R

  radius-server attribute 44 on-for-access-req  

Platform: IOS based
Where: Global configuration
Info : The (hidden) global configuration command sends attribute 44 in all access request packets. The command may be present in IOS 11.3(9+)AA (reference BugID CSCdk74429). This command is replaced by the radius-server attribute 44 include-inaccess-req command.

  radius-server attribute 6 on-for-login-auth  

Platform: IOS based
Where: Global configuration
Info: Sends attribute 6 in all authentication packets (for example, access requests ). This command may be present in IOS 11.3(9+)T and 12.0(3+)T (reference BugID CSCdk81561).

  radius-server attribute 6 support-multiple  

Platform: IOS 12.1(23)
Where: Global configuration
Info: Specifies that IOS is to support multiple Service-Type values per RADIUS profile in violation of the RFC for RADIUS. This command was added in IOS 12.1(2.3)T2 and 12.1(3.3)T (reference BugID CSCdr60306).

  radius-server attribute nas-port extended  

Platform: IOS based
Where: Global configuration
Info: Command is replaced by the radius-server attribute nas-port format command in some releases of IOS. For this reason it may be hidden in the IOS configuration mode but documented. In these versions of IOS, the command will be accepted but ignored.

  radius-server authorization default framed-protocol ppp  

Platform: IOS based
Where: Global configuration
Info: Specifies the default framed-protocol as PPP when this RADIUS attribute is missing.

  radius-server authorization permit missing service-type  

Platform: IOS based
Where: Global configuration
Info: Specifies that a RADIUS entry without service-type information is permitted. It is used when RADIUS is being used as a database without regard to service-type.

  radius-server challenge-noecho  

Platform: IOS based
Where: Global configuration
Info: Specifies that data echoing to the screen is disabled during Access-Challenge.

  radius-server directed-request [restricted] [right-to-left]  

Platform: IOS 12.0(7)
Where: Global configuration
Info: Right-to-left keyword that first appeared in IOS 12/0(7)T enables right-to-left parsing of the user information (reference BugID CSCdm77820).

  radius-server extended-portnames  

Platform: IOS 11.1
Where: Global configuration
Info: Displays expanded interface information in the NAS-Port-Type attribute; replaced by the radius-server attribute nas-port extended command. This command configures RADIUS to expand the size of the NAS-Port attribute field to 32 bits. The upper 16 bits of the NAS-Port attribute display the type and number of the controlling interface; the lower 16 bits indicate the interface undergoing authentication.

  radius-server host {hostname  ip-address} [auth-port port-number]   [acct-port port-number] [timeout seconds] [retransmit retries]   [key string] [ignore-acct-authenticator]  

Platform: IOS 11.3
Where: Global configuration
Info: ignore-acct-authenticator keyword specifies to ignore accounting authenticator errors and warn only (11.3(+)AA).

  radius-server retry method round-robin  

Platform: IOS based
Where: Global configuration
Info: Specifies an alternative method of selecting servers when a server is not responding.

  radius-server secret string  

Platform: IOS 11.1
Where: Global configuration
Info: Specifies the key shared with the RADIUS server. This command is hidden because it has been replaced with the radius-server key command (reference BugID CSCdi44081).

  radius-server unique-ident value  

Platform: IOS based
Where: Global configuration
Info: Sets high order bits for the accounting identifier. The identifier field is a one-octet field included in all RADIUS accounting packets that aids in matching requests and replies.



Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
ISBN: 0072259175
EAN: 2147483647
Year: 2005
Pages: 117

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net