Configuring Authentication Servers on AOS-CX
From the Server groups page, you can configure RADIUS or TACACS authentication servers to authenticate and authorize the users of an AOS-CX switch. The authentication servers determine if the user has access to the administrative interface.
To configure authentication servers on a switch, complete the following steps:
- In the
- To select a switch group in the filter:
- Set the filter to a group.
The dashboard context for the group is displayed.
- Under , click > .
- Click the icon to view the switch configuration dashboard.
- Set the filter to a group.
- To select a switch in the filter:
- Set the filter to or a group containing at least one switch.
- Under
A list of switches is displayed in the
view. , click > . - Click an AOS-CX switch under .
The dashboard context for the switch is displayed.
- Under
The AOS-CX UI configuration page is displayed.
, click .
app, select one of the following options: - To select a switch group in the filter:
- Click > . The Authentication Servers page is displayed with number of RADIUS and TACACS servers that are configured on the switch.
Configuring a RADIUS Server on AOS-CX
To configure a RADIUS server, complete the following steps:
- In the table, point to the server row and click the edit icon. The RADIUS servers page is displayed with the list of RADIUS servers configured on the switch.
- To add a RADIUS server, click
The Add RADIUS window is displayed.
. - Configure the following parameters:
Table 1: RADIUS Parameters
Name
Description
Value The IP address or fully qualified domain name of the RADIUS server.
The encryption key to be used during authentication sessions with the specified RADIUS server.
You can enter up to a maximum of 32 characters including letters, numbers, and special characters, except question mark (?) and double quotes (").
The authentication port number for the specified server.
Range: 1-65535
Default: 1812
The number of seconds to wait for a response from the RADIUS server before trying the next RADIUS server.
Range: 1-60
Default: 5
The VRF to be used for communicating with the RADIUS server.
and
Management VRF is not supported on the AOS-CX 4100i and 6100 switch series.
The number of retry attempts for contacting the specified RADIUS server.
Range: 0-5
Default: 1
- Click
The server that was added first is accessed first, and if necessary, the second server is accessed second, and so on. You can rearrange the order by dragging the server to a different position using the
drag-and-drop icon.
. The added server is displayed in the RADIUS servers page. - Click .
Configuring TACACS Server on AOS-CX
To configure a TACACS server, complete the following steps:
- In the table, point to the server row and click the edit icon. The TACACS servers page is displayed with the list of TACACS servers configured on the switch.
- To add a TACACS server, click
The Add TACACS window is displayed.
. - Configure the following parameters:
Table 2: TACACS Parameters
Name
Description
Value The IP address or fully qualified domain name of the TACACS server.
The encryption key to be used during authentication sessions with the specified TACACS server.
You can enter up to a maximum of 32 characters including letters, numbers, and special characters, except question mark (?) and double quotes (").
The authentication port number for the specified TACACS server.
Range: 1-65535
Default: 49
The number of seconds to wait for a response from the TACACS server before trying the next TACACS server.
Range: 1-60
Default: 5
The VRF to be used for communicating with the TACACS server.
and
Management VRF is not supported on the AOS-CX 4100i and 6100 switch series.
- Click
The server that was added first is accessed first, and if necessary, the second server is accessed second, and so on. You can rearrange the order by dragging the server to a different position using the
drag-and-drop icon.
. The added server is displayed in the TACACS servers page. - Click .