Specifying Authentication Servers - AMX NXA-ENET8-2POE Operation/Reference Manual

Gigabit ethernet layer 2 poe switch
Hide thumbs Also See for NXA-ENET8-2POE:
Table of Contents

Advertisement

Configuring the NXA-ENET8-2POE

Specifying Authentication Servers

Use the Authentication Server Configuration page to control management access based on a list of user names
and passwords configured on a RADIUS or TACACS+ remote access authentication server, and to
authenticate client access for IEEE 802.1X port authentication (see page 63).
FIG. 62
Authentication Server Configuration
Authentication Server Configuration parameters
• Timeout
• Dead Time
RADIUS/TACACS+ Server Configuration
• Enabled
• IP Address
• Port
• Secret
84
The time the switch waits for a reply from an authentication server before it re-
sends the request. (Range: 3-3600 seconds; Default: 15 seconds)
The time after which the switch considers an authentication server to be dead if it
does not reply. (Range: 0-3600 seconds; Default: 300 seconds)
Setting the Dead Time to a value greater than 0 (zero) will cause the
authentication server to be ignored until the Dead Time has expired. However, if
only one server is enabled, it will never be considered dead.
Enables the server specified in this entry.
IP address or IP alias of authentication server.
Network (UDP) port of authentication server used for authentication messages.
(Range: 1-65535; Default: 0)
If the UDP port is set to 0 (zero), the switch will use 1812 for RADIUS
authentication servers, 1813 for RADIUS accounting servers, or 49 for TACACS+
authentication servers.
Encryption key used to authenticate logon access for the client. (Maximum length:
29 characters) To set an empty secret, use two quotes (" "). To use spaces in the
secret, enquote the secret. Quotes in the secret are not allowed.
NXA-ENET8-2POE Gigabit Ethernet Layer 2 PoE Switch

Advertisement

Table of Contents
loading

Table of Contents