Step 1 |
enable
|
Enables
privileged EXEC mode.
|
Step 2 |
cts credentials id
cts-id
password
cts-password
Device# cts credentials id CTS-One password cisco123
|
Specifies
the Cisco TrustSec ID and password of the network device.
|
Step 3 |
configure
terminal
Device# configure terminal
|
Enters
global configuration mode.
|
Step 4 |
aaa new-model
Device(config)# aaa new-model
|
Enables new
RADIUS and AAA access control commands and functions and disables old commands.
|
Step 5 |
aaa session-id
common
Device(config)# aaa session-id common
|
Ensures
that the same session identification (ID) information is used for each AAA
accounting service type within a given call.
|
Step 6 |
radius server
radius-server-name
Device(config)# radius server cts-aaa-server
|
Specifies
the name for the RADIUS server configuration for Protected Access Credential
(PAC) provisioning and enters RADIUS server configuration mode.
|
Step 7 |
address ipv4 {hostname |
ipv4address} [acct-port
port |
alias {hostname |
ipv4address} |
auth-port
port [acct-port
port]]
Device(config-radius-server)# address ipv4 192.0.2.1 auth-port 1812 acct-port 1813
|
Configures
the IPv4 address for the RADIUS server accounting and authentication
parameters.
|
Step 8 |
pac key
encryption-key
Device(config-radius-server)# pac key cisco123
|
Specifies
the PAC encryption key.
|
Step 9 |
exit
Device(config-radius-server)# exit
|
Exits
RADIUS server configuration mode and enters global configuration mode.
|
Step 10 |
radius-server vsa send
authentication
Device(config)# radius-server vsa send authentication
|
Configures
the network access server (NAS) to recognize and use only authentication
vendor-specific attributes (VSAs).
|
Step 11 |
aaa group server
radius
group-name
Device(config)# aaa group server radius cts_sg
|
Groups
different RADIUS server hosts into distinct lists and distinct methods and
enters RADIUS group server configuration mode.
|
Step 12 |
server name
radius-server-name
Device(config-sg-radius)# server name cts-aaa-server
|
Specifies a
RADIUS server.
|
Step 13 |
exit
Device(config-sg-radius)# exit
|
Exits
RADIUS group server configuration mode and enters global configuration mode.
|
Step 14 |
aaa authentication dot1x
default group
group-name
Device(config)# aaa authentication dot1x default group cts_sg
|
Specifies
the RADIUS server to use for authentication on interfaces running IEEE 802.1X.
|
Step 15 |
aaa authorization network
default
group
group-name
Device(config)# aaa authorization network default group cts_sg
|
Specifies
that the RADIUS server method is the default method for authorization into a
network.
|
Step 16 |
aaa authorization
network
list-name
group
group-name
Device(config)# aaa authorization network cts-mlist group cts_sg
|
Specifies
that the RADIUS server method is part of the list of authorization methods to
use for authorization into a network.
|
Step 17 |
cts authorization
list
list-name
Device(config)# cts authorization list cts-mlist
|
Specifies a
list of AAA servers for the Cisco TrustSec seed device.
|
Step 18 |
exit
|
Exits
global configuration mode and returns to privileged EXEC mode.
|