<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Restricting AAA by Realm in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/restricting-aaa-by-realm/m-p/471106#M428685</link>
    <description>&lt;P&gt;I have a multipurpose Radius server that already manages one Realm. I'd like to add another Realm for Administrators so that Administrators can use it for authentication on the routers. Currently, both Realms can authenticate on the router. How do I tell the router that it should only accept authentication requests from the Administrators Realm?&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 21:15:47 GMT</pubDate>
    <dc:creator>rob.lemaster</dc:creator>
    <dc:date>2019-03-10T21:15:47Z</dc:date>
    <item>
      <title>Restricting AAA by Realm</title>
      <link>https://community.cisco.com/t5/network-access-control/restricting-aaa-by-realm/m-p/471106#M428685</link>
      <description>&lt;P&gt;I have a multipurpose Radius server that already manages one Realm. I'd like to add another Realm for Administrators so that Administrators can use it for authentication on the routers. Currently, both Realms can authenticate on the router. How do I tell the router that it should only accept authentication requests from the Administrators Realm?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:15:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/restricting-aaa-by-realm/m-p/471106#M428685</guid>
      <dc:creator>rob.lemaster</dc:creator>
      <dc:date>2019-03-10T21:15:47Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting AAA by Realm</title>
      <link>https://community.cisco.com/t5/network-access-control/restricting-aaa-by-realm/m-p/471107#M428689</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The following document explains how to define a default Kerberos realm.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_chapter09186a00800ca7ad.html#1001415" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_chapter09186a00800ca7ad.html#1001415&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Aug 2005 17:56:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/restricting-aaa-by-realm/m-p/471107#M428689</guid>
      <dc:creator>owillins</dc:creator>
      <dc:date>2005-08-16T17:56:18Z</dc:date>
    </item>
  </channel>
</rss>

