RADIUS Authentication and Accounting

Configuring the Switch for RADIUS Authentication

Determine an acceptable timeout period for the switch to wait for a server to respond to a request. ProCurve recommends that you begin with the default (five seconds).

Determine how many times you want the switch to try contacting a RADIUS server before trying another RADIUS server or quitting. (This depends on how many RADIUS servers you have configured the switch to access.)

Determine whether you want to bypass a RADIUS server that fails to respond to requests for service. To shorten authentication time, you can set a bypass period in the range of 1 to 1440 minutes for non-responsive servers. This requires that you have multiple RADIUS servers accessible for service requests.

Configuring the Switch for RADIUS

Authentication

RADIUS Authentication Commands

Page

aaa authentication

5-8

< console telnet ssh web > < enable login > radius*

5-8

< local none >

5-8

[no] radius-server host < IP-address>

5-10

[auth-port < port-number>]

5-10

[acct-port < port-number>]

5-10, 5-20

[key < server-specific key-string >]

5-10

[no] radius-server key < global key-string>

5-12

radius-server timeout < 1 - 15>

5-12

radius-server retransmit < 1 - 5 >

5-12

[no] radius-server dead-time < 1 - 1440 >

5-14

show radius

5-25

[< host < ip-address>]

5-25

show authentication

5-27

show radius authentication

5-27

*The web authentication option for the web browser interface is available on the 2600, 2600-PWR, and 2800 switches running software releases H.08.58 and I.08.60 or greater.

5-6

Page 106
Image 106
HP 6108, 4100gl, 2650 (J4899A/B), 2600-PWR Configuring the Switch for Radius Authentication, Radius Authentication Commands