Configuring Cisco Vpn 5000 Concentrator Radius Settings For A User Group - Cisco 3.3 User Manual

For windows server version 3.3
Table of Contents

Advertisement

Configuration-specific User Group Settings
Configuring Cisco VPN 5000 Concentrator RADIUS Settings for a
User Group
Note
Step 1
Step 2
Step 3
Step 4
User Guide for Cisco Secure ACS for Windows Server
6-46
The Cisco VPN 5000 Concentrator RADIUS attribute configurations display only
when both the following are true:
A network device has been configured to use RADIUS (Cisco VPN 5000) in
Network Configuration.
Group-level RADIUS (Cisco VPN 5000) attributes have been enabled on the
RADIUS (Cisco VPN 5000) page of the Interface Configuration section.
Cisco VPN 5000 Concentrator RADIUS represents only the Cisco VPN 5000
Concentrator VSA. You must configure both the IETF RADIUS and Cisco VPN
5000 Concentrator RADIUS attributes.
To hide or display Cisco VPN 5000 Concentrator RADIUS attributes, see
Protocol Configuration Options for Non-IETF RADIUS Attributes, page
VSA applied as an authorization to a particular group persists, even when you
remove or replace the associated AAA client; however, if you have no AAA
clients of this (vendor) type configured, the VSA settings do not appear in the
group configuration interface.
To configure and enable Cisco VPN 5000 Concentrator RADIUS attributes to be
applied as an authorization for each user in the current group, follow these steps:
Confirm that your IETF RADIUS attributes are configured properly.
For more information about setting IETF RADIUS attributes, see
IETF RADIUS Settings for a User Group, page
In the navigation bar, click Group Setup.
The Group Setup Select page opens.
From the Group list, select a group, and then click Edit Settings.
The Group Settings page displays the name of the group at its top.
From the Jump To list at the top of the page, choose RADIUS (Cisco VPN 5000).
Chapter 6
User Group Management
Configuring
6-38.
78-16592-01
Setting
3-17. A

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure access control serverSecure acs

Table of Contents