Cisco Systems 4.2 Displaying the Default UserList, Adding Users to UserLists, Ls -R, Add jane

Page 59

Chapter 4 Configuring Cisco Access Registrar 4.2

Configuring a Basic Site

Cisco AR, by default, specifies a Service called local-usersthat has the type local and uses the Default UserList (Figure 4-1).

Figure 4-1 Choosing Appropriate Services

 

 

Services

UserLists

 

 

local-users

Default

 

 

 

users

Request

Choose

local-file

 

 

 

 

service

 

 

 

 

 

 

group

 

 

 

 

18998

Displaying the Default UserList

Step 1 Use the cd command to change to UserLists/Default: cd /Radius/Userlists/Default

Step 2 Use the ls -Rcommand to display the properties of the three users:

ls -R

Cisco AR displays the three sample users:

bob who is configured as a PPP user

jane who is configured as a Telnet user

joe who is configured as either a PPP or Telnet user depending on how he logs in.

Adding Users to UserLists

Use the aregcmd command add to create a user under a UserList. The following lists the steps required to add a user:

Step 1 Use the add command to specify the name of a user and an optional description on one command line.

add jane

Added jane

Step 2 Change directory to jane.

cd jane

[ //localhost/Radius/UserLists/Default/jane ]

Name = jane

Installing and Configuring Cisco Access Registrar, 4.2

 

OL-17221-02

4-7

 

 

 

Image 59
Contents Installing and Configuring Cisco Access Registrar Installing and Configuring Cisco Access Registrar N T E N T S Upgrading Cisco Access Registrar Software Installing Cisco Access Registrar Software from CD-ROM3-14 Creating and Setting Group Membership Configuring Session Management Viii Cisco.com Obtaining DocumentationCisco Product Security Overview Reporting Security Problems in Cisco ProductsYou can access international Cisco websites at this URL Documentation FeedbackCisco Technical Support & Documentation Website Obtaining Technical AssistanceDefinitions of Service Request Severity Submitting a Service RequestXiii Obtaining Additional Publications and InformationXiv Installation Type Installation Dialog OverviewOpen Database Connectivity Installation LocationLicense File Location Java 2 Runtime EnvironmentBase Directory Downloading Cisco Access Registrar SoftwareExample Configuration Continue with InstallationCSCOar-4.2.1-sol10-k9.tar.gz for Solaris Cisco Access Registrar 4.2 LicensingOr stand-by Getting Cisco Access Registrar 4.2 LicenseLicense Slabs License slabs available in CAR 4.2 are listed in TableOpt/CSCOar/bin/arserver restart Installing Cisco Access Registrar 4.2 LicensesAdding Additional Cisco Access Registrar 4.2 Licenses Sample License FileAregcmd -l directoryname Aregcmd Command-Line OptionDisplaying License Information Launching aregcmdOL-17221-02 This chapter contains the following sections Installing the Cisco Access Registrar 4.2 License FileInstalling Downloaded Software Deciding Where to InstallInstalling Cisco Access Registrar Software from CD-ROM Zcat CSCOar-4.2.1-sol9-K9.tar.gz tar xvf Common Solaris Installation StepsEnter the following command to begin the installation For a full install, press EnterInstalling and Configuring Cisco Access Registrar Enter Y to install the setuid/setgid files RPC Bind Services Installing Cisco Access Registrar 4.2 Software on LinuxInstalling Cisco Access Registrar on LDoms Configuring SnmpCd /cdrom/cdrom0/kit/linux-2.4 Common Linux Installation StepsCp CSCOar-4.2.1-lnx26-install-K9.sh /tmp Chmod 777 CSCOar-4.2.1-lnx26-install-K9.shCSCOar-4.2.1-lnx26-install-k9.sh Enter the name of the script file to begin the installationPreparing OL-17221-02 Solaris Software Upgrade Overview Upgrading Cisco Access Registrar SoftwareEtc/init.d/arserver restart Linux Software Upgrade OverviewCd /opt Mv AICar1 CSCOar Cd /radius/replication Software Upgrade TasksDisabling Replication Enter y or yes to continue removing the AICar1 package Removing the AICar1 PackagePkgrm AICar1 Enter y or yes to continue removing the CSCOar package Removing the CSCOar PackagePkgrm CSCOar Enter Yes or Y to continue removing the Linux software Using uninstall-ar to Remove Linux SoftwareCd /opt/CSCOar/bin Uninstall-ar Upgrading Cisco Access Registrar Solaris Software Installing the Cisco Access Registrar License FileZcat CSCOar-4.2.1-sol9-k9.tar.gz tar xf Http//java.sun.com Where is the J2RE installed? ?,q Enter Y to preserve the local database Enter the administrator userID and passwordBack-up Copy of Original Configuration Removing Old VSA Names VSA Update ScriptServer Upgrading Cisco Access Registrar Linux SoftwareOpt/CSCOar/data Cd /cdrom/cdrom0/kit/linux-2.6 Run the uninstall-ar program as shown belowCd /opt/CSCOar/bin arserver stop Build Date Fri Nov 07 235551 Enter Y to remove old sessions or N to retain old sessions Oraclehome Backup Copy of Original ConfigurationRemoving Old VSA Names Restarting Replication Configuring SnmpOL-17221-02 General Command Syntax Using aregcmdRunning aregcmd Configuring a Basic SiteAregcmd Commands Set Password Changing the Administrator’s PasswordCd //localhost/Administrators Cd adminAdd jane testadmin Configuring the Radius ServerCreating Additional Administrators Cd /AdministratorsChecking the Server’s Health Checking the System-Level DefaultsSet DefaultSessionManager Selecting Ports to UseReload Displaying the UserListsAdd SaveAdd jane Displaying the Default UserListAdding Users to UserLists Ls -RDisplaying UserGroups Use the set command to provide a password for user janeSet password jane Cd /Radius/UserLists/Default Delete bethAdd QuickExampleNAS Configuring ClientsAdding a NAS Cd /Radius/ClientsSet Service-Type Framed Configuring ProfilesSetting Radius Attributes Cd /Radius/Profiles/Default-PPP-users/AttributesSet Framed-Routing 192.168.1.0/24 Validating and Using Your ChangesAdding Multiple Cisco AV Pairs Saving and ReloadingSimple john john Testing Your ConfigurationUsing radclient Radclient -sP001 send Configuring AccountingTroubleshooting Your Configuration Setting the Trace LevelAregcmd Cd /Radius/Advanced/SNMP Enabling Snmp in the Cisco Access Registrar ServerSet Enabled True Stopping the Master AgentOpt/CSCOar/bin/arserver stop Access ControlCreate a view to enable the groups to have rights Modifying the snmpd.conf FileSystem Contact Information Configuring Dynamic DNSRestarting the Master Agent Trap RecipientCd ddns Set Protocol dynamic-dns Cd /Radius/Advanced/DDNS/TSIGKeys Add foo.comCd foo.com Set Secret base64-encoded string Cd /Radius/RemoteServers Add ddnsSave the changes you have made Testing Dynamic DNS with radclientCd /Radius/ResourceManagers Add ddns Set p acctrequest Start bob Cd /opt/CSCOar/bin AregcmdTrace Launch radclient Cd /opt/CSCOar/bin Radclient Acctrequest Start usernameOL-17221-02 Configuring Specific Groups Configuring GroupsCd /Radius/UserGroups Creating and Setting Group MembershipCd /Radius/UserLists/Default/jean Using a Script to Determine Service Configuring a Default GroupSet Group Default Configuring Multiple UserListsPopulating UserLists Configuring Separate UserListsConfiguring Users Creating Separate UserListsCreating the Script Configuring ServicesCreating Separate Services Cd /Radius Configuring the ScriptClient Scripting Choosing the Scripting PointAdd ParseUserName Rex libParseUserName.so ParseUserName Configuring a Remote Server for AAHandling Multiple Scripts Add QuickExample Configuring the Remote ServerCreating a RemoteServer Cd /Radius/RemoteServersSet protocol ldap Use the set command to specify the protocol ldapSet type ldap Creating ServicesAdd remote-ldap Remote Ldap Service Use the set command to change the DefaultAuthorization Configuring Multiple Remote ServersChanging the Authentication and Authorization Defaults Set DefaultAuthentication remote-ldapAdd North Configuring Two Remote ServersCreating RemoteServers Creating the Services Set IncomingScript ParseRemoteServers Use the cd command to change to the Scripts objectCreating a Resource Manager Configuring Session ManagementConfiguring a Resource Manager Creating a Session Manager Configuring a Session ManagerSet 1 rm-100 Configuring Session ManagementUse the reload command to reload the Cisco AR server Enabling Session ManagementPPP SymbolsOverview Solaris DefaultAuthorizationServiceDefault ports Default-PPP-users Installing CAR on LDomsReloading Reloading server Remote Servers RoundRobin policy RPC servicesMultipleServersPolicy 5-6,5-11,5-14 Definition Well-known ports Sample users Save commandTransactions per second
Related manuals
Manual 214 pages 55.15 Kb Manual 34 pages 46.13 Kb

4.2 specifications

Cisco Systems, a global leader in IT and networking solutions, has consistently evolved to meet the demands of modern enterprises. One of its noteworthy offerings is Cisco Systems 4.2, a version that embodies a significant leap in networking technology and capability. With its rich set of features, Cisco Systems 4.2 caters to a wide range of industries, facilitating enhanced performance and security.

One of the main features of Cisco Systems 4.2 is its improved scalability. The architecture has been designed to support an ever-increasing number of devices and users, making it ideal for growing enterprises. The enhanced scalability allows organizations to expand their network capacities without compromising performance, ensuring seamless integration of new technologies and devices.

Another critical aspect of Cisco Systems 4.2 is its advanced security protocols. With cyber threats constantly evolving, Cisco prioritizes security in this version by offering robust features such as end-to-end encryption, improved firewall capabilities, and enhanced intrusion detection systems. These security enhancements provide organizations with peace of mind, knowing that their sensitive data and networks are well-protected from unauthorized access and potential threats.

Cisco Systems 4.2 also introduces intelligent automation features, which significantly streamline network management. Through the use of artificial intelligence and machine learning, Cisco enables organizations to automate routine tasks, reduce human error, and optimize performance. This automation not only enhances efficiency but also allows IT teams to focus on strategic initiatives rather than day-to-day maintenance.

Moreover, Cisco Systems 4.2 emphasizes infrastructure flexibility. The new architecture supports various deployment models, including on-premises, cloud, and hybrid environments. This flexibility enables organizations to adapt their networking strategies according to their specific needs and operational requirements, facilitating a more tailored approach to IT infrastructure.

Collaboration tools have also been enhanced in this version. Cisco Systems 4.2 integrates advanced communication solutions that empower teams to collaborate in real time, regardless of their geographical location. Features such as high-definition video conferencing, secure messaging, and file sharing enhance productivity and foster innovation across teams.

In summary, Cisco Systems 4.2 stands out as a forward-thinking networking solution with key features such as scalability, advanced security, intelligent automation, flexible infrastructure, and enhanced collaboration tools. These characteristics position Cisco Systems 4.2 as an invaluable asset for enterprises striving for digital transformation in an increasingly interconnected world. The ongoing innovation reflects Cisco's commitment to delivering cutting-edge technology solutions that drive business success and resilience.