User Manual
Table Of Contents
- S3300 Smart Managed Pro Switch
- Contents
- 1. Getting Started
- Getting Started with the NETGEAR Switch
- Switch Management Interface
- Connect the Switch to the Network
- Discover a Switch in a Network with a DHCP Server
- Discover a Switch in a Network without a DHCP Server
- Configure the Network Settings on the Administrative System
- Access the Management Interface from a Web Browser
- Understand the User Interfaces
- Interface Naming Convention
- Configuring Interface Settings
- Online Help
- Registration
- 2. Configure System Information
- 3. Configuring Switching
- 4. Configuring Routing
- 5. Configuring Quality of Service
- 6. Managing Device Security
- 7. Maintenance
- 8. Monitoring the System
- A. Configuration Examples
- B. Hardware Specifications and Default Values
Managing Device Security
244
S3300 Smart Managed Pro Switch
RADIUS Server Configuration
Use the RADIUS Server Configuration screen to view and configure various settings for the
current RADIUS server configured on the system.
To add a primary RADIUS server with a shared secret:
1. Select Security > Management Security > RADIUS > Server Configuration.
2. In the Server Address field, specify the IP address of the RADIUS server to add.
3. In the Authentication Port field, specify the UDP port number the server uses to verify the
RADIUS server authentication. The valid range is 1–65535. The default value is 1812.
4. From the Secret Configured list, select Yes.
You must select Yes before you can configure the RADIUS secret. After you add the
RADIUS server, this field indicates whether the shared secret for this server has been
configured.
5. In the Secret field, type the shared secret text string used for authenticating and encrypting
all RADIUS communications between the switch and the RADIUS server.
This secret must match the RADIUS encryption.
6. From the Active list, select Primary.
7. From the Message Authenticator list, enable or disable the message authenticator attribute
for the selected server.
The message authenticator adds protection to RADIUS messages by using an MD5 hash
to encrypt each message. The shared secret is used as the key, and if the message fails
to be verified by the RADIUS server, it is discarded.
8. Click the Add button.
The following table describes the RADIUS server statistics available on the screen.
Table 86. RADIUS server statistics
Field Description
Server Address This displays all configured RADIUS servers.
Round Trip Time The time interval, in hundredths of a second, between the most recent
Access-Reply/Access-Challenge and the Access-Request that matched it from
this RADIUS authentication server.
Access Requests The number of RADIUS Access-Request packets sent to this server. This
number does not include retransmissions.
Access Retransmissions The number of RADIUS Access-Request packets retransmitted to this server.
Access Accepts The number of RADIUS Access-Accept packets, including both valid and invalid
packets, that were received from this server.
Access Rejects The number of RADIUS Access-Reject packets, including both valid and invalid
packets, that were received from this server.










