Switch Security
2.Click the Authentication tab.
3.Define whether the IPSec VPN user authentication is conducted using a Radius Server (by selecting the Radius radio button), by a
4.Enter a NAS ID for the NAS port.
The profile database on the Radius server consists of user profiles for each physical network access server (NAS) port connected. Every profile contains a profile matched to a username representing a physical port. When the switch authorizes users, it queries the user profile database using a username representative of the physical NAS port making the connection.
5.If the Radius Server radio button was selected, the following server information displays when the Radius tab is selected:
Type | Displays whether this target server is a primary or secondary Radius Server. |
Server IP Address | Displays the IP address of the server acting as the data source for the Radius server. |
Port | Displays the TCP/IP port number for the server acting as a data source for the Radius. The |
| default port is 389. |
Shared Secret | Displays a shared secret used for each host or subnet authenticating against the RADIUS |
| server. The shared secret can be up to 7 characters in length. |
6.Select an existing Radius Server and click the Edit button to modify its designation as a primary or secondary Radius Server, IP address, port, NAS ID and shared secret password.
Motorola recommends only modifying an existing Radius Server when its current configuration is longer viable for providing user authentication. Otherwise, define a new Radius Server.