RADIUS

The system administrator and users with appropriate configuration rights can configure the SLC to use RADIUS to authenticate users attempting to log in using Telnet, SSH, or the console port.

Note:  Users who are authenticated through RADIUS are granted port access through the port permissions on this page.

To configure the SLC to use RADIUS to authenticate users:

  1. Complete the following fields:

Enable RADIUS

Displays selected if you enabled this method on the User Authentication page. If you want to set up this authentication method but not enable it immediately, clear the checkbox.

Note:  If you enable RADIUS here, it automatically displays at the end of the order of precedence on the User Authentication page.

RADIUS Server #1

IP address or host name of the primary RADIUS server.

Server #1 Port (optional)

Number of the TCP port on the RADIUS server used for the RADIUS service. If you do not specify an optional port, the SLC uses the default RADIUS port (1812).

Server #1 Secret

Text that serves as a shared secret between a RADIUS client and the server (SLC). The shared secret is used to encrypt a password sent between the client and the server. May have up to 128 characters.

RADIUS Server #2

IP address or host name of the secondary RADIUS server.

Server #2 Port

Number of the TCP port on the RADIUS server used for the RADIUS service. If you do not specify an optional port, the SLC uses the default RADIUS port (1812).

Server #2 Secret

Text that serves as a shared secret between a RADIUS client and the server (SLC). The shared secret is used to encrypt a password sent between the client and the server. May have up to 128 characters.

Timeout

The number of seconds (1-30) after which the connection attempt times out. The default is 30 seconds.

Custom Menu

If custom menus have been created (see the User Guide), you can assign a default custom menu to RADIUS users.

Data Ports

The ports users are able to monitor and interact with using the connect direct command. U and L denote the PC Card upper and lower slots.

Listen Ports

The ports users are able to monitor using the connect listen command.

Clear Port Buffers

The ports whose port buffer users may clear using the set locallog clear command.

Note:  Older RADIUS servers may use 1645 as the default port. Check your RADIUS server configuration to make sure.

  1. In the User Rights section, select the user group to which RADIUS users will belong:

Group

Select the group to which the RADIUS users will belong:

Default Users: This group has only the most basic rights (described above).

Power Users: This group has the same rights as Default Users plus Networking, Date/Time, Reboot & Shutdown; Diagnostics & Reports.

Administrators: This group has all possible rights.

  1. Select or clear the checkboxes for the following rights:

Full Administrative

Right to perform any function on the SLC.

Networking

Right to enter network and routing settings.

Services

Right to enable and disable system and audit logging, SSH and Telnet logins, SNMP, and SMTP.  Includes NFS and CIFS.

Date/Time

Right to set the date and time.

Local Users

Right to add or delete local users on the system.

Remote Authentication

Right to assign a remote user to a user group and assign a set of rights to the user. Includes configuring remote authentication methods and ordering.

SSH Keys

Right to set SSH keys for authenticating users.

User Menus

Right to create or edit a custom user menu for the CLI .

Reboot & Shutdown

Right to shutdown or reboot the SLC.

Firmware & Configuration

Right to upgrade the firmware on the unit and save or restore a configuration (all settings).

Diagnostics & Reports

Rights to obtain diagnostic information and reports about the unit.

SLC Network

Right to view and manage SLCs on the local subnet.

Web Access

Right to access Web-Manager.

Device Ports

Right to enter device port settings. Includes creating bidirectional and unidirection connections

PC Card

Right to enter modem settings for PC cards. Includes managing storage PC Cards.

  1. To save, click Apply.

Note: You must reboot the unit before changes will take effect.

 

See also

Device Ports

User Authentication Methods

Remote Users

Port Access Modes

NIS

LDAP

Kerberos

TACACS+