5-23
RADIUS Authentication, Authorization and Accounting
Commands Authorization
HKEY_LOCAL_MACHINE\software\cisco\CiscoAAAv3.2\
CSRadius\ExtensionPoints\002\AssociatedWithVendors
6.
Right click and then select
New > key
. Add the vendor Id number that
you determined in step 4 (100 in the example).
7.
Restart all Cisco services.
8.
The newly created HP RADIUS VSA appears only when you configure an
AAA client (NAS) to use the HP VSA RADIUS attributes. Select Network
Configuration and add (or modify) an AAA entry. In the Authenticate
Using field choose RADIUS(HP) as an option for the type of security
control protocol.
9.
Select
Restar
t to effect the change. The HP RADIUS VSA
attributes will appear in Cisco ACS configurations, for example, “Interface
Configuration”, “Group Setup”, “User Setup”.
To enable the processing of the HP-Command-String VSA for RADIUS
accounting:
1.
Select
System Configuration
.
2.
Select
Logging
.
3.
Select
CSV RADIUS Accounting
. In the Select Columns to Log section,
add the HP-Command-String attribute to the Logged Attributes list.
4.
Select
Submit
.
5.
Select
Network Configuration
. In the AAA Clients section, select an
entry in the AAA Client Hostname column. You will go to the AAA Client
Setup screen.
6.
Check the box for
Log Update/Watchdog Packets from this AAA
Client
.
7.
Click
Restart
. You should be able to see the HP-Command-
String attribute in the RADIUS accounting reports.
You can enter the commands you wish to allow or deny with the special
characters used in standard regular expressions (c, ., \, [list], [^list], *, ^, $).
Commands must be between 1-249 characters in length.
Example Configuration Using FreeRADIUS
1.
Create a dictionary file (for example, dictionary.hp) containing HP VSA
definitions. An example file is:
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......