SlideShare ist ein Scribd-Unternehmen logo
1 von 85
Сүлжээ болон хэрэглэгчийн
удирдлага хяналт
НУУЦЛАЛЫН ПРОТОКОЛУУД
Лекц 10
Агуулга
Хэрэглэгчийн хандалтын удирдлага гэж юу вэ?
Хандалтын удирдлагын аргууд
Authentication system
Authorization system
Accounting system
Директор үйлчилгээ
Аргууд:
◦ Password only
◦ Local database
◦ AAA Local Authentication (self-contained AAA)
◦ AAA Server-based
Хэрэглэгчийн хандалтын
удирдлага
Хандалтын
төрөл
Modes
Сүлжээний
хандалтын порт
Common AAA Command Element
Алсын
удирдлагын
хандалт
Character Mode
(line or EXEC mode)
tty, vty, auxiliary, and
console
login, exec, and enable
commands
Алсын
сүлжээний
хандалт
Packet (interface
mode)
Dial-up and VPN access
including asynchronous
and ISDN (BRI and PRI)
ppp and network commands
Password Only Method
R1(config)# line vty 0 4
R1(config-line)# password cisco
R1(config-line)# login
Internet
• Нууц үг ашиглан User EXEC mode , privilege EXEC mode хандах
боломжтой
User Access Verification
Password: cisco
Password: cisco1
Password: cisco12
% Bad passwords
Энгийн нууц үгээс илүү нууцлал хамгаалалт сайтай
Тохируулахад хялбар, илүү ашигтай
Local Database Method
R1(config)# username Admin secret Str0ng5rPa55w0rd
R1(config)# line vty 0 4
R1(config-line)# login local
Internet
Welcome to SPAN
Engineering
User Access Verification
Username admin
Password: cisco
User Access
Verification
Username: Admin
Password: cisco1
% Login invalid
Username: Admin
Password: cisco12
% Login invalid
• Өргөтгөх боломжгүй
• Зөвхөн дотооддоо
ашиглах боломжтой
AAA нь дараах гурван бүрэлдэхүүн хэсэгтэй. Үүнд:
AAA нууцлал, хамгаалалтын
үйлчилгээ
Хэн хандах эрхтэй вэ?
Тэдэнд юу хийхийг зөвшөөрсөн вэ?
Тэд юу хийсэн вэ?
AAA нууцлал, хамгаалалтын
үйлчилгээ
Accounting
Чи хэдийг зарцуулсан вэ?
Authentication
Чи хэн вэ?
Authorization
Чи хэдийг зарцуулж чадах вэ?
Cisco IOS рутер хоёр төрлийн AAA-аар ажиллах боломжтой. Үүнд:
Local Authentication
Local username and
password database
Cisco Secure Access
Control Server (ACS)
AAA Local Authentication
Server-Based AAA
Authentication
AAA Local Authentication
1. Клиент рутертэй холболт тогтооно
2. AAA рутерт хэрэглэгчид зориулсан username болон password өгнө
3. Local database-г ашиглан рутер username болон password-оо адилтган
танилт(authenticate) хийх ба local database дээрх мэдээлэл дээр
тулгуурлан хэрэглэгчийг сүлжээнд хандах эрх(authorize)-г олгоно.
AAA системийг өргөтгөх боломжтой бөгөөд давуу тал нь бүх системүүд
хандалтын нэгдсэн удирдлагатай болно.
◦ Хандалтын тохиргооны удирдлага болон уян хатан шинж чанарыг сайжруулна
◦ Scalability
◦ Олон backup системүүдтэй
Стандартлагдсан адилтган танилтын аргууд
◦ RADIUS, TACACS+ and Kerberos
Server-Based AAA Authentication
1. Client нь рутертэй холболт тогтооно
2. AAA рутер дээр хэрэглэгчийн username болон password-г оруулна
3. Рутер алсын AAA серверийг ашиглан username болон password-г адилтган танилт
хийнэ.
4. Алсын AAA серверийн мэдээлэл дээр үндэслэн хэрэглэгчид сүлжээнд хандах эрхийг
олгоно.
Server-Based AAA Authentication
1.Хэрэглэгч нэгэнт authenticate хийгдсэн бол AAA сервертэй session
үүсгэж холболт тогтооно.
2.Рутер AAA серверээс authorization үйлчилгээг асуусан хүсэлтийг
илгээнэ.
3.AAA сервер нь authorization-д зориулсан PASS/FAIL хариуг буцаана.
AAA-Authorization
1.Хэрэглэгч нэгэнт адилтган танилт хийгдсэн бол AAA accounting-н үйл
ажиллагаа нь мессежүүдийг үүсгэж эхэлнэ.
2.Хэрэглэгч хандалтаа дуусгах үед, мэдээллийг бичиж авахыг зогсоох ба
accounting үйл ажиллагаа төгсөнө.
3.Хэрэглэгчийн хэзээ нэвтэрсэн, хэзээ гарсан, ямар коммандууд идэвхижүүлсэн,
ямар хэмжээний пакет дамжуулсан зэрэг мэдээллийг billing, auditing болон
reporting-д ашигладаг.
AAA-Accounting
•Алдаанд тэсвэртэй байлгахын тулд Local Authentication-г давхар
тохируулж өгөх шаардлагатай
•Хэрвээ authentication серверүүд
ажиллахгүй бол Local Database-ээсээ
authentication хийнэ.
AAA – Multiple backup systems
AAA нь стандарчлагдсан аюулгүй байдлын дараах протоколуудыг
дэмждэг
◦ TACACS+
◦ Terminal Access Controller Access Control System Plus
◦ Replaces legacy protocols TACACS and XTACACS
◦ RADIUS
◦ Remote Authentication Dial-In User Service
AAA – Standardized Security Protocols
Хэд хэдэн төрлийн хандалтын эрхийг тодорхойлох боломжтой. Үүнд:
◦ one-time authorization or authorization for each service, per-user account list and profile,
user group support, …
Зөвхөн хэрэглэгч authenticate хийгдсэн байгаа тохиолдолд,
authorization үйлчилгээнүүдийг тодорхойлж болно:
◦ Хэрэглэгч хандаж чадах нөөцүүд.
◦ Хэрэглэгч гүйцэтгэхийг зөвшөөрсөн үйл ажиллагаанууд
◦ Жишээ нь:student хэрэглэгч зөвхөн Telnet-г ашиглан хост serverXYZ руу хандаж чадна
As with authentication, AAA authorization is configured by defining a
“named” list of authorization methods, and then applying that list to
various interfaces.
Authorization
•Provides the method for collecting and sending security server information.
•With AAA accounting activated, the router reports user activity to the
TACACS+ security server in the form of accounting records.
•Accounting is configured by defining a “named” list of accounting methods,
and then applying that list to various interfaces.
Accounting
© 2012 Cisco and/or its affiliates. All rights reserved. 18
Local AAA
Authentication
тохируулах
1. Global configuration горимыг ашигласнаар AAA идэвхижүүлэх:
◦ aaa new-model
2. Ашиглах authentication аргын жагсаалтуудыг тодорхойлох:
◦ aaa authentication
3. Аргын жагсаалтыг тодорхой интерфейс юмуу line дээр
харгалзуулах
CLI Local Authentication
Configuration Steps
aaa new-model коммандаар AAA онцлогыг идэвхижүүлнэ.
◦ Одоо AAA коммандуудыг тохируулж чадна.
◦ no aaa new-model коммандаар AAA-г идэвхигүй болгоно.
AAA идэвхижүүлэх
R1(config)# aaa new-model
Аuthentication төрлийг зааж тодорхойлох:
◦ Login - VTY болон con 0-н login-д зориулсан AAA-г идэвхижүүлнэ
◦ Enable - EXEC горимын хандалтанд зориулсан AAA-г идэвхижүүлнэ
◦ PPP - PPP-н хандалтанд зориулсан AAA-г идэвхижүүлнэ.
Authentication тохируулах
R1(config)# aaa authentication login
•Хэрвээ өөр арга тодорхойлоогүй бол default method list нь бүх
интерфейсүүд дээр автоматаар идэвхижинэ.
•Бүх authentication аргуудыг тодорхойлоод гүйцэтгэхээсээ өмнө
тодорхой интерфейс дээр заавал харгалзуулах ёстой
Authentication тохируулах
R1(config)# aaa authentication login SSH-LOGIN
Methods list the types of authentication to be performed and the sequence
in which they will be performed, such as:
◦ Pre-defined passwords (e.g., local, enable, or line)
◦ Consulting a TACACS+ / RADIUS / Kerberos server(s)
Configuring Authentication
Configure Authentication
Methods Description
enable Uses the enable password for authentication.
line Uses the line password for authentication.
local Uses the local username database for authentication.
none Uses no authentication.
group radius Uses the list of all RADIUS servers for authentication.
group tacacs+ Uses the list of all TACACS+ servers for authentication.
group group-name Uses a subset of RADIUS or TACACS+ servers for authentication as defined by the aaa
group server radius or aaa group server tacacs+ command.
Optionally, to lock out accounts that have excessive failed attempts, use:
◦ aaa local authentication attempts max-fail number-of-
unsuccessful-attempts
◦ To remove the number of unsuccessful attempts that was set, use the no form of this
command.
Lock Accounts with Excessive
Failed Attempts
Keyword Description
number-of-unsuccessful-
attempts
Number of unsuccessful authentication attempts before a
connection is dropped.
aaa local authentication attempts max-fail [number-of-unsuccessful-attempts]
Router(config)#
This command locks the user account if the authentication fails and the
account stays locked until it is cleared by an administrator using:
◦ clear aaa local user lockout {username username | all}
The command differs from the login delay command in how it
handles failed attempts.
◦ The login delay command introduces a delay between failed login attempts
without locking the account.
Locking a User Account
Add usernames and passwords to the local router database for users that
need administrative access to the router.
Enable AAA globally on the router.
Configure AAA parameters on the router.
Confirm and troubleshoot the AAA configuration.
Configuring Local AAA
Authentication
R1# conf t
R1(config)# username JR-ADMIN secret Str0ngPa55w0rd
R1(config)# username ADMIN secret Str0ng5rPa55w0rd
R1(config)# aaa new-model
R1(config)# aaa authentication login default local
R1(config)# aaa local authentication attempts max-fail
10
A default list or a named list can be defined.
◦ A default list is automatically applied to all interfaces if no other method list is defined.
◦ A named list must be applied to a specific interface before any of the defined
authentication methods will be performed.
Using a Named List
R1# conf t
R1(config)# username JR-ADMIN secret Str0ngPa55w0rd
R1(config)# username ADMIN secret Str0ng5rPa55w0rd
R1(config)# aaa new-model
R1(config)# aaa authentication login default local
enable
R1(config)# aaa authentication login TELNET-LOGIN
local
R1(config)# line vty 0 4
R1(config-line)# login authentication TELNET-LOGIN
Display User Information
R1# show aaa sessions
Total sessions since last reload: 4
Session Id: 1
Unique Id: 175
User Name: ADMIN
IP Address: 192.168.1.10
Idle Time: 0
CT Call Handle: 0
R1# show aaa local user lockout
Local-user Lock time
JR-ADMIN 04:28:49 UTC Sat Dec 27 2008
Troubleshooting AAA Authentication
R1# debug aaa ?
accounting Accounting
administrative Administrative
api AAA api events
attr AAA Attr Manager
authentication Authentication
authorization Authorization
cache Cache activities
coa AAA CoA processing
db AAA DB Manager
dead-criteria AAA Dead-Criteria Info
id AAA Unique Id
ipc AAA IPC
mlist-ref-count Method list reference counts
mlist-state Information about AAA method list state change and
notification
per-user Per-user attributes
pod AAA POD processing
protocol AAA protocol processing
server-ref-count Server handle reference counts
sg-ref-count Server group handle reference counts
sg-server-selection Server Group Server Selection
subsys AAA Subsystem
testing Info. about AAA generated test packets
R1# debug aaa
Troubleshooting AAA
Authentication
R1# debug aaa authentication
113123: Feb 4 10:11:19.305 CST: AAA/MEMORY: create_user (0x619C4940) user=''
ruser='' port='tty1' rem_addr='async/81560' authen_type=ASCII service=LOGIN priv=1
113124: Feb 4 10:11:19.305 CST: AAA/AUTHEN/START (2784097690): port='tty1' list=''
action=LOGIN service=LOGIN
113125: Feb 4 10:11:19.305 CST: AAA/AUTHEN/START (2784097690): using "default" list
113126: Feb 4 10:11:19.305 CST: AAA/AUTHEN/START (2784097690): Method=LOCAL
113127: Feb 4 10:11:19.305 CST: AAA/AUTHEN (2784097690): status = GETUSER
113128: Feb 4 10:11:26.305 CST: AAA/AUTHEN/CONT (2784097690): continue_login
(user='(undef)')
113129: Feb 4 10:11:26.305 CST: AAA/AUTHEN (2784097690): status = GETUSER
113130: Feb 4 10:11:26.305 CST: AAA/AUTHEN/CONT (2784097690): Method=LOCAL
113131: Feb 4 10:11:26.305 CST: AAA/AUTHEN (2784097690): status = GETPASS
113132: Feb 4 10:11:28.145 CST: AAA/AUTHEN/CONT (2784097690): continue_login
(user='diallocal')
113133: Feb 4 10:11:28.145 CST: AAA/AUTHEN (2784097690): status = GETPASS
113134: Feb 4 10:11:28.145 CST: AAA/AUTHEN/CONT (2784097690): Method=LOCAL
113135: Feb 4 10:11:28.145 CST: AAA/AUTHEN (2784097690): status = PASS
© 2012 Cisco and/or its affiliates. All rights reserved. 32
Server-Based AAA
Authentication
аргууд
Authentication Protocols
Server-Based Solution
 The Cisco AAA family :
– Terminal Access Control Access Control Server Plus (TACACS+)
– Remote Dial-in User Services (RADIUS) protocols
TACACS+ and RADIUS
Client ба AAA серверүүдийг холбох протоколоор ашиглагдана
TACACS+ нь илүү нууцлал хамгаалалт сайтай. (cолилцож байгаа бүх
мессэжүүд нууцлагдана)
Radius нь зөвхөн хэрэглэгчийн нууц үгийг нууцална.
◦ It does not encrypt user names, accounting information, or any other information carried
in the radius message.
TACACS+ ба RADIUS
TACACS+ is a Cisco protocol that provides separate AAA services.
◦ Separating the AAA services provides flexibility in implementation, because it is possible
to use TACACS+ for authorization and accounting while using another method of
authentication.
TACACS+ Authentication
Connect Username prompt?
Username? Use “Username”
JR-ADMIN JR-ADMIN
Password?
Password prompt?
“Str0ngPa55w0rd”
Use “Password”
Accept/Reject
“Str0ngPa55w0rd”
RADIUS, developed by Livingston Enterprises, is an open IETF standard AAA
protocol for applications such as network access or IP mobility.
◦ RADIUS is currently defined by RFCs 2865, 2866, 2867, and 2868.
The RADIUS protocol hides passwords during transmission but the rest of
the packet is sent in plaintext.
RADIUS Authentication
RADIUS combines authentication and authorization as one process which
means that when a user is authenticated, that user is also authorized.
◦ RADIUS uses UDP port 1645 or 1812 for authentication and UDP port 1646 or 1813 for
accounting.
RADIUS Authentication
Username?
JR-ADMIN
Password?
Str0ngPa55w0rd
Access-Request
(JR_ADMIN, “Str0ngPa55w0rd”)
Access-Accept
RADIUS is widely used by VoIP service providers because it passes login
credentials of a session initiation protocol (SIP) endpoint, such as a
broadband phone, to a SIP Registrar using digest authentication, and then
to a RADIUS server using RADIUS.
◦ RADIUS is also a common authentication protocol that is utilized by the 802.1X security
standard.
The DIAMETER protocol is the planned replacement for RADIUS.
◦ DIAMETER uses a new transport protocol called Stream Control Transmission Protocol
(SCTP) and TCP instead of UDP.
RADIUS Authentication
TACACS+ vs. RADIUS
Feature TACACS+ RADIUS
Functionality
Separates AAA according to the
AAA architecture, allowing
modularity of the security server
implementation
Combines authentication and
authorization but separates
accounting, allowing less
flexibility in implementation than
TACACS+.
Standard Mostly Cisco supported Open/RFC standard
Transport Protocol TCP port 49
UDP port 1645 or 1812 for
authentication
UDP port 1646 or 1813 for
accounting
CHAP
Bidirectional challenge and
response
as used in CHAP
Unidirectional challenge and
response from the RADIUS
security server to the RADIUS
client.
Confidentiality Entire packet encrypted Only the password is encrypted
Customization
Provides authorization of router
commands on a per-user or per-
group basis.
Has no option to authorize router
commands on a per-user or per-
group basis.
Accounting Limited Extensive
© 2012 Cisco and/or its affiliates. All rights reserved. 42
Server-Based
AAA
Authentication
тохиргоо
1. Enable AAA by using the global configuration command:
◦ aaa new-model
2. Configure security protocol parameters:
◦ Server IP address and Key
3. Define the authentication method lists using:
◦ aaa authentication
4. Apply the method lists to a particular interface or line (if required).
5. Optionally configure authorization using the global command:
◦ aaa authorization
6. Optionally configure accounting using the global command:
◦ aaa accounting
CLI Configuration Steps
1. Specify the location of the AAA server that will provide AAA services.
2. Configure the encryption key needed to encrypt the data transfer
between the network access server and Cisco Secure ACS.
Server-Based AAA
Authentication
AAA Configuration Commands
Command Description
tacacs-server host
ip-address
single-connection
• Indicates the address of the Cisco Secure ACS server and specifies
use of the TCP single-connection feature of Cisco Secure ACS.
• This feature improves performance by maintaining a single TCP
connection for the life of the session between the network access
server and the Cisco Secure ACS server, rather than opening and
closing TCP connections for each session (the default).
tacacs-server key key
• Establishes the shared secret encryption key between the network
access server and the Cisco Secure ACS server.
radius-server host ip-
address
• Specifies a RADIUS AAA server.
radius-server key key
• Specifies an encryption key to be used with the RADIUS AAA
server.
AAA Server Parameters
тохируулах
R1
192.168.1.100
192.168.1.101
Cisco Secure ACS
Solution Engine
using TACACS+
Cisco Secure ACS
for Windows
using RADIUS
R1(config)# aaa new-model
R1(config)#
R1(config)# tacacs-server host 192.168.1.101 single-connection
R1(config)# tacacs-server key TACACS+Pa55w0rd
R1(config)#
R1(config)# radius-server host 192.168.1.100
R1(config)# radius-server key RADIUS-Pa55w0rd
R1(config)#
Define Method Lists
R1(config)# aaa authentication login default ?
enable Use enable password for authentication.
group Use Server-group
krb5 Use Kerberos 5 authentication.
krb5-telnet Allow logins only if already authenticated via
Kerberos V
Telnet.
line Use line password for authentication.
local Use local username authentication.
local-case Use case-sensitive local username authentication.
none NO authentication.
passwd-expiry enable the login list to provide password aging
support
R1(config)# aaa authentication login default group ?
WORD Server-group name
radius Use list of all Radius hosts.
tacacs+ Use list of all Tacacs+ hosts.
R1(config)# aaa authentication login default group
AAA Authentication
Commands
Parameter Description
default
• This command creates a default that is automatically applied to all lines and
interfaces, specifying the method or sequence of methods for
authentication.
group group-name
group radius
group tacacs+
• These methods specify the use of an AAA server.
• The group radius and group tacacs+ methods refer to previously defined
RADIUS or TACACS+ servers.
• The group-name string allows the use of a predefined group of RADIUS or
TACACS+ servers for authentication (created with the aaa group server
radius or aaa group server tacacs+ command).
R1(config)# aaa authentication login default group tacacs+ group radius
local
Configuring the AAA ServerR1
192.168.1.100
192.168.1.101
Cisco Secure ACS
Solution Engine
using TACACS+
Cisco Secure ACS
for Windows
using RADIUS
R1(config)# aaa new-model
R1(config)#
R1(config)# tacacs-server host 192.168.1.101 single-connection
R1(config)# tacacs-server key TACACS+Pa55w0rd
R1(config)#
R1(config)# radius-server host 192.168.1.100
R1(config)# radius-server key RADIUS-Pa55w0rd
R1(config)#
R1(config)# aaa authentication login default group tacacs+ group radius local-case
R1(config)#
Troubleshooting Server-Based
Authentication
R1# debug aaa authentication
AAA Authentication debugging is on
R1#
14:01:17: AAA/AUTHEN (567936829): Method=TACACS+
14:01:17: TAC+: send AUTHEN/CONT packet
14:01:17: TAC+ (567936829): received authen response status = PASS
14:01:17: AAA/AUTHEN (567936829): status = PASS
Troubleshooting Server-Based
Authentication
R1# debug tacacs ?
accounting TACACS+ protocol accounting
authentication TACACS+ protocol authentication
authorization TACACS+ protocol authorization
events TACACS+ protocol events
packet TACACS+ packets
<cr>
R1# debug radius ?
accounting RADIUS accounting packets only
authentication RADIUS authentication packets only
brief Only I/O transactions are recorded
elog RADIUS event logging
failover Packets sent upon fail-over
local-server Local RADIUS server
retransmit Retransmission of packets
verbose Include non essential RADIUS debugs
<cr>
R1# debug radius
Troubleshooting Server-Based
Authentication
R1# debug tacacs
TACACS access control debugging is on
R1#
13:53:35: TAC+: Opening TCP/IP connection to 192.168.1.101 using source 192.48.0.79
13:53:35: TAC+: Sending TCP/IP packet number 416942312-1 to 192.168.1.101
(AUTHEN/START)
13:53:35: TAC+: Receiving TCP/IP packet number 416942312-2 from 192.168.60.15
13:53:35: TAC+ (416942312): received authen response status = GETUSER
13:53:37: TAC+: send AUTHEN/CONT packet
13:53:37: TAC+: Sending TCP/IP packet number 416942312-3 to 192.168.1.101
(AUTHEN/CONT)
13:53:37: TAC+: Receiving TCP/IP packet number 416942312-4 from 192.168.60.15
13:53:37: TAC+ (416942312): received authen response status = GETPASS
13:53:38: TAC+: send AUTHEN/CONT packet
13:53:38: TAC+: Sending TCP/IP packet number 416942312-5 to 192.168.1.101
(AUTHEN/CONT)
13:53:38: TAC+: Receiving TCP/IP packet number 416942312-6 from 192.168.60.15
13:53:38: TAC+ (416942312): received authen response status = FAIL
13:53:40: TAC+: Closing TCP/IP connection to 192.168.60.15
© 2012 Cisco and/or its affiliates. All rights reserved. 53
Server-Based
Authorization
Use to limit the services available to a user.
Router uses the user's profile information, located either in the local user
database or on the security server, to configure the user's session.
◦ User is then granted access to a requested service only if the information in the user
profile allows it.
Authorization
aaa authorization type { default | list-name } method1 … [method4]
Router(config)#
Command Authorization
show version
Command authorization for user
JR-ADMIN, command “show version”?
Accept
JR-ADMIN
Display “show
version” output
configure terminal
Command authorization for user
JR-ADMIN, command “config terminal”?
Reject
Do not permit
“configure terminal”
Configuring Authorization Type
R1(config)# aaa authorization ?
auth-proxy For Authentication Proxy Services
cache For AAA cache configuration
commands For exec (shell) commands.
config-commands For configuration mode commands.
configuration For downloading configurations from AAA server
console For enabling console authorization
exec For starting an exec (shell).
ipmobile For Mobile IP services.
multicast For downloading Multicast configurations from an AAA server
network For network services. (PPP, SLIP, ARAP)
prepaid For diameter prepaid services.
reverse-access For reverse access connections
template Enable template authorization
R1(config)# aaa authorization exec ?
WORD Named authorization list.
default The default authorization list.
R1(config)# aaa authorization exec default ?
group Use server-group.
if-authenticated Succeed if user has authenticated.
krb5-instance Use Kerberos instance privilege maps.
local Use local database.
none No authorization (always succeeds).
R1(config)# aaa authorization exec default group ?
WORD Server-group name
radius Use list of all Radius hosts.
tacacs+ Use list of all Tacacs+ hosts.
Configuring Authorization
R1# conf t
R1(config)# username JR-ADMIN secret Str0ngPa55w0rd
R1(config)# username ADMIN secret Str0ng5rPa55w0rd
R1(config)# aaa new-model
R1(config)# aaa authentication login default group tacacs+
R1(config)# aaa authentication login TELNET-LOGIN local-case
R1(config)# aaa authorization exec default group tacacs+
R1(config)# aaa authorization network default group tacacs+
R1(config)# line vty 0 4
R1(config-line)# login authentication TELNET-LOGIN
R1(config-line)# ^Z
© 2012 Cisco and/or its affiliates. All rights reserved. 58
Server-Based
Accounting
Defines the way accounting will be performed and the sequence in which
they are performed.
Named lists enable you to designate a particular security protocol to be
used on specific lines or interfaces for accounting services.
Accounting
Router(config)#
aaa accounting type { default | list-name } record-type method1 … [method2]
R1(config)# aaa accounting ?
auth-proxy For authentication proxy events.
commands For exec (shell) commands.
connection For outbound connections. (telnet, rlogin)
delay-start Delay PPP Network start record until peer IP address is known.
exec For starting an exec (shell).
gigawords 64 bit interface counters to support Radius attributes 52 & 53.
multicast For multicast accounting.
nested When starting PPP from EXEC, generate NETWORK records before EXEC-STOP
record.
network For network services. (PPP, SLIP, ARAP)
resource For resource events.
send Send records to accounting server.
session-duration Set the preference for calculating session durations
suppress Do not generate accounting records for a specific type of user.
system For system events.
update Enable accounting update records.
R1(config)# aaa accounting exec ?
WORD Named Accounting list.
default The default accounting list.
R1(config)# aaa accounting exec default ?
none No accounting.
start-stop Record start and stop without waiting
stop-only Record stop when service terminates.
R1(config)# aaa accounting exec default start-stop?
broadcast Use Broadcast for Accounting
group Use Server-group
R1(config)# aaa accounting exec default start-stop group ?
WORD Server-group name
radius Use list of all Radius hosts.
tacacs+ Use list of all Tacacs+ hosts.
Configuring Accounting
Configuring Accounting
Sample Config
R1# conf t
R1(config)# username JR-ADMIN secret Str0ngPa55w0rd
R1(config)# username ADMIN secret Str0ng5rPa55w0rd
R1(config)# aaa new-model
R1(config)# aaa authentication login default group tacacs+
R1(config)# aaa authentication login TELNET-LOGIN local-case
R1(config)# aaa authorization exec group tacacs+
R1(config)# aaa authorization network group tacacs+
R1(config)# aaa accounting exec start-stop group tacacs+
R1(config)# aaa accounting network start-stop group tacacs+
R1(config)# line vty 0 4
R1(config-line)# login authentication TELNET-LOGIN
R1(config-line)# ^Z
Router# debug tacacs
Router# debug aaa authentication
13:21:20: AAA/AUTHEN: create_user user=’’ ruser=’’ port=’tty6’
rem_addr=’10.0.0.32’ authen_type=1 service=1 priv=1
13:21:20: AAA/AUTHEN/START (0): port= ‘tty6’ list=’’ action=LOGIN service=LOGIN
13:21:20: AAA/AUTHEN/START (0): using “default” list
13:21:20: AAA/AUTHEN/START (70215483): Method=TACACS+
13:21:20: TAC+ (70215483): received authen response status = GETUSER
13:21:20: AAA/AUTHEN (70215483): status = GETUSER
13:21:23: AAA/AUTHEN/CONT (70215483): continue_login
13:21:23: AAA/AUTHEN (70215483): status = GETUSER
13:21:23: AAA/AUTHEN (70215483): Method=TACACS+
13:21:23: TAC+ : send AUTHEN/CONT packet
13:21:23: TAC+ (70215483): received authen response status = GETPASS
13:21:23: AAA/AUTHEN (70215483): status = GETPASS
13:21:27: AAA/AUTHEN/CONT (70215483): continue_login
13:21:27: AAA/AUTHEN (70215483): status = GETPASS
13:21:27: AAA/AUTHEN (70215483): Method=TACACS+
13:21:27: TAC+ : send AUTHEN/CONT packet
13:21:27: TAC+ (70215483): received authen response status = PASS
13:21:27: AAA/AUTHEN (70215483): status = PASS
The debug tacacs and debug aaa authentication commands can be
useful for troubleshooting AAA authentication problems. The example shows the
output for a successful login attempt using TACACS+.
Management Plane Authentication: AAA/TACACS+
The debug aaa authorization output captured in this example shows the following events:
The user (admin1) attempts to obtain an EXEC shell service, which requires authorization.
The cmd parameter specifies a command that the user is trying to execute. If * is listed, it refers to
plain EXEC access.
The method used to authorize this access is TACACS+.
The router sends the necessary information (user credentials) through TACACS+ to the security server.
The security server verifies the authorization, determines that the user is not authorized to perform
this function, and sends back a FAIL status response.
Router# debug aaa authorization
2:23:21: AAA/AUTHOR (0): user= ‘admin1’
2:23:21: AAA/AUTHOR (0): send AV service=shell
2:23:21: AAA/AUTHOR (0): send AV cmd*
2:23:21: AAA/AUTHOR (342885561): Method=TACACS+
2:23:21: AAA/AUTHOR/TAC+ (342885561): user=admin1
2:23:21: AAA/AUTHOR/TAC+ (342885561): send AV service=shell
2:23:21: AAA/AUTHOR/TAC+ (342885561): send AV cmd*
2:23:21: AAA/AUTHOR (342885561): Post authorization status = FAIL
Management Plane Authorization: AAA/TACACS+
The debug aaa accounting output captured in the example
shows a scenario where the default method was used, and that a
user successfully gained access to the router’s EXEC shell.
Router# debug aaa accounting
May 10 14:48:33.011: AAA/ACCT/EXEC(00000005): Pick method list
‘default’
May 10 14:48:33.011: AAA/ACCT/SETMLIST(00000005): Handle 0, mlist
81CA79CC,
Name default
May 10 14:48:33.011: Getting session id for EXEC (00000005):
db=82099258
May 10 14:48:33.011: AAA/ACCT/EXEC(00000005): add, count 2
May 10 14:48:33.011: AAA/ACCT/EVENT(00000005): EXEC UP
Management Plane Accounting: AAA/TACACS+
Management Plane: Common TACACS+ Issues
Common TACACS+ failures can include the following:
A TACACS+ server goes down or a device (TACACS client) cannot connect
to the server. As a backup, configure the network device to use the local
database for authenticating critical users.
A device (client) shared key and the server’s shared key do not match.
User credentials (username, password, or both) are rejected by the
server.
Management Plane: TACACS+ Issues – Cont.
Router# debug tacacs
Router# debug aaa authentication
! The TACACS+ server is down or the device has no connectivity to the server:
TAC+: TCP/IP open to 171.68.118.101/49 failed-
Connection refused by remote host
AAA/AUTHEN (2546660185): status = ERROR
AAA/AUTHEN/START (2546660185): Method=LOCAL
AAA/AUTHEN (2546660185): status = FAIL
As1 CHAP: Unable to validate response. Username chapuser: Authentication failure
! The key on the device and TACACS+ server do not match:
TAC+: received bad AUTHEN packet: length = 68, expected 67857
TAC+: Invalid AUTHEN/START packet (check keys)
AAA/AUTHEN (1771887965): status = ERROR
! Bad user name, bad password, or both:
AAA/AUTHEN: free_user (0x170940) user= ‘chapuser’ ruser= ‘’
Port= ‘Async1’ rem_addr= ‘async’ authen_type=CHAP service=PPP priv=1
TAC+: Closing TCP/IP 0x16EF4C connection to 171.68.118.101/49
AAA/AUTHEN (2082151566): status = FAIL
As1 CHAP: Unable to validate Response. Username papuser: Authentication failure
Management Plane: Common RADIUS Issues
The common RADIUS problems are similar to the common TACACS+
problems:
◦ The RADIUS server’s failure or loss of network connectivity
◦ Mismatch of the shared key between the RADIUS server and the network
device (RADIUS client)
◦ User authorization failure (incorrect username, password, or both)
◦ Mismatch of RADIUS port numbers between the router and RADIUS server
Management Plane: RADIUS Issues – Cont.
Router# debug radius
Router# debug aaa authentication
! The RADIUS server is down or the device has no connectivity to the server:
As1 CHAP: I RESPONSE id 12 len 28 from “chapadd”
RADIUS: id 15, requestor hung up.
RADIUS: No response for id 15
RADIUS: No response from server
AAA/AUTHEN (1866705040): status = ERROR
AAA/AUTHEN/START (1866705040): Method=LOCAL
AAA/AUTHEN (1866705040): status = FAIL
As1 CHAP: Unable to validate Response. Username chapadd: Authentication failure
As1 CHAP: 0 FAILURE id 13 len 26 msg is “Authentication failure”
! The key on the device and RADIUS server do not match:
RADIUS: received from id 21 171.68.118.101:1645, Access-Reject, len 20
RADIUS: Reply for 21 fails decrypt
NT client sends ‘DOMAINuser’ and Radius server expects ‘user’:
RADIUS: received from id 16 171.68.118.101:1645, Access-Reject, len 20
AAA/AUTHEN (2974782384): status = FAIL
As1 CHAP: Unable to validate Response. Username CISCOchapadd: Authentication
failure
As1 CHAP: 0 FAILURE id 13 len 26 msg is “Authentication failure”
! Username and password are correct, but authorization failed:
RADIUS: received from id 19 171.68.118.101:1645, Access-Accept, len 20
RADIUS: no appropriate authorization type for user
AAA/AUTHOR (2370106832): Post authorization status = FAIL
AAA/AUTHOR/LCP As1: Denied
! Bad username, bad password, or both:
RADIUS: received from id 17 171.68.118.101:1645, Access-Reject, len 20
AAA/AUTHEN (3898168391): status = FAIL
As1 CHAP: Unable to validate Response. Username ddunlap: Authentication failure
As1 CHAP: 0 FAILURE id 14 len 26 msg is “Authentication failure”
As1 PPP: Phase is TERMINATING
Агуулга
Хэрэглэгчийн хандалтын удирдлага гэж юу вэ?
Хандалтын удирдлагын аргууд
Authentication system
Authorization system
Accounting system
Директор үйлчилгээ
Директор үйлчилгээ
 Директор үйлчилгээ нь сүлжээний нөөцүүдийг төвлөрсөн
удирдлагаар удирдах боломжтой юм.
 Сүлжээний админ хэрэглэгчдийн нөөц рүү хандах хандалтыг
удирддаг
 Хэрэглэгч болон дундын нөөц хоорондын дундын түвшин юм
 Үйлчилгээ:
 Файл хуваалцах
 Хэрэглэгчдийг адилтган таних
 емэйл, интернэт, принтер гэх мэт үйлчилгээг удирдах
 USB, хардын хэмжээг удирдана
 Протокол:
 Microsoft – ын Active directory service
 Lightweight Directory Access Protocol (LDAP)
Хэрэглэгчийн удирдлагын систем
 Протокол:
 Microsoft – ын Active directory service
 Linux – Open LDAP
 Lightweight Directory Access Protocol (LDAP)
 Messaging Application Programming Interface (MAPI)
 Security Accounts Manager (SAM)
Active Directory Structure
 Шаталсан бүтэцтэй
 Обьектод суурилсан
 Домэйн нэрийн системтэй
OU
Domain
Domain
OUOU
Objects
Domain
Tree
Domain
Domain
Domain
Tree
Forest
Active Directory Structure example
AD.sict.edu.mn
Roles хэсгээс Актив директор Domain Services –
ийг сонгоно
www.themegallery.com COMPANY LOGO
Create a new
domain in a new forest – ийг сонгоно
Хэрэглэгчийн компьютерийг домайнд нэгтгэх
www.themegallery.com COMPANY LOGO
Active Directory objects
 “old friends”
 User
 Group
 Computer
 New Elements
 Distribution list
 System policies
 Application defined
custom objects
Active directory
configuration
Зохион байгуулалтын нэгжийн нэрийг өгч үүсгэнэ
www.themegallery.com COMPANY LOGO
Active directory
configuration
хэрэглэгч үүсгэнэ
www.themegallery.com COMPANY LOGO
Active directory
configuration
Хэрэглэгчийн нэрийг firest name, full name, User logon name
хэсгүүдэд бичнэ
www.themegallery.com COMPANY LOGO
Active directory policy
Password Policy
www.themegallery.com COMPANY LOGO
Active directory policy
нууц үгийг reset хийх
www.themegallery.com COMPANY LOGO
Active directory policy
нууц үгийг reset хийх
www.themegallery.com COMPANY LOGO
Active directory policy
USB оролт хаах
www.themegallery.com COMPANY LOGO
Анхаарал тавьсанд баярлалаа

Weitere ähnliche Inhalte

Was ist angesagt?

Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overview
ali raza
 
All about routers
All about routersAll about routers
All about routers
agwanna
 
Isa2004 Configuration Guide
Isa2004 Configuration GuideIsa2004 Configuration Guide
Isa2004 Configuration Guide
guest60864fc
 
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLI
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLICCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLI
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLI
Hoàng Hải Nguyễn
 
Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8
Babaa Naya
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overview
ali raza
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
Irsandi Hasan
 
Chapter 8 overview
Chapter 8 overviewChapter 8 overview
Chapter 8 overview
ali raza
 
Palo Alto VM-100 Configuration Lab
Palo Alto VM-100 Configuration LabPalo Alto VM-100 Configuration Lab
Palo Alto VM-100 Configuration Lab
Mykhaylo Skrypka
 

Was ist angesagt? (20)

Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overview
 
All about routers
All about routersAll about routers
All about routers
 
Isa2004 Configuration Guide
Isa2004 Configuration GuideIsa2004 Configuration Guide
Isa2004 Configuration Guide
 
Deployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceDeployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_appliance
 
CCNP Security-VPN
CCNP Security-VPNCCNP Security-VPN
CCNP Security-VPN
 
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLI
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLICCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLI
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLI
 
Chapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospfChapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospf
 
Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8
 
Palo Alto Virtual firewall deployment guide on OpenStack Cloud
Palo Alto Virtual firewall deployment guide on OpenStack Cloud  Palo Alto Virtual firewall deployment guide on OpenStack Cloud
Palo Alto Virtual firewall deployment guide on OpenStack Cloud
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan Redundancy
 
Packet tracer 6.2 new features
Packet tracer 6.2 new featuresPacket tracer 6.2 new features
Packet tracer 6.2 new features
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overview
 
Brkcrt 1160 c3-rev2
Brkcrt 1160 c3-rev2Brkcrt 1160 c3-rev2
Brkcrt 1160 c3-rev2
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
 
Chapter 8 overview
Chapter 8 overviewChapter 8 overview
Chapter 8 overview
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authentication
 
Palo Alto VM-100 Configuration Lab
Palo Alto VM-100 Configuration LabPalo Alto VM-100 Configuration Lab
Palo Alto VM-100 Configuration Lab
 

Ähnlich wie 010 sa302 aaa+ldap

3_poglavlje_AAA.pdf
3_poglavlje_AAA.pdf3_poglavlje_AAA.pdf
3_poglavlje_AAA.pdf
Ticmi1
 
Tacacs
TacacsTacacs
Tacacs
1 2d
 
At8000 s configurando_aaa
At8000 s configurando_aaaAt8000 s configurando_aaa
At8000 s configurando_aaa
NetPlus
 
Chapter 3 overview
Chapter 3 overviewChapter 3 overview
Chapter 3 overview
ali raza
 

Ähnlich wie 010 sa302 aaa+ldap (20)

AAA Implementation
AAA ImplementationAAA Implementation
AAA Implementation
 
3_poglavlje_AAA.pdf
3_poglavlje_AAA.pdf3_poglavlje_AAA.pdf
3_poglavlje_AAA.pdf
 
CCNA_Security_03.ppt
CCNA_Security_03.pptCCNA_Security_03.ppt
CCNA_Security_03.ppt
 
AAA Best Practices
AAA Best PracticesAAA Best Practices
AAA Best Practices
 
The Three Musketeers (Authentication, Authorization, Accounting)
The Three Musketeers (Authentication, Authorization, Accounting)The Three Musketeers (Authentication, Authorization, Accounting)
The Three Musketeers (Authentication, Authorization, Accounting)
 
Introduction to MariaDb
Introduction to MariaDbIntroduction to MariaDb
Introduction to MariaDb
 
Tacacs
TacacsTacacs
Tacacs
 
5 ip security dataplace security
5 ip security dataplace security5 ip security dataplace security
5 ip security dataplace security
 
At8000 s configurando_aaa
At8000 s configurando_aaaAt8000 s configurando_aaa
At8000 s configurando_aaa
 
CCNP Switching Chapter 7
CCNP Switching Chapter 7CCNP Switching Chapter 7
CCNP Switching Chapter 7
 
Chapter 3 overview
Chapter 3 overviewChapter 3 overview
Chapter 3 overview
 
5 ip security asa-partb
5 ip security asa-partb5 ip security asa-partb
5 ip security asa-partb
 
5 ip security aaa and acl
5 ip security aaa and acl5 ip security aaa and acl
5 ip security aaa and acl
 
AAA server
AAA serverAAA server
AAA server
 
3429 How to transform your messaging environment to a secure messaging envi...
3429   How to transform your messaging environment to a secure messaging envi...3429   How to transform your messaging environment to a secure messaging envi...
3429 How to transform your messaging environment to a secure messaging envi...
 
Implementing Cisco AAA
Implementing Cisco AAAImplementing Cisco AAA
Implementing Cisco AAA
 
5 ip security urpf
5 ip security urpf5 ip security urpf
5 ip security urpf
 
Cisco ise jun os and ios xr - tacacs+ integration
Cisco ise   jun os and ios xr - tacacs+ integrationCisco ise   jun os and ios xr - tacacs+ integration
Cisco ise jun os and ios xr - tacacs+ integration
 
5 ip security copp-mpp
5 ip security copp-mpp5 ip security copp-mpp
5 ip security copp-mpp
 
117641 config-asa-00
117641 config-asa-00117641 config-asa-00
117641 config-asa-00
 

Mehr von Babaa Naya

Suraltsagchid chiglesen uilchilgee hesgiin notolgoo
Suraltsagchid chiglesen uilchilgee hesgiin notolgooSuraltsagchid chiglesen uilchilgee hesgiin notolgoo
Suraltsagchid chiglesen uilchilgee hesgiin notolgoo
Babaa Naya
 

Mehr von Babaa Naya (20)

Суралцагчийн мэдлэг, чадвар, дадлыг үнэлэх, дүгнэх журам
Суралцагчийн мэдлэг, чадвар, дадлыг үнэлэх, дүгнэх журам Суралцагчийн мэдлэг, чадвар, дадлыг үнэлэх, дүгнэх журам
Суралцагчийн мэдлэг, чадвар, дадлыг үнэлэх, дүгнэх журам
 
Мэргэжлийн болон техникийн боловсролын сургалтын байгууллагын суралцагчид тэт...
Мэргэжлийн болон техникийн боловсролын сургалтын байгууллагын суралцагчид тэт...Мэргэжлийн болон техникийн боловсролын сургалтын байгууллагын суралцагчид тэт...
Мэргэжлийн болон техникийн боловсролын сургалтын байгууллагын суралцагчид тэт...
 
Мэргэжлийн болон техникийн боловсролын сургалтын байгууллагын багшид мэргэжли...
Мэргэжлийн болон техникийн боловсролын сургалтын байгууллагын багшид мэргэжли...Мэргэжлийн болон техникийн боловсролын сургалтын байгууллагын багшид мэргэжли...
Мэргэжлийн болон техникийн боловсролын сургалтын байгууллагын багшид мэргэжли...
 
Мэргэжлийн боловсрол, сургалтын байгууллагын төгсөгчдөд мэргэжлийн диплом, үн...
Мэргэжлийн боловсрол, сургалтын байгууллагын төгсөгчдөд мэргэжлийн диплом, үн...Мэргэжлийн боловсрол, сургалтын байгууллагын төгсөгчдөд мэргэжлийн диплом, үн...
Мэргэжлийн боловсрол, сургалтын байгууллагын төгсөгчдөд мэргэжлийн диплом, үн...
 
Suraltsagchid chiglesen uilchilgee hesgiin notolgoo
Suraltsagchid chiglesen uilchilgee hesgiin notolgooSuraltsagchid chiglesen uilchilgee hesgiin notolgoo
Suraltsagchid chiglesen uilchilgee hesgiin notolgoo
 
Img 20210105 0002
Img 20210105 0002Img 20210105 0002
Img 20210105 0002
 
Img 20210105 0001
Img 20210105 0001Img 20210105 0001
Img 20210105 0001
 
Cisco packet tracer
Cisco packet tracerCisco packet tracer
Cisco packet tracer
 
Cisco packet tracer
Cisco packet tracerCisco packet tracer
Cisco packet tracer
 
Lab10
Lab10Lab10
Lab10
 
Lab9
Lab9Lab9
Lab9
 
Lab8
Lab8Lab8
Lab8
 
Lab7
Lab7Lab7
Lab7
 
Lab6
Lab6Lab6
Lab6
 
Lab 6
Lab 6Lab 6
Lab 6
 
Lab5
Lab5Lab5
Lab5
 
Lab4
Lab4Lab4
Lab4
 
Lab3
Lab3Lab3
Lab3
 
Lab2
Lab2Lab2
Lab2
 
Lab1
Lab1Lab1
Lab1
 

Kürzlich hochgeladen

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

010 sa302 aaa+ldap

  • 1. Сүлжээ болон хэрэглэгчийн удирдлага хяналт НУУЦЛАЛЫН ПРОТОКОЛУУД Лекц 10
  • 2. Агуулга Хэрэглэгчийн хандалтын удирдлага гэж юу вэ? Хандалтын удирдлагын аргууд Authentication system Authorization system Accounting system Директор үйлчилгээ
  • 3. Аргууд: ◦ Password only ◦ Local database ◦ AAA Local Authentication (self-contained AAA) ◦ AAA Server-based Хэрэглэгчийн хандалтын удирдлага Хандалтын төрөл Modes Сүлжээний хандалтын порт Common AAA Command Element Алсын удирдлагын хандалт Character Mode (line or EXEC mode) tty, vty, auxiliary, and console login, exec, and enable commands Алсын сүлжээний хандалт Packet (interface mode) Dial-up and VPN access including asynchronous and ISDN (BRI and PRI) ppp and network commands
  • 4. Password Only Method R1(config)# line vty 0 4 R1(config-line)# password cisco R1(config-line)# login Internet • Нууц үг ашиглан User EXEC mode , privilege EXEC mode хандах боломжтой User Access Verification Password: cisco Password: cisco1 Password: cisco12 % Bad passwords
  • 5. Энгийн нууц үгээс илүү нууцлал хамгаалалт сайтай Тохируулахад хялбар, илүү ашигтай Local Database Method R1(config)# username Admin secret Str0ng5rPa55w0rd R1(config)# line vty 0 4 R1(config-line)# login local Internet Welcome to SPAN Engineering User Access Verification Username admin Password: cisco User Access Verification Username: Admin Password: cisco1 % Login invalid Username: Admin Password: cisco12 % Login invalid • Өргөтгөх боломжгүй • Зөвхөн дотооддоо ашиглах боломжтой
  • 6. AAA нь дараах гурван бүрэлдэхүүн хэсэгтэй. Үүнд: AAA нууцлал, хамгаалалтын үйлчилгээ Хэн хандах эрхтэй вэ? Тэдэнд юу хийхийг зөвшөөрсөн вэ? Тэд юу хийсэн вэ?
  • 7. AAA нууцлал, хамгаалалтын үйлчилгээ Accounting Чи хэдийг зарцуулсан вэ? Authentication Чи хэн вэ? Authorization Чи хэдийг зарцуулж чадах вэ?
  • 8. Cisco IOS рутер хоёр төрлийн AAA-аар ажиллах боломжтой. Үүнд: Local Authentication Local username and password database Cisco Secure Access Control Server (ACS) AAA Local Authentication Server-Based AAA Authentication
  • 9. AAA Local Authentication 1. Клиент рутертэй холболт тогтооно 2. AAA рутерт хэрэглэгчид зориулсан username болон password өгнө 3. Local database-г ашиглан рутер username болон password-оо адилтган танилт(authenticate) хийх ба local database дээрх мэдээлэл дээр тулгуурлан хэрэглэгчийг сүлжээнд хандах эрх(authorize)-г олгоно.
  • 10. AAA системийг өргөтгөх боломжтой бөгөөд давуу тал нь бүх системүүд хандалтын нэгдсэн удирдлагатай болно. ◦ Хандалтын тохиргооны удирдлага болон уян хатан шинж чанарыг сайжруулна ◦ Scalability ◦ Олон backup системүүдтэй Стандартлагдсан адилтган танилтын аргууд ◦ RADIUS, TACACS+ and Kerberos Server-Based AAA Authentication
  • 11. 1. Client нь рутертэй холболт тогтооно 2. AAA рутер дээр хэрэглэгчийн username болон password-г оруулна 3. Рутер алсын AAA серверийг ашиглан username болон password-г адилтган танилт хийнэ. 4. Алсын AAA серверийн мэдээлэл дээр үндэслэн хэрэглэгчид сүлжээнд хандах эрхийг олгоно. Server-Based AAA Authentication
  • 12. 1.Хэрэглэгч нэгэнт authenticate хийгдсэн бол AAA сервертэй session үүсгэж холболт тогтооно. 2.Рутер AAA серверээс authorization үйлчилгээг асуусан хүсэлтийг илгээнэ. 3.AAA сервер нь authorization-д зориулсан PASS/FAIL хариуг буцаана. AAA-Authorization
  • 13. 1.Хэрэглэгч нэгэнт адилтган танилт хийгдсэн бол AAA accounting-н үйл ажиллагаа нь мессежүүдийг үүсгэж эхэлнэ. 2.Хэрэглэгч хандалтаа дуусгах үед, мэдээллийг бичиж авахыг зогсоох ба accounting үйл ажиллагаа төгсөнө. 3.Хэрэглэгчийн хэзээ нэвтэрсэн, хэзээ гарсан, ямар коммандууд идэвхижүүлсэн, ямар хэмжээний пакет дамжуулсан зэрэг мэдээллийг billing, auditing болон reporting-д ашигладаг. AAA-Accounting
  • 14. •Алдаанд тэсвэртэй байлгахын тулд Local Authentication-г давхар тохируулж өгөх шаардлагатай •Хэрвээ authentication серверүүд ажиллахгүй бол Local Database-ээсээ authentication хийнэ. AAA – Multiple backup systems
  • 15. AAA нь стандарчлагдсан аюулгүй байдлын дараах протоколуудыг дэмждэг ◦ TACACS+ ◦ Terminal Access Controller Access Control System Plus ◦ Replaces legacy protocols TACACS and XTACACS ◦ RADIUS ◦ Remote Authentication Dial-In User Service AAA – Standardized Security Protocols
  • 16. Хэд хэдэн төрлийн хандалтын эрхийг тодорхойлох боломжтой. Үүнд: ◦ one-time authorization or authorization for each service, per-user account list and profile, user group support, … Зөвхөн хэрэглэгч authenticate хийгдсэн байгаа тохиолдолд, authorization үйлчилгээнүүдийг тодорхойлж болно: ◦ Хэрэглэгч хандаж чадах нөөцүүд. ◦ Хэрэглэгч гүйцэтгэхийг зөвшөөрсөн үйл ажиллагаанууд ◦ Жишээ нь:student хэрэглэгч зөвхөн Telnet-г ашиглан хост serverXYZ руу хандаж чадна As with authentication, AAA authorization is configured by defining a “named” list of authorization methods, and then applying that list to various interfaces. Authorization
  • 17. •Provides the method for collecting and sending security server information. •With AAA accounting activated, the router reports user activity to the TACACS+ security server in the form of accounting records. •Accounting is configured by defining a “named” list of accounting methods, and then applying that list to various interfaces. Accounting
  • 18. © 2012 Cisco and/or its affiliates. All rights reserved. 18 Local AAA Authentication тохируулах
  • 19. 1. Global configuration горимыг ашигласнаар AAA идэвхижүүлэх: ◦ aaa new-model 2. Ашиглах authentication аргын жагсаалтуудыг тодорхойлох: ◦ aaa authentication 3. Аргын жагсаалтыг тодорхой интерфейс юмуу line дээр харгалзуулах CLI Local Authentication Configuration Steps
  • 20. aaa new-model коммандаар AAA онцлогыг идэвхижүүлнэ. ◦ Одоо AAA коммандуудыг тохируулж чадна. ◦ no aaa new-model коммандаар AAA-г идэвхигүй болгоно. AAA идэвхижүүлэх R1(config)# aaa new-model
  • 21. Аuthentication төрлийг зааж тодорхойлох: ◦ Login - VTY болон con 0-н login-д зориулсан AAA-г идэвхижүүлнэ ◦ Enable - EXEC горимын хандалтанд зориулсан AAA-г идэвхижүүлнэ ◦ PPP - PPP-н хандалтанд зориулсан AAA-г идэвхижүүлнэ. Authentication тохируулах R1(config)# aaa authentication login
  • 22. •Хэрвээ өөр арга тодорхойлоогүй бол default method list нь бүх интерфейсүүд дээр автоматаар идэвхижинэ. •Бүх authentication аргуудыг тодорхойлоод гүйцэтгэхээсээ өмнө тодорхой интерфейс дээр заавал харгалзуулах ёстой Authentication тохируулах R1(config)# aaa authentication login SSH-LOGIN
  • 23. Methods list the types of authentication to be performed and the sequence in which they will be performed, such as: ◦ Pre-defined passwords (e.g., local, enable, or line) ◦ Consulting a TACACS+ / RADIUS / Kerberos server(s) Configuring Authentication
  • 24. Configure Authentication Methods Description enable Uses the enable password for authentication. line Uses the line password for authentication. local Uses the local username database for authentication. none Uses no authentication. group radius Uses the list of all RADIUS servers for authentication. group tacacs+ Uses the list of all TACACS+ servers for authentication. group group-name Uses a subset of RADIUS or TACACS+ servers for authentication as defined by the aaa group server radius or aaa group server tacacs+ command.
  • 25. Optionally, to lock out accounts that have excessive failed attempts, use: ◦ aaa local authentication attempts max-fail number-of- unsuccessful-attempts ◦ To remove the number of unsuccessful attempts that was set, use the no form of this command. Lock Accounts with Excessive Failed Attempts Keyword Description number-of-unsuccessful- attempts Number of unsuccessful authentication attempts before a connection is dropped. aaa local authentication attempts max-fail [number-of-unsuccessful-attempts] Router(config)#
  • 26. This command locks the user account if the authentication fails and the account stays locked until it is cleared by an administrator using: ◦ clear aaa local user lockout {username username | all} The command differs from the login delay command in how it handles failed attempts. ◦ The login delay command introduces a delay between failed login attempts without locking the account. Locking a User Account
  • 27. Add usernames and passwords to the local router database for users that need administrative access to the router. Enable AAA globally on the router. Configure AAA parameters on the router. Confirm and troubleshoot the AAA configuration. Configuring Local AAA Authentication R1# conf t R1(config)# username JR-ADMIN secret Str0ngPa55w0rd R1(config)# username ADMIN secret Str0ng5rPa55w0rd R1(config)# aaa new-model R1(config)# aaa authentication login default local R1(config)# aaa local authentication attempts max-fail 10
  • 28. A default list or a named list can be defined. ◦ A default list is automatically applied to all interfaces if no other method list is defined. ◦ A named list must be applied to a specific interface before any of the defined authentication methods will be performed. Using a Named List R1# conf t R1(config)# username JR-ADMIN secret Str0ngPa55w0rd R1(config)# username ADMIN secret Str0ng5rPa55w0rd R1(config)# aaa new-model R1(config)# aaa authentication login default local enable R1(config)# aaa authentication login TELNET-LOGIN local R1(config)# line vty 0 4 R1(config-line)# login authentication TELNET-LOGIN
  • 29. Display User Information R1# show aaa sessions Total sessions since last reload: 4 Session Id: 1 Unique Id: 175 User Name: ADMIN IP Address: 192.168.1.10 Idle Time: 0 CT Call Handle: 0 R1# show aaa local user lockout Local-user Lock time JR-ADMIN 04:28:49 UTC Sat Dec 27 2008
  • 30. Troubleshooting AAA Authentication R1# debug aaa ? accounting Accounting administrative Administrative api AAA api events attr AAA Attr Manager authentication Authentication authorization Authorization cache Cache activities coa AAA CoA processing db AAA DB Manager dead-criteria AAA Dead-Criteria Info id AAA Unique Id ipc AAA IPC mlist-ref-count Method list reference counts mlist-state Information about AAA method list state change and notification per-user Per-user attributes pod AAA POD processing protocol AAA protocol processing server-ref-count Server handle reference counts sg-ref-count Server group handle reference counts sg-server-selection Server Group Server Selection subsys AAA Subsystem testing Info. about AAA generated test packets R1# debug aaa
  • 31. Troubleshooting AAA Authentication R1# debug aaa authentication 113123: Feb 4 10:11:19.305 CST: AAA/MEMORY: create_user (0x619C4940) user='' ruser='' port='tty1' rem_addr='async/81560' authen_type=ASCII service=LOGIN priv=1 113124: Feb 4 10:11:19.305 CST: AAA/AUTHEN/START (2784097690): port='tty1' list='' action=LOGIN service=LOGIN 113125: Feb 4 10:11:19.305 CST: AAA/AUTHEN/START (2784097690): using "default" list 113126: Feb 4 10:11:19.305 CST: AAA/AUTHEN/START (2784097690): Method=LOCAL 113127: Feb 4 10:11:19.305 CST: AAA/AUTHEN (2784097690): status = GETUSER 113128: Feb 4 10:11:26.305 CST: AAA/AUTHEN/CONT (2784097690): continue_login (user='(undef)') 113129: Feb 4 10:11:26.305 CST: AAA/AUTHEN (2784097690): status = GETUSER 113130: Feb 4 10:11:26.305 CST: AAA/AUTHEN/CONT (2784097690): Method=LOCAL 113131: Feb 4 10:11:26.305 CST: AAA/AUTHEN (2784097690): status = GETPASS 113132: Feb 4 10:11:28.145 CST: AAA/AUTHEN/CONT (2784097690): continue_login (user='diallocal') 113133: Feb 4 10:11:28.145 CST: AAA/AUTHEN (2784097690): status = GETPASS 113134: Feb 4 10:11:28.145 CST: AAA/AUTHEN/CONT (2784097690): Method=LOCAL 113135: Feb 4 10:11:28.145 CST: AAA/AUTHEN (2784097690): status = PASS
  • 32. © 2012 Cisco and/or its affiliates. All rights reserved. 32 Server-Based AAA Authentication аргууд
  • 35.  The Cisco AAA family : – Terminal Access Control Access Control Server Plus (TACACS+) – Remote Dial-in User Services (RADIUS) protocols TACACS+ and RADIUS
  • 36. Client ба AAA серверүүдийг холбох протоколоор ашиглагдана TACACS+ нь илүү нууцлал хамгаалалт сайтай. (cолилцож байгаа бүх мессэжүүд нууцлагдана) Radius нь зөвхөн хэрэглэгчийн нууц үгийг нууцална. ◦ It does not encrypt user names, accounting information, or any other information carried in the radius message. TACACS+ ба RADIUS
  • 37. TACACS+ is a Cisco protocol that provides separate AAA services. ◦ Separating the AAA services provides flexibility in implementation, because it is possible to use TACACS+ for authorization and accounting while using another method of authentication. TACACS+ Authentication Connect Username prompt? Username? Use “Username” JR-ADMIN JR-ADMIN Password? Password prompt? “Str0ngPa55w0rd” Use “Password” Accept/Reject “Str0ngPa55w0rd”
  • 38. RADIUS, developed by Livingston Enterprises, is an open IETF standard AAA protocol for applications such as network access or IP mobility. ◦ RADIUS is currently defined by RFCs 2865, 2866, 2867, and 2868. The RADIUS protocol hides passwords during transmission but the rest of the packet is sent in plaintext. RADIUS Authentication
  • 39. RADIUS combines authentication and authorization as one process which means that when a user is authenticated, that user is also authorized. ◦ RADIUS uses UDP port 1645 or 1812 for authentication and UDP port 1646 or 1813 for accounting. RADIUS Authentication Username? JR-ADMIN Password? Str0ngPa55w0rd Access-Request (JR_ADMIN, “Str0ngPa55w0rd”) Access-Accept
  • 40. RADIUS is widely used by VoIP service providers because it passes login credentials of a session initiation protocol (SIP) endpoint, such as a broadband phone, to a SIP Registrar using digest authentication, and then to a RADIUS server using RADIUS. ◦ RADIUS is also a common authentication protocol that is utilized by the 802.1X security standard. The DIAMETER protocol is the planned replacement for RADIUS. ◦ DIAMETER uses a new transport protocol called Stream Control Transmission Protocol (SCTP) and TCP instead of UDP. RADIUS Authentication
  • 41. TACACS+ vs. RADIUS Feature TACACS+ RADIUS Functionality Separates AAA according to the AAA architecture, allowing modularity of the security server implementation Combines authentication and authorization but separates accounting, allowing less flexibility in implementation than TACACS+. Standard Mostly Cisco supported Open/RFC standard Transport Protocol TCP port 49 UDP port 1645 or 1812 for authentication UDP port 1646 or 1813 for accounting CHAP Bidirectional challenge and response as used in CHAP Unidirectional challenge and response from the RADIUS security server to the RADIUS client. Confidentiality Entire packet encrypted Only the password is encrypted Customization Provides authorization of router commands on a per-user or per- group basis. Has no option to authorize router commands on a per-user or per- group basis. Accounting Limited Extensive
  • 42. © 2012 Cisco and/or its affiliates. All rights reserved. 42 Server-Based AAA Authentication тохиргоо
  • 43. 1. Enable AAA by using the global configuration command: ◦ aaa new-model 2. Configure security protocol parameters: ◦ Server IP address and Key 3. Define the authentication method lists using: ◦ aaa authentication 4. Apply the method lists to a particular interface or line (if required). 5. Optionally configure authorization using the global command: ◦ aaa authorization 6. Optionally configure accounting using the global command: ◦ aaa accounting CLI Configuration Steps
  • 44. 1. Specify the location of the AAA server that will provide AAA services. 2. Configure the encryption key needed to encrypt the data transfer between the network access server and Cisco Secure ACS. Server-Based AAA Authentication
  • 45. AAA Configuration Commands Command Description tacacs-server host ip-address single-connection • Indicates the address of the Cisco Secure ACS server and specifies use of the TCP single-connection feature of Cisco Secure ACS. • This feature improves performance by maintaining a single TCP connection for the life of the session between the network access server and the Cisco Secure ACS server, rather than opening and closing TCP connections for each session (the default). tacacs-server key key • Establishes the shared secret encryption key between the network access server and the Cisco Secure ACS server. radius-server host ip- address • Specifies a RADIUS AAA server. radius-server key key • Specifies an encryption key to be used with the RADIUS AAA server.
  • 46. AAA Server Parameters тохируулах R1 192.168.1.100 192.168.1.101 Cisco Secure ACS Solution Engine using TACACS+ Cisco Secure ACS for Windows using RADIUS R1(config)# aaa new-model R1(config)# R1(config)# tacacs-server host 192.168.1.101 single-connection R1(config)# tacacs-server key TACACS+Pa55w0rd R1(config)# R1(config)# radius-server host 192.168.1.100 R1(config)# radius-server key RADIUS-Pa55w0rd R1(config)#
  • 47. Define Method Lists R1(config)# aaa authentication login default ? enable Use enable password for authentication. group Use Server-group krb5 Use Kerberos 5 authentication. krb5-telnet Allow logins only if already authenticated via Kerberos V Telnet. line Use line password for authentication. local Use local username authentication. local-case Use case-sensitive local username authentication. none NO authentication. passwd-expiry enable the login list to provide password aging support R1(config)# aaa authentication login default group ? WORD Server-group name radius Use list of all Radius hosts. tacacs+ Use list of all Tacacs+ hosts. R1(config)# aaa authentication login default group
  • 48. AAA Authentication Commands Parameter Description default • This command creates a default that is automatically applied to all lines and interfaces, specifying the method or sequence of methods for authentication. group group-name group radius group tacacs+ • These methods specify the use of an AAA server. • The group radius and group tacacs+ methods refer to previously defined RADIUS or TACACS+ servers. • The group-name string allows the use of a predefined group of RADIUS or TACACS+ servers for authentication (created with the aaa group server radius or aaa group server tacacs+ command). R1(config)# aaa authentication login default group tacacs+ group radius local
  • 49. Configuring the AAA ServerR1 192.168.1.100 192.168.1.101 Cisco Secure ACS Solution Engine using TACACS+ Cisco Secure ACS for Windows using RADIUS R1(config)# aaa new-model R1(config)# R1(config)# tacacs-server host 192.168.1.101 single-connection R1(config)# tacacs-server key TACACS+Pa55w0rd R1(config)# R1(config)# radius-server host 192.168.1.100 R1(config)# radius-server key RADIUS-Pa55w0rd R1(config)# R1(config)# aaa authentication login default group tacacs+ group radius local-case R1(config)#
  • 50. Troubleshooting Server-Based Authentication R1# debug aaa authentication AAA Authentication debugging is on R1# 14:01:17: AAA/AUTHEN (567936829): Method=TACACS+ 14:01:17: TAC+: send AUTHEN/CONT packet 14:01:17: TAC+ (567936829): received authen response status = PASS 14:01:17: AAA/AUTHEN (567936829): status = PASS
  • 51. Troubleshooting Server-Based Authentication R1# debug tacacs ? accounting TACACS+ protocol accounting authentication TACACS+ protocol authentication authorization TACACS+ protocol authorization events TACACS+ protocol events packet TACACS+ packets <cr> R1# debug radius ? accounting RADIUS accounting packets only authentication RADIUS authentication packets only brief Only I/O transactions are recorded elog RADIUS event logging failover Packets sent upon fail-over local-server Local RADIUS server retransmit Retransmission of packets verbose Include non essential RADIUS debugs <cr> R1# debug radius
  • 52. Troubleshooting Server-Based Authentication R1# debug tacacs TACACS access control debugging is on R1# 13:53:35: TAC+: Opening TCP/IP connection to 192.168.1.101 using source 192.48.0.79 13:53:35: TAC+: Sending TCP/IP packet number 416942312-1 to 192.168.1.101 (AUTHEN/START) 13:53:35: TAC+: Receiving TCP/IP packet number 416942312-2 from 192.168.60.15 13:53:35: TAC+ (416942312): received authen response status = GETUSER 13:53:37: TAC+: send AUTHEN/CONT packet 13:53:37: TAC+: Sending TCP/IP packet number 416942312-3 to 192.168.1.101 (AUTHEN/CONT) 13:53:37: TAC+: Receiving TCP/IP packet number 416942312-4 from 192.168.60.15 13:53:37: TAC+ (416942312): received authen response status = GETPASS 13:53:38: TAC+: send AUTHEN/CONT packet 13:53:38: TAC+: Sending TCP/IP packet number 416942312-5 to 192.168.1.101 (AUTHEN/CONT) 13:53:38: TAC+: Receiving TCP/IP packet number 416942312-6 from 192.168.60.15 13:53:38: TAC+ (416942312): received authen response status = FAIL 13:53:40: TAC+: Closing TCP/IP connection to 192.168.60.15
  • 53. © 2012 Cisco and/or its affiliates. All rights reserved. 53 Server-Based Authorization
  • 54. Use to limit the services available to a user. Router uses the user's profile information, located either in the local user database or on the security server, to configure the user's session. ◦ User is then granted access to a requested service only if the information in the user profile allows it. Authorization aaa authorization type { default | list-name } method1 … [method4] Router(config)#
  • 55. Command Authorization show version Command authorization for user JR-ADMIN, command “show version”? Accept JR-ADMIN Display “show version” output configure terminal Command authorization for user JR-ADMIN, command “config terminal”? Reject Do not permit “configure terminal”
  • 56. Configuring Authorization Type R1(config)# aaa authorization ? auth-proxy For Authentication Proxy Services cache For AAA cache configuration commands For exec (shell) commands. config-commands For configuration mode commands. configuration For downloading configurations from AAA server console For enabling console authorization exec For starting an exec (shell). ipmobile For Mobile IP services. multicast For downloading Multicast configurations from an AAA server network For network services. (PPP, SLIP, ARAP) prepaid For diameter prepaid services. reverse-access For reverse access connections template Enable template authorization R1(config)# aaa authorization exec ? WORD Named authorization list. default The default authorization list. R1(config)# aaa authorization exec default ? group Use server-group. if-authenticated Succeed if user has authenticated. krb5-instance Use Kerberos instance privilege maps. local Use local database. none No authorization (always succeeds). R1(config)# aaa authorization exec default group ? WORD Server-group name radius Use list of all Radius hosts. tacacs+ Use list of all Tacacs+ hosts.
  • 57. Configuring Authorization R1# conf t R1(config)# username JR-ADMIN secret Str0ngPa55w0rd R1(config)# username ADMIN secret Str0ng5rPa55w0rd R1(config)# aaa new-model R1(config)# aaa authentication login default group tacacs+ R1(config)# aaa authentication login TELNET-LOGIN local-case R1(config)# aaa authorization exec default group tacacs+ R1(config)# aaa authorization network default group tacacs+ R1(config)# line vty 0 4 R1(config-line)# login authentication TELNET-LOGIN R1(config-line)# ^Z
  • 58. © 2012 Cisco and/or its affiliates. All rights reserved. 58 Server-Based Accounting
  • 59. Defines the way accounting will be performed and the sequence in which they are performed. Named lists enable you to designate a particular security protocol to be used on specific lines or interfaces for accounting services. Accounting Router(config)# aaa accounting type { default | list-name } record-type method1 … [method2]
  • 60. R1(config)# aaa accounting ? auth-proxy For authentication proxy events. commands For exec (shell) commands. connection For outbound connections. (telnet, rlogin) delay-start Delay PPP Network start record until peer IP address is known. exec For starting an exec (shell). gigawords 64 bit interface counters to support Radius attributes 52 & 53. multicast For multicast accounting. nested When starting PPP from EXEC, generate NETWORK records before EXEC-STOP record. network For network services. (PPP, SLIP, ARAP) resource For resource events. send Send records to accounting server. session-duration Set the preference for calculating session durations suppress Do not generate accounting records for a specific type of user. system For system events. update Enable accounting update records. R1(config)# aaa accounting exec ? WORD Named Accounting list. default The default accounting list. R1(config)# aaa accounting exec default ? none No accounting. start-stop Record start and stop without waiting stop-only Record stop when service terminates. R1(config)# aaa accounting exec default start-stop? broadcast Use Broadcast for Accounting group Use Server-group R1(config)# aaa accounting exec default start-stop group ? WORD Server-group name radius Use list of all Radius hosts. tacacs+ Use list of all Tacacs+ hosts. Configuring Accounting
  • 61. Configuring Accounting Sample Config R1# conf t R1(config)# username JR-ADMIN secret Str0ngPa55w0rd R1(config)# username ADMIN secret Str0ng5rPa55w0rd R1(config)# aaa new-model R1(config)# aaa authentication login default group tacacs+ R1(config)# aaa authentication login TELNET-LOGIN local-case R1(config)# aaa authorization exec group tacacs+ R1(config)# aaa authorization network group tacacs+ R1(config)# aaa accounting exec start-stop group tacacs+ R1(config)# aaa accounting network start-stop group tacacs+ R1(config)# line vty 0 4 R1(config-line)# login authentication TELNET-LOGIN R1(config-line)# ^Z
  • 62. Router# debug tacacs Router# debug aaa authentication 13:21:20: AAA/AUTHEN: create_user user=’’ ruser=’’ port=’tty6’ rem_addr=’10.0.0.32’ authen_type=1 service=1 priv=1 13:21:20: AAA/AUTHEN/START (0): port= ‘tty6’ list=’’ action=LOGIN service=LOGIN 13:21:20: AAA/AUTHEN/START (0): using “default” list 13:21:20: AAA/AUTHEN/START (70215483): Method=TACACS+ 13:21:20: TAC+ (70215483): received authen response status = GETUSER 13:21:20: AAA/AUTHEN (70215483): status = GETUSER 13:21:23: AAA/AUTHEN/CONT (70215483): continue_login 13:21:23: AAA/AUTHEN (70215483): status = GETUSER 13:21:23: AAA/AUTHEN (70215483): Method=TACACS+ 13:21:23: TAC+ : send AUTHEN/CONT packet 13:21:23: TAC+ (70215483): received authen response status = GETPASS 13:21:23: AAA/AUTHEN (70215483): status = GETPASS 13:21:27: AAA/AUTHEN/CONT (70215483): continue_login 13:21:27: AAA/AUTHEN (70215483): status = GETPASS 13:21:27: AAA/AUTHEN (70215483): Method=TACACS+ 13:21:27: TAC+ : send AUTHEN/CONT packet 13:21:27: TAC+ (70215483): received authen response status = PASS 13:21:27: AAA/AUTHEN (70215483): status = PASS The debug tacacs and debug aaa authentication commands can be useful for troubleshooting AAA authentication problems. The example shows the output for a successful login attempt using TACACS+. Management Plane Authentication: AAA/TACACS+
  • 63. The debug aaa authorization output captured in this example shows the following events: The user (admin1) attempts to obtain an EXEC shell service, which requires authorization. The cmd parameter specifies a command that the user is trying to execute. If * is listed, it refers to plain EXEC access. The method used to authorize this access is TACACS+. The router sends the necessary information (user credentials) through TACACS+ to the security server. The security server verifies the authorization, determines that the user is not authorized to perform this function, and sends back a FAIL status response. Router# debug aaa authorization 2:23:21: AAA/AUTHOR (0): user= ‘admin1’ 2:23:21: AAA/AUTHOR (0): send AV service=shell 2:23:21: AAA/AUTHOR (0): send AV cmd* 2:23:21: AAA/AUTHOR (342885561): Method=TACACS+ 2:23:21: AAA/AUTHOR/TAC+ (342885561): user=admin1 2:23:21: AAA/AUTHOR/TAC+ (342885561): send AV service=shell 2:23:21: AAA/AUTHOR/TAC+ (342885561): send AV cmd* 2:23:21: AAA/AUTHOR (342885561): Post authorization status = FAIL Management Plane Authorization: AAA/TACACS+
  • 64. The debug aaa accounting output captured in the example shows a scenario where the default method was used, and that a user successfully gained access to the router’s EXEC shell. Router# debug aaa accounting May 10 14:48:33.011: AAA/ACCT/EXEC(00000005): Pick method list ‘default’ May 10 14:48:33.011: AAA/ACCT/SETMLIST(00000005): Handle 0, mlist 81CA79CC, Name default May 10 14:48:33.011: Getting session id for EXEC (00000005): db=82099258 May 10 14:48:33.011: AAA/ACCT/EXEC(00000005): add, count 2 May 10 14:48:33.011: AAA/ACCT/EVENT(00000005): EXEC UP Management Plane Accounting: AAA/TACACS+
  • 65. Management Plane: Common TACACS+ Issues Common TACACS+ failures can include the following: A TACACS+ server goes down or a device (TACACS client) cannot connect to the server. As a backup, configure the network device to use the local database for authenticating critical users. A device (client) shared key and the server’s shared key do not match. User credentials (username, password, or both) are rejected by the server.
  • 66. Management Plane: TACACS+ Issues – Cont. Router# debug tacacs Router# debug aaa authentication ! The TACACS+ server is down or the device has no connectivity to the server: TAC+: TCP/IP open to 171.68.118.101/49 failed- Connection refused by remote host AAA/AUTHEN (2546660185): status = ERROR AAA/AUTHEN/START (2546660185): Method=LOCAL AAA/AUTHEN (2546660185): status = FAIL As1 CHAP: Unable to validate response. Username chapuser: Authentication failure ! The key on the device and TACACS+ server do not match: TAC+: received bad AUTHEN packet: length = 68, expected 67857 TAC+: Invalid AUTHEN/START packet (check keys) AAA/AUTHEN (1771887965): status = ERROR ! Bad user name, bad password, or both: AAA/AUTHEN: free_user (0x170940) user= ‘chapuser’ ruser= ‘’ Port= ‘Async1’ rem_addr= ‘async’ authen_type=CHAP service=PPP priv=1 TAC+: Closing TCP/IP 0x16EF4C connection to 171.68.118.101/49 AAA/AUTHEN (2082151566): status = FAIL As1 CHAP: Unable to validate Response. Username papuser: Authentication failure
  • 67. Management Plane: Common RADIUS Issues The common RADIUS problems are similar to the common TACACS+ problems: ◦ The RADIUS server’s failure or loss of network connectivity ◦ Mismatch of the shared key between the RADIUS server and the network device (RADIUS client) ◦ User authorization failure (incorrect username, password, or both) ◦ Mismatch of RADIUS port numbers between the router and RADIUS server
  • 68. Management Plane: RADIUS Issues – Cont. Router# debug radius Router# debug aaa authentication ! The RADIUS server is down or the device has no connectivity to the server: As1 CHAP: I RESPONSE id 12 len 28 from “chapadd” RADIUS: id 15, requestor hung up. RADIUS: No response for id 15 RADIUS: No response from server AAA/AUTHEN (1866705040): status = ERROR AAA/AUTHEN/START (1866705040): Method=LOCAL AAA/AUTHEN (1866705040): status = FAIL As1 CHAP: Unable to validate Response. Username chapadd: Authentication failure As1 CHAP: 0 FAILURE id 13 len 26 msg is “Authentication failure” ! The key on the device and RADIUS server do not match: RADIUS: received from id 21 171.68.118.101:1645, Access-Reject, len 20 RADIUS: Reply for 21 fails decrypt NT client sends ‘DOMAINuser’ and Radius server expects ‘user’: RADIUS: received from id 16 171.68.118.101:1645, Access-Reject, len 20 AAA/AUTHEN (2974782384): status = FAIL As1 CHAP: Unable to validate Response. Username CISCOchapadd: Authentication failure As1 CHAP: 0 FAILURE id 13 len 26 msg is “Authentication failure” ! Username and password are correct, but authorization failed: RADIUS: received from id 19 171.68.118.101:1645, Access-Accept, len 20 RADIUS: no appropriate authorization type for user AAA/AUTHOR (2370106832): Post authorization status = FAIL AAA/AUTHOR/LCP As1: Denied ! Bad username, bad password, or both: RADIUS: received from id 17 171.68.118.101:1645, Access-Reject, len 20 AAA/AUTHEN (3898168391): status = FAIL As1 CHAP: Unable to validate Response. Username ddunlap: Authentication failure As1 CHAP: 0 FAILURE id 14 len 26 msg is “Authentication failure” As1 PPP: Phase is TERMINATING
  • 69. Агуулга Хэрэглэгчийн хандалтын удирдлага гэж юу вэ? Хандалтын удирдлагын аргууд Authentication system Authorization system Accounting system Директор үйлчилгээ
  • 70. Директор үйлчилгээ  Директор үйлчилгээ нь сүлжээний нөөцүүдийг төвлөрсөн удирдлагаар удирдах боломжтой юм.  Сүлжээний админ хэрэглэгчдийн нөөц рүү хандах хандалтыг удирддаг  Хэрэглэгч болон дундын нөөц хоорондын дундын түвшин юм  Үйлчилгээ:  Файл хуваалцах  Хэрэглэгчдийг адилтган таних  емэйл, интернэт, принтер гэх мэт үйлчилгээг удирдах  USB, хардын хэмжээг удирдана  Протокол:  Microsoft – ын Active directory service  Lightweight Directory Access Protocol (LDAP)
  • 71. Хэрэглэгчийн удирдлагын систем  Протокол:  Microsoft – ын Active directory service  Linux – Open LDAP  Lightweight Directory Access Protocol (LDAP)  Messaging Application Programming Interface (MAPI)  Security Accounts Manager (SAM)
  • 72. Active Directory Structure  Шаталсан бүтэцтэй  Обьектод суурилсан  Домэйн нэрийн системтэй OU Domain Domain OUOU Objects Domain Tree Domain Domain Domain Tree Forest
  • 73. Active Directory Structure example AD.sict.edu.mn
  • 74. Roles хэсгээс Актив директор Domain Services – ийг сонгоно www.themegallery.com COMPANY LOGO
  • 75. Create a new domain in a new forest – ийг сонгоно
  • 76. Хэрэглэгчийн компьютерийг домайнд нэгтгэх www.themegallery.com COMPANY LOGO
  • 77. Active Directory objects  “old friends”  User  Group  Computer  New Elements  Distribution list  System policies  Application defined custom objects
  • 78. Active directory configuration Зохион байгуулалтын нэгжийн нэрийг өгч үүсгэнэ www.themegallery.com COMPANY LOGO
  • 80. Active directory configuration Хэрэглэгчийн нэрийг firest name, full name, User logon name хэсгүүдэд бичнэ www.themegallery.com COMPANY LOGO
  • 81. Active directory policy Password Policy www.themegallery.com COMPANY LOGO
  • 82. Active directory policy нууц үгийг reset хийх www.themegallery.com COMPANY LOGO
  • 83. Active directory policy нууц үгийг reset хийх www.themegallery.com COMPANY LOGO
  • 84. Active directory policy USB оролт хаах www.themegallery.com COMPANY LOGO