aaa authorization (IKEv2 profile)
To specify the authentication, authorization, and accounting (AAA) authorization for a local or external group policy, use the aaa authorization command in IKEv2 profile configuration mode. To remove the AAA authorization, use the no form of this command.
aaa authorization { group { cert list | eap list | psk list } | user { cert list | eap list | psk list } { aaa-listname | [ aaa-username | [ local ] | name-mangler mangler-name ] | [ password password ] } }
no aaa authorization { group { cert list | eap list | psk list } | user { cert list | eap list | psk list } { aaa-listname | [ aaa-username | [ local ] | name-mangler mangler-name ] | [ password password ] } }
Syntax Description
group |
Specifies the AAA authorization for local or external group policy. |
local |
(Optional) Specifies the authorization policy that is used through a local method. |
user |
Specifies the AAA authorization for each user policy. |
cert |
Specifies the AAA method list that is used when the remote authentication method is certificate based. |
eap |
Specifies the AAA method list that is used when the remote authentication method is Extensible Authentication Protocol (EAP). |
psk |
Specifies the AAA method list that is used when the remote authentication method is preshared key. |
list |
Specifies the AAA method list for the remote authentication method. |
aaa-listname |
The AAA list name. |
aaa-username |
The AAA username. |
name-mangler mangler-name |
Derives the name mangler from the crypto ikev2 name-mangler command. |
password password |
Specifies the AAA password. This password argument defines the following values:
|
Command Default
AAA authorization is not specified.
Command Modes
IKEv2 profile configuration (config-ikev2-profile)
Command History
Release |
Modification |
---|---|
Cisco IOS XE Catalyst SD-WAN Release 17.2.1v |
Command qualified for use in Cisco SD-WAN Manager CLI templates. |
Usage Guidelines
For usage guidelines, see the Cisco IOS XE aaa authorization (IKEv2 profile) command.
The following example shows how to configure the AAA authorization for a local group policy.
\
Router(config)# crypto ikev2 profile if-ipsec256-ikev2-profile
Router(config-ikev2-profile)# aaa authorization group psk list default li_policy