Cisco Systems 4.2 manual Configuring Multiple UserLists, Set Group Default

Page 76

Chapter 5 Customizing Your Configuration

Configuring Multiple UserLists

Step 6 Use the set command to set the user’s group membership to the name of that group. The following example sets beth’s group membership to the Default group.

set Group Default

Step 7 Use the save command to save your changes:

save

Step 8 Use the reload command to reload the server:

reload

Note To be able to save your changes and reload the server after following this example, you must have an actual script. Cisco AR displays a warning message when it detects missing configuration objects.

Configuring Multiple UserLists

The basic site contains a single userlist, Default, and uses group membership to determine the type of Service to provide each user. When all users are in the same UserList, each username must be unique.

You can, however, group your user community by department or location, and use separate UserLists to distinguish amongst them. In this case, the users names must be unique only within each UserList. Thus, you can allow a user Jane in the North UserList as well as one in the South UserList.

When you have more than one UserList, you must have an incoming script that Cisco AR can run in response to requests. The script chooses the authentication and/or authorization Service, and the Service specifies the actual UserList (Figure 5-1).

Figure 5-1 Using a Script to Choose a UserList

 

Scripts

UserLists

 

Services

 

North-users

North

Request

South-users

South

 

Choose

 

 

service

 

 

East-users

East

 

West-users

West

 

 

22034

Table 5-3provides an overview of the process. The following sections describe the process in more detail.

Installing and Configuring Cisco Access Registrar, 4.2

5-4

OL-17221-02

 

 

Image 76
Contents Installing and Configuring Cisco Access Registrar Installing and Configuring Cisco Access Registrar N T E N T S Upgrading Cisco Access Registrar Software Installing Cisco Access Registrar Software from CD-ROM3-14 Creating and Setting Group Membership Configuring Session Management Viii Obtaining Documentation Cisco.comReporting Security Problems in Cisco Products You can access international Cisco websites at this URLDocumentation Feedback Cisco Product Security OverviewObtaining Technical Assistance Cisco Technical Support & Documentation WebsiteSubmitting a Service Request Definitions of Service Request SeverityObtaining Additional Publications and Information XiiiXiv Installation Dialog Overview Installation TypeInstallation Location License File LocationJava 2 Runtime Environment Open Database ConnectivityDownloading Cisco Access Registrar Software Example ConfigurationContinue with Installation Base DirectoryCisco Access Registrar 4.2 Licensing CSCOar-4.2.1-sol10-k9.tar.gz for SolarisGetting Cisco Access Registrar 4.2 License License SlabsLicense slabs available in CAR 4.2 are listed in Table Or stand-byInstalling Cisco Access Registrar 4.2 Licenses Adding Additional Cisco Access Registrar 4.2 LicensesSample License File Opt/CSCOar/bin/arserver restartAregcmd Command-Line Option Displaying License InformationLaunching aregcmd Aregcmd -l directorynameOL-17221-02 Installing the Cisco Access Registrar 4.2 License File This chapter contains the following sectionsInstalling Cisco Access Registrar Software from CD-ROM Deciding Where to InstallInstalling Downloaded Software Common Solaris Installation Steps Enter the following command to begin the installationFor a full install, press Enter Zcat CSCOar-4.2.1-sol9-K9.tar.gz tar xvfInstalling and Configuring Cisco Access Registrar Enter Y to install the setuid/setgid files Installing Cisco Access Registrar 4.2 Software on Linux Installing Cisco Access Registrar on LDomsConfiguring Snmp RPC Bind ServicesCommon Linux Installation Steps Cp CSCOar-4.2.1-lnx26-install-K9.sh /tmpChmod 777 CSCOar-4.2.1-lnx26-install-K9.sh Cd /cdrom/cdrom0/kit/linux-2.4Enter the name of the script file to begin the installation CSCOar-4.2.1-lnx26-install-k9.shPreparing OL-17221-02 Upgrading Cisco Access Registrar Software Solaris Software Upgrade OverviewCd /opt Mv AICar1 CSCOar Linux Software Upgrade OverviewEtc/init.d/arserver restart Disabling Replication Software Upgrade TasksCd /radius/replication Pkgrm AICar1 Removing the AICar1 PackageEnter y or yes to continue removing the AICar1 package Pkgrm CSCOar Removing the CSCOar PackageEnter y or yes to continue removing the CSCOar package Cd /opt/CSCOar/bin Uninstall-ar Using uninstall-ar to Remove Linux SoftwareEnter Yes or Y to continue removing the Linux software Installing the Cisco Access Registrar License File Upgrading Cisco Access Registrar Solaris SoftwareZcat CSCOar-4.2.1-sol9-k9.tar.gz tar xf Http//java.sun.com Where is the J2RE installed? ?,q Enter the administrator userID and password Enter Y to preserve the local databaseBack-up Copy of Original Configuration VSA Update Script Removing Old VSA NamesOpt/CSCOar/data Upgrading Cisco Access Registrar Linux SoftwareServer Cd /opt/CSCOar/bin arserver stop Run the uninstall-ar program as shown belowCd /cdrom/cdrom0/kit/linux-2.6 Build Date Fri Nov 07 235551 Enter Y to remove old sessions or N to retain old sessions Backup Copy of Original Configuration OraclehomeRemoving Old VSA Names Configuring Snmp Restarting ReplicationOL-17221-02 Using aregcmd General Command SyntaxAregcmd Commands Configuring a Basic SiteRunning aregcmd Changing the Administrator’s Password Cd //localhost/AdministratorsCd admin Set PasswordConfiguring the Radius Server Creating Additional AdministratorsCd /Administrators Add jane testadminChecking the System-Level Defaults Set DefaultSessionManagerSelecting Ports to Use Checking the Server’s HealthDisplaying the UserLists AddSave ReloadDisplaying the Default UserList Adding Users to UserListsLs -R Add janeUse the set command to provide a password for user jane Set password janeCd /Radius/UserLists/Default Delete beth Displaying UserGroupsConfiguring Clients Adding a NASCd /Radius/Clients Add QuickExampleNASConfiguring Profiles Setting Radius AttributesCd /Radius/Profiles/Default-PPP-users/Attributes Set Service-Type FramedValidating and Using Your Changes Adding Multiple Cisco AV PairsSaving and Reloading Set Framed-Routing 192.168.1.0/24Testing Your Configuration Using radclientRadclient -s Simple john johnConfiguring Accounting Troubleshooting Your ConfigurationSetting the Trace Level P001 sendEnabling Snmp in the Cisco Access Registrar Server Set Enabled TrueStopping the Master Agent Aregcmd Cd /Radius/Advanced/SNMPAccess Control Create a view to enable the groups to have rightsModifying the snmpd.conf File Opt/CSCOar/bin/arserver stopConfiguring Dynamic DNS Restarting the Master AgentTrap Recipient System Contact InformationCd /Radius/Advanced/DDNS/TSIGKeys Add foo.com Cd foo.com Set Secret base64-encoded stringCd /Radius/RemoteServers Add ddns Cd ddns Set Protocol dynamic-dnsCd /Radius/ResourceManagers Add ddns Testing Dynamic DNS with radclientSave the changes you have made Cd /opt/CSCOar/bin Aregcmd Trace Launch radclient Cd /opt/CSCOar/bin RadclientAcctrequest Start username Set p acctrequest Start bobOL-17221-02 Configuring Groups Configuring Specific GroupsCd /Radius/UserLists/Default/jean Creating and Setting Group MembershipCd /Radius/UserGroups Configuring a Default Group Using a Script to Determine ServiceConfiguring Multiple UserLists Set Group DefaultConfiguring Separate UserLists Configuring UsersCreating Separate UserLists Populating UserListsCreating Separate Services Configuring ServicesCreating the Script Configuring the Script Client ScriptingChoosing the Scripting Point Cd /RadiusHandling Multiple Scripts Configuring a Remote Server for AAAdd ParseUserName Rex libParseUserName.so ParseUserName Configuring the Remote Server Creating a RemoteServerCd /Radius/RemoteServers Add QuickExampleUse the set command to specify the protocol ldap Set protocol ldapAdd remote-ldap Remote Ldap Service Creating ServicesSet type ldap Configuring Multiple Remote Servers Changing the Authentication and Authorization DefaultsSet DefaultAuthentication remote-ldap Use the set command to change the DefaultAuthorizationCreating RemoteServers Configuring Two Remote ServersAdd North Creating the Services Use the cd command to change to the Scripts object Set IncomingScript ParseRemoteServersConfiguring a Resource Manager Configuring Session ManagementCreating a Resource Manager Configuring a Session Manager Creating a Session ManagerConfiguring Session Management Use the reload command to reload the Cisco AR serverEnabling Session Management Set 1 rm-100Symbols PPPDefaultAuthorizationService Default ports Default-PPP-usersInstalling CAR on LDoms Overview SolarisMultipleServersPolicy 5-6,5-11,5-14 RoundRobin policy RPC servicesReloading Reloading server Remote Servers Transactions per second Sample users Save commandDefinition Well-known ports
Related manuals
Manual 214 pages 55.15 Kb Manual 34 pages 46.13 Kb

4.2 specifications

Cisco Systems, a global leader in IT and networking solutions, has consistently evolved to meet the demands of modern enterprises. One of its noteworthy offerings is Cisco Systems 4.2, a version that embodies a significant leap in networking technology and capability. With its rich set of features, Cisco Systems 4.2 caters to a wide range of industries, facilitating enhanced performance and security.

One of the main features of Cisco Systems 4.2 is its improved scalability. The architecture has been designed to support an ever-increasing number of devices and users, making it ideal for growing enterprises. The enhanced scalability allows organizations to expand their network capacities without compromising performance, ensuring seamless integration of new technologies and devices.

Another critical aspect of Cisco Systems 4.2 is its advanced security protocols. With cyber threats constantly evolving, Cisco prioritizes security in this version by offering robust features such as end-to-end encryption, improved firewall capabilities, and enhanced intrusion detection systems. These security enhancements provide organizations with peace of mind, knowing that their sensitive data and networks are well-protected from unauthorized access and potential threats.

Cisco Systems 4.2 also introduces intelligent automation features, which significantly streamline network management. Through the use of artificial intelligence and machine learning, Cisco enables organizations to automate routine tasks, reduce human error, and optimize performance. This automation not only enhances efficiency but also allows IT teams to focus on strategic initiatives rather than day-to-day maintenance.

Moreover, Cisco Systems 4.2 emphasizes infrastructure flexibility. The new architecture supports various deployment models, including on-premises, cloud, and hybrid environments. This flexibility enables organizations to adapt their networking strategies according to their specific needs and operational requirements, facilitating a more tailored approach to IT infrastructure.

Collaboration tools have also been enhanced in this version. Cisco Systems 4.2 integrates advanced communication solutions that empower teams to collaborate in real time, regardless of their geographical location. Features such as high-definition video conferencing, secure messaging, and file sharing enhance productivity and foster innovation across teams.

In summary, Cisco Systems 4.2 stands out as a forward-thinking networking solution with key features such as scalability, advanced security, intelligent automation, flexible infrastructure, and enhanced collaboration tools. These characteristics position Cisco Systems 4.2 as an invaluable asset for enterprises striving for digital transformation in an increasingly interconnected world. The ongoing innovation reflects Cisco's commitment to delivering cutting-edge technology solutions that drive business success and resilience.