10-26
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-21521-01
Chapter 10 Configuring Switch-Based Authentication
Controlling Switch Access with RADIUS
When the Auth Manager command handler on the stack master receives a valid disable-port command,
it verifies this information before returning a CoA-ACK message:
the need for a port-disable
the port-id (found in the local session context)
The switch attempts to disable the port.
If the port-disable operation is successful, the signal that triggered the port-disable is removed from the
standby stack master.
If the stack master fails before the port-disable operation completes, the port is disabled after stack
master change-over based on the original command (which is subsequently removed).
If the stack master fails before sending a CoA-ACK message, the new stack master treats the re-sent
command as a new command.
Configuring RADIUS
This section describes how to configure your switch to support RADIUS. At a minimum, you must
identify the host or hosts that run the RADIUS server software and define the method lists for RADIUS
authentication. You can optionally define method lists for RADIUS authorization and accounting.
A method list defines the sequence and methods to be used to authenticate, to authorize, or to keep
accounts on a user. You can use method lists to designate one or more security protocols to be used (such
as TACACS+ or local username lookup), thus ensuring a backup system if the initial method fails. The
software uses the first method listed to authenticate, to authorize, or to keep accounts on users; if that
method does not respond, the software selects the next method in the list. This process continues until
there is successful communication with a listed method or the method list is exhausted.
You should have access to and should configure a RADIUS server before configuring RADIUS features
on your switch.
These sections contain this configuration information:
Default RADIUS Configuration, page 10-27
Identifying the RADIUS Server Host, page 10-27 (required)
Configuring RADIUS Login Authentication, page 10-29 (required)
Defining AAA Server Groups, page 10-31 (optional)
Configuring RADIUS Authorization for User Privileged Access and Network Services, page 10-33
(optional)
Starting RADIUS Accounting, page 10-34 (optional)
Configuring Settings for All RADIUS Servers, page 10-35 (optional)
Configuring the Switch to Use Vendor-Specific RADIUS Attributes, page 10-35 (optional)
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication, page 10-36
(optional)
Configuring CoA on the Switch, page 10-37
Monitoring and Troubleshooting CoA Functionality, page 10-38
Configuring RADIUS Server Load Balancing, page 10-39 (optional)