|
|
Access control is the way you control who is allowed access to the network server and what services they are allowed to use once they have access. Authentication, Authorization, and Accounting (AAA) network security services provide the primary framework through which you set up access control on your router or access server.
AAA is an architectural framework for configuring a set of three independent security functions in a consistent manner. AAA provides a modular way of performing the following services:
In many circumstances, AAA uses protocols such as RADIUS, TACACS+, and Kerberos to administer its security functions. If your router or access server is acting as a network access server, AAA is the means through which you establish communication between your network access server and your RADIUS, TACACS+, or Kerberos security server.
Although AAA is the primary (and recommended) method for access control, Cisco IOS software provides additional features for simple access control that are outside the scope of AAA, such as local username authentication, line password authentication, and enable password authentication. However, these features do not provide the same degree of access control that is possible by using AAA.
AAA provides the following benefits:
AAA is designed to enable you to dynamically configure the type of authentication and authorization you want on a per-line (per-user) or per-service (for example, IP, IPX, or VPDN) basis. You define the type of authentication and authorization you want by creating method lists, then applying those method lists to specific services or interfaces.
For information about applications that use AAA, such as per-user configuration and virtual profiles, refer to the "Per-User Configuration" and "Configuring Virtual Profiles" chapters in the Dial Solutions Configuration Guide.
A method list is simply a list defining the authentication methods to be used, in sequence, to authenticate a user. Method lists enable you to designate one or more security protocols to be used for authentication, thus ensuring a backup system for authentication in case the initial method fails. Cisco IOS software uses the first method listed to authenticate users; if that method does not respond, the Cisco IOS software selects the next authentication method listed in the method list. This process continues until there is successful communication with a listed authentication method or the authentication method list is exhausted, in which case authentication fails.
Figure 2 shows a typical AAA network configuration that includes four security servers: R1and R2 are RADIUS servers and T1 and T2 are TACACS+ servers.

Suppose the system administrator has defined a method list where R1 will be contacted first for authentication information, then R2, T1, T2, and then finally the local username database on the access server itself. When a remote user attempts to dial in to the network, the network access server first queries R1 for authentication information. If R1 authenticates the user, it issues a PASS response to the network access server and the user is allowed to access the network. If R1 returns a FAIL response, the user is denied access and the session is terminated. If R1 does not respond, then the network access server processes that as an ERROR and queries R2 for authentication information. This pattern would continue through the remaining designated methods until the user is either authenticated, rejected, or the session terminated. If all of the authentication methods return errors, which the network access server would process as a failure, the session would be terminated.
You must first decide what kind of security solution you want to implement. You need to assess the security risks in your particular network and decide on the appropriate means to prevent unauthorized entry and attack. For more information about accessing your security risks and possible security solutions, refer to the "Security Overview" chapter. We recommend that you use AAA, no matter how minor your security needs might be.
Configuring AAA is relatively simple after you understand the basic process involved. To configure security on a Cisco router or access server using AAA, follow this process:
1. Enable AAA by using the aaa new-model global configuration command.
2. If you decide to use a separate security server, configure security protocol parameters, such as RADIUS, TACACS+, or Kerberos.
3. Define the method lists for authentication by using the aaa authentication command.
4. Apply the method lists to a particular interface or line, if required.
5. (Optional) Configure authorization using the aaa authorization command.
6. (Optional) Configure accounting using the aaa accounting command.
For a complete description of the commands used in this chapter, refer to the "Authentication Commands" chapter of the Security Command Reference. To locate documentation of other commands that appear in this chapter, use the command reference master index or search online.
Before you can use any of the services AAA network security services provide, you need to enable AAA.
To enable AAA, use the following command in global configuration mode:
| Command | Purpose |
|---|---|
aaa new-model | Enable AAA. |
You can disable AAA functionality with a single command if, for some reason, you decide that your security needs cannot be met by AAA but can be met by using TACACS, extended TACACS, or a line security method that can be implemented without AAA.
To disable AAA, use the following command in global configuration mode:
| Command | Purpose |
|---|---|
no aaa new-model | Disable AAA. |
Once you have enabled AAA, you are ready to configure the other elements relating to your selected security solution. Table 3 describes AAA configuration tasks and where to find more information.
| Task | Chapter in the Security Configuration Guide |
|---|---|
Configure local login authentication. | Configuring Authentication |
Control login using security server authentication. | Configuring Authentication |
Define method lists for authentication. | Configuring Authentication |
Apply method lists to a particular interface or line. | Configuring Authentication |
Configure RADIUS security protocol parameters. | Configuring RADIUS |
Configure TACACS+ security protocol parameters. | Configuring TACACS+ |
Configure Kerberos security protocol parameters. | Configuring Kerberos |
Enable TACACS+ authorization. | Configuring Authorization |
Enable RADIUS authorization. | Configuring Authorization |
View supported IETF RADIUS attributes. | RADIUS Attributes |
View supported vendor-specific RADIUS attributes. | RADIUS Attributes |
View supported TACACS+ AV pairs. | TACACS+ AV Pairs |
Enable accounting. | Configuring Accounting |
If you have elected not to use the AAA security services, Table 4 describes non-AAA configuration tasks and where to find more information.
| Task | Chapter in the Security Configuration Guide |
|---|---|
Configure login authentication. | Configuring Authentication |
Configure TACACS. | Configuring TACACS and extended TACACS |
Configure extended TACACS. | Configuring TACACS and extended TACACS |
|
|