Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell EMC SmartFabric OS10 User Guide Release 10.5.1

PDF

radius-server host tls

Configures a RADIUS server for RADIUS over TLS user authentication and secure communication. For RADIUS over TLS authentication, the radsec shared key and a security profile that uses an X.509v3 certificate are required.

Syntax
radius-server host {hostname | ip-address} tls security-profile profile-name [auth-port tcp-port-number] key {0 authentication-key | 9 authentication-key | authentication-key}
Parameters
  • hostname — Enter the host name of the RADIUS server.
  • ip-address — Enter the IPv4 (A.B.C.D) or IPv6 (x:x:x:x::x) address of the RADIUS server.
  • tls — Enter tls to secure RADIUS server communication using the TLS protocol.
  • security-profile profile-name — Enter the name of an X.509v3 security profile to use with RADIUS over TLS authentication. To configure a security profile for an OS10 application, see Security profiles.
  • auth-port tcp-port-number — (Optional) Enter the TCP port number that the server uses for authentication. The range is from 1 to 65535. The default is 2083.
  • key 0 authentication-key — Enter the radsec shared key in plain text.
  • key 9 authentication-key — Enter the radsec shared key in encrypted format.
  • authentication-key — Enter the radsec shared key in plain text. It is not necessary to enter 0 before the key.
Default
TCP port 2083 on a RADIUS server for RADIUS over TLS communication
Command Mode
CONFIGURATION
Usage Information
For RADIUS over TLS authentication, configure the radsec shared key on the server and OS10 switch. The show running-configuration output displays both the unencrypted and encrypted key in encrypted format. Configure global settings for the timeout and retransmit attempts allowed on a RADIUS over TLS servers using the radius-server retransmit and radius-server timeout commands.

RADIUS over TLS authentication requires that X.509v3 PKI certificates are configured on a certification authority and installed on the switch. For more information, including a complete RADIUS over TLS example, see X.509v3 certificates.

Supported on the MX9116n and MX5108n switches in Full Switch mode starting in release 10.4.3.0. Also supported in SmartFabric mode starting in release 10.5.0.1.

The no version of this command removes a RADIUS server from RADIUS over TLS communication.
Example
OS10(config)# radius-server host 1.5.6.4 tls security-profile radius-admin key radsec
Supported Releases
10.4.3.0 or later

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\