Cisco IE 3000 Software Configuration Manual page 227

Table of Contents

Advertisement

Chapter 10
Configuring IEEE 802.1x Port-Based Authentication
Beginning in privileged EXEC mode, follow these steps to configure the RADIUS server parameters on
the switch. This procedure is required.
Command
Step 1
configure terminal
Step 2
radius-server host {hostname |
ip-address} auth-port port-number key
string
Step 3
end
Step 4
show running-config
Step 5
copy running-config startup-config
To delete the specified RADIUS server, use the no radius-server host {hostname | ip-address} global
configuration command.
This example shows how to specify the server with IP address 172.20.39.46 as the RADIUS server, to
use port 1612 as the authorization port, and to set the encryption key to rad123, matching the key on the
RADIUS server:
Switch(config)# radius-server host 172.l20.39.46 auth-port 1612 key rad123
You can globally configure the timeout, retransmission, and encryption key values for all RADIUS
servers by using the radius-server host global configuration command. If you want to configure these
options on a per-server basis, use the radius-server timeout, radius-server retransmit, and the
radius-server key global configuration commands. For more information, see the
for All RADIUS Servers" section on page
You also need to configure some settings on the RADIUS server. These settings include the IP address
of the switch and the key string to be shared by both the server and the switch. For more information,
see the RADIUS server documentation.
OL-13018-01
Purpose
Enter global configuration mode.
Configure the RADIUS server parameters.
For hostname | ip-address, specify the hostname or IP address of the
remote RADIUS server.
For auth-port port-number, specify the UDP destination port for
authentication requests. The default is 1812. The range is 0 to 65536.
For key string, specify the authentication and encryption key used
between the switch and the RADIUS daemon running on the RADIUS
server. The key is a text string that must match the encryption key used on
the RADIUS server.
Always configure the key as the last item in the radius-server
Note
host command syntax because leading spaces are ignored, but
spaces within and at the end of the key are used. If you use spaces
in the key, do not enclose the key in quotation marks unless the
quotation marks are part of the key. This key must match the
encryption used on the RADIUS daemon.
If you want to use multiple RADIUS servers, re-enter this command.
Return to privileged EXEC mode.
Verify your entries.
(Optional) Save your entries in the configuration file.
9-29.
Cisco IE 3000 Switch Software Configuration Guide
Configuring IEEE 802.1x Authentication
"Configuring Settings
10-25

Advertisement

Table of Contents
loading

Table of Contents