Cisco 500 series Administration Manual page 306

Stackable managed switch
Hide thumbs Also See for 500 series:
Table of Contents

Advertisement

Configuring Security
Configuring RADIUS
STEP 1
STEP 2
STEP 3
Cisco 500 Series Stackable Managed Switch Administration Guide
To set the RADIUS server parameters:
Click Security > RADIUS. The RADIUS page is displayed.
Enter the RADIUS Accounting option. The following options are available:
Port Based Access Control (802.1X, MAC Based)—Specifies that the
RADIUS server is used for 802. 1 x port accounting.
Management Access—Specifies that the RADIUS server is used for user
login accounting.
Both Port Based Access Control and Management Access—Specifies
that the RADIUS server is used for both user login accounting and 802. 1 x
port accounting.
None—Specifies that the RADIUS server is not used for accounting.
Enter the default RADIUS parameters if required. Values entered in the Default
Parameters are applied to all servers. If a value is not entered for a specific server
(in the Add RADIUS Server page) the switch uses the values in these fields.
IP Version—Displays the supported IP versions: IPv6 and/or IPv4 subnet.
Retries—Enter the number of transmitted requests that are sent to the
RADIUS server before a failure is considered to have occurred.
Timeout for Reply—Enter the number of seconds that the switch waits for
an answer from the RADIUS server before retrying the query, or switching to
the next server.
Dead Time—Enter the number of minutes that elapse before a non-
responsive RADIUS server is bypassed for service requests. If the value is 0,
the server is not bypassed.
Key String—Enter the default key string used for authenticating and
encrypting between the switch and the RADIUS server. This key must match
the key configured on the RADIUS server. A key string is used to encrypt
communications by using MD5. The key can be entered in Encrypted or
Plaintext form. If you do not have an encrypted key string (from another
device), enter the key string in plaintext mode and click Apply. The
encrypted key string is generated and displayed.
This overrides the default key string if one has been defined.
Source IPv4 Address—Enter the source IPv4 address to be used.
Source IPv6 Address—Enter the source IPv6 address to be used.
18
306

Advertisement

Table of Contents
loading

Table of Contents