Configuring The Switch-To-Radius-Server Communication - Cisco 3020 - Catalyst Blade Switch Configuration Manual

Cisco catalyst blade switch 3020 for hp software configuration guide, rel. 12.2(25)sef1
Hide thumbs Also See for 3020 - Cisco Catalyst Blade Switch:
Table of Contents

Advertisement

Chapter 7
Configuring IEEE 802.1x Port-Based Authentication
Command
Step 3
aaa authentication dot1x {default}
method1
Step 4
dot1x system-auth-control
Step 5
aaa authorization network {default}
group radius
Step 6
radius-server host ip-address
Step 7
radius-server key string
Step 8
interface interface-id
Step 9
switchport mode access
Step 10
dot1x port-control auto
Step 11
end
Step 12
show dot1x
Step 13
copy running-config startup-config

Configuring the Switch-to-RADIUS-Server Communication

RADIUS security servers are identified by their hostname or IP address, hostname and specific UDP port
numbers, or IP address and specific UDP port numbers. The combination of the IP address and UDP port
number creates a unique identifier, which enables RADIUS requests to be sent to multiple UDP ports on
a server at the same IP address. If two different host entries on the same RADIUS server are configured
for the same service—for example, authentication—the second host entry configured acts as the fail-over
backup to the first one. The RADIUS host entries are tried in the order that they were configured.
OL-8915-01
Purpose
Create an IEEE 802.1x authentication method list.
To create a default list that is used when a named list is not specified in
the authentication command, use the default keyword followed by the
method that is to be used in default situations. The default method list is
automatically applied to all ports.
For method1, enter the group radius keywords to use the list of all
RADIUS servers for authentication.
Note
Though other keywords are visible in the command-line help
string, only the group radius keywords are supported.
Enable IEEE 802.1x authentication globally on the switch.
(Optional) Configure the switch to use user-RADIUS authorization for all
network-related service requests, such as per-user ACLs or VLAN
assignment.
For per-user ACLs, single-host mode must be configured. This
Note
setting is the default.
(Optional) Specify the IP address of the RADIUS server.
(Optional) Specify the authentication and encryption key used between
the switch and the RADIUS daemon running on the RADIUS server.
Specify the port connected to the client that is to be enabled for
IEEE 802.1x authentication, and enter interface configuration mode.
(Optional) Set the port to access mode only if you configured the RADIUS
server in Step 6 and Step 7.
Enable IEEE 802.1x authentication on the port.
For feature interaction information, see the
Configuration Guidelines" section on page
Return to privileged EXEC mode.
Verify your entries.
(Optional) Save your entries in the configuration file.
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
Configuring IEEE 802.1x Authentication
"IEEE 802.1x Authentication
7-20.
7-23

Advertisement

Table of Contents
loading

Table of Contents