27.10.2013 Views

2.5.2 - Force10 Networks

2.5.2 - Force10 Networks

2.5.2 - Force10 Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Command Syntax Command Mode Purpose<br />

priority priority TACACS<br />

Configuration<br />

timeout TACACS<br />

Configuration<br />

To delete a TACACS+ server host, use the no tacacs-server host ip-address command.<br />

Configuring a RADIUS Connection<br />

Determine the order in which the server will be used with multiple<br />

authentication servers, with 0 being the highest priority.<br />

Range: zero (0) to 65535. Default = 0<br />

Range: 1 to 30 seconds. Default = global setting<br />

Remote Authentication Dial-In User Service (RADIUS) is another means of port-based network access<br />

control. The switch acts as an intermediary to a RADIUS server, which provides both an authentication<br />

and an accounting function to maintain data on service usages.<br />

Under RFC 2866, an extension was added to the RADIUS protocol giving the client the ability to deliver<br />

accounting information about a user to an accounting server. Exchanges to the accounting server follow<br />

similar guidelines to that of an authentication server, but the flows are much simpler.<br />

At the start of service for a user, the RADIUS client configured to use accounting sends an accounting start<br />

packet specifying the type of service that it will deliver. Once the server responds with an<br />

acknowledgement, the client periodically transmits accounting data. At the end of service delivery, the<br />

client sends an accounting stop packet allowing the server to update specified statistics. The server again<br />

responds with an acknowledgement.<br />

Setting up a connection to a server running Remote Authentication Dial-In User Service (RADIUS) is<br />

basically the same as the TACACS+ procedure described above (see Choosing a TACACS+ Server and<br />

Authentication Method on page 143 and Configuring TACACS+ Server Connection Options on page 145),<br />

where you identify the address of the authentication server and you specify an ordered set of authentication<br />

methods. The following RADIUS commands are documented in the Security chapter of the SFTOS<br />

Command Reference:<br />

• radius accounting mode: Enable the RADIUS accounting function.<br />

• radius server host: Configure the RADIUS authentication and accounting server.<br />

• radius server key: Configure the shared secret between the RADIUS client and the RADIUS<br />

accounting / authentication server.<br />

• radius server msgauth: Enable the message authenticator attribute for a specified server.<br />

• radius server primary: Configure the primary RADIUS authentication server for this RADIUS<br />

client.<br />

• radius server retransmit: Set the maximum number of times a request packet is re-transmitted<br />

when no response is received from the RADIUS server.<br />

• radius server timeout: Set the timeout value (in seconds) after which a request must be<br />

retransmitted to the RADIUS server if no response is received.<br />

146 Providing User Access Security

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!