Table of Contents
Configuring the Cisco Service Selection Dashboard
To start the configuration utility, follow these steps:
Step 1 Launch a web browser.
Step 2 Enter the following URL:
http://servername:port/config
where servername is the name of the server that is running the Cisco Service Selection Dashboard (Cisco SSD) and port is the port where the Cisco SSD is listening.
Note To access all Cisco SSD configuration and administration utilities, enter http://servername:port/admin.
Step 3 Enter the configuration utility username and password (default: root and admin).
The Service Selection Dashboard Configuration Utility page appears. (See Figure 3-1).
Figure 3-1: Cisco SSD Configuration Utility Page
Step 4 Review the sections described below and make any necessary changes.
- Server Section---Use this section to define guest logon properties.
- Admin Section---Use this section to define an administrator username and password.
- Messaging Service Section---Use this section to configure the Message server.
- Tools Section---Use this section to configure Cisco SSD tools.
- AAA Primary Section---Use this section to configure communications with the primary AAA server.
- AAA Secondary Section---Use this section to configure communications with the secondary AAA server.
- Service Selection Gateway (SSG) Section---Use this section to configure communications with the Cisco SSG.
Step 5 When you are finished, click Save. To exit without saving changes, click Cancel.
Note The configuration utility makes changes to the dashboard.conf file. You can modify the dashboard.conf file with the configuration utility or with a text editor.
The Server section contains guest logon properties. If your organization chooses to support guest logons, you must create a Guest Remote Access Dial-In User Service (RADIUS) user profile.
This parameter specifies whether users logged on as guests will be prompted for a username and password when accessing tunneled services. When set to ON, users logged on as guests are prompted for a username and password. When set to OFF, the guest username and password are used. The default is OFF.
This parameter specifies whether users logged on as guests will be prompted for a username and password when accessing proxy services. When set to ON, users logged on as guests are prompted for a username and password. When set to OFF, the guest username and password are used. The default is OFF.
This parameter specifies the username for the Guest account, if the Guest Logons parameter is enabled. This username must match the username of the Guest RADIUS user profile. There is no default for this parameter.
This parameter specifies whether a user who shuts down the browser without logging off will have to reenter a username and password to reaccess the Cisco SSD. When set to ON, the user will have to reenter a username and password. When set to OFF, the user will not be required to reauthenticate. The default is ON.
Note This feature provides minimal security against casual unauthorized access and is easily defeated by knowledgeable users.
This parameter specifies the password for the Guest account. This password must match the password of the Guest RADIUS user profile. There is no default for this parameter.
This parameter specifies whether guest logons are permitted. If this parameter is ON, users who log on as guests are allowed to access services configured in the Guest RADIUS user profile. If this parameter is set to OFF, guest logons are not allowed. The default is OFF.
A Guest account must be configured with the appropriate Guest Username and Guest Password, and any tunneled services that guests are allowed to access must be configured to use the same Guest name and password.
This parameter specifies how long (in seconds) a connection can remain idle before the Cisco SSD logs the user out. The default is 86400 (one day).
Note This parameter does not terminate the Cisco SSG session. Users will only need to reauthenticate with the Cisco SSD.
This parameter specifies how often (in seconds) the Cisco SSD looks for idle connections. The default is 3600 (one hour).
This Admin section contains the Cisco SSD administrator properties.
This parameter specifies the system administrator username used to log in to the Configuration Utility page (default: root).
This parameter specifies the system administrator password used to log in to the Configuration Utility page (default: admin).
The Messaging Service section contains the configuration parameters for the Message server.
This parameter specifies the port the Message server uses to listen for asynchronous messages.
This parameter enables or disables Message server debugging. If this parameter is set to 1, Message server debugging is enabled. If this parameter is set to 0, Message server debugging is disabled (default).
This parameter specifies how long the Message server waits before deleting old messages (default: 120 minutes).
This parameter specifies how many messages the Message server queues for each user before deleting old messages (default: 10).
This parameter specifies the IP address of the Message server. The Message server runs on the same machine as the Dashboard server. However, the server might have more than one IP address.
This parameter specifies how many messages the Message server queues for all users before deleting old messages (default: 10000).
The Tools section contains configuration parameters for Cisco SSD tools.
This parameter enables or disables RADIUS debugging. If this parameter is set to 1, RADIUS debugging is enabled. If this parameter is set to 0, RADIUS debugging is disabled (default).
The AAA Primary section contains parameters used by the Cisco SSD to communicate with the primary AAA server.
This parameter specifies the port the primary AAA server uses to listen for RADIUS packets.
This parameter specifies the shared secret used to encrypt data sent between the Cisco SSD and the primary AAA server.
This parameter specifies the password used in service and service group profiles. If this password does not match, the Cisco SSD will be unable to retrieve the profiles.
This parameter specifies how long the Cisco SSD waits before timing out RADIUS requests sent to the primary AAA server (default: 10 seconds).
This parameter specifies the IP address of the primary AAA server.
This parameter specifies the number of times a RADIUS packet is resent to the primary AAA server if no response is received (default: 5).
The AAA Secondary section contains parameters used by the Cisco SSD to communicate with the secondary AAA server.
This parameter specifies the port the secondary AAA server uses to listen for RADIUS packets.
This parameter specifies the shared secret used to encrypt data sent between the Cisco SSD and the secondary AAA server.
This parameter specifies the password used in service and service group profiles. If this password does not match, the Cisco SSD will be unable to retrieve the profiles.
This parameter specifies how long the Cisco SSD waits before timing out RADIUS requests sent to the secondary AAA server (default: 10 seconds).
This parameter specifies the IP address of the secondary AAA server.
This parameter specifies the number of times a RADIUS packet is resent to the secondary AAA server if no response is received (default: 5).
The SSG section contains parameters used by the Cisco SSD to communicate with the Cisco SSG.
This parameter specifies the port number the Cisco SSG uses to listen for RADIUS requests (default: 1645).
This parameter specifies the shared secret used to communicate with the Cisco SSG. For example, on the Cisco 6510 multiservice access concentrator, this must match the DashboardPassword parameter. On the Cisco 6400 node route processor, the shared secret is specified with the ssg radius-helper key command.
This parameter specifies how long the Cisco SSD waits before timing out RADIUS requests sent to the Cisco SSG (default: 10 seconds).
This parameter specifies the IP address of the Cisco SSG.
This parameter specifies the number of times a RADIUS packet is resent if no response is received (default: 5).







Posted: Mon May 24 11:05:11 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.