06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 12 <strong>User</strong> Databases<br />

OL-14386-02<br />

LEAP Proxy RADIUS <strong>Server</strong> Database (Both Plat<strong>for</strong>ms)<br />

Configuring a LEAP Proxy RADIUS <strong>Server</strong> External <strong>User</strong> Database<br />

You should install and configure your proxy RADIUS server be<strong>for</strong>e configuring ACS to authenticate<br />

users with it. For in<strong>for</strong>mation about installing the proxy RADIUS server, refer to the documentation that<br />

is included with your RADIUS server.<br />

To configure LEAP proxy RADIUS authentication:<br />

Step 1 In the navigation bar, click External <strong>User</strong> Databases.<br />

Step 2 Click Database Configuration.<br />

ACS lists all possible external user database types.<br />

Step 3 Click LEAP Proxy RADIUS <strong>Server</strong>.<br />

If no LEAP Proxy RADIUS <strong>Server</strong> configuration exists, only the Database Configuration Creation table<br />

appears. Otherwise, in addition to the Database Configuration Creation table, the External <strong>User</strong><br />

Database Configuration table appears.<br />

Step 4 If you are creating a configuration:<br />

a. Click Create New Configuration.<br />

b. Type a name <strong>for</strong> the new configuration <strong>for</strong> the LEAP Proxy RADIUS <strong>Server</strong> in the box provided, or<br />

accept the default name in the box.<br />

c. Click Submit.<br />

ACS lists the new configuration in the External <strong>User</strong> Database Configuration table.<br />

Step 5 Under External <strong>User</strong> Database Configuration, select the name of the LEAP Proxy RADIUS <strong>Server</strong><br />

database that you configure.<br />

Note If only one LEAP Proxy RADIUS <strong>Server</strong> configuration exists, the name of that configuration<br />

appears instead of the list. Proceed to Step 6.<br />

Step 6 Click Configure.<br />

Step 7 In the following boxes, type the required in<strong>for</strong>mation:<br />

Primary <strong>Server</strong> Name/IP—IP address of the primary proxy RADIUS server.<br />

Secondary <strong>Server</strong> Name/IP—IP address of the secondary proxy RADIUS server.<br />

Shared Secret—The shared secret of the proxy RADIUS server. This must be identical to the shared<br />

secret with which the proxy RADIUS server is configured.<br />

Authentication Port—The UDP port over which the proxy RADIUS server conducts authentication<br />

sessions. If the LEAP Proxy RADIUS server is installed on the same Windows server as ACS, this<br />

port should not be the same port that ACS uses <strong>for</strong> RADIUS authentication. For more in<strong>for</strong>mation<br />

about the ports that ACS uses <strong>for</strong> RADIUS, see RADIUS, page 1-4.<br />

Timeout (seconds):—The number of seconds that ACS waits be<strong>for</strong>e sending notification to the user<br />

that the authentication attempt has timed out.<br />

Retries—The number of authentication attempts ACS makes be<strong>for</strong>e failing over to the secondary<br />

proxy RADIUS server.<br />

Failback Retry Delay (minutes)—The number of minutes after which ACS attempts<br />

authentications by using a failed primary proxy RADIUS server.<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

12-49

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!