radius-server
Syntax
radius-server server-address { accounting-port port-number; accounting-retry number; accounting-timeout seconds; dynamic-request-port port-number; max-outstanding-requests value; port port-number; preauthentication-port port-number; preauthentication-secret password; retry attempts; routing-instance routing-instance-name; secret password; source-address source-address; timeout seconds; }
Hierarchy Level
[edit access], [edit access profile profile-name]
Description
Configure RADIUS for subscriber access management, L2TP, or PPP.
To configure multiple RADIUS servers, include multiple radius-server
statements. The servers are tried in order and in a round-robin fashion until a
valid response is received from one of the servers or until all the configured retry
limits are reached.
Options
server-address |
IPv4 or IPv6 address of the RADIUS server. |
accounting-port |
Configure the port number on which to contact the RADIUS accounting server. Note:
Specifying the accounting port is optional, and port 1813 is the default. However, we recommend that you configure it in order to avoid confusion, as some RADIUS servers might refer to an older default.
|
accounting-retry |
Configure
the number of times the device retransmits RADIUS accounting messages
when no response is received from the server. When you do not configure
this statement, the number of retry attempts is determined by the
Note:
To successfully set a retry limit for the accounting servers
different from the authentication servers, you must configure both
the Note:
The maximum retry duration (the number of retries times the length of the timeout) cannot exceed 2700 seconds. An error message is displayed if you configure a longer duration.
|
accounting-timeout |
Configure
how long the local device waits to receive a response from a RADIUS
accounting server before retransmitting the message. When you do not
configure this statement, the length of the timeout is determined by the
Note:
To successfully set a timeout value for the accounting servers
different from the authentication servers, you must configure both
the Note:
The maximum retry duration (the number of retries times the length of the timeout) cannot exceed 2700 seconds. An error message is displayed if you configure a longer duration.
|
dynamic-request-port |
Specify the port that the router monitors for dynamic (CoA) requests from the specified RADIUS servers. You can configure a port globally or for a specific access profile. You must either use the default port for all RADIUS servers or configure the same nondefault port for all RADIUS servers. This rule applies at both the global access and access profile levels. Note:
Any other configuration results in a commit check failure. Multiple port numbers—that is, different port numbers for different servers—are not supported.
|
max-outstanding-requests |
Configure the maximum number of outstanding requests for this RADIUS server. An increase in this value is immediate while a decrease is more gradual if the current number of outstanding requests exceeds the new value.
|
port |
Configure the port number on which to contact the RADIUS server.
|
preauthentication-port |
Configure
the port number on which to contact the RADIUS server for logical line
identification (LLID) preauthentication requests. If you do not
configure a separate UDP port for preauthentication purposes, the same
UDP port that you configure for authentication messages by including the
|
preauthentication-secret |
Configure
the password to use with the RADIUS server for LLID preauthentication
requests. If you do not configure a separate UDP password for
preauthentication purposes, the same password that you configure for
authentication messages by including the
|
retry |
Specify the number of times that the device is allowed to attempt to
contact a RADIUS authentication or accounting server. You can override
the retry limit for accounting servers with the
Note:
To successfully set a retry limit for the accounting servers
different from the authentication servers, you must configure both
the Note:
The maximum retry duration (the number of retries times the length of the timeout) cannot exceed 2700 seconds. An error message is displayed if you configure a longer duration.
|
routing-instance |
Configure the routing instance used to send RADIUS packets to the RADIUS server.
|
source-address |
Configure a source address for each configured RADIUS server. Each RADIUS
request sent to a RADIUS server uses the specified source address.
Support for IPv6
|
timeout |
Configure the amount of time that the local device waits to receive a
response from RADIUS authentication and accounting servers. You can
override the timeout value for accounting servers with the
Note:
To successfully set a timeout value for the accounting servers
different from the authentication servers, you must configure both
the Note:
The maximum retry duration (the number of retries times the length of the timeout) cannot exceed 2700 seconds. An error message is displayed if you configure a longer duration.
|
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details.
Required Privilege Level
system—To view this statement in the configuration.
system-control—To add this statement to the configuration.
Release Information
Statement introduced before Junos OS Release 7.4.
max-outstanding-requests
introduced in Junos OS Release 11.4.
accounting-retry
and accounting-timeout
introduced
in Junos OS Release 14.1.
dynamic-request-port
option added in Junos OS Release 14.2R1 for MX
Series routers.
preauthentication-port
and preauthentication-secret
options added in Junos OS Release 15.1 for MX Series routers.
accounting-port
introduced in Junos OS Release 13.2X50-D10 for EX
Series switches with support for Enhanced Layer 2 software (ELS). It was introduced
in Junos OS without ELS in the following releases: Junos OS Releases 12.3R10,
14.1X53-D25, and 15.1R4 for EX Series switches.
Support for IPv6 server-address
introduced in
Junos OS Release 16.1.