EasyManuals Logo

Cisco Catalyst 3750-E User Manual

Cisco Catalyst 3750-E
1414 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #257 background imageLoading...
Page #257 background image
9-29
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-08
Chapter 9 Configuring Switch-Based Authentication
Controlling Switch Access with RADIUS
To remove the specified RADIUS server, use the no radius-server host hostname | ip-address global
configuration command.
This example shows how to configure one RADIUS server to be used for authentication and another to
be
used for accounting:
Switch(config)# radius-server host 172.29.36.49 auth-port 1612 key rad1
Switch(config)# radius-server host 172.20.36.50 acct-port 1618 k
ey rad2
This example shows how to configure host1 as the RADIUS server and to use the default ports for both
authentication and accounting:
Switch(config)# radius-server host host1
Note You also need to configure some settings on the RADIUS server. These settings include the IP address
of the switch and the key string to be shared by both the server and the switch. For more information,
see the RADIUS server documentation.
Configuring RADIUS Login Authentication
To configure AAA authentication, you define a named list of authentication methods and then apply that
list to various ports. The method list defines the types of authentication to be performed and the sequence
in which they are performed; it must be applied to a specific port before any of the defined authentication
methods are performed. The only exception is the default method list (which, by coincidence, is named
default). The default method list is automatically applied to all ports except those that have a named
method list explicitly defined.
A method list describes the sequence and authentication methods to be queried to authenticate a user.
Y
ou can designate one or more security protocols to be used for authentication, thus ensuring a backup
system for authentication in case the initial method fails. The software uses the first method listed to
authenticate users; if that method fails to respond, the software selects the next authentication method in
the method list. This process continues until there is successful communication with a listed
authentication method or until all defined methods are exhausted. If authentication fails at any point in
this cycle—meaning that the security server or local username database responds by denying the user
access—the authentication process stops, and no other authentication methods are attempted.
Beginning in privileged EXEC mode, follow these steps to configure login authentication. This
pr
ocedure is required.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
aaa new-model Enable AAA.

Table of Contents

Other manuals for Cisco Catalyst 3750-E

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 3750-E and is the answer not in the manual?

Cisco Catalyst 3750-E Specifications

General IconGeneral
SeriesCatalyst 3750-E
Switching Capacity32 Gbps
Stacking Bandwidth32 Gbps
StackWise PlusYes
Layer SupportLayer 3
MAC Address Table Size12, 000 entries
RAM256 MB
Flash Memory64 MB
Memory256 MB DRAM, 64 MB Flash
Operating Temperature32 to 113°F (0 to 45°C)
Ports48 10/100/1000 Ethernet ports
Form FactorRack-mountable
Jumbo Frame SupportYes
Input Voltage100 to 240 VAC
Storage Temperature-25 to 70 °C
Relative Humidity10 to 90% non-condensing

Related product manuals