Configuring Radius Authentication/Authorization Servers - H3C S3100-52P Operation Manual

Aaa - radius - hwtacacs
Hide thumbs Also See for S3100-52P:
Table of Contents

Advertisement

Operation Manual – AAA – RADIUS – HWTACACS
H3C S3100-52P Ethernet Switch
Caution:
A RADIUS scheme can be referenced by multiple ISP domains simultaneously.

1.4.2 Configuring RADIUS Authentication/Authorization Servers

Table 1-13 Configure RADIUS authentication/authorization servers
Enter system view
Create a RADIUS scheme
and enter its view
Set the IP address and port
number
RADIUS
authentication/authorizatio
n server
Set the IP address and port
number of the secondary
RADIUS
authentication/authorizatio
n server
Caution:
The authentication response sent from the RADIUS server to the RADIUS client
carries authorization information. Therefore, you need not (and cannot) specify a
separate RADIUS authorization server.
In an actual network environment, you can specify one server as both the primary
and secondary authentication/authorization servers, as well as specifying two
RADIUS servers as the primary and secondary authentication/authorization servers
respectively.
The IP address and port number of the primary authentication server used by the
default RADIUS scheme "system" are 127.0.0.1 and 1645.
Operation
of
the
primary
Chapter 1 AAA & RADIUS & HWTACACS
Command
system-view
radius
scheme
radius-scheme-name
primary authentication
ip-address
[ port-number ]
secondary
authentication
ip-address
[ port-number ]
1-23
Configuration
Description
Required
By default, a RADIUS
scheme named "system"
has already been created
in the system.
Required
By default, the IP address
and UDP port number of
the primary server are
0.0.0.0
and
1812
respectively.
Optional
By default, the IP address
and UDP port number of
the secondary server are
0.0.0.0
and
1812
respectively.

Advertisement

Table of Contents
loading

Table of Contents