cc/td/doc/product/access/acs_soft
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Release Notes for CiscoSecure  ACS  2.2(3)  for  UNIX

Appendix G Update: Setting Up Database Replication among CiscoSecure ACSes

Release Notes for CiscoSecure  ACS  2.2(3)  for  UNIX

September 23, 1998

This document provides new information about CiscoSecure Access Control Server (ACS) 2.2(3) for UNIX that became available after the CiscoSecure ACS 2.2.2 for UNIX User Guide was prepared. This document includes:

Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM, a member of the Cisco Connection Family, is updated monthly. Therefore, it might be more up to date than printed documentation. To order additional copies of the Documentation CD-ROM, contact your local sales representative or call customer service. The CD-ROM package is available as a single package or as an annual subscription. You can also access Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.

If you are reading Cisco product documentation on the World Wide Web, you can submit comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco. We appreciate your comments.

New Information About CiscoSecure ACS 2.2(3)

This section provides the latest information about this version of the CiscoSecure ACS 2.2x for UNIX software. Information is updated immediately prior to release of the software. The following topics are included:

Manage Disk Space to Prevent Failed Accounting Record Updates

Failure to maintain sufficient available disk space on the SQLAnywhere, Oracle, or Sybase database server storing records for the CiscoSecure ACS can result in a general warning message and a failure to update CiscoSecure accounting records. To prevent such failures, the system administrator should:

A typical example of heavy accounting disk space requirements might be those of an ISP's ACS, running TACACS+ protocol, receiving about 200,000 login requests per day, and configured to send Start, Update, and Stop accounting records (approximately 200 bytes each) for each login.
To calculate the accounting-related database disk space requirements for the above example, you would multiply 200,000 (logins per day) x 3 (accounting records per login) x 200 (bytes per record). The result indicates that 120 MB of disk space per day on the SQLAnywhere, Oracle, or Sybase database server would be required to accommodate the daily accounting data in the above example.

Configuring the CiscoSecure ACS AutoRestart Feature

The CiscoSecure ACS startup process has been enhanced to autorestart the CiscoSecure ACS if its AAA or DBServer components abnormally abort. To provide this functionality, a new process, "CiscoAuto," is started during CiscoSecure startup. If the AAA or DBServer component aborts, CiscoAuto detects this event and performs a CiscoSecure restart. During this process, the following events occur:

    1. The CiscoSecure ACS is shut down.

    2. Any core files in the CSU or DBServer directories are moved to $BASEDIR/corefiles and compressed.

    3. The CiscoSecure ACS is restarted.

The AutoRestart feature can be customized or disabled by specifying several command-line switches with the S80CiscoSecure startup command. The switches are as follows:

Disables AutoRestart. If used, CiscoSecure will not restart if the AAA server or DBServer aborts. The AutoRestart feature is on by default.
Example: S80CiscoSecure noauto
Disables the autosave of core files during restart. If used, the CiscoSecure ACS will not save the core files into the $BASEDIR/corefiles directory during restart. Any core files contained in the DBServer and CSU directories will remain in their respective directories.
Example: S80CiscoSecure nosavecore
Instructs CiscoAuto not to save the core files in the event of an abort and restart.
Example: S80CiscoSecure nosavecore 5
Instructs CiscoAuto to check the AAA server component every 5 seconds and, in the event of a shutdown and restart, not to save the core files.
Sets the sample monitoring time. Sample time is the number of seconds between checking if the AAA server has aborted. When not supplied, the default is 30 seconds. To set the sampling time, provide a numeric value with the command-line switch.
Example: S80CiscoSecure 5
Checks that the AAA server is running every 5 seconds.
Example: S80CiscoSecure 60
Checks once a minute that the AAA server is running.

Importing a TACACS+ Freeware Database to CiscoSecure

The conversion utility, cnv, allows you to import a public domain TACACS+ freeware database into a CiscoSecure ACS 2.x for UNIX database. With cnv, you can create an intermediate file (import file) that can then be imported into the CiscoSecure 2.x RDBMS using CSImport.

However, before the import file can be used, it must be broken into two files. The first section of the import file contains the AAA server control file; the second part contains all the user profiles to import. The import file contains a separator bar, separating these two sections. Command-line syntax for cnv is as follows:

cnv <old_Config > new_Config

where

Example Import

To create an import file from a TACACS+ freeware configuration file named "myoldconfigfile," the system administrator would follow these steps:

Step 1 Type: cnv <myoldconfigfile> mynewimportfile

Step 2 Break the mynewimportfile file into the AAA.cnf and newuser.dat files.

Step 3 Run CSimport to import the user profiles:

CSimport -c -p /dir -s newuser.dat

Additional NAS Command for Token Card Support

CiscoSecure ACS support for token card-generated, one-time password (OTP) logins requires the host network access server (NAS) to be configured with a minimum 10-second TACACS+ timeout setting:

tacacs-server timeout 10

The default setting of one second will cause OTP logins to fail a large percentage of the time.

Restricting Client Access to the CiscoSecure ACS Administration Tools

You can edit the CSConfig.ini file to restrict administrative access to the CiscoSecure ACS administration web pages and command-line interface (CLI) to a specified list of workstations to which you have assigned IDs.

Step 1 Locate the CSConfig.ini file in the $BASEDIR/config directory of the CiscoSecure  ACS  2.2(3) installation.

Step 2 Insert or edit the following lines to the [ValidClients] section of the CSConfig.ini file:

where:

ValidateClients = true restricts access to only those workstations assigned IDs in the [ValidClients] section.
ValidateClients = false allows any workstation to access the CiscoSecure ACS administration web pages or CLI whether or not it is specifically listed in the [ValidClients] section.

Step 3 After editing the CSConfig.ini file, restart the CiscoSecure ACS to apply the changes.

Example CSConfig.ini [ValidClients] Settings

In the following example, two workstations, with the FQDNs of ws-barrylee and ws-pameagan, are authorized to access the CiscoSecure administration tools:

[ValidClients]
100 = ws-barrylee
120 = ws-pameagan
ValidateClients = true 

The setting ValidateClients = true stops any workstation not specifically listed in the [ValidClients] section from accessing the CiscoSecure ACS web pages or CLI.

In the following example, the setting ValidateClients = false allows any workstation to access the CiscoSecure ACS web pages or the CLI, whether or not it is specifically listed in the [ValidClients] section:

[ValidClients]
100 = ws-barrylee
120 = ws-pameagan
ValidateClients = false

Supporting TACACS+ ISDN Multilink Users on Cisco IOS Release 11.3 or Higher

If your TACACS+ NASes are running Cisco IOS Release 11.3 or higher, and you want to support CiscoSecure authorization of users who are dialing in over multiple ISDN channels, use the Java-based CiscoSecure Administrator advanced configuration program to add the protocol  =  multilink attribute-value to the profiles of the affected users.

Assigning Password Privilege Levels through the Distributed Command-Line Interface

CiscoSecure ACS 2.2(3) provides a new command switch, -prv, for the CLI AddProfile command.

In contrast to the existing -pw switch, which enables you to specify password type and password, the new -prv switch enables you to specify password type, password, and privilege-level requirements, if necessary, to new user profiles. The new syntax for the AddProfile command is:

AddProfile [-h host] -p port [-id client] {-u user | -g group} [-pr parent-group] [-pw  password-pair] [-prv password-trio] [-a  profile-info][-q]

In the AddProfile command syntax, the -pw and -prv switches are mutually exclusive. Use the -pw switch when creating profiles with passwords but no privilege-level requirements; use the -prv switch when creating profiles with password and privilege-level requirements.

The following table describes and contrasts the -pw and -prv switches.
Switch Command Type Description

-pw

password pair (optional)

type, password

or

type

Defines which passwords to add to the user's profile.

  • If you add a password type that requires a password specification (clear, ARAP, PAP, DES, String, Outbound PAP), enter type, password. For example:


-pw ARAP,2sAmzpwRd

  • If you add a password type that does not require a password specification (SYSTEM, SKEY, NO_PASSWORD, CRYPTO, ENIGMA,SDI), enter type. For example:


-pw SDI

-prv

password trio (optional)

type, password, privilege level

or

type, privilege level

Defines which password and privilege level requirement (if necessary) to add to the user's profile.

  • If you add a password type that requires a password type specification (clear, ARAP, PAP, DES, String, Outbound PAP), enter type, password, privilege level. For example:


-prv clear,2sAmzpwRd,13

  • If you add a password type that does not require a password specification (SYSTEM, SKEY, NO_PASSWORD, CRYPTO, ENIGMA,SDI), enter type and privilege level. For example:


-prv SDI,13

Replacing a Forgotten Password with a New Password through the Distributed Command-Line Interface

CiscoSecure ACS 2.2(3) provides a CLI command UpdatePassword, which enables the system administrator to assign a new password to a user or group account in case the user or group members have forgotten the old password or are unavailable to provide that information.

The UpdatePassword command works the same as the ChangePassword command except that it does not require the old password to be specified.

To change a user's forgotten password enter:

UpdatePassword [-h host] -p port [-id client] -u user
-pr
password-type -npw new-password

To change a group's forgotten password enter:

UpdatePassword [-h host] -p port [-id client] -g group
-pr
password-type -npw new-password

The following table describes the UpdatePassword switches.
Switch Command Type Description

-h

host (optional)

Name of the host where the CiscoSecure native database is located---almost always the same host where the CiscoSecure ACS is installed. Required if using command remotely.

-p

port

CiscoSecure ACS database server port with which to communicate.

-id

client (optional)

Client ID.

-u

user

User's name whose passwords are being changed.

-g

group

Group's name whose passwords are being changed.

-pr

password's protocol type

Type of protocol being changed, such as CHAP, ARAP, PAP, and so on.

-npw

new password

New password.

-q

suppress output

(Optional)

Suppresses user output.

Message RC1 Description

No Error

0

Indicates no error. The password has been successfully changed.

Input Error

1

Error in the data provided by the users.

Connection Error

66

Cannot connect to the ACS database server.

Socket Error

64

Error occurred establishing a socket.

Stream Error

65

Error occurred establishing a data stream between the ChangePassword and CiscoSecure.

Password Error

3

Invalid password type or password was provided in the -npw, or -pr switches.

Password Not Changed

5

Password did not change.

1RC = return code
The following table describes system messages that might be returned for UpdatePassword.

In the following example, the password of the user user_joe is changed to mynewpassword:

UpdatePassword -h mymachine -p 9900 -id 100 -u user_joe -pr ARAP -npw mynewpassword


In the second example, the password of the group group1 is changed to ournewpassword:

UpdatePassword -h mymachine -p 9900 -id 100 -g group1 -pr ARAP -npw ournewpassword

Additional CSU.cfg Variables

New variables have been defined for the CiscoSecure CSU.cfg file. These variables are in addition to the variables described in the appendix "CiscoSecure ACS File Formats and Syntax" in the CiscoSecure ACS 2.2.2 for UNIX User Guide. Some variables that are not new but are not described in the current user guide are also listed in the following table.


Table 1: Additional Variables in the CSU.cfg File
Type Name Default Description and Example

String

config_acct_filename

/var/log /CSAccountingLog

The file where accounting records are stored, during the accounting packet buffering process, in case of database failure.

Example:


STRING config_acct_filename = "/spec/Acct";

Number

config_metrics_enable

0 (disable)

Whether to enable or disable AAA server metrics monitoring. This feature records AAA server performance statistics (such as transactions per second, total authentications) in the csuslog file.

1 = enable; 0 = disable

Example:


NUMBER config_metrics_enable = 1;

For a description of the AAA server metrics, see "Reading AAA Server Metrics Information in the csuslog File,".

See the config_metrics_log_interval description for other related information.

Important: AAA server metrics information can cause the csuslog file to grow extremely large. We recommend enabling this feature only for short periods of time.

Number

config_metrics_log_interval

8 (seconds)

Number of seconds between the AAA metrics updates to the csuslog file. See the config_metrics_enable description in this table for related information.

Example:


NUMBER config_metrics_log_interval = 10;

Number

config_callerid_enable

1 (enable)

Whether to enable or disable the use of the caller ID as a username when a username cannot be found. If the caller ID support feature is not required, we recommend disabling it to improve authentication performance.

1 = enable; 0 = disable

Example:


NUMBER config_callerid_enable = 0;

For details on caller ID support, see "Using New Support for Caller ID,".

Number

config_defaultuser_enable

1 (enable)

Whether to enable or disable use of the default unknown_user profile if the user/caller ID can't be found. If the unkown_user/caller ID support feature is not required, we recommend disabling it to improve authentication performance.

1 = enable; 0 = disable

Example:


NUMBER config_defaultuser_enable = 0;

Number

config_maxsessions_enable

0 (disable)

Whether to enable or disable the AAA server implementation of a group or user profile's "server max-sessions" attribute.

1 = enable; 0 = disable

Example:


NUMBER config_maxsessions_enable = 1;

Important: See the section "Limiting Sessions Per User,", before setting this variable.

Number

config_maxsessions_session_timeout

1440 (minutes)

Number of minutes after which a session will be considered closed by the CiscoSecure max sessions counter. The purpose of this variable is to remove from the max sessions count sessions that should be timed out, but that, for some reason, have not been noted as closed or decremented by the max sessions counter. It does not actually enforce closure of the session in the NAS.

Example:


NUMBER config_maxsessions_session_timeout = 60;

Important: See the section "Limiting Sessions Per User,", before setting this variable.

Number

config_maxsessions_purge_ interval

60 (minutes)

Interval in minutes between checking the possible timeout of sessions for the purpose of updating the max sessions counter.

Example:


NUMBER config_maxsessions_purge_interval = 90;

Important: See the section "Limiting Sessions Per User,", before setting this variable.

Number

config_acct_fn_enable

1 (enable)

Whether to enable or disable inclusion of per user group membership information in an accounting record if a user profile has the "accounting feature" attribute added.

When this function is disabled, an accounting record for a user session will not insert group information in the accounting record.

1 = enable; 0 = disable

Example:


NUMBER config_acct_fn_enable = 0;

For details on the accounting feature attribute and group membership accounting information, see the chapter "CiscoSecure ACS Accounting" in the CiscoSecure ACS 2.2.2 for UNIX User Guide.

Number

config_cache_group_timeout

5 (seconds)

Number of seconds to maintain group profile records in the ACS profile cache. Normally group profiles are maintained in the profile cache for only short periods to save system memory; however, if group profile information is frequently accessed for ACS authentication, authorization, and accountng functions, you can improve performance by extending the seconds a group profile remains in cache before timing out.

0 = no timeout

Example:


NUMBER config_cache_group_timeout = 240

Number

config_hex_string_support_  enable

0 (disable)

Whether to enable or disable use of hex string in the RADIUS string type. This variable can be toggled to enable ACS output of raw binary data required by certain models of U.S. Robotics NASes. If this function is enabled, you can enter any binary string by using "0x" followed by the hexadecimal representation of the string you wish to output. For example, "0x30313a3222" would generate "01:23."

1 = enable; 0 = disable

Example:


NUMBER config_hex_string_support_enable = 1

NA

config_update_log_filename

NA

This variable is no longer used.

NA

config_record_write_
frequency

NA

This variable is no longer used.

Number

config_local_timezone

0 (UMT)

The local time zone in relation to Universal Mean Time (Greenwich Mean Time). For example, zero is Universal Mean Time; -5 is United States Eastern Standard Time; -8 is United States Pacific Standard Time.

This setting is normally determined by the value you specify for the Local Timezone field in the CiscoSecure ACS AAA>General web page.

Number

config_max_failed_
authentication

10

The maximum number of failed authentications allowed until a profile is disabled. This feature minimizes the possibility of successful "random password generator" attacks on CiscoSecure user accounts.

This setting is normally determined by the value you specify for the Max. Failed Authentications field in the CiscoSecure ACS AAA>General web page.

Number

config_token_cache_absolute_timeout

86400 (seconds in one day)

The absolute number of seconds that a token password will be cached for users being authenticated through the CiscoSecure ACS. This is the timeout for the tokens that are using method=session. There are cases where a token can remain valid forever if the stop record was lost. This is meant to be a safeguard parameter that does not allow any token (method=session) to remain valid beyond the configured time.

This setting is normally determined by the value you specify for the Token Cache Absolute Timeout field in the CiscoSecure ACS AAA>General web page.

Number

config_use_keepalives

1 (enabled)

This is a parameter used to set the TCP sockets. Do not change this value.

List

config_external_parser_
symbols

NA

The name of the parser library used to parse CiscoSecure profiles. Do not change this value.

String

config_server_ip_address

NA

The IP address of the CiscoSecure ACS. Do not change this value.

Disabling Features to Improve Authentication Performance

To improve authentication performance, you can set some of the CSU.cfg variables described in the section "Additional CSU.cfg Variables" to disabled status if the feature they toggle is not required for your operation. Disabling unneeded optional features improves authentication performance by stopping processes that require additional system time.

The following variables can be set to disable (for example: config_maxsessions_enable = 0) if you do not require the feature that they toggle on and off:

For any of these listed variables, check the description in "Additional CSU.cfg Variables," to decide whether you need the feature they enable or not. For additional information on config_maxsessions_enable, see also "Limiting Sessions Per User,".

Limiting Sessions Per User

The CiscoSecure max-sessions feature enables you to limit the number of sessions that an individual CiscoSecure user can open concurrently. This feature prevents any one user from appropriating a disproportionate number of available sessions, and prevents multiple users from using one paid username to get multiple free sessions.

Using the Java-based CiscoSecure Administrator advanced configuration program, you can apply the special CiscoSecure server max-sessions attribute to a group profile or user profile. Then you can tune the feature for performance or reliability or disable it by editing the CSU.cfg and CSConfig.ini files.

Assigning the "server max-sessions" Attribute

Assign the max-sessions attribute as follows:

Step 1 Start the Java-based CiscoSecure Administrator advanced configuration program.

Step 2 In the Members tab, deselect browse, select the group or user profile that you want to apply the max-sessions limitation to, and click the profile icon to display its Options menu.

Step 3 In the Options menu, select Profile attributes and click Apply to display the Profile attributes icon.

Step 4 Click the Profile attributes icon to display its Options menu, and in the Options menu, click server max-sessions.

Step 5 In the Numeric value field, enter the max-sessions number that you want to apply. For example:

Step 6 Click Apply, then click Submit.

Step 7 In the server's $BASEDIR/config directory, edit the CSU.cfg and CSConfig.ini files to enable and tune the max-sessions feature to meet your particular requirements.

Configuring High-Performance Max-Sessions Checking

If you want the highest-performance max-sessions checking, configure max-sessions to be executed by the CiscoSecure AAA server module. Edit the CSU.cfg and CSConfig.ini files as follows:


Note This configuration sacrifices max-sessions checking reliability in favor of speed. In the event of a CiscoSecure shutdown, the max-sessions counts for individual users will not be preserved. When the CiscoSecure ACS is restarted, all max-sessions counts will restart at zero. If you require a higher level of reliability, use the configuration described in "Configuring Highly Reliable Max-Sessions Checking,".

Step 1 In the CSU.cfg file, make sure the following variables are set:

where:

The value you specify for session_minutes should equal or exceed, in minutes, the actual timeout time that you set by applying the TACACS+ timeout attribute or RADIUS session timeout attribute to the group or user profile.

Step 2 In the CSConfig.ini file, make sure the following parameters are set in the [AccountingMgr] section:

Step 3 In order to implement the CSConfig.ini and CSU.cfg edits, restart the CiscoSecure ACS.

Under this configuration, the session count for your users whose profile is assigned a server max-sessions attribute will be maintained and enforced; however, if CiscoSecure is disrupted and restarted for any reason, the session count for those users will be reset to  0.

Configuring Highly Reliable Max-Sessions Checking

If you want highly reliable max-sessions checking, configure the max-sessions feature to be carried out by the CiscoSecure DBServer module. This configuration preserves the current max-sessions count of your users in the event of a CiscoSecure shutdown. Edit the CSU.cfg and CSConfig.ini files as follows.


Note This configuration is the default configuration for CiscoSecure. This configuration ensures max-sessions count persistence at the expense of max session checking speed. If you require speed, use the configuration described in "Configuring High-Performance Max-Sessions Checking,".

Step 1 In the CSU.cfg file, make sure the following variables are set:

Step 2 In the CSConfig.ini file, make sure the following parameters are set in the [AccountingMgr] section:

where:

For example, the setting:
AcctPurgeInterval = 75
does not necessarily guarantee that a purge check will be performed every 75 minutes. It does guarantee that a purge check will be performed no more frequently than once every 75 minutes. The actual interval between purge checks could be anything from 75 minutes to 135 minutes.
The minimum value for this variable is 60 minutes.
The value you specify for session_minutes should equal or exceed, in minutes, the actual timeout period that you set through your profile attributes. The minimum value is 60 minutes.

Step 3 In order to implement the CSConfig.ini and CSU.cfg edits, restart the CiscoSecure ACS.

Under this configuration, the session count for your users whose profile is assigned a server max-sessions attribute will be maintained and enforced; if CiscoSecure is disrupted and restarted, the session count for those users will be preserved and restored.

Temporarily Disabling Max-Sessions Checking

To disable max-sessions checking without deleting the server max-sessions attribute from each profile, edit the CSU.cfg and CSConfig.ini files as follows:

Step 1 In the CSU.cfg file, make sure that the following variable is set:

Step 2 In the CSConfig.ini file make sure the following parameters are set in the [AccountingMgr] section:

Step 3 To implement the CSConfig.ini and CSU.cfg edits, restart the CiscoSecure ACS.

Managing High-Performance Max-Sessions Checking through ms_util


Note Information in this section applies only if you have implemented AAA server-based max-sessions checking as described in "Configuring High-Performance Max-Sessions Checking,". It does not apply if you implemented DBServer-based max-sessions checking as described in "Configuring Highly Reliable Max-Sessions Checking,".

The ms_util tool provides a menu and prompt-driven method for the system administrator to manage a High-Performance, AAA server-based implementation of max-sessions checking. Using ms_util, the administrator can browse max sessions information for current active sessions and delete active sessions records from the AAA server-based max-sessions counter.

Before executing the delete operations, the system administrator can store the delete commands in an editable file of queued delete commands.

Viewing Active Sessions


Note Information in this section applies only if you have implemented AAA server-based max-sessions checking as described in "Configuring High-Performance Max-Sessions Checking,". It does not apply if you implemented DBServer-based max-sessions checking as described in "Configuring Highly Reliable Max-Sessions Checking,".

To view the max-sessions counter records of active sessions, follow these steps:

Step 1 Start the ms_util utility.

Go to the $BASEDIR/MaxSessions_utils directory and enter:

Step 2 In the Main menu, select 1 to view the current active sessions.

Step 3 In the View menu, enter the number for one of the following options:

.
Number and Option Description

1 browse-users

Displays a numbered, alphanumerically ordered list of all active user sessions, by username (10 entries displayed per screen, numbered 0 - 9). In addition to username each record also includes: NAS, session number, session length, and start time.

  • If necessary, enter n to view the next 10 active user sessions, or enter b to view the previous 10 active user sessions.

  • To view all sessions of a specific user, enter one of the numbered listing (0-9) of that user.

2 view-user

Displays all the active sessions of a specific user.

Enter the name of the user whose sessions you want to view.

3 browse-nas

Displays a numbered, alphanumerically ordered list of all NASes with active user sessions (maximum 10 entries per screen, numbered 0 - 9).

  • If necessary, enter n to view the next 10 NASes with active user sessions, or enter b to view the previous 10 NASes with active user sessions.

  • To view all active user sessions run through a particular NAS, enter the numbered listing (0-9) of that NAS.

    • Then, if necessary, you can enter n or b to page forward or backward through the active user sessions listings, or

    • View all active sessions of a specific user by entering the numbered listing (0-9) of that user.

4 view-nas

Displays all the active sessions of a specific NAS.

  • Enter the name of the NAS whose active user sessions you want to view.

  • Then, if necessary, you can enter n or b to page forward or backward through the active user sessions listings, or

  • View all active sessions of a specific user by entering the numbered listing (0-9) of that user.

5 refresh

Updates the current screen of information.

Step 4 The max-sessions counter active sessions records are displayed in a format similar to the following example:

--------------------------------------------------------------------
-Users with active sessions as of Wed Feb 11 10:20:00 1998-
     User      Nas       Session   Active  Start
0)   user100   nas1.com  110       00:11   Wed Feb 11 10:09:00 1998
1)   user102   nas1.com  1011      01:15   Wed Feb 11 09:05:12 1998
--------------------------------------------------------------------

The preceding example indicates that user100 logged on to nas1.com at 10:09 a.m. and the session has been active for 11 minutes; user102 logged in at 9:05 a.m. and this session has been active for 1 hour and 15 minutes.

Deleting Active Sessions Records


Note Information in this section applies only if you have implemented AAA server-based max-sessions checking as described in "Configuring High-Performance Max-Sessions Checking,". It does not apply if you implemented DBServer-based max-sessions checking as described in "Configuring Highly Reliable Max-Sessions Checking,"

To delete the records of active sessions from the AAA server-based max-sessions counter, follow these steps:


Note The Delete options described here do not actually end active sessions; they merely remove records of current active sessions from the AAA server-based max-sessions counter. Use these delete options only in situations where you know sessions have ended but for some reason have not been decremented in the max-sessions counter.

Step 1 Start the ms_util utility.

Go to the $BASEDIR/MaxSessions_utils directory and enter:

Step 2 In the Main menu, enter 2 to delete active sessions.

Step 3 In the Delete menu, enter the number for one of the following options:

Number & Option Description

1 delete-user

Clears all records in the max-sessions counter of current sessions associated with a specific user.

  • Enter the username.

or

  • Press Enter to browse the records of active user sessions.

    • If you want to browse the entire active user sessions list, enter 1.

    If necessary, enter n to view the next 10 records of active user sessions, or enter b to view the previous 10 records of active user sessions.
    To clear active sessions records for a particular user, (1) enter a numbered listing (0-9) of that user to display all that user's active sessions (2) enter the numbered listing (0-9) to delete a particular session, or (3) enter all to delete all sessions belonging to that user.

    • If you want to browse the records of active user sessions on a particular NAS, enter 2.

    If necessary, enter n to view the next 10 NASes with active user sessions, or enter b to view the previous 10 NASes with active user sessions.
    To view all active user sessions run through a particular NAS, enter the numbered screen listing (0-9) of that NAS.
    Then, if necessary, you can enter n or b to page forward or backward through the active user sessions listings.
    To clear active sessions records for a particular user, (1) enter a numbered listing (0-9) of that user to display all that user's active sessions (2) enter the numbered listing (0-9) to delete a particular session, or (3) enter all to delete all sessions belonging to that user.

2 clear-nas

Clears all records in the max-sessions counter of current sessions associated with a specific NAS.

  • Enter the NAS name.

or

  • Press Enter to browse the NASes with records of active user sessions.

    • If necessary, enter n to view the next 10 NASes with records of active user sessions, or enter b to view the previous 10 NASes with records of active user sessions.

    • To clear a particular NAS of all records of active user sessions, enter the numbered listing (0-9) of that NAS.

3 clear-all

Clears all records of active sessions from the max-sessions counter. The max-sessions count of all users is set to zero.

4 refresh

Updates the current screen of information.

Step 4 After entering the options in Step 3, press Enter to place your Delete operation in the job request queue. You return to the main menu.

Step 5 If you have other delete operations to carry out, repeat steps 2, 3, and 4.

Step 6 After specifying all the Delete operations you want carried out, enter 6 in the Main menu to execute the Delete commands in your job queue.

Managing Max-Sessions Counting through the ms_util Command-Line


Note Information in this section applies only if you have implemented AAA server-based max-sessions checking as described in "Configuring High-Performance Max-Sessions Checking,". It does not apply if you implemented DBServer-based max-sessions checking as described in "Configuring Highly Reliable Max-Sessions Checking,".

You can add switches to the ./ms_util command-line string and carry out the delete operations described in "Deleting Active Sessions Records" in command-line mode.


Note The Delete operations described here do not actually end active sessions; they merely remove records of current active sessions from the AAA server-based max-sessions counter. Use these delete operations only in situations where you know sessions have ended but for some reason have not been decremented in the max-sessions counter.

If you want to carry out ms_util deletions in command-line mode, the syntax is:

./ms_util [-u user_id, nas _id, session_id] [-n nas_id] [-e]

The command-line switch options and parameters are explained as follows:
Switch Description
-u

Deletes one specified record of an active session in the max-sessions counter associated with a specific user. The -u switch is specified with the following parameters:

./ms_util -u user_id, nas_id, session_id

where:

  • user_id is the name of the user whose active sessions records you want to delete.

  • nas_id is the name of the NAS through which the user whose active session record you want to delete has logged on.

  • session_id is the NAS-assigned session identification number of the session whose record you want to delete. This is the number displayed when you run ms_util to carry out the browse and view operations described in "Viewing Active Sessions,".

Example:

  • To delete session 103 of user john from NAS ciscoNAS, enter:


./ms_util -u john,ciscoNAS,103
-n

Deletes all records of active sessions in the max-sessions counter associated with a specific NAS. The -n switch is specified with the following parameter:

./ms_util -n nas_id

where nas_id is the name of the NAS whose active session records you want to delete from the max-sessions counter.

Example:

To clear all sessions from NAS ciscoNAS, enter:

./ms_util -n ciscoNAS
-e

Deletes all records of active sessions from the max-sessions counter. The max-sessions count of all users is set to zero.

Example:

To clear the entire max-sessions counter, enter:

./ms_util -e

Specifying Multiple Delete Operations on a Single ms_util Command-Line

Multiple delete operations can be specified on a single ms_util command-line. For example, the following ms_util command-line will delete session 103 of user john from NAS ciscoNAS, session 104 of user joe from NAS nasTWO, and clear all sessions from NAS nasTHREE:

./ms_util -u john,ciscoNAS,103 -u joe,nasTWO,104 -n nasTHREE

This is more efficient than running ms_util three times to perform the three deletes.

Reading AAA Server Metrics Information in the csuslog File

The AAA server metrics information in the csuslog file is generated when the config_metrics_enable variable is toggled on and the config_metrics_log_interval variable is set in the CSU.cfg file.

Typical AAA metric data output to a csuslog file, is shown below:

Mar  9 06:11:33 srv1 	Total Authentications = 3176			  APS = 0.0
Mar  9 06:11:33 srv1 				             TotalReqs	      TotalSec
Mar  9 06:11:33 srv1 	Accounting		    3164		           901.85
Mar  9 06:11:33 srv1 	MaxSessions		   3176 		          463.81
Mar  9 06:11:34 srv1 	Profile       2974		           248.26

Each log entry line displays the date and time of the entry and the name of the AAA server doing the processing. Other values displayed include:

Troubleshooting "Severe SQL Error" Messages

Occasionally messages indicating "Severe SQL Error" might appear in the CiscoSecure ACS 2.2(3) Administration web pages. The accompanying on-line help might direct you to view the DBServer log files. Two types of DBServer log files are located in the $BASEDIR/logfiles directory:

where date is the date the log file is created. For example, csdblog_98-MAR-28.

Accessing Information in the csdblog_date Log Files

The csdblog_date log file, located in the $BASEDIR/logfiles directory, logs error and warning messages from both the DBServer module and from the RDBMS (Oracle, Sybase, or SQLAnywhere) where you are storing your group and user profiles. A new csdblog_date log file is created every day.

Typical Contents of a csdblog_date Log File

Sample output is as follows for csdblog_98-Mar-5 (note that the first two lines are always present even if nothing else is; the other lines are the result of errors):

/*** Cisco Secure database server error log ***/
SEVERITY LEVELS ranges from 1 to 10 where 1=MINOR, 10=CATASTROPHIC
----------------------------------------------------------------------------
Thu Mar 05 09:33:07 PST 1998  Severity Level: 8  Error#0
Msg:DBInterface.execSqlUpdate:[insert into cs_user_profile ( user_na
me, profile_id, profile_ts, cycle_number )  values ( ?, 100000001, ?, 1 )
]{ SQLState: }, { Message: ORA-23326: object group MASTER-
MASTER is quiesced}, { Vendor Code: 23326}
Thu Mar 05 09:33:07 PST 1998  Severity Level: 8  Error#0
Msg:DBInterface.execSqlsInTran:{ SQLState: }, { Message: ORA-23326: 
object group MASTER-MASTER is quiesced}, { Vendor Code: 23326}
Thu Mar 05 09:33:08 PST 1998  Severity Level: 8  Error#0
Msg:DatabaseWorker error: ORA-23326: object group MASTER-MASTER is q
uiesced

A Common DBServer Module Error Message in the csdblog_date Log File

An example of a common DBServer-generated message that might appear in a csdblog_date log file is:

Wed Mar 04 12:51:49 PST 1998 Severity Level: 8 Error#0
Msg:DatabaseMgr:getAvailDBconn(): "Out of database resources error: The number of 
available connections to the Database has currently been reached. Please retry later"

If the preceding message appears frequently in the csdblog_date log file, increase the number of connections to the RDBMS (through the ConnectionLicense= parameter in the [Oracle] section of the CSConfig.ini file) or reduce the MaxConnection parameter in the CSU/libdb.conf file.

Changing the csdblog_date File Logging Level

The DBServer module or RDBMS error messages that can be logged in a csdblog_date log file are ranked in order of severity from 1 to 10 (where: 1 = minor, 5 = moderate, 8 = severe, and 10 = catastrophic).

The default logging level is 8, which means that DBServer or RDBMS error messages with a severity of 8 or higher are logged in this file.

To change the level of logging for the purposes of troubleshooting or testing, edit the MinLogLevel  = parameter in the $BASEDIR/config/CSConfig.ini file. For example, the following setting enables logging in the csdblog_date log file of moderate-or-higher severity messages.

MinLogLevel = 5 

Lowering the logging level increases the amount of messages written to your daily csdblog_date log files.

Accessing Information in the dbserver.log File

Major DBServer module events, such as startup or shutdown, are recorded in the dbserver.log file, located in the $BASEDIR/logfiles directory. DBServer events too sudden and catastrophic to be logged in the csdblog_date log file, might be recorded in the dbserver.log file.

Specifying NAS Address and NAS Port Filtering

The system administrator can use the Java-based CiscoSecure Administrator advanced configuration program to enable the Filter attributes, Allow and Refuse. The Allow and Refuse attributes enable the system administrator to allow or refuse users or groups of users access to specific TTY ports or ranges of TTY ports on specific NASes.


Note When specifying the NAS IP addresses and TTY port numbers, the administrator should follow regular expressions, the UNIX standard pattern matching syntax conventions.

Step 1 In the Java-based CiscoSecure Administrator advanced configuration program, select the user or group whose NAS and port access you want to filter and click the Profile icon.

Step 2 In the Options menu, click Filter and click Apply.

Step 3 Click the Filter icon and in the Permission menu, select either Allow or Refuse and click Apply.

Step 4 Click the Filter tab and fill out the following fields:
Field Description

NAS

The IP Address or the FQDN of the NAS to which you want to allow or refuse access. Standard UNIX regular expression pattern matching syntax conventions apply.

Example:

To specify access to the NAS at IP address 10.8.1.176, enter:

^10\.8\.1\.176$

Port

The port on the specified NAS through which you want to allow or refuse access. Standard UNIX regular expression pattern matching syntax conventions apply.

Example:

To specify access through TTY ports, tty0, tty1, tty2,tty3, enter:

^tty[0-3]$

Remote Address

(optional)

Remote IP addresses through which you can allow or refuse access to the target NAS whose IP address or FQDN you specified in the NAS field. Standard UNIX regular expression pattern matching syntax conventions apply.

Example:

To specify access to the target NAS through remote IP address 10.98.12.180, enter:

^10\.98\.12\.180$

Step 5 Repeat Steps 2 through 4 for any other filter you want to specify.

Step 6 When you have specified all the filters to apply to this profile, click Submit.

NAS Filtering Example

In the following profile example:

user = boscotam {
service = shell {
default cmd = permit
default attribute = permit
{
profile_id = 137
profile_cycle = 1
password = clear "*************"
allow "^10\.8\.1\.176$" "tty([0-9]|10)$"
allow "^10\.8\.1\.176$" "tty(2[1-9]|30)$"
refuse "^10\.8\.1\.176$" "tty(1[1-9]|20)$"
refuse "^171\.68\.118\.238$" ".*"
refuse "apps-comm1\.xyz\.zcorp\.com" ".*"
}

Note The standard UNIX pattern characters, ^, \, and $ are inserted in this example to prevent misinterpretation of the IP addresses and TTY port ranges. For example, if the \ character were not inserted before the periods in the IP addresses, then under standard UNIX pattern matching, the periods would be interpreted as wildcard characters, thus enabling user boscotam to run shell sessions not only on the NAS at 10.8.1.176, but also at addresses not necessarily intended.

New RADIUS Dictionary Options

The Java-based CiscoSecure Administrator advanced configuration program now allows you to apply attributes from additional RADIUS dictionaries optimized for compatibility with Cisco IOS Releases 11.1, 11.2, 11.3 and Ascend version 5.

In addition to the original RADIUS-Ascend, RADIUS-Cisco, RADIUS-IETF options, the CiscoSecure Administrator options menu now provides the following additional RADIUS dictionary options:

See "Fully Enabling the RADIUS-Cisco11.3 Dictionary," for details

Fully Enabling the RADIUS-Cisco11.3 Dictionary

The RADIUS-Cisco11.3 dictionary includes Cisco's set of vendor-proprietary extended RADIUS attributes. To take full advantage of this version, configure the associated NAS as follows:

radius-server host hostname|ip-address non-standard
Where hostname | ip-address is the FQDN or IP address of the CiscoSecure ACS assigned to this NAS.
radius-server configure-nas

For a description of the vendor-proprietary attributes themselves, see "RADIUS Vendor-Proprietary Attributes," in the appendix "RADIUS Attributes" in the document Security Configuration Guide, accessible at the Cisco documentation web site at the following URL:

http://www.cisco.com/univercd/cc/td/doc/product/software/ios113ed/113ed_cr/secur_c/  
scprt6/index.htm

Tuning Profile Caching

You can edit the DBPollInterval= parameter in the [ProfileCaching] section of the $BASEDIR/config/CSConfig.ini file to modify the CiscoSecure profile caching interval. The syntax is:

DBPollInterval=caching_interval

where caching_interval specifies the interval, in minutes, between profile cache updates from the RDBMS. For example, the default setting of every 30 minutes is specified as:

DBPollInterval=30

Seconds can be specified as fractions of minutes. For example:

DBPollInterval=1 1/2
DBPollInterval=15/60

Changing the Default TCP/IP Port Number of the Netscape FastTrack Server

If you change the default value of the Netscape FastTrack Server TCP/IP port number from 80 to some other value, you must perform the following additional steps to ensure continued operation of the Java-based CiscoSecure Administrator advanced configuration program.

Step 1 On the CiscoSecure ACS server, locate the $BASE/FastAdmin/turbo.conf file and change the following line:

to

Where:

For example:

NS_PATH=rtp-evergreen:8080/cs/

Step 2 Locate the $BASEDIR/ns-home/httpd-hostname/config/magnus.conf file and change the following line:

to

where: new_port_num is the new TCP/IP port value.

Enabling SSL on the Web Server

To protect data transfers (which can include passwords) between the CiscoSecure ACS graphical user interface (GUI) and your web browser, enable the Secure Socket Layer (SSL) protocol. SSL is a security protocol created by Netscape Communications Corporation. This protocol ensures that data is encrypted before being transferred over the network.

CiscoSecure ACS software provides security for remote access, and SSL provides security for data transfer between the Netscape FastTrack web server and browser.

The CiscoSecure ACS GUI communicates with the Netscape FastTrack web server, and the web server in turn communicates with the CiscoSecure ACS database. By employing CiscoSecure ACS and enabling SSL, you can provide secure data transfer into and within your network.

SSL works by requiring Netscape Navigator to authenticate only a server that has a key signed by either Netscape or VeriSign. VeriSign will sign your keys for a fee, provided you comply with certain requirements.

To enable SSL on your web server, follow these steps:

Step 1 Log in to the FastTrack Server as the administrator (root privileges). Enter:

You are prompted for a username and password.

Step 2 Enter the username and password, for example:

The Netscape Server Selector window opens.

Step 3 Click the name of your Netscape FastTrack Server.

Step 4 From the command buttons at the top of the window, click Encryption.

Step 5 On the left side of the window, click Generate Key.

A help window called Generating a key pair opens.

Step 6 Follow the online instructions to generate a server key pair.

Step 7 Click Request Certificate.

The online form called Request a Server Certificate opens.

Step 8 Complete the online form, then click OK.

Step 9 Request a certificate from a Certification Authority (such as VeriSign at www.verisign.com) and obtain a signed key.

Step 10 When you receive the server certificate, click Install Certificate from the Server Manager window.

The online form called Install a Server Certificate opens.

Step 11 Complete the online form, then click OK to install the server certificate.

Step 12 On the left side of the window, click On/Off to enable encryption.

Using New Support for Caller ID

New TACACS+ and RADIUS support for caller ID allows you to base profiles on the calling number, rather than the username being passed. Identifying users by their telephone number is especially useful for accounting purposes because you can directly bill charges according to the calling number.

To configure support for caller ID, create a new user profile and enter a designated telephone number instead of a username.

The following example shows a user profile configured for caller ID:

user = 5551212
password = chap01

In this case, if an unknown user dials in to the network access server (NAS), the NAS passes the user's information including "rem_addr (5551212)" to the CiscoSecure ACS. The CiscoSecure ACS first attempts to authenticate the user based on the user field, but in this case, the user is not in the CiscoSecure database. However, because the user profile contains the caller ID, the CiscoSecure  ACS uses the rem_addr (5551212) to index into the database.

For more information on tuning the caller ID feature, see the descriptions of the CSU.cfg variables, config_callerid_enable and config_defaultuser_enable in "Additional CSU.cfg Variables,".

User's Profile

The profile attribute Privilege - Web will accept a blank password (input as a blank space in the password field) as valid.

Additional Methods of Authenticating One-Time Password Cards via PPP

The CiscoSecure ACS now enables you to set up the profiles of one-time password (OTP) card users who use PPP and PAP protocols so that they can log in using a more conventional looking username and OTP entry than was previously required.

Previously, users assigned TACACS+ Service-PPP attribute, Password-PAP attribute, and an OTP password attribute (such as Password-Crypto, Password-Enigma, Password-SDI, Password-SKey, Password-DES) logged in by entering their username, an asterisk, and their OTP at the username prompt and the PAP at the password prompt. for example:

username: pameagan*546323
password: ********

Note See "Authenticating One Time Password Cards via PPP" in the chapter, "Token Server Support" in the CiscoSecure ACS 2.2.2 for UNIX User Guide for details.

It is now possible, however, to assign TACACS+ attributes in such a way as to enable PPP and PAP protocol OTP users to log in with more conventional entries, entering username at the username prompt and entering the OTP at the password prompt. For example:

username: pameagan
password: 546323

Using the Java-based CiscoSecure Administrator advanced configuration program, configure your PPP and PAP protocol OTP users with TACACS+ attributes. Use the main options menu to configure your users with TACACS+ attributes as before (for example: Service-PPP, Password-PAP, Password-crypto):

Even though you've assigned a dummy string in your users' Password-PAP attribute, they do not enter it during log in. In fact, they do not even need to know what the dummy string is.

Managing Accounting Performance

CiscoSecure ACS 2.2(3) for UNIX supports new parameters in the [AccountingMgr] section of the $BASEDIR/config/CSConfig.ini file that permit you to configure memory buffering for ACS accounting. The parameters and default settings are listed below:

Table 2: Accounting Management Parameters in the CSConfig.ini File
Parameter Default Description and Example

LogRawAccountingPacketToDB

enable

Enables writing of log account packets in the RDBMS cs_accounting_log database table.

BufferAccountingPackets

enable

Enables buffering of account packets in memory before storing in the RDBMS. If this setting is enabled, the DBServer module creates enough buffers to match the number of database connections available minus 2 up to a maximum of 8 buffers.

NOTE: In case of sudden termination of the DBServer module (that is, situations where the DBServer is terminated before it can issue a "DBServer has shut down" message), records in this buffer will be lost.

AccountingBufferSize

500

Specifies, in bytes, the size of each packet buffer. Permissable values range from 5 to 10000.

ProcessInMemoryMaxSessionInfo

enable

Enables processing of user max sessions information to save in memory.

ArchiveMaxSessionInfoToDB

enable

Enables writing of user max sessions information to the RDBMS cs__user_accounting database table.

NOTE: If the BufferAccountingPackets and ProcessInMemoryMaxSessionInfo parameters are enabled, then max sessions information records will be buffered as well.

AcctPurgeInterval

60

Specifies, in minutes, the minimum interval between the times that the system checks for accounting sessions to purge. Because this purge check interval is dependent upon internal variably-timed DBServer processes, the value set here is not accurate to the minute.

For example, the setting:

AcctPurgeInterval = 75

does not necessarily guarantee that a purge check will be performed every 75 minutes. It does guarantee that a purge check will be performed no more frequently than once every 75 minutes. The actual interval between purge checks could be anything from 75 minutes to 135 minutes.

The minimum value for this parameter is 60 minutes.

AcctPurgeTimeOut

1440

Specifies the maximum number of minutes that a CiscoSecure session can remain open before the system assumes it is timed out and purges it.

This value is dependent on the AcctPurgeInterval setting and is not accurate to the minute. It is not intended to be set to less than 60

Increasing Accounting Reliability

The buffering of accounting records in memory carries an inherent risk of record loss in the unlikely event that the DBServer terminates ungracefully or is unable to write to the RDBMS for some other reason. To minimize this risk, you can set the BufferAccountingPackets and ProcessInMemoryMaxSessionInfo parameters to disable to stop accounting record buffering; however, doing so will adversely and substantially affect accounting performance.

Fixing Netscape FastTrack Server-Related CiscoSecure Startup Problems

A problem with file permissions in the SPARCstation's /tmp directory might prevent the Netscape FastTrack server module that was installed with CiscoSecure ACS from starting when you attempt to start the CiscoSecure ACS. If this happens, administrators and users attempting to access the CiscoSecure ACS Administration or User password web pages will be unable to do so.

A check of the $BASEDIR/logfiles/cs_startup.log file might display the following message:

seminit failed (libsec code -8187)

This message is caused by the FastTrack server not having read, write, and execute permissions to the SPARCstation /tmp directory.

To remedy, set the SPARCstation /tmp directory file permissions to "777" and restart the CiscoSecure ACS.

Updating a Sybase Database after Adding Large Numbers of Users

If you use CiscoSecure command-line scripts or CSimport tool to add a large number of CiscoSecure users (5,000 or more) to a Sybase CiscoSecure RDBMS, you need to run the Sybase ISQL utility to update the CiscoSecure-related tables after the command-line or import operation.


Note If you do not run an ISQL update, CiscoSecure ACS operations will slow to the point where the CiscoSecure software will appear to have stopped.

At the affected database site, run the ISQL utility and update the CiscoSecure-related tables. Enter:

isql -UAdminID -PAdminPasswd -SSybaseName
> update statistics cs_profile
> go
> update statistics cs_user_profile
> go
> update statistics cs_profile_blob
> go
> update statistics cs_password
> go
> update statistics cs_privilege
> go
> update statistics cs_group_profile
> go

where:

AdminID is the login name ISQL uses for connecting to SQL Server.

AdminPasswd is the password for connecting to SQL Server.

SybaseName is the name of SQL Server whose database you want to update.

Improving General GUI Performance with Netscape Navigator

Use the following procedures to increase GUI performance on Netscape Navigator browser.

Increase Memory and Disk Cache

Step 1 Bring up the Netscape Navigator Cache settings:

The Memory Cache dialog box opens.

Step 2 In the Memory Cache field, increase the number from the default (1024 kilobytes) to 8000.

Step 3 In the Disk Cache field, increase the number from the default (5000 kilobytes) to 20000.

Step 4 Click OK.

The increased memory and disk cache take effect immediately.

Clear Cache Memory after CiscoSecure ACS Upgrade

Step 1 Bring up the Netscape Navigator Cache settings.

The Memory Cache dialog box opens.

Step 2 Click Clear Memory Cache Now.

Step 3 Click Clear Disk Cache Now.

Step 4 Click OK.

The memory and disk cache are cleared immediately.

Netscape Virtual Memory Management

When running the administration GUI under Netscape Navigator, the virtual memory used by Netscape constantly increases. There are no known issues associated with this behavior.

Considerations for a Total Security Solution

The security of your network can be compromised in many ways beyond the data exchange between the NAS and the CiscoSecure ACS. This section identifies areas that are potential security hazards and gives you advice on what you can do to protect these key areas, or security holes, against potential intruders.

Physical Security of the CiscoSecure ACS

Keep your CiscoSecure server and NASes in a locked room. Restrict access to that room and the servers within it.

Unless physically protected, intruders can attack your network at several points. Perhaps most damaging is the possibility that an intruder can approach a security server and remove its disk drive for later analysis. Additionally, when security servers are physically accessible, intruders can potentially boot the server from a CD-ROM or floppy disk, then mount the hard disk from the system, and finally change the root password. With a new root password known only to the intruder, the potential for damage is limitless.

In other cases, the intruder might disrupt service by turning off the server or disconnecting it from the network. A "denial of service" attack might even involve destroying the security server or its disk; this is another scenario where keeping good backups can reduce downtime.

Physical Security of Access Server Clients

If at all possible, keep the local telephone closet locked. When the telephone lines going into a NAS are adequately secured, wire-tapping of telephone lines or monitoring of keystrokes becomes difficult (although not impossible).

Securing Firewall Configurations

Keep remote access to security servers as restricted as possible. Even with security servers physically locked down, attacks can be launched remotely by intruders if they can access the servers through the network. Many software bugs have eventually turned out to be security holes. For this reason, you should avoid using any unnecessary services on the security server that might potentially have as-yet-unknown security holes.

Securing the Local Network Access

Most networks have large numbers of unencrypted passwords and other data flowing over them. As such, local users are able to "snoop," or easily extract, data flowing over broadcast technology networks such as Ethernet. At the very least, consider using secure methods of logging in and manipulating security configurations (for example, use Kerberized and encrypted rlogin access, SSL browsers, or dedicated and physically secured serial lines).

Do not allow local users to access security servers, even if the local users lack any privileges to change the configurations. This helps prevent exploitation of potential security holes that might exist but are generally not known.

Choosing a Password

Construct passwords that are fairly long (at least 8 characters) and consist of letters (uppercase and lowercase) and numbers. Confirm that the password cannot be easily guessed by people with familiarity with the local organization or personnel. Password-guessing attacks are the easiest and most common type of network intrusion. The easier a password is to guess, the faster an attacker can gain access to protected data.

Transmitting Passwords

Even well-chosen passwords are easily captured if sent in cleartext over broadcast media (such as Ethernet). Normally, protocols such as Telnet and rlogin do not encrypt passwords that are sent over the network although the destination system might encrypt those passwords upon arrival.

Use different passwords for the security servers and other systems, especially ones that can be accessed through unencrypted protocols. Some protocols, such as Kerberized Telnet, do not send the password over the network in cleartext, but subsequent data is still unencrypted. Consequently, while these protocols limit exposure, they do not entirely restrict exposure.


Note Xterminals send unencrypted data over the network, so even if you send your password to a local secure system, the password will still be exposed for capture between the Xterminal and the system hosting the displayed sessions.

Installing CiscoSecure ACS

Confirm that your installation of CiscoSecure ACS is conducted in one session. Do not interrupt the installation. Similarly, do not leave your server unattended if you are conducting subsequent configurations, such as adding new users or support for a new one-time password card. An intruder can potentially gain sensitive information during configurations and use the information later.

Do not install CiscoSecure ACS over an unsecure network; instead, install CiscoSecure ACS at the system console.

Passing Configuration Information

When providing configuration information to anyone (even technical support personnel), remove sensitive information such as passwords. Replace sensitive information such as password strings with "XXXXXX."

Protecting Your Web Server

Do not use the Netscape FastTrack Server software (which came bundled with CiscoSecure ACS) to serve any web pages that are not part of CiscoSecure ACS.

Use SSL for encrypted connections to the Netscape FastTrack Server. This provides a high degree of security. Users can use their own web browsers to connect to the CiscoSecure ACS database to change their own passwords. As such, all of the data traffic is vulnerable and should be encrypted.

Existing Issues with CiscoSecure ACS 2.2(3)

This section identifies issues with CiscoSecure ACS 2.2(3) and related information. Some of these issues will be addressed in a subsequent release.

Internet Explorer 3.02 Issues

The following issues have been reported when administering the CiscoSecure ACS through the Microsoft Internet Explorer 3.02 web browser. To remedy the following issues, upgrade to Microsoft  Internet Explorer 4.05 or use Netscape Navigator 3.04 or 4.04.

Navigator 4 for Solaris and the Security Socket Layer Feature

The Security Socket Layer (SSL) feature of the Navigator 4 for Solaris browser does not support the Java-based CiscoSecure Administrator advanced configuration program. To access the CiscoSecure Administrator using the SSL feature, do so through Netscape Navigator or Netscape Communicator for Windows 95 or Windows NT. [CSCdj68773]

SDI-Based Authentications Can Experience Server Malfunctions

The authentication methodology used by the OTP cards from Security Dynamics, Inc. (SDI) differs somewhat from that used by the CiscoSecure ACS. Whereas SDI authentication uses a single process, CiscoSecure ACS employs a multithreaded approach for improved performance. Although not seen in either a laboratory or a beta site, a large volume of simultaneous SDI-based authentications can theoretically generate unexpected failures. In this case, the authentication might fail even though the username and password are correct. If users encounter this issue, advise them to wait a few moments, and then retry the operation. [CSCdj01541]

Working with Slow GUI Performance

Depending on the size of your database and the number of client/server transactions taking place, you might experience some processing delays, such as waiting a long time for GUI screens to refresh. Although these GUI performance issues can be annoying, they do not result in system malfunction or loss of data.

Unlike other GUI-based applications that run locally on a given computer, CiscoSecure ACS is a network-based application and is therefore dependent on external data-transfer rates, such as that provided by local telephone services. In addition, CiscoSecure ACS is a client/server product that includes a full relational database management system, so you might experience wait time as profiles are written to and from the database.

Changing the Username and Password on the Web Server

To change the username and password on your FastTrack Server, perform the following steps:

Step 1 Log in to FastTrack as the administrator:

You see a screen requesting your username and password.

Step 2 Enter your administrator username and password to gain access to the Web Server Administration section.

Step 3 Click the Configure Administration box.

Step 4 Click the Access Control line.

Editable fields for username and password display.

Step 5 Replace the username and password as necessary.

Problems Updating the same CiscoSecure User Profile at Different CiscoSecure ACS Sites

In cases where Oracle Master-to-Master or Sybase Peer-to-Peer database replication has been implemented, the CiscoSecure system administrators must avoid updating the same CiscoSecure user profile at two or more different CiscoSecure ACS profile database sites during the same time period between database replication processes.

If the same user profile is updated at two different sites within the same time period between replications, the user profile edits at both sites will neither be replicated nor reconciled. The user profile will remain with unreconciled settings at both sites.

For more information, see "Precautions Running Oracle Database Replication and CiscoSecure," or "Precautions Running Sybase Database Replication and CiscoSecure,". [CSCdj79568]

Problems With Failed User Logins at Two or More Sites

In cases where Oracle Master-to-Master (or Master-to-Updateable-Snapshot) database replication has been implemented, precautions need to be taken to minimize the chance of a CiscoSecure user attempting a failed login at two or more different CiscoSecure ACS profile database sites during the same interval between database replication processes.

If failed logins under the same user profile occur at two different sites within the same interval between replications, the next time replication is run, Oracle shows a Unique Constraint error due to both profiles having the same name but different profile IDs.

When the same user subsequently attempts to log in, that user will fail due to the user account being locked.

The Database Administrator must delete one of the user's conflicting profiles at one of the sites and force replication before the user account can be reset.

To minimize the possibility of failed login of the same user at two or more sites within the same interval between replications:

Scaling Limitations of the SQLAnywhere Database Option

We do not recommend that large enterprise or large ISP customers, who anticipate rapid growth and scaling up operations in the number of users, use the default SQLAnywhere CiscoSecure installation option as the RDBMS engine to support your users. Please note the following limitations of the SQLAnywhere RDBMS engine:

For customers who plan to carry out large scale database growth and update operations, we recommend use of the Oracle Enterprise or Sybase Enterprise RDBMS engines.

Problems with Oracle 7.3.3 and Earlier Client Modules

CiscoSecure ACS installations using versions 7.3.3 and 7.3.2 of the Oracle client modules SQL*Net and TCP/IP protocol adapter sometimes experience profile retrieval and DBServer module failure problems under heavy usage. To forestall these problems, install the SQL*Net and TCP/IP protocol adapter client modules that come with Oracle 7.3.4 or higher.

The Oracle 7.3.4 upgrade is available free to all customers with a valid support contract. [CSCdj78312] [CSCdj86330]

Problems With Failed Accounting Record Updates

Failure to maintain sufficient available disk space on the SQLAnywhere, Oracle, or Sybase database server storing records for the CiscoSecure ACS can result in a general warning message and a failure to update CiscoSecure accounting records. To prevent such failures, the system administrator should:

A typical example of heavy accounting disk space requirements might be those of an ISP's ACS, running TACACS+ protocol, receiving about 200,000 login requests per day, and configured to send Start, Update, and Stop accounting records (approximately 200 bytes each) for each login.
To calculate the accounting-related database disk space requirements for the above example, you would multiply 200,000 (logins per day) x 3 (accounting records per login) x 200 (bytes per record) . The result indicates that 120 MB of disk space per day on the SQLAnywhere, Oracle, or Sybase database server would be required to accomodate the daily accounting data in the above example.

Problems with Oracle Core Data Dumps

When the Oracle trace file exceeds 5 MB (as may happen under frequent and heavy loads), the Oracle server might occasionally dump core data and abort. This is a known Oracle problem (ID  Number: 510778) that is remedied with Oracle version 8.0.4.

If this condition is causing problems, Oracle recommends that you disable Oracle tracing as follows:

Step 1 Go to the $ORACLE_HOME/otrace/admin directory of your Oracle server.

Step 2 Delete the existing process.dat and regid.dat files and recreate them to the default size:

Step 3 Edit the Oracle user's shell startup file. For Bourne or Korn shell users, the settings to add or edit are:

Step 4 Stop and restart the Oracle server. [CSCdj85981]

Problems Editing Large Group Profiles

Loading a large CiscoSecure group profile (20,000 users or more) from within the Java-based CiscoSecure Administrator advanced configuration program might lock up that program. If you have to administer large group profiles, use the CiscoSecure ACS 2.2(3) Administration web pages or the CiscoSecure command-line interface (CLI). [CSCdk25587]

Problems Incrementing RADIUS Password-Lifetime Attribute Value

The RADIUS Password-Lifetime attribute 208 is not supported by CiscoSecure. If a user changes his or her password before the specified password expiration date, the password expiration date is supposed to increment by the number of days specified by RADIUS attribute 208; however, the password expiration date does not increment and remains unchanged. [CSCdk14530]

Problems with Safeword 4.4.1

CiscoSecure ACS 2.2(3) for UNIX has not been tested with any Safeword version later than 4.3. Used in conjunction with Safeword 4.4.1, CiscoSecure cannot configure hard or soft tokens. [CSCdk3161]

Problems with Token Caching and Small Memory Leaks

Failed login attempts involving CiscoSecure token caching and the unknown_user feature might cause leakage of small amounts of system memory. The system administrator should monitor memory usage at the ACS and possibly restart the ACS every few months. Because memory leakage only occurs on login failures, the amount might not even be noticeable. [CSCdk19520]

Problems with AddProfile and CSImport and Single Backslash Characters

The CiscoSecure Command Line Interface (CLI) and CSImport tools do not accept the single backslash character ( \ ) as valid input. CLI commands or CSImport operations that include single backslash characters as input will fail.

An exception to the above restriction is the use of the combined backslash and n character string (\n) (as noted on page C-4 of the CiscoSecure ACS 2.2.2 for UNIX User Guide). The \n character string is recognized by the CLI AddProfile command syntax as a line break command when used in conjunction with the -a switch input to specify additional free-formatted profile information. [CSCdk24340]

Problems Adding Users to Non-existing Groups

If you use the Member>View option on the web-based CiscoSecure Administration web pages to enter the name of a non-existent group and then click Group, and Submit Query, the resulting page informs you that the group you queried for does not exist; however, it also displays an "Add a User" profile icon that you can click on to display an "Add a User" page, falsely implying that you can add a user profile to a non-existent group. Any data entered on this page is meaningless and will not be added to the CiscoSecure profile database. You cannot add a user profile to a non-existent group. [CSCdk14088]

Automatic Restart Due to Prolonged Stress

The ACS has once been witnessed to perform an automatic restart after it has been subject to five hours of stress testing. The test placed a continous load of 20 or more authentications per second on the ACS. Oracle 8.0.4 was the database used during the test. Should the ACS begin to show automatic restart symptoms under similar conditions, you can use the following solution to solve the problem. It involves stopping the ACS, substituting an older driver for the new one that was selected during the ACS installation process, and restarting the ACS. [CSCdk27794]

Step 1 Log in to the ACS.

Step 2 Type /etc/rc0.d/K80CiscoSecure to stop the ACS.

Step 3 Type $BASEDIR/weblogic/lib/solaris/oracle to change directories. In this directory, the following link to the new driver can be seen.

Step 4 Type rm libweblogicoci26.so to remove the link.

Step 5 Type ln -s libweblogicoci26.so.7 libweblogicoci26.so to create the new link. The link using the old driver should now look like the following.

Step 6 Type /etc/rc.2d/S80CiscoSecure to start the ACS.

Problems Upgrading CiscoSecure at Sites Installed with a non-Updatable Replicated Database

If you are attempting to upgrade from CiscoSecure 2.2.2 to 2.2(3) in an existing replication environment and your environment includes non-updatable sites, then when you upgrade the CiscoSecure software on the non-updatable sites, you will receive an error message at the end of the upgrade process stating that the installation failed. This occurs because the CiscoSecure tables that were set up for replication cannot be written to except by the replication process.

The workaround for this problem is to make sure that you have successfully upgraded CiscoSecure on your Master Definition site. Ignore the error message received on the non-updatable site(s). Once you replicate, the tables that were not able to be updated will become updated from the Master site by the replication process.

Corrections to the User Guide

This section addresses errors in the CiscoSecure ACS 2.2.2 for UNIX User Guide and information that was not available before the user guide was printed.

When you specify a password for a user whose profile you are creating or editing, the following characters are valid:
If accounting information is still being written when the /etc/rc0.d/K80CiscoSecure script is invoked to stop the ACS, the DBServer module of the ACS will not shut down until it finishes writing all accounting information to the RDBMS. Do not attempt to shut down the DBServer by other means during this process. Loss of accounting data might result.
When specifying the NAS Name field, if you use their IP addresses to specify your NASes, use either all regular expressions (e.g., 10.10.1) or all fully defined IP addresses (e.g., 10.10.1.48). Do not define one of your NASes with a regular expression and other NASes with fully defined subsets of that expression.
The last paragraph in this section no longer applies to TACACS+ accounting.
You cannot configure the RDBMS through the CiscoSecure web-based interface; You can, however, configure the CiscoSecure ACS through the web-based interface to record accounting packets to the RDBMS.
To quickly disable this feature on a global basis without having to remove the "Accounting function" attribute from each user profile, disable the config_acct_fn_enable variable in the CSU.cfg file. See "Additional CSU.cfg Variables," for more information.
Steps 7 and 8 are no longer necessary for this procedure.
The NAS password requirements stated in this section (at least 6 characters, no more than 13 characters, at least 1 alphabetic character, at least 1 numeric character), do not apply to a CiscoSecure system or group administrator. For administrators one digit passwords are allowable. DES passwords are only checked to 8 characters.
You can now configure your user profiles to support your users logging in by entering their OTP in their login password field. See "Additional Methods of Authenticating One-Time Password Cards via PPP," of these release notes for details.
The file skey-cs.tar referred to in the note is available at the Cisco web page:
http://www.cisco.com/cgi-bin/tablebuild.pl/ciscosecure
The second comment line in the sample CSU.cfg file, refers to a syntax supporting multiple CiscoSecure license keys; however, because in CiscoSecure ACS 2.2(3) for UNIX multiple license keys are unnecessary to support multiple ports, this syntax no longer applies.
GLOBAL NOTICE: A new command-line, UpdatePassword, now enables you to change a user password even if you do not know the original password. See "Replacing a Forgotten Password with a New Password through the Distributed Command-Line Interface,", of these release notes for details.
An additional AddProfile command-line switch, -prv, enables you to specify required privilege level along with password requirements when creating profiles through the CLI. See "Assigning Password Privilege Levels through the Distributed Command-Line Interface,", of these release notes for details.
GLOBAL NOTICE: The CiscoSecure ACS for UNIX software now provides additional RADIUS dictionaries specific to Cisco IOS 11.1, 11.2, 11.3, and Ascend 5.
The RADIUS-Cisco11.3 dictionary includes Cisco's set of vendor-proprietary extended RADIUS attributes.
http://www.cisco.com/univercd/cc/td/doc/product/software/ios113ed/113ed_cr/secur_c
In Tables F-1 through F-6, the following additional information applies to the profile_ts column description: Oracle database replication supports restricted time stamp-based conflict resolution for the CiscoSecure ACS. Sybase database replication does not provide native time stamp-based conflict resolution. See the appendix "Integrating Oracle or Sybase Database Replication and CiscoSecure" for details.
GLOBAL NOTICE: The information in this Appendix G is obsolete. For the most recent updates on CiscoSecure database replication, see the appendix update, "Appendix G Update of these release notes.

Updated Copyright Information

The following information supplements the copyright information in the user guide:

Appendix G Update: Setting Up Database Replication among CiscoSecure ACSes


Note The database replication information is this release note version of Appendix G supersedes the information of Appendix G in the printed and bound version of the CiscoSecure ACS 2.2.2 for UNIX User Guide.

CiscoSecure ACS 2.2(3) supports asynchronous database replication among multiple CiscoSecure  ACS sites that use the Oracle 7.3.3 and later or Sybase 11.02 and later database engines to store their profile information. Two recommended database replication scenarios are:


Note The CiscoSecure ACS supports only asynchronous, not real-time, database replication.

This appendix provides example procedures for setting up Oracle and Sybase database systems to carry out replication of the CiscoSecure database among multiple CiscoSecure ACS sites.


Note If you have multiple existing CiscoSecure database sites that currently contain disparate data, all of which you wish to preserve when implementing replication, request your database administrator to merge your existing databases at one Master definition site before carrying out the procedures in this appendix.

Examples

Figure 1 illustrates an example of Master-to-Snapshot or Primary-to-Replicate database replication as applied to multiple CiscoSecure ACS sites. In this scenario, all administrative changes to the user profile database are made through the web-based console to one ACS site. Then, at specified time intervals, those changes are replicated to all other sites on the network, enabling the ACSes to provide their authentication, authorization, and accounting services based on a common set of user profile data.


Figure 1:
Master-to-Snapshot Replication

Figure 2 illustrates Master-to-Master or Peer-to-Peer database replication as applied to multiple CiscoSecure profile database sites. In this scenario, local administrative changes to the user profile database can be made through the web-based consoles at two or more ACS peer sites. Then, at specified time intervals, each of these peer sites communicate their local changes to all other sites on the network. As with Master-to-Snapshot replication, the end result is that the ACSes are able to provide their authentication, authorization, and accounting services based on a common set of user profile data.


Figure 2:
Peer-to-Peer Replication

Integrating Oracle Database Replication with CiscoSecure

The example procedures in this section use the Oracle Net8 Easy Config (or the Oracle 7 SQL Net Easy Config), Security Manager, Schema Manager, SQL*Plus, and Replication Manager programs run on a Windows 95 workstation console to integrate Oracle database replication with multiple CiscoSecure ACSes.

Caution Implementing Oracle database replication requires an in-depth knowledge of Oracle tools and database structure. Integrating database replication with the CiscoSecure product based on the following example procedures should be carried out by experienced Oracle database administrators (DBAs) only.

Note For an easy-to-understand, start-to-finish, screen-by-screen configuration example of setting up one particular type of Oracle database replication to work with CiscoSecure, we recommend that you read the PDF document Using CiscoSecure with Oracle's Distributed Database Feature (filename csbsdoc.pdf). This document is located in the /CSCEacs/reloc/FastAdmin/docs directory of the CiscoSecure distribution CD-ROM.

For specific instructions on how to use the above Oracle programs, please refer to Oracle manuals and on-line help.


Note The following example procedures assume that multiple Oracle server and tablespace sites have already been installed to service each CiscoSecure ACS site and that all CiscoSecure ACS sites have been installed. Refer to the CiscoSecure ACS Installation Guide for details.

A. Plan your Oracle Database Server Distribution System

If you are planning to implement Master-to-Snapshot Replication, decide which of your Oracle database servers will become the Master database site. The remainder of your Oracle servers will become Snapshot sites.
If you are planning to implement Master-to-Master Replication, decide which of your Oracle Database servers will become the Master Definition site. The remainder of your servers will become Master Destination sites.

B. Create Connection Services from the Console to all Database Sites

If you do not have connectivity, locate the tnsnames.ora file in the $ORACLE_HOME/network/admin directory and edit it, making sure that entries exist for all the other Oracle database sites involved in the replication.

Note To support Oracle database replication, the SID for each database must be unique.

C. Create a Special User as the Replication Database Controller

For each service that you created in Step B, use the Oracle Security Administrator to create a special user with special privileges to control database replication.

Caution This user must not be the Oracle user that you specified as in charge of the DB account for CiscoSecure data during CiscoSecure installation.

D. Create Links Between Databases

Create two-way links between the databases. For each database instance, do as follows:

E. If You are Configuring a Master-to-Snapshot Replication Scenario

If you are configuring Master-to-Snapshot replication, follow the steps in this section. If you are configuring Master-to-Master replication, skip this section and go to "F. If You are Configuring a Master-to-Master Database Replication Scenario,".

Step 1 Using the SQL*Plus utility, log in to each database instance that you want to be a Snapshot site.

Step 2 Using the Oracle Replication Manager, create a database connection for each database connection service that you set up in Step B.

Step 3 Using the Oracle Replication Manager, select the database connection that you want to be the Master Definition site and create and configure the master group on this site as follows:

Step 4 Using the Oracle Replication Manager, select and set up each database connection that you want to be a Snapshot site as follows:

Disabling the update option---Causes the Snapshot site to be read-only. Configuring read-only Snapshot sites ensures that CiscoSecure administration can only be carried out at the Master site.
Enabling the update option---Causes the Snapshot site to be updateable. Configuring updateable Snapshot sites allows CiscoSecure users with user-level web privilege to change their personal passwords and preserves the maximum failed login limitations.
From the refresh group properties menu, schedule the interval (for example, every 24 hours) when the update should occur.

Step 5 At the Master Definition database site, change to the CiscoSecure $BASEDIR/utils/bin directory and run the following CiscoSecure command line:

CSdbTool cache_trigger

Step 6 At each Snapshot database site, change to the CiscoSecure $BASEDIR/utils/bin directory and run the following CiscoSecure command line:

CSdbTool cache_trigger_snap

Step 7 Before you create any new users, configure the Snapshot sites to prevent duplicate user profile names. At each Snapshot site, enter the following command:

Step 8 Edit the initsid.ora configuration file. At each Oracle site, do the following:

initsid.ora
where sid is the system identification name of the Oracle server.
job_queue_interval = minutes
job_queue_processes = number
where:
minutes is the number of minutes between updates. This value must be equivalent to the update interval time that you set in the refresh group properties menu in the Oracle Replication Manager. (See Step 4, "Using the Oracle Replication Manager, select and set up each database connection that you want to be a Snapshot site as follows)
number is the number of background processes allotted to the replication operations (must be at least one).
compatible = 7.1.0.0
to:
compatible = 7.3.0.0

Step 9 At the CiscoSecure ACS for the Master site, restore the listings for the CiscoSecure servers installed at Snapshot sites:

Notice the that the IP listings for the CiscoSecure servers installed at Snapshot sites are not listed.

F. If You are Configuring a Master-to-Master Database Replication Scenario

If you are configuring Master-to-Master replication, follow the steps in this section. If you are configuring Master-to-Snapshot replication, ignore this section. See "Precautions Running Oracle Database Replication and CiscoSecure,".

Step 1 Using the SQL*Plus utility, log in to each database instance that you want to be a Master Destination site:

Caution Remember, delete the above tables from Master Destination sites only.

Step 2 For each database connection service, create a surrogate replication administrator.

(a.) Create a special user, a surrogate replication administrator, to control database replication.
Caution This user must not be the Oracle user that you specified as in charge of the DB account for CiscoSecure data during CiscoSecure installation.
(b.) For the user's Default table space, specify the Oracle tablespace that you set up for CiscoSecure before CiscoSecure installation.

Step 3 Using the SQL*Plus utility, assign the appropriate privileges to the database surrogate replication administrator at each Oracle site:

execute DBMS_REPCAT_AUTH.GRANT_SURROGATE_REPCAT(userid => 'surrogate_repadmn')
where surrogate_repadmn is the name of the surrogate replication administrator that you just created.

Step 4 Using the Oracle Replication Manager, create a database connection for each database connection service that you set up in Step B:

Step 5 Using the Oracle Replication Manager, select the database connection that you want to be the Master Definition site and create and configure the master group on this site as follows:

Step 6 After creating the master group, set up conflict resolution for each table in the group. Add a column group, give it an arbitrary name, select the PROFILE_TS column to this group, and select the latest time stamp resolution method for this group.

Step 7 Using the Oracle Replication Manager, select and set up the database connection that you want to be a Master Definition site as follows:

Step 8 Using the Oracle Replication Manager, select and set up each database connection that you want to be a Master Destination site as follows:

Step 9 Using the Oracle Replication Manager, carry out the initial replication of the master group in each connection that you set up. For each master group configuration, go to Admin Requests and select the option, Apply all Administrative requests now.

Step 10 At each database site, run the following command line:

CSdbTool cache_trigger

Step 11 In order to prevent two different CiscoSecure servers from assigning the same internal profile ID number to different user profiles, assign non-overlapping ranges of internal profile ID numbers to each Master Destination site as follows:

update cs_id set id = 10000000 -1 where type = 'max_profile'
update cs_id set id = 10000000 where type = 'profile'
update cs_id set id = 10000000 where type = 'min_profile'
update cs_id set id = 20000000 -1 where type = 'max_profile'
update cs_id set id = 20000000 where type = 'profile'
update cs_id set id = 20000000 where type = 'min_profile'
update cs_id set id = 30000000 -1 where type = 'max_profile'

Step 12 After initial replication has occurred, and before you create any new users, configure the Master Destination sites to prevent duplicate user profile names. At each Master Destination site, enter the following command:

Step 13 Edit the initsid.ora configuration file. At each Oracle site, do the following:

where sid is the system identification name of the Oracle server.
job_queue_interval = minutes
job_queue_processes = number
where:
minutes is the number of minutes between updates. This value must be equivalent to the intervals required when you created the scheduled links in Step 7 and Step 8 of Step F.
number is the number of background processes allotted to the replication operations (must be at least one).
compatible = 7.1.0.0
to:
compatible = 7.3.0.0

Step 14 Restart the Oracle server to have the changes to the inisid.ora file take effect.

Step 15 At the CiscoSecure ACS for the Master Definition site, restore the listings for the CiscoSecure servers installed at the Master Destination sites.

Notice the that the IP listings for the CiscoSecure servers installed at Master Destination sites are not listed.

Precautions Running Oracle Database Replication and CiscoSecure

In cases where Oracle Master-to-Master (or Master-to-Updateable-Snapshot) database replication has been implemented, the CiscoSecure system administrators must avoid updating the same CiscoSecure user profile at two or more different CiscoSecure ACS profile database sites during the same interval between database replication processes.

If updating of the same user profile at two different sites within the same interval between replications occurs, the user profile edits at neither site will be replicated or reconciled. The user profile will remain with unreconciled settings at both sites, and the following Oracle error message will appear at both sites within the "Local Errors" section of the Oracle Replication Manager tree:

ORA-01403 no data found error

The above error should rarely occur, because, in practice, no more than one administrator, administering from one CiscoSecure ACS site should be authorized to administer any one user profile anyway.

However, if this error does occur, you must fix the unreconciled user profile at both sites as follows:

Step 1 Use the web-based CiscoSecure ACS Administration web pages or the Java-based CiscoSecure Administrator program to do the following:

Step 2 Use the Oracle Replication Manager to force replication, or wait until the next scheduled replication.

The settings for the new user profile will replicate throughout the system.

Integrating Sybase Database Replication with CiscoSecure

The following example procedures use the Sybase RS INIT, and rsmgen utilities run on the UNIX server, and Sybping, and Replication System Manager, running on a Windows 95 workstation console, to integrate Sybase database replication with multiple CiscoSecure ACSes.

Caution Implementing Sybase database replication requires an in-depth knowledge of Sybase tools and database structure. Integrating database replication with CiscoSecure based on the following example procedures should be carried out by experienced Sybase database administrators (DBAs) only.

For specific instructions on how to use the above Sybase programs, please refer to Sybase manuals and on-line help.


Note The following example procedures assume that multiple Sybase servers and database sites have already been installed to service each CiscoSecure ACS site and that all CiscoSecure ACS sites have been installed. Refer to the CiscoSecure ACS Installation Guide for details.

A. Plan Your Sybase Replication System

Sybase supports two types of database replication: Primary-Server-to-Replicate-Server and Peer-Server-to-Peer-Server.

If you are planning Primary-Server-to-Replicate-Server replication, decide which of your Sybase servers will become the Primary Server site. The remainder will become Replicate Server sites.
If you are planning Peer-to-Peer replication, you should still select a Primary server on which to install the replication server software.

B. Install the Replication Server Modules

To carry out database replication, Sybase requires that you install a Replication Server at one of your Sybase database sites and a Replication Server Manager client module at a PC console.

Step 1 At your Primary site, make sure that the Sybase SQL server or Adaptive server module is installed and running.

Step 2 Install the Replication Server and Replication Server Manager modules.

Step 3 Install the Sybase SQL Manager and Replication Manager Client tools on a PC console.

C. Configure the Sybase Replication Server

The Sybase Replication Server executes replication among the Sybase database sites. Set it up by using the Sybase RS INIT program following the procedures outlined in your Sybase documentation. RS INIT settings that require specific input in order to integrate Sybase replication of the CiscoSecure database are noted below:

Step 1 Specify the Replication Server Information settings. Except for the settings listed below, accept the default values:

Step 2 Specify the Replication Server Interfaces Information settings. Except for the settings listed below, accept the default values:

Step 3 Accept the default ID Server Information settings.

Step 4 Specify the Replication Server System Database Information settings. Except for the settings listed below, accept the default values:

Step 5 Specify the RSSD Device Information settings. Except for the settings listed below, accept the default values:

Step 6 Specify the Disk Partition Information settings. Except for the settings listed below, accept the default values.

If this file does not already exist, use the UNIX touch utility to create it. When creating this file, you must be logged in as the Sybase user, rather than as root.
The filename that you specify must not contain a period.

Step 7 Accept all default values for the Remote Site Connections Information settings.

D. Add the CiscoSecure Databases to the Replication

At each CiscoSecure database site run, RS INIT to integrate the CiscoSecure database into the Sybase replication system. Set it up by using the Sybase RS INIT program following the procedures outlined in your Sybase documentation. RS INIT settings that require specific input in order to integrate Sybase Replication of the CiscoSecure database are noted below:

Step 1 Specify the Replication Server Information settings. Except for the bulleted settings listed below, accept the default values:

Step 2 Specify the Database Information settings. Except for the bulleted settings listed below, accept the default values:

Step 3 At Primary and Peer database sites only, accept all the default Database Log Transfer Manager settings.

Step 4 At Primary and Peer database sites only, configure the LTM Interfaces Information settings. Except for the bulleted settings listed below, accept the default values:

Step 5 Accept the settings. Note the logfile location on exit.

E. Set Up the Replication Services Manager Server

Set up one Replication Services Manager Server as follows:

Step 1 At the Primary server, use the Sybase DSEDIT utility to create an RSM server entry in the Sybase Interfaces file.

Step 2 In the $SYBASE/Install directory, run the rsmgen utility.

Step 3 When prompted for the RSM Server name, specify the name you entered in the Interfaces file.

The rsmgen utility creates a file: RUN_rsmfilename.

where rsmfilename is the name you specified while running rsmgen.

Step 4 Run the RUN_rsmfilename file in background mode. Enter:

./RUN_rsmfilename &

F. Start the PC Replication Services Management Program

Step 1 Move to the Windows 95 or Windows NT workstation on which you installed the Replication Services Manager client and ping the hosts running all the Sybase servers involved in database replication to test the console-to-Sybase server TCP/IP connections.

Step 2 If the pings are successful, use the Windows-based SQLEDIT program to generate an Interface file on the PC. Point to the IP addresses and TCP/IP ports of the SQL or Adaptive Server, Replication Server, LTM server, and RSM server.

Step 3 Use the Sybping utility to ping the Adaptive Server, Replication Server, LTM server, and RSM server modules and confirm the console-to-server Sybase connections.

Step 4 Start the Windows-based RSM Manager.

Step 5 Select the File>New RSM Domain menu command.

Step 6 To create an RSM domain for your CiscoSecure profile databases, do the following:

Step 7 On each Primary server or Peer server in the RSM Domain, configure replication definitions for each of its tables as follows:

G. If You are Setting Up Primary-to-Replicate Server Replication

If you are configuring Primary-to-Replication server replication, follow the steps in this section. If you are configuring Peer-to-Peer replication, skip this section and go to "H. If You are Setting Up Peer-to-Peer Replication,".

Step 1 For each Replicate server in the RSM domain, configure subscriptions to each of the six replication definitions configured in Step F:

Step 2 At each of the CiscoSecure database sites, enable profile caching. Change to the CiscoSecure $BASEDIR/utils/bin directory and run the following CiscoSecure command line:

Step 3 At the CiscoSecure server for the Primary site, restore the listings for the CiscoSecure servers installed at the Replicate sites:

Notice the that the IP listings for the CiscoSecure servers installed at Replicate sites are no longer listed.

H. If You are Setting Up Peer-to-Peer Replication

If you are configuring Peer-to-Peer replication, follow the steps in this section. If you are configuring Primary-to-Replicate server replication, ignore this section.

Step 1 Decide which of your Sybase sites will be the initial source Peer site.

When the first replication is run the initial source Peer site will be the site containing the original profile data structures that will be replicated to all the other sites.

All the other sites will be secondary Peer sites.

Step 2 At each secondary peer site, delete the current CiscoSecure profile records.

Start the Sybase ISQL utility and use the delete command to empty the current CiscoSecure profile records. Enter:

Step 3 At each secondary peer site, configure subscriptions to each of the replication definitions configured in Step F. Use the Replication Services Manager Configure>Subscription option and click the Create tab.

Step 4 At the initial source Peer site, configure subscriptions to each of the replication definitions configured in Step F. Use the Replication Services Manager Configure>Subscription option and click the Define tab.

Step 5 At each CiscoSecure database site enable profile cache updating. Change to the CiscoSecure $BASEDIR/utils/bin directory and run the following CiscoSecure command line:

Step 6 In order to prevent two different CiscoSecure servers from assigning the same internal profile ID number to different user profiles, assign non-overlapping ranges of internal profile ID numbers to each Peer site as follows:

update cs_id set id = 10000000 -1 where type = 'max_profile'
update cs_id set id = 10000000 where type = 'profile'
update cs_id set id = 10000000 where type = 'min_profile'
update cs_id set id = 20000000 -1 where type = 'max_profile'
update cs_id set id = 20000000 where type = 'profile'
update cs_id set id = 20000000 where type = 'min_profile'
update cs_id set id = 30000000 -1 where type = 'max_profile'

Step 7 Restart the CicsoSecure ACS at each site if it is running.

Step 8 At the CiscoSecure ACS for either the initial or a secondary Peer site, restore the listings for the CiscoSecure servers installed at the secondary Peer sites:

Notice that the IP listings for the CiscoSecure servers installed at secondary Peer sites are no longer listed.

Precautions Running Sybase Database Replication and CiscoSecure

In cases where Sybase Peer-to-Peer database replication has been implemented, the CiscoSecure system administrators must avoid updating the same CiscoSecure user profile at two or more different CiscoSecure ACS profile database sites during the same interval between database replication processes.

If updating of the same user profile at two different sites within the same interval between replications occurs, the user profile edits at neither site will be replicated or reconciled. The user profile will remain with unreconciled settings at both sites.

In practice, this error is unlikely to occur for two reasons:

However, if the above error does occur, fix the unreconciled user profile as follows:

Step 1 Use the web-based CiscoSecure ACS Administration web pages or the Java-based CiscoSecure Administrator program to do the following:

Step 2 Wait until the next scheduled replication.

The settings for the new user profile will replicate throughout the system.

Cisco Connection Online

Cisco Connection Online (CCO) is Cisco Systems' primary, real-time support channel. Maintenance customers and partners can self-register on CCO to obtain additional information and services.

Available 24 hours a day, 7 days a week, CCO provides a wealth of standard and value-added services to Cisco's customers and business partners. CCO services include product information, product documentation, software updates, release notes, technical tips, the Bug Navigator, configuration notes, brochures, descriptions of service offerings, and download access to public and authorized files.

CCO serves a wide variety of users through two interfaces that are updated and enhanced simultaneously: a character-based version and a multimedia version that resides on the World Wide Web (WWW). The character-based CCO supports Zmodem, Kermit, Xmodem, FTP, and Internet e-mail, and it is excellent for quick access to information over lower bandwidths. The WWW version of CCO provides richly formatted documents with photographs, figures, graphics, and video, as well as hyperlinks to related information.

You can access CCO in the following ways:

For a copy of CCO's Frequently Asked Questions (FAQ), contact cco-help@cisco.com. For additional information, contact cco-team@cisco.com.


Note If you are a network administrator and need personal technical assistance with a Cisco product that is under warranty or covered by a maintenance contract, contact Cisco's Technical Assistance Center (TAC) at 800  553-2447, 408  526-7209, or tac@cisco.com. To obtain general information about Cisco Systems, Cisco products, or upgrades, contact 800  553-6387, 408  526-7208, or cs-rep@cisco.com

.


hometocprevnextglossaryfeedbacksearchhelp
Copyright 1989-1998 © Cisco Systems Inc.