McDATA® 4Gb SAN Switch for HP p-Class BladeSystem Command Line Interface Guide (AA-RWEJA-TE, November 2006)
McDATA® 4Gb SAN Switch for HP p-Class BladeSystem command line interface guide 85
9 RADIUS server configuration
Authentication can be performed locally using the switch’s security database, or remotely using a Remote
Dial-In User Service (RADIUS) server such as Microsoft RADIUS. With a RADIUS server, the security
database for the entire fabric resides on the server. In this way, the security database can be managed
centrally, rather than on each switch. You can configure up to five RADIUS servers to provide failover.
You can configure the RADIUS server to authenticate just the switch or both the switch and the initiator
device provided that the device supports authentication. When using a RADIUS server, every switch in the
fabric must have a network connection. A RADIUS server can also be configured to authenticate user
accounts. Refer to ”User Account Configuration” on page 19 for information about user accounts. A secure
connection is required to authenticate user logins with a RADIUS server. Refer to ”Connection security” on
page 69 for information about secure connections.
This section describes the following tasks:
• Displaying RADIUS server information, page 85
• Configuring a RADIUS server on the switch, page 86
Displaying RADIUS server information
Enter the Show Setup Radius command to display RADIUS server information as shown in the
following example. Refer to Table 26 for a description of the RADIUS server configuration parameters.
McDATA4GbSAN #> show setup radius
Radius Information
------------------
DeviceAuthOrder RadiusLocal
UserAuthOrder RadiusLocal
TotalServers 1
Server: 1
ServerIPAddress 10.20.11.8
ServerUDPPort 1812
DeviceAuthServer False
UserAuthServer True
AccountingServer False
Timeout 2
Retries 0
SignPackets False
Secret ********
See the ”Show Setup Radius command” on page 203.