Web and MAC Authentication
Configuring the Switch To Access a RADIUS Server
timeout <1-15>
The server response timeout interval in seconds.
Default: 5 seconds
retransmit <1-5>
Specifies the maximum number of retransmission
attempts. Default: 3 attempts
dead-time <1-1440> (in minutes)
If the switch does not receive a response from a specific
RADIUS server, the switch does not send any new authen-
tication requests to that server until the dead-time has
expired. During a new authentication attempt, the
switch bypasses a specified RADIUS server if a dead-time
period is running on the switch because of a previous
failure to receive a response from that server. The switch
continues to send new authentication requests to any
other configured RADIUS servers not affected by a dead-
time condition.
Dead-time begins with the end of the last timeout in the
last retransmit attempt of the failed authentication ses-
sion. When dead-time is set to zero, there is no dead-time
and the switch will not bypass a RADIUS server that has
failed to respond to an earlier authentication attempt.
Default: 0 (zero)
Syntax: radius-server host < ip-address > key <server-specific key-string>
[no] radius-server host < ip-address > key
Optional. Specifies an encryption key for use during
authentication (or accounting) sessions with the speci-
fied server. This key must match the encryption key used
on the RADIUS server. Use this command only if the
specified server requires a different encryption key than
configured for the global encryption key, above.
The no form of the command removes the key configured
for a specific server.
For example, to configure the switch to access a RADIUS server at IP address
192.168.32.11 using a server-specific shared secret key of ‘2Pzo22’
3-16