Cisco Systems 4.2 Configuring Multiple Remote Servers, Set DefaultAuthentication remote-ldap

Page 84

Chapter 5 Customizing Your Configuration

Configuring a Remote Server for AA

To have Cisco AR perform authentication and authorization against information from the LDAP server, you must change the DefaultAuthenticationService and DefaultAuthorizationService at the Radius level.

Changing the Authentication and Authorization Defaults

Step 1 Run the aregcmd command: aregcmd

Step 2 Use the cd command to change to the Radius level: cd /Radius

Step 3 Use the set command to change the DefaultAuthentication:

set DefaultAuthentication remote-ldap

Step 4 Use the set command to change the DefaultAuthorization:

set DefaultAuthorization remote-ldap

Step 5 Use the save command to save your changes:

save

Step 6 Use the reload command to reload the server:

reload

Configuring Multiple Remote Servers

All of the sites described so far in this chapter have used a single server for authentication and authorization; either the local RADIUS server or a remote LDAP server.

You can configure multiple remote servers to use the same Service, or multiple remote servers to use different Services. Figure 5-2shows how to use multiple servers for authentication and authorization, and how to employ a script to determine which one to use.

 

Installing and Configuring Cisco Access Registrar, 4.2

5-12

OL-17221-02

Image 84
Contents Installing and Configuring Cisco Access Registrar Installing and Configuring Cisco Access Registrar N T E N T S Upgrading Cisco Access Registrar Software Installing Cisco Access Registrar Software from CD-ROM3-14 Creating and Setting Group Membership Configuring Session Management Viii Obtaining Documentation Cisco.comReporting Security Problems in Cisco Products You can access international Cisco websites at this URLDocumentation Feedback Cisco Product Security OverviewObtaining Technical Assistance Cisco Technical Support & Documentation WebsiteSubmitting a Service Request Definitions of Service Request SeverityObtaining Additional Publications and Information XiiiXiv Installation Dialog Overview Installation TypeInstallation Location License File LocationJava 2 Runtime Environment Open Database ConnectivityDownloading Cisco Access Registrar Software Example ConfigurationContinue with Installation Base DirectoryCisco Access Registrar 4.2 Licensing CSCOar-4.2.1-sol10-k9.tar.gz for SolarisGetting Cisco Access Registrar 4.2 License License SlabsLicense slabs available in CAR 4.2 are listed in Table Or stand-byInstalling Cisco Access Registrar 4.2 Licenses Adding Additional Cisco Access Registrar 4.2 LicensesSample License File Opt/CSCOar/bin/arserver restartAregcmd Command-Line Option Displaying License InformationLaunching aregcmd Aregcmd -l directorynameOL-17221-02 Installing the Cisco Access Registrar 4.2 License File This chapter contains the following sectionsDeciding Where to Install Installing Cisco Access Registrar Software from CD-ROMInstalling Downloaded Software Common Solaris Installation Steps Enter the following command to begin the installationFor a full install, press Enter Zcat CSCOar-4.2.1-sol9-K9.tar.gz tar xvfInstalling and Configuring Cisco Access Registrar Enter Y to install the setuid/setgid files Installing Cisco Access Registrar 4.2 Software on Linux Installing Cisco Access Registrar on LDomsConfiguring Snmp RPC Bind ServicesCommon Linux Installation Steps Cp CSCOar-4.2.1-lnx26-install-K9.sh /tmpChmod 777 CSCOar-4.2.1-lnx26-install-K9.sh Cd /cdrom/cdrom0/kit/linux-2.4Enter the name of the script file to begin the installation CSCOar-4.2.1-lnx26-install-k9.shPreparing OL-17221-02 Upgrading Cisco Access Registrar Software Solaris Software Upgrade OverviewLinux Software Upgrade Overview Cd /opt Mv AICar1 CSCOarEtc/init.d/arserver restart Software Upgrade Tasks Disabling ReplicationCd /radius/replication Removing the AICar1 Package Pkgrm AICar1Enter y or yes to continue removing the AICar1 package Removing the CSCOar Package Pkgrm CSCOarEnter y or yes to continue removing the CSCOar package Using uninstall-ar to Remove Linux Software Cd /opt/CSCOar/bin Uninstall-arEnter Yes or Y to continue removing the Linux software Installing the Cisco Access Registrar License File Upgrading Cisco Access Registrar Solaris SoftwareZcat CSCOar-4.2.1-sol9-k9.tar.gz tar xf Http//java.sun.com Where is the J2RE installed? ?,q Enter the administrator userID and password Enter Y to preserve the local databaseBack-up Copy of Original Configuration VSA Update Script Removing Old VSA NamesUpgrading Cisco Access Registrar Linux Software Opt/CSCOar/dataServer Run the uninstall-ar program as shown below Cd /opt/CSCOar/bin arserver stopCd /cdrom/cdrom0/kit/linux-2.6 Build Date Fri Nov 07 235551 Enter Y to remove old sessions or N to retain old sessions Backup Copy of Original Configuration OraclehomeRemoving Old VSA Names Configuring Snmp Restarting ReplicationOL-17221-02 Using aregcmd General Command SyntaxConfiguring a Basic Site Aregcmd CommandsRunning aregcmd Changing the Administrator’s Password Cd //localhost/AdministratorsCd admin Set PasswordConfiguring the Radius Server Creating Additional AdministratorsCd /Administrators Add jane testadminChecking the System-Level Defaults Set DefaultSessionManagerSelecting Ports to Use Checking the Server’s HealthDisplaying the UserLists AddSave ReloadDisplaying the Default UserList Adding Users to UserListsLs -R Add janeUse the set command to provide a password for user jane Set password janeCd /Radius/UserLists/Default Delete beth Displaying UserGroupsConfiguring Clients Adding a NASCd /Radius/Clients Add QuickExampleNASConfiguring Profiles Setting Radius AttributesCd /Radius/Profiles/Default-PPP-users/Attributes Set Service-Type FramedValidating and Using Your Changes Adding Multiple Cisco AV PairsSaving and Reloading Set Framed-Routing 192.168.1.0/24Testing Your Configuration Using radclientRadclient -s Simple john johnConfiguring Accounting Troubleshooting Your ConfigurationSetting the Trace Level P001 sendEnabling Snmp in the Cisco Access Registrar Server Set Enabled TrueStopping the Master Agent Aregcmd Cd /Radius/Advanced/SNMPAccess Control Create a view to enable the groups to have rightsModifying the snmpd.conf File Opt/CSCOar/bin/arserver stopConfiguring Dynamic DNS Restarting the Master AgentTrap Recipient System Contact InformationCd /Radius/Advanced/DDNS/TSIGKeys Add foo.com Cd foo.com Set Secret base64-encoded stringCd /Radius/RemoteServers Add ddns Cd ddns Set Protocol dynamic-dnsTesting Dynamic DNS with radclient Cd /Radius/ResourceManagers Add ddnsSave the changes you have made Cd /opt/CSCOar/bin Aregcmd Trace Launch radclient Cd /opt/CSCOar/bin RadclientAcctrequest Start username Set p acctrequest Start bobOL-17221-02 Configuring Groups Configuring Specific GroupsCreating and Setting Group Membership Cd /Radius/UserLists/Default/jeanCd /Radius/UserGroups Configuring a Default Group Using a Script to Determine ServiceConfiguring Multiple UserLists Set Group DefaultConfiguring Separate UserLists Configuring UsersCreating Separate UserLists Populating UserListsConfiguring Services Creating Separate ServicesCreating the Script Configuring the Script Client ScriptingChoosing the Scripting Point Cd /RadiusConfiguring a Remote Server for AA Handling Multiple ScriptsAdd ParseUserName Rex libParseUserName.so ParseUserName Configuring the Remote Server Creating a RemoteServerCd /Radius/RemoteServers Add QuickExampleUse the set command to specify the protocol ldap Set protocol ldapCreating Services Add remote-ldap Remote Ldap ServiceSet type ldap Configuring Multiple Remote Servers Changing the Authentication and Authorization DefaultsSet DefaultAuthentication remote-ldap Use the set command to change the DefaultAuthorizationConfiguring Two Remote Servers Creating RemoteServersAdd North Creating the Services Use the cd command to change to the Scripts object Set IncomingScript ParseRemoteServersConfiguring Session Management Configuring a Resource ManagerCreating a Resource Manager Configuring a Session Manager Creating a Session ManagerConfiguring Session Management Use the reload command to reload the Cisco AR serverEnabling Session Management Set 1 rm-100Symbols PPPDefaultAuthorizationService Default ports Default-PPP-usersInstalling CAR on LDoms Overview SolarisRoundRobin policy RPC services MultipleServersPolicy 5-6,5-11,5-14Reloading Reloading server Remote Servers Sample users Save command Transactions per secondDefinition Well-known ports
Related manuals
Manual 214 pages 55.15 Kb Manual 34 pages 46.13 Kb

4.2 specifications

Cisco Systems, a global leader in IT and networking solutions, has consistently evolved to meet the demands of modern enterprises. One of its noteworthy offerings is Cisco Systems 4.2, a version that embodies a significant leap in networking technology and capability. With its rich set of features, Cisco Systems 4.2 caters to a wide range of industries, facilitating enhanced performance and security.

One of the main features of Cisco Systems 4.2 is its improved scalability. The architecture has been designed to support an ever-increasing number of devices and users, making it ideal for growing enterprises. The enhanced scalability allows organizations to expand their network capacities without compromising performance, ensuring seamless integration of new technologies and devices.

Another critical aspect of Cisco Systems 4.2 is its advanced security protocols. With cyber threats constantly evolving, Cisco prioritizes security in this version by offering robust features such as end-to-end encryption, improved firewall capabilities, and enhanced intrusion detection systems. These security enhancements provide organizations with peace of mind, knowing that their sensitive data and networks are well-protected from unauthorized access and potential threats.

Cisco Systems 4.2 also introduces intelligent automation features, which significantly streamline network management. Through the use of artificial intelligence and machine learning, Cisco enables organizations to automate routine tasks, reduce human error, and optimize performance. This automation not only enhances efficiency but also allows IT teams to focus on strategic initiatives rather than day-to-day maintenance.

Moreover, Cisco Systems 4.2 emphasizes infrastructure flexibility. The new architecture supports various deployment models, including on-premises, cloud, and hybrid environments. This flexibility enables organizations to adapt their networking strategies according to their specific needs and operational requirements, facilitating a more tailored approach to IT infrastructure.

Collaboration tools have also been enhanced in this version. Cisco Systems 4.2 integrates advanced communication solutions that empower teams to collaborate in real time, regardless of their geographical location. Features such as high-definition video conferencing, secure messaging, and file sharing enhance productivity and foster innovation across teams.

In summary, Cisco Systems 4.2 stands out as a forward-thinking networking solution with key features such as scalability, advanced security, intelligent automation, flexible infrastructure, and enhanced collaboration tools. These characteristics position Cisco Systems 4.2 as an invaluable asset for enterprises striving for digital transformation in an increasingly interconnected world. The ongoing innovation reflects Cisco's commitment to delivering cutting-edge technology solutions that drive business success and resilience.