5-7
RADIUS Authentication, Authorization and Accounting
Configuring the Switch for RADIUS Authentication
Outline of the Steps for Configuring RADIUS
Authentication
There are three main steps to configuring RADIUS authentication:
1.
Configure RADIUS authentication for controlling access through one or
more of the following
•
Serial port
•
Telnet
•
SSH
•
Web browser interface
•
Port-Access (802.1X)
2.
Configure the switch for accessing one or more RADIUS servers (one
primary server and up to two backup servers):
N o t e
This step assumes you have already configured the RADIUS server(s) to
support the switch. Refer to the documentation provided with the
RADIUS server documentation.)
•
Server IP address
•
(Optional) UDP destination port for authentication requests (default:
1812; recommended)
•
(Optional) UDP destination port for accounting requests (default:
1813; recommended)
•
(Optional) encryption key for use during authentication sessions with
a RADIUS server. This key overrides the global encryption key you
can also configure on the switch, and must match the encryption key
used on the specified RADIUS server. (Default: null)
3.
Configure the global RADIUS parameters.
•
Server Key:
This key must match the encryption key used on the
RADIUS servers the switch contacts for authentication and account-
ing services unless you configure one or more per-server keys.
(Default: null.)
•
Timeout Period:
The timeout period the switch waits for a RADIUS
server to reply. (Default: 5 seconds; range: 1 to 15 seconds.)
•
Retransmit Attempts:
The number of retries when there is no server
response to a RADIUS authentication request. (Default: 3; range of 1
to 5.)
•
Server Dead-Time:
The period during which the switch will not send
new authentication requests to a RADIUS server that has failed to
respond to a previous request. This avoids a wait for a request to time
Содержание ProCurve 2510G Series
Страница 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Страница 12: ...x ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Страница 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Страница 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 318: ...8 Index ...
Страница 319: ......