Cisco Systems 4.2 manual Creating Services, Add remote-ldap Remote Ldap Service, Set type ldap

Page 83

Chapter 5 Customizing Your Configuration

Configuring a Remote Server for AA

Creating Services

Step 1 Run the aregcmd command:

aregcmd

Step 2 Use the cd command to change to the Services level: cd /Radius/Services

Step 3 Use the add command to add the appropriate LDAP service. The following example adds the remote-ldap service:

add remote-ldap "Remote LDAP Service"

Step 4 Use the cd command to change to the remote-ldapobject: cd /Radius/Services/remote-ldap

Step 5 Use the set command to set the type to ldap. You can accept the default Outage Policy and MultipleServersPolicy or you can use the set command to change them.

set type ldap

Step 6 Use the cd command to change to the RemoteServers: cd /Radius/Services/remote-ldap/RemoteServers

Step 7 Use the set command to set the server number and name. By giving each server a number you tell Cisco AR the order you want it to access each server. Cisco AR uses this order when implementing the MultipleServersPolicy of Failover or RoundRobin.

The following example sets the first remote server to the server QuickExample: set 1 QuickExample

The MultipleServersPolicy determines how Cisco AR handles multiple remote servers.

When you set it to Failover, Cisco AR directs requests to the first server in the list until it determines the server is offline. At that time, Cisco AR redirects all requests to the next server in the list until it finds a server that is online.

When you set it to RoundRobin, Cisco AR directs each request to the next server in the RemoteServers list in order to share the resource load across all the servers listed in the RemoteServers list.

Configuring the RADIUS Server

In the default Cisco AR configuration, authentication and authorization are handled through the local-users Service object. This causes Cisco AR to match requesting users with the names in its own database. When you select LDAP as a remote server for authentication and authorization, Cisco AR looks to that server for user information.

 

 

Installing and Configuring Cisco Access Registrar, 4.2

 

 

 

 

 

 

OL-17221-02

 

 

5-11

 

 

 

 

 

Image 83
Contents Installing and Configuring Cisco Access Registrar Installing and Configuring Cisco Access Registrar N T E N T S Upgrading Cisco Access Registrar Software Installing Cisco Access Registrar Software from CD-ROM3-14 Creating and Setting Group Membership Configuring Session Management Viii Cisco.com Obtaining DocumentationCisco Product Security Overview Reporting Security Problems in Cisco ProductsYou can access international Cisco websites at this URL Documentation FeedbackCisco Technical Support & Documentation Website Obtaining Technical AssistanceDefinitions of Service Request Severity Submitting a Service RequestXiii Obtaining Additional Publications and InformationXiv Installation Type Installation Dialog OverviewOpen Database Connectivity Installation LocationLicense File Location Java 2 Runtime EnvironmentBase Directory Downloading Cisco Access Registrar SoftwareExample Configuration Continue with InstallationCSCOar-4.2.1-sol10-k9.tar.gz for Solaris Cisco Access Registrar 4.2 LicensingOr stand-by Getting Cisco Access Registrar 4.2 LicenseLicense Slabs License slabs available in CAR 4.2 are listed in TableOpt/CSCOar/bin/arserver restart Installing Cisco Access Registrar 4.2 LicensesAdding Additional Cisco Access Registrar 4.2 Licenses Sample License FileAregcmd -l directoryname Aregcmd Command-Line OptionDisplaying License Information Launching aregcmdOL-17221-02 This chapter contains the following sections Installing the Cisco Access Registrar 4.2 License FileInstalling Downloaded Software Deciding Where to InstallInstalling Cisco Access Registrar Software from CD-ROM Zcat CSCOar-4.2.1-sol9-K9.tar.gz tar xvf Common Solaris Installation StepsEnter the following command to begin the installation For a full install, press EnterInstalling and Configuring Cisco Access Registrar Enter Y to install the setuid/setgid files RPC Bind Services Installing Cisco Access Registrar 4.2 Software on LinuxInstalling Cisco Access Registrar on LDoms Configuring SnmpCd /cdrom/cdrom0/kit/linux-2.4 Common Linux Installation StepsCp CSCOar-4.2.1-lnx26-install-K9.sh /tmp Chmod 777 CSCOar-4.2.1-lnx26-install-K9.shCSCOar-4.2.1-lnx26-install-k9.sh Enter the name of the script file to begin the installationPreparing OL-17221-02 Solaris Software Upgrade Overview Upgrading Cisco Access Registrar SoftwareEtc/init.d/arserver restart Linux Software Upgrade OverviewCd /opt Mv AICar1 CSCOar Cd /radius/replication Software Upgrade TasksDisabling Replication Enter y or yes to continue removing the AICar1 package Removing the AICar1 PackagePkgrm AICar1 Enter y or yes to continue removing the CSCOar package Removing the CSCOar PackagePkgrm CSCOar Enter Yes or Y to continue removing the Linux software Using uninstall-ar to Remove Linux SoftwareCd /opt/CSCOar/bin Uninstall-ar Upgrading Cisco Access Registrar Solaris Software Installing the Cisco Access Registrar License FileZcat CSCOar-4.2.1-sol9-k9.tar.gz tar xf Http//java.sun.com Where is the J2RE installed? ?,q Enter Y to preserve the local database Enter the administrator userID and passwordBack-up Copy of Original Configuration Removing Old VSA Names VSA Update ScriptServer Upgrading Cisco Access Registrar Linux SoftwareOpt/CSCOar/data Cd /cdrom/cdrom0/kit/linux-2.6 Run the uninstall-ar program as shown belowCd /opt/CSCOar/bin arserver stop Build Date Fri Nov 07 235551 Enter Y to remove old sessions or N to retain old sessions Oraclehome Backup Copy of Original ConfigurationRemoving Old VSA Names Restarting Replication Configuring SnmpOL-17221-02 General Command Syntax Using aregcmdRunning aregcmd Configuring a Basic SiteAregcmd Commands Set Password Changing the Administrator’s PasswordCd //localhost/Administrators Cd adminAdd jane testadmin Configuring the Radius ServerCreating Additional Administrators Cd /AdministratorsChecking the Server’s Health Checking the System-Level DefaultsSet DefaultSessionManager Selecting Ports to UseReload Displaying the UserListsAdd SaveAdd jane Displaying the Default UserListAdding Users to UserLists Ls -RDisplaying UserGroups Use the set command to provide a password for user janeSet password jane Cd /Radius/UserLists/Default Delete bethAdd QuickExampleNAS Configuring ClientsAdding a NAS Cd /Radius/ClientsSet Service-Type Framed Configuring ProfilesSetting Radius Attributes Cd /Radius/Profiles/Default-PPP-users/AttributesSet Framed-Routing 192.168.1.0/24 Validating and Using Your ChangesAdding Multiple Cisco AV Pairs Saving and ReloadingSimple john john Testing Your ConfigurationUsing radclient Radclient -sP001 send Configuring AccountingTroubleshooting Your Configuration Setting the Trace LevelAregcmd Cd /Radius/Advanced/SNMP Enabling Snmp in the Cisco Access Registrar ServerSet Enabled True Stopping the Master AgentOpt/CSCOar/bin/arserver stop Access ControlCreate a view to enable the groups to have rights Modifying the snmpd.conf FileSystem Contact Information Configuring Dynamic DNSRestarting the Master Agent Trap RecipientCd ddns Set Protocol dynamic-dns Cd /Radius/Advanced/DDNS/TSIGKeys Add foo.comCd foo.com Set Secret base64-encoded string Cd /Radius/RemoteServers Add ddnsSave the changes you have made Testing Dynamic DNS with radclientCd /Radius/ResourceManagers Add ddns Set p acctrequest Start bob Cd /opt/CSCOar/bin AregcmdTrace Launch radclient Cd /opt/CSCOar/bin Radclient Acctrequest Start usernameOL-17221-02 Configuring Specific Groups Configuring GroupsCd /Radius/UserGroups Creating and Setting Group MembershipCd /Radius/UserLists/Default/jean Using a Script to Determine Service Configuring a Default GroupSet Group Default Configuring Multiple UserListsPopulating UserLists Configuring Separate UserListsConfiguring Users Creating Separate UserListsCreating the Script Configuring ServicesCreating Separate Services Cd /Radius Configuring the ScriptClient Scripting Choosing the Scripting PointAdd ParseUserName Rex libParseUserName.so ParseUserName Configuring a Remote Server for AAHandling Multiple Scripts Add QuickExample Configuring the Remote ServerCreating a RemoteServer Cd /Radius/RemoteServersSet protocol ldap Use the set command to specify the protocol ldapSet type ldap Creating ServicesAdd remote-ldap Remote Ldap Service Use the set command to change the DefaultAuthorization Configuring Multiple Remote ServersChanging the Authentication and Authorization Defaults Set DefaultAuthentication remote-ldapAdd North Configuring Two Remote ServersCreating RemoteServers Creating the Services Set IncomingScript ParseRemoteServers Use the cd command to change to the Scripts objectCreating a Resource Manager Configuring Session ManagementConfiguring a Resource Manager Creating a Session Manager Configuring a Session ManagerSet 1 rm-100 Configuring Session ManagementUse the reload command to reload the Cisco AR server Enabling Session ManagementPPP SymbolsOverview Solaris DefaultAuthorizationServiceDefault ports Default-PPP-users Installing CAR on LDomsReloading Reloading server Remote Servers RoundRobin policy RPC servicesMultipleServersPolicy 5-6,5-11,5-14 Definition Well-known ports Sample users Save commandTransactions per second
Related manuals
Manual 214 pages 55.15 Kb Manual 34 pages 46.13 Kb

4.2 specifications

Cisco Systems, a global leader in IT and networking solutions, has consistently evolved to meet the demands of modern enterprises. One of its noteworthy offerings is Cisco Systems 4.2, a version that embodies a significant leap in networking technology and capability. With its rich set of features, Cisco Systems 4.2 caters to a wide range of industries, facilitating enhanced performance and security.

One of the main features of Cisco Systems 4.2 is its improved scalability. The architecture has been designed to support an ever-increasing number of devices and users, making it ideal for growing enterprises. The enhanced scalability allows organizations to expand their network capacities without compromising performance, ensuring seamless integration of new technologies and devices.

Another critical aspect of Cisco Systems 4.2 is its advanced security protocols. With cyber threats constantly evolving, Cisco prioritizes security in this version by offering robust features such as end-to-end encryption, improved firewall capabilities, and enhanced intrusion detection systems. These security enhancements provide organizations with peace of mind, knowing that their sensitive data and networks are well-protected from unauthorized access and potential threats.

Cisco Systems 4.2 also introduces intelligent automation features, which significantly streamline network management. Through the use of artificial intelligence and machine learning, Cisco enables organizations to automate routine tasks, reduce human error, and optimize performance. This automation not only enhances efficiency but also allows IT teams to focus on strategic initiatives rather than day-to-day maintenance.

Moreover, Cisco Systems 4.2 emphasizes infrastructure flexibility. The new architecture supports various deployment models, including on-premises, cloud, and hybrid environments. This flexibility enables organizations to adapt their networking strategies according to their specific needs and operational requirements, facilitating a more tailored approach to IT infrastructure.

Collaboration tools have also been enhanced in this version. Cisco Systems 4.2 integrates advanced communication solutions that empower teams to collaborate in real time, regardless of their geographical location. Features such as high-definition video conferencing, secure messaging, and file sharing enhance productivity and foster innovation across teams.

In summary, Cisco Systems 4.2 stands out as a forward-thinking networking solution with key features such as scalability, advanced security, intelligent automation, flexible infrastructure, and enhanced collaboration tools. These characteristics position Cisco Systems 4.2 as an invaluable asset for enterprises striving for digital transformation in an increasingly interconnected world. The ongoing innovation reflects Cisco's commitment to delivering cutting-edge technology solutions that drive business success and resilience.