EasyManuals Logo

Cisco Catalyst 2960-XR User Manual

Cisco Catalyst 2960-XR
404 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #338 background imageLoading...
Page #338 background image
PurposeCommand or Action
The test username username option enables automated testing of the RADIUS
server connection. The specified username does not need to be a valid user name.
Example:
Switch(config)# radius-server
The key option specifies an authentication and encryption key to use between the
switch and the RADIUS server.
host 172.l20.39.46 test username
user1
To use multiple RADIUS servers, reenter this command for each server.
Configures the authorization and encryption key used between the switch and the
RADIUS daemon running on the RADIUS server.
radius-server key string
Example:
Switch(config)# radius-server key
Step 4
rad123
Specifies the number of unanswered sent messages to a RADIUS server before
considering the server to be inactive. The range of num-tries is 1 to 100.
radius-server dead-criteria tries
num-tries
Step 5
Example:
Switch(config)# radius-server
When you configure the RADIUS server parameters:
Specify the key string on a separate command line.
For key string, specify the authentication and encryption key used between
the switch and the RADIUS daemon running on the RADIUS server. The
dead-criteria tries 30
key is a text string that must match the encryption key used on the RADIUS
server.
When you specify the key string, use spaces within and at the end of the
key. If you use spaces in the key, do not enclose the key in quotation marks
unless the quotation marks are part of the key. This key must match the
encryption used on the RADIUS daemon.
You can globally configure the timeout, retransmission, and encryption key
values for all RADIUS servers by using with the radius-server host global
configuration command. If you want to configure these options on a per-server
basis, use the radius-server timeout, radius-server transmit, and the
radius-server key global configuration commands. For more information,
see the Cisco IOS Security Configuration Guide, Release 12.4 and the Cisco
IOS Security Command Reference, Release 12.4.
You need to configure some settings on the RADIUS server,
including: the switch IP address, the key string to be shared by both
the server and the switch, and the downloadable ACL (DACL). For
more information, see the RADIUS server documentation.
Note
Returns to privileged EXEC mode.end
Example:
Switch(config)# end
Step 6
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
316 OL-29434-01
Configuring Web-Based Authentication
Configuring Switch-to-RADIUS-Server Communication

Table of Contents

Other manuals for Cisco Catalyst 2960-XR

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 2960-XR and is the answer not in the manual?

Cisco Catalyst 2960-XR Specifications

General IconGeneral
Stacking Bandwidth80 Gbps
Layer SupportLayer 2 and Layer 3
Jumbo Frame Support9198 bytes
RAM512 MB
Input Voltage100-240V AC
ModelCatalyst 2960-XR
Uplink Interfaces4 x 1G SFP or 2 x 10G SFP+
Downlink Interfaces24 or 48 x Gigabit Ethernet ports
Power SupplyInternal
MAC Address Table Size16, 000 entries
PoEAvailable on PoE models
Weight4.5 kg
Featuresenergy efficiency
StackingUp to 8 switches
Operating Temperature0 to 45°C

Related product manuals