Cisco Acs 57 User Guide
Here you can view all the pages of manual Cisco Acs 57 User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 61
21 Common Scenarios Using ACS ACS and Cisco Security Group Access Cisco AnyConnect VPN client 2.3 Series MS VPN client Related Topics VPN Remote Network Access, page 19 Supported Authentication Protocols, page 19 Supported Identity Stores, page 20 Supported VPN Network Access Servers, page 20 Configuring VPN Remote Access Service, page 21 Configuring VPN Remote Access Service To configure a VPN remote access service: 1.Configure the VPN protocols in the Allowed Protocols page of the default...
Page 62
22 Common Scenarios Using ACS ACS and Cisco Security Group Access Security is improved and device management is simplified since devices can be identified by their name rather than IP address. Note: The Cisco Catalyst 6500 running Cisco IOS 12.2(33) SXI and DataCenter 3.0 (Nexus 7000) NX-OS 4.0.3 devices support Security Group Access. The Cisco Catalyst 6500 supports Security Group Tags (SGTs); however, it does not support Security Group Access Control Lists (SGACLs) in this release. To configure...
Page 63
23 Common Scenarios Using ACS ACS and Cisco Security Group Access The location or device type can be used as a condition to configure an NDAC policy rule. 3.Click Submit. Creating Security Groups Security Group Access uses security groups for tagging packets at ingress to allow filtering later on at Egress. The product of the security group is the security group tag, a 4-byte string ID that is sent to the network device. The web interface displays the decimal and hexadecimal representation. The SGT...
Page 64
24 Common Scenarios Using ACS ACS and Cisco Security Group Access The NDAC policy is a single service, and it contains a single policy with one or more rules. Since the same policy is used for setting responses for authentication, peer authorization, and environment requests, the same SGT is returned for all request types when they apply to the same device. Note: You cannot add the NDAC policy as a service in the service selection policy; however, the NDAC policy is automatically applied to Security...
Page 65
25 Common Scenarios Using ACS ACS and Cisco Security Group Access 6.In the Authentication Protocols area, check the relevant protocols for your access service. 7.Click Finish. Creating an Endpoint Admission Control Policy After you create a service, you configure the endpoint admission control policy. The endpoint admission control policy returns an SGT to the endpoint and an authorization profile. You can create multiple policies and configure the Default Rule policy. The defaults are Deny Access...
Page 66
26 Common Scenarios Using ACS RADIUS and TACACS+ Proxy Requests To add an Egress policy and populate the Egress matrix: 1.Choose Access Policies > Security Group Access Control > Egress Policy. The Egress matrix is visible. The security groups appear in the order in which you defined them. 2.Click on a cell and then click Edit. 3.Fill in the fields as required. 4.Select the set of SGACLs to apply to the cell and move the selected set to the Selected column. The ACLS are used at the Egress point of the...
Page 67
27 Common Scenarios Using ACS RADIUS and TACACS+ Proxy Requests ACS uses the service selection policy to differentiate between incoming authentication and accounting requests that must be handled locally and those that must be forwarded to a remote RADIUS or TACACS+ server. When ACS receives a proxy request from the NAS, it forwards the request to the first remote RADIUS or TACACS+ server in its list. ACS processes the first valid or invalid response from the remote RADIUS server and does the...
Page 68
28 Common Scenarios Using ACS RADIUS and TACACS+ Proxy Requests An unresponsive external RADIUS server waits for about timeout * number of retries seconds before failover to move to the next server. There could be several unresponsive servers in the list before the first responsive server is reached. In such cases, each request that is forwarded to a responsive external RADIUS server is delayed for number of previous unresponsive servers * timeout * number of retries. This delay can sometimes be...
Page 69
29 Common Scenarios Using ACS RADIUS and TACACS+ Proxy Requests Called-Station-Id – Attribute Multiple NOT allowed: On the access request: Called-Station-Id NOT on the request Attribute operation statement: Called-Station-Id ADD 1223 Result of the add attribute operation on the request forwarded to the server: Called-Station-Id =1223 If the Called-Station-Id is on the original request, ACS does not perform the add operation in this example. If multiple attributes are allowed, the add operation...
Page 70
30 Common Scenarios Using ACS RADIUS and TACACS+ Proxy Requests Login-IP-Host=10.12.12.12 If the attribute is a cisco-avpair (pair of key=value), the update is done according to the key. Example: On the access request: cisco-avpair = url-redirect=www.cisco.com cisco-avpair = url-redirect=www.yahoo.com cisco-avpair = cmd=show Attribute operation statement: cisco-avpair UPDATE new value:[url-redirect=www.google.com] Result of the attribute operation on the request forwarded to the server: cisco-avpair =...