Cisco Servers User Manual page 436

For windows 2000/nt servers
Table of Contents

Advertisement

LEAP Proxy RADIUS Server Database
Step 4
If you are creating a configuration, follow these steps:
a.
b.
c.
Step 5
Under External User Database Configuration, select the name of the LDAP
database you need to configure.
Note
Click Configure.
Step 6
Step 7
In the following boxes, type the required information:
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
11-46
Click Create New Configuration.
Type a name for the new configuration for the LEAP Proxy RADIUS Server
in the box provided, or accept the default name in the box.
Click Submit.
Result: Cisco Secure ACS lists the new configuration in the External User
Database Configuration table.
If only one LEAP Proxy RADIUS Server configuration exists, the
name of that configuration appears instead of the list. Proceed to the
next step.
Primary Server Name/IP—IP address of the primary proxy RADIUS
server.
Secondary Server Name/IP—IP address of the secondary proxy RADIUS
server.
Shared Secret—The shared secret of the proxy RADIUS server. This must
be identical to the shared secret with which the proxy RADIUS server is
configured.
Authentication Port—The TCP port over which the proxy RADIUS server
conducts authentication sessions. If the LEAP Proxy RADIUS server is
installed on the same Windows NT/2000 server as Cisco Secure ACS, this
port should not be the same port used by Cisco Secure ACS for RADIUS
authentication. For more information about the ports used by
Cisco Secure ACS for RADIUS, see the
Timeout (seconds):—The number of seconds Cisco Secure ACS waits
before sending notification to the user that the authentication attempt has
timed out.
Chapter 11
Working with User Databases
"RADIUS" section on page
78-13751-01, Version 3.0
1-6.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure acs 3.0

Table of Contents