User Guide for Cisco Secure ACS for
Windows Server
Version 3.3
May 2004
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Customer Order Number: DOC-7816592=
Text Part Number: 78-16592-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT
NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT
ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR
THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION
PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO
LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE
PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR
IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL
DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR
INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
CCIP, CCSP, the Cisco Arrow logo, the Cisco Powered Network mark, Cisco Unity, Follow Me Browsing, FormShare, and StackWise are trademarks of
Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Aironet, ASIST,
BPX, Catalyst, CCDA, CCDP, CCIE, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press,
Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherFast,
EtherSwitch, Fast Step, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard,
LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Pac ke t, PIX, Post-Routing, Pre-Routing,
ProConnect, RateMUX, Registrar, ScriptShare, SlideCast, SMARTnet, StrataView Plus, SwitchProbe, TeleRouter, The Fastest Way to Increase Your
Internet Quotient, TransPath, and VCO are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other
countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (0403R)
User Guide for Cisco Secure ACS for Windows Server
Cisco Technical Support Website xxxvii
Submitting a Service Request xxxvii
Definitions of Service Request Severity xxxviii
CONTENTS
CHAPTER
78-16592-01
Obtaining Additional Publications and Information xxxix
1Overview 1-1
The Cisco Secure ACS Paradigm 1-2
Cisco Secure ACS Specifications 1-3
System Performance Specifications 1-3
Cisco Secure ACS Windows Services 1-4
AAA Server Functions and Concepts 1-5
Cisco Secure ACS and the AAA Client 1-6
User Guide for Cisco Secure ACS for Windows Server
iii
Contents
AAA Protocols—TACACS+ and RADIUS 1-6
TACACS+ 1-7
RADIUS 1-7
Authentication 1-8
Authentication Considerations 1-9
Authentication and User Databases 1-10
Authentication Protocol-Database Compatibility 1-10
Passwords 1-11
Other Authentication-Related Features 1-16
Authorization 1-17
Max Sessions 1-18
Dynamic Usage Quotas 1-18
Shared Profile Components 1-19
Support for Cisco Device-Management Applications 1-19
Other Authorization-Related Features 1-21
Accounting 1-22
Other Accounting-Related Features 1-22
Administration 1-23
HTTP Port Allocation for Administrative Sessions 1-23
Network Device Groups 1-24
Other Administration-Related Features 1-24
Posture Validation 1-25
iv
Cisco Secure ACS HTML Interface 1-25
About the Cisco Secure ACS HTML Interface 1-26
HTML Interface Security 1-26
HTML Interface Layout 1-27
Uniform Resource Locator for the HTML Interface 1-29
Network Environments and Administrative Sessions 1-30
Administrative Sessions and HTTP Proxy 1-30
Administrative Sessions through Firewalls 1-31
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
Administrative Sessions through a NAT Gateway 1-31
Accessing the HTML Interface 1-32
Logging Off the HTML Interface 1-33
Online Help and Online Documentation 1-33
Using Online Help 1-34
Using the Online Documentation 1-34
Contents
CHAPTER
2Deployment Considerations 2-1
Basic Deployment Requirements for Cisco Secure ACS 2-2
System Requirements 2-2
Hardware Requirements 2-2
Operating System Requirements 2-2
Third-Party Software Requirements 2-3
Network and Port Requirements 2-4
Separation of Administrative and General Users 2-17
Database 2-18
Number of Users 2-18
Type of Database 2-18
Network Latency and Reliability 2-19
78-16592-01
Suggested Deployment Sequence 2-19
User Guide for Cisco Secure ACS for Windows Server
v
Contents
CHAPTER
CHAPTER
3Interface Configuration 3-1
Interface Design Concepts 3-2
User-to-Group Relationship 3-2
Per-User or Per-Group Features 3-2
User Data Configuration Options 3-3
Defining New User Data Fields 3-3
Advanced Options 3-4
Setting Advanced Options for the Cisco Secure ACS User Interface 3-6
Protocol Configuration Options for TACACS+ 3-7
Setting Options for TACACS+ 3-9
Protocol Configuration Options for RADIUS 3-11
Setting Protocol Configuration Options for IETF RADIUS Attributes 3-16
Setting Protocol Configuration Options for Non-IETF RADIUS Attributes 3-17
4Network Configuration 4-1
About Network Configuration 4-1
About Distributed Systems 4-2
AAA Servers in Distributed Systems 4-3
Default Distributed System Settings 4-3
vi
Proxy in Distributed Systems 4-4
Fallback on Failed Connection 4-5
Character String 4-6
Stripping 4-6
Proxy in an Enterprise 4-6
Remote Use of Accounting Packets 4-7
Other Features Enabled by System Distribution 4-8
Network Device Searches 4-8
Network Device Search Criteria 4-8
Searching for Network Devices 4-9
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
AAA Client Configuration 4-11
AAA Client Configuration Options 4-11
Adding a AAA Client 4-16
Editing a AAA Client 4-19
Deleting a AAA Client 4-21
AAA Server Configuration 4-21
AAA Server Configuration Options 4-22
Adding a AAA Server 4-24
Editing a AAA Server 4-26
Deleting a AAA Server 4-28
Network Device Group Configuration 4-28
Adding a Network Device Group 4-29
Assigning an Unassigned AAA Client or AAA Server to an NDG 4-30
Reassigning a AAA Client or AAA Server to an NDG 4-31
Renaming a Network Device Group 4-32
Deleting a Network Device Group 4-32
Contents
CHAPTER
78-16592-01
Proxy Distribution Table Configuration 4-34
About the Proxy Distribution Table 4-34
Adding a New Proxy Distribution Table Entry 4-35
Sorting the Character String Match Order of Distribution Entries 4-36
Editing a Proxy Distribution Table Entry 4-37
Deleting a Proxy Distribution Table Entry 4-38
5Shared Profile Components 5-1
About Shared Profile Components 5-1
Network Access Filters 5-2
About Network Access Filters 5-2
Adding a Network Access Filter 5-3
Editing a Network Access Filter 5-5
User Guide for Cisco Secure ACS for Windows Server
vii
Contents
Deleting a Network Access Filter 5-7
Downloadable IP ACLs 5-7
About Downloadable IP ACLs 5-8
Adding a Downloadable IP ACL 5-10
Editing a Downloadable IP ACL 5-13
Deleting a Downloadable IP ACL 5-14
Network Access Restrictions 5-14
About Network Access Restrictions 5-15
About IP-based NAR Filters 5-17
About Non-IP-based NAR Filters 5-18
Adding a Shared Network Access Restriction 5-19
Editing a Shared Network Access Restriction 5-23
Deleting a Shared Network Access Restriction 5-24
Command Authorization Sets 5-25
About Command Authorization Sets 5-26
Command Authorization Sets Description 5-26
Command Authorization Sets Assignment 5-28
Case Sensitivity and Command Authorization 5-29
Arguments and Command Authorization 5-29
About Pattern Matching 5-30
Adding a Command Authorization Set 5-31
Editing a Command Authorization Set 5-33
Deleting a Command Authorization Set 5-35
CHAPTER
viii
6User Group Management 6-1
About User Group Setup Features and Functions 6-2
Default Group 6-2
Group TACACS+ Settings 6-2
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
Basic User Group Settings 6-3
Group Disablement 6-4
Enabling VoIP Support for a User Group 6-4
Setting Default Time-of-Day Access for a User Group 6-5
Setting Callback Options for a User Group 6-7
Setting Network Access Restrictions for a User Group 6-8
Setting Max Sessions for a User Group 6-12
Setting Usage Quotas for a User Group 6-14
Configuration-specific User Group Settings 6-16
Setting Token Card Settings for a User Group 6-18
Setting Enable Privilege Options for a User Group 6-19
Enabling Password Aging for the CiscoSecure User Database 6-21
Enabling Password Aging for Users in Windows Databases 6-26
Setting IP Address Assignment Method for a User Group 6-28
Assigning a Downloadable IP ACL to a Group 6-30
Configuring TACACS+ Settings for a User Group 6-31
Configuring a Shell Command Authorization Set for a User Group 6-33
Configuring a PIX Command Authorization Set for a User Group 6-35
Configuring Device-Management Command Authorization for a User
Group
Configuring IETF RADIUS Settings for a User Group 6-38
Configuring Cisco IOS/PIX RADIUS Settings for a User Group 6-40
Configuring Cisco Aironet RADIUS Settings for a User Group 6-41
Configuring Ascend RADIUS Settings for a User Group 6-43
Configuring Cisco VPN 3000 Concentrator RADIUS Settings for a User
Group
Configuring Cisco VPN 5000 Concentrator RADIUS Settings for a User
Group
Configuring Microsoft RADIUS Settings for a User Group 6-47
Configuring Nortel RADIUS Settings for a User Group 6-49
Configuring Juniper RADIUS Settings for a User Group 6-50
6-37
6-44
6-46
Contents
78-16592-01
User Guide for Cisco Secure ACS for Windows Server
ix
Contents
Configuring BBSM RADIUS Settings for a User Group 6-51
Configuring Custom RADIUS VSA Settings for a User Group 6-53
Group Setting Management 6-54
Listing Users in a User Group 6-54
Resetting Usage Quota Counters for a User Group 6-55
Renaming a User Group 6-55
Saving Changes to User Group Settings 6-56
CHAPTER
7User Management 7-1
About User Setup Features and Functions 7-1
About User Databases 7-2
Basic User Setup Options 7-3
Adding a Basic User Account 7-4
Setting Supplementary User Information 7-6
Setting a Separate CHAP/MS-CHAP/ARAP Password 7-7
Assigning a User to a Group 7-8
Setting User Callback Option 7-9
Assigning a User to a Client IP Address 7-10
Setting Network Access Restrictions for a User 7-11
Setting Max Sessions Options for a User 7-16
Setting User Usage Quotas Options 7-18
Setting Options for User Account Disablement 7-20
Assigning a Downloadable IP ACL to a User 7-21
Advanced User Authentication Settings 7-22
TACACS+ Settings (User) 7-23
Configuring TACACS+ Settings for a User 7-24
Configuring a Shell Command Authorization Set for a User 7-26
Configuring a PIX Command Authorization Set for a User 7-29
User Guide for Cisco Secure ACS for Windows Server
x
78-16592-01
Configuring Device-Management Command Authorization for a
User
7-30
Configuring the Unknown Service Setting for a User 7-32
Advanced TACACS+ Settings (User) 7-33
Setting Enable Privilege Options for a User 7-33
Setting TACACS+ Enable Password Options for a User 7-35
Setting TACACS+ Outbound Password for a User 7-37
RADIUS Attributes 7-37
Setting IETF RADIUS Parameters for a User 7-38
Setting Cisco IOS/PIX RADIUS Parameters for a User 7-39
Setting Cisco Aironet RADIUS Parameters for a User 7-41
Setting Ascend RADIUS Parameters for a User 7-43
Setting Cisco VPN 3000 Concentrator RADIUS Parameters for a
User
7-44
Setting Cisco VPN 5000 Concentrator RADIUS Parameters for a
User
7-46
Setting Microsoft RADIUS Parameters for a User 7-47
Setting Nortel RADIUS Parameters for a User 7-49
Setting Juniper RADIUS Parameters for a User 7-51
Setting BBSM RADIUS Parameters for a User 7-52
Setting Custom RADIUS Attributes for a User 7-53
Contents
78-16592-01
User Management 7-54
Listing All Users 7-55
Finding a User 7-55
Disabling a User Account 7-56
Deleting a User Account 7-57
Resetting User Session Quota Counters 7-58
Resetting a User Account after Login Failure 7-59
Saving User Settings 7-60
User Guide for Cisco Secure ACS for Windows Server
xi
Contents
CHAPTER
8System Configuration: Basic 8-1
Service Control 8-1
Determining the Status of Cisco Secure ACS Services 8-2
Stopping, Starting, or Restarting Services 8-2
User Guide for Cisco Secure ACS for Windows Server
xiii
Contents
RDBMS Synchronization Components 9-29
About CSDBSync 9-29
About the accountActions Table 9-31
Cisco Secure ACS Database Recovery Using the accountActions Table 9-32
Reports and Event (Error) Handling 9-33
Preparing to Use RDBMS Synchronization 9-33
Considerations for Using CSV-Based Synchronization 9-35
Preparing for CSV-Based Synchronization 9-36
Configuring a System Data Source Name for RDBMS Synchronization 9-37
RDBMS Synchronization Options 9-38
About IP Pools Server 9-44
Allowing Overlapping IP Pools or Forcing Unique Pool Address Ranges 9-45
Refreshing the AAA Server IP Pools Table 9-47
Adding a New IP Pool 9-47
Editing an IP Pool Definition 9-48
Resetting an IP Pool 9-49
Deleting an IP Pool 9-50
IP Pools Address Recovery 9-51
Enabling IP Pool Address Recovery 9-51
10System Configuration: Authentication and Certificates 10-1
About Certification and EAP Protocols 10-1
Digital Certificates 10-2
User Guide for Cisco Secure ACS for Windows Server
Installing a Cisco Secure ACS Server Certificate 10-35
Adding a Certificate Authority Certificate 10-37
Editing the Certificate Trust List 10-38
Managing Certificate Revocation Lists 10-40
About Certificate Revocation Lists 10-40
Certificate Revocation List Configuration Options 10-41
Adding a Certificate Revocation List Issuer 10-42
Editing a Certificate Revocation List Issuer 10-44
Deleting a Certificate Revocation List Issuer 10-44
User Guide for Cisco Secure ACS for Windows Server
xv
Contents
Generating a Certificate Signing Request 10-45
Using Self-Signed Certificates 10-47
Services Logged 11-32
Configuring Service Logs 11-33
Contents
CHAPTER
12Administrators and Administrative Policy 12-1
Administrator Accounts 12-1
About Administrator Accounts 12-2
Administrator Privileges 12-3
Adding an Administrator Account 12-6
Editing an Administrator Account 12-7
Unlocking a Locked Out Administrator Account 12-10
Deleting an Administrator Account 12-11
Access Policy 12-11
Access Policy Options 12-12
Setting Up Access Policy 12-14
Session Policy 12-16
Session Policy Options 12-16
Setting Up Session Policy 12-17
Audit Policy 12-18
78-16592-01
User Guide for Cisco Secure ACS for Windows Server
xvii
Contents
CHAPTER
13User Databases 13-1
CiscoSecure User Database 13-2
About the CiscoSecure User Database 13-2
User Import and Creation 13-3
About External User Databases 13-4
Authenticating with External User Databases 13-5
External User Database Authentication Process 13-6
Windows User Database 13-7
What’s Supported with Windows User Databases 13-8
Authentication with Windows User Databases 13-9
Trust Relationships 13-9
Windows Dial-up Networking Clients 13-10
Windows Dial-up Networking Clients with a Domain Field 13-10
Windows Dial-up Networking Clients without a Domain Field 13-11
Usernames and Windows Authentication 13-11
Username Formats and Windows Authentication 13-11
Non-domain-qualified Usernames 13-13
Domain-Qualified Usernames 13-14
UPN Usernames 13-14
EAP and Windows Authentication 13-15
EAP-TLS Domain Stripping 13-16
Machine Authentication 13-16
Machine Access Restrictions 13-19
Microsoft Windows and Machine Authentication 13-20
Enabling Machine Authentication 13-22
User-Changeable Passwords with Windows User Databases 13-25
Preparing Users for Authenticating with Windows 13-26
Windows User Database Configuration Options 13-26
Configuring a Windows External User Database 13-30
xviii
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
Generic LDAP 13-32
Cisco Secure ACS Authentication Process with a Generic LDAP User
Database
Multiple LDAP Instances 13-33
LDAP Organizational Units and Groups 13-34
Domain Filtering 13-34
LDAP Failover 13-36
LDAP Configuration Options 13-37
Configuring a Generic LDAP External User Database 13-43
Novell NDS Database 13-49
About Novell NDS User Databases 13-50
User Contexts 13-51
Novell NDS External User Database Options 13-52
Configuring a Novell NDS External User Database 13-53
13-33
Successful Previous Authentication with the Primary LDAP Server 13-36
Unsuccessful Previous Authentication with the Primary LDAP
Server
13-37
Contents
78-16592-01
ODBC Database 13-55
What is Supported with ODBC User Databases 13-57
Cisco Secure ACS Authentication Process with an ODBC External User
Database
13-58
Preparing to Authenticate Users with an ODBC-Compliant Relational
Database
13-59
Implementation of Stored Procedures for ODBC Authentication 13-60
Type Definitions 13-61
Microsoft SQL Server and Case-Sensitive Passwords 13-61
Sample Routine for Generating a PAP Authentication SQL Procedure 13-62
Sample Routine for Generating an SQL CHAP Authentication
Procedure
13-63
Sample Routine for Generating an EAP-TLS Authentication Procedure 13-64
PAP Authentication Procedure Input 13-64
User Guide for Cisco Secure ACS for Windows Server
xix
Contents
PAP Procedure Output 13-65
CHAP/MS-CHAP/ARAP Authentication Procedure Input 13-66
CHAP/MS-CHAP/ARAP Procedure Output 13-66
EAP-TLS Authentication Procedure Input 13-67
EAP-TLS Procedure Output 13-68
Result Codes 13-69
Configuring a System Data Source Name for an ODBC External User
Database
Configuring an ODBC External User Database 13-71
LEAP Proxy RADIUS Server Database 13-75
Configuring a LEAP Proxy RADIUS Server External User Database 13-76
Token Server User Databases 13-78
About Token Servers and Cisco Secure ACS 13-78
RADIUS-Enabled Token Servers 13-79
RSA SecurID Token Servers 13-84
13-70
Token Servers and ISDN 13-79
About RADIUS-Enabled Token Servers 13-80
Token Server RADIUS Authentication Request and Response
Contents
13-80
Configuring a RADIUS Token Server External User Database 13-81
Configuring an RSA SecurID Token Server External User Database 13-85
CHAPTER
xx
Deleting an External User Database Configuration 13-86
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
NAC Databases 14-10
About NAC Databases 14-10
About NAC Credentials and Attributes 14-11
NAC Database Configuration Options 14-12
Policy Selection Options 14-13
Configuring a NAC Database 14-14
NAC Policies 14-16
Local Policies 14-17
About Local Policies 14-18
About Rules, Rule Elements, and Attributes 14-19
Local Policy Configuration Options 14-22
Rule Configuration Options 14-24
Creating a Local Policy 14-25
External Policies 14-28
About External Policies 14-28
External Policy Configuration Options 14-29
Creating an External Policy 14-32
Editing a Policy 14-34
Deleting a Policy 14-36
Contents
CHAPTER
78-16592-01
15Unknown User Policy 15-1
Known, Unknown, and Discovered Users 15-2
Authentication and Unknown Users 15-4
About Unknown User Authentication 15-4
General Authentication of Unknown Users 15-5
Windows Authentication of Unknown Users 15-6
Domain-Qualified Unknown Windows Users 15-6
Windows Authentication with Domain Qualification 15-7
Multiple User Account Creation 15-8
User Guide for Cisco Secure ACS for Windows Server
xxi
Contents
Performance of Unknown User Authentication 15-8
Added Authentication Latency 15-9
Authentication Timeout Value on AAA clients 15-9
Posture Validation and the Unknown User Policy 15-10
NAC and the Unknown User Policy 15-10
Posture Validation Use of the Unknown User Policy 15-11
Required Use for Posture Validation 15-12
Authorization of Unknown Users 15-13
Unknown User Policy Options 15-13
Database Search Order 15-14
Configuring the Unknown User Policy 15-16
Disabling Unknown User Authentication 15-17
CHAPTER
xxii
16User Group Mapping and Specification 16-1
About User Group Mapping and Specification 16-1
Group Mapping by External User Database 16-2
Creating a Cisco Secure ACS Group Mapping for a Token Server, ODBC
Database, or LEAP Proxy RADIUS Server Database
Group Mapping by Group Set Membership 16-4
Group Mapping Order 16-5
No Access Group for Group Set Mappings 16-5
Default Group Mapping for Windows 16-6
Windows Group Mapping Limitations 16-6
Creating a Cisco Secure ACS Group Mapping for Windows, Novell NDS, or
Generic LDAP Groups
16-7
Editing a Windows, Novell NDS, or Generic LDAP Group Set Mapping 16-9
Deleting a Windows, Novell NDS, or Generic LDAP Group Set
Mapping
16-10
Deleting a Windows Domain Group Mapping Configuration 16-11
Changing Group Set Mapping Order 16-12
User Guide for Cisco Secure ACS for Windows Server
16-3
78-16592-01
NAC Group Mapping 16-13
Configuring NAC Group Mapping 16-13
RADIUS-Based Group Specification 16-14
Contents
APPENDIX
APPENDIX
ATroubleshooting A-1
Administration Issues A-2
Browser Issues A-4
Cisco IOS Issues A-5
Database Issues A-7
Dial-in Connection Issues A-10
Debug Issues A-14
Proxy Issues A-15
Installation and Upgrade Issues A-16
MaxSessions Issues A-16
Report Issues A-17
Third-Party Server Issues A-19
User Authentication Issues A-20
TACACS+ and RADIUS Attribute Issues A-22
BTACACS+ Attribute-Value Pairs B-1
Cisco IOS AV Pair Dictionary B-1
TACACS+ AV Pairs B-2
TACACS+ Accounting AV Pairs B-4
APPENDIX
78-16592-01
CRADIUS Attributes C-1
Cisco IOS Dictionary of RADIUS AV Pairs C-2
Cisco IOS/PIX Dictionary of RADIUS VSAs C-5
About the cisco-av-pair RADUIS Attribute C-7
User Guide for Cisco Secure ACS for Windows Server
xxiii
Contents
Cisco VPN 3000 Concentrator Dictionary of RADIUS VSAs C-9
Cisco VPN 5000 Concentrator Dictionary of RADIUS VSAs C-13
Cisco Building Broadband Service Manager Dictionary of RADIUS VSA C-14
IETF Dictionary of RADIUS AV Pairs C-14
Microsoft MPPE Dictionary of RADIUS VSAs C-28
Ascend Dictionary of RADIUS AV Pairs C-31
Nortel Dictionary of RADIUS VSAs C-43
Juniper Dictionary of RADIUS VSAs C-44
APPENDIX
DCSUtil Database Utility D-1
Location of CSUtil.exe and Related Files D-2
CSUtil.exe Syntax D-2
CSUtil.exe Options D-3
Displaying Command-Line Syntax D-5
Backing Up Cisco Secure ACS with CSUtil.exe D-6
Restoring Cisco Secure ACS with CSUtil.exe D-7
Creating a CiscoSecure User Database D-8
Creating a Cisco Secure ACS Database Dump File D-10
Loading the Cisco Secure ACS Database from a Dump File D-11
Compacting the CiscoSecure User Database D-12
User and AAA Client Import Option D-14
Importing User and AAA Client Information D-15
User and AAA Client Import File Format D-16
About User and AAA Client Import File Format D-17
ONLINE or OFFLINE Statement D-17
ADD Statements D-18
UPDATE Statements D-19
DELETE Statements D-21
xxiv
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
ADD_NAS Statements D-21
DEL_NAS Statements D-23
Import File Example D-24
Exporting User List to a Text File D-24
Exporting Group Information to a Text File D-25
Exporting Registry Information to a Text File D-26
Decoding Error Numbers D-27
Recalculating CRC Values D-28
User-Defined RADIUS Vendors and VSA Sets D-28
About User-Defined RADIUS Vendors and VSA Sets D-29
Adding a Custom RADIUS Vendor and VSA Set D-29
Deleting a Custom RADIUS Vendor and VSA Set D-31
Listing Custom RADIUS Vendors D-32
Exporting Custom RADIUS Vendor and VSA Sets D-33
RADIUS Vendor/VSA Import File D-34
About the RADIUS Vendor/VSA Import File D-34
Vendor and VSA Set Definition D-35
Attribute Definition D-36
Enumeration Definition D-38
Example RADIUS Vendor/VSA Import File D-39
Contents
78-16592-01
PAC File Generation D-40
PAC File Options and Examples D-41
Generating PAC Files D-43
User Guide for Cisco Secure ACS for Windows Server
xxv
Contents
APPENDIX
APPENDIX
EVPDN Processing E-1
VPDN Process E-1
FRDBMS Synchronization Import Definitions F-1
accountActions Specification F-1
accountActions Format F-2
accountActions Mandatory Fields F-3
accountActions Processing Order F-4
Action Codes F-4
Action Codes for Setting and Deleting Values F-5
Action Codes for Creating and Modifying User Accounts F-7
Action Codes for Initializing and Modifying Access Filters F-14
Action Codes for Modifying TACACS+ and RADIUS Group and User
Settings
F-19
Action Codes for Modifying Network Configuration F-25
User Guide for Cisco Secure ACS for Windows Server
xxvii
Contents
xxviii
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
Preface
This document will help you configure and use Cisco Secure
Access Control Server (ACS) and its features and utilities.
Audience
This guide is for system administrators who use Cisco Secure ACS and who set
up and maintain accounts and dial-in network security.
Organization
This document contains the following chapters and appendixes:
• Chapter 1, “Overview”—An overview of Cisco Secure ACS and its
features, network diagrams, and system requirements.
• Chapter 2, “Deployment Considerations”—A guide to deploying
Cisco Secure ACS that includes requirements, options, trade-offs, and
suggested sequences.
• Chapter 3, “Interface Configuration”—Concepts and procedures
regarding how to use the Interface Configuration section of Cisco Secure
ACS to configure the HTML interface.
78-16592-01
• Chapter 4, “Network Configuration”—Concepts and procedures for
establishing Cisco Secure ACS network configuration and building a
distributed system.
User Guide for Cisco Secure ACS for Windows Server
xxix
Organization
Preface
• Chapter 5, “Shared Profile Components”—Concepts and procedures
regarding Cisco Secure ACS shared profile components: downloadable IP
acls, network access filters, network access restrictions, and device command
sets.
• Chapter 6, “User Group Management”—Concepts and procedures for
establishing and maintaining Cisco Secure ACS user groups.
• Chapter 7, “User Management”—Concepts and procedures for
establishing and maintaining Cisco Secure ACS user accounts.
• Chapter 8, “System Configuration: Basic”—Concepts and procedures
regarding the basic features found in the System Configuration section of
Cisco Secure ACS.
• Chapter 9, “System Configuration: Advanced”—Concepts and procedures
regarding RDBMS Synchronization, CiscoSecure Database Replication, and
IP pools, found in the System Configuration section of Cisco Secure ACS.
• Chapter 10, “System Configuration: Authentication and
Certificates”—Concepts and procedures regarding the Global
Authentication and ACS Certificate Setup pages, found in the System
Configuration section of Cisco Secure ACS.
xxx
• Chapter 11, “Logs and Reports”—Concepts and procedures regarding
Cisco Secure ACS logging and reports.
• Chapter 12, “Administrators and Administrative Policy”—Concepts and
procedures for establishing and maintaining Cisco Secure ACS
administrators.
• Chapter 13, “User Databases”—Concepts about user databases and
procedures for configuring Cisco Secure ACS to perform user authentication
with external user databases.
• Chapter 14, “Network Admission Control”—Concepts and procedures for
implementing Network Admission Control (NAC) and configuring NAC
databases, policies, and rules.
• Chapter 15, “Unknown User Policy”—Concepts and procedures about
using the Unknown User Policy with posture validation and unknown user
authentication.
• Chapter 16, “User Group Mapping and Specification”—Concepts and
procedures regarding the assignment of groups for users authenticated by an
external user database.
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
Preface
Conventions
• Appendix A, “Troubleshooting”—How to identify and solve certain
problems you might have with Cisco Secure ACS.
• Appendix B, “TACACS+ Attribute-Value Pairs”—A list of supported
TACACS+ AV pairs and accounting AV pairs.
• Appendix C, “RADIUS Attributes”—A list of supported RADIUS AV
pairs and accounting AV pairs.
• Appendix D, “CSUtil Database Utility”—Instructions for using
CSUtil.exe, a command line utility you can use to work with the CiscoSecure
user database, to import AAA clients and users, to define RADIUS vendors
and attributes, and to generate PAC files for EAP-FAST clients.
• Appendix E, “VPDN Processing”—An introduction to Virtual Private
Dial-up Networks (VPDN), including stripping and tunneling, with
instructions for enabling VPDN on Cisco Secure ACS.
• Appendix F, “RDBMS Synchronization Import Definitions”—A list of
import definitions, for use with the RDBMS Synchronization feature.
• Appendix G, “Internal Architecture”—A description of Cisco Secure ACS
architectural components.
Conventions
This document uses the following conventions:
ItemConvention
Commands, keywords, special terminology, and options that should
be selected during procedures
Variables for which you supply values and new or important
terminology
Displayed session and system information, paths and file names
Information you enterboldface screen font
Variables you enteritalic screen font
Menu items and button namesboldface font
Indicates menu items to select, in the order you select them.Option > Network Preferences
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
boldface font
italic font
screen font
xxxi
Product Documentation
TipIdentifies information to help you get the most benefit from your product.
NoteMeans reader take note. Notes identify important information that you should
CautionMeans reader be careful. In this situation, you might do something that could
Preface
reflect upon before continuing, contain helpful suggestions, or provide references
to materials not contained in the document.
result in equipment damage, loss of data, or a potential breach in your network
security.
Warning
Identifies information that you must heed to prevent damaging yourself, the
state of software, or equipment. Warnings identify definite security breaches
that will result if the information presented is not followed carefully.
Product Documentation
NoteWe sometimes update the printed and electronic documentation after original
publication. Therefore, you should also review the documentation on Cisco.com
for any updates.
Table 1 describes the product documentation that is available.
Table 1Product Documentation
Document TitleAvailable Formats
Release Notes for Cisco Secure ACS for
Windows Server
• Printed document that was included with the
product.
• On Cisco.com.
xxxii
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
Preface
Table 1Product Documentation (continued)
Document TitleAvailable Formats
Installation Guide for Cisco Secure ACS for
Windows Server
• PDF on the product CD-ROM.
• On Cisco.com.
Related Documentation
User Guide for Cisco Secure ACS for
Windows Server
Installation and User Guide for Cisco Secure ACS
User-Changeable Passwords
Supported and Interoperable Devices and
• Printed document available by order (part
number DOC-7816529=).
• PDF on the product CD-ROM.
• On Cisco.com.
• Printed document available by order (part
number DOC-7816530=).
• PDF on the product CD-ROM.
• On Cisco.com.
• On Cisco.com.
1
1
Software Tables for Cisco Secure ACS for
Windows Server
Recommended Resources for the
• On Cisco.com.
Cisco Secure ACS User
Online DocumentationIn the Cisco Secure ACS HTML interface, click
Online Documentation.
Online HelpIn the Cisco Secure ACS HTML interface, online
help appears in the right-hand frame when you are
configuring a feature.
1. See Obtaining Documentation, page xxxv.
Related Documentation
NoteWe sometimes update the printed and electronic documentation after original
publication. Therefore, you should also review the documentation on Cisco.com
for any updates.
78-16592-01
User Guide for Cisco Secure ACS for Windows Server
xxxiii
Related Documentation
Table 2 describes a set of white papers about Cisco Secure ACS. All white papers
are available on Cisco.com. To view them, go to the following URL:
Building a Scalable TACACS+
Device Management Framework
This document discusses the key benefits of and how to deploy
Cisco Secure ACS Shell Authorization Command sets, which
provide the facilities constructing a scalable network device
management system using familiar and efficient TCP/IP protocols
and utilities supported by Cisco devices.
Catalyst Switching and ACS
Deployment Guide
This document presents planning, design, and implementation
practices for deploying Cisco Secure ACS for Windows Server in
support of Cisco Catalyst Switch networks. It discusses network
topology regarding AAA, user database choices, password
protocol choices, access requirements, and capabilities of
Cisco Secure ACS.
Cisco Secure ACS for Windows vs.
Cisco Secure ACS for UNIX
This bulletin compares the overall feature sets of
Cisco Secure ACS for Windows and CiscoSecure ACS for UNIX.
It also examines the advantages and disadvantages of both
platforms and discusses issues related to migrating from the
UNIX-based product to the Windows version.
Configuring LDAP This document outlines deployment concepts for
Cisco Secure ACS when authenticating users of a Lightweight
Directory Access Protocol (LDAP) directory server, and describes
how to use these concepts to configure Cisco Secure ACS.
Deploying Cisco Secure ACS for
Windows in a Cisco Aironet
This paper discusses guidelines for wireless network design and
deployment with Cisco Secure ACS.
Environment
EAP-TLS Deployment Guide for
Wireless LAN Networks
This document discusses the Extensible Authentication Protocol
Transport Layer Security (EAP-TLS) authentication protocol
deployment in wireless networks. It introduces the EAP-TLS
architecture and then discusses deployment issues.
Preface
xxxiv
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
Preface
Obtaining Documentation
Table 2Related Documentation (continued)
Document TitleDescription and Available Formats
External ODBC Authentication This paper presents concepts and configuration issues in
deploying Cisco Secure ACS for Windows Server to authenticate
users against an external open database connectivity (ODBC)
database. This paper also describes configuring, testing, and
troubleshooting a relational database management system
(RDBMS) with ODBC and Cisco Secure ACS, and provides
sample Structured Query Language (SQL) procedures.
Guidelines for Placing ACS in the
Network
Initializing MC Authorization on
ACS 3.1
Securing ACS Running on
Microsoft Windows Platforms
This document discusses planning, design, and implementation
practices for deploying Cisco Secure ACS for Windows Server in
an enterprise network. It discusses network topology, user
database choices, access requirements, integration of external
databases, and capabilities of Cisco Secure ACS.
This application note explains how to initialize Management
Center authorization on Cisco Secure ACS.
This paper describes how the Cisco Secure ACS can be protected
against the vulnerabilities of the Windows 2000 operating system
and explains how to improve security on the computer running
Cisco Secure ACS. It discusses making the system dedicated to
Cisco Secure ACS, removing all unnecessary services, and other
measures. It also discusses how to improve administrative security
for Cisco Secure ACS through such methods as stronger
passwords and controlled administrative access. This paper
concludes with considerations of physical security for
Cisco Secure ACS and its host.
Obtaining Documentation
Cisco documentation and additional literature are available on Cisco.com. Cisco
also provides several ways to obtain technical assistance and other technical
resources. These sections explain how to obtain technical information from Cisco
Systems.
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
xxxv
Documentation Feedback
Cisco.com
You can access the most current Cisco documentation at this URL:
http://www.cisco.com/univercd/home/home.htm
You can access the Cisco website at this URL:
http://www.cisco.com
You can access international Cisco websites at this URL:
• Nonregistered Cisco.com users can order documentation through a local
account representative by calling Cisco Systems Corporate Headquarters
(California, USA) at 408 526-7208 or, elsewhere in North America, by
calling 800 553-NETS (6387).
Documentation Feedback
You can send comments about technical documentation to bug-doc@cisco.com.
User Guide for Cisco Secure ACS for Windows Server
xxxvi
78-16592-01
Preface
You can submit comments by using the response card (if present) behind the front
cover of your document or by writing to the following address:
Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
Obtaining Technical Assistance
For all customers, partners, resellers, and distributors who hold valid Cisco
service contracts, Cisco Technical Support provides 24-hour-a-day,
award-winning technical assistance. The Cisco Technical Support Website on
Cisco.com features extensive online support resources. In addition, Cisco
Technical Assistance Center (TAC) engineers provide telephone support. If you
do not hold a valid Cisco service contract, contact your reseller.
Obtaining Technical Assistance
Cisco Technical Support Website
The Cisco Technical Support Website provides online documents and tools for
troubleshooting and resolving technical issues with Cisco products and
technologies. The website is available 24 hours a day, 365 days a year at this URL:
http://www.cisco.com/techsupport
Access to all tools on the Cisco Technical Support Website requires a Cisco.com
user ID and password. If you have a valid service contract but do not have a user
ID or password, you can register at this URL:
http://tools.cisco.com/RPF/register/register.do
Submitting a Service Request
Using the online TAC Service Request Tool is the fastest way to open S3 and S4
service requests. (S3 and S4 service requests are those in which your network is
minimally impaired or for which you require product information.) After you
describe your situation, the TAC Service Request Tool automatically provides
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
xxxvii
Obtaining Technical Assistance
recommended solutions. If your issue is not resolved using the recommended
resources, your service request will be assigned to a Cisco TAC engineer. The
TAC Service Request Tool is located at this URL:
http://www.cisco.com/techsupport/servicerequest
For S1 or S2 service requests or if you do not have Internet access, contact the
Cisco TAC by telephone. (S1 or S2 service requests are those in which your
production network is down or severely degraded.) Cisco TAC engineers are
assigned immediately to S1 and S2 service requests to help keep your business
operations running smoothly.
To open a service request by telephone, use one of the following numbers:
For a complete list of Cisco TAC contacts, go to this URL:
http://www.cisco.com/techsupport/contacts
Preface
Definitions of Service Request Severity
To ensure that all service requests are reported in a standard format, Cisco has
established severity definitions.
Severity 1 (S1)—Your network is “down,” or there is a critical impact to your
business operations. You and Cisco will commit all necessary resources around
the clock to resolve the situation.
Severity 2 (S2)—Operation of an existing network is severely degraded, or
significant aspects of your business operation are negatively affected by
inadequate performance of Cisco products. You and Cisco will commit full-time
resources during normal business hours to resolve the situation.
Severity 3 (S3)—Operational performance of your network is impaired, but most
business operations remain functional. You and Cisco will commit resources
during normal business hours to restore service to satisfactory levels.
Severity 4 (S4)—You require information or assistance with Cisco product
capabilities, installation, or configuration. There is little or no effect on your
business operations.
User Guide for Cisco Secure ACS for Windows Server
xxxviii
78-16592-01
Preface
Obtaining Additional Publications and Information
Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is
available from various online and printed sources.
• Cisco Marketplace provides a variety of Cisco books, reference guides, and
logo merchandise. Visit Cisco Marketplace, the company store, at this URL:
http://www.cisco.com/go/marketplace/
• The Cisco Product Catalog describes the networking products offered by
Cisco Systems, as well as ordering and customer support services. Access the
Cisco Product Catalog at this URL:
http://cisco.com/univercd/cc/td/doc/pcat/
• Cisco Press publishes a wide range of general networking, training and
certification titles. Both new and experienced users will benefit from these
publications. For current Cisco Press titles and other information, go to Cisco
Press at this URL:
http://www.ciscopress.com
• Packet magazine is the Cisco Systems technical user magazine for
maximizing Internet and networking investments. Each quarter, Packet
delivers coverage of the latest industry trends, technology breakthroughs, and
Cisco products and solutions, as well as network deployment and
troubleshooting tips, configuration examples, customer case studies,
certification and training information, and links to scores of in-depth online
resources. You can access Packet magazine at this URL:
http://www.cisco.com/packet
78-16592-01
• iQ Magazine is the quarterly publication from Cisco Systems designed to
help growing companies learn how they can use technology to increase
revenue, streamline their business, and expand services. The publication
identifies the challenges facing these companies and the technologies to help
solve them, using real-world case studies and business strategies to help
readers make sound technology investment decisions. You can access iQ
Magazine at this URL:
http://www.cisco.com/go/iqmagazine
User Guide for Cisco Secure ACS for Windows Server
xxxix
Obtaining Additional Publications and Information
• Internet Protocol Journal is a quarterly journal published by Cisco Systems
for engineering professionals involved in designing, developing, and
operating public and private internets and intranets. You can access the
Internet Protocol Journal at this URL:
http://www.cisco.com/ipj
• World-class networking training is available from Cisco. You can view
current offerings at this URL:
http://www.cisco.com/en/US/learning/index.html
Preface
xl
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
CHAPTER
1
Overview
This chapter provides an overview of Cisco Secure ACS for Windows Server.
This chapter contains the following topics:
• The Cisco Secure ACS Paradigm, page 1-2
• Cisco Secure ACS Specifications, page 1-3
–
System Performance Specifications, page 1-3
–
Cisco Secure ACS Windows Services, page 1-4
• AAA Server Functions and Concepts, page 1-5
–
Cisco Secure ACS and the AAA Client, page 1-6
–
AAA Protocols—TACACS+ and RADIUS, page 1-6
–
Authentication, page 1-8
78-16592-01
–
Authorization, page 1-17
–
Accounting, page 1-22
–
Administration, page 1-23
–
Posture Validation, page 1-25
• Cisco Secure ACS HTML Interface, page 1-25
–
About the Cisco Secure ACS HTML Interface, page 1-26
–
HTML Interface Layout, page 1-27
–
Uniform Resource Locator for the HTML Interface, page 1-29
–
Network Environments and Administrative Sessions, page 1-30
User Guide for Cisco Secure ACS for Windows Server
1-1
The Cisco Secure ACS Paradigm
–
Accessing the HTML Interface, page 1-32
–
Logging Off the HTML Interface, page 1-33
–
Online Help and Online Documentation, page 1-33
The Cisco Secure ACS Paradigm
Cisco Secure ACS provides authentication, authorization, and accounting
(AAA—pronounced “triple A”) services to network devices that function as AAA
clients, such as a network access server, PIX Firewall, or router. The AAA client
in Figure 1-1 represents any such device that provides AAA client functionality
and uses one of the AAA protocols supported by Cisco Secure ACS.
Figure 1-1A Simple AAA Scenario
Chapter 1 Overview
Cisco Secure
Access Control Server
1-2
End-user clientAAA client
Cisco Secure ACS centralizes access control and accounting, in addition to router
and switch access management. With Cisco Secure ACS, network administrators
can quickly administer accounts and globally change levels of service offerings
for entire groups of users. Although the external user database shown in
Figure 1-1 is optional, support for many popular user repository implementations
enables companies to put to use the working knowledge gained from and the
investment already made in building their corporate user repositories.
Cisco Secure ACS supports Cisco AAA clients such as the Cisco 2509, 2511,
3620, 3640, AS5200 and AS5300, AS5800, the Cisco PIX Firewall, Cisco
Aironet Access Point wireless networking devices, Cisco VPN 3000
Concentrators, and Cisco VPN 5000 Concentrators. It also supports third-party
devices that can be configured with the Terminal Access Controller Access
Control System (TACACS+) or the Remote Access Dial-In User Service
(RADIUS) protocol. Cisco Secure ACS treats all such devices as AAA clients.
Cisco Secure ACS uses the TACACS+ and RADIUS protocols to provide AAA
User Guide for Cisco Secure ACS for Windows Server
External user
database
67472
78-16592-01
Chapter 1 Overview
services that ensure a secure environment. For more information about support for
TACACS+ and RADIUS in Cisco Secure ACS, see AAA Protocols—TACACS+
and RADIUS, page 1-6.
Cisco Secure ACS Specifications
NoteFor hardware, operating system, third-party software, and network requirements,
see Basic Deployment Requirements for Cisco Secure ACS, page 2-2.
This section contains the following topics:
• System Performance Specifications, page 1-3
• Cisco Secure ACS Windows Services, page 1-4
System Performance Specifications
Cisco Secure ACS Specifications
78-16592-01
The performance capabilities of Cisco Secure ACS are largely dependent upon
the Windows server it is installed upon, your network topology and network
management, the selection of user databases, and other factors. For example,
Cisco Secure ACS can perform many more authentications per second if it is
using its internal user database and running on a computer using the fastest
processor and network interface card available than it can if it is using several
external user databases and running on a computer that complies with the
minimum system requirements (see System Requirements, page 2-2).
For more information about the expected performance of Cisco Secure ACS in
your network setting, contact your Cisco sales representative. The following items
are general answers to common system performance questions. The performance
of Cisco Secure ACS in your network depends on your specific environment and
AAA requirements.
User Guide for Cisco Secure ACS for Windows Server
1-3
Cisco Secure ACS Specifications
• Maximum users supported by the CiscoSecure user database—There is
no theoretical limit to the number of users the CiscoSecure user database can
support. We have successfully tested Cisco Secure ACS with databases in
excess of 100,000 users. The practical limit for a single Cisco Secure ACS
authenticating against all its databases, internal and external, is 300,000 to
500,000 users. This number increases significantly if the authentication load
is spread across a number of replicated Cisco Secure ACSes.
• Transactions per second—Authentication and authorization transactions
per second is dependent on many factors, most of which are external to
Cisco Secure ACS. For example, high network latency in communication
with an external user database lowers the transactions per second that
Cisco Secure ACS can perform.
• Maximum number of AAA clients supported—Cisco Secure ACS can
support AAA services for approximately 5000 AAA client configurations.
This limitation is primarily a limitation of the Cisco Secure ACS HTML
interface. Performance of the HTML interface degrades when Cisco Secure
ACS has more than approximately 5000 AAA client configurations.
However, a AAA client configuration in Cisco Secure ACS can represent
more than one physical network device, provided that the network devices use
the same AAA protocol and use the same shared secret. If you make use of
this ability, the number of actual AAA clients supported approaches 20,000.
Chapter 1 Overview
If your network has several thousand AAA clients, we recommend using
multiple Cisco Secure ACSes and assigning no more than 5000 AAA clients
to each Cisco Secure ACS. For example, if you have 20,000 AAA clients, you
could use four Cisco Secure ACSes and divide the AAA client load among
them so that no single Cisco Secure ACS manages more than 5000 AAA
client configurations. If you use replication to propagate configuration data
among Cisco Secure ACSes, limit replication of AAA client data to
Cisco Secure ACSes that serve the same set of AAA clients.
Cisco Secure ACS Windows Services
Cisco Secure ACS operates as a set of Microsoft Windows services and controls
the authentication, authorization, and accounting of users accessing networks.
User Guide for Cisco Secure ACS for Windows Server
1-4
78-16592-01
Chapter 1 Overview
AAA Server Functions and Concepts
When you install Cisco Secure ACS, the installation adds several Windows
services. The services provide the core of Cisco Secure ACS functionality. For a
full discussion of each service, see Appendix G, “Internal Architecture”. The
Cisco Secure ACS services on the computer running Cisco Secure ACS include
the following:
• CSAdmin—Provides the HTML interface for administration of Cisco Secure
ACS.
• CSAuth—Provides authentication services.
• CSDBSync—Provides synchronization of the CiscoSecure user database
with an external RDBMS application.
• CSLog—Provides logging services, both for accounting and system activity.
• CSMon—Provides monitoring, recording, and notification of Cisco Secure
ACS performance, and includes automatic response to some scenarios.
• CSTacacs—Provides communication between TACACS+ AAA clients and
the CSAuth service.
• CSRadius—Provides communication between RADIUS AAA clients and
the CSAuth service.
Each module can be started and stopped individually from within the Microsoft
Service Control Panel or as a group from within the Cisco Secure ACS HTML
interface. For information about stopping and starting Cisco Secure ACS services,
see Service Control, page 8-1.
AAA Server Functions and Concepts
Cisco Secure ACS is a AAA server, providing AAA services to network devices
that can act as AAA clients.
As a AAA server, Cisco Secure ACS incorporates many technologies to render
AAA services to AAA clients. Understanding Cisco Secure ACS requires
knowledge of many of these technologies.
This section contains the following topics:
• Cisco Secure ACS and the AAA Client, page 1-6
• AAA Protocols—TACACS+ and RADIUS, page 1-6
• Authentication, page 1-8
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
1-5
AAA Server Functions and Concepts
• Authorization, page 1-17
• Accounting, page 1-22
• Administration, page 1-23
• Posture Validation, page 1-25
Cisco Secure ACS and the AAA Client
A AAA client is software running on a network device that enables the network
device to defer authentication, authorization, and logging (accounting) of user
sessions to a AAA server. AAA clients must be configured to direct all end-user
client access requests to Cisco Secure ACS for authentication of users and
authorization of service requests. Using the TACACS+ or RADIUS protocol, the
AAA client sends authentication requests to Cisco Secure ACS. Cisco Secure
ACS verifies the username and password using the user databases it is configured
to query. Cisco Secure ACS returns a success or failure response to the AAA
client, which permits or denies user access, based on the response it receives.
When the user authenticates successfully, Cisco Secure ACS sends a set of
authorization attributes to the AAA client. The AAA client then begins
forwarding accounting information to Cisco Secure ACS.
When the user has successfully authenticated, a set of session attributes can be
sent to the AAA client to provide additional security and control of privileges,
otherwise known as authorization. These attributes might include the IP address
pool, access control list, or type of connection (for example, IP, IPX, or Telnet).
More recently, networking vendors are expanding the use of the attribute sets
returned to cover an increasingly wider aspect of user session provisioning.
Chapter 1 Overview
AAA Protocols—TACACS+ and RADIUS
Cisco Secure ACS can use both the TACACS+ and RADIUS AAA protocols.
Table 1-1 compares the two protocols.
User Guide for Cisco Secure ACS for Windows Server
1-6
78-16592-01
Chapter 1 Overview
AAA Server Functions and Concepts
Table 1-1TACACS+ and RADIUS Protocol Comparison
Point of ComparisonTACACS+RADIUS
Transmission ProtocolTCP—connection-oriented
transport layer protocol, reliable
full-duplex data transmission
UDP—connectionless transport layer
protocol, datagram exchange without
acknowledgments or guaranteed
delivery
Ports Used49Authentication and Authorization:
1645 and 1812
Accounting: 1646 and 1813
EncryptionFull packet encryptionEncrypts only passwords up to 16
bytes
AAA ArchitectureSeparate control of each service:
authentication, authorization, and
Authentication and authorization
combined as one service
accounting
Intended PurposeDevice managementUser access control
TACACS+
RADIUS
78-16592-01
Cisco Secure ACS conforms to the TACACS+ protocol as defined by Cisco
Systems in draft 1.77. For more information, refer to the Cisco IOS software
documentation or Cisco.com (http://www.cisco.com).
Cisco Secure ACS conforms to the RADIUS protocol as defined in draft April
1997 and in the following Requests for Comments (RFCs):
• RFC 2138, Remote Authentication Dial In User Service
• RFC 2139, RADIUS Accounting
• RFC 2865
• RFC 2866
• RFC 2867
User Guide for Cisco Secure ACS for Windows Server
1-7
AAA Server Functions and Concepts
• RFC 2868
• RFC 2869
The ports used for authentication and accounting have changed in RADIUS RFC
documents. To support both the older and newer RFCs, Cisco Secure ACS accepts
authentication requests on port 1645 and port 1812. For accounting, Cisco Secure
ACS accepts accounting packets on port 1646 and 1813.
In addition to support for standard IETF RADIUS attributes, Cisco Secure ACS
includes support for RADIUS vendor-specific attributes (VSAs). We have
predefined the following RADIUS VSAs in Cisco Secure ACS:
• Cisco IOS/PIX
• Cisco VPN 3000
• Cisco VPN 5000
• Ascend
• Juniper
• Microsoft
• Nortel
Chapter 1 Overview
Authentication
User Guide for Cisco Secure ACS for Windows Server
1-8
Cisco Secure ACS also supports up to 10 RADIUS VSAs that you define. After
you define a new RADIUS VSA, you can use it as you would one of the RADIUS
VSAs that come predefined in Cisco Secure ACS. In the Network Configuration
section of the Cisco Secure ACS HTML interface, you can configure a AAA
client to use a user-defined RADIUS VSA as its AAA protocol. In Interface
Configuration, you can enable user-level and group-level attributes for
user-defined RADIUS VSAs. In User Setup and Group Setup, you can configure
the values for enabled attributes of a user-defined RADIUS VSA.
For more information about creating user-defined RADIUS VSAs, see Custom
RADIUS Vendors and VSAs, page 9-28.
Authentication determines user identity and verifies the information. Traditional
authentication uses a name and a fixed password. More modern and secure
methods use technologies such as CHAP and one-time passwords (OTPs).
Cisco Secure ACS supports a variety of these authentication methods.
78-16592-01
Chapter 1 Overview
There is a fundamental implicit relationship between authentication and
authorization. The more authorization privileges granted to a user, the stronger the
authentication should be. Cisco Secure ACS supports this relationship by
providing various methods of authentication.
• Other Authentication-Related Features, page 1-16
Authentication Considerations
Username and password is the most popular, simplest, and least expensive method
used for authentication. No special equipment is required. This is a popular
method for service providers because of its easy application by the client. The
disadvantage is that this information can be told to someone else, guessed, or
captured. Simple unencrypted username and password is not considered a strong
authentication mechanism but can be sufficient for low authorization or privilege
levels such as Internet access.
To reduce the risk of password capturing on the network, use encryption. Client
and server access control protocols such as TACACS+ and RADIUS encrypt
passwords to prevent them from being captured within a network. However,
TACACS+ and RADIUS operate only between the AAA client and the access
control server. Before this point in the authentication process, unauthorized
persons can obtain clear-text passwords, such as the communication between an
end-user client dialing up over a phone line or an ISDN line terminating at a
network access server, or over a Telnet session between an end-user client and the
hosting device.
AAA Server Functions and Concepts
78-16592-01
Network administrators who offer increased levels of security services, and
corporations that want to lessen the chance of intruder access resulting from
password capturing, can use an OTP. Cisco Secure ACS supports several types of
OTP solutions, including PAP for Point-to-Point Protocol (PPP) remote-node
login. Token cards are considered one of the strongest OTP authentication
mechanisms.
User Guide for Cisco Secure ACS for Windows Server
1-9
AAA Server Functions and Concepts
Authentication and User Databases
Cisco Secure ACS supports a variety of user databases. It supports the
CiscoSecure user database and several external user databases, including the
following:
• Windows User Database
• Generic LDAP
• Novell NetWare Directory Services (NDS)
• Open Database Connectivity (ODBC)-compliant relational databases
• RSA SecurID token server
• RADIUS-compliant token servers
NoteFor more information about token server support, see Token Server
User Databases, page 13-78
Authentication Protocol-Database Compatibility
Chapter 1 Overview
The various password protocols supported by Cisco Secure ACS for
authentication are supported unevenly by the various databases supported by
Cisco Secure ACS. For more information about the password protocols supported
by Cisco Secure ACS, see Passwords, page 1-11.
Table 1-3EAP Authentication Protocol and User Database Compatibility
PEAP
DatabaseLEAP EAP-MD5 EAP-TLS
PEAP
(EAP-GTC)
(EAP-MS
CHAPv2)
EAP-FAST
Phase Zero
EAP-FAST
Phase Two
Cisco Secure ACSYesYesYesYesYesYesYes
Win dow s S AMYe sN oNoYe sYe sYe sYe s
Windows ADYesNoYesYesYesYesYes
LDAPNoNoYesYesNoNoYes
Novell NDSNoNoNoYesNoNoYes
ODBCYesYesYesYesYesYesYes
LEAP Proxy
Ye sNoN oYesYe sYe sYe s
RADIUS Server
All Token ServersNoNoNoYesNoNoNo
Passwords
78-16592-01
Cisco Secure ACS supports many common password protocols:
• ASCII/PAP
• CHAP
• MS-CHAP
• LEAP
• EAP-MD5
• EAP-TLS
User Guide for Cisco Secure ACS for Windows Server
1-11
AAA Server Functions and Concepts
• PEAP(EAP-GTC)
• PEAP(EAP-MSCHAPv2)
• EAP-FAST
• ARAP
Passwords can be processed using these password authentication protocols based
on the version and type of security control protocol used (for example, RADIUS
or TACACS+) and the configuration of the AAA client and end-user client. The
following sections outline the different conditions and functions of password
handling.
In the case of token servers, Cisco Secure ACS acts as a client to the token server,
using either its proprietary API or its RADIUS interface, depending on the token
server. For more information, see About Token Servers and Cisco Secure ACS,
page 13-78.
Different levels of security can be concurrently used with Cisco Secure ACS for
different requirements. The basic user-to-network security level is PAP. Although
it represents the unencrypted security, PAP does offer convenience and simplicity
for the client. PAP allows authentication against the Windows database. With this
configuration, users need to log in only once. CHAP allows a higher level of
security for encrypting passwords when communicating from an end-user client
to the AAA client. You can use CHAP with the CiscoSecure user database. ARAP
support is included to support Apple clients.
Chapter 1 Overview
Comparing PAP, CHAP, and ARAP
PAP, CHAP, and ARAP are authentication protocols used to encrypt passwords.
However, each protocol provides a different level of security.
• PAP—Uses clear-text passwords (that is, unencrypted passwords) and is the
least sophisticated authentication protocol. If you are using the Windows user
database to authenticate users, you must use PAP password encryption or
MS-CHAP.
• CHAP—Uses a challenge-response mechanism with one-way encryption on
the response. CHAP enables Cisco Secure ACS to negotiate downward from
the most secure to the least secure encryption mechanism, and it protects
passwords transmitted in the process. CHAP passwords are reusable. If you
are using the CiscoSecure user database for authentication, you can use either
PAP or CHAP. CHAP does not work with the Windows user database.
User Guide for Cisco Secure ACS for Windows Server
1-12
78-16592-01
Chapter 1 Overview
MS-CHAP
AAA Server Functions and Concepts
• ARAP—Uses a two-way challenge-response mechanism. The AAA client
challenges the end-user client to authenticate itself, and the end-user client
challenges the AAA client to authenticate itself.
Cisco Secure ACS supports Microsoft Challenge-Handshake Authentication
Protocol (MS-CHAP) for user authentication. Differences between MS-CHAP
and standard CHAP are the following:
• The MS-CHAP Response packet is in a format compatible with Microsoft
Windows and LAN Manager 2.x. The MS-CHAP format does not require the
authenticator to store a clear-text or reversibly encrypted password.
• MS-CHAP provides an authentication-retry mechanism controlled by the
authenticator.
• MS-CHAP provides additional failure codes in the Failure packet Message
field.
For more information on MS-CHAP, refer to RFC
draft-ietf-pppext-mschap-00.txt, RADIUS Attributes for MS-CHAP Support.
EAP Support
78-16592-01
The Extensible Authentication Protocol (EAP), based on IETF 802.1x, is an
end-to-end framework that allows the creation of authentication types without
changing AAA client configurations. For more information about EAP, go to
Cisco Secure ACS supports the following varieties of EAP:
• EAP-MD5—An EAP protocol that does not support mutual authentication.
• EAP-TLS—EAP incorporating Transport Layer Security. For more
information, see EAP-TLS Deployment Guide for Wireless LAN Networks
and EAP-TLS Authentication, page 10-2.
• LEAP—An EAP protocol used by Cisco Aironet wireless equipment; it
supports mutual authentication.
• PEAP—Protected EAP, which is implemented with EAP-Generic Token
Card (GTC) and EAP-MSCHAPv2 protocols. For more information, see
PEAP Authentication, page 10-8.
User Guide for Cisco Secure ACS for Windows Server
1-13
AAA Server Functions and Concepts
• EAP-FAST—EAP Flexible Authentication via Secured Tunnel
(EAP-FAST), a faster means of encrypting EAP authentication, supports
EAP-GTC authentication. For more information, see EAP-FAST
Authentication, page 10-13.
The architecture of Cisco Secure ACS is extensible with regard to EAP; additional
varieties of EAP will be supported as those protocols mature.
Basic Password Configurations
There are several basic password configurations:
NoteThese configurations are all classed as inbound authentication.
• Single password for ASCII/PAP/CHAP/MS-CHAP/ARAP—This is the
most convenient method for both the administrator when setting up accounts
and the user when obtaining authentication. However, because the CHAP
password is the same as the PAP password, and the PAP password is
transmitted in clear text during an ASCII/PAP login, there is the chance that
the CHAP password can be compromised.
Chapter 1 Overview
• Separate passwords for ASCII/PAP and CHAP/MS-CHAP/ARAP—For a
higher level of security, users can be given two separate passwords. If the
ASCII/PAP password is compromised, the CHAP/ARAP password can
remain secure.
• External user database authentication—For authentication by an external
user database, the user does not need a password stored in the CiscoSecure
user database. Instead, Cisco Secure ACS records which external user
database it should query to authenticate the user.
Advanced Password Configurations
Cisco Secure ACS supports the following advanced password configurations:
• Inbound passwords—Passwords used by most Cisco Secure ACS users.
These are supported by both the TACACS+ and RADIUS protocols. They are
held internally to the CiscoSecure user database and are not usually given up
to an external source if an outbound password has been configured.
User Guide for Cisco Secure ACS for Windows Server
passwords that can be used, for example, when a AAA client has to be
authenticated by another AAA client and end-user client. Passwords from the
CiscoSecure user database are then sent back to the second AAA client and
end-user client.
• Token caching—When token caching is enabled, ISDN users can connect
(for a limited time) a second B Channel using the same OTP entered during
original authentication. For greater security, the B-Channel authentication
request from the AAA client should include the OTP in the username value
(for example, Fredpassword) while the password value contains an
ASCII/PAP/ARAP password. The TACACS+ and RADIUS servers then
verify that the token is still cached and validate the incoming password
against either the single ASCII/PAP/ARAP or separate CHAP/ARAP
password, depending on the configuration the user employs.
The TACACS+ SENDAUTH feature enables a AAA client to authenticate
itself to another AAA client or an end-user client via outbound
authentication. The outbound authentication can be PAP, CHAP, or ARAP.
With outbound authentication, the Cisco Secure ACS password is given out.
By default, ASCII/PAP or CHAP/ARAP password is used, depending on how
this has been configured; however, we recommend that the separate
SENDAUTH password be configured for the user so that Cisco Secure ACS
inbound passwords are never compromised.
Password Aging
78-16592-01
If you want to use outbound passwords and maintain the highest level of security,
we recommend that you configure users in the CiscoSecure user database with an
outbound password that is different from the inbound password.
With Cisco Secure ACS you can choose whether and how you want to employ
password aging. Control for password aging may reside either in the CiscoSecure
user database, or in a Windows user database. Each password aging mechanism
differs as to requirements and setting configurations.
The password aging feature controlled by the CiscoSecure user database enables
you force users to change their passwords under any of the following conditions:
• After a specified number of days.
• After a specified number of logins.
• The first time a new user logs in.
User Guide for Cisco Secure ACS for Windows Server
1-15
AAA Server Functions and Concepts
For information on the requirements and configuration of the password aging
feature controlled by the CiscoSecure user database, see Enabling Password
Aging for the CiscoSecure User Database, page 6-21.
The Windows-based password aging feature enables you to control the following
password aging parameters:
• Maximum password age in days.
• Minimum password age in days.
The methods and functionality of Windows password aging differ according to
which Windows operating system you use and whether you employ Active
Directory (AD) or Security Accounts Manager (SAM). For information on the
requirements and configuration of the Windows-based password aging feature,
see Enabling Password Aging for Users in Windows Databases, page 6-26.
User-Changeable Passwords
With Cisco Secure ACS, you can install a separate program that enables users to
change their passwords by using a web-based utility. For more information about
installing user-changeable passwords, see the Installation and User Guide for Cisco Secure ACS User-Changeable Passwords.
Chapter 1 Overview
Other Authentication-Related Features
In addition to the authentication-related features discussed in this section, the
following features are provided by Cisco Secure ACS:
• Authentication of unknown users with external user databases (see About
Unknown User Authentication, page 15-4).
• Authentication of computers running Microsoft Windows (see Machine
Authentication, page 13-16).
• Support for the Microsoft Windows Callback feature (see Setting User
Callback Option, page 7-9).
• Ability to configure user accounts, including passwords, using an external
data source (see About RDBMS Synchronization, page 9-26).
• Ability for external users to authenticate via an enable password (see Setting
TACACS+ Enable Password Options for a User, page 7-35).
• Proxy of authentication requests to other AAA servers (see Proxy in
Distributed Systems, page 4-4).
User Guide for Cisco Secure ACS for Windows Server
1-16
78-16592-01
Chapter 1 Overview
Authorization
AAA Server Functions and Concepts
• Configurable character string stripping from proxied authentication requests
(see Stripping, page 4-6).
• Self-signed server certificates (see Using Self-Signed Certificates,
page 10-47).
• Certificate revocation list checking during EAP-TLS authentication (see
Authorization determines what a user is allowed to do. Cisco Secure ACS can
send user profile policies to a AAA client to determine the network services the
user can access. You can configure authorization to give different users and
groups different levels of service. For example, standard dial-up users might not
have the same access privileges as premium customers and users. You can also
differentiate by levels of security, access times, and services.
The Cisco Secure ACS access restrictions feature enables you to permit or deny
logins based on time-of-day and day-of-week. For example, you could create a
group for temporary accounts that can be disabled on specified dates. This would
make it possible for a service provider to offer a 30-day free trial. The same
authorization could be used to create a temporary account for a consultant with
login permission limited to Monday through Friday, 9 A.M. to 5 P.M.
You can restrict users to a service or combination of services such as PPP,
AppleTalk Remote Access (ARA), Serial Line Internet Protocol (SLIP), or
EXEC. After a service is selected, you can restrict Layer 2 and Layer 3 protocols,
such as IP and IPX, and you can apply individual access lists. Access lists on a
per-user or per-group basis can restrict users from reaching parts of the network
where critical information is stored or prevent them from using certain services
such as File Transfer Protocol (FTP) or Simple Network Management Protocol
(SNMP).
78-16592-01
One fast-growing service being offered by service providers and adopted by
corporations is a service authorization for Virtual Private Dial-Up Networks
(VPDNs). Cisco Secure ACS can provide information to the network device for a
specific user to configure a secure tunnel through a public network such as the
Internet. The information can be for the access server (such as the home gateway
for that user) or for the home gateway router to validate the user at the customer
premises. In either case, Cisco Secure ACS can be used for each end of the VPDN.
User Guide for Cisco Secure ACS for Windows Server
1-17
AAA Server Functions and Concepts
Max Sessions
Chapter 1 Overview
This section contains the following topics:
• MaxSessions Issues, page A-16
• Dynamic Usage Quotas, page 1-18
• Shared Profile Components, page 1-19
• Support for Cisco Device-Management Applications, page 1-19
• Other Authorization-Related Features, page 1-21
Max Sessions is a useful feature for organizations that need to limit the number
of concurrent sessions available to either a user or a group:
• User Max Sessions—For example, an Internet service provider can limit
each account holder to a single session.
• Group Max Sessions—For example, an enterprise administrator can allow
the remote access infrastructure to be shared equally among several
departments and limit the maximum number of concurrent sessions for all
users in any one department.
In addition to enabling simple User and Group Max Sessions control,
Cisco Secure ACS enables the administrator to specify a Group Max Sessions
value and a group-based User Max Sessions value; that is, a User Max Sessions
value based on the group membership of the user. For example, an administrator
can allocate a Group Max Sessions value of 50 to the group “Sales” and also limit
each member of the “Sales” group to 5 sessions each. This way no single member
of a group account would be able to use more than 5 sessions at any one time, but
the group could still have up to 50 active sessions.
For more information about the Max Sessions feature, see Setting Max Sessions
for a User Group, page 6-12 and Setting Max Sessions Options for a User,
page 7-16.
Dynamic Usage Quotas
Cisco Secure ACS enables you to define network usage quotas for users. Using
quotas, you can limit the network access of each user in a group or of individual
users. You define quotas by duration of sessions or the total number of sessions.
User Guide for Cisco Secure ACS for Windows Server
1-18
78-16592-01
Chapter 1 Overview
Quotas can be either absolute or based on daily, weekly, or monthly periods. To
grant access to users who have exceeded their quotas, you can reset session quota
counters as needed.
To support time-based quotas, we recommend enabling accounting update packets
on all AAA clients. If update packets are not enabled, the quota is updated only
when the user logs off and the accounting stop packet is received from the AAA
client. If the AAA client through which the user is accessing your network fails,
the session information is not updated. In the case of multiple sessions, such as
with ISDN, the quota would not be updated until all sessions terminate, which
means that a second channel will be accepted even if the first channel has
exhausted the quota allocated to the user.
For more information about usage quotas, see Setting Usage Quotas for a User
Group, page 6-14 and Setting User Usage Quotas Options, page 7-18.
Shared Profile Components
Cisco Secure ACS provides a means for specifying authorization profile
components that you can apply to multiple user groups and users. For example,
you may have multiple user groups that have identical network access restrictions.
Rather than configuring the network access restrictions several times, once per
group, you can configure a network access restriction set in the Shared Profile
Components section of the HTML interface, and then configure each group to use
the network access restriction set you created.
AAA Server Functions and Concepts
For information about the types of shared profile components supported by
Cisco Secure ACS, see About Shared Profile Components, page 5-1.
Support for Cisco Device-Management Applications
Cisco Secure ACS supports Cisco device-management applications, such as, by
providing command authorization for network users who are using the
management application to configure managed network devices. Support for
command authorization for management application users is accomplished by
using unique command authorization set types for each management application
configured to use Cisco Secure ACS for authorization.
Cisco Secure ACS uses TACACS+ to communicate with management
applications. For a management application to communicate with Cisco Secure
ACS, the management application must be configured in Cisco Secure ACS as a
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
1-19
AAA Server Functions and Concepts
AAA client that uses TACACS+. Also, you must provide the device-management
application with a valid administrator name and password. When a management
application initially communicates with Cisco Secure ACS, these requirements
ensure the validity of the communication. For information about configuring a
AAA client, see AAA Client Configuration, page 4-11. For information about
administrator accounts, see Administrator Accounts, page 12-1.
Additionally, the administrator used by the management application must have the
Create New Device Command Set Type privilege enabled. When a management
application initially communicates with Cisco Secure ACS, it dictates to
Cisco Secure ACS the creation of a device command set type, which appears in
the Shared Profile Components section of the HTML interface. It also dictates a
custom service to be authorized by TACACS+. The custom service appears on the
TACACS+ (Cisco IOS) page in the Interface Configuration section of the HTML
interface. For information about enabling TACACS+ services, see Protocol
Configuration Options for TACACS+, page 3-7. For information about device
command-authorization sets for management applications, see Command
Authorization Sets, page 5-25.
After the management application has dictated the custom TACACS+ service and
device command-authorization set type to Cisco Secure ACS, you can configure
command-authorization sets for each role supported by the management
application and apply those sets to user groups that contain network
administrators or to individual users who are network administrators. For
information about configuring a command-authorization set, see Adding a
Command Authorization Set, page 5-31. For information about applying a shared
device command-authorization set to a user group, see Configuring
Device-Management Command Authorization for a User Group, page 6-37. For
information about applying a shared device command-authorization set to a user,
see Configuring Device-Management Command Authorization for a User,
page 7-30.
Chapter 1 Overview
1-20
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
Chapter 1 Overview
Other Authorization-Related Features
In addition to the authorization-related features discussed in this section, the
following features are provided by Cisco Secure ACS:
• Group administration of users, with support for 500 groups (see Chapter 6,
“User Group Management”).
• Ability to map a user from an external user database to a specific
Cisco Secure ACS group (see Chapter 16, “User Group Mapping and
Specification”).
• Ability to disable an account after a number of failed attempts, specified by
the administrator (see Setting Options for User Account Disablement,
page 7-20).
• Ability to disable an account on a specific date (see Setting Options for User
Account Disablement, page 7-20).
• Ability to disable groups of users (see Group Disablement, page 6-4).
• Ability to restrict time-of-day and day-of-week access (see Setting Default
Time-of-Day Access for a User Group, page 6-5).
• Network access restrictions (NARs) based on remote address caller line
identification (CLID) and dialed number identification service (DNIS) (see
Setting Network Access Restrictions for a User Group, page 6-8).
AAA Server Functions and Concepts
78-16592-01
• Downloadable ACLs for users or groups, enabling centralized, modular ACL
management (see Downloadable IP ACLs, page 5-7).
• Network access filters, enabling you to apply different downloadable ACLs
and NARs based upon a user’s point of entry into your network (see Network
Access Filters, page 5-2).
• IP pools for IP address assignment of end-user client hosts (see Setting IP
Address Assignment Method for a User Group, page 6-28).
• Per-user and per-group TACACS+ or RADIUS attributes (see Advanced
Options, page 3-4).
• Support for Voice-over-IP (VoIP), including configurable logging of
accounting data (see Enabling VoIP Support for a User Group, page 6-4).
User Guide for Cisco Secure ACS for Windows Server
1-21
AAA Server Functions and Concepts
Accounting
Chapter 1 Overview
AAA clients use the accounting functions provided by the RADIUS and
TACACS+ protocols to communicate relevant data for each user session to the
AAA server for recording. Cisco Secure ACS writes accounting records to a
comma-separated value (CSV) log file or ODBC database, depending upon your
configuration. You can easily import these logs into popular database and
spreadsheet applications for billing, security audits, and report generation. You
can also use a third-party reporting tool to manage accounting data. For example,
aaa-reports! by Extraxi supports Cisco Secure ACS (http://www.extraxi.com).
Among the types of accounting logs you can generate are the following:
• TACACS+ Accounting—Lists when sessions start and stop; records AAA
client messages with username; provides caller line identification
information; records the duration of each session.
• RADIUS Accounting—Lists when sessions stop and start; records AAA
client messages with username; provides caller line identification
information; records the duration of each session.
• Administrative Accounting—Lists commands entered on a network device
with TACACS+ command authorization enabled.
For more information about Cisco Secure ACS logging capabilities, see
Chapter 11, “Logs and Reports”.
Other Accounting-Related Features
In addition to the accounting-related features discussed in this section, the
following features are provided by Cisco Secure ACS:
• Centralized logging, allowing several Cisco Secure ACS for Windows Server
installations to forward their accounting data to a remote Cisco Secure ACS
(see Remote Logging, page 11-26).
• Configurable supplementary user ID fields for capturing additional
information in logs (see User Data Configuration Options, page 3-3).
• Configurable logs, allowing you to capture as much information as needed
(see Accounting Logs, page 11-6).
User Guide for Cisco Secure ACS for Windows Server
1-22
78-16592-01
Chapter 1 Overview
Administration
To configure, maintain, and protect its AAA functionality, Cisco Secure ACS
provides a flexible administration scheme. You can perform nearly all
administration of Cisco Secure ACS through its HTML interface. For more
information about the HTML interface, including steps for accessing the HTML
interface, see Cisco Secure ACS HTML Interface, page 1-25.
This section contains the following topics:
• HTTP Port Allocation for Administrative Sessions, page 1-23
• Network Device Groups, page 1-24
• Other Administration-Related Features, page 1-24
HTTP Port Allocation for Administrative Sessions
The HTTP port allocation feature allows you to configure the range of TCP ports
used by Cisco Secure ACS for administrative HTTP sessions. Narrowing this
range with the HTTP port allocation feature reduces the risk of unauthorized
access to your network by a port open for administrative sessions.
AAA Server Functions and Concepts
78-16592-01
We do not recommend that you administer Cisco Secure ACS through a firewall.
Doing so requires that you configure the firewall to permit HTTP traffic over the
range of HTTP administrative session ports that Cisco Secure ACS uses. While
narrowing this range reduces the risk of unauthorized access, a greater risk of
attack remains if you allow administration of Cisco Secure ACS from outside a
firewall. A firewall configured to permit HTTP traffic over the Cisco Secure ACS
administrative port range must also permit HTTP traffic through port 2002,
because this is the port a web browser must address to initiate an administrative
session.
NoteA broad HTTP port range could create a security risk. To prevent accidental
discovery of an active administrative port by unauthorized users, keep the HTTP
port range as narrow as possible. Cisco Secure ACS tracks the IP address
associated with each administrative session. An unauthorized user would have to
impersonate, or “spoof”, the IP address of the legitimate remote host to make use
of the active administrative session HTTP port.
User Guide for Cisco Secure ACS for Windows Server
1-23
AAA Server Functions and Concepts
For information about configuring the HTTP port allocation feature, see Access
Policy, page 12-11.
Network Device Groups
With a network device group (NDG), you can view and administer a collection of
AAA clients and AAA servers as a single logical group. To simplify
administration, you can assign each group a convenient name that can be used to
refer to all devices within that group. This creates two levels of network devices
within Cisco Secure ACS—discrete devices such as an individual router, access
server, AAA server, or PIX Firewall, and NDGs, which are named collections of
AAA clients and AAA servers.
A network device can belong to only one NDG at a time.
Using NDGs enables an organization with a large number of AAA clients spread
across a large geographical area to logically organize its environment within
Cisco Secure ACS to reflect the physical setup. For example, all routers in Europe
could belong to a group named Europe; all routers in the United States could
belong to a US group; and so on. This would be especially convenient if the AAA
clients in each region were administered along the same divisions. Alternatively,
the environment could be organized by some other attribute such as divisions,
departments, business functions, and so on.
Chapter 1 Overview
You can assign a group of users to an NDG. For more information on NDGs, see
Network Device Group Configuration, page 4-28.
Other Administration-Related Features
In addition to the administration-related features discussed in this section, the
following features are provided by Cisco Secure ACS:
• Ability to define different privileges per administrator (see Administrator
Accounts, page 12-1).
• Ability to log administrator activities (see Cisco Secure ACS System Logs,
page 11-13).
• Ability to view a list of logged-in users (see Dynamic Administration
Reports, page 11-9).
User Guide for Cisco Secure ACS for Windows Server
1-24
78-16592-01
Chapter 1 Overview
• CSMonitor service, providing monitoring, notification, logging, and limited
automated failure response (see Cisco Secure ACS Active Service
Management, page 8-17).
• Ability to automate configuration of users, groups, network devices, and
custom RADIUS VSAs (see RDBMS Synchronization, page 9-25).
• Replication of CiscoSecure user database components to other Cisco Secure
ACSes (see CiscoSecure Database Replication, page 9-1).
• Scheduled and on-demand Cisco Secure ACS system backups (see
Cisco Secure ACS Backup, page 8-9).
• Ability to restore Cisco Secure ACS configuration, user accounts, and group
profiles from a backup file (see Cisco Secure ACS System Restore,
page 8-14).
Posture Validation
Cisco Secure ACS supports Network Admission Control (NAC) by providing
posture validation services to NAC-compliant AAA clients and the NAC-client
computers seeking network access using those AAA clients. NAC provides a
powerful means to defend your network. The data with which you can configure
Cisco Secure ACS to evaluate posture validation requests can include operating
system patch level and anti-virus DAT file versions and dates.
Cisco Secure ACS HTML Interface
Instead of establishing identity, posture validation determines the state of the
NAC-client computer using data sent to Cisco Secure ACS by the NAC client.
Cisco Secure ACS uses the result of evaluating the state of the computer to
determine whether network access is to be granted from the computer and to
determine the degree of that access.
For more information, see Chapter 14, “Network Admission Control”.
Cisco Secure ACS HTML Interface
This section discusses the Cisco Secure ACS HTML interface and provides
procedures for using it.
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
1-25
Cisco Secure ACS HTML Interface
This section contains the following topics:
• About the Cisco Secure ACS HTML Interface, page 1-26
• HTML Interface Layout, page 1-27
• Uniform Resource Locator for the HTML Interface, page 1-29
• Network Environments and Administrative Sessions, page 1-30
• Accessing the HTML Interface, page 1-32
• Logging Off the HTML Interface, page 1-33
• Online Help and Online Documentation, page 1-33
About the Cisco Secure ACS HTML Interface
After installing Cisco Secure ACS, you configure and administer it through the
HTML interface. The HTML interface enables you to easily modify Cisco Secure
ACS configuration from any connection on your LAN or WAN.
The Cisco Secure ACS HTML interface is designed to be viewed using a web
browser. The design primarily uses HTML, along with some Java functions, to
enhance ease of use. This design keeps the interface responsive and
straightforward. The inclusion of Java requires that the browser used for
administrative sessions supports Java. For a list of supported browsers, see the
Release Notes. The most recent revision to the Release Notes is posted on
Cisco.com (http://www.cisco.com).
Chapter 1 Overview
The HTML interface not only makes viewing and editing user and group
information possible, it also enables you to restart services, add remote
administrators, change AAA client information, back up the system, view reports
from anywhere on the network, and more. The reports track connection activity,
show which users are logged in, list failed authentication and authorization
attempts, and show administrators’ recent tasks.
HTML Interface Security
Accessing the HTML interface requires a valid administrator name and password.
The Cisco Secure ACS Login page encrypts the administrator credentials before
sending them to Cisco Secure ACS.
User Guide for Cisco Secure ACS for Windows Server
1-26
78-16592-01
Chapter 1 Overview
Administrative sessions timeout after a configurable length of idle time.
Regardless, we recommend that you log out of the HTML interface after each
session. For information about logging out of Cisco Secure ACS, see Logging Off
the HTML Interface, page 1-33. For information about configuring the idle
timeout feature, see Access Policy, page 12-11.
You can enable secure socket layer (SSL) for administrative sessions. This
ensures that all communication between the web browser and Cisco Secure ACS
is encrypted. Your browser must support SSL. You can enable this feature on the
Access Policy Setup page in the Administration Control section. For more
information about enabling SSL for HTML interface security, see Access Policy,
page 12-11.
HTML Interface Layout
The HTML interface has three vertical partitions, known as frames:
• Navigation Bar—The gray frame on the left of the browser window, the
navigation bar contains the task buttons. Each button changes the
configuration area (see below) to a unique section of the Cisco Secure ACS
application, such as the User Setup section or the Interface Configuration
section. This frame does not change; it always contains the following buttons:
Cisco Secure ACS HTML Interface
78-16592-01
–
User Setup—Add and edit user profiles. For more information about the
User Setup section, see Chapter 7, “User Management”.
–
Group Setup—Configure network services and protocols for groups of
users. For more information about the Group Setup section, see
Chapter 6, “User Group Management”.
–
Shared Profile Components—Add and edit network access restriction
and command authorization sets, to be applied to users and groups. For
more information about the Shared Profile Components section, see
Chapter 5, “Shared Profile Components”.
–
Network Configuration—Add and edit network access devices and
configure distributed systems. For more information about the Network
Configuration section, see Chapter 4, “Network Configuration”.
–
System Configuration—Configure system-level features. Four chapters
address this large section of the HTML interface. For information about
fundamental features such as backup scheduling and service controls, see
Chapter 8, “System Configuration: Basic”. For information about
User Guide for Cisco Secure ACS for Windows Server
1-27
Cisco Secure ACS HTML Interface
–
–
–
–
Chapter 1 Overview
advanced features such as database replication, see Chapter 9, “System
Configuration: Advanced”. For information about configuring
authentication protocols and certificate-related features, see Chapter 10,
“System Configuration: Authentication and Certificates”. For
information about configuring logs and reports, see Chapter 11, “Logs
and Reports”.
Interface Configuration—Display or hide product features and options
to be configured. For more information about the Interface Configuration
section, Chapter 3, “Interface Configuration”.
Administration Control—Define and configure access policies. For
more information about the Administration Control section, Chapter 12,
“Administrators and Administrative Policy”.
External User Databases—Configure databases, the Unknown User
Policy, and user group mapping. For information about configuring
databases, see Chapter 13, “User Databases”. For information about the
Unknown User Policy, see Chapter 15, “Unknown User Policy”. For
information about user group mapping, see Chapter 16, “User Group
Mapping and Specification”.
Reports and Activity—Display accounting and logging information.
For information about viewing reports, see Chapter 11, “Logs and
Reports”.
1-28
–
Online Documentation—View the user guide. For information about
using the online documentation, see Online Help and Online
Documentation, page 1-33.
• Configuration Area—The frame in the middle of the browser window, the
configuration area displays web pages that belong to one of the sections
represented by the buttons in the navigation bar. The configuration area is
where you add, edit, or delete information. For example, you configure user
information in this frame on the User Setup Edit page.
NoteMost pages have a Submit button at the bottom. Click Submit to
confirm your changes. If you do not click Submit, changes are not
saved.
• Display Area—The frame on the right of the browser window, the display
area shows one of the following options:
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
Chapter 1 Overview
Cisco Secure ACS HTML Interface
–
Online Help—Displays basic help about the page currently shown in the
configuration area. This help does not offer in-depth information, rather
it gives some basic information about what can be accomplished in the
middle frame. For more information about online help, see Using Online
Help, page 1-34.
–
Reports or Lists—Displays lists or reports, including accounting
reports. For example, in User Setup you can show all usernames that start
with a specific letter. The list of usernames beginning with a specified
letter is displayed in this section. The usernames are hyperlinks to the
specific user configuration, so clicking the name enables you to edit that
user.
–
System Messages—Displays messages after you click Submit if you
have typed in incorrect or incomplete data. For example, if the
information you entered in the Password box does not match the
information in the Confirm Password box in the User Setup section,
Cisco Secure ACS displays an error message here. The incorrect
information remains in the configuration area so that you can retype and
resubmit the information correctly.
Uniform Resource Locator for the HTML Interface
You can access the Cisco Secure ACS HTML interface by using one of the
following uniform resource locators (URLs):
• http://IP address:2002
• http://hostname:2002
where IP address is the dotted decimal IP address of the computer running
Cisco Secure ACS and hostname is the hostname of the computer running
Cisco Secure ACS. If you use the hostname, DNS must be functioning properly
on your network or the hostname must be listed in the local hosts file of the
computer running the browser.
If Cisco Secure ACS is configured to use SSL to protect administrative sessions,
you can also access the HTML interface by specifying the HTTPS protocol in the
URLs:
• https://IP address:2002
• https://hostname:2002
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
1-29
Cisco Secure ACS HTML Interface
If SSL is enabled and you do not specify HTTPS, Cisco Secure ACS redirects the
initial request to HTTPS for you. Using SSL to access the login page protects
administrator credentials. For more information about enabling SSL to protect
administrative sessions, see Access Policy, page 12-11.
From the computer running Cisco Secure ACS, you can also use the following
URLs:
• http://127.0.0.1:2002
• http://hostname:2002
where hostname is the hostname of the computer running Cisco Secure ACS. If
SSL is enabled, you can specify the HTTP protocol in the URLs:
• https://127.0.0.1:2002
• https://hostname:2002
Network Environments and Administrative Sessions
We recommend that administrative sessions take place without the use of an
HTTP proxy server, without a firewall between the browser and Cisco Secure
ACS, and without a NAT gateway between the browser and Cisco Secure ACS.
Because these limitations are not always practical, this section discusses how
various network environmental issues affect administrative sessions.
This section contains the following topics:
Chapter 1 Overview
• Administrative Sessions and HTTP Proxy, page 1-30
• Administrative Sessions through Firewalls, page 1-31
• Administrative Sessions through a NAT Gateway, page 1-31
Administrative Sessions and HTTP Proxy
Cisco Secure ACS does not support HTTP proxy for administrative sessions. If
the browser used for an administrative session is configured to use a proxy server,
Cisco Secure ACS sees the administrative session originating from the IP address
of the proxy server rather than from the actual address of the computer.
Administrative session tracking assumes each browser resides on a computer with
a unique IP.
User Guide for Cisco Secure ACS for Windows Server
1-30
78-16592-01
Chapter 1 Overview
Also, IP filtering of proxied administrative sessions has to be based on the IP
address of the proxy server rather than the IP address of the computer. This
conflicts with administrative session communication that does use the actual IP
address of the computer. For more information about IP filtering of administrative
sessions, see Access Policy, page 12-11.
For these reasons, we do not recommend performing administrative sessions
using a web browser that is configured to use a proxy server. Administrative
sessions using a proxy-enabled web browser is not tested. If your web browser is
configured to use a proxy server, disable HTTP proxying when attempting
Cisco Secure ACS administrative sessions.
Administrative Sessions through Firewalls
In the case of firewalls that do not perform network address translation (NAT),
administrative sessions conducted across the firewall can require additional
configuration of Cisco Secure ACS and the firewall. This is because Cisco Secure
ACS assigns a random HTTP port at the beginning of an administrative session.
To allow administrative sessions from browsers outside a firewall that protects
Cisco Secure ACS, the firewall must permit HTTP traffic across the range of ports
that Cisco Secure ACS is configured to use. You can control the HTTP port range
using the HTTP port allocation feature. For more information about the HTTP
port allocation feature, see HTTP Port Allocation for Administrative Sessions,
page 1-23.
Cisco Secure ACS HTML Interface
While administering Cisco Secure ACS through a firewall that is not performing
NAT is possible, we do not recommend that you administer Cisco Secure ACS
through a firewall. For more information, see HTTP Port Allocation for
Administrative Sessions, page 1-23.
Administrative Sessions through a NAT Gateway
We do not recommend conducting administrative sessions across a network
device performing NAT. If the administrator runs a browser on a computer behind
a NAT gateway, Cisco Secure ACS receives the HTTP requests from the public IP
address of the NAT device, which conflicts with the computer private IP address,
included in the content of the HTTP requests. Cisco Secure ACS does not permit
this.
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
1-31
Cisco Secure ACS HTML Interface
If Cisco Secure ACS is behind a NAT gateway and the URL used to access the
HTML interface specifies Cisco Secure ACS by its hostname, administrative
sessions operate correctly, provided that DNS is functioning correctly on your
network or that computers used to access the HTML interface have a hosts file
entry for Cisco Secure ACS.
If the URL used to access the HTML interface specifies Cisco Secure ACS by its
IP address, you could configure the gateway to forward all connections to port
2002 to Cisco Secure ACS, using the same port. Additionally, all the ports
allowed using the HTTP port allocation feature would have to be similarly
mapped. We have not tested such a configuration and do not recommend
implementing it.
Accessing the HTML Interface
Remote administrative sessions always require that you log in using a valid
administrator name and password, as configured in the Administration Control
section. If the Allow automatic local login check box is cleared on the Sessions
Policy Setup page in the Administration Control section, Cisco Secure ACS
requires a valid administrator name and password for administrative sessions
accessed from a browser on the computer running Cisco Secure ACS.
Chapter 1 Overview
1-32
Before You Begin
Determine whether a supported web browser is installed on the computer you
want to use to access the HTML interface. If not, install a supported web browser
or use a computer that already has a supported web browser installed. For a list of
supported browsers, see the Release Notes. The latest revision to the Release
Notes is posted on Cisco.com (http://www.cisco.com).
Because the HTML interface uses Java in a few places, the computer running the
browser used to access the HTML interface must have a Java Virtual Machine
available for the use of the browser.
To access the HTML interface, follow these steps:
Step 1Open a web browser. For a list of supported web browsers, see the Release Notes
for the version of Cisco Secure ACS you are accessing. The most recent revision
to the Release Notes is posted on Cisco.com (http://www.cisco.com).
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
Chapter 1 Overview
Step 2In the Address or Location bar in the web browser, type the applicable URL. For
a list of possible URLs, see Uniform Resource Locator for the HTML Interface,
page 1-29.
Step 3If the Cisco Secure ACS login page appears, follow these steps:
a. In the Username box, type a valid Cisco Secure ACS administrator name.
b. In the Password box, type the password for the administrator name you
specified.
c. Click Login.
The initial page appears, listing build and copyright information.
Logging Off the HTML Interface
When you are finished using the HTML interface, we recommend that you log off.
While Cisco Secure ACS can timeout unused administrative sessions, logging off
prevents unauthorized access by someone using the browser after you or by
unauthorized persons using the HTTP port left open to support the administrative
session.
To log off the Cisco Secure ACS HTML interface, click the Logoff button.
Cisco Secure ACS HTML Interface
NoteThe Logoff button appears in the upper right corner of the browser window, except
on the initial page, where it appears in the upper left of the configuration area.
Online Help and Online Documentation
We provide two sources of information in the HTML interface:
• Online Help—Contains basic information about the page shown in the
configuration area.
• Online Documentation—Contains the entire user guide.
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
1-33
Cisco Secure ACS HTML Interface
Using Online Help
Chapter 1 Overview
Online help is the default content in the display area. For every page that appears
in the configuration area, there is a corresponding online help page. At the top of
each online help page is a list of topics covered by that page.
To jump from the top of the online help page to a particular topic, click the topic
name in the list at the top of the page.
There are three icons that appear on many pages in Cisco Secure ACS:
• Question Mark—Many subsections of the pages in the configuration area
contain an icon with a question mark. To jump to the applicable topic in an
online help page, click the question mark icon.
• Section Information—Many online help pages contain a Section
Information icon at the bottom of the page. To view an applicable section of
the online documentation, click the Section Information icon.
• Back to Help—Wherever you find a online help page with a Section
Information icon, the corresponding page in the configuration area contains
a Back to Help icon. If you have accessed the online documentation by
clicking a Section Information icon and want to view the online help page
again, click the Back to Help icon.
Using the Online Documentation
Online documentation is the user guide for Cisco Secure ACS. The user guide
provides information about the configuration, operation, and concepts of
Cisco Secure ACS. The information presented in the online documentation is as
current as the release date of the Cisco Secure ACS version you are using. For the
most up-to-date documentation about Cisco Secure ACS, please go to
http://www.cisco.com
TipClick Section Information on any online help page to view online documentation
relevant to the section of the HTML interface you are using.
User Guide for Cisco Secure ACS for Windows Server
1-34
78-16592-01
Chapter 1 Overview
Step 1In the Cisco Secure ACS HTML interface, click Online Documentation.
Step 2If you want to select a topic from the table of contents, scroll through the table of
Step 3If you want to select a topic from the index, follow these steps:
Cisco Secure ACS HTML Interface
To access online documentation, follow these steps:
TipTo open the online documentation in a new browser window, right-click
Online Documentation, and then click Open Link in New Window (for
Microsoft Internet Explorer) or Open in New Window (for Netscape
Navigator).
The table of contents opens in the configuration area.
contents and click the applicable topic.
The online documentation for the topic selected appears in the display area.
a. Click [Index].
The index appears in the display area.
b. Scroll through the index to find an entry for the topic you are researching.
78-16592-01
TipUse the lettered shortcut links to jump to a particular section of the index.
Entries appear with numbered links after them. The numbered links lead to
separate instances of the entry topic.
c. Click an instance number for the desired topic.
The online documentation for the topic selected appears in the display area.
Step 4If you want to print the online documentation, click in the display area, and then
click Print in the navigation bar of your browser.
User Guide for Cisco Secure ACS for Windows Server
1-35
Cisco Secure ACS HTML Interface
Chapter 1 Overview
1-36
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
CHAPTER
2
Deployment Considerations
Deployment of Cisco Secure ACS for Windows Server can be complex and
iterative, depending on the specific implementation required. This chapter
provides insight into the deployment process and presents a collection of factors
that you should consider before deploying Cisco Secure ACS.
The complexity of deploying Cisco Secure ACS reflects the evolution of AAA
servers in general, and the advanced capabilities, flexibility, and features of
Cisco Secure ACS in particular. AAA was conceived originally to provide a
centralized point of control for user access via dial-up services. As user databases
grew and the locations of AAA clients became more dispersed, more capability
was required of the AAA server. Regional, and then global, requirements became
common. Today, Cisco Secure ACS is required to provide AAA services for
dial-up access, dial-out access, wireless, VLAN access, firewalls, VPN
concentrators, administrative controls, and more. The list of external databases
supported has also continued to grow and the use of multiple databases, as well as
multiple Cisco Secure ACSes, has become more common. Regardless of the
scope of your Cisco Secure ACS deployment, the information contained in this
chapter should prove valuable. If you have deployment questions that are not
addressed in this guide, contact your Cisco technical representative for assistance.
This chapter contains the following topics:
78-16592-01
• Basic Deployment Requirements for Cisco Secure ACS, page 2-2
• Basic Deployment Factors for Cisco Secure ACS, page 2-6
• Suggested Deployment Sequence, page 2-19
User Guide for Cisco Secure ACS for Windows Server
2-1
Chapter 2 Deployment Considerations
Basic Deployment Requirements for Cisco Secure ACS
Basic Deployment Requirements for Cisco Secure
ACS
This section details the minimum requirements you must meet to successfully
deploy Cisco Secure ACS.
This section contains the following topics:
• System Requirements, page 2-2
–
Hardware Requirements, page 2-2
–
Operating System Requirements, page 2-2
–
Third-Party Software Requirements, page 2-3
• Network and Port Requirements, page 2-4
System Requirements
The computer running Cisco Secure ACS must meet the minimum hardware and
software requirements detailed in the following sections.
Hardware Requirements
The computer running Cisco Secure ACS must meet the following minimum
hardware requirements:
• Pentium III processor, 550 MHz or faster.
• 256 MB of RAM.
• At least 250 MB of free disk space. If you are running your database on the
same computer, more disk space is required.
• Minimum graphics resolution of 256 colors at 800 x 600 lines.
Operating System Requirements
Cisco Secure ACS for Windows Servers 3.3 supports the Windows operating
systems listed below. Both the operating system and the service pack must be
English-language versions.
User Guide for Cisco Secure ACS for Windows Server
2-2
78-16592-01
Chapter 2 Deployment Considerations
• Windows 2000 Server, with Service Pack 4 installed
• Windows 2000 Advanced Server, with the following conditions:
–
with Service Pack 4 installed
–
without Microsoft clustering service installed
–
without other features specific to Windows 2000 Advanced Server
enabled
NoteWe have not tested and cannot support the multi-processor feature of
Windows 2000 Advanced Server. Windows 2000 Datacenter Server is not
a supported operating system.
• Windows Server 2003, Enterprise Edition
• Windows Server 2003, Standard Edition
Windows service packs can be applied before or after installing Cisco Secure
ACS. If you do not install a required service pack before installing Cisco Secure
ACS, the Cisco Secure ACS installation program may warn you that the required
service pack is not present. If you receive a service pack message, continue the
installation, and then install the required service pack before starting user
authentication with Cisco Secure ACS.
Basic Deployment Requirements for Cisco Secure ACS
For the most recent information about tested operating systems and service packs,
see the Release Notes. The current version of the Release Notes are on Cisco.com,
accessible from the following URL:
The Release Notes provide information about third-party software products that
we tested with Cisco Secure ACS and that we support, including applications such
as:
• Web browsers and Java virtual machines
• Novell NDS clients
• Token-card clients
78-16592-01
User Guide for Cisco Secure ACS for Windows Server
2-3
Basic Deployment Requirements for Cisco Secure ACS
Other than the software products described in the Release Notes, we have not
tested the interoperability of Cisco Secure ACS and other software products on
the same computer. We only support interoperability issues of software products
that are mentioned in the Release Notes. The most recent version of the Release
Notes are posted on Cisco.com, accessible from the following URL:
Your network should meet the following requirements before you begin deploying
Cisco Secure ACS.
• For full TACACS+ and RADIUS support on Cisco IOS devices, AAA clients
must run Cisco IOS Release 11.2 or later.
• Non-Cisco IOS AAA clients must be configured with TACACS+ and/or
RADIUS.
• Dialin, VPN, or wireless clients must be able to connect to the applicable
AAA clients.
Chapter 2 Deployment Considerations
2-4
• The computer running Cisco Secure ACS must be able to ping all AAA
clients.
• Gateway devices between Cisco Secure ACS and other network devices must
permit communication over the ports needed to support the applicable feature
or protocol. For information about ports that Cisco Secure ACS listens to, see
Table 2-1.
• A supported web browser must be installed on the computer running
Cisco Secure ACS. For the most recent information about tested browsers,
see the Release Notes. The most recent version of the Release Notes are
posted on Cisco.com, accessible from the following URL:
• All network cards in the computer running Cisco Secure ACS must be
enabled. If there is a disabled network card on the computer running
Cisco Secure ACS, installing Cisco Secure ACS may proceed slowly due to
delays caused by Microsoft CryptoAPI.
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
Chapter 2 Deployment Considerations
NoteWe tested Cisco Secure ACS on computers that have only one
• If you want to have Cisco Secure ACS use the “Grant Dial-in Permission to
User” feature in Windows when authorizing network users, this option must
be selected in the Windows User Manager or Active Directory Users and
Computers for the applicable user accounts.
Table 2-1 lists the ports that Cisco Secure ACS listens to for communications with
AAA clients, other Cisco Secure ACSes and applications, and web browsers.
Cisco Secure ACS uses other ports to communicate with external user databases;
however, it initiates those communications rather than listening to specific ports.
In some cases, these ports are configurable, such as with LDAP and RADIUS
token server databases. For more information about ports that a particular external
user database listens to, see the documentation for that database.
Table 2-1Ports that Cisco Secure ACS Listens To
Feature/ProtocolUDP or TCP?Ports
RADIUS authentication and authorizationUDP1645, 1812
RADIUS accountingUDP1646, 1813
TACACS+TCP49
CiscoSecure Database ReplicationTCP2000
RDBMS Synchronization with
synchronization partners
User-Changeable Password web applicationTCP2000
LoggingTCP2001
Administrative HTTP port for new sessionsTCP2002
Administrative HTTP port rangeTCPConfigurable;
Basic Deployment Requirements for Cisco Secure ACS
network interface card.
TCP2000
default 1024
through 65535
78-16592-01
User Guide for Cisco Secure ACS for Windows Server
2-5
Chapter 2 Deployment Considerations
Basic Deployment Factors for Cisco Secure ACS
Basic Deployment Factors for Cisco Secure ACS
Generally, the ease in deploying Cisco Secure ACS is directly related to the
complexity of the implementation planned and the degree to which you have
defined your policies and requirements. This section presents some basic factors
you should consider before you begin implementing Cisco Secure ACS.
This section contains the following topics:
• Network Topology, page 2-6
• Remote Access Policy, page 2-14
• Security Policy, page 2-15
• Administrative Access Policy, page 2-15
• Database, page 2-18
• Network Latency and Reliability, page 2-19
Network Topology
Dial-Up Topology
User Guide for Cisco Secure ACS for Windows Server
2-6
How your enterprise network is configured is likely to be the most important
factor in deploying Cisco Secure ACS. While an exhaustive treatment of this topic
is beyond the scope of this guide, this section details how the growth of network
topology options has made Cisco Secure ACS deployment decisions more
complex.
When AAA was created, network access was restricted to either devices directly
connected to the LAN or remote devices gaining access via modem. Today,
enterprise networks can be complex and, because of tunneling technologies, can
be widely geographically dispersed.
In the traditional model of dial-up access (a PPP connection), a user employing a
modem or ISDN connection is granted access to an intranet via a network access
server (NAS) functioning as a AAA client. Users may be able to connect via only
a single AAA client as in a small business, or have the option of numerous
geographically dispersed AAA clients.
78-16592-01
Chapter 2 Deployment Considerations
In the small LAN environment, see Figure 2-1, network architects typically place
a single Cisco Secure ACS internal to the AAA client, protected from outside
access by a firewall and the AAA client. In this environment, the user database is
usually small, there are few devices that require access to the Cisco Secure ACS
for AAA, and any database replication is limited to a secondary Cisco Secure
ACS as a backup.
Figure 2-1Small Dial-up Network
Server-based
dial access
PSTN
Modem
Cisco Secure
Access Control
Server
Basic Deployment Factors for Cisco Secure ACS
Network
63486
78-16592-01
In a larger dial-in environment, a single Cisco Secure ACS with a backup may be
suitable, too. The suitability of this configuration depends on network and server
access latency. Figure 2-2 shows an example of a large dial-in arrangement. In this
scenario the addition of a backup Cisco Secure ACS is a recommended addition.
User Guide for Cisco Secure ACS for Windows Server
2-7
Basic Deployment Factors for Cisco Secure ACS
Figure 2-2Large Dial-up Network
Cisco AS5300's
Chapter 2 Deployment Considerations
Cisco AS5300
UNIX server
Novell server
Windows NT server
2-8
Cisco Secure
Access Control
Server
In a very large, geographically dispersed network (Figure 2-3), there may be
access servers located in different parts of a city, in different cities, or on different
continents. If network latency is not an issue, a central Cisco Secure ACS may
work but connection reliability over long distances may cause problems. In this
case, local Cisco Secure ACSes may be preferable to a central Cisco Secure ACS.
If the need for a globally coherent user database is most important, database
replication or synchronization from a central Cisco Secure ACS may be
necessary. Authentication using external databases, such as a Windows user
database or the Lightweight Directory Access Protocol (LDAP), can further
complicate the deployment of distributed, localized Cisco Secure ACSes. While
Cisco Secure ACS uses encryption for all replication and database
synchronization traffic, additional security measures may be required to protect
the network and user information that Cisco Secure ACS sends across the WAN.
User Guide for Cisco Secure ACS for Windows Server
Macintosh server
63487
78-16592-01
Chapter 2 Deployment Considerations
Figure 2-3Geographically Dispersed Network
Cisco Secure
Access Control
Server
Cisco Secure
Access Control
Server
Access Control
Basic Deployment Factors for Cisco Secure ACS
Cisco Secure
Server
63488
Wireless Network
78-16592-01
The wireless network access point is a relatively new client for AAA services. The
wireless access point (AP), such as the Cisco Aironet series, provides a bridged
connection for mobile end-user clients into the LAN. Authentication is absolutely
necessary due to the ease of access to the AP. Encryption is also necessary because
of the ease of eavesdropping on communications. As such, security plays an even
bigger role than in the dial-up scenario and is discussed in more detail later in this
section.
Scaling can be a serious issue in the wireless network. The mobility factor of the
wireless LAN (WLAN) requires considerations similar to those given to the
dial-up network. Unlike the wired LAN, however, the WLAN can be more readily
expanded. Though WLAN technology does have physical limits as to the number
of users that can be connected via an AP, the number of APs can grow quickly. As
with the dial-up network, you can structure your WLAN to allow full access for
all users, or to provide restricted access to different subnets between sites,
buildings, floors, or rooms. This raises a unique issue with the WLAN: the ability
of a user to “roam” between APs.
User Guide for Cisco Secure ACS for Windows Server
2-9
Basic Deployment Factors for Cisco Secure ACS
In the simple WLAN, there may be a single AP installed (Figure 2-4). Because
there is only one AP, the primary issue is security. In this environment, there is
generally a small user base and few network devices to worry about. Providing
AAA services to the other devices on the network does not cause any significant
additional load on the Cisco Secure ACS.
Figure 2-4Simple WLAN
Cisco Aironet AP
Cisco Secure
Access Control Server
Chapter 2 Deployment Considerations
Network
63489
2-10
In the LAN where a number of APs are deployed, as in a large building or a
campus environment, your decisions on how to deploy Cisco Secure ACS become
a little more involved. Though Figure 2-5 shows all APs on the same LAN, they
may be distributed throughout the LAN, connected via routers, switches, and so
on. In the larger, geographical distribution of WLANs, deployment of
Cisco Secure ACS is similar to that of large regional distribution of dial-up LANs
(Figure 2-3).
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
Chapter 2 Deployment Considerations
Figure 2-5Campus WLAN
Cisco Aironet APs
Basic Deployment Factors for Cisco Secure ACS
Dial-up connection
Cisco Secure
Access Control
Server
UNIX server
Novell server
Windows NT server
Macintosh server
78-16592-01
63490
This is particularly true when the regional topology is the campus WLAN. This
model starts to change when you deploy WLANs in many small sites that more
resemble the simple WLAN shown in Figure 2-4. This model may apply to a chain
of small stores distributed throughout a city or state, nationally, or globally
(Figure 2-6).
User Guide for Cisco Secure ACS for Windows Server
2-11
Basic Deployment Factors for Cisco Secure ACS
Figure 2-6Large Deployment of Small Sites
I
Chapter 2 Deployment Considerations
63491
For the model in Figure 2-6, the location of Cisco Secure ACS depends on
whether all users need access on any AP, or whether users require only regional
or local network access. Along with database type, these factors control whether
local or regional Cisco Secure ACSes are required, and how database continuity
is maintained. In this very large deployment model, security becomes a more
complicated issue, too.
Remote Access using VPN
Virtual Private Networks (VPNs) use advanced encryption and tunneling to
permit organizations to establish secure, end-to-end, private network connections
over third-party networks, such as the Internet or extranets (Figure 2-7). The
benefits of a VPN include the following:
• Cost Savings—By leveraging third-party networks with VPN, organizations
no longer have to use expensive leased or frame relay lines and can connect
remote users to their corporate networks via a local Internet service provider
(ISP) instead of using expensive toll-free or long-distance calls to
resource-consuming modem banks.
User Guide for Cisco Secure ACS for Windows Server
2-12
78-16592-01
Chapter 2 Deployment Considerations
• Security—VPNs provide the highest level of security using advanced
encryption and authentication protocols that protect data from unauthorized
access.
• Scalability—VPNs allow corporations to use remote access infrastructure
within ISPs; therefore, corporations can add a large amount of capacity
without adding significant infrastructure.
• Compatibility with Broadband Technology—VPNs allow mobile workers
and telecommuters to take advantage of high-speed, broadband connectivity,
such as DSL and cable, when gaining access to their corporate networks,
providing workers significant flexibility and efficiency.
Figure 2-7Simple VPN Configuration
NetworkWAN
Basic Deployment Factors for Cisco Secure ACS
VPN concentrator
78-16592-01
Tunnel
Cisco Secure
Access Control Server
63492
There are two types of VPN access into a network:
• Site-to-Site VPNs—Extend the classic WAN by providing large-scale
encryption between multiple fixed sites such as remote offices and central
offices, over a public network, such as the Internet.
• Remote Access VPNs—Permit secure, encrypted connections between
mobile or remote users and their corporate networks via a third-party
network, such as an ISP, via VPN client software.
Generally speaking, site-to-site VPNs can be viewed as a typical WAN connection
and are not usually configured to use AAA to secure the initial connection and are
likely to use the device-oriented IPSec tunneling protocol. Remote access VPNs,
however, are similar to classic remote connection technology (modem/ISDN) and
lend themselves to using the AAA model very effectively (Figure 2-8).
User Guide for Cisco Secure ACS for Windows Server
2-13
Basic Deployment Factors for Cisco Secure ACS
Figure 2-8Enterprise VPN Solution
Tunnel
Chapter 2 Deployment Considerations
Home office
ISP
ISP
Tunnel
Mobile
worker
For more information about implementing VPN solutions, see the reference guide
A Primer for Implementing a Cisco Virtual Private Network.
Remote Access Policy
Remote access is a broad concept. In general, it defines how the user can connect
to the LAN, or from the LAN to outside resources (that is, the Internet). There are
several ways this may occur. The methods include dial-in, ISDN, wireless bridges,
and secure Internet connections. Each method incurs its own advantages and
disadvantages, and provides a unique challenge to providing AAA services. This
closely ties remote access policies to the enterprise network topology. In addition
to the method of access, other decisions can also affect how Cisco Secure ACS is
deployed; these include specific network routing (access lists), time-of-day
access, individual restrictions on AAA client access, access control lists (ACLs),
and so on.
Remote access policies can be implemented for employees who telecommute or
for mobile users who dial in over ISDN or public switched telephone network
(PSTN). Such policies are enforced at the corporate campus with Cisco Secure
ACS and the AAA client. Inside the enterprise network, remote access policies
can control wireless access by individual employees.
Internet
VPN concentrator
Cisco Secure
Access Control
Server
63493
2-14
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
Chapter 2 Deployment Considerations
Cisco Secure ACS remote access policies provides control by using central
authentication and authorization of remote users. The CiscoSecure user database
maintains all user IDs, passwords, and privileges. Cisco Secure ACS access
policies can be downloaded in the form of ACLs to network access servers such
as the Cisco AS5300 Network Access Server, or by allowing access during
specific periods, or on specific access servers.
Remote access policies are part of overall corporate security policy.
Security Policy
We recommend that every organization that maintains a network develop a
security policy for the organization. The sophistication, nature, and scope of your
security policy directly affect how you deploy Cisco Secure ACS.
For more information about developing and maintaining a comprehensive security
policy, refer to the following documents:
• Network Security Policy: Best Practices White Paper
• Delivering End-to-End Security in Policy-Based Networks
Basic Deployment Factors for Cisco Secure ACS
• Cisco IOS Security Configuration Guide
Administrative Access Policy
Managing a network is a matter of scale. Providing a policy for administrative
access to network devices depends directly on the size of the network and the
number of administrators required to maintain the network. Local authentication
on a network device can be performed, but it is not scalable. The use of network
management tools can help in large networks, but if local authentication is used
on each network device, the policy usually consists of a single login on the
network device. This does not promote adequate network device security. Using
Cisco Secure ACS allows a centralized administrator database, and administrators
can be added or deleted at one location. TACACS+ is the recommended AAA
protocol for controlling AAA client administrative access because of its ability to
provide per-command control (command authorization) of AAA client
administrator access to the device. RADIUS is not well suited for this purpose
because of the one-time transfer of authorization information at time of initial
authentication.
78-16592-01
User Guide for Cisco Secure ACS for Windows Server
2-15
Basic Deployment Factors for Cisco Secure ACS
The type of access is also an important consideration. If there are to be different
administrative access levels to the AAA clients, or if a subset of administrators is
to be limited to certain systems, Cisco Secure ACS can be used with command
authorization per network device to restrict network administrators as necessary.
Using local authentication restricts the administrative access policy to no login on
a device or using privilege levels to control access. Controlling access by means
of privilege levels is cumbersome and not very scalable. This requires that the
privilege levels of specific commands are altered on the AAA client device and
specific privilege levels are defined for the user login. It is also very easy to create
more problems by editing command privilege levels. Using command
authorization on Cisco Secure ACS does not require that you alter the privilege
level of controlled commands. The AAA client sends the command to
Cisco Secure ACS to be parsed and Cisco Secure ACS determines whether the
administrator has permission to use the command. The use of AAA allows
authentication on any AAA client to any user on Cisco Secure ACS and limits
access to these devices on a per-AAA client basis.
A small network with a small number of network devices may require only one or
two individuals to administer it. Local authentication on the device is usually
sufficient. If you require more granular control than that which authentication can
provide, some means of authorization is necessary. As discussed earlier,
controlling access using privilege levels can be cumbersome. Cisco Secure ACS
reduces this problem.
Chapter 2 Deployment Considerations
2-16
In large enterprise networks, with many devices to administer, the use of
Cisco Secure ACS becomes a practical necessity. Because administration of many
devices requires a larger number of network administrators, with varying levels of
access, the use of local control is simply not a viable way of keeping track of
network device configuration changes required when changing administrators or
devices. The use of network management tools, such as CiscoWorks 2000, helps
to ease this burden, but maintaining security is still an issue. Because
Cisco Secure ACS can comfortably handle up to 100,000 users, the number of
network administrators that Cisco Secure ACS supports is rarely an issue. If there
is a large remote access population using RADIUS for AAA support, the
corporate IT team should consider separate TACACS+ authentication using
Cisco Secure ACS for the administrative team. This would isolate the general user
population from the administrative team and reduce the likelihood of inadvertent
access to network devices. If this is not a suitable solution, using TACACS+ for
administrative (shell/exec) logins, and RADIUS for remote network access,
provides sufficient security for the network devices.
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
Chapter 2 Deployment Considerations
Separation of Administrative and General Users
It is important to keep the general network user from accessing network devices.
Even though the general user may not intend to gain unauthorized access,
inadvertent access could accidentally disrupt network access. AAA and
Cisco Secure ACS provide the means to separate the general user from the
administrative user.
The easiest, and recommended, method to perform such separation is to use
RADIUS for the general remote access user and TACACS+ for the administrative
user. An issue that arises is that an administrator may also require remote network
access, like the general user. If you use Cisco Secure ACS this poses no problem.
The administrator can have both RADIUS and TACACS+ configurations in
Cisco Secure ACS. Using authorization, RADIUS users can have PPP (or other
network access protocols) set as the permitted protocol. Under TACACS+, only
the administrator would be configured to allow shell (exec) access.
For example, if the administrator is dialing in to the network as a general user, a
AAA client would use RADIUS as the authenticating and authorizing protocol
and the PPP protocol would be authorized. In turn, if the same administrator
remotely connects to a AAA client to make configuration changes, the AAA client
would use the TACACS+ protocol for authentication and authorization. Because
this administrator is configured on Cisco Secure ACS with permission for shell
under TACACS+, he would be authorized to log in to that device. This does
require that the AAA client have two separate configurations on Cisco Secure
ACS, one for RADIUS and one for TACACS+. An example of a AAA client
configuration under IOS that effectively separates PPP and shell logins follows:
aaa new-model
tacacs-server host
tacacs-server key secret-key
radius-server host ip-address
radius-server key secret-key
aaa authentication ppp default group radius
aaa authentication login default group tacacs+ local
aaa authentication login console none
aaa authorization network default group radius
aaa authorization exec default group tacacs+ none
aaa authorization command 15 default group tacacs+ none
username
line con 0
login authentication console
user password password
ip-address
Basic Deployment Factors for Cisco Secure ACS
78-16592-01
User Guide for Cisco Secure ACS for Windows Server
2-17
Basic Deployment Factors for Cisco Secure ACS
Conversely, if a general user attempts to use his or her remote access to log in to
a network device, Cisco Secure ACS checks and approves the username and
password, but the authorization process would fail because that user would not
have credentials that allow shell or exec access to the device.
Database
Aside from topological considerations, the user database is one of the most
influential factors involved in making deployment decisions for Cisco Secure
ACS. The size of the user base, distribution of users throughout the network,
access requirements, and type of user database contribute to how Cisco Secure
ACS is deployed.
Number of Users
Cisco Secure ACS is designed for the enterprise environment, comfortably
handling 100,000 users. This is usually more than adequate for a corporation. In
an environment that exceeds these numbers, the user base would typically be
geographically dispersed, which lends itself to the use of more than one
Cisco Secure ACS configuration. A WAN failure could render a local network
inaccessible because of the loss of the authentication server. In addition to this
issue, reducing the number of users that a single Cisco Secure ACS handles
improves performance by lowering the number of logins occurring at any given
time and by reducing the load on the database itself.
Chapter 2 Deployment Considerations
Type of Database
User Guide for Cisco Secure ACS for Windows Server
2-18
Cisco Secure ACS supports several database options, including the CiscoSecure
user database or using remote authentication with any of the external databases
supported. For more information about database options, types, and features, see
Authentication and User Databases, page 1-10, Chapter 13, “User Databases”, or
Chapter 16, “User Group Mapping and Specification”. Each database option has
its own advantages and limitations in scalability and performance.
78-16592-01
Chapter 2 Deployment Considerations
Network Latency and Reliability
Network latency and reliability are also important factors in how you deploy
Cisco Secure ACS. Delays in authentication can result in timeouts at the end-user
client or the AAA client.
The general rule for large, extended networks, such as a globally dispersed
corporation, is to have at least one Cisco Secure ACS deployed in each region.
This may not be adequate without a reliable, high-speed connection between sites.
Many corporations use secure VPN connections between sites so that the Internet
provides the link. This saves time and money but it does not provide the speed and
reliability that a dedicated frame relay or T1 link provides. If reliable
authentication service is critical to business functionality, such as retail outlets
with cash registers that are linked by a WLAN, the loss of WAN connection to a
remote Cisco Secure ACS could be catastrophic.
The same issue can be applied to an external database used by Cisco Secure ACS.
The database should be deployed close enough to Cisco Secure ACS to ensure
reliable and timely access. Using a local Cisco Secure ACS with a remote
database can result in the same problems as using a remote Cisco Secure ACS.
Another possible problem in this scenario is that a user may experience timeout
problems. The AAA client would be able to contact Cisco Secure ACS, but
Cisco Secure ACS would wait for a reply that might be delayed or never arrive
from the external user database. If the Cisco Secure ACS were remote, the AAA
client would time out and try an alternative method to authenticate the user, but in
the latter case, it is likely the end-user client would time out first.
Suggested Deployment Sequence
Suggested Deployment Sequence
While there is no single process for all Cisco Secure ACS deployments, you
should consider following the sequence, keyed to the high-level functions
represented in the navigation toolbar. Also bear in mind that many of these
deployment activities are iterative in nature; you may find that you repeatedly
return to such tasks as interface configuration as your deployment proceeds.
• Configure Administrators—You should configure at least one administrator
at the outset of deployment; otherwise, there is no remote administrative
access and all configuration activity must be done from the server. You should
also have a detailed plan for establishing and maintaining an administrative
policy.
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
2-19
Suggested Deployment Sequence
For more information about setting up administrators, see Chapter 1,
“Overview”.
• Configure the Cisco Secure ACS HTML Interface—You can configure the
Cisco Secure ACS HTML interface to show only those features and controls
that you intend to use. This makes using Cisco Secure ACS less difficult than
it would be if you had to contend with multiple parts of the HTML interface
that you do not plan to use. The price of this convenience can sometimes be
frustration that features and controls do not appear because you failed to
configure them in the Interface Configuration section. For guidance on
configuring the HTML interface, see Interface Design Concepts, page 3-2.
For information about configuring particular aspects of the HTML interface,
see the following sections of the interface configuration chapter:
• Configure System—There are more than a dozen functions within the
System Configuration section to be considered, from setting the format for
the display of dates and password validation to configuring settings for
database replication and RDBMS synchronization. These functions are
detailed in Chapter 8, “System Configuration: Basic”. Of particular note
during initial system configuration is setting up the logs and reports to be
generated by Cisco Secure ACS; for more information, see Chapter 1,
“Overview”.
Chapter 2 Deployment Considerations
–
User Data Configuration Options, page 3-3
–
Advanced Options, page 3-4
–
Protocol Configuration Options for TACACS+, page 3-7
–
Protocol Configuration Options for RADIUS, page 3-11
2-20
• Configure Network—You control distributed and proxied AAA functions in
the Network Configuration section of the HTML interface. From here, you
establish the identity, location, and grouping of AAA clients and servers, and
determine what authentication protocols each is to use. For more information,
see Chapter 4, “Network Configuration”.
• Configure External User Database—During this phase of deployment you
must decide whether and how you intend to implement an external database
to establish and maintain user authentication accounts. Typically, this
decision is made according to your existing network administration
mechanisms. For information about the types of databases Cisco Secure ACS
supports and instructions for establishing them, see Chapter 13, “User
Databases”.
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
Chapter 2 Deployment Considerations
Along with the decision to implement an external user database (or
databases), you should have detailed plans that specify your requirements for
Cisco Secure ACS database replication, backup, and synchronization. These
aspects of configuring CiscoSecure user database management are detailed in
Chapter 8, “System Configuration: Basic”.
• Configure Shared Profile Components—With most aspects of network
configuration already established and before configuring user groups, you
should configure your Shared Profile Components. When you set up and
name the network access restrictions and command authorization sets you
intend to employ, you lay out an efficient basis for specifying user group and
single user access privileges. For more information about Shared Profile
Components, see Chapter 5, “Shared Profile Components”.
• Configure Groups—Having previously configured any external user
databases you intend to employ, and before configuring your user groups, you
should decide how to implement two other Cisco Secure ACS features related
to external user databases: unknown user processing and database group
mapping. For more information, see About Unknown User Authentication,
page 15-4 and Chapter 16, “User Group Mapping and Specification”. Then,
you can configure your user groups with a complete plan of how Cisco Secure
ACS is to implement authorization and authentication. For more information,
see Chapter 6, “User Group Management”.
Suggested Deployment Sequence
78-16592-01
• Configure Users—With groups established, you can establish user accounts.
Remember that a particular user can belong to only one user group, and that
settings made at the user level override settings made at the group level. For
more information, see Chapter 7, “User Management”.
• Configure Reports—Using the Reports and Activities section of the
Cisco Secure ACS HTML interface, you can specify the nature and scope of
logging that Cisco Secure ACS performs. For more information, see
Chapter 1, “Overview”.
User Guide for Cisco Secure ACS for Windows Server
2-21
Suggested Deployment Sequence
Chapter 2 Deployment Considerations
2-22
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
CHAPTER
3
Interface Configuration
Ease of use is the overriding design principle of the HTML interface in the
Cisco Secure ACS for Windows Server. Cisco Secure ACS presents intricate
concepts of network security from the perspective of an administrator. The
Interface Configuration section of Cisco Secure ACS enables you to configure the
Cisco Secure ACS HTML interface—you can tailor the interface to simplify the
screens you will use by hiding the features that you do not use and by adding fields
for your specific configuration.
NoteWe recommend that you return to this section to review and confirm your initial
settings. While it is logical to begin your Cisco Secure ACS configuration efforts
with configuring the interface, sometimes a section of the HTML interface that
you initially believed should be hidden from view may later require configuration
from within this section.
78-16592-01
TipIf a section of the Cisco Secure ACS HTML interface appears to be “missing” or
“broken”, return to the Interface Configuration section and confirm that the
particular section has been activated.
This chapter contains the following topics:
• Interface Design Concepts, page 3-2
• User Data Configuration Options, page 3-3
• Advanced Options, page 3-4
User Guide for Cisco Secure ACS for Windows Server
3-1
Interface Design Concepts
• Protocol Configuration Options for TACACS+, page 3-7
• Protocol Configuration Options for RADIUS, page 3-11
Interface Design Concepts
Before you begin to configure the Cisco Secure ACS HTML interface for your
particular configuration, you should understand a few basic precepts of the system
operation. The information in the following sections is necessary for effective
interface configuration.
User-to-Group Relationship
A user can belong to only one group at a time. As long as there are no conflicting
attributes, users inherit group settings.
NoteIf a user profile has an attribute configured differently from the same attribute in
the group profile, the user setting always overrides the group setting.
Chapter 3 Interface Configuration
If a user has a unique configuration requirement, you can make that user a part of
a group and set unique requirements on the User Setup page, or you can assign
that user to his or her own group.
Per-User or Per-Group Features
You can configure most features at both group and user levels, with the following
exceptions:
• User level only—Static IP address, password, and expiration.
• Group level only—Password aging and time-of-day/day-of-week
restrictions.
User Guide for Cisco Secure ACS for Windows Server
3-2
78-16592-01
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.