Home > Cisco > Control System > Cisco Acs 57 User Guide

Cisco Acs 57 User Guide

Here you can view all the pages of manual Cisco Acs 57 User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.

Page 41

1
Cisco Systems, Inc.www.cisco.com
 
Common Scenarios Using ACS
Network control refers to the process of controlling access to a network. Traditionally a username and password was 
used to authenticate a user to a network. Now a days with the rapid technological advancements, the traditional method 
of managing network access with a username and a password is no longer sufficient.
The ways in which the users can access the network and what they can access have changed considerably. Hence, you 
must...

Page 42

2
Common Scenarios Using ACS
 
Overview of Device Administration
This chapter provides guidelines for some of the common scenarios. This chapter contains:
Overview of Device Administration, page 2
Password-Based Network Access, page 5 
Certificate-Based Network Access, page 8 
Agentless Network Access, page 11
VPN Remote Network Access, page 19
ACS and Cisco Security Group Access, page 21
RADIUS and TACACS+ Proxy Requests, page 26
Enabling and Disabling IPv6 for Network Interfaces, page 34...

Page 43

3   
Common Scenarios Using ACS
Overview of Device Administration
You configure the permit and deny settings in the device administration rule table. You configure policy elements within 
a device administration rule table as conditions that are or not met. The rule table maps specific request conditions to 
device administration results through a matching process. The result of rule table processing is a shell profile or a 
command set, dependent on the type of request.
Session administration requests...

Page 44

4
Common Scenarios Using ACS
 
Overview of Device Administration
3.ACS optionally uses an identity store (external Lightweight Directory Access Protocol [LDAP], Active Directory, 
RADIUS Identity Server, or internal ACS identity store) to retrieve user attributes which are included in policy 
processing.
4.The response indicates whether the administrator is authorized to issue the command.
To configure a command authorization policy (device administration rule table) to allow an administrator to issue...

Page 45

5   
Common Scenarios Using ACS
Password-Based Network Access
Password-Based Network Access
This section contains the following topics:
Overview of Password-Based Network Access, page 5
Password-Based Network Access Configuration Flow, page 6
For more information about password-based protocols, see Authentication in ACS 5.7, page 1
Overview of Password-Based Network Access
The use of a simple, unencrypted username and password is not considered a strong authentication mechanism but can 
be sufficient...

Page 46

6
Common Scenarios Using ACS
 
Password-Based Network Access
—EAP-FAST-GTC
—EAP-MD5
—LEAP
You must choose the authentication method based on the following factors:
The network access server—Wireless access points, 802.1X authenticating switches, VPN servers, and so on.
The client computer and software—EAP supplicant, VPN client, and so on.
The identity store that is used to authenticate the user—Internal or External (AD, LDAP, RSA token server, or RADIUS 
identity server).
Related Topics...

Page 47

7   
Common Scenarios Using ACS
Password-Based Network Access
For RADIUS, non-EAP authentication methods (RADIUS/PAP, RADIUS/CHAP, RADIUS/MS-CHAPv1, 
RADIUS/MSCHAPv2), and simple EAP methods (EAP-MD5 and LEAP), you need to configure only the protocol in the 
Allowed Protocols page as defined in Table 11 on page 7.
Some of the complex EAP protocols require additional configuration:
For EAP-TLS, you must also configure:
—The EAP-TLS settings under System Administration > Configuration > EAP-TLS Settings....

Page 48

8
Common Scenarios Using ACS
 
Certificate-Based Network Access
—The inner method in the Allowed Protocols page and specify whether password change is allowed.
—The PEAP settings under System Administration > Configuration > PEAP Settings.
—Local server certificates under System Administration > Configuration > Local Server Certificates > Local 
Certificates.
For EAP-FAST, you must also configure:
—The inner method in the Allowed Protocols page and specify whether password change is allowed.
—Whether or...

Page 49

9   
Common Scenarios Using ACS
Certificate-Based Network Access
A certificate can be self-signed or signed by another CA. A hierarchy of certificates can be made to form trust relations 
of each entity to its CA. The trusted root CA is the entity that signs the certificate of all other CAs and eventually signs 
each certificate in its hierarchy.
ACS identifies itself with its own certificate. ACS supports a certificate trust list (CTL) for authorizing connection 
certificates. ACS also supports complex...

Page 50

10
Common Scenarios Using ACS
 
Certificate-Based Network Access
EAP-TLS or PEAP (EAP-TLS)
The local certificate. See Configuring Local Server Certificates, page 16.
To configure certificate-based network access for EAP-TLS or PEAP (EAP-TLS):
1.Configure the trust certificate list. See Configuring CA Certificates, page 83, for more information.
2.Configure the LDAP external identity store. You might want to do this to verify the certificate against a certificate 
stored in LDAP. See Creating External...
Start reading Cisco Acs 57 User Guide

Related Manuals for Cisco Acs 57 User Guide

All Cisco manuals