cc/td/doc/product/access/acs_soft/cs_unx
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Configuring Initial Test Group and User Profiles

Configuring Initial Test Group and User Profiles

This chapter contains instructions on setting up an initial group profile and user account to test authentication. The topics covered in this chapter include:

After completing and verifying initial configuration of your CiscoSecure ACS software in this chapter, you can expand and customize your access control system following directions in the chapters, "Simple User and ACS Management," "Advanced Group and User Management," and "ACS and NAS Management."

Overview of Initial Test Configuration

To achieve the fastest installation and configuration of the CiscsoSecure ACS, Cisco recommends the following steps (described in detail in the next sections):

1 ) Run the web-based CiscoSecure Administrator to set up an initial group and user profile. This task varies according to whether you are setting up your group and user with TACACS+ protocol support, RADIUS protocol support, or combined TACACS+ and RADIUS protocol support.

2 ) Log in to the network access server (NAS) that you want the CiscoSecure ACS to manage and input the relevant NAS configuration commands. The NAS configuration commands will vary according to whether your NAS is enabled for TACACS+ protocol support or RADIUS protocol support.

3 ) Log in to one of the supported NASes under the initial user profile to test network operation.

After installing and verifying your initial configuration, you can expand and customize your access control system following directions in the chapters, "Simple User and ACS Management," and "Advanced Group and User Management."

Setting Up an Initial Group and User Profile

If you are installing CiscoSecure ACS for the first time, and have no user or group profiles already configured, your next step, after installing and starting the ACS software, is to set up an initial test user profile and configure your NAS to support this profile. The procedures to carry this out vary according to whether you are assigning TACACS+ protocol attributes or RADIUS protocol attributes to the user profile.

Setting Up a Test Group and User Profile with TACACS+ Attributes

In this section, you will use the Java-based CiscoSecure Administrator advanced configuration program and the CiscoSecure ACS Add a User web page and configure a NAS to set up and support an initial test group profile and user profile with TACACS+ protocol attributes.

Physical Testing Setup

For testing purposes, locate the CiscoSecureACS, the host NAS, and a login workstation on the same Ethernet segment.


Figure 2-1: CiscoSecure Recommended Test Setup




Note The GUI Client and the CiscoSecure ACS both need to have name resolution enabled.

Set Up a TACACS+ Group Profile through the CiscoSecure Administrator

Using the CiscoSecure Administrator, you will create an initial test group profile. Using TACACS+ protocol attributes, you will name the profile "T_Shell_Group," and enable Telnet login by enabling all commands and attributes associated with shell service.

Step 1 From a Windows 95 or Windows NT workstation start your Netscape Navigator or Microsoft Internet Explorer web browser and enter the following URL address:

where your_server is the host name (or the fully qualified domain name, FDQN, if host name and FDQN differ) of the SPARCstation where you installed the CiscoSecure ACS. You can also substitute the SPARCstation's IP address for your_server.


Step 2 When the CiscoSecure Logon window appears, enter the following default values for username and password and click Submit:

Step 3 In the CiscoSecure ACS Main window, click Advanced and then click Advanced again to continue.

The CiscoSecure Administrator advanced configuration program may require several minutes to load.


Step 4 Create and name a test group profile:


Figure 2-2: Creating a Test GROUP Profile

Step 5 Specify shell service for the group profile.


Figure 2-3: Specifying Shell Service



Step 6 Click Submit.

Step 7 Click Logoff to exit and terminate the CiscoSecure Administrator session. Your web browser may require several minutes to terminate.

Set Up a TACACS+ User Profile through the CiscoSecure Administrator

Using the CiscoSecure ACS Add a User web page, you will now create an initial test user profile. Using TACACS+ protocol attributes, you will name the profile "T_User," assign it a clear text password, "Cisco" and enable Telnet login by assigning it to the T_Shell_Group profile.

Step 1 From a Windows 95 or Windows NT workstation start your Netscape Navigator or Microsoft Internet Explorer web browser and enter the following URL address:

where your_server is the host name (or the fully qualified domain name, FDQN, if host name and FDQN differ) of the SPARCstation where you installed the CiscoSecure ACS. You can also substitute the SPARCstation's IP address for your_server.


Step 2 When the CiscoSecure Logon window appears, enter the following default values for username and password and click Submit:

Step 3 In the CiscoSecure ACS Main window, click Member, then click Add.

The Add a User web page appears.



Figure 2-4: Add a User Page



Step 4 In the Group field, enter T_Shell_Group. This assigns the new user to the test group you just created and, by inheritance, also grants the user the shell privileges assigned to that group.

Step 5 In the User Name field, enter T_User.

Step 6 In the Password field and in the Confirm field underneath, enter Cisco.

Step 7 Under Web Page privilege field, select 1, to grant the T_User access to the CSUser web page for changing personal passwords.

Step 8 Select Clear to indicate the method of password transmission.

Step 9 Click Add.

Enter NAS Commands for the TACACS+ User Profile

From a network workstation, log in to the host NAS. Bring up the configuration window and input the following configuration commands:

aaa new-model
aaa authentication login default tacacs+ enable
aaa authentication login no_tacacs line
aaa authorization exec tacacs+ if-authenticated
enable password cisco
!
tacacs-server host acs_ip_address
tacacs-server key secret-key
!
line con 0
 login authentication no_tacacs
 password cisco

where:

acs_ip_address is the IP address of the CiscoSecure ACS.

secret_key is the secret TACACS+ NAS key that you entered for the NAS during the CiscoSecure ACS installation.


Note The "no_tacacs+" authentication method in the above NAS command description is a precautionary measure, included so that an administrator will be able to log in to the console port of the NAS even if the CiscoSecure ACS is unavailable. To log in to the NAS console port with this configuration, enter an arbitrary username with the line password of "cisco."

Setting Up a Test Group and User Profile with RADIUS Attributes

In this section, you will use the CiscoSecure Administrator advanced configuration program and the CiscoSecure ACS Add a User web page and configure a NAS to set up an initial test group profile and test user profile with RADIUS protocol attributes.

Physical Testing Setup

For testing purposes, locate the CiscoSecure ACS, the host NAS, and a login workstation on the same Ethernet segment.


Figure 2-5: CiscoSecure Recommended Test Setup



Set Up a RADIUS Group Profile through the CiscoSecure Administrator

Using the CiscoSecure Administrator, you will create an initial group profile. Using RADIUS protocol attributes, you will name the profile "R_Shell_Group," and enable Telnet login.

Step 1 From a Windows 95 or Windows NT workstation start your Netscape Navigator or Microsoft Internet Explorer web browser, enter the following URL:

where your_server is the host name (or the fully qualified domain name, FDQN, if host name and FDQN differ) of the SPARCstation where you installed the CiscoSecure ACS. You can also substitute the SPARCstation's IP address for your_server.


Step 2 When the CiscoSecure Logon window appears, enter the following default values for username and password and click Submit.

Step 3 In the CiscoSecure ACS Main window, click Advanced then click Advanced again to continue.

The advanced configuration program may require a few minutes to load.


Step 4 Specify the host NAS, its shared secret key, and supported version of RADIUS protocol:


Figure 2-6: Spe
cifying the Host NAS and RADIUS Version



Step 5 Create a test group profile:


Figure 2-7: Creating a Test Group Profile



Step 6 Specify the RADIUS-Cisco dictionary for this group profile:


Figure 2-8: Spe
cifying RADIUS-Cisco Dictionary



Step 7 Specify RADIUS-Cisco Check Item and Reply attributes:


Figure 2-9: Specifying the Reply Attributes

Step 8 Click the plus/minus symbol by the RADIUS-Cisco icon to display the Reply Attributes and Check Items icons in the Profile pane.

Step 9 Specify the Reply Attributes values:

Step 10 Click Submit.

Step 11 When you are finished click Logoff. The CiscoSecure Administrator advanced configuration program may require several minutes to terminate.

Set Up a RADIUS User Profile through the CiscoSecure ACS

Using the CiscoSecure ACS Add a User web page, you will now create an initial test user profile. You will name the profile "R_User," assign it a clear text password, "Cisco" and enable Telnet login by assigning it to the R_Shell_Group profile.

Step 1 From a Windows 95 or Windows NT workstation start your Netscape Navigator or Microsoft Internet Explorer web browser and enter the following URL address:

where your_server is the host name (or the fully qualified domain name, FDQN, if host name and FDQN differ) of the SPARCstation where you installed the CiscoSecure ACS. You can also substitute the SPARCstation's IP address for your_server.


Step 2 When the CiscoSecure Logon window appears, enter the following default values for username and password and click Submit:

Step 3 In the CiscoSecure ACS Main window, click Member, and then click Add.

The Add a User web page appears.



Figure 2-10: Add a User Page



Step 4 In the Group field, enter R_Shell_Group. This assigns the new user to the test group you just created and, by inheritance, also grants the user the shell privileges assigned to that group.

Step 5 In the User Name field, enter R_User.

Step 6 In the Password field and in the Confirm field underneath, enter Cisco.

Step 7 Under Web Page privilege field, select 1, to grant the T_User access to the CSUser web page for changing personal passwords.

Step 8 Select Clear to indicate the method of password transmission.

Step 9 Click Add.

Enter NAS Commands for the RADIUS User Profile

From a network workstation, log in to the host NAS. Bring up the configuration window and enter the following configuration commands:

aaa new-model
aaa authentication login default radius enable
aaa authentication login no_radius local
aaa authorization exec radius if-authenticated
enable password cisco
!
username root password cisco
!
radius-server host acs_ip_address
radius-server key secret_key
!
line con 0
 login authentication no_radius

where:


Note The "no_radius" authentication method in the above NAS command description is a precautionary measure, included so that an administrator will be able to log in to the console port of the NAS even if the CiscoSecure ACS is unavailable. To log in to the NAS console port with this configuration, enter an arbitrary username with the line password of "cisco."

Testing the User Login and Authentication

In this last section, you will verify your test user's login and authorization:

Step 1 Open a Telnet window on your PC or SPARCstation using the Start/Run command.

Step 2 Telnet to the IP address of the NAS.

Step 3 Enter the username T_User or R_User, whichever one you configured, and the password Cisco at the appropriate prompts.

Step 4 If the NAS lets you in, then this username and password have been properly set up and authenticated.

hometocprevnextglossaryfeedbacksearchhelp
Copyright 1989-1998 © Cisco Systems Inc.