Cisco Catalyst 3560-X Software Configuration Manual page 270

Hide thumbs Also See for Catalyst 3560-X:
Table of Contents

Advertisement

Controlling Switch Access with RADIUS
Command
Step 4
client {ip-address | name} [vrf vrfname]
[server-key string]
Step 5
server-key [0 | 7] string
Step 6
port port-number
Step 7
auth-type {any | all | session-key}
Step 8
ignore session-key
Step 9
ignore server-key
Step 10
authentication command bounce-port
ignore
Step 11
authentication command disable-port
ignore
Step 12
end
Step 13
show running-config
Step 14
copy running-config startup-config
To disable AAA, use the no aaa new-model global configuration command. To disable the AAA server
functionality on the switch, use the no aaa server radius dynamic authorization global configuration
command.
Monitoring and Troubleshooting CoA Functionality
The following Cisco IOS commands can be used to monitor and troubleshoot CoA functionality on the
switch:
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
1-38
Purpose
Enter dynamic authorization local server configuration mode and specify
a RADIUS client from which a device will accept CoA and disconnect
requests.
Configure the RADIUS key to be shared between a device and RADIUS
clients.
Specify the port on which a device listens for RADIUS requests from
configured RADIUS clients.
Specify the type of authorization the switch uses for RADIUS clients.
The client must match all the configured attributes for authorization.
(Optional) Configure the switch to ignore the session-key.
For more information about the ignore command, see the
Intelligent Services Gateway Command Reference
(Optional) Configure the switch to ignore the server-key.
For more information about the ignore command, see the
Intelligent Services Gateway Command Reference
(Optional) Configure the switch to ignore a CoA request to temporarily
disable the port hosting a session. The purpose of temporarily disabling
the port is to trigger a DHCP renegotiation from the host when a VLAN
change occurs and there is no supplicant on the endpoint to detect the
change.
(Optional) Configure the switch to ignore a nonstandard command
requesting that the port hosting a session be administratively shut down.
Shutting down the port results in termination of the session.
Use standard CLI or SNMP commands to re-enable the port.
Return to privileged EXEC mode.
Verify your entries.
(Optional) Save your entries in the configuration file.
debug radius
debug aaa coa
debug aaa pod
debug aaa subsys
debug cmdhd [detail | error | events]
show aaa attributes protocol radius
Chapter 1
Configuring Switch-Based Authentication
on Cisco.com.
on Cisco.com.
Cisco IOS
Cisco IOS
OL-25303-03

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 3750-x

Table of Contents