Configuring RADIUS Login Authentication in network devices

Revision as of 14:31, 14 May 2021 by Shin (talk | contribs)

Configuring RADIUS Login Authentication is a little bit different according to the image version of your devices. The below is examples and you must verify how to configure from the manual of your devices.

Cisco Catalyst IOS 12.x Switches [1]
Switch(config)# aaa new-model
Switch(config)# radius-server host <imRAD IP address> auth-port 1812 key acct-port 1813 <shared secret>
Switch(config)# aaa authentication login default radius local
Switch(config)# aaa authorization network default radius
Switch(config)# aaa authorization exec default radius
Switch(config)# aaa accounting network default start-stop radius
Switch(config)# aaa accounting exec default start-stop radius
Cisco Catalyst IOS 15 Switches [2]

File:2960x_chapter_0110.pdf

Switch(config)# aaa new-model
Switch(config)# radius-server host <imRAD IP address> auth-port 1812 acct-port 1813 key <shared secret>
Switch(config)# aaa authentication login default radius local
Switch(config)# aaa authorization network radius
Switch(config)# aaa authorization exec radius
Switch(config)# aaa accounting network start-stop radius
Switch(config)# aaa accounting exec start-stop radius
Switch(config)# radius-server attribute 31 send nas-port-detail
Extreme EXOS[3]
# configure radius mgmt-access primary server <imRAD IP address> client-ip <CLIENT_IP> vr VR-Default
# configure radius mgmt-access primary shared-secret <shared-secret>
# enable radius mgmt-access
# enable radius-accounting mgmt-access