EasyManua.ls Logo

Cisco CRS User Manual

Cisco CRS
304 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #38 background imageLoading...
Page #38 background image
deadtime (server-group configuration)
To configure the deadtime value at the RADIUS server group level, use the deadtime command in server-group
configuration mode. To set deadtime to 0, use the no form of this command.
deadtime minutes
no deadtime
Syntax Description
Length of time, in minutes, for which a RADIUS server is skipped over by transaction
requests, up to a maximum of 1440 (24 hours). The range is from 1 to 1440.
minutes
Command Default
Deadtime is set to 0.
Command Modes
Server-group configuration
Command History
ModificationRelease
This command was introduced.Release 3.3.0
Usage Guidelines
The value of the deadtime set in the server groups overrides the deadtime that is configured globally. If the
deadtime is omitted from the server group configuration, the value is inherited from the master list. If the
server group is not configured, the default value of 0 applies to all servers in the group. If the deadtime is set
to 0, no servers are marked dead.
Task ID
OperationsTask ID
read, writeaaa
Examples
The following example specifies a one-minute deadtime for RADIUS server group group1 when it has failed
to respond to authentication requests for the deadtime command:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# aaa group server radius group1
RP/0/RP0/CPU0:router(config-sg-radius)# server 1.1.1.1 auth-port 1645 acct-port 1646
RP/0/RP0/CPU0:router(config-sg-radius)# server 2.2.2.2 auth-port 2000 acct-port 2001
RP/0/RP0/CPU0:router(config-sg-radius)# deadtime 1
Cisco IOS XR System Security Command Reference for the Cisco CRS Router, Release 4.1
28 OL-24740-01
Authentication, Authorization, and Accounting Commands
deadtime (server-group configuration)

Table of Contents

Other manuals for Cisco CRS

Question and Answer IconNeed help?

Do you have a question about the Cisco CRS and is the answer not in the manual?

Cisco CRS Specifications

General IconGeneral
Operating SystemCisco IOS XR
Product TypeCore Router
Form FactorModular Chassis
DimensionsVaries by chassis type
WeightVaries by chassis type
ArchitectureDistributed
Switch FabricMulti-stage
Interface SupportEthernet, SONET/SDH, OTN
Interfaces/PortsVaries by line card
Port DensityVaries by line card
Routing ProtocolBGP, IS-IS, OSPF, MPLS
ManagementCLI, SNMP
Power SupplyRedundant, hot-swappable
CoolingRedundant, Hot-swappable Fan Trays
Supported ProtocolsIPv4, IPv6, MPLS
Management InterfacesEthernet, console
Security FeaturesACLs

Summary

Preface

Document Change History

Lists technical changes made to the document since its initial release.

Documentation and Service Request Procedures

Provides information on obtaining documentation and submitting service requests.

Authentication, Authorization, and Accounting Commands

AAA Accounting Configuration

Configures AAA accounting methods for commands, EXEC sessions, network services, or system events.

AAA Authentication Configuration

Configures AAA authentication method lists for login, PPP, or subscriber authentication.

AAA Authorization Configuration

Configures AAA authorization method lists for commands, EXEC sessions, network services, or subscribers.

RADIUS Server Key Configuration

Specifies the authentication and encryption key for RADIUS communications between router and daemon.

TACACS+ Server Host Configuration

Specifies a TACACS+ host server, including its name or IP address and port.

IPSec Commands

Clear IPSec Security Associations

Deletes specific or all IPSec security associations (SAs) from the SADB or clears counters/interfaces.

Show IPSec SA Information

Displays security association (SA) information based on rack/slot/module location, peer, profile, or count.

Configure IPSec Tunnel Encapsulation

Sets the encapsulation mode for a tunnel interface, specifying GRE or IPv4.

Keychain Management Commands

Keychain Key Configuration

Creates or modifies a keychain key, specifying a 48-bit integer key identifier.

Keychain Management

Creates or modifies a keychain, specifying its name and maximum character limit.

Show Keychain Status

Displays the keychain status, including keys, tolerance, lifetimes, and cryptographic algorithm.

Lawful Intercept Commands

Disable Lawful Intercept Feature

Disables the Lawful Intercept (LI) feature, which also deletes associated Mediation Devices and TAPs.

Management Plane Protection Commands

Configure Management Traffic IP Address

Configures peer IPv4 or IPv6 addresses for management traffic allowed on an interface.

Allow Management Traffic Protocols

Configures an interface to allow peer-filtering for specified management protocols or all protocols.

Configure Management Plane Protection

Configures management plane protection to allow and disallow protocols.

Configure Out-of-Band Management

Configures out-of-band interfaces or protocols and enters management plane protection out-of-band configuration mode.

Public Key Infrastructure Commands

Authenticate Certificate Authority

Authenticates the CA to the router by obtaining the CA's certificate and verifying its fingerprint.

Configure Trusted Certificate Authority

Declares a CA and configures a trusted point for verifying peer certificates.

Generate RSA Key Pair

Generates Rivest, Shamir, and Adelman (RSA) key pairs for signing and encryption.

Software Authentication Manager Commands

Add Certificate to SAM Table

Adds a new certificate to the SAM certificate table, with or without validation.

Show SAM Certificate Information

Displays records in the SAM certificate table, including location, index, and flag.

Show SAM System Information

Displays current configuration settings, status, prompt interval, and default response for SAM.

Secure Shell Commands

Start SSH Client Connection

Starts an SSH client connection and enables an outbound connection to an SSH server.

Configure SSH Server

Enables the SSH server, configures VRFs for its use, and sets the server version to SSHv2.

Authenticate SSH Server Public Key

Authenticates a server public key (pubkey) by storing it in the client's local database.

Secure Socket Layer Protocol Commands

Show Active SSL Sessions

Displays active Secure Socket Layer (SSL) sessions, showing PID, Method, Type, Peer, Port, and Cipher-Suite.

Related product manuals