‎03-17-2022 09:57 AM
Solved! Go to Solution.
‎06-04-2025 05:53 AM
Sorry, do not recall getting any email alert about this... Giuseppe sent me the link now.
So, RADIUS reachability feature is only relevant for EAPoL, in particular fail-open and continuity modes. Basically, the EAPoL function needs to know when/if the RADIUS servers change or all fail. Endpoint-tracking also uses RADIUS reachability.
For CLI RADIUS authentication, what's the use ? If a RADIUS server is available it will be used, else, if not RADIUS response, it will fallback to local password.
‎06-04-2025 05:53 AM
Sorry, do not recall getting any email alert about this... Giuseppe sent me the link now.
So, RADIUS reachability feature is only relevant for EAPoL, in particular fail-open and continuity modes. Basically, the EAPoL function needs to know when/if the RADIUS servers change or all fail. Endpoint-tracking also uses RADIUS reachability.
For CLI RADIUS authentication, what's the use ? If a RADIUS server is available it will be used, else, if not RADIUS response, it will fallback to local password.
‎06-13-2025 02:12 AM
Hi Ludovico,
The use of Radius reachability for CLI access is to not waiting about 1 min before fallback to local password when radius servers are unreachable for any reason...
Regards.
‎03-17-2022 06:02 PM
CORE-01:1#show radius-server==================================================================================================================Radius Server Entries==================================================================================================================ACCT ACCT SOURCENAME USEDBY SECRET PORT PRIO RETRY TIMEOUT ENABLED PORT ENABLED IP------------------------------------------------------------------------------------------------------------------10.10.10.56 cli ****** 1812 10 1 8 true 1813 true 10.11.10.25410.10.10.58 cli ****** 1812 10 1 8 true 1813 true 10.11.10.25410.10.10.56 eapol ****** 1812 10 1 8 true 1813 true 10.11.10.25410.10.10.58 eapol ****** 1812 10 1 8 true 1813 true 10.11.10.25410.10.10.56 web ****** 1812 10 1 8 true 1813 true 10.11.10.25410.10.10.58 web ****** 1812 10 1 8 true 1813 true 10.11.10.254
CORE-01:1#show radius reachabilityEAP RADIUS reachability mode : use-radiusEAP RADIUS reachability status : reachableEAP RADIUS reachable server : 10.10.10.56Time until next check : 37RADIUS username : reachmeRADIUS password : reachmeRADIUS keep-alive-timer : 180RADIUS unreachable-timer : 60
CORE-01:1#show run modu radiusconfig terminal# RADIUS CONFIGURATIONradius server host 10.10.10.56 key ****** source-ip 10.11.10.254radius server host 10.10.10.58 key ****** source-ip 10.11.10.254radius server host 10.10.10.56 key ****** used-by eapol source-ip 10.11.10.254radius server host 10.10.10.58 key ****** used-by eapol source-ip 10.11.10.254radius server host 10.10.10.56 key ****** used-by web source-ip 10.11.10.254radius server host 10.10.10.58 key ****** used-by web source-ip 10.11.10.254radius enableradius accounting enableradius sourceip-flagradius reachability username reachme passwordreachmeend‎03-18-2022 03:46 AM
5520-24X-VOSS:1#sho run mod rad
config terminal
#
# RADIUS CONFIGURATION
#
radius server host 10.124.100.4 key ******  used-by web
radius enable
radius reachability keep-alive-timer 30 unreachable-timer 30
end​
The strange thing is that radius request are well managed with this config, and UDP traffic on port 1812 reaches correctly the server, but it's not the case for radius reachability...