![HP HP ProCurve Series 6600 Access Security Manual Download Page 242](http://html.mh-extra.com/html/hp/hp-procurve-series-6600/hp-procurve-series-6600_access-security-manual_163101242.webp)
6-8
RADIUS Authentication, Authorization, and Accounting
Configuring the Switch for RADIUS Authentication
Outline of the Steps for Configuring RADIUS
Authentication
There are three main steps to configuring RADIUS authentication:
1.
Configure RADIUS authentication for controlling access through one or
more of the following
•
Serial port
•
Telnet
•
SSH
•
Port-Access (802.1X)
•
WebAgent
2.
Enable RADIUS authentication on the switch to override the default
authentication operation of automatically assigning an authenticated cli-
ent to the Operator privilege level. This optional feature applies the
privilege level specified by the Service Type value received from the
RADIUS server. (Refer to “1. Configure Authentication for the Access
Methods You Want RADIUS To Protect” on page 6-10.)
3.
Configure the switch for accessing one or more RADIUS servers (one
primary server and up to two backup servers):
N o t e
This step assumes you have already configured the RADIUS server(s) to
support the switch. Refer to the documentation provided with the
RADIUS server documentation.)
•
Server IP address
[no] radius-server encrypted-key <global key-string>
radius-server timeout < 1 - 15>
radius-server retransmit < 1 - 5 >
[no] radius-server dead-time < 1 - 1440 >
show radius
[< host <
ip-address
>]
show authentication
show radius authentication
*The
web
authentication option for the WebAgent is available on the switches
covered in this guide.
RADIUS Authentication Commands
Page
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......