7-19
Catalyst 2940 Switch Software Configuration Guide
78-15507-02
Chapter7 Configuring Switch-Ba sed Authentication Controlling Switch Access with RADIUS
Configuring RADIUSThis section describes how to configure your switch to support RADIUS. At a mi nim um, y ou mus t
identify the host or hosts that run the RADIUS server software and define the method lists for RADIUS
authentication. You can optionally define method lists for RADIUS authorization and accounting.
A method list defines the sequence and methods to be used to authenticate, to authoriz e, or to keep
accounts on a user. You can use method lists to designate one or more security protocol s to be used (such
as TACACS+ or local username lookup), thus ensuring a backup system if the initial method fails. The
software uses the first method listed to authenticate, to authorize, or to keep accounts on users; if that
method does not respond, the software selects the next method in the list. This process continues until
there is successful communication with a listed method or the method list is exhausted.
You should have access to and should configure a RADIUS server before configuring RADIUS features
on your switch.
This section contains this configuration information:
•Default RADIUS Configuration, page 7-19
•Identifying the RADIUS Server Host, page 7-19 (required)
•Configuring RADIUS Login Authentication, page 7-22 (required)
•Defining AAA Server Groups, page 7-24 (optional)
•Configuring RADIUS Authorization for User Privileged Access and Network Services, page 7-2 6
(optional)
•Starting RADIUS Accounting, page 7-27 (optional)
•Configuring Settings for All RADIUS Servers, page 7-28 (optional)
•Configuring the Switch to Use Vendor-Specific RADIUS Attributes, page 7-28 (optional)
•Configuring the Switch for Vendor-Proprietary RADIUS Server Communication, page 7-29
(optional)
Default RADIUS Configuration
RADIUS and AAA are disabled by default.
To prevent a lapse in security, you cannot configure RADIUS through a network management
application. When enabled, RADIUS can authenticate users accessing the switch through the CLI.
Identifying the RADIUS Server Host
Switch-to-RADIUS-server communication involves several components:
•Host name or IP address
•Authentication destination port
•Accounting destination port
•Key string
•Timeout period
•Retransmission value