User Guide for Cisco Secure Access
Control System 5.4
November 2013
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: OL-26225-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
User Guide for Cisco Secure Access Control System 5.4
Migrating from ACS 4.2 on CSACS 1120 to ACS 5.42-7
Migrating from ACS 3.x to ACS 5.42-8
Migrating Data from Other AAA Servers to ACS 5.42-8
3ACS 5.x Policy Model3-1
Overview of the ACS 5.x Policy Model3-1
User Guide for Cisco Secure Access Control System 5.4
iii
Contents
Policy Terminology3-3
Simple Policies3-4
Rule-Based Policies3-4
Types of Policies3-5
Access Services3-6
Identity Policy3-9
Group Mapping Policy3-11
Authorization Policy for Device Administration3-11
Processing Rules with Multiple Command Sets3-11
Exception Authorization Policy Rules3-12
Service Selection Policy3-12
Simple Service Selection3-12
Rules-Based Service Selection3-13
Access Services and Service Selection Scenarios3-13
First-Match Rule Tables3-14
Policy Conditions3-16
Policy Results3-16
CHAPTER
Authorization Profiles for Network Access3-16
Processing Rules with Multiple Authorization Profiles3-17
Policies and Identity Attributes3-17
Policies and Network Device Groups3-18
Example of a Rule-Based Policy3-18
Flows for Configuring Services and Policies3-19
4Common Scenarios Using ACS4-1
Overview of Device Administration4-2
Session Administration4-3
Command Authorization4-4
TACACS+ Custom Services and Attributes4-5
Password-Based Network Access4-5
Overview of Password-Based Network Access4-5
Password-Based Network Access Configuration Flow4-7
Certificate-Based Network Access4-9
Overview of Certificate-Based Network Access4-9
Using Certificates in ACS4-10
Certificate-Based Network Access4-10
Authorizing the ACS Web Interface from Your Browser Using a Certificate4-11
Validating an LDAP Secure Authentication Connection4-12
iv
User Guide for Cisco Secure Access Control System 5.4
OL-26225-01
Agentless Network Access4-12
Overview of Agentless Network Access4-12
Host Lookup4-13
Authentication with Call Check4-14
Process Service-Type Call Check4-15
PAP/EAP-MD5 Authentication4-15
Agentless Network Access Flow4-16
Adding a Host to an Internal Identity Store4-17
Configuring an LDAP External Identity Store for Host Lookup4-17
Configuring an Identity Group for Host Lookup Network Access Requests4-18
Creating an Access Service for Host Lookup4-18
Configuring an Identity Policy for Host Lookup Requests4-19
Configuring an Authorization Policy for Host Lookup Requests4-20
Adding Devices for Security Group Access4-24
Creating Security Groups4-24
Creating SGACLs4-25
Configuring an NDAC Policy4-25
Configuring EAP-FAST Settings for Security Group Access4-26
Creating an Access Service for Security Group Access4-26
Creating an Endpoint Admission Control Policy4-27
Creating an Egress Policy4-27
Creating a Default Policy4-28
RADIUS and TACACS+ Proxy Requests4-29
Supported Protocols4-30
Supported RADIUS Attributes4-31
TACACS+ Body Encryption4-31
Connection to TACACS+ Server4-31
Configuring Proxy Service4-32
5Understanding My Workspace5-1
OL-26225-01
Welcome Page5-1
Task Guides5-2
User Guide for Cisco Secure Access Control System 5.4
v
Contents
My Account Page5-2
Login Banner5-3
Using the Web Interface5-3
Accessing the Web Interface5-4
Logging In5-4
Logging Out5-5
Understanding the Web Interface5-5
Web Interface Design5-6
Navigation Pane5-7
Content Area5-8
Importing and Exporting ACS Objects through the Web Interface5-18
Downloading the Template from the Web Interface5-21
Understanding the CSV Templates5-22
Creating the Import File5-22
CHAPTER
CHAPTER
Common Errors5-25
Concurrency Conflict Errors5-25
Deletion Errors5-26
System Failure Errors5-27
Accessibility5-27
Display and Readability Features5-27
Keyboard and Mouse Features5-28
Obtaining Additional Accessibility Information5-28
6Post-Installation Configuration Tasks6-1
Configuring Minimal System Setup6-1
Configuring ACS to Perform System Administration Tasks6-2
Configuring ACS to Manage Access Policies6-4
Configuring ACS to Monitor and Troubleshoot Problems in the Network6-4
7Managing Network Resources7-1
Network Device Groups7-2
Creating, Duplicating, and Editing Network Device Groups7-2
Deleting Network Device Groups7-3
Creating, Duplicating, and Editing Network Device Groups Within a Hierarchy7-4
Deleting Network Device Groups from a Hierarchy7-5
vi
Network Devices and AAA Clients7-5
User Guide for Cisco Secure Access Control System 5.4
OL-26225-01
Viewing and Performing Bulk Operations for Network Devices 7-6
Exporting Network Devices and AAA Clients7-7
Performing Bulk Operations for Network Resources and Users7-8
Exporting Network Resources and Users7-10
Creating, Duplicating, and Editing Network Devices7-10
Deleting an Identity Group8-7
Managing Identity Attributes8-7
Standard Attributes8-8
User Attributes8-8
Host Attributes8-9
Configuring Authentication Settings for Users8-9
Creating Internal Users8-11
Deleting Users from Internal Identity Stores8-15
Viewing and Performing Bulk Operations for Internal Identity Store Users8-15
Creating Hosts in Identity Stores8-16
Deleting Internal Hosts8-18
OL-26225-01
User Guide for Cisco Secure Access Control System 5.4
vii
Contents
Viewing and Performing Bulk Operations for Internal Identity Store Hosts8-18
Management Hierarchy8-19
Attributes of Management Hierarchy8-19
Configuring AAA Devices for Management Hierarchy8-19
Configuring Users or Hosts for Management Hierarchy8-20
Configuring and Using UserIsInManagement Hierarchy Attribute8-20
Configuring and Using HostIsInManagement Hierarchy Attributes8-21
Managing External Identity Stores8-22
LDAP Overview8-22
Directory Service8-23
Authentication Using LDAP8-23
Multiple LDAP Instances8-23
Failover8-24
LDAP Connection Management8-24
Authenticating a User Using a Bind Connection8-24
Group Membership Information Retrieval8-25
Attributes Retrieval8-25
Certificate Retrieval8-26
Creating External LDAP Identity Stores8-26
Configuring an External LDAP Server Connection8-27
Configuring External LDAP Directory Organization8-29
Deleting External LDAP Identity Stores8-33
Configuring LDAP Groups8-33
Viewing LDAP Attributes8-34
Leveraging Cisco NAC Profiler as an External MAB Database8-34
Enabling the LDAP Interface on Cisco NAC Profiler to Communicate with ACS8-35
Configuring NAC Profile LDAP Definition in ACS for Use in Identity Policy8-37
Troubleshooting MAB Authentication with Profiler Integration8-41
Microsoft AD8-41
Machine Authentication8-43
Attribute Retrieval for Authorization8-44
Group Retrieval for Authorization8-44
Certificate Retrieval for EAP-TLS Authentication8-44
Concurrent Connection Management8-44
User and Machine Account Restrictions8-44
Machine Access Restrictions8-45
Distributed MAR Cache8-46
Dial-In Permissions8-47
Callback Options for Dial-In users8-48
Joining ACS to an AD Domain8-49
viii
User Guide for Cisco Secure Access Control System 5.4
Creating and Editing RSA SecurID Token Servers8-59
RADIUS Identity Stores8-63
Supported Authentication Protocols8-63
Failover8-64
Password Prompt8-64
User Group Mapping8-64
Groups and Attributes Mapping8-64
RADIUS Identity Store in Identity Sequence8-65
Authentication Failure Messages8-65
Username Special Format with Safeword Server8-65
User Attribute Cache8-66
Creating, Duplicating, and Editing RADIUS Identity Servers8-66
Contents
CHAPTER
Configuring CA Certificates8-71
Adding a Certificate Authority8-72
Editing a Certificate Authority and Configuring Certificate Revocation Lists8-73
Deleting a Certificate Authority8-74
Exporting a Certificate Authority8-75
Creating, Duplicating, and Editing Identity Store Sequences8-78
Deleting Identity Store Sequences8-80
9Managing Policy Elements9-1
Managing Policy Conditions9-1
Creating, Duplicating, and Editing a Date and Time Condition9-3
Creating, Duplicating, and Editing a Custom Session Condition9-5
Deleting a Session Condition9-6
Managing Network Conditions9-6
Importing Network Conditions9-8
Exporting Network Conditions9-9
Creating, Duplicating, and Editing End Station Filters9-9
Creating, Duplicating, and Editing Device Filters9-12
Creating, Duplicating, and Editing Device Port Filters9-15
OL-26225-01
User Guide for Cisco Secure Access Control System 5.4
ix
Contents
Managing Authorizations and Permissions9-17
Creating, Duplicating, and Editing Authorization Profiles for Network Access9-18
Specifying Authorization Profiles9-19
Specifying Common Attributes in Authorization Profiles9-19
Specifying RADIUS Attributes in Authorization Profiles9-22
Creating and Editing Security Groups9-24
Creating, Duplicating, and Editing a Shell Profile for Device Administration9-24
Defining General Shell Profile Properties9-26
Defining Common Tasks9-26
Defining Custom Attributes9-29
Creating, Duplicating, and Editing Command Sets for Device Administration9-29
Creating, Duplicating, and Editing Downloadable ACLs9-32
Deleting an Authorizations and Permissions Policy Element9-33
Configuring Security Group Access Control Lists9-34
CHAPTER
10Managing Access Policies10-1
Policy Creation Flow10-1
Network Definition and Policy Goals10-2
Policy Elements in the Policy Creation Flow10-3
Access Service Policy Creation10-4
Service Selection Policy Creation10-4
Customizing a Policy10-4
Configuring the Service Selection Policy10-5
Configuring a Simple Service Selection Policy10-6
Service Selection Policy Page10-6
Creating, Duplicating, and Editing Service Selection Rules10-8
Displaying Hit Counts 10-10
Deleting Service Selection Rules10-10
Configuring Access Services10-11
Editing Default Access Services10-11
Creating, Duplicating, and Editing Access Services10-12
Configuring General Access Service Properties10-13
Configuring Access Service Allowed Protocols10-16
Configuring Access Services Templates10-20
Deleting an Access Service10-21
User Guide for Cisco Secure Access Control System 5.4
x
OL-26225-01
Configuring a Group Mapping Policy10-27
Configuring Group Mapping Policy Rule Properties10-29
Configuring a Session Authorization Policy for Network Access10-30
Configuring Network Access Authorization Rule Properties10-32
Configuring Device Administration Authorization Policies10-33
Configuring Device Administration Authorization Rule Properties10-34
Configuring Device Administration Authorization Exception Policies10-34
Configuring Shell/Command Authorization Policies for Device Administration10-35
Configuring Authorization Exception Policies10-36
Creating Policy Rules10-38
Duplicating a Rule10-39
Editing Policy Rules10-39
Deleting Policy Rules10-40
Configuring Compound Conditions10-41
Compound Condition Building Blocks10-41
Types of Compound Conditions10-42
Using the Compound Expression Builder10-45
Contents
CHAPTER
Security Group Access Control Pages10-46
Egress Policy Matrix Page10-46
Editing a Cell in the Egress Policy Matrix10-47
Defining a Default Policy for Egress Policy Page10-47
NDAC Policy Page10-48
NDAC Policy Properties Page10-49
Network Device Access EAP-FAST Settings Page10-51
Maximum User Sessions10-51
Max Session User Settings10-52
Max Session Group Settings10-52
Max Session Global Setting10-53
Purging User Sessions10-54
Maximum User Session in Distributed Environment10-55
Maximum User Session in Proxy Scenario10-56
11Monitoring and Reporting in ACS11-1
Authentication Records and Details11-2
Dashboard Pages11-2
OL-26225-01
Working with Portlets11-4
Working with Authentication Lookup Portlet11-5
Running Authentication Lookup Report11-6
Configuring Tabs in the Dashboard11-6
User Guide for Cisco Secure Access Control System 5.4
xi
Contents
Adding Tabs to the Dashboard11-6
Adding Applications to Tabs11-7
Renaming Tabs in the Dashboard11-7
Changing the Dashboard Layout11-8
Deleting Tabs from the Dashboard11-8
CHAPTER
12Managing Alarms12-1
Understanding Alarms12-1
Evaluating Alarm Thresholds12-2
Notifying Users of Events12-3
Viewing and Editing Alarms in Your Inbox12-3
Understanding Alarm Schedules12-9
Creating and Editing Alarm Schedules12-9
Assigning Alarm Schedules to Thresholds12-10
Deleting Alarm Schedules12-11
Creating, Editing, and Duplicating Alarm Thresholds12-11
Configuring General Threshold Information12-13
Configuring Threshold Criteria12-14
Creating and Editing Alarm Syslog Targets12-35
Deleting Alarm Syslog Targets12-36
User Guide for Cisco Secure Access Control System 5.4
OL-26225-01
Contents
CHAPTER
13Managing Reports13-1
Working with Favorite Reports13-3
Adding Reports to Your Favorites Page13-3
Viewing Favorite-Report Parameters13-4
Editing Favorite Reports13-5
Running Favorite Reports13-5
Deleting Reports from Favorites13-6
Sharing Reports13-6
Working with Catalog Reports13-7
Available Reports in the Catalog13-7
Running Catalog Reports13-11
Deleting Catalog Reports13-12
Running Named Reports 13-13
Understanding the Report_Name Page13-14
Enabling RADIUS CoA Options on a Device13-17
Changing Authorization and Disconnecting Active RADIUS Sessions13-18
Customizing Reports13-19
Restoring Reports13-20
Viewing Reports13-20
About Standard Viewer13-21
About Interactive Viewer13-21
About the Interactive Viewer Context Menus13-21
Navigating Reports13-22
Using the Table of Contents13-23
Exporting Report Data13-24
Printing Reports13-26
Saving Report Designs in Interactive Viewer13-26
Formatting Reports in Interactive Viewer13-27
Editing Labels13-27
Formatting Labels 13-28
Formatting Data13-28
Resizing Columns13-29
Changing Column Data Alignment 13-29
Formatting Data in Columns13-29
Formatting Data in Aggregate Rows13-30
Formatting Data Types13-30
Formatting Numeric Data13-31
Formatting Fixed or Scientific Numbers or Percentages13-32
Formatting Custom Numeric Data13-33
OL-26225-01
User Guide for Cisco Secure Access Control System 5.4
xiii
Contents
Formatting String Data13-33
Formatting Custom String Data13-33
Formatting Date and Time13-35
Formatting Custom Date and Time13-35
Formatting Boolean Data13-36
Applying Conditional Formats13-37
Setting Conditional Formatting for Columns13-38
Deleting Conditional Formatting13-40
Setting and Removing Page Breaks in Detail Columns13-40
Setting and Removing Page Breaks in a Group Column13-41
Organizing Report Data13-41
Displaying and Organizing Report Data13-42
Reordering Columns in Interactive Viewer13-42
Removing Columns13-44
Hiding or Displaying Report Items13-44
Hiding Columns13-45
Displaying Hidden Columns13-45
Merging Columns13-45
Selecting a Column from a Merged Column13-47
Sorting Data13-47
Sorting a Single Column13-47
Sorting Multiple Columns13-47
Grouping Data13-49
Adding Groups13-50
Grouping Data Based on Date or Time13-50
Removing an Inner Group13-51
Creating Report Calculations13-52
Understanding Supported Calculation Functions13-53
Understanding Supported Operators13-61
Using Numbers and Dates in an Expression13-61
Using Multiply Values in Calculated Columns13-62
Adding Days to an Existing Date Value13-62
Subtracting Date Values in a Calculated Column13-63
Working with Aggregate Data13-63
Creating an Aggregate Data Row13-65
Adding Additional Aggregate Rows13-66
Deleting Aggregate Rows13-67
xiv
Hiding and Filtering Report Data13-67
Hiding or Displaying Column Data13-67
Displaying Repeated Values13-68
User Guide for Cisco Secure Access Control System 5.4
OL-26225-01
Hiding or Displaying Detail Rows in Groups or Sections13-68
Working with Filters13-69
Types of Filter Conditions13-70
Setting Filter Values13-71
Creating Filters13-72
Modifying or Clearing a Filter13-73
Creating a Filter with Multiple Conditions13-73
Deleting One Filter Condition in a Filter that Contains Multiple Conditions13-75
Filtering Highest or Lowest Values in Columns13-75
Understanding Charts13-76
Modifying Charts13-77
Filtering Chart Data13-77
Changing Chart Subtype13-78
Changing Chart Formatting13-78
Contents
CHAPTER
CHAPTER
14Troubleshooting ACS with the Monitoring and Report Viewer14-1
Available Diagnostic and Troubleshooting Tools14-1
Connectivity Tests14-1
ACS Support Bundle14-1
Expert Troubleshooter14-2
Performing Connectivity Tests14-3
Downloading ACS Support Bundles for Diagnostic Information14-4
Working with Expert Troubleshooter14-6
Troubleshooting RADIUS Authentications14-6
Executing the Show Command on a Network Device14-10
Evaluating the Configuration of a Network Device14-10
Comparing SGACL Policy Between a Network Device and ACS14-12
Comparing the SXP-IP Mappings Between a Device and its Peers14-12
Comparing IP-SGT Pairs on a Device with ACS-Assigned SGT Records14-15
Comparing Device SGT with ACS-Assigned Device SGT14-16
15Managing System Operations and Configuration in the Monitoring and Report Viewer15-1
Configuring Data Purging and Incremental Backup15-3
Configuring NFS Staging15-7
OL-26225-01
Restoring Data from a Backup15-7
Viewing Log Collections15-8
Log Collection Details Page15-10
Recovering Log Messages15-12
User Guide for Cisco Secure Access Control System 5.4
xv
Contents
Viewing Scheduled Jobs15-12
Viewing Process Status15-14
Viewing Data Upgrade Status15-15
Viewing Failure Reasons15-15
Editing Failure Reasons 15-15
Specifying E-Mail Settings15-16
Configuring SNMP Preferences15-16
Understanding Collection Filters15-17
Creating and Editing Collection Filters15-17
Deleting Collection Filters15-18
Configuring System Alarm Settings15-18
Configuring Alarm Syslog Targets15-18
Configuring Remote Database Settings15-18
Changing the Port Numbers for Oracle Database15-20
CHAPTER
16Managing System Administrators16-1
Understanding Administrator Roles and Accounts16-2
Understanding Authentication16-3
Configuring System Administrators and Accounts16-3
Understanding Roles16-3
Assigning Roles16-3
Assigning Static Roles16-4
Assigning Dynamic Roles16-4
Permissions16-4
Predefined Roles16-5
Changing Role Associations16-6
Administrator Accounts and Role Association16-6
Recovery Administrator Account16-7
Creating, Duplicating, Editing, and Deleting Administrator Accounts16-7
Viewing Predefined Roles16-9
Viewing Role Properties16-10
Configuring Authentication Settings for Administrators16-10
Configuring Session Idle Timeout16-12
xvi
Configuring Administrator Access Settings16-13
Working with Administrative Access Control16-14
Administrator Identity Policy16-15
Viewing Rule-Based Identity Policies16-16
User Guide for Cisco Secure Access Control System 5.4
Changing Your Own Administrator Password16-22
Resetting Another Administrator’s Password16-23
Contents
CHAPTER
17Configuring System Operations17-1
Understanding Distributed Deployment17-2
Activating Secondary Servers17-3
Removing Secondary Servers17-4
Promoting a Secondary Server17-4
Understanding Local Mode17-4
Understanding Full Replication17-5
Specifying a Hardware Replacement17-5
Scheduled Backups17-6
Creating, Duplicating, and Editing Scheduled Backups17-6
Backing Up Primary and Secondary Instances17-8
Synchronizing Primary and Secondary Instances After Backup and Restore17-9
Editing Instances17-9
Viewing and Editing a Primary Instance17-9
Viewing and Editing a Secondary Instance17-13
Deleting a Secondary Instance17-13
Activating a Secondary Instance17-14
Registering a Secondary Instance to a Primary Instance17-14
OL-26225-01
Deregistering Secondary Instances from the Distributed System Management Page17-17
Deregistering a Secondary Instance from the Deployment Operations Page17-17
Promoting a Secondary Instance from the Distributed System Management Page17-18
Promoting a Secondary Instance from the Deployment Operations Page17-19
Replicating a Secondary Instance from a Primary Instance17-19
Replicating a Secondary Instance from the Distributed System Management Page17-20
Replicating a Secondary Instance from the Deployment Operations Page17-20
Changing the IP address of a Primary Instance from the Primary Server17-21
Failover17-22
Using the Deployment Operations Page to Create a Local Mode Instance17-23
User Guide for Cisco Secure Access Control System 5.4
xvii
Contents
Creating, Duplicating, Editing, and Deleting Software Repositories17-24
Managing Software Repositories from the Web Interface and CLI17-25
CHAPTER
18Managing System Administration Configurations18-1
Viewing RADIUS and TACACS+ Attributes18-5
Creating, Duplicating, and Editing RADIUS Vendor-Specific Attributes18-6
Creating, Duplicating, and Editing RADIUS Vendor-Specific Subattributes18-7
Viewing RADIUS Vendor-Specific Subattributes18-9
Configuring Identity Dictionaries18-10
Creating, Duplicating, and Editing an Internal User Identity Attribute18-10
Configuring Internal Identity Attributes18-11
Deleting an Internal User Identity Attribute18-12
Creating, Duplicating, and Editing an Internal Host Identity Attribute18-13
Deleting an Internal Host Identity Attribute18-13
Adding Static IP address to Users in Internal Identity Store18-14
xviii
Configuring Local Server Certificates18-14
Adding Local Server Certificates18-14
Importing Server Certificates and Associating Certificates to Protocols18-15
Generating Self-Signed Certificates18-16
Generating a Certificate Signing Request18-17
Binding CA Signed Certificates18-18
Editing and Renewing Certificates18-18
Deleting Certificates18-19
Exporting Certificates18-20
Viewing Outstanding Signing Requests18-20
Configuring Logs18-21
Configuring Remote Log Targets18-21
Deleting a Remote Log Target18-23
Configuring the Local Log18-24
Deleting Local Log Data18-24
Configuring Logging Categories18-24
User Guide for Cisco Secure Access Control System 5.4
OL-26225-01
Configuring Global Logging Categories18-25
Configuring Per-Instance Logging Categories18-29
Configuring Per-Instance Security and Log Settings18-30
Configuring Per-Instance Remote Syslog Targets 18-31
Displaying Logging Categories18-32
Configuring the Log Collector18-33
Viewing the Log Message Catalog18-33
Licensing Overview18-34
Types of Licenses18-34
Installing a License File18-35
Viewing the Base License18-36
Upgrading the Base Server License 18-37
Viewing License Feature Options18-38
Adding Deployment License Files18-39
Contents
CHAPTER
Deleting Deployment License Files18-40
Available Downloads18-40
Downloading Migration Utility Files18-41
Downloading UCP Web Service Files18-41
Downloading Sample Python Scripts18-41
Downloading Rest Services18-42
19Understanding Logging19-1
About Logging19-1
Using Log Targets19-2
Logging Categories19-2
Global and Per-Instance Logging Categories19-4
Log Message Severity Levels19-4
Local Store Target19-5
Critical Log Target19-7
Remote Syslog Server Target19-8
Monitoring and Reports Server Target19-10
Viewing Log Messages19-10
Debug Logs19-11
APPENDIX
OL-26225-01
ACS 4.x Versus ACS 5.4 Logging19-12
AAAA ProtocolsA-1
Typical Use CasesA-1
Device Administration (TACACS+)A-1
User Guide for Cisco Secure Access Control System 5.4
Hardware Replacement and CertificatesB-12
Securing the Cryptographic Sensitive MaterialB-12
xx
User Guide for Cisco Secure Access Control System 5.4
OL-26225-01
Private Keys and Passwords BackupB-13
EAP-TLS Flow in ACS 5.4B-13
PEAPv0/1B-14
Overview of PEAPB-15
Supported PEAP FeaturesB-15
PEAP Flow in ACS 5.4B-17
Creating the TLS TunnelB-18
Authenticating with MSCHAPv2B-19
EAP-FASTB-19
Overview of EAP-FASTB-19
EAP-FAST BenefitsB-21
EAP-FAST in ACS 5.4B-21
About Master-KeysB-22
About PACsB-22
Provisioning ModesB-23
Types of PACsB-23
ACS-Supported Features for PACsB-25
Master Key Generation and PAC TTLsB-27
EAP-FAST for Allow TLS RenegotiationB-27
EAP-FAST Flow in ACS 5.4.B-27
EAP-FAST PAC ManagementB-28
Key Distribution AlgorithmB-29
EAP-FAST PAC-Opaque Packing and UnpackingB-29
Revocation MethodB-29
PAC Migration from ACS 4.xB-29
Contents
OL-26225-01
EAP Authentication with RADIUS Key WrapB-30
EAP-MSCHAPv2B-30
Overview of EAP-MSCHAPv2B-31
MSCHAPv2 for User AuthenticationB-31
MSCHAPv2 for Change PasswordB-31
Windows Machine Authentication Against ADB-31
EAP- MSCHAPv2 Flow in ACS 5.4B-32
CHAPB-32
LEAPB-32
Certificate AttributesB-32
Certificate Binary ComparisonB-33
Rules Relating to Textual AttributesB-33
Certificate RevocationB-34
Machine AuthenticationB-35
User Guide for Cisco Secure Access Control System 5.4
xxi
Contents
Authentication Protocol and Identity Store CompatibilityB-36
APPENDIX
G
LOSSARY
I
NDEX
COpen Source License AcknowledgementsC-1
NoticesC-1
OpenSSL/Open SSL ProjectC-1
License IssuesC-1
C-3
xxii
User Guide for Cisco Secure Access Control System 5.4
OL-26225-01
Preface
Revised: November 13, 2013
This guide describes how to use Cisco Secure Access Control System (ACS) 5.4.
Audience
This guide is for security administrators who use ACS, and who set up and maintain network and
application security.
Document Conventions
This guide uses the convention whereby the symbol ^ represents the key labeled Control. For example,
the key combination ^z means hold down the Control key while you press the z key.
Command descriptions use these conventions:
• Examples that contain system prompts denote interactive sessions, indicating the commands that
you should enter at the prompt. The system prompt indicates the current level of the EXEC
command interpreter. For example, the prompt
level, and the prompt
privileged level usually requires a password.
Router> indicates that you should be at the user
Router# indicates that you should be at the privileged level. Access to the
OL-26225-01
• Commands and keywords are in boldface font.
• Arguments for which you supply values are in italic font.
• Elements in square brackets ([ ]) are optional.
• Alternative keywords of which you must choose one are grouped in braces ({}) and separated by
vertical bars (|).
Examples use these conventions:
• Terminal sessions and sample console screen displays are in screen font.
• Information you enter is in boldface screen font.
• Nonprinting characters, such as passwords, are in angle brackets (< >).
• Default responses to system prompts are in square brackets ([]).
• An exclamation point (!) at the beginning of a line indicates a comment line.
User Guide for Cisco Secure Access Control System 5.4
xxiii
CautionMeans reader be careful. You are capable of doing something that might result in equipment damage or
loss of data.
TimesaverMeans the described action saves time. You can save time by performing the action described in the
paragraph.
NoteMeans reader take note. Notes identify important information that you should reflect upon before
continuing, contain helpful suggestions, or provide references to materials not contained in the
document.
Documentation Updates
Table 1 lists the updates to the User Guide for Cisco Secure Access Control System 5.4.
Preface
Table 1Updates to the User Guide for Cisco Secure Access Control System 5.4
DateDescription
9/26/2013Fixed the following bugs:
• CSCuh90646
• CSCuj24445
10/30/2012Updated the guide with Cisco 3415 Secure Access Control System information.
10/23/2012Cisco Secure Access Control System, Release 5.4.
Related Documentation
Table 2 lists a set of related technical documentation available on Cisco.com. To find end-user
documentation for all products on Cisco.com, go to: http://www.cisco.com/go/techdocs.
Select Products > Security > Access Control and Policy > Policy and Access Management > Cisco Secure Access Control System.
NoteIt is possible for the printed and electronic documentation to be updated after original publication.
Therefore, you should also review the documentation on http://www.cisco.com for any updates.
xxiv
User Guide for Cisco Secure Access Control System 5.4
OL-26225-01
Preface
Table 2Product Documentation
Document TitleAvailable Formats
Cisco Secure Access Control System In-Box
Documentation and China ROHS Pointer Card
License and Documentation Guide for Cisco
Secure Access Control System 5.4
Release Notes for Cisco Secure Access Control
System 5.4
Migration Guide for Cisco Secure Access
Control System 5.4
CLI Reference Guide for Cisco Secure Access
Control System 5.4
Supported and Interoperable Devices and
Software for Cisco Secure Access Control
System 5.4
Installation and Upgrade Guide for Cisco
Secure Access Control System 5.4
Software Developer’s Guide for Cisco Secure
Access Control System 5.4
Regulatory Compliance and Safety Information
for Cisco Secure Access Control System 5.4
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional
information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and
revised Cisco technical documentation, at:
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed
and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free
service and Cisco currently supports RSS version 2.0.
OL-26225-01
User Guide for Cisco Secure Access Control System 5.4
xxv
Preface
xxvi
User Guide for Cisco Secure Access Control System 5.4
OL-26225-01
Introducing ACS 5.4
This section contains the following topics:
• Overview of ACS, page 1-1
• ACS Distributed Deployment, page 1-2
• ACS Management Interfaces, page 1-3
Overview of ACS
ACS is a policy-based security server that provides standards-compliant Authentication, Authorization,
and Accounting (AAA) services to your network. ACS facilitates the administrative management of
Cisco and non-Cisco devices and applications.
As a dominant enterprise network access control platform, ACS serves as an integration point for
network access control and identity management.
CHA PTER
1
ACS 5.x provides a rule-based policy model that allows you to control network access based on dynamic
conditions and attributes. The rule-based policy is designed to meet complex access policy needs. For
more information on the rule-based policy model in ACS, see Chapter 3, “ACS 5.x Policy Model.”
Within the greater context of two major AAA protocols—RADIUS and TACACS+—ACS provides the
following basic areas of functionality:
• Under the framework of the RADIUS protocol, ACS controls the wired and wireless access by users
and host machines to the network and manages the accounting of the network resources used.
ACS supports multiple RADIUS-based authentication methods that includes PAP, CHAP,
MSCHAPv1, MSCHAPv2. It also supports many members of the EAP family of protocols, such as
EAP-MD5, LEAP, PEAP, EAP-FAST, and EAP-TLS.
In association with PEAP or EAP-FAST, ACS also supports EAP-MSCHAPv2, EAP-GTC, and
EAP-TLS. For more information on authentication methods, see Authentication in ACS 5.4.
• Under the framework of the TACACS+ protocol, ACS helps to manage Cisco and non-Cisco
network devices such as switches, wireless access points, routers, and gateways. It also helps to
manage services and entities such as dialup, Virtual Private Network (VPN), and firewall.
ACS is the point in your network that identifies users and devices that try to connect to your network.
This identity establishment can occur directly by using the ACS internal identity repository for local user
authentication or by using external identity repositories.
For example, ACS can use Active Directory as an external identity repository, to authenticate a user to
grant the user access to the network. For more information about creating identities and supported
identity services, see Chapter 8, “Managing Users and Identity Stores.”
OL-26225-01
User Guide for Cisco Secure Access Control System 5.4
1-1
ACS Distributed Deployment
ACS provides advanced monitoring, reporting, and troubleshooting tools that help you administer and
manage your ACS deployments. For more information on the monitoring, reporting, and troubleshooting
capabilities of ACS, see Chapter 11, “Monitoring and Reporting in ACS.”.
For more information about using ACS for device administration and network access scenarios, see
Chapter 4, “Common Scenarios Using ACS.”
Cisco Secure ACS:
• Enforces access policies for VPN and wireless users.
• Provides simplified device administration.
• Provides advanced monitoring, reporting, and troubleshooting tools.
There are several changes and enhancements in ACS 5.4 compared to ACS 5.3. For a complete list of
new and changed features, see:
ACS 5.4 is delivered preinstalled on a standard Cisco Linux-based appliance, and supports a fully
distributed deployment.
An ACS deployment can consist of a single instance, or multiple instances deployed in a distributed
manner, where all instances in a system are managed centrally. One ACS instance becomes the primary instance and you can register additional ACS instances to the primary instance as secondaryinstances.
All instances have the configuration for the entire deployment, which provides redundancy for
configuration data.
The primary instance centralizes the configuration of the instances in the deployment. Configuration
changes made in the primary instance are automatically replicated to the secondary instance.
You can force a full replication to the secondary instance. Full replication is used when a new secondary
instance is registered and in other cases when the replication gap between the secondary instance and
the primary instance is significant.
Related Topic
• ACS 4.x and 5.4 Replication, page 1-2
ACS 4.x and 5.4 Replication
In ACS 4.x, you must select the database object types (or classes) you wish to replicate from primary
instance to the secondary instance. When you replicate an object, a complete configuration copy is made
on the secondary instance.
In ACS 5.4, any configuration changes made in the primary instance are immediately replicated to the
secondary instance. Only the configuration changes made since the last replication are propagated to the
secondary instance.
User Guide for Cisco Secure Access Control System 5.4
1-2
OL-26225-01
Chapter 1 Introducing ACS 5.4
ACS 4.x did not provide incremental replication, only full replication, and there was service downtime
for replication. ACS 5.4 provides incremental replications with no service downtime.
You can also force a full replication to the secondary instance if configuration changes do not replicate
it. Full replication is used when a new secondary instance is registered and other cases when the
replication gap between the secondary instance and the primary instance is significant.
Table 1 -1 lists some of the differences between ACS 4.x and 5.4 replication.
Table 1-1Differences Between ACS 4.x and 5.4 Replication
ACS 4.xACS 5.4
You can choose the data items to be replicated.You cannot choose the data items to be replicated.
Supports multi-level or cascading replication.Supports only a fixed flat replication. Cascading
Some data items, such as the external database
configurations, are not replicated.
ACS Licensing Model
All data items, by default are replicated.
replication is not supported.
All data items are replicated except the database
key, database certificate, and master keys. The
server certificates, Certificate Signing Requests
(CSRs), and private keys are replicated, but they
are not shown in the interface.
For more information about setting up a distributed deployment, see Configuring System Operations,
page 17-1.
NoteReplication does not work in ACS servers if you use the Cisco Overlay Transport Virtualization
technology in your Virtual Local Area Network.
NoteNetwork Address Translation (NAT) is not supported in an ACS distributed deployment environment.
That is, if the network address of a primary or secondary instance is translated, then the database
replication may not work properly, and it may display a shared secret mismatch error.
ACS Licensing Model
You must have a valid license to operate ACS; ACS prompts you to install a valid base license when you
first access the web interface. Each server requires a unique base license in a distributed deployment.
For information about the types of licenses you can install, see Types of Licenses, page 18-34. For more
information about licenses, see Licensing Overview, page 18-34.
Related Topic
• ACS Distributed Deployment, page 1-2
ACS Management Interfaces
This section contains the following topics:
OL-26225-01
User Guide for Cisco Secure Access Control System 5.4
1-3
ACS Management Interfaces
• ACS Web-based Interface, page 1-4
• ACS Command Line Interface, page 1-4
• ACS Programmatic Interfaces, page 1-5
ACS Web-based Interface
You can use the ACS web-based interface to fully configure your ACS deployment, and perform
monitoring and reporting operations. The web interface provides a consistent user experience, regardless
of the particular area that you are configuring.
The ACS web interface is supported on HTTPS-enabled Microsoft Internet Explorer versions from 6.x
to 9.x and Mozilla Firefox versions from 3.x to 10.x.
The new web interface design and organization:
• Reflects the new policy model, which is organized around the user’s view of policy administration.
The new policy model is easier to use, as it separates the complex interrelationships that previously
existed among policy elements.
For example, user groups, network device groups (NDGs), network access filters, network access
profiles, and so on.
• Presents the configuration tasks in a logical order that you can follow for many common scenarios.
Chapter 1 Introducing ACS 5.4
For example, first you configure conditions and authorizations for policies in the Policy Elements
drawer, and then you move on to the Policies drawer to configure the policies with the defined policy
elements.
• Provides new page functionality, such as sorting and filtering lists of items.
See “Using the Web Interface” section on page 5-3 for more information.
Related Topics
• ACS Command Line Interface, page 1-4
ACS Command Line Interface
You can use the ACS command-line interface (CLI), a text-based interface, to perform some
configuration and operational tasks and monitoring. Access to the ACS-specific CLI requires
administrator authentication by ACS 5.4.
You do not need to be an ACS administrator or log into ACS 5.4 to use the non-ACS configuration mode.
ACS configuration mode command sessions are logged to the diagnostics logs.
ACS 5.4 is shipped on the Cisco 1121 Secure Access Control System (CSACS-1121) or on the Cisco
3415 Secure Access Control System (CSACS-3415). The ADE-OS software supports these command
modes:
• EXEC—Use these commands to perform system-level operation tasks. For example, install, start,
and stop application; copy files and installations; restore backups; and display information.
1-4
In addition, certain EXEC mode commands have ACS-specific abilities. For example, start an ACS
instance, display and export ACS logs, and reset an ACS configuration to factory default settings.
Such commands are specifically mentioned in the documentation
• ACS configuration—Use these commands to set the debug log level (enable or disable) for the ACS
management and runtime components, and show system settings.
User Guide for Cisco Secure Access Control System 5.4
OL-26225-01
Loading...
+ 648 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.