These are the options to enable connectivity between Virtual Systems and a RADIUS or TACACS/TACACS+ server:
For Multi-Domain Server configurations, make sure that you configure the SecurID or Remote Authentication settings of the Domain Management Server that manages the Virtual Systems.
Configure shared authentication so that all the Virtual Systems on the VSX Gateway authenticate to the remote RADIUS or TACACS/TACACS+ server.
To configure shared authentication for RADIUS or TACACS/TACACS+:
The Virtual Systems General Properties window opens.
Do all of the previous steps for each Virtual System.
On Multi-Domain Server, work in the context of the Target Domain Management Server that manages the Virtual System.
table.def
file. See sk98339.no_hide_services_ports
parameter contains the UDP ports for RADIUS or TACACS, or the TCP ports for TACACS+. The default ports are:Sample RADIUS parameter with Hide NAT disabled:
no_hide_services_ports = { <49, 6>, <49, 17>, <500, 17>, <259, 17>, <1701, 17>, <123, 17>, <1645, 17> };
For private configurations, the active and standby Virtual Systems use the same encryption key to authenticate to the remote RADIUS or TACACS/TACACS+ server.
For High Availability configurations, make sure that the Active and Standby Virtual Systems on each VSX Cluster Member use the same VIP address.
To configure private authentication:
The General Properties view opens.
Do all of the previous steps for each Virtual System.
On the Management Server, make sure that Hide NAT is enabled.
For Multi-Domain Server, use the Domain Management Server that manages the Virtual System.
table.def
file (see sk98339) in a plain-text editor.no_hide_services_ports
parameter DOES NOT contain the UDP ports for RADIUS or TACACS, or the TCP ports for TACACS+.The default ports are:
Sample parameter with Hide NAT enabled:
no_hide_services_ports = { <500, 17>, <259, 17>, <1701, 17>, <123, 17> };