BLADE OS™ ISCLI Reference HP GbE2c L2/L3 Ethernet Blade Switch Version 5.1 Advanced Functionality Software
BLADE OS 5.1 ISCLI Reference
BMD00115, August 2009 Chapter 4: Configuration Commands
179
Note – If RADIUS is enabled, you must login using RADIUS authentication when connecting via
the console or Telnet/SSH/HTTP/HTTPS. Backdoor for console is always enabled, so you can
connect using noradius and the administrator password even if the backdoor or secure backdoor
are disabled.
If backdoor is enabled, type in noradius as a backdoor to bypass RADIUS checking, and use the
administrator password to log into the switch. The switch allows this even if RADIUS servers are
available.
If secure backdoor is enabled, type in noradius as a backdoor to bypass RADIUS checking, and
use the administrator password to log into the switch. The switch allows this only if RADIUS
servers are not available.
[no] radius-server backdoor
Enables or disables the RADIUS backdoor for Telnet/SSH/HTTP/HTTPS.
The default value is disabled.
To obtain the RADIUS backdoor password for your GbESM, contact your IBM Service and
Support line.
Command mode: Global configuration
[no] radius-server secure-backdoor
Enables or disables the RADIUS back door using secure password for Telnet/SSH/
HTTP/HTTPS. This command does not apply when backdoor (Telnet) is enabled.
Command mode: Global configuration
radius-server enable
Enables the RADIUS server.
Command mode: Global configuration
no radius-server enable
Disables the RADIUS server.
Command mode: Global configuration
show radius-server
Displays the current RADIUS server parameters.
Command mode: All
Table 91 RADIUS Configuration Commands
Command Syntax and Usage