RADIUS Authentication and Accounting
Configuring RADIUS Accounting
Operating Rules for RADIUS Accounting
■
You can configure up to four types of accounting to run simulta
neously: exec, system, network, and commands.
■
RADIUS servers used for accounting are also used for authentication.
■
The switch must be configured to access at least one RADIUS server.
■
RADIUS servers are accessed in the order in which their IP addresses
were configured in the switch. Use
show radius
to view the order.
As long as the first server is accessible and responding to authentica
tion requests from the switch, a second or third server will not be
accessed. (For more on this topic, refer to “Changing RADIUS-Server
Access Order” on page 5-47.)
■
If access to a RADIUS server fails during a session, but after the client
has been authenticated, the switch continues to assume the server is
available to receive accounting data. Thus, if server access fails during
a session, it will not receive accounting data transmitted from the
switch.
Steps for Configuring RADIUS Accounting
1. Configure the switch for accessing a RADIUS server.
You can configure a list of up to three RADIUS servers (one primary, two
backup). The switch operates on the assumption that a server can operate
in both accounting and authentication mode. (Refer to the documentation
for your RADIUS server application.)
•
Use the same
radius-server host
command that you would use to
configure RADIUS authentication. Refer to “3. Configure the Switch
To Access a RADIUS Server” on page 5-15.
•
Provide the following:
–
A RADIUS server IP address.
–
Optional—a UDP destination port for authentication requests.
Otherwise the switch assigns the default UDP port (1812; recom
mended).
–
Optional—if you are also configuring the switch for RADIUS
authentication, and need a unique encryption key for use during
authentication sessions with the RADIUS server you are desig
nating, configure a server-specific key. This key overrides the
global encryption key you can also configure on the switch, and
5-37
Содержание PROCURVE 2910AL
Страница 1: ...Access Security Guide ProCurve Switches W 14 03 2910al www procurve com ...
Страница 2: ......
Страница 3: ...HP ProCurve 2910al Switch February 2009 W 14 03 Access Security Guide ...
Страница 84: ...Configuring Username and Password Security Front Panel Security 2 36 ...
Страница 156: ...TACACS Authentication Operating Notes 4 30 ...
Страница 288: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup 8 22 ...
Страница 416: ...Configuring Advanced Threat Protection Using the Instrumentation Monitor 10 28 ...
Страница 516: ...Configuring Port Based and User Based Access Control 802 1X Messages Related to 802 1X Operation 12 76 ...
Страница 527: ...Configuring and Monitoring Port Security Port Security Figure 13 4 Examples of Show Mac Address Outputs 13 11 ...
Страница 572: ...Using Authorized IP Managers Operating Notes 14 14 ...
Страница 592: ...12 Index ...
Страница 593: ......
Страница 594: ... Copyright 2009 Hewlett Packard Development Company L P February 2009 Manual Part Number 5992 5439 ...