Cisco Cisco Packet Data Gateway (PDG)
TWAN Profile Configuration Mode Commands
radius ▀
Command Line Interface Reference, StarOS Release 17 ▄
8931
radius
This command allows you to specify the IP address and shared secret of the RADIUS accounting and authentication
client from which RADIUS accounting and authentication requests are received.
client from which RADIUS accounting and authentication requests are received.
Product
SaMOG
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > TWAN Profile Configuration
configure > context context_name > twan-profile twan_profile_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-twan-profile)#
Syntax
radius { client ipv4 | ipv6_address[/mask ] [ encrypted ] key value [ disconnect-message
[ dest-port destination_port_number ] ] [ dictionary { custom70 | custom71 } ] }
[ dest-port destination_port_number ] ] [ dictionary { custom70 | custom71 } ] }
no radius { client ipv4/ipv6_address[/mask ] }
no
Removes the previously configured RADIUS client address or IP VRF under this TWAN profile.
client { ipv4 | ipv6_address[/mask ] }
Specifies the IP address of the RADIUS client (WLC).
ipv4 | ipv6_address
must be an IP address in IPv4 dotted-decimal or IPv6 colon-separated-hexadecimal
notation.
mask
must be a subnet mask bit of the IP address. The mask bit is a numeric value which
corresponds to the number of bits in the subnet mask.
Important:
A maximum of 16 RADIUS clients can be configured under one TWAN profile.
[ encrypted ] key value
Specifies the shared secret key used to authenticate the client to the servers. The
encrypted
keyword
indicates that the key specified is encrypted.
The key
The key
value
must be an alphanumeric string of 1 through 127 characters without encryption, and 1
through 288 characters with encryption enabled.
The
The
encrypted
keyword is intended only for use by the chassis while saving configuration scripts. The
system displays the encrypted keyword in the configuration file as a flag that the variable following the
key
keyword is the encrypted version of the plaint text key. Only the encrypted key is saved as part of the
configuration file.
configuration file.