Cisco Systems 4.2 manual Configuring the Radius Server, Creating Additional Administrators

Page 56

Chapter 4 Configuring Cisco Access Registrar 4.2

Configuring a Basic Site

Creating Additional Administrators

Use the add command to add additional administrators.

Step 1 Use the cd command to change to the Administrators level:

cd /Administrators

Step 2 Use the add command and specify the name of the administrator, an optional description, and a password.

The following example adds the administrator jane, description testadmin, and password 123:

add jane testadmin 123

Step 3 Use the ls command to display the properties of the new administrator:

ls

Configuring the RADIUS Server

The top level of the Cisco AR RADIUS server is the Radius object itself. It specifies the name of the server and other parameters. In configuring this site, you only need to change a few of these properties.

[ //localhost/Radius ] Name = Radius Description = Version = 4.2.1 IncomingScript~ = OutgoingScript~ = DefaultAuthenticationService~ = local-users DefaultAuthorizationService~ = local-users DefaultAccountingService~ = local-file DefaultSessionService~ = DefaultSessionManager~ = session-mgr-1 UserLists/

UserGroups/

Policies/

Clients/

Vendors/

Scripts/

Services/

SessionManagers/

ResourceManagers/

Profiles/

Rules/

Translations/

TranslationGroups/

RemoteServers/

Advanced/

Replication/

Installing and Configuring Cisco Access Registrar, 4.2

4-4

OL-17221-02

 

 

Image 56
Contents Installing and Configuring Cisco Access Registrar Installing and Configuring Cisco Access Registrar N T E N T S Upgrading Cisco Access Registrar Software Installing Cisco Access Registrar Software from CD-ROM3-14 Creating and Setting Group Membership Configuring Session Management Viii Obtaining Documentation Cisco.comReporting Security Problems in Cisco Products You can access international Cisco websites at this URLDocumentation Feedback Cisco Product Security OverviewObtaining Technical Assistance Cisco Technical Support & Documentation WebsiteSubmitting a Service Request Definitions of Service Request SeverityObtaining Additional Publications and Information XiiiXiv Installation Dialog Overview Installation TypeInstallation Location License File LocationJava 2 Runtime Environment Open Database ConnectivityDownloading Cisco Access Registrar Software Example ConfigurationContinue with Installation Base DirectoryCisco Access Registrar 4.2 Licensing CSCOar-4.2.1-sol10-k9.tar.gz for SolarisGetting Cisco Access Registrar 4.2 License License SlabsLicense slabs available in CAR 4.2 are listed in Table Or stand-byInstalling Cisco Access Registrar 4.2 Licenses Adding Additional Cisco Access Registrar 4.2 LicensesSample License File Opt/CSCOar/bin/arserver restartAregcmd Command-Line Option Displaying License InformationLaunching aregcmd Aregcmd -l directorynameOL-17221-02 Installing the Cisco Access Registrar 4.2 License File This chapter contains the following sectionsInstalling Downloaded Software Deciding Where to InstallInstalling Cisco Access Registrar Software from CD-ROM Common Solaris Installation Steps Enter the following command to begin the installationFor a full install, press Enter Zcat CSCOar-4.2.1-sol9-K9.tar.gz tar xvfInstalling and Configuring Cisco Access Registrar Enter Y to install the setuid/setgid files Installing Cisco Access Registrar 4.2 Software on Linux Installing Cisco Access Registrar on LDomsConfiguring Snmp RPC Bind ServicesCommon Linux Installation Steps Cp CSCOar-4.2.1-lnx26-install-K9.sh /tmpChmod 777 CSCOar-4.2.1-lnx26-install-K9.sh Cd /cdrom/cdrom0/kit/linux-2.4Enter the name of the script file to begin the installation CSCOar-4.2.1-lnx26-install-k9.shPreparing OL-17221-02 Upgrading Cisco Access Registrar Software Solaris Software Upgrade OverviewEtc/init.d/arserver restart Linux Software Upgrade OverviewCd /opt Mv AICar1 CSCOar Cd /radius/replication Software Upgrade TasksDisabling Replication Enter y or yes to continue removing the AICar1 package Removing the AICar1 PackagePkgrm AICar1 Enter y or yes to continue removing the CSCOar package Removing the CSCOar PackagePkgrm CSCOar Enter Yes or Y to continue removing the Linux software Using uninstall-ar to Remove Linux SoftwareCd /opt/CSCOar/bin Uninstall-ar Installing the Cisco Access Registrar License File Upgrading Cisco Access Registrar Solaris SoftwareZcat CSCOar-4.2.1-sol9-k9.tar.gz tar xf Http//java.sun.com Where is the J2RE installed? ?,q Enter the administrator userID and password Enter Y to preserve the local databaseBack-up Copy of Original Configuration VSA Update Script Removing Old VSA NamesServer Upgrading Cisco Access Registrar Linux SoftwareOpt/CSCOar/data Cd /cdrom/cdrom0/kit/linux-2.6 Run the uninstall-ar program as shown belowCd /opt/CSCOar/bin arserver stop Build Date Fri Nov 07 235551 Enter Y to remove old sessions or N to retain old sessions Backup Copy of Original Configuration OraclehomeRemoving Old VSA Names Configuring Snmp Restarting ReplicationOL-17221-02 Using aregcmd General Command SyntaxRunning aregcmd Configuring a Basic SiteAregcmd Commands Changing the Administrator’s Password Cd //localhost/AdministratorsCd admin Set PasswordConfiguring the Radius Server Creating Additional AdministratorsCd /Administrators Add jane testadminChecking the System-Level Defaults Set DefaultSessionManagerSelecting Ports to Use Checking the Server’s HealthDisplaying the UserLists AddSave ReloadDisplaying the Default UserList Adding Users to UserListsLs -R Add janeUse the set command to provide a password for user jane Set password janeCd /Radius/UserLists/Default Delete beth Displaying UserGroupsConfiguring Clients Adding a NASCd /Radius/Clients Add QuickExampleNASConfiguring Profiles Setting Radius AttributesCd /Radius/Profiles/Default-PPP-users/Attributes Set Service-Type FramedValidating and Using Your Changes Adding Multiple Cisco AV PairsSaving and Reloading Set Framed-Routing 192.168.1.0/24Testing Your Configuration Using radclientRadclient -s Simple john johnConfiguring Accounting Troubleshooting Your ConfigurationSetting the Trace Level P001 sendEnabling Snmp in the Cisco Access Registrar Server Set Enabled TrueStopping the Master Agent Aregcmd Cd /Radius/Advanced/SNMPAccess Control Create a view to enable the groups to have rightsModifying the snmpd.conf File Opt/CSCOar/bin/arserver stopConfiguring Dynamic DNS Restarting the Master AgentTrap Recipient System Contact InformationCd /Radius/Advanced/DDNS/TSIGKeys Add foo.com Cd foo.com Set Secret base64-encoded stringCd /Radius/RemoteServers Add ddns Cd ddns Set Protocol dynamic-dnsSave the changes you have made Testing Dynamic DNS with radclientCd /Radius/ResourceManagers Add ddns Cd /opt/CSCOar/bin Aregcmd Trace Launch radclient Cd /opt/CSCOar/bin RadclientAcctrequest Start username Set p acctrequest Start bobOL-17221-02 Configuring Groups Configuring Specific GroupsCd /Radius/UserGroups Creating and Setting Group MembershipCd /Radius/UserLists/Default/jean Configuring a Default Group Using a Script to Determine ServiceConfiguring Multiple UserLists Set Group DefaultConfiguring Separate UserLists Configuring UsersCreating Separate UserLists Populating UserListsCreating the Script Configuring ServicesCreating Separate Services Configuring the Script Client ScriptingChoosing the Scripting Point Cd /RadiusAdd ParseUserName Rex libParseUserName.so ParseUserName Configuring a Remote Server for AAHandling Multiple Scripts Configuring the Remote Server Creating a RemoteServerCd /Radius/RemoteServers Add QuickExampleUse the set command to specify the protocol ldap Set protocol ldapSet type ldap Creating ServicesAdd remote-ldap Remote Ldap Service Configuring Multiple Remote Servers Changing the Authentication and Authorization DefaultsSet DefaultAuthentication remote-ldap Use the set command to change the DefaultAuthorizationAdd North Configuring Two Remote ServersCreating RemoteServers Creating the Services Use the cd command to change to the Scripts object Set IncomingScript ParseRemoteServersCreating a Resource Manager Configuring Session ManagementConfiguring a Resource Manager Configuring a Session Manager Creating a Session ManagerConfiguring Session Management Use the reload command to reload the Cisco AR serverEnabling Session Management Set 1 rm-100Symbols PPPDefaultAuthorizationService Default ports Default-PPP-usersInstalling CAR on LDoms Overview SolarisReloading Reloading server Remote Servers RoundRobin policy RPC servicesMultipleServersPolicy 5-6,5-11,5-14 Definition Well-known ports Sample users Save commandTransactions per second
Related manuals
Manual 214 pages 55.15 Kb Manual 34 pages 46.13 Kb

4.2 specifications

Cisco Systems, a global leader in IT and networking solutions, has consistently evolved to meet the demands of modern enterprises. One of its noteworthy offerings is Cisco Systems 4.2, a version that embodies a significant leap in networking technology and capability. With its rich set of features, Cisco Systems 4.2 caters to a wide range of industries, facilitating enhanced performance and security.

One of the main features of Cisco Systems 4.2 is its improved scalability. The architecture has been designed to support an ever-increasing number of devices and users, making it ideal for growing enterprises. The enhanced scalability allows organizations to expand their network capacities without compromising performance, ensuring seamless integration of new technologies and devices.

Another critical aspect of Cisco Systems 4.2 is its advanced security protocols. With cyber threats constantly evolving, Cisco prioritizes security in this version by offering robust features such as end-to-end encryption, improved firewall capabilities, and enhanced intrusion detection systems. These security enhancements provide organizations with peace of mind, knowing that their sensitive data and networks are well-protected from unauthorized access and potential threats.

Cisco Systems 4.2 also introduces intelligent automation features, which significantly streamline network management. Through the use of artificial intelligence and machine learning, Cisco enables organizations to automate routine tasks, reduce human error, and optimize performance. This automation not only enhances efficiency but also allows IT teams to focus on strategic initiatives rather than day-to-day maintenance.

Moreover, Cisco Systems 4.2 emphasizes infrastructure flexibility. The new architecture supports various deployment models, including on-premises, cloud, and hybrid environments. This flexibility enables organizations to adapt their networking strategies according to their specific needs and operational requirements, facilitating a more tailored approach to IT infrastructure.

Collaboration tools have also been enhanced in this version. Cisco Systems 4.2 integrates advanced communication solutions that empower teams to collaborate in real time, regardless of their geographical location. Features such as high-definition video conferencing, secure messaging, and file sharing enhance productivity and foster innovation across teams.

In summary, Cisco Systems 4.2 stands out as a forward-thinking networking solution with key features such as scalability, advanced security, intelligent automation, flexible infrastructure, and enhanced collaboration tools. These characteristics position Cisco Systems 4.2 as an invaluable asset for enterprises striving for digital transformation in an increasingly interconnected world. The ongoing innovation reflects Cisco's commitment to delivering cutting-edge technology solutions that drive business success and resilience.