Users Guide
– seconds: the range is from 0 to 2147483647. The default is 0 seconds.
• Congure a key for all RADIUS communications between the system and RADIUS server hosts.
CONFIGURATION mode
radius-server key [encryption-type] key
– encryption-type: enter 7 to encrypt the password. Enter 0 to keep the password as plain text.
– key: enter a string. The key can be up to 42 characters long. You cannot use spaces in the key.
• Congure the number of times Dell EMC Networking OS retransmits RADIUS requests.
CONFIGURATION mode
radius-server retransmit retries
– retries: the range is from 0 to 100. Default is 3 retries.
• Congure the time interval the system waits for a RADIUS server host response.
CONFIGURATION mode
radius-server timeout seconds
– seconds: the range is from 0 to 1000. Default is 5 seconds.
To view the conguration of RADIUS communication parameters, use the show running-config command in EXEC Privilege mode.
Monitoring RADIUS
To view information on RADIUS transactions, use the following command.
• View RADIUS transactions to troubleshoot problems.
EXEC Privilege mode
debug radius
Support for Change of Authorization and Disconnect
Messages packets
The Network Access Server (NAS) uses RADIUS to authenticate AAA or dot1x user-access to the switch. The RADIUS service does not
support unsolicited messages sent from the RADIUS server to the NAS.
However, there are many instances in which it is desirable for changes to be made to session characteristics, without requiring the NAS to
initiate the exchange. For example, it may be desirable for administrators to be able to terminate user sessions in progress.
Alternatively, if the user changes authorization level, this change may require that authorization attributes be added or deleted from the
user sessions.
To overcome these limitations, Dell EMC Networking OS provides RADIUS extension commands in order to enable unsolicited messages to
be sent to the NAS. These extension commands provide support for Disconnect Messages (DMs) and Change-of-Authorization (CoA)
packets. DMs cause user sessions to be terminated immediately; whereas, CoA packets modify session authorization attributes such as
VLAN IDs, user privileges, and so on.
724
Security