Cisco Systems Servers Server User Manual


 
Chapter 11 Working with User Databases
LEAP Proxy RADIUS Server Database
11-46
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
78-13751-01, Version 3.0
Step 4 If you are creating a configuration, follow these steps:
a. Click Create New Configuration.
b. Type a name for the new configuration for the LEAP Proxy RADIUS Server
in the box provided, or accept the default name in the box.
c. Click Submit.
Result: Cisco Secure ACS lists the new configuration in the External User
Database Configuration table.
Step 5 Under External User Database Configuration, select the name of the LDAP
database you need to configure.
Note If only one LEAP Proxy RADIUS Server configuration exists, the
name of that configuration appears instead of the list. Proceed to the
next step.
Step 6 Click Configure.
Step 7 In the following boxes, type the required information:
Primary Server Name/IPIP address of the primary proxy RADIUS
server.
Secondary Server Name/IPIP address of the secondary proxy RADIUS
server.
Shared SecretThe shared secret of the proxy RADIUS server. This must
be identical to the shared secret with which the proxy RADIUS server is
configured.
Authentication PortThe TCP port over which the proxy RADIUS server
conducts authentication sessions. If the LEAP Proxy RADIUS server is
installed on the same Windows NT/2000 server as Cisco Secure ACS, this
port should not be the same port used by Cisco Secure ACS for RADIUS
authentication. For more information about the ports used by
Cisco Secure ACS for RADIUS, see the RADIUS section on page 1-6.
Timeout (seconds):The number of seconds Cisco Secure ACS waits
before sending notification to the user that the authentication attempt has
timed out.