E-33
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Appendix E Configuring an External Server for Authorization and Authentication
Configuring an External RADIUS Server
Note
RADIUS attribute names do not contain the cVPN3000 prefix to better reflect support for all three
security appliances (VPN 3000, PIX, and the ASA). Cisco Secure ACS 4.x supports this new
nomenclature, but attribute names in pre-4.0 ACS releases still include the cVPN3000 prefix. The
appliances enforce the RADIUS attributes based on attribute numeric ID, not attribute name. LDAP
attributes are enforced by their name, not by the ID.
Configuring an External RADIUS Server
This section presents an overview of the RADIUS configuration procedure and defines the Cisco
RADIUS and attributes. It includes the following topics:
•
Reviewing the RADIUS Configuration Procedure
•
Security Appliance RADIUS Authorization Attributes
•
Security Appliance Attributes
Reviewing the RADIUS Configuration Procedure
This section describes the RADIUS configuration steps required to support authentication and
authorization of the security appliance users. Follow these steps to set up the RADIUS server to inter
operate with the security appliance.
Step 1
Load the security appliance attributes into the RADIUS server. The method you use to load the attributes
depends on which type of RADIUS server you are using:
•
If you are using Cisco ACS: the server already has these attributes integrated. You can skip this step.
•
If you are using a FUNK RADIUS server: Cisco supplies a dictionary file that contains all the
security appliance attributes. Obtain this dictionary file,
cisco3k.dct
, from Software Center on
CCO or from the security appliance CD-ROM. Load the dictionary file on your server.
•
For other vendors’ RADIUS servers (for example, Microsoft Internet Authentication Service): you
must manually define each security appliance attribute. To define an attribute, use the attribute name
or number, type, value, and vendor code (3076). For a list of security appliance RADIUS
authorization attributes and values, see
Table E-5
.
Step 2
Set up the users or groups with the permissions and attributes to send during IPSec/WebVPN tunnel
establishment.
WebVPN-Macro-Value1
Y
223
String
Single
Unbounded
WebVPN-Macro-Value2
Y
224
String
Single
Unbounded
Table E-5
Security Appliance Supported RADIUS Attributes and Values (continued)
Attribute Name
VPN
3000
ASA
PIX
Attr.
#
Syntax/
Type
Single
or
Multi-
Valued
Description or Value
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......