Cisco Systems 4.2 manual Common Linux Installation Steps, Cd /cdrom/cdrom0/kit/linux-2.4

Page 29

Chapter 2 Installing Cisco Access Registrar 4.2

Installing Cisco Access Registrar 4.2 Software on Linux

Deciding Where to Install

Before you begin the software installation, you should decide where you want to install the new software. The default installation directory for CAR 4.2 software is /opt/CSCOar. You can use the default installation directory, or you can choose to install the Cisco AR software in a different directory.

Installing Cisco Access Registrar Software from CD-ROM

The following steps describe how to begin the software installation process when installing software from the CAR 4.2 CD-ROM. If you are installing downloaded software, proceed to Installing Downloaded Software.

Step 1 Place the CAR 4.2 software CD-ROM in the Cisco AR workstation CD-ROM drive.

Step 2 Log in to the Cisco AR workstation as a root user and find a temporary directory, such as /tmp, to store the Linux installation file.

Note The temporary directory requires at least 70 MB of free space.

Step 3 Change directory to the CD-ROM.

cd /cdrom/cdrom0/kit/linux-2.4

Step 4 Copy the CSCOar-4.2.1-lnx26-install-K9.shfile to the temporary directory.

cp CSCOar-4.2.1-lnx26-install-K9.sh /tmp

Step 5 Change the permissions of the CSCOar-4.1.4-lnx24-install-k9.sh file to make it executable.

chmod 777 CSCOar-4.2.1-lnx26-install-K9.sh

To continue the installation, proceed to Common Linux Installation Steps.

Common Linux Installation Steps

This section describes how to install the downloaded Cisco AR software for Linux and begin the software installation.

Note The Cisco AR Linux installation automatically installs aregcmd and radclient as setgid programs in group adm.

Step 1 Log in to the Cisco AR workstation as a root user.

Step 2 Change directory to the location where you have stored the CSCOar-4.1.4-lnx26-install-K9.shfile. cd /tmp

Installing and Configuring Cisco Access Registrar, 4.2

 

OL-17221-02

2-7

 

 

 

Image 29
Contents Installing and Configuring Cisco Access Registrar Installing and Configuring Cisco Access Registrar N T E N T S Upgrading Cisco Access Registrar Software Installing Cisco Access Registrar Software from CD-ROM3-14 Creating and Setting Group Membership Configuring Session Management Viii Cisco.com Obtaining DocumentationYou can access international Cisco websites at this URL Reporting Security Problems in Cisco ProductsDocumentation Feedback Cisco Product Security OverviewCisco Technical Support & Documentation Website Obtaining Technical AssistanceDefinitions of Service Request Severity Submitting a Service RequestXiii Obtaining Additional Publications and InformationXiv Installation Type Installation Dialog OverviewLicense File Location Installation LocationJava 2 Runtime Environment Open Database ConnectivityExample Configuration Downloading Cisco Access Registrar SoftwareContinue with Installation Base DirectoryCSCOar-4.2.1-sol10-k9.tar.gz for Solaris Cisco Access Registrar 4.2 LicensingLicense Slabs Getting Cisco Access Registrar 4.2 LicenseLicense slabs available in CAR 4.2 are listed in Table Or stand-byAdding Additional Cisco Access Registrar 4.2 Licenses Installing Cisco Access Registrar 4.2 LicensesSample License File Opt/CSCOar/bin/arserver restartDisplaying License Information Aregcmd Command-Line OptionLaunching aregcmd Aregcmd -l directorynameOL-17221-02 This chapter contains the following sections Installing the Cisco Access Registrar 4.2 License FileInstalling Downloaded Software Deciding Where to InstallInstalling Cisco Access Registrar Software from CD-ROM Enter the following command to begin the installation Common Solaris Installation StepsFor a full install, press Enter Zcat CSCOar-4.2.1-sol9-K9.tar.gz tar xvfInstalling and Configuring Cisco Access Registrar Enter Y to install the setuid/setgid files Installing Cisco Access Registrar on LDoms Installing Cisco Access Registrar 4.2 Software on LinuxConfiguring Snmp RPC Bind ServicesCp CSCOar-4.2.1-lnx26-install-K9.sh /tmp Common Linux Installation StepsChmod 777 CSCOar-4.2.1-lnx26-install-K9.sh Cd /cdrom/cdrom0/kit/linux-2.4CSCOar-4.2.1-lnx26-install-k9.sh Enter the name of the script file to begin the installationPreparing OL-17221-02 Solaris Software Upgrade Overview Upgrading Cisco Access Registrar SoftwareEtc/init.d/arserver restart Linux Software Upgrade OverviewCd /opt Mv AICar1 CSCOar Cd /radius/replication Software Upgrade TasksDisabling Replication Enter y or yes to continue removing the AICar1 package Removing the AICar1 PackagePkgrm AICar1 Enter y or yes to continue removing the CSCOar package Removing the CSCOar PackagePkgrm CSCOar Enter Yes or Y to continue removing the Linux software Using uninstall-ar to Remove Linux SoftwareCd /opt/CSCOar/bin Uninstall-ar Upgrading Cisco Access Registrar Solaris Software Installing the Cisco Access Registrar License FileZcat CSCOar-4.2.1-sol9-k9.tar.gz tar xf Http//java.sun.com Where is the J2RE installed? ?,q Enter Y to preserve the local database Enter the administrator userID and passwordBack-up Copy of Original Configuration Removing Old VSA Names VSA Update ScriptServer Upgrading Cisco Access Registrar Linux SoftwareOpt/CSCOar/data Cd /cdrom/cdrom0/kit/linux-2.6 Run the uninstall-ar program as shown belowCd /opt/CSCOar/bin arserver stop Build Date Fri Nov 07 235551 Enter Y to remove old sessions or N to retain old sessions Oraclehome Backup Copy of Original ConfigurationRemoving Old VSA Names Restarting Replication Configuring SnmpOL-17221-02 General Command Syntax Using aregcmdRunning aregcmd Configuring a Basic SiteAregcmd Commands Cd //localhost/Administrators Changing the Administrator’s PasswordCd admin Set PasswordCreating Additional Administrators Configuring the Radius ServerCd /Administrators Add jane testadminSet DefaultSessionManager Checking the System-Level DefaultsSelecting Ports to Use Checking the Server’s HealthAdd Displaying the UserListsSave ReloadAdding Users to UserLists Displaying the Default UserListLs -R Add janeSet password jane Use the set command to provide a password for user janeCd /Radius/UserLists/Default Delete beth Displaying UserGroupsAdding a NAS Configuring ClientsCd /Radius/Clients Add QuickExampleNASSetting Radius Attributes Configuring ProfilesCd /Radius/Profiles/Default-PPP-users/Attributes Set Service-Type FramedAdding Multiple Cisco AV Pairs Validating and Using Your ChangesSaving and Reloading Set Framed-Routing 192.168.1.0/24Using radclient Testing Your ConfigurationRadclient -s Simple john johnTroubleshooting Your Configuration Configuring AccountingSetting the Trace Level P001 sendSet Enabled True Enabling Snmp in the Cisco Access Registrar ServerStopping the Master Agent Aregcmd Cd /Radius/Advanced/SNMPCreate a view to enable the groups to have rights Access ControlModifying the snmpd.conf File Opt/CSCOar/bin/arserver stopRestarting the Master Agent Configuring Dynamic DNSTrap Recipient System Contact InformationCd foo.com Set Secret base64-encoded string Cd /Radius/Advanced/DDNS/TSIGKeys Add foo.comCd /Radius/RemoteServers Add ddns Cd ddns Set Protocol dynamic-dnsSave the changes you have made Testing Dynamic DNS with radclientCd /Radius/ResourceManagers Add ddns Trace Launch radclient Cd /opt/CSCOar/bin Radclient Cd /opt/CSCOar/bin AregcmdAcctrequest Start username Set p acctrequest Start bobOL-17221-02 Configuring Specific Groups Configuring GroupsCd /Radius/UserGroups Creating and Setting Group MembershipCd /Radius/UserLists/Default/jean Using a Script to Determine Service Configuring a Default GroupSet Group Default Configuring Multiple UserListsConfiguring Users Configuring Separate UserListsCreating Separate UserLists Populating UserListsCreating the Script Configuring ServicesCreating Separate Services Client Scripting Configuring the ScriptChoosing the Scripting Point Cd /RadiusAdd ParseUserName Rex libParseUserName.so ParseUserName Configuring a Remote Server for AAHandling Multiple Scripts Creating a RemoteServer Configuring the Remote ServerCd /Radius/RemoteServers Add QuickExampleSet protocol ldap Use the set command to specify the protocol ldapSet type ldap Creating ServicesAdd remote-ldap Remote Ldap Service Changing the Authentication and Authorization Defaults Configuring Multiple Remote ServersSet DefaultAuthentication remote-ldap Use the set command to change the DefaultAuthorizationAdd North Configuring Two Remote ServersCreating RemoteServers Creating the Services Set IncomingScript ParseRemoteServers Use the cd command to change to the Scripts objectCreating a Resource Manager Configuring Session ManagementConfiguring a Resource Manager Creating a Session Manager Configuring a Session ManagerUse the reload command to reload the Cisco AR server Configuring Session ManagementEnabling Session Management Set 1 rm-100PPP SymbolsDefault ports Default-PPP-users DefaultAuthorizationServiceInstalling CAR on LDoms Overview SolarisReloading Reloading server Remote Servers RoundRobin policy RPC servicesMultipleServersPolicy 5-6,5-11,5-14 Definition Well-known ports Sample users Save commandTransactions per second
Related manuals
Manual 214 pages 55.15 Kb Manual 34 pages 46.13 Kb

4.2 specifications

Cisco Systems, a global leader in IT and networking solutions, has consistently evolved to meet the demands of modern enterprises. One of its noteworthy offerings is Cisco Systems 4.2, a version that embodies a significant leap in networking technology and capability. With its rich set of features, Cisco Systems 4.2 caters to a wide range of industries, facilitating enhanced performance and security.

One of the main features of Cisco Systems 4.2 is its improved scalability. The architecture has been designed to support an ever-increasing number of devices and users, making it ideal for growing enterprises. The enhanced scalability allows organizations to expand their network capacities without compromising performance, ensuring seamless integration of new technologies and devices.

Another critical aspect of Cisco Systems 4.2 is its advanced security protocols. With cyber threats constantly evolving, Cisco prioritizes security in this version by offering robust features such as end-to-end encryption, improved firewall capabilities, and enhanced intrusion detection systems. These security enhancements provide organizations with peace of mind, knowing that their sensitive data and networks are well-protected from unauthorized access and potential threats.

Cisco Systems 4.2 also introduces intelligent automation features, which significantly streamline network management. Through the use of artificial intelligence and machine learning, Cisco enables organizations to automate routine tasks, reduce human error, and optimize performance. This automation not only enhances efficiency but also allows IT teams to focus on strategic initiatives rather than day-to-day maintenance.

Moreover, Cisco Systems 4.2 emphasizes infrastructure flexibility. The new architecture supports various deployment models, including on-premises, cloud, and hybrid environments. This flexibility enables organizations to adapt their networking strategies according to their specific needs and operational requirements, facilitating a more tailored approach to IT infrastructure.

Collaboration tools have also been enhanced in this version. Cisco Systems 4.2 integrates advanced communication solutions that empower teams to collaborate in real time, regardless of their geographical location. Features such as high-definition video conferencing, secure messaging, and file sharing enhance productivity and foster innovation across teams.

In summary, Cisco Systems 4.2 stands out as a forward-thinking networking solution with key features such as scalability, advanced security, intelligent automation, flexible infrastructure, and enhanced collaboration tools. These characteristics position Cisco Systems 4.2 as an invaluable asset for enterprises striving for digital transformation in an increasingly interconnected world. The ongoing innovation reflects Cisco's commitment to delivering cutting-edge technology solutions that drive business success and resilience.