Configuration Examples for Controlling Switch Access with RADIUS
Command
debug aaa pod
debug aaa subsys
debug cmdhd [detail | error | events]
For detailed information about the fields in these displays, see the command reference for this release.
Configuration Examples for Controlling Switch Access with
RADIUS
Examples: Identifying the RADIUS Server Host
This example shows how to configure one RADIUS server to be used for authentication and another to be
used for accounting:
Switch(config)# radius-server host 172.29.36.49 auth-port 1612 key rad1
Switch(config)# radius-server host 172.20.36.50 acct-port 1618 key rad2
This example shows how to configure host1 as the RADIUS server and to use the default ports for both
authentication and accounting:
Switch(config)# radius-server host host1
Example: Using Two Different RADIUS Group Servers
In this example, the switch is configured to recognize two different RADIUS group servers (group1 and
group2). Group1 has two different host entries on the same RADIUS server configured for the same services.
The second host entry acts as a fail-over backup to the first entry.
Switch(config)# radius-server host 172.20.0.1 auth-port 1000 acct-port 1001
Switch(config)# radius-server host 172.10.0.1 auth-port 1645 acct-port 1646
Switch(config)# aaa new-model
Switch(config)# aaa group server radius group1
Switch(config-sg-radius)# server 172.20.0.1 auth-port 1000 acct-port 1001
Switch(config-sg-radius)# exit
Switch(config)# aaa group server radius group2
Switch(config-sg-radius)# server 172.20.0.1 auth-port 2000 acct-port 2001
Switch(config-sg-radius)# exit
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
102
Purpose
Displays information for troubleshooting POD
packets.
Displays information for troubleshooting POD
packets.
Displays information for troubleshooting command
headers.
Configuring RADIUS
OL-29048-01