Cisco 2509 - Router - EN User Manual page 464

User guide
Hide thumbs Also See for 2509 - Router - EN:
Table of Contents

Advertisement

LEAP Proxy RADIUS Server Database
If you are creating a configuration, follow these steps:
Step 4
a.
b.
c.
Step 5
Under External User Database Configuration, select the name of the LEAP Proxy
RADIUS Server database you need to configure.
Note
Step 6
Click Configure.
In the following boxes, type the required information:
Step 7
User Guide for Cisco Secure ACS for Windows Server
11-56
Click Create New Configuration.
Type a name for the new configuration for the LEAP Proxy RADIUS Server
in the box provided, or accept the default name in the box.
Click Submit.
Result: Cisco Secure ACS lists the new configuration in the External User
Database Configuration table.
If only one LEAP Proxy RADIUS Server configuration exists, the name
of that configuration appears instead of the list. Proceed to Step 6.
Primary Server Name/IP—IP address of the primary proxy RADIUS server.
Secondary Server Name/IP—IP address of the secondary proxy RADIUS
server.
Shared Secret—The shared secret of the proxy RADIUS server. This must
be identical to the shared secret with which the proxy RADIUS server is
configured.
Authentication Port—The UDP port over which the proxy RADIUS server
conducts authentication sessions. If the LEAP Proxy RADIUS server is
installed on the same Windows server as Cisco Secure ACS, this port should
not be the same port used by Cisco Secure ACS for RADIUS authentication.
For more information about the ports used by Cisco Secure ACS for
RADIUS, see
RADIUS, page
Timeout (seconds):—The number of seconds Cisco Secure ACS waits
before sending notification to the user that the authentication attempt has
timed out.
Chapter 11
Working with User Databases
1-6.
78-14696-01, Version 3.1

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure acs

Table of Contents