02-18-2014 12:44 PM - edited 03-01-2019 02:45 PM
Hello All.
I started using asr 1002-x with IOS XE instead of 7201 as ISG + AAA + RADIUS.
I had a question on IOS XE 3.11, 3.10, 3.9.
Command "radius-server vsa send ..." is in a configuration, however it isn't applied and doesn't appear in running-config.
cod-r8(config)#radius-server vsa send?
accounting Send in accounting requests
authentication Send in access requests
cisco-nas-port Send cisco-nas-port VSA (2)
<cr>
cod-r8(config)#radius-server vsa send accounting
cod-r8(config)#radius-server vsa send authentication
cod-r8(config)#radius-server vsa send cisco-nas-port
cod-r8(config)#do sh run | include vsa
radius-server vsa send cisco-nas-port</cr>
It turns out that vsa is included by default or doesn't work at all?
Thanks.
_________
Konstantin
Solved! Go to Solution.
02-19-2014 01:37 AM
Hi Konstantin,
I believe those commands are enable by default and that's why theey are not dispayed when doing 'show run'. I checked on one device running 3.10.1 and, when using 'show run all', I can see the commands:
bsns-asr1002x-1#sh run | in vsa
radius-server vsa send cisco-nas-port
bsns-asr1002x-1#sh run all | in vsa
radius-server vsa send cisco-nas-port
radius-server vsa send accounting
radius-server vsa send authentication
bsns-asr1002x-1#
Regards.
02-19-2014 01:37 AM
Hi Konstantin,
I believe those commands are enable by default and that's why theey are not dispayed when doing 'show run'. I checked on one device running 3.10.1 and, when using 'show run all', I can see the commands:
bsns-asr1002x-1#sh run | in vsa
radius-server vsa send cisco-nas-port
bsns-asr1002x-1#sh run all | in vsa
radius-server vsa send cisco-nas-port
radius-server vsa send accounting
radius-server vsa send authentication
bsns-asr1002x-1#
Regards.
02-19-2014 02:03 AM
Hi Manuel,
Thanks for your answer.
It is strange that these commands cleaned from sh run view.
I see you in a network have asr 1002-x.
To what ios you will advise for ISG + IPoE?
Thanks.
_________
Konstantin
02-19-2014 02:17 AM
Hi Konstantin,
Regarding "It is strange that these commands cleaned from sh run view.": this is normal for many default configuration commands.
Mine is a lab device so I cannot really comment on stability or provide you a recommendation based on that. However, I see that the download section from Cisco.com mentiones the following release as the recommended based on quality, stability and longevity:
asr1002x-universal.03.07.04a.S.152-4.S4a.SPA.bin
The best would be for you to check this with yor cisco Account Team or Advanced Services Team as normally they are the proper point of contacts for SW advisory.
Regards.
03-04-2014 02:39 AM
Hi Konstantin,
we observed that 3.10.1 were more stable in our environment than 3.11. We have made a rollback to 3.10.1 after two strange faults that we couldn't reproduce again. However we use asr1000, not asr1000-x
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide