Home > Cisco > Switch > Cisco Sg3008 Manual

Cisco Sg3008 Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Sg3008 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 586
    							Security
    Configuring TACACS+
    334 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
    18
    The following information is sent to the TACACS+ server by the device when a 
    user logs in or out:
    Defaults
    The following defaults are relevant to this feature:
    •No default TACACS+ server is defined by default. 
    •If you configure a TACACS+ server, the accounting feature is disabled by 
    default.
    Interactions With Other Features
    You cannot enable accounting on both a RADIUS and TACACS+ server.
    Workflow
    To use a TACACS+ server, do the following:
    STEP 1Open an account for a user on the TACACS+ server.
    STEP  2Configure that server along with the other parameters in the TACACS+ and Add 
    TA C A C S +  S e r v e r  p a g e s .
    Table 2:
    Argument Description In Start 
    MessageIn Stop 
    Message
    task_id A unique accounting session 
    identifier. Ye s Ye s
    user Username that is entered for 
    login authentication.Ye s Ye s
    rem-addr P address of the user. Yes Yes
    elapsed-time Indicates how long the user was 
    logged in.No Yes
    reason Reports why the session was 
    terminated.No Yes 
    						
    							Security
    Configuring TACACS+
    Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  335
    18
     
    STEP  3Select TA C A C S + in the Management Access Authentication page, so that when a 
    user logs onto the device, authentication is performed on the TACACS+ server 
    instead of in the local database.
    NOTEIf more than one TACACS+ server has been configured, the device uses the 
    configured priorities of the available TACACS+ servers to select the TACACS+ 
    server to be used by the device.
    Configuring a TACACS+ Server
    The TACACS+ page enables configuring TACACS+ servers. 
    Only users who have privilege level 15 on the TACACS+ server can administer the 
    device. Privilege level 15 is given to a user or group of users on the TACACS+ 
    server by the following string in the user or group definition:
    service = exec {
    priv-lvl = 15
    } 
    To configure TACACS+ server parameters:
    STEP 1Click Security > TA C A C S +.
    STEP  2Enable TACACS+ Accounting if required. See explanation in the Accounting 
    Using a TACACS+ Server section.
    STEP  3Enter the following default parameters: 
    •Key String—Enter the default Key String used for communicating with all 
    TA C A C S +  s e r v e r s  i n  Encrypted or Plaintext mode. The device can be 
    configured to use this key or to use a key entered for an specific server 
    (entered in the Add TACACS+ Server page).
    If you do not enter a key string in this field, the server key entered in the Add 
    TACACS+ Server page must match the encryption key used by the 
    TA C A C S +  s e r v e r.  
    If you enter both a key string here and a key string for an individual 
    TACACS+ server, the key string configured for the individual TACACS+ 
    server takes precedence.
    •Timeout for Reply—Enter the amount of time that passes before the 
    connection between the device and the TACACS+ server times out. If a 
    value is not entered in the Add TACACS+ Server page for a specific server, 
    the value is taken from this field. 
    						
    							Security
    Configuring TACACS+
    336 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
    18
    •Source IPv4 —(In Layer 3 system mode only) Select the device IPv4 
    source interface to be used in messages sent for communication with the 
    TA C A C S +  s e r v e r.  
    •Source IPv6 —(In Layer 3 system mode only) Select the device IPv6 
    source interface to be used in messages sent for communication with the 
    TA C A C S +  s e r v e r.  
    NOTEIf the Auto option is selected, the system takes the source IP address 
    from the IP address defined on the outgoing interface.
    STEP  4Click Apply. The TACACS+ default settings are added to the Running 
    Configuration file. These are used if the equivalent parameters are not defined in 
    the Add page.
    STEP  5To add a TACACS+ server, click Add.
    STEP  6Enter the parameters.
    •Server Definition—Select one of the following ways to identify the 
    TA C A C S +  s e r v e r :
    -By IP Address—If this is selected, enter the IP address of the server in 
    the Server IP Address/Name field.
    -By Name—If this is selected enter the name of the server in the Server IP 
    Address/Name field.
    •IP Version—Select the supported IP version of the source address: IPv6 or 
    IPv4. 
    •IPv6 Address Type—Select the IPv6 address type (if IPv6 is used). The 
    options are:
    -Link Local—The IPv6 address uniquely identifies hosts on a single 
    network link. A link local address has a prefix of FE80, is not routable, and 
    can be used for communication only on the local network. Only one link 
    local address is supported. If a link local address exists on the interface, 
    this entry replaces the address in the configuration.
    -Global—The IPv6 address is a global Unicast IPV6 type that is visible and 
    reachable from other networks.
    •Link Local Interface—Select the link local interface (if IPv6 Address Type 
    Link Local is selected) from the list. 
    •Server IP Address/Name—Enter the IP address or name of the TACACS+ 
    server. 
    						
    							Security
    Configuring TACACS+
    Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  337
    18
     
    •Priority—Enter the order in which this TACACS+ server is used. Zero is the 
    highest priority TACACS+ server and is the first server used. If it cannot 
    establish a session with the high priority server, the device tries the next 
    highest priority server. 
    •Source IP Address—(For SG500X devices and other devices in Layer 3 
    system mode). Select to use either the default device source address or one 
    of the available device IP addresses for communication with the TACACS+ 
    server.
    •Key String—Enter the default key string used for authenticating and 
    encrypting between the device and the TACACS+ server. This key must 
    match the key configured on the TACACS+ server. 
    A key string is used to encrypt communications by using MD5. You can 
    select the default key on the device, or the key can be entered in Encrypted 
    or Plaintext form. If you do not have an encrypted key string (from another 
    device), enter the key string in plaintext mode and click Apply. The 
    encrypted key string is generated and displayed.
    If you enter a key, this overrides the default key string if one has been 
    defined for the device on the main page.
    •Timeout for Reply—Enter the amount of time that passes before the 
    connection between the device and the TACACS+ server times out. Select 
    Use Default to use the default value displayed on the page.
    • IP Port—Enter the port number through which the TACACS+ session 
    occurs.
    •Single Connection—Select to enable receiving all information in a single 
    connection. If the TACACS+ server does not support this, the device reverts 
    to multiple connections.
    STEP  7To display sensitive data in plaintext form in the configuration file, click Display 
    Sensitive Data As Plaintext.
    STEP  8Click Apply. The TACACS+ server is added to the Running Configuration file of the 
    device. 
    						
    							Security
    Configuring RADIUS
    338 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
    18
    Configuring RADIUS
    Remote Authorization Dial-In User Service (RADIUS) servers provide a centralized 
    802.1X or MAC-based network access control. The device is a RADIUS client that 
    can use a RADIUS server to provide centralized security. 
    An organization can establish a Remote Authorization Dial-In User Service 
    (RADIUS) server to provide centralized 802.1X or MAC-based network access 
    control for all of its devices. In this way, authentication and authorization can be 
    handled on a single server for all devices in the organization.
    The device can act as a RADIUS client that uses the RADIUS server for the 
    following services:
    •Authentication—Provides authentication of regular and 802.1X users 
    logging onto the device by using usernames and user-defined passwords. 
    •Authorization—Performed at login. After the authentication session is 
    completed, an authorization session starts using the authenticated 
    username. The RADIUS server then checks user privileges.
    •Accounting—Enable accounting of login sessions using the RADIUS server. 
    This enables a system administrator to generate accounting reports from 
    the RADIUS server.
    Accounting Using a RADIUS Server
    The user can enable accounting of login sessions using a RADIUS server. 
    The user-configurable, TCP port used for RADIUS server accounting is the same 
    TCP port that is used for RADIUS server authentication and authorization.
    Defaults
    The following defaults are relevant to this feature:
    •No default RADIUS server is defined by default. 
    •If you configure a RADIUS server, the accounting feature is disabled by 
    default. 
    						
    							Security
    Configuring RADIUS
    Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  339
    18
     
    Interactions With Other Features
    You cannot enable accounting on both a RADIUS and TACACS+ server.
    Radius Workflow
    To user a RADIUS server, do the following:
    STEP 1Open an account for the device on the RADIUS server.
    STEP  2Configure that server along with the other parameters in the RADIUS and ADD 
    RADIUS Server pages.
    NOTEIf more than one RADIUS server has been configured, the device uses the 
    configured priorities of the available RADIUS servers to select the RADIUS server 
    to be used by the device.
    To set the RADIUS server parameters:
    STEP 1Click Security > RADIUS.
    STEP  2Enter the RADIUS Accounting option. The following options are available:
    •Port Based Access Control (802.1X, MAC Based, Web Authentication)—
    Specifies that the RADIUS server is used for 802.1x port accounting.
    •Management Access—Specifies that the RADIUS server is used for user 
    login accounting.
    •Both Port Based Access Control and Management Access—Specifies 
    that the RADIUS server is used for both user login accounting and 802.1x 
    port accounting.
    •None—Specifies that the RADIUS server is not used for accounting.
    STEP  3Enter the default RADIUS parameters if required. Values entered in the Default 
    Parameters are applied to all servers. If a value is not entered for a specific server 
    (in the Add RADIUS Server page) the device uses the values in these fields.
    •Retries—Enter the number of transmitted requests that are sent to the 
    RADIUS server before a failure is considered to have occurred. 
    •Timeout for Reply—Enter the number of seconds that the device waits for 
    an answer from the RADIUS server before retrying the query, or switching to 
    the next server.  
    						
    							Security
    Configuring RADIUS
    340 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
    18
    •Dead Time—Enter the number of minutes that elapse before a non-
    responsive RADIUS server is bypassed for service requests. If the value is 0, 
    the server is not bypassed. 
    •Key String—Enter the default key string used for authenticating and 
    encrypting between the device and the RADIUS server. This key must match 
    the key configured on the RADIUS server. A key string is used to encrypt 
    communications by using MD5. The key can be entered in Encrypted or 
    Plaintext form. If you do not have an encrypted key string (from another 
    device), enter the key string in plaintext mode and click Apply. The 
    encrypted key string is generated and displayed.
    This overrides the default key string if one has been defined.
    •Source IPv4 —(In Layer 3 system mode only) Select the device IPv4 source 
    interface to be used in messages for communication with the RADIUS 
    server. 
    •Source IPv6 —(In Layer 3 system mode only) Select the device IPv6 
    source interface to be used in messages for communication with the 
    RADIUS server. 
    NOTEIf the Auto option is selected, the system takes the source IP address 
    from the IP address defined on the outgoing interface.
    STEP  4Click Apply. The RADIUS default settings for the device are updated in the 
    Running Configuration file.
    To add a RADIUS server, click Add.
    STEP  5Enter the values in the fields for each RADIUS server. To use the default values 
    entered in the RADIUS page, select Use Default. 
    •Server Definition—Select whether to specify the RADIUS server by 
    IP address or name.
    •IP Version—Select the version of the IP address of the RADIUS server. 
    •IPv6 Address Type—Displays that IPv6 address type is Global. 
    •IPv6 Address Type—Select the IPv6 address type (if IPv6 is used). The 
    options are:
    -Link Local—The IPv6 address uniquely identifies hosts on a single 
    network link. A link local address has a prefix of FE80, is not routable, and 
    can be used for communication only on the local network. Only one link 
    local address is supported. If a link local address exists on the interface, 
    this entry replaces the address in the configuration. 
    						
    							Security
    Configuring RADIUS
    Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  341
    18
     
    -Global—The IPv6 address is a global Unicast IPV6 type that is visible and 
    reachable from other networks.
    •Link Local Interface—Select the link local interface (if IPv6 Address Type 
    Link Local is selected) from the list. 
    •Server IP Address/Name—Enter the RADIUS server by IP address or 
    name.
    •Priority—Enter the priority of the server. The priority determines the order 
    the device attempts to contact the servers to authenticate a user. The device 
    starts with the highest priority RADIUS server first. Zero is the highest 
    priority.
    Key String—Enter the key string used for authenticating and encrypting 
    communication between the device and the RADIUS server. This key must 
    match the key configured on the RADIUS server. It can be entered in 
    Encrypted or Plaintext format . If Use Default is selected, the device 
    attempts to authenticate to the RADIUS server by using the default Key 
    String.
    •Timeout for Reply—Enter the number of seconds the device waits for an 
    answer from the RADIUS server before retrying the query, or switching to the 
    next server if the maximum number of retries were made. If Use Default is 
    selected, the device uses the default timeout value.
    •Authentication Port—Enter the UDP port number of the RADIUS server port 
    for authentication requests.
    •Accounting Port—Enter the UDP port number of the RADIUS server port for 
    accounting requests.
    •Retries—Enter the number of requests that are sent to the RADIUS server 
    before a failure is considered to have occurred. If Use Default is selected, the 
    device uses the default value for the number of retries.
    •Dead Time—Enter the number of minutes that must pass before a non-
    responsive RADIUS server is bypassed for service requests. If Use Default 
    is selected, the device uses the default value for the dead time. If you enter 
    0 minutes, there is no dead time.
    •Usage Type—Enter the RADIUS server authentication type. The options are: 
    -Lo gin—RADIUS server is used for authenticating users that ask to 
    administer the device.
    -802.1X—RADIUS server is used for 802.1x authentication. 
    						
    							Security
    Management Access Method
    342 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
    18
    -All—RADIUS server is used for authenticating user that ask to administer 
    the device and for 802.1X authentication.
    STEP  6To display sensitive data in plaintext form in the configuration file, click Display 
    Sensitive Data As Plaintext.
    STEP  7Click Apply. The RADIUS server definition is added to the Running Configuration 
    file of the device.
    Management Access Method
    Access profiles determine how to authenticate and authorize users accessing the 
    device through various access methods. Access Profiles can limit management 
    access from specific sources.
    Only users who pass both the active access profile and the management access 
    authentication methods are given management access to the device.
    There can only be a single access profile active on the device at one time.
    Access profiles consist of one or more rules. The rules are executed in order of 
    their priority within the access profile (top to bottom).
    Rules are composed of filters that include the following elements:
    •Access Methods—Methods for accessing and managing the device:
    -Te l n e t
    -Secure Telnet (SSH)
    -Hypertext Transfer Protocol (HTTP)
    -Secure HTTP (HTTPS)
    -Simple Network Management Protocol (SNMP)
    -All of the above
    •Action—Permit or deny access to an interface or source address.
    •Interface—Which ports, LAGs, or VLANs are permitted to access or are 
    denied access to the web-based configuration utility. 
    						
    							Security
    Management Access Method
    Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  343
    18
     
    •Source IP Address—IP addresses or subnets. Access to management 
    methods might differ among user groups. For example, one user group 
    might be able to access the device module only by using an HTTPS 
    session, while another user group might be able to access the device 
    module by using both HTTPS and Telnet sessions.
    Active Access Profile
    The Access Profiles page displays the access profiles that are defined and 
    enables selecting one access profile to be the active one.
    When a user attempts to access the device through an access method, the device 
    looks to see if the active access profile explicitly permits management access to 
    the device through this method. If no match is found, access is denied.
    When an attempt to access the device is in violation of the active access profile, 
    the device generates a SYSLOG message to alert the system administrator of the 
    attempt.
    If a console-only access profile has been activated, the only way to deactivate it is 
    through a direct connection from the management station to the physical console 
    port on the device.
    For more information see Defining Profile Rules.
    Use the Access Profiles page to create an access profile and to add its first rule. If 
    the access profile only contains a single rule, you are finished. To add additional 
    rules to the profile, use the Profile Rules page.
    STEP 1Click Security > Mgmt Access Method > Access Profiles.
    This page displays all of the access profiles, active and inactive.
    STEP  2To change the active access profile, select a profile from the Active Access 
    Profile drop down menu and click Apply. This makes the chosen profile the active 
    access profile. 
    NOTEA caution message appears if you selected Console Only. If you 
    continue, you are immediately disconnected from the web-based 
    configuration utility and can access the device only through the console 
    port. This only applies to device types that offer a console port. 
    						
    All Cisco manuals Comments (0)

    Related Manuals for Cisco Sg3008 Manual