EasyManuals Logo

Cisco Catalyst 2960-XR User Manual

Cisco Catalyst 2960-XR
404 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #88 background imageLoading...
Page #88 background image
PurposeCommand or Action
timeout is set with the radius-server host command, the setting of the
radius-server timeout command is used.
1612 key rad1
(Optional) For retransmit retries, specify the number of times a RADIUS request
is resent to a server if that server is not responding or responding slowly. The range
is 1 to 1000. If no retransmit value is set with the radius-server host command,
the setting of the radius-server retransmit global configuration command is used.
(Optional) For key string, specify the authentication and encryption key used
between the switch and the RADIUS daemon running on the RADIUS server.
The key is a text string that must match the encryption key used on the RADIUS
server. Always configure the key as the last item in the radius-server host
command. Leading spaces are ignored, but spaces within and at the end of the
key are used. If you use spaces in your key, do not enclose the key in quotation
marks unless the quotation marks are part of the key.
Note
To configure the switch to recognize more than one host entry associated with a single
IP address, enter this command as many times as necessary, making sure that each UDP
port number is different. The switch software searches for hosts in the order in which
you specify them. Set the timeout, retransmit, and encryption key values to use with the
specific RADIUS host.
Returns to privileged EXEC mode.end
Example:
Switch(config)# end
Step 3
Related Topics
RADIUS Server Host, on page 62
Defining AAA Server Groups, on page 68
Configuring Settings for All RADIUS Servers, on page 73
Configuring RADIUS Login Authentication
Beginning in privileged EXEC mode, follow these steps to configure RADIUS login authentication:
Before You Begin
To secure the switch for HTTP access by using AAA methods, you must configure the switch with the ip
http authentication aaa global configuration command. Configuring AAA authentication does not secure
the switch for HTTP access by using AAA methods.
For more information about the ip http authentication command, see the Cisco IOS Security Command
Reference, Release 12.4.
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
66 OL-29434-01
Configuring RADIUS
Configuring RADIUS Login Authentication

Table of Contents

Other manuals for Cisco Catalyst 2960-XR

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 2960-XR and is the answer not in the manual?

Cisco Catalyst 2960-XR Specifications

General IconGeneral
Stacking Bandwidth80 Gbps
Layer SupportLayer 2 and Layer 3
Jumbo Frame Support9198 bytes
RAM512 MB
Input Voltage100-240V AC
ModelCatalyst 2960-XR
Uplink Interfaces4 x 1G SFP or 2 x 10G SFP+
Downlink Interfaces24 or 48 x Gigabit Ethernet ports
Power SupplyInternal
MAC Address Table Size16, 000 entries
PoEAvailable on PoE models
Weight4.5 kg
Featuresenergy efficiency
StackingUp to 8 switches
Operating Temperature0 to 45°C

Related product manuals