Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
Follow these steps to configure the switch to use vendor-proprietary RADIUS server communication:
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
radius-server host
{
hostname
|
ip-address
}
non-standard
4.
radius-server key string
5.
end
6.
show running-config
7.
copy running-config startup-config
DETAILED STEPS
Purpose
Command or Action
Enables privileged EXEC mode. Enter your password if prompted.
enable
Step 1
Example:
Switch>
enable
Enters the global configuration mode.
configure terminal
Example:
Switch#
configure terminal
Step 2
Specifies the IP address or hostname of the remote RADIUS server
host and identifies that it is using a vendor-proprietary
implementation of RADIUS.
radius-server host
{
hostname
|
ip-address
}
non-standard
Example:
Switch(config)#
radius-server host
Step 3
172.20.30.15 non-standard
Specifies the shared secret text string used between the switch and
the vendor-proprietary RADIUS server. The switch and the RADIUS
radius-server key string
Example:
Switch(config)#
radius-server key rad124
Step 4
server use this text string to encrypt passwords and exchange
responses.
The key is a text string that must match the encryption key
used on the RADIUS server. Leading spaces are ignored,
but spaces within and at the end of the key are used. If you
use spaces in your key, do not enclose the key in quotation
marks unless the quotation marks are part of the key.
Note
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
OL-29048-01
97
Configuring RADIUS
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication