2-31 
# Configure RADIUS scheme radius1. 
[Switch] radius scheme radius1 
[Switch-radius-radius1] primary authentication 10.110.91.164 1812 
[Switch-radius-radius1] primary accounting 10.110.91.164 1813 
[Switch-radius-radius1] key authentication aabbcc 
[Switch-radius-radius1] server-type extended 
[Switch-radius-radius1] user-name-format with-domain 
[Switch-radius-radius1] quit 
# In the test domain, specify the authentication method for 802.1X users as radius1, and that for telnet 
users as local. 
[Switch] domain test 
[Switch-isp-test] scheme lan-access radius-scheme radius1 
[Switch-isp-test] scheme login local 
[Switch-isp-test] quit 
# Configure the test domain as the default domain. 
[Switch] domain default enable test 
# Enable 802.1X globally. 
[Switch] dot1x 
# Enable 802.1X on interface Ethernet 1/0/1. 
[Switch] interface ethernet 1/0/1 
[Switch-Ethernet1/0/1] dot1x 
Remote RADIUS Authentication of Telnet/SSH Users 
 
 
The configuration procedure for remote authentication of SSH users by RADIUS server is similar to that 
for Telnet users. The following text only takes Telnet users as example to describe the configuration 
procedure for remote authentication. 
 
Network requirements 
In the network environment shown in Figure 2-3, you are required to configure the switch so that the 
Telnet users logging into the switch are authenticated by the RADIUS server. 
z  A RADIUS authentication server with IP address 10.110.91.164 is connected to the switch.  
z  On the switch, set the shared key it uses to exchange messages with the authentication RADIUS 
server to "aabbcc". 
z  A CAMS server is used as the RADIUS server. You can select extended as the server-type in a 
RADIUS scheme. 
z  On the RADIUS server, set the shared key it uses to exchange messages with the switch to 
"aabbcc," set the authentication port number, and add Telnet user names and login passwords.