Cisco Acs 57 User Guide
Here you can view all the pages of manual Cisco Acs 57 User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 541
5 AAA Protocols Overview of TACACS+ Overview of TACACS+ TACACS+ must be used if the network device is a Cisco device-management application, access server, router, or firewall. ACS 5.7 supports IPv6 addresses in TACACS+ protocols. ACS 5.7 supports Cisco device-management applications by providing command authorization for network users who are using the management application to configure managed network devices. You provide support for command authorization for management application users by...
Page 542
6 AAA Protocols Overview of RADIUS To support the older and newer RFCs, ACS 5.7 accepts authentication requests on port 1645 and port 1812. For accounting, ACS accepts accounting packets on ports 1646 and 1813. RADIUS IETF ACS 5.7 provides a set of standard IETF RADIUS attributes with a set of predefined sub-attributes and values. You can not edit these RADIUS IETF attributes. You can use them in policy conditions. You can identify RADIUS IETF attributes that are currently unused by their names....
Page 543
7 AAA Protocols Overview of RADIUS RA D I U S i s u n i ver sa l l y u se d t o s ec u re t he a c c ess o f e n d - u s er s t o n e t wo r k re s ou rc es. A R A D I U S se r ve r c a n ac t as a p rox y to other RADIUS servers or other kinds of authentication servers. The NAD serves as the network gatekeeper and sends an Access-Request to ACS on behalf of the user. ACS verifies the username, password, and possibly other data by using either the internal identity store, or an...
Page 544
8 AAA Protocols Overview of RADIUS Generic and Cisco VSAs Other vendors’ attributes ACS 5.7 also supports attributes defined in the following extensions to RADIUS: Accounting-related attributes, as defined in RFC 2866. Support for Tunnel Protocol, as defined in RFCs 2867 and 2868. Support for EAP (via the EAP-Message attribute), as defined in RFCs 2869 and 3579. Note: When RADIUS parameters are referenced, the convention [attribute-number] [attribute name] is used. For example, [1]User-Name,...
Page 545
9 AAA Protocols Overview of RADIUS In addition, various EAP-based protocols can be transported over RADIUS, encapsulated within the RADIUS EAP-Message attribute. These can be further categorized with respect to whether or not, and to what extent, they make use of certificates. These include: EAP methods that do not use certificates: —EAP-MD5 —LEAP EAP methods in which the client uses the ACS server certificate to perform server authentication: —PEAP/EAP-MSCHAPv2 —PEAP/EAP-GTC...
Page 546
10 AAA Protocols Overview of RADIUS Access list to apply A static route to install in the NAD routing table The configuration information in the RADIUS server defines which parameters to set on the NAD during installation.
Page 547
1 Cisco Systems, Inc.www.cisco.com Authentication in ACS 5.7 Authentication verifies user information to confirm the user's identity. Traditional authentication uses a name and a fixed password. More secure methods use cryptographic techniques, such as those used inside the Challenge Authentication Handshake Protocol (CHAP), OTP, and advanced EAP-based protocols. ACS supports a variety of these authentication methods. A fundamental implicit relationship exists between authentication and...
Page 548
2 Authentication in ACS 5.7 PA P —EAP-MSCHAPv2, page 27 EAP family of protocols transported over RADIUS, which can be further classified as: —Simple EAP protocols that do not use certificates: EAP-MD5—For more information, see EAP-MD5, page 4. LEAP—For more information, see LEAP, page 29. —EAP protocols that involve a TLS-handshake and in which the client uses the ACS server certificate to perform server authentication: PEAP, using one of the following inner methods: PEAP/EAP-MSCHAPv2 and...
Page 549
3 Authentication in ACS 5.7 EAP Figure 6 RADIUS with PAP Authentication Use Case EAP Extensible Authentication Protocol (EAP) is an authentication framework for wireless networks and point-to-point connections. EAP supports multiple authentication methods, and provides common functions and rules for negotiation of the desired authentication method: Server authentication request Client authentication response Server success authentication result Server failure authentication result Silent...
Page 550
4 Authentication in ACS 5.7 EAP-MD5 2.The host sends an EAP Response to the network device; the network device embeds the EAP packet that it received from the host into a RADIUS request and sends it to ACS, which is acting as the EAP server. 3.ACS negotiates the EAP method for authentication. The client can acknowledge the EAP method that the EAP server suggests or, it can respond with a negative acknowledgment (NAK) and suggest a list of alternative EAP methods. The server and client must reach...