Home > Cisco > Control System > Cisco Acs 57 User Guide

Cisco Acs 57 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Acs 57 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 584
    							31   
    Common Scenarios Using ACS
    RADIUS and TACACS+ Proxy Requests
    Example:
    Callback-ID – Attribute Multiple NOT allowed.
    On the access accept response from the RADIUS server:
    Callback-ID NOT on the access accept response
    Attribute operation statement:
    Callback-ID ADD 1223
    Result of the add attribute operation on the response sent to the client device: 
    Callback-ID=1223
    If the Callback-ID is on the original access accept response, ACS does not perform the add operation in this 
    example.
    If multiple attributes are allowed, the add operation always adds the attribute with a new value.
    Example:
    Login-IP-Host – attribute Multiple allowed:
    On the access accept response from the RADIUS server:
    Login-IP-Host=10.58.23.192
    Attribute operation statement: 
    Login-IP-Host ADD 10.58.1.1
    Result of the attribute operation on the response sent to the client device: 
    Login-IP-Host=10.58.23.192
    Login-IP-Host=10.58.1.1
    Updating Attributes in Outbound RADIUS Responses
    This option is used to update the existing value of a selected RADIUS attribute.
    If multiple attributes are not allowed, the update operation updates the existing attributes with a new value only if 
    the attribute exist in the access accept response.
    If multiple attributes are allowed, the update operation removes all the occurrences of this attribute and adds one 
    attribute with a new value.
    Example:
    Login-IP-Host – attribute Multiple allowed.
    On the access accept response from the RADIUS server:
    Login-IP-Host=10.58.23.192
    Login-IP-Host=10.58.1.1
    Attribute operation statement:
    Login-IP-Host UPDATE 10.11.11.11 
    						
    							32
    Common Scenarios Using ACS
     
    RADIUS and TACACS+ Proxy Requests
    Result of the attribute operation on the response sent to the client device: 
    Login-IP-Host=10.11.11.11
    If the attribute is cisco-avpair (pair of key=value), the update is done according to the key.
    Example:
    On the access accept response from the RADIUS server:
    cisco-avpair = url-redirect=www.cisco.com
    cisco-avpair = url-redirect=www.yahoo.com
    cisco-avpair = cmd=show
    Attribute operation statement:
    cisco-avpair UPDATE new value:[url-redirect=www.google.com]
    Result of the attribute operation on the response sent to the client device:
    cisco-avpair = url-redirect=www.google.com
    cisco-avpair = cmd=show
    Deleting Attributes from OutBound RADIUS Responses
    This option is used to delete the value of RADIUS outbound attributes.
    Example:
    Login-IP-Host – attribute Multiple allowed
    On the Access Accept Response from the RADIUS server:
    Login-IP-Host=10.56.21.190
    Attribute Operation statement:
    Login-IP-Host DELETE
    Result of the attribute operation on the response sent to the client device:
    Attribute Login-IP-Host is not in the access accept response.
    Related Topics
    Supported Protocols, page 32
    Supported RADIUS Attributes, page 33
    Configuring Proxy Service, page 34
    Supported Protocols
    The RADIUS proxy feature in ACS supports the following protocols:
    Supports forwarding for all RADIUS protocols
    All EAP protocols
    Protocols not supported by ACS (Since ACS proxy do not interfere into the protocol conversation and just forwards 
    requests) 
    						
    							33   
    Common Scenarios Using ACS
    RADIUS and TACACS+ Proxy Requests
    Note: ACS proxy can not support protocols that use encrypted RADIUS attributes. 
    The TACACS+ proxy feature in ACS supports the following protocols:
    PA P
    ASCII
    CHAP
    MSCHAP authentications types
    Related Topics
    RADIUS and TACACS+ Proxy Requests, page 26
    Supported RADIUS Attributes, page 33
    Configuring Proxy Service, page 34
    Supported RADIUS Attributes
    The following supported RADIUS attributes are encrypted:
    User-Password
    CHAP-Password
    Message-Authenticator
    MPPE-Send-Key and MPPE-Recv-Key
    Tunnel-Password
    LEAP Session Key Cisco AV-Pair
    TACACS+ Body Encryption
    When ACS receives a packet from NAS with encrypted body (flag TAC_PLUS_UNECRYPTED_FLAG is 0x0), ACS 
    decrypts the body with common data such as shared secret and sessionID between NAS and ACS and then encrypts 
    the body with common data between ACS and TACACS+ proxy server. If the packet body is in cleartext, ACS will resend 
    it to TACACS+ server in cleartext.
    Connection to TACACS+ Server
    ACS supports single connection to another TACACS+ server (flag TAC_PLUS_SINGLE_CONNECT_FLAG is 1). If the 
    remote TACACS+ server does not support multiplexing TACACS+ sessions over a single TCP connection ACS will open 
    or close connection for each session.
    Related Topics
    RADIUS and TACACS+ Proxy Requests, page 26
    Supported Protocols, page 32
    Configuring Proxy Service, page 34 
    						
    							34
    Common Scenarios Using ACS
     
    Enabling and Disabling IPv6 for Network Interfaces
    Configuring Proxy Service
    To configure proxy services:
    1.Configure a set of remote RADIUS and TACACS+ servers. For information on how to configure remote servers, see 
    Creating, Duplicating, and Editing External Proxy Servers, page 19.
    2.Configure an External proxy service. For information on how to configure a External proxy service, see Configuring 
    General Access Service Properties, page 13.
    You must select the User Selected Service Type option and choose External proxy as the Access Service Policy 
    Structure in the Access Service Properties - General page.
    3.After you configure the allowed protocols, click Finish to complete your External proxy service configuration.
    Related Topics
    RADIUS and TACACS+ Proxy Requests, page 26
    Supported Protocols, page 32
    Supported RADIUS Attributes, page 33
    Enabling and Disabling IPv6 for Network Interfaces
    ACS 5.7 provides the capability to disable the IPv6 stack for all interfaces or for a specific interface. By default, IPv6 is 
    enabled for all interfaces. 
    You can enable or disable the IPv6 stack from the ACS CLI in configuration mode. You should restart the ACS services 
    to reflect correct IPv6 behavior even though the CLI prompts for a confirmation.
    When you disable IPv6 at the global level, you cannot enable it at the interface level.
    Even when you disable IPv6, ACS allows IPv6 static address configuration, which is shown in the running configuration. 
    However, it will not be used.
    For more information on the ipv6 enable command and its usage, see the CLI Reference Guide for Cisco Secure Access 
    Control System 5.7. 
    						
    							1
    Cisco Systems, Inc.www.cisco.com
     
    Understanding My Workspace
    The Cisco Secure ACS web interface is designed to be viewed using Microsoft Internet Explorer and Mozilla Firefox 
    browsers. For more information on supported browser versions, see Release Notes for Cisco Secure Access Control 
    System 5.7. The web interface not only makes viewing and administering ACS possible, but it also allows you to monitor 
    and report on any event in the network. 
    These reports track connection activity, show which users are currently logged in, list the failed authentication and 
    authorization attempts, and so on.
    The My Workspace drawer contains:
    Welcome Page, page 1
    Task Guides, page 2
    My Account Page, page 2
    Login Banner, page 3
    Using the Web Interface, page 3
    Importing and Exporting ACS Objects Through the Web Interface, page 18
    Common Errors, page 24
    Accessibility, page 26
    Welcome Page
    The Welcome page appears when you start ACS, and it provides shortcuts to common ACS tasks and links to 
    information.
    You can return to the Welcome page at any time during your ACS session. To return to this page, choose My Workspace 
    > Welcome.
    Ta b l e 1 4 W e l c o m e  P a g e
    Field Description
    Before You Begin Contains a link to a section that describes the ACS policy model and associated terminology. 
    Getting  Started Links in this section launch the ACS Task Guides, which provide step-by-step instructions on how 
    to accomplish ACS tasks.
    Quick Start  Opens the Task Guide for the Quick Start scenario. These steps guide you through a minimal 
    system setup to get ACS going quickly in a lab, evaluation, or demonstration environment.
    Initial  System  Setup Opens the Task Guide for initial system setup. This scenario guides you through the steps that are 
    required to set up ACS for operation as needed; many steps are optional. 
    						
    							2
    Understanding My Workspace
     
    Ta s k  G u i d e s
    In ACS 5.7, you can also see a banner in the welcome page. You can customize this After Login banner text from the 
    Login Banner page. 
    Task Guides
    From the My Workspace drawer, you can access Tasks Guides. When you click any of the tasks, a frame opens on the 
    right side of the web interface. This frame contains step-by-step instructions, as well as links to additional information. 
    ACS provides the following task guides:
    Quick Start—Lists the minimal steps that are required to get ACS up and running quickly.
    Initial System Setup—Lists the required steps to set up ACS for basic operations, including information about optional 
    steps.
    Policy Setup Steps—Lists the required steps to define ACS access control policies.
    My Account Page
    Note: Every ACS administrator account is assigned one or more administrative roles. Depending upon the roles assigned 
    to your account, you may or may not be able to perform the operations or see the options described in certain 
    procedures. See Configuring System Administrators and Accounts, page 3 to configure the appropriate administrator 
    privileges.
    Use the My Account page to update and change the administrator password for the administrator that is currently logged 
    in to ACS.
    To display this page, choose My Workspace > My Account. Policy Setup Steps Opens the Task Guide for policy setup. This scenario guides you through the steps that are 
    required to set up ACS policies.
    New  in  ACS  5 Options in this section link to topics in the ACS online help. Click an option to open the online help 
    window, which displays information for the selected topic. 
    Use the links in the online help topics and in the Contents pane of the online help to view more 
    information about ACS features and tasks.
    Tu t o r i a l s  &  O t h e r  
    ResourcesProvides links to:
    Introduction Overview video. 
    Configuration guide that provides step-by-step instructions for common ACS scenarios.
    Table 14 Welcome Page (continued)
    Field Description 
    						
    							3   
    Understanding My Workspace
    Login Banner
    Related Topics
    Configuring Authentication Settings for Administrators, page 11
    Changing the Administrator Password, page 25
    Login Banner
    ACS 5.7 supports customizing of the login banner texts. You can set two sets of banner text; for instance, before logging 
    you can display one banner text, and after logging in you can display another banner text. You can do this customization 
    from the Login Banner page. The copyright statement is default for both the banners. ACS 5.7 displays the role of ACS 
    in the login banners. The role can be primary, primary log collector, secondary, or secondary log collector. 
    You can also configure login banners for ACS CLI. To display a banner text before and after logging in to ACS CLI, use 
    the banner command in the EXEC mode. The banners that are configured using the banner command from ACS CLI do 
    not reflect in ACS web interface, whereas the banners that are configured in ACS web interface impacts the ACS CLI 
    banner. For more information on banner command, see the CLI Reference Guide for Cisco Secure Access Control 
    System.
    Note: ACS does not support ' and " symbols in login banner text. 
    To customize the login banner, choose My Workspace > Login Banner.
    Using the Web Interface
    You can configure and administer ACS through the ACS web interface, in which you can access pages, perform 
    configuration tasks, and view interface configuration errors. This section describes:
    Ta b l e 1 5 M y  A c c o u n t  P a g e
    Field Description
    General Read-only fields that display information about the currently logged-in administrator:
    Administrator name
    Description
    E-mail address, if it is available
    Change Password Displays rules for password definition according to the password policy.
    To change your password:
    1.In the Password field, enter your current password.
    2.In the New Password field, enter a new password.
    3.In the Confirm Password field, enter your new password again.
    Assigned Roles Displays the roles that are assigned to the currently logged-in administrator.
    Table 16 Login Banner Page
    Field Description
    Before Login Enter the text that you want to display in the banner before login. 
    After Login Enter the text that you want to display in the banner after login.  
    						
    							4
    Understanding My Workspace
     
    Using the Web Interface
    Accessing the Web Interface, page 4
    Understanding the Web Interface, page 5
    Common Errors, page 24
    Accessibility, page 26
    Accessing the Web Interface
    The ACS web interface is supported on HTTPS-enabled Microsoft Internet Explorer and Mozilla Firefox browsers. For 
    more information on supported browser versions, see Release Notes for Cisco Secure Access Control System 5.7. 
    This section contains:
    Logging In, page 4
    Logging Out, page 5
    Logging In
    To log in to the ACS web interface for the first time after installation:
    1.Enter the ACS URL in your browser, for example, https://acs_host/acsadmin, https://[IPv6 address]/acsadmin, or 
    https://ipv4 address/acsadmin, where /acs_host is the IP address or Domain Name System (DNS) hostname. The 
    DNS hostname works for IPv6 when the given IP address is resolvable to both IPv4 and IPv6 formats. 
    Note: Launching the ACS web interface using IPv6 addresses is not supported in Mozilla Firefox versions 4.x or later. 
    The login page appears. 
    2.Enter ACSAdmin in the Username field; the value is not case-sensitive.
    3.Enter default in the Password field; the value is case-sensitive.
    This password (default) is valid only when you log in for the first time after installation. Click Reset to clear the 
    Username and Password fields and start over, if needed.
    4.Click Login or press Enter.
    The login page reappears, prompting you to change your password.
    ACS prompts you to change your password the first time you log in to the web interface after installation and in other 
    situations based on the authentication settings that is configured in ACS.
    5.Enter default in the Old Password field, and enter a new password in the New Password and the Confirm Password 
    fields.
    If you forget your password, use the acs reset-password command to reset your password to default. See the CLI 
    Reference Guide for Cisco Secure Access Control System, 5.7 for more information.
    6.Click Login or press Enter.
    You are prompted to install a valid license: 
    						
    							5   
    Understanding My Workspace
    Using the Web Interface
    Note: The license page only appears the first time that you log in to ACS.
    7.See Installing a License File, page 38 to install a valid license.
    If your login is successful, the main page of the ACS web interface appears.
    If your login is unsuccessful, the following error message appears:
    Access Denied. Please contact your Security Administrator for assistance. 
    The Username and Password fields are cleared.
    8.Re-enter the valid username and password, and click Login.
    Note: When you use Internet Explorer to view the ACS web interface, if the Enhanced Security Configuration (ESC) is 
    enabled, you would observe issues in displaying pages and pop-ups of the ACS web interface. To overcome this issue, 
    you must disable the ESC from the Internet Explorer settings.
    Logging Out
    Click Logout in the ACS web interface header to end your administrative session. A dialog box appears asking if you are 
    sure you want to log out of ACS. Click OK.
    Caution: For security reasons, Cisco recommends that you log out of the ACS when you complete your 
    administrative session. If you do not log out, the ACS web interface logs you out if your session remains inactive for 
    a configurable period of time, and does not save any unsubmitted configuration data. See Configuring Session Idle 
    Timeout, page 13 for configuring session idle timeout.
    Understanding the Web Interface
    The following sections explain the ACS web interface:
    Web Interface Design, page 6
    Header, page 6
    Navigation Pane, page 7
    Content Area, page 8 
    						
    							6
    Understanding My Workspace
     
    Using the Web Interface
    Web Interface Design
    Figure 3 on page 6 shows the overall design of the ACS web interface.
    Figure 3 ACS Web Interface
    The interface contains:
    Header, page 6
    Navigation Pane, page 7
    Content Area, page 8
    Header
    Use the header to:
    Identify the current user (your username)
    Access the online help
    Log out
    Access the About information, where you can find information about which ACS web interface version is installed.
    These items appear on the right side of the header (see Figure 4 on page 6).
    Figure 4 Header
    Related Topics
    Navigation Pane, page 7
    Content Area, page 8 
    						
    All Cisco manuals Comments (0)