|
This section shows basic procedures for enabling an SSG and configuring it to communicate with a RADIUS server. When following these procedures, replace the sample IP addresses, port numbers, and passwords with values that are appropriate for your configuration.
Step 1 Log on to the SSG device.
Step 2 To access enabled mode, enter:
en
Step 3 To change the configuration, enter:
conf t
Step 4 To enable the SSG, enter:
ssg enable
Step 5 To remove a line, enter:
no radius-server host 10.3.3.2 auth-port 1647 acctport 1648 0 key cisco
Step 6 To add an entry, enter:
radius-server host 10.3.3.2 auth-port 1812 acctport 1813 0 key cisco
Step 7 To end editing, enter:
Ctrl-Z
Step 8 To rebuild the configuration, enter:
wr t
Step 9 To examine the current configuration, enter:
show run
Step 10 The relevant configuration entries are as follows:
a. To identify the network that the SESM web application is running on, enter:
ssg default-network 10.3.3.0 255.255.255.0
b. To specify the password to query RADIUS for service profiles, enter:
ssg service-password servicecisco
c. To configure the RADIUS protocol communication used between SSG and the SESM web application, specify the port on which the SSG is listening as follows:
ssg radius-helper auth-port 1812
d. To specify the shared secret for password encryption between SSG and the SESM web application, enter:
ssg radius-helper key cisco
e. To specify the maximum number of concurrent services for a user, enter:
ssg maxservice 21
f. To configure communication between SSG and the RADIUS server, specify the authentication port, the accounting port, and the secret as follows:
radius-server host 10.3.3.2 auth-port 1812 acct-port 1813 key cisco
g. To specify the number of RADIUS retries for authentication, enter:
radius-server retransmit 3
h. To specify the shared secret for password encryption to the RADIUS server, enter:
radius-server key cisco
For the host key port bundle mechanism to operate correctly, the SESM web application must reside in the default network with subscribers (PPP or bridged/routed) connected on downstream interfaces.
Note The host key feature requires Cisco IOS Release 12.2(2)B or later on the SSG device. |
To configure the SSG for host key operation, enter the following configuration commands at the terminal configuration prompt on the SSG host:
ssg port-map enable
ssg port-map source ip loopback 0
ssg port-map destination range lowPort to highPort ip SESMaddress
The ssg port-map source ip command configures the IP addresses for use as the IP portion of the host key. Each configured address allows for approximately 4000 host keys, if the default port bundle length of 4 is used. This address becomes the source IP address for all upstream TCP packets from SSG to the SESM web application (and conversely, the destination address for all downstream TCP packets from the SESM web application to the SSG). Although you can explicitly configure these addresses, the safest way to configure them is by using a loopback interface, as shown above, because these IP addresses must be recognized as corresponding to a local interface or loopback.
If you use the interface that is configured to give SSG access to the default network as one of the interfaces in the ssg port-map source ip command, that interface cannot also be used as a Telnet interface into the SSG host.
The ssg port-map destination range command defines the address and ports of the SESM web application, where:
If there is only one SESM port available, highPort should have the value lowPort + 1
. For example:
ssg port-map destination range 10100 to 10101 ip 10.0.3.1
The following annotated configuration example shows how to configure SSG to work with an SESM application.
c7200-1#sho run
Building configuration...
Current configuration : 4499 bytes
!
version 12.2
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname c7200-1
!
boot system flash disk0:c7200-g4js-mz.v122_4_b_throttle
The following lines configure AAA authentication.
aaa new-model
!
!
aaa authentication login default none
aaa authentication ppp default group radius
aaa authorization network ssg_aaa_author_internal_list none
aaa session-id common
enable password cisco
!
username cisco password 0 cisco
ip subnet-zero
!
!
!
ip cef
!
!
The following lines enable and configure SSG to communicate with the SESM web application.
!!
ssg enable
ssg profile-cache
ssg default-network 192.168.254.16 255.255.255.248
ssg service-password pw
ssg radius-helper auth-port 1812 acct-port 1813
ssg radius-helper key cisco
ssg accounting interval 999999
The following lines configure the SSG port-bundle host key feature.
ssg port-map enable
ssg port-map destination range 8080 to 8080
ssg port-map destination range 8443 to 8443
ssg port-map source ip Loopback0
!
!
ssg bind service passthrough1 FastEthernet4/0
ssg bind service proxy1 FastEthernet4/0
ssg bind service tunnel1 FastEthernet4/0
ssg bind direction downlink FastEthernet1/0
ssg bind direction downlink Ethernet3/2
!
The following lines configure a RADIUS proxy server.
ssg radius-proxy
client-address 192.167.254.26 key cisco
address-pool 10.0.0.1 10.0.0.200
!
The following lines configure SSG TCP redirections.
ssg tcp-redirect
network-list Unauth-Service-pass
network 10.60.60.0 255.255.255.128
!
network-list Unauth-Service-prox
network 10.61.61.0 255.255.255.128
!
network-list Unauth-Service-tunn
network 10.62.62.0 255.255.255.128
!
port-list ports
port 80
port 8080
!
server-group Unauth-User
server 192.168.254.21 8090
!
server-group Initial
server 192.168.254.21 8091
!
redirect port-list ports to Initial
!
server-group Advertisment
server 192.168.254.21 8092
!
redirect port-list ports to Advertisment
!
server-group Unauth-Service-pass
server 192.168.254.21 8094
!
redirect port-list ports to Unauth-Service-pass
redirect unauthorized-service destination network-list Unauth-Service-pass to
Unauth-Service-pass
!
server-group Unauth-Service-prox
server 192.168.254.21 8095
!
redirect port-list ports to Unauth-Service-prox
redirect unauthorized-service destination network-list Unauth-Service-prox to
Unauth-Service-prox
!
server-group Unauth-Service-tunn
server 192.168.254.21 8096
!
redirect port-list ports to Unauth-Service-tunn
redirect unauthorized-service destination network-list Unauth-Service-tunn to
Unauth-Service-tunn
!
server-group Advertisement
!
redirect unauthenticated-user to Unauth-User
redirect captivate initial default group Initial duration 1
redirect captivate advertising default group Advertisment duration 5 frequency 600
!
!
The following lines configure the device interfaces.
interface Loopback0
ip address 10.2.2.1 255.255.255.0
no ip mroute-cache
!
interface FastEthernet0/0
ip address 10.0.3.20 255.255.255.128
no ip mroute-cache
duplex half
no cdp enable
!
interface FastEthernet1/0
ip address 192.168.254.25 255.255.255.248
no ip mroute-cache
duplex half
no cdp enable
!
interface ATM2/0
no ip address
no ip mroute-cache
shutdown
no atm ilmi-keepalive
atm voice aal2 aggregate-svc upspeed-number 0
!
interface Ethernet3/0
ip address 10.10.10.1 255.255.255.0
no ip mroute-cache
duplex half
no cdp enable
!
interface Ethernet3/1
ip address 192.168.254.20 255.255.255.248
no ip mroute-cache
duplex half
no cdp enable
!
interface Ethernet3/2
ip address 192.168.254.4 255.255.255.248
no ip mroute-cache
duplex half
no cdp enable
!
interface Ethernet3/3
ip address 10.5.5.2 255.255.255.0
no ip mroute-cache
shutdown
duplex half
no cdp enable
!
interface FastEthernet4/0
ip address 172.16.59.1 255.255.255.0
no ip mroute-cache
duplex half
no cdp enable
!
ip default-gateway 192.168.254.1
ip classless
ip route 0.0.0.0 0.0.0.0 10.52.199.1
ip route 10.0.12.0 255.255.255.128 10.10.10.2
ip route 10.1.0.0 255.255.0.0 10.0.4.1
ip route 10.50.0.0 255.255.0.0 10.52.199.1
ip route 192.168.254.100 255.255.255.255 10.52.199.1
ip route 172.19.60.0 255.255.255.128 10.59.59.2
ip route 172.18.61.0 255.255.255.128 10.59.59.2
ip route 172.17.62.0 255.255.255.128 10.59.59.2
ip route 172.16.70.0 255.255.255.0 10.59.59.2
ip route 192.168.0.0 255.255.0.0 10.52.199.1
no ip http server
ip pim bidir-enable
!
The following lines configure communication between SSG and a RADIUS server.
radius-server host 192.168.254.100 auth-port 1645 acct-port 1646 timeout 10 retransmit 3
key cisco
radius-server retransmit 3
radius-server attribute 44 include-in-access-req
radius-server attribute 55 include-in-acct-req
call rsvp-sync
!
mgcp profile default
!
dial-peer cor custom
!!
gatekeeper
shutdown
!
line con 0
exec-timeout 0 0
line aux 0
line vty 0 4
exec-timeout 0 0
password cisco
!
end
c7200-1#
Posted: Mon Aug 26 08:35:30 PDT 2002
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.