cyberlabs.us | home | subscribe | contact | admin
Monday, July 7th  
FreeRADIUS with Cisco IOS
Informational

Configure a Switch for Authentication and Authorization

In order to create a local user on the switch with full privileges for fallback access, enter:

Switch(config)#username admin privilege 15 password 0 cisco123!

In order to enable AAA, enter:

switch(config)# aaa new-model

In order to provide the IP address of the RADIUS server as well as the key, enter:

switch# configure terminal

switch(config)#radius-server host 172.16.71.146 auth-port 1645 acct-port 1646

switch(config)#radius-server key hello123

In order to test RADIUS server availability, enter the test aaa command:

switch# test aaa server Radius 172.16.71.146 user1 Ur2Gd2BH

The test authentication fails with a Rejection from the server because it is not yet configured, but it will confirm that the server itself is reachable.

In order to configure login authentications to fall back to local users if RADIUS is unreachable, enter:

switch(config)#aaa authentication login default group radius local

In order to configure authorization for a privilege level of 15, as long as a user is authenticated, enter:

switch(config)#aaa authorization exec default group radius if-authenticated

FreeRADIUS Configuration

Define the Client on the FreeRADIUS Server

In order to navigate to the configuration directory, enter:

# cd /etc/freeradius

In order to edit the clients.conf file, enter:

# vi clients.conf

In order to add each device (router/switch) identified by hostname and include the correct shared secret, enter:

client 192.168.1.1 {
secret = secretkey
nastype = cisco
shortname = switch
}

January 27th, 2022 - 07:41 pm | read more | comments