Cisco ACS
Cisco ACS
Appliance
Version 3.2
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION
PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO
LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as
part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE
PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED
OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL
DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR
INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
CCIP, CCSP, the Cisco Arrow logo, the Cisco Powered Network mark, Cisco Unity, Follow Me Browsing, FormShare, and StackWise are trademarks of
Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Aironet, ASIST,
BPX, Catalyst, CCDA, CCDP, CCIE, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press,
Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherSwitch,
Fast Step, GigaStack, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys, MGX, MICA, the
Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, RateMUX, Registrar, ScriptShare, SlideCast,
SMARTnet, StrataView Plus, Stratm, SwitchProbe, TeleRouter, The Fastest Way to Increase Your Internet Quotient, TransPath, and VCO are registered
trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (0402R)
Preface xxiii
Objective xxiii
Audience xxiii
Organization xxiv
Conventions xxv
Related Documentation xxvii
Obtaining Documentation xxviii
Cisco.com xxviii
Ordering Documentation xxviii
Documentation Feedback xxix
Obtaining Technical Assistance xxix
Cisco TAC Website xxix
Opening a TAC Case xxx
TAC Case Priority Definitions xxx
Obtaining Additional Publications and Information xxxi
TACACS+ 1-6
RADIUS 1-6
Authentication 1-8
Authentication Considerations 1-8
Authentication and User Databases 1-9
Authentication Protocol-Database Compatibility 1-9
Passwords 1-10
Other Authentication-Related Features 1-16
Authorization 1-16
Max Sessions 1-17
Dynamic Usage Quotas 1-18
Shared Profile Components 1-18
Support for Cisco Device-Management Applications 1-18
Other Authorization-Related Features 1-20
Accounting 1-20
Other Accounting-Related Features 1-21
Administration 1-21
HTTP Port Allocation for Administrative Sessions 1-22
Network Device Groups 1-22
Other Administration-Related Features 1-23
Cisco Secure ACS HTML Interface 1-24
About the Cisco Secure ACS HTML Interface 1-24
HTML Interface Security 1-25
HTML Interface Layout 1-25
Uniform Resource Locator for the HTML Interface 1-27
Network Environments and Administrative Sessions 1-27
Administrative Sessions and HTTP Proxy 1-28
Administrative Sessions through Firewalls 1-28
Administrative Sessions through a NAT Gateway 1-29
Accessing the HTML Interface 1-29
Creating a Cisco Secure ACS Group Mapping for a Token Server or LEAP
Proxy RADIUS Server Database 15-3
Group Mapping by Group Set Membership 15-4
Group Mapping Order 15-5
No Access Group for Group Set Mappings 15-5
Default Group Mapping for Windows 15-6
Creating a Cisco Secure ACS Group Mapping for Windows, Novell NDS, or
Generic LDAP Groups 15-6
Editing a Windows, Novell NDS, or Generic LDAP Group Set Mapping 15-8
Deleting a Windows, Novell NDS, or Generic LDAP Group Set
Mapping 15-10
Deleting a Windows Domain Group Mapping Configuration 15-11
Changing Group Set Mapping Order 15-11
RADIUS-Based Group Specification 15-13
INDEX
Objective
This document will help you configure and use Cisco Secure ACS and its features
and utilities.
Audience
This guide is for system administrators who use Cisco Secure ACS and who set
up and maintain accounts and dial-in network security.
Organization
The Cisco Secure ACS User Guide is organized into the following chapters:
• Chapter 1, “Overview”. An overview of Cisco Secure ACS and its features,
network diagrams, and system requirements.
• Chapter 2, “Deployment Considerations”. A guide to deploying the
Cisco Secure ACS that includes requirements, options, trade-offs, and
suggested sequences.
• Chapter 3, “Interface Configuration”. Concepts and procedures regarding
how to use the Interface Configuration section of the Cisco Secure ACS to
configure the HTML interface.
• Chapter 4, “Network Configuration”. Concepts and procedures for
establishing Cisco Secure ACS network configuration and building a
distributed system.
• Chapter 5, “Shared Profile Components”. Concepts and procedures regarding
Cisco Secure ACS shared profile components: network access restrictions
and device command sets.
• Chapter 6, “User Group Management”. Concepts and procedures for
establishing and maintaining Cisco Secure ACS user groups.
• Chapter 7, “User Management”. Concepts and procedures for establishing
and maintaining Cisco Secure ACS user accounts.
• Chapter 8, “System Configuration: Basic”. Concepts and procedures
regarding the basic features found in the System Configuration section of
Cisco Secure ACS.
• Chapter 9, “System Configuration: Advanced”. Concepts and procedures
regarding RDBMS Synchronization and CiscoSecure Database Replication,
found in the System Configuration section of Cisco Secure ACS.
• Chapter 10, “System Configuration: Authentication and Certificates”.
Concepts and procedures regarding the Global Authentication and ACS
Certificate Setup pages, found in the System Configuration section of
Cisco Secure ACS.
• Chapter 11, “Logs and Reports”. Concepts and procedures regarding
Cisco Secure ACS logging and reports.
Conventions
This guide uses the following typographical conventions:
Convention Meaning
Italics Introduces new or important terminology and variable input for
commands.
Convention Meaning
Script Denotes paths, file names, and example screen output. Also
denotes Secure Script translations of security policy decision
trees.
Bold Identifies special terminology and options that should be
selected during procedures.
Tip Means the following information will help you solve a problem. The tip
information might not be troubleshooting or even an action, but could be useful
information.
Note Means reader take note. Notes contain helpful suggestions or references to
materials not covered in the manual.
Caution Means reader be careful. In this situation, you might do something that could
result in equipment damage, loss of data, or a breach in your network security.
Warning Means danger. You are in a situation that could cause bodily injury. Before you
work on any equipment, you must be aware of the hazards involved with
electrical circuitry and be familiar with standard practices for preventing
accidents. To see translated versions of the warning, refer to the Regulatory
Compliance and Safety document that accompanied the device.
Related Documentation
Note Although every effort has been made to validate the accuracy of the information
in the printed and electronic documentation, you should also review
Cisco Secure ACS documentation on Cisco.com for any updates.
You should refer to the documentation that came with your AAA clients for more
information about those products. You might also want to consult the Cisco
Systems publication Cisco Systems’ Internetworking Terms and Acronyms.
Obtaining Documentation
Cisco documentation and additional literature are available on Cisco.com. Cisco
also provides several ways to obtain technical assistance and other technical
resources. These sections explain how to obtain technical information from Cisco
Systems.
Cisco.com
You can access the most current Cisco documentation on the World Wide Web at
this URL:
http://www.cisco.com/univercd/home/home.htm
You can access the Cisco website at this URL:
http://www.cisco.com
International Cisco websites can be accessed from this URL:
http://www.cisco.com/public/countries_languages.shtml
Ordering Documentation
You can find instructions for ordering documentation at this URL:
http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm
You can order Cisco documentation in these ways:
• Registered Cisco.com users (Cisco direct customers) can order Cisco product
documentation from the Ordering tool:
http://www.cisco.com/en/US/partner/ordering/index.shtml
Documentation Feedback
You can submit e-mail comments about technical documentation to
bug-doc@cisco.com.
You can submit comments by using the response card (if present) behind the front
cover of your document or by writing to the following address:
Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
Accessing all the tools on the Cisco TAC website requires a Cisco.com user ID
and password. If you have a valid service contract but do not have a login ID or
password, register at this URL:
http://tools.cisco.com/RPF/register/register.do
Cisco Secure
Access Control Server
67472
database
Cisco Secure ACS centralizes access control and accounting, in addition to router
and switch access management. With Cisco Secure ACS, network administrators
can quickly administer accounts and globally change levels of service offerings
for entire groups of users. Although the external user database shown in
Figure 1-1 is optional, support for many popular user repository implementations
enables companies to put to use the working knowledge gained from and the
investment already made in building their corporate user repositories.
Cisco Secure ACS supports Cisco AAA clients such as the Cisco 2509, 2511,
3620, 3640, AS5200 and AS5300, AS5800, the Cisco PIX Firewall, Cisco
Aironet Access Point wireless networking devices, Cisco VPN 3000
Concentrators, and Cisco VPN 5000 Concentrators. It also supports third-party
devices that can be configured with the Terminal Access Controller Access
Control System (TACACS+) or the Remote Access Dial-In User Service
(RADIUS) protocol. Cisco Secure ACS treats all such devices as AAA clients.
Cisco Secure ACS uses the TACACS+ and RADIUS protocols to provide AAA
services that ensure a secure environment. For more information about support for
TACACS+ and RADIUS in Cisco Secure ACS, see AAA Protocols—TACACS+
and RADIUS, page 1-6.
Note For hardware specifications of the Cisco Secure ACS Appliance, see the
Installation and Setup Guide for Cisco Secure ACS.
use the same AAA protocol and use the same shared secret. If you make use
of this ability, the number of actual AAA clients supported can be
considerably higher than 5000.
TACACS+
Cisco Secure ACS conforms to the TACACS+ protocol as defined by Cisco
Systems in draft 1.77. For more information, refer to the Cisco IOS software
documentation or Cisco.com (http://www.cisco.com).
RADIUS
Cisco Secure ACS conforms to the RADIUS protocol as defined in draft April
1997 and in the following Requests for Comments (RFCs):
• RFC 2138, Remote Authentication Dial In User Service
• RFC 2139, RADIUS Accounting
• RFC 2865
• RFC 2866
• RFC 2867
• RFC 2868
• RFC 2869
The ports used for authentication and accounting have changed in RADIUS RFC
documents. To support both the older and newer RFCs, Cisco Secure ACS accepts
authentication requests on port 1645 and port 1812. For accounting, Cisco Secure
ACS accepts accounting packets on port 1646 and 1813.
In addition to support for standard IETF RADIUS attributes, Cisco Secure ACS
includes support for RADIUS vendor-specific attributes (VSAs). We have
predefined the following RADIUS VSAs in Cisco Secure ACS:
• Cisco IOS/PIX
• Cisco VPN 3000
• Cisco VPN 5000
• Ascend
• Juniper
• Microsoft
• Nortel
Cisco Secure ACS also supports up to 10 RADIUS VSAs that you define. After
you define a new RADIUS VSA, you can use it as you would one of the RADIUS
VSAs that come predefined in Cisco Secure ACS. In the Network Configuration
section of the Cisco Secure ACS HTML interface, you can configure a AAA
client to use a user-defined RADIUS VSA as its AAA protocol. In Interface
Configuration, you can enable user-level and group-level attributes for
user-defined RADIUS VSAs. In User Setup and Group Setup, you can configure
the values for enabled attributes of a user-defined RADIUS VSA.
For more information about creating user-defined RADIUS VSAs, see Custom
RADIUS Vendors and VSAs, page 9-27.
Authentication
Authentication determines user identity and verifies the information. Traditional
authentication uses a name and a fixed password. More modern and secure
methods use technologies such as CHAP and one-time passwords (OTPs).
Cisco Secure ACS supports a variety of these authentication methods.
There is a fundamental implicit relationship between authentication and
authorization. The more authorization privileges granted to a user, the stronger the
authentication should be. Cisco Secure ACS supports this relationship by
providing various methods of authentication.
Authentication Considerations
Username and password is the most popular, simplest, and least expensive
method used for authentication. No special equipment is required. This is a
popular method for service providers because of its easy application by the client.
The disadvantage is that this information can be told to someone else, guessed, or
captured. Simple unencrypted username and password is not considered a strong
authentication mechanism but can be sufficient for low authorization or privilege
levels such as Internet access.
To reduce the risk of password capturing on the network, use encryption. Client
and server access control protocols such as TACACS+ and RADIUS encrypt
passwords to prevent them from being captured within a network. However,
TACACS+ and RADIUS operate only between the AAA client and the access
control server. Before this point in the authentication process, unauthorized
persons can obtain clear-text passwords, such as the communication between an
end-user client dialing up over a phone line or an ISDN line terminating at a
network access server, or over a Telnet session between an end-user client and the
hosting device.
Network administrators who offer increased levels of security services, and
corporations that want to lessen the chance of intruder access resulting from
password capturing, can use an OTP. Cisco Secure ACS supports several types of
OTP solutions, including PAP for Point-to-Point Protocol (PPP) remote-node
login. Token cards are considered one of the strongest OTP authentication
mechanisms.
Table 1-2 Non-EAP Authentication Protocol and User Database Compatibility (continued)
PEAP
PEAP (EAP-MS EAP-FAST EAP-FAST
Database LEAP EAP-MD5 EAP-TLS (EAP-GTC) CHAPv2) Phase Zero Phase Two
Cisco Secure Yes Yes Yes Yes Yes Yes Yes
ACS
Windows SAM Yes No No Yes Yes Yes Yes
Windows AD Yes No Yes Yes Yes Yes Yes
LDAP No No Yes Yes No No Yes
Novell NDS No No Yes Yes No No Yes
LEAP Proxy Yes No No Yes Yes Yes Yes
RADIUS Server
All Token No No No Yes No No No
Servers
Passwords
Cisco Secure ACS supports many common password protocols:
• ASCII/PAP
• CHAP
• MS-CHAP
• LEAP
• EAP-MD5
• EAP-TLS
• PEAP(EAP-GTC)
• PEAP(EAP-MSCHAPv2)
• EAP-FAST
• ARAP
Passwords can be processed using these password authentication protocols based
on the version and type of security control protocol used (for example, RADIUS
or TACACS+) and the configuration of the AAA client and end-user client. The
following sections outline the different conditions and functions of password
handling.
In the case of token servers, Cisco Secure ACS acts as a client to the token server,
using either its proprietary API or its RADIUS interface, depending on the token
server. For more information, see About Token Servers and Cisco Secure ACS,
page 13-58.
Different levels of security can be concurrently used with Cisco Secure ACS for
different requirements. The basic user-to-network security level is PAP. Although
it represents the unencrypted security, PAP does offer convenience and simplicity
for the client. PAP allows authentication against the Windows database. With this
configuration, users need to log in only once. CHAP allows a higher level of
security for encrypting passwords when communicating from an end-user client
to the AAA client. You can use CHAP with the CiscoSecure user database. ARAP
support is included to support Apple clients.
PAP, CHAP, and ARAP are authentication protocols used to encrypt passwords.
However, each protocol provides a different level of security.
• PAP—Uses clear-text passwords (that is, unencrypted passwords) and is the
least sophisticated authentication protocol. If you are using the Windows user
database to authenticate users, you must use PAP password encryption or
MS-CHAP.
• CHAP—Uses a challenge-response mechanism with one-way encryption on
the response. CHAP enables Cisco Secure ACS to negotiate downward from
the most secure to the least secure encryption mechanism, and it protects
MS-CHAP
EAP Support
Password Aging
With Cisco Secure ACS you can choose whether and how you want to employ
password aging. Control for password aging may reside either in the CiscoSecure
user database, or in a Windows user database. Each password aging mechanism
differs as to requirements and setting configurations.
The password aging feature controlled by the CiscoSecure user database enables
you force users to change their passwords under any of the following conditions:
• After a specified number of days.
• After a specified number of logins.
• The first time a new user logs in.
For information on the requirements and configuration of the password aging
feature controlled by the CiscoSecure user database, see Enabling Password
Aging for the CiscoSecure User Database, page 6-20.
The Windows-based password aging feature enables you to control the following
password aging parameters:
• Maximum password age in days.
• Minimum password age in days.
The methods and functionality of Windows password aging differ according to
which Windows operating system you use and whether you employ Active
Directory (AD) or Security Accounts Manager (SAM). For information on the
requirements and configuration of the Windows-based password aging feature,
see Enabling Password Aging for Users in Windows Databases, page 6-25.
User-Changeable Passwords
With Cisco Secure ACS, you can install a separate program that enables users to
change their passwords by using a web-based utility. For more information about
installing user-changeable passwords, see the Installation and User Guide for
Cisco Secure ACS User-Changeable Passwords.
Authorization
Authorization determines what a user is allowed to do. Cisco Secure ACS can
send user profile policies to a AAA client to determine the network services the
user can access. You can configure authorization to give different users and
groups different levels of service. For example, standard dial-up users might not
have the same access privileges as premium customers and users. You can also
differentiate by levels of security, access times, and services.
The Cisco Secure ACS access restrictions feature enables you to permit or deny
logins based on time-of-day and day-of-week. For example, you could create a
group for temporary accounts that can be disabled on specified dates. This would
make it possible for a service provider to offer a 30-day free trial. The same
authorization could be used to create a temporary account for a consultant with
login permission limited to Monday through Friday, 9 A.M. to 5 P.M.
Max Sessions
Max Sessions is a useful feature for organizations that need to limit the number
of concurrent sessions available to either a user or a group:
• User Max Sessions—For example, an Internet service provider can limit
each account holder to a single session.
• Group Max Sessions—For example, an enterprise administrator can allow
the remote access infrastructure to be shared equally among several
departments and limit the maximum number of concurrent sessions for all
users in any one department.
In addition to enabling simple User and Group Max Sessions control,
Cisco Secure ACS enables the administrator to specify a Group Max Sessions
value and a group-based User Max Sessions value; that is, a User Max Sessions
value based on the group membership of the user. For example, an administrator
can allocate a Group Max Sessions value of 50 to the group “Sales” and also limit
each member of the “Sales” group to 5 sessions each. This way no single member
of a group account would be able to use more than 5 sessions at any one time, but
the group could still have up to 50 active sessions.
For more information about the Max Sessions feature, see Setting Max Sessions
for a User Group, page 6-11, and Setting Max Sessions Options for a User,
page 7-15.
Accounting
AAA clients use the accounting functions provided by the RADIUS and
TACACS+ protocols to communicate relevant data for each user session to the
AAA server for recording. Cisco Secure ACS writes accounting records to
comma-separated value (CSV) log files. You can easily import these logs into
popular database and spreadsheet applications for billing, security audits, and
report generation. You can also use a third-party reporting tool to manage
accounting data. For example, aaa-reports! by Extraxi supports Cisco Secure ACS
(http://www.extraxi.com).
Among the types of accounting logs you can generate are the following:
• TACACS+ Accounting—Lists when sessions start and stop; records AAA
client messages with username; provides caller line identification
information; records the duration of each session.
• RADIUS Accounting—Lists when sessions stop and start; records AAA
client messages with username; provides caller line identification
information; records the duration of each session.
• Administrative Accounting—Lists commands entered on a network device
with TACACS+ command authorization enabled.
For more information about Cisco Secure ACS logging capabilities, see
Chapter 1, “Overview.”
Administration
To configure, maintain, and protect its AAA functionality, Cisco Secure ACS
provides a flexible administration scheme. You can perform nearly all
administration of Cisco Secure ACS through its HTML interface. For more
information about the HTML interface, including steps for accessing the HTML
interface, see Cisco Secure ACS HTML Interface, page 1-24.
Note A broad HTTP port range could create a security risk. To prevent accidental
discovery of an active administrative port by unauthorized users, keep the HTTP
port range as narrow as possible. Cisco Secure ACS tracks the IP address
associated with each administrative session. An unauthorized user would have to
impersonate, or “spoof”, the IP address of the legitimate remote host to make use
of the active administrative session HTTP port.
For information about configuring the HTTP port allocation feature, see Access
Policy, page 12-11.
Using NDGs enables an organization with a large number of AAA clients spread
across a large geographical area to logically organize its environment within
Cisco Secure ACS to reflect the physical setup. For example, all routers in Europe
could belong to a group named Europe; all routers in the United States could
belong to a US group; and so on. This would be especially convenient if the AAA
clients in each region were administered along the same divisions. Alternatively,
the environment could be organized by some other attribute such as divisions,
departments, business functions, and so on.
You can assign a group of users to an NDG. For more information on NDGs, see
Network Device Group Configuration, page 4-36.
Note Most pages have a Submit button at the bottom. Click Submit to
confirm your changes. If you do not click Submit, changes are not
saved.
• Display Area—The frame on the right of the browser window, the display
area shows one of the following options:
– Online Help—Displays basic help about the page currently shown in the
configuration area. This help does not offer in-depth information, rather
it gives some basic information about what can be accomplished in the
middle frame. For more detailed information, click Section Information
at the bottom of the page to go to the applicable part of Online
Documentation.
– Reports or Lists—Displays lists or reports, including accounting
reports. For example, in User Setup you can show all usernames that start
with a specific letter. The list of usernames beginning with a specified
letter is displayed in this section. The usernames are hyperlinks to the
specific user configuration, so clicking the name enables you to edit that
user.
– System Messages—Displays messages after you click Submit if you
have typed in incorrect or incomplete data. For example, if the
information you entered in the Password box does not match the
information in the Confirm Password box in the User Setup section,
While administering Cisco Secure ACS through a firewall that is not performing
NAT is possible, we do not recommend that you administer Cisco Secure ACS
through a firewall. For more information, see HTTP Port Allocation for
Administrative Sessions, page 1-22.
Because the HTML interface uses Java in a few places, the computer running the
browser used to access the HTML interface must have a Java Virtual Machine
available for the use of the browser.
To access the HTML interface, follow these steps:
Step 1 Open a web browser. For a list of supported web browsers, see the Release Notes
for the version of Cisco Secure ACS you are accessing. The latest revision to the
Release Notes is posted on Cisco.com (http://www.cisco.com).
Step 2 In the Address or Location bar in the web browser, type the applicable URL. For
a list of possible URLs, see Uniform Resource Locator for the HTML Interface,
page 1-27.
Step 3 In the Username box, type a valid Cisco Secure ACS administrator name.
Step 4 In the Password box, type the password for the administrator name you specified.
Step 5 Click Login.
The initial page appears.
Note The Logoff button appears in the upper right corner of the browser window,
except on the initial page, where it appears in the upper left of the configuration
area.
Tip Click Section Information on any online help page to view online documentation
relevant to the section of the HTML interface you are using.
Step 1 In the Cisco Secure ACS HTML interface, click Online Documentation.
Tip Use the lettered shortcut links to jump to a particular section of the index.
Entries appear with numbered links after them. The numbered links lead to
separate instances of the entry topic.
c. Click an instance number for the desired topic.
The online documentation for the topic selected appears in the display area.
Step 4 If you want to print the online documentation, click in the display area, and then
click Print in the navigation bar of your browser.
• To have Cisco Secure ACS use the Grant Dial-in Permission to User feature
in Windows when authorizing network users, this option must be selected in
the Windows User Manager or Active Directory Users and Computers for the
applicable user accounts.
Table 2-1 lists the ports that Cisco Secure ACS listens to for communications with
AAA clients, other Cisco Secure ACSes and applications, and web browsers.
Cisco Secure ACS uses other ports to communicate with external user databases;
however, it initiates those communications rather than listening to specific ports.
In some cases, these ports are configurable, such as with LDAP and RADIUS
token server databases. For more information about ports that a particular external
user database listens to, see the documentation for that database.
Network Topology
How your enterprise network is configured is likely to be the most important
factor in deploying Cisco Secure ACS. While an exhaustive treatment of this topic
is beyond the scope of this guide, this section details how the growth of network
topology options has made Cisco Secure ACS deployment decisions more
complex.
When AAA was created, network access was restricted to either devices directly
connected to the LAN or remote devices gaining access via modem. Today,
enterprise networks can be complex and, because of tunneling technologies, can
be widely geographically dispersed.
Dial-Up Topology
In the traditional model of dial-up access (a PPP connection), a user employing a
modem or ISDN connection is granted access to an intranet via a network access
server (NAS) functioning as a AAA client. Users may be able to connect via only
a single AAA client as in a small business, or have the option of numerous
geographically dispersed AAA clients.
In the small LAN environment, see Figure 2-1, network architects typically place
a single Cisco Secure ACS internal to the AAA client, protected from outside
access by a firewall and the AAA client. In this environment, the user database is
usually small, there are few devices that require access to the Cisco Secure ACS
for AAA, and any database replication is limited to a secondary Cisco Secure
ACS as a backup.
Server-based
dial access
PSTN
Modem
Network
Cisco Secure
Access Control
63486
Server
In a larger dial-in environment, a single Cisco Secure ACS with a backup may be
suitable, too. The suitability of this configuration depends on network and server
access latency. Figure 2-2 shows an example of a large dial-in arrangement. In this
scenario the addition of a backup Cisco Secure ACS is a recommended addition.
Cisco AS5300
Cisco AS5300's
UNIX server
Novell server
Windows NT server
63487
Server
Cisco Secure
Access Control
Server
Cisco Secure
Access Control Cisco Secure
Server Access Control
Server
63488
Wireless Network
The wireless network access point is a relatively new client for AAA services. The
wireless access point (AP), such as the Cisco Aironet series, provides a bridged
connection for mobile end-user clients into the LAN. Authentication is absolutely
necessary due to the ease of access to the AP. Encryption is also necessary because
of the ease of eavesdropping on communications. As such, security plays an even
bigger role than in the dial-up scenario and is discussed in more detail later in this
section.
Scaling can be a serious issue in the wireless network. The mobility factor of the
wireless LAN (WLAN) requires considerations similar to those given to the
dial-up network. Unlike the wired LAN, however, the WLAN can be more readily
expanded. Though WLAN technology does have physical limits as to the number
of users that can be connected via an AP, the number of APs can grow quickly. As
with the dial-up network, you can structure your WLAN to allow full access for
all users, or to provide restricted access to different subnets between sites,
buildings, floors, or rooms. This raises a unique issue with the WLAN: the ability
of a user to “roam” between APs.
In the simple WLAN, there may be a single AP installed (Figure 2-4). Because
there is only one AP, the primary issue is security. In this environment, there is
generally a small user base and few network devices to worry about. Providing
AAA services to the other devices on the network does not cause any significant
additional load on the Cisco Secure ACS.
Cisco Aironet AP
Network
Cisco Secure
63489
Access Control Server
Dial-up connection
UNIX server
Novell server
Windows NT server
Cisco Secure
Access Control
Server
Macintosh server
63490
This is particularly true when the regional topology is the campus WLAN. This
model starts to change when you deploy WLANs in many small sites that more
resemble the simple WLAN shown in Figure 2-4. This model may apply to a chain
of small stores distributed throughout a city or state, nationally, or globally
(Figure 2-6).
63491
For the model in Figure 2-6, the location of Cisco Secure ACS depends on
whether all users need access on any AP, or whether users require only regional
or local network access. Along with database type, these factors control whether
local or regional Cisco Secure ACSes are required, and how database continuity
is maintained. In this very large deployment model, security becomes a more
complicated issue, too.
VPN concentrator
Network WAN
63492
Tunnel
Cisco Secure
Access Control Server
Tunnel
Home office
ISP
VPN concentrator
Internet
ISP
63493
Mobile Server
worker
For more information about implementing VPN solutions, see the reference guide
A Primer for Implementing a Cisco Virtual Private Network.
Cisco Secure ACS remote access policies provides control by using central
authentication and authorization of remote users. The CiscoSecure user database
maintains all user IDs, passwords, and privileges. Cisco Secure ACS access
policies can be downloaded in the form of ACLs to network access servers such
as the Cisco AS5300 Network Access Server, or by allowing access during
specific periods, or on specific access servers.
Remote access policies are part of overall corporate security policy.
Security Policy
We recommend that every organization that maintains a network develop a
security policy for the organization. The sophistication, nature, and scope of your
security policy directly affect how you deploy Cisco Secure ACS.
For more information about developing and maintaining a comprehensive security
policy, refer to the following documents:
• Network Security Policy: Best Practices White Paper
• Delivering End-to-End Security in Policy-Based Networks
• Cisco IOS Security Configuration Guide
Conversely, if a general user attempts to use his or her remote access to log in to
a network device, Cisco Secure ACS checks and approves the username and
password, but the authorization process would fail because that user would not
have credentials that allow shell or exec access to the device.
Database
Aside from topological considerations, the user database is one of the most
influential factors involved in making deployment decisions for Cisco Secure
ACS. The size of the user base, distribution of users throughout the network,
access requirements, and type of user database contribute to how Cisco Secure
ACS is deployed.
Number of Users
Cisco Secure ACS is designed for the enterprise environment, comfortably
handling 100,000 users. This is usually more than adequate for a corporation. In
an environment that exceeds these numbers, the user base would typically be
geographically dispersed, which lends itself to the use of more than one
Cisco Secure ACS configuration. A WAN failure could render a local network
inaccessible because of the loss of the authentication server. In addition to this
issue, reducing the number of users that a single Cisco Secure ACS handles
improves performance by lowering the number of logins occurring at any given
time and by reducing the load on the database itself.
Type of Database
Cisco Secure ACS supports several database options, including the CiscoSecure
user database or using remote authentication with any of the external databases
supported. For more information about database options, types, and features, see
Authentication and User Databases, page 1-9, Chapter 13, “User Databases,” or
Chapter 15, “User Group Mapping and Specification.” Each database option has
its own advantages and limitations in scalability and performance.
Ease of use is the overriding design principle of the HTML interface in the
Cisco Secure ACS Appliance. Cisco Secure ACS presents intricate concepts of
network security from the perspective of an administrator. The Interface
Configuration section of Cisco Secure ACS enables you to configure the
Cisco Secure ACS HTML interface—you can tailor the interface to simplify the
screens you will use by hiding the features that you do not use and by adding fields
for your specific configuration.
Note We recommend that you return to this section to review and confirm your initial
settings. While it is logical to begin your Cisco Secure ACS configuration efforts
with configuring the interface, sometimes a section of the HTML interface that
you initially believed should be hidden from view may later require configuration
from within this section.
Tip If a section of the Cisco Secure ACS HTML interface appears to be “missing” or
“broken”, return to the Interface Configuration section and confirm that the
particular section has been activated.
User-to-Group Relationship
A user can belong to only one group at a time. As long as there are no conflicting
attributes, users inherit group settings.
Note If a user profile has an attribute configured differently from the same attribute in
the group profile, the user setting always overrides the group setting.
If a user has a unique configuration requirement, you can make that user a part of
a group and set unique requirements on the User Setup page, or you can assign
that user to his or her own group.
Step 1 Click Interface Configuration, and then click User Data Configuration.
The Configure User Defined Fields page appears. Check boxes in the Display
column indicate which fields are configured to appear in the Supplementary User
Information section at the top of the User Setup page.
Step 2 Select a check box in the Display column.
Step 3 In the corresponding Field Title box, type a title for the new field.
Step 4 To configure another field, repeat Step 2 and Step 3.
Step 5 When you have finished configuring new user data fields, click Submit.
Tip You can change the title of a field by editing the text in the Field Title box
and then clicking Submit. For the change to take effect, you must restart
Cisco Secure ACS services, including CSAdmin. To do so, use the restart
command at the serial console of the appliance. Restarting services
should be done during off hours because it briefly interrupts
authentication, authorization, and accounting.
Advanced Options
This feature enables you to determine which advanced features Cisco Secure ACS
displays. You can simplify the pages displayed in other areas of the Cisco Secure
ACS HTML interface by hiding advanced features that you do not use. Many of
these options do not appear if they are not enabled.
Caution Disabling an advanced option in the Interface Configuration section does not
affect anything except the display of that function in the HTML interface. Settings
made while an advanced option was active (selected) remain in effect when that
advanced option is no longer displayed in the interface (deselected). Further, the
interface displays any advanced option that is enabled or has non-default values,
even if you have configured that advanced option to be hidden. If you later disable
the option or delete its value, Cisco Secure ACS hides the advanced option.
Caution Disabling an advanced feature in the Interface Configuration section does not
affect anything except the display of that feature in the HTML interface. Settings
made while an advanced feature was displayed remain in effect when that
advanced feature is no longer displayed. Further, the interface displays any
advanced feature that has non-default settings, even if you have configured that
advanced feature to be hidden. If you later disable the feature or delete its settings,
Cisco Secure ACS hides the advanced feature. The only exception is the Network
Device Groups feature. Regardless of whether Network Device Groups are in use,
they are hidden when deselected on the Advanced Options page.
Tip The default interface setting presents a single column of check boxes, at the group
level only, for selecting TACACS+ Services Settings and New Service Settings.
To view two columns of check boxes that enable you to configure settings at the
Group level or the User level, you must have enabled the Per-user
TACACS+/RADIUS Attributes option on the Advanced Options page of Interface
Configuration section.
Note If you have configured Cisco Secure ACS to interact with device
management applications for other Cisco products, such as a,
Cisco Secure ACS may display new TACACS+ services as dictated
by these device management applications. To ensure the proper
functioning of Cisco Secure ACS, of device management applications
with which Cisco Secure ACS interacts, and of the Cisco network
devices managed by those applications, do not change or delete
automatically generated TACACS+ service types.
• Advanced Configuration Options—In this area you can add more detailed
information for even more tailored configurations.
The four items you can choose to hide or display are as follows:
– Advanced TACACS+ Features—This option displays or hides the
Advanced TACACS+ Options section on the User Setup page. These
options include Privilege Level Authentication and Outbound Password
Configuration for SENDPASS and SENDAUTH clients, such as routers.
– Display a Time-of-Day access grid for every TACACS+ service where
you can override the default Time-of-Day settings—If this option is
selected, a grid appears on the User Setup page that enables you to
override the TACACS+ scheduling attributes on the Group Setup page.
You can control the use of each TACACS+ service by the time of day and
day of week. For example, you can restrict Exec (Telnet) access to
business hours but permit PPP-IP access at any time.
The default setting is to control time-of-day access for all services as part
of authentication. However, you can override the default and display a
time-of-day access grid for every service. This keeps user and group
setup easy to manage, while making this feature available for the most
sophisticated environments. This feature applies only to TACACS+
because TACACS+ can separate the authentication and authorization
processes. RADIUS time-of-day access applies to all services. If
TACACS+ and RADIUS are used simultaneously, the default
time-of-day access applies to both. This provides a common method to
control access regardless of the access control protocol.
– Display a window for each service selected in which you can enter
customized TACACS+ attributes—If this option is selected, an area
appears on the User Setup and Group Setup pages that enables you to
enter custom TACACS+ attributes.
Cisco Secure ACS can also display a custom command field for each
service. This text field enables you to make specialized configurations to
be downloaded for a particular service for users in a particular group.
You can use this feature to send many TACACS+ commands to the access
device for the service, provided that the device supports the command,
and that the command syntax is correct. This feature is disabled by
default, but you can enable it the same way you enable attributes and
time-of-day access.
– Display enable Default (Undefined) Service Configuration—If this
check box is selected, an area appears on the User Setup and Group Setup
pages that enables you to permit unknown TACACS+ services, such as
Cisco Discovery Protocol (CDP).
Note Customized settings at the user level take precedence over settings at the group
level.
To configure the user interface for TACACS+ options, follow these steps:
Note The CiscoSecure Access Control Server ACS HTML interface displays any
protocol option that is enabled or has non-default values, even if you have
configured that protocol option to be hidden. If you later disable the option or
delete its value and the protocol option is configured to be hidden, CiscoSecure
Access Control Server ACS hides the protocol option. This behavior prevents
CiscoSecure Access Control Server ACS from hiding active settings.
Step 1 Click Interface Configuration, and then click TACACS+ (Cisco IOS).
The TACACS+ (Cisco) page appears.
Step 2 In the TACACS+ Services table, select the check box for each TACACS+ service
you want displayed on the applicable setup page.
Step 3 To add new services and protocols, follow these steps:
a. In the New Services section of the TACACS+ Services table, type in any
Service and Protocol to be added.
Note If you have configured Cisco Secure ACS to interact with device
management applications for other Cisco products, such as a,
Cisco Secure ACS may display new TACACS+ services as dictated
by these device management applications. To ensure the proper
functioning of Cisco Secure ACS, of device management applications
with which Cisco Secure ACS interacts, and of the Cisco network
devices managed by those applications, do not change or delete
automatically generated TACACS+ service types.
b. Select the appropriate check box to select those that should be displayed for
configuration either under User Setup, or Group Setup, or both.
Step 4 In the Advanced Configurations Options section, select the check boxes of the
display options you want to enable.
Step 5 When you have finished setting TACACS+ interface display options, click
Submit.
Configure
this Type
of AAA
Client... ...the Interface Configuration Page Lists the Types of Settings Shown
RADIUS RADIUS RADIUS
RADIUS (Cisco RADIUS RADIUS (Cisco (Cisco
RADIUS (Cisco RADIUS IOS/PIX (Micros (Ascend VPN VPN RADIUS RADIUS
(IETF) Aironet) (BBSM) ) oft) ) 3000) 5000) (Juniper) (Nortel)
RADIUS Yes No No No No No No No No No
(IETF)
RADIUS Yes Yes No Yes No No No No No No
(Cisco
Aironet)
Configure
this Type
of AAA
Client... ...the Interface Configuration Page Lists the Types of Settings Shown
RADIUS Yes No Yes No No No No No No No
(BBSM)
RADIUS Yes No No Yes Yes Yes No No No No
(Cisco
IOS/PIX)
RADIUS Yes No No No Yes Yes No No No No
(Ascend)
RADIUS Yes No No Yes Yes No Yes No No No
(Cisco
VPN
3000)
RADIUS Yes No No No No No No Yes No No
(Cisco
VPN
5000)
RADIUS Yes No No No No No No No Yes No
(Juniper)
Configure
this Type
of AAA
Client... ...the Interface Configuration Page Lists the Types of Settings Shown
RADIUS RADIUS RADIUS
RADIUS (Cisco RADIUS RADIUS (Cisco (Cisco
RADIUS (Cisco RADIUS IOS/PIX (Micros (Ascend VPN VPN RADIUS RADIUS
(IETF) Aironet) (BBSM) ) oft) ) 3000) 5000) (Juniper) (Nortel)
RADIUS Yes No No No No No No No No Yes
(Nortel)
RADIUS Yes No No No No No No No No No
(iPass)
Tip You must have your network devices configured before you can select, on the
Interface Configuration page, a type of setting for further configuration.
From the Interface Configuration page, when you select a type of RADIUS setting
to configure, the HTML interface displays the corresponding list of available
RADIUS attributes and associated check boxes. If you have selected the Per-user
TACACS+/RADIUS Attributes check box in Interface Configuration: Advanced
Options, a User check box appears alongside the Group check box for each
attribute. Otherwise, only the Group check box for each attribute appears. By
selecting check boxes in a list of attributes, you determine whether the
corresponding (IETF) RADIUS attribute or vendor-specific attribute (VSA) is
configurable from the User Setup and Group Setup sections.
Details regarding the types of RADIUS settings pages follow:
• (IETF) RADIUS Settings—This page lists attributes available for (IETF)
RADIUS.
These standard (IETF) RADIUS attributes are available for any network
device configuration when using RADIUS. If you want to use IETF attribute
number 26 (for VSAs), select Interface Configuration and then RADIUS for
the vendors whose network devices you use. Attributes for (IETF) RADIUS
and the VSA for each RADIUS network device vendor supported by
Cisco Secure ACS appear in User Setup or Group Setup.
Note The RADIUS (IETF) attributes are shared with RADIUS VSAs. You
must configure the first RADIUS attributes from RADIUS (IETF) for
the RADIUS vendor.
• RADIUS (Cisco VPN 3000) Settings—From this section you enable the
RADIUS VSAs for RADIUS (Cisco VPN 3000). For detailed procedures, see
Setting Protocol Configuration Options for Non-IETF RADIUS Attributes,
page 3-17.
• RADIUS (Cisco VPN 5000) Settings—From this section you enable the
RADIUS VSAs for RADIUS (Cisco VPN 5000). For detailed procedures, see
Setting Protocol Configuration Options for Non-IETF RADIUS Attributes,
page 3-17.
• RADIUS (Microsoft) Settings—From this section you enable the RADIUS
VSAs for RADIUS (Microsoft). This page appears if you configure a
RADIUS (Ascend), or a RADIUS (VPN 3000), or a RADIUS (Cisco
IOS/PIX) device. For detailed procedures, see Setting Protocol Configuration
Options for Non-IETF RADIUS Attributes, page 3-17.
• RADIUS (Nortel) Settings—From this section you enable the RADIUS
VSAs for RADIUS (Nortel). For detailed procedures, see Setting Protocol
Configuration Options for Non-IETF RADIUS Attributes, page 3-17.
• RADIUS (Juniper) Settings—From this section you enable the RADIUS
VSAs for RADIUS (Juniper). For detailed procedures, see Setting Protocol
Configuration Options for Non-IETF RADIUS Attributes, page 3-17.
• RADIUS (BBSM) Settings—From this section you enable the RADIUS
VSAs for RADIUS “Building Broadband Service Manger” (BBSM). For
detailed procedures, see Setting Protocol Configuration Options for
Non-IETF RADIUS Attributes, page 3-17.
While Cisco Secure ACS ships with these listed VSAs prepackaged, it also
enables you to define and configure custom attributes for any VSA set not already
contained in Cisco Secure ACS. If you have configured a custom VSA and a
corresponding AAA client, from the Interface Configuration section you can
select the custom VSA and then set the options for how particular attributes
appear as configurable options on the User Setup or Group Setup page. For
information about creating user-defined RADIUS VSAs, see Custom RADIUS
Vendors and VSAs, page 9-27.
Note Each selected IETF RADIUS attribute must be supported by all your network
devices using RADIUS.
To set protocol configuration options for IETF RADIUS attributes, follow these
steps:
Step 3 To specify how many values to display for tagged attributes on the User Setup and
Group Setup pages, select the Tags to Display Per Attribute option, and then
select a value from the corresponding list. Examples of tagged attributes are [064]
Tunnel-Type and [069] Tunnel-Password.
Step 4 When you have finished selecting the attributes, click Submit at the bottom of the
page.
Each IETF RADIUS attribute that you selected appears as a configurable option
on the User Setup or Group Setup page, as applicable.
The page listing the selected set of available RADIUS VSAs appears.
Step 3 For each RADIUS VSA that you want to appear as a configurable option on the
User Setup or Group Setup page, select the corresponding check box.
This chapter details concepts and procedures for configuring Cisco Secure ACS
Appliance to interact with AAA clients, AAA servers, and remote agents, and for
establishing a distributed system.
This chapter contains the following topics:
• About Network Configuration, page 4-2
• About Distributed Systems, page 4-3
• Proxy in Distributed Systems, page 4-4
• Network Device Searches, page 4-9
• AAA Client Configuration, page 4-11
• AAA Server Configuration, page 4-22
• Remote Agent Configuration, page 4-29
• Network Device Group Configuration, page 4-36
• Proxy Distribution Table Configuration, page 4-41
Note If the fields mentioned in this section do not appear in the Cisco Secure ACS
HTML interface, enable them by clicking Interface Configuration, clicking
Advanced Options, and then selecting the Distributed System Settings check
box.
Proxy provides a useful service to users, such as business travelers, who dial in to
a network device other than the one they normally use and would otherwise be
authenticated by a “foreign” AAA server. To use proxy, you must first click
Interface Configuration, click Advanced Options, and then select the
Distributed System Settings check box.
Whether, and where, an authentication request is to be forwarded is defined in the
Proxy Distribution Table on the Network Configuration page. You can use
multiple Cisco Secure ACSes throughout your network. For information about
configuring the Proxy Distribution Table, see Proxy Distribution Table
Configuration, page 4-41.
Cisco Secure ACS employs character strings defined by the administrator to
determine whether an authentication request should be processed locally or
forwarded, and to where. When an end user dials in to the network device and
Cisco Secure ACS finds a match for the character string defined in the Proxy
Distribution Table, Cisco Secure ACS forwards the authentication request to the
associated remote AAA server.
Note When a Cisco Secure ACS receives a TACACS+ authentication request forwarded
by proxy, any Network Access Restrictions for TACACS+ requests are applied to
the IP address of the forwarding AAA server, not to the IP address of the
originating AAA client.
Note When a Cisco Secure ACS proxies to a second Cisco Secure ACS, the second
Cisco Secure ACS responds to the first using only IETF attributes, no VSAs,
when it recognizes the first Cisco Secure ACS as a AAA server. Alternatively, you
can configure an Cisco Secure ACS to be seen as a AAA client by the second
Cisco Secure ACS; in this case, the second Cisco Secure ACS responses include
the RADIUS VSAs for whatever RADIUS vendor is specified in the AAA client
definition table entry—in the same manner as any other AAA client.
Character String
Cisco Secure ACS forwards authentication requests using a configurable set of
characters with a delimiter, such as dots (.), slashes (/), or hyphens (-). When
configuring the Cisco Secure ACS character string to match, you must specify
whether the character string is the prefix or suffix. For example, you can use
“domain.us” as a suffix character string in username*domain.us, where *
represents any delimiter. An example of a prefix character string is
domain.*username, where the * would be used to detect the “/” character.
Stripping
Stripping allows Cisco Secure ACS to remove, or strip, the matched character
string from the username. When you enable stripping, Cisco Secure ACS
examines each authentication request for matching information. When
Cisco Secure ACS finds a match by character string in the Proxy Distribution
Table, as described in the example under Proxy in Distributed Systems, page 4-4,
Cisco Secure ACS strips off the character string if you have configured it to do so.
For example, in the proxy example that follows, the character string that
accompanies the username establishes the ability to forward the request to another
AAA server. If the user must enter the user ID of mary@corporate.com to be
forwarded correctly to the AAA server for authentication, Cisco Secure ACS
might find a match on the “@corporate.com” character string, and strip the
“@corporate.com”, leaving a username of “mary”, which may be the username
format that the destination AAA server requires to identify the correct entry in its
database.
Proxy in an Enterprise
This section presents a scenario of proxy used in an enterprise system. Mary is an
employee with an office in the corporate headquarters in Los Angeles. Her
username is mary@la.corporate.com. When Mary needs access to the network,
she accesses the network locally and authenticates her username and password.
Because Mary works in the Los Angeles office, her user profile, which defines her
authentication and authorization privileges, resides on the local Los Angeles
AAA server. However, Mary occasionally travels to a division within the
corporation in New York, where she still needs to access the corporate network to
get her e-mail and other files. When Mary is in New York, she dials in to the New
York office and logs in as mary@la.corporate.com. Her username is not
recognized by the New York Cisco Secure ACS, but the Proxy Distribution Table
contains an entry, “@la.corporate.com”, to forward the authentication request to
the Los Angeles Cisco Secure ACS. Because the username and password
information for Mary reside on that AAA server, when she authenticates correctly,
the authorization parameters assigned to her are applied by the AAA client in the
New York office.
Sending accounting packets to the remote Cisco Secure ACS offers several
benefits. When Cisco Secure ACS is configured to send accounting packets to the
remote AAA server, the remote AAA server logs an entry in the accounting report
for that session on the destination server. Cisco Secure ACS also caches the user
connection information and adds an entry in the List Logged on Users report. You
can then view the information for users that are currently connected. Because the
accounting information is being sent to the remote AAA server, even if the
connection fails, you can view the Failed Attempts report to troubleshoot the
failed connection.
Sending the accounting information to the remote AAA server also enables you
to use the Max Sessions feature. The Max Sessions feature uses the Start and Stop
records in the accounting packet. If the remote AAA server is a Cisco Secure ACS
and the Max Sessions feature is implemented, you can track the number of
sessions allowed for each user or group.
You can also choose to have Voice-over-IP (VoIP) accounting information logged
remotely, either appended to the RADIUS Accounting log, in a separate VoIP
Accounting log, or both.
• Device Group—The NDG the device is assigned to. This search criterion
only appears if you have enabled Network Device Groups on the Advanced
Options page in the Interface Configuration Section. If you do not want to
limit the search based on NDG membership, select “Any” from the Device
Group list.
Tip When you leave the Search for Network Devices page, Cisco Secure ACS
retains your search criteria and results for the duration of the current
administrative session. Until you log out of Cisco Secure ACS, you can
return to the Search for Network Devices page to view your most recent
search criteria and results.
Step 3 Set the criteria for a device search. For information about search criteria, see
Network Device Search Criteria, page 4-9.
The table listing matching network devices includes the device name, IP address,
and type. If you have enabled Network Device Groups on the Advanced Options
page in the Interface Configuration Section, the table also includes the NDG of
each matching network device.
Tip You can sort the table rows by whichever column you like, in either
ascending or descending order. Click a column title once to sort the rows
by the entries in that column in ascending order. Click the column a
second time to sort the rows by the entries in that column in descending
order.
Step 5 If you want to view the configuration settings for a network device found by the
search, click the network device name in the Name column of the table of
matching network devices.
Cisco Secure ACS displays the applicable setup page. For information about the
AAA Client Setup page, see AAA Client Configuration Options, page 4-12. For
information about the AAA Server Setup page, see AAA Server Configuration
Options, page 4-23.
Step 6 If you want to download a file containing the search results in a comma-separated
value format, click Download and use your browser to save the file to a location
and filename of your choice.
Step 7 If you want to search again using different criteria, repeat Step 3 and Step 4.
Note After you submit the AAA client hostname, you cannot change it. If
you want to use a different name for a AAA client, delete the AAA
client configuration and create a AAA client configuration using the
new name.
In each IP address you specify, you have three options for each octet in the
address, as follows:
– Number—You can specify a number, for example, 10.3.157.98.
– Numeric Range—You can specify the low and high numbers of the
range in the octet, separated by a hyphen, for example, 10.3.157.10-50.
– Wildcard—You can use an asterisk (*) to match all numbers in that
octet, for example, 10.3.157.*.
Cisco Secure ACS allows any octet or octets in the IP Address box to be a
number, a numeric range, or an asterisk, for example 172.16-31.*.*.
• Key—The shared secret of the AAA client. Maximum length for a AAA
client key is 32 characters.
For correct operation, the key must be identical on the AAA client and
Cisco Secure ACS. Keys are case sensitive. Because shared secrets are not
synchronized, it is easy to make mistakes when entering them on network
devices and Cisco Secure ACS. If the shared secret does not match,
Cisco Secure ACS discards all packets from the network device.
Note If the AAA client represents multiple network devices, the key must
be identical on all network devices represented by the AAA client.
• Network Device Group—The name of the NDG to which this AAA client
should belong. To make the AAA client independent of NDGs, use the Not
Assigned selection.
Note This option does not appear if you have not configured Cisco Secure
ACS to use NDGs. To enable NDGs, click Interface Configuration,
click Advanced Options, and then select the Network Device
Groups check box.
Note If TCP connections between Cisco Secure ACS and the AAA client
are unreliable, do not use this feature.
Note If this option is enabled, Cisco Secure ACS cannot determine the
number of user sessions for each user. Each session uses the same
session identifier, the username; therefore, the Max Sessions feature
is ineffective for users accessing the network through a AAA client
with this feature enabled.
Note If you only provide the keyword “dynamic”, the AAA client
configuration cannot be used by Cisco Secure ACS to provide
AAA services to a network device and is used solely for
command authorization of Cisco multi-device management
applications, such as Management Center for Firewalls (Firewall
MC).
Step 5 In the Key box, type the shared secret that the AAA client and Cisco Secure ACS
use to encrypt the data (up to 32 characters).
Note For correct operation, the identical key must be configured on the AAA
client and Cisco Secure ACS. Keys are case sensitive.
Step 6 If you are using NDGs, from the Network Device Group list, select the name of
the NDG to which this AAA client should belong, or select Not Assigned to set
this AAA client to be independent of NDGs.
Step 7 From the Authenticate Using list, select the network security protocol used by the
AAA client.
Tip If you are uncertain which protocol to select on the Authenticate Using
list, see AAA Client Configuration Options, page 4-12.
Step 8 If you want to enable a single connection from a AAA client, rather than a new
one for every TACACS+ request, select the Single Connect TACACS+ AAA
Client (Record stop in accounting on failure) check box.
Note If TCP connections between Cisco Secure ACS and the AAA client are
unreliable, do not use this feature.
Step 9 If you want to enable logging of watchdog packets, select the Log
Update/Watchdog Packets from this AAA Client check box.
Step 10 If you want to enable logging of RADIUS tunneling accounting packets, select the
Log RADIUS tunneling Packets from this AAA Client check box.
Step 11 If you want to track session state by username rather than port number, select the
Replace RADIUS Port info with Username from this AAA check box.
Note If this option is enabled, Cisco Secure ACS cannot determine the number
of user sessions for each user. Each session uses the same session
identifier, the username; therefore, the Max Sessions feature is ineffective
for users accessing the network through a AAA client with this feature
enabled.
Step 12 If you want to save your changes and apply them immediately, click
Submit + Restart.
Note Restarting the service clears the Logged-in User report and temporarily
interrupts all Cisco Secure ACS services. This affects the Max Sessions
counter.
Tip If you want to save your changes and apply them later, click Submit.
When you are ready to implement the changes, click System
Configuration, click Service Control, and then click Restart.
Note You cannot directly edit the name of a AAA client; rather, you must delete the
AAA client entry and then re-establish the entry with the corrected name. For
steps about deleting a AAA client configuration, see Deleting a AAA Client,
page 4-21. For steps about creating a AAA client configuration, see Adding a
AAA Client, page 4-17.
Note You cannot directly edit the name of a AAA client; rather, you must delete
the AAA client entry and then re-establish the entry with the corrected
name. For steps about deleting a AAA client entry, see Deleting a AAA
Client, page 4-21. For steps about creating a AAA client entry, see
Adding a AAA Client, page 4-17.
Step 4 To save your changes and apply them immediately, click Submit + Restart.
Tip To save your changes and apply them later, click Submit. When you are
ready to implement the changes, click System Configuration, click
Service Control, and then click Restart.
Note Restarting the service clears the Logged-in User report and temporarily
interrupts all Cisco Secure ACS services. This affects the Max Sessions
counter.
Step 3 To delete the AAA client and have the deletion take effect immediately, click
Delete + Restart.
Note Restarting Cisco Secure ACS services clears the Logged-in User report
and temporarily interrupts all Cisco Secure ACS services. As an
alternative to restarting when you delete a AAA client, you can click
Delete. However, when you do this, the change does not take effect until
you restart the system, which you can do by clicking System
Configuration, clicking Service Control, and then clicking Restart.
Tip If the AAA Servers table does not appear, click Interface Configuration, click
Advanced Options, and then select the Distributed System Settings check box.
Note After you submit the AAA server name, you cannot change it. If you
want to use a different name for a AAA server, delete the AAA server
configuration and create a AAA server configuration using the new
name.
Note This option does not appear if you have not configured Cisco Secure
ACS to use NDGs. To enable NDGs, click Interface Configuration,
click Advanced Options, and then select the Network Device
Groups check box.
Note The remote Cisco Secure ACS must be using version 2.1 or later.
• Traffic Type—The Traffic Type list defines the direction in which traffic to
and from the remote AAA server is permitted to flow from this Cisco Secure
ACS. The list includes the following options:
– Inbound—The remote AAA server accepts requests that have been
forwarded to it and does not forward the requests to another AAA server.
Select this option if you do not want to permit any authentication requests
to be forwarded from the remote AAA server.
– Outbound—The remote AAA server sends out authentication requests
but does not receive them. If a Proxy Distribution Table entry is
configured to proxy authentication requests to a AAA server that is
configured for Outbound, the authentication request is not sent.
Note The key is case sensitive. If the shared secret does not match,
Cisco Secure ACS discards all packets from the remote AAA server.
Step 6 From the Network Device Group list, select the NDG to which this AAA server
belongs.
Step 7 To enable watchdog packets, select the Log Update/Watchdog Packets from
this remote AAA Server check box.
Step 8 From the AAA Server Type list, select the AAA server type applicable to the
remote AAA server. If the remote AAA server is another Cisco Secure ACS,
identify it as such by selecting CiscoSecure ACS.
Step 9 From the Traffic Type list, select the type of traffic you want to permit between
the remote AAA server and Cisco Secure ACS.
Step 10 To save your changes and apply them immediately, click Submit + Restart.
Tip To save your changes and apply them later, click Submit. When you are
ready to implement the changes, click System Configuration, click
Service Control, and then click Restart.
Note Restarting the service clears the Logged-in User report and temporarily
interrupts all Cisco Secure ACS services. This affects the Max Sessions
counter and resets it to zero.
Note You cannot edit the name of a AAA server. To rename a AAA server, you must
delete the existing AAA server entry and then add a new server entry with the new
name.
• Traffic Type
Step 4 To save your changes and apply them immediately, click Submit + Restart.
Tip To save your changes and apply them later, click Submit. When you are
ready to implement the changes, click System Configuration, click
Service Control, and then click Restart.
Note Restarting the service clears the Logged-in User report and temporarily
interrupts all Cisco Secure ACS services. This affects the Max Sessions
counter and resets it to zero.
Step 3 To delete the AAA server and have the deletion take effect immediately, click
Delete + Restart.
Note Restarting the service clears the Logged-in User report and temporarily
interrupts all Cisco Secure ACS services. As an alternative to restarting
when you delete a AAA server, in the preceding step you can click Delete.
However, when you do this, the change does not take effect until you
restart the system, which you can do by clicking System Configuration,
clicking Service Control, and then clicking Restart.
logging and before you can configure authentication using a Windows external
user database, you must add at least one remote agent configuration to the Remote
Agents table in the Network Configuration section.
For more information about remote agents, including how to install and configure
them, see Installation and Configuration Guide for Cisco Secure ACS Remote
Agents.
Note After you submit the remote agent name, you cannot change it. If you
want to use a different name for a remote agent, delete the remote
agent configuration, create a new remote agent configuration using
the new name, and change remote logging and Windows
authentication configurations that use the remote agent.
If the port number provided here does not match the port the remote agent is
configured to listen to, Cisco Secure ACS cannot communicate with the
remote agent. For information about configuring the port number that the
remote agent listens to, see Installation and Configuration Guide for
Cisco Secure ACS Remote Agents.
• Network Device Group—The name of the NDG to which this remote agent
should belong. To make the remote agent independent of NDGs, use the Not
Assigned selection.
Note This option does not appear if you have not configured Cisco Secure
ACS to use NDGs. To enable NDGs, click Interface Configuration,
click Advanced Options, and then select the Network Device
Groups check box.
In addition to the options in the preceding list, the Remote Agent Setup page
includes the following options:
• Running Status—Information about the status of the remote agent. If
Cisco Secure ACS can contact the remote agent, the uptime for the remote
agent is displayed. If Cisco Secure ACS cannot contact the remote agent, the
message “Not responding” is displayed.
• Configuration Provider—The Cisco Secure ACS that the remote agent
receives its configuration from.
Tip You can access the HTML interface for the Cisco Secure ACS that provides a
remote agent its configuration by clicking on the Cisco Secure ACS name. A new
browser window displays the HTML interface for the Cisco Secure ACS
providing configuration data to the remote agent.
Note If the port number provided here does not match the port the remote agent
is configured to listen to, Cisco Secure ACS cannot communicate with the
remote agent. For information about configuring the port number that the
remote agent listens to, see Installation and Configuration Guide for
Cisco Secure ACS Remote Agents.
Step 6 From the Network Device Group list, select the NDG to which this remote agent
belongs.
Note The Network Device Group list appears only if NDGs are enabled. To
enable NDGs, click Interface Configuration, click Advanced Options,
and then click Network Device Groups.
Step 7 To save your changes and apply them immediately, click Submit + Restart.
Tip To save your changes and apply them later, click Submit. When you are
ready to implement the changes, click System Configuration, click
Service Control, and then click Restart.
Note Restarting the service clears the Logged-in User report and temporarily
interrupts all Cisco Secure ACS services. This affects the Max Sessions
counter and resets it to zero.
Note You cannot edit the name of a remote agent. If you want to use a different name
for a remote agent, delete the remote agent configuration, create a remote agent
configuration using the new name, and change remote logging and Windows
authentication configurations that use the remote agent.
Note If the Cisco Secure ACS you are currently logged into does not provide
configuration data for the remote agent, none of the options are editable.
You can access the HTML interface for the Cisco Secure ACS that does
provide configuration data to the remote agent by clicking the
Cisco Secure ACS name listed as the Configuration Provider.
Step 4 To save your changes and apply them immediately, click Submit + Restart.
Tip To save your changes and apply them later, click Submit. When you are
ready to implement the changes, click System Configuration, click
Service Control, and then click Restart.
Note Restarting the service clears the Logged-in User report and temporarily
interrupts all Cisco Secure ACS services. This affects the Max Sessions
counter and resets it to zero.
Note You cannot delete a remote agent that Cisco Secure ACS is configured to use for
remote logging or Windows authentication.
Note Restarting services clears the Logged-in User report and temporarily
interrupts all Cisco Secure ACS services. As an alternative to restarting
when you delete a remote agent, in the preceding step you can click
Delete. However, when you do this, the change does not take effect until
you restart services, which you can do by clicking System
Configuration, clicking Service Control, and then clicking Restart.
Caution To see the Network Device Groups table in the HTML interface, you must have
the Network Device Groups option selected on the Advanced Options page of the
Interface Configuration section. Unlike in other areas of Interface Configuration,
it is possible to remove from sight an active NDG if you deselect the Network
Device Groups option. Therefore, if you choose to configure NDGs, make sure
you leave the Network Device Groups option selected on the Advanced Option
page.
Tip If the Network Device Groups table does not appear, click Interface
Configuration, click Advanced Options, and then select Network
Device Groups.
Step 3 In the Network Device Group Name box, type the name of the new NDG.
Tip The maximum name length is 24 characters. Quotation marks (“) and
commas (,) are not allowed. Spaces are allowed.
Tip If the Network Device Groups table does not appear, click Interface
Configuration, click Advanced Options, and then select the Network
Device Groups check box.
Step 3 Click the name of the network device you want to assign to an NDG.
Step 4 From the Network Device Groups list, select the NDG to which you want to assign
the AAA client or AAA server.
Step 5 Click Submit.
The client or server is assigned to an NDG.
Caution When renaming an NDG, ensure that there are no NARs or other shared profile
components (SPCs) that invoke the original NDG name. Cisco Secure ACS
performs no automatic checking to determine whether the original NDG is still
invoked. If a user’s authentication request incorporates an SPC that invokes a
non-existent (or renamed) NDG, the attempt will fail and the user will be rejected.
Tip If the Network Device Groups table does not appear, click Interface
Configuration, click Advanced Options, and then select the Network
Device Groups check box.
Tip It may be useful to empty an NDG of AAA clients and AAA servers before you
delete it. You can do this manually by performing the procedure Reassigning a
AAA Client or AAA Server to an NDG, page 4-39, or, in cases where there are a
large number of devices to reassign, you can use the RDBMS Synchronization
feature.
Caution When deleting an NDG, ensure that there are no NARs or other SPCs that invoke
the original NDG. Cisco Secure ACS performs no automatic checking to
determine whether the original NDG is still invoked. If a user authentication
request incorporates an SPC that invokes a non-existent (or renamed) NDG, the
attempt will fail and the user will be rejected.
Tip If the Network Device Groups table does not appear, click Interface
Configuration, click Advanced Options, and then select the Network
Device Groups check box.
• Sorting the Character String Match Order of Distribution Entries, page 4-44
• Editing a Proxy Distribution Table Entry, page 4-45
• Deleting a Proxy Distribution Table Entry, page 4-46
Tip To enable Distributed Systems Settings in the Cisco Secure ACS, click Interface
Configuration, click Advanced Options, and then select the Distributed
System Settings check box.
The Proxy Distribution Table includes entries that show the character strings on
which to proxy, the AAA servers to proxy to, whether to strip the character string,
and where to send the accounting information (Local/Remote, Remote, or Local).
For more information about the proxy feature, see Proxy in Distributed Systems,
page 4-4.
The entries you define and place in the Proxy Distribution Table can be considered
turnstiles for each authentication request that Cisco Secure ACS receives from the
AAA client. The authentication request is defined in the Proxy Distribution Table
according to where it is to be forwarded. If a match to an entry in the Proxy
Distribution Table that contains proxy information is found, Cisco Secure ACS
forwards the request to the appropriate AAA server.
The Character String column in the Proxy Distribution Table always contains an
entry of “(Default)”. The “(Default)” entry matches authentication requests
received by the local Cisco Secure ACS that do not match any other defined
character strings. While you cannot change the character string definition for the
“(Default)” entry, you can change the distribution of authentication requests
matching the “(Default)” entry. At installation, the AAA server associated with
the “(Default)” entry is the local Cisco Secure ACS. It can sometimes be easier to
define strings that match authentication requests to be processed locally rather
than defining strings that match authentication requests to be processed remotely.
In such a case, associating the “(Default)” entry with a remote AAA server
permits you to configure your Proxy Distribution Table with the more easily
written entries.
Note If the Proxy Distribution Table does not appear, click Interface
Configuration, click Advanced Options, and then select the
Distributed System Settings check box.
Step 3 In the Character String box, type the string of characters, including the delimiter
to forward on when users dial in to be authenticated. For example, .uk.
Step 4 From the Position list, select Prefix if the character string you typed appears at
the beginning of the username or Suffix if the character string appears at the end
of the username.
Step 5 From the Strip list, select Yes if the character string you entered is to be stripped
off the username, or select No if it is to be left intact.
Step 6 In the AAA Servers column, select the AAA server you want to use for proxy.
Click --> (right arrow button) to move it to the Forward To column.
Tip You can also select additional AAA servers to use for backup proxy if the
prior servers fail. To set the order of AAA servers, in the Forward To
column, click the name of the applicable server and click Up or Down to
move it into the position you want.
Tip If the AAA server you want to use is not listed, click Network
Configuration, click AAA Servers, click Add Entry and complete the
applicable information.
Step 7 From the Send Accounting Information list, select one of the following areas to
which to report accounting information:
• Local—Keep accounting packets on the local Cisco Secure ACS.
• Remote—Send accounting packets to the remote Cisco Secure ACS.
• Local/Remote—Keep accounting packets on the local Cisco Secure ACS and
send them to the remote Cisco Secure ACS.
Tip This information is especially important if you are using the Max
Sessions feature to control the number of connections a user is allowed.
Max Sessions depends on accounting start and stop records, and where
the accounting information is sent determines where the Max Sessions
counter is tracked. The Failed Attempts log and the Logged in Users
report are also affected by where the accounting records are sent.
Tip Before you sort the entries, you must have configured at least two unique
Proxy Distribution Table entries in addition to the (Default) table entry.
Step 3 Select the character string entry to reorder, and then click Up or Down to move
its position to reflect the search order you want.
Step 4 When you finish sorting, click Submit or Submit + Restart.
Tip For information about the parameters that make up a distribution entry,
see Adding a New Proxy Distribution Table Entry, page 4-43.
Step 4 When you finish editing the entry, click Submit or Submit + Restart.
This chapter addresses the Cisco Secure ACS Appliance features found in the
Shared Profile Components section of the HTML interface.
This chapter contains the following topics:
• About Shared Profile Components, page 5-1
• Downloadable IP ACLs, page 5-2
• Network Access Restrictions, page 5-7
• Command Authorization Sets, page 5-15
Downloadable IP ACLs
This section describes downloadable ACLs followed by detailed instructions for
configuring and managing them.
This section contains the following topics:
• About Downloadable IP ACLs, page 5-2
• Adding a Downloadable IP ACL, page 5-4
• Editing a Downloadable IP ACL, page 5-5
• Deleting a Downloadable IP ACL, page 5-6
An example of the format you should use to enter VPN 3000 ACLs in the ACL
Definitions box follows:
permit ip 10.153.0.0 0.0.255.255 host 10.158.9.1
permit ip 10.154.0.0 0.0.255.255 10.158.10.0 0.0.0.255
permit 0 any host 10.159.1.22
deny ip 10.155.10.0 0.0.0.255 10.159.2.0 0.0.0.255 log
For detailed ACL definition information, see the command reference section of
your device configuration guide.
Note The name of a IP ACL may contain up to 27 characters. The name may
contain spaces; but it cannot contain leading, trailing, or multiple spaces,
or the following five characters: - [ ] / —
Step 6 In the ACL Definitions box, type the new IP ACL definitions.
Tip In entering the ACL definitions in the Cisco Secure ACS HTML
interface, you do not use keyword and name entries; rather, you begin
with a permit/deny keyword. For an example of the proper format of the
ACL definitions, see About Downloadable IP ACLs, page 5-2.
Step 7 When you have completed specifying the IP ACL, click Submit.
Cisco Secure ACS enters the new IP ACL, which takes effect immediately. For
example, if the IP ACL is for use with PIX Firewalls, it is available to be sent to
any PIX Firewall that is attempting authentication of a user who has that ACL
name as part of his or her user or group profile. For information on assigning a
downloadable IP ACL to user or a user group, see Assigning a Downloadable IP
ACL to a User, page 7-20, or Assigning a Downloadable IP ACL to a Group,
page 6-28.
Note Do not enter more than 32,000 characters in the ACL Definitions box.
Tip Do not use keyword and name entries in the ACL Definitions box; instead,
begin with a permit/deny keyword. For an example of the proper format
of the ACL definitions, see About Downloadable IP ACLs, page 5-2.
Step 5 When you have finished editing the information for the IP ACL, click Submit.
Cisco Secure ACS re-enters the IP ACL with the new information, which takes
effect immediately.
Step 5 To confirm that you want to delete the IP ACL, click OK.
The selected IP ACL is deleted.
When specifying a NAR you may use asterisks (*) as wildcards for any value, or
as part of any value to establish a range. All the values/conditions in a NAR
specification must be met for the NAR to restrict access; that is, the values are
“ANDed”.
Note When an authentication request is forwarded by proxy to a Cisco Secure ACS, any
NARs for TACACS+ requests are applied to the IP address of the forwarding
AAA server, not to the IP address of the originating AAA client.
You can define a NAR for, and apply it to, a specific user or user group. For more
information on this, see Setting Network Access Restrictions for a User,
page 7-10, or Setting Network Access Restrictions for a User Group, page 6-7.
However, in the Shared Profile Components section of Cisco Secure ACS you can
create and name a shared NAR without directly citing any user or user group. You
give the shared NAR a name that can be referenced in other parts of the
Cisco Secure ACS HTML interface. Then, when you set up users or user groups,
you can select none, one, or multiple shared restrictions to be applied. When you
specify the application of multiple shared NARs to a user or user group, you
choose one of two access criteria: either “All selected filters must permit”, or
“Any one selected filter must permit”.
Shared access restrictions are kept in the CiscoSecure user database. You can use
the Cisco Secure ACS backup and restore features to back up and restore them.
You can also replicate the shared access restrictions, along with other
configurations, to secondary Cisco Secure ACSes.
characters, the port numbers are 5 characters, the CLI entries are 15
characters, and the DNIS entries are 20 characters, you can add 450 line items
before reaching the 16 KB limit.
To add a shared NAR, follow these steps:
Note The name can contain up to 31 characters. Leading and trailing spaces are
not allowed. Names cannot contain the following four characters:
[],/
Step 5 In the Description box, type a description of the new shared NAR.
Step 6 To permit or deny access based on IP addressing, follow these steps:
Note The total number of characters in the AAA Client list and the Port and
Src IP Address boxes must not exceed 1024. Although Cisco Secure
ACS accepts more than 1024 characters when you add a NAR, you
cannot edit the NAR and Cisco Secure ACS cannot accurately apply
it to users.
d. Click enter.
The AAA client, port, and address information appears as a line item in the
table.
e. To enter additional IP-based line items, repeat Step c and Step d.
Step 7 To permit or deny access based on calling location or values other than an
established IP address, follow these steps:
a. Select the Define CLI/DNIS based access restrictions check box.
b. To specify whether you are listing addresses that are permitted or denied,
from the Table Defines list, select the applicable value.
c. To specify the applicability of this NAR, from the AAA Client list, select one
of the following values:
• The name of the NDG
• The name of the particular AAA client
• All AAA clients
Tip Only NDGs that you have already configured are listed.
d. To specify the information that this NAR should filter on, type values in the
following boxes, as applicable:
Tip You can type an asterisk (*) as a wildcard to specify “all” as a value.
Note The total number of characters in the AAA Client list and the Port,
CLI, and DNIS boxes must not exceed 1024. Although Cisco Secure
ACS accepts more than 1024 characters when you add a NAR, you
cannot edit the NAR and Cisco Secure ACS cannot accurately apply
it to users.
e. Click enter.
The information specifying the NAR line item appears in the table.
f. To enter additional non-IP-based NAR line items, repeat Step c through
Step e.
Step 8 When you are finished defining the shared NAR, click Submit.
Cisco Secure ACS saves the named shared NAR and lists it in the Network Access
Restrictions table.
Note The total number of characters in the AAA Client list and the Port and
Src IP Address boxes must not exceed 1024. Although Cisco Secure
ACS accepts more than 1024 characters when you add a NAR, you
cannot edit the NAR and Cisco Secure ACS cannot accurately apply
it to users.
c. Click enter.
The edited information for this line item is written to the IP-based access
restrictions table.
Step 6 To remove a line item from the IP-based access restrictions table, follow these
steps:
a. Select the line item.
b. Below the table, click remove.
The line item is removed from the IP-based access restrictions table.
Step 7 To edit a line item in the CLI/DNIS access restrictions table, follow these steps:
a. Double-click the line item that you want to edit.
Information for the line item is removed from the table and written to the
boxes below the table.
b. Edit the information, as necessary.
Note The total number of characters in the AAA Client list and the Port,
CLI, and DNIS boxes must not exceed 1024. Although Cisco Secure
ACS accepts more than 1024 characters when you add a NAR, you
cannot edit the NAR and Cisco Secure ACS cannot accurately apply
it to users.
c. Click enter.
The edited information for this line item is written to the CLI/DNIS access
restrictions table.
Step 8 To remove a line item from the CLI/DNIS access restrictions table, follow these
steps:
a. Select the line item.
b. Below the table, click remove.
The line item is removed from the CLI/DNIS access restrictions table.
Step 9 When you have finished editing the line items that make up the filter, click
Submit.
Cisco Secure ACS re-enters the filter with the new information, which takes effect
immediately.
For example, if you type the following command during a router-hosted session:
interface FASTETHERNET 0/1
the router may submit the command and arguments to Cisco Secure ACS as:
interface FastEthernet 0 1
If, for the interface command, the command authorization set explicitly permits
the FastEthernet argument using the spelling “fastethernet”, Cisco Secure ACS
fails the command authorization request. If the command authorization rule
instead permits the argument “FastEthernet”, Cisco Secure ACS grants the
command authorization request. The case used in command authorization sets
must match what the device sends, which may or may not match the case you use
when you type the command.
the router may send the command and arguments Cisco Secure ACS as follows:
01:44:53: tty2 AAA/AUTHOR/CMD(390074395): send AV cmd=interface
01:44:53: tty2 AAA/AUTHOR/CMD(390074395): send AV cmd-arg=FastEthernet
01:44:53: tty2 AAA/AUTHOR/CMD(390074395): send AV cmd-arg=0
01:44:53: tty2 AAA/AUTHOR/CMD(390074395): send AV cmd-arg=1
01:44:53: tty2 AAA/AUTHOR/CMD(390074395): send AV cmd-arg=<cr>
In this example, the router sees multiple arguments where the user typed one
string of characters without spaces after the command. It also omits the slash
character that separated 0 and 1 when the user issued the command.
If the command authorization rule for the interface command explicitly permits
the FastEthernet argument using the spelling “FastEthernet0/1”, Cisco Secure
ACS fails the command authorization request because it does not match what the
router submitted to Cisco Secure ACS. If the command authorization rule instead
permits the argument “FastEthernet 0 1", Cisco Secure ACS grants the command
authorization request. The case of arguments specified in command authorization
sets must match what the device sends, which may or may not match the case you
use when you type the arguments.
The applicable Command Authorization Set page appears. Depending upon the
type of command authorization set you are adding, the contents of the page vary.
Below the Name and Description boxes, Cisco Secure ACS displays either
additional boxes or an expandable checklist tree. The expandable checklist tree
appears for device command set types that support a Cisco device-management
application.
Step 4 In the Name box, type a name for the command authorization set.
Note The set name can contain up to 27 characters. Names cannot contain the
following characters:
#?"*><
Leading and trailing spaces are not allowed.
Step 5 In the Description box, type a description of the command authorization set.
Step 6 If Cisco Secure ACS displays an expandable checklist tree below the Name and
Description boxes, use the checklist tree to specify the actions permitted by the
command authorization set. To do so, follow these steps:
a. To expand a checklist node, click the plus (+) symbol to its left.
b. To enable an action, select its check box. For example, to enable a Device
View action, select the View check box under the Device checklist node.
Tip Selecting an expandable check box node selects all check boxes within
that node. Selecting the first check box in the checklist tree selects all
check boxes in the checklist tree.
c. To enable other actions in this command authorization set, repeat Step a and
Step b, as needed.
Step 7 If Cisco Secure ACS displays additional boxes below the Name and Description
boxes, use the boxes to specify the commands and arguments permitted or denied
by the command authorization set. To do so, follow these steps:
a. To specify how Cisco Secure ACS should handle unmatched commands,
select either the Permit or Deny option, as applicable.
b. In the box just above the Add Command button, type a command that is to be
part of the set.
Caution Enter the full command word; if you use command abbreviations, authorization
control may not function.
Note The correct format for arguments is <permit | deny> <argument>. For
example, with the command show already listed, you might enter
permit run as the argument.
Tip You can list several arguments for a single command by pressing Enter
between arguments.
e. To allow arguments, which you have not listed, to be effective with this
command, select the Permit Unmatched Args check box.
f. To add other commands to this command authorization set, repeat Step a
through Step e.
Step 8 When you finish creating the command authorization set, click Submit.
Cisco Secure ACS displays the name and description of the new command
authorization set in the applicable Command Authorization Sets table.
Tip Selecting an expandable check box node selects all check boxes within
that node. Selecting the first check box in the checklist tree selects all
check boxes in the checklist tree.
• To disable an action, clear its check box. For example, to disable a Device
View action, clear the View check box under the Device checklist node.
Step 5 If additional boxes appear below the Name and Description boxes, you can do any
or all of the following:
• To change the set Name or Description, edit the words in the corresponding
box.
• To remove a command from the set, from the Matched Commands list, select
the command, and then click Remove Command.
• To edit arguments of a command, from the command list box, select the
command and then type changes to the arguments in the box to the right of
the command list box.
Step 6 When you finish editing the set, click Submit.
This chapter provides information about setting up and managing user groups in
Cisco Secure ACS Appliance to control authorization. Cisco Secure ACS enables
you to group network users for more efficient administration. Each user can
belong to only one group in Cisco Secure ACS. You can establish up to 500
groups to effect different levels of authorization.
Cisco Secure ACS also supports external database group mapping; that is, if your
external user database distinguishes user groups, these groups can be mapped into
Cisco Secure ACS. And if the external database does not support groups, you can
map all users from that database to a Cisco Secure ACS user group. For
information about external database mapping, see Chapter 15, “User Group
Mapping and Specification.”
Before you configure Group Setup, you should understand how this section
functions. Cisco Secure ACS dynamically builds the Group Setup section
interface depending on the configuration of your network devices and the security
protocols being used. That is, what you see under Group Setup is affected by
settings in the Network Configuration and Interface Configuration sections.
This chapter contains the following topics:
• About User Group Setup Features and Functions, page 6-2
• Basic User Group Settings, page 6-3
• Configuration-specific User Group Settings, page 6-15
• Group Setting Management, page 6-52
Default Group
If you have not configured group mapping for an external user database,
Cisco Secure ACS assigns users who are authenticated by the Unknown User
Policy to the Default Group the first time they log in. The privileges and
restrictions for the default group are applied to first-time users. If you have
upgraded from a previous version of Cisco Secure ACS and kept your database
information, Cisco Secure ACS retains the group mappings you configured before
upgrading.
Note You can also configure TACACS+ settings at the user level. User-level settings
always override group level settings.
Cisco Secure ACS also enables you to enter and configure new TACACS+
services. For information about how to configure a new TACACS+ service to
appear on the group setup page, see Protocol Configuration Options for
TACACS+, page 3-7.
Note If this feature does not appear, click Interface Configuration, click Advanced
Options, and then select the Voice-over-IP (VoIP) Group Settings check box.
Perform this procedure to enable support for the null password function of VoIP.
This enables users to authenticate (session or telephone call) on only the user ID
(telephone number).
When you enable VoIP at the group level, all users in this group become VoIP
users, and the user IDs are treated similarly to a telephone number. VoIP users do
not need to enter passwords to authenticate.
Caution Enabling VoIP disables password authentication and most advanced settings,
including password aging and protocol attributes.
Note If this feature does not appear, click Interface Configuration, click Advanced
Options, and then select the Default Time-of-Day / Day-of-Week Specification
check box.
To define the times during which users in a particular group are permitted or
denied access, follow these steps:
Note You must select the Set as default Access Times check box to limit
access based on time or day.
Times at which the system permits access are highlighted in green on the day and
hour matrix.
Step 4 In the day and hour matrix, click the times at which you do not want to permit
access to members of this group.
Tip Clicking times of day on the graph deselects those times; clicking again
reselects them.
At any time, you can click Clear All to clear all hours, or you can click
Set All to select all hours.
Step 5 To save the group settings you have just made, click Submit.
For more information, see Saving Changes to User Group Settings, page 6-54.
Step 6 To continue specifying other group settings, perform other procedures in this
chapter, as applicable.
Step 5 To continue specifying other group settings, perform other procedures in this
chapter, as applicable.
Note You can also use the CLI/DNIS-based access restrictions area to
specify other values. For more information, see About Network
Access Restrictions, page 5-7.
Typically, you define (shared) NARs from within the Shared Components section
so that these restrictions can be applied to more than one group or user. For more
information, see Adding a Shared Network Access Restriction, page 5-9. You
must have enabled the Group-Level Shared Network Access Restriction check
box on the Advanced Options page of the Interface Configuration section for
these options to appear in the Cisco Secure ACS HTML interface.
However, Cisco Secure ACS also enables you to define and apply a NAR for a
single group from within the Group Setup section. You must have enabled the
Group-Level Network Access Restriction setting under the Advanced Options
page of the Interface Configuration section for single group IP-based filter options
and single group CLI/DNIS-based filter options to appear in the Cisco Secure
ACS HTML interface.
Note To apply a shared NAR, you must have configured it under Network
Access Restrictions in the Shared Profile Components section. For more
information, see Adding a Shared Network Access Restriction, page 5-9.
Tip To view the server details of the shared NARs you have selected to apply,
you can click either View IP NAR or View CLID/DNIS NAR, as
applicable.
Step 4 To define and apply a NAR, for this particular user group, that permits or denies
access to this group based on IP address, or IP address and port, follow these
steps:
Tip You should define most NARs from within the Shared Components
section so that the restrictions can be applied to more than one group or
user. For more information, see Adding a Shared Network Access
Restriction, page 5-9.
Note The total number of characters in the AAA Client list and the Port and
Src IP Address boxes must not exceed 1024. Although Cisco Secure
ACS accepts more than 1024 characters when you add a NAR, you
cannot edit the NAR and Cisco Secure ACS cannot accurately apply
it to users.
d. Click Enter.
The specified the AAA client, port, and address information appears in the
NAR Access Control list.
Step 5 To permit or deny access to this user group based on calling location or values
other than an established IP address, follow these steps:
a. Select the Define CLI/DNIS-based access restrictions check box.
b. To specify whether the subsequent listing specifies permitted or denied
values, from the Table Defines list, select one of the following:
• Permitted Calling/Point of Access Locations
• Denied Calling/Point of Access Locations
c. From the AAA Client list, select either All AAA Clients or the name of the
NDG or the name of the particular AAA client to which to permit or deny
access.
d. Complete the following boxes:
Note You must type an entry in each box. You can use the wildcard asterisk
(*) for all or part of a value. The format you use must match the
format of the string you receive from your AAA client. You can
determine this format from your RADIUS Accounting Log.
Tip This is also the selection to use if you want to restrict access based on
other values, such as a Cisco Aironet client MAC address. For more
information, see About Network Access Restrictions, page 5-7.
Tip This is also the selection to use if you want to restrict access based on
other values, such as a Cisco Aironet AP MAC address. For more
information, see About Network Access Restrictions, page 5-7.
Note The total number of characters in the AAA Client list and the Port,
CLI, and DNIS boxes must not exceed 1024. Although Cisco Secure
ACS accepts more than 1024 characters when you add a NAR, you
cannot edit the NAR and Cisco Secure ACS cannot accurately apply
it to users.
e. Click Enter.
The information, specifying the AAA client, port, CLI, and DNIS appears in
the list.
Step 6 To save the group settings you have just made, click Submit.
For more information, see Saving Changes to User Group Settings, page 6-54.
Step 7 To continue specifying other group settings, perform other procedures in this
chapter, as applicable.
Note If this feature does not appear, click Interface Configuration, click Advanced
Options, and then select the Max Sessions check box.
Note The default setting for group Max Sessions is Unlimited for both the group and
the user within the group.
To configure max sessions settings for a user group, follow these steps:
Note Settings made in User Setup override group settings. For more
information, see Setting Max Sessions Options for a User, page 7-15.
Step 5 To save the group settings you have just made, click Submit.
For more information, see Saving Changes to User Group Settings, page 6-54.
Step 6 To continue specifying other group settings, perform other procedures in this
chapter, as applicable.
Note If this feature does not appear, click Interface Configuration, click Advanced
Options, and then select the Usage Quotas check box.
Perform this procedure to define usage quotas for members of a group. Session
quotas affect each user of a group individually, not the group collectively. You can
set quotas for a given period in two ways:
• By total duration of session
• By the total number of sessions
If you make no selections in the Usage Quotas section for a group, no usage
quotas are enforced on users assigned to that group, unless you configure usage
quotas for the individual users.
Note The Usage Quotas section on the Group Settings page does not show usage
statistics.
Usage statistics are available only on the settings page for an individual user. For
more information, see Setting User Usage Quotas Options, page 7-17.
When a user exceeds his or her assigned quota, Cisco Secure ACS denies that user
access upon attempting to start a session. If a quota is exceeded during a session,
Cisco Secure ACS allows the session to continue.
You can reset the usage quota counters for all users of a group from the Group
Settings page. For more information about resetting usage quota counters for a
whole group, see Resetting Usage Quota Counters for a User Group, page 6-53.
network fails, the quota is not updated. In the case of multiple sessions, such as
with ISDN, the quota is not updated until all sessions terminate. This means that
a second channel will be accepted even if the first channel has exhausted the quota
for the user.
To set user usage quotas for a user group, follow these steps:
c. Select the period for which the quota is effective from the following:
• per Day—From 12:01 a.m. until midnight.
• per Week—From 12:01 a.m. Sunday until midnight Saturday.
• per Month—From 12:01 a.m. on the first of the month until midnight on
the last day of the month.
• Total—An ongoing count of hours, with no end.
Step 4 To define user session quotas based on number of sessions, follow these steps:
a. In the Usage Quotas table, select the Limit each user of this group to x
sessions check box.
b. Type the number of sessions to which you want to limit users in the to x
sessions box.
c. Select the period for which the session quota is effective from the following:
• per Day—From 12:01 a.m. until midnight.
• per Week—From 12:01 a.m. Sunday until midnight Saturday.
• per Month—From 12:01 a.m. on the first of the month until midnight on
the last day of the month.
• Total—An ongoing count of session, with no end.
Step 5 To save the group settings you have just made, click Submit.
For more information, see Saving Changes to User Group Settings, page 6-54.
Step 6 To continue specifying other group settings, perform other procedures in this
chapter, as applicable.
Note If this section does not appear, configure a token server. Then, click External
User Databases, click Database Configuration, and then add the applicable
token card server.
Perform this procedure to allow a token to be cached. This means users can use a
second B channel without having to enter a second one-time password (OTP).
Caution This option is for use with token caching only for ISDN terminal adapters. You
should fully understand token caching and ISDN concepts and principles before
implementing this option. Token caching allows you to connect to multiple B
channels without having to provide a token for each channel connection. Token
card settings are applied to all users in the selected group.
Step 4 In the Token Card Settings table, to cache the token for the entire session, select
Session.
Step 5 Also in the Token Card Settings table, to cache the token for a specified time
period (measured from the time of first authentication), follow these steps:
a. Select Duration.
b. Type the duration length in the box.
c. Select the unit of measure, either Seconds, Minutes or Hours.
Step 6 To save the group settings you have just made, click Submit.
For more information, see Saving Changes to User Group Settings, page 6-54.
Step 7 To continue specifying other group settings, perform other procedures in this
chapter, as applicable.
Note If this section does not appear, click Interface Configuration and then click
TACACS+ (Cisco). At the bottom of the page in the Advanced Configuration
Options table, select the Advanced TACACS+ features check box.
Note To define levels in this manner, you must have configured the option
in Interface Configuration; if you have not done so already, click
Interface Configuration, click Advanced Settings, and then select
the Network Device Groups check box.
If you are using NDGs, this option lets you configure the NDG for
enable-level mapping rather than having to do it for each user in the group.
To set enable privilege options for a user group, follow these steps:
Also, to run password aging for transit sessions, the AAA client can be
running either RADIUS or TACACS+; and the AAA client must be using
Cisco IOS Release 11.2.7 or later and be configured to send a watchdog
accounting packet (aaa accounting new-info update) with the IP address of
the calling station. (Watchdog packets are interim packets sent periodically
during a session. They provide an approximate session length in the event that
no stop packet is received to mark the end of the session.)
You can control whether Cisco Secure ACS propagates passwords changed
by this feature. For more information, see Local Password Management,
page 8-5.
Cisco Secure ACS supports password aging using the RADIUS protocol under
MS CHAP versions 1 and 2. Cisco Secure ACS does not support password aging
over Telnet connections using the RADIUS protocol.
Caution If a user with a RADIUS connection tries to make a Telnet connection to the AAA
client during or after the password aging warning or grace period, the change
password option does not appear, and the user account is expired.
Note All passwords expire at midnight, not the time at which they were set.
Tip To allow users to log in an unlimited number of times without changing their
passwords, type -1.
that they must change their passwords. If users do not change their
passwords now, their accounts expire and they cannot log in. This
number must be greater than the Issue warning after x login number.
Tip To allow users to log in an unlimited number of times without changing their
passwords, type -1.
• Apply password change rule—Selecting this check box forces new users to
change their passwords the first time they log in.
• Generate greetings for successful logins—Selecting this check box enables
a Greetings message to display whenever users log in successfully via the
CAA client. The message contains up-to-date password information specific
to this user account.
The password aging rules are not mutually exclusive; a rule is applied for each
check box that is selected. For example, users can be forced to change their
passwords every 20 days, and every 10 logins, and to receive warnings and grace
periods accordingly.
If no options are selected, passwords never expire.
Unlike most other parameters, which have corresponding settings at the user level,
password aging parameters are configured only on a group basis.
Users who fail authentication because they have not changed their passwords and
have exceeded their grace periods are logged in the Failed Attempts log. The
accounts expire and appear in the Accounts Disabled list.
Before You Begin
• Verify that your AAA client is running the TACACS+ or RADIUS protocol.
(TACACS+ only supports password aging for device-hosted sessions.)
• Set up your AAA client to perform authentication and accounting using the
same protocol, either TACACS+ or RADIUS.
• Verify that you have configured your password validation options. For more
information, see Local Password Management, page 8-5.
• Set up your AAA client to use Cisco IOS Release 11.2.7 or later and to send
a watchdog accounting packet (aaa accounting new-info update) with the IP
address of the calling station.
To set password aging rules for a user group, follow these steps:
Step 5 To set password aging by use, select the Apply age-by-uses rules check box and
type the number of logins for each of the following options, as applicable:
• Issue warning after x logins
• Require change after x logins
Step 6 To force the user to change the password on the first login after an administrator
has changed it, select the Apply password change rule check box.
Step 7 To enable a Greetings message display, select the Generate greetings for
successful logins check box.
Step 8 To save the group settings you have just made, click Submit.
For more information, see Saving Changes to User Group Settings, page 6-54.
Step 9 To continue specifying other group settings, perform other procedures in this
chapter, as applicable.
Note You can run both Windows Password Aging and Cisco Secure ACS Password
Aging for Transit Sessions mechanisms concurrently, provided that the users
authenticate from the two different databases.
Tip For information on enabling MS CHAP for password changes, see Configuring
Windows Authentication, page 13-29. For information on enabling MS CHAP in
System Configuration, see Global Authentication Setup, page 10-25.
Tip For information about enabling PEAP in System Configuration, see Global
Authentication Setup, page 10-25.
Tip For information about enabling PEAP password changes, see Configuring
Windows Authentication, page 13-29.
Users whose Windows accounts reside in “remote” domains (that is, not the
domain within which Cisco Secure ACS is running) can only use the
Windows-based password aging if they supply their domain names.
The methods and functionality of Windows password aging differ according to
which Microsoft Windows operating system you are using, and whether you
employ Active Directory (AD) or Security Accounts Manager (SAM). Setting
password aging for users in the Windows user database is only one part of the
Note If there is more than one pool in the Selected Pools list, the users
in this group are assigned to the first available pool in the order
listed.
Tip To change the position of a pool in the list, select the pool name and click
Up or Down until the pool is in the position you want.
Step 5 To save the group settings you have just made, click Submit.
For more information, see Saving Changes to User Group Settings, page 6-54.
Step 6 To continue specifying other group settings, perform other procedures in this
chapter, as applicable.
Note You must have established one or more IP ACLs before attempting to assign one.
For instructions on how to add a downloadable IP ACL using the Shared Profile
Components section of the Cisco Secure ACS HTML interface, see Adding a
Downloadable IP ACL, page 5-4.
Tip The Downloadable ACLs table does not appear if it has not been enabled. To
enable the Downloadable ACLs table, click Interface Configuration, click
Advanced Options, and then select the Group-Level Downloadable ACLs
check box.
The Group Settings page displays the name of the group at its top.
Step 3 From the Jump To list at the top of the page, choose TACACS+.
The system displays the TACACS+ Settings table section.
Step 4 To configure services and protocols in the TACACS+ Settings table to be
authorized for the group, follow these steps:
a. Select one or more service/protocol check boxes (for example, PPP IP or
ARAP).
b. Under each service/protocol that you selected in Step a, select attributes and
then type in the corresponding values, as applicable, to further define
authorization for that service/protocol.
To employ custom attributes for a particular service, you must select the
Custom attributes check box under that service, and then specify the
attribute/value in the box below the check box.
For more information about attributes, see Appendix B, “TACACS+
Attribute-Value Pairs,” or your AAA client documentation.
Tip For ACLs and IP address pools, the name of the ACL or pool as defined
on the AAA client should be entered. (An ACL is a list of Cisco IOS
commands used to restrict access to or from other devices and users on
the network.)
Note Leave the attribute value box blank if the default (as defined on the
AAA client) should be used.
Step 5 To allow all services to be permitted unless specifically listed and disabled, you
can select the Default (Undefined) Services check box under the Checking this
option will PERMIT all UNKNOWN Services table.
Caution This is an advanced feature and should only be used by administrators who
understand the security implications.
Step 6 To save the group settings you have just made, click Submit.
For more information, see Saving Changes to User Group Settings, page 6-54.
Step 7 To continue specifying other group settings, perform other procedures in this
chapter, as applicable.
Note This feature requires that you have previously configured a shell command
authorization set. For detailed steps, see Adding a Command Authorization Set,
page 5-19.
To specify shell command authorization set parameters for a user group, follow
these steps:
Step 2 From the Group list, select a group, and then click Edit Settings.
The Group Settings page displays the name of the group at its top.
Step 3 From the Jump To list at the top of the page, choose TACACS+.
The system displays the TACACS+ Settings table section.
Step 4 Use the vertical scrollbar to scroll to the Shell Command Authorization Set
feature area.
Step 5 To prevent the application of any shell command authorization set, select (or
accept the default of) the None option.
Step 6 To assign a particular shell command authorization set to be effective on any
configured network device, follow these steps:
a. Select the Assign a Shell Command Authorization Set for any network
device option.
b. Then, from the list directly below that option, select the shell command
authorization set you want applied to this group.
Step 7 To create associations that assign a particular shell command authorization set to
be effective on a particular NDG, for each association, follow these steps:
a. Select the Assign a Shell Command Authorization Set on a per Network
Device Group Basis option.
b. Select a Device Group and a corresponding Command Set.
Tip You can select a Command Set that will be effective for all Device
Groups, that are not otherwise assigned, by assigning that set to the
<default> Device Group.
Tip To enter several commands, you must click Submit after specifying a
command. A new command entry box appears below the box you just
completed.
• Make sure that you have already configured one or more PIX command
authorization sets. For detailed steps, see Adding a Command Authorization
Set, page 5-19.
To specify PIX command authorization set parameters for a user group, follow
these steps:
Note This feature requires that you have configured a command authorization set for
the applicable Cisco device-management application. For detailed steps, see
Adding a Command Authorization Set, page 5-19.
Note To hide or display Cisco IOS/PIX RADIUS attributes, see Setting Protocol
Configuration Options for Non-IETF RADIUS Attributes, page 3-17. A VSA
applied as an authorization to a particular group persists, even when you remove
or replace the associated AAA client; however, if you have no AAA clients of this
(vendor) type configured, the VSA settings do not appear in the group
configuration interface.
Step 1 Before you configure Cisco IOS/PIX RADIUS attributes, be sure your IETF
RADIUS attributes are configured properly. For more information about setting
IETF RADIUS attributes, see Configuring IETF RADIUS Settings for a User
Group, page 6-37.
Step 2 For the Cisco attributes, determine the attributes to be authorized for the group by
selecting the check box next to the attribute, and then type the commands (such
as TACACS+ commands) to be packed as a RADIUS VSA.
Step 3 To save the group settings you have just made, click Submit.
For more information, see Saving Changes to User Group Settings, page 6-54.
Step 4 To continue specifying other group settings, perform other procedures in this
chapter, as applicable.
Tip Only enable and configure the Cisco-Aironet-Session-Timeout when some or all
members of a group may connect through wired or wireless access devices. If
members of a group always connect with a Cisco Aironet Access Point (AP) or
always connect only with a wired access device, you do not need to use
Cisco-Aironet-Session-Timeout but should instead configure RADIUS (IETF)
attribute 27, Session-Timeout.
Note To hide or display the Cisco Aironet RADIUS VSA, see Setting Protocol
Configuration Options for Non-IETF RADIUS Attributes, page 3-17. A VSA
applied as an authorization to a particular group persists, even when you remove
or replace the associated AAA client; however, if you have no AAA clients
configured to use RADIUS (Cisco Aironet), the VSA settings do not appear in the
group configuration interface.
Step 1 Confirm that your IETF RADIUS attributes are configured properly. For more
information about setting IETF RADIUS attributes, see Configuring IETF
RADIUS Settings for a User Group, page 6-37.
Step 2 In the navigation bar, click Group Setup.
The Group Setup Select page opens.
Step 3 From the Group list, select a group, and then click Edit Settings.
The Group Settings page displays the name of the group at its top.
Step 4 From the Jump To list at the top of the page, choose RADIUS (Cisco Aironet).
Step 5 In the Cisco Aironet RADIUS Attributes table, select the [5842\001]
Cisco-Aironet-Session-Timeout check box.
Step 6 In the [5842\001] Cisco-Aironet-Session-Timeout box, type the session timeout
value (in seconds) that Cisco Secure ACS is to send in the IETF RADIUS
Session-Timeout (27) attribute when the AAA client is configured in Network
Configuration to use the RADIUS (Cisco Aironet) authentication option. The
recommended value is 600 seconds.
For more information about the IETF RADIUS Session-Timeout attribute, see
Appendix C, “RADIUS Attributes,” or your AAA client documentation.
Step 7 To save the group settings you have just made, click Submit.
For more information, see Saving Changes to User Group Settings, page 6-54.
Step 8 To continue specifying other group settings, perform other procedures in this
chapter, as applicable.
Note To hide or display Ascend RADIUS attributes, see Setting Protocol Configuration
Options for Non-IETF RADIUS Attributes, page 3-17. A VSA applied as an
authorization to a particular group persists, even when you remove or replace the
associated AAA client; however, if you have no AAA clients of this (vendor) type
configured, the VSA settings do not appear in the group configuration interface.
Step 1 Confirm that your IETF RADIUS attributes are configured properly. For more
information about setting IETF RADIUS attributes, see Configuring IETF
RADIUS Settings for a User Group, page 6-37.
Step 2 In the navigation bar, click Group Setup.
The Group Setup Select page opens.
Step 3 From the Group list, select a group, and then click Edit Settings.
The Group Settings page displays the name of the group at its top.
Step 4 From the Jump To list at the top of the page, choose RADIUS (Ascend).
Step 5 In the Ascend RADIUS Attributes table, determine the attributes to be authorized
for the group by selecting the check box next to the attribute. Be sure to define the
authorization for that attribute in the field next to it. For more information about
attributes, see Appendix C, “RADIUS Attributes,” or your AAA client
documentation.
Step 6 To save the group settings you have just made, click Submit.
For more information, see Saving Changes to User Group Settings, page 6-54.
Step 7 To continue specifying other group settings, perform other procedures in this
chapter, as applicable.
Note To hide or display Cisco VPN 3000 Concentrator RADIUS attributes, see Setting
Protocol Configuration Options for Non-IETF RADIUS Attributes, page 3-17. A
VSA applied as an authorization to a particular group persists, even when you
remove or replace the associated AAA client; however, if you have no AAA
clients of this (vendor) type configured, the VSA settings do not appear in the
group configuration interface.
Step 1 Confirm that your IETF RADIUS attributes are configured properly.
For more information about setting IETF RADIUS attributes, see Configuring
IETF RADIUS Settings for a User Group, page 6-37.
Step 2 In the navigation bar, click Group Setup.
The Group Setup Select page opens.
Step 3 From the Group list, select a group, and then click Edit Settings.
The Group Settings page displays the name of the group at its top.
Step 4 From the Jump To list at the top of the page, choose RADIUS (Cisco VPN 3000).
Step 5 In the Cisco VPN 3000 Concentrator RADIUS Attributes table, determine the
attributes to be authorized for the group by selecting the check box next to the
attribute. Further define the authorization for that attribute in the field next to it.
Note To hide or display Cisco VPN 5000 Concentrator RADIUS attributes, see Setting
Protocol Configuration Options for Non-IETF RADIUS Attributes, page 3-17. A
VSA applied as an authorization to a particular group persists, even when you
remove or replace the associated AAA client; however, if you have no AAA
clients of this (vendor) type configured, the VSA settings do not appear in the
group configuration interface.
Step 1 Confirm that your IETF RADIUS attributes are configured properly.
For more information about setting IETF RADIUS attributes, see Configuring
IETF RADIUS Settings for a User Group, page 6-37.
Step 2 In the navigation bar, click Group Setup.
The Group Setup Select page opens.
Step 3 From the Group list, select a group, and then click Edit Settings.
The Group Settings page displays the name of the group at its top.
Step 4 From the Jump To list at the top of the page, choose RADIUS (Cisco VPN 5000).
Step 5 In the Cisco VPN 5000 Concentrator RADIUS Attributes table, select the
attributes that should be authorized for the group by selecting the check box next
to the attribute. Further define the authorization for each attribute in the field next
to it.
For more information about attributes, see Appendix C, “RADIUS Attributes,” or
the documentation for network devices using RADIUS.
Step 6 To save the group settings you have just made, click Submit.
For more information, see Saving Changes to User Group Settings, page 6-54.
Step 7 To continue specifying other group settings, perform other procedures in this
chapter, as applicable.
enabled, Cisco Secure ACS determines the values to be sent in outbound RADIUS
(Microsoft) attributes and sends them along with the RADIUS (Cisco VPN 3000)
attributes, regardless of whether RADIUS (Microsoft) attributes are enabled in
the Cisco Secure ACS HTML interface or how those attributes might be
configured.
The Microsoft RADIUS attribute configurations appear only when both the
following are true:
• A network device has been configured in Network Configuration that uses a
RADIUS protocol that supports the Microsoft RADIUS VSA.
• Group-level Microsoft RADIUS attributes have been enabled on the RADIUS
(Microsoft) page of the Interface Configuration section.
The following Cisco Secure ACS RADIUS protocols support the Microsoft
RADIUS VSA:
• Cisco IOS/PIX
• Cisco VPN 3000
• Ascend
Microsoft RADIUS represents only the Microsoft VSA. You must configure both
the IETF RADIUS and Microsoft RADIUS attributes.
Step 1 Confirm that your IETF RADIUS attributes are configured properly.
For more information about setting IETF RADIUS attributes, see Configuring
IETF RADIUS Settings for a User Group, page 6-37.
Step 2 In the navigation bar, click Group Setup.
The Group Setup Select page opens.
Step 3 From the Group list, select a group, and then click Edit Settings.
The Group Settings page displays the name of the group at its top.
Step 4 From the Jump To list at the top of the page, choose RADIUS (Microsoft).
Step 5 In the Microsoft RADIUS Attributes table, specify the attributes to be authorized
for the group by selecting the check box next to the attribute. Where applicable,
further define the authorization for that attribute in the field next to it. For more
information about attributes, see Appendix C, “RADIUS Attributes,” or the
documentation for network devices using RADIUS.
Step 6 To save the group settings you have just made, click Submit.
For more information, see Saving Changes to User Group Settings, page 6-54.
Step 7 To continue specifying other group settings, perform other procedures in this
chapter, as applicable.
Note To hide or display Nortel RADIUS attributes, see Setting Protocol Configuration
Options for Non-IETF RADIUS Attributes, page 3-17. A VSA applied as an
authorization to a particular group persists, even when you remove or replace the
associated AAA client; however, if you have no AAA clients of this (vendor) type
configured, the VSA settings do not appear in the group configuration interface.
Step 1 Confirm that your IETF RADIUS attributes are configured properly.
For more information about setting IETF RADIUS attributes, see Configuring
IETF RADIUS Settings for a User Group, page 6-37.
Step 2 In the navigation bar, click Group Setup.
The Group Setup Select page opens.
Step 3 From the Group list, select a group, and then click Edit Settings.
The Group Settings page displays the name of the group at its top.
Step 4 From the Jump To list at the top of the page, choose RADIUS (Nortel).
Step 5 In the Nortel RADIUS Attributes table, specify the attributes to be authorized for
the group by selecting the check box next to the attribute. Where applicable,
further define the authorization for that attribute in the field next to it. For more
information about attributes, see Appendix C, “RADIUS Attributes,” or the
documentation for network devices using RADIUS.
Step 6 To save the group settings you have just made, click Submit.
For more information, see Saving Changes to User Group Settings, page 6-54.
Step 7 To continue specifying other group settings, perform other procedures in this
chapter, as applicable.
Note To hide or display Juniper RADIUS attributes, see Setting Protocol Configuration
Options for Non-IETF RADIUS Attributes, page 3-17. A VSA applied as an
authorization to a particular group persists, even when you remove or replace the
associated AAA client; however, if you have no AAA clients of this (vendor) type
configured, the VSA settings do not appear in the group configuration interface.
Step 1 Confirm that your IETF RADIUS attributes are configured properly.
For more information about setting IETF RADIUS attributes, see Configuring
IETF RADIUS Settings for a User Group, page 6-37.
Step 2 In the navigation bar, click Group Setup.
The Group Setup Select page opens.
Step 3 From the Group list, select a group, and then click Edit Settings.
The Group Settings page displays the name of the group at its top.
Step 4 From the Jump To list at the top of the page, choose RADIUS (Juniper).
Step 5 In the Juniper RADIUS Attributes table, specify the attributes to be authorized for
the group by selecting the check box next to the attribute. Where applicable,
further define the authorization for that attribute in the field next to it. For more
information about attributes, see Appendix C, “RADIUS Attributes,” or the
documentation for network devices using RADIUS.
Step 6 To save the group settings you have just made, click Submit.
For more information, see Saving Changes to User Group Settings, page 6-54.
Step 7 To continue specifying other group settings, perform other procedures in this
chapter, as applicable.
Note To hide or display BBSM RADIUS attributes, see Setting Protocol Configuration
Options for Non-IETF RADIUS Attributes, page 3-17. A VSA applied as an
authorization to a particular group persists, even when you remove or replace the
associated AAA client; however, if you have no AAA clients of this (vendor) type
configured, the VSA settings do not appear in the group configuration interface.
Step 1 Confirm that your IETF RADIUS attributes are configured properly.
For more information about setting IETF RADIUS attributes, see Configuring
IETF RADIUS Settings for a User Group, page 6-37.
Step 2 In the navigation bar, click Group Setup.
The Group Setup Select page opens.
Step 3 From the Group list, select a group, and then click Edit Settings.
The Group Settings page displays the name of the group at its top.
Step 4 From the Jump To list at the top of the page, choose RADIUS (BBSM).
Step 5 In the BBSM RADIUS Attributes table, specify the attribute to be authorized for
the group by selecting the check box next to the attribute. Where applicable,
further define the authorization for that attribute in the field next to it. For more
information about attributes, see Appendix C, “RADIUS Attributes,” or the
documentation for network devices using RADIUS.
Step 6 To save the group settings you have just made, click Submit.
For more information, see Saving Changes to User Group Settings, page 6-54.
Step 7 To continue specifying other group settings, perform other procedures in this
chapter, as applicable.
Step 1 Confirm that your IETF RADIUS attributes are configured properly.
For more information about setting IETF RADIUS attributes, see Configuring
IETF RADIUS Settings for a User Group, page 6-37.
Step 2 In the navigation bar, click Group Setup.
The Group Setup Select page opens.
Step 3 From the Group list, select a group, and then click Edit Settings.
The Group Settings page displays the name of the group at its top.
Step 4 From the Jump To list at the top of the page, choose RADIUS (custom name).
Step 5 In the RADIUS (custom name) Attributes table, specify the attributes to be
authorized for the group by selecting the check box next to the attribute. Where
applicable, further define the authorization for that attribute in the field next to it.
For more information about attributes, see Appendix C, “RADIUS Attributes,” or
the documentation for network devices using RADIUS.
Step 6 To save the group settings you have just made, click Submit.
For more information, see Saving Changes to User Group Settings, page 6-54.
Step 7 To continue specifying other group settings, perform other procedures in this
chapter, as applicable.
Note The group remains in the same position in the list. The number value of
the group is still associated with this group name. Some utilities, such as
the database import utility, use the numeric value associated with the
group.
The Select page opens with the new group name selected.
Step 1 To save your changes and apply them later, click Submit. When you are ready to
implement the changes, click System Configuration, and then click Service
Control, and click Restart.
The group attributes are applied and services are restarted. The Edit page opens.
Note Restarting the service clears the Logged-in User Report and temporarily
interrupts all Cisco Secure ACS services. This affects the Max Sessions
counter.
Step 2 To verify that your changes were applied, select the group and click Edit Settings.
View the settings.
This chapter provides information about setting up and managing user accounts
in Cisco Secure ACS Appliance.
Note Settings at the user level override settings configured at the group level.
Before you configure User Setup, you should understand how this section
functions. Cisco Secure ACS dynamically builds the User Setup section interface
depending on the configuration of your AAA client and the security protocols
being used. That is, what you see under User Setup is affected by settings in both
the Network Configuration and Interface Configuration sections.
This chapter contains the following topics:
• About User Setup Features and Functions, page 7-1
• Basic User Setup Options, page 7-2
• Advanced User Authentication Settings, page 7-21
• User Management, page 7-53
From within the User Setup section, you can perform the following tasks:
• View a list of all users in the CiscoSecure user database.
• Find a user.
• Add a user.
• Assign the user to a group, including Voice-over-IP (VoIP) Groups.
• Edit user account information.
• Establish or change user authentication type.
• Configure callback information for the user.
• Set network access restrictions (NARs) for the user.
• Configure Advanced Settings.
• Set the maximum number of concurrent sessions (Max Sessions) for the user.
• Disable or re-enable the user account.
• Delete the user.
Note The username can contain up to 64 characters. Names cannot contain the
following special characters:
#?"*><
Leading and trailing spaces are not allowed.
Step 4 Make sure that the Account Disabled check box is cleared.
Note Alternatively, you can select the Account Disabled check box to create a
user account that is disabled, and enable the account at another time.
Step 5 Under Password Authentication in the User Setup table, select the applicable
authentication type from the list.
Tip The authentication types that appear reflect the databases that you have
configured in the Database Configuration area of the External User
Databases section.
Step 6 Specify a single CiscoSecure PAP password by typing it in the first set of
Password and Confirm Password boxes.
Note Up to 32 characters are allowed each for the Password box and the
Confirm Password box.
Tip You can configure the AAA client to ask for a PAP password first and then
a CHAP or MS-CHAP password so that when users dial in using a PAP
password, they will authenticate. For example, the following line in the
AAA client configuration file causes the AAA client to enable CHAP
after PAP:
ppp authentication pap chap
Tip For lengthy account configurations, you can click Submit before
continuing. This will prevent loss of information you have already entered
if an unforeseen problem occurs.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Complete each box that appears in the Supplementary User Info table.
Note Up to 128 characters are allowed each for the Real Name and the
Description boxes.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Select the Separate CHAP/MS-CHAP/ARAP check box in the User Setup table.
Step 3 Specify the CHAP/MS-CHAP/ARAP password to be used by typing it in each of
the second set of Password/Confirm boxes under the Separate
(CHAP/MS-CHAP/ARAP) check box.
Note Up to 32 characters are allowed each for the Password box and the
Confirm Password box.
Note These Password and Confirm Password boxes are only required for
authentication by the Cisco Secure ACS database. Additionally, if a user
is assigned to a VoIP (null password) group, and the optional password is
also included in the user profile, the password is not used until the user is
re-mapped to a non-VoIP group.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited appears at
the top of the page.
Step 2 From the Group to which user is assigned list in the User Setup table, select the
group to which you want to assign the user.
Tip Alternatively, you can scroll up in the list to select the Mapped By
External Authenticator option.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited appears at
the top of the page.
Step 2 Under Callback in the User Setup table, select the applicable option. Choices
include the following:
• Use group setting—Select if you want this user to use the setting for the
group.
• No callback allowed—Select to disable callback for this user.
• Callback using this number—Select and type the complete number,
including area code if necessary, on which to always call back this user.
Note The maximum character length for the callback number is 199
characters.
Note The dial-in user must have configured software that supports
callback.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Under Client IP Address Assignment in the User Setup table, select the applicable
option. Choices include the following:
• Assigned by AAA client pool—Select this option and type the AAA client
IP pool name in the box, if this user is to have the IP address assigned by an
IP address pool configured on the AAA client.
• Assigned from AAA pool—Select this option and type the applicable pool
name in the box, if this user is to have the IP address assigned by an IP address
pool configured on the AAA server. Select the AAA server IP pool name from
the Available Pools list, and then click --> (right arrow button) to move the
name into the Selected Pools list. If there is more than one pool in the
Selected Pools list, the users in this group are assigned to the first available
pool in the order listed. To move the position of a pool in the list, select the
pool name and click Up or Down until the pool is in the position you want.
Step 3 Do one of the following:
• If you are finished configuring the user account options, click Submit to
record the options.
• To continue to specify the user account options, perform other procedures in
this chapter, as applicable.
Note You can also use the CLI/DNIS-based access restrictions area to
specify other values. For more information, see About Network
Access Restrictions, page 5-7.
Typically, you define (shared) NARs from within the Shared Components section
so that these restrictions can be applied to more than one group or user. For more
information, see Adding a Shared Network Access Restriction, page 5-9. You
must have selected the User-Level Shared Network Access Restriction check box
on the Advanced Options page of the Interface Configuration section for this set
of options to appear in the HTML interface.
However, Cisco Secure ACS also enables you to define and apply a NAR for a
single user from within the User Setup section. You must have enabled the
User-Level Network Access Restriction setting on the Advanced Options page of
the Interface Configuration section for single user IP-based filter options and
single user CLI/DNIS-based filter options to appear in the HTML interface.
Note When an authentication request is forwarded by proxy to a Cisco Secure ACS, any
NARs for TACACS+ requests are applied to the IP address of the forwarding
AAA server, not to the IP address of the originating AAA client.
When you create access restrictions on a per-user basis, Cisco Secure ACS does
not enforce limits to the number of access restrictions and it does not enforce a
limit to the length of each access restriction; however, there are strict limits, as
follows:
• The combination of fields for each line item cannot exceed 1024 characters
in length.
• The shared NAR cannot have more than 16 KB of characters. The number of
line items supported depends on the length of each line item. For example, if
you create a CLI/DNIS-based NAR where the AAA client names are 10
characters, the port numbers are 5 characters, the CLI entries are 15
characters, and the DNIS entries are 20 characters, you can add 450 line items
before reaching the 16 KB limit.
To set NARs for a user, follow these steps:
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 To apply a previously configured shared NAR to this user, follow these steps:
Note To apply a shared NAR, you must have configured it under Network
Access Restrictions in the Shared Profile Components section. For more
information, see Adding a Shared Network Access Restriction, page 5-9.
Tip To view the server details of the shared NARs you have selected to apply,
you can click either View IP NAR or View CLID/DNIS NAR, as
applicable.
Step 3 To define and apply a NAR, for this particular user, that permits or denies this user
access based on IP address, or IP address and port, follow these steps:
Tip You should define most NARs from within the Shared Components
section so that they can be applied to more than one group or user. For
more information, see Adding a Shared Network Access Restriction,
page 5-9.
a. In the Network Access Restrictions table, under Per User Defined Network
Access Restrictions, select the Define IP-based access restrictions check
box.
b. To specify whether the subsequent listing specifies permitted or denied IP
addresses, from the Table Defines list, select one of the following:
• Permitted Calling/Point of Access Locations
• Denied Calling/Point of Access Locations
Note The total number of characters in the AAA Client list and the Port and
Src IP Address boxes must not exceed 1024. Although Cisco Secure
ACS accepts more than 1024 characters when you add a NAR, you
cannot edit the NAR and Cisco Secure ACS cannot accurately apply
it to users.
d. Click enter.
The specified AAA client, port, and address information appears in the table
above the AAA Client list.
Step 4 To permit or deny this user access based on calling location or values other than
an established IP address, follow these steps:
a. Select the Define CLI/DNIS based access restrictions check box.
b. To specify whether the subsequent listing specifies permitted or denied
values, from the Table Defines list, select one of the following:
• Permitted Calling/Point of Access Locations
• Denied Calling/Point of Access Locations
c. Complete the following boxes:
Note You must make an entry in each box. You can use the wildcard
asterisk (*) for all or part of a value. The format you use must match
the format of the string you receive from your AAA client. You can
determine this format from your RADIUS Accounting Log.
• AAA Client—Select All AAA Clients, or the name of the NDG, or the
name of the individual AAA client, to which to permit or deny access.
• PORT—Type the number of the port to which to permit or deny access.
You can use the wildcard asterisk (*) to permit or deny access to all ports.
• CLI—Type the CLI number to which to permit or deny access. You can
use the wildcard asterisk (*) to permit or deny access based on part of the
number.
Tip This is also the selection to use if you want to restrict access based on
other values such as a Cisco Aironet client MAC address. For more
information, see About Network Access Restrictions, page 5-7.
Tip This is also the selection to use if you want to restrict access based on
other values such as a Cisco Aironet AP MAC address. For more
information, see About Network Access Restrictions, page 5-7.
Note The total number of characters in the AAA Client list and the Port,
CLI, and DNIS boxes must not exceed 1024. Although Cisco Secure
ACS accepts more than 1024 characters when you add a NAR, you
cannot edit the NAR and Cisco Secure ACS cannot accurately apply
it to users.
d. Click enter.
The information, specifying the AAA client, port, CLI, and DNIS, appears in
the table above the AAA Client list.
Note Each Cisco Secure ACS holds its own Max Sessions counts. There is no
mechanism for Cisco Secure ACS to share Max Sessions counts across multiple
Cisco Secure ACSes. Therefore, if two Cisco Secure ACS are set up as a mirror
pair with the workload distributed between them, they will have completely
independent views of the Max Sessions totals.
Tip If the Max Sessions table does not appear, click Interface Configuration, click
Advanced Options, and then select the Max Sessions check box.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 In the Max Sessions table, under Sessions available to user, select one of the
following three options:
• Unlimited—Select to allow this user an unlimited number of simultaneous
sessions. (This effectively disables Max Sessions.)
• n—Select and then type the maximum number of simultaneous sessions to
allow this user.
• Use group setting—Select to use the Max Sessions value for the group.
Note User Max Sessions settings override the group Max Sessions settings. For
example, if the group Sales has a Max Sessions value of only 10, but a
user in the group Sales, John, has a User Max Sessions value of
Unlimited, John is still allowed an unlimited number of sessions.
Note If the User Usage Quotas feature does not appear, click Interface Configuration,
click Advanced Options, and then select the Usage Quotas check box.
Tip The Current Usage table under the User Usage Quotas table on the User Setup
Edit page displays usage statistics for the current user. The Current Usage table
lists both online time and sessions used by the user, with columns for daily,
weekly, monthly, and total usage. The Current Usage table appears only on user
accounts that you have established; that is, it does not appear during initial user
setup.
For a user who has exceeded his quota, Cisco Secure ACS denies him access upon
his next attempt to start a session. If a quota is exceeded during a session,
Cisco Secure ACS allows the session to continue. If a user account has been
disabled because the user has exceeded usage quotas, the User Setup Edit page
displays a message stating that the account has been disabled for this reason.
You can reset the session quota counters on the User Setup page for a user. For
more information about resetting usage quota counters, see Resetting User
Session Quota Counters, page 7-57.
To support time-based quotas, we recommend enabling accounting update packets
on all AAA clients. If update packets are not enabled, the quota is updated only
when the user logs off. If the AAA client through which the user is accessing your
network fails, the quota is not updated. In the case of multiple sessions, such as
with ISDN, the quota is not updated until all sessions terminate, which means that
a second channel will be accepted even if the first channel has exhausted the quota
allocated to the user.
To set usage quota options for a user, follow these steps:
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 In the Usage Quotas table, select Use these settings.
Step 3 To define a usage quota based on duration of sessions for a user, follow these
steps:
a. Select the Limit user to x hours of online time check box.
b. Type the number of hours to which you want to limit the user in the Limit
user to x hours of online time box. Use decimal values to indicate minutes.
For example, a value of 10.5 would equal 10 hours and 30 minutes.
c. Select the period for which you want to enforce the time usage quota:
• per Day—From 12:01 a.m. until midnight.
• per Week—From 12:01 a.m. Sunday until midnight Saturday.
• per Month—From 12:01 a.m. on the first of the month until midnight on
the last day of the month.
• Absolute—A continuous, open-ended count of hours.
Step 4 To define usage quotas based on the number of sessions for a user, follow these
steps:
a. Select the Limit user to x sessions check box.
b. Type the number of sessions to which you want to limit the user in the Limit
user to x sessions box.
c. Select the period for which you want to enforce the session usage quota:
• per Day—From 12:01 a.m. until midnight.
• per Week—From 12:01 a.m. Sunday until midnight Saturday.
• per Month—From 12:01 a.m. on the first of the month until midnight on
the last day of the month.
• Absolute—A continuous, open-ended count of hours.
Note Do not confuse this feature with account expiration due to password aging.
Password aging is defined for groups only, not for individual users. Also note that
this feature is distinct from the Account Disabled check box. For instructions on
how to disable a user account, see Disabling a User Account, page 7-55.
Note If the user is authenticated with a Windows user database, this expiration
information is in addition to the information in the Windows user account.
Changes here do not alter settings configured in Windows.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Do one of the following:
a. Select the Never option to keep the user account always enabled.
b. Select the Disable account if option to disable the account under specific
circumstances. Then, specify one or both of the circumstances under the
following boxes:
• Date exceeds—Select the Date exceeds: check box. Then select the
month and type the date (two characters) and year (four characters) on
which to disable the account.
Note The Downloadable ACLs table does not appear if it has not been enabled. To
enable the Downloadable ACLs table, click Interface Configuration, click
Advanced Options, and then select the User-Level Downloadable ACLs check
box.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added and edited is at the
top of the page.
Step 2 Under the Downloadable ACLs section, click the Assign IP ACL: check box.
Step 3 Select an IP ACL from the list.
Step 4 Do one of the following:
• If you are finished configuring the user account options, click Submit to
record the options.
• To continue to specify the user account options, perform other procedures in
this chapter, as applicable.
Step 1 Click Interface Configuration and then click TACACS+ (Cisco IOS). In the
TACACS+ Services table, under the heading User, ensure that the check box is
selected for each service/protocol you want to configure.
Step 2 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 3 Scroll down to the TACACS+ Settings table and select the bold service name
check box to enable that protocol; for example (PPP IP).
Step 4 To enable specific parameters within the selected service, select the check box
next to a specific parameter and then do one of the following, as applicable:
• Select the Enabled check box.
• Specify a value in the corresponding attribute box.
To specify ACLs and IP address pools, enter the name of the ACL or pool as
defined on the AAA client. Leave the box blank if the default (as defined on
the AAA client) should be used. For more information about attributes, see
Appendix B, “TACACS+ Attribute-Value Pairs,” or your AAA client
documentation. For information on assigning a IP ACL, see Assigning a
Downloadable IP ACL to a User, page 7-20.
Tip An ACL is a list of Cisco IOS commands used to restrict access to or from
other devices and users on the network.
Step 5 To employ custom attributes for a particular service, select the Custom attributes
check box under that service, and then specify the attribute/value in the box below
the check box.
To specify shell command authorization set parameters for a user, follow these
steps:
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Scroll down to the TACACS+ Settings table and to the Shell Command
Authorization Set feature area within it.
Step 3 To prevent the application of any shell command authorization set, select (or
accept the default of) the None option.
Step 4 To assign the shell command authorization set at the group level, select the As
Group option.
Step 5 To assign a particular shell command authorization set to be effective on any
configured network device, follow these steps:
a. Select the Assign a Shell Command Authorization Set for any network
device option.
b. Then, from the list directly below that option, select the shell command
authorization set you want applied to this user.
Step 6 To create associations that assign a particular shell command authorization set to
be effective on a particular NDG, for each association, follow these steps:
a. Select the Assign a Shell Command Authorization Set on a per Network
Device Group Basis option.
b. Select a Device Group and an associated Command Set.
c. Click Add Association.
Tip You can also select which command set applies to network device groups
that are not listed simply by associating that command set with the NDG
<default> listing.
The NDG or NDGs and associated shell command authorization set or sets
are paired in the table.
Step 7 To define the specific Cisco IOS commands and arguments to be permitted or
denied for this user, follow these steps:
a. Select the Per User Command Authorization option.
b. Under Unmatched Cisco IOS commands, select either Permit or Deny.
If you select Permit, the user can issue all commands not specifically listed.
If you select Deny, the user can issue only those commands listed.
c. To list particular commands to be permitted or denied, select the Command
check box and then type the name of the command, define its arguments using
standard permit or deny syntax, and select whether unlisted arguments are to
be permitted or denied.
Tip To enter several commands, you must click Submit after specifying a
command. A new command entry box appears below the box you just
completed.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Scroll down to the TACACS+ Settings table and to the PIX Command
Authorization Set feature area within it.
Step 3 To prevent the application of any PIX command authorization set, select (or
accept the default of) the None option.
Step 4 To assign the PIX command authorization set at the group level, select the As
Group option.
Step 5 To assign a particular PIX command authorization set to be effective on any
configured network device, follow these steps:
a. Select the Assign a PIX Command Authorization Set for any network
device option.
b. From the list directly below that option, select the PIX command
authorization set you want applied to this user.
Step 6 To create associations that assign a particular PIX command authorization set to
be effective on a particular NDG, for each association, follow these steps:
a. Select the Assign a PIX Command Authorization Set on a per Network
Device Group Basis option.
b. Select a Device Group and an associated Command Set.
c. Click Add Association.
The associated NDG and PIX command authorization set appear in the table.
Step 7 Do one of the following:
• If you are finished configuring the user account options, click Submit to
record the options.
• To continue to specify the user account options, perform other procedures in
this chapter, as applicable.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Scroll down to the TACACS+ Settings table and to the applicable
device-management command authorization feature area within it.
Step 3 To prevent the application of any command authorization for actions performed
in the applicable device-management application, select (or accept the default of)
the None option.
Step 4 To assign command authorization for the applicable device-management
application at the group level, select the As Group option.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Scroll down to the table under the heading Checking this option will PERMIT all
UNKNOWN Services.
Step 3 To allow TACACS+ AAA clients to permit unknown services for this user, select
the Default (Undefined) Services check box.
Step 4 Do one of the following:
• If you are finished configuring the user account options, click Submit to
record the options.
• To continue to specify the user account options, perform other procedures in
this chapter, as applicable.
Tip If the Advanced TACACS+ Settings (User) table does not appear, click Interface
Configuration, click TACACS+ (Cisco IOS), and then click Advanced
TACACS+ Features.
• Max Privilege for any AAA Client—Enables you to select from a list the
maximum privilege level that will apply to this user on any AAA client on
which this user is authorized.
• Define Max Privilege on a per-Network Device Group Basis—Enables you
to associate maximum privilege levels to this user in one or more NDGs.
Note For information about privilege levels, refer to your AAA client
documentation.
Tip You must configure NDGs from within Interface Configuration before you can
assign user privilege levels to them.
To select and specify the privilege level for a user, follow these steps:
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Under TACACS+ Enable Control in the Advanced TACACS+ Settings table,
select one of the four privilege options, as follows:
• Use Group Level Setting
• No Enable Privilege
Step 4 If you selected Define Max Privilege on a per-Network Device Group Basis in
Step 2, perform the following steps to define the privilege levels on each NDG, as
applicable:
a. From the Device Group list, select a device group.
Note You must have already configured a device group for it to be listed.
b. From the Privilege list, select a privilege level to associate with the selected
device group.
c. Click Add Association.
An entry appears in the table, associating the device group with a particular
privilege level.
d. Repeat Step a through Step c for each device group you want to associate to
this user.
Tip To delete an entry, select the entry and then click Remove Associate.
To set the options for the TACACS+ Enable password, follow these steps:
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Do one of the following:
• To use the information configured in the Password Authentication section,
select Use CiscoSecure PAP password.
Note For information about basic password setup, see Adding a Basic
User Account, page 7-3.
Note The list of databases displays only the databases that you have
configured. For more information, see About External User
Databases, page 13-3.
• To use a separate password, click Use separate password, and then type and
retype to confirm a control password for this user. This password is used in
addition to the regular authentication.
Step 3 Do one of the following:
• If you are finished configuring the user account options, click Submit to
record the options.
• To continue to specify the user account options, perform other procedures in
this chapter, as applicable.
Caution Use an outbound password only if you are familiar with the use of a TACACS+
SendAuth/OutBound password.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Type and retype to confirm a TACACS+ outbound password for this user.
Step 3 Do one of the following:
• If you are finished configuring the user account options, click Submit to
record the options.
• To continue to specify the user account options, perform other procedures in
this chapter, as applicable.
RADIUS Attributes
You can configure user attributes for RADIUS authentication either generally, at
the IETF level, or for vendor-specific attributes (VSAs) on a vendor-by-vendor
basis. For general attributes, see Setting IETF RADIUS Parameters for a User,
page 7-37. Cisco Secure ACS ships with many popular VSAs already loaded and
available to configure and apply. For information about creating additional,
custom RADIUS VSAs, see Custom RADIUS Vendors and VSAs, page 9-27.
Note To display or hide any of these attributes in the HTML interface, see Protocol
Configuration Options for RADIUS, page 3-11.
Note For a list and explanation of RADIUS attributes, see Appendix C, “RADIUS
Attributes,” or the documentation for your particular network device using
RADIUS.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 In the IETF RADIUS table, for each attribute that you need to authorize for the
current user, select the check box next to the attribute and then further define the
authorization for the attribute in the box or boxes next to it, as applicable.
Step 3 Do one of the following:
• If you are finished configuring the user account options, click Submit to
record the options.
• To continue to specify the user account options, perform other procedures in
this chapter, as applicable.
Note To hide or display the Cisco IOS RADIUS VSA, see Setting Protocol
Configuration Options for Non-IETF RADIUS Attributes, page 3-17. A VSA
applied as an authorization to a particular user persists, even when you remove or
replace the associated AAA client; however, if you have no AAA clients of this
(vendor) type configured, the VSA settings do not appear in the user configuration
interface.
Cisco IOS RADIUS represents only the Cisco IOS VSAs. You must configure
both the IETF RADIUS and Cisco IOS RADIUS attributes.
To configure and enable Cisco IOS RADIUS attributes to be applied as an
authorization for the current user, follow these steps:
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Before configuring Cisco IOS RADIUS attributes, be sure your IETF RADIUS
attributes are configured properly. For more information about setting IETF
RADIUS attributes, see Setting IETF RADIUS Parameters for a User, page 7-37.
Step 3 In the Cisco IOS/PIX RADIUS Attributes table, to specify the attributes to be
authorized for the user, follow these steps:
a. Select the [009\001] cisco-av-pair attribute check box.
b. Type the commands (such as TACACS+ commands) to be packed as a
RADIUS VSA.
c. Continue to select and define attributes, as applicable.
Step 4 Do one of the following:
• If you are finished configuring the user account options, click Submit to
record the options.
• To continue to specify the user account options, perform other procedures in
this chapter, as applicable.
a user must be able to connect via both wireless and wired devices. This capability
to provide a second timeout value specifically for WLAN connections avoids the
difficulties that would arise if you had to use a standard timeout value (typically
measured in hours) for a WLAN connection (that is typically measured in
minutes). You do not need to use Cisco-Aironet-Session-Timeout if the particular
user will always connect only with a Cisco Aironet Access Point. Rather, use this
setting when a user may connect via wired or wireless clients.
For example, imagine a user’s Cisco-Aironet-Session-Timeout set to 600 seconds
(10 minutes) and that same user’s IETF RADIUS Session-Timeout set to 3 hours.
When the user connects via a VPN, Cisco Secure ACS uses 3 hours as the timeout
value. However, if that same user connects via a Cisco Aironet Access Point,
Cisco Secure ACS responds to an authentication request from the Aironet AP by
sending 600 seconds in the IETF RADIUS Session-Timeout attribute. Thus, with
the Cisco-Aironet-Session-Timeout attribute configured, different session
timeout values can be sent depending on whether the end-user client is a wired
device or a Cisco Aironet Access Point.
The Cisco Aironet RADIUS parameters appear on the User Setup page only if all
the following are true:
• A AAA client is configured to use RADIUS (Cisco Aironet) in Network
Configuration.
• The Per-user TACACS+/RADIUS Attributes check box is selected under
Advanced Options in the Interface Configuration section.
• User-level RADIUS (Cisco Aironet) attribute is enabled under RADIUS
(Cisco Aironet) in the Interface Configuration section.
Note To hide or display the Cisco Aironet RADIUS VSA, see Setting Protocol
Configuration Options for Non-IETF RADIUS Attributes, page 3-17. A VSA
applied as an authorization to a particular user persists, even when you remove or
replace the associated AAA client; however, if you have no AAA clients of this
(vendor) type configured, the VSA settings do not appear in the user configuration
interface.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Before configuring Cisco Aironet RADIUS attributes, be sure your IETF
RADIUS attributes are configured properly. For more information about setting
IETF RADIUS attributes, see Setting IETF RADIUS Parameters for a User,
page 7-37.
Step 3 In the Cisco Aironet RADIUS Attributes table, select the [5842\001]
Cisco-Aironet-Session-Timeout check box.
Step 4 In the [5842\001] Cisco-Aironet-Session-Timeout box, type the session timeout
value (in seconds) that Cisco Secure ACS is to send in the IETF RADIUS
Session-Timeout (27) attribute when the AAA client is configured in Network
Configuration to use the RADIUS (Cisco Aironet) authentication option. The
recommended value is 600 seconds.
For more information about the IETF RADIUS Session-Timeout attribute, see
Appendix C, “RADIUS Attributes” or your AAA client documentation.
Step 5 Do one of the following:
• If you are finished configuring the user account options, click Submit to
record the options.
• To continue to specify the user account options, perform other procedures in
this chapter, as applicable.
• User-level RADIUS (Ascend) attributes you want to apply are enabled under
RADIUS (Ascend) in the Interface Configuration section.
Ascend RADIUS represents only the Ascend proprietary attributes. You must
configure both the IETF RADIUS and Ascend RADIUS attributes. Proprietary
attributes override IETF attributes.
The default attribute setting displayed for RADIUS is Ascend-Remote-Addr.
Note To hide or display Ascend RADIUS attributes, see Setting Protocol Configuration
Options for Non-IETF RADIUS Attributes, page 3-17. A VSA applied as an
authorization to a particular user persists, even when you remove or replace the
associated AAA client; however, if you have no AAA clients of this (vendor) type
configured, the VSA settings do not appear in the user configuration interface.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Before configuring Ascend RADIUS attributes, be sure your IETF RADIUS
attributes are configured properly. For more information about setting IETF
RADIUS attributes, see Setting IETF RADIUS Parameters for a User, page 7-37.
Step 3 In the Ascend RADIUS Attributes table, to specify the attributes that should be
authorized for the user, follow these steps:
a. Select the check box next to the particular attribute.
b. Further define the authorization for that attribute in the box next to it.
c. Continue to select and define attributes, as applicable.
For more information about attributes, see Appendix C, “RADIUS
Attributes,” or your AAA client documentation.
Note To hide or display Cisco VPN 5000 Concentrator RADIUS attributes, see Setting
Protocol Configuration Options for Non-IETF RADIUS Attributes, page 3-17. A
VSA applied as an authorization to a particular user persists, even when you
remove or replace the associated AAA client; however, if you have no AAA
clients of this (vendor) type configured, the VSA settings do not appear in the user
configuration interface.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Before configuring Cisco VPN 3000 Concentrator RADIUS attributes, be sure
your IETF RADIUS attributes are configured properly.
For more information about setting IETF RADIUS attributes, see Setting IETF
RADIUS Parameters for a User, page 7-37.
Step 3 In the Cisco VPN 3000 Concentrator Attribute table, to specify the attributes that
should be authorized for the user, follow these steps:
a. Select the check box next to the particular attribute.
b. Further define the authorization for that attribute in the box next to it.
c. Continue to select and define attributes, as applicable.
For more information about attributes, see Appendix C, “RADIUS
Attributes,” or your AAA client documentation.
Step 4 Do one of the following:
• If you are finished configuring the user account options, click Submit to
record the options.
• To continue to specify the user account options, perform other procedures in
this chapter, as applicable.
Note To hide or display Cisco VPN 5000 Concentrator RADIUS attributes, see Setting
Protocol Configuration Options for Non-IETF RADIUS Attributes, page 3-17. A
VSA applied as an authorization to a particular user persists, even when you
remove or replace the associated AAA client; however, if you have no AAA
clients of this (vendor) type configured, the VSA settings do not appear in the user
configuration interface.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Before configuring Cisco VPN 5000 Concentrator RADIUS attributes, be sure
your IETF RADIUS attributes are configured properly. For more information
about setting IETF RADIUS attributes, see Setting IETF RADIUS Parameters for
a User, page 7-37.
Step 3 In the Cisco VPN 5000 Concentrator Attribute table, to specify the attributes that
should be authorized for the user, follow these steps:
a. Select the check box next to the particular attribute.
b. Further define the authorization for that attribute in the box next to it.
c. Continue to select and define attributes, as applicable.
For more information about attributes, see Appendix C, “RADIUS
Attributes,” or your AAA client documentation.
Step 4 Do one of the following:
• If you are finished configuring the user account options, click Submit to
record the options.
• To continue to specify the user account options, perform other procedures in
this chapter, as applicable.
The Microsoft RADIUS attribute configurations display only if both the following
are true:
• A AAA client is configured in Network Configuration that uses a RADIUS
protocol that supports the Microsoft RADIUS VSA.
• The Per-user TACACS+/RADIUS Attributes check box is selected under
Advanced Options in the Interface Configuration section.
• The user-level RADIUS (Microsoft) attributes you want to apply are enabled
under RADIUS (Microsoft) in the Interface Configuration section.
The following Cisco Secure ACS RADIUS protocols support the Microsoft
RADIUS VSA:
• Cisco IOS
• Cisco VPN 3000
• Cisco VPN 5000
• Ascend
Microsoft RADIUS represents only the Microsoft VSA. You must configure both
the IETF RADIUS and Microsoft RADIUS attributes.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Before configuring Cisco IOS RADIUS attributes, be sure your IETF RADIUS
attributes are configured properly. For more information about setting IETF
RADIUS attributes, see Setting IETF RADIUS Parameters for a User, page 7-37.
Step 3 In the Microsoft RADIUS Attributes table, to specify the attributes that should be
authorized for the user, follow these steps:
a. Select the check box next to the particular attribute.
b. Further define the authorization for that attribute in the box next to it.
c. Continue to select and define attributes, as applicable.
For more information about attributes, see Appendix C, “RADIUS
Attributes,” or your AAA client documentation.
Note To hide or display Nortel RADIUS attributes, see Setting Protocol Configuration
Options for Non-IETF RADIUS Attributes, page 3-17. A VSA applied as an
authorization to a particular user persists, even when you remove or replace the
associated AAA client; however, if you have no AAA clients of this (vendor) type
configured, the VSA settings do not appear in the user configuration interface.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Before configuring Nortel RADIUS attributes, be sure your IETF RADIUS
attributes are configured properly. For more information about setting IETF
RADIUS attributes, see Setting IETF RADIUS Parameters for a User, page 7-37.
Step 3 In the Nortel RADIUS Attributes table, to specify the attributes that should be
authorized for the user, follow these steps:
a. Select the check box next to the particular attribute.
b. Further define the authorization for that attribute in the box next to it.
c. Continue to select and define attributes, as applicable.
For more information about attributes, see Appendix C, “RADIUS
Attributes,” or your AAA client documentation.
Step 4 Do one of the following:
• If you are finished configuring the user account options, click Submit to
record the options.
• To continue to specify the user account options, perform other procedures in
this chapter, as applicable.
Note To hide or display Juniper RADIUS attributes, see Setting Protocol Configuration
Options for Non-IETF RADIUS Attributes, page 3-17. A VSA applied as an
authorization to a particular user persists, even when you remove or replace the
associated AAA client; however, if you have no AAA clients of this (vendor) type
configured, the VSA settings do not appear in the user configuration interface.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Before configuring Juniper RADIUS attributes, be sure your IETF RADIUS
attributes are configured properly. For more information about setting IETF
RADIUS attributes, see Setting IETF RADIUS Parameters for a User, page 7-37.
Step 3 In the Juniper RADIUS Attributes table, to specify the attributes that should be
authorized for the user, follow these steps:
a. Select the check box next to the particular attribute.
b. Further define the authorization for that attribute in the box next to it.
c. Continue to select and define attributes, as applicable.
Note To hide or display BBSM RADIUS attributes, see Setting Protocol Configuration
Options for Non-IETF RADIUS Attributes, page 3-17. A VSA applied as an
authorization to a particular user persists, even when you remove or replace the
associated AAA client; however, if you have no AAA clients of this (vendor) type
configured, the VSA settings do not appear in the user configuration interface.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Before configuring BBSM RADIUS attributes, be sure your IETF RADIUS
attributes are configured properly. For more information about setting IETF
RADIUS attributes, see Setting IETF RADIUS Parameters for a User, page 7-37.
Step 3 In the BBSM RADIUS Attributes table, to specify the attributes that should be
authorized for the user, follow these steps:
a. Select the check box next to the particular attribute.
b. Further define the authorization for that attribute in the box next to it.
c. Continue to select and define attributes, as applicable.
For more information about attributes, see Appendix C, “RADIUS
Attributes,” or your AAA client documentation.
Step 4 Do one of the following:
• If you are finished configuring the user account options, click Submit to
record the options.
• To continue to specify the user account options, perform other procedures in
this chapter, as applicable.
Step 1 Perform Step 1 through Step 3 of Adding a Basic User Account, page 7-3.
The User Setup Edit page opens. The username being added or edited is at the top
of the page.
Step 2 Before configuring custom RADIUS attributes, be sure your IETF RADIUS
attributes are configured properly. For more information about setting IETF
RADIUS attributes, see Setting IETF RADIUS Parameters for a User, page 7-37.
Step 3 In the RADIUS custom name Attributes table, to specify the attributes that should
be authorized for the user, follow these steps:
a. Select the check box next to the particular attribute.
b. Further define the authorization for that attribute in the box next to it, as
required.
c. Continue to select and define attributes, as applicable.
For more information about attributes, see Appendix C, “RADIUS
Attributes,” or your AAA client documentation.
Step 4 Do one of the following:
• If you are finished configuring the user account options, click Submit to
record the options.
• To continue to specify the user account options, perform other procedures in
this chapter, as applicable.
User Management
This section describes how to use the User Setup section to perform a variety of
user account managerial tasks.
This section contains the following topics:
• Listing All Users, page 7-54
• Finding a User, page 7-54
• Disabling a User Account, page 7-55
Finding a User
To find a user, follow these steps:
Tip To display a list of usernames that begin with a particular letter or number,
click the letter or number in the alphanumeric list. A list of users whose
names begin with that letter or number opens in the display area on the
right.
The username, status (enabled or disabled), and group to which the user belongs
appear in the display area on the right.
Step 3 To view or edit the information for the user, click the username in the display area
on the right.
The user account information appears.
Note This is not to be confused with account expiration due to password aging.
Password aging is defined for groups only, not for individual users.
Caution If you are authenticating using the Unknown User policy, you must also delete the
user account from the external user database. This prevents the username from
being automatically re-added to the CiscoSecure user database the next time the
user attempts to log in.
Note Alternatively, you can click List All Users and then select the user from
the list that appears.
Note The Delete button appears only when you are editing user information,
not when you are adding a username.
A popup window appears that asks you to confirm the user deletion.
Note Alternatively, you can click List All Users and then select the user from
the list that appears.
Note Alternatively, you can click List All Users and then select the user from
the list that appears.
Note This counter shows the number of unsuccessful login attempts since the
last time this user logged in successfully.
Note If the user authenticates with a Windows user database, this expiration
information is in addition to the information in the Windows user account.
Changes here do not alter settings configured in Windows.
This chapter addresses the basic features found in the System Configuration
section of Cisco Secure ACS Appliance.
This chapter contains the following topics:
• Service Control, page 8-2
• Logging, page 8-3
• Date Format Control, page 8-3
• Local Password Management, page 8-5
• Cisco Secure ACS Backup, page 8-8
• Cisco Secure ACS System Restore, page 8-13
• Cisco Secure ACS Active Service Management, page 8-17
• VoIP Accounting Configuration, page 8-21
• Appliance Configuration, page 8-22
• Support, page 8-24
• Viewing or Downloading Diagnostic Logs, page 8-27
• Appliance Upgrade Status, page 8-27
Service Control
Cisco Secure ACS uses several services. The Service Control page provides basic
status information about the services, and enables you to configure the service log
files and to stop or restart the services. For more information about Cisco Secure
ACS services, see Chapter 1, “Overview.”
Tip You can configure Cisco Secure ACS service logs. For more information, see
Configuring Service Log Detail, page 11-27.
Note If the CSAdmin service needs to be restarted, you can do so using stop and start
commands on the serial console; however, it is best to use the HTML interface to
restart services because there are dependencies in the order in which the services
are started.
To stop, start, or restart Cisco Secure ACS services, follow these steps:
Logging
You can configure Cisco Secure ACS to generate logs for administrative and
accounting events, depending on the protocols and options you have enabled. For
more information, including configuration steps, see Chapter 1, “Overview”.
Note If you have reports that were generated before you changed the date format, be
sure to move or rename them to avoid conflicts. For example, if you are using the
month/day/year format, Cisco Secure ACS assigns the name 2001-07-12.csv to a
report generated on July 12, 2001. If you subsequently change to the
day/month/year format, on December 7, 2001, Cisco Secure ACS creates a file
also named 2001-07-12.csv and overwrites the existing file.
Note For the new date format to be seen in the HTML interface reports, you
must restart the connection to the Cisco Secure ACS. Click the Logoff
button (a button with an X) in the upper-right corner of the browser
window.
Tip The Cisco Secure ACSes that receive the changed password information
are listed below the Upon remote user password change, immediately
propagate the change to selected replication partners check box.
Components Backed Up
The Cisco Secure ACS Backup utility backs up the CiscoSecure user database and
other Cisco Secure ACS configuration data. The user database backup includes all
user information, such as username, password, and other authentication
information, including server certificates and the certificate trust list. The other
configuration data includes information such as NDG information, AAA client
configuration, and administrator accounts.
Backup Options
The ACS System Backup Setup page contains the following configuration
options:
• Manually—Cisco Secure ACS does not perform automatic backups.
• Every X minutes—Cisco Secure ACS performs automatic backups on a set
frequency. The unit of measurement is minutes, with a default backup
frequency of 60 minutes.
• At specific times...—Cisco Secure ACS performs automatic backups at the
time specified in the day and hour graph. The minimum resolution is one
hour, and the backup takes place on the hour selected.
• FTP Server—The IP address or hostname of the FTP server that you want to
send backup files to. If you specify a hostname, DNS must be enabled on your
network.
• Login—A valid username to enable Cisco Secure ACS to access the FTP
server.
• Password—The password for the username provided in the Login box.
• Directory—The directory where Cisco Secure ACS writes the backup file.
The directory must be specified relative to the FTP root directory. To specify
the FTP root directory, enter a single period or “dot”.
• Encrypt backup file—Whether Cisco Secure ACS encrypts the backup file.
Note If an encrypted backup file is used to restore Cisco Secure ACS data,
you must provide the exact password entered in the Encryption
Password box when the backup was created.
b. In the Encryption Password box, type the password you want to use to encrypt
the backup file.
Note If an encrypted backup file is used to restore Cisco Secure ACS data,
you must provide the exact password entered in the Encryption
Password box when the backup was created.
Note Because Cisco Secure ACS is momentarily shut down during backup, if
the backup interval is set too low, users might be unable to authenticate.
b. In the day and hour graph, click the times at which you want Cisco Secure
ACS to perform a backup.
Tip Clicking times of day on the graph selects those times; clicking again
clears them. At any time you can click Clear All to clear all hours, or you
can click Set All to select all hours.
Step 5 In the FTP box under FTP Setup, type the IP address or hostname of the FTP
server that you want Cisco Secure ACS to send the backup file to.
Step 6 In the Login box under FTP Setup, type a valid username to enable Cisco Secure
ACS to access the FTP server.
Step 7 In the Password box under FTP Setup, type the password for the username
provided in the Login box.
Step 8 In the Directory box under FTP Setup, type the relative path to the directory on
the FTP server where you want the backup file to be written.
Step 9 If you want to encrypt the backup file, follow these steps:
a. Select the Encrypt backup file check box.
b. In the Encryption Password box, type the password you want to use to encrypt
the backup file.
Note If an encrypted backup file is used to restore Cisco Secure ACS data,
you must provide the exact password entered in the Encryption
Password box when the backup was created.
The ACS System Restore feature only works with backup files generated by a
Cisco Secure ACS running an identical Cisco Secure ACS version and patch
level.
If you chose to encrypt the backup file, the backup filename includes the
lowercase letter e just before the “.dmp” file extension. If the previous example
was an encrypted backup file, the file name would be:
13-Oct-1999-11-41-35e.dmp
If you are not sure of the FTP server and directory used to create the latest backup
file, check the ACS System Restore Setup page. Information about the most recent
backup and restore, if any, is displayed at the top of the page.
Components Restored
You can select the components to restore: the user and group databases, the
system configuration, or both.
Note Using the Cisco Secure ACS System Restore feature restarts all Cisco Secure
ACS services and logs out all administrators.
To restore Cisco Secure ACS from a backup file generated by the Cisco Secure
ACS Backup feature, follow these steps:
Tip If no files are found or the FTP server could not be accessed, click Cancel
to close the dialog box, and repeat Step a through d.
f. Click the filename of the backup file you want to use to restore Cisco Secure
ACS.
The filename you select appears in the File box. The dialog box closes.
Step 5 If the backup file specified the File box is encrypted, in the Decryption Password
box, type the same password used to encrypt the backup file.
Note The decryption password must exactly match the password specified in
the Encryption Password box on the ACS System Backup Setup page.
Step 6 If you want to restore user and group database information, select the User and
Group Database check box.
Step 7 If you want to restore system configuration information, select the CiscoSecure
ACS System Configuration check box.
Step 8 Click Restore Now.
Cisco Secure ACS displays a confirmation dialog box indicating that performing
the restoration will restart Cisco Secure ACS services and log out all
administrators.
Step 9 To continue with the restoration, click OK.
Cisco Secure ACS restores the system components specified using the backup file
you selected. The restoration should require several minutes to complete,
depending on which components you selected to restore and the size of your
database.
When the restoration is complete, you can log in again to Cisco Secure ACS.
System Monitoring
Cisco Secure ACS system monitoring enables you to determine how often
Cisco Secure ACS tests its authentication and accounting processes, and what
automated actions it takes should tests detect a failure of these processes.
Cisco Secure ACS accomplishes system monitoring with the CSMon service. For
more information about the CSMon service, see CSMon, page F-4. For
information about monitoring the performance of system services, see Monitoring
System Information, page 8-26.
Event Logging
The Event Logging feature enables you to configure whether Cisco Secure ACS
generates an e-mail when an event occurs. Cisco Secure ACS detects events using
the System Monitoring feature. For more information about system monitoring,
see System Monitoring Options, page 8-18.
Note Do not use underscores in the e-mail addresses you type in this box.
c. In the SMTP Mail Server box, type the hostname of the sending email server
(up to 200 characters).
Note The SMTP mail server must be operational and must be available
from the Cisco Secure ACS.
Note The VoIP Accounting Configuration feature does not enable VoIP accounting. To
enable VoIP accounting, see Chapter 1, “Overview.”
Note If this feature does not appear, click Interface Configuration, click
Advanced Options, and then select the Voice-over-IP (VoIP)
Accounting Configuration check box.
Appliance Configuration
Use the Appliance Configuration page to set the Cisco Secure ACS host and
domain names, as well as the system date and time.
This section contains the following topics:
• Setting the Cisco Secure ACS System Time and Date, page 8-22
• Setting the Cisco Secure ACS Host and Domain Names, page 8-23
Tip You can also perform this procedure using the serial console interface to the
Cisco Secure ACS. For details, see the Installation and Setup Guide for
Cisco Secure ACS Appliance.
Note If the system does not display the Appliance Configuration page, check
your connectivity to the Cisco Secure ACS.
Step 3 From the Time Zone list, select the system time zone.
Step 4 In the Time box, enter the system time in the format hh:mm:ss.
Step 5 From the Day list, select the day of the month.
Step 6 From the Month list, select the month.
Step 7 From the Year list, select the year.
Step 8 Perform the following substeps only if you want to set up the NTP server to
automatically synchronize date and time.
a. Click the NTP Synchronization Enabled check box.
b. In the NTP Server(s) box, type the IP address or addresses of the NTP
server(s) you want the system to use. If you enter more than one, separate the
IP addresses with a space.
Note Be sure that the IP addresses you specify are valid NTP servers.
Incorrect IP addresses or incorrectly operating NTP servers can
greatly slow the NTP synchronization process.
Note This procedure requires that you reboot the Cisco Secure ACS and, therefore, you
should perform the procedure during off hours to minimize disruption of users.
To set the Cisco Secure ACS host and domain names, follow these steps:
Note If the system does not display the Appliance Configuration page, check
your connectivity to the Cisco Secure ACS.
Support
You use the Support page for two purposes:
• To package system state information into a file that can be forwarded for tech
support.
• To monitor the state of the Cisco Secure ACS services.
Each of these activities is detailed in the following procedures:
• Running Support, page 8-24
• Monitoring System Information, page 8-26
Running Support
You use the Support page to package system information that can be forwarded to
your Technical Assistance Center (TAC) representative. When you perform this
procedure, Cisco Secure ACS automatically packages all its current logs. You
also have the option to package either, or both, of the following:
• User database
• System logs for the number of preceding days that you specify.
Support information is packaged in a cabinet file, which has the file extension
.cab. Cabinet files are a compressed format, so that you can more easily send the
support information to TAC or other support personnel.
To package system state information into a file for tech support, follow these steps
Note The AAA services of the CiscoSecure Access Control Server ACS are briefly
suspended when you run this procedure. We recommend that you perform this
procedure during periods of least AAA activity to minimize user impact.
Tip The first row of the Resource Usage table, marked System, displays the
percentage of CPU cycles that are idle. Other rows indicate the percentage
of CPU cycles used by each service. Taken together, these total 100
percent.
Upgrade Phase 2
2. Unzip package, if necessary 6. Login to ACS
3. Run Autorun 7. Confirm Package Identity and Version
4. Browser Launches 8. Transfer Upgrade to Appliance
5. On Install Page, Identify Appliance
Upgrade Phase 1
87848
1. Load Upgrade Package
to Distribution Server
• Phase One—In the first phase, you obtain an upgrade package and load it
onto a computer designated as a distribution server for Cisco Secure ACS
Appliance upgrade distribution. The upgrade package may be obtained either
as a CD ROM or as a file that you download from Cisco.com.
• Phase Two—In the second phase you transfer installation package files from
the distribution server to the appliance. File transfer is done by the HTTP
server that is part of the installation package. The upgrade files are signed and
the signature is verified after uploading to ensure that they have not been
corrupted.
• Phase Three—The final phase of upgrading the appliance is to apply the
upgrade. Before the upgrade files are applied to the appliance, Cisco Secure
ACS verifies the digital signature on the files to ensure their authenticity and
to verify that they are not corrupt.
Tip While you apply the upgrade, Cisco Secure ACS cannot provide AAA services. If
it is not critical to apply an upgrade package immediately, consider performing
this phase when Cisco Secure ACS downtime will have the least impact.
Note Using the JRE in the upgrade package does not install the JRE on
the distribution server.
– If the distribution server uses Solaris, the distribution server must have
JRE 1.3.1 installed.
• For support, the distribution server must use an English-language version of
one of the following operating systems:
– Windows 2000 Server with Service Pack 3 installed
– Windows XP Professional with Service Pack 1 installed
– Solaris 2.8
Note While the upgrade process may succeed using a different operating
system than those listed above, this list reflects the operating systems
we used to test the upgrade process. We do not support upgrades from
distribution servers that use untested operating systems.
• If you acquire the upgrade package on CD, the distribution server must have
a CD ROM drive or be able to use the CD ROM drive on another computer
that you can access.
• TCP port 8080 should not be in use on the distribution server. The upgrade
process requires exclusive control of it.
Tip We recommend that no other web server runs on the distribution server.
Upgrading an Appliance
Before You Begin
Always back up Cisco Secure ACS before upgrading. For information about
backing up Cisco Secure ACS, see Cisco Secure ACS Backup, page 8-8.
Step 1 Acquire the upgrade package. Depending upon the type of upgrade package and
any applicable service agreement for Cisco Secure ACS, the way to acquire an
upgrade package differs.
• For commercial upgrade packages, contact your Cisco sales representative.
• If you have a maintenance contract, you may be able to download upgrade
packages from Cisco.com. Contact your Cisco sales representative.
• For upgrade packages that apply patches for specific issues, work with your
TAC representative to acquire the upgrade package.
Step 2 Pick a computer to use as the distribution server. The distribution server must
meet the requirements discussed in Distribution Server Requirements, page 8-29.
Step 3 If you have acquired the upgrade package in a compressed file format, such as a
.zip or .gz file, follow these steps:
a. If you have not already done so, copy the upgrade package file to a directory
available from the distribution server.
b. Use the applicable file decompression utility to extract the upgrade package.
Tip Consider extracting the upgrade package in a new directory created for
the contents of the upgrade package.
Step 4 If you have acquired the upgrade package on CD, do not insert the CD in a CD
ROM drive until instructed to do so. The CD contains autorun files, and if the
distribution server uses Microsoft Windows, the CD ROM drive may
automatically run the autorun files before you want.
Step 5 Transfer the upgrade package to an appliance. For detailed steps, see Transferring
an Upgrade Package to an Appliance, page 8-32.
The upgrade package is on the appliance and ready to be applied.
Step 6 Apply the upgrade package to the appliance. For detailed steps, see Applying an
Upgrade, page 8-35.
Cisco Secure ACS applies the upgrade and runs using the upgraded software.
Step 1 If the distribution server uses Microsoft Windows, follow these steps:
a. If you have acquired the upgrade package on CD, insert the CD in a CD ROM
drive on the distribution server.
Tip You can also use a shared CD drive on a different computer. If you do so
and autorun is enabled on the shared CD drive, the HTTP server included
in the upgrade package starts on the other computer.
b. Locate the autorun.sh file on the CD or in the directory that you extracted
the compressed upgrade package in.
c. Run autorun.sh.
The HTTP server starts. Messages from autorun.sh appear in a console window.
Two web browser windows appear. The browser window titled Appliance
Upgrade contains the Enter appliance hostname or IP address box. You can use
the second browser window, titled New Desktop, to start transfers to other
appliances.
Step 3 If, after you have run the applicable autorun file, no web browser opens, start a
web browser on the distribution server and open the following URL:
http://127.0.0.1:8080/install/index.html
Tip You can access the HTTP server of the distribution server from a web
browser on a different computer using the following URL: http://IP
address :8080/install/index.html, where IP address is the IP address
of the distribution server.
Step 4 In the Appliance Upgrade browser window, type the appliance IP address or
hostname in the Enter appliance hostname or IP address box, and click Install.
The Cisco Secure ACS login page for the appliance specified appears.
Step 5 Log in to the Cisco Secure ACS HTML interface. To do so, follow these steps:
a. In the Username box, type a valid Cisco Secure ACS administrator name.
b. In the Password box, type the password for the administrator specified.
c. Click Login.
Step 6 In the navigation bar, click System Configuration.
Step 7 Click Appliance Upgrade Status.
Cisco Secure ACS displays the Appliance Upgrade page.
Step 8 Click Download.
Cisco Secure ACS displays the Appliance Upgrade Form page. This page
contains the Transfer Setup table, which enables you to identify the distribution
server.
Step 9 In the Install Server box, type the hostname or IP address of the distribution
server and click Connect.
The Appliance Upgrade Form page displays the Software Install table, which
details the version and name of the upgrade available from the distribution server.
Step 10 Examine the table to confirm that the version, name, and condition of the upgrade
is satisfactory, and click Download Now.
The Appliance Upgrade page appears and the upgrade file is downloaded from the
distribution server to the appliance. Below the Appliance Versions table,
Cisco Secure ACS displays the status of the download.
Tip On the Appliance Upgrade page, the system displays the message
“Distribution Download in Progress”, followed by the number of
kilobytes downloaded.
Step 11 If you want to update the transfer status message, click Refresh.
Tip You can click Refresh as often as necessary to update the status message
until the transfer completes.
If you click Refresh while the transfer is in progress, Cisco Secure ACS displays
the number of kilobytes downloaded. If you click Refresh after the transfer is
complete, the Apply Upgrade button appears and the transfer progress text is
replaced with a message indicating that an upgrade package is available on the
appliance.
Step 12 To ensure that the upload was successful and the upgrade is ready to be applied,
confirm that the following message appears on the Appliance Upgrade page:
Ready to Upgrade to version, where version is the version of the upgrade
package you have transferred to the appliance.
The upgrade package is successfully transferred to the appliance.
Step 13 If you want to transfer the upgrade package to another appliance, access the
browser window titled New Desktop, click Install Next, and return to Step 4.
Tip If you know the URL for the HTML interface of another appliance, you
can type it in the browser location box and return to Step 5 to transfer the
upgrade package to that appliance.
Step 14 If are finished transferring upgrade packages to appliances, access the browser
window titled New Desktop and click Stop Distribution Server.
The HTTP server stops and the resources it used on the distribution server are
released.
Step 15 If you want to apply the upgrade, perform the steps in Applying an Upgrade,
page 8-35. Alternatively, you can apply the upgrade command using the serial
console. For more information about the upgrade command, see Installation and
Setup Guide for Cisco Secure ACS Appliance.
Applying an Upgrade
Perform this procedure to apply an upgrade package to a Cisco Secure ACS
Appliance.
Note As as alternative to this procedure, you can apply the upgrade by using the
upgrade command at the serial console for the Cisco Secure ACS Appliance. For
more information, see Installation and Setup Guide for Cisco Secure ACS
Appliance.
Note You may receive a warning message that an upgrade package is not
verified. Before applying an upgrade or patch, Cisco Secure ACS
attempts to verify that the upgrade or patch is certified by Cisco. Some
valid upgrade packages may not pass this verification, such as patches
distributed for an urgent fix. Do not apply any upgrade package if you
have unresolved concerns about the validity of the upgrade package.
After you have answered all confirmation prompts, Cisco Secure ACS applies the
upgrade. Be aware of the following:
• While applying an upgrade, Cisco Secure ACS services are not available.
This usually includes the HTML interface. After the upgrade is complete, the
services and the HTML interface are available again.
• Applying an upgrade may take several minutes or more. A full upgrade of
Cisco Secure ACS takes longer if the CiscoSecure user database has many
user profiles.
• Upgrading Cisco Secure ACS usually requires the appliance to restart itself
once or twice. Only smaller patches may not require restarts.
• While services restart or the appliance restarts, the HTML interface is not
available. If this occurs, wait for the appliance to resume normal operation,
and then close the original browser window, open a new browser window, and
login to Cisco Secure ACS again.
Caution Do not reset the appliance while an upgrade is being applied, unless directed to
do so by TAC.
Step 6 After the upgrade is applied, go to the Appliance Upgrade page and verify that the
versions of software on the appliance are as expected.
Note The HTML interface is unavailable while services restart and while the
appliance restarts. When this occurs, the HTML interface is available
again after the upgrade process is complete. Close the original browser
window, open a new browser window, and log in to Cisco Secure ACS
again.
The Appliance Versions table lists the versions of software running on the
appliance. The table entries should reflect the upgrade package that you applied.
Note Bidirectional replication, wherein a Cisco Secure ACS both sends database
components to and receives database components from the same remote
Cisco Secure ACS, is not supported.
Note All Cisco Secure ACSes involved in replication must run the same release of the
Cisco Secure ACS software. For example, if the primary Cisco Secure ACS is
running Cisco Secure ACS version 3.2, all secondary Cisco Secure ACSes should
be running Cisco Secure ACS version 3.2. Because patch releases can introduce
significant changes to the CiscoSecure database, we strongly recommend that
Cisco Secure ACSes involved in replication use the same patch level, too.
Replication Process
This topic describes the process of database replication, including the interaction
between a primary Cisco Secure ACS and each of its secondary Cisco Secure
ACSes. The following steps occur in database replication:
1. The primary Cisco Secure ACS determines if its database has changed since
the last successful replication. If it has, replication proceeds. If it has not,
replication is aborted. No attempt is made to compare the databases of the
primary and secondary Cisco Secure ACSes.
Tip You can force replication to occur by making one change to a user or group
profile, such as changing a password or modifying a RADIUS attribute.
2. The primary Cisco Secure ACS contacts the secondary Cisco Secure ACS. In
this initial connection, the following four events occur:
a. The two Cisco Secure ACSes perform mutual authentication based upon
the shared secret of the primary Cisco Secure ACS. If authentication
fails, replication fails.
Note On the secondary Cisco Secure ACS, the AAA Servers table
entry for the primary Cisco Secure ACS must have the same
shared secret that the primary Cisco Secure ACS has for itself in
its own AAA Servers table entry. The secondary Cisco Secure
ACS’s shared secret is irrelevant.
b. The secondary Cisco Secure ACS stops its authentication service and
replaces its database components with the database components it
received from the primary Cisco Secure ACS. During this step, if AAA
clients are configured properly, those that usually use the secondary
Cisco Secure ACS failover to another Cisco Secure ACS.
c. The secondary Cisco Secure ACS resumes its authentication service.
Cisco Secure ACS can act as both a primary Cisco Secure ACS and a secondary
Cisco Secure ACS. Figure 9-1 shows a cascading replication scenario. Server 1
acts only as a primary Cisco Secure ACS, replicating to servers 2 and 3, which act
as secondary Cisco Secure ACSes. After replication from server 1 to server 2 has
completed, server 2 acts as a primary Cisco Secure ACS while replicating to
servers 4 and 5. Similarly, server 3 acts as a primary Cisco Secure ACS while
replicating to servers 6 and 7.
Server 4
Server 5
Server 2
Server 1 Server 6
67473
Server 3
Server 7
Replication Frequency
The frequency with which your Cisco Secure ACSes replicate can have important
implications for overall AAA performance. With shorter replication frequencies,
a secondary Cisco Secure ACS is more up-to-date with the primary Cisco Secure
ACS. This allows for a more current secondary Cisco Secure ACS if the primary
Cisco Secure ACS fails.
There is a cost to having frequent replications. The more frequent the replication,
the higher the load on a multi-Cisco Secure ACS architecture and on your
network environment. If you schedule frequent replication, network traffic is
much higher. Also, processing load on the replicating systems is increased.
Replication consumes system resources and briefly interrupts authentication; thus
the more often replication is repeated, the greater the impact on the AAA
performance of the Cisco Secure ACS.
This issue is more apparent with databases that are large or that frequently change.
Database replication is a non-incremental, destructive backup. In other words, it
completely replaces the database and configuration on the secondary
Cisco Secure ACS every time it runs. Therefore, a large database results in
substantial amounts of data being transferred, and the processing overhead can
also be large.
– In its AAA Servers table, a secondary Cisco Secure ACS must have an
accurately configured entry for each of its primary Cisco Secure ACSes.
– On a primary Cisco Secure ACS and all its secondary Cisco Secure
ACSes, the AAA Servers table entries for the primary Cisco Secure ACS
must have identical shared secrets.
Tip You can force replication to occur by making one change to a user or group
profile, such as changing a password or modifying a RADIUS attribute.
Due to the necessity of local configuration, replication does not process IP pool
definitions (however, IP pool assignments are replicated as part of the user and
group profiles). Therefore, if applicable, common IP pool definitions must be
manually configured in a manner that uses common pool names while
establishing different address ranges. Certificate configuration is not replicated
either, because certificate information is specific to each Cisco Secure ACS.
Also, network device group (NDG) settings, if employed, must remain constant
between Cisco Secure ACSes. That is, you must guard against the primary
Cisco Secure ACS sending a user or group profile that invokes an NDG that is not
defined on the secondary Cisco Secure ACS.
Replication Options
The Cisco Secure ACS HTML interface provides three sets of options for
configuring CiscoSecure Database Replication, documented in this section.
This section contains the following topics:
• Replication Components Options, page 9-11
• Outbound Replication Options, page 9-12
• Inbound Replication Options, page 9-14
The options that control the components replicated appear in the Replication
Components table on the CiscoSecure Database Replication page and are as
follows:
• User and group database—Replicate the information for groups and users.
• Network Configuration Device tables—Replicate the AAA Servers tables,
the AAA Clients tables, and the Remote Agent tables in the Network
Configuration section.
Note The items in the AAA Server and Replication lists reflect the AAA
servers configured in the AAA Servers table in Network
Configuration. To make a particular Cisco Secure ACS available as a
secondary Cisco Secure ACS, you must first add that Cisco Secure
ACS to the AAA Servers table of the primary Cisco Secure ACS.
Note Cisco Secure ACS does not support bidirectional database replication. A
secondary Cisco Secure ACS receiving replicated components verifies that the
primary Cisco Secure ACS is not on its Replication list. If not, the secondary
Cisco Secure ACS accepts the replicated components. If so, it rejects the
components.
Note Cisco Secure ACS does not support bidirectional database replication. A
secondary Cisco Secure ACS receiving replicated components verifies that the
primary Cisco Secure ACS is not on its Replication list. If not, the secondary
Cisco Secure ACS accepts the replicated components. If so, it rejects the
components.
For more information about the AAA Servers table in Network Configuration, see
AAA Server Configuration, page 4-22.
For more information about adding entries to the AAA Servers table, see
AAA Server Configuration, page 4-22.
b. If you want to replicate according to a schedule, at intervals, or whenever the
primary Cisco Secure ACS has received replicated components from another
Cisco Secure ACS, see Scheduling Replication, page 9-20.
c. If you want to initiate replication immediately, see Replicating Immediately,
page 9-18.
Note If this feature does not appear, click Interface Configuration, click Advanced
Options, and select the CiscoSecure ACS Database Replication check box.
Select the Distributed System Settings check box if not already selected.
secret that the primary Cisco Secure ACS has for its own entry in its AAA Servers
table. For more information about the AAA Servers table, see AAA Server
Configuration, page 4-22.
To configure a Cisco Secure ACS to be a secondary Cisco Secure ACS, follow
these steps:
Step 1 Log in to the HTML interface on the secondary Cisco Secure ACS.
Step 2 In the navigation bar, click System Configuration.
Step 3 Click CiscoSecure Database Replication.
The Database Replication Setup page appears.
Step 4 In the Replication Components table, select the Receive check box for each
database component to be received from a primary Cisco Secure ACS.
For more information about replication components, see Replication Components
Options, page 9-11.
Step 5 Make sure that no Cisco Secure ACS that the secondary Cisco Secure ACS is to
receive replicated components from is included in the Replication list. If so, select
the primary Cisco Secure ACS in the Replication list and click the <-- (left arrow)
to move it to the AAA Servers list.
Note Cisco Secure ACS does not support bidirectional database replication. A
secondary Cisco Secure ACS receiving replicated components verifies
that the primary Cisco Secure ACS is not on its Replication list. If not, the
secondary Cisco Secure ACS accepts the replicated components. If so, it
aborts replication.
Step 6 If the secondary Cisco Secure ACS is to receive replication components from only
one primary Cisco Secure ACS, from the Accept replication from list, select the
name of the primary Cisco Secure ACS.
The primary Cisco Secure ACSes available in the Accept replication from list are
determined by the AAA Servers table in the Network Configuration section. For
more information about the AAA Servers table, see AAA Server Configuration,
page 4-22.
Note On the primary Cisco Secure ACS and all secondary Cisco Secure
ACSes, the AAA Servers table entries for the primary Cisco Secure ACS
must have identical shared secrets.
Step 7 If the secondary Cisco Secure ACS is to receive replication components from
more than one primary Cisco Secure ACS, from the Accept replication from list,
select Any Known CiscoSecure ACS Server.
The Any Known CiscoSecure ACS Server option is limited to the Cisco Secure
ACSes listed in the AAA Servers table in Network Configuration.
Note For each primary Cisco Secure ACS for this secondary Cisco Secure
ACS, on both the primary and secondary Cisco Secure ACS, the AAA
Servers table entries for the primary Cisco Secure ACS must have
identical shared secrets.
Replicating Immediately
You can manually start database replication.
Note Replication cannot occur until you have configured at least one secondary
Cisco Secure ACS. For more information about configuring a secondary
Cisco Secure ACS, see Configuring a Secondary Cisco Secure ACS, page 9-16.
For each secondary Cisco Secure ACS that this Cisco Secure ACS is to send
replicated components to, make sure that you have completed the steps in
Configuring a Secondary Cisco Secure ACS, page 9-16.
To initiate database replication immediately, follow these steps:
Step 1 Log in to the HTML interface on the primary Cisco Secure ACS.
Step 2 In the navigation bar, click System Configuration.
Step 3 Click CiscoSecure Database Replication.
Note If this feature does not appear, click Interface Configuration, click
Advanced Options, and select the CiscoSecure ACS Database
Replication check box. Select the Distributed System Settings check
box if not already selected.
Tip If you want to remove a secondary Cisco Secure ACSes from the
Replication list, select the secondary Cisco Secure ACS in the
Replication list, and then click <-- (left arrow button).
Note Cisco Secure ACS does not support bidirectional database replication. A
secondary Cisco Secure ACS receiving replicated components verifies
that the primary Cisco Secure ACS is not on its Replication list. If not, the
secondary Cisco Secure ACS accepts the replicated components. If so, it
rejects the components.
Cisco Secure ACS saves the replication configuration. Cisco Secure ACS
immediately begins sending replicated database components to the secondary
Cisco Secure ACSes you specified.
Note Replication only occurs when the database of the primary Cisco Secure
ACS has changed since the last successful replication. You can force
replication to occur by making one change to a user or group profile, such
as changing a password or RADIUS attribute.
Scheduling Replication
You can schedule when a primary Cisco Secure ACS sends its replicated database
components to a secondary Cisco Secure ACS. For more information about
replication scheduling options, see Outbound Replication Options, page 9-12.
Note Replication cannot occur until the secondary Cisco Secure ACSes are configured
properly. For more information, see Configuring a Secondary Cisco Secure ACS,
page 9-16.
Step 1 Log in to the HTML interface on the primary Cisco Secure ACS.
Step 2 In the navigation bar, click System Configuration.
Step 3 Click CiscoSecure Database Replication.
Note If this feature does not appear, click Interface Configuration, click
Advanced Options, and select the CiscoSecure ACS Database
Replication check box. Select the Distributed System Settings check
box if not already selected.
Note Because Cisco Secure ACS is momentarily shut down during replication,
a short replication interval may cause frequent failover of your AAA
clients to other Cisco Secure ACSes. If AAA clients are not configured to
failover to other Cisco Secure ACSes, the brief interruption in
authentication service may prevent users from authenticating. For more
information, see Replication Frequency, page 9-7.
Step 6 If you want to schedule times at which the primary Cisco Secure ACS sends its
replicated database components to its secondary Cisco Secure ACSes, follow
these steps:
a. In the Outbound Replication table, select the At specific times option.
b. In the day and hour graph, click the times at which you want Cisco Secure
ACS to perform replication.
Tip Clicking times of day on the graph selects those times; clicking again
clears them. At any time you can click Clear All to clear all hours, or you
can click Set All to select all hours.
Step 7 If you want to have this Cisco Secure ACS send replicated database components
immediately upon receiving replicated database components from another
Cisco Secure ACS, select the Automatically triggered cascade option.
Note If you specify the Automatically triggered cascade option, you must
configure another Cisco Secure ACS to act as a primary Cisco Secure
ACS to this Cisco Secure ACS; otherwise, this Cisco Secure ACS never
replicates to its secondary Cisco Secure ACSes.
Step 8 You must specify the secondary Cisco Secure ACSes that this Cisco Secure ACS
should replicate to. To do so, follow these steps:
Note Cisco Secure ACS does not support bidirectional database replication. A
secondary Cisco Secure ACS receiving replicated database components
verifies that the primary Cisco Secure ACS is not on its Replication list.
If not, the secondary Cisco Secure ACS accepts the replicated database
components. If so, it rejects the components. For more information about
replication partners, see Inbound Replication Options, page 9-14.
a. In the Outbound Replication table, from the AAA Servers list, select the
name of a secondary Cisco Secure ACS to which you want the primary
Cisco Secure ACS to send its selected replicated database components.
Note The secondary Cisco Secure ACSes available in the AAA Servers list
are determined by the AAA Servers table in Network Configuration.
For more information about the AAA Servers table, see AAA Server
Configuration, page 4-22.
c. Repeat Step a and Step b for each secondary Cisco Secure ACS to which you
want the primary Cisco Secure ACS to send its selected replicated database
components.
Step 9 Click Submit.
Cisco Secure ACS saves the replication configuration you created.
Step 1 Log in to the HTML interface on the primary Cisco Secure ACS.
Step 2 In the navigation bar, click System Configuration.
Step 3 Click CiscoSecure Database Replication.
The Database Replication Setup page appears.
Step 4 In the Replication Components table, clear all check boxes.
Step 5 In the Outbound Replication table, select the Manually option.
Step 6 Click Submit.
Cisco Secure ACS does not permit any replication to or from this Cisco Secure
ACS server.
RDBMS Synchronization
This section provides information about the RDBMS Synchronization feature,
including procedures for implementing this feature, within both Cisco Secure
ACS and the external data source involved.
This section contains the following topics:
• About RDBMS Synchronization, page 9-24
– Users, page 9-25
– User Groups, page 9-26
– Network Configuration, page 9-26
– Custom RADIUS Vendors and VSAs, page 9-27
• RDBMS Synchronization Components, page 9-27
– About CSDBSync, page 9-28
– About the accountActions File, page 9-28
• Cisco Secure ACS Database Recovery Using the accountActions Table,
page 9-28
• Preparing to Use RDBMS Synchronization, page 9-29
• RDBMS Synchronization Options, page 9-31
– FTP Setup Options, page 9-31
– Synchronization Scheduling Options, page 9-32
– Synchronization Partners Options, page 9-32
• Performing RDBMS Synchronization Immediately, page 9-32
• Scheduling RDBMS Synchronization, page 9-34
• Disabling Scheduled RDBMS Synchronizations, page 9-37
Users
Among the user-related configuration actions that RDBMS Synchronization can
perform are the following:
• Adding users.
• Deleting users.
• Setting passwords.
• Setting user group memberships.
• Setting Max Sessions parameters.
• Setting network usage quota parameters.
• Configuring command authorizations.
• Configuring network access restrictions.
• Configuring time-of-day/day-of-week access restrictions.
• Assigning IP addresses.
• Specifying outbound RADIUS attribute values.
• Specifying outbound TACACS+ attribute values.
Note For specific information about all actions that RDBMS Synchronization can
perform, see Appendix E, “RDBMS Synchronization Import Definitions.”
User Groups
Among the group-related configuration actions that RDBMS Synchronization can
perform are the following:
• Setting Max Sessions parameters.
• Setting network usage quota parameters.
• Configuring command authorizations.
• Configuring network access restrictions.
• Configuring time-of-day/day-of-week access restrictions.
• Specifying outbound RADIUS attribute values.
• Specifying outbound TACACS+ attribute values.
Note For specific information about all actions that RDBMS Synchronization can
perform, see Appendix E, “RDBMS Synchronization Import Definitions.”
Network Configuration
Among the network device-related configuration actions that RDBMS
Synchronization can perform are the following:
• Adding AAA clients.
• Deleting AAA clients.
• Setting AAA client configuration details.
• Adding AAA servers.
• Deleting AAA servers.
• Setting AAA server configuration details.
• Adding and configuring Proxy Distribution Table entries.
Note For specific information about all actions that RDBMS Synchronization can
perform, see Appendix E, “RDBMS Synchronization Import Definitions.”
Note If you intend to replicate user-defined RADIUS vendor and VSA configurations,
user-defined RADIUS vendor and VSA definitions to be replicated must be
identical on the primary and secondary Cisco Secure ACSes, including the
RADIUS vendor slots that the user-defined RADIUS vendors occupy. For more
information about database replication, see CiscoSecure Database Replication,
page 9-1.
For specific information about all actions that RDBMS Synchronization can
perform, see Appendix E, “RDBMS Synchronization Import Definitions.”
About CSDBSync
The CSDBSync service reads the accountActions file. While
“accountActions.csv” is the default name for the accountActions file, you can
name the file however you like. Synchronization events fail if CSDBSync cannot
access the accountActions file.
CSDBSync reads each record from the accountActions file and updates the
CiscoSecure user database as specified by the action code in the record. For
example, a record could instruct CSDBSync to add a user or change a user
password.
For more information about CSDBSync or other Windows services used by
Cisco Secure ACS, see Chapter 1, “Overview.”
additions and updates to records in the accountActions file. The transaction log
file would therefore be a concatenation of all actions recorded in the many
instances of the accountActions file processed by RDBMS Synchronization.
If the database is large, it is not practical to recreate the CiscoSecure user database
by replaying the transaction log for the entire history of the system. Instead, create
regular backups of the CiscoSecure user database and replay the transaction logs
from the time of most recent backup to bring the CiscoSecure user database back
in synchronization with the external system. For information on creating backup
files, see Cisco Secure ACS Backup, page 8-8.
Replaying transaction logs that slightly predate the checkpoint does not damage
the CiscoSecure user database, although some transactions might be invalid and
reported as errors. As long as the entire transaction log is replayed, the
CiscoSecure user database is consistent with the database of the external system.
Note After testing that the third-party system updates the accountActions file
properly, discontinue updating the accountActions file until after you
have completed Step 5.
Step 5 Schedule RDBMS synchronization in Cisco Secure ACS. For steps, see
Scheduling RDBMS Synchronization, page 9-34.
Step 6 Configure your third-party system to begin updating the accountActions file with
information to be imported into the CiscoSecure user database. If needed, activate
the mechanism that is to copy the accountActions file to the applicable directory
on the FTP server.
Step 7 Confirm that RDBMS synchronization is operating properly by monitoring the
RDBMS Synchronization report in the Reports and Activity section. For more
information about the RDBMS Synchronization log, see Cisco Secure ACS
System Logs, page 11-12.
Also, monitor the CSDBSync service log. For more information about the
CSDBSync service log, see Service Logs, page 11-25.
Note If this feature does not appear, click Interface Configuration, click
Advanced Options, and then select the RDBMS Synchronization check
box.
Note For more information about FTP setup, see FTP Setup Options,
page 9-31.
a. In the Actions Files box, type the name of the accountActions file that you
want to use to update Cisco Secure ACS.
b. In the FTP Server box, type the IP address or hostname of the FTP server that
you want Cisco Secure ACS to get the accountActions file from.
c. In the Directory box, type the relative path to the directory on the FTP server
where the accountActions file is.
d. In the Username box, type a valid username to enable Cisco Secure ACS to
access the FTP server.
e. In the Password box, type the password for the username provided in the
Login box.
Cisco Secure ACS has the information necessary to get the accountActions file
from the FTP server.
Step 4 For each Cisco Secure ACS that you want this Cisco Secure ACS to update using
the actions in the accountActions file, select the Cisco Secure ACS in the AAA
Servers list, and then click --> (right arrow button).
Note The Cisco Secure ACSes available in the AAA Servers list is determined
by the AAA Servers table in Network Configuration, with the addition of
the name of the current Cisco Secure ACS server. For more information
about the AAA Servers table, see AAA Server Configuration Options,
page 4-23.
Note At least one Cisco Secure ACS must be in the Synchronize list. This
includes the Cisco Secure ACS on which you are configuring RDBMS
Synchronization. RDBMS Synchronization does not automatically
include the internal database of the current Cisco Secure ACS.
Step 5 To remove Cisco Secure ACSes from Synchronize list, select the Cisco Secure
ACS in the Synchronize list, and then click <-- (left arrow button).
The selected Cisco Secure ACS appears in the AAA Servers list.
Step 6 At the bottom of the browser window, click Synchronize Now.
Cisco Secure ACS immediately begins a synchronization event. To check on the
status of the synchronization, view the RDBMS Synchronization report in
Reports and Activity.
Note If this feature does not appear, click Interface Configuration, click
Advanced Options, and then select the RDBMS Synchronization check
box.
Note For more information about FTP setup, see FTP Setup Options,
page 9-31.
a. In the Actions Files box, type the name of the accountActions file that you
want to use to update Cisco Secure ACS.
b. In the FTP Server box, type the IP address or hostname of the FTP server that
you want Cisco Secure ACS to get the accountActions file from.
c. In the Directory box, type the relative path to the directory on the FTP server
where the accountActions file is.
d. In the Username box, type a valid username to enable Cisco Secure ACS to
access the FTP server.
e. In the Password box, type the password for the username provided in the
Login box.
Cisco Secure ACS has the information necessary to get the accountActions file
from the FTP server.
Step 4 To have this Cisco Secure ACS perform RDBMS synchronization at regular
intervals, under Synchronization Scheduling, select the Every X minutes option
and in the X box type the length of the interval at which Cisco Secure ACS should
perform synchronization (up to 7 characters).
Step 5 To schedule times at which this Cisco Secure ACS performs RDBMS
synchronization, follow these steps:
a. Under Synchronization Scheduling, select the At specific times option.
b. In the day and hour graph, click the times at which you want Cisco Secure
ACS to perform replication.
Tip Clicking times of day on the graph selects those times; clicking again
clears them. At any time you can click Clear All to clear all hours, or you
can click Set All to select all hours.
Step 6 For each Cisco Secure ACS you want to synchronize using the actions in the
accountActions file, follow these steps:
a. In the Synchronization Partners table, from the AAA Servers list, select the
name of a Cisco Secure ACS that you want this Cisco Secure ACS to update
with data from the accountActions file.
Note The Cisco Secure ACSes available in the AAA Servers list is
determined by the AAA Servers table in Network Configuration, with
the addition of the name of the current Cisco Secure ACS server. For
more information about the AAA Servers table, see AAA Server
Configuration Options, page 4-23.
Note At least one Cisco Secure ACS must be in the Synchronize list. This
includes the Cisco Secure ACS on which you are configuring
RDBMS Synchronization. RDBMS Synchronization does not
automatically include the internal database of the current
Cisco Secure ACS.
IP Pools Server
This section provides information about the IP Pools feature, including
procedures for creating and maintaining IP pools.
This section contains the following topics:
• About IP Pools Server, page 9-38
• Allowing Overlapping IP Pools or Forcing Unique Pool Address Ranges,
page 9-39
• Refreshing the AAA Server IP Pools Table, page 9-40
• Adding a New IP Pool, page 9-40
• Editing an IP Pool Definition, page 9-41
• Resetting an IP Pool, page 9-42
• Deleting an IP Pool, page 9-43
Note IP pool definitions are not replicated by the CiscoSecure Database Replication
feature; however, user and group assignments to IP pools are replicated. By not
replicating IP pool definitions, Cisco Secure ACS avoids inadvertently assigning
an IP address that a replication partner has already assigned to a different
workstation. To support IP pools in a AAA environment that uses replication, you
must manually configure each secondary Cisco Secure ACS to have IP pools with
names identical to the IP pools defined on the primary Cisco Secure ACS.
To use IP pools, the AAA client must have network authorization (in IOS, aaa
authorization network) and accounting (in IOS, aaa accounting) enabled.
Note To use the IP Pools feature, you must set up your AAA client to perform
authentication and accounting using the same protocol — either TACACS+ or
RADIUS.
Note To use overlapping pools, you must be using RADIUS with VPN, and you cannot
be using Dynamic Host Configuration Protocol (DHCP).
You can determine whether overlapping IP pools are allowed by checking which
button appears below the AAA Server IP Pools table:
• Allow Overlapping Pool Address Ranges—Indicates that overlapping IP
pool address ranges are not allowed. Clicking this button allows IP address
ranges to overlap between pools.
• Force Unique Pool Address Range—Indicates that overlapping IP pool
address ranges are allowed. Clicking this button prevents IP address ranges
from overlapping between pools.
To allow overlapping IP pools or to force unique pool address ranges, follow
these steps:
Note If this feature does not appear, click Interface Configuration, click
Advanced Options, and then select the IP Pools check box.
The AAA Server IP Pools table lists any IP pools you have configured, their
address ranges, and the percentage of pooled addresses in use.
Step 3 If you want to allow overlapping IP pool address ranges, follow these steps:
a. If the Allow Overlapping Pool Address Ranges button appears, click that
button.
Cisco Secure ACS allows overlapping IP pool address ranges.
b. If the Force Unique Pool Address Range button appears, do nothing.
Cisco Secure ACS already allows overlapping IP pool address ranges.
Step 4 If you want to deny overlapping IP pool address ranges, follow these steps:
a. If the Allow Overlapping Pool Address Ranges button appears, do nothing.
Cisco Secure ACS already does not permit overlapping IP pool address
ranges.
b. If the Force Unique Pool Address Range button appears, click that button.
Cisco Secure ACS does not permit overlapping IP pool address ranges.
The AAA Server IP Pools table lists any IP pools you have already configured,
their address ranges, and the percentage of pooled addresses in use.
Step 3 Click Add Entry.
The New Pool table appears.
Step 4 In the Name box, type the name (up to 31 characters) you want to assign to the
new IP pool.
Step 5 In the Start Address box, type the lowest IP address (up to 15 characters) of the
range of addresses for the new pool.
Note All addresses in an IP pool must be on the same Class C network, so the
first three octets of the start and end addresses must be the same. For
example, if the start address is 192.168.1.1, the end address must be
between 192.168.1.2 and 192.168.1.254.
Step 6 In the End Address box, type the highest IP address (up to 15 characters) of the
range of addresses for the new pool.
Step 7 Click Submit.
The new IP pool appears in the AAA Server IP Pools table.
Step 4 To change the name of the pool, in the Name box, type the name (up to 31
characters) to which you want to change the IP pool.
Step 5 To change the starting address of the pool range of IP addresses, in the Start
Address box, type the lowest IP address (up to 15 characters) of the new range of
addresses for the pool.
Note All addresses in an IP pool must be on the same Class C network, so the
first three octets of the start and end addresses must be the same. For
example, if the start address is 192.168.1.1, the end address must be
between 192.168.1.2 and 192.168.1.254.
Step 6 To change the ending address of the pool range of IP addresses, in the End
Address box, type the highest IP address (up to 15 characters) of the new range of
addresses for the pool.
Step 7 Click Submit.
The edited IP pool appears in the AAA Server IP Pools table.
Resetting an IP Pool
The Reset function recovers IP addresses within an IP pool when there are
“dangling” connections. A dangling connection occurs when a user disconnects
and Cisco Secure ACS does not receive an accounting stop packet from the
applicable AAA client. If the Failed Attempts log in Reports and Activity shows
a large number of “Failed to Allocate IP Address For User” messages, consider
using the Reset function to reclaim all allocated addresses in this IP pool.
Note Using the Reset function to reclaim all allocated IP addresses in a pool can result
in users being assigned addresses that are already in use.
To reset an IP pool and reclaim all its IP addresses, follow these steps:
The AAA Server IP Pools table lists any IP pools you have configured, their
address ranges, and the percentage of pooled addresses in use.
Step 3 Click the name of the IP pool you need to reset.
The name pool table appears, where name is the name of the IP pool you selected.
The In Use field displays how many IP addresses in this pool are assigned to a
user. The Available field displays how many IP addresses are not assigned to
users.
Step 4 Click Reset.
Cisco Secure ACS displays a dialog box indicating the possibility of assigning
user addresses that are already in use.
Step 5 To continue resetting the IP pool, click OK.
The IP pool is reset. All its IP addresses are reclaimed. In the In Use column of
the AAA Server IP Pools table, zero percent of the IP pool addresses are assigned
to users.
Deleting an IP Pool
Note If you delete an IP pool that has users assigned to it, those users cannot
authenticate until you edit the user profile and change their IP assignment
settings. Alternatively, if the users receive their IP assignment based on group
membership, you can edit the user group profile and change the IP assignment
settings for the group.
The name pool table appears, where name is the name of the IP pool you selected.
The In Use column displays how many IP addresses in this pool are assigned to a
user. The Available column displays how many IP addresses are not assigned to
users.
Step 4 Click Delete.
Cisco Secure ACS displays a dialog box to confirm that you want to delete the IP
pool.
Step 5 To delete the IP pool, click OK.
The IP pool is deleted. The AAA Server IP Pools table does not list the deleted IP
pool.
Note If this feature does not appear, click Interface Configuration, click
Advanced Options, and then select the IP Pools check box.
Digital Certificates
The ACS Certificate Setup pages enable you to install digital certificates to
support EAP-TLS and PEAP authentication, as well as to support HTTPS
protocol for secure access to the Cisco Secure ACS HTML interface.
Cisco Secure ACS uses the X.509 v3 digital certificate standard. Certificate files
must be in either Base64-encoded X.509 format or DER-encoded binary X.509
format. Also, Cisco Secure ACS supports manual certificate enrollment.
Digital certificates do not require the sharing of secrets nor stored database
credentials. They can be scaled and trusted over large deployments. If managed
properly, they can serve as a method of authentication that is stronger and more
secure than shared secret systems. Mutual trust requires that Cisco Secure ACS
have an installed certificate that can be verified by end-user clients.
EAP-TLS Authentication
This section contains the following topics:
• About the EAP-TLS Protocol, page 10-2
• EAP-TLS and Cisco Secure ACS, page 10-3
• EAP-TLS Limitations, page 10-5
• Enabling EAP-TLS Authentication, page 10-5
EAP-TLS authentication involves two elements of trust. The first element of trust
is when the EAP-TLS negotiation establishes end-user trust by validating,
through RSA signature verifications, that the user possesses a keypair signed by
a certificate. This verifies that the end user is the legitimate keyholder for a given
digital certificate and the corresponding user identification contained in the
certificate. However, trusting that a user possesses a certificate only provides a
username/keypair binding. The second element of trust is to use a third-party
signature, usually from a certification authority (CA), that verifies the
information in a certificate. This third-party binding is similar to the real world
equivalent of the seal on a passport. You trust the passport because you trust the
preparation and identity checking that the particular country’s passport office
made when creating that passport. You trust digital certificates by installing the
root certificate CA signature.
EAP-TLS requires support from both the end client and the AAA client. An
example of an EAP-TLS client includes the Microsoft Windows XP operating
system; EAP-TLS-compliant AAA clients include Cisco 802.1x-enabled switch
platforms (such as the Catalyst 6500 product line) and Cisco Aironet Wireless
solutions. To accomplish secure Cisco Aironet connectivity, EAP-TLS generates
a dynamic, per-user, per-connection, unique session key.
Cisco Secure ACS also supports three methods of certificate comparison and a
session resume feature. This topic discusses these features.
To permit access to the network by a user or computer authenticating with
EAP-TLS, Cisco Secure ACS must verify that the claimed identity (presented in
the EAP Identity response) corresponds to the certificate presented by the user.
Cisco Secure ACS can accomplish this verification in three ways:
• Certificate SAN Comparison—Based on the name in the Subject
Alternative Name field in the user certificate.
• Certificate CN Comparison—Based on the name in the Subject Common
Name field in the user certificate.
• Certificate Binary Comparison—Based on a binary comparison between
the user certificate stored in the user object in the LDAP server or Active
Directory and the certificate presented by the user during EAP-TLS
authentication. This comparison method cannot be used to authenticate users
stored in an ODBC external user database.
Note If you use certificate binary comparison, the user certificate must be
stored in a binary format. Also, for generic LDAP and Active
Directory, the attribute storing the certificate must be the standard
LDAP attribute named “usercertificate”.
When you set up EAP-TLS, you can select the criterion (one, two, or all) that
Cisco Secure ACS uses. For more information, see Configuring Authentication
Options, page 10-32.
Cisco Secure ACS supports a session resume feature for EAP-TLS-authenticated
user sessions, a particularly useful feature for WLANs, wherein a user may move
the client computer so that a different wireless access point is in use. When this
feature is enabled, Cisco Secure ACS caches the TLS session created during
EAP-TLS authentication, provided that the user successfully authenticates. If a
user needs to reconnect and the original EAP-TLS session has not timed out,
Cisco Secure ACS uses the cached TLS session, resulting in faster EAP-TLS
performance and lessened AAA server load. When Cisco Secure ACS resumes an
EAP-TLS session, the user reauthenticates by SSL handshake only, without a
certificate comparison.
In effect, enabling EAP-TLS session resume allows Cisco Secure ACS to trust a
user based on the cached TLS session from the original EAP-TLS authentication.
Because Cisco Secure ACS only caches a TLS session when a new EAP-TLS
authentication succeeds, the existence of a cached TLS session is proof that the
user has successfully authenticated within the number of minutes defined by the
EAP-TLS session timeout option.
Note Session timeout is based on the time of the initial, full authentication of the
session. It is not dependent upon an accounting start message.
Changes to group assignment in an external user database are not enforced by the
session resume feature. This is because group mapping does not occur when a user
session is resumed. Instead, the user is mapped to the same Cisco Secure ACS
group that the user was mapped to upon the beginning of the session. Upon the
start of a new session, group mapping enforces the new group assignment.
To force an EAP-TLS session to end before the session timeout is reached, either
restart the CSAuth service or delete the user from the CiscoSecure user database
CiscoSecure user database. Disabling or deleting the user in an external user
database has no effect because the session resume feature does not involve the use
of external user databases.
You can enable the EAP-TLS session resume feature and configure the timeout
interval on the Global Authentication Setup page. For more information about
enabling this feature, see Global Authentication Setup, page 10-25.
EAP-TLS Limitations
The Cisco Secure ACS implementation of EAP-TLS has the following
limitations:
• Server certificate format—Server and CA certificates must be either in
Base64-encoded X.509 format or DER-encoded binary X.509 format.
• LDAP attribute for binary comparison—If you configure Cisco Secure
ACS to perform binary comparison of user certificates, the user certificate
must be stored in Active Directory or an LDAP server, using a binary format.
Also, the attribute storing the certificate must be named “usercertificate”.
Step 1 Install a server certificate in Cisco Secure ACS. EAP-TLS requires a server
certificate. For detailed steps, see Installing a Cisco Secure ACS Certificate,
page 10-33.
Step 2 Edit the certification trust list so that the certification authority (CA) issuing
end-user client certificates is trusted. If you do not perform this step, Cisco Secure
ACS only trusts user certificates issued by the same CA that issued the certificate
installed in Cisco Secure ACS. For detailed steps, see Editing the Certificate Trust
List, page 10-38.
Step 3 Enable EAP-TLS on the Global Authentication Setup page. Cisco Secure ACS
allows you to complete this step only after you have successfully completed Step
1. For detailed steps, see Configuring Authentication Options, page 10-32.
Step 4 Configure a user database. To determine which user databases support EAP-TLS
authentication, see Authentication Protocol-Database Compatibility, page 1-9.
Cisco Secure ACS is ready to perform EAP-TLS authentication.
PEAP Authentication
This section contains the following topics:
• About the PEAP Protocol, page 10-7
• PEAP and Cisco Secure ACS, page 10-8
• PEAP and the Unknown User Policy, page 10-9
• Enabling PEAP Authentication, page 10-10
Note Session timeout is based on the time that authentication succeeds. It is not
dependent upon accounting.
You can enable the PEAP session resume feature and configure the timeout
interval on the Global Authentication Setup page. For more information about
enabling this feature, see Global Authentication Setup, page 10-25.
Cisco Secure ACS also supports a fast reconnect feature. When the session
resume feature is enabled, the fast reconnection feature causes Cisco Secure ACS
to allow a PEAP session to resume without checking user credentials. In effect,
enabling this feature allows Cisco Secure ACS to trust a user based on the cached
TLS session from the original PEAP authentication. Because Cisco Secure ACS
only caches a TLS session when phase two of PEAP authentication succeeds, the
existence of a cached TLS session is proof that the user has successfully
authenticated within the number of minutes defined by the PEAP session timeout
option.
Changes to group assignment in an external user database are not enforced by the
session resume feature. This is because group mapping does not occur when a user
session is extended by the session resume feature. Instead, the user is mapped to
the same Cisco Secure ACS group that the user was mapped to upon the beginning
of the session. Upon the start of a new session, group mapping enforces the new
group assignment.
The fast reconnect feature is particularly useful for wireless LANs, wherein a user
may move the client computer so that a different wireless access point is in use.
When Cisco Secure ACS resumes a PEAP session, the user reauthenticates
without entering a password, provided that the session has not timed out. If the
end-user client is restarted, the user must enter a password even if the session
timeout interval has not ended.
You can enable the PEAP fast reconnect feature on the Global Authentication
Setup page. For more information about enabling this feature, see Global
Authentication Setup, page 10-25.
Cisco PEAP client does not; therefore, Cisco Secure ACS does not attempt to
lookup the username presented during phase one and the use of the Unknown User
Policy is irrelevant during phase one, regardless of the PEAP client used.
When phase two of PEAP authentication occurs and the username presented by
the PEAP client is unknown to Cisco Secure ACS, Cisco Secure ACS processes
the username in the same way that it processes usernames presented in other
authentication protocols. If the username is unknown and the Unknown User
Policy is disabled, authentication fails. If the username is unknown and the
Unknown User Policy is enabled, Cisco Secure ACS attempts to authenticate the
PEAP user with unknown user processing.
For more information about unknown user processing, see Unknown User
Processing, page 14-2.
Note End-user client computers must be configured to support PEAP. This procedure
is specific to configuration of Cisco Secure ACS only.
Step 1 Install a server certificate in Cisco Secure ACS. PEAP requires a server
certificate. For detailed steps, see Installing a Cisco Secure ACS Certificate,
page 10-33.
Step 2 Enable PEAP on the Global Authentication Setup page. Cisco Secure ACS allows
you to complete this step only after you have successfully completed Step 1. For
detailed steps, see Configuring Authentication Options, page 10-32.
Step 3 Configure a user database. To determine which user databases support PEAP
authentication, see Authentication Protocol-Database Compatibility, page 1-9.
Cisco Secure ACS is ready to perform PEAP authentication for most users. For
more information, see PEAP and the Unknown User Policy, page 10-9.
Step 4 Consider enabling the Unknown User Policy to simplify PEAP authentication.
For more information, see PEAP and the Unknown User Policy, page 10-9. For
detailed steps, see Configuring the Unknown User Policy, page 14-10.
EAP-FAST Authentication
Note EAP-FAST support is available beginning in Cisco Secure ACS version 3.2.3.
Earlier versions of Cisco Secure ACS do not include this feature.
About EAP-FAST
The EAP Flexible Authentication via Secured Tunnel (EAP-FAST) protocol is a
client-server security architecture that encrypts EAP transactions with a TLS
tunnel. While similar to PEAP in this respect, it differs significantly in that
EAP-FAST tunnel establishment is based upon strong secrets that are unique to
users. These secrets are called Protected Access Credentials (PACs), which
Cisco Secure ACS generates using a master key known only to Cisco Secure ACS.
Because handshakes based upon shared secrets are intrinsically faster than
handshakes based upon PKI, EAP-FAST is the significantly faster of the two
solutions that provide encrypted EAP transactions. No certificate management is
required to implement EAP-FAST.
EAP-FAST occurs in three phases:
• Phase zero—Unique to EAP-FAST, phase zero is a tunnel-secured means of
providing an EAP-FAST end-user client with a PAC for the user requesting
network access (see Automatic PAC Provisioning, page 10-17). Providing a
PAC to the end-user client is the sole purpose of phase zero. The tunnel is
established based on an anonymous Diffie-Hellman key exchange. If
EAP-MSCHAPv2 authentication succeeds, Cisco Secure ACS provides the
user a PAC. To determine which databases support EAP-FAST phase zero,
see Authentication Protocol-Database Compatibility, page 1-9.
To increase the security of EAP-FAST, Cisco Secure ACS changes the master key
that it uses to generate PACs. Cisco Secure ACS uses time-to-live (TTL) values
you define to determine when it generates a new master key and to determine the
age of all master keys. Based on TTL values, Cisco Secure ACS assigns master
keys one of the three following states:
• Active—An active master key is the master key used by Cisco Secure ACS
to generate PACs. The duration that a master key remains active is
determined by the Master key TTL setting. At any time, only one master key
is active. When you define TTLs for master keys and PACs, Cisco Secure
ACS permits only a PAC TTL that is shorter than the active master key TTL.
This limitation ensures that a PAC is refreshed at least once before the
expiration of the master key used to generate the PAC, provided that
EAP-FAST users log in to the network at least once before the master key
expires. For more information about how TTL values determine whether
PAC refreshing or provisioning is required, see Master Key and PAC TTLs,
page 10-19.
When Cisco Secure ACS is configured to receive replicated EAP-FAST
policies and master keys, a backup master key is among the master keys
received. The backup master key is used only if the active master key retires
before the next successful master key replication. If the backup master key
also retires before the next successful master key replication, EAP-FAST
authentication fails for all users requesting network access with EAP-FAST.
Tip If EAP-FAST authentication fails because the active and backup master keys have
retired and Cisco Secure ACS has not received new master keys in replication,
you can force Cisco Secure ACS to generate its own master keys by selecting the
EAP-FAST Master Server check box and clicking Submit.
Cisco Secure ACS records the generation of master keys in the logs for the
CSAuth service.
• Retired—When a master key becomes older than the Master key TTL
settings, it is considered retired for as long as specified by the Retired master
key TTL settings. Cisco Secure ACS can store up to 255 retired master keys.
While a retired master key is not used to generate new PACs, Cisco Secure
ACS needs it to authenticate PACs that were generated using it. When you
define TTLs for master keys and retired master keys, Cisco Secure ACS
permits only TTL settings that require storing 255 or fewer retired master
keys. For example, if the master key TTL is 1 hour and the retired master key
TTL is 4 weeks, this would require storing up to 671 retired master keys;
therefore, Cisco Secure ACS presents an error message and does not allow
these settings.
When a user gains network access using a PAC generated with a retired
master key, Cisco Secure ACS provides the end-user client a new PAC
generated with the active master key. For more information about
Cisco Secure ACS with respect to the states of master keys and PACs, see
Master Key and PAC TTLs, page 10-19.
• Expired—When a master key becomes older than the sum of the master key
TTL and retired master TTL settings, it is considered expired and
Cisco Secure ACS deletes it from its records of master keys. For example, if
the master key TTL is one hour and the retired master key TTL is one week,
a master key expires when it becomes greater than one week and one hour old.
PACs generated by an expired master key cannot be used to access your
network. An end-user client presenting a PAC that was generated with an
expired master key must be provided a new PAC using automatic or manual
provisioning before phase one of EAP-FAST can succeed.
About PACs
PACs are strong shared secrets that enable Cisco Secure ACS and an EAP-FAST
end-user client to authenticate each other and establish a TLS tunnel for use in
EAP-FAST phase two. Cisco Secure ACS generates PACs using the active master
key and a username. An EAP-FAST end-user client stores PACs for each user
accessing the network with the client. Additionally, a AAA server that supports
EAP-FAST has a unique Authority ID. An end-user client associates a user’s
PACs with the Authority ID of the AAA server that generated them.
During EAP-FAST phase one, the end-user client presents the PAC that it has for
the current user and for the Authority ID sent by Cisco Secure ACS at the
beginning of the EAP-FAST transaction. Cisco Secure ACS determines whether
the PAC was generated using one of the master keys it is aware of, either active
or retired (a PAC generated using an expired master key can never be used to gain
network access). When an end-user client has a PAC generated with an expired
master key, the end-user client must receive a new PAC before EAP-FAST phase
one can succeed. The means of providing PACs to end-user clients, known as
PAC provisioning, are discussed in Automatic PAC Provisioning, page 10-17, and
Manual PAC Provisioning, page 10-18.
After end-user clients are provided PACs, Cisco Secure ACS refreshes them as
dictated by master key and PAC TTL values. Cisco Secure ACS generates and
sends a new PAC as needed at the end of phase two of EAP-FAST; however, if
you shorten the master key TTL, you may in effect be requiring PAC provisioning
to occur. For more information about how master key and PAC states determine
whether Cisco Secure ACS sends a new PAC to the end-user client at the end of
phase two, see Master Key and PAC TTLs, page 10-19.
Regardless of the master key TTL values you define, a user will require PAC
provisioning when the user does not use EAP-FAST to access the network before
the master key used to generate the user’s PAC has expired. For example, if the
master key TTL is one week and the retired master key TTL is one week, each
EAP-FAST end-user client used by someone who goes on vacation for two weeks
will require PAC provisioning.
The following list contrasts the various means by which an end-user client can
receive PACs:
• PAC provisioning—Required when an end-user client has no PAC or has a
PAC that is based on an expired master key. For more information about how
master key and PAC states determine whether PAC provisioning is required,
see Master Key and PAC TTLs, page 10-19.
Two means of PAC provisioning are supported:
– Automatic provision—Sends a PAC using a secure network connection.
For more information, see Automatic PAC Provisioning, page 10-17.
– Manual provision—Requires that you use Cisco Secure ACS to
generate a PAC file for the user, copy the PAC file to the computer
running the end-user client, and import the PAC file into the end-user
client. For more information, see Manual PAC Provisioning, page 10-18.
• PAC refresh—Occurs automatically when EAP-FAST phase two
authentication has succeeded and master key and PAC TTLs dictate that the
PAC must be refreshed. For more information about how master key and PAC
states determine whether a PAC is refreshed, see Master Key and PAC TTLs,
page 10-19.
PACs have the following two states, determined by the PAC TTL setting:
• Active—A PAC younger than the PAC TTL is considered active and can be
used to complete EAP-FAST phase one, provided that the master key used to
generate it has not expired. Regardless of whether a PAC is active, if it is
based on an expired master key, PAC provisioning must occur before
EAP-FAST phase one can succeed.
• Expired—A PAC older than the PAC TTL is considered expired. Provided
that the master key used to generate the PAC has not expired, an expired PAC
can be used to complete EAP-FAST phase one and, at the end of EAP-FAST
phase two, Cisco Secure ACS will generate a new PAC for the user and
provide it to the end-user client.
Note Because EAP-FAST phase zero and phase two use different authentication
methods (EAP-MSCHAPv2 in phase zero versus EAP-GTC in phase two), some
databases that support phase two cannot support phase zero. Given that
Cisco Secure ACS associates each user with a single user database, the use of
automatic PAC provisioning requires that EAP-FAST users are authenticated
with a database that is compatible with EAP-FAST phase zero. For the databases
with which Cisco Secure ACS can support EAP-FAST phase zero and phase two,
see Authentication Protocol-Database Compatibility, page 1-9.
To control whether Cisco Secure ACS performs automatic PAC provisioning, you
use the options on the Global Authentication Setup page in the System
Configuration section. For more information, see Authentication Configuration
Options, page 10-25.
Note Replicating EAP-FAST master keys and policies affects the ability to require
different PACs per Cisco Secure ACS. For more information, see Table 10-2.
The EAP-FAST master server setting has a significant effect upon EAP-FAST
authentication and replication, as follows:
• Enabled—When the EAP-FAST master server check box is selected, the
“Actual EAP-FAST server status” is Master and Cisco Secure ACS ignores
the EAP-FAST settings, Authority ID, and master keys it receives from a
primary Cisco Secure ACS during replication, preferring instead to use
master keys it generates, its unique Authority ID, and the EAP-FAST settings
configured in its HTML interface.
Enabling the EAP-FAST master server setting requires providing for the
end-user client a PAC from the primary Cisco Secure ACS that is different
than the PAC from the secondary Cisco Secure ACS. Because the primary
and secondary Cisco Secure ACSes send different Authority IDs at the
beginning of the EAP-FAST transaction, the end-user client must have a PAC
for each Authority ID. A PAC generated by the primary Cisco Secure ACS is
not accepted by the secondary Cisco Secure ACS in a replication scheme
where the EAP-FAST master server setting is enabled on the secondary
Cisco Secure ACS.
Tip In a replicated Cisco Secure ACS environment, use the EAP-FAST master server
feature in conjunction with disallowing automatic PAC provisioning to control
EAP-FAST access to different segments of your network. Without automatic
PAC provisioning, users must request PACs for each network segment.
Note When you deselect the EAP-FAST master server check box, the
“Actual EAP-FAST server status” remains Master until Cisco Secure
ACS receives replicated EAP-FAST components and then the
“Actual EAP-FAST server status” changes to Slave. Until “Actual
EAP-FAST server status” changes to Slave, Cisco Secure ACS acts
as a master EAP-FAST server, using master keys it generates, its
unique Authority ID, and the EAP-FAST settings configured in its
HTML interface.
Disabling the EAP-FAST master server setting eliminates the need for
providing a different PAC from the primary and secondary Cisco Secure
ACSes. This is because the primary and secondary Cisco Secure ACSes send
the end-user client the same Authority ID at the beginning of the EAP-FAST
transaction; therefore, the end-user client uses the same PAC in its response
to either Cisco Secure ACS. Also, a PAC generated for a user by one
Cisco Secure ACS in a replication scheme where the EAP-FAST master
server setting is disabled is accepted by all other Cisco Secure ACSes in the
same replication scheme.
For more information about replication, see CiscoSecure Database Replication,
page 9-1.
Enabling EAP-FAST
This procedure provides an overview of the detailed procedures required to
configure Cisco Secure ACS to support EAP-FAST authentication.
Note User database support differs for EAP-FAST phase zero and phase two.
Cisco Secure ACS supports use of the Unknown User Policy and group mapping
with EAP-FAST, as well as password aging with Windows external user
databases.
Step 2 Determine master key and PAC TTL values. While changing keys and PACs more
frequently could be considered more secure, it also increases the likelihood that
PAC provisioning will be needed for machines left offline so long that the PACs
on them are based on expired master keys.
Also, keep in mind that if you reduce the TTL values that you initially deploy
EAP-FAST with, you may force PAC provisioning to occur because users would
be more likely to have PACs based on expired master keys.
For information about how master key and PAC TTL values determine whether
PAC provisioning or PAC refreshing is required, see Master Key and PAC TTLs,
page 10-19.
Step 3 Determine whether you want to use automatic or manual PAC provisioning. For
more information about the two means of PAC provisioning, see Automatic PAC
Provisioning, page 10-17, and Manual PAC Provisioning, page 10-18.
Step 4 Using the decisions during Step 2 and Step 3, enable EAP-FAST on the Global
Authentication Setup page. For detailed steps, see Configuring Authentication
Options, page 10-32.
Cisco Secure ACS is ready to perform EAP-FAST authentication.
Note If users access your network using a AAA client defined in the
Network Configuration section as a RADIUS (Cisco Aironet)
device, one or more of the LEAP, EAP-TLS, or EAP-FAST
protocols must be enabled on the Global Authentication Setup
page; otherwise, Cisco Aironet users cannot authenticate.
Note Decreasing the master key TTL can cause retired master keys to
expire because a master key expires when it is older than the sum
of the master key TTL and the retired master key TTL; therefore,
decreasing the master key TTL requires PAC provisioning for
end-user clients with PACs based on the newly expired master
keys.
For more information about master keys, see About Master Keys,
page 10-13.
– Retired master key TTL—The duration that PACs generated using a
retired master key are acceptable for EAP-FAST authentication. In other
words, the retired master key TTL defines the length of the grace period
during which PACs generated with a master key that is no longer active
are acceptable. When an end-user client gains network access using a
PAC based on a retired master key, Cisco Secure ACS sends a new PAC
to the end-user client. The default retired master key TTL is three
months.
When a retired master key ages past the retired master key TTL, it
expires and Cisco Secure ACS deletes it.
Note Decreasing the retired master key TTL is likely to cause some
retired master keys to expire; therefore, end-user clients with
PACs based on the newly expired master keys require PAC
provisioning.
Note Decreasing the retired master key TTL can cause retired master
keys to expire; therefore, decreasing the retired master key TTL
requires PAC provisioning for end-user clients with PACs based
on the newly expired master keys.
For more information about master keys, see About Master Keys,
page 10-13.
– PAC TTL—The duration that a PAC is used before it expires and must
be replaced. If the master key used to generate it has not expired, new
PAC creation and assignment are automatic. If the master key used to
generate it has expired, in-band or out-of-band provisioning must be used
to provide the end-user client with a new PAC. The default PAC TTL is
one month.
For more information about PACs, see About PACs, page 10-15.
– Client initial display message—Specifies a message to be sent to users
who authenticate with an EAP-FAST client. Maximum length is 40
characters.
Note A user will see the initial display message only if the end-user
client supports its display.
Tip If you deselect the EAP-FAST Master Server check box, EAP-FAST server status
remains “Master” until Cisco Secure ACS receives replicated EAP-FAST
components.
Note If users access your network using a AAA client defined in the
Network Configuration section as a RADIUS (Cisco Aironet)
device, one or more of the LEAP, EAP-TLS, or EAP-FAST
protocols must be enabled on the Global Authentication Setup
page; otherwise, Cisco Aironet users cannot authenticate.
Note If you select more than one comparison type, Cisco Secure ACS
performs the comparisons in the order listed. If the one
comparison type fails, Cisco Secure ACS attempts the next
enabled comparison type. Comparison stops after the first
successful comparison.
Note If users access your network using a AAA client defined in the
Network Configuration section as a RADIUS (Cisco Aironet) device,
either LEAP, EAP-TLS, or both must be enabled on the Global
Authentication Setup page; otherwise, Cisco Aironet users cannot
authenticate.
During EAP conversations, Cisco Secure ACS sends the value defined in the
AP EAP request timeout box using the IETF RADIUS Session-Timeout (27)
attribute; however, in the RADIUS Access-Accept packet at the end of the
conversation, the value that Cisco Secure ACS sends in the IETF RADIUS
Session-Timeout (27) attribute is the value specified in the Cisco Aironet
RADIUS VSA Cisco-Aironet-Session-Timeout (01) or, if that attribute is not
enabled, the IETF RADIUS Session-Timeout (27) attribute.
with that version using RADIUS cannot access the network. If no end-user
clients are configured to use a specific version of MS-CHAP with RADIUS,
we recommend that you disable that version of MS-CHAP.
Note For TACACS+, Cisco Secure ACS supports only MS-CHAP version
1. TACACS+ support for MS-CHAP version 1 is always enabled and
is not configurable.
Cisco Secure ACS restarts its services and implements the authentication
configuration options you selected.
Step 5 If you want to save the settings you have made but implement them later, click
Submit.
Tip You can restart Cisco Secure ACS services at any time by using the
Service Control page in the System Configuration section.
Cisco Secure ACS saves the authentication configuration options you selected.
To install an existing certificate for use on Cisco Secure ACS, follow these steps:
Tip If you specify the hostname, DNS must be working correctly on your
network.
b. In the Login box, type a valid username that Cisco Secure ACS can use to
access the FTP server.
c. In the Password box, type the password for the username you specified in the
Login box.
d. In the Remote FTP Directory box, type relative path from the FTP server
root directory to the directory containing the certificate file you want
Cisco Secure ACS to download from the FTP server.
e. In the Remote FTP File Name box, type the name of the certificate file you
want Cisco Secure ACS to download from the FTP server.
f. Click Submit.
The system downloads the certificate file and displays the file name in Certificate
file box of the Install ACS Certificate page.
Tip If the file transfer encounters errors, they appear in the window on the
right.
Step 6 If you generated the request using Cisco Secure ACS, click the Download
private key file link.
The Download Private Key File page appears.
Step 7 To download the private key file to the Cisco Secure ACS, in the Download File
table follow these steps:
a. In the FTP Server box, type the IP address or hostname of the FTP server
that has the private key file you want to download.
Tip If you specify the hostname, DNS must be working correctly on your
network.
b. In the Login box, type a valid username that Cisco Secure ACS can use to
access the FTP server.
c. In the Password box, type the password for the username you specified in the
Login box.
d. In the Remote FTP Directory box, type the relative path from the FTP server
root directory to the directory containing the private key file you want
Cisco Secure ACS to download from the FTP server.
e. In the Remote FTP File Name box, type the name of the private key file you
want Cisco Secure ACS to download from the FTP server.
f. Click Submit.
The system downloads the private key file and displays the filename in Private
key file box of the Install ACS Certificate page.
Tip If the file transfer encounters errors, they appear in the window on the
right.
Step 8 In the Private key password box, type the private key password.
Tip If you used Cisco Secure ACS to generate the certificate signing request,
this is the value you entered in Private key password under Generate
certificate signing request (CSR). If the private key file is unencrypted,
leave this box empty.
Note If the clients and Cisco Secure ACS are getting their certificates from the same
CA, you do not need to perform this procedure because Cisco Secure ACS
automatically trusts the CA that issued its certificate.
When a user certificate is from an unknown CA (that is, one that is different from
the CA that certifies the Cisco Secure ACS), you must specifically configure
Cisco Secure ACS to trust that CA or authentication fails. Until you perform this
procedure to explicitly extend trust by adding another CA, Cisco Secure ACS
only recognizes certificates from the CA that issued its own certificate.
Configuring Cisco Secure ACS to trust a specific CA is a two-step process that
comprises both this procedure of adding a CA certificate and the procedure in
Editing the Certificate Trust List, page 10-38, where you signify that the
Tip If the file transfer encounters errors, they appear in the window on the
right.
Step 6 In the Private key password box, type the private key password.
Note The single exception to the requirement that a CA must be explicitly signified as
trustworthy occurs when the clients and Cisco Secure ACS are getting their
certificates from the same CA. You do not need to add this CA to the CTL because
Cisco Secure ACS automatically trusts the CA that issued its certificate.
How you edit your CTL determines the type of trust model you have. Many use a
restricted trust model wherein very few, privately controlled CAs are trusted. This
model provides the highest level of security but restricts adaptability and
scalability. The alternative, an open trust model, allows for more CAs or public
CAs. This open trust model trades off increased security for greater adaptability
and scalability.
We recommend that you fully understand the implications of your trust model
before editing the CTL in Cisco Secure ACS.
Use this procedure to configure CAs on your CTL as trusted or not trusted. Before
a CA can be configured as trusted on the CTL, you must have added the CA to the
local certificate storage; for more information, see Adding a Certificate Authority
Certificate, page 10-36. If a user’s certificate is from a CA that you have not
specifically configured Cisco Secure ACS to trust, authentication fails.
To edit the CTL, follow these steps:
Warning Adding a public CA, which you do not control, to your CTL, may reduce your
system security.
Step 4 To configure a CA on your CTL as trusted, select the corresponding check box.
Tip You can select, or deselect, as many CAs as you want. Deselecting a CA’s
check box configures the CA as not trusted.
Note If you already have a server certificate, you do not need to use this portion of the
ACS Certificate Setup page.
Step 4 In the Certificate subject box, type cn= followed by the name that you would like
to use as subject name in this ACS certificate, for example, cn=ACSWireless.
Step 5 In the Private key file box, type the full directory path and name of the file in
which the private key is saved, for example, c:\privateKeyFile.pem.
Step 6 In the Private key password box, type the private key password (that you have
invented).
Step 7 In the Retype private key password box, retype the private key password.
Step 8 From the Key length list, select the length of the key to be used.
Tip The choices for Key length are 512 or 1024 bits. The default and more
secure choice is 1024 bits.
Step 9 From the Digest to sign with list, select the digest (or hashing algorithm).
Tip The choices for Digest to sign with are MD2, MD5, SHA, and SHA1. The
default is SHA1.
Tip You can copy and paste this certificate to the online enrollment tool of
any CA.
Caution This procedure eliminates your existing Cisco Secure ACS certificate and erases
your Certificate Trust List configuration.
Note If your Cisco Secure ACS has not already been enrolled with a certificate,
you do not see the Installed Certificate Information table. Rather, you see
the Install new certificate table. If this is the case, you can proceed to
Step 5.
Tip You can also specify a domain-qualified username, using the format
DOMAIN\username. For example, if you specify ENIGINEERING\augustin,
Cisco Secure ACS generates a PAC file name ENGINEERING_augustin.pac.
• Users from specific ACS group—Cisco Secure ACS generates a PAC file
for each user in the user group specified by the ACS Group list. Cisco Secure
ACS has 500 groups, numbered from 0 (zero) to 499. For example, assume
group 7 has 43 users. If you selected this option and selected <Group 7> from
the ACS Group list, Cisco Secure ACS would generate 43 PAC files, one for
each user who is a member of group 7. Each PAC file is named in the
following format:
username.pac
Note Generating PAC files for users in a specific group restarts the CSAuth
service. No users are authenticated while CSAuth is unavailable.
Tip To generate PAC files for more than one group of users, generate PAC files for
each group separately. For example, to generate PAC files for users in groups 7
through 10, generate PAC files four times, once each for groups 7, 8, 9, and 10.
• All users in ACS internal DB—Cisco Secure ACS generates a PAC file for
each user in the CiscoSecure user database. For example, if you have 3278
users in the CiscoSecure user database and select this option, Cisco Secure
ACS would generate 3278 PAC files, one for each user. Each PAC file is
named in the following format:
username.pac
Note Generating PAC files for all users in the CiscoSecure user database
restarts the CSAuth service. No users are authenticated while CSAuth
is unavailable.
• Users from list—Cisco Secure ACS generates a PAC file for each username
contained in the file retrieved from the FTP server you specify.
Lists of usernames should contain one username per line with no additional
spaces or other characters.
For example, if a list retrieved from an FTP server contains the following
usernames:
seaniemop
jwiedman
echamberlain
Tip You can also specify domain-qualified usernames, using the format
DOMAIN\username. For example, if you specify ENIGINEERING\augustin,
Cisco Secure ACS generates a PAC file name ENGINEERING_augustin.pac.
– Login—A valid username to enable Cisco Secure ACS to access the FTP
server.
Tip To specify the FTP root directory, enter a single period or “dot”.
– Users list file—The filename of the username list. For example, if the
name of the username file is eapfastusers.txt, type eapfastusers.txt in
the User list filebox.
• Encrypt PAC file(s) with—Each PAC file is always encrypted using a
password, either the default password known to Cisco Secure ACS and the
end-user clients or a password that you specify. Encrypting PAC files helps
prevent use of stolen PAC files for access to your network by unauthorized
persons. Although the default password is a strong password, it is used by all
Cisco Secure ACSes and all EAP-FAST end-user clients.
Note We recommend that you use a password that you devise rather than
the default password.
Note We recommend that you use a password you devise rather than
the default password.
Note If you choose to generate PAC files for all users in the CiscoSecure user
database in a specific group, the CSAuth service restarts. No user
authentication occurs while CSAuth is unavailable.
click Refresh occasionally until the “Current PAC CAB file generation status”
display is:
CAB file is ready. Press ’Download’ to retrieve the file.
Depending upon how many users you specified, Cisco Secure ACS requires from
a few seconds to a few minutes to generate PAC files.
Step 6 When the “Current PAC CAB file generation status” display is
CAB file is ready. Press ’Download’ to retrieve the file.
click Download.
Note The file download options provided by your web browser may differ;
however, the fundamental process should be similar to these steps.
Cisco Secure ACS Appliance produces a variety of logs and provides a way to
view most of these logs in the Cisco Secure ACS HTML interface as HTML
reports.
This chapter contains the following topics:
• Logging Formats, page 11-1
• Special Logging Attributes, page 11-2
• Update Packets in Accounting Logs, page 11-3
• About Cisco Secure ACS Logs and Reports, page 11-4
• Working with CSV Logs, page 11-13
• Remote Logging, page 11-17
• Service Logs, page 11-25
Logging Formats
Cisco Secure ACS logs a variety of user and system activities. Regardless of the
content, a Cisco Secure ACS Appliance writes all logs in comma-separated (CSV)
files. The CSV format records data in columns separated by commas.
Files in a CSV format are easily imported into a variety of third-party
applications, such as Microsoft Excel or Microsoft Access. After data from a CSV
file is imported into such applications, you can prepare charts or perform queries,
such as determining how many hours a user was logged in to the network during
a given period. For information about how to use a CSV file in a third-party
application such as Microsoft Excel, please see the documentation supplied by the
third-party vendor.
You can access the CSV files by downloading the CSV file from the HTML
interface. For more information about downloading the CSV file from the HTML
interface, see Viewing a CSV Report, page 11-14.
user access, or more specific information about which NAR denied the user
access. If no NARs apply to the user, this logging attribute notes that no
NARs were applied.
The Filter Information attribute is available for Passed Authentication and
Failed Attempts logs.
• Device Command Set—The name of the device command set, if any, that
was used to satisfy a command authorization request.
The Device Command Set attribute is available for Failed Attempts logs.
• Remote Logging Result—Whether a forwarded accounting packet is
successfully processed by a remote logging service. This attribute is useful
for determining which accounting packets, if any, may not have been logged
by a central logging service. It is dependent upon the receipt of an
acknowledgment message from the remote logging service. The
acknowledgment message indicates that the remote logging service properly
processed the accounting packet in the manner that the remote logging
service is configured to do. A value of Remote-logging-successful
indicates that the remote logging service successfully processed the
accounting packet. A value of Remote-logging-failed indicates that the
remote logging service did not process the accounting packet successfully.
Note Cisco Secure ACS cannot determine how a remote logging service is
configured to process accounting packets that it is forwarded. For
example, if a remote logging service is configured to discard
accounting packets, it discards a forwarded accounting packet and
responds to Cisco Secure ACS with an acknowledgment message,
causing Cisco Secure ACS to write a value of
Remote-logging-successful in the Remote Logging Result attribute
in the local log that records the account packet.
Note To record update packets in Cisco Secure ACS accounting logs, you must
configure your AAA clients to send the update packets. For more information
about configuring your AAA client to send update packets, refer to the
documentation for your AAA clients.
Accounting Logs
Accounting logs contain information about the use of remote access services by
users. They are available in CSV format. Table 11-1 contains descriptions of all
accounting logs.
In the HTML interface, all accounting logs can be enabled, configured, and
viewed. Table 11-2 contains information about what you can do in the
Cisco Secure ACS HTML interface regarding accounting logs.
Log Description
TACACS+ Accounting Contains the following information:
• User sessions stop and start times
• AAA client messages with username
• Caller line identification (CLID) information
• Session duration
TACACS+ Administration Lists configuration commands entered on a AAA client using
TACACS+ (Cisco IOS). Particularly if you use Cisco Secure ACS to
perform command authorization, we recommend that you use this log.
Note To use the TACACS+ Administration log, you must configure
TACACS+ AAA clients to perform command accounting with
Cisco Secure ACS.
Log Description
RADIUS Accounting Contains the following information:
• User sessions stop and start times
• AAA client messages with username
• CLID information
• Session duration
You can configure Cisco Secure ACS to include accounting for
Voice-over-IP (VoIP) in the RADIUS Accounting log, in a separate
VoIP accounting log, or in both places.
VoIP Accounting Contains the following information:
• VoIP session stop and start times
• AAA client messages with username
• CLID information
• VoIP session duration
You can configure Cisco Secure ACS to include accounting for VoIP in
this separate VoIP accounting log, in the RADIUS Accounting log, or
in both places.
Failed Attempts Lists authentication and authorization failures with an indication of the
cause.
Passed Authentications Lists successful authentication requests. This log is not dependent upon
accounting packets from your AAA clients, so it is available even if
your AAA clients do not support RADIUS accounting or if you have
disabled accounting on your AAA clients.
For instructions on viewing the Logged-in User report in the HTML interface,
see Viewing the Logged-in Users Report, page 11-9.
For instructions about deleting logged-in users from specific AAA clients or
from all AAA clients, see Deleting Logged-in Users, page 11-10.
Disabled Accounts Lists all user accounts that are currently disabled and the reason they were
disabled.
For instructions on viewing the Disabled Accounts report in the HTML
interface, see Viewing the Disabled Accounts Report, page 11-11.
Appliance Status Lists statistics about resource utilization on the Cisco Secure ACS Appliance
and provides details about IP configuration, including the MAC address for the
network interface card.
Tip You can sort the table by any column’s entries, in either ascending or
descending order. Click a column title once to sort the table by the entries
in that column in ascending order. Click the column a second time to sort
the table by the entries in that column in descending order.
Tip You can sort the table by the entries in any column, in either ascending or
descending order. Click a column title once to sort the table by the entries
in that column, in ascending order. Click the column a second time to sort
the table by the entries that column in descending order.
Note Deleting logged-in users only ends the Cisco Secure ACS accounting record of
users logged in to a particular AAA client. It does not terminate active user
sessions, nor does it affect user records.
Note Some CSV logs are always enabled. For information about specific logs,
including whether you can disable them, see About Cisco Secure ACS Logs and
Reports, page 11-4.
Step 4 To enable the log, under Enable Logging, select the Log to CSV log report check
box, where log is the name of the CSV log you selected in Step 3.
Step 5 To disable the log, under Enable Logging, clear the Log to CSV report log check
box, where log is the name of the CSV log you selected in Step 3.
Step 6 Click Submit.
If you enabled the log, Cisco Secure ACS begins logging information for the log
selected. If you disabled the log, Cisco Secure ACS stops logging information for
the log selected.
Tip You can configure how Cisco Secure ACS handles old CSV report files.
For more information, see Configuring a CSV Log, page 11-15.
Step 3 Click the CSV report filename whose contents you want to view.
If the CSV report file contains information, the information appears in the display
area.
Tip You can sort the table by any entries in the column, in either ascending or
descending order. Click a column title once to sort the table by that
column’s entries in ascending order. Click the column a second time to
sort the table by the entries in that column in descending order.
Tip To check for newer information in the current CSV report, click Refresh.
Step 4 If you want to download the CSV log file for the report you are viewing, follow
these steps:
a. Click Download.
Your browser displays a dialog box for accepting and saving the CSV file.
b. Choose a location to save the CSV file and save the file.
• VoIP Accounting
• Failed Attempts
• Passed Authentications
Note The ACS Backup and Restore, RDBMS Synchronization, and Database
Replication CSV logs cannot be configured.
Tip Use the vertical scroll bar to find attributes not visible in the list box.
Step 5 To remove an attribute from the log, select the attribute in the Logged Attributes
list, then click <-- (left arrow button).
The attribute moves to the Attributes list.
Tip Use the vertical scroll bar to find attributes not visible in the list.
Step 6 To set the attributes in the Logged Attributes list back to the default selections, at
the bottom of the browser window, click Reset Columns.
Step 7 Click Submit.
Cisco Secure ACS implements the CSV log configuration that you specified.
Remote Logging
This section discusses remote logging capabilities of Cisco Secure ACS.
This section contains the following topics:
• About Remote Logging, page 11-17
• Implementing Centralized Remote Logging, page 11-18
• Local Configuration of Remote Logging, page 11-19
• Remote Agent Logging Configuration, page 11-22
Note The Remote Logging feature does not affect the forwarding of accounting data for
proxied authentication requests. Cisco Secure ACS only applies Remote Logging
settings to accounting data for sessions authenticated by proxy when accounting
data for sessions authenticated by proxy is logged locally. For more information
about proxied authentication requests and accounting data for sessions
authenticated by proxy, see Proxy Distribution Table Configuration, page 4-41.
The Remote Logging Setup page, available from the Logging Configuration page
in the System Configuration section, is where you configure Cisco Secure ACS to
perform remote logging of accounting data. You can specify that account data is
sent to a single remote agent or that it is sent to many remote agents. For more
information about enabling remote logging, see Local Configuration of Remote
Logging, page 11-19.
Regardless of how many Cisco Secure ACSes send their accounting data to the
central logging server, the remote agent receives its configuration from a single
Cisco Secure ACS Appliance. That Cisco Secure ACS is the configuration
provider for the remote agent. In the HTML interface of the configuration
provider Cisco Secure ACS, you determine the remote agent configuration. By
using the links found under Remote Agent Logging Configuration on the Logging
Configuration page, you determine what logs the remote agent keeps, what data
is recorded for each log kept, and how the remote agent manages the log files. For
more information about configuring remote agent logging, see Remote Agent
Logging Configuration, page 11-22.
Step 1 Install and configure a Cisco Secure ACS Remote Agent on a computer that you
want to use to store centralized logging data. For more information about
installing and configuring a Cisco Secure ACS Remote Agent, see Installation
and Configuration Guide for Cisco Secure ACS Remote Agent.
Step 2 On each Cisco Secure ACS Appliance, add the remote agent. For more
information, see Remote Agent Configuration, page 4-29.
Step 3 On each Cisco Secure ACS Appliance, enable remote logging. For more
information, see Local Configuration of Remote Logging, page 11-19.
Step 4 On the Cisco Secure ACS Appliance that the remote agent is configured to use as
its configuration provider, configure remote agent logging. For more information,
see Remote Agent Logging Configuration, page 11-22.
Step 5 If you want to create another central logging server, for use either as a secondary
server or as a mirror server, perform Step 1 through Step 4 for the additional
server.
Note Local configuration of remote logging does not affect the types of logs sent to
remote agents or the configuration of the data included in logs sent to remote
agents. For information about configuring which logs are sent to remote agents
and the data the logs contain, see Remote Agent Logging Configuration,
page 11-22.
one or more backup central logging servers so that no accounting data is lost
if the first central logging server fails or is otherwise unavailable to
Cisco Secure ACS.
• Remote Log Services—The remote agents configured in the Remote Agents
table in Network Configuration to which Cisco Secure ACS does not send
accounting data for locally authenticated sessions.
• Selected Log Services—The remote agents configured in the Remote Agents
table in Network Configuration to which Cisco Secure ACS does send
accounting data for locally authenticated sessions.
b. To send the accounting information for this Cisco Secure ACS to a single
remote agent, select the Log to subsequent remote log services on failure
option.
Note Use the “Log to subsequent remote log services on failure” option
when you want to configure Cisco Secure ACS to send accounting
data to a second remote agent if the first remote fails.
Step 6 For each remote agent you want to have in the Selected Log Services list, follow
these steps:
a. In the Remote Log Services list, select the name of a remote agent to which
you want to send accounting data for locally authenticated sessions.
Note The remote agents available in the Remote Log Services list is
determined by the Remote Agents table in Network Configuration.
For more information about the Remote Agents table, see Remote
Agent Configuration, page 4-29.
b. Click --> (right arrow button) to move the selected remote agent to the
Selected Log Services list.
Step 7 To assign an order to the remote agents in the Selected Log Services list, click Up
and Down to move selected remote agents until you have created the order you
need.
• Logged Attributes—The attributes whose data is sent to the remote agent for
logging.
• Generate New File—The frequency with which the remote agent starts a new
CSV file for the log. You have the following options:
– Every day—The remote agent starts a new CSV log file at 12 A.M. every
day.
– Every week—The remote agent starts a new CSV log file at 12:00 A.M.
every Sunday.
– Every month—The remote agent starts a new CSV log file at 12:00 A.M
on the first day of every month.
– When size is greater than X KB—The remote agent starts a new CSV
log file when the current log file grows to the number of kilobytes
specified in the box.
• Directory—The directory where the remote agent writes the CSV log file.
The directory must be specified by its full path on the server that runs the
remote agent. If the server uses Microsoft Windows, the path must begin with
the drive letter, such as c:/acs-logs. If the server uses Sun Solaris, the path
must begin at the root directory, such as /usr/data/acs-logs.
• Manage Directory—Defines whether the remote agent deletes older log
files. Using the following options, you can specify how the remote agent
determines which log files to delete:
– Keep only the last X files—The remote agent retains the most recent log
files, up to the number of files specified. When the number of files
specified is exceeded, the remote agent deletes the oldest files.
– Delete files older than X days—The remote agent deletes log files that
are older than the number of days specified. When a log file grows older
than the number of days specified, the remote agent deletes it.
This procedure applies to all logs recorded by a remote agent, that is, all logs
listed in the Remote Agent Logging Configuration table on the Logging
Configuration page.
Before You Begin
For information about the options available for remote agent log configuration,
see Remote Agent Logging Options, page 11-22.
To configure a CSV log for a remote agent, follow these steps:
Note If the Log to CSV log name report check box is not selected, Cisco Secure
ACS does not send data for this log to remote agents.
Step 5 For each attribute that you want to include in the remote agent log, select the
attribute in the Attributes list and click --> (right arrow button).
The attribute moves to the Logged Attributes list.
Tip Use the vertical scroll bar to find attributes not visible in the list box.
Step 6 If you need to remove an attribute from the remote agent log, select the attribute
in the Logged Attributes list and click <-- (left arrow button).
The attribute moves to the Attributes list.
Tip Use the vertical scroll bar to find attributes not visible in the list.
Step 7 If you want to set the attributes in the Logged Attributes list back to the default
selections, at the bottom of the browser window, click Reset Columns.
Step 8 Under Generate New File, specify when the remote agent should begin a new log
file.
Step 9 If you want to manage which CSV files the remote agent keeps, follow these
steps:
a. Select the Manage Directory check box.
b. To limit the number of CSV files Cisco Secure ACS retains, select the Keep
only the last X files option and type the number of files you want
Cisco Secure ACS to retain in the X box.
c. To limit how old CSV files retained by Cisco Secure ACS can be, select the
Delete files older than X days option and type the number of days for which
Cisco Secure ACS should retain a CSV file before deleting it.
Step 10 Click Submit.
Cisco Secure ACS implements the remote agent log configuration that you
specified.
Service Logs
The service logs may be considered diagnostic logs and are used for
troubleshooting or debugging purposes only. These logs are not intended for
general use by Cisco Secure ACS administrators; instead, they are mainly sources
of information for Cisco support personnel. Service logs contain a record of all
Cisco Secure ACS service actions and activities. When service logging is
enabled, each service generates a log whenever the service is running, whether or
not you are using the service. For example, Cisco Secure ACS generates RADIUS
service logs even if you are not using RADIUS to communicate with AAA clients
or other AAA servers.
The Support feature in the System Configuration section includes service logs in
the package.cab file that it generates if you click Run Support Now. For more
information about this feature, see Support, page 8-24.
For more information about Cisco Secure ACS services, see Chapter 1,
“Overview.”
Services Logged
Cisco Secure ACS generates logs for the following services:
• CSAdmin
• CSAuth
• CSDBSync
• CSLog
• CSMon
• CSRadius
• CSTacacs
These files can be retrieved from the appliance using the Support feature in the
System Configuration section or using the support command at the serial
console.
For each service, Cisco Secure ACS writes separate log files. When a log file
reaches 10 MB in size, Cisco Secure ACS starts a new log file. Cisco Secure ACS
retains the most recent 30 log files for each service.
The most recent debug log is named as follows:
SERVICE.log
where SERVICE is the name of the applicable service.
Older debug logs are named with the year, month, and date they were created. For
example, a file created on July 13, 2003, would be named as follows:
SERVICE 2003-07-13.log
This chapter addresses the Cisco Secure ACS Appliance features found in the
Administration Control section of the HTML interface.
This chapter contains the following topics:
• Administrator Accounts, page 12-1
• Access Policy, page 12-11
• Session Policy, page 12-16
Administrator Accounts
This section provides details about Cisco Secure ACS administrators.
This section contains the following topics:
• About Administrator Accounts, page 12-2
• Administrator Privileges, page 12-3
• Adding an Administrator Account, page 12-6
• Editing an Administrator Account, page 12-8
• Unlocking a Locked Out Administrator Account, page 12-10
• Deleting an Administrator Account, page 12-11
Note Cisco Secure ACS administrator accounts are unique to Cisco Secure ACS. They
are not related to administrator accounts for your network, operating systems, or
other software.
Administrator Privileges
You can grant appropriate privileges to each Cisco Secure ACS administrator by
assigning privileges on an administrator-by-administrator basis. You control
privileges by selecting the options in the Administrator Privileges table on the
Add Administrator or Edit Administrator pages. These options are listed below:
• User and Group Setup—Contains the following privilege options for the
User Setup and Group Setup sections of the HTML interface:
– Add/Edit users in these groups—Enables the administrator to add or
edit users and to assign users to groups in the Editable groups list.
– Setup of these groups—Enables the administrator to edit the settings for
the groups in the Editable groups list.
– Available Groups—Lists the user groups for which the administrator
does not have edit privileges and to which the administrator cannot add
users.
– Editable Groups—Lists the user groups for which the administrator
does have edit privileges and to which the administrator account can add
users.
• Shared Profile Components—Contains the following privilege options for
the Shared Profile Components section of the HTML interface:
– Network Access Restriction Sets—Allows the administrator full access
to the Network Access Restriction Sets feature.
– Downloadable ACLs—Allows the administrator full access to the
Downloadable PIX ACLs feature.
– Create New Device Command Set Type—Allows the administrator
account to be used as valid credentials by another Cisco application for
adding new device command set types. New device command set types
that are added to Cisco Secure ACS using this privilege appear in the
Shared Profile Components section of the HTML interface.
– Shell Command Authorization Sets—Allows the administrator full
access to the Shell Command Authorization Sets feature.
– PIX Command Authorization Sets—Allows the administrator full
access to the PIX Command Authorization Sets feature.
Tip To clear all privileges, including user group editing privileges for all user
groups, click Revoke All.
Step 5 To grant user and user group editing privileges, follow these steps:
a. Select the desired check boxes under User & Group Setup.
b. To move a user group to the Editable groups list, select the group in the
Available groups list, and then click --> (right arrow button).
The selected group moves to the Editable groups list.
c. To remove a user group from the Editable groups list, select the group in the
Editable groups list, and then click <-- (left arrow button).
The selected group moves to the Available groups list.
d. To move all user groups to the Editable groups list, click >>.
The user groups in the Available groups list move to the Editable groups list.
e. To remove all user groups from the Editable groups list, click <<.
The user groups in the Editable groups list move to the Available groups list.
Step 6 To grant any of the remaining privilege options, in the Administrator Privileges
table, select the applicable check boxes.
Note You cannot change the name of an administrator account; however, you can delete
an administrator account and then create an account with the new name. For
information about deleting an administrator account, see Deleting an
Administrator Account, page 12-11. For information about creating an
administrator account, see Adding an Administrator Account, page 12-6.
b. In the Confirm Password box, double-click the asterisks, and then type the
new administrator password a second time.
The new password is effective immediately after you click Submit in Step 9.
Step 4 If the Reset current failed attempts count check box appears below the Confirm
Password box and you want to allow the administrator whose account you are
editing to access the Cisco Secure ACS HTML interface, select the Reset current
failed attempts count check box.
Note If the Reset current failed attempts count check box appears below the
Confirm Password box, the administrator cannot access Cisco Secure
ACS unless you complete Step 4. For more information about re-enabling
an administrator account, see Unlocking a Locked Out Administrator
Account, page 12-10.
Step 5 To select all privileges, including user group editing privileges for all user groups,
click Grant All.
All privilege options are selected. All user groups move to the Editable groups
list.
Step 6 To clear all privileges, including user group editing privileges for all user groups,
click Revoke All.
All privileges options are cleared. All user groups move to the Available groups
list.
Step 7 To grant user and user group editing privileges, follow these steps:
a. Under User & Group Setup, select the applicable check boxes.
b. To move all user groups to the Editable groups list, click >>.
The user groups in the Available groups list move to the Editable groups list.
c. To move a user group to the Editable groups list, select the group in the
Available groups list, and then click --> (right arrow button).
The selected group moves to the Editable groups list.
d. To remove all user groups from the Editable groups list, click <<.
The user groups in the Editable groups list move to the Available groups list.
e. To remove a user group from the Editable groups list, select the group in the
Editable groups list, and then click <-- (left arrow button).
The selected group moves to the Available groups list.
Step 8 To grant any remaining privilege options, select the applicable check boxes in the
Administrator Privileges table.
Step 9 To revoke any remaining privilege options, clear the applicable check boxes in the
Administrator Privileges table.
Step 10 Click Submit.
Cisco Secure ACS saves the changes to the administrator account.
Access Policy
The Access Policy feature affects access to the Cisco Secure ACS HTML
interface. You can limit access by IP address and by the TCP port range used for
administrative sessions. You can also enable secure socket layer (SSL) for access
to the HTML interface.
To enable SSL, you must have completed the steps in Installing a Cisco
Secure ACS Certificate, page 10-33, and Adding a Certificate Authority
Certificate, page 10-36.
Note The IP addresses entered to define a range must differ only in the last
octet.
Step 5 To allow remote access to the HTML interface only from IP addresses outside a
range or ranges of IP addresses, follow these steps:
a. In the IP Address Filtering table, select the Reject connections from listed
IP addresses option.
b. For each IP address range from outside which you want to allow remote
access to the HTML interface, complete one row of the IP Address Ranges
table. Type the lowest IP address (up to 16 characters) in the range in the Start
IP Address box. Type the highest IP address (up to 16 characters) in the range
in the End IP Address box.
Note The IP addresses entered to define a range must differ only in the last
octet.
Step 6 If you want to allow Cisco Secure ACS to use any valid TCP port for
administrative sessions, under HTTP Port Allocation, select the Allow any TCP
ports to be used for Administration HTTP Access option.
Step 7 If you want to allow Cisco Secure ACS to use only a specified range of TCP ports
for administrative sessions, follow these steps:
a. Under HTTP Port Allocation, select the Restrict Administration Sessions to
the following port range From Port X to Port Y option.
b. In the X box type the lowest TCP port (up to 5 characters) in the range.
c. In the Y box type the highest TCP port (up to 5 characters) in the range.
Step 8 If you want to enable SSL encryption of administrator access to the HTML
interface, under Secure Socket Layer Setup, select the Use HTTPS Transport
for Administration Access check box.
Note To enable SSL, you must have completed the steps in Installing a Cisco
Secure ACS Certificate, page 10-33, and Adding a Certificate Authority
Certificate, page 10-36.
Session Policy
The Session Policy feature controls various aspects of Cisco Secure ACS
administrative sessions.
This section contains the following topics:
• Session Policy Options, page 12-16
• Setting Up Session Policy, page 12-17
Cisco Secure Access Control Server (ACS) Appliance authenticates users against
one of several possible databases, including its internal database. You can
configure Cisco Secure ACS to authenticate users with more than one type of
database. This flexibility enables you to use user accounts data collected in
different locations without having to explicitly import the users from each
external user database into the CiscoSecure user database. It also enables you to
apply different databases to different types of users, depending on the security
requirements associated with user authorizations on your network. For example,
a common configuration is to use a Windows user database for standard network
users and a token server for network administrators.
Note For information about the Unknown User Policy and group mapping features, see
Chapter 14, “Unknown User Policy,” and Chapter 15, “User Group Mapping and
Specification.”
In addition to authentication for network access, Cisco Secure ACS can perform
authentication for TACACS+ enable privileges using external user databases. For
more information about TACACS+ enable passwords, see Setting TACACS+
Enable Password Options for a User, page 7-34.
Note You can only use external users databases to authenticate users and to determine
which group Cisco Secure ACS assigns a user to. The CiscoSecure user database,
internal to Cisco Secure ACS, provides all authorization services. With few
exceptions, Cisco Secure ACS cannot retrieve authorization data from external
user databases. Exceptions are noted where applicable in the discussions of
specific databases in this chapter. For more information about group mapping for
unknown users, see Chapter 15, “User Group Mapping and Specification.”
For Generic LDAP and Novell NDS authentication, the interface for the external
authentication is provided by the Cisco Secure ACS Appliance.
For RADIUS-based token servers, such as ActivCard, CRYPTOCard, PassGo,
SafeWord, and Vasco, the standard RADIUS interface serves as the third-party
API.
Cisco Secure
Access Control Server
67472
database
The specifics of the method used to communicate with the external user database
vary with the database type. For LDAP and Novell NDS, Cisco Secure ACS uses
TCP connections. For Windows user databases, Cisco Secure ACS uses the
authentication API provided in the Windows operating system. With the exception
of RSA token servers, Cisco Secure ACS communicates with token servers using
RADIUS. For RSA token servers, Cisco Secure ACS acts an RSA client in order
to use the RSA proprietary interface.
For more information, see the section regarding the database type you are
interested in.
user database, the remote agent forwards the response to Cisco Secure ACS,
which instructs the requesting AAA client to grant or deny the user access,
depending upon the response from the Windows user database.
Cisco Secure ACS grants authorization based on the Cisco Secure ACS group to
which the user is assigned. While the group to which a user is assigned can be
determined by information from the Windows user database, it is Cisco Secure
ACS that grants authorization privileges.
To further control access by a user from within the Windows User Manager or
Active Directory Users and Computers, you can configure Cisco Secure ACS to
also check the setting for granting dialin permission to user. If this feature is
disabled for the user, access is denied, even if the username and password are
typed correctly.
Trust Relationships
Cisco Secure ACS can take advantage of trust relationships that have been
established between Windows domains. If the domain containing the computer
running the Windows remote agent trusts another domain, Cisco Secure ACS can
authenticate users whose accounts reside in the other domain. Cisco Secure ACS
can also reference the “Grant dialin permission to user” setting across trusted
domains.
If your domains are Windows 2000 domains, Cisco Secure ACS can take
advantage of indirect trusts for Windows authentication. Consider the example of
Windows 2000 domains A, B, and C, where the remote agent runs on a Windows
2000 server in domain A. Domain A trusts domain B, but no trust relationship is
established between domain A and domain C. If domain B trusts domain C, the
remote agent in domain A can authenticate users whose accounts reside in domain
C, making use of the indirect trust of domain C.
For more information on trust relationships, refer to your Microsoft Windows
documentation.
Note You can also prefix your username with the name of the domain you
want to log in to. For more information about the implications of
prefixing or not prefixing the domain name before the username, see
Windows Authentication, page 13-10.
Windows Authentication
While different versions of Windows provide different methods of specifying a
domain name, the effect of providing or not providing the domain name while
logging in is the same. The most reliable method of authenticating users against
a specific domain is to require users to submit the domains they should be
authenticated against along with their usernames.
With the dial-up networking client provided with Windows NT, Windows 2000,
and Windows XP Professional, submitting a domain name is accomplished by
typing the domain name in the domain field (or selecting it from the drop-down
list). With the dial-up networking client provided with Windows 95, Windows 98,
Windows ME, and Windows XP Home, this is accomplished by submitting the
username in the fully qualified format. Users submitting a fully qualified
username must enter the domain name before their username in the following
format:
DOMAIN_NAME\username
For example, user Mary Smith (msmith) in Domain10 would enter the following:
Domain10\msmith
Another reason to provide the username in the format shown above is if a user is
included in more than one domain. In this case, the privileges assigned upon
authentication will be those associated with the account in the first domain with a
matching username and password. This also illustrates the importance of
removing usernames from a domain when the privileges associated with the user
are no longer required.
Tip Entering the domain name can speed up authentication, because authentication is
directed to a specific domain rather than depending upon Windows to search
through the local domain and all trusted domains until it finds the username.
Note Except in EAP-TLS authentication against Active Directory, Cisco Secure ACS
does not support the user@domain (UPN) format of qualified usernames when
authenticating users with Windows user databases of any type, including local and
domain SAM databases and Active Directory databases. With Active Directory,
EAP-TLS authentication with user certificates using UPN format is supported.
If you do not specify a domain name when typing the username, Cisco Secure
ACS submits the username to the Windows by way of the Windows remote agent.
If Windows does not find the username in its local domain database, it then checks
all trusted domains. If the Windows remote agent runs on a member server and the
username is not found in trusted domains, Windows also checks its local accounts
database. Windows attempts to authenticate a user with the first occurrence of the
username that it finds.
Note If the credentials submitted by the user do not match the credentials associated
with the first matching username that Windows finds, authentication fails. Thus,
if different users in different domains share the same exact username, logging in
with a non-domain-qualified username can result in inadvertent authentication
failure.
Use of the Domain List is not required to support Windows authentication, but it
can alleviate authentication failures caused by non-domain-qualified usernames.
If you have configured the Domain List in the Windows User Database
Configuration page of the External User Databases section, Cisco Secure ACS
submits the username and password to each domain in the list in a fully qualified
format until it successfully authenticates the user. If Cisco Secure ACS has tried
each domain listed in the Domain List or if no trusted domains have been
configured in the Domain List, Cisco Secure ACS stops attempting to
authenticate the user and does not grant that user access.
Note If your Domain List contains domains and your Windows SAM or Active
Directory user databases are configured to lock out users after a number of failed
attempts, users can be inadvertently locked out because Cisco Secure ACS tries
each domain in the Domain List explicitly, resulting in failed attempts for
identical usernames that reside in different domains.
Machine Authentication
Cisco Secure ACS supports the authentication of computers running Microsoft
Windows operating systems that support EAP computer authentication, such as
Windows XP with Service Pack 1. Machine authentication, also called computer
authentication, allows networks services only for computers known to Active
Directory. This is especially useful for wireless networks, where unauthorized
users outside the physical premises of your workplace can access your wireless
access points.
Note Microsoft PEAP clients also initiate machine authentication whenever a user logs
off. This prepares the network connection for the next user login. Microsoft PEAP
clients may also initiate machine authentication when a user has selected to
shutdown or restart the computer rather than just logging off.
where computer is the name of the computer and domain is the domain the
computer belongs to. The domain segment may include subdomains, too, if they
are used, so that the format may be:
host/computer.subdomain.domain
that was added to the local machine storage later. As with PEAP-based machine
authentication, the computer name must appear in the CiscoSecure user database
in the format contained in the computer client certificate and the user profile
corresponding to the computer name must be configured to authenticate using the
Windows external user database. If you enable unknown user processing,
Cisco Secure ACS adds the computer names to the CiscoSecure user database
automatically once they authenticate successfully. It also automatically
configures the user profiles created to use the external user database that the user
was found in. For machine authentication, this will always be the Windows
external user database.
e. Also on the Smart Card or other Certificate Properties dialog box, you
can enforce that Cisco Secure ACS has a valid server certificate by
selecting the Validate server certificate check box. If you do select this
check box, you must also select the applicable Trusted Root Certification
Authorities.
If you have a Microsoft certification authority server configured on the domain
controller, you can configure a policy in Active Directory to produce a client
certificate automatically when a computer is added to the domain. For more
information, see Microsoft Knowledge Base Article 313407, HOW TO: Create
Automatic Certificate Requests with Group Policy in Windows.
Note The MAR feature is available beginning in Cisco Secure ACS version 3.2.3.
Earlier versions of Cisco Secure ACS do not include this feature.
When you enable the MAR feature, Cisco Secure ACS does the following:
• For every successful machine authentication, Cisco Secure ACS caches the
value received in IETF RADIUS Calling-Station-Id attribute (31) as evidence
of the successful machine authentication. Cisco Secure ACS stores each
Calling-Station-Id attribute value for the number of hours specified on the
Windows User Database Configuration page before deleting it from the
cache.
• When a user authenticates with an EAP-TLS or Microsoft PEAP end-user
client, Cisco Secure ACS searches the cache of Calling-Station-Id values
from successful machine authentications for the Calling-Station-Id value
received in the user authentication request. Whether Cisco Secure ACS finds
the user-authentication Calling-Station-Id value in the cache affects how
Cisco Secure ACS assigns the user requesting authentication to a user group.
– Calling-Station-Id value found in the cache—Cisco Secure ACS
assigns the user to a user group by normal methods, which include
manual specification of a group in the user profile, group mapping, or
The MAR feature supports full EAP-TLS and Microsoft PEAP authentication, as
well as resumed sessions for EAP-TLS and Microsoft PEAP and fast
reconnections for Microsoft PEAP.
The MAR feature has the following limitations and requirements:
• Machine authentication must be enabled.
• Users must authenticate with EAP-TLS or a Microsoft PEAP client. MAR
does not apply to users authenticated by other protocols, such as EAP-FAST,
LEAP, or MS-CHAP.
• The AAA client must send a value in the IETF RADIUS Calling-Station-Id
attribute (31).
• Cisco Secure ACS does not replicate the cache of Calling-Station-Id attribute
values from successful machine authentications.
Note End-user client computers and the applicable Active Directory must be configured
to support machine authentication. This procedure is specific to configuration of
Cisco Secure ACS only. For information about configuring Microsoft Windows
operating systems to support machine authentication, see Microsoft Windows and
Machine Authentication, page 13-16.
Step 3 Enable the applicable protocols on the Global Authentication Setup page:
• To support machine authentication with PEAP, enable the
PEAP(EAP-MSCHAPv2) protocol.
• To support machine authentication with EAP-TLS, enable the EAP-TLS
protocol.
Cisco Secure ACS allows you to complete this step only after you have
successfully completed Step 1. For detailed steps, see Configuring Authentication
Options, page 10-32.
Step 4 Configure a Windows external user database and enable the applicable types of
machine authentication on the Windows User Database Configuration page:
• To support machine authentication with PEAP, select the Permit PEAP
machine authentication check box.
• To support machine authentication with EAP-TLS, select the Permit
EAP-TLS machine authentication check box.
• To require machine authentication in addition to user authentication, select
the Enable machine access restrictions check box.
Note If you already have a Windows external user database configured, modify
its configuration to enable the applicable machine authentication types.
Note Windows authentication requires a Cisco Secure ACS Remote Agent for
Windows.
For more information about password aging support in Cisco Secure ACS, see
Enabling Password Aging for Users in Windows Databases, page 6-25.
Step 1 Make sure the username exists in the Windows user database.
Step 2 In Windows, for each user account, clear the following User Properties check
boxes:
• User must change password at next logon
• Account disabled
Step 3 If you want to control dial-in access from within Windows NT, click Dial-in and
select Grant dialin permission to user. In Windows 2000, access the User
Properties dialog box, select the Dial-In tab, and in the Remote Access area, click
Allow access. You must also configure the option to reference this feature under
Database Group Mappings in the External User Databases section of Cisco Secure
ACS.
Note If you do not want to use a secondary remote agent, from the Secondary
list, select None.
Note This feature applies to all users authenticated by Cisco Secure ACS
with a Windows external user database; despite the name of the
feature, it is not limited to users who access the network with a dialup
client but is applied regardless of client type. For example, if you have
configured a PIX Firewall to authenticate Telnet sessions using
Cisco Secure ACS as a RADIUS server, a user authenticated by a
Windows external user database would be denied Telnet access to the
PIX Firewall if the Dialin Permission feature is enabled and the
Windows user account does not have dialin permission.
• Configure Domain List—The Domain List controls what Cisco Secure ACS
does when user authentication is requested for a username that is not
domain-qualified. If no domains are in the Domain List and the initial user
authentication request is rejected by Windows, Cisco Secure ACS stops
attempting to authenticate the user. If domains are in the Domain List,
Cisco Secure ACS qualifies the username with a domain from the list and
submits the domain-qualified username to Windows, once for each domain in
the Domain List, until each domain has rejected the user or until one of the
domains authenticates the user.
Note Configuring the Domain List list is optional. For more information
about the Domain List, see Windows Authentication, page 13-10.
Caution If your Domain List contains domains and your Windows SAM or Active
Directory user databases are configured to lock out users after a number of failed
attempts, users can be inadvertently locked out because Cisco Secure ACS tries
each domain in the Domain List explicitly, resulting in failed attempts for
identical usernames that reside in different domains.
Note Be sure you have enabled the types of machine authentication that
your Windows computers are configured to use—either PEAP
machine authentication or EAP-TLS authentication, or both. If the
MAR feature is enabled but Cisco Secure ACS does not perform
machine authentication for a computer, EAP-TLS and Microsoft
PEAP users accessing the network with that computer will be
assigned to the group specified in the “Group map for successful user
authentication without machine authentication” list.
Note If you do not change the value of the Aging time (hours) box to
something other than zero, all EAP-TLS and Microsoft PEAP users
whose computers perform machine authentication are assigned to the
group specified in the “Group map for successful user authentication
without machine authentication” list.
Tip To enable machine access restrictions, you must specify a number greater
than zero in the Aging time (hours) box.
Tip To clear the cache of Calling-Station-Id values, type 0 in the Aging time
(hours) box and click Submit.
Note User profile settings always override group profile settings. If a user
profile grants an authorization that is denied by the group specified in
the “Group map for successful user authentication without machine
authentication” list, Cisco Secure ACS grants the authorization.
Note All the settings on the Windows User Database Configuration page are
optional and need not be enabled unless you want to permit and configure
the specific features they support.
Generic LDAP
Cisco Secure ACS supports ASCII, PAP, EAP-TLS, PEAP(EAP-GTC), and
EAP-FAST (phase two only) authentication via generic Lightweight Directory
Access Protocol (LDAP) databases, such as Netscape Directory Services. Other
authentication protocols are not supported with LDAP external user databases.
Note Authentication protocols not supported with LDAP databases may be supported
by another type of external user database. For more information about
authentication protocols and the external database types that support them, see
Authentication Protocol-Database Compatibility, page 1-9.
Cisco Secure ACS supports group mapping for unknown users by requesting
group membership information from LDAP user databases. For more information
about group mapping for users authenticated with an LDAP user database, see
Group Mapping by Group Set Membership, page 15-4.
Configuring Cisco Secure ACS to authenticate against an LDAP database has no
effect on the configuration of the LDAP database. To manage your LDAP
database, see your LDAP database documentation.
primary server IP address and port configuration, along with the secondary server
IP address and port configuration, forms an LDAP instance that corresponds to
one Cisco Secure ACS LDAP configuration instance.
Cisco Secure ACS does not require that each LDAP instance corresponds to a
unique LDAP database. You can have more than one LDAP configuration set to
access the same database. This is useful when your LDAP database contains more
than one subtree for users or groups. Because each LDAP configuration supports
only one subtree directory for users and one subtree directory for groups, you
must configure separate LDAP instances for each user directory subtree and group
directory subtree combination for which Cisco Secure ACS should submit
authentication requests.
For each LDAP instance, you can add or leave it out of the Unknown User Policy.
For more information, see Unknown User Processing, page 14-2.
For each LDAP instance, you can establish unique group mapping. For more
information, see Group Mapping by Group Set Membership, page 15-4.
Multiple LDAP instances is also important when you use domain filtering. For
more information, see Domain Filtering, page 13-32.
Domain Filtering
Using domain filtering, you can control which LDAP instance is used to
authenticate a user based on domain-qualified usernames. Domain filtering is
based on parsing the characters either at the beginning or end of a username
submitted for authentication. Domain filtering provides you with greater control
over the LDAP instance that Cisco Secure ACS submits any given user
authentication request to. You also have control of whether usernames are
submitted to an LDAP server with their domain qualifiers intact.
Cisco Secure ACS supports both prefixed and suffixed domain qualifiers. A
single LDAP configuration can attempt to strip both prefixed and suffixed
domain qualifiers; however, you can only specify one delimiting character
each for prefixed and suffixed domain qualifiers. To support more than one
type of domain-qualifier delimiting character, you can create more than one
LDAP configuration in Cisco Secure ACS.
Allowing usernames of any domain but stripping domain qualifiers is useful
when the LDAP server stores usernames in a non-domain qualified format but
the AAA client or end-user client submits the username to Cisco Secure ACS
in a domain-qualified format.
Note With this option, Cisco Secure ACS submits usernames that are
non-domain qualified, too. Usernames are not required to be domain
qualified to be submitted to an LDAP server.
LDAP Failover
Cisco Secure ACS supports failover between a primary LDAP server and
secondary LDAP server. In the context of LDAP authentication with Cisco Secure
ACS, failover applies when an authentication request fails because Cisco Secure
ACS could not connect to an LDAP server, such as when the server is down or is
otherwise unreachable by Cisco Secure ACS. To use this feature, you must define
the primary and secondary LDAP servers on the LDAP Database Configuration
page. Also, you must select the On Timeout Use Secondary check box. For more
information about configuring an LDAP external user database, see Configuring
a Generic LDAP External User Database, page 13-42.
If the On Timeout Use Secondary check box is selected, and if the first LDAP
server that Cisco Secure ACS attempts to contact cannot be reached, Cisco Secure
ACS always attempts to contact the other LDAP server. The first server
Cisco Secure ACS attempts to contact may not always be the primary LDAP
server. Instead, the first LDAP server that Cisco Secure ACS attempts to contact
depends on the previous LDAP authentication attempt and on the value specified
in the Failback Retry Delay box.
If Cisco Secure ACS cannot connect to either LDAP server, Cisco Secure ACS
stops attempting LDAP authentication for the user. If the user is an unknown user,
Cisco Secure ACS tries the next external user database listed in the Unknown
User Policy list. For more information about the Unknown User Policy list, see
Unknown User Processing, page 14-2.
or
dc=corporation,dc=com
or
dc=corporation,dc=com
– Admin DN—The fully qualified (DN) of the administrator; that is, the
LDAP account which, if bound to, permits searches for all required users
under the User Directory Subtree. It must contain the following
information about your LDAP server:
uid=user id,[ou=organizational unit,][ou=next organizational
unit]o=organization
where user id is the username, organizational unit is the last level of the
tree, and next organizational unit is the next level up the tree.
For example:
uid=joesmith,ou=members,ou=administrators,o=cisco
You can use anonymous credentials for the administrator username if the
LDAP server is configured to make the group name attribute visible in
searches by anonymous credentials. Otherwise, you must specify an
administrator username that permits the group name attribute to be
visible to searches.
Note If only one LDAP configuration exists, the name of that configuration
appears instead of the list. Proceed to the next step.
Caution If you click Delete, the configuration of the selected LDAP database is deleted.
Step 7 If you do not want Cisco Secure ACS to filter LDAP authentication requests by
username, under Domain Filtering, select Process all usernames.
Step 8 If you want to limit authentications processed by this LDAP configuration to
usernames with a specific domain qualification, follow these steps:
a. Under Domain Filtering, select Only process usernames that are domain
qualified.
b. From the “Qualified by” list, select the applicable type of domain
qualification, either Suffix or Prefix. Only one type of domain qualification
is supported per LDAP configuration.
For example, if you want this LDAP configuration to authenticate usernames
that begin with a specific domain name, select Prefix. If you want this LDAP
configuration to authenticate usernames that end with a specific domain
name, select Suffix.
c. In the Domain box, type the name of the domain that you want this LDAP
configuration to authenticate usernames for. Include the delimiting character
that separates the user ID from the domain name. Be sure that the delimiting
character appears in the applicable position: at the end of the domain name if
Prefix is selected on the “Qualified by” list; at the beginning of the domain
name if Suffix is selected on the “Qualified by” list.
Only one domain name is supported per LDAP configuration. You can type
up to 512 characters.
d. If you want Cisco Secure ACS to remove the domain qualifier before
submitting it to the LDAP database, select the Strip domain before
submitting username to LDAP server check box.
e. If you want Cisco Secure ACS to pass the username to the LDAP database
without removing the domain qualifier, clear the Strip domain before
submitting username to LDAP server check box.
Step 9 If you want to enable Cisco Secure ACS to strip domain qualifiers from
usernames prior to submitting them to an LDAP server, follow these steps:
Note The default values in the UserObjectType and following fields reflect the
default configuration of the Netscape Directory Server. Confirm all values
for these fields with your LDAP server configuration and documentation.
Step 13 In the User Object Class box, type the value of the LDAP “objectType” attribute
that identifies the record as a user.
Note User records often have several values for the objectType attribute, some
of which are unique to the user, some of which are shared with other
object types. Make sure that the value you provide in the User Object
Class box is a value that is not shared.
Step 14 In the GroupObjectType box, type the name of the attribute in the group record
that contains the group name.
Step 15 In the GroupObjectClass box, type a value of the LDAP “objectType” attribute in
the group record that identifies the record as a group.
Step 16 In the GroupAttributeName box, type the name of the attribute of the group record
that contains the list of user records who are a member of that group.
Step 17 In the Server Timeout box, type the number of seconds Cisco Secure ACS waits
for a response from an LDAP server before determining that the connection with
that server has failed.
Step 18 To enable failover of LDAP authentication attempts, select the On Timeout Use
Secondary check box. For more information about the LDAP failover feature, see
LDAP Failover, page 13-34.
Step 19 In the Failback Retry Delay box, type the number of minutes after the primary
LDAP server fails to authenticate a user that Cisco Secure ACS resumes sending
authentication requests to the primary LDAP server first.
Note To specify that Cisco Secure ACS should always use the primary LDAP
server first, type 0 (zero) in the Failback Retry Delay box.
Step 20 For the Primary LDAP Server and Secondary LDAP Server tables, follow these
steps:
Note If you did not select the On Timeout Use Secondary check box, you do
not need to complete the options in the Secondary LDAP Server table.
a. In the Hostname box, type the name or IP address of the machine that is
running the LDAP software. If you are using DNS on your network, you can
type the hostname instead of the IP address.
b. In the Port box, type the TCP/IP port number on which the LDAP server is
listening. The default is 389, as stated in the LDAP specification. If you do
not know the port number, you can find this information by viewing those
properties on the LDAP server. If you want to use secure authentication, port
number 636 is usually used.
c. To specify that Cisco Secure ACS should use LDAP version 3 to
communicate with your LDAP database, select the LDAP Version check box.
If the LDAP Version check box is not selected, Cisco Secure ACS uses LDAP
version 2.
d. If you want Cisco Secure ACS to use SSL to connect to the LDAP server,
select the Use secure authentication check box and complete the next three
steps.
Note If you do not use SSL, the username and password credentials are
passed over the network to the LDAP directory in clear text.
f. In the Admin DN box, type the following information about an LDAP account
that permits searches for all required users under the User Directory Subtree:
uid=user id ,[ou=organizational unit,]
[ou=next organizational unit]o=organization
Tip If you are using Netscape DS, you can copy this information from the
Netscape Console.
Cisco Secure ACS saves the generic LDAP configuration you created. You can
now add it to your Unknown User Policy or assign specific user accounts to use
this database for authentication. For more information about the Unknown User
Policy, see Unknown User Processing, page 14-2. For more information about
configuring user accounts to authenticate using this database, see Chapter 7,
“User Management.”
Step 1 To access the Download Certificate Database page, follow these steps:
a. Open the LDAP Database Configuration page that contains the information
for the LDAP server whose certificate database file you want to download.
b. For the LDAP server whose certificate database file you want to download,
click Download Certificate database.
Note Cisco Secure ACS lists a primary and secondary LDAP server for
each LDAP database configuration. To support secure authentication
to both servers, you must download a certificate database file twice,
once for the primary LDAP server and once for the secondary LDAP
server.
Step 2 In the FTP Server box, type the IP address or hostname of the FTP server. The
FTP Server box accepts a maximum of 512 characters.
Note Providing the hostname requires that DNS is operating correctly on your
network.
Step 3 In the Login box, type a valid username to enable Cisco Secure ACS to access the
FTP server. The Login box accepts a maximum of 512 characters.
Step 4 In the Password box, type the password for the username provided in the Login
box. The Password box accepts a maximum of 512 characters.
Step 5 In the Directory box, type the path to the cert7.db file. The path is relative to the
starting directory at login to the FTP server.
For example, if the cert7.db file is located in c:\ACS-files\LDAPcertdb and the
user provided in the Login box starts its FTP sessions in c:\, you would type
ACS-files\LDAPcertdb.
Note Cisco Secure ACS Appliance only supports NDS servers that are configured to
use standard LDAP.
Note Authentication protocols not supported with Novell NDS external user databases
may be supported by another type of external user database. For more information
about authentication protocols and the external database types that support them,
see Authentication Protocol-Database Compatibility, page 1-9.
For users to authenticate against a Novell NDS database, Cisco Secure ACS must
be correctly configured to recognize the Novell NDS structure. Cisco Secure ACS
supports up to twenty NDS servers. For a user to authenticate against a Novell
NDS context, the applicable user object must exist in one of the contexts provided
and the user password must be able to log the name into the tree. If you enable
subtree searching, authentication can succeed if the user object is in a subtree of
one of the contexts provided.
Cisco Secure ACS supports group mapping for unknown users by requesting
group membership information from Novell NDS user databases. For more
information about group mapping for users authenticated with a Novell NDS user
database, see Group Mapping by Group Set Membership, page 15-4.
Note Aside from user group membership information, Cisco Secure ACS retrieves no
user settings from Novell NDS databases; however, authentication responses from
a Novell NDS database may reflect user settings applied to the authentication
response by the Novell NDS database. For example, Cisco Secure ACS does not
fetch and process network access restrictions but the Novell NDS database may
fail an authentication request based on network access restrictions stored in the
Novell NDS database.
Configuring Cisco Secure ACS to authenticate against an NDS database does not
affect the configuration of the NDS database. To manage your NDS database,
refer to your NDS database documentation.
User Contexts
You must supply one or more contexts when you configure Cisco Secure ACS to
authenticate with an NDS database; however, users can supply an additional
portion of the full context that defines their fully qualified usernames. In other
words, if none of the contexts in the list of contexts contains a username submitted
for authentication, the username must specify exactly how they are subordinate to
the contexts in the list of contexts. The user specifies the manner in which a
username is subordinate to a context by providing the additional context
information needed to uniquely identify the user in the NDS database.
Consider the following example tree:
[Root] whose treename=ABC
OU=ABC-Company
OU=sales
CN=Agamemnon
OU=marketing
CN=Odysseus
OU=marketing-research
CN=Penelope
OU=marketing-product
CN=Telemachus
Note The name specified in the NDS Host box is an arbitrary name and
does not affect connectivity to the actual computer running Novell
NDS.
• Host IP—The hostname or IP address of the Novell NDS host against which
Cisco Secure ACS should authenticate users. If you specify a hostname, be
sure DNS is operating correctly on your network.
• Administrator Username—The fully qualified, typed username for the
administrator of the Novell server. For example:
uid=admin.ou=Chicago.o=Corporation
You can use anonymous credentials for the administrator username if the
Novell NDS server is configured to make the group name attribute visible in
searches by anonymous credentials. Otherwise, you must specify an
administrator username that permits the group name attribute to be visible to
searches.
• Context List—The full context list with each context specified in canonical,
typed form; that is, include the o= and ou= and separate each part of the
context using a period (.). You can enter more than one context list. If you do,
separate them with a comma. For example, if your Organization is
Corporation, your Organization Name is Chicago, and you want to enter two
Context names, Marketing and Engineering, you would type:
ou=Engineering.ou=Chicago.o=Corporation,ou=Marketing.ou=Chicago.o=Corporation
Note Users can provide a portion of their context when they login. For
more information, see User Contexts, page 13-50.
Tip You can allow users to enter their own context as part of the login process. For
more information, see User Contexts, page 13-50.
Step 1 See your Novell NetWare administrator to get the names and other information on
the Tree, Container, and Context.
Step 2 In the navigation bar, click External User Databases.
Step 3 Click Database Configuration.
Cisco Secure ACS lists all possible external user database types.
Step 4 Click Novell NDS.
If no Novell NDS database has yet been configured, the Database Configuration
Creation page appears. Otherwise, the External User Database Configuration
page appears.
Step 5 If you are creating a configuration, follow these steps:
a. Click Create New Configuration.
b. Type a name for the new configuration for Novell NDS Authentication in the
box provided.
c. Click Submit.
Cisco Secure ACS lists the new configuration in the External User Database
Configuration table.
Step 6 Click Configure.
Caution If you click Delete, the Cisco Secure ACS configuration for your Novell NDS
database is deleted.
The NDS Authentication Support page appears. The NDS Authentication Support
page enables you to add a configuration for a Novell NDS host, change existing
host configurations, and delete existing host configurations.
For more information about the content of the NDS Authentication Support page,
see Novell NDS External User Database Options, page 13-51.
Step 7 If you want to add a new host configuration, complete the fields in the blank form
at the bottom of the NDS Authentication Support page.
Note You must select the Add New NDS Host check box to confirm that you
want to create a host configuration.
Step 8 If you want to change an existing host configuration, edit the values you need to
change.
Note The name of a host is not changeable. If you need to change a hostname,
click Delete NDS Host? on the misnamed host section and click Submit.
Then, add a new host with the same configuration data as the deleted,
misnamed host, making sure the hostname is correct before clicking
Submit.
Step 9 If you want to delete an existing host configuration, select the Delete Tree check
box.
Step 10 Click Submit.
Cisco Secure ACS saves the NDS configuration you created. You can add it to
your Unknown User Policy or assign specific user accounts to use this database
for authentication. For more information about the Unknown User Policy, see
Unknown User Processing, page 14-2. For more information about configuring
user accounts to authenticate using this database, see Chapter 7, “User
Management.”
Note Authentication protocols not supported with LEAP Proxy RADIUS Server
databases may be supported by another type of external user database. For more
information about authentication protocols and the external database types that
support them, see Authentication Protocol-Database Compatibility, page 1-9.
Cisco Secure ACS uses MS-CHAP version 1 for LEAP Proxy RADIUS Server
authentication. To manage your proxy RADIUS database, refer to your RADIUS
database documentation.
Note The third-party RADIUS server must return Microsoft Point-to-Point Encryption
(MPPE) keys in the Microsoft RADIUS vendor-specific attribute (VSA)
MSCHAP-MPPE-Keys (VSA 12). If the third-party RADIUS server does not
return the MPPE keys, the authentication fails and is logged in the Failed
Attempts log.
Note If only one LEAP Proxy RADIUS Server configuration exists, the name
of that configuration appears instead of the list. Proceed to the next step.
Note If both the primary and the secondary servers fail, Cisco Secure
ACS alternates between both servers until one responds.
Note Authentication protocols not supported with token server databases may be
supported by another type of external user database. For more information about
authentication protocols and the external database types that support them, see
Authentication Protocol-Database Compatibility, page 1-9.
Requests from the AAA client are first sent to Cisco Secure ACS. Cisco Secure
ACS then acts as a RADIUS client to the token server. Rather than using the
proprietary API of the vendor, Cisco Secure ACS sends standard RADIUS
authentication requests to the RADIUS authentication port on the token server.
The token servers that Cisco Secure ACS Appliance supports by means of their
RADIUS interface are as follows:
• RSA SecureID
• ActivCard
• CRYPTOCard
• Vasco
• SafeWord
• PassGo
• Any IETF RFC 2865-compliant token server
Cisco Secure ACS provides a means for specifying a user group assignment in the
RADIUS response from the RADIUS-enabled token server. Group specification
always takes precedence over group mapping. For more information, see
RADIUS-Based Group Specification, page 15-13.
Cisco Secure ACS also supports mapping users authenticated by a
RADIUS-enabled token server to a single group. Group mapping only occurs if
group specification does not occur. For more information, see Group Mapping by
External User Database, page 15-2.
networking. If the terminal adapter supports the ability to turn on and off the
second B channel, users might have to enter many OTPs each time the second
B channel comes into service.
Cisco Secure ACS caches the token to help make the OTPs easier for users. This
means that if a token card is being used to authenticate a user on the first
B channel, a specified period can be set during which the second B channel can
come into service without requiring the user to enter another OTP. To lessen the
risk of unauthorized access to the second B channel, you can limit the time the
second B channel is up. Furthermore, you can configure the second B channel to
use the CHAP password specified during the first login to further lessen the
chance of a security problem. When the first B channel is dropped, the cached
token is erased.
Note If you are using a token server from a vendor other than those listed in the
HTML interface, select RADIUS Token Server.
Note If only one token server configuration exists, the name of that
configuration appears instead of the list. Continue with Step 6.
Note For Cisco Secure ACS to send RADIUS OTP messages to a token
server, you must ensure that gateway devices between the token
server and Cisco Secure ACS allow communication over the
UDP port specified in the Authentication Port box.
Note If both the primary and the secondary servers fail, Cisco Secure
ACS alternates between both servers until one responds.
Step 8 If you want to support token users performing a shell login to a TACACS+ AAA
Client, you must configure the options in the TACACS+ Shell Configuration
table. Do one of the following:
a. If you want Cisco Secure ACS to present a custom prompt for tokens, select
Static (sync and async tokens), and then type the prompt that Cisco Secure
ACS will present in the Prompt box.
For example, if you type “Enter your PassGo token” in the Prompt box, users
receive an “Enter your PassGo token” prompt rather than a password prompt.
Note If some tokens submitted to this server are synchronous tokens, you
must use the Static (sync and async tokens) option.
b. If you want Cisco Secure ACS to send the token server a password to trigger
a challenge, select From Token Server (async tokens only), and then, in the
Password box, type the password that Cisco Secure ACS will forward to the
token server.
For example, if the token server requires the string “challengeme” in order to
evoke a challenge, you should type “challengeme” in the Password box. Users
receive a username prompt and a challenge prompt.
Tip Most token servers vendor accept a blank password as the trigger to send
a challenge prompt.
Note You should only use the From Token Server (async tokens only)
option if all tokens submitted to this token server are asynchronous
tokens.
Policy, see Unknown User Processing, page 14-2. For more information about
configuring user accounts to authenticate using this database, see Chapter 7,
“User Management.”
After you have configured Cisco Secure Access Control Server (ACS) Appliance
to communicate with an external user database, you can decide how to implement
other Cisco Secure ACS features related to external user databases. These features
are the Unknown User Policy and user group mapping. This chapter addresses the
Unknown User Policy feature, found in the External User Databases section of
Cisco Secure ACS.
For information about user group mapping, see Chapter 15, “User Group
Mapping and Specification.”
For information about the databases supported by Cisco Secure ACS and how to
configure Cisco Secure ACS to communicate with an external user database, see
Chapter 13, “User Databases.”
This chapter contains the following topics:
• Unknown User Processing, page 14-2
• Known, Unknown, and Discovered Users, page 14-2
• General Authentication Request Handling and Rejection Mode, page 14-4
• Authentication Request Handling and Rejection Mode with the Windows
User Database, page 14-5
• Performance of Unknown User Authentication, page 14-8
• Network Access Authorization, page 14-9
• Unknown User Policy, page 14-9
Such users never have previously authenticated with Cisco Secure ACS. If
the Unknown User Policy is configured in Cisco Secure ACS, Cisco Secure
ACS attempts to authenticate these users with external user databases.
• Discovered Users—Users whose accounts were created in the Cisco Secure
ACS database when Cisco Secure ACS successfully authenticated them using
the Unknown User Policy. When Cisco Secure ACS creates a discovered
user, the user account contains only the username, a Password Authentication
list setting that reflects the external user database that authenticated the user,
and a “Group to which the user is assigned” list setting of Mapped By
External Authenticator, which enables group mapping. Using the
Cisco Secure ACS HTML interface, you can further configure the user
account as needed. For example, after a discovered user is created in
Cisco Secure ACS, you can assign user-specific network access restrictions
to the discovered user.
Note Cisco Secure ACS does not import passwords for a discovered user;
rather, Cisco Secure ACS creates the user account with the Password
Authentication list set to the external user database that originally
authenticated the user.
All discovered users were once unknown users. The authentication process
for discovered users is identical to the authentication process for known
users.
Note The scenario given above is handled differently if the user accounts with identical
usernames exist in separate Windows domains. For more information, see
Authentication Request Handling and Rejection Mode with the Windows User
Database, page 14-5.
with various Windows versions differ in the method by which users can specify
their domains. For more information, see Windows Dial-up Networking Clients,
page 13-9.
If the domain controller rejects the authentication request, Cisco Secure ACS logs
the request as a failed attempt.
For Windows 95, Windows 98, Windows ME, and Windows XP Home, the
dial-up networking client provided with Windows only allows users to specify
their domains by submitting the usernames in a domain-qualified format, that is,
DOMAIN \username. Using a domain-qualified username allows Cisco Secure
ACS to differentiate a user from multiple instances of the same username in
different domains. For unknown users who provide domain-qualified usernames
and who are authenticated by a Windows user database, Cisco Secure ACS
creates their user accounts in the CiscoSecure user database in the form
DOMAIN \username. The combination of username and domain makes this user
unique in the Cisco Secure ACS database.
Note Cisco Secure ACS does not support the user@domain form of qualified
usernames.
It is possible for unknown user processing to create more than one user account
for the same network user. For example, if a user provides a domain-qualified
username and successfully authenticates, Cisco Secure ACS creates an account in
the format DOMAIN \username. If the same user successfully authenticates
without prefixing the domain name to the username, Cisco Secure ACS creates an
account in the format username. If you rely on groups rather than individual user
settings, both accounts should receive the same privileges. Regardless of whether
the user prefixes the domain name, group mapping will assign the user to the same
Cisco Secure ACS user group, because both Cisco Secure ACS user accounts
correspond to a single Windows user account.
nor the remote agent cannot control. Though the order of resources used can
differ, when searching for a non-domain qualified username, Windows usually
follows the order in the list below
• The local domain controller.
• The domain controllers in any trusted domains.
• If the remote agent runs on a member server, the local accounts database.
Windows attempts to authenticate the user with the first account it finds whose
username matches the one passed to Windows by the remote agent. Whether
authentication fails or succeeds, Windows does not search for other accounts with
the same username; therefore, Windows can fail to authenticate a user who
supplies valid credentials because Windows may check the supplied credentials
against the wrong account that coincidentally has an identical username.
You can circumvent this difficulty by using the Domain List in the Cisco Secure
ACS configuration for the Windows user database. If you have configured the
Domain List with a list of trusted domains, Cisco Secure ACS submits the
username and password to each domain in the list, using a domain-qualified
format, until Cisco Secure ACS successfully authenticates the user or until
Cisco Secure ACS has tried each domain listed in the Domain List.
Note If your network has multiple occurrences of a username across domains (for
example, every domain has a user called Administrator) or if users dialing in do
not provide their domains as part of their authentication credentials, be sure to
configure the Domain List for the Windows user database in the External User
Databases section. If not, only the user whose account Windows happens to check
first authenticates successfully. The Domain List is the only way that
Cisco Secure ACS controls the order in which Windows checks domains. The
most reliable method of supporting multiple instances of a username across
domains is to require users to supply their domain memberships as part of the
authentication request.
Added Latency
Adding external databases against which to process unknown users can
significantly increase the time needed for each individual authentication. At best,
the time needed for each authentication is the time taken by the external database
to authenticate, plus some latency for Cisco Secure ACS processing. In some
circumstances (for example, when using a Windows user database), the extra
latency introduced by an external database can be as much as tens of seconds. If
you have configured multiple databases, this number is multiplied by the time
taken for each one to complete.
You can account for added latency by setting the order of databases. If you are
using an authentication protocol that is particularly time sensitive, such as PEAP,
we recommend configuring unknown user processing to attempt authentication
first with the database most likely to contain unknown users using the
time-sensitive protocol. For more information, see Database Search Order,
page 14-10.
For more information about configuring your Unknown User Policy, see
Configuring the Unknown User Policy, page 14-10.
Step 3 To deny authentication requests for any unknown user, select the Fail the
attempt option.
Step 4 To allow authentication requests for unknown users, follow these steps:
a. Select the Check the following external user databases option.
b. For each database you need Cisco Secure ACS to use when attempting to
authenticate unknown users, select the database in the External Databases list
and click -->(right arrow button) to move it to the Selected Databases list. To
remove a database from the Selected Databases list, select the database, and
then click <-- (left arrow button) to move it back to the External Databases
list.
c. To assign the order in which Cisco Secure ACS should use the selected
external databases when attempting to authenticate an unknown user, select
a database name from the Selected Databases list and click Up or Down to
move it into the position you want.
Tip Place at the top of the list databases that are most likely to authenticate
unknown users or those databases that are associated with AAA clients or
authentication protocols that are particularly time-sensitive, such as
PEAP.
d. Repeat Step a through Step c until the selected databases are in the order
needed.
Step 5 Click Submit.
Cisco Secure ACS saves and implements the Unknown User Policy configuration
you created. Cisco Secure ACS attempts to authenticate unknown users using the
databases in the order listed in the Selected Databases list.
In addition to the Database Group Mapping feature, for some database types,
Cisco Secure ACS supports RADIUS-based group specification.
Tip The Select a default group for database list displays the number of users
assigned to each group.
Note For more information about group specification for RADIUS token
servers, see RADIUS-Based Group Specification, page 15-13.
When you configure a Cisco Secure ACS group mapping based on group set
membership, you can add one or many external user database groups to the set.
For Cisco Secure ACS to map a user to the specified Cisco Secure ACS group, the
user must match all external user database groups in the set.
As an example, you could configure a group mapping for users who belong to
both the Engineering and Tokyo groups and a separate one for users who belong
to both Engineering and London. You could then configure separate group
mappings for the combinations of Engineering-Tokyo and Engineering-London
and configure different access times for the Cisco Secure ACS groups to which
they map. You could also configure a group mapping that only included the
Engineering group that would map other members of the Engineering group who
were not members of Tokyo or London.
c. If the Windows domain for which you want to create a group set mapping
does not appear in the Detected domains list, type the name of a trusted
Windows domain in the Domain box.
d. Click Submit.
The new Windows domain appears in the list of domains in the Domain
Configurations page.
Step 5 If you are mapping a Windows group set, click the domain name for which you
want to configure a group set mapping.
The Group Mappings for Domain: domainname table appears.
Step 6 If you are mapping a Novell NDS group set, click the name of the Novell NDS
tree for which you want to configure group set mappings.
The Group Mappings for NDS Users table appears.
Step 7 Click Add Mapping.
The Create new group mapping for database page opens. The group list displays
group names derived from the external user database.
Step 8 For each group to be added to the group set mapping, select the name of the
applicable external user database group in the group list, and then click Add to
selected.
Note A user must match all the groups in the Selected list so that Cisco Secure
ACS can use this group set mapping to map the user to a Cisco Secure
ACS group; however, a user can also belong to other groups (in addition
to the groups listed) and still be mapped to a Cisco Secure ACS group.
Tip To remove a group from the mapping, select the name of the group in the
Selected list, and then click Remove from selected.
The Selected list shows all the groups that a user must belong to in order to be
mapped to a Cisco Secure ACS group.
Step 9 In the CiscoSecure group list, select the name of the Cisco Secure ACS group to
which you want to map users who belong to all the external user database groups
in the Selected list.
Note You can also select <No Access>. For more information about the <No
Access> group, see No Access Group for Group Set Mappings,
page 15-5.
Note The asterisk at the end of each set of groups indicates that users
authenticated with the external user database can belong to other groups
besides those in the set.
Note The external user database groups of an existing group set mapping cannot be
edited. If you want to add or remove external user database groups from the group
set mapping, delete the group set mapping and create one with the revised set of
groups.
To edit a Windows, Novell NDS, or generic LDAP group mapping, follow these
steps:
Step 3 Click the external user database name for which you want to edit a group set
mapping.
If you are editing a Windows group set mapping, the Domain Configurations table
appears. If you are editing an NDS group set mapping, the NDS Trees table
appears. Otherwise, the Group Mappings for database Users table appears.
Step 4 If you are editing a Windows group set mapping, click the domain name for which
you want to edit a group set mapping.
The Group Mappings for Domain: domainname table appears.
Step 5 If you are editing a Novell NDS group set mapping, click the name of the Novell
NDS tree for which you want to edit a group set mapping.
The Group Mappings for NDS Users table appears.
Step 6 Click the group set mapping to be edited.
The Edit mapping for database page opens. The external user database group or
groups included in the group set mapping appear above the CiscoSecure group
list.
Step 7 From the CiscoSecure group list, select the name of the group to which the set of
external database groups should be mapped, and then click Submit.
Note You can also select <No Access>. For more information about the <No
Access> group, see No Access Group for Group Set Mappings,
page 15-5.
If you are ordering Windows group set mappings, the Domain Configurations
table appears. If you are ordering NDS group set mappings, the NDS Trees table
appears. Otherwise, the Group Mappings for database Users table appears.
Step 4 If you are configuring Windows group mapping order, click the domain name for
which you want to configure group set mapping order.
The Group Mappings for Domain: domainname table appears.
Step 5 If you are configuring Novell NDS group set mapping order, click the name of the
Novell NDS tree for which you want to configure group set mapping order.
The Group Mappings for NDS Users table appears.
Step 6 Click Order mappings.
Note The Order mappings button appears only if more than one group set
mapping exists for the current database.
The Order mappings for database page appears. The group mappings for the
current database appear in the Order list.
Step 7 Select the name of a group set mapping you want to move, and then click Up or
Down until it is in the position you want.
Step 8 Repeat Step 7 until the group mappings are in the order you need.
Step 9 Click Submit.
The Group Mappings for database page displays the group set mappings in the
order you defined.
where N is the Cisco Secure ACS group number (0 through 499) to which
Cisco Secure ACS should assign the user. For example, if the LEAP Proxy
RADIUS Server authenticated a user and included the following value for the
Cisco IOS/PIX RADIUS attribute 1, [009\001] cisco-av-pair:
ACS:CiscoSecure-Group-Id = 37
Cisco Secure ACS assigns the user to group 37 and applies authorization
associated with group 37.
This appendix provides information about certain basic problems and describes
how to resolve them.
Scan the column on the left to identify the condition that you are trying to resolve,
and then carefully go through each corresponding recovery action offered in the
column on the right.
This chapter contains the following topics:
• Administration Issues, page A-2
• Browser Issues, page A-4
• Cisco IOS Issues, page A-5
• Database Issues, page A-6
• Dial-in Connection Issues, page A-8
• Debug Issues, page A-12
• Proxy Issues, page A-13
• Installation and Upgrade Issues, page A-13
• MaxSessions Issues, page A-14
• Report Issues, page A-14
• Third-Party Server Issues, page A-16
• PIX Firewall Issues, page A-16
• User Authentication Issues, page A-17
• TACACS+ and RADIUS Attribute Issues, page A-18
Administration Issues
Note For information on using the command line interface to execute administrative
commands, see the “Administering the ACS Appliance” chapter of the
Installation and Setup Guide for Cisco Secure ACS Appliance.
Browser Issues
Condition Recovery Action
The browser cannot bring up the Open Internet Explorer or Netscape Navigator and choose Help >
Cisco Secure ACS HTML About to determine the version of the browser. See System
interface. Installation Requirements, page 2-2, for a list of browsers
supported by Cisco Secure ACS and the release notes for known
issues with a particular browser version.
For information about various network scenarios that affect remote
administrative sessions, see Network Environments and
Administrative Sessions, page 1-27.
The browser displays the Java Check the Session idle timeout value for remote administrators.
message that your session This is on the Session Policy Setup page of the Administration
connection is lost. Control section. Increase the value as needed.
Administrator database appears The remote Netscape client is caching the password. If you specify
corrupted. an incorrect password, it is cached. When you attempt to
re-authenticate with the correct password, the incorrect password is
sent. Clear the cache before attempting to re-authenticate or close
the browser and open a new session.
Remote administrator Make sure that the client browser does not have proxy server
intermittently can’t browse the configured. Cisco Secure ACS does not support HTTP proxy for
Cisco Secure ACS HTML remote administrative sessions. Disable proxy server settings.
interface.
The correct syntax for the arguments in the text box is permit argument or
deny argument.
Administrator has been If you have a fallback method configured on your AAA client, disable
locked out of the AAA connectivity to the AAA server and log in using local/line username and
client because of an password.
incorrect configuration
Try to connect directly to the AAA client at the console port. If that is not
set up in the AAA client.
successful, consult your AAA client documentation or see the Password
Recovery Procedures page on Cisco.com for information regarding your
particular AAA client.
IETF RADIUS attributes Cisco incorporated RADIUS (IETF) attributes in Cisco IOS Release 11.1.
not supported in However, there are a few attributes that are not yet supported or that require
Cisco IOS 12.0.5.T a later version of the Cisco IOS software. For more information, see the
RADIUS Attributes page on Cisco.com.
Unable to enter Enable Check the failed attempts log in the ACS. If the log reads “CS password
Mode after doing aaa invalid,” it may be that the user has no enable password set up. Set the
authentication enable TACACS+ Enable Password within the Advanced TACACS+ Settings
default tacacs+. section.
Getting error message If you do not see the Advanced TACACS+ Settings section among the user
“Error in authentication setup options, go to Interface Configuration > Advanced Configuration
on the router.” Options > Advanced TACACS+ Features and select that option to have
the TACACS+ settings appear in the user settings. Then select Max
privilege for any AAA Client (this will typically be 15) and enter the
TACACS+ Enable Password that you want the user to have for enable.
Database Issues
Condition Recovery Action
RDBMS Synchronization Make sure the correct server is listed in the Partners list.
is not operating properly.
Database Replication not • Make sure you have set the server correctly as either Send or Receive.
operating properly. • On the sending server, make sure the receiving server is in the
Replication list.
• On the receiving server, make sure the sending server is selected in the
Accept Replication from list.
• Make sure that the replication schedule on the sending Cisco Secure
ACS is not conflicting with the replication schedule on the receiving
Cisco Secure ACS.
• If the receiving server has dual network cards, on the sending server
add a AAA server to the AAA Servers table in Network Configuration
for every IP address of the receiving server. If the sending server has
dual network cards, on the receiving server add a AAA server to the
AAA Servers table in Network Configuration for every IP address of
the receiving server.
The external user database The external database has not been configured in External User Databases
is not available in the or the username and password have been typed incorrectly. Make sure the
Group Mapping section. username and password are correct. Click the applicable external database
to configure.
External databases not Make sure a two-way trust (for dial-in check) has been established
operating properly. between the Cisco Secure ACS domain and the other domains. Check the
csauth service log file for any debug messages beginning with [External
DB]. See Setting Up Event Logging, page 8-20.
Unknown users are not Go to External User Databases > Unknown User Policy. Select the
authenticated. Check the following external user databases option. From the External
Databases list, select the database(s) against which to authenticate
unknown users. Click —> (right arrow button) to add the database to the
Selected Databases list. Click Up or Down to move the selected database
into the desired position in the authentication hierarchy.
If you are using the Cisco Secure ACS Unknown User feature, external
databases can only authenticate using PAP.
Debug Issues
Condition Recovery Action
When you run The configurations of the AAA client or Cisco Secure ACS are likely to be at
debug aaa fault.
authentication on
From within Cisco Secure ACS confirm the following:
the AAA client,
Cisco Secure ACS • Cisco Secure ACS is receiving the request. This can be done by viewing the
returns a failure Cisco Secure ACS reports. What does or does not appear in the reports may
message. provide indications that your Cisco Secure ACS is misconfigured.
From the AAA client, confirm the following:
• The command ppp authentication pap is entered for each interface if
authentication against the Windows User Database is being used.
• The command ppp authentication chap pap is entered for each interface if
authentication against the CiscoSecure user database is being used.
• The AAA and TACACS+ or RADIUS configuration is correct in the AAA
client.
When you run This problem occurs because authorization rights are not correctly assigned.
debug aaa From Cisco Secure ACS User Setup, confirm that the user is assigned to a group
authentication and that has the correct authorization rights. Authorization rights can be modified
debug aaa under Group Setup or User Setup. User settings override group settings.
authorization on
the AAA client, If a specific attribute for TACACS+ or RADIUS is not displayed within the
Cisco Secure ACS Group Setup section, this might indicate it has not been enabled in Interface
returns a PASS for Configuration: TACACS+ (Cisco IOS) or RADIUS.
authentication, but
returns a FAIL for
authorization.
Proxy Issues
Condition Recovery Action
Proxy fails Make sure that the direction on the remote server is set to Incoming/Outgoing or
Incoming, and that the direction on the authentication forwarding server is set to
Incoming/Outgoing or Outgoing.
Make sure the shared secret (key) matches the shared secret of one or both
Cisco Secure ACSes.
Make sure the character string and delimiter match the stripping information
configured in the Proxy Distribution Table, and the position is set correctly to either
Prefix or Suffix.
One or more servers is down, or no fallback server is configured. Go to Network
Configuration and configure a fallback server. Fallback servers are used only under
the following circumstances:
• The remote Cisco Secure ACS is down.
• One or more services (CSTacacs, CSRadius, or CSAuth) are down.
• The secret key is misconfigured.
• Inbound/Outbound messaging is misconfigured.
MaxSessions Issues
Condition Recovery Action
MaxSessions over VPDN is The use of MaxSessions over VPDN is not supported.
not working.
User MaxSessions Services were restarted, possibly because the connection between the
fluctuates or is unreliable. Cisco Secure ACS and the AAA client is unstable. Click to clear the
Single Connect TACACS+ AAA Client check box.
User MaxSessions not Make sure you have accounting configured on the AAA client and you
taking affect. are receiving accounting start/stop records.
Report Issues
Condition Recovery Action
The You changed protocol configurations recently.
lognameactive.csv Whenever protocol configurations change, the existing lognameactive.csv
report is blank. report file is renamed to lognameyyyy-mm-dd.csv, and a new, blank
lognameactive.csv report is generated
A report is blank. Make sure you have selected Log to reportname Report under System
Configuration: Logging: Log Target: reportname. You must also set Network
Configuration: servername: Access Server Type to Cisco Secure ACS for
Windows NT.
No Unknown User The Unknown User database was changed. Accounting reports will still
information is included contain unknown user information.
in reports.
Two entries are logged Make sure that the remote logging function is not configured to send
for one user session. accounting packets to the same location as the Send Accounting Information
fields in the Proxy Distribution Table.
Cisco Secure Access Control Server (ACS) Appliance supports Terminal Access
Controller Access Control System (TACACS+) attribute-value (AV) pairs. You
can enable different AV pairs for any supported attribute value.
Note If you specify a given AV pair in Cisco Secure ACS, you must also enable the
corresponding AV pair in the Cisco IOS software running on the AAA client.
Therefore, you must consider which AV pairs your Cisco IOS release supports. If
Cisco Secure ACS sends an AV pair to the AAA client that the Cisco IOS software
does not support, that attribute is not implemented.
Note All TACACS+ values are strings. The concept of value “type” does not exist in
TACACS+ as it does in Remote Access Dial-In User Service (RADIUS).
TACACS+ AV Pairs
Note Beginning with Cisco Secure ACS 2.3, some TACACS+ attributes no longer
appear on the Group Setup page. This is because IP pools and callback supersede
the following attributes:
addr
addr-pool
callback-dialstring
Cisco Secure ACS supports many TACACS+ AV pairs. For descriptions of these
attributes, refer to Cisco IOS documentation for the release of Cisco IOS running
on your AAA clients. TACACS+ AV pairs supported in Cisco Secure ACS are as
follows:
• acl=
• addr=
• addr-pool=
• autocmd=
• callback-dialstring
• callback-line
• callback-rotary
• cmd-arg=
• cmd=
• dns-servers=
• gw-password
• idletime=
• inacl#n
• inacl=
• interface-config=
• ip-addresses
• link-compression=
• load-threshold=n
• max-links=n
• nas-password
• nocallback-verify
• noescape=
• nohangup=
• old-prompts
• outacl#n
• outacl=
• pool-def#n
• pool-timeout=
• ppp-vj-slot-
compression
• priv-lvl=
• protocol=
• route
• route#n
• routing=
• rte-ftr-in#n
• rte-ftr-out#n
• sap#n
• sap-fltr-in#n
• sap-fltr-out#n
• service=
• source-ip=
• timeout=
• tunnel-id
• wins-servers=
• zonelist=
• protocol
• reason
• service
• start_time
• stop_time
• task_id
• timezone
• xmit-rate
Cisco Secure Access Control Server (Cisco Secure ACS) Appliance version 3.2
supports many RADIUS attributes. This appendix lists the standard attributes,
vendor-proprietary attributes, and vendor-specific attributes supported by
Cisco Secure ACS for the following vendor implementations of RADIUS:
• Cisco IOS RADIUS
• Cisco VPN 3000 Concentrator RADIUS
• Cisco VPN 5000 Concentrator RADIUS
• Cisco Building Broadband Service Manager RADIUS
• Microsoft RADIUS
• Ascend RADIUS
• Nortel RADIUS
• Juniper RADIUS
• Internet Engineering Task Force (IETF) RADIUS
You can enable different attribute-value (AV) pairs for IETF RADIUS and for any
supported vendor. This appendix provides information about the following
RADIUS AV pairs:
• Cisco IOS Dictionary of RADIUS AV Pairs, page C-2
• Cisco IOS/PIX Dictionary of RADIUS VSAs, page C-5
• Cisco VPN 3000 Concentrator Dictionary of RADIUS VSAs, page C-7
• Cisco VPN 5000 Concentrator Dictionary of RADIUS VSAs, page C-11
Note If you specify a given AV pair on Cisco Secure ACS, the corresponding AV pair
must be implemented in the Cisco IOS software running on the network device.
Always consider which AV pairs your Cisco IOS release supports. If
Cisco Secure ACS sends an AV pair that the Cisco IOS software does not
support, the attribute is not implemented.
Note Because IP pools and callback supersede them, the following RADIUS attributes
do not appear on the Group Setup page:
8, Framed-IP-Address
19, Callback-Number
218, Ascend-Assign-IP-Pool
Note For a discussion of Cisco IOS/PIX RADIUS VSA 1, cisco-av-pair, see AV pair
26 in Table C-6.
Note For details about the Cisco IOS H.323 VSAs, refer to Cisco IOS Voice-over-IP
documentation.
Note For details about the Cisco IOS Node Route Processor-Service Selection Gateway
VSAs (VSAs 250, 251, and 252), refer to Cisco IOS documentation.
Note Some of the RADIUS VSAs supported by Cisco VPN 3000 Concentrators are
interdependent. Before you implement them, we recommend that you refer to
Cisco VPN 3000-series Concentrator documentation.
To control Microsoft MPPE settings for users accessing the network through a
Cisco VPN 3000-series concentrator, use the CVPN3000-PPTP-Encryption (VSA
20) and CVPN3000-L2TP-Encryption (VSA 21) attributes. Settings for
CVPN3000-PPTP-Encryption (VSA 20) and CVPN3000-L2TP-Encryption (VSA
21) override Microsoft MPPE RADIUS settings. If either of these attributes is
enabled, Cisco Secure ACS determines the values to be sent in outbound
RADIUS (Microsoft) attributes and sends them along with the RADIUS (Cisco
VPN 3000) attributes, regardless of whether RADIUS (Microsoft) attributes are
enabled in the Cisco Secure ACS HTML interface or how those attributes might
be configured.
Type of Inbound/
Attribute Number Description Value Outbound Multiple
User-Name 1 Name of the user being String Inbound No
authenticated.
User-Password 2 User password or input following an String Outbound No
access challenge. Passwords longer
than 16 characters are encrypted
using IETF Draft #2 or later
specifications.
CHAP-Password 3 PPP (Point-to-Point Protocol) CHAP String Outbound No
(Challenge Handshake
Authentication Protocol) response to
an Access-Challenge.
NAS-IP Address 4 IP address of the AAA client that is Ipaddr Inbound No
requesting authentication.
Type of Inbound/
Attribute Number Description Value Outbound Multiple
NAS-Port 5 Physical port number of the AAA Integer Inbound No
client that is authenticating the user.
The AAA client port value (32 bits)
consists of one or two 16-bit values,
depending on the setting of the
RADIUS server extended
portnames command. Each 16-bit
number is a 5-digit decimal integer
interpreted as follows:
• For asynchronous terminal
lines, async network interfaces,
and virtual async interfaces, the
value is 00ttt, where ttt is the
line number or async interface
unit number.
• For ordinary synchronous
network interfaces, the value is
10xxx.
Type of Inbound/
Attribute Number Description Value Outbound Multiple
Service-Type 6 Type of service requested or type of Integer Both No
service to be provided:
• In a request:
– Framed—For known PPP
or SLIP (Serial Line
Internet Protocol)
connection.
– Administrative User—For
enable command.
• In a response:
– Login—Make a
connection.
– Framed—Start SLIP or
PPP.
– Administrative
User—Start an EXEC or
enable ok.
– Exec User—Start an EXEC
session.
Framed-Protocol 7 Framing to be used for framed Integer Both No
access.
Framed-IP- 8 Address to be configured for the — — —
Address user.
Framed-IP- 9 IP netmask to be configured for the Ipaddr Outbound No
Netmask user when the user is a router to a (maximum
network. This AV results in a static length 15
route being added for characters)
Framed-IP-Address with the mask
specified.
Type of Inbound/
Attribute Number Description Value Outbound Multiple
Framed-Routing 10 Routing method for the user when Integer Outbound No
the user is a router to a network.
Only None and Send and Listen
values are supported for this
attribute.
Filter-Id 11 Name of the filter list for the user, String Outbound Yes
formatted as follows: %d, %d.in, or
%d.out. This attribute is associated
with the most recent service-type
command. For login and EXEC, use
%d or %d.out as the line access list
value from 0 to 199. For Framed
service, use %d or %d.out as
interface output access list and
%d.in for input access list. The
numbers are self-encoding to the
protocol to which they refer.
Framed-MTU 12 Indicates the maximum transmission Integer Outbound No
unit (MTU) that can be configured (maximum
for the user when the MTU is not length 10
negotiated by PPP or some other characters)
means.
Framed-Compress 13 Compression protocol used for the Integer Outbound Yes
ion link. This attribute results in
“/compress” being added to the PPP
or SLIP autocommand generated
during EXEC authorization. Not
currently implemented for
non-EXEC authorization.
Login-IP-Host 14 Host to which the user will connect Ipaddr Both Yes
when the Login-Service attribute is (maximum
included. length 15
characters)
Type of Inbound/
Attribute Number Description Value Outbound Multiple
Login-Service 15 Service that should be used to Integer Both No
connect the user to the login host.
Service is indicated by a numeric
value as follows:
• 0: Telnet
• 1: Rlogin
• 2: TCP-Clear
• 3: PortMaster
• 4: LAT
Login-TCP-Port 16 TCP (Transmission Control Integer Outbound No
Protocol) port with which the user is (maximum
to be connected when the length 10
Login-Service attribute is also characters)
present.
Reply-Message 18 Text to be displayed to the user. String Outbound Yes
Callback-Number 19 — String Outbound No
Callback-Id 20 — String Outbound No
Framed-Route 22 Routing information to be String Outbound Yes
configured for the user on this AAA
client. The RADIUS RFC (Request
for Comments) format (net/bits
[router [metric]]) and the old style
dotted mask (net mask [router
[metric]]) are supported. If the router
field is omitted or 0 (zero), the peer
IP address is used. Metrics are
ignored.
Framed-IPX- 23 — Integer Outbound No
Network
Type of Inbound/
Attribute Number Description Value Outbound Multiple
State 24 Allows State information to be String Outbound No
maintained between the AAA client (maximum
and the RADIUS server. This length 253
attribute is applicable only to CHAP characters)
challenges.
Class 25 Arbitrary value that the AAA client String Both Yes
includes in all accounting packets
for this user if supplied by the
RADIUS server.
Type of Inbound/
Attribute Number Description Value Outbound Multiple
Vendor-Specific 26 Allows vendors to support their own String Outbound Yes
extended attributes. The Cisco
RADIUS implementation supports
one vendor-specific option using the
format recommended in the
specification. The Cisco vendor-ID
is 9, and the supported option is
vendor-type 1, cisco-avpair. The
value is a string of the format:
protocol:attribute sep value
Type of Inbound/
Attribute Number Description Value Outbound Multiple
Session-Timeout 27 Maximum number of seconds of Integer Outbound No
service to be provided to the user (maximum
before the session terminates. This length 10
AV becomes the per-user absolute characters)
timeout. This attribute is not valid
for PPP sessions.
Idle-Timeout 28 Maximum number of consecutive Integer Outbound No
seconds of idle connection time (maximum
allowed to the user before the length 10
session terminates. This AV characters)
becomes the per-user
session-timeout. This attribute is not
valid for PPP sessions.
Termination- 29 — Integer Both No
Action
Called-Station-Id 30 Allows the AAA client to send the String Inbound No
telephone number the call came from
as part of the access-request packet
using automatic number
identification or similar technology.
This attribute has the same value as
remote-addr in TACACS+. This
attribute is supported only on ISDN
and for modem calls on the Cisco
AS5200 if used with PRI.
Calling-Station-Id 31 Allows the AAA client to send the String Inbound No
telephone number the user called
into as part of the access-request
packet, using DNIS (Dialed Number
Identification Server) or similar
technology. This attribute is only
supported on ISDN and for modem
calls on the Cisco AS5200 if used
with PRI (Primary Rate Interface).
Type of Inbound/
Attribute Number Description Value Outbound Multiple
NAS-Identifier 32 — String Inbound No
Proxy-State 33 Included in proxied RADIUS String Inbound No
requests per RADIUS standards. The (maximum
operation of Cisco Secure ACS does length 253
not depend on the contents of this characters)
attribute.
Login-LAT- 34 System with which the user is to be String Inbound No
Service connected by local area transport (maximum
(LAT) protocol. This attribute is only length 253
available in the EXEC mode. characters)
Login-LAT-Node 35 — String Inbound No
Login-LAT-Group 36 — String Inbound No
Framed- 37 — Integer Outbound No
AppleTalk-Link
Framed- 38 — Integer Outbound Yes
AppleTalk-
Network
Framed- 39 — String Out No
AppleTalk-
Zone
Acct-Status-Type 40 Specifies whether this Integer Inbound No
accounting-request marks the
beginning of the user service (start)
or the end (stop).
Acct-Delay-Time 41 Number of seconds the client has Integer Inbound No
been trying to send a particular
record.
Acct-Input-Octets 42 Number of octets received from the Integer Inbound No
port while this service is being
provided.
Acct-Output- 43 Number of octets sent to the port Integer Inbound No
Octets while this service is being delivered.
Type of Inbound/
Attribute Number Description Value Outbound Multiple
Acct-Session-Id 44 Unique accounting identifier that String Inbound No
makes it easy to match start and stop
records in a log file. The
Acct-Session-Id restarts at 1 each
time the router is power cycled or the
software is reloaded. Contact Cisco
support if this is unsuitable.
Acct-Authentic 45 Way in which the user was Integer Inbound No
authenticated—by RADIUS, by the
AAA client itself, or by another
remote authentication protocol. This
attribute is set to radius for users
authenticated by RADIUS; to
remote for TACACS+ and Kerberos;
or to local for local, enable, line, and
if-needed methods. For all other
methods, the attribute is omitted.
Acct-Session- 46 Number of seconds the user has been Integer Inbound No
Time receiving service.
Acct-Input- 47 Number of packets received from the Integer Inbound No
Packets port while this service is being
provided to a framed user.
Acct-Output- 48 Number of packets sent to the port Integer Inbound No
Packets while this service is being delivered
to a framed user.
Type of Inbound/
Attribute Number Description Value Outbound Multiple
Acct-Terminate- 49 Reports details on why the Integer Inbound No
Cause connection was terminated.
Termination causes are indicated by
a numeric value as follows:
• 1: User request
• 2: Lost carrier
• 3: Lost service
• 4: Idle timeout
• 5: Session-timeout
• 6: Admin reset
• 7: Admin reboot
• 8: Port error
• 9: AAA client error
• 10: AAA client request
• 11: AAA client reboot
• 12: Port unneeded
• 13: Port pre-empted
• 14: Port suspended
• 15: Service unavailable
• 16: Callback
• 17: User error
• 18: Host request
Acct-Multi- 50 — String Inbound No
Session-Id
Acct-Link-Count 51 — Integer Inbound No
Acct-Input- 52 — Integer Inbound No
Gigawords
Type of Inbound/
Attribute Number Description Value Outbound Multiple
Acct-Output- 53 — Integer Inbound No
Gigawords
Event-Timestamp 55 — Date Inbound No
CHAP-Challenge 60 — String Inbound No
NAS-Port-Type 61 Indicates the type of physical port Integer Inbound No
the AAA client is using to
authenticate the user. Physical ports
are indicated by a numeric value as
follows:
• 0: Asynchronous
• 1: Synchronous
• 2: ISDN-Synchronous
• 3: ISDN-Asynchronous (V.120)
• 4: ISDN- Asynchronous (V.110)
• 5: Virtual
Port-Limit 62 Sets the maximum number of ports Integer Both No
to be provided to the user by the (maximum
network access server. length 10
characters)
Login-LAT-Port 63 — String Both No
Tunnel-Type 64 — Tagged Both Yes
integer
Tunnel-Medium- 65 — Tagged Both Yes
Type integer
Tunnel-Client- 66 — tagged Both Yes
Endpoint string
Tunnel-Server- 67 — Tagged Both Yes
Endpoint string
Type of Inbound/
Attribute Number Description Value Outbound Multiple
Acct-Tunnel- 68 — String Inbound No
Connection
Tunnel-Password 69 — tagged Both Yes
string
ARAP-Password 70 — String Inbound No
ARAP-Features 71 — String Outbound No
ARAP-Zone- 72 — Integer Outbound No
Access
ARAP-Security 73 — Integer Inbound No
ARAP-Security- 74 — String Inbound No
Data
Password-Retry 75 — Integer Internal No
use only
Prompt 76 — Integer Internal No
use only
Connect-Info 77 — String Inbound No
Configuration- 78 — String Internal No
Token use only
EAP-Message 79 — String Internal No
use only
Message- 80 — String Outbound No
Authenticator
Tunnel-Private- 81 — tagged Both Yes
Group-ID string
Tunnel- 82 — tagged Both Yes
Assignment-ID string
Tunnel-Preference 83 — Tagged Both No
integer
Acct-Interim- 85 — Integer Outbound No
Interval
Type of Inbound/
Attribute Number Description Value Outbound Multiple
NAS-Port-Id 87 — String Inbound No
Framed-Pool 88 — String Internal No
use only
Tunnel-Client- 90 — tagged Both Yes
Auth-ID string
Tunnel-Server- 91 — tagged Both Yes
Auth-ID string
Primary-DNS- 135 — Ipaddr Both No
Server
Secondary-DNS- 136 — Ipaddr Both No
Server
Multilink-ID 187 — Integer Inbound No
Num-In-Multilink 188 — Integer Inbound No
Pre-Input-Octets 190 — Integer Inbound No
Pre-Output-Octets 191 — Integer Inbound No
Pre-Input-Packets 192 — Integer Inbound No
Pre-Output- 193 — Integer Inbound No
Packets
Maximum-Time 194 — Integer Both No
Disconnect-Cause 195 — Integer Inbound No
Data-Rate 197 — Integer Inbound No
PreSession-Time 198 — Integer Inbound No
PW-Lifetime 208 — Integer Outbound No
IP-Direct 209 — Ipaddr Outbound No
PPP-VJ-Slot- 210 — Integer Outbound No
Comp
Assign-IP-pool 218 — Integer Outbound No
Route-IP 228 — Integer Outbound No
Type of Inbound/
Attribute Number Description Value Outbound Multiple
Link-Compression 233 — Integer Outbound No
Target-Utils 234 — Integer Outbound No
Maximum- 235 — Integer Outbound No
Channels
Data-Filter 242 — Ascend Outbound Yes
filter
Call-Filter 243 — Ascend Outbound Yes
filter
Idle-Limit 244 — Integer Outbound No
Type of Inbound/
Attribute Number Value Description Outbound Multiple
MS-CHAP- 1 String — Inbound No
Response
MS-CHAP-Error 2 String — Outbound No
MS-CHAP-CPW- 3 String — Inbound No
1
MS-CHAP-CPW- 4 String — Inbound No
2
MS-CHAP-LM- 5 String — Inbound No
Enc-PW
MS-CHAP-NT- 6 String — Inbound No
Enc-PW
MS-MPPE- 7 Integer The MS-MPPE-Encryption-Policy Outbound No
Encryption-Policy attribute signifies whether the use of
encryption is allowed or required. If
the Policy field is equal to 1
(Encryption-Allowed), any or none
of the encryption types specified in
the MS-MPPE-Encryption-Types
attribute can be used. If the Policy
field is equal to 2
(Encryption-Required), any of the
encryption types specified in the
MS-MPPE-Encryption-Types
attribute can be used, but at least one
must be used.
Type of Inbound/
Attribute Number Value Description Outbound Multiple
MS-MPPE- 8 Integer The MS-MPPE-Encryption-Types Outbound No
Encryption-Types attribute signifies the types of
encryption available for use with
MPPE. It is a four octet integer that
is interpreted as a string of bits.
MS-CHAP- 10 String — Inbound No
Domain
MS-CHAP- 11 String — Inbound No
Challenge
MS-CHAP- 12 String The MS-CHAP-MPPE-Keys Outbound No
MPPE-Keys attribute contains two session keys
for use by the MPPE. This attribute
is only included in Access-Accept
packets.
Note The MS-CHAP-MPPE-Keys
attribute value is
autogenerated by
Cisco Secure ACS; there is
no value to set in the HTML
interface.
MS-MPPE-Send- 16 String The MS-MPPE-Send-Key attribute Outbound No
Key (maximum contains a session key for use by
length 240 MPPE. This key is for encrypting
characters) packets sent from the AAA client to
the remote host. This attribute is
only included in Access-Accept
packets.
Type of Inbound/
Attribute Number Value Description Outbound Multiple
MS-MPPE-Recv- 17 String The MS-MPPE-Recv-Key attribute Outbound No
Key (maximum contains a session key for use by
length 240 MPPE. This key is for encrypting
characters) packets received by the AAA client
from the remote host. This attribute
is only included in Access-Accept
packets.
MS-RAS-Version 18 String — Inbound No
MS-CHAP-NT- 25 String — Inbound No
Enc-PW
MS-CHAP2- 26 String — Outbound No
Response
MS-CHAP2-CPW 27 String — Inbound No
Note RADIUS filters are retrieved only when a call is placed using a
RADIUS outgoing profile or answered using a RADIUS incoming
profile. Filter entries are applied in the order in which they are
entered. If you make changes to a filter in an Ascend RADIUS
profile, the changes do not take effect until a call uses that profile.
Inbound/
Attribute Number Type of Value Outbound Multiple
Dictionary of Ascend Attributes
User-Name 1 String Inbound No
User-Password 2 String Outbound No
CHAP-Password 3 String Outbound No
NAS-IP-Address 4 Ipaddr Inbound No
NAS-Port 5 Integer Inbound No
Service-Type 6 Integer Both No
Framed-Protocol 7 Integer Both No
Framed-IP-Address 8 Ipaddr Both No
Framed-IP-Netmask 9 Ipaddr Outbound No
Framed-Routing 10 Integer Outbound No
Framed-Filter 11 String Outbound Yes
Framed-MTU 12 Integer Outbound No
Framed-Compression 13 Integer Outbound Yes
Login-IP-Host 14 Ipaddr Both Yes
Login-Service 15 Integer Both No
Inbound/
Attribute Number Type of Value Outbound Multiple
Login-TCP-Port 16 Integer Outbound No
Change-Password 17 String — —
Reply-Message 18 String Outbound Yes
Callback-ID 19 String Outbound No
Callback-Name 20 String Outbound No
Framed-Route 22 String Outbound Yes
Framed-IPX-Network 23 Integer Outbound No
State 24 String Outbound No
Class 25 String Outbound Yes
Vendor-Specific 26 String Outbound Yes
Call-Station-ID 30 String Inbound No
Calling-Station-ID 31 String Inbound No
Acct-Status-Type 40 Integer Inbound No
Acct-Delay-Time 41 Integer Inbound No
Acct-Input-Octets 42 Integer Inbound No
Acct-Output-Octets 43 Integer Inbound No
Acct-Session-Id 44 Integer Inbound No
Acct-Authentic 45 Integer Inbound No
Acct-Session-Time 46 Integer Inbound No
Acct-Input-Packets 47 Integer Inbound No
Acct-Output-Packets 48 Integer Inbound No
Tunnel-Type 64 String Both Yes
Tunnel-Medium-Type 65 String Both Yes
Tunnel-Client-Endpoint 66 String (maximum length 250 Both Yes
characters)
Tunnel-Server-Endpoint 67 String (maximum length 250 Both Yes
characters)
Inbound/
Attribute Number Type of Value Outbound Multiple
Acct-Tunnel-Connection 68 Integer (maximum length 253 Inbound No
characters)
Ascend-Private-Route 104 String (maximum length 253 Both No
characters)
Ascend-Numbering-Plan-ID 105 Integer (maximum length 10 Both No
characters)
Ascend-FR-Link-Status-Dlci 106 Integer (maximum length 10 Both No
characters)
Ascend-Calling-Subaddress 107 String (maximum length 253 Both No
characters)
Ascend-Callback-Delay 108 String (maximum length 10 Both No
characters)
Ascend-Endpoint-Disc 109 String (maximum length 253 Both No
characters)
Ascend-Remote-FW 110 String (maximum length 253 Both No
characters)
Ascend-Multicast-GLeave-Delay 111 Integer (maximum length 10 Both No
characters)
Ascend-CBCP-Enable 112 String Both No
Ascend-CBCP-Mode 113 String Both No
Ascend-CBCP-Delay 114 String (maximum length 10 Both No
characters)
Ascend-CBCP-Trunk-Group 115 String (maximum length 10 Both No
characters)
Ascend-AppleTalk-Route 116 String (maximum length 253 Both No
characters)
Ascend-AppleTalk-Peer-Mode 117 String (maximum length 10 Both No
characters)
Ascend-Route-AppleTalk 118 String (maximum length 10 Both No
characters)
Inbound/
Attribute Number Type of Value Outbound Multiple
Ascend-FCP-Parameter 119 String (maximum length 253 Both No
characters)
Ascend-Modem-PortNo 120 Integer (maximum length 10 Inbound No
characters)
Ascend-Modem-SlotNo 121 Integer (maximum length 10 Inbound No
characters)
Ascend-Modem-ShelfNo 122 Integer (maximum length 10 Inbound No
characters)
Ascend-Call-Attempt-Limit 123 Integer (maximum length 10 Both No
characters)
Ascend-Call-Block_Duration 124 Integer (maximum length 10 Both No
characters)
Ascend-Maximum-Call-Duration 125 Integer (maximum length 10 Both No
characters)
Ascend-Router-Preference 126 String (maximum length 10 Both No
characters)
Ascend-Tunneling-Protocol 127 String (maximum length 10 Both No
characters)
Ascend-Shared-Profile-Enable 128 Integer Both No
Ascend-Primary-Home-Agent 129 String (maximum length 253 Both No
characters)
Ascend-Secondary-Home-Agent 130 String (maximum length 253 Both No
characters)
Ascend-Dialout-Allowed 131 Integer Both No
Ascend-BACP-Enable 133 Integer Both No
Ascend-DHCP-Maximum-Leases 134 Integer (maximum length 10 Both No
characters)
Ascend-Client-Primary-DNS 135 Address (maximum length 15 Both No
characters)
Inbound/
Attribute Number Type of Value Outbound Multiple
Ascend-Client-Secondary-DNS 136 Address (maximum length 15 Both No
characters)
Ascend-Client-Assign-DNS 137 Enum Both No
Ascend-User-Acct-Type 138 Enum Both No
Ascend-User-Acct-Host 139 Address (maximum length 15 Both No
characters)
Ascend-User-Acct-Port 140 Integer (maximum length 10 Both No
characters)
Ascend-User-Acct-Key 141 String (maximum length 253 Both No
characters)
Ascend-User-Acct-Base 142 Enum (maximum length 10 Both No
characters)
Ascend-User-Acct-Time 143 Integer (maximum length 10 Both No
characters)
Support IP Address Allocation from Global Pools
Ascend-Assign-IP-Client 144 Ipaddr (maximum length 15 Outbound No
characters)
Ascend-Assign-IP-Server 145 Ipaddr (maximum length 15 Outbound No
characters)
Ascend-Assign-IP-Global-Pool 146 String (maximum length 253 Outbound No
characters)
DHCP Server Functions
Ascend-DHCP-Reply 147 Integer Outbound No
Ascend-DHCP-Pool-Number 148 Integer (maximum length 10 Outbound No
characters)
Connection Profile/Telco Option
Ascend-Expect-Callback 149 Integer Outbound No
Event Type for an Ascend-Event Packet
Inbound/
Attribute Number Type of Value Outbound Multiple
Ascend-Event-Type 150 Integer (maximum length 10 Inbound No
characters)
RADIUS Server Session Key
Ascend-Session-Svr-Key 151 String (maximum length 253 Outbound No
characters)
Multicast Rate Limit Per Client
Ascend-Multicast-Rate-Limit 152 Integer (maximum length 10 Outbound No
characters)
Connection Profile Fields to Support Interface-Based Routing
Ascend-IF-Netmask 153 Ipaddr (maximum length 15 Outbound No
characters)
Ascend-Remote-Addr 154 Ipaddr (maximum length 15 Outbound No
characters)
Multicast Support
Ascend-Multicast-Client 155 Integer (maximum length 10 Outbound No
characters)
Frame Datalink Profiles
Ascend-FR-Circuit-Name 156 String (maximum length 253 Outbound No
characters)
Ascend-FR-LinkUp 157 Integer (maximum length 10 Outbound No
characters)
Ascend-FR-Nailed-Group 158 Integer (maximum length 10 Outbound No
characters)
Ascend-FR-Type 159 Integer (maximum length 10 Outbound No
characters)
Ascend-FR-Link-Mgt 160 Integer (maximum length 10 Outbound No
characters)
Ascend-FR-N391 161 Integer (maximum length 10 Outbound No
characters)
Inbound/
Attribute Number Type of Value Outbound Multiple
Ascend-FR-DCE-N392 162 Integer (maximum length 10 Outbound No
characters)
Ascend-FR-DTE-N392 163 Integer (maximum length 10 Outbound No
characters)
Ascend-FR-DCE-N393 164 Integer (maximum length 10 Outbound No
characters)
Ascend-FR-DTE-N393 165 Integer (maximum length 10 Outbound No
characters)
Ascend-FR-T391 166 Integer (maximum length 10 Outbound No
characters)
Ascend-FR-T392 167 Integer (maximum length 10 Outbound No
characters)
Ascend-Bridge-Address 168 String (maximum length 253 Outbound No
characters)
Ascend-TS-Idle-Limit 169 Integer (maximum length 10 Outbound No
characters)
Ascend-TS-Idle-Mode 170 Integer (maximum length 10 Outbound No
characters)
Ascend-DBA-Monitor 171 Integer (maximum length 10 Outbound No
characters)
Ascend-Base-Channel-Count 172 Integer (maximum length 10 Outbound No
characters)
Ascend-Minimum-Channels 173 Integer (maximum length 10 Outbound No
characters)
IPX Static Routes
Ascend-IPX-Route 174 String (maximum length 253 Inbound No
characters)
Ascend-FT1-Caller 175 Integer (maximum length 10 Inbound No
characters)
Inbound/
Attribute Number Type of Value Outbound Multiple
Ascend-Backup 176 String (maximum length 253 Inbound No
characters)
Ascend-Call-Type 177 Integer Inbound No
Ascend-Group 178 String (maximum length 253 Inbound No
characters)
Ascend-FR-DLCI 179 Integer (maximum length 10 Inbound No
characters)
Ascend-FR-Profile-Name 180 String (maximum length 253 Inbound No
characters)
Ascend-Ara-PW 181 String (maximum length 253 Inbound No
characters)
Ascend-IPX-Node-Addr 182 String (maximum length 253 Both No
characters)
Ascend-Home-Agent-IP-Addr 183 Ipaddr (maximum length 15 Outbound No
characters)
Ascend-Home-Agent-Password 184 String (maximum length 253 Outbound No
characters)
Ascend-Home-Network-Name 185 String (maximum length 253 Outbound No
characters)
Ascend-Home-Agent-UDP-Port 186 Integer (maximum length 10 Outbound No
characters)
Ascend-Multilink-ID 187 Integer Inbound No
Ascend-Num-In-Multilink 188 Integer Inbound No
Ascend-First-Dest 189 Ipaddr Inbound No
Ascend-Pre-Input-Octets 190 Integer Inbound No
Ascend-Pre-Output-Octets 191 Integer Inbound No
Ascend-Pre-Input-Packets 192 Integer Inbound No
Ascend-Pre-Output-Packets 193 Integer Inbound No
Inbound/
Attribute Number Type of Value Outbound Multiple
Ascend-Maximum-Time 194 Integer (maximum length 10 Both No
characters)
Ascend-Disconnect-Cause 195 Integer Inbound No
Ascend-Connect-Progress 196 Integer Inbound No
Ascend-Data-Rate 197 Integer Inbound No
Ascend-PreSession-Time 198 Integer Inbound No
Ascend-Token-Idle 199 Integer (maximum length 10 Outbound No
characters)
Ascend-Token-Immediate 200 Integer Outbound No
Ascend-Require-Auth 201 Integer (maximum length 10 Outbound No
characters)
Ascend-Number-Sessions 202 String (maximum length 253 Outbound No
characters)
Ascend-Authen-Alias 203 String (maximum length 253 Outbound No
characters)
Ascend-Token-Expiry 204 Integer (maximum length 10 Outbound No
characters)
Ascend-Menu-Selector 205 String (maximum length 253 Outbound No
characters)
Ascend-Menu-Item 206 String Outbound Yes
RADIUS Password Expiration Options
Ascend-PW-Warntime 207 Integer (maximum length 10 Outbound No
characters)
Ascend-PW-Lifetime 208 Integer (maximum length 10 Outbound No
characters)
Ascend-IP-Direct 209 Ipaddr (maximum length 15 Outbound No
characters)
Ascend-PPP-VJ-Slot-Comp 210 Integer (maximum length 10 Outbound No
characters)
Inbound/
Attribute Number Type of Value Outbound Multiple
Ascend-PPP-VJ-1172 211 Integer (maximum length 10 Outbound No
characters)
Ascend-PPP-Async-Map 212 Integer (maximum length 10 Outbound No
characters)
Ascend-Third-Prompt 213 String (maximum length 253 Outbound No
characters)
Ascend-Send-Secret 214 String (maximum length 253 Outbound No
characters)
Ascend-Receive-Secret 215 String (maximum length 253 Outbound No
characters)
Ascend-IPX-Peer-Mode 216 Integer Outbound No
Ascend-IP-Pool-Definition 217 String (maximum length 253 Outbound No
characters)
Ascend-Assign-IP-Pool 218 Integer Outbound No
Ascend-FR-Direct 219 Integer Outbound No
Ascend-FR-Direct-Profile 220 String (maximum length 253 Outbound No
characters)
Ascend-FR-Direct-DLCI 221 Integer (maximum length 10 Outbound No
characters)
Ascend-Handle-IPX 222 Integer Outbound No
Ascend-Netware-Timeout 223 Integer (maximum length 10 Outbound No
characters)
Ascend-IPX-Alias 224 String (maximum length 253 Outbound No
characters)
Ascend-Metric 225 Integer (maximum length 10 Outbound No
characters)
Ascend-PRI-Number-Type 226 Integer Outbound No
Ascend-Dial-Number 227 String (maximum length 253 Outbound No
characters)
Inbound/
Attribute Number Type of Value Outbound Multiple
Connection Profile/PPP Options
Ascend-Route-IP 228 Integer Outbound No
Ascend-Route-IPX 229 Integer Outbound No
Ascend-Bridge 230 Integer Outbound No
Ascend-Send-Auth 231 Integer Outbound No
Ascend-Send-Passwd 232 String (maximum length 253 Outbound No
characters)
Ascend-Link-Compression 233 Integer Outbound No
Ascend-Target-Util 234 Integer (maximum length 10 Outbound No
characters)
Ascend-Max-Channels 235 Integer (maximum length 10 Outbound No
characters)
Ascend-Inc-Channel-Count 236 Integer (maximum length 10 Outbound No
characters)
Ascend-Dec-Channel-Count 237 Integer (maximum length 10 Outbound No
characters)
Ascend-Seconds-Of-History 238 Integer (maximum length 10 Outbound No
characters)
Ascend-History-Weigh-Type 239 Integer Outbound No
Ascend-Add-Seconds 240 Integer (maximum length 10 Outbound No
characters)
Ascend-Remove-Seconds 241 Integer (maximum length 10 Outbound No
characters)
Connection Profile/Session Options
Ascend-Data-Filter 242 Call filter Outbound Yes
Ascend-Call-Filter 243 Call filter Outbound Yes
Ascend-Idle-Limit 244 Integer (maximum length 10 Outbound No
characters)
Inbound/
Attribute Number Type of Value Outbound Multiple
Ascend-Preempt-Limit 245 Integer (maximum length 10 Outbound No
characters)
Connection Profile/Telco Options
Ascend-Callback 246 Integer Outbound No
Ascend-Data-Svc 247 Integer Outbound No
Ascend-Force-56 248 Integer Outbound No
Ascend-Billing-Number 249 String (maximum length 253 Outbound No
characters)
Ascend-Call-By-Call 250 Integer (maximum length 10 Outbound No
characters)
Ascend-Transit-Number 251 String (maximum length 253 Outbound No
characters)
Terminal Server Attributes
Ascend-Host-Info 252 String (maximum length 253 Outbound No
characters)
PPP Local Address Attribute
Ascend-PPP-Address 253 Ipaddr (maximum length 15 Outbound No
characters)
MPP Percent Idle Attribute
Ascend-MPP-Idle-Percent 254 Integer (maximum length 10 Outbound No
characters)
Ascend-Xmit-Rate 255 Integer (maximum length 10 Outbound No
characters)
Inbound/
Attribute Number Type of Value Outbound Multiple
Bay-Local-IP-Address 035 Ipaddr (maximum length 15 Outbound No
characters)
Bay-Primary-DNS-Server 054 Ipaddr (maximum length 15 Outbound No
characters)
Bay-Secondary-DNS-Server 055 Ipaddr (maximum length 15 Outbound No
characters)
Bay-Primary-NBNS-Server 056 Ipaddr (maximum length 15 Outbound No
characters)
Bay-Secondary-NBNS-Server 057 Ipaddr (maximum length 15 Outbound No
characters)
Bay-User-Level 100 Integer Outbound No
Bay-Audit-Level 101 Integer Outbound No
Inbound/
Attribute Number Type of Value Outbound Multiple
Juniper-Local-User-Name 001 String (maximum length 247 Outbound No
characters)
Juniper-Allow-Commands 002 String (maximum length 247 Outbound No
characters)
Juniper-Deny-Commands 003 String (maximum length 247 Outbound No
characters)
VPDN Process
This section describes the steps for processing VPDN requests in a standard
environment.
1. A VPDN user dials in to the network access server (NAS) of the regional
service provider (RSP). The standard call/point-to-point protocol (PPP) setup
is done. A username and password are sent to the NAS in the format
username@domain (for example, mary@corporation.us). See Figure D-1 on
page D-2.
Corporation RSP
S6645
ACS ACS
VPDN user
User = mary@corporation.us
2. If VPDN is enabled, the NAS assumes that the user is a VPDN user. The NAS
strips off the “username@” (mary@) portion of the username and authorizes
(not authenticates) the domain portion (corporation.us) with the ACS. See
Figure D-2.
Authorization request
User = corporation.us
ACS ACS
VPDN user
User = mary@corporation.us
3. If the domain authorization fails, the NAS assumes the user is not a VPDN
user. The NAS then authenticates (not authorizes) the user as if the user is a
standard non-VPDN dial user. See Figure D-3 on page D-3.
Corporation
Authorization RSP
failed
S6655
ACS ACS
VPDN user
User = mary@corporation.us
If the ACS authorizes the domain, it returns the Tunnel ID and the IP address
of the home gateway (HG); these are used to create the tunnel. See
Figure D-4.
Corporation RSP
S6647
ACS ACS
VPDN user
User = mary@corporation.us
4. The HG uses its ACS to authenticate the tunnel, where the username is the
name of the tunnel (nas_tun). See Figure D-5 on page D-4.
Username = nas_tun
Authentication request Password = CHAP_stuff
Corporation
RSP
S6649
ACS ACS
VPDN user
User = mary@corporation.us
5. The HG now authenticates the tunnel with the NAS, where the username is
the name of the HG. This name is chosen based on the name of the tunnel, so
the HG might have different names depending on the tunnel being set up. See
Figure D-6.
CHAP challenge
Corporation RSP
S6650
ACS ACS
VPDN user
User = mary@corporation.us
6. The NAS now uses its ACS to authenticate the tunnel from the HG. See
Figure D-7 on page D-5.
Username = home_gate
Password = CHAP_stuff
Corporation RSP
S6651
ACS ACS
VPDN user
User = mary@corporation.us
CHAP response
Corporation RSP
S6652
ACS ACS
VPDN user
User = mary@corporation.us
8. The HG now authenticates the user as if the user dialed directly in to the HG.
The HG might now challenge the user for a password. The Cisco Secure ACS
at RSP can be configured to strip off the @ and domain before it passes the
authentication to the HG. (The user is passed as mary@corporation.us.) The
HG uses its ACS to authenticate the user. See Figure D-9 on page D-6.
Username = mary@corporation.us
Password = secret
Corporation RSP
S6653
ACS ACS
VPDN user
User = mary@corporation.us
VPDN user
User = sue@corporation.us
Username = sue@corporation.us
Password = secret2
VPDN
Corporation customer RSP
S6654
ACS ACS
VPDN user
User = mary@corporation.us
accountActions Specification
Whether you create accountActions by hand in a text editor or through automation
using a third-party system that writes to accountActions, you must adhere to the
accountActions specification and must only use the action codes detailed in
accountActions Format
Each row in accountActions has 14 fields (or columns). Table E-1 lists the fields
that compose accountActions. Table E-1 also reflects the order in which the fields
appear in accountActions.
The one-letter or two-letter abbreviations given in the Mnemonic column are a
shorthand notation used to indicate required fields for each action code in Action
Codes, page E-5.
To see an example accountActions, see An Example of accountActions,
page E-38.
Size (Max.
Field Name Mnemonic Type Length) Comments
SequenceId SI AutoNumber 32 The unique action ID.
Priority P Integer 1 The priority with which this update is to
be treated. 0 is the lowest priority.
UserName UN String 32 The name of the user to which the
transaction applies.
GroupName GN String 32 The name of the group to which the
transaction applies.
Action A Number 0-216 The Action required. (See Action Codes,
page E-5.)
ValueName VN String 255 The name of the parameter to change.
Value1 V1 String 255 The new value (for numeric parameters,
this is a decimal string).
Value2 V2 String 255 The name of a TACACS+ protocol; for
example, “ip” or RADIUS VSA Vendor
ID.
Size (Max.
Field Name Mnemonic Type Length) Comments
Value3 V3 String 255 The name of a TACACS+ service; for
example, “ppp” or the RADIUS VSA
attribute number.
DateTime DT DateTime — The date/time the Action was created.
MessageNo MN Integer — Used to number related transactions for
audit purposes.
ComputerNames CN String 32 RESERVED by CSDBSync.
AppId AI String 255 The type of configuration parameter to
change.
Status S Number 32 TRI-STATE:0=not processed, 1=done,
2=failed. This should normally be set to
0.
Note The UserName and GroupName fields are mutually exclusive; only one of these
two fields can have a value and neither field is always required.
Note When changing transaction priorities, be careful that they are processed in the
correct order; for example, a user account must be created before the user
password is assigned.
You can use the MessageNo field (mnemonic: MN) to associate related
transactions, such as the addition of a user and subsequent actions to set password
values and status. You can use the MessageNo field to create an audit trail for a
third-party system that writes to accountActions.
Action Codes
This section provides the action codes valid for use in the Action field (mnemonic:
A) of accountActions. The Required column uses the field mnemonic names to
indicate which fields should be completed, except for the mandatory fields, which
are assumed. For more information about the mnemonic names of accountActions
fields, see Table E-1 on page E-2. For more information about the mandatory
fields, see accountActions Mandatory Fields, page E-3.
If an action can be applied to either a user or group, “UN|GN” appears, using the
vertical bar to indicate that either one of the two fields is required. To make the
action affect only the user, leave the group name empty; to make the action affect
only the group, leave the user name empty.
This section contains the following topics:
• Action Codes for Setting and Deleting Values, page E-5
• Action Codes for Creating and Modifying User Accounts, page E-7
• Action Codes for Initializing and Modifying Access Filters, page E-15
• Action Codes for Modifying TACACS+ and RADIUS Group and User
Settings, page E-19
• Action Codes for Modifying Network Configuration, page E-27
Action
Code Name Required Description
1 SET_VALUE UN|GN, AI, Sets a value (V1) named (VN) of type (V2) for App ID
VN, V1, V2 (AI).
App IDs (AI) can be one of the following:
• APP_CSAUTH
• APP_CSTACACS
• APP_CSRADIUS
• APP_CSADMIN
Value types (V2) can be one of the following:
• TYPE_BYTE—Single 8-bit number.
• TYPE_SHORT—Single 16-bit number.
• TYPE_INT—Single 32-bit number.
• TYPE_STRING—Single string.
• TYPE_ENCRYPTED_STRING—Single string
to be saved encrypted.
• TYPE_MULTI_STRING—Tab-separated set of
substrings.
• TYPE_MULTI_INT—Tab-separated set of
32-bit numbers.
For example:
UN = “fred”
AI = “APP_CSAUTH”
VN = “My Value”
V2 = “TYPE_MULTI_STRING”
V1 = “str1tabstr2tab str3”
2 DELETE_VALUE UN|GN, AI, Deletes value (VN) for App ID (AI) and user (UN) or
VN group (GN).
Note Before you can modify a user account, such as assigning a password, you must
create the user account, either in the HTML interface or by using the ADD_USER
action (action code: 100).
Transactions using these codes affect the configuration displayed in the User
Setup section of the HTML interface. For more information about the User Setup
section, see Chapter 7, “User Management.”
Action
Code Name Required Description
100 ADD_USER UN|GN, V1 Creates a user (32 characters maximum). V1 is used as
the initial password. Optionally, the user can also be
assigned to a group.
101 DELETE_USER UN Removes a user.
102 SET_PAP_PASS UN, V1 Sets the PAP password for a user (64 ASCII characters
maximum). CHAP/ARAP will also default to this.
103 SET_CHAP_PASS UN, V1 Sets the CHAP/ARAP password for a user (64 characters
maximum).
104 SET_OUTBOUND UN, V1 Sets the CHAP/ARAP password for a user (32 characters
_CHAP_PASS maximum).
Action
Code Name Required Description
105 SET_T+_ENABLE UN, VN, Sets the TACACS+ enable password (V1) (32 characters
_PASS V1, V2, V3 maximum) and Max Privilege level (V2) (0-15).
The enable type (V3) should be one of the following:
• ENABLE_LEVEL_AS_GROUP—Max privilege
taken from group setting.
• ENABLE_LEVEL_NONE—No T+ enable
configured.
• ENABLE_LEVEL_STATIC—Value set in V2 used
during enable level check.
You can use VN to link the enable password to an external
authenticator, as per action 108 SET_PASS_TYPE.
106 SET_GROUP UN, GN Sets the Cisco Secure ACS group assignment of the user.
Action
Code Name Required Description
108 SET_PASS_TYPE UN|GN, V1 Sets the password type of the user. This can be one of the
CiscoSecure user database password types or any of the
external databases supported:
• PASS_TYPE_CSDB—CSDB internal password.
• PASS_ TYPE_CSDB_UNIX—CSDB internal
password (UNIX encrypted).
• PASS_TYPE_NT—External Windows user
database password.
• PASS_TYPE_NDS—External Novell database
password.
• PASS_TYPE_LDAP—External generic LDAP
database password.
• PASS_TYPE_SDI—External RSA Security
database password.
• PASS_TYPE_ANPI—External PassGo database
password.
• PASS_TYPE_ENIGMA—External SafeWord
database password.
• PASS_TYPE_CRYPTO—External CRYPTOCard
database password.
• PASS_TYPE_LEAP—External LEAP proxy
RADIUS server database password.
• PASS_TYPE_ACTIVCARD—External ActivCard
database password.
• PASS_TYPE_VASCO—External Vasco database
password.
• PASS_TYPE_RADIUS_TOKEN—External
RADIUS token server database password.
Action
Code Name Required Description
109 REMOVE_PASS_ UN,V1 Removes a password status flag. This results in the status
STATUS states being linked in a logical XOR condition. V1 should
contain one of the following:
• PASS_STATUS_EXPIRES—Password expires on a
given date.
• PASS_STATUS_NEVER—Password never expires.
• PASS_STATUS_WRONG—Password expires after
a given number of login attempts using the wrong
password.
• PASS_STATUS_DISABLED—The account has
been disabled.
110 ADD_PASS_ UN, V1 Defines how a password should be expired by
STATUS Cisco Secure ACS. To set multiple password states for a
user, use multiple instances of this action. This results in
the status states being linked in a logical XOR condition.
V1 should contain one of the following:
• PASS_STATUS_EXPIRES—Password expires on a
given date.
• PASS_STATUS_NEVER—Password never expires.
• PASS_STATUS_WRONG—Password expires after
a given number of login attempts using the wrong
password.
• PASS_STATUS_RIGHT—Password expires after a
given number of login attempts using the correct
password.
• PASS_STATUS_DISABLED—The account has
been disabled.
112 SET_PASS_ UN,V1 Sets the maximum number of bad authentications
EXPIRY_WRONG allowed (automatic reset on good password if not
exceeded) and reset current count.
Action
Code Name Required Description
113 SET_PASS_ UN,V1 Sets the date on which the account expires. The date
EXPIRY_DATE format should be YYYYMMDD.
114 SET_MAX_SESSI UN|GN,V1 Sets the maximum number of simultaneous sessions for a
ONS user or group. V1 should contain one of the following
values:
• MAX_SESSIONS_UNLIMITED
• MAX_SESSIONS_AS_GROUP
• 1-65534
115 SET_MAX_ GN,V1 Sets the max sessions for a user of the group to one of the
SESSIONS_ following values:
GROUP_USER • MAX_SESSIONS_UNLIMITED
• 1-65534
Action
Code Name Required Description
260 SET_QUOTA VN,V1,V2 Sets a quota for a user or group.
VN defines the quota type. Valid values are:
• online time—The quota limits the user or group by
the number of seconds logged in to the network for
the period defined in V2.
• sessions—The quota limits the user or group by the
number of sessions on the network for the period
defined in V2.
V1 defines the quota. If VN is set to sessions, V1 is the
maximum number of sessions in the period defined in V2.
If VN is set to online time, V1 is the maximum number of
seconds.
V2 holds the period for the quota. Valid values are:
• QUOTA_PERIOD_DAILY—The quota is enforced
in 24-hour cycles, from 12:01 A.M. to midnight.
• QUOTA_PERIOD_WEEKLY—The quota is
enforced in 7-day cycles, from 12:01 A.M. Sunday
until midnight Saturday.
• QUOTA_PERIOD_MONTHLY—The quota is
enforced in monthly cycles, from 12:01 A.M. on the
first of the month until midnight on the last day of the
month.
• QUOTA_PERIOD_ABSOLUTE—The quota is
enforced in an ongoing basis, without an end.
Action
Code Name Required Description
261 DISABLE_QUOTA UN|GN,VN Disables a group or user usage quota.
VN defines the quota type. Valid values are:
• online time—The quota limits the user or group by
the number of seconds logged in to the network for
the period defined in V2.
• sessions—The quota limits the user or group by the
number of sessions on the network for the period
defined in V2.
262 RESET_ UN|GN Resets usage quota counters for a user or group.
COUNTERS
263 SET_QUOTA_ V1 Defines whether a user usage quota is determined by the
APPLY_TYPE user group quota or by a quota unique to the user. V1
makes this specification. Valid values for V1 are:
• ASSIGNMENT_FROM_USER
• ASSIGNMENT_FROM_GROUP
Action
Code Name Required Description
270 SET_DCS_TYPE UN|GN, Sets the type of device command set (DCS) authorization
VN,V1, for a group or user.
Optionally VN defines the service. Valid service types are:
V2
• shell—Cisco IOS shell command authorization.
• pixshell—Cisco PIX command authorization.
Note If additional DCS types have been added to your
Cisco Secure ACS, you can find the valid value in
the Interface Configuration page for TACACS+
(Cisco IOS). The valid values appear in
parentheses after the service title, such as PIX
Shell (pixshell).
Action
Code Name Required Description
271 SET_DCS_NDG_ UN|GN,VN Use this action code to map between the device command
MAP ,V1,V2 set and the NDG when the assignment type specified by a
270 action code is ndg.
VN defines the service. Valid service types are:
• shell—Cisco IOS shell command authorization.
• pixshell—Cisco PIX command authorization.
Note If additional DCS types have been added to your
Cisco Secure ACS, you can find the valid value in
the Interface Configuration page for TACACS+
(Cisco IOS). The valid values appear in
parentheses after the service title, such as PIX
Shell (pixshell).
Transactions using these codes affect the configuration displayed in the User
Setup and Group Setup sections of the HTML interface. For more information
about the User Setup section, see Chapter 7, “User Management.” For more
information about the Group Setup section, see Chapter 6, “User Group
Management.”
Table E-4 Action Codes for Initializing and Modifying Access Filters
Action
Code Name Required Description
120 INIT_NAS_ACCESS_ UN|GN, Clears the AAA client access filter list and initialize
CONTROL V1 permit/deny for any forthcoming filters. V1 should
be one of the following values:
• ACCESS_PERMIT
• ACCESS DENY
121 INIT_DIAL_ACCESS_ UN|GN, Clears the dial-up access filter list and initialize
CONTROL V1 permit/deny for any forthcoming filters. V1 should
be one of the following values:
• ACCESS_PERMIT
• ACCESS DENY
122 ADD_NAS_ACCESS_ UN|GN, Adds a AAA client filter for the user|group.
FILTER V1
V1 should contain a single (AAA client name, AAA
client port, remote address, CLID) tuple; for
example:
NAS01,tty0,0898-69696969
Table E-4 Action Codes for Initializing and Modifying Access Filters (continued)
Action
Code Name Required Description
123 ADD_DIAL_ACCESS_ UN|GN, Adds a dial-up filter for the user|group.
FILTER V1, V2 V1 should contain one of the following values:
• Calling station ID
• Called station ID
• Calling and called station ID; for example:
01732-875374,0898-69696969
Table E-4 Action Codes for Initializing and Modifying Access Filters (continued)
Action
Code Name Required Description
140 SET_TODDOW_ UN|GN, Sets periods during which access is permitted. V1
ACCESS V1 contains a string of 168 characters. Each character
represents a single hour of the week. A “1”
represents an hour that is permitted, while a “0”
represents an hour that is denied. If this parameter is
not specified for a user, the group setting applies.
The default group setting is “111111111111” and so
on.
150 SET_STATIC_IP UN, V1, Configures the (TACACS+ and RADIUS) IP address
V2 assignment for this user.
V1 holds the IP address in the following format:
xxx.xxx.xxx.xxx
V2 should be one of the following:
• ALLOC_METHOD_STATIC—The IP address
in V1 is assigned to the user in the format
xxx.xxx.xxx.xxx.
• ALLOC_METHOD_NAS_POOL—The IP
pool named in V1 (configured on the AAA
client) will be assigned to the user.
• ALLOC_METHOD_AAA_POOL—The IP
pool named in V1 (configured on the AAA
server) will be assigned to the user.
• ALLOC_METHOD_CLIENT—The dial-in
client will assign its own IP address.
• ALLOC_METHOD_AS_GROUP—The IP
address assignment configured for the group will
be used.
Table E-4 Action Codes for Initializing and Modifying Access Filters (continued)
Action
Code Name Required Description
151 SET_CALLBACK_NO UN|GN, Sets the callback number for this user or group
V1 (TACACS+ and RADIUS). V1 should be one of the
following:
• Callback number—The phone number the
AAA client is to call back.
• none—No callback is allowed.
• roaming—The dial-up client determines the
callback number.
• as group—Use the callback string or method
defined by the group.
Table E-5 Action Codes for Modifying TACACS+ and RADIUS Group and User Settings
Action
Code Name Required Description
161 DEL_RADIUS_ UN|GN, VN, Deletes the named RADIUS attribute for the group or user,
ATTR Optionally where:
V2, V3
• VN = “Vendor-Specific”
• V2 = IETF vendor ID
• V3 = VSA attribute ID
For example, to specify the Cisco IOS/PIX vendor ID and
the Cisco AV Pair:
VN = “Vendor-Specific”
V2 = “9”
V3 = “1”
Table E-5 Action Codes for Modifying TACACS+ and RADIUS Group and User Settings (continued)
Action
Code Name Required Description
163 ADD_RADIUS UN|GN, VN, Adds the numbered attribute (VN) to value (V) for the
_ ATTR V1, user/group (UN|GN). For example, to set the IETF
Optionally RADIUS Reply-Message attribute (attr. 18) for a group:
V2, V3 GN = “Group 1"
VN = “18”
V1 = “Greetings”
Table E-5 Action Codes for Modifying TACACS+ and RADIUS Group and User Settings (continued)
Action
Code Name Required Description
170 ADD_TACACS UN|GN, VN, Permits the service for that user or group of users. For
_SERVICE V1, V3, example:
Optionally GN = “Group 1"
V2 V1 = “ppp”
V2 = “ip”
or
UN = “fred”
V1 = “ppp”
V2 = “ip”
or
UN = “fred”
V1= “exec”
171 REMOVE_ UN|GN, V1 Denies the service for that user or group of users. For
TACACS_ Optionally example:
SERVICE V2 GN = “Group 1"
V1 = “ppp”
V2 = “ip”
or
UN = “fred”
V1 = “ppp”
V2 = “ip”
or
UN = “fred”
V1 = “exec”
Table E-5 Action Codes for Modifying TACACS+ and RADIUS Group and User Settings (continued)
Action
Code Name Required Description
172 ADD_TACACS UN|GN, VN, Sets a service-specific attribute. The service must already
_ATTR V1, V3 have been permitted either via the HTML interface or using
Optionally Action 170:
V2 GN = “Group 1"
VN = “routing”
V1 = “ppp”
V2 = “ip”
V3 = “true”
or
UN = “fred”
VN = “route”
V1 = “ppp”
V2 = “ip”
V3 = 10.2.2.2
173 REMOVE_ UN|GN, VN, Removes a service-specific attribute:
TACACS_ATTR V1 GN = “Group 1"
Optionally V1 = “ppp”
V2 = “ip”
V2 VN = “routing”
or
UN = “fred”
V1 = “ppp”
V2 = “ip”
VN = “route”
Table E-5 Action Codes for Modifying TACACS+ and RADIUS Group and User Settings (continued)
Action
Code Name Required Description
174 ADD_IOS_ UN|GN, VN, Authorizes the given Cisco IOS command and determines
COMMAND V1 if any arguments given to the command are to be found in
a defined set or are not to be found in a defined set. The
defined set is created using Actions 176 and 177:
GN = “Group 1"
VN = “telnet”
V1 = “permit”
or
UN = “fred”
VN = “configure”
V1 = “deny”
or
UN = “fred”
VN = “configure”
Table E-5 Action Codes for Modifying TACACS+ and RADIUS Group and User Settings (continued)
Action
Code Name Required Description
176 ADD_IOS_ UN|GN, VN, Specifies a set of command-line arguments that are either
COMMAND_ V1, V2 permitted or denied for the Cisco IOS command contained
ARG in VN. The command must have already been added via
Action 174:
GN = “Group 1"
VN = “telnet”
V1 = “permit”
V2 = “10.1.1.2”
or
UN = “fred”
VN = “show”
V1 = “deny”
V2 = “run”
or
UN = “fred”
VN = “show”
V2 = “run”
Table E-5 Action Codes for Modifying TACACS+ and RADIUS Group and User Settings (continued)
Action
Code Name Required Description
178 SET_PERMIT_ UN|GN, V1 Sets unmatched Cisco IOS command behavior. The default
DENY_ is that any Cisco IOS commands not defined via a
UNMATCHED_ combination of Actions 174 and 175 will be denied. This
IOS_ behavior can be changed so that issued Cisco IOS
COMMANDS commands that do not match any command/command
argument pairs are authorized:
GN = “Group 1"
V1 = “permit”
or
UN = “fred”
V1 = “deny”
Action
Code Name Required Description
220 ADD_NAS VN, V1, Adds a new AAA client (named in VN) with an IP address (V1),
V2, V3 shared secret key (V2), and vendor (V3). Valid vendors are as
follows:
• VENDOR_ID_IETF_RADIUS—For IETF RADIUS.
• VENDOR_ID_CISCO_RADIUS—For Cisco IOS/PIX
RADIUS.
• VENDOR_ID_CISCO_TACACS—For Cisco TACACS+.
• VENDOR_ID_ASCEND_RADIUS—For Ascend
RADIUS.
• VENDOR_ID_ALTIGA_RADIUS—For Cisco VPN 3000
RADIUS.
• VENDOR_ID_COMPATIBLE_RADIUS—For Cisco VPN
5000 RADIUS.
• VENDOR_ID_AIRONET_RADIUS—For Cisco Aironet
RADIUS.
• VENDOR_ID_NORTEL_RADIUS—For Nortel RADIUS.
• VENDOR_ID_JUNIPER_RADIUS—For Juniper
RADIUS.
• VENDOR_ID_CBBMS_RADIUS—For Cisco BBMS
RADIUS.
For example:
VN = AS5200-11
V1 = 192.168.1.11
V2 = byZantine32
V3 = VENDOR_ID_CISCO_RADIUS
Action
Code Name Required Description
221 SET_NAS_ VN, V1 Sets one of the per-AAA client flags (V1) for the named AAA
FLAG client (VN). Use the action once for each flag required. Valid
values for per-AAA client flags are as follows:
• FLAG_SINGLE_CONNECT
• FLAG_LOG_KEEP_ALIVE
• FLAG_LOG_TUNNELS
222 DEL_HOST VN Deletes the named AAA client (VN).
223 ADD_NAS_ VN,V1, Adds a new AAA client (named in VN) with an IP address (V1),
BY_IETF_ V2, V3 shared secret key (V2), and the enterprise code for the vendor
CODE (V3).
230 ADD_AAA_ VN, V1, Adds a new AAA server named (VN) with IP address (V1),
SERVER V2 shared secret key (V2).
231 SET_AAA_ VN, V1 Sets the AAA server type for server (VN) to value in V1, which
TYPE should be one of the following:
• TYPE_ACS
• TYPE_TACACS
• TYPE_RADIUS
• The default is AAA_SERVER_TYPE_ACS
232 SET_AAA_ VN, V1 Sets one of the per-AAA client flags (V1) for the named AAA
FLAG server (VN):
• FLAG_LOG_KEEP_ALIVE
• FLAG_LOG_TUNNELS
Use the action once for each flag required.
Action
Code Name Required Description
233 SET_AAA_ VN, V1 Sets the appropriate traffic type (V1) for the named AAA server
TRAFFIC_ (VN):
TYPE • TRAFFIC_TYPE_INBOUND
• TRAFFIC_TYPE_OUTBOUND
• TRAFFIC_TYPE_BOTH
The default is TRAFFIC_TYPE_BOTH.
234 DEL_AAA_ VN Deletes the named AAA server (VN).
SERVER
240 ADD_ VN, V1, Adds a new proxy markup (VN) with markup type (V1) strip
PROXY V2, V3 markup flag (V2) and accounting flag (V3).
The markup type (V1) must be one of the following:
• MARKUP_TYPE_PREFIX
• MARKUP_TYPE_SUFFIX
The markup strip flag should be TRUE if the markup is to be
removed from the username before forwarding.
The accounting flag (V3) should be one of the following:
• ACCT_FLAG_LOCAL
• ACCT_FLAG_REMOTE
• ACCT_FLAG_BOTH
241 ADD_ VN, V1 Adds to named proxy markup (VN) the host name (V1). The host
PROXY_ should already be configured on the Cisco Secure ACS.
TARGET
Note The order in which proxy targets are added sets the proxy
search order; the first target added is the first target
proxied to, and so on. The order must be changed through
the HTML interface.
242 DEL_ VN Deletes the named proxy markup (VN).
PROXY
250 ADD_NDG VN Creates a network device group (NDG) named (VN).
Action
Code Name Required Description
251 DEL_NDG VN Deletes the named NDG.
252 ADD_HOST VN, V1 Adds to the named AAA client/AAA server (VN) the NDG (V1).
_TO_NDG
270 SET_DCS_ — —
ASSIGNME
NT
271 ADD_NDG_ — —
TO_DCS_
MAPPING
300 RESTART_ — Restarts the CSRadius and CSTacacs services to apply new
PROTO_ settings.
MODULES
350 ADD_UDV VN, V1, Adds a RADIUS vendor to the Cisco Secure ACS vendor
V2 database. Vendors added to Cisco Secure ACS by this method are
know as User-Defined Vendors (UDV).
VN contains the name of the Vendor.
Note Cisco Secure ACS adds “RADIUS(...)” to the name
entered in the Variable Name field. For example, if you
enter the name “MyCo”, Cisco Secure ACS displays
“RADIUS (MyCo)” in the HTML interface.
Action
Code Name Required Description
351 DEL_UDV V1 Removes the vendor with the IETF code specified in V1 and any
defined VSAs.
Note Action code 351 does not remove any instances of VSAs
assigned to Cisco Secure ACS groups or users. If
Cisco Secure ACS has AAA clients configured with the
UDV specified in V1, the delete operation fails.
352 ADD_VSA VN, V1, Adds a new VSA to the vendor specified by the vendor IETF code
V2, V3 in V1.
VN is the VSA name. If the vendor name is MyCo and the
attribute is assigned a group ID, we recommend prefixing the
vendor name or an abbreviation to all VSAs. For example, VSAs
could be “MyCo-Assigned-Group-Id”.
Note VSA names must be unique to both the vendor and to the
Cisco Secure ACS dictionary. For example,
“MyCo-Framed-IP-Address” is allowed but
“Framed-IP-Address” is not, because
“Framed-IP-Address” is used by IETF action code 8 in
the RADIUS attributes.
Action
Code Name Required Description
353 SET_VSA_ V1, V2, V3 Sets the inbound/outbound profile of the VSA. The profile
PROFILE specifies usage “IN” for accounting, “OUT” for authorization, or
“MULTI” if more than a singe instance is allowed per RADIUS
message. Combinations are allowed.
V1 contains the vendor IETF code.
V2 contains the VSA number.
V3 contains the profile, one of the following:
IN
OUT
IN OUT
MULTI OUT
MULTI IN OUT
354 ADD_VSA_ VN, V1, Sets meaningful enumerated values, if the VSA attribute has
ENUM V2, V3 enumerated. In the User Setup section, the Cisco Secure ACS
HTML interface displays the enumeration strings in a list.
VN contains the VSA Enum Name.
V1 contains the vendor IETF code.
V2 contains the VSA number.
V3 contains the VSA Enum Value.
Example:
VN = Disabled
V1 = 9034
V2 = MyCo-Encryption
V3 = 0
or
VN = Enabled
V1 = 9034
V2 = MyCo-Encryption
V3 = 1
355 ADOPT_ — Restarts the CSAdmin, CSRadius, and CSLog services. These
NEW_UDV_ services must be restarted before new UDVs or VSAs can become
OR_VSA usable.
User-Specific Attributes
Table E-7 lists the attributes that define a Cisco Secure ACS user, including their
data types, limits, and default values. It also provides the action code you can use
in accountActions to affect each attribute. Although there are many actions
available, adding a user requires only one transaction: ADD_USER. You can
safely leave other user attributes at their default values. The term NULL is not
simply an empty string, but means not set; that is, the value will not be processed.
Some features are processed only if they have a value assigned to them. For more
information about action codes, see Action Codes, page E-5.
User-Defined Attributes
User-defined attributes (UDAs) are string values that can contain any data, such
as social security number, department name, telephone number, and so on. You
can configure Cisco Secure ACS to include UDAs on accounting logs about user
activity. For more information about configuring UDAs, see User Data
Configuration Options, page 3-3.
RDBMS Synchronization can set UDAs by using the SET_VALUE action (code
1) to create a value called “USER_DEFINED_FIELD_0” or
“USER_DEFINED_FIELD_1”. For accountActions rows defining a UDA value,
the AppId (AI) field must contain “APP_ CSAUTH” and the Value2(V2) field
must contain “TYPE_STRING”.
Table E-8 on page E-37 lists the data fields that define UDAs. For more
information about action codes, see Action Codes, page E-5.
Username
Action (UN) ValueName (VN) Value1 (V1) Value2 (V2) AppId (AI)
1 fred USER_DEFINED_FIELD SS123456789 TYPE_STRING APP_CSAUTH
_0
1 fred USER_DEFINED_FIELD Engineering TYPE_STRING APP_CSAUTH
_1
1 fred USER_DEFINED_FIELD 949-555-1111 TYPE_STRING APP_CSAUTH
_2
Note If more than two UDAs are created, only the first two are passed to accounting
logs.
Group-Specific Attributes
Table E-9 lists the attributes that define a Cisco Secure ACS group, including
their data types, limits, and default values. It also provides the action code you can
use in your accountActions table to affect each field. For more information about
action codes, see Action Codes, page E-5.
An Example of accountActions
Table E-10 on page E-39 presents an sample instance of accountActions that
contains some of the action codes described in Action Codes, page E-5. First user
“fred” is created, along with his passwords, including a TACACS_ Enable
password with privilege level 10. Fred is assigned to “Group 2." His account
expires after December 31, 1999, or after 10 incorrect authentication attempts.
Attributes for Group 2 include Time-of-Day/Day-of-Week restrictions, token
caching, and some RADIUS attributes.
Note This example omits several columns that should appear in any accountActions
table. The omitted columns are Sequence ID (SI), Priority (P), DateTime (DT),
and MessageNo (MN).
• CSTacacs
• CSRadius
You can stop or restart Cisco Secure ACS services as a group, except for
CSAdmin, using the Cisco Secure ACS HTML interface. For more information,
see Service Control, page 8-2.
Individual Cisco Secure ACS services can be started, stopped, and restarted from
the appliance serial console. For more information about starting, stopping, and
restarting services using the serial console, see the Installation and Setup Guide
for Cisco Secure ACS Appliance.
CSAdmin
CSAdmin is the service that provides the web server for the Cisco Secure ACS
HTML interface. After Cisco Secure ACS is installed, you must configure it from
its HTML interface; therefore, CSAdmin must be running when you configure
Cisco Secure ACS.
Because the Cisco Secure ACS web server uses port 2002 rather than the standard
port 80 usually associated with HTTP traffic, you can use another web server on
the same machine to provide other web services. We have not performed
interoperability testing with other web servers, but unless a second web server is
configured to use either port 2002 or one of the ports within the range specified
in the HTTP Port Allocation feature, you should not encounter port conflicts for
HTTP traffic. For more information about the HTTP Port Allocation feature, see
Access Policy, page 12-11.
Note For more information about access to the HTML interface and network
environments, see Network Environments and Administrative Sessions,
page 1-27.
Although you can start and stop services from within the Cisco Secure ACS
HTML interface, this does not include starting or stopping CSAdmin. If CSAdmin
stops abnormally because of an external action, you can only restart the service
using the appliance serial console. For more information about starting, stopping,
and restarting services using the serial console, see the Installation and Setup
Guide for Cisco Secure ACS Appliance.
CSAuth
CSAuth is the authentication and authorization service. It permits or denies access
to users by processing authentication and authorization requests. CSAuth
determines if access should be granted and defines the privileges for a particular
user. CSAuth is the Cisco Secure ACS database manager.
To authenticate users, Cisco Secure ACS can use the internal user database or one
of many external databases. When a request for authentication arrives,
Cisco Secure ACS checks the database that is configured for that user. If the user
is unknown, Cisco Secure ACS checks the database(s) configured for unknown
users. For more information about how Cisco Secure ACS handles authentication
requests for unknown users, see Unknown User Processing, page 14-2.
For more information about the various database types supported by Cisco Secure
ACS, see Chapter 13, “User Databases.”
When a user has authenticated, Cisco Secure ACS obtains a set of authorizations
from the user profile and the group to which the user is assigned. This information
is stored with the username in the CiscoSecure user database. Some of the
authorizations included are the services to which the user is entitled, such as IP
over PPP, IP pools from which to draw an IP address, access lists, and
password-aging information. The authorizations, with the approval of
authentication, are then passed to the CSTacacs or CSRadius modules to be
forwarded to the requesting device.
CSDBSync
CSDBSync is the service used to synchronize the Cisco Secure ACS database
with data from comma-separated value files. CSDBSync synchronizes AAA
client, AAA server, network device groups (NDGs) and Proxy Table information.
For information on RDBMS Synchronization, see RDBMS Synchronization,
page 9-24.
CSLog
CSLog is the service used to capture and place logging information. CSLog
gathers data from the TACACS+ or RADIUS packet and CSAuth, and then
manipulates the data to be placed into the comma-separated value (CSV) files.
CSV files can be imported into spreadsheets that support this format.
For information about the logs generated by Cisco Secure ACS, see Chapter 1,
“Overview.”
CSMon
CSMon is a service that helps minimize downtime in a remote access network
environment. CSMon works for both TACACS+ and RADIUS and automatically
detects which protocols are in use.
You can use the Cisco Secure ACS HTML interface to configure the CSMon
service. The Cisco Secure ACS Active Service Management feature provides
options for configuring CSMon behavior. For more information, see Cisco Secure
ACS Active Service Management, page 8-17.
Monitoring
CSMon monitors the overall status of Cisco Secure ACS and the system on which
it is running. CSMon actively monitors three basic sets of system parameters:
• Generic host system state—CSMon monitors the following key system
thresholds:
– Available hard disk space
– Processor utilization
– Physical memory utilization
All events related to generic host system state are categorized as “warning
events”.
• Application-specific performance
– Application viability—CSMon periodically performs a test login using
a special built-in test account (the default period is one minute).
Problems with this authentication can be used to determine if the service
has been compromised.
– Application performance thresholds—CSMon monitors and records
the latency of each test authentication request (the time it takes to receive
a positive response). Each time this is performed, CSMon updates a
variable containing the average response time value. Additionally, it
records whether retries were necessary to achieve a successful response.
By tracking the average time for each test authentication, CSMon can
build up a “picture” of expected response time on the system in question.
CSMon can therefore detect whether excess re-tries are required for each
authentication or if response times for a single authentication exceed a
percentage threshold over the average.
• System resource consumption by Cisco Secure ACS—CSMon periodically
monitors and records the usage by Cisco Secure ACS of a small set of key
system resources and compares it against predetermined thresholds for
indications of atypical behavior. The parameters monitored include the
following:
– Handle counts
– Memory utilization
– Processor utilization
– Thread used
– Failed log-on attempts
CSMon cooperates with CSAuth to keep track of user accounts being disabled by
exceeding their failed attempts count maximum. This feature is more oriented to
security and user support than to system viability. If configured, it provides
immediate warning of “brute force” attacks by alerting the administrator to a large
number of accounts becoming disabled. In addition, it helps support technicians
anticipate problems with individual users gaining access.
Recording
CSMon records exception events in a CSV log that you can use to diagnose
problems. Because this logging consumes relatively small amounts of resources,
CSMon logging cannot be disabled.
Notification
CSMon can be configured to notify system administrators in the following cases:
• Exception events
• Response
• Outcome of the response
Notification for exception events and outcomes includes the current state of
Cisco Secure ACS at the time of the message. The default notification method is
simple mail-transfer protocol (SMTP) e-mail, but you can create scripts to enable
other methods.
Response
CSMon detects exception events that affect the integrity of the service and can
respond to events. For information about monitored events, see Monitoring,
page F-5. These events are application-specific and hard-coded into Cisco Secure
ACS. There are two types of responses:
• Warning events—Service is maintained but some monitored threshold is
breached.
• Failure events—One or more Cisco Secure ACS components stop providing
service.
CSMon responds to the event by logging the event, sending notifications (if
configured) and, if the event is a service failure, taking action. CSMon provides
several options for responding to service failures. These actions are hard-coded
into the program and are always carried out when a triggering event is detected.
For more information about response options, see System Monitoring Options,
page 8-18.
If the event is a warning event, it is logged and the administrator is notified. No
further action is taken. CSMon also attempts to fix the cause of the failure after a
sequence of re-tries and individual service restarts.
editing 4-27
A
enabling in interface (table) 3-5
AAA functions and concepts 1-4
See also AAA clients in distributed systems 4-3
See also AAA servers master 9-3
definition 1-1 overview 4-22
pools for IP address assignment 7-10 primary 9-3
AAA clients replicating 9-3
AAA Clients table 4-2 searching for 4-9
adding and configuring 4-17 secondary 9-3
configuration 4-11 troubleshooting A-1
definition 1-5 access devices 1-5
deleting 4-21 accessing Cisco Secure ACS
editing 4-20 how to 1-29
interaction with AAA servers 1-5 URL 1-27
IP pools 7-10 with SSL enabled 1-27
multiple IP addresses for 4-12 access policies
searching for 4-9 See administrative access policies
supported Cisco AAA clients 1-2 accountActions File 9-28
timeout values 14-8 account disablement
AAA servers Account Disabled check box 7-4
AAA Servers table 4-2 manual 7-55
adding 4-25 resetting 7-57
configuring 4-22 setting options for 7-19
deleting 4-28 accounting
certificate database for LDAP servers 13-47 Cisco Secure ACS administration
overview 1-21
certification
Cisco Secure ACS Backup and Restore log
See also EAP-TLS
viewing 11-14
See also PEAP
Cisco Secure ACS backups
adding certificate authority certificates 10-36
See backups
background 10-1
Cisco Secure ACS service management
backups 8-9
event logging configuration 8-20
certificate enrollment 10-33
system monitoring
certificate signing request generation 10-39
configuring 8-19
editing the certificate trust list 10-38
options 8-18
installing certificate 10-33
Cisco Secure ACS Service Monitoring log
replacing certificate 10-40
CSV (comma-separated values) file
updating certificate 10-40 directory 11-26
CHAP Cisco Secure ACS system restore
compatible databases 1-9 See restore
in User Setup 7-4 CiscoSecure Authentication Agent 1-15, 6-20
protocol supported 1-10 CiscoSecure database replication
Cisco IOS See replication
RADIUS CiscoSecure user database
AV (attribute value) pairs C-2 See also databases
group attributes 6-38 overview 13-2
user attributes 7-38 codes
Interface Configuration
H
See also HTML interface
handle counts F-5 advanced options 3-4
hard disk space F-5 configuring 3-1
Help 1-26 customized user data fields 3-3
host and domain names configuration 8-23 security protocol options 3-9
host system state F-5 IP addresses
HTML interface in User Setup 7-9
See also Interface Configuration multiple IP addresses for AAA client 4-12
encrypting 12-13 requirement for CSTacacs and CSRadius F-7
logging off 1-30 setting assignment method for user
overview 1-24 groups 6-27
format 11-1
L
overview 11-4
LAN manager 1-12 remote agent logging
latency in networks 2-17 configuration 11-22
LDAP databases options 11-22
See generic LDAP user databases remote logging
LEAP proxy RADIUS user databases centralized 11-18
configuring external databases 13-56 configuring 11-20
group mappings 15-2 disabling 11-22
overview 13-55 enabling 11-20
RADIUS-based group specifications 15-13 enabling in interface 3-5
list all users local configuration 11-19
in Group Setup 6-53 options 11-19
in User Setup 7-54 overview 11-17
Logged-In Users report replication 9-11
deleting logged-in users 11-10 services
description 11-8 configuring service logs 11-27
viewing 11-9 list of logs generated 11-26
logging system logs 11-12
See also Reports and Activity troubleshooting A-14
accounting logs 11-5 user data attributes 11-2
configuring 11-16, 11-17 watchdog packets 11-3
configuring remote agent logs 11-24, 11-25 logins
debug log detail levels 11-27 greeting upon 6-23
diagnostic logs 8-27 password aging dependency 6-22
domain names 11-2 login testing frequency 8-18
dynamic administration reports 11-7
event logging 8-20
external user databases 11-2