Fabric OS Administrator's Guide v7.0.0 (53-1002148-02, June 2011)

116 Fabric OS Administrator’s Guide
53-1002148-02
The authentication model using RADIUS and LDAP
5
Displaying the current RADIUS configuration
1. Connect to the switch and log in using an account with admin permissions.
2. Enter the aaaConfig
--show command.
If a configuration exists, its parameters are displayed. If RADIUS or LDAP service is not
configured, only the parameter heading line is displayed. Parameters include:
Configuring local authentication as backup
It is useful to enable local authentication so that the switch can take over authentication locally if
the RADIUS or LDAP servers fail to respond because of power outage or network problems.
Example of enabling local authentication, enter the following command for RADIUS
switch:admin> aaaconfig --authspec "radius;local" --backup
Example for LDAP
switch:admin> aaaconfig --authspec "ldap;local" --backup
For details about this command see Table 15 on page 100.
When local authentication is enabled and the RADIUS or LDAP servers fail to respond, you can log
in to the default switch accounts (admin and user) or any user-defined account. You must know the
passwords of these accounts.
When the command succeeds, the event log indicates that local database authentication is
disabled or enabled.
Position The order in which servers are contacted to provide service.
Server The server names or IPv4 or IPv6 addresses. IPv6 is not supported when using PEAP
authentication.
Port The server ports.
Secret The shared secrets.
Timeouts The length of time servers have to respond before the next server is contacted.
Authentication The type of authentication being used on servers.