Configuring The Switch-To-Radius-Server Communication - Cisco Catalyst 2960 series Configuration Manual

Consolidated platform configuration guide, ios release 15.2(4)e
Hide thumbs Also See for Catalyst 2960 series:
Table of Contents

Advertisement

Command or Action
Step 11
dot1x pae authenticator
Example:
Switch(config-if)# dot1x pae authenticator
Step 12
end
Example:
Switch(config-if)# end

Configuring the Switch-to-RADIUS-Server Communication

You can globally configure the timeout, retransmission, and encryption key values for all RADIUS servers
by using the radius-server host global configuration command. If you want to configure these options on a
per-server basis, use the radius-server timeout, the radius-server retransmit, and the radius-server key
global configuration commands.
You also need to configure some settings on the RADIUS server. These settings include the IP address of the
switch and the key string to be shared by both the server and the switch. For more information, see the RADIUS
server documentation.
Follow these steps to configure the RADIUS server parameters on the switch. This procedure is required.
Before You Begin
You must enable authentication, authorization, and accounting (AAA) and specify the authentication method
list. A method list describes the sequence and authentication method to be queried to authenticate a user.
SUMMARY STEPS
1. enable
2. configure terminal
3. radius-server host {hostname | ip-address} auth-port port-number key string
4. end
DETAILED STEPS
Command or Action
Step 1
enable
Sets the interface Port Access Entity to act only as an authenticator
and ignore messages meant for a supplicant.
Returns to privileged EXEC mode.
Purpose
Enables privileged EXEC mode. Enter your password if prompted.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(4)E (Catalyst 2960-X Switches)
How to Configure 802.1x Port-Based Authentication
Purpose
1365

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents