

Note: If the “radius server” command is not supported you need to use legacy commands: radius-server host 192.168.245.123 key c1sc0ziN3Īfter that, it is possible define the method lists: aaa authentication login VTY_authen group radius-ise-group localĪaa authorization exec VTY_author group radius-ise-group local Remember: The radius group can contain more than one server for redundancy/load balancing. Radius server configuration on Cisco IOS is performed in few steps:ĭefine the Radius server and the key server radius server radius-iseĭefine a Radius server group aaa group server radius radius-ise-group If the username is found and the password is correct, the RADIUS server returns an Access-Accept response, including a list of attribute-value pairs that describe the parameters to be used for this session. Remember: In Radius, authentication and authorization are coupled together.

These attributes are compared to the information contained in a database for a given user and the result is returned to AAA to determine the user‘s actual capabilities and restrictions.Īccounting enables you to track the services users are accessing as well as the amount of network resources they are consuming.Ī typical AAA server is Radius (Remote Authentication Dial-In User Service): it is an open protocol, distributed client/server system that provides Authentication, Authorization and Accounting ( AAA) management.


Suppose you manage hundreds of Cisco devices how can you connect and secure it against unauthorized access? You can use local username, but it isn’t scalable and granular, or use an AAA Server.
