Cisco Systems 3.5 manual Failover by the NAS and Session Management

Page 25

Chapter 2 Understanding Cisco Access Registrar

Program Flow

Action

Explanation

 

 

Determines whether to

The Service name defined in

perform authorization.

/Radius/DefaultAuthorizationService, if different than

 

the Authentication Service.

 

 

*Executes the

A script referred to in

Service’s incoming

/Radius/Services/<Name>/IncomingScript.

script.

 

 

 

Performs

Checks that the Service type is defined in

authorization.

/Radius/Services/<Name>/<Type>.

 

 

*Executes the

A script referred to in

Service’s outgoing

/Radius/Services/<Name>/OutgoingScript.

script.

 

 

 

Session Management

The Session Management feature requires the client (NAS or proxy) to send all RADIUS accounting requests to the Cisco Access Registrar server performing session management. (The only exception is if the clients are USR/3Com Network Access Servers configured to use the USR/3Com RADIUS resource management feature.) This information is used to keep track of user sessions, and the resources allocated to those sessions.

When another accounting RADIUS server needs this accounting information, the Cisco Access Registrar server performing session management may proxy it to this second server.

Table 2-5describes how Cisco Access Registrar handles session management.

 

Table 2-5 Session Management Processing

 

 

 

Action

 

Explanation

 

 

 

Determines whether

 

The session management defined in the Environment

to perform session

 

dictionary variable Session-Manager.

management.

 

 

 

The session management name referred to in

 

 

 

 

/Radius/DefaultSessionManager.

 

 

 

Performs session

 

Selects Session Manager as defined in

management.

 

/Radius/SessionManagers/<Name>.

 

 

 

Performs resource

 

Directs the request to the appropriate Resource manager

management.

 

listed in

 

 

/Radius/SessionManagers/<Name>/ResourceManagers/<

 

 

Name>, which then allocates or checks the resource

 

 

according to the type listed in

 

 

/Radius/ResourceManagers/<Name>/<Type>.

 

 

 

Sends an

 

Creates and formats the response, and sends it back to the

Access-Accept.

 

client (NAS).

 

 

 

Failover by the NAS and Session Management

When a Network Access Server’s primary RADIUS server is performing session management, and the NAS determines the server is not responding and begins sending requests to its secondary RADIUS server, the following occurs:

Cisco Access Registrar 3.5 Concepts and Reference Guide

 

OL-2683-02

2-7

 

 

 

Image 25
Contents Corporate Headquarters Cisco Access Registrar 3.5 Concepts and Reference GuideCisco Access Registrar 3.5 Concepts and Reference Guide Iii N T E N T SSession-Service Service Step and Radius-Session Service Replication’s Impact on Request Processing IPAddress Port Understanding Snmp Vii Accounting Start Data FlowViii World Wide Web Obtaining DocumentationOrdering Documentation Obtaining Technical AssistanceDocumentation Feedback Cisco.comTechnical Assistance Center Contacting TAC by Using the Cisco TAC WebsiteContacting TAC by Telephone Xii Radius Protocol OverviewPacket Exchange Between User, NAS, and Radius Steps to ConnectionTypes of Radius Messages Packet ContentsAttribute Dictionary Proxy ServersProxying to an Ldap Server for Authentication Basic Authentication and AuthorizationOverview Basic Authentication and Authorization Cisco Access Registrar Hierarchy Understanding Cisco Access RegistrarUserLists and Groups ServicesProfiles ScriptsSession Management Using Resource Managers Program Flow Cisco AR Directory StructureSubdirectory Description Client or NAS Scripting Points Scripting PointsCisco AR Server Action Explanation Action ExplanationRadius/Advanced/RequireNASsBehindProxyBeInClie Authentication and/or Authorization Scripting PointsFailover by the NAS and Session Management Session ManagementScript Processing Hierarchy Authentication/Authorization ScriptsIncoming Scripts Overview Cross Server Session and Resource ManagementOutgoing Scripts Configuring a Front Line Cisco Access Registrar Session-Service Service Step and Radius-Session ServiceConfigure Central AR OL-2683-02 ACMEOutgoingScript Using Cisco AR ScriptsAltigaIncomingScript AltigaOutgoingScript AuthorizeServiceANAAAOutgoing AscendIncomingScriptCabletronIncoming AuthorizeTelnetCabletronOutgoing CiscoIncomingExecDNISRule ExecTimeRuleExecFilterRule ExecNASIPRuleMapSourceIPAddress LDAPOutageParseAAARealm ParseAAASRealmParseServiceAndAAASRealmHints ParseServiceAndAAARealmHintsParseServiceAndAARealmHints ParseServiceAndAASRealmHintsParseTranslationGroupsByCLID ParseServiceHintsParseTranslationGroupsByDNIS ParseTranslationGroupsByRealmUSROutgoingScript Replication Overview Understanding ReplicationReplication Data Flow How Replication WorksMaster Server Replication Archive SecurityEnsuring Data Integrity Slave ServerTransaction Order Transaction Data VerificationAutomatic Resynchronization Understanding Hot-Configuration Replication Configuration SettingsFull Resynchronization Replication’s Impact on Request ProcessingRepTransactionSyncInterval RepTypeRepTransactionArchiveLimit MasterRepPort RepIPAddressRepSecret RepIPMasterRep Members/Slave1 Rep Members SubdirectoryName IPAddressSupported MIBs OverviewRADIUS-AUTH-SERVER-MIB Snmp TrapsCarServerStart Supported TrapsCarServerStop CarInputQueueFullCarOtherAuthServerResponding CarOtherAuthServerNotRespondingCarOtherAccServerNotResponding CarOtherAccServerResponding Configuring TrapsCarAccountingLoggingFailure Directories SearchedSwitching Configuration Files in Mid-File Configuration File TypesCommunity String OL-2683-02 Prepaid Billing Solution Measurements and Component Actions Configuring Prepaid Billing Call Flow Details Generic Call FlowAttribute Number Attribute Name Description Access-Request AuthenticationAccess-Request Authorization Access-Accept AuthenticationAccess-Accept Authorization Data Flow Accounting StartAttribute Number Attribute Name Accept-Accept Quota Depleted Access-Request Quota DepletedAccounting Response Final Status Accounting Stop Session EndSource VSA Name Type Call Flow Description Vendor-Specific AttributesTotal Volume quota received by Crbprivate GL-1 O S S a R YGL-2 Scalable wholesale access/open access solutionGL-3 GL-4 GL-5 GL-6 GL-7 GL-8 GL-9 GL-10 IN-1 RadiusIN-2 RFCIN-3 IN-4
Related manuals
Manual 180 pages 47.88 Kb

3.5 specifications

Cisco Systems 3.5 is an advanced version of Cisco's renowned networking and security solutions. This iteration showcases significant enhancements in performance, scalability, and security, making it a preferred choice for enterprises aiming to optimize their network operations and bolster their cybersecurity posture.

One of the main features of Cisco Systems 3.5 is its enhanced network automation capabilities. Automation streamlines network management, allowing organizations to apply consistent policies across their infrastructure while minimizing human error. This version employs advanced algorithms and machine learning to predict and rectify network issues proactively. With automation tools, network administrators can configure, monitor, and troubleshoot their networks with unprecedented efficiency.

Another notable characteristic of Cisco Systems 3.5 is its integration of artificial intelligence and machine learning into networking processes. The incorporation of AI enhances decision-making by analyzing vast amounts of network data, identifying patterns, and offering insights that help ensure optimal performance. This predictive analytics capability allows organizations to predict potential disruptions before they impact operations.

Security is a major focus in Cisco Systems 3.5. The platform introduces advanced threat detection and response systems that utilize deep learning to identify and mitigate emerging threats in real-time. Enhanced encryption protocols ensure that data transmitted over the network remains secure, protecting sensitive information from cyber threats. The integrated security features ensure compliance with various regulatory standards, a crucial requirement for businesses across multiple sectors.

The platforms' support for Software-Defined Networking (SDN) allows for dynamic resource allocation and traffic management. This flexibility enables organizations to adjust their network resources quickly in response to changing demands, leading to improved efficiency and reduced operational costs. Cisco Systems 3.5 also supports multicloud environments, facilitating seamless integration with cloud services such as AWS, Google Cloud, and Microsoft Azure.

Moreover, Cisco Systems 3.5 offers robust telemetry features, providing detailed real-time insights into network performance and health. This data-driven approach allows organizations to make informed decisions regarding capacity planning and resource optimization.

In summary, Cisco Systems 3.5 combines cutting-edge technologies such as AI, machine learning, and SDN to deliver a comprehensive networking solution. With its focus on automation, enhanced security, and multicloud support, this version is well-suited for modern enterprises looking to enhance their network infrastructure and security measures. As organizations continue to evolve in a digital-centric world, Cisco Systems 3.5 stands out as a critical tool to achieve connectivity and security goals effectively.