Service Manual

Usage Information
You can use this command to associate a group of RADIUS servers with a VRF and source interface. You
can congure the source interface only with the VRF attribute and source interface is optional with the VRF
attributes.
If VRF is not congured on the RADIUS group, then the group is considered to be on the default VRF. It is
possible to use the default VRF name; however, you cannot congure the source interface with the default
VRF as such a conguration results in conicts between the source interfaces corresponding to the 802.1x
supplicants on that default VRF.
RADIUS groups and VRFs have one-to-one mapping. If a VRF is congured with one RADIUS group, then
you cannot use the same VRF with another RADIUS group. When the VRF is removed, then the
corresponding RADIUS group is also removed automatically.
Example
Dell(conf)#radius-server group group1
Dell(conf-radius-group)#radius-server vrf vrf1 source-interface
tengigabitethernet 1/30/1
Dell(conf)#radius-server group group2
Dell(conf-radius-group)#radius-server vrf default
radius-server key
Congure a key for all RADIUS communications between the switch and the RADIUS host server.
Syntax
radius-server key [encryption-type] key
To delete a password, use the no radius-server key command.
Parameters
encryption-type (OPTIONAL) Enter either zero (0) or 7 as the encryption type for the key entered.
The options are:
0 is the default and means the key is not encrypted and stored as clear text.
7 means that the key is encrypted and hidden.
key Enter a string that is the key to be exchanged between the switch and RADIUS
servers. It can be up to 42 characters long.
Defaults Not congured.
Command Modes CONFIGURATION
Command History
This guide is platform-specic. For command information about other platforms, refer to the relevant Dell
Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version Description
9.7(0.0) Introduced on the S6000–ON.
9.0.2.0 Introduced on the S6000.
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
8.3.7.0 Introduced on the S4810.
1190
Security