Enterasys Matrix DFE-Gold Series Configuration Guide 26-1
26
RADIUS Snooping Configuration
ThischapterdescribestheRADIUSSnoopingcommandsandhowtousethem.
Understanding RADIUS Snooper
RADIUSSnooper(RS)allowsanetworkmanagertomanagedownstreamconnections,whenthe
fullcomplementofEnterasys’SecureNetworkscapabilitiesisnotdeployedatthenetworkedge.
Thisallowsforthedeploymentoflessfeaturerichedgedevicestoperformbasicaccesscontrolat
thenetworkedge,whilestillprovidingcomplexuser
andservicebasedCoSprovisioning,
authorization,andusageauditingtothesession.
ManydownstreamdevicesauthenticatethelocalsessionwithaRADIUSserverthatresides
upstreamofthedistribution‐tierdevice.RADIUSrequestandresponseframesfromthesedevices
transitthedistribution‐tierdevice.TheinterceptionofthisRADIUStrafficallows
thedistribution‐
tierdevicetobuildanauthenticatedsessionfortheend‐station,asthoughitwasdirectly
connected.SessionsdetectedbyRSfunctionidenticallytolocalauthenticatedsessions fromthe
perspectiveoftheEnterasysMultiAuthframework.
TheunencryptedtrafficofthedownstreamdevicespassesthroughthedevicerunningRS,
allowing
suchMultiAuthandSecureNetworkfeaturesassession‐timeout,idle‐timeout,filter‐ID
attributesandVLAN‐tunnelattributestobeappliedtothetraffic.
TheclientsendsaRADIUSAccess‐RequestframetotheRADIUSservertoinitiatethe
authenticationprocess.ThisrequestframecontainstheCalling‐Station‐IDattribute.TheCalling
‐
Station‐ID,containingtheMACaddress,iscapturedbytheRS.Thesessionisdefinedbythe
attributesreturnedbytheRADIUSserverintheAccess‐Acceptframe.Theidle‐timeoutand
session‐timeoutdictatetheendofthesession,justasifthesessionwasdirectlyconnectedtothe
distributed‐tierdevicerunningRS.
TheRSflowtablecontainsflowsforeachvalidsessionforthissystem.TheclientIPaddressand
authenticatingRADIUSserverIP addressaremanuallyenteredintotheRADIUSflowtableonthe
RSenabledswitch.WhenaninvestigatedRADIUSframetransitstheRSenabledport
witha
matchintheflowtable,asessioniscreated.Thesessionbecomesactivewhenitseesaresponsefor
thesessionmatchfromtheRADIUSserver.
Aconfigurabletimerdeterminestheamountoftimethefirmwarewillwaitbeforeterminatinga
sessionbecausenoresponsewasseenfromthe
RADIUSserver.
DefaultandnetworkadministratorconfigurableRADIUSpacketdropsettingsexistbasedupon
resourceissuesandvalidationfailure.Packetdropforvalidationfailurescanbeconfiguredona
port‐by‐portbasis.
ToconfigureRSonaswitch:
Note: An Enterasys Feature Guide document that contains a complete discussion on RADIUS
Snooping configuration exists at the following Enterasys web site: http://www.enterasys.com/
support/manuals/