Users Guide

Table Of Contents
authentication-key — Enter the radsec shared key in plain text. It is not necessary to enter 0 before
the key.
Default TCP port 2083 on a RADIUS server for RADIUS over TLS communication
Command Mode
CONFIGURATION
Usage Information For RADIUS over TLS authentication, congure the radsec shared key on the server and OS10 switch. The show
running-configuration output displays both the unencrypted and encrypted key in encrypted format.
Congure global settings for the timeout and retransmit attempts allowed on a RADIUS over TLS servers using the
radius-server retransmit and radius-server timeout commands. The no version of this
command removes a RADIUS server from RADIUS over TLS communication.
RADIUS over TLS authentication requires that X.509v3 PKI certicates are congured on a certication authority
and installed on the switch. For more information, including a complete RADIUS over TLS example, see X.509v3
certicates.
Example
OS10(config)# radius-server host 1.5.6.4 tls security-profile radius-admin key
radsec
Supported Releases 10.4.3.0 or later
radius-server retransmit
Congures the number of authentication attempts allowed on RADIUS servers.
Syntax
radius-server retransmit retries
Parameters retries — Enter the number of retry attempts, from 0 to 100.
Default An OS10 switch retransmits a RADIUS authentication request three times.
Command Mode
CONFIGURATION
Usage Information Use this command to globally congure the number of retransmit attempts allowed for authentication requests on
RADIUS servers. The no version of this command resets the value to the default.
Example
OS10(config)# radius-server retransmit 50
Supported Releases 10.2.0E or later
radius-server timeout
Congures the timeout used to resend RADIUS authentication requests.
Syntax
radius-server timeout seconds
Parameters seconds — Enter the time in seconds for retransmission, from 0 to 1000.
Default An OS10 switch stops sending RADIUS authentication requests after ve seconds.
Command Mode
CONFIGURATION
962 Security