Configuring a TACACS+ Server Introduction
6-87
Software Reference for SwitchBlade x3100 Series Switches (Access and Security)
SET RADIUS SERVER (SEC)
Syntax
SET RADIUS SERVER={ipaddress-list|hostname-list|ALL}[SECRET=secret]
[AUTHPORT=1..65535] [ACCTPORT=1..65535][RETRIES=0..10]
[TIMEOUT=1..60] [AUTHENTICATION={ON|OFF}][ACCOUNTING={ON|OFF}]
[PRIORITY=1..65535] [TYPE={{LOGIN|DOT1X}[,...]|ALL}]
Description Allows the user to change the settings of one or more existing configured RADIUS serv-
ers. Users can change the servers' shared secret, port number, retries and timeout values.
This command is used to add a RADIUS server to the Port Authentication configuration.
Refer to Section 6.9.
Options The following table gives the range of values for each option that can be specified with
this command and a default value (if applicable).
Option Description Default Value
SERVER Used to specify one or more IP addresses or hostnames
to send RADIUS authentication requests to.
SECRET Used to specify the secret that is shared with the
RADIUS server for use in authentication requests. The
secret must be an alphanumeric string of 64 characters
or less in length.
AUTHPORT Specifies the UDP port to which RADIUS authentication
requests should be directed to on the RADIUS server. if
not specified, the default is port 1812, the IANA-
assigned port for RADIUS
1812
ACCTPORT Specifies the UDP port to which RADIUS accounting
requests should be directed to on the RADIUS server.
1813
RETRIES Specifies the number of times a user authentication
request should be retried. Once the maximum number
of retries has been reached without a response from the
RADIUS server, the next RADIUS or TACACS+ server
or local database is consulted to determine the validity
of the authentication attempt.
3
TIMEOUT Used to specify the number of seconds to wait for a
response back from the RADIUS server. If no response
is received within the timeout period either the request
is retried if there are retries remaining, the next
RADIUS or TACACS+ server is contacted or authenti-
cation is attempted against the local user database.
5 seconds