303
RADIUS configuration example
Network requirements
As shown in
, an 802.1X user logs in to the switch from the host. Configure the switch to
implement RADIUS authentication and accounting for the 802.1X user. RADIUS accounting records
the online duration of the 802.1X user.
Configure RADIUS servers on CAMS or IMC to use the default port for authentication and
accounting. The 802.1X user's username and password and the shared key
expert
are configured
for packet exchange with the switch.
On the switch, configure the shared key for packet exchange with the RADIUS server as
expert
, and
configure the system to remove the domain name of a username before sending it to the RADIUS
server.
On the switch, enable the Telnet server function, and configure the switch to use AAA for
authentication, authorization and accounting of Telnet users.
Figure 319 Network diagram
Configuration prerequisites
Enable 802.1X globally and on the specified port. Configure network access control based on MAC
addresses. (Details not shown.)
Configuring a RADIUS scheme
1.
Select
Authentication
>
RADIUS
from the navigation tree.
2.
Click
Add
to add a RADIUS scheme:
a.
Enter
system
as the scheme name.
b.
Select
Extended
as the server type.
c.
Select
Without domain name
for the username format.
3.
In the
RADIUS Server Configuration
area, click
Add
to configure the primary authentication
server:
a.
Select
Primary Authentication
as the server type.
b.
Enter
10.110.91.146
as the IP address.
c.
Enter
1812
as the port.
d.
Enter
expert
as the key and enter
expert
again to confirm the key.
e.
Click
Apply
.
Summary of Contents for FlexNetwork NJ5000
Page 12: ...x Index 440 ...
Page 39: ...27 Figure 16 Configuration complete ...
Page 67: ...55 Figure 47 Displaying the speed settings of ports ...
Page 78: ...66 Figure 59 Loopback test result ...
Page 158: ...146 Figure 156 Creating a static MAC address entry ...
Page 183: ...171 Figure 171 Configuring MSTP globally on Switch D ...
Page 243: ...231 Figure 237 IPv6 active route table ...