Dell POWEREDGE M1000E User Manual

Page 314

Advertising
background image

10-52

Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide

OL-13270-03

Chapter 10 Configuring IEEE 802.1x Port-Based Authentication

Configuring IEEE 802.1x Authentication

Step 4

radius-server host ip-address
[acct-port
udp-port] [auth-port
udp-port][test username name
[idle-time time] [ignore-acct-port]
[ignore-auth-port]] [key string]

(Optional) Configure the RADIUS server parameters by using these
keywords:

acct-port udp-port—Specify the UDP port for the RADIUS
accounting server. The range for the UDP port number is from 0 to
65536. The default is 1646.

auth-port udp-port—Specify the UDP port for the RADIUS
authentication server. The range for the UDP port number is from 0
to 65536. The default is 1645.

Note

You should configure the UDP port for the RADIUS accounting
server and the UDP port for the RADIUS authentication server to
nondefault values.

test username name—Enable automated testing of the RADIUS
server status, and specify the username to be used.

idle-time time—Set the interval of time in minutes after which the
switch sends test packets to the server. The range is from 1 to
35791 minutes. The default is 60 minutes (1 hour).

ignore-acct-portDisable testing on the RADIUS-server
accounting port.

ignore-auth-portDisable testing on the RADIUS-server
authentication port.

For key string, specify the authentication and encryption key used
between the switch and the RADIUS daemon running on the
RADIUS server. The key is a text string that must match the
encryption key used on the RADIUS server.

Note

Always configure the key as the last item in the radius-server
host
command syntax because leading spaces are ignored, but
spaces within and at the end of the key are used. If you use spaces
in the key, do not enclose the key in quotation marks unless the
quotation marks are part of the key. This key must match the
encryption used on the RADIUS daemon.

You can also configure the authentication and encryption key by
using the radius-server key {0 string | 7 string | string} global
configuration command.

Step 5

interface interface-id

Specify the port to be configured, and enter interface configuration mode.
For the supported port types, see the

“IEEE 802.1x Authentication

Configuration Guidelines” section on page 10-33

.

Step 6

dot1x critical [recovery action
reinitialize
| vlan vlan-id]

Enable the inaccessible authentication bypass feature, and use these
keywords to configure the feature:

recovery action reinitialize—Enable the recovery feature, and
specify that the recovery action is to authenticate the port when an
authentication server is available.

vlan vlan-id—Specify the access VLAN to which the switch can
assign a critical port. The range is from 1 to 4094.

Step 7

end

Return to privileged EXEC mode.

Command

Purpose

Advertising