Configuring Radius Authentication/Authorization Servers - H3C S3100 Series Operation Manual

H3c s3100 series ethernet switches operation manual
Hide thumbs Also See for S3100 Series:
Table of Contents

Advertisement

Operation
Enable RADIUS
authentication port
Create a RADIUS scheme
and enter its view
A RADIUS scheme can be referenced by multiple ISP domains simultaneously.

Configuring RADIUS Authentication/Authorization Servers

Table 2-12 Configure RADIUS authentication/authorization servers
Operation
Enter system view
Create a RADIUS scheme and
enter its view
Set the IP address and port
number of the primary RADIUS
authentication/authorization
server
Set the IP address and port
number of the secondary
RADIUS
authentication/authorization
server
Command
radius client enable
radius scheme
radius-scheme-name
Command
system-view
radius scheme
radius-scheme-name
primary authentication
{ ip-address | ipv6
ipv6-address } [ port-number ]
[ key string ]
secondary authentication
{ ip-address | ipv6
ipv6-address } [ port-number ]
[ key string ]
2-13
Remarks
Optional
By default, RADIUS authentication port is
enabled.
Required
By default, a RADIUS scheme named
"system" has already been created in the
system.
Remarks
Required
By default, a RADIUS scheme
named "system" has already
been created in the system.
Required
By default, the IP address and
UDP port number of the
primary server are 0.0.0.0 and
1812 respectively for a newly
created RADIUS scheme.
Optional
By default, the IP address and
UDP port number of the
secondary server are 0.0.0.0
and 1812 respectively for a
newly created RADIUS
scheme.

Advertisement

Chapters

Table of Contents
loading

Table of Contents