Command Reference Guide

Error! Use the Home tab to apply 見出し 1 to the text that you want to appear here. 88
RADIUS server configuration
NOTE: See the N8406-026 10Gb Intelligent L3 Switch Application Guide for information on RADIUS.
The following table describes the RADIUS Server Configuration commands.
Table 80 RADIUS Server Configuration commands
Command
Description
[no] radius-server primary-host
<IP address> {data-port|mgt-
port} key <1-32 characters>
Sets the primary RADIUS server address and shared secret
between the switch and the RADIUS server(s).
Command mode: Global configuration
[no] radius-server secondary-
host <IP address> {data-
port|mgt-port} key <1-32
characters>
Sets the secondary RADIUS server address and shared secret
between the switch and the RADIUS server(s).
Command mode: Global configuration
radius-server port <UDP port
number>
Enter the number of the User Datagram Protocol (UDP) port to
be configured, between 1500-3000. The default is 1645.
Command mode: Global configuration
radius-server retransmit <1-3>
Sets the number of failed authentication requests before
switching to a different RADIUS server. The range is 1-3 requests.
The default is 3 requests.
Command mode: Global configuration
radius-server timeout <1-10>
Sets the amount of time, in seconds, before a RADIUS server
authentication attempt is considered to have failed. The range
is 1-10 seconds. The default is 3 seconds.
Command mode: Global configuration
[no] radius-server telnet-
backdoor
Enables or disables the RADIUS back door for telnet/SSH/
HTTP/HTTPS. The default is disabled. This command does not
apply when secure backdoor is enabled.
Command mode: Global configuration
[no] radius-server secure-
backdoor
Enables or disables the RADIUS back door using secure password
for telnet/SSH/ HTTP/HTTPS. The default is disabled. This command
does not apply when backdoor (telnet) is enabled.
Command mode: Global configuration
radius-server enable
Enables the RADIUS server.
Command mode: Global configuration
no radius-server enable
Disables the RADIUS server. This is the default.
Command mode: Global configuration
show radius-server
Displays the current RADIUS server parameters.
Command mode: All except User EXEC
IMPORTANT: If RADIUS is enabled, you must login using RADIUS authentication when connecting
via the console or Telnet/SSH/HTTP/HTTPS. Backdoor for console is always enabled, so you can
connect using noradius and the administrator password even if the backdoor (telnet-backdoor) or
secure backdoor (secure-backdoor) are disabled.
If Telnet backdoor is enabled (telnet-backdoor), type in noradius as a backdoor to bypass
RADIUS checking, and use the administrator password to log into the switch. The switch allows this
even if RADIUS servers are available.
If secure backdoor is enabled (secure-backdoor), type in noradius as a backdoor to bypass
RADIUS checking, and use the administrator password to log into the switch. The switch allows this
only if RADIUS servers are not available.