is radius authorization for isakmp useful if authentication is working?

Unanswered Question
Feb 14th, 2008
User Badges:

I am setting up a 2801 router for Cisco clients to connect to and working on getting it to work with IAS server. I've been looking at lots of configuration examples and see that I can do isakmp authorization to Radius but can't get it to work. I have crypto map xxyy client authentication working to Radius but crypto map xxyy isakmp authorization isn't working - I can only get connections by setting it to local. I've read a bunch of different guides on aaa but I'm not sure what the benefit of the authorization part is. It almost seems like this is backward ex: the shared key authenticates and then if your username is valid and set to accept dial-in in Active Directory then you are "authorized" - what am I missing? and what is being "authorized" if there are no local users on the router but it is doing isakmp authorization to a local list?

Thanks to anyone who can give me some insight on this!

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
Richard Burts Fri, 02/15/2008 - 05:49
User Badges:
  • Super Silver, 17500 points or more
  • Hall of Fame,

    Founding Member

  • Cisco Designated VIP,

    2017 LAN, WAN


I do not believe that I have seen aaa authorization to Radius for VPN sessions. I do not see any useful reason to do this.



dan.tesch Fri, 02/15/2008 - 07:44
User Badges:

Thanks, I did see a configuration guide (Cisco) that was for Radius authentication but had a link to an almost identical guide that included authorization as well. I'm going to proceed without the authorization because I think you've validated what I already thought but I'd love to understand more about what would be possible using authorization as well. The best I've been able to find are some blogs and I'm not convinced the blog authors are always using the terminology correctly. Thanks again.


This Discussion