Cisco Systems 4.2 manual Creating and Setting Group Membership, Cd /Radius/UserGroups

Page 74

Chapter 5 Customizing Your Configuration

Configuring Groups

Table 5-1 Configuring UserGroups

Object

Action

 

 

UserGroups

Add a new UserGroup

 

 

UserLists

Set group membership

 

 

Creating and Setting Group Membership

Step 1 Run the aregcmd command:

aregcmd

Step 2 Use the cd command to change to the UserGroups object.

cd /Radius/UserGroups

Step 3 Use the add command to create a user group, specifying the name and optional description, BaseProfile, AuthenticationScript, or AuthorizationScript. The following example shows how to add the PPP-users group.

This example sets the BaseProfile to default-PPP-users. When you set this property to the name of a profile, Cisco AR adds the properties in the profile to the response dictionary as part of the authorization process.

add PPP-users "Users who always connect using PPP" default-PPP-users

Step 4 Use the cd command to change to the user you want to include in this group. The following example shows how to change to the user, jean:

cd /Radius/UserLists/Default/jean

Step 5 Use the set command to set the user’s group membership to the name of the group you have just created. set group PPP-users

Step 6 Use the save command to save your changes.

save

Step 7 Use the reload command to reload the server.

reload

Note You must save whenever you have changed the configuration, either through adds, deletes, or sets. Before you exit, log out, or reload, Cisco AR prompts you to save. You must reload after all saves except when you have only made changes to individual users (either adds, deletes, or sets). Unlike all other changes, Cisco AR reads user records on demand; that is, when there is a request from that user.

Installing and Configuring Cisco Access Registrar, 4.2

5-2

OL-17221-02

 

 

Image 74
Contents Installing and Configuring Cisco Access Registrar Installing and Configuring Cisco Access Registrar N T E N T S Upgrading Cisco Access Registrar Software Installing Cisco Access Registrar Software from CD-ROM3-14 Creating and Setting Group Membership Configuring Session Management Viii Obtaining Documentation Cisco.comDocumentation Feedback Reporting Security Problems in Cisco ProductsYou can access international Cisco websites at this URL Cisco Product Security OverviewObtaining Technical Assistance Cisco Technical Support & Documentation WebsiteSubmitting a Service Request Definitions of Service Request SeverityObtaining Additional Publications and Information XiiiXiv Installation Dialog Overview Installation TypeJava 2 Runtime Environment Installation LocationLicense File Location Open Database ConnectivityContinue with Installation Downloading Cisco Access Registrar SoftwareExample Configuration Base DirectoryCisco Access Registrar 4.2 Licensing CSCOar-4.2.1-sol10-k9.tar.gz for SolarisLicense slabs available in CAR 4.2 are listed in Table Getting Cisco Access Registrar 4.2 LicenseLicense Slabs Or stand-bySample License File Installing Cisco Access Registrar 4.2 LicensesAdding Additional Cisco Access Registrar 4.2 Licenses Opt/CSCOar/bin/arserver restartLaunching aregcmd Aregcmd Command-Line OptionDisplaying License Information Aregcmd -l directorynameOL-17221-02 Installing the Cisco Access Registrar 4.2 License File This chapter contains the following sectionsInstalling Downloaded Software Deciding Where to InstallInstalling Cisco Access Registrar Software from CD-ROM For a full install, press Enter Common Solaris Installation StepsEnter the following command to begin the installation Zcat CSCOar-4.2.1-sol9-K9.tar.gz tar xvfInstalling and Configuring Cisco Access Registrar Enter Y to install the setuid/setgid files Configuring Snmp Installing Cisco Access Registrar 4.2 Software on LinuxInstalling Cisco Access Registrar on LDoms RPC Bind ServicesChmod 777 CSCOar-4.2.1-lnx26-install-K9.sh Common Linux Installation StepsCp CSCOar-4.2.1-lnx26-install-K9.sh /tmp Cd /cdrom/cdrom0/kit/linux-2.4Enter the name of the script file to begin the installation CSCOar-4.2.1-lnx26-install-k9.shPreparing OL-17221-02 Upgrading Cisco Access Registrar Software Solaris Software Upgrade OverviewEtc/init.d/arserver restart Linux Software Upgrade OverviewCd /opt Mv AICar1 CSCOar Cd /radius/replication Software Upgrade TasksDisabling Replication Enter y or yes to continue removing the AICar1 package Removing the AICar1 PackagePkgrm AICar1 Enter y or yes to continue removing the CSCOar package Removing the CSCOar PackagePkgrm CSCOar Enter Yes or Y to continue removing the Linux software Using uninstall-ar to Remove Linux SoftwareCd /opt/CSCOar/bin Uninstall-ar Installing the Cisco Access Registrar License File Upgrading Cisco Access Registrar Solaris SoftwareZcat CSCOar-4.2.1-sol9-k9.tar.gz tar xf Http//java.sun.com Where is the J2RE installed? ?,q Enter the administrator userID and password Enter Y to preserve the local databaseBack-up Copy of Original Configuration VSA Update Script Removing Old VSA NamesServer Upgrading Cisco Access Registrar Linux SoftwareOpt/CSCOar/data Cd /cdrom/cdrom0/kit/linux-2.6 Run the uninstall-ar program as shown belowCd /opt/CSCOar/bin arserver stop Build Date Fri Nov 07 235551 Enter Y to remove old sessions or N to retain old sessions Backup Copy of Original Configuration OraclehomeRemoving Old VSA Names Configuring Snmp Restarting ReplicationOL-17221-02 Using aregcmd General Command SyntaxRunning aregcmd Configuring a Basic SiteAregcmd Commands Cd admin Changing the Administrator’s PasswordCd //localhost/Administrators Set PasswordCd /Administrators Configuring the Radius ServerCreating Additional Administrators Add jane testadminSelecting Ports to Use Checking the System-Level DefaultsSet DefaultSessionManager Checking the Server’s HealthSave Displaying the UserListsAdd ReloadLs -R Displaying the Default UserListAdding Users to UserLists Add janeCd /Radius/UserLists/Default Delete beth Use the set command to provide a password for user janeSet password jane Displaying UserGroupsCd /Radius/Clients Configuring ClientsAdding a NAS Add QuickExampleNASCd /Radius/Profiles/Default-PPP-users/Attributes Configuring ProfilesSetting Radius Attributes Set Service-Type FramedSaving and Reloading Validating and Using Your ChangesAdding Multiple Cisco AV Pairs Set Framed-Routing 192.168.1.0/24Radclient -s Testing Your ConfigurationUsing radclient Simple john johnSetting the Trace Level Configuring AccountingTroubleshooting Your Configuration P001 sendStopping the Master Agent Enabling Snmp in the Cisco Access Registrar ServerSet Enabled True Aregcmd Cd /Radius/Advanced/SNMPModifying the snmpd.conf File Access ControlCreate a view to enable the groups to have rights Opt/CSCOar/bin/arserver stopTrap Recipient Configuring Dynamic DNSRestarting the Master Agent System Contact InformationCd /Radius/RemoteServers Add ddns Cd /Radius/Advanced/DDNS/TSIGKeys Add foo.comCd foo.com Set Secret base64-encoded string Cd ddns Set Protocol dynamic-dnsSave the changes you have made Testing Dynamic DNS with radclientCd /Radius/ResourceManagers Add ddns Acctrequest Start username Cd /opt/CSCOar/bin AregcmdTrace Launch radclient Cd /opt/CSCOar/bin Radclient Set p acctrequest Start bobOL-17221-02 Configuring Groups Configuring Specific GroupsCd /Radius/UserGroups Creating and Setting Group MembershipCd /Radius/UserLists/Default/jean Configuring a Default Group Using a Script to Determine ServiceConfiguring Multiple UserLists Set Group DefaultCreating Separate UserLists Configuring Separate UserListsConfiguring Users Populating UserListsCreating the Script Configuring ServicesCreating Separate Services Choosing the Scripting Point Configuring the ScriptClient Scripting Cd /RadiusAdd ParseUserName Rex libParseUserName.so ParseUserName Configuring a Remote Server for AAHandling Multiple Scripts Cd /Radius/RemoteServers Configuring the Remote ServerCreating a RemoteServer Add QuickExampleUse the set command to specify the protocol ldap Set protocol ldapSet type ldap Creating ServicesAdd remote-ldap Remote Ldap Service Set DefaultAuthentication remote-ldap Configuring Multiple Remote ServersChanging the Authentication and Authorization Defaults Use the set command to change the DefaultAuthorizationAdd North Configuring Two Remote ServersCreating RemoteServers Creating the Services Use the cd command to change to the Scripts object Set IncomingScript ParseRemoteServersCreating a Resource Manager Configuring Session ManagementConfiguring a Resource Manager Configuring a Session Manager Creating a Session ManagerEnabling Session Management Configuring Session ManagementUse the reload command to reload the Cisco AR server Set 1 rm-100Symbols PPPInstalling CAR on LDoms DefaultAuthorizationServiceDefault ports Default-PPP-users Overview SolarisReloading Reloading server Remote Servers RoundRobin policy RPC servicesMultipleServersPolicy 5-6,5-11,5-14 Definition Well-known ports Sample users Save commandTransactions per second
Related manuals
Manual 214 pages 55.15 Kb Manual 34 pages 46.13 Kb

4.2 specifications

Cisco Systems, a global leader in IT and networking solutions, has consistently evolved to meet the demands of modern enterprises. One of its noteworthy offerings is Cisco Systems 4.2, a version that embodies a significant leap in networking technology and capability. With its rich set of features, Cisco Systems 4.2 caters to a wide range of industries, facilitating enhanced performance and security.

One of the main features of Cisco Systems 4.2 is its improved scalability. The architecture has been designed to support an ever-increasing number of devices and users, making it ideal for growing enterprises. The enhanced scalability allows organizations to expand their network capacities without compromising performance, ensuring seamless integration of new technologies and devices.

Another critical aspect of Cisco Systems 4.2 is its advanced security protocols. With cyber threats constantly evolving, Cisco prioritizes security in this version by offering robust features such as end-to-end encryption, improved firewall capabilities, and enhanced intrusion detection systems. These security enhancements provide organizations with peace of mind, knowing that their sensitive data and networks are well-protected from unauthorized access and potential threats.

Cisco Systems 4.2 also introduces intelligent automation features, which significantly streamline network management. Through the use of artificial intelligence and machine learning, Cisco enables organizations to automate routine tasks, reduce human error, and optimize performance. This automation not only enhances efficiency but also allows IT teams to focus on strategic initiatives rather than day-to-day maintenance.

Moreover, Cisco Systems 4.2 emphasizes infrastructure flexibility. The new architecture supports various deployment models, including on-premises, cloud, and hybrid environments. This flexibility enables organizations to adapt their networking strategies according to their specific needs and operational requirements, facilitating a more tailored approach to IT infrastructure.

Collaboration tools have also been enhanced in this version. Cisco Systems 4.2 integrates advanced communication solutions that empower teams to collaborate in real time, regardless of their geographical location. Features such as high-definition video conferencing, secure messaging, and file sharing enhance productivity and foster innovation across teams.

In summary, Cisco Systems 4.2 stands out as a forward-thinking networking solution with key features such as scalability, advanced security, intelligent automation, flexible infrastructure, and enhanced collaboration tools. These characteristics position Cisco Systems 4.2 as an invaluable asset for enterprises striving for digital transformation in an increasingly interconnected world. The ongoing innovation reflects Cisco's commitment to delivering cutting-edge technology solutions that drive business success and resilience.