Configuration of Cisco ACS 5.2 Radius authentication with comware v7 switches 2

Similar documents
Configuring RADIUS. Information About RADIUS. RADIUS Network Environments. Send document comments to

Configuration Example: TACACS Administrator Access to Converged Access Wireless LAN Controllers

Configuring TACACS+ Information About TACACS+ Send document comments to CHAPTER

Configuring Authentication, Authorization, and Accounting

IEEE 802.1X Multiple Authentication

HPE IMC UAM Device User Authentication Configuration Examples

H3C COMWARE 7 FREERADIUS REMOTE AAA SIMULATION USING HCL

ACS 5.2 Attribute Support in the Migration Utility

Cisco Nexus 1000V for KVM Security Configuration Guide, Release 5.x

Configuring TACACS+ About TACACS+

PT Activity: Configure AAA Authentication on Cisco Routers

Configuring Security for the ML-Series Card

Manage Users. About User Profiles. About User Roles

Configuring RADIUS and TACACS+

Examples of Cisco APE Scenarios

TACACS Device Access Control with Cisco Active Network Abstraction

Configuring Authorization

Encrypted Vendor-Specific Attributes

Configuring RADIUS Servers

The ISG RADIUS Proxy Support for Mobile Users Hotspot Roaming and Accounting Start Filtering feature

Configuring Cisco Prime NAM

Configuring LDAP. Finding Feature Information

DHCP Server RADIUS Proxy

ACS Shell Command Authorization Sets on IOS and ASA/PIX/FWSM Configuration Example

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+

HPE IMC UAM 802.1X Authentication Configuration Examples

Configuring Basic AAA on an Access Server

thus, the newly created attribute is accepted if the user accepts attribute 26.

Configuring RADIUS. Finding Feature Information. Prerequisites for RADIUS

IEEE 802.1X VLAN Assignment

Resource: Installing Cisco Secure ACS 3.0 and greater for Windows 2000

RADIUS Tunnel Attribute Extensions

Network Edge Authentication Topology

Lock and Key: Dynamic Access Lists

thus, the newly created attribute is accepted if the user accepts attribute 26.

Configuring Switch-Based Authentication

UniNets CCNA Security LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL UniNets CCNA LAB MANUAL

Configuring the CSS as a Client of a TACACS+ Server

RADIUS Attributes. RADIUS IETF Attributes

Configuring Authorization

IEEE 802.1X with ACL Assignments

H3C Intelligent Management Center

Remote Authentication

Per-User ACL Support for 802.1X/MAB/Webauth Users

Configuring Role-Based Access Control

Administrative Tasks CHAPTER

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Lab 8.5.2: Troubleshooting Enterprise Networks 2

Configuring Role-Based Access Control

Encrypted Vendor-Specific Attributes

Configuring RADIUS and TACACS+ Servers

Lab Configuring and Verifying Extended ACLs Topology

Authentication of Wireless LAN Controller's Lobby Administrator via RADIUS Server

RADIUS Vendor-Specific Attributes and RADIUS Disconnect-Cause Attribute Values

RADIUS Vendor-Specific Attributes (VSA) and RADIUS Disconnect-Cause Attribute Values

Configuring Management Access

Using the Command-Line Interface

AAA and the Local Database

Using the Command-Line Interface

TACACS+ Configuration Mode Commands

Configuring RADIUS. Finding Feature Information. Prerequisites for RADIUS. Last Updated: November 2, 2012

ISE Primer.

TACACS+ on an Aironet Access Point for Login Authentication Configuration Example

Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+)

Configuring Web-Based Authentication

Cisco PIX. Quick Start Guide. Copyright 2006, CRYPTOCard Corporation, All Rights Reserved

Managing GSS User Accounts Through a TACACS+ Server

aaa max-sessions maximum-number-of-sessions The default value for aaa max-sessions command is platform dependent. Release 15.0(1)M.

Data Structure Mapping

PPPoE Session Limit per NAS Port

Configuring 802.1x CHAPTERS. 1. Overview x Configuration 3. Configuration Example 4. Appendix: Default Parameters

Implementing ADSL and Deploying Dial Access for IPv6

Configuring Secure Shell (SSH)

Using the Command-Line Interface

Data Structure Mapping

Cisco Nexus 3000 Series NX-OS Security Configuration Guide, Release 6.x

Data Structure Mapping

Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images

Implementing Authentication Proxy

Configuring Local Authentication and Authorization

IEEE 802.1X RADIUS Accounting

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Per-Session QoS. Finding Feature Information

isco Cisco Secure ACS for Windows Frequently Asked Quest

Chapter 12. AAA. Upon completion of this chapter, you will be able to perform the following tasks:

EAP FAST with the Internal RADIUS Server on the Autonomous Access Point Configuration Example

Console Port, Telnet, and SSH Handling

RADIUS Route Download

CSN11111 Network Security

Table of Contents 1 AAA Overview AAA Configuration 2-1

Send document comments to

IEEE 802.1X Open Authentication

Configuring Web-Based Authentication

RADIUS Change of Authorization Support

Control Device Administration Using TACACS+

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM

Network security session 9-2 Router Security. Network II

Configuring Multiple SSIDs

Enabling Remote Access to the ACE

Using the Command-Line Interface

Transcription:

Contents Configuration of Cisco ACS 5.2 Radius authentication with comware v7 switches 2 Network requirements: 2 Networking diagram 2 Configuration steps 2 Cisco ACS 5.2 configuration 4 Verifying the working of the configuration 12 Key points of the configuration 12 i

Configuration of Cisco ACS 5.2 Radius authentication with comware v7 switches Network requirements: A PC and Cisco ACS 5.2 server directly connected to switch S5820V2 The PC with IP address 10.1.1.1/24 and running Microsoft Windows 7 OS; Cisco ACS 5.2 server with IP address 192.168.1.253/24 The Switch S5820V2 running with software version Release 2208P01; VLAN 10 with IP address 10.1.1.254/24 as default gateway of the PC; VLAN 192 with IP address 192.168.1.254/24 as default gateway of ACS server; Networking diagram Configuration steps Configuration of the PC 2

Configuration of the switch S5820V2 S5820V2 CONFIGURATION telnet server enable vlan 10 vlan 192 interface Vlan-interface10 ip address 10.1.1.254 255.255.255.0 interface Vlan-interface192 ip address 192.168.1.254 255.255.255.0 interface Ten-GigabitEthernet1/0/1 port access vlan 10 interface Ten-GigabitEthernet1/0/2 port access vlan 192 user-interface vty 0 15 authentication-mode scheme user-role network-admin radius scheme login primary authentication 192.168.1.253 primary accounting 192.168.1.253 key authentication cipher 123 3

S5820V2 CONFIGURATION key accounting cipher 123 user-name-format without-domain nas-ip 192.168.1.254 domain system authentication login radius-scheme login authorization login radius-scheme login accounting login radius-scheme login Cisco ACS 5.2 configuration CLI configuration CISCO ACS CONFIGURATION interface GigabitEthernet 0 ip address 192.168.1.253 255.255.255.0 no shutdown! ip default-gateway 192.168.1.254 HTTP GUI configuration 1. Login using https://192.168.1.253 in Internet Explorer (IE) 2. Configure the network resources. It is required to pre-plan the network device groups (NDG) distribution methods, such as in accordance with the device type or with location to which the device belongs as per the following examples: 4

3. Network Resources > Network Device Groups > Device Type > Network Devices and AAA Clients to configure a device and AAA client: 5

4. Assign S5820V2 to the designated site, the type of device group, specify the IP address, select the Radius protocol, configure the shared key as the same key configured on the device 5. Configure user groups and users by creating and Identity group and by assigning it to the Identity group All Groups. 6. Create an Internal Identity Store user (Users) and set the user password, and assign the user to the specific Identity Group you want the user associated to: 6

7. Configure policy elements by creating an Authorization Profile 7

8. Add Radius attributes. These are mainly three attributes: Login-Service (RADIUS - IETF ) with Enum Name selected as Telnet; Service-Type (RADIUS-IETF) with Enum Name selected as Login; cisco-av-pair (RADIUS-Cisco) and feel in under attribute shell:roles*\"network-admin\", or shell:roles=\"network-admin\". 8

9. Configure an Access Policy. ACS provides two default access services: Default Device Admin used for TACACS+ based access to device CLI and Default Network Access used for RADIUS-based access to network connectivity. You can use the access services as is, modify them, or delete them as needed. You can also create additional access services and have their Access Service Policy Structure based on one of the default access services. 10. Select the authentication protocol, you can here check PAP and CHAP: 9

11. Configure the Network Access Authorization Policy to be Enabled and associated to the corresponding Network Device Group, their location and to the corresponding Authorization Profile. 10

12. Configure the Service selection rules, by selecting the access service you have already created: 11

Verifying the working of the configuration You can use wireshark to capture the packet exchange to see the Service-type, Login-Service, cisco-avpair and other attributes in the Radius Access-Accept message. You can also use the switch capture/debugging feature to achieve the same result. Key points of the configuration When Configuring with ACS server, the extended attribute cisco-av-pair must be used to issue a role to the user; When the switch configuration uses a Radius Scheme, you must configure the switch to supports RADIUS server type as extended type; Configure the service selection rules, to adjust the criteria in the order, from top to bottom to be able to match the type of agreement; When configuring cisco-av-pair attribute, pay attention to the syntax. The format is: shell:roles*\"network-admin\" or shell:roles =\"network-admin\" You can also use H3C Exec_Privilege to grant commands to the authenticated user on basis of user level (user level from 0 to 15). To do so, you need to configure the following RADIUS VSA: H3C Vendor ID: 25506 H3C-Exec-Privilege Vendor Attribute ID: 29, Attribute Type: Unsigned Integer 32, and then add this property in the authorization policy that has been created, and fill out the authorization levels. 12

13