Cisco Cisco Clean Access 3.5
C H A P T E R
6-1
Cisco Clean Access Manager Installation and Administration Guide
OL-7044-01
6
User Management: Auth Servers
This chapter describes how to set up external authentication sources, VLAN ID or attribute-based auth
server mapping rules, and RADIUS accounting. Topics are as follows:
server mapping rules, and RADIUS accounting. Topics are as follows:
•
•
•
•
•
•
For details on configuring user roles and local users, see
For details on creating and configuring the web user login page, see
For details on configuring traffic policies for user roles, see
Overview
By connecting the Clean Access Manager to external authentication sources, you can use existing user
data to authenticate users in the untrusted network. Cisco Clean Access supports several authentication
provider types for the following two cases:
data to authenticate users in the untrusted network. Cisco Clean Access supports several authentication
provider types for the following two cases:
•
When you want to work with an existing backend authentication server(s)
•
When you want to enable any of the transparent authentication mechanisms provided by Cisco Clean
Access
Access
Working with Existing Backend Authentication Servers
When working with existing backend authentication servers, Cisco supports the following authentication
protocol types:
protocol types:
•
Kerberos
•
RADIUS (Remote Authentication Dial-In User Service)
•
Windows NT (NTLM Auth Server)
•
LDAP (Lightweight Directory Access Protocol)