Purpose
Command or Action
Enables AAA.
aaa new-model
Example:
Switch(config)#
aaa new-model
Step 2
Sets the conditions that determine when a RADIUS server is considered
un-available or down (dead).
radius-server dead-criteria
{
time seconds
}
[
tries number
]
Step 3
Example:
Switch(config)#
radius-server
•
time
—
1 to 120 seconds. The switch dynamically determines a
default
seconds
value between 10 and 60.
•
number
—
1 to 100 tries. The switch dynamically determines a default
triesnumber
between 10 and 100.
dead-criteria time 20 tries 10
(Optional) Sets the number of minutes during which a RADIUS server is
not sent requests. The range is from 0 to 1440 minutes (24 hours). The
default is 0 minutes.
radius-serverdeadtimeminutes
Example:
Switch(config)#
radius-server deadtime
Step 4
60
(Optional) Configure the RADIUS server parameters by using these
keywords:
radius-server host ip-address
address
[
acct-port udp-port
][
auth-port
Step 5
udp-port
] [
testusername name
[
idle-time time
]
•
acct-portudp-port
—
Specify the UDP port for the RADIUS
accounting server. The range for the UDP port number is from 0 to
65536. The default is 1646.
[
ignore-acct-port
][
ignore auth-port
]] [
key
string
]
Example:
Switch(config)#
radius-server host
•
auth-portudp-port
—
Specify the UDP port for the RADIUS
authentication server. The range for the UDP port number is from 0
to 65536. The default is 1645.
1.1.1.2 acct-port 1550 auth-port
1560 test username user1 idle-time 30
You should configure the UDP port for the RADIUS
accounting server and the UDP port for the RADIUS
authentication server to nondefault values.
Note
key abc1234
•
test usernamename
—
Enable automated testing of the RADIUS
server status, and specify the username to be used.
•
idle-time time
—
Set the interval of time in minutes after which the
switch sends test packets to the server. The range is from 1 to 35791
minutes. The default is 60 minutes (1 hour).
•
ignore-acct-port
—
Disable testing on the RADIUS-server accounting
port.
•
ignore-auth-port
—
Disable testing on the RADIUS-server
authentication port.
•
For
keystring
, specify the authentication and encryption key used
between the switch and the RADIUS daemon running on the
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
OL-29048-01
329
Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN