EasyManua.ls Logo

Cisco Catalyst 4500 Series - Configuring RADIUS

Cisco Catalyst 4500 Series
1610 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
44-100
Software Configuration Guide—Release IOS XE 3.3.0SG and IOS 15.1(1)SG
OL-25340-01
Chapter 44 Configuring 802.1X Port-Based Authentication
Controlling Switch Access with RADIUS
Configuring RADIUS
This section describes how to configure your switch to support RADIUS. At a minimum, you must
identify the host or hosts that run the RADIUS server software and define the method lists for RADIUS
authentication. You can optionally define method lists for RADIUS authorization and accounting.
A method list defines the sequence and methods to be used to authenticate, to authorize, or to keep
accounts on a user. You can use method lists to designate one or more security protocols to be used (such
as TACACS+ or local username lookup), thus ensuring a backup system if the initial method fails. The
software uses the first method listed to authenticate, to authorize, or to keep accounts on users. If that
method does not respond, the software selects the next method in the list. This process continues until
there is successful communication with a listed method or the method list is exhausted.
You should have access to and should configure a RADIUS server before configuring RADIUS features
on your switch.
Default RADIUS Configuration, page 44-100
Identifying the RADIUS Server Host, page 44-100 (required)
Configuring RADIUS Login Authentication, page 44-103 (required)
Defining AAA Server Groups, page 44-105 (optional)
Configuring RADIUS Authorization for User Privileged Access and Network Services, page 44-107
(optional)
Starting RADIUS Accounting, page 44-108 (optional)
Configuring Settings for All RADIUS Servers, page 44-109 (optional)
Configuring the Switch to Use Vendor-Specific RADIUS Attributes, page 44-109 (optional)
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication, page 44-111
(optional)
Configuring CoA on the Switch, page 44-112
Monitoring and Troubleshooting CoA Functionality, page 44-113
Configuring RADIUS Server Load Balancing, page 44-113 (optional)
Default RADIUS Configuration
RADIUS and AAA are disabled by default.
To prevent a lapse in security, you cannot configure RADIUS through a network management
application. When enabled, RADIUS can authenticate users accessing the switch using the CLI.
Identifying the RADIUS Server Host
Switch-to-RADIUS-server communication involves several components:
Hostname or IP address
Authentication destination port
Accounting destination port
Key string
Timeout period
Retransmission value

Table of Contents

Other manuals for Cisco Catalyst 4500 Series

Related product manuals