11.07.2015 Views

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 2<strong>Catalyst</strong> <strong>3750</strong>-E <strong>and</strong> <strong>3560</strong>-E <strong>Switch</strong> <strong>Cisco</strong> <strong>IOS</strong> Comm<strong>and</strong>sradius-server hostComm<strong>and</strong> ModesGlobal configurationComm<strong>and</strong> HistoryRelease12.2(35)SE2ModificationThis comm<strong>and</strong> was introduced.Usage GuidelinesWe recommend that you configure the UDP port for the RADIUS accounting server <strong>and</strong> the UDP portfor the RADIUS authentication server to nondefault values.Use the test username name keywords to enable automatic server testing of the RADIUS server status<strong>and</strong> to specify the username to be used.You can configure the authentication <strong>and</strong> encryption key by using the radius-server host ip-address keystring or the radius-server key {0 string | 7 string | string} global configuration comm<strong>and</strong>. Alwaysconfigure the key as the last item in this comm<strong>and</strong>.ExamplesThis example shows how to configure 1500 as the UDP port for the accounting server <strong>and</strong> 1510 as theUDP port for the authentication server:<strong>Switch</strong>(config)# radius-server host 1.1.1.1 acct-port 1500 auth-port 1510This example shows how to configure the UDP port for the accounting server <strong>and</strong> the authenticationserver, enable automated testing of the RADIUS server status, specify the username to be used, <strong>and</strong>configure a key string:<strong>Switch</strong>(config)# radius-server host 1.1.1.2 acct-port 800 auth-port 900 test usernameaaafail idle-time 75 key abc123You can verify your settings by entering the show running-config privileged EXEC comm<strong>and</strong>.Related Comm<strong>and</strong>sComm<strong>and</strong>dot1x critical (global configuration)dot1x critical (interfaceconfiguration)radius-server key {0 string | 7 string |string}show running-configDescriptionConfigures the parameters for the inaccessible authenticationbypass feature.Enables the inaccessible authentication bypass feature on aninterface <strong>and</strong> configures the access VLAN to which the switchassigns the critical port when the port is in thecritical-authentication state.Sets the authentication <strong>and</strong> encryption key for all RADIUScommunications between the router <strong>and</strong> the RADIUS daemon.For syntax information, select <strong>Cisco</strong> <strong>IOS</strong> Security Comm<strong>and</strong>Reference, Release 12.2 > Server Security Protocols >RADIUS Comm<strong>and</strong>s.Displays the operating configuration. For syntax information,use this link to the <strong>Cisco</strong> <strong>IOS</strong> Release 12.2 Comm<strong>and</strong>Reference listing page:http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/prod_comm<strong>and</strong>_reference_list.htmlSelect the <strong>Cisco</strong> <strong>IOS</strong> Comm<strong>and</strong>s Master List, Release 12.2to navigate to the comm<strong>and</strong>.OL-9776-08<strong>Catalyst</strong> <strong>3750</strong>-E <strong>and</strong> <strong>3560</strong>-E <strong>Switch</strong> Comm<strong>and</strong> Reference2-459

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!