User Manual

94
Users Manual of XGS-6350-24X4C
password.
The ACCEPT or REJECT response is bundled with additional data that is used for EXEC or network
authorization. You must first complete RADIUS authentication before using RADIUS authorization. The
additional data included with the ACCEPT or REJECT packets consists of the following:
Services that the user can access, including Telnet, rlogin, or local-area transport (LAT) connections, and PPP,
Serial Line Internet Protocol (SLIP), or EXEC services.
Connection parameters,include the host or client IP address, access list, and user timeouts.
6.2.2 RADIUS Configuration Task List
To configure RADIUS on your switch or access server, you must perform the following tasks:
Use the aaa authentication global configuration command to define method lists for RADIUS
authentication. For more information about using the aaa authentication command, refer to the
"Configuring Authentication" chapter.
Use line and interface commands to enable the defined method lists to be used. For more information,
refer to the "Configuring Authentication" chapter.
The following configuration tasks are optional:
You may use the aaa authorization global command to authorize specific user functions. For more
information about using the aaa authorization command, refer to the chapter "Configuring
Authorization."
You may use the aaa accounting command to enable accounting for RADIUS connections. For more
information about using the aaa accounting command, refer to the chapter "Configuring Accounting."
6.2.3 RADIUS Configuration Task List
Configuring Switch to RADIUS Server Communication
Configuring Switch to Use Vendor-Specific RADIUS Attributes
Specifying RADIUS Authentication
Specifying RADIUS Authorization
Specifying RADIUS Accounting
6.2.4 RADIUS Configuration Task
6.2.4.1 Configuring Switch to RADIUS Server Communication
The RADIUS host is normally a multiuser system running RADIUS server software from Livingston, Merit,
Microsoft, or another software provider.
A RADIUS server and a Cisco router use a shared secret text string to encrypt passwords and exchange
responses.