EasyManua.ls Logo

ProCurve 2610 - Page 68

ProCurve 2610
454 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Web and MAC Authentication
Configuring the Switch To Access a RADIUS Server
timeout <1-15>
The server response timeout interval in seconds.
Default: 5 seconds
retransmit <1-5>
Specifies the maximum number of retransmission
attempts. Default: 3 attempts
dead-time <1-1440> (in minutes)
If the switch does not receive a response from a specific
RADIUS server, the switch does not send any new authen-
tication requests to that server until the dead-time has
expired. During a new authentication attempt, the
switch bypasses a specified RADIUS server if a dead-time
period is running on the switch because of a previous
failure to receive a response from that server. The switch
continues to send new authentication requests to any
other configured RADIUS servers not affected by a dead-
time condition.
Dead-time begins with the end of the last timeout in the
last retransmit attempt of the failed authentication ses-
sion. When dead-time is set to zero, there is no dead-time
and the switch will not bypass a RADIUS server that has
failed to respond to an earlier authentication attempt.
Default: 0 (zero)
Syntax: radius-server host < ip-address > key <server-specific key-string>
[no] radius-server host < ip-address > key
Optional. Specifies an encryption key for use during
authentication (or accounting) sessions with the speci-
fied server. This key must match the encryption key used
on the RADIUS server. Use this command only if the
specified server requires a different encryption key than
configured for the global encryption key, above.
The no form of the command removes the key configured
for a specific server.
For example, to configure the switch to access a RADIUS server at IP address
192.168.32.11 using a server-specific shared secret key of ‘2Pzo22’
3-16

Table of Contents

Related product manuals