You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

This object provides an option for configuring users on a remote RADIUS server and authenticating login attempts with that RADIUS server. The authenticating user should be part of the Administrator group.

Command Syntax

The CLI syntax to configure RADIUS-based authentication is shown below.

% set oam radiusAuthentication
   radiusNasIp <NAS IP address>
   radiusServerIp <server IP address>
   radiusServerPort <server IP port number> 
   radiusSharedSecret <shared key, 8 to 128 characters>

Command Parameters

Radius Authentication Parameters

Parameter

Length/Range

Description

radiusAuthentication

N/A

Use this object to configure RADIUS-based user authentication.

radiusNasIp

N/A

NAS IP address. (default is ‘0.0.0.0’)

radiusServerIp

N/A

RADIUS server IP address. (default is ‘0.0.0.0’)

radiusServerPort

1-65535

RADIUS server IP port. (default = 1812)

radiusSharedSecret

8-128

RADIUS server shared key.

Command Example

The following example configures 

Unable to show "metadata-from": No such page "_space_variables"
to communicate with the external RADIUS server for user authentication:

% set oam radiusAuthentication radiusNasIp 10.22.33.44 radiusServerIp 10.22.33.45 radiusServerPort 1813 radiusSharedSecret 123456789abcdefg
 
% show oam radiusAuthentication
   radiusServerIp 10.22.33.45;
   radiusServerPort 1813;
   radiusNasIp 10.22.33.44;
   radiusSharedSecret $3$6FW+rC82fxREk0RMtOl7ba1iNQtDLM2a;

The radiusSharedSecret results in the 'show' command will be encrypted.

The following example enables external RADIUS authentication:

% set system admin TXSBC01a externalAuthenticationEnabled true
  • No labels