Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation

Example: Configuring RADIUS Authentication

The Junos OS supports two protocols for central authentication of users on multiple routers: RADIUS and TACACS+. We recommend RADIUS because it is a multivendor IETF standard, and its features are more widely accepted than those of TACACS+ or other proprietary systems. In addition, we recommend using a one-time-password system for increased security, and all vendors of these systems support RADIUS.

The Junos OS uses one or more template accounts to perform user authentication. You create the template account or accounts, and then configure the user access to use that account. If the RADIUS server is unavailable, the fallback is for the login process to use the local account that set up on the router or switch.

The following example shows how to configure RADIUS authentication:

[edit]
system {authentication-order [ radius password ];root-authentication {encrypted-password "$9$aH1j8gqQ1gjyjgjhgjgiiiii"; # SECRET-DATA}name-server {10.1.1.1;10.1.1.2;}}

The following example shows how to enable RADIUS authentication and define the shared secret between the client and the server. The secret enables the client and server to determine that they are talking to the trusted peer.

Define a timeout value for each server, so that if there is no response within the specified number of seconds, the router can try either the next server or the next authentication mechanism.

[edit]
system {radius-server {10.1.2.1 {secret "$9$aH1j8gqQ1sdjerrrhser"; # SECRET-DATAtimeout 5;}10.1.2.2 {secret "$9$aH1j8gqQ1csdoiuardwefoiud"; # SECRET-DATAtimeout 5;}}}

Published: 2013-01-23

Published: 2013-01-23