AAA Configuration on Cisco Switch

Oh I saw the earlier post. My bad… :frowning:

1 Like

when we configure the radius server, can we just write [SW1(config)#radius-server host 192.168.1.101 key radiuspass] ? without specifying port numbers? also we write the default value of acct-port which is 1646 (So, it is possible to not mention the acct-port in the command, right?). What is the auth-port 1812?

is it because of the radius server (Elektron)? meaning, there is a specific port number for each server? if we use another server then, different port number need to be used?

Hello Mohanad

You can indeed issue the command without the port numbers if you choose to. By default, the auth-port port number is 1645 and by default, the acct-port port number is 1646. In this specific lesson, Rene had to specify the auth-port since it was different from the default. He didn’t need to specify the acct-port since it is the default, however, he chose to include it for completeness.

I hope this has been helpful!

Laz

Hello,
please can you give me a help for how can i configure the switch WS-C2960L-24PS-LL.
some comand are different from your swtich dimostration.

Thanks

Hello Valerio

It could be that some of the commands have changed since the writing of the lesson. Can you share with us the version of the IOS in the device you are using and which commands you find are not working? Let us know and we’ll look into it further…

Looking forward to hearing back from you!

Laz

Hello Lazaros,
C2960L Software (C2960L-UNIVERSALK9-M), Version 15.2(6)E, when i enable aaa new-model then in config i cannot make the comand: radius-server host ?
% Unrecognized command.

the only options that i have are :

radius-server ? 

  accounting          Accounting information configuration
  attribute           Customize selected radius attributes
  authorization       Authorization processing information
  backoff             Retry backoff pattern(Default is retransmits with constant delay)
  cache               AAA auth cache default server group
  challenge-noecho    Data echoing to screen is disabled during Access-Challenge
  configure-nas       Attempt to upload static routes and IP pools at startup
  dead-criteria       Set the criteria used to decide when a radius server is marked dead
  deadtime            Time to stop using a server that doesn't respond
  directed-request    Allow user to specify radius server to use with `@server'
  domain-stripping    Strip the domain from the username
  load-balance        Radius load-balancing options.
  optional-passwords  The first RADIUS request can be made without requesting a password
  retransmit          Specify the number of retries to active server
  retry               Specify how the next packet is sent after timeout.
  source-ports        source ports used for sending out RADIUS requests
  throttle            Throttle requests to radius server
  timeout             Time to wait for a RADIUS server to reply
  transaction         Specify per-transaction parameters
  unique-ident        Higher order bits of Acct-Session-Id
  vsa                 Vendor specific attribute configuration

Hello Valerio

Starting from IOS 15.4(2)S, the command has changed. As shown in this Cisco IOS command reference, the command is now radius server <name>.

For example:

Router(config)# aaa new-model
Router(config)# radius server
Router(config-radius-server)# address ipv4 10.0.0.1 acct-port 1813 auth-port 1812
Router(config-radius-server)# key mykey

More info on this command can be found in this command line reference:

I hope this has been helpful!

Laz

Hi community !
AAA Configuration on Cisco Switch : Section 2: Configuration

I could not find **dot1x ** cli config under switchport interface. I am using
Cisco IOS Software, vios_l2 Software (vios_l2-ADVENTERPRISEK9-M), Version 15.2

Please inform the which version of the switch has interface cli option for dot1x

Hello Raghu

I’ve just logged in to CML and found that I have Cisco IOS Software, vios_l2 Software (vios_l2-ADVENTERPRISEK9-M), Version 15.2 same as you, and I have the dot1x optoin available. Did you remember to start off by issuing the aaa new-model command?

Let us know!

I hope this has been helpful!

Laz

HI Rene a bit of an nooby question but how did you figure out the port numbers for
SW1(config)#radius-server host 192.168.1.101 auth-port 1812 acct-port 1646 key radiuspass

is this set in stone? as in always the same? or is it given to me some where and I just don’t know where to find it?

Hello Brian.

Modern RADIUS implementations use UDP port 1812 for authentication and authorization, and UDP 1813 for accounting. Older implementations used 1645 and 1646.

Here’s what freeRADIUS uses
obrázok

So what you would do is specify the ports as 1812 for auth/autz and 1813 for accounting so the device knows which ports to use.

The ports you specify here should be the same as the ones you’re using on the RADIUS server. Most RADIUS servers should use these ports by default but just like with anything else, you always have the option to change them :slight_smile:

So in summary, RADIUS implementations will typically use 1812/1813 these days, so you can specify these ports in the command. However, these ports can be changed and if you’re unsure what ports is the RADIUS server using, you’re always free to log into it and check. What’s important here is having the ports specified in the RADIUS configuration and on the RADIUS server the same.

David

1 Like

Is there any difference when we used

aaa authorization exec default group radius local

compared to

aaa authorization exec default radius local

Does this do the same thing? What is the point of the group command if I can specify it without it?

radius-server host 192.168.1.101 auth-port 1812 acct-port 1646 key radiuspass
why i cannot type the above command any switch under any switch ?

Hello Cameron

First of all, it seems that I am unable to issue the aaa authorization exec default radius local command on my CML.

Router(config)#aaa authorization exec default ?
  cache             Use Cached-group
  group             Use server-group.
  if-authenticated  Succeed if user has authenticated.
  krb5-instance     Use Kerberos instance privilege maps.
  local             Use local database.
  none              No authorization (always succeeds).

Router(config)#aaa authorization exec default 

I am running the following:

Cisco IOS Software, IOSv Software (VIOS-ADVENTERPRISEK9-M), Version 15.9(3)M6, RELEASE SOFTWARE (fc1)

I also don’t see this syntax for the command as shown in the following Cisco command reference:

If however, on some IOS version this command is available, there is still a difference between these commands.

The use of the group radius keywords uses the list of all RADIUS servers for authorization as defined by the aaa group server radius command. If the group keyword is not used (and assuming this works on some other IOS version) then the single configured RADIUS server will be used.

Just to confirm, can you check to see that your setup does indeed support this command and let us know what IOS you’re using.

I hope this has been helpful!

Laz

Hi Laz,

Thank you for taking time and looking into this for me! I appreciate it. I am using IOS XE. See the screenshots below.


image
image

I thought that using the group command would first make it use the radius server that is configured then if not if you had a second way to authenticate/authorize it would use that, such as local for local credentials after.

I did this get this after I entered the command.

aaa authorization exec default radius local is a hidden command. Use of this command is not recommended/supported and will be removed in future.

I also was wondering a bit about the reverse-access command. I read the documentation and it seems it is only used for reverse telnet and that allows you to telnet to a device but then console into another device from the device that you telnetted into. Is that correct? Would that be configured on the device you are telnetting to or the one you originally telnetted from?

Hello Prasenjit

The radius-server host command has been deprecated in newer devices and OSes and it has been replaced with the following syntax:

radius server MY_SERVER
 address ipv4 192.168.1.101 auth-port 1812 acct-port 1646
 key radiuspass

Take a look at this Cisco command reference for more details:

I will let @ReneMolenaar know to consider updating the lesson.

I hope this has been helpful!

Laz

Hello Cameron

Thanks for letting us know the version you’re using.

That’s an interesting response. Cisco often has commands that are considered “hidden” because they are not documented in the standard command reference guides. These commands may still be usable to ensure backward compatibility with legacy IOS versions, but are not recommended because they could be deprecated or removed in future versions of the IOS software. The warning you mentioned suggests that Cisco plans to remove or stop supporting this command in the future.

The specific command that you had shared in your post was this one:

aaa authorization exec default group radius local

The group keyword indicates that the methods that follow will be used for authorization. In this case, radius specifies that the device should first attempt to authorize the user through a RADIUS server group. If the RADIUS server is not available or does not respond, the device will fall back to using the local user database, that is, user credentials and authorization settings configured manually on the device itself.

Your understanding of the reverse-access command is generally correct. The reverse-access command is used to facilitate “reverse telnet,” which is a method that allows you to telnet into a network device (like a router or a terminal server) and then connect to the console port of another device connected to that first device. This is particularly useful for managing and accessing devices that do not have direct network connectivity.

The reverse-access command is configured on the device that you initially telnet into (often referred to as a terminal server or access server). This device has asynchronous serial lines (often referred to as “lines” in Cisco terminology) that are connected to the console ports of other devices.

I hope this has been helpful!

Laz

Hi Lazarus,

Thank you for taking the time for looking into this for me. I understand all of it a lot better now. You are always great at understanding and always have great research and knowledge!

Hello Cameron

Thanks for your kind words, it’s my pleasure!!

Laz