Configuring The Switch For Radius Authentication - HP ProCurve 6200yl Series Access Security Manual

Hide thumbs Also See for ProCurve 6200yl Series:
Table of Contents

Advertisement

RADIUS Authentication and Accounting

Configuring the Switch for RADIUS Authentication

•­ Determine how many times you want the switch to try contacting a RADIUS server before trying another RADIUS
server or quitting. (This depends on how many RADIUS servers you have configured the switch to access.)
•­ Determine whether you want to bypass a RADIUS server that fails to respond to requests for service. To shorten
authentication time, you can set a bypass period in the range of 1 to 1440 minutes for non-responsive servers. This
requires that you have multiple RADIUS servers accessible for service requests.
•­ Optional: Determine whether the switch access level (Manager or Operator) for authenticated clients can be set by
a Service Type value the RADIUS server includes in its authentication message to the switch. (Refer to "2. Enable the
(Optional) Access Privilege Option" on page 6-12.)
• Configure RADIUS on the server(s) used to support authentication on the switch.
6-8
Configuring the Switch for RADIUS
Authentication
RADIUS Authentication Commands
aaa authentication
< console | telnet | ssh | web > < enable | login > radius*
[ local | none ]
[login privilege-mode]*
[no] radius-server host < IP-address >
[auth-port < port-number >]
[acct-port < port-number >]
[key < server-specific key-string >]
[no] radius-server key < global key-string >
radius-server timeout < 1 - 15>
radius-server retransmit < 1 - 5 >
[no] radius-server dead-time < 1 - 1440 >
show radius
[< host < ip-address>]
show authentication
show radius authentication
*The web authentication option for the web browser interface is available on
the switches covered in this guide.
Page
6-10
6-10
6-10
6-12
6-13
6-13
6-13, 6-23
6-13
6-16
6-16
6-16
6-17
6-29
6-30
6-31
6-32

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents