Cisco Systems 4.2 manual Use the cd command to change to the Scripts object

Page 87

Chapter 5 Customizing Your Configuration

Configuring a Remote Server for AA

Step 7 Create another Service (SouthUsers-radius) for the South remote server.

Configuring the Script

When you have multiple RemoteServers, you need a script that determines the authentication and/or authorization Service, which in turn specifies the RemoteServer to check when a user makes an Access-Request. If you want the script to apply to all users, irrespective of the NAS they are using, place the script at the Radius level.

Note See Determining the Goal of the Script, page 10-2in the Cisco Access Registrar User’s Guide for sample scripts you can use as a basis for your own scripts.

Choosing the Scripting Point

Step 1 Run the aregcmd command:

>aregcmd

Step 2 Use the cd command to change to the Scripts object:

cd /Radius/Scripts

Step 3 Use the add command to add the new script, specifying the name, description, language, filename and an optional entry point. If you do not specify an entry point, Cisco AR uses the script’s name.

The following example specifies the name ParseRemoteServers, the language Rex, the filename libParseRemoteServers.so, and the entry point ParseRemoteServers:

add ParseRemoteServers “Remote Server Script” RexlibParseRemoteServers.so ParseRemoteServers

Step 4 Use the cd command to change to the appropriate object level. The following example changes to the server level:

cd /Radius

Step 5 Use the set command to set the incoming script. The following example sets the script, ParseRemoteServers, at the server level:

set IncomingScript ParseRemoteServers

Step 6 Use the save command to save your changes:

save

Step 7 Use the reload command to reload the server.

reload

 

 

Installing and Configuring Cisco Access Registrar, 4.2

 

 

 

 

 

 

OL-17221-02

 

 

5-15

 

 

 

 

 

Image 87
Contents Installing and Configuring Cisco Access Registrar Installing and Configuring Cisco Access Registrar N T E N T S Upgrading Cisco Access Registrar Software Installing Cisco Access Registrar Software from CD-ROM3-14 Creating and Setting Group Membership Configuring Session Management Viii Cisco.com Obtaining DocumentationCisco Product Security Overview Reporting Security Problems in Cisco ProductsYou can access international Cisco websites at this URL Documentation FeedbackCisco Technical Support & Documentation Website Obtaining Technical AssistanceDefinitions of Service Request Severity Submitting a Service RequestXiii Obtaining Additional Publications and InformationXiv Installation Type Installation Dialog OverviewOpen Database Connectivity Installation LocationLicense File Location Java 2 Runtime EnvironmentBase Directory Downloading Cisco Access Registrar SoftwareExample Configuration Continue with InstallationCSCOar-4.2.1-sol10-k9.tar.gz for Solaris Cisco Access Registrar 4.2 LicensingOr stand-by Getting Cisco Access Registrar 4.2 LicenseLicense Slabs License slabs available in CAR 4.2 are listed in TableOpt/CSCOar/bin/arserver restart Installing Cisco Access Registrar 4.2 LicensesAdding Additional Cisco Access Registrar 4.2 Licenses Sample License FileAregcmd -l directoryname Aregcmd Command-Line OptionDisplaying License Information Launching aregcmdOL-17221-02 This chapter contains the following sections Installing the Cisco Access Registrar 4.2 License FileDeciding Where to Install Installing Cisco Access Registrar Software from CD-ROMInstalling Downloaded Software Zcat CSCOar-4.2.1-sol9-K9.tar.gz tar xvf Common Solaris Installation StepsEnter the following command to begin the installation For a full install, press EnterInstalling and Configuring Cisco Access Registrar Enter Y to install the setuid/setgid files RPC Bind Services Installing Cisco Access Registrar 4.2 Software on LinuxInstalling Cisco Access Registrar on LDoms Configuring SnmpCd /cdrom/cdrom0/kit/linux-2.4 Common Linux Installation StepsCp CSCOar-4.2.1-lnx26-install-K9.sh /tmp Chmod 777 CSCOar-4.2.1-lnx26-install-K9.shCSCOar-4.2.1-lnx26-install-k9.sh Enter the name of the script file to begin the installationPreparing OL-17221-02 Solaris Software Upgrade Overview Upgrading Cisco Access Registrar SoftwareLinux Software Upgrade Overview Cd /opt Mv AICar1 CSCOarEtc/init.d/arserver restart Software Upgrade Tasks Disabling ReplicationCd /radius/replication Removing the AICar1 Package Pkgrm AICar1Enter y or yes to continue removing the AICar1 package Removing the CSCOar Package Pkgrm CSCOarEnter y or yes to continue removing the CSCOar package Using uninstall-ar to Remove Linux Software Cd /opt/CSCOar/bin Uninstall-arEnter Yes or Y to continue removing the Linux software Upgrading Cisco Access Registrar Solaris Software Installing the Cisco Access Registrar License FileZcat CSCOar-4.2.1-sol9-k9.tar.gz tar xf Http//java.sun.com Where is the J2RE installed? ?,q Enter Y to preserve the local database Enter the administrator userID and passwordBack-up Copy of Original Configuration Removing Old VSA Names VSA Update ScriptUpgrading Cisco Access Registrar Linux Software Opt/CSCOar/dataServer Run the uninstall-ar program as shown below Cd /opt/CSCOar/bin arserver stopCd /cdrom/cdrom0/kit/linux-2.6 Build Date Fri Nov 07 235551 Enter Y to remove old sessions or N to retain old sessions Oraclehome Backup Copy of Original ConfigurationRemoving Old VSA Names Restarting Replication Configuring SnmpOL-17221-02 General Command Syntax Using aregcmdConfiguring a Basic Site Aregcmd CommandsRunning aregcmd Set Password Changing the Administrator’s PasswordCd //localhost/Administrators Cd adminAdd jane testadmin Configuring the Radius ServerCreating Additional Administrators Cd /AdministratorsChecking the Server’s Health Checking the System-Level DefaultsSet DefaultSessionManager Selecting Ports to UseReload Displaying the UserListsAdd SaveAdd jane Displaying the Default UserListAdding Users to UserLists Ls -RDisplaying UserGroups Use the set command to provide a password for user janeSet password jane Cd /Radius/UserLists/Default Delete bethAdd QuickExampleNAS Configuring ClientsAdding a NAS Cd /Radius/ClientsSet Service-Type Framed Configuring ProfilesSetting Radius Attributes Cd /Radius/Profiles/Default-PPP-users/AttributesSet Framed-Routing 192.168.1.0/24 Validating and Using Your ChangesAdding Multiple Cisco AV Pairs Saving and ReloadingSimple john john Testing Your ConfigurationUsing radclient Radclient -sP001 send Configuring AccountingTroubleshooting Your Configuration Setting the Trace LevelAregcmd Cd /Radius/Advanced/SNMP Enabling Snmp in the Cisco Access Registrar ServerSet Enabled True Stopping the Master AgentOpt/CSCOar/bin/arserver stop Access ControlCreate a view to enable the groups to have rights Modifying the snmpd.conf FileSystem Contact Information Configuring Dynamic DNSRestarting the Master Agent Trap RecipientCd ddns Set Protocol dynamic-dns Cd /Radius/Advanced/DDNS/TSIGKeys Add foo.comCd foo.com Set Secret base64-encoded string Cd /Radius/RemoteServers Add ddnsTesting Dynamic DNS with radclient Cd /Radius/ResourceManagers Add ddnsSave the changes you have made Set p acctrequest Start bob Cd /opt/CSCOar/bin AregcmdTrace Launch radclient Cd /opt/CSCOar/bin Radclient Acctrequest Start usernameOL-17221-02 Configuring Specific Groups Configuring GroupsCreating and Setting Group Membership Cd /Radius/UserLists/Default/jeanCd /Radius/UserGroups Using a Script to Determine Service Configuring a Default GroupSet Group Default Configuring Multiple UserListsPopulating UserLists Configuring Separate UserListsConfiguring Users Creating Separate UserListsConfiguring Services Creating Separate ServicesCreating the Script Cd /Radius Configuring the ScriptClient Scripting Choosing the Scripting PointConfiguring a Remote Server for AA Handling Multiple ScriptsAdd ParseUserName Rex libParseUserName.so ParseUserName Add QuickExample Configuring the Remote ServerCreating a RemoteServer Cd /Radius/RemoteServersSet protocol ldap Use the set command to specify the protocol ldapCreating Services Add remote-ldap Remote Ldap ServiceSet type ldap Use the set command to change the DefaultAuthorization Configuring Multiple Remote ServersChanging the Authentication and Authorization Defaults Set DefaultAuthentication remote-ldapConfiguring Two Remote Servers Creating RemoteServersAdd North Creating the Services Set IncomingScript ParseRemoteServers Use the cd command to change to the Scripts objectConfiguring Session Management Configuring a Resource ManagerCreating a Resource Manager Creating a Session Manager Configuring a Session ManagerSet 1 rm-100 Configuring Session ManagementUse the reload command to reload the Cisco AR server Enabling Session ManagementPPP SymbolsOverview Solaris DefaultAuthorizationServiceDefault ports Default-PPP-users Installing CAR on LDomsRoundRobin policy RPC services MultipleServersPolicy 5-6,5-11,5-14Reloading Reloading server Remote Servers Sample users Save command Transactions per secondDefinition Well-known ports
Related manuals
Manual 214 pages 55.15 Kb Manual 34 pages 46.13 Kb

4.2 specifications

Cisco Systems, a global leader in IT and networking solutions, has consistently evolved to meet the demands of modern enterprises. One of its noteworthy offerings is Cisco Systems 4.2, a version that embodies a significant leap in networking technology and capability. With its rich set of features, Cisco Systems 4.2 caters to a wide range of industries, facilitating enhanced performance and security.

One of the main features of Cisco Systems 4.2 is its improved scalability. The architecture has been designed to support an ever-increasing number of devices and users, making it ideal for growing enterprises. The enhanced scalability allows organizations to expand their network capacities without compromising performance, ensuring seamless integration of new technologies and devices.

Another critical aspect of Cisco Systems 4.2 is its advanced security protocols. With cyber threats constantly evolving, Cisco prioritizes security in this version by offering robust features such as end-to-end encryption, improved firewall capabilities, and enhanced intrusion detection systems. These security enhancements provide organizations with peace of mind, knowing that their sensitive data and networks are well-protected from unauthorized access and potential threats.

Cisco Systems 4.2 also introduces intelligent automation features, which significantly streamline network management. Through the use of artificial intelligence and machine learning, Cisco enables organizations to automate routine tasks, reduce human error, and optimize performance. This automation not only enhances efficiency but also allows IT teams to focus on strategic initiatives rather than day-to-day maintenance.

Moreover, Cisco Systems 4.2 emphasizes infrastructure flexibility. The new architecture supports various deployment models, including on-premises, cloud, and hybrid environments. This flexibility enables organizations to adapt their networking strategies according to their specific needs and operational requirements, facilitating a more tailored approach to IT infrastructure.

Collaboration tools have also been enhanced in this version. Cisco Systems 4.2 integrates advanced communication solutions that empower teams to collaborate in real time, regardless of their geographical location. Features such as high-definition video conferencing, secure messaging, and file sharing enhance productivity and foster innovation across teams.

In summary, Cisco Systems 4.2 stands out as a forward-thinking networking solution with key features such as scalability, advanced security, intelligent automation, flexible infrastructure, and enhanced collaboration tools. These characteristics position Cisco Systems 4.2 as an invaluable asset for enterprises striving for digital transformation in an increasingly interconnected world. The ongoing innovation reflects Cisco's commitment to delivering cutting-edge technology solutions that drive business success and resilience.