
Chapter 11 Working with User Databases
LEAP Proxy RADIUS Server Database
11-56
User Guide for Cisco Secure ACS for Windows Server
78-14696-01, Version 3.1
Step 4
If you are creating a configuration, follow these steps:
a.
Click Create New Configuration.
b.
Type a name for the new configuration for the LEAP Proxy RADIUS Server
in the box provided, or accept the default name in the box.
c.
Click Submit.
Result: Cisco Secure ACS lists the new configuration in the External User
Database Configuration table.
Step 5
Under External User Database Configuration, select the name of the LEAP Proxy
RADIUS Server database you need to configure.
Note
If only one LEAP Proxy RADIUS Server configuration exists, the name
of that configuration appears instead of the list. Proceed to Step 6.
Step 6
Click Configure.
Step 7
In the following boxes, type the required information:
•
Primary Server Name/IP—IP address of the primary proxy RADIUS server.
•
Secondary Server Name/IP—IP address of the secondary proxy RADIUS
server.
•
Shared Secret—The shared secret of the proxy RADIUS server. This must
be identical to the shared secret with which the proxy RADIUS server is
configured.
•
Authentication Port—The UDP port over which the proxy RADIUS server
conducts authentication sessions. If the LEAP Proxy RADIUS server is
installed on the same Windows server as Cisco Secure ACS, this port should
not be the same port used by Cisco Secure ACS for RADIUS authentication.
For more information about the ports used by Cisco Secure ACS for
RADIUS, see
RADIUS, page 1-6
.
•
Timeout (seconds):—The number of seconds Cisco Secure ACS waits
before sending notification to the user that the authentication attempt has
timed out.