| 0 comments ]

Configuring AAA on a Cisco Router to Use Cisco Secure ACS

Add a note hereCisco Secure Access Control Server (ACS) for Windows provides a centralized identity networking solution and simplified user management experience across all Cisco devices and security management applications. This section covers what Cisco Secure ACS is and what you can use it for, the requirements for installing Cisco Secure ACS for Windows, and the Cisco Secure ACS installation procedure.

Add a note here Cisco Secure ACS Overview

Add a note here Local implementations of AAA, explained in the previous section of this book, do not scale well. Most corporate environments have multiple Cisco routers and network access servers (NAS) with multiple router administrators and hundreds or thousands of users needing access to the corporate LAN. Maintaining local databases for each Cisco router and NAS for this size of network is not feasible.

Add a note hereTo solve this challenge, you can use one or more Cisco Secure ACS systems (servers or engines) to manage the entire user and administrative access needs for an entire corporate network using one or more databases. External AAA systems, such as the Cisco Secure ACS for Windows or Cisco Secure ACS Solution Engine, communicate with Cisco routers and NASs using the TACACS+ or RADIUS protocols to implement AAA functions. This allows you to make changes to user accounts and passwords in a centralized place (the ACS server), and have all the Cisco routers and NASs in your network access this information.

Add a note here Figure 2-14 shows the steps of the authentication and authorization process using an external Cisco Secure ACS system to provide AAA services to a network:

Add a note here Step 1

Add a note hereThe client establishes a connection with the router.

Add a note here Step 2

Add a note hereThe router prompts the user for a username and password.

Add a note here Step 3

Add a note hereThe router passes the username and password to the Cisco Secure ACS (server or engine).

Add a note here Step 4

Add a note hereThe Cisco Secure ACS authenticates the user. The user is authorized to access the router (administrative access) or the network based on information found in the Cisco Secure ACS database.

Click to collapse
Add a note hereFigure 2-14: Implementing Authentication Using External Servers

Add a note here Cisco Secure ACS is a highly scalable, high-performance ACS that operates as a centralized RADIUS and TACACS+ server that provides the following features:

  • Add a note hereExtends access security by combining authentication, user access, and administrator access with policy control within a centralized identity networking solution

  • Add a note hereAllows greater flexibility and mobility, increased security, and user-productivity gains

  • Add a note hereEnforces a uniform security policy for all users regardless of how they access the network

  • Add a note hereReduces the administrative and management burden involved in scaling user and network administrator access to the network

Add a note hereCisco Secure ACS uses a central database, which allows it to centralize the control of all user privileges and distribute them to hundreds or thousands of access points throughout the network. Cisco Secure ACS provides detailed reporting and monitoring capabilities of user behavior, access connections, and device configuration changes. This feature has become extremely important for organizations trying to comply with Sarbanes-Oxley Act regulations. Cisco Secure ACS supports a broad variety of access connections, including wired and wireless LAN, dialup, broadband, content, storage, VoIP, firewalls, switches, and VPNs.

Add a note hereYou can leverage the Cisco Secure ACS framework to control administrator access and configuration for all the network devices in your network that support RADIUS and TACACS+. The following are some of the advanced features of Cisco Secure ACS:

  • Add a note hereAutomatic service monitoring

  • Add a note hereDatabase synchronization and importing of tools for large-scale deployments

  • Add a note hereLightweight Directory Access Protocol (LDAP) user authentication support

  • Add a note hereUser and administrative access reporting

  • Add a note hereRestrictions to network access based on criteria such as the time of day and the day of week

  • Add a note hereUser and device group profiles

  • Add a note hereToken-based authentication

Add a note hereCisco Secure ACS is an important component of the Cisco Identity Based Networking Services (IBNS) architecture. Cisco IBNS is based on port-security standards such as IEEE 802.1x and Extensible Authentication Protocol (EAP), and extends security from the perimeter of the network to every connection point inside the LAN. You can deploy new policy control, such as per-user quotas, VLAN assignments, and ACLs within this new architecture, because of the extended capabilities of Cisco switches and wireless access points to query Cisco Secure ACS over the RADIUS protocol.

Add a note hereCisco Secure ACS is also an important component of Cisco Network Admission Control (NAC). Cisco NAC is an industry initiative sponsored by Cisco that uses the network infrastructure to enforce security-policy compliance on all devices seeking to access network computing resources, thereby limiting damage from viruses and worms. With NAC, customers can choose to allow network access only to compliant and trusted endpoint devices (for instance, PCs, servers, and personal digital assistants [PDAs]) and can restrict the access of noncompliant devices. Cisco NAC is part of the Cisco Self-Defending Network initiative and is the foundation for enabling NAC on Layer 2 and Layer 3 networks. Future phases extend endpoint and network security interoperation to include dynamic incident-containment capabilities. This innovation enables compliant system elements to report misuse emanating from rogue or infected systems during an attack. Thus, infected systems can be dynamically quarantined from the rest of the network to significantly reduce virus, worm, and blended-threat propagation.

Add a note hereCisco Secure ACS is a powerful access control server with many high-performance and scalability features for any organization growing its WAN or LAN. The following lists the main benefits of Cisco Secure ACS:

  • Add a note here Ease of use: A web-based user interface simplifies and distributes the configuration for user profiles, group profiles, and Cisco Secure ACS configuration.

  • Add a note here Scalability: Cisco Secure ACS is built to support large networked environments with support for redundant servers, remote databases, and database replication and backup services.

  • Add a note here Extensibility: LDAP authentication forwarding supports the authentication of user profiles that are stored in directories from leading directory vendors, including Sun, Novell, and Microsoft.

  • Add a note here Management: Microsoft Windows Active Directory support consolidates Windows user name and password management and uses the Windows Performance Monitor for real-time statistics viewing.

  • Add a note here Administration: Different access levels for each Cisco Secure ACS administrator and the ability to group network devices together make it easier and more flexible to control the enforcement and changes of security policy administration over all of the devices in a network.

  • Add a note here Product flexibility: Because Cisco IOS Software has embedded support for AAA, Cisco Secure ACS can be used across virtually any network access server that Cisco sells (the Cisco IOS Software release must support RADIUS or TACACS+). Cisco Secure ACS is available in three options: Cisco Secure ACS Solution Engine, Cisco Secure ACS Express, and Cisco Secure ACS for Windows.

  • Add a note here Integration: Tight coupling with Cisco IOS routers and VPN solutions provides features such as Multichassis Multilink PPP and Cisco IOS Software command authorization.

  • Add a note here Third-party support: Cisco Secure ACS offers token server support for any one-time password (OTP) vendor that provides an RFC-compliant RADIUS interface, such as RSA, PassGo, Secure Computing, ActiveCard, Vasco, or CryptoCard.

  • Add a note here Control: Cisco Secure ACS provides dynamic quotas to restrict access based on the time of day, network use, number of logged sessions, and the day of the week.

Cisco Secure ACS for Windows Requirements

Add a note hereThe Cisco Secure ACS server must meet certain minimum hardware, operating system, and third-party software requirements. In addition, if you are upgrading from an earlier version of Cisco Secure ACS, you should refer to the Cisco Secure ACS upgrade requirements at http://tinyurl.com/8optuc.

Hardware Requirements

Add a note hereThe server that will be running Cisco Secure ACS 4.2 must meet the following minimum hardware requirements:

  • Add a note herePentium IV processor that is 1.8 GHz or faster

  • Add a note here1 GB of RAM

  • Add a note hereAt least 1 GB of free disk space; if you are running the database on the same computer, more disk space is required

  • Add a note hereMinimum graphics resolution of 256 colors at 800×600 pixels

Operating System Requirements

Add a note hereCisco Secure ACS 4.2 for Windows supports the English-language versions of the following Microsoft Windows operating systems:

  • Add a note hereWindows 2000 Server, with Service Pack 4 installed

  • Add a note hereWindows 2000 Advanced Server, with the following conditions:

    Add a note hereService Pack 4 installed

    Add a note hereWithout Microsoft clustering service installed

    Add a note hereWithout other features specific to Windows 2000 Advanced Server enabled, such as Terminal Services.

  • Add a note hereWindows Server 2003 Service Pack 1, Enterprise Edition or Standard Edition

  • Add a note hereWindows Server 2003, R2, Standard Edition

  • Add a note hereWindows Server 2003, Service Pack 2

  • Add a note hereWindows Server 2003, R2, Service Pack 2


Note

Add a note hereACS for Windows supports the multiprocessor feature on dual processor computers. Cisco Secure ACS 4.2 supports the Japanese Windows Server 2003.

Add a note here You can apply the Windows service packs before or after installing Cisco Secure ACS. If you do not install a required service pack before installing Cisco Secure ACS, the Cisco Secure ACS installation program might warn you that the required service pack is not present. If you receive a service pack message, continue the installation, and then install the required service pack before starting user authentication with Cisco Secure ACS.

Virtualization Compatibility

Add a note hereCisco has also tested ACS 4.2 on VMWare platform MWare ESX server 3.0.0.


Note

Add a note hereFor the most recent information about supported operating systems and service packs, see the Cisco Secure ACS release notes at http://www.cisco.com/en/US/products/sw/secursw/ps2086/prod_release_notes_list.html.

Cisco Secure ACS Solution Engine

Add a note hereThe Cisco Secure ACS Solution Engine, shown in Figure 2-15, is a one rack unit (RU), security-hardened appliance with a preinstalled Cisco Secure ACS license. The following lists the specifications of Cisco Secure ACS Solution Engine 4.2:

  • Add a note hereCPU 3.4-GHz Intel Pentium 4, 800-MHz FSB, 2-MB cache

  • Add a note here1 GB of system memory

  • Add a note here80-GB Serial Advanced Technology Attachment (SATA) hard drive

  • Add a note hereCombination CD/DVD drive

  • Add a note hereOne RS-232 serial port and three USB 2.0 I/O ports (one front, two rear)

Click to collapse
Add a note hereFigure 2-15: Cisco Secure ACS Solution Engine

Add a note hereCompared to the Cisco Secure ACS for Windows product, the Cisco Secure ACS Solution Engine reduces the total cost of ownership by eliminating the need to install and maintain a Microsoft Windows server machine.

Cisco Secure ACS Express 5.0

Add a note here Cisco Secure ACS Express 5.0 is intended for commercial (fewer than 350 users), retail, and enterprise branch office deployments. The product offers a comprehensive yet simplified feature set, a cutting-edge user-friendly GUI, and an attractive price point that allows you to deploy this product in situations where Cisco Secure ACS for Windows or Cisco Secure ACS Solution Engine might not be suitable.

Add a note hereCisco Secure ACS Express 5.0 is available as a one RU, security-hardened appliance with a preinstalled Cisco Secure ACS Express license. Cisco Secure ACS Express 5.0 supports a maximum of 50 AAA clients and 350 unique user logins in a 24-hour period.

Add a note hereThe following are some of the hardware specifications of Cisco Secure ACS Express 5.0:

  • Add a note hereCPU Intel 352 Celeron D

  • Add a note here1 GB of system memory

  • Add a note here250-GB hard drive, CD/DVD drive

  • Add a note here2-10/100/1000 onboard Ethernet network interface cards (NIC)

  • Add a note hereOne RS-232 serial port and three USB 2.0 I/O ports (one front, two rear)

  • Add a note here1 PS/2 keyboard port and 1 PS/2 mouse port


Note

Add a note hereFor information about Cisco Secure ACS Express 5.0, visit http://www.cisco.com/en/US/products/ps8543/index.html.

Cisco Secure ACS View 4.0

Add a note hereCisco Secure ACS View 4.0 is an advanced reporting and alert tool for multiple Cisco Secure ACS servers. Much like Cisco Monitoring, Analysis, and Response System (MARS), which takes an enterprise approach to logging, Cisco Secure ACS View 4.0 takes a similar approach to monitoring Cisco Secure ACS servers. It has a web-based interface and a significant number of preprogrammed reports which make it a powerful addition to a distributed enterprise that has widely distributed resources and Cisco Secure ACS servers.

Add a note here TACACS+ and RADIUS Protocols

Add a note hereThe Cisco Secure ACS family of products supports both RADIUS and TACACS+ protocols, which are the two predominant AAA protocols that are used by Cisco security appliances, routers, and switches for implementing AAA.

Add a note hereCisco Secure ACS supports both TACACS+ and RADIUS:

  • Add a note hereTACACS+ remains more secure than RADIUS.

  • Add a note hereRADIUS has a robust application programming interface and strong accounting.

TACACS+

Add a note here TACACS+ is a Cisco enhancement to the original TACACS protocol. Despite its name, TACACS+ is a protocol that was designed from the ground up and it is therefore incompatible with any earlier version of TACACS. TACACS+ has been submitted to the Internet Engineering Task Force (IETF) as a draft proposal.

Add a note hereTACACS+ provides separate message types for AAA services. Because TACACS+ separates authentication and authorization, it is possible to use TACACS+ authorization and accounting, while using another method of authentication.

Add a note hereThe extensions to the TACACS+ protocol provide more types of authentication requests and response codes than were in the original specification. TACACS+ offers multiprotocol support, such as IP and AppleTalk. Normal TACACS+ operation encrypts the entire body of the packet for more secure communications and uses TCP port 49.

RADIUS

Add a note hereRADIUS is an open IETF standard AAA protocol for applications such as network access or IP mobility that was developed by Livingston Enterprises. RADIUS works in both local and roaming situations and is commonly used for accounting purposes. RADIUS is currently defined by RFCs 2865, 2866, 2867, 2868, and many other related RFCs.

Add a note hereThe RADIUS protocol hides the passwords during transmission between the NAS and RADIUS server, even with the PAP protocol, using a rather complex operation that involves Message Digest 5 (MD5) hashing and a shared secret. However, the rest of the packet is sent in plaintext.

Add a note hereRADIUS combines authentication and authorization as one process. Once users are authenticated, they are authorized, as well. RADIUS uses User Datagram Protocol (UDP) ports 1645 or 1812 for authentication and UDP ports 1646 or 1813 for accounting.

Add a note hereIn addition, RADIUS is widely used by VoIP service providers. It is used to pass login credentials of a Session Initiation Protocol (SIP) endpoint (such as a broadband phone) to a SIP registrar using digest authentication, and then to a RADIUS server using RADIUS. RADIUS is also a common authentication protocol that is used by the 802.1x security standard.

Add a note hereThe DIAMETER protocol is the planned replacement for RADIUS. DIAMETER is more secure than RADIUS because it uses Stream Control Transmission Protocol (SCTP) or TCP rather than UDP. It also provides for failover procedures, and offers a transition path for current RADIUS implementations.

Comparing TACACS+ and RADIUS

Add a note hereThere are several differences between TACACS+ and RADIUS, as shown in the following list. Table 2-11 summarizes these differences.

Add a note here Table 2-11: TACACS+/RADIUS Comparison
Open table as spreadsheet

Add a note hereTACACS+

Add a note hereRADIUS

Add a note here Functionality

Add a note hereSeparates AAA

Add a note hereCombines authentication and authorization

Add a note here Standard

Add a note hereMostly Cisco supported

Add a note hereOpen/RFC

Add a note here Transport protocol

Add a note hereTCP

Add a note hereUDP

Add a note here CHAP

Add a note hereBidirectional

Add a note hereUnidirectional

Add a note here Protocol support

Add a note hereMultiprotocol support

Add a note hereNo ARA, no NetBEUI

Add a note here Confidentiality

Add a note hereEntire packet encrypted

Add a note herePassword encrypted

  • Add a note here Functionality: TACACS+ separates AAA functions according to the AAA architecture, allowing modularity of the security server implementation. RADIUS combines authentication and authorization, but separates accounting, thus allowing less flexibility in implementation than TACACS+.

  • Add a note here Standard: TACACS+ is a standard that is used mostly by Cisco customers. RADIUS is an open industry standard.

  • Add a note here Transport protocol: TACACS+ uses TCP. RADIUS uses UDP, which was chosen for the simplification of client and server implementations; however, it makes the RADIUS protocol less robust and requires the server to implement reliability measures such as packet retransmission and timeouts.

  • Add a note here Challenge and response: TACACS+ supports bidirectional challenge and response as used in Challenge Handshake Authentication Protocol (CHAP) between two routers. RADIUS supports unidirectional challenge and response from the RADIUS security server to the RADIUS client.

  • Add a note here Protocol support: TACACS+ provides more complete dialup and WAN protocol support. RADIUS does not support AppleTalk Remote Access (ARA) access, NetBIOS Extended User Interface (NetBEUI), NetWare Access Server Interface (NASI), and X.25 Packet Assembler/Disassembler (PAD) connections.

  • Add a note here Confidentiality: TACACS+ encrypts the entire packet body of every packet. RADIUS encrypts only the password attribute portion of the Access-Request packet, which makes TACACS+ more secure.

  • Add a note here Customization: The flexibility that is provided in the TACACS+ protocol allows many things to be customized on a per-user basis or per-group basis, including which commands a user can execute on a router. RADIUS lacks this flexibility, and therefore many features that are possible with TACACS+ are not possible with RADIUS.

  • Add a note here Accounting: TACACS+ accounting includes a limited number of information fields. RADIUS accounting can contain more information than TACAS+ accounting records, which is the key strength of RADIUS over TACACS+.

Add a note here Installing Cisco Secure ACS for Windows

Add a note here Before installing Cisco Secure ACS, it is important to prepare the server. You must consider third-party software requirements and the network and port requirements of the Cisco Secure ACS server and AAA devices.

Third-Party Software Requirements

Add a note hereOther than the software products that are described in the release notes, Cisco has not tested the interoperability of Cisco Secure ACS and other software products on the same computer. Cisco will only support interoperability issues with software products that are mentioned in the release notes. The most recent version of the Cisco Secure ACS release notes is posted on Cisco.com.

Network and Port Requirements

Add a note hereThe network should meet the following requirements before you begin deploying Cisco Secure ACS:

  • Add a note hereFor full TACACS+ and RADIUS support on Cisco IOS devices, AAA clients must run Cisco IOS Release 11.2 or later.

  • Add a note hereCisco devices that are not Cisco IOS AAA clients must be configured with TACACS+, RADIUS, or both.

  • Add a note hereDial-in, VPN, or wireless clients must be able to connect to the applicable AAA clients.

  • Add a note hereThe computer running Cisco Secure ACS must be able to reach all AAA clients using ping.

  • Add a note hereGateway devices between the Cisco Secure ACS and other network devices must permit communication over the ports that are needed to support the applicable feature or protocol.

  • Add a note hereA supported web browser must be installed on the computer running Cisco Secure ACS. For the most recent information about tested browsers, see the release notes for your Cisco Secure ACS product on Cisco.com.

  • Add a note hereAll network cards in the computer running Cisco Secure ACS must be enabled. If there is a disabled network card on the computer running Cisco Secure ACS, installing Cisco Secure ACS may proceed slowly because of delays that are caused by the Microsoft CryptoAPI.

Add a note here Configuring the Server

Add a note hereAfter successfully installing Cisco Secure ACS, you must perform some initial configuration. The only way to configure a Cisco Secure ACS server is through an HTML interface, as shown in Figure 2-16. To access the Cisco Secure ACS HTML interface from the computer that is running Cisco Secure ACS, you can use the Cisco Secure icon labeled ACS Admin that appears on the desktop or you can enter the following URL into a supported web browser: http://127.0.0.1:2002.

Click to collapse
Add a note hereFigure 2-16: Cisco Secure ACS 4.0 Home Page

Note

Add a note hereYou can also reach Cisco Secure ACS remotely after an administrator user account has been configured. To remotely access the Cisco Secure ACS, enter http://ip_address[hostname]:2002. After the initial connection, a different port is dynamically negotiated.

Add a note hereThe home page of Cisco Secure ACS is divided into frames. The buttons in the navigation bar represent a particular area or function that you can configure. When you click one of the buttons in the navigation bar, the window that opens enables you to access help on the right side of the window.

Add a note hereThe following are the navigation buttons that are available in the navigation bar.

  • Add a note here User Setup: This option enables you to add a new user, search for an existing user, find users alphabetically or numerically, or simply list all users at once.

  • Add a note here Group Setup: This option enables you to configure any parameters that are common to a group of users. In this section, you can apply configuration from shared profile components and specific TACACS+ and RADIUS attributes.

  • Add a note here Shared Profile Components: This option allows you to specify shell command authorization sets and Cisco PIX Firewall shell command authorization sets. By creating these command authorization sets, you can control the commands a user can execute on a device by applying the command authorization set to the user profile in the TACACS+ settings or at the group level.

  • Add a note here Network Configuration: This option is where you add, delete, or modify settings for AAA clients.

  • Add a note here System Configuration: Under this option, you will find many subconfiguration links:

    • Add a note here Service Control: Allows you to start and stop the Cisco Secure ACS services.

    • Add a note here Logging: Allows you to configure logging, such as failed attempts, and TACACS+ and RADIUS accounting.

    • Add a note here Date Format Control: Allows you to change the format of the date that is displayed on reports.

    • Add a note here Local Password Management: Allows you to set password length and password options. You can also configure options for remote password change and logging of password changes.

    • Add a note here ACS Backup: Allows you to schedule backups to be performed manually or automatically at specific times.

    • Add a note here ACS Service Management: Enables you to determine how often to test the availability of ACS authentication services.

  • Add a note here Interface Configuration: This option allows you to configure user-defined fields that are recorded in accounting logs, configure TACACS+ and RADIUS options, and control the display of options in the user interface. What options are available depends on whether you have selected TACACS+ or a form of RADIUS when you entered your AAA client.


    Note

    Add a note hereIf you do not see RADIUS options here, you must add a AAA client that uses the RADIUS protocol. Interface Configuration is directly affected by the settings in Network Configuration.

  • Add a note here Administration Control: This option enables you to configure all aspects of Cisco Secure ACS for administrative access.

  • Add a note here External User Databases: This option enables you to configure the unknown user policy, configure authorization privileges for unknown users, and configure external database types.

  • Add a note here Posture Validation: Cisco Secure ACS supports the NAC initiative. NAC ensures that every endpoint conforms to the security policy before they are granted access to the network. The Posture Validation option enables you to configure NAC options.

  • Add a note here Network Access Profiles: This option enables you to classify access requests according to the IP address of a AAA client, membership in a network device group, protocol types, or other specific RADIUS attribute values sent by the network device through which the user connects. Cisco Secure ACS does not support network access profiles for TACACS+.

  • Add a note here Reports and Activity: Cisco Secure ACS keeps track of a lot of information. Use this option to view the following logs that Cisco Secure ACS keeps:

    Add a note hereTACACS+ accounting

    Add a note hereTACACS+ administration

    Add a note hereRADIUS accounting

    Add a note here VoIP accounting

    Add a note herePassed authentications

    Add a note hereFailed attempts

    Add a note hereLogged-in users

    Add a note hereDisabled accounts

    Add a note hereCisco Secure ACS backup and restore

    Add a note hereRemote Database Management Source (RDBMS) synchronization

    Add a note hereDatabase replication

    Add a note hereAdministration audit

    Add a note hereUser password changes

    Add a note hereCisco Secure ACS service monitoring

  • Add a note here Online Documentation: This button provides access to documentation for Cisco Secure ACS online at Cisco.com.

Network Configuration

Add a note hereBefore configuring a router, switch, or firewall as a TACACS+ or RADIUS client, you must add the AAA client to the Cisco Secure ACS server and specify the IP address and encryption key, as shown in Figure 2-17. The Network Configuration page is where you add, delete, or modify settings for AAA clients.

Click to collapse
Add a note hereFigure 2-17: Cisco Secure ACS Network Configuration

Add a note hereFollow these steps to create a AAA client:

Add a note here Step 1

Add a note hereClick Network Configuration in the navigation bar. The Network Configuration page appears

Add a note here Step 2

Add a note here In the AAA Clients section, click Add Entry.

Add a note here Step 3

Add a note hereEnter the client hostname in the AAA Client Hostname field. For example, enter the name of the router that will be a AAA client to the Cisco Secure ACS server.


Note

Add a note hereIn the Cisco Secure ACS application, a client is a router, switch, firewall, or VPN concentrator that will be using the services of the Cisco Secure ACS server.

Add a note here Step 4

Add a note hereEnter the IP address in the AAA Client IP Address field.

Add a note here Step 5

Add a note hereEnter the key that the client will use for encryption in the Shared Secret field.

Add a note here Step 6

Add a note hereChoose the appropriate AAA protocol from the Authenticate Using drop-down list.

Add a note here Step 7

Add a note hereComplete other parameters as your needs require.

Add a note here Step 8

Add a note hereClick Submit and Apply.

Interface Configuration

Add a note hereThe options available from the Interface Configuration navigation button, shown in Figure 2-18, enable you to control the display of options in the user interface. The following configuration links are available when you click the Interface Configuration button; the specific options you see depend on whether you have added TACACS+ or RADIUS clients to the Cisco Secure ACS server:

  • Add a note here User Data Configuration

  • Add a note hereTACACS+ (Cisco IOS)

  • Add a note hereRADIUS (Microsoft)

  • Add a note hereRADIUS (Ascend)

  • Add a note hereRADIUS (IETF)

  • Add a note hereRADIUS (Cisco IOS/PIX 6.0)

  • Add a note hereAdvanced Options

Click to collapse
Add a note hereFigure 2-18: Cisco Secure ACS Interface Configuration

Note

Add a note hereIf you do not see RADIUS options in the list, you need to add a AAA client that uses the RADIUS protocol.

Add a note hereThe User Data Configuration link enables you to customize the fields that appear in the user setup and configuration windows. Here you can add fields such as phone number, work location, supervisor name, or any other pertinent information.

Add a note hereThe TACACS+ (Cisco IOS) link enables the administrator to configure TACACS+ settings and add new TACACS+ services. You can also configure advanced options that affect what you see in your user interface.

Configuring Cisco Secure ACS for External Databases

Add a note hereYou can configure Cisco Secure ACS to forward authentication of users to one or more external user databases. Support for external user databases means that Cisco Secure ACS does not require you to create duplicate user entries in the Cisco Secure user database. In organizations in which a substantial user database already exists, Cisco Secure ACS can leverage the work already invested in building the database without any additional input. Figure 2-19 shows an example of Cisco Secure ACS External databases choices.

Click to collapse
Add a note hereFigure 2-19: Configuring Cisco Secure ACS for External Databases

Add a note hereFor most database configurations, except for Windows databases, Cisco Secure ACS supports only one instance of a username and password. If you configure Cisco Secure ACS to use multiple user databases with common usernames stored in each, you must be careful with the database configurations; the first database to match the authentication credentials of the user is the only one that Cisco Secure ACS uses for that user.


Note

Add a note hereIt is recommended that there be only one instance of a username in all the external databases.

Add a note hereFollow these steps, shown in Figure 2-19, to configure Cisco Secure ACS to use external databases:

Add a note here Step 1

Add a note hereClick the External User Databases button in the navigation bar. The External User Databases window appears with the following links:

  • Add a note here Unknown User Policy: This option enables you to configure the authentication procedure for users that are not located in the Cisco Secure ACS database.

  • Add a note here Database Group Mappings: This option enables you to configure which group privileges external database users inherit when Cisco Secure ACS authenticates them. This means that in most cases when users are authenticated by an external user database, their actual privileges are drawn from Cisco Secure ACS and not the external database.

  • Add a note here Database Configuration: This option enables you to define all the external servers that you want Cisco Secure ACS to work with and authenticate users against.

Add a note here Step 2

Add a note hereClick Database Configuration. The External User Databases Configuration pane appears, displaying the following options:

  • Add a note hereWindows Database

  • Add a note hereGeneric LDAP

  • Add a note hereExternal ODBC Database

  • Add a note hereLEAP Proxy RADIUS Server

  • Add a note hereRADIUS Token Server

  • Add a note hereRSA SecurID Token Server

Add a note here Step 3

Add a note hereTo use the Windows database as an external database, click Windows Database. The External User Database Configuration pane appears.

Configuring a Windows Database as the External Database for Cisco Secure ACS

Add a note here The Windows external database configuration has more options than other external database configurations. Because Cisco Secure ACS is native to the Windows operating system, you can configure additional functionality using the Windows external database option, functionality that you cannot configure with other external database options.

Add a note here Step 4

Add a note hereTo configure the additional Windows database functionality, shown in Figure 2-20, click Configure from the External User Database Configuration pane. The Windows User Database Configuration window appears.

Click to collapse
Add a note hereFigure 2-20: Configuring the Windows Database

Add a note here Step 5

Add a note hereIf you want to have more control over who is able to authenticate to the network, you can configure the Dialin Permissions option. To configure this, in the Dialin Permission section, check the Verify That “Grant dialin permissions to user” Setting Has Been Enabled from Within the Windows Users Manager for Users Configured for Windows User Database Authentication check box. You must also make sure that the Grant Dial-in Permissions check box is checked in the Windows profile within Windows Users Manager.


Note

Add a note hereThe Dialin Permissions option of Cisco Secure ACS applies to more than just the dialup connections. If a user has this option enabled, it applies to access permission in Windows 2000 and Windows 2003 R2.

Add a note hereAnother option you can configure using the Windows external database is to map databases to domains. This option allows you to have the same username across different domains, all with different passwords.

Authenticating Users with the External Database

Add a note here After you have configured Cisco Secure ACS to communicate with an external user database, you can configure Cisco Secure ACS to authenticate users with the external user database in one of two ways:

  • Add a note here By specific user assignment: You can configure Cisco Secure ACS to authenticate specific users with an external user database.

  • Add a note here By unknown user policy: You can configure Cisco Secure ACS to use an external database to authenticate users not found in the Cisco Secure user database. This method does not require you to define users in the Cisco Secure user database.

Add a note hereFollow these steps to configure the unknown user policy in Cisco Secure ACS:

Add a note here Step 1

Add a note hereIn the navigation bar, click External User Databases.

Add a note here Step 2

Add a note hereClick Unknown User Policy.

Add a note here Step 3

Add a note hereChoose the Check the Following External User Databases option.

Add a note here Step 4

Add a note hereFor each database that you want Cisco Secure ACS to use when attempting to authenticate unknown users, choose the database in the External Databases list and click the Right Arrow button to move it to the Selected Databases list. To remove a database from the Selected Databases list, choose the database, and then click the Left Arrow button to move it back to the External Databases list.

Add a note here Step 5

Add a note hereTo assign the order in which Cisco Secure ACS should use the selected external databases when attempting to authenticate an unknown user, click a database name in the Selected Databases list and click Up or Down to move it into the position you want.


Tip

Add a note herePlace the databases that are most likely to authenticate unknown users at the top of the list.

Add a note here Step 6

Add a note hereClick Submit.

Add a note here Figure 2-21 shows an example of an Unknown User Policy interface.

Click to collapse
Add a note hereFigure 2-21: Cisco Secure ACS Unknown User Policy Interface

Group Setup

Add a note hereAfter a user has been authenticated to an external database, the authorization that takes place is up to Cisco Secure ACS. This can complicate things because users authenticated by a Windows server might require different authorizations than users authenticated by the LDAP server.

Add a note hereBecause of this potential need for different authorizations, you should place users authenticated by the Windows server in one group and users authenticated by the LDAP server in another group. To do this, use database group mappings. Database group mappings enable you to map an authentication server, such as LDAP, Windows, ODBC, and so on, to a group that you have configured in Cisco Secure ACS. For some databases, a user can belong to only one group. For other databases, such as LDAP and Windows, support for group mapping by external database group membership is possible.


Key Topic

Add a note herePlace users authenticated by the Windows server in one group and users authenticated by the LDAP server in another group.

Add a note hereOne of the things you can configure in group setup is Per Group Command Authorization, which uses the Cisco Secure ACS to authorize which router commands the users that belong to a group can execute. In Figure 2-22, the group is permitted to execute any router commands except show running-config. This example is configured by doing the following:

Add a note here Step 1

Add a note hereClick Permit in the Unmatched Cisco IOS commands option.

Add a note here Step 2

Add a note hereCheck the Command check box and enter show in the text box. In the Arguments text box, enter deny running-config.

Add a note here Step 3

Add a note hereFor the Unlisted arguments option, click Permit.

Click to collapse
Add a note hereFigure 2-22: Configuring Group Setup in Cisco Secure ACS

Note

Add a note hereTo access the Group Setup window, click Group Setup in the navigation bar.

User Setup

Add a note hereThe configuration of user access is a critical task for configuring Cisco Secure ACS. Follow these steps to add a user account to the Cisco Secure ACS Server database:

Add a note here Step 1

Add a note hereClick User Setup in the navigation bar.

Add a note here Step 2

Add a note here Enter a username in the User field and click Add/Edit.

Add a note here Step 3

Add a note hereIn the Edit pane, enter data in the fields to define the user account. Among the fields you will likely need are the user password fields, TACACS+ Enable Control, TACACS+ Enable Password, and TACACS+ Shell Command Authorization.

Add a note here Step 4

Add a note hereClick Submit.


Note

Add a note hereIf there are user properties that you do not see, you might need to modify the interface configuration. To modify the user interface, choose Interface Configuration > User Data Configuration.

Add a note here Figure 2-23 shows how to accomplish user setup in Cisco Secure ACS.

Click to collapse
Add a note hereFigure 2-23: User Setup Window in Cisco Secure ACS

Add a note here Configuring TACACS+ Support on a Cisco Router

Add a note hereThe next step in configuring the router for TACACS+ support is to specify a list of available Cisco Secure ACS servers that will provide TACACS+ services for the router. Follow these steps to use Cisco SDM to add a TACACS+ server to the router:

Add a note here Step 1

Add a note hereFrom the Cisco SDM home page, choose Configure > Additional Tasks > AAA > AAA Servers and Groups > AAA Servers.

Add a note here Step 2

Add a note hereIn the AAA Servers pane, click Add. The Add AAA Server window appears. Choose TACACS+ from the Server Type list box, as shown in Figure 2-24.

Click to collapse
Add a note hereFigure 2-24: Adding a AAA Server

Add a note here Step 3

Add a note hereEnter the IP address or hostname of the AAA server in the Server IP or Host field. If the router has not been configured to use a DNS server, enter an IP address.

Add a note here Step 4

Add a note here If you want the router to maintain a single open connection to the TACACS+ server, rather than opening and closing a TCP connection each time it communicates with the server, check the Single Connection to Server (for CiscoSecure) check box. A single open connection is more efficient because it allows the TACACS+ server to handle a higher number of TACACS+ operations.

Add a note here Step 5

Add a note hereIf you want to override AAA server global settings and specify a server-specific timeout value, in the Server-Specific Setup section enter a value in the Timeout (seconds) field. This field determines how long the router will wait for a response from this server before going on to the next server in the group list. If you do not enter a value, the router uses the value configured in the AAA Servers Global Settings window.

Add a note here Step 6

Add a note hereTo configure a server-specific key, check the Configure Key check box and enter the key used to encrypt traffic between the router and this server in the New Key field. Reenter the key in the Confirm Key field for confirmation. If you do not check this option and enter a value, the router uses the value that was configured in the AAA Servers Global Settings window.

Add a note here Step 7

Add a note hereClick OK.

Add a note hereThe resulting CLI command that Cisco SDM will generate following the preceding steps is tacacs-server host 10.0.1.1 key secretkey.

Creating a AAA Login Authentication Policy

Add a note hereAfter you enable AAA and configure the TACACS+ servers, you can configure the router to use the Cisco Secure ACS server to authenticate users logging in to the router. To configure the router to use the Cisco Secure ACS server for login authentication, you must create a user-defined authentication login method list or edit the default method list, and then apply this list to a router interface or line. The default method list is automatically applied to all interfaces and lines except those that have a user-defined method list explicitly applied. A user-defined method list overrides the default method list.


Note

Add a note hereThe default login policy does not apply to Cisco SDM.

Add a note hereFollow these steps to use Cisco SDM to configure a user-defined authentication login method list:

Add a note here Step 1

Add a note hereFrom the Cisco SDM home page, choose Configure > Additional Tasks > AAA > Authentication Policies > Login.

Add a note here Step 2

Add a note hereIn the Authentication Login pane, click Add.

Add a note here Step 3

Add a note hereTo create a new authentication login method, choose User Defined from the Name drop-down list.

Add a note here Step 4

Add a note hereEnter the authentication login method list name in the Specify field. The example in Figure 2-25 enters TACACS_SERVER as the method list name.

Click to collapse
Add a note hereFigure 2-25: Creating a AAA Login Authentication Policy

Add a note here Step 5

Add a note hereClick Add to define the methods that this policy uses. The Select Method List(s) for Authentication Login window appears.

Add a note here Step 6

Add a note hereChoose group tacacs+ from the method list, as shown previously in Figure 2-25.

Add a note here Step 7

Add a note hereClick OK to add group tacacs+ to the method list and return to the Add a Method List for Authentication Login window.

Add a note here Step 8

Add a note hereClick Add to add a backup method to this policy. The Select Method List(s) for Authentication Login window appears.

Add a note here Step 9

Add a note hereChoose Enable from the method list to use the enable password as the backup login authentication method.

Add a note here Step 10

Add a note hereClick OK to add enable to the method list and return to the Add a Method List for Authentication Login window.

Add a note here Step 11

Add a note hereClick OK to add the authentication login method list and return to the Authentication Login screen.

Add a note hereThe resulting CLI command that Cisco SDM generates is aaa authentication login TACACS_SERVER group tacacs+ enable.

Applying an Authentication Policy

Add a note hereOnce you create the authentication login method lists, you can apply the lists to lines and interfaces on the router.

Add a note here Follow these steps to apply an authentication policy to a router line using Cisco SDM:

Add a note here Step 1

Add a note hereChoose Configure > Additional Tasks > Router Access > VTY.

Add a note here Step 2

Add a note hereFrom the VTY Lines window, click the Edit button to make changes to the vty lines. The Edit VTY Lines window appears.

Add a note here Step 3

Add a note hereFrom the Authentication Policy list box, choose the authentication policy that you want to apply to the vty lines. In Figure 2-26, the authentication policy named TACACS_SERVER is applied to vty lines 0 to 4.

Click to collapse
Add a note hereFigure 2-26: Applying an Authentication Policy

Add a note here Example 2-27 shows the resulting CLI commands that Cisco SDM will generate in Figure 2-26.

Add a note here Example 2-27: AAA Authentication Policy on vty Lines

Add a note hereRouter(config)# line vty 0 4
Router(config-line)# login authentication TACACS_SERVER

Add a note hereYou can also use the CLI to apply an authentication policy to lines or interfaces. Use the CLI command login authentication {default | list-name} in line configuration mode or interface configuration mode, where list-name is the name of the method list that was created and default is the default list.

Creating a AAA Exec Authorization Policy

Add a note here Because the TACACS+ protocol allows you to separate authentication from authorization, you can configure a router to restrict the user to be able to perform only certain functions after successful authentication. You can configure authorization for both character mode (exec authorization) and packet mode (network authorization).

Add a note hereTo configure the router to use the Cisco Secure ACS server for authorization, you must create a user-defined authorization method list or edit the default authorization method list. The default authorization method list is automatically applied to all interfaces except those that have a user-defined authorization method list explicitly applied. A user-defined authorization method list overrides the default authorization method list.


Tip

Add a note hereTo avoid locking yourself out of the router, make sure you configure authorization on the Cisco Secure ACS before you configure the router for authorization.

Add a note hereAlso as a precaution, you should consider logging on the router console in privilege mode before starting the authorization configuration.

Add a note hereFollow these steps to use Cisco SDM to configure the default authorization method list for character mode (exec) access:

Add a note here Step 1

Add a note hereFrom the Cisco SDM home page, choose Configure > Additional Tasks > AAA > Authorization Policies > Exec.

Add a note here Step 2

Add a note hereIn the Exec Authorization pane, click Edit.

Add a note here Step 3

Add a note hereIn the Edit a Method List for Exec Authorization window, click Delete to remove the local method.

Add a note here Step 4

Add a note hereIn the Edit a Method List for Exec Authorization window, click Add to define the method that this policy uses, as shown in Figure 2-27.

Click to collapse
Add a note hereFigure 2-27: Creating a AAA Exec Authorization Policy

Add a note here Step 5

Add a note hereFrom the Select Method List(s) for Exec Authorization window, choose group tacacs+ from the method list.

Add a note here Step 6

Add a note hereClick OK to return to the Add a Method List for Exec Authorization window.

Add a note here Step 7

Add a note hereClick OK to return to the Exec Authorization pane.

Add a note hereThe resulting CLI command that Cisco SDM will generate is aaa authorization exec default group tacacs+.

Creating a AAA Network Authorization Policy

Add a note hereFollow these steps to use Cisco SDM to configure the default authorization method list for packet mode (network) access:

Add a note here Step 1

Add a note hereFrom the Cisco SDM home page, choose Configure > Additional Tasks > AAA > Authorization Policies > Network.

Add a note here Step 2

Add a note hereIn the Network Authorization pane, click Add.

Add a note here Step 3

Add a note here In the Add a Method List for Network Authorization window, choose Default from the Name drop-down list.

Add a note here Step 4

Add a note hereClick Add to define the methods that this policy uses.

Add a note here Step 5

Add a note hereFrom the Select Method List(s) for Network Authorization window, choose group tacacs+ from the method list, as shown in Figure 2-28.

Click to collapse
Add a note hereFigure 2-28: Creating a AAA Network Authorization Policy

Add a note here Step 6

Add a note hereClick OK to return to the Add a Method List for Network Authorization window.

Add a note here Step 7

Add a note hereClick OK to return to the Network Authorization pane.

Add a note hereThe resulting CLI command that Cisco SDM will generate is aaa authorization network default group tacacs+.

AAA Accounting Configuration

Add a note hereCisco Secure ACS serves as a central repository for accounting information, essentially tracking events that occur on the network. Each session that is established through Cisco Secure ACS can be fully accounted for, and stored on, the server. This stored information can be very helpful for management, security audits, capacity planning, and network-usage billing.

Add a note hereLike authentication and authorization method lists, method lists for accounting define the way accounting will be performed and the sequence in which these methods are performed. The default accounting method list is automatically applied to all interfaces except those that have a named accounting method list explicitly defined. A defined accounting method list overrides the default accounting method list.

Add a note here AAA supports six different types of accounting: network, connection, exec, system, command, and resource.

Add a note hereCurrently, AAA accounting can be configured only via the CLI.

Add a note hereTo configure AAA accounting using named method lists, use the commands shown in Table 2-12 beginning in global configuration mode.

Add a note here Table 2-12: AAA Accounting Using Named Method Lists Procedure
Open table as spreadsheet

Add a note hereStep

Add a note hereAction

Add a note hereNotes

Add a note here1.

Add a note hereRouter(config)# aaa accounting {system | network | exec | connection | commands level} {default | list-name} {start-stop | stop-only | none} [method1 [method2...]]

Add a note hereThis command creates an accounting method list and enables accounting. The argument list-name is a character string used to name the list you are creating. To edit the default method list, use the default parameter.

Add a note here level refers to a specific privilege level, such as level 15.

Add a note here list-name refers to the name used to identify at least one of the accounting methods, explained below.

Add a note here method refer to local, group tacacs+, group, and so on.

Add a note here2.

Add a note hereRouter(config)# line [aux | console | tty | vty] line-number [ending-line-number]

Add a note hereor

Add a note hereRouter(config)# interface interface-type interface-number

Add a note hereThis command enters the line configuration mode or interface configuration mode for the lines or interface to which you want to apply the accounting method list.

Add a note here3.

Add a note hereRouter(config-line)# accounting {arap | commands level | connection | exec} {default | list-name}

Add a note hereor

Add a note hereRouter(config-if)# ppp accounting {default | list-name}

Add a note hereThis command applies the accounting method list to a line or set of lines, or to an interface or set of interfaces.

Add a note here Named accounting method lists are specific to the indicated type of accounting. The aaa accounting parameters shown in Table 2-13 describes the types of accounting that can use named accounting method lists. The aaa accounting command enables you to specify how much information to record for accounting. Table 2-13 also describes the AAA accounting record types.

Add a note here Table 2-13: aaa accounting Command Parameters
Open table as spreadsheet

Add a note hereParameter

Add a note hereDescription

Add a note here system

Add a note herePerforms accounting for all system-level events not associated with users, such as reloads.

Add a note hereNote that when system accounting is used and the accounting server is unreachable at system startup time, the system will not be accessible for approximately 2 minutes.

Add a note here default

Add a note hereUses the listed accounting methods that follow this keyword as the default list of methods for accounting services.

Add a note here network

Add a note hereThis parameter creates a method list to enable accounting for all network-related service requests, including SLIP, PPP, PPP NCP, and ARAP protocols.

Add a note here exec

Add a note hereThis parameter creates a method list that provides accounting records about user EXEC terminal sessions on the network access server, including username, date, start and stop times.

Add a note here connection

Add a note hereThis parameter creates a method list that provides accounting information about all outbound connections made from the network access server.

Add a note here commands

Add a note hereThis parameter creates a method list that provides accounting information about specific, individual EXEC commands associated with a specific privilege level.

Add a note here start-stop

Add a note hereThis parameter instructs the TACACS+ server to send a start accounting notice at the beginning of the requested event and a stop accounting notice at the end of the event.

Add a note here stop-only

Add a note hereThis parameter instructs the TACACS+ server to send a stop record accounting notice at the end of the requested user process.

Add a note here none

Add a note hereThis parameter instructs the TACACS+ server to stop all accounting activities on this line or interface.


Note

Add a note hereSystem accounting provides information about all system-level events, such as when the system reboots or when accounting is turned on or off. System accounting does not use named method lists. For system accounting, you can define only the default method list.

AAA Configuration for TACACS+ Example

Add a note here Example 2-28 shows the resulting running configuration of a router that has been configured for TACACS+ services using Cisco SDM and CLI commands.

Add a note here Example 2-28: Example of AAA Configuration for TACACS+

Add a note hereaaa new-model
!
aaa authentication login TACACS_SERVER tacacs+ local
aaa authorization exec tacacs+
aaa authorization network tacacs+
aaa accounting exec start-stop tacacs+
aaa accounting network start-stop tacacs+
aaa accounting commands 15 default stop-only group tacacs+
!
!
tacacs-server host 10.0.1.11
tacacs-server key ciscosecure
!
line vty 0 4
login authentication TACACS_SERVER

Add a note here The following is an explanation of the commands displayed in Example 2-28:

  • Add a note here aaa new-model: Enables AAA

  • Add a note here aaa authentication login TACACS_SERVER tacacs+ local: Defines a AAA login policy entitled TACACS_SERVER that uses TACACS+ as the first authentication method and the local database as a second method if TACACS+ is unavailable

  • Add a note here aaa authorization exec tacacs+: Defines a AAA authorization policy that utilizes TACACS+ for access to an EXEC prompt

  • Add a note here aaa authorization network tacacs+: Defines a AAA authorization policy that utilizes TACACS+ for network access

  • Add a note here aaa accounting exec start-stop tacacs+: Defines a AAA accounting policy that utilizes TACACS+ for logging both start and stop records for user EXEC terminal sessions

  • Add a note here aaa accounting network start-stop tacacs+: Defines a AAA accounting policy that utilizes TACACS+ for logging both start and stop records for all network-related service requests

  • Add a note here aaa accounting commands 15 default stop-only group tacacs+: Defines a default commands accounting method list, where accounting services are provided by a TACACS+ security server, set for privilege level 15 commands with a stop-only restriction

  • Add a note here tacacs-server host 10.0.1.11: Configures the IP address of the TACACS+ server

  • Add a note here tacacs-server key ciscosecure: Configures an encryption key of ciscosecure to be used when communicating with the TACACS+ server

  • Add a note here line vty 0 4: Enters line configuration mode for vty 0 through vty 4

  • Add a note here login authentication TACACS_SERVER: Applies the AAA authentication policy named TACACS_SERVER to all five vty lines

Add a note here Troubleshooting TACACS+

Add a note hereUse the debug aaa authentication command in privileged EXEC mode to get a high-level view of login activity. When the TACACS+ protocol is used on the router, you can also use the debug tacacs command for more detailed debugging information. To disable debugging output, use the no form of this command.

Add a note here Example 2-29 provides sample output from the debug aaa authentication command for a TACACS+ login attempt that was successful. The information indicates that TACACS+ is the authentication method that was used.

Add a note here Example 2-29: Sample debug aaa authentication and debug tacacts+ Output

Add a note hereRouter# debug aaa authentication


14:01:17: AAA/AUTHEN (567936829): Method=TACACS+
14:01:17: TAC+: send AUTHEN/CONT packet
14:01:17: TAC+ (567936829): received authen response status = PASS
14:01:17: AAA/AUTHEN (567936829): status = PASS
The following is sample output from the debug tacacs command for a TACACS+ login
attempt that was successful, as indicated by the status PASS:
Router# debug tacacs

14:00:09: TAC+: Opening TCP/IP connection to 192.168.60.15 using source
10.116.0.79
14:00:09: TAC+: Sending TCP/IP packet number 383258052-1 to 192.168.60.15
(AUTHEN/START)
14:00:09: TAC+: Receiving TCP/IP packet number 383258052-2 from 192.168.60.15
14:00:09: TAC+ (383258052): received authen response status = GETUSER
14:00:10: TAC+: send AUTHEN/CONT packet
14:00:10: TAC+: Sending TCP/IP packet number 383258052-3 to 192.168.60.15
(AUTHEN/CONT)
14:00:10: TAC+: Receiving TCP/IP packet number 383258052-4 from 192.168.60.15
14:00:10: TAC+ (383258052): received authen response status = GETPASS
14:00:14: TAC+: send AUTHEN/CONT packet
14:00:14: TAC+: Sending TCP/IP packet number 383258052-5 to 192.168.60.15
(AUTHEN/CONT)
14:00:14: TAC+: Receiving TCP/IP packet number 383258052-6 from 192.168.60.15
14:00:14: TAC+ (383258052): received authen response status = PASS
14:00:14: TAC+: Closing TCP/IP connection to 192.168.60.15

Add a note here Example 2-30 shows sample output from the debug tacacs command for a TACACS+ login attempt that was unsuccessful, as indicated by the status FAIL.

Add a note here Example 2-30: debug tacacs Command for an Unsuccessful TACACS+ Login Attempt

Add a note hereRouter# debug tacacs


13:53:35: TAC+: Opening TCP/IP connection to 192.168.60.15 using source
192.48.0.79
13:53:35: TAC+: Sending TCP/IP packet number 416942312-1 to 192.168.60.15
(AUTHEN/START)
13:53:35: TAC+: Receiving TCP/IP packet number 416942312-2 from 192.168.60.15
13:53:35: TAC+ (416942312): received authen response status = GETUSER
13:53:37: TAC+: send AUTHEN/CONT packet
13:53:37: TAC+: Sending TCP/IP packet number 416942312-3 to 192.168.60.15
(AUTHEN/CONT)
13:53:37: TAC+: Receiving TCP/IP packet number 416942312-4 from 192.168.60.15
13:53:37: TAC+ (416942312): received authen response status = GETPASS
13:53:38: TAC+: send AUTHEN/CONT packet
13:53:38: TAC+: Sending TCP/IP packet number 416942312-5 to 192.168.60.15
(AUTHEN/CONT)
13:53:38: TAC+: Receiving TCP/IP packet number 416942312-6 from 192.168.60.15
13:53:38: TAC+ (416942312): received authen response status = FAIL
13:53:40: TAC+: Closing TCP/IP connection to 192.168.60.15

Add a note here To display information from the TACACS+ helper process, use the debug tacacs events command in privileged EXEC mode. To disable debugging output, use the no form of this command.


Note

Add a note hereUse the debug tacacs events command with caution, because it can generate a substantial amount of output.

Add a note hereAlso, because console ports communicate at 9600 bauds, it is recommended to send debug output to syslog server and enter no logging console on the router.

Add a note here Example 2-31 shows sample output from the debug tacacs events command. The example shows the opening and closing of a TCP connection to a TACACS+ server, the bytes read and written over the connection, and the TCP status of the connection:

Add a note here Example 2-31: debug tacacs event Command Output

Add a note hereRouter# debug tacacs events


%LINK-3-UPDOWN: Interface Async2, changed state to up
00:03:16: TAC+: Opening TCP/IP to 192.168.58.104/1049 timeout=15
00:03:16: TAC+: Opened TCP/IP handle 0x48A87C to 192.168.58.104/1049
00:03:16: TAC+: periodic timer started
00:03:16: TAC+: 192.168.58.104 req=3BD868 id=-1242409656 ver=193 handle=0x48A87C
(ESTAB)
expire=14 AUTHEN/START/SENDAUTH/CHAP queued
00:03:17: TAC+: 192.168.58.104 ESTAB 3BD868 wrote 46 of 46 bytes
00:03:22: TAC+: 192.168.58.104 CLOSEWAIT read=12 wanted=12 alloc=12 got=12
00:03:22: TAC+: 192.168.58.104 CLOSEWAIT read=61 wanted=61 alloc=61 got=49
00:03:22: TAC+: 192.168.58.104 received 61 byte reply for 3BD868
00:03:22: TAC+: req=3BD868 id=-1242409656 ver=193 handle=0x48A87C (CLOSEWAIT)
expire=9
AUTHEN/START/SENDAUTH/CHAP processed
00:03:22: TAC+: periodic timer stopped (queue empty)
00:03:22: TAC+: Closing TCP/IP 0x48A87C connection to 192.168.58.104/1049
00:03:22: TAC+: Opening TCP/IP to 192.168.58.104/1049 timeout=15
00:03:22: TAC+: Opened TCP/IP handle 0x489F08 to 192.168.58.104/1049
00:03:22: TAC+: periodic timer started
00:03:22: TAC+: 192.168.58.104 req=3BD868 id=299214410 ver=192 handle=0x489F08
(ESTAB)
expire=14 AUTHEN/START/SENDPASS/CHAP queued
00:03:23: TAC+: 192.168.58.104 ESTAB 3BD868 wrote 41 of 41 bytes
00:03:23: TAC+: 192.168.58.104 CLOSEWAIT read=12 wanted=12 alloc=12 got=12
00:03:23: TAC+: 192.168.58.104 CLOSEWAIT read=21 wanted=21 alloc=21 got=9
00:03:23: TAC+: 192.168.58.104 received 21 byte reply for 3BD868
00:03:23: TAC+: req=3BD868 id=299214410 ver=192 handle=0x489F08 (CLOSEWAIT)
expire=13
AUTHEN/START/SENDPASS/CHAP processed
00:03:23: TAC+: periodic timer stopped (queue empty)


Note

Add a note hereThe TACACS messages are intended to be self-explanatory to IT service personnel only.

0 comments

Post a Comment