Configuring The Switch For Radius Authentication - ProCurve 2610 Manual

2610 / 2610-pwr series
Table of Contents

Advertisement

• Determine an acceptable timeout period for the switch to wait for a server to respond to a request. ProCurve
recommends that you begin with the default (five seconds).
• Determine how many times you want the switch to try contacting a RADIUS server before trying another RADIUS
server or quitting. (This depends on how many RADIUS servers you have configured the switch to access.)
• Determine whether you want to bypass a RADIUS server that fails to respond to requests for service. To shorten
authentication time, you can set a bypass period in the range of 1 to 1440 minutes for non-responsive servers. This
requires that you have multiple RADIUS servers accessible for service requests.
Configuring the Switch for RADIUS
Authentication
RADIUS Authentication Commands
aaa authentication
< console | telnet | ssh | web > < enable | login > radius
< local | none | authorized> <web-based | mac-based>
<chap-radius>>>
[no] radius-server host < IP-address >
[auth-port < port-number >]
[acct-port < port-number >]
[key < server-specific key-string >]
[no] radius-server key < global key-string >
radius-server timeout < 1 - 15>
radius-server retransmit < 1 - 5 >
[no] radius-server dead-time < 1 - 1440 >
show radius
[< host < ip-address>]
show authentication
show radius authentication
RADIUS Authentication and Accounting

Configuring the Switch for RADIUS Authentication

Page
5-8
5-8
5-8
5-11
5-11
5-11, 5-28
5-11
5-13
5-13
5-13
5-15
5-33
5-33
5-35
5-35
5-7

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents