Cisco Acs 5x User Guide
Here you can view all the pages of manual Cisco Acs 5x User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 81
4-17 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS Agentless Network Access Step 7Define the service selection. Step 8Add the access service to your service selection policy. For more information, see Creating, Duplicating, and Editing Service Selection Rules, page 10-8. Related Topics Managing Users and Identity Stores, page 8-1 Managing Access Policies, page 10-1 Adding a Host to an Internal Identity Store To configure an internal...
Page 82
4-18 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS Agentless Network Access Previous Step: Network Devices and AAA Clients, page 7-5 Next Step: Configuring an Identity Group for Host Lookup Network Access Requests, page 4-18 Related Topics Creating External LDAP Identity Stores, page 8-26 Deleting External LDAP Identity Stores, page 8-33 Configuring an Identity Group for Host Lookup Network Access Requests To configure an identity group for...
Page 83
4-19 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS Agentless Network Access c.Select Network Access, and check Identity and Authorization. The group mapping and External Policy options are optional. d.Make sure you select Process Host Lookup. If you want ACS to detect PAP or EAP-MD5 authentications for MAC addresses (see PAP/EAP-MD5 Authentication, page 4-15), and process it like it is a Host Lookup request (for example, MAB requests),...
Page 84
4-20 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS VPN Remote Network Access Configuring an Authorization Policy for Host Lookup Requests To configure an authorization policy for Host Lookup requests: Step 1Choose Access Policies > Access Services > Authorization. See Configuring a Session Authorization Policy for Network Access, page 10-29, for details. Step 2Select Customize to customize the authorization policy conditions. A list of...
Page 85
4-21 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS VPN Remote Network Access Supported Authentication Protocols ACS 5.3 supports the following protocols for inner authentication inside the VPN tunnel: RADIUS/PAP RADIUS/CHAP RADIUS/MS-CHAPv1 RADIUS/MS-CHAPv2 With the use of MS-CHAPv1 or MS-CHAPv2 protocols, ACS can generate MPPE keys that is used for encryption of the tunnel that is created. Related Topics VPN Remote Network Access, page...
Page 86
4-22 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS VPN Remote Network Access Supported VPN Network Access Servers ACS 5.3 supports the following VPN network access servers: Cisco ASA 5500 Series Cisco VPN 3000 Series Related Topics VPN Remote Network Access, page 4-20 Supported Authentication Protocols, page 4-21 Supported Identity Stores, page 4-21 Supported VPN Clients, page 4-22 Configuring VPN Remote Access Service, page 4-22 Supported...
Page 87
4-23 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS ACS and Cisco Security Group Access Related Topics VPN Remote Network Access, page 4-20 Supported Authentication Protocols, page 4-21 Supported Identity Stores, page 4-21 Supported VPN Network Access Servers, page 4-22 Supported VPN Clients, page 4-22 Configuring VPN Remote Access Service, page 4-22 ACS and Cisco Security Group Access NoteACS requires an additional feature license to enable...
Page 88
4-24 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS ACS and Cisco Security Group Access 6.Configuring EAP-FAST Settings for Security Group Access. 7.Creating an Access Service for Security Group Access. 8.Creating an Endpoint Admission Control Policy. 9.Creating an Egress Policy. 10.Creating a Default Policy. Adding Devices for Security Group Access The RADIUS protocol requires a shared secret between the AAA client and the server. In ACS,...
Page 89
4-25 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS ACS and Cisco Security Group Access Devices consider only the SGT value; the name and description of a security group are a management convenience and are not conveyed to the devices. Therefore, changing the name or description of the security group does not affect the generation ID of an SGT. To create a security group: Step 1Choose Policy Elements > Authorizations and Permissions >...
Page 90
4-26 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS ACS and Cisco Security Group Access To configure an NDAC policy for a device: Step 1Choose Access Policies > Security Group Access Control > Security Group Access > Network Device Access > Authorization Policy. Step 2Click Customize to select which conditions to use in the NDAC policy rules. The Default Rule provides a default rule when no rules match or there are no rules defined. The...