EasyManua.ls Logo

Cisco IOS XE Intelligent Services - Page 199

Cisco IOS XE Intelligent Services
358 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Enabling ISG to Interact with External Policy Servers
How to Enable ISG to Interact with External Policy Servers
5
DETAILED STEPS
Command or Action Purpose
Step 1
enable
Example:
Router> enable
Enables privileged EXEC mode.
Enter your password if prompted.
Step 2
configure terminal
Example:
Router# configure terminal
Enters global configuration mode.
Step 3
aaa server radius dynamic-author
Example:
Router(config)# aaa server radius
dynamic-author
Configures the ISG as a AAA server.
Step 4
client {name | ip-address} [key [0 | 7] word]
[vrf vrf-id]
Example:
Router(config-locsvr-da-radius)#
Specifies a client with which ISG will be communicating.
Step 5
port port-number
Example:
Router(config-locsvr-da-radius)# port 1600
Specifies the RADIUS server port.
Default is 1700.
Step 6
server-key [0 | 7] word
Example:
Router(config-locsvr-da-radius)# server-key
cisco
Specifies the encryption key shared with the RADIUS
client.
Step 7
auth-type {all | any | session-key}
Example:
Router(config-locsvr-da-radius)# auth-type all
Specifies the attributes to be used for session authorization.
Step 8
ignore {server-key | session-key}
Example:
Router(config-locsvr-da-radius)# ignore
session-key
Configures ISG to ignore the shared encryption key or
attribute 151.
Step 9
end
Example:
Router(config)# end
Exits global configuration mode.

Table of Contents

Related product manuals