Cisco Systems 4.2 manual Preparing

Page 31

Chapter 2 Installing Cisco Access Registrar 4.2

Installing Cisco Access Registrar 4.2 Software on Linux

Step 7 When prompted whether to install the example configuration now, enter Y or N to continue.

Note You can delete the example configuration at any time by running the command

/opt/CSCOar/usrbin/aregcmd -f /opt/CSCOar/examples/cli/delete-example-configuration.rc.

unpack the rpm file done

 

 

Preparing...

###########################################

[100%]

1:CSCOarui-add

###########################################

[100%]

Archive: ./jakarta-tomcat-4.0.6.zip

creating: /opt/CSCOar/jakarta-tomcat-4.0.6/bin/ inflating: /opt/CSCOar/jakarta-tomcat-4.0.6/bin/bootstrap.jar inflating: /opt/CSCOar/jakarta-tomcat-4.0.6/bin/catalina.bat inflating: /opt/CSCOar/jakarta-tomcat-4.0.6/bin/catalina.sh inflating: /opt/CSCOar/jakarta-tomcat-4.0.6/bin/cpappend.bat inflating: /opt/CSCOar/jakarta-tomcat-4.0.6/bin/digest.bat inflating: /opt/CSCOar/jakarta-tomcat-4.0.6/bin/digest.sh inflating: /opt/CSCOar/jakarta-tomcat-4.0.6/bin/jasper.bat inflating: /opt/CSCOar/jakarta-tomcat-4.0.6/bin/jasper.sh

.

.

.

Rollforward recovery using "/opt/CSCOar/data/db/vista.tjf" finished Fri Nov 07 15:30:40 2008

#add-example-config y calling gen-tomcat

We will now generate an RSA key-pair and self-signed certificate that may be used for test purposes

Generating a 1536 bit RSA private key

.....................++++

.........................................++++

writing new private key to '/cisco-ar/certs/tomcat/server-key.pem'

-----

Server self-signed certificate now resides in /cisco-ar/certs/tomcat/server-cert.pem Server private RSA key now resides in /cisco-ar/certs/tomcat/server-key.pem

Remember to install additional CA certificates for client verification

Tomcat private RSA key now resides in /cisco-ar/certs/tomcat/server-key.pem

Starting Access Registrar Server Agent..completed.

The Radius server is now running.

hostname root /tmp###

Configuring SNMP

If you choose not to use the SNMP features of Cisco AR, the installation process is completed. To use SNMP features, complete the configuration procedure described in Configuring SNMP, page 4-14.

Installing and Configuring Cisco Access Registrar, 4.2

 

OL-17221-02

2-9

 

 

 

Image 31
Contents Installing and Configuring Cisco Access Registrar Installing and Configuring Cisco Access Registrar N T E N T S Upgrading Cisco Access Registrar Software Installing Cisco Access Registrar Software from CD-ROM3-14 Creating and Setting Group Membership Configuring Session Management Viii Cisco.com Obtaining DocumentationCisco Product Security Overview Reporting Security Problems in Cisco ProductsYou can access international Cisco websites at this URL Documentation FeedbackCisco Technical Support & Documentation Website Obtaining Technical AssistanceDefinitions of Service Request Severity Submitting a Service RequestXiii Obtaining Additional Publications and InformationXiv Installation Type Installation Dialog OverviewOpen Database Connectivity Installation LocationLicense File Location Java 2 Runtime EnvironmentBase Directory Downloading Cisco Access Registrar SoftwareExample Configuration Continue with InstallationCSCOar-4.2.1-sol10-k9.tar.gz for Solaris Cisco Access Registrar 4.2 LicensingOr stand-by Getting Cisco Access Registrar 4.2 LicenseLicense Slabs License slabs available in CAR 4.2 are listed in TableOpt/CSCOar/bin/arserver restart Installing Cisco Access Registrar 4.2 LicensesAdding Additional Cisco Access Registrar 4.2 Licenses Sample License FileAregcmd -l directoryname Aregcmd Command-Line OptionDisplaying License Information Launching aregcmdOL-17221-02 This chapter contains the following sections Installing the Cisco Access Registrar 4.2 License FileInstalling Cisco Access Registrar Software from CD-ROM Deciding Where to InstallInstalling Downloaded Software Zcat CSCOar-4.2.1-sol9-K9.tar.gz tar xvf Common Solaris Installation StepsEnter the following command to begin the installation For a full install, press EnterInstalling and Configuring Cisco Access Registrar Enter Y to install the setuid/setgid files RPC Bind Services Installing Cisco Access Registrar 4.2 Software on LinuxInstalling Cisco Access Registrar on LDoms Configuring SnmpCd /cdrom/cdrom0/kit/linux-2.4 Common Linux Installation StepsCp CSCOar-4.2.1-lnx26-install-K9.sh /tmp Chmod 777 CSCOar-4.2.1-lnx26-install-K9.shCSCOar-4.2.1-lnx26-install-k9.sh Enter the name of the script file to begin the installationPreparing OL-17221-02 Solaris Software Upgrade Overview Upgrading Cisco Access Registrar SoftwareCd /opt Mv AICar1 CSCOar Linux Software Upgrade OverviewEtc/init.d/arserver restart Disabling Replication Software Upgrade TasksCd /radius/replication Pkgrm AICar1 Removing the AICar1 PackageEnter y or yes to continue removing the AICar1 package Pkgrm CSCOar Removing the CSCOar PackageEnter y or yes to continue removing the CSCOar package Cd /opt/CSCOar/bin Uninstall-ar Using uninstall-ar to Remove Linux SoftwareEnter Yes or Y to continue removing the Linux software Upgrading Cisco Access Registrar Solaris Software Installing the Cisco Access Registrar License FileZcat CSCOar-4.2.1-sol9-k9.tar.gz tar xf Http//java.sun.com Where is the J2RE installed? ?,q Enter Y to preserve the local database Enter the administrator userID and passwordBack-up Copy of Original Configuration Removing Old VSA Names VSA Update ScriptOpt/CSCOar/data Upgrading Cisco Access Registrar Linux SoftwareServer Cd /opt/CSCOar/bin arserver stop Run the uninstall-ar program as shown belowCd /cdrom/cdrom0/kit/linux-2.6 Build Date Fri Nov 07 235551 Enter Y to remove old sessions or N to retain old sessions Oraclehome Backup Copy of Original ConfigurationRemoving Old VSA Names Restarting Replication Configuring SnmpOL-17221-02 General Command Syntax Using aregcmdAregcmd Commands Configuring a Basic SiteRunning aregcmd Set Password Changing the Administrator’s PasswordCd //localhost/Administrators Cd adminAdd jane testadmin Configuring the Radius ServerCreating Additional Administrators Cd /AdministratorsChecking the Server’s Health Checking the System-Level DefaultsSet DefaultSessionManager Selecting Ports to UseReload Displaying the UserListsAdd SaveAdd jane Displaying the Default UserListAdding Users to UserLists Ls -RDisplaying UserGroups Use the set command to provide a password for user janeSet password jane Cd /Radius/UserLists/Default Delete bethAdd QuickExampleNAS Configuring ClientsAdding a NAS Cd /Radius/ClientsSet Service-Type Framed Configuring ProfilesSetting Radius Attributes Cd /Radius/Profiles/Default-PPP-users/AttributesSet Framed-Routing 192.168.1.0/24 Validating and Using Your ChangesAdding Multiple Cisco AV Pairs Saving and ReloadingSimple john john Testing Your ConfigurationUsing radclient Radclient -sP001 send Configuring AccountingTroubleshooting Your Configuration Setting the Trace LevelAregcmd Cd /Radius/Advanced/SNMP Enabling Snmp in the Cisco Access Registrar ServerSet Enabled True Stopping the Master AgentOpt/CSCOar/bin/arserver stop Access ControlCreate a view to enable the groups to have rights Modifying the snmpd.conf FileSystem Contact Information Configuring Dynamic DNSRestarting the Master Agent Trap RecipientCd ddns Set Protocol dynamic-dns Cd /Radius/Advanced/DDNS/TSIGKeys Add foo.comCd foo.com Set Secret base64-encoded string Cd /Radius/RemoteServers Add ddnsCd /Radius/ResourceManagers Add ddns Testing Dynamic DNS with radclientSave the changes you have made Set p acctrequest Start bob Cd /opt/CSCOar/bin AregcmdTrace Launch radclient Cd /opt/CSCOar/bin Radclient Acctrequest Start usernameOL-17221-02 Configuring Specific Groups Configuring GroupsCd /Radius/UserLists/Default/jean Creating and Setting Group MembershipCd /Radius/UserGroups Using a Script to Determine Service Configuring a Default GroupSet Group Default Configuring Multiple UserListsPopulating UserLists Configuring Separate UserListsConfiguring Users Creating Separate UserListsCreating Separate Services Configuring ServicesCreating the Script Cd /Radius Configuring the ScriptClient Scripting Choosing the Scripting PointHandling Multiple Scripts Configuring a Remote Server for AAAdd ParseUserName Rex libParseUserName.so ParseUserName Add QuickExample Configuring the Remote ServerCreating a RemoteServer Cd /Radius/RemoteServersSet protocol ldap Use the set command to specify the protocol ldapAdd remote-ldap Remote Ldap Service Creating ServicesSet type ldap Use the set command to change the DefaultAuthorization Configuring Multiple Remote ServersChanging the Authentication and Authorization Defaults Set DefaultAuthentication remote-ldapCreating RemoteServers Configuring Two Remote ServersAdd North Creating the Services Set IncomingScript ParseRemoteServers Use the cd command to change to the Scripts objectConfiguring a Resource Manager Configuring Session ManagementCreating a Resource Manager Creating a Session Manager Configuring a Session ManagerSet 1 rm-100 Configuring Session ManagementUse the reload command to reload the Cisco AR server Enabling Session ManagementPPP SymbolsOverview Solaris DefaultAuthorizationServiceDefault ports Default-PPP-users Installing CAR on LDomsMultipleServersPolicy 5-6,5-11,5-14 RoundRobin policy RPC servicesReloading Reloading server Remote Servers Transactions per second Sample users Save commandDefinition Well-known ports
Related manuals
Manual 214 pages 55.15 Kb Manual 34 pages 46.13 Kb

4.2 specifications

Cisco Systems, a global leader in IT and networking solutions, has consistently evolved to meet the demands of modern enterprises. One of its noteworthy offerings is Cisco Systems 4.2, a version that embodies a significant leap in networking technology and capability. With its rich set of features, Cisco Systems 4.2 caters to a wide range of industries, facilitating enhanced performance and security.

One of the main features of Cisco Systems 4.2 is its improved scalability. The architecture has been designed to support an ever-increasing number of devices and users, making it ideal for growing enterprises. The enhanced scalability allows organizations to expand their network capacities without compromising performance, ensuring seamless integration of new technologies and devices.

Another critical aspect of Cisco Systems 4.2 is its advanced security protocols. With cyber threats constantly evolving, Cisco prioritizes security in this version by offering robust features such as end-to-end encryption, improved firewall capabilities, and enhanced intrusion detection systems. These security enhancements provide organizations with peace of mind, knowing that their sensitive data and networks are well-protected from unauthorized access and potential threats.

Cisco Systems 4.2 also introduces intelligent automation features, which significantly streamline network management. Through the use of artificial intelligence and machine learning, Cisco enables organizations to automate routine tasks, reduce human error, and optimize performance. This automation not only enhances efficiency but also allows IT teams to focus on strategic initiatives rather than day-to-day maintenance.

Moreover, Cisco Systems 4.2 emphasizes infrastructure flexibility. The new architecture supports various deployment models, including on-premises, cloud, and hybrid environments. This flexibility enables organizations to adapt their networking strategies according to their specific needs and operational requirements, facilitating a more tailored approach to IT infrastructure.

Collaboration tools have also been enhanced in this version. Cisco Systems 4.2 integrates advanced communication solutions that empower teams to collaborate in real time, regardless of their geographical location. Features such as high-definition video conferencing, secure messaging, and file sharing enhance productivity and foster innovation across teams.

In summary, Cisco Systems 4.2 stands out as a forward-thinking networking solution with key features such as scalability, advanced security, intelligent automation, flexible infrastructure, and enhanced collaboration tools. These characteristics position Cisco Systems 4.2 as an invaluable asset for enterprises striving for digital transformation in an increasingly interconnected world. The ongoing innovation reflects Cisco's commitment to delivering cutting-edge technology solutions that drive business success and resilience.