Cisco Acs 57 User Guide
Here you can view all the pages of manual Cisco Acs 57 User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 551
5 Authentication in ACS 5.7 EAP-TLS Overview of EAP-MD5 EAP Message Digest 5-(EAP-MD5) provides one-way client authentication. The server sends the client a random challenge. The client proves its identity by hashing the challenge and its password with MD5. EAP-MD5 is vulnerable to dictionary attacks when it is used over an open medium. This is because hackers are able to see the challenge and response. Since no server authentication occurs, it is also vulnerable to falsification. Related Topics...
Page 552
6 Authentication in ACS 5.7 EAP-TLS Related Topics Configuring CA Certificates, page 83 Certificate-Based Network Access, page 8 ACS and Cisco Security Group Access, page 21 EAP-TLS Flow in ACS 5.7, page 12 User Certificate Authentication EAP-TLS is a mutual authentication method for certificate-based authentication; the client and server authenticate each other by using digital certificates. Certificates must meet specific requirements on the server and client for successful authentication. EAP...
Page 553
7 Authentication in ACS 5.7 EAP-TLS name and the subject alternative name. These restrictions are applicable only when the specified name form is present in the client certificate. The ACS authentication fails if the client certificate is excluded or not permitted by the namespace. Related Topics Configuring CA Certificates, page 83 Certificate-Based Network Access, page 8 PKI Authentication EAP-TLS uses public key infrastructures (PKI) concepts: A host requires a valid certificate to...
Page 554
8 Authentication in ACS 5.7 EAP-TLS PKI Credentials This section contains the following topics: PKI Usage, page 8 Fixed Management Certificates, page 8 Importing Trust Certificates, page 8 Exporting Credentials, page 10 PKI Usage ACS supports using certificates for various PKI use cases. The main use case is the EAP-TLS protocol, where the PKI is used to authenticate not only the server, but also the client (PEAP and EAP-FAST also make use of certificates for server authentication, but do not...
Page 555
9 Authentication in ACS 5.7 EAP-TLS The ACS domain may have more than a single ACS server; each domain should have its own set of PKI key pairs to identify itself through the appropriate interfaces. Some interfaces may require that the certificate that identifies ACS, contain the IP or FQDN of the ACS server, in its Common Name (CN) for better binding of the certificate to the IP of the server, for example, the HTTPS ACS server certificate which is used for the Web interface. For other...
Page 556
10 Authentication in ACS 5.7 EAP-TLS Certificate Generation You can generate ACS server certificates through the Web interface. The output of this process is a certificate or a certificate request and it’s corresponding private-key and password. The generated private-key is structured as PKCS#12 encrypted, by using a relatively strong automatically generated password based on at least 128 bit of randomness. You can select any of these generated private-key lengths: 512, 1024, 2048 or 4096 bit. The...
Page 557
11 Authentication in ACS 5.7 EAP-TLS Credentials Distribution All certificates are kept in the ACS database which is distributed and shared between all ACS nodes. The ACS server certificates are associated and designated for a specific node, which uses that specific certificate. Public certificates are distributed along with the private keys and the protected private key passwords by using the ACS distributed mechanism. ACS implements a method of protection to prevent a private-key to be used by...
Page 558
12 Authentication in ACS 5.7 EAP-TLS EAP-TLS Flow in ACS 5.7 An EAP-TLS server exchanges data with a client by using packets based on the EAP Request and response packets; the packets are extended by specific EAP-TLS data. ACS acts as the EAP-TLS server and uses the Open Secure Sockets Layer (OpenSSL/CiscoSSL) library to process the TLS conversation. The ACS EAP-TLS server produces 128-bit MPPE send and receive keys that are used for encrypted communication between the client and server. The ACS...
Page 559
13 Authentication in ACS 5.7 PEAPv0/1 —Signature check failed. The client dropped cases resulting in malformed EAP packets. EAP-TLS also supports the Session Resume feature. ACS supports the EAP-TLS session resume feature for fast reauthentication of a user who has already passed full EAP-TLS authentication. If the EAP-TLS configuration includes a session timeout period, ACS caches each TLS session for the duration of the timeout period. When a user reconnects within the configured EAP-TLS...
Page 560
14 Authentication in ACS 5.7 PEAPv0/1 It then creates an encrypted SSL/TLS tunnel between the client and the authentication server. The ensuing exchange of authentication information to authenticate the client is then encrypted and user credentials are safe from eavesdropping. PEAP is similar to EAP-TLS but uses a different client authentication method. PEAP provides authentication, by using server certificates, a TLS tunnel and client authentication through that encrypted tunnel. Unlike EAP-TLS,...