Home
        Cisco Systems OL-9971-01 User's Manual
         Contents
1.     Step 5    You can rename an NDG  change the shared secret  and the key wrap configuration        When renaming an NDG  ensure that there are no NARs or other shared profile components  SPCs  that  invoke the original NDG name  ACS performs no automatic checking to determine whether the original  NDG is still invoked  If a user   s authentication request incorporates an SPC that invokes a nonexistent   or renamed  NDG  the attempt will fail and the user will be rejected        To edit an NDG     In the navigation bar  click Network Configuration   The Network Configuration page opens   In the Network Device Groups table  click the NDG that you want to edit     p    Tip If the Network Device Groups table does not appear  choose Interface Configuration  gt   Advanced Options  Then  check the Network Device Groups check box           At the bottom of the page  click Edit Properties     Change the network device group properties as required  For more information about these properties   see Adding a Network Device Group  page 3 23     Click Submit   The NDG properties are changed        User Guide for Cisco Secure Access Control Server  326 E OL 9971 01       _Chapter 3    Netw ork Configuration       Configuring Proxy Distribution Tables Hil    Deleting a Network Device Group     amp      gt        Caution    Step 1    Step 2    Step 3    Step 4    When you delete an NDG  all AAA clients and AAA servers that belong to the deleted group appear in  the Not Assigned AAA Clients 
2.    TACACS  and RADIUS  page 1 3     To edit AAA clients     In the navigation bar  click Network Configuration     The Network Configuration page opens        User Guide for Cisco Secure Access Control Server  312 E OL 9971 01        Chapter3 Network Configuration       Step 2    Step 3    Step 4    Configuring AAA Clients Ti    Do one of the following       If you are using NDGs  click the name of the NDG to which the AAA client is assigned  Then  click  the name of the AAA client       To edit AAA clients when you have not enabled NDGs  click the name of the AAA client in the AAA  Client Hostname column of the AAA Clients table     The AAA Client Setup For Name page appears     Modify the AAA client settings  as needed  For information about the configuration options available  for the AAA client  see AAA Client Configuration Options  page 3 8      amp     Note You cannot directly edit the name of the AAA client  rather  you must delete the AAA client  entry and then re establish the entry with the corrected name  For steps about deleting the AAA  client entry  see Deleting AAA Clients  page 3 14  For steps about creating the AAA client entry   see Adding AAA Clients  page 3 11              To save your changes and apply them immediately  click Submit   Apply     p    Tip To save your changes and apply them later  choose Submit  When you are ready to implement  the changes  choose System Configuration  gt  Service Control  Then  choose Restart            amp     Note Restar
3.  NDGs  click Add Entry below the AAA Clients  table     The Add AAA Client page appears     Enter the AAA client settings  as needed  For information about the configuration options available for  the AAA client  see AAA Client Configuration Options  page 3 8     To save your changes and apply them immediately  click Submit   Apply      amp     Note Restarting the service clears the Logged in User report and temporarily interrupts all ACS  services  This action affects the Max Sessions counter           p    Tip If you want to save your changes and apply them later  choose Submit  When you are ready to  implement the changes  choose System Configuration  gt  Service Control  Then  choose  Restart           Editing AAA Clients     amp     Note    Step 1    You can use the following procedure to edit the settings for AAA client configurations        You cannot directly edit the names of AAA clients  rather  you must delete the AAA client entry and  then reestablish the entry with the corrected name  For steps about deleting AAA client configurations   see Deleting AAA Clients  page 3 14  For steps about creating AAA client configurations  see Adding  AAA Clients  page 3 11        Before You Begin    For ACS to provide AAA services to AAA clients  you must ensure that gateway devices between AAA  clients and ACS permit communication over the ports that support the applicable AAA protocol   RADIUS or TACACS    For information about ports that AAA protocols use  see AAA  Protocols
4.  Restrictions for TACACS  are applied to the IP address of the forwarding AAA server   not to the IP address of the originating AAA client           When an ACS proxies to a second ACS  the second ACS responds to the first by using only IETF  attributes  no VSAs  when it recognizes the first ACS as the AAA server  Alternatively  you can  configure the second ACS to see an ACS as a AAA client  in this case  the second ACS responses include  the RADIUS VSAs for whatever RADIUS vendor is specified in the AAA client definition table  entry   in the same manner as any other AAA client        Administrators with geographically dispersed networks can configure and manage the user profiles of  employees within their immediate location or building  The administrator can  therefore  manage the  policies of just their users and all authentication requests from other users within the company can be  forwarded to their respective AAA server for authentication  Not every user profile must reside on every  AAA server  Proxies save administration time and server space  and allows end users to receive the same  privileges regardless of the access device through which they connect     Fallback on Failed Connection    You can configure the order in which ACS checks remote AAA servers if a failure of the network  connection to the primary AAA server occurs  If an authentication request cannot be sent to the first  listed server  because of a network failure for example  the next listed server is
5.  Windows authentication configurations that use the remote agent        Before You Begin    For descriptions of the options available while editing a remote agent configuration  see Remote Agent  Configuration Options  page 3 19      amp     Note For ACS to communicate with a remote agent  you must ensure that gateway devices between a  remote agent and ACS permit communication over the TCP ports used by remote agents  For  information about ports used by remote agents  see the Installation and Configuration Guide for  Cisco Secure ACS Remote Agents Release 4 1              I OL 9971 01    User Guide for Cisco Secure Access Control Server E    Chapter3 Network Configuration         HI Configuring Remote Agents  ACS Solution Engine Only     Step 1    Step 2    Step 3    Step 4    To edit a remote agent configuration     In the navigation bar  click Network Configuration   The Network Configuration section opens   Perform one of the following steps  based on your use of NDGs     a  Ifyou are using NDGs  click the name of the NDG to which the remote agent belongs  Then  in the  NDG Remote Agents table  click the name of the remote agent configuration you want to edit     b  If you are not using NDGs  in the Remote Agents table  click the name of the remote agent that you  want to edit     The Remote Agent Setup for the agent page appears   Enter or select new settings for one or more of the following options     Remote Agent IP Address    Port  e Network Device Group  displayed 
6.  a division within the corporation in New York  where she still  needs to access the corporate network to get her e mail and other files  When Mary is in New York  she  dials in to the New York office and logs in as mary  la corporate com  The New York ACS does not  recognize her username  but the Proxy Distribution Table contains an entry    a corporate com  to  forward the authentication request to the Los Angeles ACS  Because the username and password  information for Mary reside on that AAA server  when she authenticates correctly  the AAA client in the  New York office applies the authorization parameters that are assigned to her     Proxy Distribution Table    Whether  and where  an authentication request is to be forwarded is defined in the Proxy Distribution  Table on the Network Configuration page  You can use multiple ACSs throughout your network  For  information about configuring the Proxy Distribution Table  see Configuring Proxy Distribution Tables   page 3 27     ACS employs character strings that the administrator defines to determine whether an authentication  request should be processed locally or forwarded  and where  When an end user dials in to the network  device and ACS finds a match for the character string defined in the Proxy Distribution Table  ACS  forwards the authentication request to the associated remote AAA server        Note       3 0    When an ACS receives a TACACS  authentication request forwarded by proxy  any requests for  Network Access
7.  are assigned to each NDG  If you are using NDGs   the AAA Clients table and AAA Servers table do not appear on the opening page  To configure AAA  clients or AAA servers  you must click the name of the NDG to which the device is assigned  If the  newly configured device is not assigned to an NDG  it belongs to the  Not Assigned  group     This table appears only when you have configured the interface to use NDGs  For more information  about this interface configuration  see Displaying Advanced Options  page 2 5       Proxy Distribution Table   You can use the Proxy Distribution Table to configure proxy  capabilities including domain stripping  For more information  see Configuring Proxy Distribution  Tables  page 3 27     This table appears only when you have configured the interface to enable Distributed Systems  Settings  For more information about this interface configuration  see Displaying Advanced  Options  page 2 5     About ACS in Distributed Systems    These topics describe how ACS can be used in a distributed system     AAA Servers in Distributed Systems  page 3 2    Default Distributed System Settings  page 3 3    AAA Servers in Distributed Systems    AAA server is the generic term for an access control server  ACS   and the two terms are often used  interchangeably  Multiple AAA servers can be configured to communicate with one another as primary   backup  client  or peer systems  You can  therefore  use powerful features such as       Proxy      Fallback on fail
8.  checked  This checking       User Guide for Cisco Secure Access Control Server  Eg  OL 9971 01        Chapter 3    Netw ork Configuration       Character String    Stripping    Proxy in Distributed Systems  il    continues  in order  down the list  until the AAA servers handles the authentication request   Failed  connections are detected by failure of the nominated server to respond within a specified time period   That is  the request is timed out   If ACS cannot connect to any server in the list  authentication fails     ACS forwards authentication requests by using a configurable set of characters with a delimiter  such as  periods      slashes      or hyphens      When configuring the ACS character string  you must specify  whether the character string is the prefix or suffix  For example  you can use domain us as a suffix  character string in username domain us  where the asterisk     represents any delimiter  An example of  a prefix character string is domain   username  where the asterisk     would be used to detect the slash        Stripping allows ACS to remove  or strip  the matched character string from the username  When you  enable stripping  ACS examines each authentication request for matching information  When ACS finds  a match by character string in the Proxy Distribution Table  as described in the example under Proxy in  Distributed Systems  page 3 3  ACS strips off the character string if you have configured it to do so  For  example  in the following pr
9.  in the  NDG Remote Agents table  click the name of the remote agent configuration you want to delete     b  If you are not using NDGs  in the Remote Agents table  click the name of the remote agent  configuration that you want to delete     The Remote Agent Setup for the agent page appears   To delete the remote agent and have the deletion take effect immediately  click Delete   Apply     XS    Note Restarting services clears the Logged in User report and temporarily interrupts all ACS services   As an alternative to restarting when you delete a remote agent  in the preceding step you can  click Delete  However  when you do this  the change does not take effect until you restart  services  which you can do by clicking System Configuration  gt  Service Control  gt  Restart           A confirmation dialog box appears   Click OK     ACS restarts its services and the remote agent configuration is deleted     Configuring Netw ork Device Groups     gt        Caution    Network Device Grouping is an advanced feature that you use to view and administer a collection of  network devices as a single logical group  To simplify administration  you can assign each group a name  that can be used to refer to all devices within that group  This action creates two levels of network  devices within ACS    single discrete devices such as an individual router or network access server  and  an NDG  that is  a collection of routers or AAA servers        To see the Network Device Groups table in th
10.  not appear in the ACS web interface  you can enable them by  choosing Interface Configuration  gt  Advanced Options  Then  check the Distributed System Settings  check box        Default Distributed System Settings    You use the AAA Servers table and the Proxy Distribution Table to establish distributed system settings   The parameters that are configured within these tables create the foundation so that you can configure  multiple ACSs to work with one another  Each table contains an ACS entry for itself  In the AAA Servers  table  the only AAA server that is initially listed is itself  in ACS SE  the server name is listed as self    the Proxy Distribution Table lists an initial entry of  Default   which displays how the local ACS is  configured to handle each authentication request locally     You can configure additional AAA servers in the AAA Servers table  These devices can  therefore   become visible in the web interface so that they can be configured for other distributed features such as  proxy  ACS internal database replication  remote logging  and RDBMS synchronization  For  information about configuring additional AAA servers  see Adding AAA Servers  page 3 16     Proxy in Distributed Systems    Proxy is a powerful feature that enables you to use ACS for authentication in a network that uses more  than one AAA server  This section contains the following topics       The Proxy Feature  page 3 3     Fallback on Failed Connection  page 3 4    Remote Use of Accountin
11.  of the Pairwise Master Key  PMK    In ASCII mode  enter a key length of exactly 16 characters  in hexadecimal mode  enter a key  length of 32 characters       Message Authentication Code Key  MACK    This is used for the keyed hashed message  authentication code  HMAC  calculation over the RADIUS message  In ASCII mode  enter a  key length of exactly 20 characters  in hexadecimal mode  enter a key length of 40 characters     S    Note If you leave a key field empty when key wrap is enabled  the key will contain only zeros                Key Input Format   Select whether to enter the keys as ASCII or hexadecimal strings  the  default is ASCII       amp     Note You must enable the Key Wrap feature in the NAP Authentication Settings page to  implement these shared keys in EAP TLS authentication           Authenticate Using   The AAA protocol to use for communications with the AAA client  The  Authenticate Using list includes Cisco IOS TACACS  and several vendor specific implementations  of RADIUS  If you have configured user defined RADIUS vendors and VSAs  those vendor specific  RADIUS implementations appear on the list also  For information about creating user defined  RADIUS VSAs  see Custom RADIUS Vendors and VSAs  page 8 19        I OL 9971 01    User Guide for Cisco Secure Access Control Server      Chapter3 Network Configuration         WE Configuring AAA Clients    The Authenticate Using list always contains       TACACS   Cisco IOS    The Cisco IOS TACACS  protocol  w
12.  remote agent  For information  about configuring the remote agent port  see the Installation and Configuration Guide for  Cisco Secure ACS Remote Agents Release 4 1             Network Device Group   The name of the NDG to which this remote agent should belong  To make  the remote agent independent of NDGs  chose the Not Assigned selection     In addition to the options in the preceding list  the Remote Agent Setup page includes the following  options       Running Status   Information about the status of the remote agent  If ACS can contact the remote  agent  the uptime for the remote agent appears  If ACS cannot contact the remote agent  the message  Not responding appears       Configuration Provider   The ACS from which the remote agent receives its configuration     p    Tip Click on the ACS name to access the web interface for the ACS that provides configuration data  to a remote agent  A new browser window displays the web interface for the ACS that provides  configuration data to the remote agent             Service Table   ACS displays a table of remote agent services below the Configuration Provider   The table includes the following columns       Service   A list of services that a remote agent can provide  remote logging and Windows  authentication       Available   Whether the remote agent can currently provide the corresponding service       Used by this ACS   Whether the ACS into which you are logged is currently using the  corresponding service     Adding a R
13. AAA servers  you must delete the existing AAA  server entry and then add a new server entry with the new name        Before You Begin    For descriptions of the options available while editing a remote AAA server entry  see AAA Server  Configuration Options  page 3 15     For ACS to provide AAA services to a remote AAA server  you must ensure that gateway devices  between the remote AAA server and ACS permit communication over the ports that support the  applicable AAA protocol  RADIUS or TACACS    For information about ports that AAA protocols use   see AAA Protocols   TACACS  and RADIUS  page 1 3     To edit AAA servers     In the navigation bar  click Network Configuration   The Network Configuration page opens   Do one of the following        Ifyou are using NDGs  click the name of the NDG to which the AAA server is assigned  Then  in  the AAA Servers table  click the name of the AAA server to be edited       Ifyou have not enabled NDGs  in the AAA Servers table  click the name of the AAA server to be  edited     The AAA Server Setup for X page appears        I OL 9971 01    User Guide for Cisco Secure Access Control Server E    Chapter3 Network Configuration         HI Configuring Remote Agents  ACS Solution Engine Only     Step3 Enter or change AAA server settings  as needed  For information about the configuration options  available for the AAA server  see AAA Server Configuration Options  page 3 15     Step4 To save your changes and apply them immediately  click Submi
14. CHAPTER    Netw ork Configuration    This chapter details concepts and procedures for configuring the Cisco Secure Access Control Server  Release 4 1  hereafter referred to as ACS  You use the configuration process to establish a distributed  system  and set up interaction with authentication  authorization  and accounting  AAA  clients and  servers  You can also configure remote agents for the ACS Solution Engine     This chapter contains the following topics     About Network Configuration  page 3 1    About ACS in Distributed Systems  page 3 2     Proxy in Distributed Systems  page 3 3    Network Device Searches  page 3 6    Configuring AAA Clients  page 3 8    Configuring AAA Servers  page 3 14    Configuring Remote Agents  ACS Solution Engine Only   page 3 18    Configuring Network Device Groups  page 3 23    Configuring Proxy Distribution Tables  page 3 27    About Netw ork Configuration    The appearance of the page that you see when you click Network Configuration differs according to the  network configuration selections that you made in the Interface Configuration section     The tables that might appear in this section are     e AAA Clients   This table lists each AAA client that is configured on the network  together with its  IP address and associated protocol     If you are using Network Device Groups  NDGs   this table does not appear on the initial page  but  is accessed through the Network Device Group table  For more information about this interface  configu
15. Device Groups           In the Network Device Group Name box  type the name of the new NDG     p    Tip The maximum name length is 24 characters  Quotation marks       and commas     are not  allowed  Spaces are allowed           In the Shared Secret box  enter a key for the Network Device Group  The maximum length is 32  characters     Each device that is assigned to the Network Device Group will use the shared key that you enter here   The key that was assigned to the device when it was added to the system is ignored  If the key entry is  null  the AAA client key is used  See AAA Client Configuration Options  page 3 8  This feature  simplifies key management for devices     In the RADIUS Key Wrap section  enter the shared secret keys for RADIUS Key Wrap in EAP TLS  authentications     Each key must be unique  and must also be distinct from the RADIUS shared key  These shared keys are  configurable for each AAA Client  as well as for each NDG  The NDG key configuration overrides the  AAA Client configuration  If the key entry is null  the AAA client key is used  See AAA Client  Configuration Options  page 3 8       Key Encryption Key  KEK    This is used for encryption of the Pairwise Master Key  PMK   In  ASCII mode  enter a key length of exactly 16 characters  in hexadecimal mode  enter a key length  of 32 characters       Message Authentication Code Key  MACK    This is used for the keyed hashed message  authentication code  HMAC  calculation over the RADIUS message  In A
16. Remote Agents  ACS Solution Engine Only     This section presents information about remote agents and procedures for configuring remote agents in  the ACS web interface        User Guide for Cisco Secure Access Control Server  P38 E OL 9971 01        Chapter3 Network Configuration       Configuring Remote Agents  ACS Solution Engine Only  W    This section contains the following topics     About Remote Agents  page 3 19    Remote Agent Configuration Options  page 3 19     Adding a Remote Agent  page 3 20    Editing a Remote Agent Configuration  page 3 21    Deleting a Remote Agent Configuration  page 3 22    About Remote Agents    An ACS Solution Engine can use remote agents for remote logging and authentication of users with a   Windows external user database  Before you can configure remote logging and authentication by using  a Windows external user database  you must add at least one remote agent configuration to the Remote  Agents table in the Network Configuration section     For more information about remote agents  including how to install and configure them  see the  Installation Guide for Cisco Secure ACS Solution Engine Release 4 1     Remote Agent Configuration Options    The Add Remote Agent and Remote Agent Setup pages include the following options      amp     Note A remote agent that does not have a corresponding configuration in ACS  or whose configuration  in ACS is incorrect  cannot communicate with ACS to receive its configuration  logging data  or  Window
17. SCII mode  enter a key  length of exactly 20 characters  in hexadecimal mode  enter a key length of 40 characters      amp     Note If you leave a key field empty when key wrap is enabled  the key will contain only zeros             Key Input Format   Select whether to enter the keys as ASCII or hexadecimal strings  the default  is ASCII         User Guide for Cisco Secure Access Control Server  324 E OL 9971 01        Chapter3 Network Configuration       Step 6    Step 7    Configuring Network Device Groups W     amp     Note You must enable the Key Wrap feature in the NAP Authentication Settings page to implement  these shared keys in EAP TLS authentication           Click Submit   The Network Device Groups table displays the new NDG     To populate the newly established NDG with AAA clients or AAA servers  perform one or more of the  following procedures  as applicable        Adding AAA Clients  page 3 11     Adding AAA Servers  page 3 16      Assigning an Unassigned AAA Client or AAA Server to an NDG  page 3 25  e Reassigning AAA Clients or AAA Servers to an NDG  page 3 25    Assigning an Unassigned AAA Client or AAA Server to an NDG    Step 1    Step 2    Step 3  Step 4    Step 5    You use this procedure to assign an unassigned AAA client or AAA server to an NDG  Before you begin  this procedure  you should have already configured the client or server and it should appear in the Not  Assigned AAA Clients or Not Assigned AAA Servers table     To assign a network device t
18. You can specify a number  for example  10 3 157 98     Numeric Range    You can specify the low and high numbers of the range in the octet  separated  by a hyphen      for example  10 3 157 10 50     Wildcard   You can use an asterisk     to match all numbers in that octet  for example   10 3 157     ACS allows any octet or octets in the IP Address box to be a number  a numeric range  or an asterisk       for example 172 16 31         Shared Secret   The shared secret key of the AAA client  Maximum length for the AAA client key  is 32 characters     For correct operation  the key must be identical on the AAA client and ACS  Keys are case sensitive   If the shared secret does not match  ACS discards all packets from the network device     Network Device Group   tThe name of the NDG to which this AAA client should belong  To make  the AAA client independent of NDGs  use the Not Assigned selection     e   Note This option does not appear if you have not configured ACS to use NDGs  To enable NDGs   choose Interface Configuration  gt  Advanced Options  Then  check the Network Device  Groups check box           RADIUS Key Wrap   The shared secret keys for RADIUS Key Wrap in EAP TLS authentications   Each key must be unique  and must also be distinct from the RADIUS shared key  These shared keys  are configurable for each AAA Client  as well as for each NDG  The NDG key configuration  overrides the AAA Client configuration       Key Encryption Key  KEK    This is used for encryption
19. age 1 3     To add and configure AAA servers     Step1 In the navigation bar  click Network Configuration     The Network Configuration page opens        User Guide for Cisco Secure Access Control Server  P36 E OL 9971 01       _Chapter 3    Netw ork Configuration       Step 2    Step 3    Step 4    Configuring AAA Servers W    Do one of the following       If you are using NDGs  click the name of the NDG to which the AAA server is to be assigned  Then   click Add Entry below the  name  AAA Servers table       To add AAA servers when you have not enabled NDGs  below the AAA Servers table  click Add  Entry     The Add AAA Server page appears     Enter the AAA server settings  as needed  For information about the configuration options available for  the AAA server  see AAA Server Configuration Options  page 3 15     To save your changes and apply them immediately  click Submit   Apply     P    Tip To save your changes and apply them later  choose Submit  When you are ready to implement  the changes  choose System Configuration  gt  Service Control  Then  choose Restart            amp     Note Restarting the service clears the Logged in User report and temporarily interrupts all ACS  services  This action affects the Max Sessions counter and resets it to  0               Editing AAA Servers     amp     Use this procedure to edit the settings for AAA servers that you have previously configured        Note    Step 1    Step 2    You cannot edit the names of AAA servers  To rename 
20. and centralized logging   For more information  see Remote Logging for ACS for  Windows  page 10 9  and Remote Logging for ACS SE with ACS Remote Agents  page 10 10     Netw ork Device Searches    You can search for any network device that is configured in the Network Configuration section of the  ACS web interface     This section contains the following topics     Network Device Search Criteria  page 3 6      Searching for Network Devices  page 3 7    Netw ork Device Search Criteria    You can specify search criteria for network device searches  ACS provides the following search criteria       Name   tThe name assigned to the network device in ACS  You can use an asterisk     as a wildcard  character  For example  if you wanted to find all devices with names starting with the letter M  you  would enter M  or m   Name based searches are case insensitive  If you do not want to search based  on device name  you can leave the Name box blank or you can put only an asterisk     in the Name  box        IP Address   The IP address specified for the network device in ACS  For each octet in the address   you have three options       Number   You can specify a number  for example  10 3 157 98       Numeric Range   You can specify the low and high numbers of the range in the octet  separated  by a hyphen      for example  10 3 157 10 50       Wildcard   You can use an asterisk     to match all numbers in that octet  for example   10 3 157       ACS allows any octet or octets in the IP A
21. ch user   Each session uses the same session identifier  the username  therefore  the Max Sessions  feature is ineffective for users accessing the network through the AAA client with this  feature enabled              Match Framed IP Address with user IP address for accounting packets from this AAA  Client   Select this option when the AAA client uses Cisco SSL WebVPN  This action ensures that  ACS assigns different IP addresses to two different users when they log in via a Cisco SSL WebVPN  client  By default  this check box is unchecked     Adding AAA Clients    You can use this procedure to add AAA client configurations     Before You Begin    For ACS to provide AAA services to AAA clients  you must ensure that gateway devices between AAA  clients and ACS allow communication over the ports needed to support the applicable AAA protocol   RADIUS or TACACS    For information about ports that AAA protocols use  see AAA  Protocols   TACACS  and RADIUS  page 1 3        I OL 9971 01    User Guide for Cisco Secure Access Control Server E    Chapter3 Network Configuration         WE Configuring AAA Clients    Step 1    Step 2    Step 3    Step 4    To add AAA clients     In the navigation bar  click Network Configuration   The Network Configuration page opens   Do one of the following       If you are using NDGs  click the name of the NDG to which you want to assign the AAA client   Then  click Add Entry below the AAA Clients table       To add AAA clients when you have not enabled
22. cure Access Control Server E    Chapter3 Network Configuration         WE Configuring AAA Servers    Log Update Watchdog Packets from this remote AAA Server   Enables logging of update or  watchdog packets from AAA clients that are forwarded by the remote AAA server to this ACS   Watchdog packets are interim packets that are sent periodically during a session  They provide you  with an approximate session length if the AAA client fails and  therefore  no stop packet is received  to mark the end of the session     AAA Server Type   One of types       RADIUS   Select this option if the remote AAA server is configured by using any type of  RADIUS protocol       TACACS    Select this option if the remote AAA server is configured by using the TACACS   protocol       ACS   Select this option if the remote AAA server is another ACS  This action enables you to  configure features that are only available with other ACSs  such as ACS internal database  replication and remote logging     Traffic Type   tThe Traffic Type list defines the direction in which traffic to and from the remote  AAA server is permitted to flow from this ACS  The list includes       Inbound   The remote AAA server accepts requests that have been forwarded to it and does not  forward the requests to another AAA server  Select this option if you do not want to permit any  authentication requests to be forwarded from the remote AAA server       Outbound   The remote AAA server sends out authentication requests but d
23. ddress box to be a number  a numeric range  or an asterisk       for example 172 16 31            User Guide for Cisco Secure Access Control Server  EN  OL 9971 01        Chapter 3    Netw ork Configuration       Network Device Searches W      Type   tThe device type  as specified by the AAA protocol that it is configured to use  or the kind of  AAA server it is  You can also search for Solution Engine remote agents  If you do not want to limit  the search based on device type  choose Any from the Type list       Device Group   The NDG to which the device is assigned  This search criterion only appears if you  have enabled Network Device Groups on the Advanced Options page in the Interface Configuration  section  If you do not want to limit the search based on NDG membership  select Any from the  Device Group list     Searching for Netw ork Devices    Step 1    Step 2    Step 3    Step 4    Step 5    To search for a network device     In the navigation bar  click Network Configuration   The Network Configuration page opens   Click Search     The Search for Network Devices page appears  In the configuration area  the controls for setting search  criteria appear above the search results for the most recent search that was previously conducted for this  session  if any      amp     Tip When you leave the Search for Network Devices page  ACS retains your search criteria and  results for the duration of the current administrative session  Until you log out of ACS  you can  return 
24. e web interface  you must check the Network Device  Groups option on the Advanced Options page of the Interface Configuration section  Unlike in other  areas of Interface Configuration  it is possible to remove from sight an active NDG if you uncheck the  Network Device Groups option  Therefore  if you choose to configure NDGs  ensure that you leave the  Network Device Groups option selected on the Advanced Option page        This section contains the following topics     Adding a Network Device Group  page 3 23    Assigning an Unassigned AAA Client or AAA Server to an NDG  page 3 25    Reassigning AAA Clients or AAA Servers to an NDG  page 3 25     Editing a Network Device Group  page 3 26     Deleting a Network Device Group  page 3 26       I OL 9971 01    User Guide for Cisco Secure Access Control Server E    Chapter3 Network Configuration         WE Configuring Network Device Groups    Adding a Network Device Group    Step 1    Step 2    Step 3    Step 4    Step 5    You can assign users or groups of users to NDGs  For more information  see     Setting TACACS  Enable Password Options for a User  page 6 23     Setting Enable Privilege Options for a User Group  page 5 13   To add an NDG     In the navigation bar  click Network Configuration   The Network Configuration page opens   Under the Network Device Groups table  click Add Entry     p    Tip If the Network Device Groups table does not appear  choose Interface Configuration  gt   Advanced Options  Then  choose Network 
25. ed connection     ACS internal database replication    Remote and centralized logging    You can configure AAA servers to determine who can access the network and what services are  authorized for each user  The AAA server stores a profile containing authentication and authorization  information for each user  Authentication information validates user identity  and authorization  information determines what network services a user can to use  A single AAA server can provide  concurrent AAA services to many dial up access servers  routers  and firewalls  Each network device can  be configured to communicate with a AAA server  You can  therefore  centrally control dial up access   and secure network devices from unauthorized access     User Guide for Cisco Secure Access Control Server  32 E OL 9971 01           Chapter3 Network Configuration       Proxy in Distributed Systems  il    These types of access control have unique authentication and authorization requirements  With ACS   system administrators can use a variety of authentication methods that are used with different degrees  of authorization privileges     Completing the AAA functionality  ACS serves as a central repository for accounting information  Each  user session that ACS grants can be fully accounted for  and its accounting information can be stored in  the server  You can use this accounting information for billing  capacity planning  and security audits        Note    If the fields mentioned in this section do
26. emote Agent    Before You Begin    For descriptions of the options available while adding a remote agent configuration  see Remote Agent  Configuration Options  page 3 19     For ACS to communicate with a remote agent  you must ensure that gateway devices between a remote  agent and ACS permit communication over the TCP ports used by remote agents  For information about  ports used by remote agents  see the Installation and Configuration Guide for Cisco Secure ACS Remote  Agents Release 4 1     To add and configure a remote agent     Step1 In the navigation bar  click Network Configuration   The Network Configuration section opens   Step2 Perform one of the following steps  based on your use of NDGs     a  Ifyou are using NDGs  click the name of the NDG to which you want to assign the remote agent   Then  in the NDG Remote Agents table  click Add Entry     b  Ifyou are not using NDGs  click Add Entry in the Remote Agents table        User Guide for Cisco Secure Access Control Server  320 E OL 9971 01       _Chapter 3    Netw ork Configuration       Step 3  Step 4  Step 5    Step 6    Step 7    Configuring Remote Agents  ACS Solution Engine Only  W    The Add Remote Agent page appears   In the Remote Agent Name box  type a name for the remote agent  up to 32 characters    In the Remote Agent IP Address box  type the IP address of the computer that runs the remote agent     In the Port box  type the number of the TCP port on which the remote agent listens for communication  fro
27. essions than ACS sends to wired end user clients        Note If all authentication requests from a particular Cisco Aironet Access Point are PEAP or  EAP TLS requests  use RADIUS  IETF  instead of RADIUS  Cisco Aironet   ACS cannot  support PEAP authentication by using the RADIUS  Cisco Aironet  protocol          RADIUS  Cisco BBSM    RADIUS using Cisco Broadband Services Manager  BBSM   Vendor Specific Attributes  VSAs   Select this option if the network device is a Cisco BBSM  network device supporting authentication via RADIUS       RADIUS  Cisco IOS PIX 6 0    RADIUS using Cisco IOS PIX 6 0 VSAs  This option enables  you to pack commands sent to a Cisco IOS or Project Information Exchange  PIX S 6 0 AAA  client  The commands are defined in the Group Setup section  Select this option for RADIUS  environments in which key TACACS  functions are required to support Cisco IOS and PIX  equipment       RADIUS  Cisco VPN 3000 ASA PIX7 x     RADIUS using Cisco VPN 3000 concentrator   ASA device  and PIX 7 x device VSAs  Select this option if the network device is a Cisco VPN  3000 series concentrator  an ASA  or PIX 7 x  device supporting authentication via RADIUS       RADIUS  Cisco VPN 5000    RADIUS using Cisco VPN 5000 VSAs  Select this option if the  network device is a Cisco VPN 5000 series Concentrator       RADIUS  IETF    IETF standard RADIUS  using no VSAs  Select this option if the AAA  client represents RADIUS enabled devices from more than one manufacturer and you wan
28. figuration  The AAA server  hostname that is configured in ACS does not have to match the hostname configured on a network  device  We recommend that you adopt a descriptive  consistent naming convention for AAA server  names  Maximum length for AAA server names is 32 characters     wy    Note After you submit the AAA server name  you cannot change it  If you want to use a different  name for the AAA server  delete the AAA server configuration and create the AAA server  configuration by using the new name              AAA Server IP Address   The IP address of the AAA server  in dotted  four octet format  For  example  10 77 234 3       Key   The shared secret of the AAA server  Maximum length for AAA server keys is 32 characters     For correct operation  the key must be identical on the remote AAA server and ACS  Keys are case  sensitive  Because shared secrets are not synchronized  you could easily to make mistakes when  entering them on remote AAA servers and ACS  If the shared secret does not match  ACS discards  all packets from the remote AAA server       Network Device Group   tThe name of the NDG to which this AAA server should belong  To make  the AAA server independent of NDGs  use the Not Assigned selection      amp     Note This option does not appear if you have not configured ACS to use NDGs  To enable NDGs   choose Interface Configuration  gt  Advanced Options  Then  check the Network Device  Groups check box              I OL 9971 01    User Guide for Cisco Se
29. g Packets  page 3 5      Other Features Enabled by System Distribution  page 3 6    The Proxy Feature    Using proxy  ACS automatically forwards an authentication request from AAA clients to AAA servers   After the request has been successfully authenticated  the authorization privileges that you configured  for the user on the remote AAA server are passed back to the original ACS  where the AAA client applies  the user profile information for that session     Proxy provides a useful service to users  such as business travelers  who dial in to a network device other  than the one they normally use and would otherwise be authenticated by a foreign AAA server  To  configure proxy  you choose Interface Configuration  gt  Advanced Options  Then  check the  Distributed System Settings check box        I OL 9971 01    User Guide for Cisco Secure Access Control Server E    Chapter3 Network Configuration         W Proxy in Distributed Systems    An Example    This section presents a scenario of proxy that is used in an enterprise system  Mary is an employee with  an office in the corporate headquarters in Los Angeles  Her username is mary  la corporate com  When  Mary needs access to the network  she accesses the network locally and authenticates her username and  password  Because Mary works in the Los Angeles office  her user profile  which defines her  authentication and authorization privileges  resides on the local Los Angeles AAA server     However  Mary occasionally travels to
30. hich is the standard choice  when using Cisco Systems access servers  routers  and firewalls  If the AAA client is a Cisco  device management application  such as Management Center for Firewalls  you must use this  option       RADIUS  Cisco Airespace    RADIUS using Cisco Airespace VSAs  Select this option if the  network device is a Cisco Airespace WLAN device supporting authentication via RADIUS       RADIUS  Cisco Aironet    RADIUS using Cisco Aironet VSAs  Select this option if the  network device is a Cisco Aironet Access Point used by users who authenticate with the  Lightweight and Efficient Application Protocol  LEAP  or the Extensible Authentication  Protocol Transport Layer Security  EAP TLS  protocol  provided that these protocols are  enabled on the Global Authentication Setup page in the System Configuration section     When an authentication request from a RADIUS  Cisco Aironet  AAA client arrives  ACS first  attempts authentication by using LEAP  if this fails  ACS fails over to EAP TLS  If LEAP is  not enabled on the Global Authentication Setup page  ACS immediately attempts EAP TLS  authentication  If neither LEAP nor EAP TLS is enabled on the Global Authentication Setup   any authentication attempt received from a Cisco Aironet RADIUS client fails  For more  information about enabling LEAP or EAP TLS  see Global Authentication Setup  page 9 19     Using this option enables ACS to send the wireless network device a different session timeout  value for user s
31. if enabled in Advanced Options in the interface configuration     XS    Note Ifthe ACS into which you are currently logged does not provide configuration data for the  remote agent  none of the options can be edited  You can access the web interface for the ACS  that does provide configuration data to the remote agent by clicking the ACS name listed as the  Configuration Provider           To save your changes and apply them immediately  click Submit   Apply     p    Tip To save your changes and apply them later  click Submit  When you are ready to implement the  changes  click System Configuration  gt  Service Control  and then click Restart            amp     Note Restarting the service clears the Logged in User report and temporarily interrupts all ACS  services  The Max Sessions counter is reset to 0           Deleting a Remote Agent Configuration     amp        Note    Step 1    You cannot delete a remote agent that you have configured to use for remote logging or Windows  authentication        To delete a remote agent configuration     In the navigation bar  click Network Configuration     The Network Configuration section opens        User Guide for Cisco Secure Access Control Server  322 E OL 9971 01        Chapter3 Network Configuration       Step 2    Step 3    Step 4    Configuring Network Device Groups Hi    Perform one of the following steps  based on your use of NDGs     a  If you are using NDGs  click the name of the NDG to which the remote agent belongs  Then 
32. ination server  ACS  also caches the user connection information and adds an entry in the List Logged on Users report   You can then view the information for users that are currently connected  Because the accounting  information is sent to the remote AAA server  even if the connection fails  you can view the Failed  Attempts report to troubleshoot the failed connection        I OL 9971 01    User Guide for Cisco Secure Access Control Server E    Chapter3 Network Configuration         HI Network Device Searches      Sending the accounting information to the remote AAA server also enables you to use the Max  Sessions feature  The Max Sessions feature uses the Start and Stop records in the accounting packet   If the remote AAA server is an ACS and the Max Sessions feature is implemented  you can track  the number of sessions that are allowed for each user or group       You can also choose to have Voice over IP  VoIP  accounting information logged remotely   appended to the RADIUS Accounting log  entered in a separate VoIP Accounting log  or both     Other Features Enabled by System Distribution    Beyond basic proxy and fallback features  configuring an ACS to interact with distributed systems  enables several other features that are beyond the scope of this chapter  These features include       Replication   For more information  see ACS Internal Database Replication  page 8 1     RDBMS synchronization   For more information  see RDBMS Synchronization  page 8 17       Remote 
33. ins the following topics     About the Proxy Distribution Table  page 3 27     Adding a New Proxy Distribution Table Entry  page 3 28    Sorting the Character String Match Order of Distribution Entries  page 3 29     Editing a Proxy Distribution Table Entry  page 3 29    Deleting a Proxy Distribution Table Entry  page 3 30       I OL 9971 01    User Guide for Cisco Secure Access Control Server E    Chapter3 Network Configuration         WE Configuring Proxy Distribution Tables    About the Proxy Distribution Table     amp     If you enabled the Distributed Systems Settings  when you click Network Configuration  you will see  the Proxy Distribution Table        To enable Distributed Systems Settings in the ACS  choose Interface Configuration  gt  Advanced  Options  Then  check the Distributed System Settings check box        The Proxy Distribution Table includes entries that show the character strings on which to proxy  the  AAA servers to proxy to  whether to strip the character string  and where to send the accounting  information  Local Remote  Remote  or Local   For more information about the proxy feature  see Proxy  in Distributed Systems  page 3 3     The entries that you define and place in the Proxy Distribution Table are treated one at a time for each  authentication request that ACS receives from the AAA client  The authentication request is defined in  the Proxy Distribution Table according to the forwarding destination  If a match to an entry in the Proxy  Distrib
34. l ACS     Remote   Send accounting packets to the remote ACS       Local Remote   Keep accounting packets on the local ACS and send them to the remote ACS     p    Tip This information is especially important if you are using the Max Sessions feature to control the  number of connections that a user is allowed  Max Sessions depends on accounting start and stop  records  and where the accounting information is sent determines where the Max Sessions  counter is tracked  The Failed Attempts log and the Logged in Users report are also affected by  where the accounting records are sent  See Remote Use of Accounting Packets  page 3 5 for an  example           When you finish  click Submit or Submit   Apply     Sorting the Character String M atch Order of Distribution Entries    Step 1    Step 2    You can use this procedure to set the priority by which ACS searches character string entries in the Proxy  Distribution Table when users dial in     To determine the order by which ACS searches entries in the Proxy Distribution Table     In the navigation bar  click Network Configuration   The Network Configuration page opens   Below the Proxy Distribution Table  click Sort Entries     p    Tip Before you sort the entries  you must configure at least two unique Proxy Distribution Table  entries in addition to the  Default  table entry              I OL 9971 01    User Guide for Cisco Secure Access Control Server E    Chapter3 Network Configuration         WE Configuring Proxy Distributio
35. lears the Logged in User report and temporarily interrupts all ACS  services  As an alternative to restarting when you delete AAA clients  you can click Delete   However  when you do  the change does not take effect until you restart the system  which you  can do by choosing System Configuration  gt  Service Control  Then  choose Restart           A confirmation dialog box appears   Click OK   ACS restarts AAA services and the AAA client is deleted     If you have a configured RADIUS TACACS source interface command on the AAA client  ensure that  you configure the client on ACS by using the IP address of the interface that is specified     Configuring AAA Servers    No    This section presents procedures for configuring AAA servers in the ACS web interface  For additional  information about AAA servers  see AAA Servers in Distributed Systems  page 3 2     To configure distributed system features for a given ACS  you must first define the other AAA server s    For example  all ACSs that are involved in replication  remote logging  authentication proxying  and  RDBMS synchronization must have AAA server configurations for each other  otherwise  incoming  communication from an unknown ACS is ignored and the distributed system feature will fail        If the AAA Servers table does not appear  choose Interface Configuration  gt  Advanced Options  Then   check the Distributed System Settings check box        This section contains the following topics     AAA Server Configuration Op
36. m ACS  up to 6 digits   The default TCP port is 2003     N    Note If this port number does not match the port on which the remote agent is configured to listen   ACS cannot communicate with the remote agent  For information about configuring the port  number on which the remote agent listens  see the Installation and Configuration Guide for  Cisco Secure ACS Remote Agents Release 4 1           From the Network Device Group list  select the NDG to which this remote agent belongs      amp     Note The Network Device Group list appears only if NDGs are enabled  To enable NDGs  click  Interface Configuration  gt  Advanced Options  and then click Network Device Groups           To save your changes and immediately apply them  click Submit   Apply     p    Tip To save your changes and apply them later  click Submit  When you are ready to implement the  changes  click System Configuration  gt  Service Control  and then click Restart            amp     Note Restarting the service clears the Logged in User report and temporarily interrupts all ACS  services  The Max Sessions counter is reset to 0           Editing a Remote Agent Configuration    N    Note    Use this procedure to edit the settings for a remote agent that you have previously configured        You cannot edit the name of a remote agent  If you want to use a different name for a remote agent  delete  the remote agent configuration  create a remote agent configuration by using the new name  and change  remote logging and
37. n Tables    Step 3    Step 4    Select the character string entry to reorder  and then click Up or Down to move its position to reflect the  search order that you want     When you finish sorting  click Submit or Submit   Apply     Editing a Proxy Distribution Table Entry    Step 1    Step 2    Step 3    Step 4    To edit a Proxy Distribution Table entry     In the navigation bar  click Network Configuration   The Network Configuration page opens     In the Character String column of the Proxy Distribution Table  click the distribution entry that you want  to edit     The Edit Proxy Distribution Entry page appears   Edit the entry as necessary     p    Tip For information about the parameters that make up a distribution entry  see Adding a New Proxy  Distribution Table Entry  page 3 28           When you finish editing the entry  click Submit or Submit   Apply     Deleting a Proxy Distribution Table Entry    Step 1    Step 2    Step 3    Step 4    To delete a Proxy Distribution Table entry     In the navigation bar  click Network Configuration   The Network Configuration page opens     In the Character String column of the Proxy Distribution Table  click the distribution entry that you want  to delete     The Edit Proxy Distribution Entry page appears   Click Delete    A confirmation dialog box appears    Click OK     The distribution entry is deleted from the Proxy Distribution Table        User Guide for Cisco Secure Access Control Server  330 fF OL 9971 01      
38. o an NDG     In the navigation bar  click Network Configuration   The Network Configuration page opens   In the Network Device Groups table  click Not Assigned     p    Tip If the Network Device Groups table does not appear  choose Interface Configuration  gt   Advanced Options  Then  check the Network Device Groups check box           Click the name of the network device that you want to assign to an NDG     From the Network Device Groups list  select the NDG to which you want to assign the AAA client or  AAA server     Click Submit     The client or server is assigned to an NDG     Reassigning AAA Clients or AAA Servers to an NDG    Step 1    To reassign AAA clients or AAA servers to a new NDG     In the navigation bar  click Network Configuration     The Network Configuration page opens        I OL 9971 01    User Guide for Cisco Secure Access Control Server E    Chapter3 Network Configuration         WE Configuring Network Device Groups    Step 2  Step 3    Step 4  Step 5    In the Network Device Groups table  click the name of the current group of the network device     In the AAA Clients table or AAA Servers table  as applicable  click the name of the client or server that  you want to assign to a new NDG     From the Network Device Group list  select the NDG to which you want to reassign the network device   Click Submit     The network device is assigned to the NDG you selected     Editing a Network Device Group    A    Caution       Step 1    Step 2    Step 3  Step 4
39. oes not receive  them  If a Proxy Distribution Table entry is configured to proxy authentication requests to the  AAA server that is configured for Outbound  the authentication request is not sent       Inbound Outbound   The remote AAA server forwards and accepts authentication requests   allowing the selected server to handle authentication requests in any manner that is defined in  the distribution tables     AAA Server RADIUS Authentication Port   Specify the port on which the AAA server accepts  authentication requests  The standard port is 1812  and another commonly used port is 1645  If you  select TACACS  in the AAA Server Type field  this RADIUS Authentication Port field is dimmed     AAA Server RADIUS Accounting Port   Specify the port on which the AAA server accepts  accounting information  The standard port is 1813  and another commonly used port is 1646  If you  select TACACS  in the AAA Server Type field  this RADIUS Accounting Port field is dimmed     Adding AAA Servers    Before You Begin    For descriptions of the options that are available while adding a remote AAA server configuration  see  AAA Server Configuration Options  page 3 15     For ACS to provide AAA services to a remote AAA server  you must ensure that gateway devices  between the remote AAA server and ACS permit communication over the ports that support the  applicable AAA protocol  RADIUS or TACACS    For information about ports that AAA protocols use   see AAA Protocols   TACACS  and RADIUS  p
40. of characters  including the delimiter to forward on when  users dial in to be authenticated  For example   uk      amp     Note Angle brackets   lt  gt   cannot be used           From the Position list  select Prefix if the character string that you typed appears at the beginning of the  username or Suffix if the character string appears at the end of the username        User Guide for Cisco Secure Access Control Server  328 E OL 9971 01       _Chapter 3    Netw ork Configuration       Step 5    Step 6    Step 7    Step 8    Configuring Proxy Distribution Tables Hil    From the Strip list  select Yes to strip the character string from the username that you entered  or select  No to leave it     In the AAA Servers column  select the AAA server that you want to use for proxy  Click the    gt   right  arrow button  to move it to the Forward To column     p    Tip You can also select additional AAA servers to use for backup proxy if the prior servers fail  To  set the order of AAA servers  in the Forward To column  click the name of the applicable server  and click Up or Down to move it into the position that you want            amp     Tip If the AAA server that you want to use is not listed  choose Network Configuration  gt  AAA  Servers  Then  choose Add Entry and complete the applicable information           From the Send Accounting Information list  select one of the following areas to which to report  accounting information       Local   Keep accounting packets on the loca
41. or Not Assigned AAA Servers table        It might be useful to empty an NDG of AAA clients and AAA servers before you delete it  You can do  this manually by performing the procedure Reassigning AAA Clients or AAA Servers to an NDG  page  3 25  or  in cases where you have a large number of devices to reassign  use the RDBMS Synchronization  feature           When deleting an NDG  ensure that there are no NARs or other SPCs that invoke the original NDG  ACS  performs no automatic checking to determine whether the original NDG is still invoked  If a user  authentication request incorporates an SPC that invokes a nonexistent  or renamed  NDG  the attempt  will fail and the user will be rejected        To delete an NDG     In the navigation bar  click Network Configuration   The Network Configuration page opens   In the Network Device Groups table  click the NDG that you want to delete      amp     Tip If the Network Device Groups table does not appear  choose Interface Configuration  gt   Advanced Options  Then check the Network Device Groups check box           At the bottom of the page  click Delete Group   A confirmation dialog box appears   Click OK     The NDG is deleted and its name is removed from the Network Device Groups table  Any AAA clients  and AAA servers that were in the NDG are now in the Not Assigned AAA Clients or Not Assigned AAA  Servers table     Configuring Proxy Distribution Tables    This section describes the Proxy Distribution Table   This section conta
42. oxy example  the character string that accompanies the username establishes  the ability to forward the request to another AAA server  If the user must enter the user ID of   mary    corporate com to be forwarded correctly to the AAA server for authentication  ACS might find  a match on the  corporate com character string  and strip the  corporate com  leaving a username of  mary  which might be the username format that the destination AAA server requires to identify the  correct entry in its database        Note    Realm stripping does not work with Extensible Authentication Protocol  EAP  based authentication  protocols  such as Protected Extensible Authentication Protocol  PEAP  or Extensible Authentication  Protocol Flexible Authentication via Secure Tunneling  EAP FAST   For example  if you are using  Protected Extensible Authentication Protocol Microsoft Challenge Authentication Handshake Protocol   PEAP MSCHAP   authentication will fail if a realm is stripped by proxy        Remote Use of Accounting Packets    When proxy is employed  ACS can dispatch AAA accounting packets in one of three ways     Log them locally     Forward them to the destination AAA server     Log them locally and forward copies to the destination AAA server    Sending accounting packets to the remote ACS offers several benefits       When ACS is configured to send accounting packets to the remote AAA server  the remote  AAA server logs an entry in the accounting report for that session on the dest
43. ple network devices  thus  the AAA client hostname  configured in ACS is not required to match the hostname configured on a network device  We  recommend that you adopt a descriptive  consistent naming convention for AAA client hostnames   Maximum length for AAA client hostnames is 32 characters      amp     Note After you submit the AAA client hostname  you cannot change it  If you want to use a  different name for AAA clients  delete the AAA client configuration and create a new AAA  client configuration by using the new name             AAA Client IP Address   At a minimum  a single IP address of the AAA client or the keyword  dynamic     If you only use the keyword dynamic  with no IP addresses  the AAA client configuration can only  be used for command authorization for Cisco multi device management applications  such as  Management Center for Firewalls  ACS only provides AAA services to devices based on IP address   so it ignores such requests from a device whose AAA client configuration only has the keyword  dynamic in the Client IP Address box     If you want the AAA client configuration in ACS to represent multiple network devices  you can  specify multiple IP addresses  Separate each IP address by pressing Enter     In each IP address that you specify  you have three options for each octet in the address        User Guide for Cisco Secure Access Control Server  EN  OL 9971 01       _ Chapter 3    Netw ork Configuration       Configuring AAA Clients Ti      Number   
44. ptions  page 3 15        I OL 9971 01    User Guide for Cisco Secure Access Control Server E    Chapter3 Network Configuration         WE Configuring AAA Clients    Step6 If you want to download a file containing the search results in a comma separated value format  click  Download  and use your browser to save the file to a location and filename of your choice     Step7 If you want to search again by using different criteria  repeat Step 3 and Step 4     Configuring AAA Clients    This guide uses the term    AAA client    comprehensively to signify the device through which or to which  service access is attempted  This is the RADIUS or TACACS   client device  and may comprise Network  Access Servers  NASs   PIX Firewalls  routers  or any other RADIUS or TACACS  hardware or  software client     This section contains the following topics     AAA Client Configuration Options  page 3 8     Adding AAA Clients  page 3 11    Editing AAA Clients  page 3 12    Deleting AAA Clients  page 3 14    AAA Client Configuration Options    AAA client configurations enable ACS to interact with the network devices that the configuration  represents  A network device that does not have a corresponding configuration in ACS  or whose  configuration in ACS is incorrect  does not receive AAA services from ACS     The Add AAA Client and AAA Client Setup pages include       AAA Client Hostname   The name that you assign to the AAA client configuration  Each AAA  client configuration can represent multi
45. ration  see Displaying Advanced Options  page 2 5     e AAA Servers   This table lists each AAA server that is configured on the network together with its  IP address and associated type  After installation  this table automatically lists the machine on which  ACS is installed  In ACS SE  the name of the machine is listed as self     If you are using Network Device Groups  NDGs   this table does not appear on the initial page  but  is accessed through the Network Device Group table  For more information about this interface  configuration  see Displaying Advanced Options  page 2 5        I OL 9971 01    User Guide for Cisco Secure Access Control Server E    Chapter3 Network Configuration         W About ACS in Distributed Systems      Remote Agents  ACS Solution Engine    This table lists each remote agent that is configured  together with its IP address and available services  For more information about remote agents  see  About Remote Agents  page 3 19      amp     Note The Remote Agents table does not appear unless you have enabled the Distributed System  Settings feature in Interface Configuration  If you are using NDGs  this table does not appear on  the initial page  but is accessed through the Network Device Groups table  For more information  about this interface configuration  see Displaying Advanced Options  page 2 5             Network Device Groups   This table lists the name of each NDG that has been configured  and the  number of AAA clients and AAA servers that
46. s authentication requests             Remote Agent Name   The name that you assign to the remote agent configuration  You configure  remote agent logging and Windows authentication by using remote agent names  We recommend  that you adopt a descriptive  consistent naming convention for remote agents  For example  you  could assign the same name as the hostname of the server that runs the remote agent  The maximum  length for a remote agent name is 32 characters     S    Note After you submit the remote agent name  you cannot change it  If you want to use a different  name for a remote agent  delete the remote agent configuration  create a new remote agent  configuration by using the new name  and change remote logging and Windows  authentication configurations that use the remote agent                Remote Agent IP Address   The IP address of the remote agent  in dotted decimal format  For  example  10 77 234 3       Remote Agent Port   The TCP port on which the remote agent listens for communication from  ACS  The maximum length for the TCP port number is 6 characters  The Remote Agent Port must  be a numeric value in the range of 0 to 65535        User Guide for Cisco Secure Access Control Server    OL 9971 01 a 3 19      Chapter3 Network Configuration         HI Configuring Remote Agents  ACS Solution Engine Only      amp     Note Ifthe port number that you provide does not match the port the remote agent that you  configured for listening  ACS cannot communicate with the
47. sion  By default  this check box is unchecked      amp     Note If TCP connections between ACS and the AAA client are unreliable  do not use this feature             Log Update Watchdog Packets from this AAA Client   Enables logging of update or watchdog  packets  Watchdog packets are interim packets that are sent periodically during a session  They  provide you with an approximate session length if the AAA client fails and  therefore  no stop packet  is received to mark the end of the session  By default  this check box is unchecked       Log RADIUS Tunneling Packets from this AAA Client   Enables logging of RADIUS tunneling  accounting packets  Packets are recorded in the RADIUS Accounting reports of Reports and  Activity  By default  this check box is unchecked       Replace RADIUS Port info with Username from this AAA Client   Enables use of username   rather than port number  for session state tracking  This option is useful when the AAA client cannot  provide unique port values  such as a gateway GPRS support node  GGSN   For example  if you use  the ACS IP pools server and the AAA client does not provide a unique port for each user  ACS  assumes that a reused port number indicates that the previous user session has ended and ACS may  reassign the IP address that was previously assigned to the session with the non unique port number   By default  this check box is unchecked           Note If this option is enabled  ACS cannot determine the number of user sessions for ea
48. t   Apply      amp     Tip To save your changes and apply them later  choose Submit  When you are ready to implement  the changes  choose System Configuration  gt  Service Control  Then  choose Restart            amp     Note Restarting the service clears the Logged in User report and temporarily interrupts all ACS  services  This action affects the Max Sessions counter and resets it to  0            Deleting AAA Servers    To delete AAA servers     Step1 In the navigation bar  click Network Configuration   The Network Configuration page opens   Step2 Do one of the following        Ifyou are using NDGs  click the name of the NDG to which the AAA server is assigned  Then  click  the AAA server name in the AAA Servers table       If you have not enabled NDGs  click the AAA server name in the AAA Servers table   The AAA Server Setup for X page appears   Step3 To delete the AAA server and have the deletion take effect immediately  click Delete   Apply     S    Note Restarting the service clears the Logged in User report and temporarily interrupts all ACS  services  As an alternative to restarting when you delete AAA servers  in the preceding step you  can click Delete  However  when you do this  the change does not take effect until you restart  the system  which you can do by choosing System Configuration  gt  Service Control  Then   choose Restart           A confirmation dialog box appears   Step4 Click OK   ACS performs a restart and the AAA server is deleted     Configuring 
49. t to  use standard IETF RADIUS attributes  If the AAA client represents a Cisco Aironet Access  Point used only by users who authenticate with PEAP or EAP TLS  this is also the protocol to  select       RADIUS  Ascend    RADIUS using Ascend RADIUS VSAs  Select this option if the network  device is an Ascend network device that supports authentication via RADIUS       RADIUS  Juniper    RADIUS using Juniper RADIUS VSAs  Select this option if the network  device is a Juniper network device that supports authentication via RADIUS           User Guide for Cisco Secure Access Control Server  P30 E OL 9971 01        Chapter 3    Netw ork Configuration       Configuring AAA Clients Ti      RADIUS  Nortel    RADIUS using Nortel RADIUS VSAs  Select this option if the network  device is a Nortel network device that supports authentication via RADIUS       RADIUS  iPass    RADIUS for AAA clients using iPass RADIUS  Select this option if the  network device is an iPass network device supporting authentication via RADIUS  The iPass  RADIUS is identical to IETF RADIUS       Single Connect TACACS  AAA Client  Record stop in accounting on failure    If you select  TACACS   Cisco IOS  from the Authenticate Using list  you can use this option to specify that ACS  use a single TCP connection for all TACACS  communication with the AAA client  rather than a  new one for every TACACS  request  In single connection mode  multiple requests from a network  device are multiplexed over a single TCP ses
50. ting the service clears the Logged in User report and temporarily interrupts all ACS  services  This action affects the Max Sessions counter           Configuring a Default AAA Client    Step 1  Step 2  Step 3     amp     Note       You can configure a default AAA Client to accommodate any unrecognized AAA Clients  NAS      Follow the steps for Adding AAA Clients  page 3 11   Leave the AAA Client Hostname and AAA Client IP address blank   Complete the rest of the fields and continue with the rest of the procedure for adding AAA Clients        Only TACACS  can have a default AAA Client configured  The default name for the client is Others  and the default IP address is 0 0 0 0           I OL 9971 01    User Guide for Cisco Secure Access Control Server E    Chapter3 Network Configuration         WE Configuring AAA Servers    Deleting AAA Clients    Step 1    Step 2    Step 3    Step 4    To delete AAA clients     In the navigation bar  click Network Configuration   The Network Configuration page opens   Do one of the following       If you are using NDGs  click the name of the NDG to which the AAA client is assigned  Then  click  the AAA client hostname in the AAA Clients table       To delete AAA clients when you have not enabled NDGs  click the AAA client hostname in the  AAA Clients table     The AAA Client Setup for the Name page appears   To delete the AAA client and have the deletion take effect immediately  click Delete   Apply      amp     Note Restarting ACS services c
51. tions  page 3 15  e Adding AAA Servers  page 3 16    Editing AAA Servers  page 3 17       User Guide for Cisco Secure Access Control Server  P34 E OL 9971 01       _Chapter 3    Netw ork Configuration       Configuring AAA Servers W       Deleting AAA Servers  page 3 18    AAA Server Configuration Options    2    AAA server configurations enable ACS to interact with the AAA server that the configuration represents   AAA servers that do not have a corresponding configuration in ACS  or whose configuration in ACS is  incorrect  do not receive AAA services from ACS  such as proxied authentication requests  database  replication communication  remote logging  and RDBMS synchronization  Also  several distributed  systems features require that the other ACSs included in the distributed system be represented in the  AAA Servers table  For more information about distributed systems features  see About ACS in  Distributed Systems  page 3 2     After installation  the AAA Servers table automatically lists the machine on which ACS is installed  This  machine is also defined as the default proxy server in the Proxy Distribution table  and appears by default  in the RDBMS table        In ACS SE  the name of the machine in the AAA servers table is listed as self  in the Proxy Distribution  and RDBMS tables the appliance hostname is listed        The Add AAA Server and AAA Server Setup pages include the following options       AAA Server Name   The name that you assign to the AAA server con
52. to the Search for Network Devices page to view your most recent search criteria and  results           Set the criteria for a device search  For information about search criteria  see Network Device Search  Criteria  page 3 6     p    Tip To reset the search criteria to default settings  click Clear           Click Search     A table lists each network device configured in ACS that matches the search criteria you specified  If  ACS did not find a matching network device  the message No Search Results appears     The table listing that matches network devices includes the device name  IP address  and type  If you  have enabled Network Device Groups on the Advanced Options page in the Interface Configuration  Section  the table also includes the NDG of each matching network device     p    Tip You can sort the table rows by whichever column you want  in ascending or descending order   Click a column title once to sort the rows by the entries in that column in ascending order  Click  the column a second time to sort the rows by the entries in that column in descending order           If you want to view the configuration settings for a network device found by the search  click the network  device name in the Name column in the table of matching network devices     ACS displays the applicable setup page  For information about the AAA Client Setup page  see AAA  Client Configuration Options  page 3 8  For information about the AAA Server Setup page  see AAA  Server Configuration O
53. ution Table that contains proxy information is found  ACS forwards the request to the appropriate  AAA server     The Character String column in the Proxy Distribution Table always contains an entry of  Default   The   Default  entry matches authentication requests that are received by the local ACS that do not match any  other defined character strings  While you cannot change the character string definition for the  Default   entry  you can change the distribution of authentication requests matching the  Default  entry  At  installation  the AAA server associated with the  Default  entry is the local ACS  You might sometimes  find it easier to define strings that match authentication requests to be processed locally rather than  defining strings that match authentication requests to be processed remotely  In such a case  associating  the  Default  entry with a remote AAA server permits you to configure your Proxy Distribution Table  with the more easily written entries     Adding a New Proxy Distribution Table Entry    Step 1    Step 2    Step 3    Step 4    To create a Proxy Distribution Table entry     In the navigation bar  click Network Configuration   The Network Configuration page opens   Under the Proxy Distribution Table  click Add Entry      amp     Note If the Proxy Distribution Table does not appear  choose Interface Configuration  gt  Advanced  Options  Then  select the Distributed System Settings check box           In the Character String box  type the string 
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
User manual Van Hoorn Carbide Customer Connect  User`s Manual English Edition  TEFAL ZC500H65 Instruction Manual  Instalación en el vehículo - Shop  Brodit ProClip 511443  BMW 525i Sedan Service and Warranty Information  Griffin DirectDeck  Manual for HDMI 3x1 Switch  北斗vol15.indd  IHeat S-4 Instructions / Assembly    Copyright © All rights reserved. 
   Failed to retrieve file