|
|
This feature module describes the Internet Key Exchange (IKE) Extended Authentication feature. It includes information on the benefits of the new feature, supported platforms, related documents, and so forth.
This document includes the following sections:
IKE Extended Authentication (Xauth) is a draft RFC developed by the Internet Engineering Task Force (IETF) based on the Internet Key Exchange (IKE) protocol. The Xauth feature is an enhancement to the existing Internet Key Exchange (IKE) Protocol feature. Xauth allows all Cisco IOS software AAA authentication methods to perform user authentication in a separate phase after the IKE authentication phase 1 exchange. The AAA configuration list-name must match the Xauth configuration list-name for user authentication to occur.
The Xauth feature is an extension to the IKE feature, and does not replace IKE authentication.
Additional Security
Before Xauth, IKE only supported authentication of the device, not authentication of the user using the device. With Xauth, IKE can now authenticate the user using the device after the device has been authenticated during normal IKE authentication, using any of the Cisco IOS software AAA authentication methods.
Enhancement to IKE
Xauth does not replace IKE. While IKE allows for device authentication, Xauth allows for user authentication. This Xauth user authentication occurs after IKE device authentication. Xauth occurs after IKE authentication phase 1, but before IKE IPSec SA negotiation phase 2.
Strong Encryption Limitations
Cisco IOS software images with strong encryption (including, but not limited to, 56-bit data encryption feature sets) are subject to United States government export controls, and have a limited distribution. Images to be installed outside the United States require an export license. Customer orders might be denied or subject to delay due to United States government regulations. Contact your sales representative or distributor for more information, or send e-mail to export@cisco.com.
The IKE Extended Authentication feature module is related to the following existing features:
For information related to the Xauth feature, refer to the following documents:
![]() |
Note Cisco Secure VPN Client Version 1.1 and Cisco Secure PIX Firewall Version 5.1 are currently based on Xauth revision 3. These products will support the current version of Xauth at a later date. |
The Xauth feature is supported on all platforms that support IPSec in Cisco IOS Release 12.1 T.
Standards
No new or modified standards are supported by this feature.
MIBs
No new or modified MIBs are supported by this feature.
For descriptions of supported MIBs and how to use MIBs, see Cisco's MIB web site on CCO at http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml.
RFCs
IETF Extended Authentication Draft, draft-ietf-ipsec-isakmp-xauth-04.txt
IPSec Software Image Required
Before configuring the Xauth feature, you must have an encryption software image that supports the Xauth feature downloaded on to your router. For more information on downloading a software image, see the following publications:
Authentication Configuration Required
Before configuring Xauth, you must set up an authentication list using AAA commands.
| Command | Purpose |
|---|---|
Router(config)# aaa authentication login {default | list-name} method1 [method2...]
| Set the AAA authentication at login. |
For more information on configuring AAA commands, see the following publications:
IPSec and IKE Configuration Required
Before configuring Xauth, you must configure an IPSec transform, a crypto map, and ISAKMP policy using IPSec and IKE commands.
| Command | Purpose |
|---|---|
Router(config)# crypto ipsec transform-set transform-set-name transform1 [transform2 [transform3]] | Define a transform set, which is an acceptable combination of security protocols and algorithms, and enters crypto transform configuration mode. |
Router(cfg-crypto-trans)# mode [tunnel | transport] | Specify the mode for the transform set. |
Router(cfg-crypto-trans)# exit | Exit crypto transform configuration mode. |
Router(config)# crypto map map-name seq-num ipsec-isakmp | Create or modify a static crypto map entry, and enters the crypto map configuration mode. |
Router(config-crypto-map)# match address [access-list-id | name] | Specify an extended access list for a crypto map entry. |
Router(config-crypto-map)# set transform-set transform-set-name1 [transform-set-name2...transform-set-name6] | Specify which transform sets can be used with the static crypto map entry. |
Router(config-crypto-map)# exit | Exit crypto map configuration mode. |
Router(config)# crypto isakmp policy priority | Define an IKE policy, and enters ISAKMP policy configuration mode. |
Router(config-isakmp)# hash {sha | md5}
| Specify the hash algorithm within an IKE policy. |
Router(config-isakmp)# authentication {rsa-sig | rsa-encr | pre-share}
| Specify the authentication method within an IKE policy. |
Router(config-isakmp)# exit | Exit ISAKMP policy configuration mode. |
Router(config-crypto-map)# crypto map map-name seq-num ipsec-isakmp dynamic dynamic-map-name | Create or modify a dynamic crypto map entry, and enters the crypto map configuration mode. |
Router(config-crypto-map)# set transform-set transform-set-name1 [transform-set-name2...transform-set-name6] | Specify which transform sets can be used with the dynamic crypto map entry. |
Router(config-crypto-map)# exit | Exit crypto map configuration mode. |
Router(config)# crypto isakmp key keystring address peer-address | Configure a pre-shared authentication key. |
Router(config)# interface interface | Enter the interface configuration mode. |
Router(config-if)# ip address ip-address | Indicate an IP address for the interface. |
Router(config-if)# interface interface | Apply a previously defined crypto map to the interface. |
Router(config-if)# exit | Exit interface configuration mode. |
For more information on configuring IPSec and IKE commands, see the following publications:
Xauth Configuration
The Xauth configuration command is optional and is disabled by default.
See the following sections for Xauth configuration tasks. Each task in the list indicates if it is optional or required:
To enable and configure a router for Xauth, perform the following tasks beginning in crypto map configuration mode:
![]() |
Note For information on configuring AAA, IPSec transform, static crypto map, ISAKMP policy, and dynamic crypto map, see "Prerequisites." |
| Command | Purpose |
|---|---|
Router(config)# crypto map map-name client authentication list list-name | (Required) Enable extended authentication on a crypto map. |
To verify that the Xauth is enabled, enter the show crypto map command at the EXEC prompt. If the crypto map client authentication list command does not appear in the crypto map output, then Xauth is not enabled.
Enter the following debug commands in EXEC mode to troubleshoot Xauth:
| Command | Purpose |
|---|---|
debug crypto isakmp | Display messages about IKE events |
debug aaa authentication | Display information on AAA/Terminal Access Controller Access Control System Plus (TACACS+) authentication. |
debug tacacs | Display information associated with the Terminal Access Controller Access Control System (TACACS). |
debug radius | Display information associated with the Remote Authentication Dial-In User Server (RADIUS) |
In the following example output from the show running configuration global configuration command, Xauth is configured with IKE pre-shared key using AAA local policy:
aaa new-model aaa authentication login xauthlist local ! username robin password cisco1234 ! crypto ipsec transform-set xauthtransform esp-des esp-md5-hmac ! crypto isakmp policy 1 hash md5 authentication pre-share crypto isakmp key cisco1234 address 209.165.202.145 ! crypto map xauthmap client authentication list xauthlist crypto map xauthmap 10 ipsec-isakmp set peer 209.165.202.145 set transform-set xauthtransform match address 192 ! interface Ethernet1/0 ip address 209.165.202.147 255.255.255.224 crypto map xauthmap ! access-list 192 permit ip host 209.165.202.147 host 209.165.202.145
In the following example ouput from the show running configuration global configuration command, a corporate gateway uses Xauth configured on a RADIUS authentication server. Digital certification is also configured with dynamic crypto maps for scalability. This allows for both remote user authentication and device authentication.
aaa new-model radius-server host alcatraz radius-server key cisco12345 aaa authentication login xauthlist radius ! crypto ipsec transform-set remote esp-des esp-md5-hmac ! crypto ca identity mycaenrollment url http://myca.cisco.com:80
crypto ca certificate chain mycacertificate ca <cert-serial-number> <hex data> certificate <hex data>
! crypto dynamic-map xauthdynamic 10set transform-set xauthtransform
! crypto map xauthmap client authentication list xauthlist crypto map xauthmap 10 ipsec-isakmp dynamic xauthdynamic ! interface Ethernet1/0ip address 209.165.202.147 255.255.255.224 crypto map xauthmap
zeke.cisco.com Password = "cisco", Service-Type = OutboundTunnel-Medium-Type =:1:IP, Tunnel-Type =:1:ESP, Cisco:Avpair = "ipsec:tunnel-password=cisco", Cisco:Avpair = "ipsec:key-exchange=ike"
zeke.cisco.com Password = "cisco", Service-Type = OutboundTunnel-Medium-Type =:1:IP, Tunnel-Password =:1:"cisco" Tunnel-Type =:1:ESP, Cisco:Avpair = "ipsec:key-exchange=ike"
This section documents a new command, crypto map client authentication list global configuration command. All other commands used with this feature are documented in the Cisco IOS Release 12.1 command reference publications.
To configure IKE extended authentication (Xauth) on your router, use the crypto map client authentication list global configuration command. Use the no form of this command to restore the default value.
[no] crypto map map-name client authentication list list-name
Syntax Description
map-name The name you assign to the crypto map set. list-name Character string used to name the list of authentication methods activated when a user logs in. The list-name must match the list-name defined during AAA configuration.
Defaults
Xauth is not enabled.
Command Modes
Global configuration mode
Command History
12.1(1)T This command was introduced in Cisco IOS Release 12.1 T.
Release
Modification
Usage Guidelines
Before configuring Xauth, you should set up an authentication list using AAA commands.
Before configuring Xauth, you should configure an IPSec transform, a crypto map, and ISAKMP policy using IPSec and IKE commands.
After enabling Xauth, you should apply the crypto map on which Xauth is configured to the router interface.
Examples
The following example configures user authentication (a list of authentication methods called xauthlist) on an existing static crypto map called xauthmap:
crypto map xauthmap client authentication list xauthlist
The following example configures user authentication (a list of authentication methods called xauthlist) on a dynamic crypto map called xauthdynamic that has been applied to a static crypto map called xauthmap:
crypto map xauthmap client authentication list xauthlist crypto map xauthmap 10 ipsec-isakmp dynamic xauthdynamic
Related Commands
aaa authentication login Set AAA authentication at login. crypto ipsec transform-set Define a transform set, which is an acceptable combination of security protocols and algorithms, and enters crypto transform configuration mode. crypto map (global configuration) Create or modify a crypto map entry, and enters the crypto map configuration mode crypto isakmp policy Define an IKE policy, and enters ISAKMP policy configuration mode. crypto isakmp key Configure a pre-shared authentication key. interface Enter the interface configuration mode.
Command
Description
AAA---authentication, authorization, and accounting. A framework of security services that provide the method for identifying users (authentication), for remote access control (authorization), and for collecting and sending security server information used for billing, auditing, and reporting (accounting).
authentication---The method of identifying users, including login and password dialog, challenge and response, messaging support, and, depending on the security protocol you select, encryption. Authentication establishes data integrity and ensures no one tampers with the data in transit. It also provides data origin authentication.
authentication, authorization, and accounting---See AAA.
IKE---A key management protocol standard which is used in conjunction with the IPSec standard. IPSec is an IP security feature that provides robust authentication and encryption of IP packets. IPSec can be configured without IKE, but IKE enhances IPSec by providing additional features, flexibility, and ease of configuration for the IPSec standard. IKE is a hybrid protocol which implements the Oakley key exchange and Skeme key exchange inside the Internet Security Association and Key Management Protocol (ISAKMP) framework. (ISAKMP, Oakley, and Skeme are security protocols implemented by IKE.)
Internet Key Exchange---See IKE.
IP Security Protocol---See IPSec.
IPSec---IP Security Protocol. A framework of open standards that provides data confidentiality, data integrity, and data authentication between participating peers. IPSec provides these security services at the IP layer. IPSec uses IKE to handle negotiation of protocols and algorithms based on local policy and to generate the encryption and authentication keys to be used by IPSec. IPSec can be used to protect one or more data flows between a pair of hosts, between a pair of security gateways, or between a security gateway and a host.
pre-shared key---A pre-shared key is a shared secret that is used during IKE authentication.
TACACS+---Terminal Access Controller Access Control System Plus. A security protocol that provides detailed accounting information and flexible administrative control over authentication and authorization processes. TACACS+ is facilitated through authentication, authorization, and accounting (AAA) and can be enabled only through AAA commands.
Terminal Access Controller Access Control System Plus---See TACACS+.
RADIUS---Remote Authentication Dial-In User Service. A distributed client/server system that secures networks against unauthorized access. RADIUS clients run on Cisco routers and send authentication requests to a central RADIUS server that contains all user authentication and network service access information.
Remote Authentication Dial-In User Service---See RADIUS.
SA---security association. An instance of security policy and keying material applied to a data flow. Both IKE and IPSec use SAs, although SAs are independent of one another. IPSec SAs are unidirectional and they are unique in each security protocol. An IKE SA is used by IKE only, and unlike the IPSec SA, it is bi-directional. IKE negotiates and establishes SAs on behalf of IPSec. A user can also establish IPSec SAs manually.
A set of SAs are needed for a protected data pipe, one per direction per protocol. For example, if you have a pipe that supports ESP between peers, one ESP SA is required for each direction. SAs are uniquely identified by destination (IPSec endpoint) address, security protocol (AH or ESP), and security parameter index (SPI).
security association---See SA.
Virtual Private Network---See VPN.
VPN---Virtual Private Network. Enables IP traffic to travel securely over a public TCP/IP network by encrypting all traffic from one network to another. A VPN uses tunnels to encrypt all information at the IP level.
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Mon Apr 3 17:18:49 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.