Enabling ISG to Interact with External Policy Servers
Configuration Examples for ISG Interaction with External Policy Servers
6
Configuration Examples for ISG Interaction with External Policy
Servers
This section contains the following example:
⢠ISG Interaction with External Policy Servers: Example, page 6
ISG Interaction with External Policy Servers: Example
The following example configures ISG to interact with external policy servers:
!
aaa group server radius CAR_SERVER
server 10.100.2.36 auth-port 1812 acct-port 1813
!
aaa authentication login default none
aaa authentication login IP_AUTHEN_LIST group CAR_SERVER
aaa authentication ppp default group CAR_SERVER
aaa authorization network default group CAR_SERVER
aaa authorization subscriber-service default local group radius
aaa accounting network default start-stop group CAR_SERVER
!
aaa server radius dynamic-author
client 10.76.86.90 key cisco
client 172.19.192.25 vrf VRF1 key cisco
client 172.19.192.25 vrf VRF2 key cisco
client 172.19.192.25 key cisco
message-authenticator ignore
Additional References
The following sections provide references related to ISG interaction with external policy servers.
Related Documents
Standards
Related Topic Document Title
ISG commands Cisco IOS Intelligent Services Gateway Command Reference
AAA configuration tasks āAuthentication, Authorization, and Accounting (AAA)ā section of
the Cisco IOS XE Security Configuration Guide
AAA commands Cisco IOS Security Command Reference
Standard Title
No new or modified standards are supported by this
feature.
ā