cc/td/doc/product/access/acs_soft/cs_unx
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

ACS and NAS Management

ACS and NAS Management

This chapter contains the instructions for managing the CiscoSecure Access Control Server (ACS) and its network access server (NAS) clients through the CiscoSecure ACS web-based management interface.

This chapter covers the following topics:

Managing Profiles for TACACS+-Enabled NASes

When you installed the CiscoSecure ACS, you either specified a single NAS as a TACACS+-enabled ACS client or you allowed any NAS with a matching secret TACACS+ key to act as an ACS client. The CiscoSecure ACS AAA NAS web page enables you to add, configure and delete profiles of TACACS+-enabled NASes as ACS clients.

Adding and Configuring Profiles of TACACS+-Enabled NASes

Step 1 In the CiscoSecure ACS web menu bar of the web interface, click AAA and NAS to display the AAA NAS web page.


Figure 5-1: AAA NAS Page



Step 2 When the AAA NAS page appears, specify the name of the NAS client that you want to add or configure.

The NAS configuration page appears.



Figure 5-2: NAS Configuration Page



Step 3 Fill in or edit the appropriate fields:

Step 4 Click Save and then click Re-Initialize at the top right of the page to effect the changes.

Deleting TACACS+ NAS Profiles

To delete an existing profile of a TACACS+-enabled NAS client, do as follows:

Step 1 In the CiscoSecure ACS web menu bar of the web interface, click AAA and NAS to display the AAA NAS web page.

Step 2 In the TACACS+ NAS Configurations list box, select the profile name of the NAS that you want to disable as a CiscoSecure ACS client and click Delete.

Step 3 Click Re-Initialize at the top right of the page to effect the change.

Adding and Configuring NASes as RADIUS Clients

The CiscoSecure Administrator advanced configuration program provides a special tabbed NASes page for adding NASes as RADIUS-enabled clients to the CiscoSecure ACS.

Managing Profiles of RADIUS-Enabled NASes

To display, add, copy, delete, edit, or unlock the NASes configured as RADIUS-enabled clients, follow these steps:

Step 1 Start the Java-based CiscoSecure Administrator advanced configuration program and click the NASes tab.

Step 2 (Optional) To update the list of NASes, click the NASes button at the top of the list of available NASes. The Administrator window will reload from the database and get the current list of available NASes. This is useful when more than one person is making changes to NAS profiles.

Step 3 Click the IP address in the left column to display NAS profile information. (See Figure 5-3.)


Figure 5-3: CiscoSecure Administrator NASes Tabbed Page



The following information displays:


Adding a Profile of a RADIUS-Enabled NAS

To add a NAS to the list of CiscoSecure ACS clients:

Step 1 In the NASes page of the CiscoSecure Administrator advanced configuration program, click New. You will be prompted to enter the IP address of the new NAS.

Step 2 Enter the IP address of the new NAS in the NAS IP Address field.

Step 3 If necessary, log in to the NAS and input the appropriate NAS configuration commands as described in the next section "Changing Profile Information for a RADIUS-Enabled NAS."

 
Timesaver To create a NAS profile with characteristics similar to one already created, just click the IP address of the similar NAS, then click Copy. You can then modify individual characteristics of the new NAS by clicking Edit.

Changing Profile Information for a RADIUS-Enabled NAS

To change the information for a NAS RADIUS-enabled NAS client, follow these steps:

Step 1 In the NASes page of the CiscoSecure Administrator advanced configuration program, click the name of the NAS for which you want to change information.

Step 2 Click Edit.

Step 3 Click the field you want to change. The following information can be changed:

Step 4 Type or select the new information.

Step 5 When you have finished, click one of the following:

Deleting a NAS as a RADIUS-Enabled Client

To delete a NAS as a RADIUS-enabled client:

Step 1 In the NASes page of the CiscoSecure Administrator advanced configuration program, click the name of the NAS you want to delete.

Step 2 Click Delete. The name of the NAS will be removed from the list.

Managing General Settings on the ACS

The CiscoSecure ACS AAA General web page enables you to specify authentication methods, time zone, and logging mode options for the CiscoSecure ACS server.

Step 1 In the CiscoSecure ACS web menu bar of the web interface, click AAA and then click General to display the AAA General configuration page.


Figure 5-4: AAA General Web Page



Step 2 Check off the Authentication methods that you want the ACS to support. The choices are:

Step 3 In the Local Timezone field, specify the local time zone in relation to Universal Mean Time (Greenwich Mean Time). For example, zero is Universal Mean Time. -5 is United States Eastern Standard Time. -8 is United States Pacific Standard Time.

Step 4 In the CiscoSecure License Key field, enter the server license key. This is the key code that you received after you accessed the CiscoSecure License web page or filled out the "CiscoSecure Fax Back Form" before installing CiscoSecure ACS 2.2.2.

Step 5 In the Max. Failed Authentications field, specify the maximum number of failed authentication attempts allowed per user. This field specifies the number of failed logins allowed each user before CiscoSecure disables that user's account. This feature minimizes the possiblity of successful third party "random password generator" attacks on CiscoSecure user accounts.

Step 6 In the Token Cache Absolute Timeout field, specify, in seconds, the absolute maximum amount of time that a token password will be cached for users being authenticated through this CiscoSecure ACS. This absolute timeout setting overrides individual group or user profile token caching timeout settings that specify longer time periods. This setting does not override group or user profile token caching timeout settings that specify equal or shorter periods.

Step 7 If necessary, select additional logging options in the Logging Options pane. This specifies the types of system messages that the CiscoSecure ACS will record to a system log file that you specify through the UNIX syslog utility.

 
Caution Cisco recommends that you leave these logging options unchanged. If necessary these options can be selected for troubleshooting purposes in communication with Cisco Technical Support.

The logging options you can enable are as follows:


Step 8 Click Re-Initialize at the top of the page to effect the changes.

Managing RADIUS Settings on the ACS

The Servers tab in the Java-based CiscoSecure Administrator advanced configuration program enables you to carry out simple RADIUS-specific configuration of all CiscoSecure ACSes installed on the network and using the same CiscoSecure database. To configure another ACS on the network, you create a profile for that ACS and edit its parameters.

To display, add, copy, delete, edit, or unlock the available CiscoSecure ACS RADIUS settings profiles:

Step 1 Start Java-based CiscoSecure Administrator advanced configuration program and click the Servers tab.

Step 2 (Optional) To update the list of access control servers, click Servers at the top of the list of available servers. The Administrator window will reload the current list of available access control server profiles from the database. This is useful when more than one person can make changes to the ACS profiles.

Step 3 Click a server's IP address in the left window. The CiscoSecure ACS displays information about the server. (See Figure 5-5.)


Figure 5-5: CiscoSecure ACS Servers Window


Note You can move between fields by clicking the field with the mouse or pressing the Tab key.

The following fields and information displays:

Adding a RADIUS Server Profile for an ACS

To add an access control server profile to the list:

Step 1 In the Servers page of the CiscoSecure Administrator advanced configuration program, click New. You will be prompted to enter the IP address of the new server.

Step 2 Enter the IP address for the access server in the Server Name field.

Step 3 If necessary, change the configuration as described in the next section "Changing RADIUS Profile Information for an ACS."

 
Timesaver To create a server profile with characteristics similar to those of an existing server profile, click the IP address of the existing server profile, then click Copy. You can then modify individual characteristics, if necessary, by clicking Edit.

Changing RADIUS Profile Information for an ACS

To change RADIUS profile information for an ACS server:

Step 1 In the Servers page of the CiscoSecure Administrator advanced configuration program, click Edit.

Step 2 Click the field for the information you want to change for your server.

Step 3 Type or select the new information. Some of the information cannot be changed. The information you can change depends on your system and desired operation of the ACS. For an explanation of the fields on this screen, see the section, "Managing RADIUS Settings on the ACS," earlier in this chapter.

Step 4 When you have finished, click one of the following:

Deleting a RADIUS Profile for an ACS

To delete an access control server profile:

Step 1 In the Servers page of the CiscoSecure Administrator advanced configuration program, click the IP address of the server profile you want to delete.

Step 2 Click Delete. The IP address of the server profile will be removed from the list.

Managing RADIUS Dictionaries

Three RADIUS dictionaries are installed when you select the RADIUS protocol during installation: Cisco, Ascend, and IETF.


Note These dictionaries cannot be changed or deleted; however, you can create copies and change the copies.

Note You do not need to configure dictionary support for the TACACS+ protocol.

To display the RADIUS dictionaries:

Step 1 Start the CiscoSecure Administrator advanced configuration program and click the Dictionaries tab.

Step 2 (Optional) To update the list of dictionaries, click Dictionaries at the top of the list of available dictionaries. The Administrator window will reload from the database and get the current list of available dictionaries. This is useful when more than one person can make changes to the dictionary profiles.

Step 3 Click the name of the dictionary for which you want to display information.

The dictionary attributes display.



Figure 5-6: RADIUS Dictionary Page View Mode

For each attribute, a summary line is displayed containing the following information:



Table 5-1: Attribute Type Values
Attribute Type Format
string Displayable ASCII Length cannot exceed 253 characters
ipaddr 4 octets Octets must be in network byte order
integer 32 bit value Big endian order (high byte first)
date 32 bit value Big endian order; seconds since 00:00:00 GMT, January 1, 1970
abinary ASCII character set Length cannot exceed 254 characters
enum 32-bit value Subset of integers

Step 4 To view the detailed information for a specific attribute, click that attribute's magnifying glass icon.

When you click the attribute's magnifying glass, its detailed information appears in an attribute editor frame at the bottom of the page. The detailed information includes:


Adding a RADIUS Dictionary

To add a dictionary to the list:

Step 1 In the Dictionaries page of the Java-based CiscoSecure Administrator advanced configuration program, click New.

Step 2 Enter the name of the dictionary to add.

Step 3 If necessary, change the configuration as described in the next section "Changing RADIUS Dictionary Information."

 
Timesaver To create a dictionary with characteristics similar to one already created, just click the name of the similar dictionary, then click Copy. You can then modify individual characteristics of the new dictionary by clicking Edit.

Changing RADIUS Dictionary Information

 
Caution Use caution when editing dictionaries. Changes to a dictionary will affect all users who are using that dictionary. Only experienced RADIUS system administrators should attempt to edit dictionaries.

Take the following steps to change the information for a dictionary:

Step 1 In the Dictionaries page of the Java-based CiscoSecure Administrator advanced configuration program, click the name of the dictionary for which you want to change information.

Step 2 Click Edit. The magnifying glass view icons become pencil edit icons. (See Figure 5-7.)


Figure 5-7: RADIUS Dictionary Page Edit Mode

Step 3 If you want to change the vendor ID for the entire dictionary, click vendor= in the lower right corner, enter a new ID number in the Enter Vendor ID dialog box, and click OK.

Step 4 If you want to change the detailed information for a specific attribute, click that attribute's pencil icon.

You can then edit that attribute's detailed information fields in the attribute edit frame at the bottom of the page:


For details on the fields, see the section "Managing RADIUS Dictionaries" earlier in this chapter.


Step 5 When you have finished, click one of the following:

For more information on the Dictionaries window, see the appendix "RADIUS Attribute-Value Pairs and Dictionary Management."

Deleting a RADIUS Dictionary

To delete a dictionary:

Step 1 In the Dictionaries page of the CiscoSecure Administrator advanced configuration program, click the name of the dictionary you want to delete.

Step 2 Click Delete. The name of the dictionary will be removed from the list.

Displaying a System Summary and Expired Passwords

To display a summary of the system's statistics, go the the Members page of the CiscoSecure advanced configuration program, and click the Display System Summary and Expired Passwords button. You can also click this button to display users with expired passwords by password type.


Figure 5-8: Display System Summary and Expired Passwords Button

The CiscoSecure Properties window opens. To view the system summary, click the Summary Statistics tab. (See Figure 5-9.)


Figure 5-9: CiscoSecure Summary Statistics Window

To view expired passwords, click the Expired Passwords tab. (See Figure 5-10.)


Figure 5-10: CiscoSecure Expired Passwords Window

Clearing the Failed Logins Counter

If the number of consecutive failed logins for a given user exceeds the number set in the Max. Failed Authentications field of the CiscoSecure ACS AAA General web page, that user's account is temporarily disabled.

To re-enable a user account disabled by too many consecutive failed authentications:

Step 1 In the Members page of the CiscoSecure Administrator advanced configuration program, deselect Browse, find and click the profile of the user whose account was disabled in the Navigator pane, and click the Profile icon in the Profile pane.

Step 2 Reset the failed logins count by locating and selecting the server-current-failed logins icon in the Profile pane. Then, do one of the following:

The ACS increments the counter by one for each failed login attempt. If the current count for a user is below the global number and the user logs in successfully, the counter is reset to zero.


Step 3 Re-enable the user profile by locating and selecting the profile status icon on the Profile pane. Then do one of the following:

Step 4 Click Submit to confirm the user profile's re-enabled status.

Setting Up Access to a Local or Remote Domain

If you maintain an internet service accessed by various customers maintaining separate virtual private dial-up networks (VPDN), the CiscoSecure ACS Domain web page enables you to authenticate VPDN users logging in to access local domains and route VPDN users logging in to access remote domains.

You can configure the CiscoSecure ACS to recognize and authenticate users logging in with specific local domain name strings. You can also configure CiscoSecure ACS to recognize and route users logging in with specific remote domain name strings to the home gateway NAS of those domains.

To configure the ACS to handle user login strings with domain names:

Step 1 In the CiscoSecure ACS web menu bar of the web interface, click AAA button and then click Domain to display the AAA Domain configuration page.


Figure 5-11: AAA Domain Web Page



Step 2 In the Domain Name field, enter the name of the remote domain that CiscoSecure users may want to access.

For example, in the login string "sam@zephyr.com," "zephyr.com" is the domain name.


Step 3 In the Delimiter field, select the delimiter character.

This is the character that separates the user name from the domain name. For example, for the login string, "sam@zephyr.com," "@" is the delimiter.


Step 4 In the Domain Name Position field, specify the domain name position in relation to the delimter. Select Before or After.

Step 5 In the Domain Type field, specify whether the domain is local or remote.

Step 6 Click Add Domain.

The domain name string you specified is displayed in the either the Local Domains or Remote Domains list box.


Step 7 Click Re-Initialize at the top of the page to effect the changes.

Deleting Access to a Local or Remote Domain

To delete access to a local or remote domain:

Step 1 In the CiscoSecure ACS web menu bar of the web interface, click AAA and then click Domain to display the AAA Domain configuration page.

Step 2 In the Local Domains or Remote Domains list box, select the domain name string you want to disable, then click either Delete Local or Delete Remote, whichever is applicable.

The selected domain name string disappears from the list box.


Step 3 Click Re-Initialize at the top of the page to effect the changes.

Logging Off the CiscoSecure Administrator Interface

To exit the web-based interface, click Logoff.


Note When you log out of the Java-based CiscoSecure Administrator advanced configuration program, the program may require several minutes to shut down.

hometocprevnextglossaryfeedbacksearchhelp
Copyright 1989-1998 © Cisco Systems Inc.