Partner Name
Web Site www.cisco.com
Product Name
Version & Platform
Product Description
Product Category
Cisco
Cisco PIX Security Appliance
PIX IOS 7.0(2)
The market-leading Cisco PIX Security Appliance Series delivers robust
user and application policy enforcement, mutlivector attack protection, and
secure connectivity services in cost-effective, easy-to-deploy solutions.
These purpose-built appliances provide multiple integrat ed security and
networking services.
Ranging from compact, plug-and-play desktop appliances for small and
home offices to modular gigabit appliances with superior investment
protection for enterprise and service-provider environments, Cisco PIX
Security Appliances provide comprehensive security, performance, and
reliability for network environments of all sizes.
Perimeter Defense (Firewalls, VPNs & Intrusion Detection)
1
Solution Summary
The Cisco PIX® Security Appliance Series delivers robust user and application policy enforcement, multivector attack protection, and secure connectivity services in cost-effective, easy-to-deploy sol utions. The
Cisco PIX® Security Appliance Series provides convenient methods for authenticating VPN users through
native integration with popular authentication services, including RADIUS and RSA SecurID
authentication (without requiring a separate RADIUS/TACACS+ server to act as an intermediary).
Partner Integration Overview
Authentication Methods Supported
List Library Version Used
RSA Authentication Manager Name Locking
RSA Authentication Manager Replica Support
Secondary RADIUS Server Support
Location of Node Secret on Agent
RSA Authentication Agent Host Type
RSA SecurID User Specification
RSA SecurID Protection of Administrative Users
RSA Software Token API Integration
Use of Cached Domain Credentials
Native RSA SecurID Authentication, or RADIUS,
Library Version # 5.0.3
Yes
Full Replica Support
Yes (hardware dependent for number of servers)
In flash
Communication Server
Designated Users, All Users, Default Method
No
Yes
No
Important: If you are configuring the PIX Security Appliance to use
IPSec you will also need to configu re the Cisco VPN client. Information on
how to configure the Cisco VPN client can be found in the Cisco VPN client
implementation guide located at:
To facilitate communication between the Cisco PIX Security Appliance and the RSA Authentication
Manager / RSA SecurID Appliance, an Agent Host record must be added to the RSA Authentication
Manager database and RADIUS Server database if using RADIUS. The Agent Host record identifies the
Cisco PIX Security Appliance within its database and contains information about communication and
encryption.
To create the Agent Host record, you will need the following information.
• Hostname
• IP Addresses for all network interfaces
• RADIUS Secret (When using RADIUS Authentication Protocol)
When adding the Agent Host Record, you should configure the Cisco PIX Security Appliance as a
Communication Server. This setting is used by the RSA Authentication Manager to determine how
communication with the Cisco PIX Security Appliance will occur.
Note: Hostnames within the RSA Authentication Manager / RSA SecurID
Appliance must resolve to valid IP addresses on the local network.
Please refer to the appropriate RSA Security documentation for additional information about Creating,
Modifying and Managing Agent Host records.
4
Partner Authentication Agent Configuration
Before You Begin
This section provides instructions for integrating the partners’ product with RSA SecurID Authentication.
This document is not intended to suggest optimum installations or configurations.
It is assumed that the reader has both working knowledge of all products involved, and the ability to
perform the tasks outlined in this section. Administrators should have access to the product
documentation for all products in order to install the required components.
All vendor products/components must be installed and working prior to the integration. Perform the
necessary tests to confirm that this is true before proceeding.
Cisco PIX Security Appliance
Log onto the Cisco PIX Security Appliance and enter enable mode, by typing the word “enable” and
giving the enable password. Then enter configuration mode by typing “config t”. You are now able to
enter the commands below to turn on authentication.
VPN Configuration
Please refer to the following Implementation Guide for instructions on setting up the Cisco VPN client to
use with the VPN configuration section.
: You can also enter the word “any” in place of the service, ftp, telnet,
Note
etc, to have all services use authentication.
7
Certification Checklist: Firewall
Date Tested: September 29, 2005
Certification Environment
Product Name Version Information Operating System
RSA Authentication Manager
RSA Software Token
Cisco Pix Security Appliance
RSA Native Protocol RADIUS Protocol
New PIN Mode
Force Authentication After New PIN
System Generated PIN
User Defined (4-8 Alphanumeric)
User Defined (5-7 Numeric)
User Selectable
Deny 4 and 8 Digit PIN
Deny Alphanumeric PIN
PASSCODE
16 Digit PASSCODE
4 Digit Password
Next Tokencode Mode
Next Tokencode Mode N/A
Load Balancing / Reliability Testing
Failover (3-10 Replicas)
Name Locking Enabled
No RSA Authentication Manager
RSA Software Token API Functionality
System Generated PIN
User Defined (8 Digit Numeric)
User Selectable
Next Tokencode Mode
Domain Credential Functionality
Determine Cached Credential State N/A
Set Domain Credential N/A
Retrieve Domain Credential N/A
BSD/SWA = Pass = Fail N/A = Non-Available Function
6.1 Windows 2003
3.0.4 Windows 2000
7.0(2) IOS
Mandatory Functionality
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
Force Authentication After New PIN
System Generated PIN
User Defined (4-8 Alphanumeric)
User Defined (5-7 Numeric)
User Selectable
Deny 4 and 8 Digit PIN
Deny Alphanumeric PIN
16 Digit PASSCODE
4 Digit Password
Next Tokencode Mode
Failover
Name Locking Enabled
No RSA Authentication Manager
Additional Functionality
N/A
N/A
N/A
N/A
System Generated PIN
User Defined (8 Digit Numeric)
User Selectable
Next Tokencode Mode
Determine Cached Credential State
Set Domain Credential
Retrieve Domain Credential
N/A
N/A
N/A
N/A
8
Certification Checklist: VPN
Date Tested: September 29, 2005
Certification Environment
Product Name Version Information Operating System
RSA Authentication Manager
RSA Software Token
Cisco Pix Security Appliance
Cisco VPN Client
RSA Native Protocol RADIUS Protocol
New PIN Mode
Force Authentication After New PIN
System Generated PIN
User Defined (4-8 Alphanumeric)
User Defined (5-7 Numeric)
User Selectable
Deny 4 and 8 Digit PIN
Deny Alphanumeric PIN
PASSCODE
16 Digit PASSCODE
4 Digit Password
Next Tokencode Mode
Next Tokencode Mode
Load Balancing / Reliability Testing
Failover (3-10 Replicas)
Name Locking Enabled
No RSA Authentication Manager
RSA Software Token API Functionality
System Generated PIN
User Defined (8 Digit Numeric)
User Selectable
Next Tokencode Mode
Domain Credential Functionality
Determine Cached Credential State N/A
Set Domain Credential N/A
Retrieve Domain Credential N/A
BSD/SWA = Pass = Fail N/A = Non-Available Function
6.1 Windows 2003
3.0.4 Windows 2000
7.0(2) IOS
4.6 Windows 2000
Mandatory Functionality
Force Authentication After New PIN
System Generated PIN
User Defined (4-8 Alphanumeric)
User Defined (5-7 Numeric)
User Selectable
Deny 4 and 8 Digit PIN
Deny Alphanumeric PIN
16 Digit PASSCODE
4 Digit Password
Next Tokencode Mode
Failover
Name Locking Enabled
No RSA Authentication Manager
Additional Functionality
System Generated PIN
User Defined (8 Digit Numeric)
User Selectable
Next Tokencode Mode
Determine Cached Credential State
Set Domain Credential
Retrieve Domain Credential
9
Known Issues
1. Failed PIN creation via RADIUS with VPN Client. When a user fails to enter a PIN that matches the PIN
criteria they will be prompted to enter their password again but will always fail as the information the user enters
will not be sent to the RADIUS Server. The user needs to disconnect and reconnect to attempt to create the PIN
again.
Appendix
Node Secret: The Node Secret file is stored in flash on the Cisco PIX Security Appliance. To see this
file run
Authentication Server with a .sdi extension. Example 10-10-10-2.sdi
show flash. The Node Secret file will be named with the IP Address of the Primary RSA
10
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.