Cisco Systems OL-5650-02 User Manual

Cisco Content Services Switch Security Configuration Guide
Software Version 7.50 March 2005
Corporate Headquarters
Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000
Fax: 408 526-4100
Text Part Number: OL-5650-02
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Pack e t , PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, StrataView Plus, TeleRouter, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0502R)
Cisco Content Services Switch Security Configuration Guide
Copyright © 2005, Cisco Systems, Inc. All rights reserved.
Preface xi
Audience xii
How to Use This Guide xii
Related Documentation xiii
Symbols and Conventions xvi
Obtaining Documentation xvii
Cisco.com xvii Documentation DVD xviii Ordering Documentation xviii
Documentation Feedback xviii
Cisco Product Security Overview xix
Reporting Security Problems in Cisco Products xix

CONTENTS

CHAPTER
OL-5650-02
Obtaining Technical Assistance xx
Cisco Technical Support Website xx Submitting a Service Request xxi Definitions of Service Request Severity xxii
Obtaining Additional Publications and Information xxii
1 Controlling CSS Access 1-1
Changing the Administrative Username and Password 1-2
Creating Usernames and Passwords 1-3
Controlling Remote User Access to the CSS 1-6
Configuring Virtual Authentication 1-7 Configuring Console Authentication 1-8
Cisco Content Services Switch Security Configuration Guide
iii
Contents
Controlling Administrative Access to the CSS 1-10
Enabling Administrative Access to the CSS 1-10 Disabling Administrative Access to the CSS 1-11
Controlling CSS Network Traffic Through Access Control Lists 1-12
ACL Overview 1-13 ACL Configuration Quick Start 1-15 Creating an ACL 1-17 Deleting an ACL 1-18 Configuring Clauses 1-19 Adding a Clause When ACLs are Globally Enabled 1-25 Deleting a Clause 1-26 Applying an ACL to a Circuit or DNS Queries 1-27 Removing an ACL from Circuits or DNS Queries 1-28 Enabling ACLs on the CSS 1-29 Disabling ACLs on the CSS 1-30 Showing ACLs 1-30 Setting the Show ACL Counters to Zero 1-32 Logging ACL Activity 1-32 ACL Example 1-34
CHAPTER
iv
Configuring Network Qualifier Lists for ACLs 1-35
Creating an NQL 1-36 Describing an NQL 1-36 Adding Networks to an NQL 1-36 Adding an NQL to an ACL Clause 1-38 Showing NQL Configurations 1-38
2 Configuring the Secure Shell Daemon Protocol 2-1
Enabling SSH 2-2
Configuring SSH Access 2-3
Cisco Content Services Switch Security Configuration Guide
OL-5650-02
Configuring SSHD in the CSS 2-3
Configuring SSHD Keepalive 2-3 Configuring SSHD Port 2-4 Configuring SSHD Server-Keybits 2-4 Configuring SSHD Version 2-5
Configuring Telnet Access When Using SSHD 2-6
Showing SSHD Configurations 2-6
Contents
CHAPTER
CHAPTER
3 Configuring the CSS as a Client of a RADIUS Server 3-1
RADIUS Configuration Quick Start 3-3
Configuring a RADIUS Server for Use with the CSS 3-4
Configuring Authentication Settings 3-5 Configuring Authorization Settings 3-5
Specifying a Primary RADIUS Server 3-6
Specifying a Secondary RADIUS Server 3-7
Configuring the RADIUS Server Timeouts 3-8
Configuring the RADIUS Server Retransmits 3-8
Configuring the RADIUS Server Dead-Time 3-9
Showing RADIUS Server Configuration Information 3-9
4 Configuring the CSS as a Client of a TACACS+ Server 4-1
TACACS+ Configuration Quick Start 4-2
Configuring TACACS+ Server User Accounts for Use with the CSS 4-3
Configuring Authentication Settings 4-3 Configuring Authorization Settings 4-4
OL-5650-02
Configuring Global TACACS+ Attributes 4-5
Setting the Global CSS TACACS+ Timeout Period 4-6 Defining a Global Encryption Key 4-7
Cisco Content Services Switch Security Configuration Guide
v
Contents
Setting the Global TACACS+ Keepalive Frequency 4-7
Defining a TACACS+ Server 4-8
Setting TACACS+ Authorization 4-11
Sending Full CSS Commands to the TACACS+ Server 4-12
Setting TACACS+ Accounting 4-13
Showing TACACS+ Server Configuration Information 4-14
CHAPTER
5 Configuring Firewall Load Balancing 5-1
Overview of FWLB 5-2
Firewall Synchronization 5-3
Configuring FWLB 5-3
Configuring a Keepalive Timeout for a Firewall 5-4 Configuring an IP Static Route for a Firewall 5-5 Configuring OSPF to Advertise Firewall Routes 5-6 Configuring RIP to Advertise Firewall Routes 5-7 Example of FWLB Static Route Configuration 5-7
Configuring FWLB with VIP and Virtual Interface Redundancy 5-10
Example of Firewall and Route Configurations 5-13
CSS-OUT-L Configuration 5-13 CSS-OUT-R Configuration 5-13 CSS-IN-L Configuration 5-14 CSS-IN-R Configuration 5-14
Displaying Firewall Flow Summaries 5-15
Displaying Firewall IP Routes 5-16
Displaying Firewall IP Information 5-17
I
NDEX
vi
Cisco Content Services Switch Security Configuration Guide
OL-5650-02
Figure 1-1 CSS Directory Access Privileges 1-5
Figure 1-2 ACLs Enabled on the CSS 1-14
Figure 5-1 Example of FWLB 5-9
Figure 5-2 FWLB with VIP/Interface Redundancy Configuration 5-11
FIGURES
OL-5650-02
Cisco Content Services Switch Security Configuration Guide
vii
Figures
viii
Cisco Content Services Switch Security Configuration Guide
OL-5650-02
TABLES
Table 1-1 ACL Configuration Quick Start 1-16
Table 1-2 Clause Command Options 1-21
Table 1-3 Field Descriptions for the show acl Command Output 1-31
Table 1-4 Field Descriptions for the show nql Command Output 1-38
Table 2-1 Field Descriptions for the show sshd config Command 2-6
Table 2-2 Field Descriptions for the show sshd sessions
Command
Table 3-1 RADIUS Configuration Quick Start 3-3
Table 3-2 Field Descriptions for the show radius config Command 3-10
Table 3-3 Field Descriptions for the show radius statistics Command 3-11
Table 4-1 TACACS+ Configuration Quick Start 4-2
Table 4-2 Field Descriptions for the show tacacs-server
Command
2-8
4-14
Table 5-1 Field Descriptions for the show flow Command 5-16
Table 5-2 Field Descriptions for the show ip routes firewall Command 5-16
Table 5-3 Field Descriptions for the show ip routes firewall Command 5-17
Cisco Content Services Switch Security Configuration Guide
OL-5650-02
ix
Tables
Cisco Content Services Switch Security Configuration Guide
x
OL-5650-02

Preface

This guide provides instructions for configuring the security features of the Cisco 11500 Series Content Services Switches (CSS). Information in this guide applies to all CSS models except where noted.
The CSS software is available in a Standard or optional Enhanced feature set.
Proximity Database and Secure Management, which includes Secure Shell Host and SSL strong encryption for the Device Management software, are optional
features.
This preface contains the following major sections:
Audience
How to Use This Guide
Related Documentation
OL-5650-02
Symbols and Conventions
Obtaining Documentation
Documentation Feedback
Cisco Product Security Overview
Obtaining Technical Assistance
Obtaining Additional Publications and Information
Cisco Content Services Switch Security Configuration Guide
xi

Audience

Audience
This guide is intended for the following trained and qualified service personnel who are responsible for configuring the CSS:
Web mas t e r
System administrator
System operator

How to Use This Guide

This guide is organized as follows:
Chapter Description
Chapter 1, Controlling CSS Access
Chapter 2, Configuring the Secure Shell Daemon Protocol
Chapter 3, Configuring the CSS as a Client of a RADIUS Server
Chapter 4, Configuring the CSS as a Client of a TACACS+ Server
Chapter 5, Configuring Firewall Load Balancing
Preface
Control access to the CSS including user and network traffic access.
Configure Secure Shell Daemon (SSHD) protocol to provide secure encrypted communications between two hosts communicating over an insecure network.
Configure Remote Authentication Dial-In User Service (RADIUS) protocol as a client on the CSS.
Configure Terminal Access Controller Access Control System (TACACS+) protocol as a client on the CSS.
Configure firewall load balancing between CSSs for enhanced security.
xii
Cisco Content Services Switch Security Configuration Guide
OL-5650-02
Preface

Related Documentation

In addition to this guide, the Content Services Switch documentation includes the following publications.
Document Title Description
Release Note for the Cisco 11500 Series Content Services Switch
Cisco 11500 Series Content Services Switch Hardware Installation Guide
Cisco Content Services Switch Getting Started Guide
Related Documentation
This release note provides information on operating considerations, caveats, and command line interface (CLI) commands for the Cisco 11500 series CSS.
This guide provides information for installing, cabling, and powering the Cisco 11500 series CSS. In addition, this guide provides information about CSS specifications, cable pinouts, and hardware troubleshooting.
This guide describes how to perform initial administration and configuration tasks on the CSS, including:
OL-5650-02
Booting the CSS for the first time and on a
routine basis, and logging in to the CSS
Configuring the username and password,
Ethernet management port, static IP routes, and the date and time
Configuring DNS server for hostname
resolution
Configuring sticky cookies with a sticky
overview and advanced load-balancing method using cookies
A task list to help you find information in the
CSS documentation
Troubleshooting the boot process
Cisco Content Services Switch Security Configuration Guide
xiii
Related Documentation
Document Title Description
Cisco Content Services Switch Administration Guide
Cisco Content Services Switch Routing and Bridging Configuration Guide
This guide describes how to perform administrative tasks on the CSS, including upgrading your CSS software and configuring the following:
Logging, including displaying log messages
and interpreting sys.log messages
User profile and CSS parameters
SNMP
RMON
XML documents to configure the CSS
CSS scripting language
Offline Diagnostic Monitor (Offline DM)
menu
This guide describes how to perform routing and bridging configuration tasks on the CSS, including:
Management ports, interfaces, and circuits
Spanning-tree bridging
Address Resolution Protocol (ARP)
Routing Information Protocol (RIP)
Preface
xiv
Internet Protocol (IP)
Open Shortest Path First (OSPF) protocol
Cisco Discovery Protocol (CDP)
Dynamic Host Configuration Protocol (DHCP)
relay agent
Cisco Content Services Switch Security Configuration Guide
OL-5650-02
Preface
Document Title Description
Cisco Content Services Switch Content Load-Balancing Configuration Guide
This guide describes how to perform CSS content load-balancing configuration tasks, including:
Flow and port mapping
Services
Service, global, and script keepalives
Source groups
Loads for services
Server/Application State Protocol (SASP)
Dynamic Feedback Protocol (DFP)
Owners
Content rules
Sticky parameters
HTTP header load balancing
Related Documentation
OL-5650-02
Cisco Content Services Switch Global Server Load-Balancing Configuration Guide
Cisco Content Services Switch Redundancy Configuration Guide
Cisco Content Services Switch Security Configuration Guide
Content caching
Content replication
This guide describes how to perform CSS global load-balancing configuration tasks, including:
Domain Name System (DNS)
DNS Sticky
Content Routing Agent
Client-Side Accelerator
Network proximity
This guide describes how to perform CSS redundancy configuration tasks, including:
VIP and virtual interface redundancy
Adaptive session redundancy
Box-to-box redundancy
xv

Symbols and Conventions

Document Title Description
Cisco Content Services Switch SSL Configuration Guide
Cisco Content Services Switch Command Reference
Cisco Content Services Switch Device Management User’s Guide
This guide describes how to perform CSS SSL configuration tasks, including:
SSL certificate and keys
SSL termination
Back-end SSL
SSL initiation
This reference provides an alphabetical list of all CLI commands including syntax, options, and related commands.
This guide describes how to use the Device Management user interface, an HTML-based Web-based application that you use to configure and manage your CSS.
Preface
Symbols and Conventions
This guide uses the following symbols and conventions to identify different types of information.
Caution A caution means that a specific action you take could cause a loss of data or
adversely impact use of the equipment.
Warning
Note A note provides important related information, reminders, and recommendations.
Cisco Content Services Switch Security Configuration Guide
xvi
A warning describes an action that could cause you physical harm or damage the equipment.
Bold text indicates a command in a paragraph.
OL-5650-02
Preface

Obtaining Documentation

Courier text
prompt.
Courier bold text indicates commands and text you enter in a command line.
Italics text indicates the first occurrence of a new term, book title, emphasized text, and variables for which you supply values.
1. A numbered list indicates that the order of the list items is important.
a. An alphabetical list indicates that the order of the secondary list items is
A bulleted list indicates that the order of the list topics is unimportant.
indicates text that appears on a command line, including the CLI
important.
An indented list indicates that the order of the list subtopics is unimportant.
Obtaining Documentation
Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several ways to obtain technical assistance and other technical resources. These sections explain how to obtain technical information from Cisco Systems.

Cisco.com

OL-5650-02
You can access the most current Cisco documentation at this URL:
http://www.cisco.com/univercd/home/home.htm
You can access the Cisco website at this URL:
http://www.cisco.com
You can access international Cisco websites at this URL:
http://www.cisco.com/public/countries_languages.shtml
Cisco Content Services Switch Security Configuration Guide
xvii

Documentation Feedback

Documentation DVD

Cisco documentation and additional literature are available in a Documentation DVD package, which may have shipped with your product. The Documentation DVD is updated regularly and may be more current than printed documentation. The Documentation DVD package is available as a single unit.
Registered Cisco.com users (Cisco direct customers) can order a Cisco Documentation DVD (product number DOC-DOCDVD=) from the Ordering tool or Cisco Marketplace.
Cisco Ordering tool:
http://www.cisco.com/en/US/partner/ordering/
Cisco Marketplace:
http://www.cisco.com/go/marketplace/

Ordering Documentation

Preface
You can find instructions for ordering documentation at this URL:
http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm
You can order Cisco documentation in these ways:
Registered Cisco.com users (Cisco direct customers) can order Cisco product
documentation from the Ordering tool:
http://www.cisco.com/en/US/partner/ordering/
Nonregistered Cisco.com users can order documentation through a local
account representative by calling Cisco Systems Corporate Headquarters (California, USA) at 408 526-7208 or, elsewhere in North America, by calling 1 800 553-NETS (6387).
Documentation Feedback
You can send comments about technical documentation to bug-doc@cisco.com.
Cisco Content Services Switch Security Configuration Guide
xviii
OL-5650-02
Preface
You can submit comments by using the response card (if present) behind the front cover of your document or by writing to the following address:
Cisco Systems Attn: Customer Document Ordering 170 West Tasman Drive San Jose, CA 95134-9883
We appreciate your comments.

Cisco Product Security Overview

Cisco provides a free online Security Vulnerability Policy portal at this URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.ht ml
From this site, you can perform these tasks:
Report security vulnerabilities in Cisco products.
Obtain assistance with security incidents that involve Cisco products.
Cisco Product Security Overview
Register to receive security information from Cisco.
A current list of security advisories and notices for Cisco products is available at this URL:
http://www.cisco.com/go/psirt
If you prefer to see advisories and notices as they are updated in real time, you can access a Product Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed from this URL:
http://www.cisco.com/en/US/products/products_psirt_rss_feed.html

Reporting Security Problems in Cisco Products

Cisco is committed to delivering secure products. We test our products internally before we release them, and we strive to correct all vulnerabilities quickly. If you think that you might have identified a vulnerability in a Cisco product, contact PSIRT:
Emergencies— security-alert@cisco.com
Cisco Content Services Switch Security Configuration Guide
OL-5650-02
xix

Obtaining Technical Assistance

Nonemergencies— psirt@cisco.com
Tip We encourage you to use Pretty Good Privacy (PGP) or a compatible product to
encrypt any sensitive information that you send to Cisco. PSIRT can work from encrypted information that is compatible with PGP versions 2.x through 8.x.
Never use a revoked or an expired encryption key. The correct public key to use in your correspondence with PSIRT is the one that has the most recent creation date in this public key server list:
http://pgp.mit.edu:11371/pks/lookup?search=psirt%40cisco.com&op=index&ex act=on
In an emergency, you can also reach PSIRT by telephone:
1 877 228-7302
1 408 525-6532
Preface
Obtaining Technical Assistance
For all customers, partners, resellers, and distributors who hold valid Cisco service contracts, Cisco Technical Support provides 24-hour-a-day, award-winning technical assistance. The Cisco Technical Support Website on Cisco.com features extensive online support resources. In addition, Cisco Technical Assistance Center (TAC) engineers provide telephone support. If you do not hold a valid Cisco service contract, contact your reseller.

Cisco Technical Support Website

The Cisco Technical Support Website provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The website is available 24 hours a day, 365 days a year, at this URL:
http://www.cisco.com/techsupport
Cisco Content Services Switch Security Configuration Guide
xx
OL-5650-02
Preface
Obtaining Technical Assistance
Access to all tools on the Cisco Technical Support Website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a user ID or password, you can register at this URL:
http://tools.cisco.com/RPF/register/register.do
Note Use the Cisco Product Identification (CPI) tool to locate your product serial
number before submitting a web or phone request for service. You can access the CPI tool from the Cisco Technical Support Website by clicking the Too l s &
Resources link under Documentation & Tools. Choose Cisco Product Identification Tool from the Alphabetical Index drop-down list, or click the Cisco Product Identification Tool link under Alerts & RMAs. The CPI tool
offers three search options: by product ID or model name; by tree view; or for certain products, by copying and pasting show command output. Search results show an illustration of your product with the serial number label location highlighted. Locate the serial number label on your product and record the information before placing a service call.

Submitting a Service Request

Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3 and S4 service requests are those in which your network is minimally impaired or for which you require product information.) After you describe your situation, the TAC Service Request Tool provides recommended solutions. If your issue is not resolved using the recommended resources, your service request is assigned to a Cisco TAC engineer. The TAC Service Request Tool is located at this URL:
http://www.cisco.com/techsupport/servicerequest
For S1 or S2 service requests or if you do not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests are those in which your production network is down or severely degraded.) Cisco TAC engineers are assigned immediately to S1 and S2 service requests to help keep your business operations running smoothly.
To open a service request by telephone, use one of the following numbers:
Asia-Pacific: +61 2 8446 7411 (Australia: 1 800 805 227) EMEA: +32 2 704 55 55 USA: 1 800 553-2447
Cisco Content Services Switch Security Configuration Guide
OL-5650-02
xxi

Obtaining Additional Publications and Information

For a complete list of Cisco TAC contacts, go to this URL:
http://www.cisco.com/techsupport/contacts

Definitions of Service Request Severity

To ensure that all service requests are reported in a standard format, Cisco has established severity definitions.
Severity 1 (S1)—Your network is “down,” or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.
Severity 2 (S2)—Operation of an existing network is severely degraded, or significant aspects of your business operation are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.
Severity 3 (S3)—Operational performance of your network is impaired, but most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels.
Preface
Severity 4 (S4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations.
Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is available from various online and printed sources.
Cisco Marketplace provides a variety of Cisco books, reference guides, and
logo merchandise. Visit Cisco Marketplace, the company store, at this URL:
http://www.cisco.com/go/marketplace/
Cisco Press publishes a wide range of general networking, training and
certification titles. Both new and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press at this URL:
http://www.ciscopress.com
Cisco Content Services Switch Security Configuration Guide
xxii
OL-5650-02
Preface
Obtaining Additional Publications and Information
Pack et magazine is the Cisco Systems technical user magazine for
maximizing Internet and networking investments. Each quarter, Packet delivers coverage of the latest industry trends, technology breakthroughs, and Cisco products and solutions, as well as network deployment and troubleshooting tips, configuration examples, customer case studies, certification and training information, and links to scores of in-depth online resources. You can access Packet magazine at this URL:
http://www.cisco.com/packet
iQ Magazine is the quarterly publication from Cisco Systems designed to
help growing companies learn how they can use technology to increase revenue, streamline their business, and expand services. The publication identifies the challenges facing these companies and the technologies to help solve them, using real-world case studies and business strategies to help readers make sound technology investment decisions. You can access iQ Magazine at this URL:
http://www.cisco.com/go/iqmagazine
Internet Protocol Journal is a quarterly journal published by Cisco Systems
for engineering professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL:
OL-5650-02
http://www.cisco.com/ipj
World-class networking training is available from Cisco. You can view
current offerings at this URL:
http://www.cisco.com/en/US/learning/index.html
Cisco Content Services Switch Security Configuration Guide
xxiii
Obtaining Additional Publications and Information
Preface
xxiv
Cisco Content Services Switch Security Configuration Guide
OL-5650-02
CHA P T ER
1

Controlling CSS Access

This chapter describes how to configure access to the CSS including network traffic. Information in this chapter applies to all models of the CSS, except where noted.
This chapter contains the following major sections:
Changing the Administrative Username and Password
Creating Usernames and Passwords
Controlling Remote User Access to the CSS
Controlling Administrative Access to the CSS
Controlling CSS Network Traffic Through Access Control Lists
Configuring Network Qualifier Lists for ACLs
OL-5650-02
Cisco Content Services Switch Security Configuration Guide
1-1
Chapter 1 Controlling CSS Access

Changing the Administrative Username and Password

Changing the Administrative Username and Password
During the initial log in to the CSS you enter the default user name admin and the default password system in lowercase text. For security reasons, you should change the administrative username and password. Security on your CSS can be compromised because the administrative username and password are configured to be the same for every CSS shipped from Cisco Systems.
The administrative username and password are stored in nonvolatile random access memory (NVRAM). Each time you reboot the CSS, it reads the username and password from NVRAM and reinserts them in to the user database. SuperUser status is assigned to the administrative username by default.
You can change the administrative username and password, but because the information is stored in NVRAM, you cannot permanently delete them. If you delete the administrative username using the no username command, the CSS deletes the username from the running-config file, but restores the username from NVRAM when you reboot the CSS.
Use the username-offdm name password text command to change the administrative username or password.
1-2
Note You can also use the Security Options menu from the Offline DM menu (accessed
during the boot process) to change the administrative username and password. Refer to the Cisco Content Services Switch Administration Guide for information on the Offline DM menu.
For example, to change the default administrative username and password to a different username and password, enter.
(config)# username-offdm bobo password secret
Cisco Content Services Switch Security Configuration Guide
OL-5650-02
Chapter 1 Controlling CSS Access

Creating Usernames and Passwords

Logging into the CSS requires a username and password. The CSS supports a maximum of 32 usernames, including the administrator and technician usernames. You can assign each user with SuperUser or User status.
User - Allows access to a limited set of commands that enable you to monitor
and display CSS parameters, but not change them. A User prompt ends with the > symbol.
SuperUser - Allows access to the full set of CLI commands, including those
in User mode, that enable you to configure the CSS. A SuperUser prompt ends with the # symbol.
From SuperUser mode, you can enter global configuration mode and its subordinate configuration modes. If you do not specify superuser when configuring a new user, the new user has only user-level status by default.
Caution Creating or modifying a username and password is restricted to CSS users who
are identified as either administrators or technicians, and it is contingent on whether the restrict user-database command has been entered.
Creating Usernames and Passwords
OL-5650-02
Use the username command to create usernames and passwords to log in to the CSS. The syntax for this global configuration mode command is:
username name [des-password|password] password {superuser}
{dir-access access}
The following example creates a SuperUser named picard with a password of captain.
(config)# username picard password “captain” superuser
The options and variables are as follows:
name - Sets the username you want to assign or change. Enter an unquoted
text string with no spaces and a maximum of 16 characters. To see a list of existing usernames, enter username ?.
des-password - Specifies the password is Data Encryption Standard (DES)
encrypted. Use this option only when you are creating a file for use as a script or a startup configuration file. Enter the DES password as a case-sensitive unquoted text string 6 to 64 characters in length.
Cisco Content Services Switch Security Configuration Guide
1-3
Creating Usernames and Passwords
password - Specifies the password is not encrypted. Use this option when
you use the CLI to dynamically create users.
password - The password. Enter an unquoted text string with no spaces and a
length of 6 to 16 characters. The CSS allows all special characters in a password except for the percent sign (%).
Note If you specify the des-password option, you must know the encrypted
superuser - Specifies SuperUser privileges to allow a user to access
SuperUser mode. If you do not enter this option, the user can only access User mode.
dir-access - (Optional) Defines the CSS directory access privileges for the
username. There are access privileges assigned to the seven CSS directories, in the following order: Script, Log, Root (installed CSS software), Archive, Release Root (configuration files), Core, and MIBs. By default, users have both read- and write-access privileges (B) to all seven directories. Administrators or technicians can use the dir-access option to selectively implement a set of directory access privileges for each user. Changing the access level also affects the use of the CLI commands associated with directories.
Chapter 1 Controlling CSS Access
form of this password to successfully log in to the CSS. You can find the CSS encrypted password in the running configuration. To display the CSS running configuration, use the show running-config command (see the
“Creating Usernames and Passwords” section).
1-4
To use the dir-access option, you must first specify the restrict user-database command to implement security restrictions for the CSS user
database.
Cisco Content Services Switch Security Configuration Guide
OL-5650-02
Chapter 1 Controlling CSS Access
access - Specifies directory access privileges for the username. By default,
users have both read- and write-access privileges (B) to all seven directories. Enter, in order, one of the following access privilege codes for each of the seven CSS directories:
Figure 1-1 illustrates the directory access privileges for a username.
Figure 1-1 CSS Directory Access Privileges
NWBNNNR
Archive directory, set to None (no directory access)
Root directory, set to both read and write-access
Log directory, set to write-only access
Script directory, set to None (no directory access)
Creating Usernames and Passwords
R - Read-only access to the CSS directory
W - Write-only access to the CSS directory
B - Both read- and write-access privileges to the CSS directory
N - No access privileges to the CSS directory
MIBs directory, set to read-only access
Core directory, set to None (no directory access)
Release Root directory, set to None (no directory access)
59110
OL-5650-02
For example, to define directory access for username picard, enter:
(config)# username picard password “captain” superuser NWBNNNR
To display a list of existing usernames, enter:
(config)# username ?
To remove an existing username, enter:
(config)# no username picard
To change a user password, reenter the username command and specify the new password. Remember to include SuperUser privileges if required. For example:
(config)# username picard password “flute” superuser
Caution The no username command removes a user permanently. Make sure you want to
perform this action because you cannot undo this command.
Cisco Content Services Switch Security Configuration Guide
1-5
Chapter 1 Controlling CSS Access

Controlling Remote User Access to the CSS

Controlling Remote User Access to the CSS
To control access to the CSS, you can configure the CSS to authenticate remote (virtual) or console users. The CSS can authenticate users by using the local user database, RADIUS server, or TACACS+ server. You can also allow user access without authenticating or disallowing all remote user access to the CSS.
You can set a maximum of three authentication methods: a primary, secondary, or tertiary authentication method. The primary method is the first authentication method that the CSS tries. If the primary authentication method fails (for example, the RADIUS server is down or is unreachable), the CSS tries the secondary method. And if the secondary method fails, then the CSS tries the tertiary method. In the event the tertiary method also fails, the CSS displays a message that authentication has failed.
The CSS does not attempt a secondary or tertiary authentication method under the following conditions:
If the authentication method is local, and the local username is not found in
the local user database.
If the authentication method is local and the local username is found in the
local user database, but the password is invalid.
If the authentication method is radius, and the RADIUS server rejects the
primary authentication request from the CSS.
1-6
If the authentication method is tacacs, and the TACACS+ server rejects the
primary authentication request from the CSS.
Before you can use RADIUS or TACACS+ as either the virtual authentication method or the console authentication method, you must enable communication with the RADIUS or TACACS+ security server. Use either the radius-server command (refer to the Chapter 3, Configuring the CSS as a Client of a RADIUS
Server) or the tacacs-server command (see the Chapter 4, Configuring the CSS as a Client of a TACACS+ Server).
This section includes the following topics:
Configuring Virtual Authentication
Configuring Console Authentication
To display virtual and console authentication settings, use the show user-database command.
Cisco Content Services Switch Security Configuration Guide
OL-5650-02
Loading...
+ 92 hidden pages