Cisco Systems 78-11424-03 Specifying a Secondary Radius Server, Config# no radius-server primary

Page 30

Chapter 2 Configuring User Profiles and CSS Parameters

Configuring the CSS as a Client of a RADIUS Server

To remove a primary RADIUS server, enter:

(config)# no radius-server primary

Specifying a Secondary RADIUS Server

Use the radius-server secondary command to specify a secondary RADIUS server to authenticate user information from the CSS RADIUS client (console or virtual authentication). The CSS directs authentication requests to the secondary RADIUS server when the specified RADIUS primary server is unavailable. The syntax for this global configuration mode command is:

radius-server secondary ip_address secret string {auth-port port_number}

Note Configuration of a secondary RADIUS server is optional.

Options and variables include:

secondary ip_address - The IP address or host name for the secondary RADIUS server. Enter the address in either dotted-decimal IP notation (for example, 192.168.11.1) or mnemonic host-name format (for example, myhost.mydomain.com).

secret string - The shared secret text string between the secondary RADIUS server and the CSS RADIUS client. The shared secret allows authentication transactions between the client and secondary RADIUS server to occur. Enter the shared secret as a case-sensitive string with no spaces (16 characters maximum).

auth-portport_number - Optional. The UDP port on the primary RADIUS server allocated to receive authentication packets from the RADIUS client. Valid entries are 0 to 65535. The default is 1645.

 

Cisco Content Services Switch Basic Configuration Guide

2-30

78-11424-03

Image 30
Contents Configuring User Profiles and CSS Parameters Configuring User Profiles Configuring User Terminal Parameters # show profileConfiguring Terminal Idle Configuring Terminal LengthConfiguring Terminal More Configuring Terminal Netmask-FormatConfiguring Terminal Timeout Using Expert Mode Changing the CLI Prompt Modifying the History BufferDisplaying the History Buffer Copying the Running Profile to the Default-Profile Copying and Saving User Profiles# show history Copying the Running Profile to a User Profile Copying the Running Profile to an FTP ServerCopying the Running Profile to a Tftp Server Boot Configuration Mode Commands # copy profile tftp 192.168.3.6 \home\bobo\bobo-profileConfig-boot#remove ap0410008 Specifying the Primary Boot ConfigurationConfig-boot#unpack ap0500002.adi Unpacking an ArrowPoint Distribution Image ADIConfiguring the Primary Boot-File Configuring the Primary Boot-TypeConfig-boot#primary config-path f/bootdir Configuring the Primary Config-PathConfig-boot#no primary boot-type Config-boot#no primary config-pathConfig-boot#secondary boot-file ap0410008 Specifying the Secondary Boot ConfigurationSpecifying the Secondary Boot-File Config-boot#secondary boot-file ?Config-boot#secondary boot-type boot-via-disk Specifying the Secondary Boot-TypeSpecifying the Secondary Config-Path Config-boot#no secondary boot-typeConfig-boot#secondary config-path f/bootdir Config-boot#no secondary config-pathConfiguring the Passive SCM IP Address Config-boot#passive ip addressConfiguring the Passive SCM Primary Boot File Configuring the Passive SCM Primary Boot TypeConfiguring the Passive SCM Primary Configuration Path Configuring the Passive SCM Secondary Boot FileConfig-boot#passive secondary boot-type boot-via-disk Configuring the Passive SCM Secondary Boot TypeConfiguring the Passive SCM Secondary Configuration Path Config-boot#no passive secondary boot-typeConfig-boot#no passive secondary config-path Configuring the Passive SCM Subnet MaskConfig-boot#passive secondary config-path c/bootdir Config-boot#passive subnet maskShowing the Boot Configuration Booting the CSS from a Network DriveConfig-boot#show boot-config Configuring Network Boot for a Primary SCM Config-boot#primary boot-type boot-via-network bootrecordConfig-boot#primary config-path e/adidirectory Configuring Network Boot for a Passive SCM Showing Network Boot Configurations Config# show boot-configConfig# host CSS11150-LML Configuring Host NameConfiguring Idle Timeout Config# no host CSS11150-LMLConfig# idle timeout Config# no idle timeoutConfiguring the CSS as a Radius Client Specifying a Primary Radius Server Config# no radius-server primary Specifying a Secondary Radius ServerConfig# no radius-server secondary Configuring the Radius Server TimeoutsConfiguring the Radius Server Retransmits Config# radius-server timeoutShowing Radius Server Configuration Information Configuring the Radius Server Dead-TimeConfig# show radius config primary Config# show radius stats secondaryDescribes the fields in the show radius stat output Controlling Remote Access to the CSS Config# virtual authentication disallowed Config# admin-shutdownConfig# restrict telnet Config# find ip address Finding an IP AddressConfiguring Flow Parameters Configuring Permanent Connections for TCP PortsResetting Fast Ethernet and Gigabit Ethernet Ports Reclaiming Reserved Telnet and FTP Control PortsConfig# flow statistics Config# flow reserve-cleanConfig# no flow reserve-clean Showing Flow StatisticsConfiguring Content API Creating XML CodeActioninterface ethernet-6/action Actionip address 10.10.104.1/16/actionXML Document Example Controlling Access to the CSS Http Server Parsing the XML CodePublishing the XML Code to the CSS Testing the Output of the XML Code Configuring the Command Scheduler Config# no cmd-sched Config# no cmd-sched periodicshowsShowing Configured Command Scheduler Records Config# show cmd-schedWhere to Go Next

78-11424-03 specifications

Cisco Systems 78-11424-03 is a highly regarded networking component designed to enhance and streamline network connectivity in enterprise environments. As part of Cisco's extensive suite of networking products, this component is tailored to meet the growing demands of modern businesses for reliable and efficient data transmission solutions.

One of the standout features of the Cisco 78-11424-03 is its scalability. It is designed to accommodate the ever-evolving needs of organizations, allowing for seamless integration into large and dynamic networks. This is particularly advantageous for businesses that anticipate growth and require robust networking infrastructure that can expand without significant modifications.

Another key characteristic of this product is its enhanced security features. In an age where data breaches and cyber threats are prevalent, Cisco has prioritized security within its product offerings. The 78-11424-03 incorporates advanced security protocols and encryption methods, ensuring that data transmitted across the network remains secure. This is vital for organizations that handle sensitive information and must comply with stringent regulatory standards.

The technology behind the Cisco 78-11424-03 includes support for various networking protocols, enhancing its versatility. For instance, it adheres to both IPv4 and IPv6 standards, ensuring compatibility with legacy systems while also future-proofing the network for emerging technologies. This adaptability is crucial as companies transition to newer internet protocol versions to accommodate the increasing number of connected devices.

Performance is another hallmark of the Cisco 78-11424-03. It offers impressive throughput and low latency, enabling the rapid transfer of data even within congested networks. This high-performance capability is particularly beneficial for applications that demand real-time data processing, such as video conferencing and cloud computing.

Furthermore, Cisco's commitment to energy efficiency is evident in the design of the 78-11424-03. By minimizing power consumption without compromising performance, it supports organizations' sustainability initiatives while reducing operational costs.

In summary, Cisco Systems 78-11424-03 represents a fusion of scalability, security, advanced technology, impressive performance, and energy efficiency. It serves as a cornerstone for modern networking solutions, enabling businesses to thrive in an increasingly connected and digital world. As organizations continue to navigate the complexities of network management, products like the 78-11424-03 will remain integral to their success and operational efficiency.