Purpose
Command
Displays information for troubleshooting POD
packets.
debug aaa pod
Displays information for troubleshooting POD
packets.
debug aaa subsys
Displays information for troubleshooting command
headers.
debug cmdhd
[
detail
|
error
|
events
]
For detailed information about the fields in these displays, see the command reference for this release.
Configuration Examples for Controlling Switch Access with
RADIUS
Examples: Identifying the RADIUS Server Host
This example shows how to configure one RADIUS server to be used for authentication and another to be
used for accounting:
Switch(config)#
radius-server host 172.29.36.49 auth-port 1612 key rad1
Switch(config)#
radius-server host 172.20.36.50 acct-port 1618 key rad2
This example shows how to configure
host1
as the RADIUS server and to use the default ports for both
authentication and accounting:
Switch(config)#
radius-server host host1
Example: Using Two Different RADIUS Group Servers
In this example, the switch is configured to recognize two different RADIUS group servers (
group1
and
group2
). Group1 has two different host entries on the same RADIUS server configured for the same services.
The second host entry acts as a fail-over backup to the first entry.
Switch(config)#
radius-server host 172.20.0.1 auth-port 1000 acct-port 1001
Switch(config)#
radius-server host 172.10.0.1 auth-port 1645 acct-port 1646
Switch(config)#
aaa new-model
Switch(config)#
aaa group server radius group1
Switch(config-sg-radius)#
server 172.20.0.1 auth-port 1000 acct-port 1001
Switch(config-sg-radius)#
exit
Switch(config)#
aaa group server radius group2
Switch(config-sg-radius)#
server 172.20.0.1 auth-port 2000 acct-port 2001
Switch(config-sg-radius)#
exit
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
102
OL-29048-01
Configuring RADIUS
Configuration Examples for Controlling Switch Access with RADIUS