Cisco Systems 4.2 manual Testing Dynamic DNS with radclient, Cd /Radius/ResourceManagers Add ddns

Page 70

Chapter 4 Configuring Cisco Access Registrar 4.2

Configuring Dynamic DNS

set IPAddress 10.10.10.1 (ip address of primary dns server for zone)

set ForwardZoneTSIGKey foo.com

set ReverseZoneTSIGKey foo.com

If the reverse zone will be updated and if the primary server for the reverse zone is different than the primary server for the forward zone, you will need to add another Remote Server. Follow the previous two steps to do so. Note that the IP Address and the TSIG Key will be different.

You can now use aregcmd to create and configure a resource manager of type dynamic-dns.

Step 7 Create the dynamic-dns resource manager:

cd /Radius/ResourceManagers

add ddns

This example named the service ddns which is the related to the resource manager type but you can use any valid name for your resource manager.

Step 8 Configure the dynamic-dns resource manager.

cd ddns

set Type dynamic-dns

set ForwardZone foo.com

set ForwardZoneServer DDNS

Finally, reference the new resource manager from a session manager. Assuming that the example configuration was installed, the following step will accomplish this. If you have a different session manager defined you can add it there if that is appropriate.

Step 9 Reference the resource manager from a session manager:

cd /Radius/SessionManagers/session-mgr-1/ResourceManagers

set 5 DDNS

Note The Property AllowAccountingStartToCreateSession must be set to TRUE for dynamic DNS to work.

Step 10 Save the changes you have made.

Testing Dynamic DNS with radclient

After the Resource Manager has been defined it must be referenced from the appropriate Session Manager. You can use radclient to confirm that dynamic DNS has been properly configured and is operational.

To test Dynamic DNS using radclient, follow these steps:

 

Installing and Configuring Cisco Access Registrar, 4.2

4-18

OL-17221-02

Image 70
Contents Installing and Configuring Cisco Access Registrar Installing and Configuring Cisco Access Registrar N T E N T S Upgrading Cisco Access Registrar Software Installing Cisco Access Registrar Software from CD-ROM3-14 Creating and Setting Group Membership Configuring Session Management Viii Obtaining Documentation Cisco.comDocumentation Feedback Reporting Security Problems in Cisco ProductsYou can access international Cisco websites at this URL Cisco Product Security OverviewObtaining Technical Assistance Cisco Technical Support & Documentation WebsiteSubmitting a Service Request Definitions of Service Request SeverityObtaining Additional Publications and Information XiiiXiv Installation Dialog Overview Installation TypeJava 2 Runtime Environment Installation LocationLicense File Location Open Database ConnectivityContinue with Installation Downloading Cisco Access Registrar SoftwareExample Configuration Base DirectoryCisco Access Registrar 4.2 Licensing CSCOar-4.2.1-sol10-k9.tar.gz for SolarisLicense slabs available in CAR 4.2 are listed in Table Getting Cisco Access Registrar 4.2 LicenseLicense Slabs Or stand-bySample License File Installing Cisco Access Registrar 4.2 LicensesAdding Additional Cisco Access Registrar 4.2 Licenses Opt/CSCOar/bin/arserver restartLaunching aregcmd Aregcmd Command-Line OptionDisplaying License Information Aregcmd -l directorynameOL-17221-02 Installing the Cisco Access Registrar 4.2 License File This chapter contains the following sectionsInstalling Cisco Access Registrar Software from CD-ROM Deciding Where to InstallInstalling Downloaded Software For a full install, press Enter Common Solaris Installation StepsEnter the following command to begin the installation Zcat CSCOar-4.2.1-sol9-K9.tar.gz tar xvfInstalling and Configuring Cisco Access Registrar Enter Y to install the setuid/setgid files Configuring Snmp Installing Cisco Access Registrar 4.2 Software on LinuxInstalling Cisco Access Registrar on LDoms RPC Bind ServicesChmod 777 CSCOar-4.2.1-lnx26-install-K9.sh Common Linux Installation StepsCp CSCOar-4.2.1-lnx26-install-K9.sh /tmp Cd /cdrom/cdrom0/kit/linux-2.4Enter the name of the script file to begin the installation CSCOar-4.2.1-lnx26-install-k9.shPreparing OL-17221-02 Upgrading Cisco Access Registrar Software Solaris Software Upgrade OverviewCd /opt Mv AICar1 CSCOar Linux Software Upgrade OverviewEtc/init.d/arserver restart Disabling Replication Software Upgrade TasksCd /radius/replication Pkgrm AICar1 Removing the AICar1 PackageEnter y or yes to continue removing the AICar1 package Pkgrm CSCOar Removing the CSCOar PackageEnter y or yes to continue removing the CSCOar package Cd /opt/CSCOar/bin Uninstall-ar Using uninstall-ar to Remove Linux SoftwareEnter Yes or Y to continue removing the Linux software Installing the Cisco Access Registrar License File Upgrading Cisco Access Registrar Solaris SoftwareZcat CSCOar-4.2.1-sol9-k9.tar.gz tar xf Http//java.sun.com Where is the J2RE installed? ?,q Enter the administrator userID and password Enter Y to preserve the local databaseBack-up Copy of Original Configuration VSA Update Script Removing Old VSA NamesOpt/CSCOar/data Upgrading Cisco Access Registrar Linux SoftwareServer Cd /opt/CSCOar/bin arserver stop Run the uninstall-ar program as shown belowCd /cdrom/cdrom0/kit/linux-2.6 Build Date Fri Nov 07 235551 Enter Y to remove old sessions or N to retain old sessions Backup Copy of Original Configuration OraclehomeRemoving Old VSA Names Configuring Snmp Restarting ReplicationOL-17221-02 Using aregcmd General Command SyntaxAregcmd Commands Configuring a Basic SiteRunning aregcmd Cd admin Changing the Administrator’s PasswordCd //localhost/Administrators Set PasswordCd /Administrators Configuring the Radius ServerCreating Additional Administrators Add jane testadminSelecting Ports to Use Checking the System-Level DefaultsSet DefaultSessionManager Checking the Server’s HealthSave Displaying the UserListsAdd ReloadLs -R Displaying the Default UserListAdding Users to UserLists Add janeCd /Radius/UserLists/Default Delete beth Use the set command to provide a password for user janeSet password jane Displaying UserGroupsCd /Radius/Clients Configuring ClientsAdding a NAS Add QuickExampleNASCd /Radius/Profiles/Default-PPP-users/Attributes Configuring ProfilesSetting Radius Attributes Set Service-Type FramedSaving and Reloading Validating and Using Your ChangesAdding Multiple Cisco AV Pairs Set Framed-Routing 192.168.1.0/24Radclient -s Testing Your ConfigurationUsing radclient Simple john johnSetting the Trace Level Configuring AccountingTroubleshooting Your Configuration P001 sendStopping the Master Agent Enabling Snmp in the Cisco Access Registrar ServerSet Enabled True Aregcmd Cd /Radius/Advanced/SNMPModifying the snmpd.conf File Access ControlCreate a view to enable the groups to have rights Opt/CSCOar/bin/arserver stopTrap Recipient Configuring Dynamic DNSRestarting the Master Agent System Contact InformationCd /Radius/RemoteServers Add ddns Cd /Radius/Advanced/DDNS/TSIGKeys Add foo.comCd foo.com Set Secret base64-encoded string Cd ddns Set Protocol dynamic-dnsCd /Radius/ResourceManagers Add ddns Testing Dynamic DNS with radclientSave the changes you have made Acctrequest Start username Cd /opt/CSCOar/bin AregcmdTrace Launch radclient Cd /opt/CSCOar/bin Radclient Set p acctrequest Start bobOL-17221-02 Configuring Groups Configuring Specific GroupsCd /Radius/UserLists/Default/jean Creating and Setting Group MembershipCd /Radius/UserGroups Configuring a Default Group Using a Script to Determine ServiceConfiguring Multiple UserLists Set Group DefaultCreating Separate UserLists Configuring Separate UserListsConfiguring Users Populating UserListsCreating Separate Services Configuring ServicesCreating the Script Choosing the Scripting Point Configuring the ScriptClient Scripting Cd /RadiusHandling Multiple Scripts Configuring a Remote Server for AAAdd ParseUserName Rex libParseUserName.so ParseUserName Cd /Radius/RemoteServers Configuring the Remote ServerCreating a RemoteServer Add QuickExampleUse the set command to specify the protocol ldap Set protocol ldapAdd remote-ldap Remote Ldap Service Creating ServicesSet type ldap Set DefaultAuthentication remote-ldap Configuring Multiple Remote ServersChanging the Authentication and Authorization Defaults Use the set command to change the DefaultAuthorizationCreating RemoteServers Configuring Two Remote ServersAdd North Creating the Services Use the cd command to change to the Scripts object Set IncomingScript ParseRemoteServersConfiguring a Resource Manager Configuring Session ManagementCreating a Resource Manager Configuring a Session Manager Creating a Session ManagerEnabling Session Management Configuring Session ManagementUse the reload command to reload the Cisco AR server Set 1 rm-100Symbols PPPInstalling CAR on LDoms DefaultAuthorizationServiceDefault ports Default-PPP-users Overview SolarisMultipleServersPolicy 5-6,5-11,5-14 RoundRobin policy RPC servicesReloading Reloading server Remote Servers Transactions per second Sample users Save commandDefinition Well-known ports
Related manuals
Manual 214 pages 55.15 Kb Manual 34 pages 46.13 Kb

4.2 specifications

Cisco Systems, a global leader in IT and networking solutions, has consistently evolved to meet the demands of modern enterprises. One of its noteworthy offerings is Cisco Systems 4.2, a version that embodies a significant leap in networking technology and capability. With its rich set of features, Cisco Systems 4.2 caters to a wide range of industries, facilitating enhanced performance and security.

One of the main features of Cisco Systems 4.2 is its improved scalability. The architecture has been designed to support an ever-increasing number of devices and users, making it ideal for growing enterprises. The enhanced scalability allows organizations to expand their network capacities without compromising performance, ensuring seamless integration of new technologies and devices.

Another critical aspect of Cisco Systems 4.2 is its advanced security protocols. With cyber threats constantly evolving, Cisco prioritizes security in this version by offering robust features such as end-to-end encryption, improved firewall capabilities, and enhanced intrusion detection systems. These security enhancements provide organizations with peace of mind, knowing that their sensitive data and networks are well-protected from unauthorized access and potential threats.

Cisco Systems 4.2 also introduces intelligent automation features, which significantly streamline network management. Through the use of artificial intelligence and machine learning, Cisco enables organizations to automate routine tasks, reduce human error, and optimize performance. This automation not only enhances efficiency but also allows IT teams to focus on strategic initiatives rather than day-to-day maintenance.

Moreover, Cisco Systems 4.2 emphasizes infrastructure flexibility. The new architecture supports various deployment models, including on-premises, cloud, and hybrid environments. This flexibility enables organizations to adapt their networking strategies according to their specific needs and operational requirements, facilitating a more tailored approach to IT infrastructure.

Collaboration tools have also been enhanced in this version. Cisco Systems 4.2 integrates advanced communication solutions that empower teams to collaborate in real time, regardless of their geographical location. Features such as high-definition video conferencing, secure messaging, and file sharing enhance productivity and foster innovation across teams.

In summary, Cisco Systems 4.2 stands out as a forward-thinking networking solution with key features such as scalability, advanced security, intelligent automation, flexible infrastructure, and enhanced collaboration tools. These characteristics position Cisco Systems 4.2 as an invaluable asset for enterprises striving for digital transformation in an increasingly interconnected world. The ongoing innovation reflects Cisco's commitment to delivering cutting-edge technology solutions that drive business success and resilience.