Cisco Acs 5x User Guide
Here you can view all the pages of manual Cisco Acs 5x User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 571
A-1 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 APPENDIXA AAA Protocols This section contains the following topics: Typical Use Cases, page A-1 Access Protocols—TACACS+ and RADIUS, page A-5 Overview of TACACS+, page A-5 Overview of RADIUS, page A-6 Typical Use Cases This section contains the following topics: Device Administration (TACACS+), page A-1 Network Access (RADIUS With and Without EAP), page A-2 Device Administration (TACACS+) Figure A-1 shows the flows associated with...
Page 572
A-2 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Appendix A AAA Protocols Typical Use Cases Session Access Requests (Device Administration [TACACS+]) NoteThe numbers refer to Figure A-1 on page A-1. For session request: 1.An administrator logs into a network device. 2.The network device sends a TACACS+ access request to ACS. 3.ACS uses an identity store to validate the users credentials. 4.ACS sends a TACACS+ response to the network device that applies the decision. The...
Page 573
A-3 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Appendix A AAA Protocols Typical Use Cases –EAP protocols that involve a TLS handshake and in which the client uses the ACS server certificate to perform server authentication: PEAP, using one of the following inner methods: PEAP/EAP-MSCHAPv2 and PEAP/EAP-GTC EAP-FAST, using one of the following inner methods: EAP-FAST/EAP-MSCHAPv2 and EAP-FAST/EAP-GTC –EAP protocols that are fully certificate-based, in which the TLS...
Page 574
A-4 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Appendix A AAA Protocols Typical Use Cases –EAP-FAST/EAP-MSCHAPv2 –EAP-FAST/EAP-GTC EAP methods that use certificates for both server and client authentication –EAP-TLS Whenever EAP is involved in the authentication process, it is preceded by an EAP negotiation phase to determine which specific EAP method (and inner method, if applicable) should be used. For all EAP authentications: 1.A host connects to a network device. 2.The...
Page 575
A-5 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Appendix A AAA Protocols Access Protocols—TACACS+ and RADIUS Access Protocols—TACACS+ and RADIUS This section contains the following topics: Overview of TACACS+, page A-5 Overview of RADIUS, page A-6 ACS 5.3 can use the TACACS+ and RADIUS access protocols. Ta b l e A - 1 compares the two protocols. Overview of TACACS+ TACACS+ must be used if the network device is a Cisco device-management application, access server, router, or...
Page 576
A-6 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Appendix A AAA Protocols Overview of RADIUS Overview of RADIUS This section contains the following topics: RADIUS VSAs, page A-6 ACS 5.3 as the AAA Server, page A-7 RADIUS Attribute Support in ACS 5.3, page A-8 RADIUS Access Requests, page A-9 RADIUS is a client/server protocol through which remote access servers communicate with a central server to authenticate dial-in users, and authorize their access to the requested system...
Page 577
A-7 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Appendix A AAA Protocols Overview of RADIUS ACS 5.3 as the AAA Server A AAA server is a server program that handles user requests for access to computer resources, and for an enterprise, provides AAA services. The AAA server typically interacts with network access and gateway servers, and databases and directories that contain user information. The current standard by which devices or applications communicate with an AAA...
Page 578
A-8 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Appendix A AAA Protocols Overview of RADIUS RADIUS Attribute Support in ACS 5.3 ACS 5.3 supports the RADIUS protocol as RFC 2865 describes. ACS 5.3 supports the following types of RADIUS attributes: IETF RADIUS attributes Generic and Cisco VSAs Other vendors’ attributes ACS 5.3 also supports attributes defined in the following extensions to RADIUS: Accounting-related attributes, as defined in RFC 2866. Support for Tunnel...
Page 579
A-9 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Appendix A AAA Protocols Overview of RADIUS Authentication ACS supports various authentication protocols transported over RADIUS. The supported protocols that do not include EAP are: PA P CHAP MSCHAPv1 MSCHAPv2 In addition, various EAP-based protocols can be transported over RADIUS, encapsulated within the RADIUS EAP-Message attribute. These can be further categorized with respect to whether or not, and to what extent, they...
Page 580
A-10 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Appendix A AAA Protocols Overview of RADIUS In RADIUS, authentication and authorization are coupled. If the RADIUS server finds the username and the password is correct, the RADIUS server returns an access-accept response, including a list of attribute-value pairs that describe the parameters to use for this session. This list of parameters sets the authorization rights for the user. Typical parameters include: Service...