Configuring ISG as a RADIUS Proxy
How to Configure ISG as a RADIUS Proxy
10
Defining an ISG Policy for RADIUS Proxy Events
Perform this task to configure a policy that is applied at session start and causes ISG to proxy RADIUS
packets to a specified server.
SUMMARY STEPS
1. enable
2. configure terminal
3. aaa new-model
4. aaa authorization radius-proxy {default | list-name} method1 [method2 [method3...]]
5. policy-map type control policy-map-name
6. class type control {control-class-name | always} event session-start
7. action-number proxy [aaa list {default | list-name}
8. end
DETAILED STEPS
Step 12
timer {ip-address | request} seconds
Example:
Router(config-locsvr-radius-client)# timer
ip-address 5
Specifies the amount of time ISG waits for the specified
event before terminating the session.
• ip-address—Specifies the amount of time ISG waits
for an IP address to be assigned to the session.
• request—Specifies the amount of time ISG waits to
receive an Access-Request from a client device.
Step 13
end
Example:
Router(config-locsvr-radius-client)# end
Exits the current configuration mode and returns to
privileged EXEC mode.
Command or Action Purpose
Command or Action Purpose
Step 1
enable
Example:
Router> enable
Enables privileged EXEC mode.
• Enter your password if prompted.
Step 2
configure terminal
Example:
Router# configure terminal
Enters global configuration mode.
Step 3
aaa new-model
Example:
Router(config)# aaa new-model
Enables the AAA access control model.