Skip to:Content
|
Bottom
Cover image for Cisco access control security : AAA administrative services
Title:
Cisco access control security : AAA administrative services
Personal Author:
Series:
Networking technology series
Publication Information:
Indianapolis, IN : Cisco Press, 2004
ISBN:
9781587051241

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010105247 QA76.3 C374 2004 Open Access Book Book
Searching...

On Order

Summary

Summary

Provides you with the skills needed to configure authentication, authorization, and accounting (AAA) services on Cisco devices. Divided into three parts, this book presents configuration details of centralized identity networking solutions. It also provides an overview of the AAA architecture, with discussions of configuring Cisco routers for AAA.


Author Notes

Brandon J. Carroll is a certified Cisco Systems instructor with Ascolta Training Company


Table of Contents

Introductionp. xx
Part I AAA Overviewp. 3
Chapter 1 Authentication, Authorization, and Accounting Overviewp. 5
Authentication Overviewp. 6
Authentication Examplep. 7
Authorization Overviewp. 8
Authorization Examplep. 9
Accounting Overviewp. 10
Accounting Examplep. 12
Cisco Device Support for AAAp. 12
Summaryp. 13
End Notesp. 13
Chapter 2 TACACS+ and RADIUSp. 15
A Brief Overview of TACACS+p. 15
A Brief Overview of RADIUSp. 16
TACACS+ in Detailp. 16
RADIUS in Detailp. 42
Summaryp. 49
End Notesp. 50
Chapter 3 Authentication Configuration on Cisco Routersp. 53
Local Authenticationp. 53
Authentication Configurations Using Cisco Secure ACS for Windows Server and Cisco Secure ACS Solution Enginep. 59
Debugging Authenticationp. 59
Authentication Command Referencesp. 61
Summaryp. 61
Part II Enterprise AAA and Cisco Secure Access Control Serverp. 63
Chapter 4 Enterprise Authentication Serversp. 65
Cisco Secure Access Control Server Software and Versionsp. 65
Cisco Secure Solution Enginep. 71
Summaryp. 72
Chapter 5 Deploying Cisco Secure Access Control Server for Windows Serverp. 75
What Is ACS?p. 75
How to Obtain ACSp. 76
Requirements to Run ACS Version 3.2p. 76
Installing ACSp. 77
Reinstalling ACS and Using an Existing ACS Databasep. 81
Positioning ACS in Your Networkp. 81
Summaryp. 86
Chapter 6 Getting Familiar with CSACSp. 89
Navigating the HTML Interfacep. 89
Starting Point for Configuring Your Serverp. 107
Configuring Your Interfacep. 111
Preparing to Add Usersp. 114
Summaryp. 117
Chapter 7 Configuring User Accountsp. 119
Adding Users to the Databasep. 119
User Changeable Passwordsp. 123
Authenticating Users to a Windows NT/2000 Databasep. 132
Advanced Configurationsp. 138
Summaryp. 143
End Notesp. 143
Chapter 8 Configuring User Groupsp. 147
Group-Level Configuration of ACSp. 147
PPP Callback Configurationp. 154
Configuring Network Access Restrictionsp. 155
Max Sessions, Usage Quotas, and Password Aging Rulesp. 160
IP Assignment and Downloadable ACLsp. 162
Using TACACS+ for Group Configurationp. 169
Summaryp. 184
End Notesp. 185
Chapter 9 Managing Network Configurationsp. 187
Configuring a Distributed Systemp. 187
Configuring Network Device Groupsp. 191
Configuring Proxy Distribution Tablesp. 194
Using Remote Accountingp. 201
Using Network Device Searchesp. 202
Creating a Complete Distributed Networkp. 205
Client Configurationp. 208
Troubleshooting Network Configurationsp. 214
Summaryp. 215
Chapter 10 Configuring Shared Profile Componentsp. 217
Downloadable ACLsp. 218
Network Access Restrictionsp. 221
Configuring Network Access Restrictionsp. 223
Command Authorization Setsp. 228
Troubleshooting Extended Configurationsp. 237
Common Issues of Network Access Restrictionsp. 240
And Do Not Forget the Importance of Documentationp. 240
Summaryp. 241
Chapter 11 System Configurationp. 243
How Users Interact with Your External Database Configurationp. 243
External Database Configurationp. 244
Database Group Mappingsp. 271
Unknown User Policyp. 272
Database Replicationp. 272
Synchronization of ACS Devicesp. 277
Summaryp. 281
End Notesp. 281
Chapter 12 Reports and Logging for Windows Serverp. 283
ACS Reportsp. 283
Logging Attributes in ACS Reportsp. 285
ACS Reportsp. 293
Remote Logging with ACSp. 308
Additional Logs Maintained by ACSp. 312
Summaryp. 315
Chapter 13 Exploring TACACS+ Attribute Valuesp. 317
TACACS+ AV Pairs Overviewp. 317
Attributes of TACACS+ AV Pairsp. 318
AV Pair Example PPP Networkp. 325
Understanding TACACS+ AV Pairs in the ACS Interfacep. 330
Summaryp. 335
Part III Service Provider AAA and the Cisco Access Registrarp. 339
Chapter 14 Service Provider AAA and the Cisco CNS Access Registrarp. 341
Service Provider (SP) Modelp. 341
Service Provider Challengep. 341
Value Added Servicesp. 342
Cisco CNS Access Registrarp. 342
Options of ARp. 343
AR's Architecturep. 344
Installation Requirements for AR on Solaris 8p. 352
Installing ARp. 354
AR's Subdirectoriesp. 357
Configuring Cisco CNS ARp. 358
Summaryp. 359
End Notesp. 360
Chapter 15 Configuring the Cisco Access Registrarp. 363
Using aregcmd to Configure ARp. 363
AR's Server Object Hierarchyp. 367
Configuring the ACE ISP as a Basic Sitep. 369
Configuring AR's Administratorsp. 370
Configuring the RADIUS Serverp. 371
Validating and Saving Your Changes to ARp. 381
Testing Your Configurationp. 382
Troubleshooting Your Configuration with tracep. 383
Summaryp. 385
End Notesp. 385
Part IV Appendixp. 387
Appendix A RADIUS Attribute Tablesp. 389
Indexp. 419
Go to:Top of Page