cc/td/doc/product/access/acs_soft/cs_unx
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Introduction to the CiscoSecure ACS Software

Introduction to the CiscoSecure ACS Software

This chapter contains an overview of the CiscoSecure Access Control Server (ACS) 2.3 for UNIX (Solaris) software, defines package contents and system requirements, describes features of the software, and provides general information on network security.

Overview of CiscoSecure ACS

The CiscoSecure ACS software is designed to help ensure the security of your network and track the activity of people who successfully connect to your network. The CiscoSecure ACS software uses either the Terminal Access Controller Access Control System (TACACS)+ or the Remote Authentication Dial-In User Service (RADIUS) protocol to provide this network security and tracking.

The CiscoSecure ACS uses authentication, authorization, and accounting (AAA) to provide network security. Each facet of AAA significantly contributes to the overall security of your network:

CiscoSecure ACS Network Architecture

The CiscoSecure ACS sits on a network that dial-in users and other types of outside users access through a network access server (NAS).


Figure 1-1: Overview of CiscoSecure ACS Configuration


As users log in through the NAS, the CiscoSecure ACS exchanges data and instructions with the NAS, authenticating and authorizing users on the basis of user and group profiles that are stored in either a local or network database. After the CiscoSecure ACS software authenticates and authorizes users for the proper level of network access, it tracks individual user access and stores this information in a database where it can later be retrieved for accounting or analyzing network use.

System administrators authorized to manage the CiscoSecure ACS do so from a network workstation through the web-based CiscoSecure Administrator program.

Users can be granted access to a web-based CiscoSecure User Access program, through which they can change their login passwords.

You can configure the CiscoSecure ACS software to work in conjunction with token card servers and PIX firewall servers. (PIX does not currently support AAA accounting.)

New Features

This release of CiscoSecure ACS for UNIX adds the following features:

Additionally, with this release, CiscoSecure enables the "Valid Client" feature in the "CSConfig.ini" configuration file by default; previously, this feature was disabled by default. This feature requires a valid list of IP addresses (trusted hosts) to access the Debasers. A configuration parameter named "FastAdminValidClients" was added which allows the Fast Administration web-based GUI to permit the same IP addresses specified in the valid clients list. These configuration changes enable a higher default security level in the CiscoSecure product.

Features

This section describes the features available in CiscoSecure ACS.

Session Management Support

CiscoSecure ACS 2.3 for UNIX offers max sessions support. This feature is the ability to limit the number of concurrent sessions permitted per specific user, group, VPDN, or PoP group.

Imposing a maximum sessions limitation per group, per user, or per VPDN enables the system administrator to ensure against one user or group of users from consuming a disproportionate amount of network connections.

Caution  The DSM module features cannot be implemented for members of VPDNs set up to use the Cisco IOS Release 11.3 dial-in number information service (DNIS) feature.


Note Use of the DSM module also requires the CiscoSecure ACS configured to use the Oracle Enterprise or Sybase Enterprise RDBMS sites that have been set up for database replication.

Other Features

Features of previous versions of CiscoSecure also included in CiscoSecure ACS 2.3 for UNIX product include:

CiscoSecure ACS Flexibility and Scalability

The CiscoSecure ACS is designed to provide for easy expansion of AAA services in a NAS. It uses relational enterprise databases, allowing an environment in which any number of CiscoSecure ACSes can be distributed among many locations.

For example, in a dial-in network where dial-in port banks are located in different regions, you can scale network performance by installing separate CiscoSecure ACSes to support each region.

In this distributed architecture, the number of authentications per second would be equal to the number of CiscoSecure ACSes multiplied by the authentications per second of a given ACS. That is, if the performance of a CiscoSecure ACS is x authentications per second, when you use 10 CiscoSecure ACSes, you'll achieve 10x authentications per second.

If you have multiple points of presence (PoPs), each PoP can use its own CiscoSecure ACS. The distributed databases provide the necessary replication of data among the CiscoSecure ACSes. This solution allows for redundancy, user-entry scalability, and performance scalability.

Redundancy

The NAS at each PoP can always use its local CiscoSecure ACS as the primary server. The scalable architecture of the CiscoSecure ACS provides that, in the event a NAS is unable to use its primary server, the NAS can also point to two other backup CiscoSecure ACSes. This helps to ensure continuous availability of network resources.

Network-Wide, Web-Based Management

During installation, CiscoSecure ACS sets up the CiscoSecure ACS web site for administrators and users to access and carry out appropriate administration tasks. This interface allows multiple administrators to add users to CiscoSecure ACS. It allows authorized users to access it to change their passwords. It provides record locking so that only one administrator at a time can modify information for the same user.

It enables system administrators to set global login restrictions that apply to all client NASes using the CiscoSecure ACS services.

Using the CiscoSecure ACS software saves memory in all the access devices and eliminates the need to update every NAS when new users are added, authorization is modified, or users change their passwords. Changes are made instead to the CiscoSecure profile database.

Quick Addition of NAS Clients

If you want to specify multiple NASes as CiscoSecure ACS clients, you can use the web-based CiscoSecure ACS 2.3 for UNIX administration interface to designate and configure specific TACACS+-enabled NASes and RADIUS-enabled NASes as CiscoSecure clients.

Multiple Levels of Access Control Administration

CiscoSecure ACS 2.3 for UNIX supports multiple levels of access control administration.

The top level, or system administrator can manage network access control of all users and groups in the AAA database.

The system administrator can, in turn, parcel out administrative access control tasks to mid-level group administrators on a per-group basis. The system administrator can assign (to selected users) group administrator access control privileges that those users can exercise within their home groups and in any subordinate group, but cannot apply at any level above or equal to their home group.

For example, the system administrator can empower User A as the group administrator of the network access of fellow users in Group A and in its child groups but prevent User A from viewing or administering users in Group B even though the users in both groups are accessing the network through the same NAS and ACS system.

Local and Remote VPDN Access

If you maintain an Internet service accessed by various customers maintaining separate virtual private dial-up networks (VPDNs), you can configure the CiscoSecure ACS to authenticate VPDN users logging in to access local domains and route VPDN users logging in to access remote domains.

You can configure the CiscoSecure ACS to recognize and authenticate users logging in with specific local domain name strings. You can also configure the CiscoSecure ACS to recognize and route users logging in with specific remote domain name strings to the home gateway NAS of those domains.

Thus a VPDN user logging in through local NAS_A at Service_Provider_A as sam@zephyrware, would be authorized for the remote zephyrware domain by local ACS_A and routed to the home gateway NAS_B for the Zephyrware domain and authenticated there by ACS_B.

User Group Scalability

The CiscoSecure ACS supports user group profiles. This feature allows you to define a group with a set of attributes based on your security policy. When you add a user to that group (defining the user's password in the process), the new user is automatically assigned the attributes for the group. This dramatically simplifies the process of adding a user and makes your security easy to enforce and modify.

Performance Scalability

The distributed architecture of the CiscoSecure ACS allows you to scale your performance. In a dial-in network with multiple dial-in port banks located in different regions, you can scale network performance by installing separate CiscoSecure ACSes to support each region.

Database Options

The CiscoSecure ACS supports the following database options for storing group and user profiles and accounting information:

The CiscoSecure ACS includes SQLAnywhere from Sybase. Although this version of the database does not have client/server support, it is optimized to perform the essential AAA services with the CiscoSecure ACS.

Caution The SQLAnywhere database option will not support profile databases exceeding 5,000 users, replication of profile information among database sites, or the CiscoSecure DSM feature.

If you intend to support CiscoSecure profile databases of 5,000 or more users, database replication, or the CiscoSecure DSM feature, you must pre-install an Oracle (version 7.3.2, 7.3.3, or 8.0.3) or Sybase SQL server (version 11) relational database management system (RDBMS) to hold your CiscoSecure profile information. Database replication requires further RDBMS configuration after the CiscoSecure installation program is complete.
If you are upgrading from a previous 2.x version of CiscoSecure, the CiscoSecure installation program automatically upgrades the profile database to be compatible with CiscoSecure ACS 2.3 for UNIX.
You can convert existing freeware TACACS+ or RADIUS profile databases or flat files for use with this version of the CiscoSecure ACS. See the chapter "Converting an Existing AA Database for CiscoSecure ACS 2.3."

Database Replication Support

If you are supporting multiple CiscoSecure ACS sites using Oracle or Sybase database engines, you can implement periodic Oracle or Sybase database updating and replication between the sites. Database replication ensures that additions or modifications to the user profile database at one ACS site are incorporated at the other ACS sites. Consequently, every CiscoSecure ACS on the network is providing authentication, authorization and accounting services using a common consistent pool of user profile information.

Accommodation of Non-CiscoSecure Users

The CiscoSecure ACS allows you to easily configure a default profile for unknown_user to apply to non-CiscoSecure users, that is, users logging in through the client NAS without a CiscoSecure ACS user profile configured. You might want to configure a default profile to accommodate guest users or users who are being authenticated by another login control system.

Upgrade Options

The CiscoSecure ACS supports the following upgrade options:

If you are using the database included with CiscoSecure ACS 1.x, you can import your 1.0x user database into the CiscoSecure ACS relational database management system (RDBMS). See "Converting an Existing AA Database for CiscoSecure ACS 2.3."
If you are using CiscoSecure ACS 2.x, your database will be supported in this version of CiscoSecure ACS when you install the new version.

Standards and Specifications

The CiscoSecure ACS software conforms to the following standards and specifications:

The CiscoSecure ACS software conforms to the TACACS+ protocol as defined by Cisco Systems. See your Cisco IOS software documentation for more information.
The CiscoSecure ACS software conforms to the RADIUS protocol as defined in the following RFCs:

Basic CiscoSecure ACS Concepts

The CiscoSecure ACS network might include these hardware and software elements:

Figure 1-2 shows a typical configuration.


Figure 1-2: Overview of Typical CiscoSecure ACS Configuration


In this example, the NAS, CiscoSecure ACS, external relational database, web browser workstation, and token card server are interconnected. With the appropriate authorization, the CiscoSecure ACS can be managed from any computer on the network running a supported web browser.

CiscoSecure ACS software uses group-and-user information stored in a relational database for authentication, authorization, and accounting. This database is known as the AAA database.

CiscoSecure ACS and the NAS

The CiscoSecure ACS software does the actual work of verifying AAA, and responds to the NAS for access requests by users outside the LAN. Using the TACACS+ or RADIUS protocol, the NAS sends authentication requests to the CiscoSecure ACS, which then verifies the username and password and returns a success or failure response to the NAS.

When the user has been authenticated, a set of session attributes can be sent to the NAS to provide additional security. These attributes can include per-user access lists, specific services that can be used, and session timeout values.

Figure 1-3 illustrates a scenario in which the process of AAA is performed by the NAS and the CiscoSecure ACS.


Figure 1-3: AAA from the NAS to the CiscoSecure ACS


TACACS+ and RADIUS Protocol Support

TACACS+ and RADIUS are AAA protocols through which the NAS and the CiscoSecure ACS communicate. CiscoSecure supports both protocols. Table 1-1 lists the AAA features supported by the two protocols.


Table 1-1: Protocol-Supported AAA Features
AAA Feature TACACS+ Support RADIUS Support

Web-based administration

Yes

Yes

Encrypted password transactions

Yes

Yes

Solaris 2.5 or greater support

Yes

Yes

Option to disable accounts after failed login attempt count exceeded

Yes

Yes

User group membership support

Yes

Yes

Accounting support

Yes

Yes

S/Key authentication support

Yes

Yes

Option to specify maximum sessions per user

Yes

Yes

Support for use of common token card servers (CRYPTOCard, Secure Computing, and Security Dynamics, Inc. [SDI])

Yes

Yes

Password aging and configurable warning period

Yes

No

Allow/refuse filter option for remote addresses

Yes

No

Option to change user passwords or reject passwords not meeting security requirements

Yes

No

Language configurable message catalogs

Yes

No

Option for a single TCP1 connection between the NAS and the CiscoSecure ACS

Yes

No

Permit/deny control for X.121 addresses (on a network-wide basis)

Yes

No

Permit/deny control for X.121 addresses (on a NAS-by-NAS basis)

Yes

Yes

1TCP = Transmission Control Protocol.

Dictionaries for the RADIUS Protocol

To support the use of RADIUS protocols, CiscoSecure supplies RADIUS protocol dictionaries that support the sets of Attribute-Value pairs for commonly-used versions of the RADIUS protocol. CiscoSecure supplies separate dictionaries to support the attribute sets supported by Cisco IOS Release 11.2, Cisco IOS Release 11.3, Ascend, Ascend 5, and the IETF-RADIUS specification.

Using the CiscoSecure Administrator, you can customize a dictionary's attribute set to suit the access control attributes your NAS is configured to support and assign this dictionary to a group profile or user profile. When users fitting this profile log in through the NAS, the CiscoSecure ACS and the NAS communicate through the RADIUS protocol, using the attributes specified in the customized dictionary to determine the authentication and authorization of the new user, and also store user accounting information.

CiscoSecure ACS Web-Based Interface

The CiscoSecure web interface enables you to use Netscape Navigator or Microsoft Internet Explorer to easily set up and modify the authorization and authentication parameters of any group or user on your network. You can assign users to groups that have a set of common configuration parameters. You can then further modify the parameters for each individual user. The CiscoSecure Administrator web interface provides a point-and-click interface to administer the user database.


Note For security reasons, the use of the Refresh button in Internet Explorer and the Shift + Reload feature in Netscape are not supported in the Advanced Administrator interface.

Three Components of Dial-In Network Security

To maintain reliability and security in your network, the AAA features of the CiscoSecure ACS software help you monitor and control:

Authentication

Authentication allows network managers to bar intruders from their networks. Simple authentication methods use a database of usernames and passwords, while more complex methods use one-time passwords (OTP).

CiscoSecure ACS software uses the TACACS+ and/or RADIUS protocol to authenticate users who dial in to accept usernames or password information sent to a NAS by different protocols such as the AppleTalk Remote Access Protocol (ARAP), Serial Line Internet Protocol (SLIP), Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), and standard Telnet. This broad protocol support provides flexibility for network administrators to define the same or different usernames and passwords for different protocols.

CiscoSecure ACS software supports the following password management features:

Authorization

Authorization lets network managers limit the network services available to each user and helps restrict access to the internal network to outside callers. It also lets mobile users connect to the closest local connection and still have the same access privileges they would have if they were directly connected to their local networks. Authorization also lets you specify which commands a new system administrator can issue on specific network devices.

The CiscoSecure ACS software also supports:

Accounting

System administrators might need to bill departments or customers for connection time or resources used on the network (for example, total time connected). Accounting tracks this kind of information. You can also use the accounting syslog to track suspicious connection attempts into the network. The accounting portion of AAA contains:

The billing information includes connect time, user ID, connection location, amount of data transferred, start time, and stop time.

The following features are also supported:

User Profiles

For each user that logs in to the network through the NAS with a distinct ID, use the CiscoSecure Administrator web interface to set up a user profile in the AAA database. This profile contains all the relevant information that the ACS needs to authenticate, authorize, and log accounting information for that user on the network.

When authorized users log on to your network, the CiscoSecure ACS uses the group and user profiles to identify users of a service or a set of services.

Group Profiles

As the number of users grows, assigning all the necessary attributes to every individual user becomes time-consuming and unmanageable.

For large groups of users with similar characteristics, you can set up CiscoSecure user group profiles that allow you to set up AAA attributes for large numbers of users at the same time. This means that you can declare common characteristics once and then have all users assigned to the group inherit those characteristics when they are assigned to the group. This obviously saves a great deal of time.

One way to manage large numbers of users is to group them together according to the services they will use. Using the web-based CiscoSecure ACS Administrator program, you can modify the CiscoSecure ACS to define each group and authorize it to use the appropriate set of services. You can then add each new user to the appropriate group.

For example, you could restrict access by assigning regular employees and contract employees to separate groups and assigning attributes that allow the regular employees group to dial in at any time and the contract employees group to dial in only from 8:00 am to 5:00 pm Monday through Friday.

With grouping, you can also control the access of users to critical network services. For example, rather than controlling the access to a feature, you could control the ability of a group of users to log on to a specified server.

A group can be a member of another group. In a sales group, for example, the complete sales information group might be a member of a larger group of all sales employees that has access to other services and accounting information.

Grouping can simplify the task of ensuring a secure network in which users have easy access to necessary services and information, but no access to other services, which are unrelated to their jobs. In this way, you can reliably and easily ensure the security of the entire network regardless of its size or complexity.

Inheritance

The passing down of a user group's attributes to its member users is called inheritance.

Within the CiscoSecure ACS, inheritance means that in the absence of specifically assigned attribute values, individual users will have the same attribute values as the group from which they were derived.

Inheritance works differently depending on the AAA protocol being applied:


hometocprevnextglossaryfeedbacksearchhelp
Posted: Sun Apr 2 16:09:33 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.