cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1294
Views
0
Helpful
2
Replies

Can ACS 5.2 be used as VMPS?

leninstcs
Level 1
Level 1

I have ACS 1131 with 5.2 version software.

Can this be configured as a VLAN Membership Policy Server for dynamic vlan assignment in the switches.

If possible, Can anybody provide me the configuration steps or ideas.

Thanks & Regards,

Lenin S

9620745656

2 Replies 2

Jatin Katyal
Cisco Employee
Cisco Employee

Yes, this is possible with ACS 5.2

The attributes are still same.

The RADIUS user attributes used for the VLAN ID assignment are:

  • IETF 64 (Tunnel Type)—Set this to VLAN.

  • IETF 65 (Tunnel Medium Type)—Set this to 802

  • IETF 81 (Tunnel Private Group ID)—Set this to VLAN ID.

You may take a look at the screen shot to configure it on ACS 5.2

https://supportforums.cisco.com/servlet/JiveServlet/download/3211910-74181/DynVLANAssign.jpg

Once you are done with the policy element section then jump to access-policies and configure authorization profile.

Configuration example

http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a008076317c.shtml

Hope it helps.

Regards,

Jatin

Do rate help full posts-

~Jatin

Hi,

Thanks a lot for the reply. I still didn't check this. I will update it soon.

Also I require another information.

I want to authorize show config command for level 4 user. Can this be done ing ACS 5.2 or we need to authorize on all the devices only.

switch configuration is

aaa new-model

aaa authentication login default group tacacs+ local

aaa authentication enable default group tacacs+ enable

aaa authorization config-commands

aaa authorization exec default group tacacs+ local

aaa authorization commands 0 default group tacacs+ local

aaa authorization commands 4 default group tacacs+ local

aaa authorization commands 15 default group tacacs+ local

aaa authorization network default group tacacs+ local

aaa accounting exec default start-stop group tacacs+

aaa accounting network default start-stop group tacacs+

ACS config

Policy Elements > Authorization and Permissions > Device Administration > Command Sets.

I configured command set   with

grand - permit

command - show

attribute - config

but its not working,

please help me on this.