RADIUS Server Load Balancing
|
|
|
- Jane Jones
- 10 years ago
- Views:
Transcription
1 The feature distributes authentication, authorization, and accounting (AAA) authentication and accounting transactions across RADIUS servers in a server group These servers can share the AAA transaction load and thereby respond faster to incoming requests This module describes the feature Finding Feature Information, page 1 Prerequisites for, page 1 Restrictions for, page 2 Information About, page 2 How to Configure, page 4 Configuration Examples for, page 8 Additional References for, page 15 Feature Information for, page 16 Finding Feature Information Your software release may not support all the features documented in this module For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module Use Cisco Feature Navigator to find information about platform support and Cisco software image support To access Cisco Feature Navigator, go to wwwciscocom/go/cfn An account on Ciscocom is not required Prerequisites for Authentication, authorization, and accounting (AAA) must be configured on the RADIUS AAA RADIUS server groups must be configured RADIUS must be configured for functions such as authentication, accounting, or static route download 1
2 Restrictions for Restrictions for Incoming RADIUS requests, such as Packet of Disconnect (POD) requests, are not supported Load balancing is not supported on proxy RADIUS servers and for private server groups Information About Overview Load balancing distributes batches of transactions to RADIUS servers within a server group Load balancing assigns each batch of transactions to the server with the lowest number of outstanding transactions in its queue The process of assigning a batch of transactions is as follows: 1 The first transaction is received for a new batch 2 All server transaction queues are checked 3 The server with the lowest number of outstanding transactions is identified 4 The identified server is assigned the next batch of transactions The batch size is a user-configured parameter Changes in the batch size may impact CPU load and network throughput As batch size increases, CPU load decreases and network throughput increases However, if a large batch size is used, all available server resources may not be fully utilized As batch size decreases, CPU load increases and network throughput decreases Note There is no set number for large or small batch sizes A batch with more than 50 transactions is considered large and a batch with fewer than 25 transactions is considered small Note If a server group contains ten or more servers, we recommend that you set a high batch size to reduce CPU load Transaction Load Balancing Across RADIUS Server Groups You can configure load balancing either per-named RADIUS server group or for the global RADIUS server group The load balancing server group must be referred to as radius in the authentication, authorization, and accounting (AAA) method lists All public servers that are part of the RADIUS server group are then load balanced You can configure authentication and accounting to use the same RADIUS server or different servers In some cases, the same server can be used for preauthentication, authentication, or accounting transactions for a session The preferred server, which is an internal setting and is set as the default, informs AAA to use the same server for the start and stop record for a session regardless of the server cost When using the preferred 2
3 RADIUS Server Status and Automated Testing server setting, ensure that the server that is used for the initial transaction (for example, authentication), the preferred server, is part of any other server group that is used for a subsequent transaction (for example, accounting) The preferred server is not used if one of the following criteria is true: The load-balance method least-outstanding ignore-preferred-server command is used The preferred server is dead The preferred server is in quarantine The want server flag has been set, overriding the preferred server setting The want server flag, an internal setting, is used when the same server must be used for all stages of a multistage transaction regardless of the server cost If the want server is not available, the transaction fails You can use the load-balance method least-outstanding ignore-preferred-server command if you have either of the following configurations: Dedicated authentication server and a separate dedicated accounting server Network where you can track all call record statistics and call record details, including start and stop records and records that are stored on separate servers If you have a configuration where authentication servers are a superset of accounting servers, the preferred server is not used RADIUS Server Status and Automated Testing The feature considers the server status when assigning batches Transaction batches are sent only to live servers We recommend that you test the status of all RADIUS load-balanced servers, including low usage servers (for example, backup servers) Transactions are not sent to a server that is marked dead A server is marked dead until its timer expires, at which time it moves to quarantine state A server is in quarantine until it is verified alive by the RADIUS automated tester functionality To determine if a server is alive and available to process transactions, the RADIUS automated tester sends a request periodically to the server for a test user ID If the server returns an Access-Reject message, the server is alive; otherwise the server is either dead or quarantined A transaction sent to an unresponsive server is failed over to the next available server before the unresponsive server is marked dead We recommend that you use the retry reorder mode for failed transactions When using the RADIUS automated tester, verify that the authentication, authorization, and accounting (AAA) servers are responding to the test packets that are sent by the network access server (NAS) If the servers are not configured correctly, packets may be dropped and the server erroneously marked dead Caution We recommend that you use a test user that is not defined on the RADIUS server for the RADIUS server automated testing to protect against security issues that may arise if the test user is not correctly configured 3
4 How to Configure Note Use the test aaa group command to check load-balancing transactions How to Configure Enabling Load Balancing for a Named RADIUS Server Group SUMMARY STEPS 1 enable 2 configure terminal 3 radius-server host {hostname ip-address} [test username name] [auth-port number] [ignore-auth-port] [acct-port number] [ignore-acct-port] [idle-time seconds] 4 aaa group server radius group-name 5 load-balance method least-outstanding [batch-size number] [ignore-preferred-server] 6 end DETAILED STEPS Step 1 Step 2 Command or Action enable Device> enable configure terminal Purpose Enables privileged EXEC mode Enter your password if prompted Enters global configuration mode Device# configure terminal Step 3 radius-server host {hostname ip-address} [test username name] [auth-port number] [ignore-auth-port] [acct-port number] [ignore-acct-port] [idle-time seconds] Enables RADIUS automated testing Device(config)# radius-server host test username test1 idle-time 1 Step 4 aaa group server radius group-name Enters server group configuration mode Device(config)# aaa group server radius rad-sg 4
5 Enabling Load Balancing for a Global RADIUS Server Group Command or Action Purpose Step 5 load-balance method least-outstanding [batch-size number] [ignore-preferred-server] Enables the least-outstanding load balancing for a named server group Step 6 Device(config-sg)# load-balance method least-outstanding batch-size 30 end Device(config-sg)# end Exits server group configuration mode and enters privileged EXEC mode Enabling Load Balancing for a Global RADIUS Server Group The global RADIUS server group is referred to as radius in the authentication, authorization, and accounting (AAA) method lists SUMMARY STEPS 1 enable 2 configure terminal 3 radius-server host {hostname ip-address} [test username name] [auth-port number] [ignore-auth-port] [acct-port number] [ignore-acct-port] [idle-time seconds] 4 radius-server load-balance method least-outstanding [batch-size number] [ignore-preferred-server] 5 load-balance method least-outstanding [batch-size number] [ignore-preferred-server] 6 end DETAILED STEPS Step 1 Step 2 Command or Action enable Device> enable configure terminal Purpose Enables privileged EXEC mode Enter your password if prompted Enters global configuration mode Device# configure terminal 5
6 Troubleshooting Step 3 Command or Action radius-server host {hostname ip-address} [test username name] [auth-port number] [ignore-auth-port] [acct-port number] [ignore-acct-port] [idle-time seconds] Purpose Enables RADIUS automated testing Step 4 Step 5 Device(config)# radius-server host test username test1 idle-time 1 radius-server load-balance method least-outstanding [batch-size number] [ignore-preferred-server] Device(config)# radius-server load-balance method least-outstanding load-balance method least-outstanding [batch-size number] [ignore-preferred-server] Enables the least-outstanding load balancing for the global RADIUS server group and enters server group configuration mode The default batch size is 25 The batch size range is from 1 to Enables least-outstanding load balancing for a global named server group Step 6 Device(config-sg)# load-balance method least-outstanding batch-size 5 end Device(config-sg)# end Exits server group configuration mode and enters privileged EXEC mode Troubleshooting SUMMARY STEPS After configuring the feature, you can monitor the idle timer, dead timer, and load balancing server selection or verify the server status by using a manual test command 1 Use the debug aaa test command to determine when an idle timer or dead timer has expired, when test packets are sent, the status of the server, or to verify the server state 2 Use the debug aaa sg-server selection command to determine the server that is selected for load balancing 3 Use the test aaa group command to manually verify the RADIUS load-balanced server status DETAILED STEPS Step 1 Use the debug aaa test command to determine when an idle timer or dead timer has expired, when test packets are sent, the status of the server, or to verify the server state 6
7 Troubleshooting The idle timer is used to check the server status and is updated with or without any incoming requests Monitoring the idle timer helps to determine if there are nonresponsive servers and to keep the RADIUS server status updated to efficiently utilize available resources For instance, an updated idle timer would help ensure that incoming requests are sent to servers that are alive The dead timer is used either to determine that a server is dead or to update a dead server s status appropriately Monitoring server selection helps to determine how often the server selection changes Server selection is effective in analyzing if there are any bottlenecks, a large number of queued requests, or if only specific servers are processing incoming requests The following sample output from the debug aaa test command shows when the idle timer expired: Device# debug aaa test Jul 16 00:07:01: AAA/SG/TEST: Server ( :1700,1701) quarantined Jul 16 00:07:01: AAA/SG/TEST: Sending test request(s) to server ( :1700,1701) Jul 16 00:07:01: AAA/SG/TEST: Sending 1 Access-Requests, 1 Accounting-Requests in current batch Jul 16 00:07:01: AAA/SG/TEST(Req#: 1): Sending test AAA Access-Request Jul 16 00:07:01: AAA/SG/TEST(Req#: 1): Sending test AAA Accounting-Request Jul 16 00:07:01: AAA/SG/TEST: Obtained Test response from server ( :1700,1701) Jul 16 00:07:01: AAA/SG/TEST: Obtained Test response from server ( :1700,1701) Jul 16 00:07:01: AAA/SG/TEST: Necessary responses received from server ( :1700,1701) Jul 16 00:07:01: AAA/SG/TEST: Server ( :1700,1701) marked ALIVE Idle timer set for 60 sec(s) Jul 16 00:07:01: AAA/SG/TEST: Server ( :1700,1701) removed from quarantine Step 2 Use the debug aaa sg-server selection command to determine the server that is selected for load balancing The following sample output from the debug aaa sg-server selection command shows five access requests being sent to a server group with a batch size of three: Device# debug aaa sg-server selection Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Obtaining least loaded Jul 16 03:15:05: AAA/SG/SERVER_SELECT: [3] transactions remaining in batch Reusing Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Obtaining least loaded Jul 16 03:15:05: AAA/SG/SERVER_SELECT: [2] transactions remaining in batch Reusing Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Obtaining least loaded Jul 16 03:15:05: AAA/SG/SERVER_SELECT: [1] transactions remaining in batch Reusing Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Obtaining least loaded Jul 16 03:15:05: AAA/SG/SERVER_SELECT: No more transactions in batch Obtaining a new Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Obtaining a new least loaded Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Server[0] load: 3 Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Server[1] load: 0 Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Server[2] load: 0 Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Selected Server[1] with load 0 Jul 16 03:15:05: AAA/SG/SERVER_SELECT: [3] transactions remaining in batch Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Obtaining least loaded Jul 16 03:15:05: AAA/SG/SERVER_SELECT: [2] transactions remaining in batch Reusing Step 3 Use the test aaa group command to manually verify the RADIUS load-balanced server status The following sample output shows the response from a load-balanced RADIUS server that is alive when the username test does not match a user profile The server is verified alive when it issues an Access-Reject response to an authentication, authorization, and accounting (AAA) packet generated using the test aaa group command 7
8 Configuration Examples for Device# test aaa group SG1 test lab new-code 00:06:07: RADIUS/ENCODE( ):Orig component type = INVALID 00:06:07: RADIUS/ENCODE( ): dropping service type, "radius-server attribute 6 on-for-login-auth" is off 00:06:07: RADIUS( ): Config NAS IP: :06:07: RADIUS( ): sending 00:06:07: RADIUS/ENCODE: Best Local IP-Address for Radius-Server :06:07: RADIUS( ): Send Access-Request to :1645 id 1645/1, len 50 00:06:07: RADIUS: authenticator CA DB F4 9B 7B 66 C8 A9 - D1 99 4E 8E A B4 00:06:07: RADIUS: User-Password [2] 18 * 00:06:07: RADIUS: User-Name [1] 6 "test" 00:06:07: RADIUS: NAS-IP-Address [4] :06:07: RADIUS: Received from id 1645/ :1645, Access-Reject, len 44 00:06:07: RADIUS: authenticator 2F E F0 4E F AB B8 75 5B C3 00:06:07: RADIUS: Reply-Message [18] 24 00:06:07: RADIUS: E F 6E [Authentication f] 00:06:07: RADIUS: C [failure] 00:06:07: RADIUS( ): Received from id 1645/1 00:06:07: RADIUS/DECODE: Reply-Message fragments, 22, total 22 bytes Configuration Examples for Enabling Load Balancing for a Named RADIUS Server Group The following examples show load balancing enabled for a named RADIUS server group These examples are shown in three parts: the current configuration of the RADIUS command output, debug output, and authentication, authorization, and accounting (AAA) server status information The following sample output shows the relevant RADIUS configuration: Device# show running-config aaa group server radius server-group1 server auth-port 2095 acct-port 2096 server auth-port 2015 acct-port 2016 load-balance method least-outstanding batch-size 5! aaa authentication ppp default group server-group1 aaa accounting network default start-stop group server-group1 The lines in the current configuration of the preceding RADIUS command output are defined as follows: The aaa group server radius command shows the configuration of a server group with two member servers The load-balance command enables load balancing for global RADIUS server groups with the batch size specified The aaa authentication ppp command authenticates all PPP users using RADIUS 8
9 Enabling Load Balancing for a Named RADIUS Server Group The aaa accounting command enables sending of all accounting requests to the AAA server when the client is authenticated and then disconnected using the start-stop keyword The show debug sample output below shows the selection of the preferred server and the processing of requests for the preceding configuration: Device# show debug *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT( C):No preferred server available *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT:Obtaining least loaded *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT:No more transactions in batch Obtaining a new *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT:Obtaining a new least loaded *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT:Server[0] load:0 *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT:Server[1] load:0 *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT:Selected Server[0] with load 0 *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT:[5] transactions remaining in batch *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT( C):Server ( :2095,2096) now being *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT( D):No preferred server available *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT:Obtaining least loaded *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT:[4] transactions remaining in batch Reusing *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT( D):Server ( :2095,2096) now being *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT( E):No preferred server available *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT:Obtaining least loaded *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT:[3] transactions remaining in batch Reusing *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT( E):Server ( :2095,2096) now being *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT( F):No preferred server available *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT:Obtaining least loaded *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT:[2] transactions remaining in batch Reusing *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT( F):Server ( :2095,2096) now being *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT( ):No preferred server available *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT:Obtaining least loaded *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT:[1] transactions remaining in batch Reusing *Feb 28 13:51:16019:AAA/SG/SERVER_SELECT( ):Server ( :2095,2096) now being *Feb 28 13:51:16023:AAA/SG/SERVER_SELECT( ):No preferred server available *Feb 28 13:51:16023:AAA/SG/SERVER_SELECT:Obtaining least loaded *Feb 28 13:51:16023:AAA/SG/SERVER_SELECT:No more transactions in batch Obtaining a new *Feb 28 13:51:16023:AAA/SG/SERVER_SELECT:Obtaining a new least loaded *Feb 28 13:51:16023:AAA/SG/SERVER_SELECT:Server[1] load:0 *Feb 28 13:51:16023:AAA/SG/SERVER_SELECT:Server[0] load:5 *Feb 28 13:51:16023:AAA/SG/SERVER_SELECT:Selected Server[1] with load 0 *Feb 28 13:51:16023:AAA/SG/SERVER_SELECT:[5] transactions remaining in batch *Feb 28 13:51:16023:AAA/SG/SERVER_SELECT( ):Server ( :2015,2016) now being *Feb 28 13:51:16023:AAA/SG/SERVER_SELECT( ):No preferred server available *Feb 28 13:51:16023:AAA/SG/SERVER_SELECT:Obtaining least loaded *Feb 28 13:51:16023:AAA/SG/SERVER_SELECT:[4] transactions remaining in batch Reusing The following sample output from the show aaa servers command shows the AAA server status for the named RADIUS server group configuration: The sample output shows the status of two RADIUS servers Both servers are alive, and no requests have been processed since the counters were cleared 0 minutes ago Device# show aaa servers RADIUS:id 8, priority 1, host , auth-port 2095, acct-port
10 Enabling Load Balancing for a Global RADIUS Server Group State:current UP, duration 3781s, previous duration 0s Dead:total time 0s, count 0 Quarantined:No Authen:request 0, timeouts 0 Response:unexpected 0, server error 0, incorrect 0, time 0ms Transaction:success 0, failure 0 Author:request 0, timeouts 0 Response:unexpected 0, server error 0, incorrect 0, time 0ms Transaction:success 0, failure 0 Account:request 0, timeouts 0 Response:unexpected 0, server error 0, incorrect 0, time 0ms Transaction:success 0, failure 0 Elapsed time since counters last cleared:0m RADIUS:id 9, priority 2, host , auth-port 2015, acct-port 2016 State:current UP, duration 3781s, previous duration 0s Dead:total time 0s, count 0 Quarantined:No Authen:request 0, timeouts 0 Response:unexpected 0, server error 0, incorrect 0, time 0ms Transaction:success 0, failure 0 Author:request 0, timeouts 0 Response:unexpected 0, server error 0, incorrect 0, time 0ms Transaction:success 0, failure 0 Account:request 0, timeouts 0 Response:unexpected 0, server error 0, incorrect 0, time 0ms Transaction:success 0, failure 0 Elapsed time since counters last cleared:0m Enabling Load Balancing for a Global RADIUS Server Group The following examples show how to enable load balancing for global RADIUS server groups These examples are shown in three parts: the current configuration of the RADIUS command output, debug output, and authentication, authorization, and accounting (AAA) server status information You can use delimiting characters to display relevant parts of the configuration The following example shows the relevant RADIUS configuration: Device# show running-config include radius aaa authentication ppp default group radius aaa accounting network default start-stop group radius radius-server host auth-port 2095 acct-port 2096 key cisco radius-server host auth-port 2015 acct-port 2016 key cisco radius-server load-balance method least-outstanding batch-size 5 Lines in the current configuration of the preceding RADIUS command output are defined as follows: The aaa authentication ppp command authenticates all PPP users using RADIUS The aaa accounting command enables the sending of all accounting requests to an AAA server when the client is authenticated and then disconnected through use of the start-stop keyword The radius-server host command defines the IP address of the RADIUS server host with the authorization and accounting ports specified and the authentication and encryption keys identified The radius-server load-balance command enables load balancing for global RADIUS server groups with the batch size specified The show debug sample output below shows the selection of the preferred server and the processing of requests for the configuration: Device# show debug General OS: AAA server group server selection debugging is on # 10
11 Enabling Load Balancing for a Global RADIUS Server Group <sending 10 pppoe requests> Device# *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT( ):No preferred server available *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:Obtaining least loaded *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:No more transactions in batch Obtaining a new *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:Obtaining a new least loaded *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:Server[0] load:0 *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:Server[1] load:0 *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:Selected Server[0] with load 0 *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:[5] transactions remaining in batch *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT( ):Server ( :2095,2096) now being *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT( ):No preferred server available *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:Obtaining least loaded *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:[4] transactions remaining in batch Reusing *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT( ):Server ( :2095,2096) now being *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT( ):No preferred server available *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:Obtaining least loaded *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:[3] transactions remaining in batch Reusing *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT( ):Server ( :2095,2096) now being *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT( ):No preferred server available *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:Obtaining least loaded *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:[2] transactions remaining in batch Reusing *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT( ):Server ( :2095,2096) now being *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT( ):No preferred server available *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:Obtaining least loaded *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:[1] transactions remaining in batch Reusing *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT( ):Server ( :2095,2096) now being *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT( ):No preferred server available *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:Obtaining least loaded *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:No more transactions in batch Obtaining a new *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:Obtaining a new least loaded *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:Server[1] load:0 *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:Server[0] load:5 *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:Selected Server[1] with load 0 *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT:[5] transactions remaining in batch *Feb 28 13:40:32199:AAA/SG/SERVER_SELECT( ):Server ( :2015,2016) now being used as preferred The following sample output from the show aaa servers command shows the AAA server status for the global RADIUS server group configuration: The sample output shows the status of two RADIUS servers Both servers are up and successfully processed in the last 2 minutes: Five out of six authentication requests Five out of five accounting requests Device# show aaa servers RADIUS:id 4, priority 1, host , auth-port 2095, acct-port 2096 State:current UP, duration 3175s, previous duration 0s Dead:total time 0s, count 0 Quarantined:No Authen:request 6, timeouts 1 Response:unexpected 1, server error 0, incorrect 0, time 1841ms Transaction:success 5, failure 0 Author:request 0, timeouts 0 Response:unexpected 0, server error 0, incorrect 0, time 0ms Transaction:success 0, failure 0 11
12 Monitoring Idle Timer Account:request 5, timeouts 0 Response:unexpected 0, server error 0, incorrect 0, time 3303ms Transaction:success 5, failure 0 Elapsed time since counters last cleared:2m RADIUS:id 5, priority 2, host , auth-port 2015, acct-port 2016 State:current UP, duration 3175s, previous duration 0s Dead:total time 0s, count 0 Quarantined:No Authen:request 6, timeouts 1 Response:unexpected 1, server error 0, incorrect 0, time 1955ms Transaction:success 5, failure 0 Author:request 0, timeouts 0 Response:unexpected 0, server error 0, incorrect 0, time 0ms Transaction:success 0, failure 0 Account:request 5, timeouts 0 Response:unexpected 0, server error 0, incorrect 0, time 3247ms Transaction:success 5, failure 0 Elapsed time since counters last cleared:2m Monitoring Idle Timer The following example shows idle timer and related server state for load balancing enabled for a named RADIUS server group The current configuration of the RADIUS command output and debug command output are also displayed The following sample output shows the relevant RADIUS configuration: Device# show running-config include radius aaa group server radius server-group1 radius-server host auth-port 2095 acct-port 2096 test username junk1 idle-time 1 key cisco radius-server host auth-port 2015 acct-port 2016 test username junk1 idle-time 1 key cisco radius-server load-balance method least-outstanding batch-size 5 The lines in the current configuration of the preceding RADIUS command output are defined as follows: The aaa group server radius command shows the configuration of a server group The radius-server host command defines the IP address of the RADIUS server host with authorization and accounting ports specified and the authentication and encryption key identified The radius-server load-balance command enables load balancing for the RADIUS server with the batch size specified The show debug sample output below shows test requests being sent to servers The response to the test request sent to the server is received, the server is removed from quarantine as appropriate, the server is marked alive, and then the idle timer is reset Device# show debug *Feb 28 13:52:20835:AAA/SG/TEST:Server ( :2015,2016) quarantined *Feb 28 13:52:20835:AAA/SG/TEST:Sending test request(s) to server ( :2015,2016) *Feb 28 13:52:20835:AAA/SG/TEST:Sending 1 Access-Requests, 1 Accounting-Requests in current batch *Feb 28 13:52:20835:AAA/SG/TEST(Req#:1):Sending test AAA Access-Request *Feb 28 13:52:20835:AAA/SG/TEST(Req#:1):Sending test AAA Accounting-Request *Feb 28 13:52:21087:AAA/SG/TEST:Obtained Test response from server ( :2015,2016) *Feb 28 13:52:22651:AAA/SG/TEST:Obtained Test response from server ( :2015,2016) *Feb 28 13:52:22651:AAA/SG/TEST:Necessary responses received from server ( :2015,2016) *Feb 28 13:52:22651:AAA/SG/TEST:Server ( :2015,2016) marked ALIVE Idle timer set for 60 secs(s) *Feb 28 13:52:22651:AAA/SG/TEST:Server ( :2015,2016) removed from quarantine 12
13 Configuring the Preferred Server with the Same Authentication and Authorization Server Configuring the Preferred Server with the Same Authentication and Authorization Server The following example shows an authentication server group and an authorization server group that use the same servers and Both server groups have the preferred server flag enabled aaa group server radius authentication-group server key radkey1 server key radkey2 aaa group server radius accounting-group server key radkey1 server key radkey2 When a preferred server is selected for a session, all transactions for that session will continue to use the original preferred The servers and are load balanced based on sessions rather than transactions Configuring the Preferred Server with Different Authentication and Authorization Servers The following example shows an authentication server group that uses servers and and an authorization server group that uses servers and Both server groups have the preferred server flag enabled aaa group server radius authentication-group server key radkey1 server key radkey2 aaa group server radius accounting-group server key radkey3 server key radkey4 The authentication server group and the accounting server group do not share any common servers A preferred server is never found for accounting transactions; therefore, authentication and accounting servers are load-balanced based on transactions Start and stop records are sent to the same server for a session Configuring the Preferred Server with Overlapping Authentication and Authorization Servers The following example shows an authentication server group that uses servers , , and and an accounting server group that uses servers and Both server groups have the preferred server flag enabled aaa group server radius authentication-group server key radkey1 server key radkey2 server key radkey3 aaa group server radius accounting-group server key radkey3 server key radkey4 If all servers have equal transaction processing capability, one-third of all authentication transactions are directed toward the server Therefore, one-third of all accounting transactions are also directed toward the server The remaining two-third of accounting transactions are load balanced equally 13
14 Configuring the Preferred Server with Authentication Servers As a Subset of Authorization Servers between servers and The server receives fewer authentication transactions because the server has outstanding accounting transactions Configuring the Preferred Server with Authentication Servers As a Subset of Authorization Servers The following example shows an authentication server group that uses servers and and an authorization server group that uses servers , , and Both server groups have the preferred server flag enabled aaa group server radius authentication-group server key radkey1 server key radkey2 aaa group server radius accounting-group server key radkey1 server key radkey2 server key radkey3 One-half of all authentication transactions are sent to the server and the other half to the server Servers and are preferred servers for authentication and accounting transaction Therefore, there is an equal distribution of authentication and accounting transactions across servers and The server is relatively unused Configuring the Preferred Server with Authentication Servers As a Superset of Authorization Servers The following example shows an authentication server group that uses servers , , and and an authorization server group that uses servers and Both server groups have the preferred server flag enabled aaa group server radius authentication-group server key radkey1 server key radkey2 server key radkey3 aaa group server radius accounting-group server key radkey1 server key radkey2 Initially, one-third of authentication transactions are assigned to each server in the authorization server group As accounting transactions are generated for more sessions, accounting transactions are sent to servers and because the preferred server flag is on As servers and begin to process more transactions, authentication transactions will start to be sent to server Transaction requests authenticated by server do not have any preferred server setting and are split between servers and , which negates the use of the preferred server flag This configuration should be used cautiously 14
15 Additional References for Additional References for Related Documents Related Topic Cisco IOS commands Security commands Document Title Cisco IOS Master Command List, All Releases Security Command Reference: Commands A to C Security Command Reference: Commands D to L Security Command Reference: Commands M to R Security Command Reference: Commands S to Z AAA and RADIUS AAA server groups and RADIUS configuration Failover retry reorder mode Authentication, Authorization, and Accounting Configuration Guide Configuring RADIUS module in the RADIUS Configuration Guide RADIUS Server Reorder on Failure module in the RADIUS Configuration Guide Technical Assistance Description The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds Access to most tools on the Cisco Support website requires a Ciscocom user ID and password Link 15
16 Feature Information for Feature Information for The following table provides release information about the feature or features described in this module This table lists only the software release that introduced support for a given feature in a given software release train Unless noted otherwise, subsequent releases of that software release train also support that feature Use Cisco Feature Navigator to find information about platform support and Cisco software image support To access Cisco Feature Navigator, go to wwwciscocom/go/cfn An account on Ciscocom is not required Table 1: Feature Information for Feature Name Releases Cisco IOS XE 32SE Cisco IOS XE 33SE Cisco IOS XE 35E Feature Information The RADIUS Server Load Balancing feature distributes authentication, authorization, and accounting (AAA) authentication and accounting transactions across servers in a server group These servers can share the AAA transaction load and thereby respond faster to incoming requests In Cisco IOS XE Release 32SE, this feature was supported on the following platforms: Catalyst 3850 Series Switches Cisco 5760 Wireless LAN Controller In Cisco IOS XE Release 33SE, this feature was supported on the following platforms: Catalyst 3650 Series Switches The following commands were introduced or modified: debug aaa sg-server selection, debug aaa test, load-balance (server-group), radius-server host, radius-server load-balance, and test aaa group 16
RADIUS Server Load Balancing
First Published: March 20, 2006 Last Updated: September 22, 2009 The feature distributes authentication, authorization, and accounting (AAA) authentication and accounting transactions across servers in
Supported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access
Configuring Timeout, Retransmission, and Key Values per RADIUS Server The Configuring Timeout, Retransmission, and Key Values per RADIUS Server feature extends the functionality of the existing radius-server
Flow-Based per Port-Channel Load Balancing
The feature allows different flows of traffic over a Gigabit EtherChannel (GEC) interface to be identified based on the packet header and then mapped to the different member links of the port channel.
Configuring Timeout, Retransmission, and Key Values Per RADIUS Server
Configuring Timeout, Retransmission, and Key Values Per RADIUS Server Feature Summary The radius-server host command functions have been extended to include timeout, retransmission, and encryption key
Firewall Authentication Proxy for FTP and Telnet Sessions
Firewall Authentication Proxy for FTP and Telnet Sessions First Published: May 14, 2003 Last Updated: August 10, 2010 Before the introduction of the Firewall Authentication Proxy for FTP and Telnet Sessions
Call Flows for Simple IP Users
This chapter provides various call flows for simple IP users. Finding Feature Information, page 1 Simple IP Unclassified MAC Authentication (MAC TAL and Web Login) Call Flows, page 1 Finding Feature Information
Configuring DNS. Finding Feature Information
The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname.
Configuring Aggressive Load Balancing
Finding Feature Information, page 1 Restrictions for Aggressive Load Balancing, page 1 Information for Parameters, page 2 How to Configure Aggressive Load Balancing, page 3 Monitoring Aggressive Load Balancing,
RADIUS Authentication and Accounting
5 RADIUS Authentication and Accounting Contents Overview...................................................... 5-2 Terminology................................................... 5-3 Switch Operating Rules
Transferring Files Using HTTP or HTTPS
Transferring Files Using HTTP or HTTPS First Published: May 5, 2005 Last Updated: May 14, 2009 Cisco IOS Release 12.4 provides the ability to transfer files between your Cisco IOS software-based device
Configuring RADIUS Servers
CHAPTER 13 This chapter describes how to enable and configure the Remote Authentication Dial-In User Service (RADIUS), that provides detailed accounting information and flexible administrative control
Image Verification. Finding Feature Information. Restrictions for Image Verification
The feature allows users to automatically verify the integrity of Cisco IOS images. Thus, users can be sure that the image is protected from accidental corruption, which can occur at any time during transit,
You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource
The feature enables the configuration of a Virtual Private Network (VPN) routing and forwarding instance (VRF) table so that the domain name system (DNS) can forward queries to name servers using the VRF
Configuring Aggressive Load Balancing
Finding Feature Information, page 1 Restrictions for Aggressive Load Balancing, page 1 Information for Parameters, page 2 How to Configure Aggressive Load Balancing, page 3 Monitoring Aggressive Load Balancing,
Configuring CSS Remote Access Methods
CHAPTER 11 Configuring CSS Remote Access Methods This chapter describes how to configure the Secure Shell Daemon (SSH), Remote Authentication Dial-In User Service (RADIUS), and the Terminal Access Controller
Configuring Secure Socket Layer HTTP
Finding Feature Information, page 1 Prerequisites for Configuring the Switch for Secure Sockets Layer HTTP, page 1 Restrictions for Configuring the Switch for Secure Sockets Layer HTTP, page 2 Information
Configuring IKEv2 Load Balancer
The IKEv2 Load Balancer feature provides support for enabling clusters of FlexVPN gateways and distributes incoming Internet Key Exchange Version 2 (IKEv2) connection requests among FlexVPN gateways. This
DHCP Server Port-Based Address Allocation
The feature provides port-based address allocation support on the Cisco IOS Dynamic Host Configuration Protocol (DHCP) server for the Ethernet platform. The DHCP server provides address assignment support
GLBP - Gateway Load Balancing Protocol
GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
VRRPv3: Object Tracking Integration
Virtual Router Redundancy Protocol (VRRP) enables a group of devices to form a single virtual device to provide redundancy. The LAN clients then can be configured with the virtual device as the default
Configuring Auto-MDIX
Prerequisites for Auto-MDIX, page 1 Restrictions for Auto-MDIX, page 1 Information about, page 1 How to Configure Auto-MDIX, page 2 Example for, page 3 Additional References, page 4 Feature History and
HTTP 1.1 Web Server and Client
HTTP 1.1 Web Server and Client Finding Feature Information HTTP 1.1 Web Server and Client Last Updated: August 17, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users
BGP Link Bandwidth. Finding Feature Information. Prerequisites for BGP Link Bandwidth
The Border Gateway Protocol (BGP) Link Bandwidth feature is used to advertise the bandwidth of an autonomous system exit link as an extended community. This feature is configured for links between directly
Encrypted Preshared Key
The feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Release Modification 12.3(2)T This feature was introduced. Finding Support Information
Configuring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
SNMP Version 3. Finding Feature Information. Information About SNMP Version 3. Security Features in SNMP Version 3
The feature provides secure access to devices by authenticating and encrypting data packets over the network. Simple Network Management Protocol version 3 (SNMPv3) is an interoperable, standards-based
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
Router Recovery with ROM Monitor
CHAPTER 2 This chapter describes the router recovery methods in ROM Monitor mode (ROMMON) of the router. This chapter contains the following sections: Overview, page 2-19 About ROMMON Installation Files,
Using Link Layer Discovery Protocol in Multivendor Networks
Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates
Configuring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Finding Feature Information Configuring a Load-Balancing Scheme Last Updated: August 15, 2011 This module contains information about Cisco Express Forwarding and describes
Configuring Enhanced Object Tracking
Configuring Enhanced Object Tracking First Published: May 2, 2005 Last Updated: July 1, 2009 Before the introduction of the Enhanced Object Tracking feature, the Hot Standby Router Protocol (HSRP) had
Configuring Right-To-Use Licenses
Finding Feature Information, page 1 Restrictions for Configuring RTU Licenses, page 1 Information About Configuring RTU Licenses, page 2 How to Configure RTU Licenses, page 5 Monitoring and Maintaining
Virtual Fragmentation Reassembly
Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
Configuring Auto-QoS
Finding Feature Information, page 1 Prerequisites for Auto-QoS, page 1 Restrictions for Auto-QoS, page 2 Information About, page 3 How to Configure Auto-QoS, page 5 Monitoring Auto-QoS, page 9 Configuration
Configuring a Load-Balancing Scheme
This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco Express Forwarding traffic. Load-balancing allows you to optimize
How To Install Cisco Asr 9000 Series Router Software On A Mini Mini Mini (Cisco Ios) Router
This chapter describes the router recovery methods in ROM Monitor (ROMMON) mode of the router. Table 1: Feature History for Router Recovery with the ROM Monitor Release Modification Release 4.2.0 A new
Encrypted Preshared Key
Encrypted Preshared Key The Encrypted Preshared Key feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Encrypted Preshared Key Release
Configuring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Last Updated: October 5, 2011 This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco
Backing Up and Restoring Data
Backing Up and Restoring Data Cisco Unity Express backup and restore functions use an FTP server to store and retrieve data. The backup function copies the files from the Cisco Unity Express application
IOS Server Load Balancing
IOS Server Load Balancing This feature module describes the Cisco IOS Server Load Balancing (SLB) feature. It includes the following sections: Feature Overview, page 1 Supported Platforms, page 5 Supported
Network Security and AAA
ICT Technical Update Module Network Security and AAA Prof. Dr Harsha Sirisena Electrical and Computer Engineering University of Canterbury AAA Introduction Overview A network administrator may allow remote
Connecting to the Firewall Services Module and Managing the Configuration
CHAPTER 3 Connecting to the Firewall Services Module and This chapter describes how to access the command-line interface and work with the configuration. This chapter includes the following sections: Connecting
Troubleshooting the Firewall Services Module
25 CHAPTER This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
Easy Performance Monitor
The chapter describes how to configure (ezpm) for Application Visibility and Control (AVC). Finding Feature Information, page 1 Information About, page 1 How to Configure, page 3 Configuration Examples
Easy Performance Monitor
First Published: July 30, 2013 The chapter describes how to configure (ezpm) for Application Visibility and Control (AVC). Finding Feature Information Your software release may not support all the features
Easy Performance Monitor
The chapter describes how to configure (ezpm) for Application Visibility and Control (AVC). Finding Feature Information, page 1 Information About, page 2 How to Configure, page 4 Verifying Configuration,
IOS Server Load Balancing
IOS Server Load Balancing This feature module describes the Cisco IOS Server Load Balancing (SLB) feature. It includes the following sections: Feature Overview, page 1 Supported Platforms, page 5 Supported
Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example
Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example Document ID: 45843 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Passwords
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
Configuring VoIP Call Setup Monitoring
The Cisco IOS IP Service Level Agreements (SLAs) VoIP Call Setup (Post-Dial Delay) Monitoring feature provides the ability to measure your network s response time for setting up a Voice over IP (VoIP)
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S This feature was introduced This document describes the Enhanced Password Security feature in It includes the following sections: Feature Overview,
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
Switch Configuration Required to Support Cisco ISE Functions
APPENDIXC Switch Configuration Required to Support Cisco ISE Functions To ensure Cisco ISE is able to interoperate with network switches and functions from Cisco ISE are successful across the network segment,
Ethernet Overhead Accounting
The feature enables the router to account for downstream Ethernet frame headers when applying shaping to packets. Finding Feature Information, page 1 Restrictions for, page 1 Information About, page 2
Firewall Support for SIP
Firewall Support for SIP The Firewall Support for SIP feature integrates Cisco IOS firewalls, Voice over IP (VoIP) protocol, and Session Initiation Protocol (SIP) within a Cisco IOS-based platform, enabling
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S 121(8a)E 122(14)S This feature was introduced Support for this feature was integrated into Cisco IOS Release 121(8a)E This feature was integrated
Deploying an SESM/SSG Solution
12 CHAPTER This section describes the attributes that control communication between components in an SESM deployment. In many cases, attributes with matching values must be set on both sides of the communication
Configuring Password Encryption
This chapter describes how to configure password encryption on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About Password Encryption,
Configuring SIP Registration Proxy on Cisco UBE
The Support for SIP Registration Proxy on Cisco UBE feature provides support for sending outbound registrations from Cisco Unified Border Element (UBE) based on incoming registrations. This feature enables
How To Set Up An Ipa 1X For Aaa On A Ipa 2.1X On A Network With Aaa (Ipa) On A Computer Or Ipa (Ipo) On An Ipo 2.0.1
Implementation of IEEE 802.1X in wired networks Best Practice Document Produced by UNINETT led working group on security (UFS 133) Authors: Øystein Gyland, Tom Myren, Rune Sydskjør, Gunnar Bøe March 2013
Configuring Logging. Information About Logging CHAPTER
52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page
CCNA Security. Chapter Three Authentication, Authorization, and Accounting. 2009 Cisco Learning Institute.
CCNA Security Chapter Three Authentication, Authorization, and Accounting 1 AAA Access Security Authentication Who are you? Authorization which resources the user is allowed to access and which operations
Configuring System Message Logging
CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records
Firewall Stateful Inspection of ICMP
The feature categorizes Internet Control Management Protocol Version 4 (ICMPv4) messages as either malicious or benign. The firewall uses stateful inspection to trust benign ICMPv4 messages that are generated
Using Debug Commands
CHAPTER 1 Using Debug Commands This chapter explains how you use debug commands to diagnose and resolve internetworking problems. Specifically, it covers the following topics: Entering debug commands Using
Configuring System Message Logging
CHAPTER 25 This chapter describes how to configure system message logging on the Catalyst 2960 switch. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco
Configuring the Cisco Secure PIX Firewall with a Single Intern
Configuring the Cisco Secure PIX Firewall with a Single Intern Table of Contents Configuring the Cisco Secure PIX Firewall with a Single Internal Network...1 Interactive: This document offers customized
IPSLA Y1731 On-Demand and Concurrent Operations
IPSLA Y1731 On-Demand and Concurrent Operations This module describes how to configure the IPSLA Y1731 SLM Feature Enhancements feature for enabling real-time Ethernet service troubleshooting for users
Cisco IOS Flexible NetFlow Command Reference
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION
Table of Contents. Cisco Configuring the PPPoE Client on a Cisco Secure PIX Firewall
Table of Contents Configuring the PPPoE Client on a Cisco Secure PIX Firewall...1 Document ID: 22855...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...2 Configure...2
Network Security 2. Module 6 Configure Remote Access VPN
1 1 Network Security 2 Module 6 Configure Remote Access VPN 2 Learning Objectives 6.1 Introduction to Cisco Easy VPN 6.2 Configure the Easy VPN Server 6.3 Configure Easy VPN Remote for the Cisco VPN Client
How To Configure A Bomgar.Com To Authenticate To A Rdius Server For Multi Factor Authentication
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Troubleshooting the Firewall Services Module
CHAPTER 25 This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
End of Sale/End of Life Report Tool Usage Notes for CiscoWorks NCM 1.6
End of Sale/End of Life Report Tool Usage Notes for CiscoWorks NCM 1.6 October 2010, These usage notes provide information on using the End of Sale/End of Life Report tool that is available with CiscoWorks
Lab 11.5.6.1 Configure Syslog on AP
Lab 11.5.6.1 Configure Syslog on AP Estimated Time: 25 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, students will configure and use syslog logging to monitor
QoS: Color-Aware Policer
QoS: Color-Aware Policer First Published: August 26, 2003 Last Updated: February 28, 2006 The QoS: Color-Aware Policer enables a color-aware method of traffic policing. This feature allows you to police
Supporting Document LNS Configuration
Supporting Document LNS Configuration Swisscom (Schweiz) AG Version 1-0 15.112010 Inhalt 1 General... 3 1.1 Appendix A: Load Balancing between POPs... 3 1.2 Appendix B: Examples of LNS and BGP Configurations...
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices Secure Access How-to User Series Author: Technical Marketing, Policy and Access, Security Business Group, Cisco Systems Date: January
Configure ISDN Backup and VPN Connection
Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
Enabling Remote Access to the ACE
CHAPTER 2 This chapter describes how to configure remote access to the Cisco Application Control Engine (ACE) module by establishing a remote connection by using the Secure Shell (SSH) or Telnet protocols.
Configuring Access Service Security
CHAPTER 3 Configuring Access Service Security The access service security paradigm presented in this guide uses the authentication, authorization, and accounting (AAA) facility. Authentication requires
Firewall Load Balancing
CHAPTER 6 This chapter describes the (FWLB) feature. It includes the following sections: FWLB Overview, page 6-1 FWLB Features, page 6-2 FWLB Configuration Tasks, page 6-3 Monitoring and Maintaining FWLB,
Table of Contents. Cisco Cisco VPN Client FAQ
Table of Contents Cisco VPN Client FAQ...1 Questions...1 Introduction...2 Q. Why does the VPN Client disconnect after 30 minutes? Can I extend this time period?...2 Q. I upgraded to Mac OS X 10.3 (known
L2TP Dial-Out Load Balancing and Redundancy
L2TP Dial-Out Load Balancing and Redundancy The L2TP Dial-Out Load Balancing and Redundancy feature enables an L2TP network server (LNS) to dial out to multiple L2TP access concentrators (LACs) When the
Firewall Stateful Inspection of ICMP
The feature addresses the limitation of qualifying Internet Control Management Protocol (ICMP) messages into either a malicious or benign category by allowing the Cisco IOS firewall to use stateful inspection
MPLS VPN Route Target Rewrite
The feature allows the replacement of route targets on incoming and outgoing Border Gateway Protocol (BGP) updates Typically, Autonomous System Border Routers (ASBRs) perform the replacement of route targets
Configuring the Device for Access Point Discovery
Configuring the Device for Access Point Discovery Finding Feature Information, page 1 Prerequisites for Configuring the Device for Access Point Discovery, page 1 Restrictions for Configuring the Device
Configuring LLDP, LLDP-MED, and Location Service
27 CHAPTER Configuring LLDP, LLDP-MED, and Location Service This chapter describes how to configure the Link Layer Discovery Protocol (LLDP), LLDP Media Endpoint Discovery (LLDP-MED), and Location Service
Latest IT Exam Questions & Answers
DumpKiller Latest IT Exam Questions & Answers http://www.dumpkiller.com No help, Full refund! Exam : 210-260 Title : Implementing Cisco Network Security Vendor : Cisco Version : DEMO 1 NO.1 Which address
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
Configuring Modem Transport Support for VoIP
Configuring Modem Transport Support for VoIP This chapter explains how to configure modem transport support for Voice over IP (VoIP) and contains the following sections: Modem Transport Support Overview,
How to Connect to Anonyproz OpenVPN Servers in Failover and Switcher Modes
How to Connect to Anonyproz OpenVPN Servers in Failover and Switcher Modes Anonyproz provides a powerful and feature-packed customized open source OpenVPN GUI client. The latest GUI offers our subscribers
P and FTP Proxy caching Using a Cisco Cache Engine 550 an
P and FTP Proxy caching Using a Cisco Cache Engine 550 an Table of Contents HTTP and FTP Proxy caching Using a Cisco Cache Engine 550 and a PIX Firewall...1 Introduction...1 Before You Begin...1 Conventions...1
Module 6 Configure Remote Access VPN
Network Security 2 Module 6 Configure Remote Access VPN Learning Objectives 6.1 Introduction to Cisco Easy VPN 6.2 Configure the Easy VPN Server 6.3 Configure Easy VPN Remote for the Cisco VPN Client 4.x
Security Provider Integration RADIUS Server
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
7750 SR OS System Management Guide
7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012
