About Users Specifying A Radius Server At Login; Allowing Users To Specify A Radius Server At Login; About Vendor-Specific Attributes - Cisco AP776A - Nexus Converged Network Switch 5020 Configuration Manual

Cisco mds 9000 family cli configuration guide - release 4.x (ol-18084-01, february 2009)
Hide thumbs Also See for AP776A - Nexus Converged Network Switch 5020:
Table of Contents

Advertisement

Configuring RADIUS
S e n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a c k - d o c @ c i s c o . c o m
To send the test message to the RADIUS server, follow this step:
Command
Step 1
switch# test aaa server radius
10.10.1.1 test test
switch# test aaa server radius
10.10.1.1 testuser Ur2Gd2BH

About Users Specifying a RADIUS Server at Login

By default, an MDS switch forwards an authentication request to the first server in the RADIUS server
group. You can configure the switch to allow the user to specify which RADIUS server to send the
authenticate request by enabling the directed request option. If you enable this option, the user can log
in as username@hostname, where the hostname is the name of a configured RADIUS server.

Allowing Users to Specify a RADIUS Server at Login

To allow users logging into an MDS switch to select a RADIUS server for authentication, follow these
steps:
Command
Step 1
switch# config t
Step 2
switch(config)# radius-server
directed-request
switch(config)# no radius-server
directed-request
You can use the show tacacs-server directed-request command to display the RADIUS directed
request configuration.
switch# show radius-server directed-request
disabled

About Vendor-Specific Attributes

The Internet Engineering Task Force (IETF) draft standard specifies a method for communicating
vendor-specific attributes (VSAs) between the network access server and the RADIUS server. The IETF
uses attribute 26. VSAs allow vendors to support their own extended attributes that are not suitable for
general use. The Cisco RADIUS implementation supports one vendor-specific option using the format
recommended in the specification. The Cisco vendor ID is 9, and the supported option is vendor type 1,
which is named cisco-avpair. The value is a string with the following format:
protocol : attribute separator value *
Cisco MDS 9000 Family CLI Configuration Guide
34-14
Chapter 34
Purpose
Sends a test message to a RADIUS server using the default
username (test) and password (test).
Sends a test message to a RADIUS server using a
configured test username (testuser) and password
(Ur2Gd2BH).
A configured username and password is optional
Note
(see the
"Configuring Test User Name" section on
page
34-12).
Purpose
Enters configuration mode.
Allows users to specify a RADIUS server to send the
authentication request when logging in.
Reverts to sending the authentication request to the first
server in the server group (default).
OL-18084-01, Cisco MDS NX-OS Release 4.x
Configuring RADIUS and TACACS+

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents