Enviar búsqueda
Cargar
Chapter 3 overview
•
Descargar como PPT, PDF
•
3 recomendaciones
•
683 vistas
ali raza
Seguir
Educación
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 65
Descargar ahora
Recomendados
CCNA Security 06- AAA
CCNA Security 06- AAA
Ahmed Habib
Chapter 2 overview
Chapter 2 overview
ali raza
CCNA Security 05- securing the management plane
CCNA Security 05- securing the management plane
Ahmed Habib
Cisco CCNA Security 210-260 Practice Exam
Cisco CCNA Security 210-260 Practice Exam
Jysmeen
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLI
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLI
Hoàng Hải Nguyễn
Chapter 5 overview
Chapter 5 overview
ali raza
CCNA Security - Chapter 3
CCNA Security - Chapter 3
Irsandi Hasan
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
Ahmed Habib
Recomendados
CCNA Security 06- AAA
CCNA Security 06- AAA
Ahmed Habib
Chapter 2 overview
Chapter 2 overview
ali raza
CCNA Security 05- securing the management plane
CCNA Security 05- securing the management plane
Ahmed Habib
Cisco CCNA Security 210-260 Practice Exam
Cisco CCNA Security 210-260 Practice Exam
Jysmeen
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLI
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLI
Hoàng Hải Nguyễn
Chapter 5 overview
Chapter 5 overview
ali raza
CCNA Security - Chapter 3
CCNA Security - Chapter 3
Irsandi Hasan
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
Ahmed Habib
Chapter 8 overview
Chapter 8 overview
ali raza
Chapter 1 overview
Chapter 1 overview
ali raza
CCNA Security - Chapter 4
CCNA Security - Chapter 4
Irsandi Hasan
CCNP Security-VPN
CCNP Security-VPN
mohannadalhanahnah
ASA Multiple Context Training
ASA Multiple Context Training
Tariq Bader
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
Ahmed Habib
CCNA Security - Chapter 6
CCNA Security - Chapter 6
Irsandi Hasan
CCNA Security - Chapter 2
CCNA Security - Chapter 2
Irsandi Hasan
Ccna security
Ccna security
dkaya
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
Ahmed Habib
Brkcrt 1160 c3-rev2
Brkcrt 1160 c3-rev2
Solomon Abavire Kobina,
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7
Chaing Ravuth
CCNP Security-Firewall
CCNP Security-Firewall
mohannadalhanahnah
CCA security answers chapter 2 test
CCA security answers chapter 2 test
Soporte Yottatec
CCNP Security-Secure
CCNP Security-Secure
mohannadalhanahnah
How to configure cisco asa virtual firewall
How to configure cisco asa virtual firewall
IT Tech
CCNP Security-IPS
CCNP Security-IPS
mohannadalhanahnah
Cisco ASA Firewalls
Cisco ASA Firewalls
Bryley Systems Inc.
Understanding and Troubleshooting ASA NAT
Understanding and Troubleshooting ASA NAT
Cisco Russia
Cisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep dive
solarisyougood
Cisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overview
solarisyougood
Chapter 9 overview
Chapter 9 overview
ali raza
Más contenido relacionado
La actualidad más candente
Chapter 8 overview
Chapter 8 overview
ali raza
Chapter 1 overview
Chapter 1 overview
ali raza
CCNA Security - Chapter 4
CCNA Security - Chapter 4
Irsandi Hasan
CCNP Security-VPN
CCNP Security-VPN
mohannadalhanahnah
ASA Multiple Context Training
ASA Multiple Context Training
Tariq Bader
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
Ahmed Habib
CCNA Security - Chapter 6
CCNA Security - Chapter 6
Irsandi Hasan
CCNA Security - Chapter 2
CCNA Security - Chapter 2
Irsandi Hasan
Ccna security
Ccna security
dkaya
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
Ahmed Habib
Brkcrt 1160 c3-rev2
Brkcrt 1160 c3-rev2
Solomon Abavire Kobina,
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7
Chaing Ravuth
CCNP Security-Firewall
CCNP Security-Firewall
mohannadalhanahnah
CCA security answers chapter 2 test
CCA security answers chapter 2 test
Soporte Yottatec
CCNP Security-Secure
CCNP Security-Secure
mohannadalhanahnah
How to configure cisco asa virtual firewall
How to configure cisco asa virtual firewall
IT Tech
CCNP Security-IPS
CCNP Security-IPS
mohannadalhanahnah
Cisco ASA Firewalls
Cisco ASA Firewalls
Bryley Systems Inc.
Understanding and Troubleshooting ASA NAT
Understanding and Troubleshooting ASA NAT
Cisco Russia
La actualidad más candente
(19)
Chapter 8 overview
Chapter 8 overview
Chapter 1 overview
Chapter 1 overview
CCNA Security - Chapter 4
CCNA Security - Chapter 4
CCNP Security-VPN
CCNP Security-VPN
ASA Multiple Context Training
ASA Multiple Context Training
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
CCNA Security - Chapter 6
CCNA Security - Chapter 6
CCNA Security - Chapter 2
CCNA Security - Chapter 2
Ccna security
Ccna security
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
Brkcrt 1160 c3-rev2
Brkcrt 1160 c3-rev2
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7
CCNP Security-Firewall
CCNP Security-Firewall
CCA security answers chapter 2 test
CCA security answers chapter 2 test
CCNP Security-Secure
CCNP Security-Secure
How to configure cisco asa virtual firewall
How to configure cisco asa virtual firewall
CCNP Security-IPS
CCNP Security-IPS
Cisco ASA Firewalls
Cisco ASA Firewalls
Understanding and Troubleshooting ASA NAT
Understanding and Troubleshooting ASA NAT
Destacado
Cisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep dive
solarisyougood
Cisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overview
solarisyougood
Chapter 9 overview
Chapter 9 overview
ali raza
Chapter 2
Chapter 2
ali raza
Cisco orientation
Cisco orientation
ali raza
Chapter 3
Chapter 3
ali raza
Chapter 6
Chapter 6
ali raza
Chapter 4
Chapter 4
ali raza
From Cisco ACS to ISE
From Cisco ACS to ISE
Mahzad Zahedi
Chapter 4 overview
Chapter 4 overview
ali raza
Chapter 5
Chapter 5
ali raza
Chapter 7
Chapter 7
ali raza
VPN Security
VPN Security
dromerotrejo
Chapter 6 overview
Chapter 6 overview
ali raza
Chapter 1
Chapter 1
ali raza
CSACSGuide-SAMPLE
CSACSGuide-SAMPLE
Tariq Sheikh
Chapter 7 overview
Chapter 7 overview
ali raza
VMware vSphere5.1 Training
VMware vSphere5.1 Training
零壹科技股份有限公司
Chapter 8
Chapter 8
ali raza
Implementing Cisco AAA
Implementing Cisco AAA
dkaya
Destacado
(20)
Cisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep dive
Cisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overview
Chapter 9 overview
Chapter 9 overview
Chapter 2
Chapter 2
Cisco orientation
Cisco orientation
Chapter 3
Chapter 3
Chapter 6
Chapter 6
Chapter 4
Chapter 4
From Cisco ACS to ISE
From Cisco ACS to ISE
Chapter 4 overview
Chapter 4 overview
Chapter 5
Chapter 5
Chapter 7
Chapter 7
VPN Security
VPN Security
Chapter 6 overview
Chapter 6 overview
Chapter 1
Chapter 1
CSACSGuide-SAMPLE
CSACSGuide-SAMPLE
Chapter 7 overview
Chapter 7 overview
VMware vSphere5.1 Training
VMware vSphere5.1 Training
Chapter 8
Chapter 8
Implementing Cisco AAA
Implementing Cisco AAA
Similar a Chapter 3 overview
CCNA_Security_03.ppt
CCNA_Security_03.ppt
veracru1
CCNA_Security_02.ppt
CCNA_Security_02.ppt
veracru1
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
Mohamed Loey
AAA Implementation
AAA Implementation
Ahmad El Tawil
network security
network security
Dayanna Moyano
CCNASv2_InstructorPPT_CH2.pptx
CCNASv2_InstructorPPT_CH2.pptx
mohamedabdelwahed68
Copyright © 2016 VIT, All Rights Reserved. VIT and its log.docx
Copyright © 2016 VIT, All Rights Reserved. VIT and its log.docx
bobbywlane695641
300 101 Dumps - Implementing Cisco IP Routing
300 101 Dumps - Implementing Cisco IP Routing
Sara Rock
Application and Server Security
Application and Server Security
Brian Pontarelli
Securing management, control & data plane
Securing management, control & data plane
NetProtocol Xpert
Brkcrt 2214
Brkcrt 2214
Mac An
Interconnecting_Cisco_Networking_Devices.pdf
Interconnecting_Cisco_Networking_Devices.pdf
Daginni78
APIs_ An Introduction.pptx
APIs_ An Introduction.pptx
AkashThorat25
CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8
Chaing Ravuth
Configuring kerberos based sso in weblogic
Configuring kerberos based sso in weblogic
Harihara sarma
Ccna sv2 instructor_ppt_ch2
Ccna sv2 instructor_ppt_ch2
SalmenHAJJI1
MySQL Security and Standardization at PayPal - Percona Live 2019
MySQL Security and Standardization at PayPal - Percona Live 2019
Yashada Jadhav
Prévention et détection des mouvements latéraux
Prévention et détection des mouvements latéraux
ColloqueRISQ
Cyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense Mechanisms
Jim Kaplan CIA CFE
Itn6 instructor materials_chapter2
Itn6 instructor materials_chapter2
limenih muluneh
Similar a Chapter 3 overview
(20)
CCNA_Security_03.ppt
CCNA_Security_03.ppt
CCNA_Security_02.ppt
CCNA_Security_02.ppt
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
AAA Implementation
AAA Implementation
network security
network security
CCNASv2_InstructorPPT_CH2.pptx
CCNASv2_InstructorPPT_CH2.pptx
Copyright © 2016 VIT, All Rights Reserved. VIT and its log.docx
Copyright © 2016 VIT, All Rights Reserved. VIT and its log.docx
300 101 Dumps - Implementing Cisco IP Routing
300 101 Dumps - Implementing Cisco IP Routing
Application and Server Security
Application and Server Security
Securing management, control & data plane
Securing management, control & data plane
Brkcrt 2214
Brkcrt 2214
Interconnecting_Cisco_Networking_Devices.pdf
Interconnecting_Cisco_Networking_Devices.pdf
APIs_ An Introduction.pptx
APIs_ An Introduction.pptx
CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8
Configuring kerberos based sso in weblogic
Configuring kerberos based sso in weblogic
Ccna sv2 instructor_ppt_ch2
Ccna sv2 instructor_ppt_ch2
MySQL Security and Standardization at PayPal - Percona Live 2019
MySQL Security and Standardization at PayPal - Percona Live 2019
Prévention et détection des mouvements latéraux
Prévention et détection des mouvements latéraux
Cyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense Mechanisms
Itn6 instructor materials_chapter2
Itn6 instructor materials_chapter2
Último
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
Jisc
Spatium Project Simulation student brief
Spatium Project Simulation student brief
Association for Project Management
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
Celine George
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
Nguyen Thanh Tu Collection
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University of Engineering & Technology, Jamshoro
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
Dr. Ravikiran H M Gowda
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
Ramakrishna Reddy Bijjam
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
Mebane Rash
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
christianmathematics
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
TechSoup
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
Dr. Sarita Anand
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Pooja Bhuva
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Dr Vijay Vishwakarma
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
Jisc
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
jbellavia9
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
VishalSingh1417
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Pooja Bhuva
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
Celine George
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
Elizabeth Walsh
Último
(20)
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
Spatium Project Simulation student brief
Spatium Project Simulation student brief
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
Chapter 3 overview
1.
1© 2009 Cisco
Learning Institute. CCNA Security Chapter Three Authentication, Authorization, and Accounting
2.
222© 2009 Cisco
Learning Institute. Lesson Planning • This lesson should take 3-6 hours to present • The lesson should include lecture, demonstrations, discussion and assessment • The lesson can be taught in person or using remote instruction
3.
333© 2009 Cisco
Learning Institute. Major Concepts • Local Authentication • Enhancements to Local Authentication • Describe the purpose of AAA and the various implementation techniques • Implement AAA using the local database • Implement AAA using TACACS+ and RADIUS protocols • Implement AAA Authorization and Accounting
4.
444© 2009 Cisco
Learning Institute. Lesson Objectives Upon completion of this lesson, the successful participant will be able to: 1. Describe the importance of AAA as it relates to authentication, authorization, and accounting 2. Configure AAA authentication using a local database 3. Configure AAA using a local database in SDM 4. Troubleshoot AAA using a local database 5. Explain server-based AAA 6. Describe and compare the TACACS+ and RADIUS protocols
5.
555© 2009 Cisco
Learning Institute. Lesson Objectives 7. Describe the Cisco Secure ACS for Windows software 8. Describe how to configure Cisco Secure ACS for Windows as a TACACS+ server 9. Configure server-based AAA authentication on Cisco Routers using CLI 10. Configure server-based AAA authentication on Cisco Routers using SDM 11. Troubleshoot server-based AAA authentication using Cisco Secure ACS 12. Configure server-based AAA Authorization using Cisco Secure ACS 13. Configure server-based AAA Accounting using Cisco Secure ACS
6.
666© 2009 Cisco
Learning Institute. AAA Access Security Accounting What did you spend it on? Accounting What did you spend it on? Authentication Who are you? Authentication Who are you? Authorization which resources the user is allowed to access and which operations the user is allowed to perform? Authorization which resources the user is allowed to access and which operations the user is allowed to perform?
7.
777© 2009 Cisco
Learning Institute. Authentication – Password-Only • Uses a login and password combination on access lines • Easiest to implement, but most unsecure method • Vulnerable to brute-force attacks • Provides no accountability R1(config)# line vty 0 4 R1(config-line)# password cisco R1(config-line)# login Internet User Access Verification Password: cisco Password: cisco1 Password: cisco12 % Bad passwords Password-Only Method
8.
888© 2009 Cisco
Learning Institute. Authentication – Local Database • Creates individual user account/password on each device • Provides accountability • User accounts must be configured locally on each device • Provides no fallback authentication method R1(config)# username Admin secret Str0ng5rPa55w0rd R1(config)# line vty 0 4 R1(config-line)# login local Internet User Access Verification Username: Admin Password: cisco1 % Login invalid Username: Admin Password: cisco12 % Login invalid Local Database Method
9.
999© 2009 Cisco
Learning Institute. Local Versus Remote Access InternetLAN 1 R1 Local Access Administrator Console Port LAN 2 R1 Internet R2Firewall LAN 3 Management LAN Administration Host Logging Host Remote Access Uses Telnet, SSH HTTP or SNMP connections to the router from a computer Requires a direct connection to a console port using a computer running terminal emulation software
10.
101010© 2009 Cisco
Learning Institute. Password Security To increase the security of passwords, use additional configuration parameters: - Minimum password lengths should be enforced - Unattended connections should be disabled - All passwords in the configuration file should be encrypted R1(config)# service password-encryption R1(config)# exit R1# show running-config line con 0 exec-timeout 3 30 password 7 094F471A1A0A login line aux 0 exec-timeout 3 30 password 7 094F471A1A0A login
11.
111111© 2009 Cisco
Learning Institute. Passwords An acceptable password length is 10 or more characters Complex passwords include a mix of upper and lowercase letters, numbers, symbols and spaces Avoid any password based on repetition, dictionary words, letter or number sequences, usernames, relative or pet names, or biographical information Deliberately misspell a password (Security = 5ecur1ty) Change passwords often Do not write passwords down and leave them in obvious places
12.
121212© 2009 Cisco
Learning Institute. Access Port Passwords R1 R1(config)# enable secret cisco R1(config)# line con 0 R1(config-line)# password cisco R1(config-line)# login R1(config)# line aux 0 R1(config-line)# password cisco R1(config-line)# login R1(config)# line vty 0 4 R1(config-line)# password cisco R1(config-line)# login Command to restrict access to privileged EXEC mode Commands to establish a login password on the console line Commands to establish a login password on incoming Telnet sessions Commands to establish a login password for dial-up modem connections
13.
131313© 2009 Cisco
Learning Institute. Creating Users Parameter Description name This parameter specifies the username. 0 (Optional) This option indicates that the plaintext password is to be hashed by the router using MD5. password This parameter is the plaintext password to be hashed using MD5. 5 This parameter indicates that the encrypted-secret password was hashed using MD5. encrypted-secret This parameter is the MD5 encrypted-secret password that is stored as the encrypted user password. username name secret {[0]password|5encrypted-secret}
14.
141414© 2009 Cisco
Learning Institute. Enhanced Login Features The following commands are available to configure a Cisco IOS device to support the enhanced login features:
15.
151515© 2009 Cisco
Learning Institute. login block-for Command All login enhancement features are disabled by default. The login block-for command enables configuration of the login enhancement features. - The login block-for feature monitors login device activity and operates in two modes: o Normal-Mode (Watch-Mode) —The router keeps count of the number of failed login attempts within an identified amount of time. o Quiet-Mode (Quiet Period) — If the number of failed logins exceeds the configured threshold, all login attempts made using Telnet, SSH, and HTTP are denied.
16.
161616© 2009 Cisco
Learning Institute. System Logging Messages • To generate log messages for successful/failed logins: - login on-failure log - login on-success log • To generate a message when failure rate is exceeded: - security authentication failure rate threshold- rate log • To verify that the login block-for command is configured and which mode the router is currently in: - show login • To display more information regarding the failed attempts: - show login failures
17.
171717© 2009 Cisco
Learning Institute. Access Methods • Character Mode A user sends a request to establish an EXEC mode process with the router for administrative purposes • Packet Mode A user sends a request to establish a connection through the router with a device on the network
18.
181818© 2009 Cisco
Learning Institute. Self-Contained AAA Authentication Self-Contained AAA 1. The client establishes a connection with the router. 2. The AAA router prompts the user for a username and password. 3. The router authenticates the username and password using the local database and the user is authorized to access the network based on information in the local database. AAA Router Remote Client 1 2 3 • Used for small networks • Stores usernames and passwords locally in the Cisco router
19.
191919© 2009 Cisco
Learning Institute. Server-Based AAA Authentication • Uses an external database server - Cisco Secure Access Control Server (ACS) for Windows Server - Cisco Secure ACS Solution Engine - Cisco Secure ACS Express • More appropriate if there are multiple routers Server-Based AAA 1. The client establishes a connection with the router. 2. The AAA router prompts the user for a username and password. 3. The router authenticates the username and password using a remote AAA server. 4. The user is authorized to access the network based on information on the remote AAA Server. AAA RouterRemote Client 1 2 4 Cisco Secure ACS Server 3
20.
202020© 2009 Cisco
Learning Institute. AAA Authorization • Typically implemented using an AAA server-based solution • Uses a set of attributes that describes user access to the network 1. When a user has been authenticated, a session is established with an AAA server. 2. The router requests authorization for the requested service from the AAA server. 3. The AAA server returns a PASS/FAIL for authorization.
21.
212121© 2009 Cisco
Learning Institute. AAA Accounting • Implemented using an AAA server-based solution • Keeps a detailed log of what an authenticated user does on a device 1. When a user has been authenticated, the AAA accounting process generates a start message to begin the accounting process. 2. When the user finishes, a stop message is recorded ending the accounting process.
22.
222222© 2009 Cisco
Learning Institute. Local AAA Authentication Commands To authenticate administrator access (character mode access) 1.Add usernames and passwords to the local router database 2.Enable AAA globally 3.Configure AAA parameters on the router 4.Confirm and troubleshoot the AAA configuration R1# conf t R1(config)# username JR-ADMIN secret Str0ngPa55w0rd R1(config)# username ADMIN secret Str0ng5rPa55w0rd R1(config)# aaa new-model R1(config)# aaa authentication login default local-case R1(config)# aaa local authentication attempts max-fail 10
23.
232323© 2009 Cisco
Learning Institute. Additional Commands • aaa authentication enable Enables AAA for EXEC mode access • aaa authentication ppp Enables AAA for PPP network access
24.
242424© 2009 Cisco
Learning Institute. AAA Authentication Command Elements router(config)# aaa authentication login {default | list-name} method1… [method4] Command Description default Uses the listed authentication methods that follow this keyword as the default list of methods when a user logs in list-name Character string used to name the list of authentication methods activated when a user logs in password- expiry Enables password aging on a local authentication list. method1 [method2... ] Identifies the list of methods that the authentication algorithm tries in the given sequence. You must enter at least one method; you may enter up to four methods.
25.
252525© 2009 Cisco
Learning Institute. Method Type Keywords Keywords Description enable Uses the enable password for authentication. This keyword cannot be used. krb5 Uses Kerberos 5 for authentication. krb5-telnet Uses Kerberos 5 telnet authentication protocol when using Telnet to connect to the router. line Uses the line password for authentication. local Uses the local username database for authentication. local-case Uses case-sensitive local username authentication. none Uses no authentication. cache group-name Uses a cache server group for authentication. group radius Uses the list of all RADIUS servers for authentication. group tacacs+ Uses the list of all TACACS+ servers for authentication. group group-name Uses a subset of RADIUS or TACACS+ servers for authentication as defined by the aaa group server radius or aaa group server tacacs+ command.
26.
262626© 2009 Cisco
Learning Institute. Additional Security R1# show aaa local user lockout Local-user Lock time JR-ADMIN 04:28:49 UTC Sat Dec 27 2008 router(config)# aaa local authentication attempts max-fail [number-of- unsuccessful-attempts] R1# show aaa sessions Total sessions since last reload: 4 Session Id: 1 Unique Id: 175 User Name: ADMIN IP Address: 192.168.1.10 Idle Time: 0 CT Call Handle: 0
27.
272727© 2009 Cisco
Learning Institute. Sample Configuration R1# conf t R1(config)# username JR-ADMIN secret Str0ngPa55w0rd R1(config)# username ADMIN secret Str0ng5rPa55w0rd R1(config)# aaa new-model R1(config)# aaa authentication login default local-case enable R1(config)# aaa authentication login TELNET-LOGIN local-case R1(config)# line vty 0 4 R1(config-line)# login authentication TELNET-LOGIN
28.
282828© 2009 Cisco
Learning Institute. Verifying AAA Authentication • AAA is enabled by default in SDM • To verify or enable/disable AAA, choose Configure > Additional Tasks > AAA
29.
292929© 2009 Cisco
Learning Institute. Using SDM 1. Select Configure > Additional Tasks > Router Access > User Accounts/View 2. Click Add 3. Enter username and password 4. Choose 15 5. Check the box and select a view 6. Click OK
30.
303030© 2009 Cisco
Learning Institute. Configure Login Authentication 1. Select Configure > Additional Tasks > AAA > Authentication Policies > Login and click Add 2. Verify that Default is selected 3. Click Add 4. Choose local 5. Click OK 6. Click OK
31.
313131© 2009 Cisco
Learning Institute. Troubleshooting • The debug aaa Command • Sample Output
32.
323232© 2009 Cisco
Learning Institute. The debug aaa Command R1# debug aaa ? accounting Accounting administrative Administrative api AAA api events attr AAA Attr Manager authentication Authentication authorization Authorization cache Cache activities coa AAA CoA processing db AAA DB Manager dead-criteria AAA Dead-Criteria Info id AAA Unique Id ipc AAA IPC mlist-ref-count Method list reference counts mlist-state Information about AAA method list state change and notification per-user Per-user attributes pod AAA POD processing protocol AAA protocol processing server-ref-count Server handle reference counts sg-ref-count Server group handle reference counts sg-server-selection Server Group Server Selection subsys AAA Subsystem testing Info. about AAA generated test packets R1# debug aaa
33.
333333© 2009 Cisco
Learning Institute. Sample Output R1# debug aaa authentication 113123: Feb 4 10:11:19.305 CST: AAA/MEMORY: create_user (0x619C4940) user='' ruser='' port='tty1' rem_addr='async/81560' authen_type=ASCII service=LOGIN priv=1 113124: Feb 4 10:11:19.305 CST: AAA/AUTHEN/START (2784097690): port='tty1' list='' action=LOGIN service=LOGIN 113125: Feb 4 10:11:19.305 CST: AAA/AUTHEN/START (2784097690): using "default" list 113126: Feb 4 10:11:19.305 CST: AAA/AUTHEN/START (2784097690): Method=LOCAL 113127: Feb 4 10:11:19.305 CST: AAA/AUTHEN (2784097690): status = GETUSER 113128: Feb 4 10:11:26.305 CST: AAA/AUTHEN/CONT (2784097690): continue_login (user='(undef)') 113129: Feb 4 10:11:26.305 CST: AAA/AUTHEN (2784097690): status = GETUSER 113130: Feb 4 10:11:26.305 CST: AAA/AUTHEN/CONT (2784097690): Method=LOCAL 113131: Feb 4 10:11:26.305 CST: AAA/AUTHEN (2784097690): status = GETPASS 113132: Feb 4 10:11:28.145 CST: AAA/AUTHEN/CONT (2784097690): continue_login (user='diallocal') 113133: Feb 4 10:11:28.145 CST: AAA/AUTHEN (2784097690): status = GETPASS 113134: Feb 4 10:11:28.145 CST: AAA/AUTHEN/CONT (2784097690): Method=LOCAL 113135: Feb 4 10:11:28.145 CST: AAA/AUTHEN (2784097690): status = PASS
34.
343434© 2009 Cisco
Learning Institute. Local Versus Server-Based Authentication 1. The user establishes a connection with the router. 2. The router prompts the user for a username and password. 3. The router passes the username and password to the Cisco Secure ACS (server or engine). 4. The Cisco Secure ACS authenticates the user. The user is authorized to access the router (administrative access) or the network based on information found in the Cisco Secure ACS database. Perimeter Router Remote User Cisco Secure ACS for Windows Server 1 2 3 4 Server-Based Authentication 1. The user establishes a connection with the router. 2. The router prompts the user for a username and password authenticating the user using a local database. Local Authentication
35.
353535© 2009 Cisco
Learning Institute. Overview of TACACS+ and RADIUS Perimeter Router Remote User Cisco Secure ACS for Windows Server Cisco Secure ACS Express TACACS+ or RADIUS protocols are used to communicate between the clients and AAA security servers.
36.
363636© 2009 Cisco
Learning Institute. TACACS+/RADIUS Comparison TACACS+ RADIUS Functionality Separates AAA according to the AAA architecture, allowing modularity of the security server implementation Combines authentication and authorization but separates accounting, allowing less flexibility in implementation than TACACS+. Standard Mostly Cisco supported Open/RFC standard Transport Protocol TCP UDP CHAP Bidirectional challenge and response as used in Challenge Handshake Authentication Protocol (CHAP) Unidirectional challenge and response from the RADIUS security server to the RADIUS client. Protocol Support Multiprotocol support No ARA, no NetBEUI Confidentiality Entire packet encrypted Password encrypted Customization Provides authorization of router commands on a per-user or per-group basis. Has no option to authorize router commands on a per-user or per-group basis Confidentiality Limited Extensive
37.
373737© 2009 Cisco
Learning Institute. TACACS+ Authentication Process • Provides separate AAA services • Utilizes TCP port 49 Connect Username prompt? Username? Use “Username” JR-ADMIN JR-ADMIN Password? Password prompt? “Str0ngPa55w0rd” Use “Password” Accept/Reject “Str0ngPa55w0rd”
38.
383838© 2009 Cisco
Learning Institute. RADIUS Authentication Process • Works in both local and roaming situations • Uses UDP ports 1645 or 1812 for authentication and UDP ports 1646 or 1813 for accounting Username? JR-ADMIN Password? Str0ngPa55w0rd Access-Request (JR_ADMIN, “Str0ngPa55w0rd”) Access-Accept
39.
393939© 2009 Cisco
Learning Institute. Cisco Secure ACS Benefits • Extends access security by combining authentication, user access, and administrator access with policy control • Allows greater flexibility and mobility, increased security, and user-productivity gains • Enforces a uniform security policy for all users • Reduces the administrative and management efforts
40.
404040© 2009 Cisco
Learning Institute. Advanced Features • Automatic service monitoring • Database synchronization and importing of tools for large-scale deployments • Lightweight Directory Access Protocol (LDAP) user authentication support • User and administrative access reporting • Restrictions to network access based on criteria • User and device group profiles
41.
414141© 2009 Cisco
Learning Institute. Installation Options Cisco Secure ACS for Windows can be installed on: - Windows 2000 Server with Service Pack 4 - Windows 2000 Advanced Server with Service Pack 4 - Windows Server 2003 Standard Edition - Windows Server 2003 Enterprise Edition Cisco Secure ACS Solution Engine - A highly scalable dedicated platform that serves as a high- performance ACS - 1RU, rack-mountable - Preinstalled with a security-hardened Windows software, Cisco Secure ACS software - Support for more than 350 users Cisco Secure ACS Express 5.0 - Entry-level ACS with simplified feature set - Support for up to 50 AAA device and up to 350 unique user ID logins in a 24-hour period
42.
424242© 2009 Cisco
Learning Institute. Deploying ACS • Consider Third-Party Software Requirements • Verify Network and Port Prerequisites - AAA clients must run Cisco IOS Release 11.2 or later. - Cisco devices that are not Cisco IOS AAA clients must be configured with TACACS+, RADIUS, or both. - Dial-in, VPN, or wireless clients must be able to connect to AAA clients. - The computer running ACS must be able to reach all AAA clients using ping. - Gateway devices must permit communication over the ports that are needed to support the applicable feature or protocol. - A supported web browser must be installed on the computer running ACS. - All NICs in the computer running Cisco Secure ACS must be enabled. • Configure Secure ACS via the HTML interface
43.
434343© 2009 Cisco
Learning Institute. Cisco Secure ACS Homepage add, delete, modify settings for AAA clients (routers) set menu display options for TACACS and RADIUS configure database settings
44.
444444© 2009 Cisco
Learning Institute. Network Configuration 1. Click Network Configuration on the navigation bar 2. Click Add Entry 3. Enter the hostname 4. Enter the IP address 5. Enter the secret key 6. Choose the appropriate protocols 7. Make any other necessary selections and click Submit and Apply
45.
454545© 2009 Cisco
Learning Institute. Interface Configuration The selection made in the Interface Configuration window controls the display of options in the user interface
46.
464646© 2009 Cisco
Learning Institute. External User Database 1. Click the External User Databases button on the navigation bar 2. Click Database Configuration 3. Click Windows Database
47.
474747© 2009 Cisco
Learning Institute. Windows User Database Configuration 4. Click configure 5. Configure options
48.
484848© 2009 Cisco
Learning Institute. Configuring the Unknown User Policy 1. Click External User Databases on the navigation bar 2. Click Unknown User Policy 3. Place a check in the box 4. Choose the database in from the list and click the right arrow to move it to the Selected list 6. Click Submit5. Manipulate the databases to reflect the order in which each will be checked
49.
494949© 2009 Cisco
Learning Institute. Group Setup Database group mappings - Control authorizations for users authenticated by the Windows server in one group and those authenticated by the LDAP server in another 1. Click Group Setup on the navigation bar 2. Choose the group to edit and click Edit Settings 3. Click Permit in the Unmatched Cisco IOS commands option 4. Check the Command check box and select an argument 5. For the Unlisted Arguments option, click Permit
50.
505050© 2009 Cisco
Learning Institute. User Setup 1. Click User Setup on the navigation bar 2. Enter a username and click Add/Edit 3. Enter the data to define the user account 4. Click Submit
51.
515151© 2009 Cisco
Learning Institute. Configuring Server-Based AAA Authentication 1. Globally enable AAA to allow the user of all AAA elements (a prerequisite) 2. Specify the Cisco Secure ACS that will provide AAA services for the network access server 3. Configure the encryption key that will be used to encrypt the data transfer between the network access server and the Cisco Secure ACS 4. Configure the AAA authentication method list
52.
525252© 2009 Cisco
Learning Institute. aaa authentication Command R1(config)# aaa authentication type { default | list-name } method1 … [method4] R1(config)# aaa authentication login default ? enable Use enable password for authentication. group Use Server-group krb5 Use Kerberos 5 authentication. krb5-telnet Allow logins only if already authenticated via Kerberos V Telnet. line Use line password for authentication. local Use local username authentication. local-case Use case-sensitive local username authentication. none NO authentication. passwd-expiry enable the login list to provide password aging support R1(config)# aaa authentication login default group ? WORD Server-group name radius Use list of all Radius hosts. tacacs+ Use list of all Tacacs+ hosts. R1(config)# aaa authentication login default group
53.
535353© 2009 Cisco
Learning Institute. Sample Configuration • Multiple RADIUS servers can be identified by entering a radius-server command for each • For TACACS+, the single-connection command maintains a single TCP connection for the life of the session R1 TACACS+ or RADIUS protocols are used to communicate between the clients and AAA security servers. 192.168.1.100 192.168.1.101 Cisco Secure ACS Solution Engine using TACACS+ Cisco Secure ACS for Windows using RADIUS R1(config)# aaa new-model R1(config)# R1(config)# radius-server host 192.168.1.100 R1(config)# radius-server key RADIUS-Pa55w0rd R1(config)# R1(config)# tacacs-server host 192.168.1.101 R1(config)# tacacs-server key TACACS+Pa55w0rd single-connection R1(config)# R1(config)# aaa authentication login default group tacacs+ group radius local-case R1(config)#
54.
545454© 2009 Cisco
Learning Institute. Add TACACS Support 192.168.1.101 1. Choose Configure > Additional Tasks > AAA > AAA Servers and Groups > AAA Servers 2. Click Add 3. Choose TACACS+ 4. Enter the IP address (or hostname) of the AAA server 5. Check the Single Connection check box to maintain a single connection 6. Check the Configure Key to encrypt traffic7. Click OK
55.
555555© 2009 Cisco
Learning Institute. Create AAA Login Method 1. Choose Configure>Additional Tasks>AAA>Authentication Policies>Login 2. Click Add 3. Choose User Defined 4. Enter the name 5. Click Add 6. Choose group tacacs+ from the list 7. Click OK 8. Click Add to add a backup method 9. Choose enable from the list Click OK twice
56.
565656© 2009 Cisco
Learning Institute. Apply Authentication Policy 1. Choose Configure>Additional Tasks>Router Access>VTY 2. Click Edit 3. Choose the authentication policy to apply
57.
575757© 2009 Cisco
Learning Institute. Sample Commands • The debug aaa authentication command provides a view of login activity • For successful TACACS+ login attempts, a status message of PASS results R1# debug aaa authentication AAA Authentication debugging is on R1# 14:01:17: AAA/AUTHEN (567936829): Method=TACACS+ 14:01:17: TAC+: send AUTHEN/CONT packet 14:01:17: TAC+ (567936829): received authen response status = PASS 14:01:17: AAA/AUTHEN (567936829): status = PASS
58.
585858© 2009 Cisco
Learning Institute. Sample Commands R1# debug radius ? accounting RADIUS accounting packets only authentication RADIUS authentication packets only brief Only I/O transactions are recorded elog RADIUS event logging failover Packets sent upon fail-over local-server Local RADIUS server retransmit Retransmission of packets verbose Include non essential RADIUS debugs <cr> R1# debug radius R1# debug tacacs ? accounting TACACS+ protocol accounting authentication TACACS+ protocol authentication authorization TACACS+ protocol authorization events TACACS+ protocol events packet TACACS+ packets <cr>
59.
595959© 2009 Cisco
Learning Institute. AAA Authorization Overview • The TACACS+ protocol allows the separation of authentication from authorization. • Can be configured to restrict the user to performing only certain functions after successful authentication. • Authorization can be configured for - character mode (exec authorization) - packet mode (network authorization) • RADIUS does not separate the authentication from the authorization process show version Command authorization for user JR-ADMIN, command “show version”? Accept Display “show version” output configure terminal Command authorization for user JR-ADMIN, command “config terminal”? Reject Do not permit “configure terminal”
60.
606060© 2009 Cisco
Learning Institute. AAA Authorization Commands • To configure command authorization, use: aaa authorization service-type {default | list-name} method1 [method2] [method3] [method4] • Service types of interest include: - commands level For exec (shell) commands - exec For starting an exec (shell) - network For network services. (PPP, SLIP, ARAP) R1# conf t R1(config)# username JR-ADMIN secret Str0ngPa55w0rd R1(config)# username ADMIN secret Str0ng5rPa55w0rd R1(config)# aaa new-model R1(config)# aaa authentication login default group tacacs+ R1(config)# aaa authentication login TELNET-LOGIN local-case R1(config)# aaa authorization exec default group tacacs+ R1(config)# aaa authorization network default group tacacs+ R1(config)# line vty 0 4 R1(config-line)# login authentication TELNET-LOGIN R1(config-line)# ^Z
61.
616161© 2009 Cisco
Learning Institute. Using SDM to Configure Authorization Character Mode 1. Choose Configure>Additional Tasks>AAA>Authorization Policies>Exec 2. Click Add 3. Choose Default 4. Click Add 5. Choose group tacacs+ from the list 6. Click OK 7. Click OK to return to the Exec Authorization window
62.
626262© 2009 Cisco
Learning Institute. Using SDM to Configure Authorization Packet Mode 1. Choose Configure>Additional Tasks>AAA>Authorization Policies>Network 2. Click Add 3. Choose Default 4. Click Add 5. Choose group tacacs+ from the list 6. Click OK 7. Click OK to return to the Exec Authorization pane
63.
636363© 2009 Cisco
Learning Institute. AAA Accounting Overview • Provides the ability to track usage, such as dial-in access; the ability to log the data gathered to a database; and the ability to produce reports on the data gathered • To configure AAA accounting using named method lists: aaa accounting {system | network | exec | connection | commands level} {default | list-name} {start-stop | wait-start | stop-only | none} [method1 [method2]] • Supports six different types of accounting: network, connection, exec, system, commands level, and resource.
64.
646464© 2009 Cisco
Learning Institute. AAA Accounting Commands • aaa accounting exec default start-stop group tacacs+ Defines a AAA accounting policy that uses TACACS+ for logging both start and stop records for user EXEC terminal sessions. • aaa accounting network default start-stop group tacacs+ Defines a AAA accounting policy that uses TACACS+ for logging both start and stop records for all network-related service requests. R1# conf t R1(config)# username JR-ADMIN secret Str0ngPa55w0rd R1(config)# username ADMIN secret Str0ng5rPa55w0rd R1(config)# aaa new-model R1(config)# aaa authentication login default group tacacs+ R1(config)# aaa authentication login TELNET-LOGIN local-case R1(config)# aaa authorization exec group tacacs+ R1(config)# aaa authorization network group tacacs+ R1(config)# aaa accounting exec start-stop group tacacs+ R1(config)# aaa accounting network start-stop group tacacs+ R1(config)# line vty 0 4 R1(config-line)# login authentication TELNET-LOGIN R1(config-line)# ^Z
65.
656565© 2009 Cisco
Learning Institute.
Notas del editor
If there are user properties that you do not see, you may have to modify the interface configuration. Choose Interface Configuration &gt; User Data Configuration to modify the user interface.
Descargar ahora