Configuring the switch for RADIUS authentication
Serial port
Telnet
SSH
Port-Access (802.1X)
WebAgent
- RADIUS authentication on the switch must be enabled to override the default authentication operation which is to automatically assign an authenticated client to the operator privilege level. This applies the privilege level specified by the service type value received from the RADIUS server, see Configuring authentication for access methods RADIUS is to protect.
- Configure the switch for
accessing one or more RADIUS servers (one primary server and up to
two backup servers):
Server IP address
(Optional) UDP destination port for authentication requests (default: 1812; recommended)
(Optional) UDP destination port for accounting requests (default: 1813; recommended)
(Optional) Encryption key for use during authentication sessions with a RADIUS server. This key overrides the global encryption key you can also configure on the switch, and must match the encryption key used on the specified RADIUS server. Default: null.
NOTE:Step 2 assumes you have already configured the RADIUS servers to support the switch. See your RADIUS server documentation for details.
- Configure the global RADIUS parameters.
- Server key
This key must match the encryption key used on the RADIUS servers the switch contacts for authentication and accounting services unless you configure one or more per-server keys.
Default: null.
- Timeout period
The timeout period the switch waits for a RADIUS server to reply.
Default: 5 seconds; range: 1 to 15 seconds.
- Retransmit attempts
The number of retries when there is no server response to a RADIUS authentication request.
Default: 3; range of 1 to 5.
- Server dead-time
The period during which the switch does not send new authentication requests to a RADIUS server that has failed to respond to a previous request. This avoids a wait for a request to time out on a server that is unavailable. If you want to use this feature, select a dead-time period of 1 to 1440 minutes. (Default: 0disabled; range: 1 - 1440 minutes.) If your first-choice server was initially unavailable, but then becomes available before the dead-time expires, you can nullify the dead-time by resetting it to zero and then trying to log on again. As an alternative, you can reboot the switch, (thus resetting the dead-time counter to assume the server is available) and then try to log on again.
- Number of Login Attempts
This is actually an aaa authentication command. It controls how many times per session a RADIUS client (and clients using other forms of access) can try to log in with the correct user name and password.
Default: Three times per session.
- Server key
For RADIUS accounting features, see Accounting services.