
Chapter 4 Setting Up and Managing Network Configuration
AAA Client Configuration
4-14
User Guide for Cisco Secure ACS for Windows Server
78-14696-01, Version 3.1
Note
If all authentication requests from a particular Cisco Aironet Access
Point are PEAP or EAP-TLS requests, use RADIUS (IETF) instead
of RADIUS (Cisco Aironet). Cisco Secure ACS cannot support
PEAP authentication using the RADIUS (Cisco Aironet) protocol.
–
RADIUS (Cisco BBMS)—RADIUS using Cisco BBMS VSAs. Select
this option if the network device is a Cisco BBMS network device
supporting authentication via RADIUS.
–
RADIUS (Cisco IOS/PIX)—RADIUS using Cisco IOS/PIX VSAs. This
option enables you to pack commands sent to a Cisco IOS AAA client.
The commands are defined in the Group Setup section. Select this option
for RADIUS environments in which key functions are
required to support Cisco IOS equipment.
–
RADIUS (Cisco VPN 3000)—RADIUS using Cisco VPN 3000 VSAs.
Select this option if the network device is a Cisco VPN 3000 series
Concentrator.
–
RADIUS (Cisco VPN 5000)—RADIUS using Cisco VPN 5000 VSAs.
Select this option if the network device is a Cisco VPN 5000 series
Concentrator.
–
RADIUS (IETF)—IETF-standard RADIUS, using no VSAs. Select this
option if the AAA client represents RADIUS-enabled devices from more
than one manufacturer and you want to use standard IETF RADIUS
attributes. If the AAA client represents a Cisco Aironet Access Point
used only by users authenticating with PEAP or EAP-TLS, this is also the
protocol to select.
–
RADIUS (Ascend)—RADIUS using Ascend RADIUS VSAs. Select this
option if the network device is an Ascend network device supporting
authentication via RADIUS.
–
RADIUS (Juniper)—RADIUS using Juniper RADIUS VSAs. Select
this option if the network device is a Juniper network device supporting
authentication via RADIUS.