Cisco Systems, Inc. Catalyst Switches

Similar documents
Cisco Systems, Inc. Wireless LAN Controller

Cisco Systems, Inc. Aironet Access Point

Cisco Systems, Inc. IOS Router

<Partner Name> RSA SECURID ACCESS Standard Agent Implementation Guide. WALLIX WAB Suite 5.0. <Partner Product>

Barracuda Networks SSL VPN

HOB HOB RD VPN. RSA SecurID Ready Implementation Guide. Partner Information. Product Information Partner Name. Last Modified: March 3, 2014 HOB

Dell SonicWALL NSA 3600 vpn v

RSA Ready Implementation Guide for

RSA SecurID Ready Implementation Guide. Last Modified: March 27, Cisco Systems, Inc.

VMware Identity Manager vidm 2.7

Citrix Systems, Inc. Web Interface

RSA Ready Implementation Guide for. GlobalSCAPE EFT Server 7.3

Cyber Ark Software Ltd Sensitive Information Management Suite

Barracuda Networks NG Firewall 7.0.0

Vanguard Integrity Professionals ez/token

Caradigm Single Sign-On and Context Management RSA Ready Implementation Guide for. Caradigm Single Sign-On and Context Management 6.2.

Avocent DSView 4.5. RSA SecurID Ready Implementation Guide. Partner Information. Last Modified: June 9, Product Information Partner Name

Apple Computer, Inc. ios

RSA SECURID ACCESS PAM Agent Implementation Guide

<Partner Name> RSA SECURID ACCESS. VMware Horizon View Client 6.2. Standard Agent Implementation Guide. <Partner Product>

Infosys Limited Finacle e-banking

SecureW2 Enterprise Client

Rocket Software Strong Authentication Expert

RSA Ready Implementation Guide for. VMware vsphere Management Assistant 6.0

RSA SecurID Ready Implementation Guide. Last Modified: November 19, 2009

Security Access Manager 7.0

SSH Communications Tectia 6.4.5

Attachmate Reflection for Secure IT 8.2 Server for Windows

Microsoft Forefront UAG 2010 SP1 DirectAccess

RSA SecurID Ready Implementation Guide

<Partner Name> <Partner Product> RSA SECURID ACCESS. VMware Horizon View 7.2 Clients. Standard Agent Client Implementation Guide

RSA Ready Implementation Guide for. HelpSystems Safestone DetectIT Security Manager

<Partner Name> <Partner Product> RSA SECURID ACCESS. NetMove SaAT Secure Starter. Standard Agent Client Implementation Guide

<Partner Name> <Partner Product> RSA SECURID ACCESS. Pulse Secure Connect Secure 8.3. Standard Agent Client Implementation Guide

RSA SecurID Implementation

RSA SecurID Ready Implementation Guide

Barron McCann Technology X-Kryptor

RSA SecurID Ready Implementation Guide

Pulse Secure Policy Secure

Microsoft Unified Access Gateway 2010

RSA SecurID Ready Implementation Guide. Last Modified: December 13, 2013

Open System Consultants Radiator RADIUS Server

RSA Ready Implementation Guide for. Checkpoint Mobile VPN for ios v1.458

How to Configure the RSA Authentication Manager

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. CyberArk Enterprise Password Vault

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. PingIdentity PingFederate 8

Fischer International Identity Fischer Identity Suite 4.2

RSA Ready Implementation Guide for

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Cisco Adaptive Security Appliance 9.5(2)

How to Integrate RSA SecurID with the Barracuda Web Application Firewall

TalariaX sendquick Alert Plus

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Citrix NetScaler Gateway 12.0

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Pulse Connect Secure 8.x

How to RSA SecureID with Clustered NATIVE

RSA Ready Implementation Guide for

Hitachi ID Systems Inc Identity Manager 8.2.6

SailPoint IdentityIQ 6.4

RSA SecurID Ready with Wireless LAN Controllers and Cisco Secure ACS Configuration Example

Authentify SMS Gateway

QUESTION: 1 An RSA SecurID tokencode is unique for each successful authentication because

AT&T Global Smart Messaging Suite

SOFTEL Communications Password Reset and Identity Management Suite

RSA Ready Implementation Guide for

050-v71x-CSESECURID RSA. RSA SecurID Certified Systems Engineer 7.1x

RSA Exam 050-v71-CASECURID02 RSA SecurID Certified Administrator 7.1 Exam Version: 6.0 [ Total Questions: 140 ]

Vendor: RSA. Exam Code: CASECURID01. Exam Name: RSA SecurID Certified Administrator 8.0 Exam. Version: Demo

RSA Authentication Manager 8.2

Data Structure Mapping

Pass4sure CASECURID01.70 Questions

Data Structure Mapping

Data Structure Mapping

<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Check Point SmartEndpoint Security

Advantage Cloud Two-Factor Security Process

Integration Guide. SafeNet Authentication Service (SAS)

Secured by RSA Implementation Guide for Software Token Authenticators

Data Structure Mapping

Data Structure Mapping

<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Intel Security Drive Encryption 7.1.3

BMC Software BMC Provisioning Module for RSA Authentication Manager

Are You Flirting with Risk?

McAfee Endpoint Encryption

Security Cooperation Information Portal

Intel Security/McAfee Endpoint Encryption

Data Structure Mapping

Symantec Encryption Desktop

<Partner Name> RSA SECURID ACCESS Authenticator Implementation Guide. Intel Authenticate & Intel IPT based Token Provider for RSA SecurID

Integration Guide. LoginTC

Data Structure Mapping

RSA Authentication Manager 6.1 to 8.0 Migration Guide

Are You Flirting with Risk?

Securing VSPEX VMware View 5.1 End- User Computing Solutions with RSA

Remote Support Security Provider Integration: RADIUS Server

Xceedium Xsuite. Secured by RSA Implementation Guide for 3rd Party PKI Applications. Partner Information. Last Modified: February 10 th, 2014

RSA Two Factor Authentication. Feature Description

Cisco Systems, Inc IronPort

Security Provider Integration RADIUS Server

Configuring Secure Shell (SSH)

Question: 1 The NAC Agent uses which port and protocol to send discovery packets to an ISE Policy Service Node?

Technical Note: RSA SecurID /SA Integration

Symbols. Numerics I N D E X

Transcription:

RSA SecurID Ready Implementation Guide Partner Information Last Modified: vember 11, 2013 Product Information Partner Name Cisco Systems, Inc. Web Site www.cisco.com Product Name Version & Platform IOS 15.0 Product Description Cisco access switches create new user experiences and support network and application requirements. They help you scale your infrastructure for growing business needs, increase network intelligence with visibility and control, simplify operations, and improve security for users and applications.

Solution Summary Cisco Catalyst switches integrate with RSA SecurID using RADIUS to protect console access. RSA Authentication Manager supported features Cisco Catalyst switch RSA SecurID Authentication via Native RSA SecurID Protocol RSA SecurID Authentication via RADIUS Protocol On-Demand Authentication via Native SecurID Protocol On-Demand Authentication via RADIUS Protocol Risk-Based Authentication Risk-Based Authentication with Single Sign-On RSA Authentication Manager Replica Support Secondary RADIUS Server Support RSA SecurID Software Token Automation RSA SecurID SD800 Token Automation RSA SecurID Protection of Administrative Interface - 2 -

Authentication Agent Configuration Authentication Agents are records in the RSA Authentication Manager database that contain information about the systems for which RSA SecurID authentication is provided. All RSA SecurID-enabled systems require corresponding Authentication Agents. Authentication Agents are managed using the RSA Security Console. The following information is required to create an Authentication Agent: Hostname IP Addresses for network interfaces Set the Agent Type to Standard Agent when adding the Authentication Agent. This setting is used by the RSA Authentication Manager to determine how communication with Cisco Catalyst switches will occur. A RADIUS client that corresponds to the Authentication Agent must be created in the RSA Authentication Manager in order for the Cisco Catalyst switch to communicate with RSA Authentication Manager. RADIUS clients are managed using the RSA Security Console. The following information is required to create a RADIUS client: Hostname IP Addresses for network interfaces RADIUS Secret te: Hostnames within the RSA Authentication Manager / RSA SecurID Appliance must resolve to valid IP addresses on the local network. Please refer to the appropriate RSA documentation for additional information about creating, modifying and managing Authentication Agents and RADIUS clients. - 3 -

Partner Product Configuration Before You Begin This section provides instructions for configuring the Cisco Catalyst switch with RSA SecurID Authentication. This document is not intended to suggest optimum installations or configurations. It is assumed that the reader has both working knowledge of all products involved, and the ability to perform the tasks outlined in this section. Administrators should have access to the product documentation for all products in order to install the required components. All Cisco Catalyst switch components must be installed and working prior to the integration. Perform the necessary tests to confirm that this is true before proceeding. Configure Console Access for RSA SecurID Authentication 1. Enable AAA. Switch(config)#aaa new-model 2. Specify the RADIUS server settings. Switch(config)#radius server servername Switch(config-radius-server)#address ipv4 radius_server_ip auth-port 1812 Switch(config-radius-server)#key radius_server_key Switch(config-radius-server)#exit 3. Configure authentication. te: Repeat these steps using different servernames for any replica servers in your deployment. Switch(config)#authentication login default group radius - 4 -

RSA SecurID Login Screens Login screen: User-defined New PIN: - 5 -

System-generated New PIN: Next Tokencode: - 6 -

Certification Checklist for RSA Authentication Manager Date Tested: vember 11, 2013 Certification Environment Product Name Version Information Operating System RSA Authentication Manager 8.0 Virtual Appliance Cisco Catalyst 2960 5.0(2)SE5 IOS Mandatory Functionality RSA Native Protocol RADIUS Protocol New PIN Mode Force Authentication After New PIN N/A Force Authentication After New PIN System Generated PIN N/A System Generated PIN User Defined (4-8 Alphanumeric) N/A User Defined (4-8 Alphanumeric) User Defined (5-7 Numeric) N/A User Defined (5-7 Numeric) Deny 4 and 8 Digit PIN N/A Deny 4 and 8 Digit PIN Deny Alphanumeric PIN N/A Deny Alphanumeric PIN Deny PIN Reuse N/A Deny PIN Reuse Passcode 16-Digit Passcode N/A 16-Digit Passcode 4-Digit Fixed Passcode N/A 4-Digit Fixed Passcode Next Tokencode Mode Next Tokencode Mode N/A Next Tokencode Mode On-Demand Authentication On-Demand Authentication N/A On-Demand Authentication On-Demand New PIN N/A On-Demand New PIN Load Balancing / Reliability Testing Failover (3-10 Replicas) N/A Failover RSA Authentication Manager N/A RSA Authentication Manager PEW = Pass = Fail N/A = t Applicable to Integration - 7 -