Cisco Systems 3560 Manual De Usuario

Descargar
Página de 1288
 
10-50
Catalyst 3560 Switch Software Configuration Guide
OL-8553-06
Chapter 10      Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Authentication
Step 4
radius-server host ip-address 
[acct-port
 udp-port] [auth-port 
udp-port] [test username name 
[idle-time time] [ignore-acct-port
[ignore-auth-port]] [key string]
(Optional) Configure the RADIUS server parameters by using these 
keywords:
  •
acct-port udp-port—Specify the UDP port for the RADIUS 
accounting server. The range for the UDP port number is from 0 to 
65536. The default is 1646.
  •
auth-port udp-port—Specify the UDP port for the RADIUS 
authentication server. The range for the UDP port number is from 0 
to 65536. The default is 1645.
Note
You should configure the UDP port for the RADIUS accounting 
server and the UDP port for the RADIUS authentication server to 
nondefault values.
  •
test username name—Enable automated testing of the RADIUS 
server status, and specify the username to be used.
  •
idle-time time—Set the interval of time in minutes after which the 
switch sends test packets to the server. The range is from 1 to 
35791 minutes. The default is 60 minutes (1 hour).
  •
ignore-acct-portDisable testing on the RADIUS-server 
accounting port.
  •
ignore-auth-portDisable testing on the RADIUS-server 
authentication port.
  •
key string—Specify the authentication and encryption key for all 
RADIUS communication between the switch and the RADIUS 
daemon.
Note
Always configure the key as the last item in the radius-server 
host
 command syntax because leading spaces are ignored, but 
spaces within and at the end of the key are used. If you use spaces 
in the key, do not enclose the key in quotation marks unless the 
quotation marks are part of the key. This key must match the 
encryption used on the RADIUS daemon.
You can also configure the authentication and encryption key by 
using the radius-server key {0 string | 7 string | string} global 
configuration command.
Step 5
dot1x critical {eapol | recovery delay 
milliseconds
(Optional) Configure the parameters for inaccessible authentication 
bypass:
eapol—Specify that the switch sends an EAPOL-Success message when 
the switch successfully authenticates the critical port.
recovery delay milliseconds—Set the recovery delay period during 
which the switch waits to re-initialize a critical port when a RADIUS 
server that was unavailable becomes available. The range is from 1 to 
10000 milliseconds. The default is 1000 milliseconds (a port can be 
re-initialized every second).
Step 6
interface interface-id
Specify the port to be configured, and enter interface configuration mode. 
For the supported port types, see the 
.
Command
Purpose