2-30[Switch] radius scheme radius1[Switch-radius-radius1] primary authentication 10.110.91.164 1812[Switch-radius-radius1] primary accounting 10.110.91.164 1813[Switch-radius-radius1] key authentication aabbcc[Switch-radius-radius1] server-type extended[Switch-radius-radius1] user-name-format with-domain[Switch-radius-radius1] quit# In the test domain, specify the authentication method for 802.1X users as radius1, and that for telnetusers as local.[Switch] domain test[Switch-isp-test] scheme lan-access radius-scheme radius1[Switch-isp-test] scheme login local[Switch-isp-test] quit# Configure the test domain as the default domain.[Switch] domain default enable test# Enable 802.1X globally.[Switch] dot1x# Enable 802.1X on interface Ethernet 1/0/1.[Switch] interface ethernet 1/0/1[Switch-Ethernet1/0/1] dot1xRemote RADIUS Authentication of Telnet/SSH UsersThe configuration procedure for remote authentication of SSH users by RADIUS server is similar to thatfor Telnet users. The following text only takes Telnet users as example to describe the configurationprocedure for remote authentication.Network requirementsIn the network environment shown in Figure 2-3, you are required to configure the switch so that theTelnet users logging into the switch are authenticated by the RADIUS server.z A RADIUS authentication server with IP address 10.110.91.164 is connected to the switch.z On the switch, set the shared key it uses to exchange messages with the authentication RADIUSserver to aabbcc.z A CAMS server is used as the RADIUS server. You can select extended as the server-type in aRADIUS scheme.z On the RADIUS server, set the shared key it uses to exchange messages with the switch toaabbcc, set the authentication port number, and add Telnet usernames and login passwords.The Telnet usernames added to the RADIUS server must be in the format of userid@isp-name if youhave configured the switch to include domain names in the usernames to be sent to the RADIUS serverin the RADIUS scheme.