Restrictions For Configuring Radius - Cisco Catalyst 2960-X Security Configuration Manual

Cisco ios release 15.0(2)ex
Hide thumbs Also See for Catalyst 2960-X:
Table of Contents

Advertisement

Restrictions for Configuring RADIUS

• Use the aaa new-model global configuration command to enable AAA.
• Use the aaa authentication global configuration command to define method lists for RADIUS
• Use line and interface commands to enable the defined method lists to be used.
• At a minimum, you must identify the host or hosts that run the RADIUS server software and define the
• You should have access to and should configure a RADIUS server before configuring RADIUS features
• The RADIUS host is normally a multiuser system running RADIUS server software from Cisco (Cisco
• To use the Change-of-Authorization (CoA) interface, a session must already exist on the switch. CoA
For RADIUS operation:
• Users must first successfully complete RADIUS authentication before proceeding to RADIUS
Related Topics
RADIUS and Switch Access, on page 59
RADIUS Operation, on page 60
Restrictions for Configuring RADIUS
This topic covers restrictions for controlling Switch access with RADIUS.
General:
• To prevent a lapse in security, you cannot configure RADIUS through a network management application.
RADIUS is not suitable in the following network security situations:
• Multiprotocol access environments. RADIUS does not support AppleTalk Remote Access (ARA),
• Switch-to-switch or router-to-router situations. RADIUS does not provide two-way authentication.
• Networks using a variety of services. RADIUS generally binds a user to one service model.
Related Topics
RADIUS Overview, on page 59
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
58
authentication.
method lists for RADIUS authentication. You can optionally define method lists for RADIUS
authorization and accounting.
on your Switch.
Secure Access Control Server Version 3.0), Livingston, Merit, Microsoft, or another software provider.
For more information, see the RADIUS server documentation.
can be used to identify a session and enforce a disconnect request. The update affects only the specified
session.
authorization, if it is enabled.
NetBIOS Frame Control Protocol (NBFCP), NetWare Asynchronous Services Interface (NASI), or X.25
PAD connections.
RADIUS can be used to authenticate from one device to a non-Cisco device if the non-Cisco device
requires authentication.
Configuring RADIUS
OL-29048-01

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents