EasyManuals Logo
Home>Cisco>Firewall>FirePOWER ASA 5500 series

Cisco FirePOWER ASA 5500 series User Manual

Cisco FirePOWER ASA 5500 series
989 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #935 background imageLoading...
Page #935 background image
E-25
Cisco Security Appliance Command Line Configuration Guide
OL-10088-01
Appendix E Configuring an External Server for Authorization and Authentication
Configuring an External RADIUS Server
• For other vendors’ RADIUS servers (for example, Microsoft Internet Authentication Service): you
must manually define each security appliance attribute. To define an attribute, use the attribute name
or number, type, value, and vendor code (3076). For a list of security appliance RADIUS
authorization attributes and values, see Table E-4.
Step 2 Set up the users or groups with the permissions and attributes to send during IPSec/WebVPN tunnel
establishment. The permissions or attributes might include access hours, primary DNS, banner, and so
forth.
Security Appliance RADIUS Authorization Attributes
Note Authorization refers to the process of enforcing permissions or attributes. A RADIUS server defined as
an authentication server enforces permissions or attributes if they are configured.
Table E-4 lists all the possible security appliance supported attributes that can be used for user
authorization.
Table E-4 Security Appliance Supported RADIUS Attributes and Values
Attribute Name
VPN
3000 ASA PIX
Attr.
#
Syntax/
Type
Single
or
Multi-
Valued
Single or Multi-
Valued
Access-Hours Y Y Y 1 String Single Name of the time range, e.g.,
Business-hours
Simultaneous-Logins Y Y Y 2 Integer Single An integer 0 to 2147483647
Primary-DNS Y Y Y 5 String Single An IP address
Secondary-DNS Y Y Y 6 String Single An IP address
Primary-WINS Y Y Y 7 String Single An IP address
Secondary-WINS Y Y Y 8 String Single An IP address
SEP-Card-Assignment 9 Integer Single Not used
Tunneling-Protocols Y Y Y 11 Integer Single 1 = PPTP
2 = L2TP
4 = IPSec
8 = L2TP/IPSec
16 = WebVPN
4 and 8 are mutually exclusive,
(0-11, 16-27 are legal values)
IPSec-Sec-Association Y 12 String Single Name of the security
association

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco FirePOWER ASA 5500 series and is the answer not in the manual?

Cisco FirePOWER ASA 5500 series Specifications

General IconGeneral
BrandCisco
ModelFirePOWER ASA 5500 series
CategoryFirewall
LanguageEnglish

Related product manuals