cc/td/doc/product/access/acs_soft
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

NAS Configuration Examples

NAS Configuration Examples

This appendix provides examples you can apply directly to your own CiscoSecure access control server (ACS). Use the information here to help you configure your CiscoSecure ACS and Cisco network access server (NAS) for:

Configuring Your CiscoSecure ACS and Cisco NAS for RADIUS

Because the CiscoSecure ACS supports the RADIUS protocol, you can configure your network access server for RADIUS and achieve the same, or equivalent, security services as with the TACACS+ protocol.

The sample configuration that follows might be a typical configuration for an ISP with an existing RADIUS installation. In this sample configuration, the Cisco AS5200 can use the same authentication and accounting servers as other vendors' equipment. The result is uniform authentication, authorization, and accounting services, which in turn provides centralized user management as well as accounting records necessary for billing.

You can enter the following sample configuration directly into your NAS to immediately enable the CiscoSecure ACS for RADIUS-based security services.

Current configuration:
!
version 11.1
service udp-small-servers
service tcp-small-servers
!
hostname isdn-14
!
aaa new-model
aaa authentication login default none
aaa authentication login console line
aaa authentication login secure radius local
aaa authentication login vty line
aaa authentication ppp default none
aaa authentication ppp secure if-needed radius local
aaa authorization exec radius
aaa authorization network radius
aaa accounting exec start-stop radius
aaa accounting network start-stop radius
!
username backup password radiusISdown
ip radius source-interface Ethernet0
rlogin trusted-remoteuser-source local
rlogin trusted-localuser-source radius
isdn switch-type primary-5ess
!
controller T1 0
 framing esf
 clock source line primary
 linecode b8zs
 pri-group timeslots 1-24
!
controller T1 1
 framing esf
 clock source line secondary
 linecode b8zs
 pri-group timeslots 1-24
!
interface Loopback0
 ip address 171.68.187.254 255.255.255.0
!
interface Ethernet0
 ip address 172.16.25.15 255.255.255.224
!
interface Serial0
 no ip address
 shutdown
!
interface Serial1
 no ip address
 shutdown
!
interface Serial0:23
 ip unnumbered Loopback0
 encapsulation ppp
 isdn incoming-voice modem
 peer default ip address pool default
 dialer rotary-group 1
 dialer-group 1
!
interface Serial1:23
 ip unnumbered Loopback0
 encapsulation ppp
 isdn incoming-voice modem
 peer default ip address pool default
 dialer rotary-group 1
 dialer-group 1
!
interface Group-Async1
 ip unnumbered Loopback0
 ip tcp header-compression passive
 encapsulation ppp
 async mode interactive
 peer default ip address pool default
 dialer-group 1
 ppp authentication chap pap secure
 group-range 1 48
!
interface Dialer1
 ip unnumbered Loopback0
 encapsulation ppp
 peer default ip address pool default
 ppp multilink
 ppp authentication chap pap secure
 dialer-group 1
!
ip local pool default 171.68.187.1 171.68.187.48
ip domain-name cisco.com
ip name-server 171.68.10.70
no ip classless
async-bootp dns-server 171.68.10.70
!
radius-server host 172.16.72.41
radius-server host 172.16.72.42
radius-server timeout 3
radius-server key MYSECRET
!
dialer-list 1 protocol ip permit
!
line con 0
 login authentication console
 password cisco
line 1 48
 session-timeout 15  output
 autoselect during-login
 autoselect ppp
 login authentication secure
 modem InOut
 transport input all
line aux 0
line vty 0 4
 login authentication vty
 password secret
!
end

Configuring Your CiscoSecure ACS and Cisco NAS for Lock and Key

An improved security solution starting with Cisco IOS Release 11.1 software is the Lock and Key Security feature (see Figure D-1). Lock and Key security defines dynamic access lists that grant access per user, on a specific source/destination host basis through a user authentication process.

In essence, you can allow user access through a firewall dynamically, without compromising security restrictions. When a user tries to log in, the CiscoSecure ACS runs the access-enable command. Provided that the user is in an access list, this command uses a configuration template to open a hole in the firewall.


Figure D-1: Lock and Key with CiscoSecure ACS

Lock and Key security is activated after the user has been authenticated by the network's CiscoSecure ACS. The NAS is the authentication mechanism and is responsible for altering the access list for the incoming interface to enable the privileges allowed to that user.

In a typical environment, Lock and Key security puts in place an access control list (ACL) that filters all traffic until the remote user has authenticated with the security mechanism. After authentication, a remote host can then execute a Telnet session and open the corporate site firewall. Until such time, the firewall is configured to disallow all traffic except Telnet.

In this manner, no ACLs exist for any port, except for the Telnet ACL. Until the remote user authenticates, access is denied on the port. After authentication, a specific ACL is put in place, for that port only, that allows the authenticating of user/network access beyond the firewall.

Caution Lock and Key security allows an external event to place an opening in the firewall. After this opening is placed, the router is susceptible to source address spoofing. To prevent this, you need to provide encryption support using IP authentication or encryption.

You can enter the following sample configuration to immediately enable Lock and Key with the CiscoSecure ACS. The sample configuration enables Lock and Key functionality on a Cisco 2511. Depending on your NAS and network topology, you might have to modify this sample configuration slightly to meet your exact needs.

NAS "delta" configuration
=========================
! simple tacacs+ configuration. You need EXEC authorization to execute
! the autocommand configured for the user
!
aaa new-model
aaa authentication login default tacacs+
aaa authorization exec tacacs+
!
tacacs-server host 10.10.1.200
tacacs-server key secret
!
! Now configure the access-list. The fixed access list should deny
! traffic except for telnet to the router itself and deny everything
! else. The dynamic part of the access-list determines what access
! the user will have after they have authenticated themselves. In
! this case, the user will have full IP access after authentication.
!
access-list 101 permit tcp any host 10.10.1.254 eq telnet
access-list 101 dynamic temp permit ip any any
!
! Now apply the access-list inbound to the dial-up interfaces
!
int s0:23
 ip access-group 101 in
CiscoSecure database
================
# match keys with the NAS
key = "secret"
# definition of the lock&key user
user = unlockme {
	# his LOGIN password
        password = clear "key"
	# define user's EXEC authorization profile
	service = exec {
		# this will unlock the access-list for
		# the user for 15 minutes
                set autocmd = "access-enable 15"
	}
}
Full NAS configuration
======================
DEMO1#wr t
Building configuration...
 
Current configuration:
!
version 11.1
service udp-small-servers
service tcp-small-servers
!
hostname Router
!
aaa new-model
aaa authentication login default tacacs+
aaa authorization exec tacacs+
!
interface Ethernet0
 ip address 10.10.1.254 255.255.255.0
!
interface Serial0:23
 ip address 10.10.2.254 255.255.255.0
 ip access-group 101 in
 encapsulation ppp
 dialer map ip 10.10.2.1 name cisco-1004 broadcast
 dialer-group 1
 ppp authentication chap
!
access-list 101 permit tcp any host 10.10.2.254 eq telnet
access-list 101 dynamic temp permit ip any any
tacacs-server host 10.10.1.200
tacacs-server key secret
!
line con 0
line aux 0
line vty 0 4
!
  end

Configuring the CiscoSecure ACS for Remote Node IP and IPX Dialup

In this next example (see Figure D-2), a remote node dials in to a NAS, authenticates by means of the CiscoSecure ACS, and ultimately is authorized on the protected network.


Figure D-2: Address Scheme for Routers Dialing in to the Cisco AS5200

You can enter the following sample configuration directly into your NAS to immediately enable the CiscoSecure ACS for remote node IP and IPX dialup. Depending on your NAS and network topology, you might have to adapt this sample configuration slightly to meet your exact needs.

Remote Node IP and IPX Dial-Up Configuration:
!
version 11.1
service udp-small-servers
service tcp-small-servers
!
hostname AS5200
!
aaa new-model
aaa authentication login default tacacs+ enable
aaa authentication ppp default if-needed tacacs+
aaa authorization exec
aaa authorization network
aaa accounting exec start-stop tacacs+
aaa accounting network start-stop tacacs+
!
isdn switch-type primary-5ess
!
ipx routing
!
controller T1 0
 framing esf
 clock source line primary
 linecode b8zs
 pri-group timeslots 1-24
!
controller T1 1
 framing esf
 clock source line secondary
 linecode b8zs
 pri-group timeslots 1-24
!
interface Loopback0
 ip address 10.10.2.254 255.255.255.0
 ipx network AAAA
 ipx sap-interval 0
!
interface Ethernet0
 ip address 10.10.1.254 255.255.255.0
 ipx network BBBB
!
interface Serial0
 no ip address
 shutdown
!
interface Serial1
 no ip address
 shutdown
!
interface Serial0:23
 ip unnumbered Loopback0
 encapsulation ppp
 isdn incoming-voice modem
 ipx ppp-client Loopback0
 peer default ip address pool default
 dialer rotary-group 1
 dialer-group 1
!
interface Serial1:23
 ip unnumbered Loopback0
 encapsulation ppp
 isdn incoming-voice modem
 ipx ppp-client Loopback0
 peer default ip address pool default
 dialer rotary-group 1
 dialer-group 1
!
interface Group-Async1
 ip unnumbered Loopback0
 ip tcp header-compression passive
 encapsulation ppp
 async mode interactive
 ipx ppp-client Loopback0
 peer default ip address pool default
 dialer-group 1
 no cdp enable
 ppp authentication chap pap
 group-range 1 48
!
interface Dialer1
 ip unnumbered Loopback0
 encapsulation ppp
 ipx ppp-client Loopback0
 peer default ip address pool default
 dialer-group 1
 ppp multilink
 ppp authentication chap pap
!
tacacs-server host 10.10.1.200
tacacs-server key secret
ip local pool default 10.10.2.1 10.10.2.48
!
ipx router rip
 no network AAAA
!
dialer-list 1 protocol ip permit
dialer-list 1 protocol ipx permit
!
line con 0
line 1 48
 autoselect during-login
 autoselect ppp
 login local
 modem InOut
 modem autoconfigure type microcom_hdms
 transport input all
 stopbits 1
 rxspeed 115200
 txspeed 115200
 flowcontrol hardware
line aux 0
line vty 0 4
!
end

Configuring Your CiscoSecure ACS for ISDN Dialup to a Cisco AS5200

You can enter the following sample configuration directly into your NAS to immediately enable CiscoSecure ACS for ISDN dialup to a Cisco AS5200. (See Figure D-3.)


Figure D-3:

ISDN Dialup to a Cisco AS5200

Depending on your NAS and network topology, you might have to adapt this sample configuration slightly to meet your exact needs.

Current configuration:
!
version 11.1
service udp-small-servers
service tcp-small-servers
!
hostname AS5200
!
aaa new-model
aaa authentication login default tacacs+ enable
aaa authentication ppp default if-needed tacacs+
aaa authorization exec
aaa authorization network
aaa accounting exec start-stop tacacs+
aaa accounting network start-stop tacacs+
!
isdn switch-type primary-5ess
!
ipx routing
!
controller T1 0
 framing esf
 clock source line primary
 linecode b8zs
 pri-group timeslots 1-24
!
controller T1 1
 framing esf
 clock source line secondary
 linecode b8zs
 pri-group timeslots 1-24
!
interface Loopback0
 ip address 10.10.2.254 255.255.255.0
 ipx network AAAA
 ipx sap-interval 0
!
interface Ethernet0
 ip address 10.10.1.254 255.255.255.0
 ipx network BBBB
!
interface Serial0
 no ip address
 shutdown
!
interface Serial1
 no ip address
 shutdown
!
interface Serial0:23
 ip unnumbered Loopback0
 encapsulation ppp
 isdn incoming-voice modem
 ipx ppp-client Loopback0
 peer default ip address pool default
 dialer rotary-group 1
 dialer-group 1
!
interface Serial1:23
 ip unnumbered Loopback0
 encapsulation ppp
 isdn incoming-voice modem
 ipx ppp-client Loopback0
 peer default ip address pool default
 dialer rotary-group 1
 dialer-group 1
!
interface Group-Async1
 ip unnumbered Loopback0
 ip tcp header-compression passive
 encapsulation ppp
 async mode interactive
 ipx ppp-client Loopback0
 peer default ip address pool default
 dialer-group 1
 no cdp enable
 ppp authentication chap pap
 group-range 1 48
!
interface Dialer1
 ip unnumbered Loopback0
 encapsulation ppp
 ipx ppp-client Loopback0
 peer default ip address pool default
 dialer-group 1
 ppp multilink
 ppp authentication chap pap
!
tacacs-server host 10.10.1.200
tacacs-server key secret
ip local pool default 10.10.2.1 10.10.2.48
!
ipx router rip
 no network AAAA
!
dialer-list 1 protocol ip permit
dialer-list 1 protocol ipx permit
!
line con 0
line 1 48
 autoselect during-login
 autoselect ppp
 login local
 modem InOut
 modem autoconfigure type microcom_hdms
 transport input all
 stopbits 1
 rxspeed 115200
 txspeed 115200
 flowcontrol hardware
line aux 0
line vty 0 4
!
end

Configuring CiscoSecure ACS for Remote Node IP Dialup

You can enter the following sample configuration directly into your NAS to immediately enable the CiscoSecure ACS for remote node IP dialup. (See Figure D-4.)


Figure D-4: Remote Node IP Dialup

Depending on your NAS and network topology, you might have to adapt this sample configuration slightly to meet your exact needs.

Current configuration:
!
version 11.1
service udp-small-servers
service tcp-small-servers
!
hostname AS5200
!
aaa new-model
aaa authentication login default tacacs+ enable
aaa authentication ppp default if-needed tacacs+
aaa authorization exec
aaa authorization network
aaa accounting exec start-stop tacacs+
aaa accounting network start-stop tacacs+
!
isdn switch-type primary-5ess
!
controller T1 0
 framing esf
 clock source line primary
 linecode b8zs
 pri-group timeslots 1-24
!
controller T1 1
 framing esf
 clock source line secondary
 linecode b8zs
 pri-group timeslots 1-24
!
interface Ethernet0
 ip address 10.10.1.254 255.255.255.0
!
interface Serial0
 no ip address
 shutdown
!
interface Serial1
 no ip address
 shutdown
!
interface Serial0:23
 ip unnumbered Ethernet0
 encapsulation ppp
 isdn incoming-voice modem
 peer default ip address pool default
 dialer rotary-group 1
 dialer-group 1
!
interface Serial1:23
 ip unnumbered Ethernet0
 encapsulation ppp
 isdn incoming-voice modem
 peer default ip address pool default
 dialer rotary-group 1
 dialer-group 1
!
interface Group-Async1
 ip unnumbered Ethernet0
 ip tcp header-compression passive
 encapsulation ppp
 async mode interactive
 peer default ip address pool default
 dialer-group 1
 no cdp enable
 ppp authentication chap pap
 group-range 1 48
!
interface Dialer1
 ip unnumbered Ethernet0
 encapsulation ppp
 peer default ip address pool default
 dialer-group 1
 ppp multilink
 ppp authentication chap pap
!
tacacs-server host 10.10.1.200
tacacs-server key secret
ip local pool default 10.10.1.1 10.10.1.48
!
dialer-list 1 protocol ip permit
!
line con 0
 exec-timeout 0 0
line 1 48
 autoselect during-login
 autoselect ppp
 login local
 modem InOut
 modem autoconfigure type microcom_hdms
 transport input all
 stopbits 1
 rxspeed 115200
 txspeed 115200
 flowcontrol hardware
line aux 0
line vty 0 4
!
end

hometocprevnextglossaryfeedbacksearchhelp
Copyright 1989-1997 © Cisco Systems Inc.