Switch Security 6-67

To configure Radius proxy server support:

1.Select Security > Radius Server from the main menu.

2.Ensure the Configuration tab is selected.

3.Select the Proxy Servers tab from the bottom portion of the Configuration tab.

The Proxy Servers tab displays the user ID suffix (index), IP address and port number of the switch’s existing proxy server configurations.

4.To remove an existing Radius proxy server configuration from the table of configurations available to the switch, select the configuration and click the Delete button.

5.To create a new Radius proxy server configuration, click the Add button at the bottom of the screen.

a. Create a new User ID Suffix serving as an abbreviation for the configuration to differentiate it from other configurations with similar attributes.

b. Specify the IP Address of the new Radius proxy server.

c. Enter the TCP/IP port number to be used by the proxy Radius server.

d. Specify a Radius Shared Secret for authenticating the Radius client.

e. Shared secrets are used to verify Radius messages (with the exception of the Access-Request message) are sent by a Radius -enabled device configured with the same shared secret. The shared secret is a case-sensitive string that can include letters, numbers, or symbols. Make the shared secret at least 22 characters long to protect the Radius server from brute-force attacks. The max length of the shared secret is 31 characters.

f. Refer to the Status field for the current state of the requests made from applet. This field displays

error messages if something goes wrong in the transaction between the applet and the switch.

g. Click OK to use the changes to the running configuration and close the dialog.

h. Click Cancel to close the dialog without committing updates to the running configuration

6.9.4 Configuring Radius Authentication and Accounting

Deploy one or more Radius servers to manage security and retrieve accounting information within the switch managed network. Radius accounting supplies administrators with user data as Radius sessions are started and terminated.

To define the Radius authentication and accounting configuration:

Page 291
Image 291
Motorola WS5100 manual Configuring Radius Authentication and Accounting