Table of Contents:
INTRODUCTION:....................................................................................................................................... 2
GETTING STARTED: ................................................................................................................................ 3
STEP-1: INTERFACE CONFIGURATION ............................................................................................. 4
STEP-2: NETWORK CONFIGURATION ............................................................................................... 5
STEP-3: SYSTEM CONFIGURATION .................................................................................................... 9
STEP 4: EXTERNAL USER DATABASE .............................................................................................. 22
STEP-5 REPORTS AND ACTIVITY: ..................................................................................................... 24
BIND YOUR AAA CLIENTS AND ACS SERVER TOGETHER WITH A SHARED SECRET: .... 26
1
Step-by-step Guide for Configuring Cisco® ACS server as the
Radius with an External Windows Database
Introduction:
This is a simple step by step configuration for Setting up Cisco ACS server as the Radius for granting secure network access for Intel AMT clients. The configuration here uses Windows AD as external database for simplicity. CISCO ACS server has been configured here to allow several popular Radius protocols like EAP-PEAP, EAP-TLS and EAPFAST.
You can use this as a quick start guide for validating Intel AMT access to secure networks where CISCO ACS has been deployed as Radius.
This configuration has been successfully used for validating wired and wireless access to AMT FW over secure networks in a simple environment with a single domain controller using SCCM SP1 & SP2 consoles. It is assumed that