cc/td/doc/product/access/acs_soft
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Introduction to the CiscoSecure ACS Software

Introduction to the CiscoSecure ACS Software

This chapter contains an overview of the CiscoSecure Access Control Server (ACS) 2.1.2 for UNIX (Solaris) software, defines package contents and system requirements, describes features of the software, and provides general information on network security.

Overview of CiscoSecure ACS

The CiscoSecure ACS software is designed to help ensure the security of your network and track the activity of people who successfully connect to your network. The CiscoSecure ACS software uses either the Terminal Access Controller Access Control System (TACACS)+ or the Remote Authentication Dial-In User Service (RADIUS) protocol to provide this network security and tracking.

The CiscoSecure ACS uses Authentication, Authorization, and Accounting (AAA) to provide network security. Each facet of AAA significantly contributes to the overall security of your network:

The CiscoSecure ACS Network Architecture

The CiscoSecure ACS sits on a network that dial-in users and other types of outside users access through a network access server (NAS).


Figure 1-1: Overview of CiscoSecure ACS Configuration



As users log in through the NAS, the CiscoSecure ACS exchanges data and instructions with the NAS, authenticating and authorizing users on the basis of user and group profiles that are stored in either a local or network database. After the CiscoSecure ACS software authenticates and authorizes users for the proper level of network access, it tracks individual user access and stores this information in a database where it can later be retrieved for accounting or analyzing network use.

System administrators authorized to manage the CiscoSecure ACS do so from a network workstation through the web-based CiscoSecure Administrator program.

Users can be granted access to a web-based CiscoSecure User Access program, through which they can change their login passwords.

You can configure the CiscoSecure ACS software to work in conjunction with token card servers and PIX firewall servers.

CiscoSecure ACS Flexibility and Scalability

The CiscoSecure ACS is designed to provide for easy expansion of AAA services in a NAS. It uses relational enterprise databases, allowing an environment in which any number of CiscoSecure ACSes can be distributed among many locations.

For example, if you have multiple main points of presence (POPs), each POP can use its own CiscoSecure ACS. The distributed databases provide the necessary replication of data among the CiscoSecure ACSes. This solution allows for redundancy, user-entry scalability, and performance scalability.

Redundancy

The NAS at each POP can always use its local CiscoSecure ACS as the primary server. The scalable architecture of the CiscoSecure ACS provides that, in the event a NAS is unable to use its primary server, the NAS can also point to two other backup CiscoSecure ACSs. This helps to ensure continuous availability of network resources.

Network-Wide, Web-Based Management

CiscoSecure ACS uses an Administrator program. This interface allows multiple administrators to add users to CiscoSecure ACS. CiscoSecure ACS provides record locking so that only one administrator at a time can modify user information.

Using the CiscoSecure ACS software saves memory in all the access devices and eliminates the need to update every NAS when new users are added, authorization is modified, or users change their passwords.

User Group Scalability

The CiscoSecure ACS supports user group profiles. This feature allows you to define a group with a set of attributes based on your security policy. When you add a user to that group (defining the user's password in the process), the new user is automatically assigned the attributes for the group. This dramatically simplifies the process of adding a user and makes your security easy to enforce and modify.

Performance Scalability

The distributed architecture of the CiscoSecure ACS allows you to scale your performance. In a network with multiple POPs, each CiscoSecure ACS supports a primary POP. In a distributed architecture, authentications per second are multiplied by the number of CiscoSecure ACSes in the network. That is, if the performance of CiscoSecure ACS is X authentications per second, when you use 10 CiscoSecure ACSs, you'll achieve 10X authentications per second.

Database Options

The CiscoSecure ACS supports the following database options for storing group and user profiles and accounting information:

The CiscoSecure ACS includes SQLAnywhere from Sybase. Although this version of the database does not have client/server support, it is optimized to perform the essential AAA services with the CiscoSecure ACS. See the section "Gathering the Installation Information" in the chapter "Preparing to Install the CiscoSecure ACS Software."
In addition to SQLAnywhere, the CiscoSecure ACS supports two other databases: Oracle version 7.3.2 or above and Sybase SQL Server version 11 or above. See the section "Gathering the Installation Information" in the chapter "Preparing to Install the CiscoSecure ACS Software."
If you are using a RADIUS server, you can convert your database for use with this version of theCiscoSecure ACS. See the appendix "Converting an Existing AA Database to a CiscoSecure ACS 2.1 Database."

Upgrade Options

The CiscoSecure ACS supports the following upgrade options:

If you are using the database included with CiscoSecure ACS 1.x, you can import your 1.0x user database into the CiscoSecure ACS relational database management system (RDBMS). See the appendix, "Converting an Existing AA Database to a CiscoSecure ACS 2.1 Database."
If you are using CiscoSecure ACS 2.x, your database will be supported in this version of CiscoSecure ACS when you install the new version.

Package Contents

The CiscoSecure ACS package includes the following items:

System Requirements

The CiscoSecure ACS requires the hardware and software specified in the following sections.

Hardware Requirements

The CiscoSecure ACS requires the following hardware:

Workstation Requirements

Requirements for the workstation on which the web-based interface for the CiscoSecure ACS is run depend on your web browser and operating system. See your manufacturer's documentation. Workstations normally require:

Software Requirements

The SPARCstation-based CiscoSecure ACS requires:

Caution Do not use a browser that is not specifically listed in the release notes or readme.txt file as being supported.

Licensing

The CiscoSecure ACS software is licensed per server. That is, each CiscoSecure ACS requires its own license. You can also use a backup server license to allow sites to run redundant systems to back up system security and accounting information. For details on setting up licensing on your CiscoSecure ACS, see the chapter "Preparing to Install the CiscoSecure ACS Software."

Standards and Specifications

The CiscoSecure ACS software conforms to the following standards and specifications:

The CiscoSecure ACS software conforms to the TACACS+ protocol as defined by Cisco Systems. See your Cisco IOS software documentation for more information.
The CiscoSecure ACS software conforms to the RADIUS protocol as defined in the following RFCs:

  • RFC2139, Remote Authentication Dial In User Service

  • RFC2139, RADIUS Accounting

Basic CiscoSecure ACS Concepts

To run CiscoSecure, the CiscoSecure ACS network must include these hardware and software elements:

Figure 1-2 shows a typical configuration.


Figure 1-2: Overview of Typical CiscoSecure ACS Configuration



In this example, the NAS, CiscoSecure ACS, external relational database, web browser workstation, and token card server are interconnected. With the appropriate authorization, the CiscoSecure ACS can be managed from any computer on the network running a supported web browser.

CiscoSecure ACS software uses group-and-user information stored in a relational database for Authentication, Authorization, and Accounting. This database is known as the AAA database.

CiscoSecure ACS and the NAS

The CiscoSecure ACS software does the actual work of verifying Authentication, Authorization, and Accounting (AAA), and responds to the NAS for access requests by users outside the LAN. Using the TACACS+ or RADIUS protocol, the NAS sends authentication requests to the CiscoSecure ACS, which then verifies the username and password and returns a success or failure response to the NAS.

When the user has been authenticated, a set of session attributes can be sent to the NAS to provide additional security. These attributes can include per-user access lists, specific services that can be used, and session timeout values.

Figure 1-3 illustrates a scenario in which the process of AAA is performed by the NAS and the CiscoSecure ACS.


Figure 1-3: AAA from the NAS to the CiscoSecure ACS



TACACS+ and RADIUS Protocol Support

TACACS+ and RADIUS are AAA protocols through which the NAS and the CiscoSecure ACS communicate. You can configure CiscoSecure to support the TACACS+ protocol, the RADIUS protocol, or both. Which protocol combination you enable may depend on the set of AAA features that you want to support. The following table lists the AAA features supported by the two protocols.


Table  1-1: Protocol-Supported AAA Features

AAA Feature TACACS+ Support RADIUS Support
Web-based administration Yes Yes
Encrypted password transactions Yes Yes
Solaris 2.5 or greater support Yes Yes
Option to disable accounts after failed login attempt count exceeded Yes Yes
User group membership support Yes Yes
Accounting support Yes Yes
S/Key authentication support Yes Yes
Option to specify maximum sessions per user Yes Yes
Support for use of common token card servers (CRYPTOCard, Secure Computing, and Security Dynamics, Inc. [SDI]) Yes Yes
Password aging and configurable warning period Yes No
Allow/refuse option for remote addresses Yes No
Option to change user passwords or reject passwords not meeting security requirements Yes No
Language configurable message catalogs Yes No
Option for a single TCP connection between the NAS and the CiscoSecure ACS Yes No
Permit/deny control for X.121 addresses (on a network-wide basis) Yes No
Permit/deny control for X.121 addresses (on a NAS-by-NAS basis) Yes Yes

Dictionaries for the RADIUS Protocol

To support the use of RADIUS protocols, CiscoSecure supplies RADIUS protocol "dictionaries" that support the sets of "Attribute-Value pairs" for commonly-used versions of the RADIUS protocol. CiscoSecure supplies separate dictionaries to support the attribute sets supported by Cisco IOS Release 11.2, Ascend, and the IETF-RADIUS specification.

Using the CiscoSecure Administrator, you can customize a dictionary's attribute set to suit the access control attributes your NAS is configured to support and assign this dictionary to a group profile or user profile. When users fitting this profile log in through the NAS, the CiscoSecure ACS and the NAS communicate through the RADIUS protocol, using the attributes specified in the customized dictionary to determine the authentication and authorization of the new user, and also store user accounting information.

CiscoSecure ACS Web-Based Interface

The CiscoSecure web interface enables you to use Netscape Navigator or Microsoft Explorer to easily set up and modify the authorization and authentication parameters of any group or user on your network. You can assign users to groups that have a set of common configuration parameters. You can then further modify the parameters for each individual user. The CiscoSecure Administrator web interface provides a point-and-click interface to administer the user database. See the chapter "Managing User Authentication and Authorization."

Three Components of Network Security

To maintain reliability and security in your network, the AAA features of the CiscoSecure ACS software help you monitor and control:

Authentication

Authentication allows network managers to bar intruders from their networks. Simple authentication methods use a database of usernames and passwords, while more complex methods use one-time passwords (OTP).

CiscoSecure ACS software uses the TACACS+ and/or RADIUS protocol to authenticate users who dial in to accept usernames or password information sent to a NAS by different protocols such as the AppleTalk Remote Access Protocol (ARAP), Serial Line Internet Protocol (SLIP), Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), and standard Telnet. This broad protocol support provides flexibility for network administrators to define the same or different usernames and passwords for different protocols.

CiscoSecure ACS software supports the following password management features:

Authorization

Authorization lets network managers limit the network services available to each user and helps restrict access to the internal network to outside callers. It also lets mobile users connect to the closest local connection and still have the same access privileges they would have if they were directly connected to their local networks. Authorization also lets you specify which commands a new system administrator can issue on specific network devices.

The CiscoSecure ACS software also supports:

Accounting

System administrators might need to bill departments or customers for connection time or resources used on the network (for example, total time connected). Accounting tracks this kind of information. You can also use the accounting syslog to track suspicious connection attempts into the network. The accounting portion of AAA contains:

The billing information includes connect time, user ID, connection location, amount of data transferred, start time, and stop time.

The following features are also supported:

User Profiles

For each user that logs in to the network through the NAS with a distinct ID, you use the CiscoSecure Administrator web interface to set up a user profile in the AAA database. This profile contains all the relevant information that the ACS needs to authenticate, authorize and log accounting information for that user on the network.

When authorized users log on to your network, the CiscoSecure ACS uses the group and user profiles to identify users of a service or a set of services.

Group Profiles

As the number of users grows, assigning all the necessary attributes to every individual user becomes time-consuming and unmanageable.

For large groups of users with similar characteristics, you can set up CiscoSecure user group profiles that allow you to set up AAA attributes for large numbers of users at the same time. This means that you can declare common characteristics once and have each user assigned to the group inherit those characteristics when they are assigned to the group. This obviously saves a great deal of time.

One way to manage large numbers of users is to group them together according to the services they will use. Using the web-based CiscoSecure ACS Administrator program, you can modify the CiscoSecure ACS to define each group and authorize it to use the appropriate set of services. You can then add each new user to the appropriate group.

For example, you could restrict access by assigning regular employees and contract employees to separate groups and assigning attributes that allow the regular employees group to dial in at any time and the contract employees group to dial in only from 8:00 am to 5:00 pm Monday through Friday.

With grouping, you can also control the access of users to critical network services. For example, rather than controlling the access to a feature, you could control the ability of a group of users to log onto a specified server.

A group can be a member of another group. In a sales group, for example, the complete sales information group might be a member of a larger group of all sales employees that has access to other services and accounting information.

Grouping can simplify the task of ensuring a secure network in which users have easy access to necessary services and information, but no access to other services, which are unrelated to their jobs. In this way, you can reliably and easily ensure the security of the entire network regardless of its size or complexity.

Inheritance

The passing down of a user group's attributes to its member users is called inheritance.

Within the CiscoSecure ACS, inheritance means that in the absence of specifically assigned attribute values, individual users will have the same attributes values as the group from which they were derived.

Inheritance works differently depending on the AAA protocol being applied:

hometocprevnextglossaryfeedbacksearchhelp
Copyright 1989-1997 © Cisco Systems Inc.