RADIUS Config - Part
RADIUS Config - Part
distributed client/server system allows you to secure networks against unauthorized access. In the Cisco
implementation, RADIUS clients run on Cisco Nexus 5000Seriesswitches and send authentication and
accounting requeststo a central RADIUSserver that contains all user authentication and network service
access information. RADIUS Network Environments RADIUS can be implemented in a variety of network
environments that require high levels of security while maintaining network access for remote users.
You can use RADIUS in the following network environments that require access security: • Networks
with multiple-vendor network devices, each supporting RADIUS. For example, network devices from
several vendors can use a single RADIUS server-based security database. • Networks already using
RADIUS. You can add a Nexus 5000 Series switch with RADIUS to the network. This action might be the
first step when you make a transition to a AAA server. • Networks that require resource accounting. You
can use RADIUSaccounting independent of RADIUSauthentication or authorization. The RADIUS
accounting functions allow data to be sent at the start and end of services, indicating the amount of
resources (such as time, packets, bytes, and so on) used during the session. An Internet service provider
(ISP) might use a freeware-based version of the RADIUS access control and accounting software to meet
special security and billing needs. Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-
16597-01 1 • Networks that support authentication profiles. Using the RADIUS server in your network,
you can configure AAA authentication and set up per-user profiles.Per-user profiles enable the Nexus
5000Seriesswitch to better manage ports using their existing RADIUSsolutions and to efficiently manage
shared resourcesto offer differentservice-level agreements. RADIUS Operation When a user attempts to
log in and authenticate to a Cisco Nexus 5000 Series switch using RADIUS, the following process occurs:
1 The user is prompted for and enters a username and password. 2 The username and encrypted
password are sent over the network to the RADIUS server. 3 The user receives one of the following
responses from the RADIUS server: • ACCEPT—The user is authenticated. • REJECT—The user is not
authenticated and is prompted to reenter the username and password, or access is denied. •
CHALLENGE—A challenge is issued by the RADIUS server. The challenge collects additional data from the
user. • CHANGE PASSWORD—A request is issued by the RADIUS server, asking the user to select a new
password. The ACCEPT or REJECT response is bundled with additional data that is used for EXEC or
network authorization. You must first complete RADIUS authentication before using RADIUS
authorization. The additional data included with the ACCEPT or REJECT packets consists of the following:
• Services that the user can access, including Telnet, rlogin, or local-area transport (LAT) connections,
and Point-to-Point Protocol (PPP), Serial Line Internet Protocol (SLIP), or EXEC services. • Connection
parameters, including the host or client IPv4 or IPv6 address, access list, and user timeouts. RADIUS
Server Monitoring An unresponsive RADIUS server can cause delay in processing of AAA requests. You
can configure the Cisco Nexus 5000 Series switch to periodically monitor a RADIUS server to check
whether it is responding (or alive) to save time in processing AAA requests. The Cisco Nexus 5000 Series
switch marks unresponsive RADIUSservers as dead and does notsend AAA requeststo any dead
RADIUSservers. The switch periodically monitors the dead RADIUS servers and brings them to the alive
state once they respond. This monitoring process verifiesthat a RADIUSserver isin a working state before
real AAA requests are sent its way. Whenever Cisco Nexus 5000 Series Switch CLI Software Configuration
Guide 2 OL-16597-01 Configuring RADIUS RADIUS Operation a RADIUS server changes to the dead or
alive state, a Simple Network Management Protocol (SNMP) trap is generated and the Cisco Nexus 5000
Series switch displays an error message that a failure is taking place. Figure 1: RADIUS Server States The
monitoring interval for alive servers and dead servers are different and can be configured by the user.
The RADIUS server monitoring is performed by sending a test authentication request to the RADIUS
server. Note Vendor-Specific Attributes The Internet Engineering Task Force (IETF) draft standard
specifies a method for communicating vendor-specific attributes (VSAs) between the network access
server and the RADIUS server. The IETF uses attribute 26. VSAs allow vendors to support their own
extended attributes that are not suitable for general use. The Cisco RADIUSimplementation supports
one vendor-specific option using the format recommended in the specification. The Cisco vendor ID is 9,
and the supported option is vendor type 1, which is named cisco-av-pair. The value is a string with the
following format: protocol : attribute separator value * The protocol is a Cisco attribute for a particular
type of authorization, the separator is an equal sign (=) for mandatory attributes, and an asterisk (*)
indicates optional attributes. When you use RADIUSserversfor authentication on a Cisco Nexus
5000Seriesswitch, the RADIUSprotocol directsthe RADIUSserver to return user attributes,such as
authorization information, along with authentication results. This authorization information is specified
through VSAs. The following VSA protocol options are supported by the Cisco Nexus 5000 Series switch:
• Shell— Used in access-accept packets to provide user profile information. • Accounting— Used in
accounting-request packets. If a value contains any white spaces, you should enclose the value within
double quotation marks. The Nexus 5000 Series switch supports the following attributes: Cisco Nexus
5000 Series Switch CLI Software Configuration Guide OL-16597-01 3 Configuring RADIUS Vendor-Specific
Attributes • roles—Lists all the roles to which the user belongs. The value field is a string that lists the
role names delimited by white space. • accountinginfo—Stores accounting information in addition to
the attributes covered by a standard RADIUS accounting protocol. This attribute is sent only in the VSA
portion of the Account-Request frames from the RADIUS client on the switch. It can be used only with
the accounting protocol data units (PDUs). Prerequisites for RADIUS RADIUS has the following
prerequisites: • Obtain IPv4 or IPv6 addresses or host names for the RADIUS servers. • Obtain preshared
keys from the RADIUS servers. • Ensure that the Cisco Nexus 5000 Series switch is configured as a
RADIUS client of the AAA servers. Guidelines and Limitations for RADIUS RADIUS has the following
guidelines and limitations: • You can configure a maximum of 64 RADIUS servers on the Cisco Nexus
5000 Series switch. Configuring RADIUS Servers To configure RADIUS servers, perform this task:
Procedure Step 1 Establish the RADIUS server connections to the Cisco Nexus 5000 Series switch. Step 2
Configure the preshared secret keys for the RADIUS servers. Step 3 If needed, configure RADIUS server
groups with subsets of the RADIUS servers for AAA authentication methods. Step 4 If needed, configure
any of the following optional parameters: • Dead-time interval. • Allow specification of a RADIUS server
at login. • Transmission retry count and timeout interval. • Accounting and authentication attributes.
Step 5 If needed, configure periodic RADIUS server monitoring. Cisco Nexus 5000 Series Switch CLI
Software Configuration Guide 4 OL-16597-01 Prerequisites for RADIUS Vendor-Specific Attributes
Configuring RADIUS Server Hosts You must configure the IPv4 or IPv6 address or the host name for each
RADIUS server that you want to use for authentication. All RADIUSserver hosts are added to the default
RADIUSserver group. You can configure up to 64 RADIUS servers. To configure a RADIUS server host,
perform this task: Procedure Command or Action Purpose Step 1 switch# configure terminal Enters
configuration mode. Specifies the IPv4 or IPv6 address or hostname for a RADIUS server. switch(config)
#radius-server host {ipv4-address | ipv6-address | host-name} Step 2 Step 3 switch(config)# exit Exits
configuration mode. (Optional) Displays the RADIUS server configuration. Step 4 switch# show radius-
server (Optional) Copies the running configuration to the startup configuration. switch# copy running-
config startup-config Step 5 The following example shows how to configure a RADIUS server host:
switch# configure terminal switch(config)# radius-server host 10.10.1.1 switch(config)# exit switch#
show radius-server switch# copy running-config startup-config Configuring RADIUS Global Preshared
Keys You can configure preshared keys at the global level for all servers used by the Cisco Nexus 5000
Series switch. A preshared key is a shared secret text string between the switch and the RADIUS server
hosts. To configure global preshared keys, obtain the preshared key values for the remote RADIUS
servers and perform this task: Procedure Command or Action Purpose Step 1 switch# configure terminal
Enters configuration mode. Specifies a preshared key for all RADIUS servers. You can specify a clear text
( 0 ) or encrypted ( 7 ) preshared key. switch(config)# radius-server key [0 | 7] key-value Step 2 The
default format is clear text. The maximum length is 63 characters. By default, no preshared key is
configured. Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01 5 Configuring
RADIUS Configuring RADIUS Server Hosts Command or Action Purpose Step 3 switch(config)# exit Exits
configuration mode. (Optional) Displays the RADIUS server configuration. Step 4 switch# show radius-
server The preshared keys are saved in encrypted form in the running configuration. Use the show
running-config command to display the encrypted preshared keys. Note (Optional) Copies the running
configuration to the startup configuration. switch# copy running-config startup-config Step 5 The
following example shows how to configure the preshared key values for a remote RADIUS server:
switch# configure terminal switch(config)# radius-server key 0 QsEfThUkO switch(config)# exit switch#
show radius-server switch# copy running-config startup-config Configuring RADIUS Server Preshared
Keys You can configure preshared keysfor a RADIUSserver. A preshared key is a shared secret textstring
between the Cisco Nexus 5000 Series switch and the RADIUS server host. To configure radius server
preshared keys, obtain the preshared key values for the remote RADIUS servers and perform this task:
Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode.
Specifies a preshared key for a specific RADIUS server. You can specify a clear text ( 0 ) or encrypted ( 7 )
switch(config)# radius-serverhost {ipv4-address | ipv6-address | host-name} key [0 | 7] key-value Step 2
preshared key. The default format is clear text. The maximum length is 63 characters. This preshared key
is used instead of the global preshared key. Step 3 switch(config)# exit Exits configuration mode.
(Optional) Displays the RADIUS server configuration. Step 4 switch# show radius-server The preshared
keys are saved in encrypted form in the running configuration. Use the show running-config command
to display the encrypted preshared keys. Note Cisco Nexus 5000 Series Switch CLI Software
Configuration Guide 6 OL-16597-01 Configuring RADIUS Configuring RADIUS Server Preshared Keys
Command or Action Purpose (Optional) Copies the running configuration to the startup configuration.
switch# copy running-config startup-config Step 5 The following example shows how to configure a
preshared keys for a RADIUS server: switch# configure terminal switch(config)# radius-server host
10.10.1.1 key 0 PlIjUhYg switch(config)# exit switch# show radius-server switch# copy running-config
startup-config Configuring RADIUS Server Groups You can specify one or more remote AAA servers for
authentication using server groups. All members of a group must belong to the RADIUS protocol. The
servers are tried in the same order in which you configure them. You can configure these server groups
at any time but they only take effect when you apply them to an AAA service. To configure radius server
groups, perform this task: Procedure Command or Action Purpose Step 1 switch# configure terminal
Enters configuration mode. Creates a RADIUS server group and enters the RADIUS server group
configuration submode for that group. The switch(config)# aaa group server radius group-name Step 2
group-name argument is a case-sensitive alphanumeric string with a maximum length of 127 characters.
Configures the RADIUS server as a member of the RADIUS server group. switch(config-radius)# server
{ipv4-address | ipv6-address | server-name} Step 3 If the specified RADIUS server is not found, configure
it using the radius-server host command and retry this command. (Optional) Configures the monitoring
dead time. The default is 0 minutes. The range is from 1 through 1440. switch(config-radius)# deadtime
minutes Step 4 If the dead-time interval for a RADIUS server group is greater than zero (0), that value
takes precedence over the global dead-time value. See the example that shows how to configure
periodic RADIUS server monitoring. Note Step 5 switch(config-radius)# exit Exits configuration mode.
Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01 7 Configuring RADIUS
Configuring RADIUS Server Groups Command or Action Purpose (Optional) Displays the RADIUS server
group configuration. switch(config) #show radius-server group [group-name] Step 6 (Optional) Copies
the running configuration to the startup configuration. switch(config)# copy running-config startup-
config Step 7 The following example shows how to configure a RADIUS server group: switch# configure
terminal switch(config)# aaa group server radius RadServer switch(config-radius)# server 10.10.1.1
switch(config-radius)# deadtime 30 switch(config-radius)# use-vrf management switch(config-radius)#
exit switch(config)# show radius-server group switch(config)# copy running-config startup-config
Allowing Users to Specify a RADIUS Server at Login To allow users to specify a RADIUS server at login,
perform this task: Procedure Command or Action Purpose Step 1 switch# configure terminal Enters
configuration mode. Allows users to specify a RADIUS server to send the authentication request when
logging in. The default is disabled. switch(config)# radius-server directed-request Step 2 Step 3
switch(config)# exit Exits configuration mode. (Optional) Displays the directed request configuration.
switch# show radius-server directed-request Step 4 (Optional) Copies the running configuration to the
startup configuration. switch# copy running-config startup-config Step 5 Configuring the Global RADIUS
Transmission Retry Count and Timeout Interval You can configure a global retransmission retry count
and timeout interval for all RADIUSservers. By default, a switch retries transmission to a RADIUS server
only once before reverting to local authentication. You can increase this number up to a maximum of
five retries per server. The timeout interval determines how long the Cisco Nexus 5000 Series switch
waits for responses from RADIUS servers before declaring a timeout failure. To configure the global
RADIUS transmission retry count and timeout interval, perform this task: Cisco Nexus 5000 Series Switch
CLI Software Configuration Guide 8 OL-16597-01 Configuring RADIUS Allowing Users to Specify a RADIUS
Server at Login Procedure Command or Action Purpose Step 1 switch# configure terminal Enters
configuration mode. Specifies the retransmission count for all RADIUS servers. The default
retransmission count is 1 and the range is from 0 to 5. switch(config)# radius-server retransmit count
Step 2 Specifies the transmission timeout interval for RADIUS servers. The default timeout interval is 5
seconds and the range is from 1 to 60 seconds. switch(config)# radius-server timeout seconds Step 3
Step 4 switch(config)# exit Exits configuration mode. (Optional) Displays the RADIUS server
configuration. Step 5 switch# show radius-server (Optional) Copies the running configuration to the
startup configuration. switch# copy running-config startup-config Step 6 Configuring the RADIUS
Transmission Retry Count and Timeout Interval for a Server By default, a Cisco Nexus 5000 Series switch
retries transmission to a RADIUS server only once before reverting to local authentication. You can
increase this number up to a maximum of five retries per server. You can also set a timeout interval that
the switch waits for responses from RADIUS servers before declaring a timeout failure. To configure
RADIUS transmission retry count and timeout interval for a server, perform this task: Procedure
Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Specifiesthe
retransmission count for a specific server. The default is the global value. #switch(config)# radius-server
host {ipv4-address |ipv6-address | host-name} retransmit count Step 2 The retransmission count value
specified for a RADIUS server overrides the count specified for all RADIUS servers. Note Specifies the
transmission timeout interval for a specific server. The default is the global value. switch(config)#
switch(config)# radius-server host {ipv4-address Step 3 |ipv6-address | host-name} timeout seconds The
timeout interval value specified for a RADIUS server overrides the interval value specified for all RADIUS
servers. Note Step 4 switch(config)# exit Exits configuration mode. Cisco Nexus 5000 Series Switch CLI
Software Configuration Guide OL-16597-01 9 Configuring RADIUS Configuring the RADIUS Transmission
Retry Count and Timeout Interval for a Server Command or Action Purpose (Optional) Displays the
RADIUS server configuration. Step 5 switch# show radius-server (Optional) Copies the running
configuration to the startup configuration. switch# copy running-config startup-config Step 6 The
following example shows how to configure RADIUS transmission retry count and timeout interval for a
server: switch# configure terminal switch(config)# radius-server host server1 retransmit 3
switch(config)# radius-server host server1 timeout 10 switch(config)# exit switch# show radius-server
switch# copy running-config startup-config Configuring Accounting and Authentication Attributes for
RADIUS Servers You can specify that a RADIUS server is to be used only for accounting purposes or only
for authentication purposes. By default, RADIUS servers are used for both accounting and
authentication. You can also specify the destination UDP port numbers where RADIUS accounting and
authentication messages should be sent. To configure the accounting and authentication attributes for
RADIUS servers, perform this task: Procedure Command or Action Purpose Step 1 switch# configure
terminal Enters configuration mode. (Optional) Specifies a UDPport to use for RADIUSaccounting
messages.The default UDP port is 1812. The range is from 0 to 65535. switch(config) #radius-server host
{ipv4-address | ipv6-address | host-name} acct-port udp-port Step 2 (Optional) Specifies that the
specified RADIUS server it to be used only for accounting purposes. The default is both accounting and
authentication. switch(config)# radius-server host {ipv4-address | ipv6-address | host-name} accounting
Step 3 (Optional) Specifies a UDP port to use for RADIUS authentication messages. The default UDP port
is 1812. The range is from 0 to 65535. switch(config)# radius-server host {ipv4-address | ipv6-address |
host-name} auth-port udp-port Step 4 (Optional) Specifiesthat the specified RADIUSserver only be used
for authentication purposes. The default is both accounting and authentication. switch(config)# radius-
server host {ipv4-address | ipv6-address | host-name} authentication Step 5 Step 6 switch(config)# exit
Exits configuration mode. Cisco Nexus 5000 Series Switch CLI Software Configuration Guide 10 OL-
16597-01 Configuring RADIUS Configuring Accounting and Authentication Attributes for RADIUS Servers
Command or Action Purpose (Optional) Displays the RADIUS server configuration. Step 7 switch(config)#
show radius-server (Optional) Copies the running configuration to the startup configuration. switch#
copy running-config startup-config Step 8 The following example shows how to configure the accounting
and authentication attributes for a RADIUS server: switch# configure terminal switch(config)# radius-
server host 10.10.1.1 acct-port 2004 switch(config)# radius-server host 10.10.1.1 accounting
switch(config)# radius-server host 10.10.2.2 auth-port 2005 switch(config)# radius-server host 10.10.2.2
authentication switch(config)# exit switch# show radius-server switch# copy running-config startup-
config Configuring Periodic RADIUS Server Monitoring You can monitor the availability of RADIUS
servers. These parameters include the username and password to use for the server and an idle timer.
The idle timer specifies the interval during which a RADIUS server receives no requests before the Cisco
Nexus 5000 Series switch sends out a test packet. You can configure this option to test servers
periodically. For security reasons, we recommend that you do not configure a test username that is the
same as an existing user in the RADIUS database. Note The test idle timer specifies the interval during
which a RADIUS server receives no requests before the Cisco Nexus 5000 Series switch sends out a test
packet. The default idle timer value is 0 minutes. When the idle time interval is 0 minutes, the Cisco
Nexus 5000 Series switch does not perform periodic RADIUS server monitoring. Note Procedure
Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Specifies
parametersforserver monitoring. The default username is test and the default password is test. The
switch(config)# radius-server host {ipv4-address | ipv6-address | Step 2 default value for the idle timer is
0 minutes. The valid range is 0 to 1440 minutes. host-name} test {idle-time minutes |
passwordpassword [idle-time minutes] | username name [password password [idle-time minutes]]} For
periodic RADIUSserver monitoring, you must set the idle timer to a value greater than 0. Note Cisco
Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01 11 Configuring RADIUS
Configuring Periodic RADIUS Server Monitoring Command or Action Purpose Specifies the number of
minutes before the Cisco Nexus 5000 Series switch checks a RADIUS server switch(config)# radius-
serverdeadtime minutes Step 3 that was previously unresponsive. The default value is 0 minutes. The
valid range is 1 to 1440 minutes. Step 4 switch(config)# exit Exits configuration mode. (Optional)
Displays the RADIUS server configuration. Step 5 switch# show radius-server (Optional) Copies the
running configuration to the startup configuration. switch# copy running-config startup-config Step 6 To
configure periodic RADIUS server monitoring, perform this task: switch# configure terminal
switch(config)# radius-server host 10.10.1.1 test username user1 password Ur2Gd2BH idle-time 3
switch(config)# radius-server deadtime 5 switch(config)# exit switch# show radius-server switch# copy
running-config startup-config Configuring the Dead-Time Interval You can configure the dead-time
interval for all RADIUS servers. The dead-time interval specifies the time that the Cisco Nexus 5000
Series switch waits after declaring a RADIUS server is dead, before sending out a test packet to
determine if the server is now alive. The default value is 0 minutes. When the dead-time interval is 0
minutes, RADIUS servers are not marked as dead even if they are not responding. You can configure the
dead-time interval for a RADIUS server group. Note To configure dead time interval, perform this task:
Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode.
Configures the dead-time interval. The default value is 0 minutes. The range is from 1 to 1440 minutes.
#switch(config)# radius-server deadtime Step 2 Step 3 switch(config)# exit Exits configuration mode.
(Optional) Displays the RADIUS server configuration. Step 4 switch# show radius-server Cisco Nexus
5000 Series Switch CLI Software Configuration Guide 12 OL-16597-01 Configuring RADIUS Configuring
the Dead-Time Interval Command or Action Purpose (Optional) Copies the running configuration to the
startup configuration. switch# copy running-config startup-config Step 5 Manually Monitoring RADIUS
Servers or Groups To manually send a test message to a RADIUS server or to a server group, perform this
task: Procedure Command or Action Purpose Sends a test message to a RADIUSserver to confirm
availability. switch# test aaa server radius {ipv4-address | ipv6-address | server-name} [vrf vrf-name]
username password Step 1 Sends a test message to a RADIUS server group to confirm availability.
switch# test aaa group group-name username password Step 2 The following example shows how to
manually send a test message to a RADIUS server: switch# test aaa server radius 10.10.1.1 user1
Ur2Gd2BH switch# test aaa group RadGroup user2 As3He3CI Verifying RADIUS Configuration To display
RADIUS configuration information, perform one of the following tasks: Procedure Command or Action
Purpose Displays the RADIUS configuration in the running configuration. Step 1 switch# show running-
config radius [all] Displays the RADIUS configuration in the startup configuration. Step 2 switch# show
startup-config radius Displays all configured RADIUS server parameters. switch# show radius-server
[server-name | ipv4-address | ipv6-address] [directed-request | groups | sorted | statistics] Step 3 For
detailed information about the fields in the output from this command, refer to the Cisco Nexus 5000
Series Command Reference. Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-
01 13 Verifying RADIUS Configuration Manually Monitoring RADIUS Servers or Groups Displaying RADIUS
Server Statistics To display the statistics the Cisco Nexus 5000 Series switch maintains for RADIUS server
activity, perform this task: Procedure Command or Action Purpose switch# show radius-server statistics
{hostname | Displays the RADIUS statistics. ipv4-address | ipv6-address} Step 1 The following example
shows how to display statistics: switch# show radius-server statistics 10.10.1.1 Example RADIUS
Configuration The following example shows how to configure RADIUS: switch# configure terminal
switch(config)# radius-server key 7 "ToIkLhPpG" switch(config)# radius-server host 10.10.1.1 key 7
"ShMoMhTl" authentication accounting switch(config)# aaa group server radius RadServer
switch(config-radius)# server 10.10.1.1 switch(config-radius)# exit switch(config-radius)# use-vrf
management Default RADIUS Settings The following table lists the default settings for RADIUS
parameters. Table 1: Default RADIUS Parameters Parameters Default Server roles Authentication and
accounting