|
|
Configuring the Network Access Server
Configuring the CiscoSecure server is only half of the configuration tasks required for an operational system. The other half of configuration tasks is configuring the network access server so that is functions properly with the CiscoSecure server.
This chapter describes how to configure the network access server and contains the following sections:
For complete information about a specific Cisco IOS release or more detailed configurations, refer to the publication Router Products Configuration Guide or the Configuration Fundamentals Configuration Guide. (See the appendix "References and Recommended Reading")
The first steps in configuring the network access server are to enable TACACS+, specify the list of CiscoSecure servers that will provide AAA services for the network access server, and configure the encryption key that is used to encrypt the data transfer between the network access server and the CiscoSecure server.
To begin global configuratin, enter the following commands, using the correct IP address of the CiscoSecure servers and your own encryption key:
Router(config)#aaa new-model Router(config)#tacacs-server host 144.1.12.100 Router(config)#tacacs-server host 144.1.200.250 Router(config)#tacacs-server key arachnid
The word arachnid is the encryption key that is shared between the network access server and the CiscoSecure server. The encryption key should be kept secret in order to protect the privacy of passwords that are sent between the CiscoSecure server and the network access server during the authentication process.
You can specify multiple CiscoSecure servers by repeating the tacacs-server host command.
Authentication on the Network Access Server
The authentication configuration builds a set of authentication lists, each of which can be used for different purposes within the network access server. The syntax of the command is as follows:
aaa authentication login list_name method1 [method2] [method3] [method4]
Each of the authentication methods is listed in Table 7-1:
Table 7-1 : Network Access Server Authentication Methods
| Method | Meaning |
|---|---|
| enable | Use the enable password. |
| line | Use the line password. |
| local | Use the network access server internal username database. |
| none | Use no authentication. |
| tacacs+ | Use TACACS+ authentication. |
In the following example, system administrators must use TACACS+ authentication and, if a CiscoSecure server is not available, fall back to using the router enable password. However, all other users must use only TACACS+:
aaa authentication default tacacs+ aaa authentication admin tacacs+ enable
To configure authentication at login on all lines on a 16-port network access server, enter the following commands:
line console 0 login authentication admin line aux 0 login authentication admin line vty 0 4 login authentication default line 1 16 login authentication default
Network access server ports may be excluded from using CiscoSecure by creating a separate authentication method list which does not include TACACS+ as an authentication method. Depending on your needs, you create a separate authentication method list to fixed ports that do not need AAA services, or for all the vty ports.
In the following example, only the first two vty ports and the console are enabled for AAA services in the network access server configuration:
aaa new-model aaa authentication login admin tacacs+ enable aaa authentication login no_tacacs line tacacs-server host 144.251.1.1 tacacs-server key arachnid ! The console and VTY lines 0 & 1 use TACACS+ line console 0 login authentication admin line vty 0 1 login authentication admin ! VTY Lines 2 - 4 do not use TACACS+ line vty 2 4 login authentication no_tacacs
Authorization on the Network Access Server
The network access server can use a CiscoSecure server to authorize specific commands by individual users. To authorize specific commands, you must specify which commands and actions will require authorization checks, using the following command syntax:
aaa authorization {network | connection | exec | commands level} methods
The four items that can be checked for authorization are listed in Table 7-2.
Table 7-2 : Checkable Authorization Items on the Network Access Server
| Keyword | Authorization Check |
|---|---|
| network | Check authorization for all network activities including SLIP, PPP, PPP network control protocols, and ARAP. |
| connection | Check authorization for outbound telnet and rlogin. |
| exec | Determine if the user is allowed to run an EXEC shell when logging into the network access server. This keyword may cause CiscoSecure UNIX server to return user profile information such as autocommand information. |
| commands level | Check authorization for all commands at the specified privilege level level. Valid levels are 0 through 15. Level 1 is normal user EXEC commands. Level 15 is normal privileged level. |
The methods you can specify are listed in Table 7-3.
Table 7-3 : Authorization Methods on the Network Access Server
| Method | Meaning |
|---|---|
| tacacs+ | Requests authorization information from the CiscoSecure server. |
| if-authenticated | Allows the user to access the requested function if the user is authenticated. Note that you are either authenticated or not, so this should be the last method in the list. |
| none | No authorization is performed. |
| local | Uses the local database for authorization. |
Using the command syntax specified above, you can configure the network access server to restrict the set of commands that an individual user can execute. To require that all commands at privilege level 1 be authorized, enter the following command:
aaa authorization commands 1 tacacs+
To require that the system administrators be authorized at level 15, enter the following command:
aaa authorization commands 15 tacacs+ if-authenticated
This command uses TACACS+ authorization level 15 but if problems arise you can switch off the CiscoSecure server and the authorization will then be granted to anyone who is authenticated.
Accounting on the Network Access Server
The network access server must be specifically configured to send accounting records to the CiscoSecure server. Several types of accounting records are available. Use the following command syntax to configure accounting on the network access server:
aaa accounting {system | network | connection | exec | command level}
{start-stop | wait-start | stop-only} tacacs+
The first set of keywords allows you to specify accounting of the events listed in Table 7-4.
Table 7-4 : Accounting Events on the Network Access Server
| Event Type | Meaning |
|---|---|
| system | Enables accounting for all system-level events not associated with users, such as reloads. |
| network | Enables accounting for all network-related requests, including SLIP, PPP, PPP network control protocols, and ARA protocol |
| connection | Enables accounting for outbound Telnet and rlogin. |
| exec | Enables accounting for EXEC processes (user shells). |
| command level | Enables accounting for all commands at the specified privilege level, 0 through 15. |
You can specify when accounting records are to be sent by using the second set of keywords, which are listed in Table 7-5.
Table 7-5 : Accounting Record Keywords on the Network Access Server
| Keyword | Meaning |
|---|---|
| stop-only | The network access server sends a stop record accounting notice at the end of the specified activity or event (command, EXEC shell, etc.) |
| start-stop | The network access server sends a start record accounting notice at the beginning of a process and a stop record at the end of the process. The start accounting record is sent in the background. The requested user process begins regardless of whether or not the start accounting record was acknowledged by the accounting server. |
| wait-start | Causes both a start and stop accounting record to be sent to the accounting server. However, the requested user service does not begin until the start accounting record is acknowledged. A stop accounting record is also sent. |
Use the following commands to record accounting information on network access server system events, network connections, outbound connections, EXEC operations, and commands at level 1 and level 15:
aaa accounting system start-stop tacacs+ aaa accounting network start-stop tacacs+ aaa accounting connection start-stop tacacs+ aaa accounting exec stop-only tacacs+ aaa accounting command 1 stop-only tacacs+ aaa accounting command 15 wait-start tacacs+
You can use other commands to tailor the operation of the network access server with the TACACS+ protocol. Refer to the publications Router Products Command Reference or Configuration Fundamentals Command Reference for a detailed list of commands. (See the appendix, "References and Recommended Reading."
|
|
Copyright 1988-1996 © Cisco Systems Inc.