Cisco Acs 57 User Guide
Here you can view all the pages of manual Cisco Acs 57 User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 571
25 Authentication in ACS 5.7 EAP-FAST For information about how master key generation and PAC TTL values determine whether PAC provisioning or PAC refreshing is required, see Master Key Generation and PAC TTLs, page 24. 3.Determine whether you want to use automatic or manual PAC provisioning. For more information about the two means of PAC provisioning, see Automatic In-Band PAC Provisioning, page 21, and Manual PAC Provisioning, page 22. We recommend that you limit the use of Automatic In-Band PAC...
Page 572
26 Authentication in ACS 5.7 EAP-FAST Key Distribution Algorithm The common seed-key is a relatively large and a completely random buffer that is generated by the primary ACS server. The seed-key is generated only once during installation, or it can be manually regenerated by an administrator. The seed-key should rarely be replaced, because if you change seed-key, of all the previous master-keys and PACs would automatically be deactivated. The seed-key is generated by using a RNG generator that...
Page 573
27 Authentication in ACS 5.7 EAP Authentication with RADIUS Key Wrap EAP Authentication with RADIUS Key Wrap You can configure ACS to use PEAP, EAP-FAST and EAP-TLS authentication with RADIUS Key Wrap. ACS can then authenticate RADIUS messages and distribute the session key to the network access server (NAS). The EAP session key is encrypted by using Advanced Encryption Standard (AES), and the RADIUS message is authenticated by using HMAC-SHA-1. Because RADIUS is used to transport EAP messages (in...
Page 574
28 Authentication in ACS 5.7 CHAP MSCHAPv2 for User Authentication, page 28 MSCHAPv2 for Change Password, page 28 Windows Machine Authentication Against AD, page 28 MSCHAPv2 for User Authentication ACS supports the EAP-MSCHAPv2 authentication protocol as the inner method of EAP-FAST and PEAP. The protocol is an encapsulation of MSCHAPv2 into the EAP framework. Mutual authentication occurs against the configured credential database. The client does not send its password, but a cryptographic...
Page 575
29 Authentication in ACS 5.7 LEAP If you are using the ACS internal database for authentication, you can use PAP or CHAP. CHAP does not work with the Windows user database. Compared to RADIUS PAP, CHAP allows a higher level of security for encrypting passwords when communicating from an end-user client to the AAA client. LEAP ACS currently uses LEAP only for Cisco Aironet wireless networking. If you do not enable this option, Cisco Aironet end-user clients who are configured to perform LEAP...
Page 576
30 Authentication in ACS 5.7 Certificate Attributes SAN—otherName If the certificate does not contain the configured attribute, authentication fails. Note: ACS 5.7 supports short hard-coded attributes and certificate attribute verification for the only the EAP-TLS protocol. Certificate Binary Comparison You can perform binary comparison against a certificate that ACS receives from an external identity store and determine the identity store's parameters that will be used for the comparison. Note:...
Page 577
31 Authentication in ACS 5.7 Machine Authentication Possible reasons for revocation of a certificate include suspicion that the associated private key has been compromised or the realization that the certificate was issued improperly. If either of these conditions exist, the certificate is rejected. ACS supports a static-CRL that contains a list of URLs used to acquire the CRL files that are configured in ACS database. Note: ACS does not support delta CRLs in certificate revocation validation. You...
Page 578
32 Authentication in ACS 5.7 Authentication Protocol and Identity Store Compatibility Note: If a computer fails machine authentication and the user has not successfully logged in to the domain by using the computer since the most recent user password change, the cached credentials on the computer will not match the new password. Instead, the cached credentials will match an older password of the user, provided that the user once successfully logged in to the domain from this computer. User network...
Page 579
33 Authentication in ACS 5.7 Authentication Protocol and Identity Store Compatibility Table 45 EAP Authentication Protocol and User Database Compatibility Identity Store EAP-MD5 EAP-TLS1 1. In EAP-TLS authentication, the user is authenticated by cryptographic validation of the certificate. Additionally, ACS 5.7 optionally allows a binary comparison of the user’s certificate sent by the end-user client against the certificate located in the user’s record in the LDAP identity store. PEAP-TLS2 2. In...