Cisco Catalyst 2960-XR Security Configuration Manual page 98

Ios release 15.0 2 ex1
Hide thumbs Also See for Catalyst 2960-XR:
Table of Contents

Advertisement

Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
SUMMARY STEPS
1. configure terminal
2. radius-server host {hostname | ip-address} non-standard
3. radius-server key string
4. end
DETAILED STEPS
Command or Action
Step 1
configure terminal
Example:
Switch# configure terminal
Step 2
radius-server host {hostname | ip-address}
non-standard
Example:
Switch(config)# radius-server host
172.20.30.15 nonstandard
Step 3
radius-server key string
Example:
Switch(config)# radius-server key
rad124
Step 4
end
Example:
Switch(config)# end
What to Do Next
This feature allows access and authentication requests to be evenly across all RADIUS servers in a server
group. For more information, see the "RADIUS Server Load Balancing" chapter of the Cisco IOS Security
Configuration Guide, Release 12.4.
Related Topics
Vendor-Proprietary RADIUS Server Communication, on page 64
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
76
Purpose
Enters the global configuration mode.
Specifies the IP address or hostname of the remote RADIUS server host
and identifies that it is using a vendor-proprietary implementation of
RADIUS.
Specifies the shared secret text string used between the switch and the
vendor-proprietary RADIUS server. The switch and the RADIUS server
use this text string to encrypt passwords and exchange responses.
Note
The key is a text string that must match the encryption key used
on the RADIUS server. Leading spaces are ignored, but spaces
within and at the end of the key are used. If you use spaces in
your key, do not enclose the key in quotation marks unless the
quotation marks are part of the key.
Returns to privileged EXEC mode.
Configuring RADIUS
OL-29434-01

Advertisement

Table of Contents
loading

Table of Contents