Home > Cisco > Control System > Cisco Acs 57 User Guide

Cisco Acs 57 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Acs 57 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 584
    							1   
    Managing Reports
    Available Filters
    Table 3 Available Filters
    Option Description
    User Enter a valid username on which to configure your threshold.
    MAC Address Enter a valid MAC address on which to run your report.
    Identity Group Enter a valid identity group name on which to run your report.
    Device Name Enter a valid device name on which to run your report.
    Device IP Enter a valid device IP address on which to run your report.
    SNMP Community Configure SNMP preferences to authenticate access to MIB objects. For more information, see 
    Configuring SNMP Preferences, page 17. This community string is used by ACS to query information 
    using SNMP on AAA client, and cannot used by SNMP manager to query MIB information on ACS.
    Device Group Enter a valid device group name on which to run your report.
    Access Service Enter a valid access service name on which to run your report
    Identity Store Enter a valid identity store name on which to run your report.
    ACS Instance  Enter an valid ACS instance name on which to run your report.
    Failure Reason Enter a valid failure reason name on which to run your report.
    Protocol Use the drop down list box to select which protocol on which you want to run your report. Valid options 
    are:
    RADIUS
    TACACS+
    Authentication 
    StatusUse the drop down list box to select which authentication status on which you want to run your report. 
    Valid options are:
    Pass Or Fail
    Pass
    Fail
    Radius Audit 
    Session IDEnter the RADIUS audit session identification name on which you want to run a report.
    ACS Session ID Enter the ACS session identification name on which you want to run a report.
    Severity Use the drop down list box to select the severity level on which you want to run a report. This setting 
    captures the indicated severity level and those that are higher within the threshold. Valid options are:
    Fatal
    Error
    Warning
    Info
    Debug
    End Point IP 
    AddressEnter the end point IP address on which you want to run a report.
    Command 
    Accounting OnlyCheck the check box to enable your report to run for command accounting. 
    						
    							2
    Managing Reports
     
    Available Filters
    Top Use the drop down list box to select the number of top (most frequent) authentications by access 
    service on which you want to run your report. Valid options are:
    10
    50
    100
    500
    1000
    5000
    By Use the drop down list box to select the type of authentications on which you want to run your report. 
    Valid options are:
    Passed Authentications
    Failed Authentications
    Total Authentications
    Administrator Name Enter the administrator username for which you want to run your report.
    Object Type Enter a valid object type on which you want to run your report.
    Object Name Enter the name of the object on which you want to run your report.
    Authorization Status Use the drop down list box to select which authentication status on which you want to run your report. 
    Valid options are:
    Pass Or Fail
    Pass
    Fail
    Time  Range Use the drop down list box to select the time range on which you want to run your report. Valid options 
    are:
    Last 30 Minutes (for AAA Protocol reports and ACS Health Summary report only)
    Last Hour (for AAA Protocol reports and ACS Health Summary report only)
    Last 12 Hours (for AAA Protocol reports and ACS Health Summary report only)
    To d a y
    Ye s t e r d a y
    Last 7 Days
    Last 30 Days
    Custom—You must configure a Start Date and End Date, or a Day.
    Note: Some options are not valid for some Time Range entries of the various reports.
    Start Date Enter a date, or click the date selector icon to enter the start date for which you want run your report.
    End Date Enter a date, or click the date selector icon to enter the end date for which you want run your report.
    Table 3 Available Filters (continued)
    Option Description 
    						
    							2   
    Managing Reports
    Changing Authorization for RADIUS Active Sessions Dynamically
    Related Topics
    ACS Reports, page 2
    Favorite Reports, page 13
    Available Reports, page 14
    Running Reports, page 3
    Changing Authorization for RADIUS Active Sessions Dynamically
    ACS provides the Dynamic Change of Authorization (CoA) feature through a new report, the RADIUS Active Sessions report, 
    which allows you to dynamically control active RADIUS sessions. With this feature, you can send a reauthenticate or disconnect 
    request to a NAD to:
    Troubleshoot issues related to authentication—You can use the Disconnect:None option to follow up with an attempt to 
    reauthenticate again.
    You must not use the disconnect option to restrict access. To restrict access, use the shutdown option.
    Block a problematic host—You can use the Disconnect:Port Disable option to block an infected host that sends a lot of traffic 
    over the network.
    The RADIUS protocol currently does not support a method for re-enabling a port that is shut down.
    Force endpoints to reacquire IP addresses—You can use the Disconnect:Port Bounce option for endpoints that do not have 
    a supplicant or client to generate a DHCP request after VLAN change.
    Push an updated authorization policy to an endpoint—You can use the Re-Auth option to enforce an updated policy 
    configuration, such as a change in the authorization policy on existing sessions based on the administrator’s discretion.
    For example, if posture validation is enabled, when an endpoint gains access initially, it is usually quarantined. After the 
    endpoint’s identity and posture are known, it is possible to send the CoA Re-Auth command to the endpoint for the 
    endpoint to acquire the actual authorization policy based on its posture.
    Legacy NAS devices do not support the CoA feature. Cisco plans to support CoA in all its devices as part of the NPF program.
    Note: For the CoA commands to be understood correctly by the device, it is important that you configure the options 
    appropriately.
    For the CoA feature to work properly, you must configure in ACS the shared secret of each and every device for which you want 
    to dynamically change the authorization. ACS uses the shared secret configuration, both for requesting access from the device 
    and for issuing CoA commands to it.
    This section contains the following topics: 
    Enabling RADIUS CoA Options on a Device, page 22
    Changing Authorization and Disconnecting Active RADIUS Sessions, page 22 Start Time Enter the start time you want to run the report. 
    End Time Enter the end time you want to run the report. 
    Day Enter a date, or click the date selector icon to enter the end date for which you want run your report.
    Run Click to run the report for which you have made selections.
    Table 3 Available Filters (continued)
    Option Description 
    						
    							2
    Managing Reports
     
    Changing Authorization for RADIUS Active Sessions Dynamically
    Enabling RADIUS CoA Options on a Device
    To view all the RADIUS Active Session reports you have to enable RADIUS CoA options on the device.
    To configure the RADIUS CoA options:
    1.Configure MAB, 802.1X and Web Authentication on the NAD against ACS RADIUS Server.
    2.Configure CoA on the NAD as follows, which is connected to the supplicant. 
    aa server radius dynamic-author
    client { - } [vrf ] [server-key]
    server-key [0 - 7] 
    port 
    auth-type {any - all - session-key}
    ignore session-key
    ignore server-key
    3.Configure the authentication order.
    Changing Authorization and Disconnecting Active RADIUS Sessions
    Note: S o m e  o f  t h e  N A D s  i n  y o u r  d e p l o y m e n t  d o  n o t  s e n d  a n  A c c o u n t i n g Stop or Accounting Off packet after a reload. As a result 
    of this, you might find two sessions in the Session Directory reports, one of which has expired. Hence, when you want to 
    dynamically change the authorization of an active RADIUS session or disconnect an active RADIUS session, ensure that you 
    always choose the most recent session. 
    To change authorization or disconnect an active RADIUS session:
    1.Run the RADIUS Active Sessions report under Session Directory. 
    See Running Reports, page 3 for information on how to run a RADIUS Active Sessions report.
    A report similar to the one shown in Figure 7 on page 22 appears.
    Figure 7 RADIUS Active Session Report
    2.Click the CoA link from the RADIUS session that you want to reauthenticate or terminate.
    The Change of Authorization Request page appears. 
    						
    							2   
    Managing Reports
    Understanding Charts
    3.Select a CoA option from the CoA option drop-down list box shown in Figure 8 on page 23.
    Valid options are:
    Disconnect:None—Do not terminate the session.
    Disconnect:Port Bounce—Terminate the session and restart the port.
    Disconnect:Port Disable—Terminate the session and shut down the port.
    Re-Auth—Reauthenticate the user.
    Figure 8 CoA Options
    4.Click Run to reauthenticate or disconnect the RADIUS session.
    If your change of authorization fails, it might be because of any of the following reasons:
    Device does not support CoA
    Changes to the identity or authorization policy
    Shared secret mismatch
    5.See the Troubleshooting RADIUS Authentications, page 6 to troubleshoot a failed change of authorization attempt. 
    A failed dynamic CoA will be listed under failed RADIUS authentications.
    Understanding Charts
    A chart is a graphical representation of data or the relationships among data sets. Charts display complex data in an 
    easy-to-assimilate format. In ACS 5.7, you cannot customize the charts from Reports web interface. 
    Figure 9 on page 24 shows the parts of a basic bar chart. A chart displays data as one or more sets of points. The chart 
    organizes data points into sets of values called series. The two types of series are:
    Category series— The category series typically determines what text, numbers, or dates you see on the x-axis. 
    Value series—The value series typically determines the text, numbers, or dates on the y-axis. 
    In Figure 9 on page 24, the category series contains a set of regions, and the value series contains a set of sales figure values. 
    						
    							2
    Managing Reports
     
    Understanding Charts
    Figure 9 Parts of a Basic Bar Chart
    There are a variety of chart types. Some types of data are best depicted with a specific type of chart. Charts can be used as 
    reports in themselves and they can be used together with tabular data report styles.  
    						
    							1
    Cisco Systems, Inc.www.cisco.com
     
    Troubleshooting ACS with the Monitoring 
    and Report Viewer
    This chapter describes the diagnostic and troubleshooting tools that the Monitoring and Report Viewer provides for the 
    Cisco Secure Access Control System.
    This chapter contains the following sections:
    Available Diagnostic and Troubleshooting Tools, page 1
    Performing Connectivity Tests, page 3
    Downloading ACS Support Bundles for Diagnostic Information, page 4
    Working with Expert Troubleshooter, page 5
    Available Diagnostic and Troubleshooting Tools
    The Monitoring and Report Viewer provides the following:
    Connectivity Tests, page 1
    ACS Support Bundle, page 1
    Expert Troubleshooter, page 2
    Connectivity Tests
    When you have authentication problems, you can perform a connectivity test to check for connectivity issues. You can 
    enter the hostname or the IP address of the network device that you are trying to connect with and execute the following 
    commands from the web interface: ping, traceroute, and nslookup. 
    The Monitoring and Report Viewer displays the output of these commands. See Performing Connectivity Tests, page 3 
    for detailed instructions on how to perform the connectivity tests.
    ACS Support Bundle
    You can use the ACS support bundle to prepare diagnostic information for TAC to troubleshoot problems with ACS.
    Support bundles typically contain the ACS database, log files, core files, and Monitoring and Report Viewer support files. 
    You can exclude certain files from the support bundle, per ACS node. You can download the support bundle to your local 
    computer. The browser (depending on its configuration) displays the progress of the download and prompts you to save 
    the support bundle to an appropriate location.
    If the ACS server is a primary instance, the support bundle includes an export of the ACS configuration. 
    If the ACS server is a secondary instance, the ACS database is not included. 
    If the ACS server is a log collector, the support bundle includes an export of the monitoring and report configuration 
    and collected AAA audit and diagnostic logs. 
    						
    							2
    Troubleshooting ACS with the Monitoring and Report Viewer
     
    Available Diagnostic and Troubleshooting Tools
    If the ACS server is not the log collector, the monitoring and reporting configuration is not included in the support 
    bundle. See Downloading ACS Support Bundles for Diagnostic Information, page 4 for detailed instructions on how 
    to download ACS support bundles.
    Expert Troubleshooter
    Expert Troubleshooter is an easy-to-use, web-based troubleshooting utility that helps you diagnose and troubleshoot 
    problems in ACS deployments. It reduces the time that you take to diagnose the problem and provides you detailed 
    instructions on how to resolve the problem.
    You can use Expert Troubleshooter to diagnose and troubleshoot passed and failed authentications. For example, if a 
    user is unable to gain access to the network, you can use the Expert Troubleshooter to diagnose the cause of this 
    problem.
    Expert Troubleshooter provides you the option to run show commands on any network device from the ACS web 
    interface. The output of the show command is returned to you in precisely the same manner as the output appears on a 
    console.
    You can use Expert Troubleshooter to evaluate the configuration of any network device to see if there are any 
    discrepancies that cause the problem. ACS 5.7 supports evaluating communication with network devices over IPv6 along 
    with IPv4. 
    In addition, Expert Troubleshooter provides you four diagnostic tools for troubleshooting Security Group Access 
    device-related problems.
    The Expert Troubleshooter identifies the cause of the problem and lists an appropriate course of action that you can take 
    to resolve the problem. See Working with Expert Troubleshooter, page 5 for more information on the various tools that 
    Expert Troubleshooter offers.
    Table 1 on page 2 describes the diagnostic tools that ACS 5.7 offers:
    Table 1 Expert Troubleshooter - Diagnostic Tools
    Diagnostic Tool Description
    RADIUS Authentication Troubleshooting Troubleshoots a RADIUS authentication. See Troubleshooting RADIUS 
    Authentications, page 6 for more information.
    Execute Network Device Command Executes any show command on a network device. See Executing the Show 
    Command on a Network Device, page 9 for more information.
    Evaluate Configuration Validator Evaluates the configuration of a network device. See Evaluating the Configuration 
    of a Network Device, page 10 for more information. 
    						
    							3   
    Troubleshooting ACS with the Monitoring and Report Viewer
    Performing Connectivity Tests
    Performing Connectivity Tests
    You can test your connectivity to a network device with the dev i c e ’s  h os t n am e o r  I P a d d re ss.  Fo r  e x am p l e ,  you  c an  ver i f y  
    your connection to an identity store by performing a connectivity test. In ACS 5.7, you can also test the connectivity of 
    remote machines. 
    To test connectivity between your ACS and a device’s hostname or IP address:
    1.Select Monitoring and Reports > Troubleshooting > Connectivity Tests.
    The Connectivity Tests page appears.
    2.Click the IPv4 or IPv6 radio button to select the appropriate IP address type.
    3.Modify the fields in the Connectivity Tests page as described in Table 2 on page 3.
    4.Click ping, traceroute, or nslookup, depending upon your test.
    The output of the ping, traceroute, or nslookup command appears.
    Related Topics
    Available Diagnostic and Troubleshooting Tools, page 1 Trust Sec Tools
    Egress (SGACL) Policy Compares the Egress Policy (SGACL) between a network device and ACS. See 
    Comparing SGACL Policy Between a Network Device and ACS, page 11 for more 
    information.
    SXP-IP  Mappings Compares SXP mappings between a device and peers. See Comparing the SXP-IP 
    Mappings Between a Device and its Peers, page 12 for more information.
    IP User SGT Compares IP-SGTs on a device with ACS authentication-assigned User-IP-SGT 
    records. See Comparing IP-SGT Pairs on a Device with ACS-Assigned SGT 
    Records, page 14 for more information.
    Device SGT Compares device SGT with ACS-assigned SGT. See Comparing Device SGT with 
    ACS-Assigned Device SGT, page 15 for more information.
    Table 1 Expert Troubleshooter - Diagnostic Tools (continued)
    Diagnostic Tool Description
    Table 2 Connectivity Tests
    Option Description
    Hostname or IP Address Enter the hostname or IP address of a connection you want to test. Click Clear to clear the 
    hostname or IP address that you have entered.
    ping Click to see the ping command output, where you can view the packets sent and received, packet 
    loss (if any) and the time for the test to complete.
    traceroute Click to see the traceroute command output, where you can view the intermediary IP addresses 
    (hops) between your ACS and the tested hostname or IP address, and the time for each hop to 
    complete.
    nslookup Click to see the nslookup command output, where you can see the server and IP address of your 
    tested domain name server hostname or IP address. 
    						
    							4
    Troubleshooting ACS with the Monitoring and Report Viewer
     
    Downloading ACS Support Bundles for Diagnostic Information
    Connectivity Tests, page 1
    ACS Support Bundle, page 1
    Expert Troubleshooter, page 2
    Downloading ACS Support Bundles for Diagnostic Information
    To create and download an ACS support bundle:
    1.Select Monitoring and Reports > Troubleshooting > ACS Support Bundle.
    The ACS Support Bundle page appears with the fields described in Table 3 on page 4:
    2.Choose a server and click Get Support Bundle. 
    The Download Parameters for the Server page appears. You can create and download an ACS support bundle for 
    the associated ACS node instance. 
    Note: ACS 5.7 allows you to download the support bundle to an IPv6 URL-specified destination.
    3.Select the download options you want to incorporate in your ACS support.tar.gz file. 
    Downloading a support bundle can be slow if the size of the file is extremely large. For faster downloads, do not 
    include core files and View support files in the support bundle.
    The options are:
    Encrypt Support Bundle—Check this box to encrypt the support bundle. Specify the decrypting password in 
    Passphrase and confirm the password in Confirm Passphrase.
    Include full configuration database—Check this box to have the whole database included in the support bundle. If this 
    option in not checked, only a subset of the database is included in the support bundle. Click Include sensitive 
    information or Exclude sensitive information to include or exclude sensitive information in the logs.
    Sensitive information consists of passwords in the encrypted format, ACS configuration data, and so on.
    Include debug logs—Check this check box to include debug logs, then click All, or click Recent and enter a value 
    from 1 to 999 in the file(s) field to specify which debug logs to include. 
    Include local logs—Check this check box to include local logs, then click All, or click Recent and enter a value from 
    1 to 999 in the file(s) field to specify which debug logs to include.
    Include core files—Check this check box to include core files, then click All or click Include files from the last and 
    enter a value from 1 to 365 in the day(s) field.
    Include monitoring and reporting logs—Check this check box to include monitoring and reporting logs, then click All 
    or click Include files from the last and enter a value from 1 to 365 in the day(s) field. 
    Specify which monitoring and reporting logs to include: 
    Table 3 ACS Support Bundle Page
    Option Description
    Server Name of an ACS node instance. Click to display the Download Parameters for the Server page, 
    to create and download an ACS support bundle for the ACS node instance.
    IP AddressDisplay only. Indicates the IP address of an associated ACS node.
    Node DesignationDisplay only. Indicates the primary or secondary instance of an associated ACS node. 
    						
    All Cisco manuals Comments (0)

    Related Manuals for Cisco Acs 57 User Guide