Configuring The Switch For Vendor-Proprietary Radius Server Communication - Cisco Catalyst 2960-X Security Configuration Manual

Cisco ios release 15.0(2)ex
Hide thumbs Also See for Catalyst 2960-X:
Table of Contents

Advertisement

Configuring RADIUS

Configuring the Switch for Vendor-Proprietary RADIUS Server Communication

Follow these steps to configure the switch to use vendor-proprietary RADIUS server communication:
SUMMARY STEPS
1. enable
2. configure terminal
3. radius-server host {hostname | ip-address} non-standard
4. radius-server key string
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
Command or Action
Step 1
enable
Example:
Switch> enable
Step 2
configure terminal
Example:
Switch# configure terminal
Step 3
radius-server host {hostname | ip-address}
non-standard
Example:
Switch(config)# radius-server host
172.20.30.15 non-standard
Step 4
radius-server key string
Example:
Switch(config)# radius-server key rad124
OL-29048-01
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
Purpose
Enables privileged EXEC mode. Enter your password if prompted.
Enters the global configuration mode.
Specifies the IP address or hostname of the remote RADIUS server
host and identifies that it is using a vendor-proprietary
implementation of RADIUS.
Specifies the shared secret text string used between the switch and
the vendor-proprietary RADIUS server. The switch and the RADIUS
server use this text string to encrypt passwords and exchange
responses.
The key is a text string that must match the encryption key
Note
used on the RADIUS server. Leading spaces are ignored,
but spaces within and at the end of the key are used. If you
use spaces in your key, do not enclose the key in quotation
marks unless the quotation marks are part of the key.
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
97

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents