radius-server timeout < 1 - 15>
radius-server retransmit < 1 - 5 >
[no] radius-server dead-time < 1 - 1440 >
show radius
[< host <
ip-address
>]
show authentication
show radius authentication
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......