
set radius
18-6
Security Configuration
Defaults
If
secret
‐
value
is
not
specified,
none
will
be
applied.
If
realm
is
not
specified,
the
any
access
realm
will
be
used.
Mode
Switch
command,
read
‐
write.
Usage
The
SecureStack
C2
device
allows
up
to
10
RADIUS
accounting
servers
to
be
configured,
with
up
to
two
servers
active
at
any
given
time.
The
RADIUS
client
can
only
be
enabled
on
the
switch
once
a
RADIUS
server
is
online,
and
its
IP
address(es)
has
been
configured
with
the
same
password
the
RADIUS
client
will
use.
Examples
This
example
shows
how
to
enable
the
RADIUS
client
for
authenticating
with
RADIUS
server
1
at
IP
address
192.168.6.203,
UDP
authentication
port
1812,
and
an
authentication
password
of
“pwsecret.”
As
previously
noted,
the
“server
secret”
password
entered
here
must
match
that
already
configured
as
the
Read
‐
Write
(rw)
password
on
the
RADIUS
server
:
C2(su)->set radius server 1 192.168.6.203 1812 pwsecret
This
example
shows
how
to
set
the
RADIUS
timeout
to
5
seconds:
C2(su)->set radius timeout 5
This
example
shows
how
to
set
RADIUS
retries
to
10:
C2(su)->set radius retries 10
This
example
shows
how
to
force
any
management
‐
access
to
the
switch
(Telnet,
web,
SSH)
to
authenticate
through
a
RADIUS
server.
The
all
parameter
at
the
end
of
the
command
means
that
any
of
the
defined
RADIUS
servers
can
be
used
for
this
Authentication.
C2(rw)->set radius realm management-access all
realm
management
‐
access
|
any
|
network
‐
access
Realm
allows
you
to
define
who
has
to
go
through
the
RADIUS
server
for
authentication.
•
management
‐
access
:
This
means
that
anyone
trying
to
access
the
switch
(Telnet,
SSH,
Local
Management)
has
to
authenticate
through
the
RADIUS
server.
•
network
‐
access
:
This
means
that
all
the
users
have
to
authenticate
to
a
RADIUS
server
before
they
are
allowed
access
to
the
network.
•
any
:
Means
that
both
management
‐
access
and
network
‐
access
have
been
enabled.
Note:
If the
management-access
or
any
access realm has been configured, the
local “admin” account is disabled for access to the switch using the console, Telnet,
or Local Management. Only the
network-access
realm allows access to the local
“admin” account.
index
|
all
Applies
the
realm
setting
to
a
specific
server
or
to
all
servers.
Note:
If RADIUS is configured with no host IP address on the device, it will use the loopback
interface 0 IP address (if it has been configured) as its source for the NAS-IP attribute. For
information about configuring loopback interfaces, refer to “
Содержание SecureStack C2
Страница 1: ...SecureStack C2 Stackable Switches Configuration Guide Firmware Version 5 1 xx P N 9033991 16 ...
Страница 2: ......
Страница 28: ...xxvi ...
Страница 106: ...set ssl 3 52 Basic Configuration ...
Страница 226: ...Creating a Basic SNMP Trap Configuration 6 38 SNMP Configuration ...
Страница 278: ...show spantree nonforwardingreason 7 52 Spanning Tree Configuration ...
Страница 302: ...set garp timer 8 24 802 1Q VLAN Configuration ...
Страница 448: ...show dhcp pool configuration 14 30 DHCP Server Configuration ...
Страница 454: ...no license advanced 15 6 Preparing for Router Mode ...