|
|
This chapter describes management protocols and Network Access Server (NAS) security and control functionality with AAA and RADIUS servers.
Remote Monitoring (RMON) is an Internet Engineering Task Force (IETF) monitoring standard (RFC 1757) that allows console systems and network monitors to exchange statistical and functional monitoring data through RMON-compliant console managers and network probes. RMON provides network administrators with flexibility to satisfy networking demands through console and network monitoring probes to obtain fault diagnostics, planning, and performance information.
RMON delivers information in nine unique monitoring element groups that provide specific types of data which satisfies common network-monitoring requirements. Some RMON groups are dependent upon others for support but each is optional so it is not necessary for vendors to support all the groups within the Mananagement Information Base (MIB). See Table 4-1 for RMON group functions.
| RMON Group | Description |
|---|---|
Alarm | Periodic statistical sampling from event generated variables in the probe that compares configured thresholds. |
Events | Controls the generates and notification of events from this device. |
Filters | Enables packet matching by equation filtering to form data streams that may be captured or generate events. |
History | Records and stores periodic statistical samples, number of samples, and items sampled from a network. |
Host | Contains statistics associated with each discovered network host. |
HostTopN | Creates tables describing hosts that top a list ordered by one of their rate-based statistics. |
Matrix | Stores new conversation statistics detected on source and destination device. |
Packet Capture | Enables packet capturing after they flow through a channel. |
Statistics | Contains probe calculated statistics for each interface monitored on device. |
This section describes how to enable basic management protocols on a Cisco AS5800 as part of a dial access service. It does not however, describe how to integrate the Cisco IOS software with NT or UNIX servers. Management protocols are described only from the perspective of the Cisco IOS software.
Figure 4-1 shows a logical perspective of how management protocols interact between the Cisco IOS software (client) and a network element management server. Dashed lines represent different protocols and functions.
Table 4-2 provides the RFCs and URLs for the management protocols described in this section.
| Management Protocol | RFC | URL |
|---|---|---|
RFC 1157 |
For more information about system management, refer to Cisco IOS Release 12.0 Configuration Fundamentals Configuration Guide and Command Reference at the following URL:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/12cgcr/index.htm
The Network Time Protocol (NTP) provides a common time base for networked routers, servers, and other devices. A synchronized time enables you to correlate syslog and Cisco IOS debug output to specific events. For example, you can find call records for specific users within one millisecond.
Comparing logs from various networks is essential for:
Without precise time synchronization between all the various logging, management, and AAA functions, time comparisons are not possible.
An NTP enabled network usually gets its time from an authoritative time source, such as a Cisco router, radio clock, or an atomic clock attached to a timeserver. NTP then distributes this time across the network. NTP is extremely efficient; no more than one packet per minute is necessary to synchronize two machines to within a millisecond of one another. NTP runs over UDP, which in turn runs over IP.
![]() |
Note For more information, refer to the following URL: http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/12cgcr/fun_c/fcprt3/ fcgenral.htm |
Step 2 Specify the primary NTP server IP address and automatic calendar updates as shown below:
!ntp update-calendar ntp server 172.22.66.18 prefer!
Step 3 Verify that the clock is synchronized to the NTP server. Inspect the status and time association. Clock sources are identified by their stratum levels. The following example shows a stratum level five clock.
5800-NAS#show ntp status Clock is synchronized, stratum 5, reference is 172.22.66.18 nominal freq is 250.0000 Hz, actual freq is 250.0000 Hz, precision is 2**24 reference time is BB944312.4451C9E7 (23:11:30.266 PDT Wed Sep 22 1999) clock offset is 0.5343 msec, root delay is 13.26 msec root dispersion is 18.02 msec, peer dispersion is 0.09 msec 5800-NAS#
The following command identifies how often the NAS is polling and updating to the stratum clock. An asterisk (*) next to the NTP server's IP address indicates successful synchronization with the stratum clock.
5800-NAS#show ntp association address ref clock st when poll reach delay offset disp *~172.22.66.18 172.60.8.1 16 46 64 377 1.0 0.53 0.1 * master (synced), # master (unsynced), + selected, - candidate, ~ configured 5800-NAS#
The Cisco IOS software can send syslog messages to one or more element manager servers. Syslog messages are then collected by a standard UNIX or NT type syslog daemon.
Syslog enables you to:
Figure 4-2 shows the Cisco IOS software sending syslog data to an element manager. Syslog data either stays in the Cisco IOS software buffer or is pushed out and written to the element manager's hard disk.
![]() |
Note Cisco System's UNIX syslog format is compatible with 4.3 BSD UNIX. |
!service timestamps debug datetime msec localtime show-timezone service timestamps log datetime msec localtime show-timezone!
Step 2 Verify that console logging is disabled. If it is enabled, the NAS will intermittently freeze up as soon as the console port is overloaded with log messages. See the field "1 flushes." Increments on this number represents bad logging behavior.
5800-NAS#show logging
Syslog logging: enabled (0 messages dropped, 1 flushes, 0 overruns)
Console logging: level debugging, 1523 messages logged
Monitor logging: level debugging, 0 messages logged
Buffer logging: level debugging, 911 messages logged
Trap logging: level informational, 44 message lines logged
5800-NAS(config)#no logging console
5800-NAS(config)#^Z
5800-NAS#show logging
Syslog logging: enabled (0 messages dropped, 1 flushes, 0 overruns)
Console logging: disabled
Monitor logging: level debugging, 0 messages logged
Buffer logging: level debugging, 912 messages logged
Trap logging: level informational, 45 message lines logged
![]() |
Caution Not entering the no logging console command, might cause CPU interrupts, dropped packets, and denial of service events. The router might lock up. |
Step 3 Specify the logging configuration:
!logging 172.22.66.18 logging buffered 10000 debugging logging trap debugging!
Table 4-3 describes the commands in the previous configuration fragment.
| Command | Purpose |
|---|---|
logging 172.22.66.18 | Specifies the syslog server's IP address. |
logging buffered 10000 debugging | Sets the internal log buffer to 10000 bytes for debug output (newer messages overwrite older messages). |
logging trap debugging | Allows logging up to the debug level (all 8 levels) for all messages sent to the syslog server. |
If you are working with multiple network access servers, assign a different logging facility tag to each server. Syslog information can be collected and sorted into different files on the syslog server.
For example:
Assigning a different tag to each device enables you to intelligently sort and view syslog messages:
!logging facility local7!
Step 4 Verify that local buffered logging is working:
5800-NAS#show logging
Syslog logging: enabled (0 messages dropped, 0 flushes, 0 overruns)
Console logging: disabled
Monitor logging: level debugging, 0 messages logged
Buffer logging: level debugging, 2 messages logged
Trap logging: level debugging, 53 message lines logged
Logging to 172.22.66.18, 2 message lines logged
Log Buffer (10000 bytes):
Sep 26 16:32:02.848 PDT: %SYS-5-CONFIG_I: Configured from console by admin on console
Sep 26 16:33:16.069 PDT: %SYS-5-CONFIG_I: Configured from console by admin on console
5800-NAS#
The SNMP traps generated by Cisco routers provide useful information:
The Cisco IOS software generates SNMP traps based on the features that the Cisco IOS software supports.
Figure 4-3 shows the interactions and timing of the SNMP protocol between the EM (SNMP manager) and the NAS (SNMP agent). Traps are unsolicited messages sent from the NAS to the EM. There are four functions of SNMP: trap, get request, get next, and set request.
![]() |
Note For a listing of all SNMP traps supported by Cisco, refer to the following URL: http://www.cisco.com/public/mibs/traps/ |
!snmp-server contact admin user@the.doc snmp-server location 5800-NAS-corporate snmp-server community poptarts RO 8 snmp-server community pixysticks RW 5 snmp-server host 172.22.66.18 maddog snmp-server trap-source Loopback0 snmp-server enable traps snmp!access-list 5 permit 172.22.67.1 access-list 5 permit 0.0.0.1 172.22.68.20 access-list 8 permit 172.22.67.1 access-list 8 permit 0.0.0.1 172.22.68.20!
Table 4-4 describes commands in the previous configuration fragment.
| Command | Purpose |
|---|---|
snmp-server contact admin user@the.doc | Specifies a contact name to notify whenever a MIB problems occurs. |
snmp-server location 5800-NAS-corporate | Specifies a geographic location name for the router. |
snmp-server community poptarts RO 8 | Assigns a read only (RO) community string. Only queries and get requests can be performed. The community string (poptarts) allows polling but no configuration changes. Without the correct community string on both machines, SNMP will not let you do the authorization to get or set the request. |
snmp-server community pixysticks RW 5 | Assigns a read write (RW) community string. This community string (pixysticks) enables configuration changes to be performed. For example, you can shut down an interface, download a configuration file, or change a password. |
snmp-server host 172.22.66.18 maddog | Identifies the IP address of the SNMP host followed by a password. |
snmp-server trap-source Loopback0 | Associates SNMP traps with a loopback interface. In this way, an Ethernet shutdown will not disrupt SNMP management flow. |
snmp-server enable traps | Enables traps for unsolicited notifications for configuration changes, environmental variables, and device conditions. |
access-list 5 permit 172.22.67.1 access-list 8 permit 172.22.67.1 | Permits access from a single element management server. |
access-list 5 permit 0.0.0.1 172.22.68.20 access-list 8 permit 0.0.0.1 172.22.68.20 | Permits access from a block of addresses at your network operations center. |
![]() |
Caution If you are not using SNMP, make sure to turn it off. Never use a configuration that uses "public" or "private" as community stringsthese strings are well known in the industry and are common defaults on much hardware. These strings are open invitations to attacks, regardless if you use filters. |
Step 2 Monitor SNMP input and output statistics. For example, display a real-time view of who is polling the NAS for statistics and how often.
Excessive polling will:
5800-NAS#show snmp
Chassis: 11811596
Contact: admin user@the.doc
Location: 5800-NAS-corporate
0 SNMP packets input
0 Bad SNMP version errors
0 Unknown community name
0 Illegal operation for community name supplied
0 Encoding errors
0 Number of requested variables
0 Number of altered variables
0 Get-request PDUs
0 Get-next PDUs
0 Set-request PDUs
0 SNMP packets output
0 Too big errors (Maximum packet size 1500)
0 No such name errors
0 Bad values errors
0 General errors
0 Response PDUs
0 Trap PDUs
SNMP logging: enabled
Logging to 172.22.66.18.162, 0/10, 0 sent, 0 dropped.
5800-NAS#
Limit the amount of output logged from the group-async interface and ISDN D channels. Carefully choose the data sources for system management purposes. AAA accounting and the modem-call record terse feature provides the best data set for analyzing ISDN remote node device activity.
Link status up-down events and SNMP trap signals:
The following configuration fragment disables logging on access interfaces:
!interface Serial 0:23 no logging event link-status no snmp trap link-status!interface Serial 1:23 no logging event link-status no snmp trap link-status!interface Serial 2:23 no logging event link-status no snmp trap link-status!interface Serial 3:23 no logging event link-status no snmp trap link-status!interface Group-Async 1 no logging event link-status no snmp trap link-status!
The following is a sample of the AS5800 running configuration with Cisco IOS Release 12.0(4) XL1 installed.
5800-NAS#show running-config Building configuration... Current configuration: ! version 12.0 service timestamps debug datetime msec localtime show-timezone service timestamps log datetime msec localtime show-timezone service password-encryption ! hostname 5800-NAS ! logging buffered 10000 debugging no logging console aaa new-model aaa authentication login default local aaa authentication ppp default if-needed local enable secret 5 $1$LKgL$tgi19XvWn7fld7JGt55p01 ! username dude password 7 045802150C2E username admin password 7 044E1F050024 ! ! ! shelf-id 0 router-shelf shelf-id 1 dial-shelf ! ! ! resource-pool disable ! modem-pool Default pool-range 1/2/0-1/10/143 ! ! spe 1/2/0 1/10/11 firmware ios-bundled default modem recovery action none ip subnet-zero no ip source-route ip host guessme 172.22.100.9 ip domain-name the.net ip name-server 172.22.11.10 ip name-server 172.22.12.11 ! async-bootp dns-server 172.30.10.1 172.30.10.2 isdn switch-type primary-ni isdn voice-call-failure 0 ! ! controller T3 1/0/0 framing m23 cablelength 0 t1 4 controller ! controller T1 1/0/0:4 framing esf pri-group timeslots 1-24 ! ! voice-port 1/0/0:4:D ! ! process-max-time 200 ! interface Loopback0 ip address 172.22.99.1 255.255.255.255 no ip directed-broadcast ! interface Loopback1 ip address 172.22.90.1 255.255.255.0 no ip directed-broadcast ! interface FastEthernet0/1/0 ip address 172.22.66.23 255.255.255.0 no ip directed-broadcast ! interface Serial1/0/0:4:23 no ip address no ip directed-broadcast no snmp trap link-status isdn switch-type primary-ni isdn incoming-voice modem no cdp enable ! interface Group-Async0 ip unnumbered FastEthernet0/1/0 no ip directed-broadcast encapsulation ppp async mode interactive no snmp trap link-status peer default ip address pool addr-pool no cdp enable ppp authentication chap pap group-range 1/2/00 1/10/143 ! ip local pool addr-pool 172.22.90.2 172.22.90.254 ip classless ip route 0.0.0.0 0.0.0.0 172.22.66.1 no ip http server ! logging trap debugging logging 172.22.66.18 access-list 5 permit 172.22.67.1 access-list 5 permit 0.0.0.1 172.22.68.20 access-list 8 permit 172.22.67.1 access-list 8 permit 0.0.0.1 172.22.68.20 snmp-server engineID local 00000009020000D0D3424C1C snmp-server community poptarts RO 8 snmp-server community pixysticks RW 5 snmp-server community maddog view v1default RO snmp-server trap-source Loopback0 snmp-server location 5800-NAS-Austin snmp-server contact admin dude@the.net snmp-server enable traps snmp snmp-server enable traps isdn call-information snmp-server enable traps hsrp snmp-server enable traps config snmp-server enable traps entity snmp-server enable traps envmon snmp-server enable traps syslog snmp-server enable traps rsvp snmp-server enable traps frame-relay snmp-server enable traps rtr snmp-server enable traps dial snmp-server enable traps dsp card-status snmp-server enable traps bgp snmp-server enable traps voice poor-qov snmp-server host 172.22.66.18 maddog ! banner login ^C This is a secured device. Unauthorized use is prohibited by law. ^C ! line con 0 transport input none line aux 0 transport input telnet line vty 0 4 line 1/2/00 1/10/143 autoselect during-login autoselect ppp modem InOut no modem log rs232 ! ntp update-calendar ntp server 172.22.66.18 prefer end
The Cisco AS5800 is designed to support a security paradigm providing authentication, authorization, and accounting (AAA) security measures using RADIUS and TACACS+.
This section describes how to configure security using a local database resident on your Cisco AS5800 or using a remote security database for Terminal Access Controller Access Control System with Cisco proprietary enhancements (TACACS+) and Remote Authentication Dial-In User Service (RADIUS). Refer to section "Local vs. Remote Server Authentication" for local and remote authentication definitions.
![]() |
Note This section does not provide a comprehensive security overview. It does not describe how to completely configure TACACS, Extended TACACS, access lists or RADIUS. It presents the most commonly used security mechanisms to prevent unauthenticated and unauthorized access to network resources through a Cisco AS5800. For a comprehensive overview of Cisco security tools, refer to the Security Configuration Guide in the Cisco IOS configuration guides and command references documentation. |
This section describes the following specific topics:
This section describes the differences between local and remote security databases and the basic authentication process for each. Remote security databases described in this section include Terminal Access Controller Access Control System with Cisco proprietary enhancements (TACACS+) and Remote Authentication Dial-In User Service (RADIUS).
Generally the size of the network and type of corporate security policies and control determine whether you use a local or remote security database.
If you have one or two Cisco AS5800 providing access to your network, store username and password security information on your Cisco AS5800. This is referred to as local authentication.
As your network expands, you need a centralized security database that provides username and password information to each of the access servers comprising the network. This centralized security database resides in a security server.
A centralized security database helps establish consistent remote access policies throughout a corporation. An example of a remote security database server is the CiscoSecure product from Cisco Systems. CiscoSecure is a UNIX security daemon, with which the administrator creates a database that defines the network users and their privileges. CiscoSecure uses a central database that stores user and group profiles with authentication and authorization information.
The Cisco AS5800 exchanges user authentication information with a TACACS+ or RADIUS database on the security server by transmitting encrypted TACACS+ or RADIUS packets across the network.
For specific information about the interaction between the security server and the Cisco AS5800, refer to the Security Configuration Guide in the Cisco IOS configuration guides and command references documentation.
This section describes the Remote Authentication Dial-In User Service (RADIUS) security system, defines its operation, and identifies appropriate and inappropriate network environments for using RADIUS technology. The "RADIUS Configuration Task List" section describes how to configure RADIUS with the authentication, authorization, and accounting (AAA) command set. The "RADIUS Configuration Examples" section at the end of this section offers two possible implementation scenarios.
This section includes the following topics:
For a complete description of the commands used in this section, refer to the "RADIUS Commands" chapter in the Security Command Reference. To locate documentation of other commands that appear in this section, use the command reference master index or search online.
RADIUS is a distributed client/server system that secures networks against unauthorized access. In the Cisco implementation, RADIUS clients run on Cisco routers and send authentication requests to a central RADIUS server that contains all user authentication and network service access information.
RADIUS is a fully open protocol, distributed in source code format, that can be modified to work with any security system currently available on the market.
Cisco supports RADIUS under its AAA security paradigm. RADIUS can be used with other AAA security protocols, such as TACACS+, Kerberos, or local username lookup. RADIUS is supported on all Cisco platforms.
RADIUS has been implemented in a variety of network environments that require high levels of security while maintaining network access for remote users.
Use RADIUS in the following network environments that require access security:
RADIUS is not suitable in the following network security situations:
When attempting to log in and authenticate to an Cisco AS5800 using RADIUS, the following steps occur:
1. The user enters a username and password at the corresponding prompts.
2. The username and encrypted password are sent over the network to the RADIUS server.
3. The user receives one of the following responses from the RADIUS server:
The ACCEPT or REJECT response is bundled with additional data that is used for EXEC or network authorization. You must first complete RADIUS authentication before using RADIUS authorization. The additional data included with the ACCEPT or REJECT packets consists of the following:
To configure RADIUS on your Cisco AS5800, you must perform the following tasks:
The following configuration tasks are optional:
This section describes how to set up RADIUS for authentication, authorization, and accounting on your network, and includes the following sections:
The RADIUS host is normally a multiuser system running RADIUS server software from Livingston, Merit, Microsoft, or another software provider. A RADIUS server and a Cisco router use a shared secret text string to encrypt passwords and exchange responses.
To configure RADIUS to use the AAA security commands, you must specify the host running the RADIUS server daemon and a secret text string that it shares with the router. Use the radius-server commands to specify the RADIUS server host and a secret text string.
To specify a RADIUS server host and shared secret text string, perform the following tasks in global configuration mode.
Specify the IP address or host name of the remote RADIUS server host and assign authentication and accounting destination port numbers.
radius-server host {hostname | ip-address}
[auth-port port-number] [acct-port port-number]
Specify the shared secret text string used between the router and the RADIUS server.
radius-server key string
To customize communication between the router and the RADIUS server, use the following optional radius-server global configuration commands.
Specify the number of times the router transmits each RADIUS request to the server before giving up (default is three).
radius-server retransmit retries
Specify the number of seconds a router waits for a reply to a RADIUS request before retransmitting the request.
radius-server timeout seconds
Specify the number of minutes a RADIUS server, which is not responding to authentication requests, is passed over by requests for RADIUS authentication.
radius-server deadtime minutes
The Internet Engineering Task Force (IETF) draft standard specifies a method for communicating vendor-specific information between the network Cisco AS5800 and the RADIUS server by using the vendor-specific attribute (Attribute 26). Vendor-specific attributes (VSAs) allow vendors to support their own extended attributes not suitable for general use. The Cisco RADIUS implementation supports one vendor-specific option using the format recommended in the specification. Cisco's vendor-ID is 9, and the supported option has vendor-type 1, which is named "cisco-avpair." The value is a string of the format:
protocol : attribute sep value *
"Protocol" is a value of the Cisco "protocol" attribute for a particular type of authorization. "Attribute" and "value" are an appropriate attribute/value (AV) pair defined in the Cisco TACACS+ specification, and "sep" is "=" for mandatory attributes and "*" for optional attributes. This allows the full set of features available for TACACS+ authorization to also be used for RADIUS.
For example, the following AV pair causes Cisco's "multiple named ip address pools" feature to be activated during IP authorization (during PPP's IPCP address assignment).
cisco-avpair= "ip:addr-pool=first"
The following example causes a "NAS Prompt" user to have immediate access to EXEC commands.
cisco-avpair= "shell:priv-lvl=15"
Other vendors have their own unique vendor-IDs, options, and associated VSAs. For more information about vendor-IDs and VSAs, refer to RFC 2138, "Remote Authentication Dial-In User Service (RADIUS)."
To configure the NAS to recognize and use VSAs, perform the following task in global configuration mode:
Enable the network Cisco AS5800 to recognize and use VSAs as defined by RADIUS IETF attribute 26.
radius-server vsa send [accounting|authentication]
For a complete list of RADIUS attributes or more information about vendor-specific Attribute 26, refer to the RADIUS Attributes appendix.
Although the IETF draft standard for RADIUS specifies a method for communicating vendor-specific information between the network Cisco AS5800 and the RADIUS server, some vendors have extended the RADIUS attribute set in a unique way. Cisco IOS software supports a subset of vendor-proprietary RADIUS attributes.
As mentioned earlier, to configure RADIUS (whether vendor-proprietary or IETF draft-compliant), you must specify the host running the RADIUS server daemon and the secret text string it shares with the Cisco device. You specify the RADIUS host and secret text string by using the radius-server commands. To identify that the RADIUS server is using a vendor-proprietary implementation of RADIUS, use the radius-server host nonstandard command.
Vendor-proprietary attributes will not be supported unless you use the radius-server host non-standard command.
To specify a vendor-proprietary RADIUS server host and a shared secret text string, perform the following tasks in global configuration mode.
Specify the IP address or host name of the remote RADIUS server host and identify that it is using a vendor-proprietary implementation of RADIUS.
radius-server host {hostname |ip-address} non-standard
Specify the shared secret text string used between the router and the vendor-proprietary RADIUS server. The router and the RADIUS server use this text string to encrypt passwords and exchange responses.
radius-server key string
Some vendor-proprietary implementations of RADIUS let the user define static routes and IP pool definitions on the RADIUS server instead of on each individual network Cisco AS5800 in the network. Each network Cisco AS5800 then queries the RADIUS server for static route and IP pool information.
To have the Cisco AS5800 query the RADIUS server for static routes and IP pool definitions when the device first starts up, perform the following task in global configuration mode.
Tell the Cisco AS5800 to query the RADIUS server for the static routes and IP pool definitions used throughout its domain.
radius-server configure-nas
![]() |
Note Because the radius-server configure-nas command is performed when the Cisco router starts up, it will not take effect until you enter a copy running-config startup-config command. |
There are some situations when PPP or login authentication occurs on an interface different from the interface on which the call itself comes in. For example, in a V.120 ISDN call, login or PPP authentication occurs on a virtual asynchronous interface "ttt" but the call itself occurs on one of the channels of the ISDN interface.
The radius-server attribute nas-port extended command configures RADIUS to expand the size of the NAS-Port attribute (RADIUS IETF Attribute 5) field to 32 bits. The upper 16 bits of the NAS-Port attribute display the type and number of the controlling interface; the lower 16 bits indicate the interface undergoing authentication.
To display expanded interface information in the NAS-port attribute field, perform the following task in global configuration mode.
Expand the NAS-port attribute size from 16 to 32 bits to display extended interface information.
radius-server attribute nas-port extended
![]() |
Note This command replaces the deprecated radius-server extended-portnames command. |
On platforms with multiple interfaces (ports) per slot, the Cisco RADIUS implementation will not provide a unique NAS-Port attribute that permits distinguishing between the interfaces. For example, if a dual PRI interface is in slot 1, calls on both Serial1/0:1 and Serial1/1:1 will appear as NAS-Port = 20101. This is because of the 16-bit field size limitation associated with RADIUS IETF NAS-port attribute. In this case, the solution is to replace the NAS-port attribute with a vendor-specific attribute (RADIUS IETF Attribute 26). Cisco's vendor-ID is 9, and the Cisco-NAS-Port attribute is subtype 2. Vendor-specific attributes (VSAs) can be turned on by entering the radius-server vsa send command. The port information in this attribute is provided and configured using the aaa nas port extended command.
To replace the NAS-port attribute with RADIUS IETF Attribute 26 and to display extended field information, perform the following tasks in global configuration mode.
Enable the network Cisco AS5800 to recognize and use vendor-specific attributes as defined by RADIUS IETF Attribute 26.
radius-server vsa send [accounting | authentication]
Expand the size of the VSA nas-port field from 16 to 32 bits to display extended interface information.
aaa nas-port extended
The standard NAS-Port attribute (RADIUS IETF Attribute 5) will continue to be sent. If you don't want this information to be sent, you can suppress it by using the no radius-server attribute nas-port command. When this command is configured, the standard NAS-Port attribute will no longer be sent.
After you have identified the RADIUS server and defined the RADIUS authentication key, you need to define method lists for RADIUS authentication. Because RADIUS authentication is facilitated through AAA, you need to enter the aaa authentication command, specifying RADIUS as the authentication method. For more information, refer to the "Configuring Authentication" chapter in the Security Configuration Guide.
AAA authorization lets you set parameters that restrict a user's network access. Authorization using RADIUS provides one method for remote access control, including one-time authorization or authorization for each service, per-user account list and profile, user group support, and support of IP, IPX, ARA, and Telnet. Because RADIUS authorization is facilitated through AAA, you need to issue the aaa authorization command, specifying RADIUS as the authorization method.
The AAA accounting feature enables you to track the services users are accessing and the amount of network resources they are consuming. Because RADIUS accounting is facilitated through AAA, you need to issue the aaa accounting command, specifying RADIUS as the accounting method.
The network Cisco AS5800 monitors the RADIUS authorization and accounting functions defined by RADIUS attributes in each user-profile.
An Internet Engineering Task Force (IETF) draft standard for RADIUS specifies a method for communicating vendor-proprietary information between the network Cisco AS5800 and the RADIUS server. Some vendors, nevertheless, have extended the RADIUS attribute set in a unique way. Cisco IOS software supports a subset of vendor-proprietary RADIUS attributes.
RADIUS configuration examples in this section include the following:
The following example shows a router configuration to authenticate and authorize using RADIUS.
aaa authentication login use-radius radius local aaa authentication ppp user-radius if-needed radius aaa authorization exec radius aaa authorization network radius
These RADIUS authentication and authorization configuration commands are defined as follows:
The following sample is a general configuration using RADIUS with the AAA command set.
radius-server host 123.45.1.2 radius-server key myRaDiUSpassWoRd username root password ALongPassword aaa authentication ppp dialins radius local aaa authorization network radius local aaa accounting network start-stop radius aaa authentication login admins local aaa authorization exec local line 1 16 autoselect ppp autoselect during-login login authentication admins modem ri-is-cd interface group-async 1 encaps ppp ppp authentication pap dialins
The lines in this sample RADIUS authentication, authorization, and accounting configuration are defined as follows:
The following sample is a general configuration using vendor-proprietary RADIUS with the AAA command set.
radius-server host alcatraz non-standard radius-server key myRaDiUSpassWoRd radius-server configure-nas username root password ALongPassword aaa authentication ppp dialins radius local aaa authorization network radius local aaa accounting network start-stop radius aaa authentication login admins local aaa authorization exec local line 1 16 autoselect ppp autoselect during-login login authentication admins modem ri-is-cd interface group-async 1 encaps ppp ppp authentication pap dialins
The lines in this sample RADIUS authentication, authorization, and accounting configuration are defined as follows:
The following Cisco IOS software support is available for RADIUS.
1. AAA commands
2. RADIUS commands
3. RADIUS & AAA debugs
aaa new-model aaa authentication login CONSOLE none aaa authentication login RADIUS_LIST radius aaa authentication login TAC_PLUS tacacs+ enable aaa authentication login V.120 none aaa authentication enable default enable tacacs+ aaa authentication ppp RADIUS_LIST if-needed radius aaa authorization exec RADIUS_LIST radius if-authenticated aaa authorization exec V.120 none aaa authorization network default radius if-authenticated aaa authorization network V.120 radius if-authenticated aaa authorization network RADIUS_LIST if-authenticated radius aaa accounting suppress null-username aaa accounting delay-start aaa accounting exec default start-stop radius aaa accounting commands 0 default start-stop radius aaa accounting network default start-stop radius aaa accounting connection default start-stop radius aaa accounting system default start-stop radius aaa nas port extended aaa udp kick protocol stack in butt
ip radius source-interface subinterface-name
radius-server configure-nas
radius-server dead-time minutes
radius-server extended-portnames (*deprecated)
radius-server attribute nas-port extended (old)
radius-server attribute nas-port format {a | b | c} (new)
radius-server host {hostname | ip} [auth-port port#] [acct-port port#]
radius-server host {hostname | ip} non-standard
radius-server host {hostname | ip} ignore
radius-server host {hostname | ip}
radius-server key {string}
radius-server retransmit retries
radius-server timeout seconds
debug radius debug aaa authorization debug aaa authentication debug aaa peruser debug ppp negotiation debug ppp authentication debug isdn q931
The following global configuration commands provide basic security and local database configuration.
5800-1(config)# aaa new-model
Step 2 Enable AAA authentication method during login.
5800-1(config)# aaa authentication login default local
Step 3 Enable AAA authentication method during login using a methods list.
5800-1(config)# aaa authentication login console none
Step 4 Enable AAA authentication method for use on serial interfaces running PPP when TACACS+ is used.
5800-1(config)# aaa authentication ppp default if-needed local
Step 5 Enter authorization for username and password.
5800-1(config)# username username password password
Use the AAA facility to authenticate users with either a local or a remote security database. For more information about what a local and remote security database are, refer to the section "Local vs. Remote Server Authentication".
Whether you maintain a local or remote security database, or use TACACS+ or RADIUS authentication and authorization, the process of configuring the Cisco AS5800 for these different databases and protocols is similar. The basic process of configuring the Cisco IOS software for authentication requires the following tasks:
1. Securing Access to Privileged EXEC and Configuration Mode
2. Communicating Between the Access and Security Servers
4. Defining Authentication Method Lists
5. Applying Authentication Method Lists to Lines and Interfaces
The first step is to secure access to privileged EXEC (enable) mode. Enable mode provides access to configuration mode, which enables any type of configuration change to the Cisco AS5800. To secure privileged EXEC mode access, use one of the following commands.
The enable secret password takes precedence over the enable password when it exists. The same password cannot be used for both commands. You can view the encrypted version of the enable secret password using the show running-config or show startup-config commands. (The encrypted version of the password is noted with * in the following example.)
5800-1(config)# show running-config Using 1899 out of 126968 bytes ! Version 11.3 AA . . . ! hostname 5800-1 ! enable secret 5 $1$60L4$X2JYOwoDc0.kqa1lo0/w8/* . . .
![]() |
Note For more information about the enable password and enable secret commands and their complete syntax, refer to the Security Command Reference in the Cisco IOS configuration guides and command references documentation. |
![]() |
Note The enable secret password overrides the enable password. |
The following global configuration commands provide an encrypted password using enable secret.
5800-1(config)#enable secret password5800-1(config)#
Step 2 Type the exit command to exit out of global configuration mode.
5800-1(config)# exit
5800-1#
Step 3 Enter the show running-config command to view the encrypted version of the cleartext password that was entered in Step 1. The encrypted password is noted with **.
5800-1# show running-config Building configuration... Current configuration: ! version 11.3 AA ! some of the configuration skipped enable secret 5 $1$h7dd$VTNs4.BAfQMUU0Lrvw6570** ! the rest of the configuration skipped
![]() |
Note Encryption type 5 is the only valid encryption type for enable secret. |
Step 4 Type Ctrl-Z to return to privileged EXEC mode.
5800-1(config)#Ctrl-Z5800-1#
Step 5 Save changes.
5800-1# copy running-config startup-config
You can also specify additional protection for privileged EXEC mode, including the following:
For more information about these security tools, refer to the Security Configuration Guide in the Cisco IOS configuration guides and command references documentation.
This section describes the Cisco IOS software commands that enable the Cisco AS5800 to communicate with a security server. This process is similar for communicating with TACACS+ and RADIUS servers, and the following sections describe the process.
If you are using a remote security server for authentication and authorization, you must configure the security server before performing the tasks described in this section. The section "TACACS+ Security Examples" at the end of this section shows some typical TACACS+ and RADIUS server entries corresponding to the Cisco AS5800 security configurations.
The following global configuration commands enable communication between the TACACS+ security (database) server and the Cisco AS5800.
5800-1(config)# tacacs-server host {hostname | ip-address}
Step 2 Specify a shared secret text string used between the Cisco AS5800 and the TACACS+ server. The Cisco AS5800 and TACACS+ server use this text string to encrypt passwords and exchange responses.
5800-1(config)# tacacs-server key shared-secret-text-string
Step 3 Type Ctrl-Z to return to privileged EXEC mode.
5800-1(config)#Ctrl-Z5800-1#
Step 4 Save your changes when ready.
5800-1# copy running-config startup-config
For example, to enable the remote TACACS+ server to communicate with the Cisco AS5800, enter the commands as follows:
5800-1# configure terminal 5800-1(config)# tacacs-server host alcatraz 5800-1(config)# tacacs-server key abra2cad
The host name of the TACACS+ server in the previous example is alcatraz. The key in the previous example (abra2cad) is the encryption key shared between the TACACS+ server and the Cisco AS5800. Substitute your own TACACS+ server host name and password for those shown.
For more information about these commands, refer to the Security Command Reference, which is part of the Cisco IOS configuration guides and command references documentation.
On most TACACS+ security servers, there are three ways to authenticate a user for login:
user = birdman {global = cleartext "birdman global password"}
user = aaaa chap = cleartext "chap password" login = des XQj4892fjk}
default authentication = /etc/passwd
user= bbbb {login = skey}
5800-1# configure terminal 5800-1(config)# aaa new-model 5800-1(config)# aaa authentication login default tacacs+ enable
![]() |
Caution When you issue the aaa authentication login default tacacs+ enable command, you are specifying that if your TACACS+ server fails to respond (because it is set up incorrectly), you can log in to the Cisco AS5800 by using your enable password. If you do not have an enable password set on the Cisco AS5800, you will not be able to log in to it until you have a functioning TACACS+ daemon configured with usernames and passwords. The enable password in this case is a last-resort authentication method. You can also specify none as the last-resort method, which means that no authentication is required if all other methods failed. |
To use the AAA security facility in the Cisco IOS software, you must issue the aaa new-model command from global configuration mode.
When you issue the aaa new-model command, all lines on the Cisco AS5800 receive the implicit login authentication default method list, and all interfaces with PPP enabled have an implicit ppp authentication pap default method list applied.
![]() |
Caution If you intend to authenticate users via a security server, make sure you do not inadvertently lock yourself out of the Cisco AS5800 ports after you issue the aaa new-model command. Enter line configuration mode and issue the aaa authentication login default tacacs+ enable global configuration command. This command specifies that if your TACACS+ (or RADIUS) server is not functioning properly, you can enter your enable password to log in to the Cisco AS5800. In general, verify you have a last-resort access method before you are certain that your security server is set up and functioning properly. For more information about the aaa authentication command, refer to the next section "Defining Authentication Method Lists." |
![]() |
Note Cisco recommends that you use CHAP authentication with PPP, rather than PAP. CHAP passwords are encrypted when they cross the network, whereas PAP passwords are cleartext when they cross the network. The Cisco IOS software selects PAP as the default, so you must manually select CHAP. The process for specifying CHAP is described in the section "Applying Authentication Method Lists". |
5800-1# configure terminal 5800-1(config)# aaa new-model
After you enable AAA globally on the Cisco AS5800, you need to define authentication method lists, which you then apply to lines and interfaces. These authentication method lists are security profiles that indicate the protocol (PPP) or login and authentication method (TACACS+, RADIUS, or local authentication).
To define an authentication method list, follow these steps, which are described in this section:
1. Issue the aaa authentication command.
2. Specify protocol (PPP) or login authentication.
3. Identify a list name or default. A list name is any alphanumeric string you choose. You assign different authentication methods to different named lists.
4. Specify the authentication method. You can specify multiple methods, such as tacacs+, followed by local if a TACACS+ server is not available on the network.
5. Populate the local username database if you specified local as the authentication method (or one of the authentication methods). To use a local username database, you must issue the username global configuration command. Refer to the section "Populate the Local Username Database if Necessary."
After defining these authentication method lists, apply them to your interfaces (synchronous or asynchronous) configured for PPP.
Refer to the section "Applying Authentication Method Lists" for information regarding how to apply these lists.
To define an authentication method list, start by issuing the aaa authentication global configuration command, as shown in the following example:
5800-1# configure terminal 5800-1(config)# aaa authentication
After you issue aaa authentication, you must specify one of the following dial-in protocols as applicable for your network:
You can specify only one dial-in protocol per authentication method list; however, you can create multiple authentication method lists with each of these options. You must give each list a different name, as described in the section "Identify a List Name."
If you specify the ppp option, the default authentication method for PPP is PAP. For greater security, specify CHAP. The full command is aaa authentication ppp chap.
For example, if you specify PPP authentication, the configuration looks like this:
5800-1# configure terminal 5800-1(config)# aaa authentication ppp
A list name identifies each authentication list. You can choose either to use the keyword default, or choose any other name that describes the authentication list. For example, you may give it the name ppp-radius if you intend to apply it to interfaces configured for PPP and RADIUS authentication. The list name can be any alphanumeric string. Use default as the list name for most lines and interfaces, and use different names on an exception basis.
You can create different authentication method lists and apply them to lines and interfaces selectively. You can even create a named authentication method list that you do not apply to a line or interface, but which you intend to apply at some later point, such as when you deploy a new login method for users.
After you define a list name, you must identify additional security attributes (such as local authentication versus TACACS+ or RADIUS).
In the following example, the default authentication method list for PPP dial-in clients uses the local security database:
5800-1# configure terminal 5800-1(config)# aaa authentication ppp default
In the following example, the PPP authentication method list name is insecure:
5800-1# configure terminal 5800-1(config)# aaa authentication ppp insecure
In the following example, the login authentication method list name is deveng:
5800-1# configure terminal 5800-1(config)# aaa authentication login deveng
After you identify a list name, you must specify an authentication method to identify how users will be authenticated. Authentication methods are defined with optional keywords in the aaa authentication command.
The following global configuration commands configure authentication methods for PPP.
5800-1(config)# aaa new-model
Step 2 Create a local authentication list. Methods include if-needed, krb5, local, none, radius, tacacs+.
5800-1(config)# aaa authentication ppp {default | list-name} method1 [method2]
Step 3 Apply the authentication list to a line or set of lines.
5800-1(config)# ppp authenntication {chap | pap | chap pap | pap chap} [if-needed]
{default | list-name} [callin]
Step 4 Type Ctrl-Z to return to privileged EXEC mode.
5800-1(config)#Ctrl-Z5800-1#
Step 5 Save your changes when ready.
5800-1# copy running-config startup-config
The keyword list-name is any character string used to name the list you are creating. The keyword method refers to the actual method the authentication algorithm tries. The additional methods of authentication are used only if the previous method returns an error, not if it fails. To specify that the authentication should succeed even if all methods return an error, specify none as the final method in the command line.
![]() |
TimeSaver If you are not sure whether you should use TACACS+ or RADIUS, consider the following: TACACS+ encrypts the entire payload of packets passed across the network, whereas RADIUS only encrypts the password when it crosses the network. TACACS+ can query the security server multiple times, whereas a RADIUS server gives one response only and is not as flexible regarding per-user authentication and authorization attempts. |
You can specify multiple authentication methods for each authentication list. The following authentication method example for PPP first queries a TACACS+ server, then a RADIUS server, then the local security database. Multiple authentication methods can be useful if you have multiple types of security servers on the network and one or more types of security server do not respond.
5800-1(config)# aaa authentication ppp testbed tacacs+ radius local
If you specify more than one authentication method and the first method (TACACS+ in the previous example) is not available, the Cisco IOS software attempts to authenticate using the next method (such as RADIUS). If, in the previous example, the RADIUS server has no information about the user, or if no RADIUS server can be found, the user is authenticated using the local username database that was populated with the username command.
If authentication fails using the first method listed, the Cisco IOS software does not permit access. It does not attempt to authenticate using the subsequent security methods if the user entered the incorrect password.
If you specify local as the security method, you must specify username profiles for each user who might log in. An example of specifying local authentication is as follows:
5800-1(config)# aaa authentication login deveng local
This command specifies that anytime a user attempts to log in to a line on an Cisco AS5800, the Cisco IOS software checks the username database. To create a local username database, define username profiles using the username global configuration command.
The following example shows how to use the username command and password:
5800-1(config)# username username password password
The show running-config command shows the encrypted version of the password, as follows:
5800-1# show running-config Building configuration... Current configuration: ! version 11.3 AA ! most of config omitted username xxx password 7 0215055500070C294D
This section includes authentication method list examples for:
The following example creates a local authentication list for users logging in to any line on the Cisco AS5800:
5800-1(config)# aaa authentication login default local
The following example specifies login authentication using RADIUS (the RADIUS daemon is polled for authentication profiles):
5800-1(config)# aaa authentication login default radius
The following example specifies login authentication using TACACS+ (the TACACS+ daemon is polled for authentication profiles):
5800-1(config)# aaa authentication login default tacacs+
The following example creates a TACACS+ authentication list for users connecting to interfaces configured for dial-in using PPP. The name of the list is marketing. This example specifies that a remote TACACS+ daemon be used as the security database. If this security database is not available, the Cisco IOS software then polls the RADIUS daemon. Users are not authenticated if they are already authenticated on a TTY line.
5800-1(config)# aaa authentication ppp marketing if-needed tacacs+ radius
In the above example, default can be substituted for marketing if the administrator wants this list to be the default list.
As described in the "Defining Authentication Method Lists" section, the aaa authentication global configuration command creates authentication method lists or profiles. You apply these authentication method lists to lines or interfaces by issuing the login authentication or ppp authentication command, as described in Table 4-4.
| Interface and Line Command | Action | Port to which List is Applied | Corresponding Global Configuration Command |
|---|---|---|---|
Logs directly in to the Cisco AS5800 | Console port or VTY lines | aaa authentication login | |
ppp authentication1 | Uses PPP to access IP or IPX network resources | Interface | aaa authentication ppp |
You can create more than one authentication list or profile for log-in and protocol authentication and apply them to different lines or interfaces. The following examples show the line or interface authentication commands that correspond to the aaa authentication global configuration command.
The following example shows the default login authentication list applied to the console port and the default virtual terminal (VTY) lines on the Cisco AS5800:
5800-1(config)# aaa authentication login default local 5800-1(config)# line console 0 5800-1(config-line)# login authentication default 5800-1(config-line)# line vty 0 69 5800-1(config-line)# login authentication default
In the following example, the login authentication list named rtp2-office, which uses RADIUS authentication, is created. It is applied to all 54 lines on an configured with a channelized T1 PRI card, including the console (CTY) port, the 48 physical asynchronous (TTY) lines, the auxiliary (AUX) port, and 69 virtual terminal (VTY) lines:
5800-1(config)# aaa authentication login rtp2-office radius 5800-1(config)# line 0 118 5800-1(config-line)# login authentication rtp2-office
The following sample output shows lines and their status on the Cisco AS5800.
5800-1# show line Tty Typ Tx/Rx A Modem Roty AccO AccI Uses Noise Overruns * 0 CTY - - - - - 0 0 0/0 I 1 TTY 115200/115200 - inout - - - 0 0 0/0 I 2 TTY 115200/115200 - inout - - - 0 0 0/0 ... I 48 TTY 115200/115200 - inout - - - 0 0 0/0 49 AUX 9600/9600 - - - - - 0 0 0/0 50 VTY - - - - - 0 0 0/0 51 VTY - - - - - 0 0 0/0 52 VTY - - - - - 0 0 0/0 53 VTY - - - - - 0 0 0/0 54 VTY - - - - - 0 0 0/0
The following example creates the PPP authentication list marketing, which uses TACACS+, then RADIUS authentication. The list marketing requires authentication only if the user has not already been authenticated on another line. It is then applied to asynchronous lines 1 through 48 on a Cisco AS5800 and uses CHAP authentication, instead of the default of PAP:
5800-1(config)# aaa authentication ppp marketing if-needed tacacs+ radius 5800-1(config)# line shelf/slot/1 shelf/slot/48 5800-1(config-line)# ppp authentication chap marketing
You can configure the Cisco AS5800 to restrict user access to the network so that users can only perform certain functions after successful authentication. As with authentication, authorization can be used with either a local or remote security database. This guide describes only remote security server authorization.
A typical configuration most likely uses the EXEC facility and network authorization. EXEC authorization restricts access to the EXEC, and network authorization restricts access to network services, including PPP.
Authorization must be configured on both the Cisco AS5800 and the security daemon. The default authorization is different on the Cisco AS5800 and the security server:
![]() |
TimeSaver If authentication has not been set up for a user, per-user authorization attributes are not enabled for that user. That is, if you want a user to obtain authorization before gaining access to network resources, you must first require that the user provide authentication. For example, if you want to specify the aaa authorization network tacacs+ (or radius) command, you must first specify the aaa authentication {ppp} default if-needed tacacs+ (or radius) command. |
You typically have three methods for configuring default authorization on the security server, which are as follows:
default authorization = permit
default service = permit
a. If the AV pair from the Cisco AS5800 is mandatory, look for an exact match in the daemon's mandatory list. If found, add the AV pair to the output.
b. If an exact match does not exist. look in the daemon's optional list for the first attribute match. If found, add the Cisco AS5800 AV pair to the output.
c. If no attribute match exists, deny the command if the default is to deny, or if the default is permit, add the Cisco AS5800 AV pair to the output.
d. If the AV pair from the Cisco AS5800 is optional, look for an exact attribute, value match in the mandatory list. If found, add the daemon's AV pair to output.
e. If not found, look for the first attribute match in the mandatory list. If found, add daemon's AV pair to output.
f. If no mandatory match exists, look for an exact attribute, value pair match among the daemon's optional AV pairs. If found, add the daemon's matching AV pair to the output.
g. If no exact match exists, locate the first attribute match among the daemon's optional AV pairs. If found add the daemon's matching AV pair to the output.
h. If no match is found, delete the AV pair if default is deny, or if the default is permit, add the Cisco AS5800 AV pair to the output.
i. If there is no attribute match already in the output list after all AV pairs have been processed for each mandatory daemon AV pair, add the AV pair (add only one AV pair for each mandatory attribute).
The following global configuration commands configure network and EXEC authorization.
5800-1(config)# aaa authorization network
Step 2 Prevents users from logging in to the privileged EXEC facility.
5800-1(config)# aaa authorization exec
Step 3 Type Ctrl-Z to return to privileged EXEC mode.
5800-1(config)#Ctrl-Z5800-1#
Step 4 Save your changes when ready.
5800-1# copy running-config startup-config
![]() |
Note You can also require authorization before a user can issue specific commands by using the aaa authorization command. For more information, refer to the Security Configuration Guide, which is part of the Cisco IOS configuration guides and command references. |
Authorization methods are defined as optional keywords in the aaa authorization command. The following global configuration command configure both network and EXEC AAA authorization. Table 4-6 defines authorization options.
5800-1(config)# aaa authorization {if-authenticated | local | none | radius | tacacs+}
Step 2 Type Ctrl-Z to return to privileged EXEC mode.
5800-1(config)#Ctrl-Z5800-1#
Step 3 Save your changes when ready.
5800-1# copy running-config startup-config
| Authorization Methods | Purpose |
|---|---|
if-authenticated | User is authorized if already authenticated. |
local | Uses the local database for authorization. The local database is created using the username privilege command to assign users to a privilege level from 0 to 15 and the privilege level command to assign commands to these different levels. |
none | Authorization always succeeds. |
radius | Uses RADIUS authorization as defined on a RADIUS server. |
tacacs+ | Uses TACACS+ authorization as defined on a TACACS+ server. |
When you configure authorization, you must ensure that the parameters established on the Cisco AS5800 correspond with those set on the TACACS+ server.
The following example uses a TACACS+ server to authorize the use of network services, including PPP. If the TACACS+ server is not available or has no information about a user, no authorization is performed, and the user can use all network services:
5800-1(config)# aaa authorization network tacacs+ none
The following example permits the user to run the EXEC process if the user is already authenticated. If the user is not already authenticated, the Cisco IOS software defers to a RADIUS server for authorization information:
5800-1(config)# aaa authorization exec if-authenticated radius
The following example configures network authorization. If the TACACS+ server does not respond or has no information about the username being authorized, the RADIUS server is polled for authorization information for the user. If the RADIUS server does not respond, the user still can access all network resources without authorization requirements.
5800-1(config)# aaa authorization network tacacs+ radius none
The following series of examples shows complete security configuration components of a configuration file on a Cisco AS5800. Each example shows authentication and authorization.
The following sample configuration uses AAA to configure default authentication using a local security database on the Cisco AS5800. All lines and interfaces have the default authentication lists applied. Users aaaa, bbbb, and cccc have been assigned privilege level 7, that prevents them from issuing ppp and slip commands, because these commands have been assigned to privilege level 8.
aaa new-model aaa authentication login default local aaa authentication arap default local aaa authentication ppp default local aaa authorization exec local aaa authorization network local aaa authorization ! username aaaa privilege exec level 7 privilege network level 8 password 7 095E470B1110 username bbbb privilege network level 7 password 7 0215055500070C294D username cccc privilege network level 7 password 7 095E4F10140A1916 ! privilege exec level 8 ppp privilege exec level 8 slip line console 0 login authentication default ! line 2/2/0 2/2/47 interface Group-Async1 ppp authentication chap default group-range 2/2/0 2/2/47
The following configuration displays the sign-on dialog from a remote PC:
atdt5551234 CONNECT 14400/ARQ/V32/LAPM/V42BIS User Access Verification Username: username Password: password 5800-1> enable Password: password 5800-1#
The following example shows how to create and apply the following authentication lists:
![]() |
Note The authentication method lists used in this example use names other than default; however, you generally specify default as the list name for most lines and interfaces, and apply different named lists on an exception basis. These names are used only for illustrative purposes. |
hostname 5800-1 ! tacacs-server host aaa tacacs-server key 007 ! aaa authentication login rtp-office tacacs+ aaa authentication ppp marketing if-needed tacacs+ ! line console0 login authentication rtp-office ! tacacs-server host aaa tacacs-server key 007 ! aaa authentication login rtp-office tacacs+ aaa authentication ppp marketing if-needed tacacs+ ! line console0 login authentication rtp-office ! interface group-async0 ppp authentication chap marketing group-range 2/2/0 2/2/47 ! line 2/2/0 2/2/47
The following example shows how to create the following authentication lists:
radius-server host aaa radius-server key 007 ! privilege exec level 14 configure privilege exec level 14 reload privilege exec level 8 ppp ! aaa authentication login fly radius aaa authentication ppp itsme if-needed radius aaa authorization network radius aaa authorization exec radius ! line 2/1/0 2/1/53 login authentication fly ! interface group-async6 ppp authentication chap itsme group-range 2/2/0 2/2/47
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Tue Sep 26 10:29:29 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.