Home > Cisco > Control System > Cisco Acs 5x User Guide

Cisco Acs 5x User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Acs 5x User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 650
    							17-21
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    Chapter 17      Configuring System Operations
      Replicating a Secondary Instance from a Primary Instance
    Failover
    ACS 5.3 allows you to configure multiple ACS instances for a deployment scenario. Each deployment 
    can have one primary and multiple secondary ACS server.
    Scenario 1: Primary ACS goes down in a Distributed deployment
    Consider we have three ACS instances ACS1, ACS2, and ACS3. 
    ACS1 is the primary, and ACS2 and ACS3 are secondaries. You cannot make any configuration changes 
    on the secondary servers when the primary server ACS1 is down. If all other secondary ACS servers are 
    active, we can make any secondary server as a primary server. 
    Step 1Promote the ACS2 to the primary for the time being and use it to make configuration changes. 
    See Promoting a Secondary Instance from the Distributed System Management Page, page 17-17 and 
    Promoting a Secondary Instance from the Deployment Operations Page, page 17-18 to promote a 
    secondary ACS server as a primary server. 
    Now, ACS2 is the new primary instance. So, we can make the configuration changes on ACS2 and it will 
    be instantly replicated to ACS3 and on all secondary servers. 
    Now, consider the ACS1 is back online. If you need to retain the changes made on ACS2 and the rest of 
    the deployment so that ACS1 is the standalone, do not replicate the changes anymore.  
    Step 2Delete ACS2 and ACS3 from the secondary server list of ACS1.
    Step 3Delete ACS1 from ACS2, the current primary server to register ACS1 as secondary. 
    Now, ACS2 is the new primary server. The deployment is now fully back online, operational and has the 
    original structure. 
    Scenario 2: Restoring a database backup on the primary server 
    For this scenario, restore a database backup on our primary server and make all secondary servers also 
    have the restored database. 
    To restore a database backup on the primary server:
    Step 1Use the command acs backup and take a database backup when the deployment is working fine. 
    Step 2Restore the older database backup file taken when the deployment was working fine on the primary.
    The following warning message is displayed. 
    restore AAA--?110907--?2140.tar.gpg rep chftp Restore requires restart of ACS services. 
    Continue? (yes/no) yes
    Restoring the database affects the distributed setup. 
    Restoring the data base will affect the distributed setup. For example, replication 
    between primary and secondary will be broken. It is recommended to schedule a downtime 
    to carry out the restore operation. After restore, you will have to configure each 
    secondary to local mode and then re-connect with primary. Do you want to continue with 
    restore operation?. :yes
    Continuing restore…..
    Stopping ACS.
    Stopping Management and View...............
    Stopping Runtime.......
    Stopping Database........ 
    						
    							17-22
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    Chapter 17      Configuring System Operations
      Using the Deployment Operations Page to Create a Local Mode Instance
    Cleanup.......
    Starting ACS....
    The database on the primary server is restored successfully. 
    Now, you can observe that all secondary servers in the distributed deployment are disconnected. 
    Step 3Log into the secondary webinterface and choose System Administration > Operations > Local 
    Operations > Deployment Operations and click Request Local Mode. 
    You can observe the changes in the menu after the local mode gets activated. 
    Step 4Enter the Admin Username and Admin password and click Reconnect. 
    The secondary ACS server gets restarted. 
    From the primary server , you can observe that the secondary server is up. You can also observe that the 
    database has only the backed up data taken when the deployment was working well. So, the replication 
    of the restored database is successful. 
    Step 5Follow the same procedure for the other secondary servers to get them reconnected. 
    Using the Deployment Operations Page to Create a Local Mode 
    Instance
    When the secondary instance is in local mode it does not receive any configuration changes from the 
    primary instance. The configuration changes you make to the secondary instance are local and do not 
    propagate to the primary instance.
    To use the Deployment Operations page to create a local mode instance:
    Step 1Choose System Operations > Operations > Local Operations > Deployment Operations.
    The Deployment Operations page appears. See the Table 17-4 for valid field options.
    Step 2Specify the appropriate values in the Registration section for the secondary instance you want to register.
    Step 3Click Register to Primary.
    The system displays the following warning message:
    This operation will register this ACS Instance as a secondary to the specified Primary 
    Instance. ACS will be restarted. You will be required to login again. Do you wish to 
    continue?
    Step 4Click OK.
    Step 5Log into the ACS local machine.
    Step 6Choose System Administration > Operations > Local Operations > Deployment Operations.
    The Deployment Operations page appears. 
    Step 7Click Request Local Mode.
    The secondary instance is now in local mode. 
    After you reconnect the secondary instance to a primary instance you will lose the configuration changes 
    you made to the local secondary instance. You must manually restore the configuration information for 
    the primary instance.  
    						
    							17-23
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    Chapter 17      Configuring System Operations
      Using the Deployment Operations Page to Create a Local Mode Instance
    You can use the configuration information on the ACS Configuration Audit report to manually restore 
    the configuration information for this instance.
    Creating, Duplicating, Editing, and Deleting Software Repositories
    To create, duplicate, edit, or delete a software repository:
    Step 1Choose System Administration > Operations > Software Repositories.
    The Software Repositories page appears with the information described in Table 17-7:
    Step 2Perform one of these actions:
    Click Create.
    Check the check box next to the software repository that you want to duplicate and click Duplicate.
    Click the software repository that you want to modify; or, check the check box for the name and 
    click Edit.
    Check one or more check boxes next to the software repository that you want to delete and click 
    Delete.
    The Software Update Repositories Properties Page page appears. 
    Step 3Complete the fields in the Software Repositories Properties Page as described in Table 17-8:
    Table 17-7 Software Repositories Page 
    Option Description
    Name  Name of the software repository.
    NoteIn ACS web interface, you cannot configure utf-8 characters for a backup filename and a 
    repository name.
    Protocol Name of the protocol (DISK, FTP, SFTP, TFTP, NFS) you want to use to transfer the upgrade file.
    Server Name Name of the server.
    Path Name of the path for the directory containing the upgrade file. You must specify the protocol and 
    the location of the upgrade file; for example, ftp://acs-home/updates.
    Description Description of the software repository.
    Table 17-8 Software Update Repositories Properties Page 
    Option Description
    General
    Name  Name of the software repository.
    NoteIn ACS web interface, you cannot configure utf-8 characters for a backup filename and a 
    repository name.
    Description Description of the software repository. 
    						
    							17-24
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    Chapter 17      Configuring System Operations
      Using the Deployment Operations Page to Create a Local Mode Instance
    Step 4Click Submit. 
    The new software repository is saved. The Software Repository page appears, with the new software 
    repository that you created, duplicated, or edited.
    Related Topics
    Managing Software Repositories from the Web Interface and CLI, page 17-24
    Managing Software Repositories from the Web Interface and CLI
    You can manage repositories from the web interface or the CLI. Keep in mind the rules for creating or 
    deleting repositories from the web interface or CLI:
    If you create a repository from the CLI, that repository is not visible from the web interface, and can 
    only be deleted from the CLI. 
    If you create a repository from the web interface, it can be deleted from the CLI; however, that 
    repository still exists in the web interface. If you use the web interface to create a repository for a 
    software update, the repository is automatically created again in the CLI. 
    If you delete a repository using the web interface, it is also deleted in the CLI.
    Related Topics
    Creating, Duplicating, Editing, and Deleting Software Repositories, page 17-23
    Repository Information
    Protocol The name of the protocol that you want to use to transfer the upgrade file. Valid options are:
    DISK—If you choose this protocol, you must provide the path.
    FTP—If you choose this protocol, you must provide the server name, path, and credentials.
    SFTP—If you choose this protocol, you must provide the server name, path, and credentials.
    TFTP—If you choose this protocol, you must enter the name of the TFTP server. You can 
    optionally provide the path.
    NFS—If you choose this protocol, you must provide the server name and path. You can 
    optionally provide the credentials. If you choose this protocol, make sure that ACS has full 
    access to the NFS file system. You must have read-write and allow root access permission on 
    the NFS file system.
    Server Name Name of the FTP, SFTP, TFTP, or NFS server.
    NoteThe actual location that the repository points to is /localdisk/pathname
    Path Name of the path for the upgrade file. You must specify the protocol and the location of the 
    upgrade file; for example, ftp://acs-home/updates.
    User Credentials
    Username Administrator name.
    Password Administrator password.
    Table 17-8 Software Update Repositories Properties Page   (continued)
    Option Description 
    						
    							CH A P T E R
    18-1
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    18
    Managing System Administration Configurations
    After you install Cisco Secure ACS, you must configure and administer it to manage your network 
    efficiently. The ACS web interface allows you to easily configure ACS to perform various operations. 
    For a list of post-installation configuration tasks to get started with ACS, see Chapter 6, 
    “Post-Installation Configuration Tasks”.
    When you select System Administration > Configuration you can access pages that allow you do the 
    following:
    Configure global system options, including settings for TACACS+, EAP-TTLS, PEAP, and 
    EAP-FAST. See Configuring Global System Options, page 18-1.
    Configure protocol dictionaries. See Managing Dictionaries, page 18-5.
    Manage local sever certificates. See Configuring Local Server Certificates, page 18-14.
    Manage log configurations. See Configuring Logs, page 18-21.
    Manage licensing. See Licensing Overview, page 18-34.
    Configuring Global System Options
    From the System Administration > Configuration > Global System Options pages, you can view 
    these options:
    Configuring TACACS+ Settings, page 18-1
    Configuring EAP-TLS Settings, page 18-2
    Configuring PEAP Settings, page 18-3
    Configuring EAP-FAST Settings
    Generating EAP-FAST PAC
    Configuring TACACS+ Settings
    Use the TACACS+ Settings page to configure TACACS+ runtime characteristics. 
    Select System Administration > Configuration > Global System Options > TACACS+ Settings.
    The TACACS+ Settings page appears as described in Table 18-1: 
    						
    							18-2
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    Chapter 18      Managing System Administration Configurations
      Configuring Global System Options
    Configuring EAP-TLS Settings
    Use the EAP-TLS Settings page to configure EAP-TLS runtime characteristics. 
    Select System Administration > Configuration > Global System Options > EAP-TLS Settings.
    The EAP-TLS Settings page appears as described in Table 18-2:
    Table 18-1 TACACS+ Settings 
    Option Description
    Port to Listen Port number on which to listen. By default, the port number is displayed as 49 and you cannot 
    edit this field.
    Connection Timeout Number of minutes before the connection times out.
    Session Timeout Number of minutes before the session times out.
    Maximum Packet Size Maximum packet size (in bytes).
    Single Connect Support Check to enable single connect support.
    Login Prompts
    Username Prompt Text string to use as the username prompt.
    Password Prompt Text string to use as the password prompt.
    Password Change Control
    Enable TELNET Change 
    PasswordChoose this option if you want to provide an option to change password during a TELNET 
    session.
    Prompt for Old Password: Text string to use as the old password prompt.
    Prompt for New Password Text string to use as the new password prompt.
    Prompt for Confirm 
    PasswordText string to use as the confirm password prompt.
    Disable TELNET Change 
    PasswordChoose this option if you do not want change password during a TELNET session.
    Message when Disabled Message that is displayed when you choose the Disable TELNET Change Password option.
    Table 18-2 EAP-TLS Settings 
    Option Description
    Enable EAP-TLS Session 
    ResumeCheck this box to support abbreviated reauthentication of a user who has passed full EAP-TLS 
    authentication. 
    This feature provides reauthentication of the user with only an SSL handshake and without the 
    application of certificates. EAP-TLS session resume works only within the EAP-TLS session 
    timeout value. 
    EAP-TLS session timeout Enter the number of seconds before the EAP-TLS session times out. 
    						
    							18-3
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    Chapter 18      Managing System Administration Configurations
      Configuring Global System Options
    Configuring PEAP Settings
    Use the PEAP Settings page to configure PEAP runtime characteristics. 
    Select System Administration > Configuration > Global System Options > PEAP Settings.
    The PEAP Settings page appears as described in Table 18-3:
    Related Topic
    Generating EAP-FAST PAC, page 18-4
    Configuring EAP-FAST Settings
    Use the EAP-FAST Settings page to configure EAP-FAST runtime characteristics. 
    Select System Administration > Configuration > Global System Options > EAP-FAST > Settings.
    The EAP-FAST Settings page appears as described in Table 18-4:
    Table 18-3 PEAP Settings
    Option Description
    Enable PEAP Session 
    ResumeWhen checked, ACS caches the TLS session that is created during phase one of PEAP 
    authentication, provided the user successfully authenticates in phase two of PEAP. If a user needs 
    to reconnect and the original PEAP session has not timed out, ACS uses the cached TLS session, 
    resulting in faster PEAP performance and a lessened AAA server load. 
    You must specify a PEAP session timeout value for the PEAP session resume features to work.
    PEAP Session Timeout Enter the number of seconds before the PEAP session times out. The default value is 7200 
    seconds.
    Enable Fast Reconnect Check to allow a PEAP session to resume in ACS without checking user credentials when the 
    session resume feature is enabled.
    Table 18-4 EAP-FAST Settings 
    Option Description
    General
    Authority Identity Info 
    DescriptionUser-friendly string that describes the ACS server that sends credentials to a client. The client can 
    discover this string in the Protected Access Credentials Information (PAC-Info) 
    Type-Length-Value (TLV). The default value is Cisco Secure ACS.
    Master Key Generation 
    PeriodThe value is used to encrypt or decrypt and sign or authenticate PACs. The default is one week. 
    Revoke
    Revoke Click Revoke to revoke all previous master keys and PACs. This operation should be used with 
    caution.
    If the ACS node is a secondary node, the Revoke option is disabled. 
    						
    							18-4
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    Chapter 18      Managing System Administration Configurations
      Configuring RSA SecurID Prompts
    Generating EAP-FAST PAC
    Use the EAP-FAST Generate PAC page to generate a user or machine PAC. 
    Step 1Select System Administration > Configuration > Global System Options > EAP-FAST > Generate 
    PAC .
    The Generate PAC page appears as described in Table 18-5:
    Step 2Click Generate PAC.
    Configuring RSA SecurID Prompts
    You can configure RSA prompts for an ACS deployment. The set of RSA prompts that you configure is 
    used for all RSA realms and ACS instances in a deployment. To configure RSA SecurID Prompts:
    Step 1Choose System Administration > Configuration > Global System Options > RSA SecurID Prompts.
    The RSA SecurID Prompts page appears.
    Step 2Modify the fields described in Ta b l e 1 8 - 6.
    Table 18-5 Generate PAC
    Option Description
    Tunnel PAC Select to generate a tunnel PAC.
    Machine PAC Select to generate a machine PAC.
    Identity Specifies the username or machine name presented as the “inner username” by the EAP-FAST 
    protocol. If the Identity string does not match that username, authentication will fail.
    PAC Time To Live Enter the equivalent maximum value in days, weeks, months and years, and enter a positive 
    integer.
    Password Enter the password.
    Table 18-6 RSA SecurID Prompts Page
    Option Description
    Next Token Prompt Text string to request for the next token. The default value is “Enter Next 
    TOKENCODE:”.
    Choose PIN Type Prompt Text string to request the PIN type. The default value is “Do you want to 
    enter your own pin?”. 
    						
    							18-5
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    Chapter 18      Managing System Administration Configurations
      Managing Dictionaries
    Step 3Click Submit to configure the RSA SecurID Prompts.
    Managing Dictionaries
    The following tasks are available when you select System Administration > Configuration > 
    Dictionaries:
    Viewing RADIUS and TACACS+ Attributes, page 18-5
    Configuring Identity Dictionaries, page 18-10
    Viewing RADIUS and TACACS+ Attributes
    The RADIUS and TACACS+ Dictionary pages display the available protocol attributes in these 
    dictionaries:
    RADIUS (IETF)
    RADIUS (Cisco)
    RADIUS (Microsoft)
    RADIUS (Ascend)
    RADIUS (Cisco Airespace)
    RADIUS (Cisco Aironet)
    RADIUS (Cisco BBSM)
    RADIUS (Cisco VPN 3000)
    RADIUS (Cisco VPN 5000)
    RADIUS (Juniper)
    RADIUS (Nortel [Bay Networks]) Accept System PIN Prompt Text string to accept the system-generated PIN. The default value is “ARE 
    YOU PREPARED TO ACCEPT A SYSTEM-GENERATED PIN?”.
    For the two PIN entry prompts below, if the prompt contains the following 
    strings, they will be substituted as follows:
    {MIN_LENGTH}- will be replaced by the minimum PIN length 
    configured for the RSA Realm. 
    {MAX_LENGTH}- will be replaced by the maximum PIN length 
    configured for the RSA Realm. 
    Alphanumeric PIN Prompt Text string for requesting an alphanumeric PIN.
    Numeric PIN Prompt Text string for requesting a numeric PIN.
    Re-Enter PIN Prompt Text string to request the user to re-enter the PIN. The default value is 
    “Reenter PIN:”.
    Table 18-6 RSA SecurID Prompts Page
    Option Description 
    						
    							18-6
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    Chapter 18      Managing System Administration Configurations
      Managing Dictionaries
    RADIUS (RedCreek)
    RADIUS (US Robotics)
    TA C A C S +
    To view and choose attributes from a protocol dictionary, select System Administration > 
    Configuration > Dictionaries > Protocols; then choose a dictionary. 
    The Dictionary page appears with a list of available attributes as shown in Table 18-7:
    Use the arrows to scroll through the attribute list.
    ACS 5.3 also supports RADIUS vendor-specific attributes (VSAs). A set of predefined RADIUS VSAs 
    are available. You can define additional vendors and attributes from the ACS web interface. You can 
    create, edit, or delete RADIUS VSAs. 
    After you have defined new VSAs, you can use them in policies, authorization profiles, and RADIUS 
    token servers in the same way as predefined VSAs. For more information, see:
    RADIUS VSAs, page A-6.
    Creating, Duplicating, and Editing RADIUS Vendor-Specific Attributes, page 18-6
    Creating, Duplicating, and Editing RADIUS Vendor-Specific Attributes
    Vendor-Specific Attributes (VSAs) allow vendors to create extension to the RADIUS attributes. The 
    vendors have a specific vendor number assigned to them. VSAs are attributes that contain subattributes. 
    ACS 5.3 allows you to create, duplicate, or edit RADIUS VSA (VSAs). To do this:
    Some of the internally used attributes cannot be modified.
    You cannot modify an attribute’s type if the attribute is used by any policy or policy element.
    Step 1Choose System Administration > Configuration > Dictionaries > Protocols > RADIUS VSA.
    Step 2Do one of the following:
    Click Create.
    Check the check box next to the RADIUS VSA that you want to duplicate, then click Duplicate.
    Check the check box next to the RADIUS VSA that you want to edit, then click Edit.
    The Create RADIUS VSA page appears. Modify the fields as described in Table 18-8.
    Table 18-7  Protocols Dictionary Page 
    Option Description
    Attribute Name of the attribute.
    ID (RADIUS only) The VSA ID.
    Type Data type of the attribute.
    Direction (RADIUS only) Specifies where the attribute is in use: in the request, in the response, or both. Single 
    or bidirectional authentication.
    Multiple Allowed (RADIUS only) Multiple attributes are allowed. Attributes that specify multiple allowed can be used 
    more than once in one request or response. 
    						
    All Cisco manuals Comments (0)

    Related Manuals for Cisco Acs 5x User Guide