Table of Contents
index
- AAA
- BootFlash considerations B-1
- case study overview (figure) 1-2
- Cisco IOS 12.0(7)T command descriptions A-13
- defined 1-1
- disabling B-1
- example configuration (NAS) A-5, A-9
- example configuration (router) A-2
- overview 1-1
- security checklist (table) 1-12
- task checklist (table) 1-14
- aaa accounting command A-13, A-14
- aaa authentication command A-13, A-14
- aaa authorization command A-13, A-14
- aaa new-model key command A-13, A-14
- AAA server
- creating a user profile (RADIUS authentication) 4-7
- creating a user profile (RADIUS authorization) 4-9
- creating a user profile (TACACS+ authentication) 4-3
- creating a user profile (TACACS+ authorization) 4-5
- negotiation process (flow diagram) 6-3
- restarting 3-10
- software version used in case study xii
- verifying user configuration (RADIUS authentication) 4-8, 4-9
- verifying user configuration (TACACS+ authentication) 4-3
- verifying user configuration (TACACS+ authorization) 4-5
- AAA servers
- in network context 1-2
- access list
- dialup PPP filtering 1-11
- troubleshooting problems 6-14, 6-17
- verification, show caller user command (server-based) 4-10, C6
- verification, show line command (local-based) 2-8
- accounting
- configuring EXEC and command level (TACACS+) 5-4
- configuring NAS (TACACS+) 5-2
- configuring router (TACACS+) 5-4
- defined 1-1
- dial-based accounting (server) 5-1, 5-4
- monitored dialup PPP events 1-11
- monitored router administration events 1-11
- records policies 1-11
- server-based dial implementation 5-1
- server-based router implementation 5-4
- session timeout output example 5-3
- SQL query 5-2, 5-5
- TACACS+ dial implementation 5-1
- TACACS+ implementation (local-based) 2-12
- TACACS+ router implementation 5-4
- TACACS+ verification tests (local-based) 2-13
- TACACS+ verification tests (server-based) 5-2
- verifying from AAA server 5-2, 5-5
- acknowledgements xv
- AddProfile command
- adding basic user profile 3-11
- adding group profiles (TACACS+ authentication) 4-11
- adding group profiles (TACACS+ authorization) 4-17, 4-18
- adding user profiles (RADIUS authentication) 4-7
- adding user profiles (RADIUS authorization) 4-9
- adding user profiles (TACACS+ authentication) 4-3
- adding user profiles (TACACS+ authorization) 4-5
- administrative control
- authorization policy 1-11
- creating, router example 4-13
- privilege level 15 1-11
- attribute-value pair
- See AVPs
- audience
- defined xi
- authentication
- configuring NAS (RADIUS) 4-7
- configuring NAS (TACACS+) 4-3
- general process (flow diagram) 6-3
- RADIUS implementation 4-6
- RADIUS verification tests (server-based) C4
- RADIUS vs. TACACS+ 1-5
- server-based implementation 4-2, 4-6, 4-10
- TACACS+ dialup, verifying by using csuslog 4-4
- TACACS+ implementation (local-based) 2-2, 2-8
- TACACS+ implementation (server-based) 4-2, 4-10
- TACACS+ verification tests (local-based) 2-3, 2-9
- TACACS+ verification tests (server-based) C1, C7
- verifying PPP user authentication 4-4
- authentication, authorization, and accounting
- See AAA
- authorization
- configuring NAS (RADIUS) 4-9
- configuring NAS (TACACS+) 4-4
- configuring routers 4-13
- defined 1-1
- general process (flow diagram) 6-3
- RADIUS implementation 4-8
- RADIUS verification tests (server-based) C5
- RADIUS vs. TACACS+ 1-5
- server-based implementation 4-4, 4-8, 4-13
- TACACS+ dialup, verifying by using csuslog 4-5
- TACACS+ implementation (local-based) 2-5, 2-10
- TACACS+ implementation (server-based) 4-4, 4-13
- TACACS+ router, verifying by using csuslog 4-16, 4-18, 4-19
- TACACS+ verification tests (local-based) 2-6, 2-11
- TACACS+ verification tests (server-based) C2, C9
- verifying access list 4-10
- verifying PPP user authorization 4-5
- verifying RADIUS authorization 4-9
- autocommand ppp negotiate command 1-11
- AVPs
- adding group profiles (TACACS+ authentication) 4-11
- adding group profiles (TACACS+ authorization) 4-16, 4-17, 4-18
- defined 1-6
- dial access devices 1-11
- EXEC disabled implementation 6-6
- EXEC shell enabled (TACACS+) 6-5
- privilege level 15 enabled (TACACS+) 6-5
- RADIUS, user profile 4-7, 4-9
- RADIUS examples (table) 1-6
- TACACS+, user profile 4-3, 4-5
- TACACS+ authentication, group profile 4-11
- TACACS+ authorization, group profile 4-16, 4-17, 4-18
- TACACS+ examples (table) 1-6
- BootFlash images
- AAA considerations B-1
- case study
- hardware xii
- objectives xi
- overview 1-1
- purpose xi
- software xii
- CCO
- accessing xiii
- definition xiii
- CD-ROM
- documentation xiv
- Challenge Handshake Authentication Protocol
- See CHAP
- CHAP
- ISDN authentication 1-10
- checklists
- AAA implementation tasks (table) 1-14
- AAA security (table) 1-12
- AAA service definition (table) 1-10
- general service definition (table) 1-9
- network services 1-9
- Cisco 7206 VXR xii
- Cisco AS5300 xii
- Cisco AS5800 xii
- Cisco Connection Online
- See CCO
- Cisco IOS 12.0(7)T xii
- aaa accounting command A-13, A-14
- aaa authentication command A-13, A-14
- aaa authorization command A-13, A-14
- AAA command descriptions (NAS) A-13
- AAA command descriptions (router) A-13
- aaa new-model command A-13, A-14
- autocommand ppp negotiate command 1-11
- disabling AAA B-1
- example configurations A-1
- ip http command A-13
- ip tacacs command A-13
- local-based router example A-2
- radius-server host command A-15
- server-based NAS example A-5, A-9
- tacacs-server host command A-13, A-15
- tacacs-server key command A-13
- version used in case study xii
- CiscoSecure for UNIX
- See CSU
- commands
- Cisco IOS 12.0(7)T (AAA) A-13
- configurations
- Cisco IOS 12.0(7)T, NAS example A-5, A-9
- Cisco IOS 12.0(7)T, router example A-2
- CSU example A-15
- example CSConfig.ini listing A-19
- example CSU.cfg listing A-16
- examples, Cisco IOS 12.0(7)T A-1
- local router A-2
- RADIUS A-9
- TACACS+ A-5
- conventions
- command syntax xiii
- document xiii
- CSConfig.ini
- example file listing A-19
- CSU
- configuring CSU logging 3-9
- configuring debugging level 3-10
- creating csuslog file 3-9
- example configuration listings A-15
- example CSConfig.ini listing A-19
- example CSU.cfg listing A-16
- installation process 3-2
- installing 3-5
- log files listed A-25
- minimum system specifications xii
- pkgadd command 3-6
- restarting AAA server 3-10
- restarting syslog daemon 3-10
- software version used in case study xii
- verifying Oracle account information 3-4
- version 2.3(3) xii
- CSU.cfg
- example file listing A-16
- csuslog
- configuring logging 3-9
- creating file 3-9
- TACACS+ dialup authentication 4-4
- TACACS+ dialup authorization 4-5
- TACACS+ router authorization 4-16, 4-18, 4-19
- using tail command (TACACS+ dialup authentication) 4-4
- using tail command (TACACS+ PPP authorization) 4-5
- using tail command (TACACS+ router authorization) 4-16, 4-18, 4-19
- using the tail command C1
- database
- verifying instance 3-3
- Data Encryption Standard
- See DES
- debug command
- summary of relevant commands 6-7
- using to troubleshoot AAA problems 6-7
- debug output
- accounting (server-based) 5-3, 5-5
- accounting, TACACS+ (local-based) 2-13
- authentication, RADIUS (server-based) C4
- authentication, TACACS+ (local-based) 2-3, 2-10
- authentication, TACACS+ (server-based) C1, C7
- authorization, RADIUS (server-based) C5
- authorization, TACACS+ (local-based) 2-6, 2-11
- authorization, TACACS+ (server-based) C3, C9
- DES
- password support policy 1-13
- router policy 1-10
- diagnostics
- using debug command output C1
- directory environment variable
- verifying 3-3
- disconnect cause codes
- idle timeouts 5-2, 5-3
- listed (table) 5-6
- encryption
- RADIUS 1-4
- TACACS+ 1-5
- flow diagram
- general authentication and authorization 6-3
- TACACS+, authentication and authorization 4-14
- groups
- defining administrative control 4-13
- hardware
- case study xii
- Cisco 7206 VXR xii
- Cisco AS5300 xii
- Cisco AS5800 xii
- Sun UltraSPARC xii
- implementation
- AAA task checklist (table) 1-14
- interoperability
- RADIUS attribute support 1-6
- IP addresses
- static address policy 1-13
- ip http command A-13
- ip tacacs command A-13
- ISDN
- CHAP authentication 1-10
- listener.ora
- configuration listing A-24
- local-based access
- compared with server-based access 1-6
- defined 1-6
- local-based configuration
- implementation overview 2-1
- TACACS+, accounting 2-12
- TACACS+, authentication 2-2, 2-8
- TACACS+, authorization 2-5, 2-10
- verification test results (TACACS+ accounting) 2-13
- verification test results (TACACS+ authentication) 2-3, 2-9
- verification test results (TACACS+ authorization) 2-6, 2-11
- management policy
- TACACS+ vs. RADIUS comparison 1-5
- MD5
- RFC link 1-2
- multiprotocol support
- TACACS+ vs. RADIUS comparison 1-5
- NAS
- versions used in case study xii
- NAS profile
- RADIUS 4-7
- network environment
- equipment summary 1-13
- network services
- AAA checklist (table) 1-10
- accounting policy 1-11
- authentication policy 1-10
- authorization policy 1-11
- checklist 1-9
- definitions and policies 1-10
- dialup/shell AAA policy 1-10
- general checklist (table) 1-9
- objectives
- case study xi
- online documentation
- See CCO
- Oracle
- accounting records policy 1-11
- confirming tnsnames service 3-4
- creating tablespace 3-2
- DB Client 7.3(4) xii
- DB Server 7.3(4) xii
- installation reference 3-2
- listener (lsnrctl) 3-3
- listener.ora listing A-24
- Server Manager (svrmgrl) 3-3
- software version used in case study xii
- user environment variable A-23
- verifying account information 3-4
- verifying database instance 3-3
- verifying SMON operation 3-3
- verifying software directory environment variable 3-3
- OS Solaris 2.5(1) xii
- overview
- AAA case study 1-1
- PAP
- PPP authentication 1-10
- Password Authentication Protocol
- See PAP
- passwords
- authentication policies 1-13
- authentication policy 1-10
- authorization policies 1-13
- local access policy 1-10
- planning
- pre-deployment summary 1-9
- site preparation xi
- Point-to-Point Protocol
- See PPP
- policies
- accounting 1-11
- accounting, PPP 1-11
- accounting, router administration 1-11
- authentication 1-10
- authorization 1-11
- dialup/shell AAA 1-10
- privilege level 15 authorization 1-13
- router, administrative control 1-11
- router management 1-5
- security considerations 1-12
- PPP
- PAP authentication 1-10
- verifying TACACS+ authorization 4-5
- verifying TACACS+ user authentication 4-4
- privilege level
- TACACS+ support 1-2
- privilege level 15
- accounting 1-11, 1-12
- command authorization policy 1-13
- local administration 1-12
- router authorization policy 1-11
- router command authorization A-13
- privilege level 15 commands 4-13
- configuring accounting 5-4
- problems
- authentication
- AAA behavior configured incorrectly in NAS 6-9
- AAA behavior configured incorrectly in router 6-20
- connection between NAS and AAA server down 6-12
- connection between router and AAA server down 6-23
- group profile password type does not match type in NAS 6-13
- incorrect AAA configuration in router 6-21, 6-24
- maximum number of users exceeded 6-12, 6-23
- shell initiated PPP session fails 6-9, 6-13
- TACACS+ key incorrect in router or AAA server 6-23
- TACACS+ or RADIUS key incorrect in NAS or AAA server 6-12
- user account disabled due to too many failed logins 6-10, 6-22
- user account password or profile expired 6-11, 6-22
- user enters invalid username or password 6-9, 6-20
- user enters password incorrectly 6-10, 6-22
- user exceeds the maximum number of concurrent sessions 6-11, 6-22
- user name not in server database 6-10, 6-22
- user profile configured incorrectly 6-10, 6-22
- user workstation configured incorrectly 6-11
- authorization
- AAA authorization configured incorrectly in NAS 6-16
- AAA behavior incorrectly configured 6-26, 6-28
- AAA configuration error 6-25, 6-27
- access list assigned to user 6-14, 6-17
- authorization failed service 6-25, 6-27
- autocommand ppp negotiate assigned to user 6-26, 6-28
- AVPs not assigned 6-14, 6-17
- does not have PPP service assigned 6-16
- feature is not supported on console ports 6-28
- group lacks shell service assigned 6-16
- Idle-Timeout RADIUS AVP not configured on group profile 6-18
- idletime TACACS+ AVP not configured on group profile 6-18
- Lack of service=shell AVP 6-28
- user client configuration error 6-13
- user exceeds the maximum number of concurrent sessions 6-19
- user or group does not have User-Service-Type AVP assigned 6-19
- user or group profile lacks proper AVP 6-18
- user or group profile restricted 6-18
- user or lacks service=shell AVP assigned 6-19
- user profile configured incorrectly 6-28
- user profile lacks appropriate enable level to perform command 6-25
- user profile lacks appropriate enable privilege level to perform command 6-27
- user profile lacks appropriate privilege level to perform command 6-25, 6-27
- user profile restricted 6-14
- profiles
- assigning user to group profile (TACACS+ authentication) 4-11
- assigning user to group profile (TACACS+ authorization) 4-16, 4-17, 4-18
- creating basic user 3-11
- group, configuring router access 4-13
- group, verifying (TACACS+ authentication) 4-11
- group, verifying (TACACS+ authorization) 4-16, 4-17, 4-18
- group configuration, TACACS+ 4-14
- group permissions (table) 4-13
- user, defining access privileges 6-5
- user, RADIUS 4-7, 4-9
- user, TACACS+ 4-3, 4-5
- user, verifying (TACACS+ authentication) 4-12
- user, verifying (TACACS+ authorization) 4-16, 4-17, 4-18
- user, verifying basic 3-11
- user configuration (RADIUS authentication) 4-7
- user configuration (RADIUS authorization) 4-9
- user configuration (TACACS+ authentication) 4-3
- user configuration (TACACS+ authorization) 4-5
- purpose
- case study xi
- RADIUS
- authentication tests (server-based) C4
- authorization tests (server-based) C5
- AVP examples (table) 1-6
- compared with TACACS+ 1-4
- compared with TACACS+ (table) 1-4
- configuring authentication (server-based) 4-6
- configuring authorization (server-based) 4-8
- creating user profiles (authentication) 4-7
- debug output, server-based authentication C4
- debug output, server-based authorization C5
- encryption 1-4
- example configuration (NAS) A-9
- interoperability 1-6
- NAS profile, creating 4-7
- negotiation process (flow diagram) 6-4
- RFC link 1-2
- See also AVPs
- See also troubleshooting
- technology overview 1-3
- troubleshooting scenario, authorization 6-36
- troubleshooting symptom list, authentication 6-10
- troubleshooting symptom list, authorization 6-15
- verifying access list assignment 4-10
- radius-server host command A-15
- Remote Authentication Dial-in User Service
- See RADIUS
- Requests for Comments
- See RFCs
- RFCs
- reference links 1-2
- router
- administration, command and control policy 1-11
- administrative control, creating 4-13
- authorization, controlling 4-13
- management, RADIUS vs. TACACS+ 1-5
- scenario
- case study description 1-8
- case study overview (figure) 1-2
- scenarios
- troubleshooting examples 6-29
- security
- policy considerations 1-12
- server-based access
- compared with local-based access 1-7
- defined 1-7
- server-based configuration
- implementation overview (authentication and authorization) 4-1
- verification test results (RADIUS authentication) C4
- verification test results (RADIUS authorization) C5
- verification test results (TACACS+ authentication) C1, C7
- verification test results (TACACS+ authorization) C2, C9
- verifying user (RADIUS authentication) 4-8, 4-9
- verifying user (TACACS+ authentication) 4-3
- verifying user (TACACS+ authorization) 4-5
- show caller user command
- access list verification output (server-based) 4-10, C6
- session timeout disconnect example 5-3
- show line command
- verification output (local-based) 2-8
- site preparation xi
- SMON
- verifying operation on Oracle server 3-3
- software
- case study listing xii
- software components
- Cisco IOS 12.0(7)T xii
- Oracle DB Client 7.3(4) xii
- Oracle DB Server 7.3(4) xii
- OS Solaris 2.5(1) xii
- SQL*Plus Release 3.3.4.0.1 xii
- SQL*Plus
- Release 3.3.4.0.1 xii
- sqlplus
- verifying account information 3-4
- symptom list, troubleshooting AAA
- dial-based local authentication 6-9
- dial-based local authorization 6-13
- dial-based server authentication 6-10
- dial-based server authorization 6-15
- router-based local authentication 6-19
- router-based local authorization 6-24
- router-based server authentication 6-21
- router-based server authorization 6-26
- syslog daemon
- restarting 3-10
- tablespace
- installing (Oracle) 3-2
- size requirements 3-2
- TAC
- contacting xiv
- TACACS
- RFC link 1-2
- TACACS+
- accounting tests (local-based) 2-13
- assigning user to group profile (authentication) 4-11
- assigning user to group profile (authorization) 4-16, 4-17, 4-18
- authentication and authorization (figure) 4-14
- authentication tests (local-based) 2-3, 2-9
- authentication tests (server-based) C1, C7
- authorization tests (local-based) 2-6, 2-11
- authorization tests (server-based) C2, C9
- AVP examples (table) 1-6
- compared with RADIUS 1-4
- compared with RADIUS (table) 1-4
- configuring accounting (local-based) 2-12
- configuring authentication (local-based) 2-2, 2-8
- configuring authentication (server-based) 4-2, 4-10
- configuring authorization (local-based) 2-5, 2-10
- configuring authorization (server-based) 4-4, 4-13
- configuring dial accounting (server-based) 5-1, 5-2
- configuring router accounting (server-based) 5-4
- creating user profiles (authentication) 4-3
- debug output, server-based authentication C1, C7
- debug output, server-based authorization C3, C9
- encryption 1-5
- example configuration (NAS) A-5
- multiprotocol support 1-5
- negotiation process, EXEC disabled (flow diagram) 6-6
- negotiation process, EXEC enabled (flow diagram) 6-5
- privilege level support 1-2
- RFC link 1-2
- router management 1-5
- See also AVPs
- See also troubleshooting
- service control 1-3
- technology overview 1-2
- troubleshooting scenario, authentication 6-29, 6-30, 6-31
- troubleshooting scenario, authorization 6-33, 6-34, 6-35
- troubleshooting symptom list, authentication 6-10, 6-21
- troubleshooting symptom list, authorization 6-15, 6-24, 6-26
- tacacs-server host command A-13, A-15
- tacacs-server key command A-13
- tail command
- reading the csuslog file C1
- verifying dialup authentication with csuslog (TACACS+) 4-4
- verifying PPP authorization with csuslog (TACACS+) 4-5
- verifying router authorization with csuslog (TACACS+) 4-16, 4-18, 4-19
- Technical Assistance Center
- See TAC
- technology
- AAA overview 1-1
- Terminal Access Controller Access Control System Plus
- See TACACS+
- tnsnames service
- verifying with tnsping utility 3-4
- tnsping
- using to verify tnsnames service 3-4
- troubleshooting
- diagnostic overview 6-1
- example scenarios 6-29
- methodology overview 6-7
- RADIUS authorization scenario 6-36
- See also problems
- See also RADIUS
- See also symptom list, troubleshooting AAA
- See also TACACS+
- TACACS+ authentication scenario 6-29, 6-30, 6-31
- TACACS+ authorization scenario 6-33, 6-34, 6-35
- UNIX
- version used in case study xii
- user
- creating profiles (RADIUS authentication) 4-7
- creating profiles (RADIUS authorization) 4-9
- creating profiles (TACACS+ authentication) 4-3
- creating profiles (TACACS+ authorization) 4-5
- user environment variable
- Oracle, listed A-23
- verification
- accounting, TACACS+ (local-based) 2-13
- accounting, TACACS+ (server-based) 5-2
- authentication, RADIUS (server-based) C4
- authentication, TACACS+ (local-based) 2-3, 2-9
- authentication, TACACS+ (server-based) C1, C7
- authorization, RADIUS (server-based) C5
- authorization, TACACS+ (local-based) 2-6, 2-11
- authorization, TACACS+ (server-based) C2, C9
- verification tests
- debug output, RADIUS authentication (server-based) C4
- debug output, RADIUS authorization (server-based) C5
- debug output, TACACS+ (local-based) 2-6, 2-11, 2-13
- debug output, TACACS+ (server-based accounting) 5-3, 5-5
- debug output, TACACS+ authentication (server-based) C1, C7
- debug output, TACACS+ authorization (server-based) C3, C9
- SQL query (accounting) 5-2, 5-5
- ViewProfile command
- verifying basic user configuration 3-11
- verifying user configuration (RADIUS authentication) 4-8, 4-9
- verifying user configuration (TACACS+ authentication) 4-3
- verifying user configuration (TACACS+ authorization) 4-5







Posted: Fri Jun 2 20:54:30 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.