- play_arrow Working With Network Director
- play_arrow About Network Director
- play_arrow Installing Network Director
- play_arrow Accessing Network Director
- play_arrow Understanding Network Director System Administration and Preferences
- play_arrow Getting Started with Network Director
-
- play_arrow Working with the Dashboard
- play_arrow About the Dashboard
- play_arrow Using the Dashboard
- play_arrow Dashboard Widget Reference
-
- play_arrow Working in Deploy Mode
- play_arrow About Deploy Mode
- play_arrow Deploying and Managing Device Configurations
- Deploying Configuration to Devices
- Managing Configuration Deployment Jobs
- Deploy Configuration Window
- Importing Configuration Data from Junos OS Configuration Groups
- Enabling High-Frequency Traffic Statistics Monitoring on Devices
- Configuring Network Traffic Analysis
- Approving Change Requests
- Enabling SNMP Categories and Setting Trap Destinations
- Understanding Resynchronization of Device Configuration
- Resynchronizing Device Configuration
- Managing Device Configuration Files
- Creating and Managing Baseline of Device Configuration Files
- play_arrow Deploying and Managing Software Images
- play_arrow Managing Devices
- play_arrow Setting Up Zero Touch Provisioning for Devices
-
- play_arrow Monitoring Devices and Traffic
- play_arrow About Monitor Mode
- play_arrow Monitoring Traffic
- play_arrow Monitoring Client Sessions
- play_arrow Monitoring Devices
- play_arrow Monitoring and Analyzing Fabrics
- play_arrow Monitoring Virtual Networks
- play_arrow General Monitoring
- play_arrow Monitor Reference
- 802.11 Packet Errors Monitor
- Access vs. Uplink Port Utilization Trend Monitor
- Current Sessions Monitor
- Current Sessions by Type Monitor
- Error Trend Monitor
- Equipment Summary By Type Monitor
- Node Device Summary Monitor
- Port Status Monitor
- Port Status for IP Fabric Monitor
- Port Utilization Monitor
- Power Supply and Fan Status Monitor
- Resource Utilization Monitor for Switches, Routers, and Virtual Chassis
- Top Users Monitor
- Top Sessions by MAC Address Monitor
- Session Trends Monitor
- Status Monitor for Junos Fusion Systems
- Status Monitor for Layer 3 Fabrics
- Status Monitor for Switches and Routers
- Status Monitor for Virtual Chassis
- Status Monitor for Virtual Chassis Members
- Top Talker - Wired Devices Monitor
- Traffic Trend Monitor
- Unicast vs Broadcast/Multicast Monitor
- Unicast vs Broadcast/Multicast Trend Monitor
- User Session Details Window
- Virtual Chassis Topology Monitor
- VC Equipment Summary By Type Monitor
-
- play_arrow Using Fault Mode
- play_arrow About Fault Mode
- play_arrow Using Fault Mode
- play_arrow Fault Reference
-
- play_arrow Working in Report Mode
- play_arrow About Report Mode
- play_arrow Creating and Managing Reports
- play_arrow Report Reference
-
- play_arrow Working with Network Director Mobile
- play_arrow About Network Director Mobile
- play_arrow Getting Started with Network Director Mobile
- play_arrow Working in the Network Director Mobile Dashboard Mode
- play_arrow Working in the Network Director Mobile Devices Mode
-
Creating and Managing RADIUS Profiles
Remote Authentication Dial In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for computers to connect and use a network service. By default, RADIUS servers are used for both accounting and authentication. From Network Director, you can create and manage RADIUS profiles that configure RADIUS server settings.
In addition to your RADIUS server, you can configure an LDAP server for EX Series ELS switch authentication also—for directions, see Creating and Managing LDAP Profiles.
This topic describes:
Managing RADIUS Profiles
From the Manage RADIUS Profiles page, you can:
Create a new profile by clicking Add. For directions, see Creating RADIUS Profiles.
Modify an existing profile by selecting it and clicking Edit.
View information about a profile by selecting the group and clicking Details or by clicking the profile name.
Delete profiles by selecting the profile and clicking Delete.
Tip:You cannot delete profiles that are in use—that is, assigned to objects or used by other profiles. To see the current assignments for a profile, select the profile and click Details.
Clone a profile by selecting the profile and clicking Clone.
Table 1 describes the information provided about RADIUS profiles on the Manage RADIUS Profiles page. This page lists all RADIUS profiles defined for your network, regardless of your current selected scope in the network view.
Field | Description |
---|---|
RADIUS Profile Name | Name given to the RADIUS profile when it was created. |
Server Address | IP address of the RADIUS server. |
Server Port | UDP port being used by the RADIUS server. |
Creation Time | Date and time when this profile was created. |
Update Time | Date and time when this profile was last modified. |
User Name | The username of the user who created or modified the profile. |
All columns may not be currently displayed. To show or hide fields in the table, click the down arrow on the field header, select Columns, and select or clear the check box adjacent to the field that you want to show or hide.
Creating RADIUS Profiles
To create a RADIUS profile:
Click
in the Network Director banner.
Under Select View, select either Logical View, Location View, Device View or Custom Group View.
Tip:Do not select Dashboard View or Topology View.
From the Tasks pane, select the type of network (Wired), the appropriate functional area (System or AAA), and select the name of the profile that you want to create. For example, to create a port profile for a wired device, click Wired > Profiles > PORT. The Manage Profile page opens.
Click Add on the Manage RADIUS Profiles page.
The Create RADIUS Profile page appears.
Enter settings for the RADIUS profile on the Create RADIUS Profile page as described in Specifying Settings for a RADIUS Profile.
Click Done.
Specifying Settings for a RADIUS Profile
Use the Create RADIUS Profile page to define authentication, authorization, and accounting settings for a RADIUS server.
Table 2 describes the RADIUS profile settings.
Field | Action |
---|---|
Server Name | Type a name for the server, using up to 64 alphanumeric characters and no special characters other than the underscore. The name must be unique among servers. |
Server Address | Type the IP address of the RADIUS server. |
Authentication Port(default is 1812) | Using the arrows, adjust the number of the UDP port to use for RADIUS authentication messages. The default UDP port is 1812, and the range is from 0 to 65535. |
Secret | Provide a password for the RADIUS server. |
Advanced Settings You can change the advanced settings for a RADIUS server, or you can use the default settings. | |
Accounting Port(default is 1813) | Using the arrows, adjust the number of the UDP port to use for RADIUS accounting messages. The default UDP port is 1813, and the range is from 0 to 65535. |
Retry Count(default is 3) | Using the arrows, adjust the retry count until it reflects the number of times Network Director retries connecting to the RADIUS server when the RADIUS server is unavailable. |
Timeout (default is 5 seconds) | Using the arrows, adjust the timeout value. Timeout indicates how many seconds Network Director allows for RADIUS server connection before giving an unreachable error. |
Dead Time(default is 5 seconds) | Using the arrows, adjust the number of seconds before Network Director checks a RADIUS server that was previously unresponsive. The default value is 5 seconds. |
Use MAC as Password | Enable this option if you want each client device to use its MAC address as its password for the RADIUS server. If you enable Use MAC As Password, then the Authorization Password field becomes unavailable. |
Authorization Password | If you are not using MAC addresses as passwords for the RADIUS server, provide a common password here. |
MAC Address Format | Select None, Hyphens, Colons, One-Hyphen, or Raw to determine the MAC address format used with the RADIUS server. For example:
|
Authentication Protocol(Default is PAP) | Select PAP, CHAP, MSCHAP-V2, or None to determine an authentication protocol for the RADIUS server. These authentication protocols work as follows:
|
Server Priority(default is 1) | Enter a server priority to indicate the order in which RADIUS servers are accessed. Entering a one means that this server is checked first. |
Click OK to add the RADIUS server to the EX Switching Access profile. You can add more RADIUS servers if needed.
If you have multiple RADIUS servers, you can prioritize them in the Authentication Server Order section, using the arrows.
Click Done to create the RADIUS server profile.
The RADIUS server name appears in the list of RADIUS servers on the Manage RADIUS Profiles page.
What to Do Next
Link the RADIUS server to an Access profile. For directions, see Creating and Managing Access Profiles.