CHAPTE R
12-1
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
12
Configuring Switch-Based Authentication

Finding Feature Information

Your software release may not support all the features documented in this chapter. For the latest feature
information and caveats, see the release notes for your platform and software release.
Use Cisco Feature Navigator to find information about platform support an d Cisco software image
support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on
Cisco.com is not required.

Prerequisites for Configuring Switch-Based Authentication

If you configure an SDM template and then perform the show sdm prefer command, the template
currently in use displays.
You must enter the reload privileged EXEC command to have your configured SDM template take
effect.
You should have access to and should configure a RADIUS server before configuring RADIUS
features on your switch.
At a minimum, you must identify the host or hosts that run the RADIUS server so ftware and define
the method lists for RADIUS authentication. You can optionally define method lists for RADIUS
authorization and accounting.

Restrictions for Configuring Switch-Based Authentication

To use the Radius CoA interface, a session must already exist on the switch. CoA can be used to
identify a session and enforce a disconnect request. The update affects only the specified session.
To use Secure Shell, you must install the cryptographic (encrypted) software im age on your switch.
You must obtain authorization to use this feature and to download the cryptographic software files
from Cisco.com. For more information, see the release notes for this release.