RADIUS Route Download

Similar documents
Encrypted Vendor-Specific Attributes

AAA Dead-Server Detection

Configuring the Physical Subscriber Line for RADIUS Access and Accounting

Encrypted Vendor-Specific Attributes

Configuring Local Authentication and Authorization

Configuring DHCP Option 60 and Option 82 with VPN-ID Support for Transparent Automatic Logon

802.1P CoS Bit Set for PPP and PPPoE Control Frames

Configuring the Physical Subscriber Line for RADIUS Access and Accounting

Configuring Embedded Resource Manager-MIB

NBAR2 HTTP-Based Visibility Dashboard

Password Strength and Management for Common Criteria

The MSCHAP Version 2 feature (introduced in Cisco IOS Release 12.2(2)XB5) allows Cisco routers to

Dynamic Bandwidth Sharing

RADIUS Logical Line ID

DHCP Server RADIUS Proxy

RADIUS Tunnel Attribute Extensions

Memory Threshold Notifications

Flow-Based per Port-Channel Load Balancing

RADIUS Attribute 66 Tunnel-Client-Endpoint Enhancements

Exclusive Configuration Change Access and Access Session Locking

Contextual Configuration Diff Utility

Cisco IOS Login Enhancements-Login Block

Exclusive Configuration Change Access and Access Session Locking

HTTP 1.1 Web Server and Client

PPPoE Agent Remote-ID and DSL Line Characteristics Enhancement

OSPF Incremental SPF

Configuring ISG Policies for Automatic Subscriber Logon

DMVPN Event Tracing. Finding Feature Information

IP Overlapping Address Pools

AAA Server Groups. Finding Feature Information. Information About AAA Server Groups. AAA Server Groups

Logging to Local Nonvolatile Storage (ATA Disk)

Configuring Secure Shell (SSH)

Configuring System MTU

Configuring Access Point Groups

Configuring Access Point Groups

Configuring TACACS. Finding Feature Information. Prerequisites for Configuring TACACS

SSH Algorithms for Common Criteria Certification

Configuring Secure Shell (SSH)

Configuring Authorization

IEEE 802.1X Open Authentication

PPPoE Smart Server Selection

FPG Endpoint Agnostic Port Allocation

Predownloading an Image to Access Points

PPPoE Smart Server Selection

Configuring the Cisco Discovery Protocol

Configuring Secure Shell (SSH)

Configuring Secure Shell (SSH)

OSPF Limit on Number of Redistributed Routes

IEEE 802.1X Multiple Authentication

BGP Link Bandwidth. Finding Feature Information. Prerequisites for BGP Link Bandwidth

QoS: Child Service Policy for Priority Class

IEEE 802.1X RADIUS Accounting

Configuring EEE. Finding Feature Information. Information About EEE. EEE Overview

Restrictions for Secure Copy Performance Improvement

HTTP 1.1 Web Server and Client

Fine-Grain NBAR for Selective Applications

Configurable Number of Simultaneous Packets per Flow

Enabling ALGs and AICs in Zone-Based Policy Firewalls

RADIUS for Multiple UDP Ports

Configuring Secure Shell (SSH)

Configuring WLAN Security

IPv6 Routing: RIP for IPv6

Transferring Files Using HTTP or HTTPS

Configuring DHCP Services for Accounting and Security

Configuring Secure Shell (SSH)

Clock Recovery System

Enabling ALGs and AICs in Zone-Based Policy Firewalls

Firewall Authentication Proxy for FTP and Telnet Sessions

TACACS+ Configuration Guide, Cisco IOS XE Release 3S

Configuring ISG Support for Prepaid Billing

Clock Recovery System

Autoroute Announce and Forwarding Adjacencies For OSPFv3

Autoroute Announce and Forwarding Adjacencies For OSPFv3

Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+)

RADIUS Packet of Disconnect

Configuring System MTU

Configuring DNS. Finding Feature Information. Prerequisites for Configuring DNS

Port-Level Shaping and Minimum Bandwidth Guarantee

Quality of Service for VPNs

To use DNS, you must have a DNS name server on your network.

Configuring Aggressive Load Balancing

Configuring Switched Port Analyzer

Link Aggregation Control Protocol (IEEE 802.3ad) Support for Cisco ubr10012 Routers

PPPoE on ATM. Finding Feature Information. Prerequisites for PPPoE on ATM. Restrictions for PPPoE on ATM

Object Tracking: IPv6 Route Tracking

Bulk Logging and Port Block Allocation

OSPFv2 Local RIB. Finding Feature Information

IEEE 802.1X with ACL Assignments

Netflow v9 for IPv6. Finding Feature Information. Prerequisites for Netflow v9 for IPv6. Information About Netflow v9 for IPv6

Nested Class Map Support for Zone-Based Policy Firewall

Configuring EEE. Finding Feature Information. Restrictions for EEE

Per-User ACL Support for 802.1X/MAB/Webauth Users

Fine-Grain NBAR for Selective Applications

DHCP Server Port-Based Address Allocation

Contextual Configuration Diff Utility

Dynamic Bandwidth Sharing

MPLS LDP Autoconfiguration

RADIUS Server Load Balancing

SIP ALG Resilience to DoS Attacks

Troubleshooting ISG with Session Monitoring and Distributed Conditional Debugging

Transcription:

The feature allows users to configure their network access server (NAS) to direct RADIUS authorization. Finding Feature Information, page 1 Prerequisites for, page 1 Information About, page 1 How to Configure, page 2 Configuration Examples for, page 3 Additional References, page 3 Feature Information for, page 4 Finding Feature Information Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for AAA network security must be enabled before you perform the tasks in this feature. Information About The feature allows users to configure their network access server (NAS) to direct RADIUS authorization. Users configure a separate named method list (in addition to the default method list) 1

How to Configure for static route download requests sent by their NAS to authorization, authentication, and accounting (AAA) servers. Before this feature, RADIUS authorization for static route download requests was sent only to AAA servers specified by the default method list. This feature extends the functionality of the aaa route download command to allow users to specify the name of the method list that will be used to direct static route download requests to the AAA servers. The aaa route downloadcommandmay be used to specify a separate method list for downloading static routes. This method list can be added by using the aaa authorization configuration command. How to Configure Configuring SUMMARY STEPS To configure the NAS to send static route download requests to the servers specified by a named method list, use the following commands in global configuration mode: 1. Router(config)# aaa authorization configuration method-name [ radius tacacs+ group group-name ] 2. Router(config)# aaa route download [time] [authorization method-list] DETAILED STEPS Step 1 Step 2 Command or Action Router(config)# aaa authorization configuration method-name [ radius tacacs+ group group-name ] Router(config)# aaa route download [time] [authorization method-list] Purpose Downloads static route configuration information from the AAA server using RADIUS. Enables the static route download feature. Use the authorization method-list attributes to specify a named method list to which RADIUS authorization requests for static route downloads are sent. Verifying To verify the routes that are installed, use the show ip route command in EXEC mode. To display information that is associated with RADIUS, use the debug radius command in privileged EXEC mode. 2

Configuration Examples for Configuration Examples for Configuration Example The following example shows how to configure the NAS to send static route download requests to the servers specified by the method list named list1 : aaa new-model aaa group server radius rad1 server 10.2.2.2 auth-port 1645 acct-port 1646! aaa group server tacacs+ tac1 server 172.17.3.3! aaa authorization configuration default group radius aaa authorization configuration list1 group rad1 group tac1 aaa route download 1 authorization list1 tacacs-server host 172.17.3.3 tacacs-server key cisco tacacs-server administration! radius-server host 10.2.2.2 auth-port 1645 acct-port 1646 radius-server key cisco Additional References The following sections provide references related to. Related Documents Related Topic Security commands Document Title Cisco IOS Security Command Reference Standards Standard No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature. Title -- 3

Feature Information for MIBs MIB No new or modified MIBs are supported by this feature, and support for existing MIBs has not been modified by this feature. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS XE software releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs RFCs RFC No new or modified RFCs are supported by this feature, and support for existing RFCs has not been modified by this feature. Title -- Technical Assistance Description The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Link http://www.cisco.com/techsupport Feature Information for The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required. 4

Feature Information for Table 1: Feature Information for Feature Name Releases Cisco IOS XE Release 2.1 Feature Information The feature allows users to configure their network access server (NAS) to direct RADIUS authorization. Users configure a separate named method list (in addition to the default method list) for static route download requests sent by their NAS to authorization, authentication, and accounting (AAA) servers. In Cisco IOS XE Release 2.1, this feature was introduced on Cisco ASR 1000 Series Aggregation Services Routers. The following commands were introduced: aaa route download 5

Feature Information for 6