Cisco Nexus 9000v - Notes on Cisco Nexus Configuration - RSA Ready Implementation Guide
Originally Published: 2023-03-21
This section provides the notes on Cisco Nexus Configuration.
- When logging on to the switch using SSH/Telnet, the user gets the default role network-operator, which grants read only permissions to the user.
- Configure the RSA Authentication Manager or identity router to send RADIUS attribute to grant authorization access level to the user the according to the attribute value, which should match a role configured or preconfigured on the Nexus Switch.
- By default, the Nexus RADIUS server’s idle-time is set to 0, which means it does not monitor the servers by default. This needs to be changed according to your requirement.
KAPACNEXUS001(config)# radius-server host 192.168.100.50 test idle-time 1
- You must set the fallback to the AAA authentication using RADIUS to use local (for example, if the RADIUS server is not reachable) to prevent switch lockdown.
Return to the main page.
Related Articles
Cisco Nexus 9000v - RADIUS Client Configuration - RSA Ready Implementation Guide 40Number of Views Cisco Nexus 9000v - RADIUS Configuration - RSA Ready Implementation Guide 58Number of Views Cisco Nexus 9000v RSA Ready Implementation Guide 84Number of Views Cisco ISE 3.4 - Authentication Agent Configuration - RSA Ready Implementation Guide 228Number of Views RADIUSwith AM Configuration - Cisco FTD RSA Ready SecurID Access Implementation Guide 80Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Release Notes for RSA Authentication Manager 8.8 RSA announces End of Life EOL dates for RSA MyAccessLive Service RSA Authentication Manager 8.9 Administrator's Guide
Don't see what you're looking for?