|
This appendix describes the configuration steps required to include a RADIUS server in an CiscoSubscriber Edge Services Manager (SESM) deployment. This appendix includes the following topics:
You must configure SSG to communicate with the RADIUS server. To do so, use the radius-server host Cisco IOS command on the SSG host. Different ports are used for handling authentication and accounting packets. For example:
radius-server host 10.3.3.2 auth-port 1812 acct-port 1813 key cisco
To use different RADIUS servers for authentication and accounting, use two commands as follows:
radius-server host 10.3.3.2 auth-port 1812 acct-port 0 key cisco
radius-server host 10.3.3.3 auth-port 0 acct-port 1813 key cisco
The RADIUS protocol is based on a client server model. The RADIUS server is the server. Multiple dial-in Network Access Server (NAS) devices are the clients. Before communication can occur, every client must be configured on the server.
An SESM deployment requires that you configure the following NAS clients on the RADIUS server:
Table D-1 summarizes the information that might be required to define a NAS client on the RADIUS server. See your RADIUS server vendor documentation for more specific requirements, syntax, and procedures.
Property | Description |
---|---|
Name or IP Address | Identifies the client. Use either IP address or hostname. |
Must match a shared secret value configured on the client. If the shared secrets do not match, the RADIUS server issues an access-reject message. A shared secret is a value that is configured on both the client and the server. It is never sent over the network. The shared secret is used for MD5 encryption of the profile password. | |
For SSGCisco:NAS For SESMRAD_RFC+ACCT_RFC |
The following sample entries show a Merit RADIUS format defining SESM web applications and an SSG host as RADIUS clients. The examples use the value cisco
as the shared secret on all of the clients.
#Entries for SESM-Server clients
10.3.3.2 cisco type=RAD_RFC+ACCT_RFC
10.3.3.101 cisco type=RAD_RFC+ACCT_RFC
10.3.3.102 cisco type=RAD_RFC+ACCT_RFC
#Entries for 6400 NRP (SSG host)
192.168.1.6 cisco type=Cisco:NAS
An attribute dictionary defines attributes to the RADIUS server. The attribute dictionary contains:
An SESM deployment requires that you add Cisco VSAs to your RADIUS attribute dictionary. See your RADIUS server vendor's documentation for instructions and syntax. The Cisco Access Registrar ships with all of the Cisco SESM VSAs preconfigured.
Table D-2 shows the Cisco VSAs required in an SESM deployment that uses a RADIUS server, which includes:
RADIUS Attribute | Vendor ID | Subattribute | Name | Type |
---|---|---|---|---|
26 | 9 | 1 | Cisco-Avpair | String |
26 | 9 | 250 | Account-Info | String |
26 | 9 | 251 | Service-Info | String |
26 | 9 | 252 | Command-Code | String |
26 | 9 | 253 | Control-Info | String |
Service profiles define the services that subscribers can access using the SESM web pages.
In an SESM deployment, you must configure a service profile for each service that will be accessible through the SESM web application.
Table D-3 briefly describes the attributes in a RADIUS service profile. Use the following references for more information.
The service configuration examples in this section use a Merit RADIUS format.
Example Service Profile for Passthrough Service
internet Password = "servicecisco", Service-Type = Outbound
Service-Info = "IInternet",
Service-Info = "R153.153.153.0;255.255.255.0",
Service-Info = "MC",
Service-Info = "TP"
Example Service Profile for Proxy Service
corporate Password = "servicecisco", Service-Type = Outbound
Service-Info = "ICorporate Intranet (proxy)",
Service-Info = "R154.154.154.0;255.255.255.0",
Service-Info = "S10.3.3.101;1812;1813;cisco",
Service-Info = "MC",
Service-Info = "TX"
Example Service Profile Using Timeout Values
iptv Password = "servicecisco", Service-Type = Outbound
Service-Info = "IIP/TV",
Service-Info = "R160.160.160.0;255.255.255.0",
Service-Info = "MC",
Service-Info = "TP"
Idle-Timeout = 60,
Session-Timeout = 60
In an SESM deployment, you must define a user profile for each user ID and password combination that will sign onto the SESM application from a web browser.
Table D-4 briefly describes the attributes in a RADIUS user profile. Use the following references for more information about:
The user profile example in this section is in a Merit RADIUS format.
Example User Profile for Auto Services
user1 Password = "cisco"
Service-Type = Framed-User,
Account-Info = "Ainternet", (hidden on the subscriber's web page)
Account-Info = "Ninternet" (makes it visible)
SSG supports the following additional optional features. See the Cisco 6400 Feature Guide for information about these features.
ssg-next-hop Password = "xssg-key"
Control-Info = "Gl2tp-net7;192.168.1.101",
Control-Info = "Gl2tp-net40;192.168.1.102",
Control-Info = "Gweb-key;192.168.1.101",
Control-Info = "Gproxy-radius-key;192.168.1.101",
Control-Info = "Gxint-24;192.168.1.101"
If you configure a RADIUS accounting port, SSG generates accounting records and forwards them to the RADIUS server. To configure a RADIUS server for accounting only, you must perform the following configuration steps.
Note You do not need to provide service and user profiles if you are using the RADIUS server solely for accounting purposes. |
The subscriber actions that cause SSG to generate a RADIUS accounting record are:
Use the following references for more information:
This section describes how to configure the Cisco Access Registrar (Cisco AR) for an SESM deployment. The section includes profile examples in Cisco AR format.
By default, Cisco Access Registrar listens on ports 1645 and 1646 for any type of RADIUS request. You can configure Cisco Access Registrar to listen on ports 1812 and 1813 instead by entering the following commands:
add /Radius/Advanced/Ports/1812
add /Radius/Advanced/Ports/1813
These commands cause Cisco Access Registrar to listen on the explicitly defined ports, 1812 and 1813, for all types of RADIUS requests. It no longer listens on the default ports.
Cisco Access Registrar is installed with the following Cisco VSAs already defined in its attribute dictionary:
Use the following commands to configure the NAS clients required by an SESM deployment:
add /Radius/Clients/SESM1 "" 10.3.3.2 cisco
add /Radius/Clients/SESM2 "" 10.3.3.101 cisco
add /Radius/Clients/SESM1 "" 10.3.3.102 cisco
This section shows commands for creating sample profiles in Cisco Access Registrar format.
Internet Service Profile
add /Radius/Profiles/internet-profile
set /Radius/Profiles/internet-profile/Attributes/Cisco-SSG-Service-Info IInternet
R153.153.153.0;255.255.255.0 MC TP
Corporate Service Profile
add /Radius/Profiles/corporate-profile
set /Radius/Profiles/corporate-profile/Attributes/Cisco-SSG-Service-Info "ICorporate
Intranet(proxy)" R154.154.154.0;255.255.255.0 S10.3.3.101;1812;1813;cisco MC TX
IPTV Profile
add /Radius/Profiles/iptv-profile
set /Radius/Profiles/iptv-profile/Attributes/Cisco-SSG-Service-Info IIP/TV
R160.160.160.0;255.255.255.0 MC TP
set /Radius/Profiles/iptv-profile/Attributes/Idle-Timeout 60
set /Radius/Profiles/iptv-profile/Attributes/Session-Timeout 60
Standard user profile
add /Radius/Profiles/std-user-profile
set /Radius/Profiles/std-user-profile/Attributes/Service-Type Framed
set /Radius/Profiles/std-user-profile/Attributes/Cisco-SSG-Account-Info Ainternet
Ninternet
Pseudo-service profile:
add /Radius/Profiles/pseudo-service-profile
set /Radius/Profiles/pseudo-service-profile/Attributes/Cisco-SSG-Control-Info
Gl2tp-net7;192.168.1.101 Gl2tp-net40;192.168.1.102 Gweb-key;192.168.1.101
Gproxy-radius-key;192.168.1.101 Gxint-24;192.168.1.101
This section describes how to configure userlists and authentication and authorization services on Cisco Access Registrar.
Configuring Userlist for SESM Services
The following commands configure userlists containing SESM services and corresponding attribute profiles.
add /Radius/Userlists/SESMservices
add /Radius/Userlists/SESMservices/internet "" servicecisco TRUE "" internet-profile
add /Radius/Userlists/SESMservices/corporate "" servicecisco TRUE "" corporate-profile
add /Radius/Userlists/SESMservices/iptv "" servicecisco TRUE "" iptv-profile
Configuring Userlist for SESM Users
The following commands configure userlists containing SESM users and corresponding attribute profiles.
add /Radius/Userlists/SESMusers
add /Radius/Userlists/SESMusers/user1 "" cisco TRUE "" std-user-profile
add /Radius/Userlists/SESMusers/ssg-next-hop "" xssg-key TRUE "" pseudo-service-profile
Configuring AA Services
The following commands configure Cisco Access Register AA services. The first command configures services for the SESM services userlist. The second command configures services for SESM users userlist.
add /Radius/Services/Outbound "" local "" "" RejectAll "" SESMservices
add /Radius/Services/SESMdefault "" local "" "" RejectAll "" SESMusers
Checking the Service-Type Attribute
The following commands configure Cisco Access Registrar to check the Service-Type attribute in the request. If Service-Type is set to Outbound, then the Outbound AA service is used; otherwise, the SESMdefault AA service is used.
set /Radius/DefaultAuthenticationService ${q|Service-Type}{SESMdefault}
set /Radius/DefaultAuthorizationService ${q|Service-Type}{SESMdefault}
To configure accounting services, use the following commands:
add /Radius/Services/SESMaccounting "" file
set /Radius/DefaultAccountingService SESMaccounting
To save the configuration and reload the Cisco Access Registrar server, use the following commands:
save
reload
Posted: Wed Jul 24 12:13:04 PDT 2002
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.