|
|
Table Of Contents
Configuring the NAS for RADIUS
Sample Configuration for a Cisco 2509 Using RADIUS with Accounting Enabled
Sample Configuration for an ISP Using a Cisco AS5200
RADIUS Tunneling in a Multivendor LAC Environment
Configuring the NAS for RADIUS
Configuration for the network access server (NAS) using the Remote Access Dial-In User Service (RADIUS) protocol is similar to configuration for the Terminal Access Controller Access Control System (TACACS+) protocol.
This chapter describes:
•
Sample Configuration for a Cisco 2509 Using RADIUS with Accounting Enabled
•
Sample Configuration for an ISP Using a Cisco AS5200
Note
The information in this chapter applies to Cisco NASes; however, you can use the CiscoSecure Access Control Server (ACS) with other vendors' NASes. See your manufacturer's documentation for more specific information on configuring your NAS. Configure your NAS for RADIUS as you would normally; no special configuration is required.
For complete information about a specific Cisco IOS release or more detailed configurations, see the Router Products Configuration Guide or the Configuration Fundamentals Configuration Guide publication. (See "References and Recommended Reading.")
Note
For a sample configuration, see the "Sample Configuration for a Cisco 2509 Using RADIUS with Accounting Enabled" section and the "Sample Configuration for an ISP Using a Cisco AS5200" section. For more ready-to-use configurations, see the chapter "NAS Configuration Examples," in the CiscoSecure ACS 2.3 for UNIX Reference Guide for sample configurations that you can apply directly to your own NAS or modify according to your needs.
Global Configuration
The first steps in configuring the NAS are:
1.
Enable RADIUS.
2.
Specify the list of CiscoSecure ACSs that will provide AAA services for the NAS.
3.
Configure the encryption key that is used to encrypt the data transfer between the NAS and the CiscoSecure ACS.
To begin global configuration, enter the following commands, using the correct IP address of the CiscoSecure ACSes and your own encryption key:
Router(config)# aaa new-modelRouter(config)# radius-server host 144.1.12.100Router(config)# radius-server host 144.1.200.250Router(config)# radius-server key arachnidThe word "arachnid" is the encryption key shared between the NAS and the CiscoSecure ACS. The encryption key should be kept secret to protect the privacy of passwords sent between the CiscoSecure ACS and the NAS during the authentication process.
For backup purposes, you can specify multiple CiscoSecure ACSes by repeating the radius-server host command.
For a RADIUS-enabled NAS to use a CiscoSecure ACS, it must be added to the list of available RADIUS-enabled NASes in the NASes page of that ACS's Java-based CiscoSecure Administrator advanced configuration program.
Authentication on the NAS
The authentication configuration builds a set of authentication lists, each of which can be used for different purposes within the NAS. The syntax of the command is as follows:
aaa authentication login list_name method1 [method2] [method3] [method4]aaa authentication PPP list_name method1 [method2] [method3] [method4]As you can see, the AAA server requires an authentication for PPP in addition to an authentication for login before it will work properly.
Each of these command lines supports several arguments. A list name and one authentication method are required. Additional authentication methods are optional.
Each of the authentication methods is listed in Table 11-1.
In the following example, system administrators must use RADIUS authentication. If a CiscoSecure ACS is not available, use the NAS's local user database password. However, all other users must use only RADIUS:
aaa authentication login default radiusaaa authentication login admin radius localTo configure authentication at login on all lines on a 16-port NAS, enter the following commands:
line console 0login authentication adminline aux 0login authentication adminline vty 0 4login authentication defaultline 1 16login authentication default
CautionIf you do not include the enable method for system administrator logins, you will no longer be able to log in to your NAS unless you have a functioning CiscoSecure ACS appropriately configured with usernames and passwords. The addition of the enable method ensures that you will still be able to log in to the router if the router cannot contact a CiscoSecure ACS. The NAS will test the enable method only if it cannot contact a CiscoSecure ACS.
Excluding Ports
NAS ports can be excluded from using the CiscoSecure ACS by creating a separate authentication method list that does not include RADIUS as an authentication method. Depending on your needs, you create a separate authentication method list to fixed ports that do not need authentication, authorization, and accounting (AAA) services, or for all the vty ports.
In the following example, only the first two vty ports and the console are enabled for AAA services in the NAS configuration:
aaa new-modelaaa authentication login admin radius localaaa authentication login no_radius lineradius-server host 144.251.1.1radius-server key arachnid! The console and VTY lines 0 & 1 use RADIUSline console 0login authentication adminline vty 0 1login authentication admin! VTY Lines 2 - 4 do not use RADIUSline vty 2 4login authentication no_radiusAuthorization on the NAS
The NAS can use a CiscoSecure ACS to authorize specific commands by individual users. To authorize specific commands, you must use the following command syntax to specify which commands and actions will require authorization checks:
aaa authorization {network | connection | exec | commands level} methodsThe four items that can be checked for authorization are listed in Table 11-2.
The methods you can specify are listed in Table 11-3.
Using the command syntax specified above, you can configure the NAS to restrict the set of commands that an individual user can execute. To require that all commands entered by users at privilege level 1 be checked for ACS authorization, enter the following command:
aaa authorization commands 1 radius
CautionWhen you enter this command in your NAS, you will be permitted to execute only NAS commands that are allowed by your CiscoSecure ACS. Therefore, make sure you have configured an authenticated user who is authorized to run commands on the CiscoSecure ACS.
To require that the system administrators be authorized at level 15, enter the following command:
aaa authorization commands 15 radius if-authenticatedThis command uses RADIUS authorization level 15, but if problems arise you can switch off the CiscoSecure ACS and the authorization will then be granted to anyone who is authenticated.
Note
The NAS will test the if-authenticated method only if it cannot contact a CiscoSecure ACS.
Accounting on the NAS
The NAS must be specifically configured to send accounting records to the CiscoSecure ACS. Several types of accounting records are available. Use the following command syntax to configure accounting on the NAS:
aaa accounting {system | network | connection | exec | command level}{start-stop | wait-start | stop-only} radiusThe first set of keywords allows you to specify accounting of the events listed in Table 11-4.
You can specify when accounting records are to be sent by using the second set of keywords, which are listed in Table 11-5.
Use the following commands to record accounting information on NAS system events, network connections, outbound connections, EXEC operations, and commands at level 1 and level 15:
aaa accounting system start-stop radiusaaa accounting network start-stop radiusaaa accounting connection start-stop radiusaaa accounting exec stop-only radiusaaa accounting command 1 stop-only radiusaaa accounting command 15 wait-start radius
Note
Stop records contain elapsed time for connections and EXEC sessions.
Note
The aaa accounting command 0 start-stop command is not implemented in Cisco IOS Release 11.0. Check the release notes for your Cisco IOS release to determine whether it has been implemented.
Sample Configuration for a Cisco 2509 Using RADIUS with Accounting Enabled
The following is a sample configuration for a Cisco 2509 router using RADIUS with the accounting feature enabled:
Current configuration:!version 11.2service udp-small-serversservice tcp-small-servers!hostname as2509!aaa new-modelaaa authentication local-overrideaaa authentication login default radiusaaa authentication login no_radius localaaa authentication enable default enableaaa authentication ppp default radiusaaa authorization exec radius if-authenticatedaaa authorization network radiusaaa accounting exec start-stop radiusaaa accounting network start-stop radiusaaa accounting system start-stop radiusenable password secure!username cisco password 7 03175E08131D24username therzog password 7 09404B1D14001E1C59username root password 7 070C285F4D06ip address-pool localchat-script cisco-default ABORT ERROR "" "AT Z" OK "ATDT \T" TIMEOUT 30 \c CONNECT \cchat-script usr-courier-veverything "" "AT&FS0=1&C1&D2&H1&R2&N14&B1&W"chat-script factory-default "" "AT&F"!interface Ethernet0ip address 200.200.200.44 255.255.255.0no mop enabled!interface Serial0no ip addressshutdown!interface Serial1no ip addressshutdown!interface Async1ip unnumbered Ethernet0encapsulation pppsync mode interactivepeer default ip address 200.200.200.58no cdp enableppp authentication chap pap!interface Async2ip unnumbered Ethernet0encapsulation pppasync mode interactivepeer default ip address pool pool1no cdp enableppp authentication pap chap!interface Group-Async1ip unnumbered Ethernet0encapsulation pppno cdp enablegroup-range 3 8!ip local pool pool1 200.200.200.50 200.200.200.57no ip classless!radius-server host 200.200.200.41radius-server key as2509abcd!line con 0session-timeout 10exec-timeout 30 0login authentication no_radiustransport preferred noneline 1autoselect during-loginautoselect pppscript startup usr-courier-veverythingscript reset usr-courier-veverythingmodem InOutmodem autoconfigure type usr_couriertransport input allrxspeed 115200txspeed 115200flowcontrol hardwareline 2autoselect pppscript startup usr-courier-veverythingscript reset usr-courier-veverythingmodem InOutmodem autoconfigure type usr_couriertransport input allrxspeed 115200txspeed 115200flowcontrol hardwareline 3 8transport input allrxspeed 115200txspeed 115200flowcontrol hardwareline aux 0transport preferred nonetransport input allline vty 0exec-timeout 0 0width 102transport preferred noneline vty 1exec-timeout 0 0length 35width 127transport preferred noneline vty 2 4exec-timeout 0 0transport preferred none!endas2509#Sample Configuration for an ISP Using a Cisco AS5200
The following sample configuration for a Cisco AS5200 is typical of one that can be used by an Internet service provider (ISP) with a RADIUS installation. This configuration includes AAA, allowing the ISP to have centralized user management as well as accounting records necessary for billing:
!version 11.1service udp-small-serversservice tcp-small-servers!hostname isdn-14!aaa new-modelaaa authentication login default Radiusaaa authentication login console lineaaa authentication login secure radius localaaa authentication login vty lineaaa authentication ppp default Radiusaaa authentication ppp secure if-needed radius localaaa authorization exec radiusaaa authorization network radiusaaa accounting exec start-stop radiusaaa accounting network start-stop radius!username backup password radiusISdownip radius source-interface Ethernet0rlogin trusted-remoteuser-source localrlogin trusted-localuser-source radiusisdn switch-type primary-5ess!controller T1 0framing esfclock source line primarylinecode b8zspri-group timeslots 1-24!controller T1 1framing esfclock source line secondarylinecode b8zspri-group timeslots 1-24!interface Loopback0ip address 171.68.187.254 255.255.255.0!interface Ethernet0ip address 172.16.25.15 255.255.255.224!interface Serial0no ip addressshutdown!interface Serial1no ip addressshutdown!interface Serial0:23ip unnumbered Loopback0encapsulation pppisdn incoming-voice modempeer default ip address pool defaultdialer rotary-group 1dialer-group 1!interface Serial1:23ip unnumbered Loopback0encapsulation pppisdn incoming-voice modempeer default ip address pool defaultdialer rotary-group 1dialer-group 1!interface Group-Async1ip unnumbered Loopback0ip tcp header-compression passiveencapsulation pppasync mode interactivepeer default ip address pool defaultdialer-group 1ppp authentication chap pap securegroup-range 1 48!interface Dialer1ip unnumbered Loopback0encapsulation ppppeer default ip address pool defaultppp multilinkppp authentication chap pap securedialer-group 1!ip local pool default 171.68.187.1 171.68.187.48ip domain-name cisco.comip name-server 171.68.10.70no ip classlessasync-bootp dns-server 171.68.10.70!radius-server host 172.16.72.41radius-server host 172.16.72.42radius-server timeout 3radius-server key MYSECRET!dialer-list 1 protocol ip permit!line con 0login authentication consolepassword ciscoline 1 48session-timeout 15 outputautoselect during-loginautoselect ppplogin authentication securemodem InOuttransport input allline aux 0line vty 0 4login authentication vtypassword secret!endCHAP-Challenge Attribute
CiscoSecure ACS for UNIX supports the CHAP-Challenge(60) RADIUS attribute.
RADIUS Tunneling
CiscoSecure ACS supports the following attributes for use with RADIUS tunneling.
RADIUS Tunneling in a Multivendor LAC Environment
To use RADIUS tunneling in a multivendor L2TP Access Concentrator (LAC) environment in which the non-Cisco LAC sends a fully qualified name in the form of user@domain_name (one that might incorporate 3Com LACs, for example), follow these additional configuration steps. This allows CiscoSecure ACS for UNIX to handle fully qualified names in the form of user@domain_name.
Step 1
Install CiscoSecure ACS for UNIX according to the instructions in the CiscoSecure ACS 2.3 for UNIX Installation Guide.
Step 2
Edit the CSU.cfg file and set config_remote_domain_authen to 1.
Step 3
Start CiscoSecure ACS.
Step 4
Using the graphical user interface (GUI), Click AAA->Domain and enter the name of the remote domain(s) in the LAC CiscoSecure ACS AAA server field.
Step 5
Click AAA->Re-Initialize to reinitialize the AAA server.
Step 6
Set up the remote domain profiles as follows:
•
Specify password=no_password.
•
Do not specify User-Password (attribute 2) as a check item.
•
In reply_attributes, specify User-Service-Type (attribute 6) to be Outbound-User (5).
For example:
user = l2tp.com{password = no_passwordradius=Cisco12.05 {reply_attributes= {6=564=:1:365=:1:167=:1:"204.183.122.143"69=:1:"tunpass"82=:1:"sp_lac"}}}
Posted: Wed Feb 16 10:09:43 PST 2005
All contents are Copyright © 1992--2005 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.