cc/td/doc/solution/sesm/sesm_317
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Configuring SESM Features

Configuring SESM Features

This chapter describes how to configure the following SESM features:

Automatic Service Connections

An automatically connected service is a service that SSG connects immediately after the subscriber authenticates, without requiring the subscriber to explicitly select the service. This section describes two topics related to automatic connections:

Configuring Automatic Services

In general, if a service is marked as an auto connect service, the SSG performs the automatic connection after the subscriber authenticates. There is a special case with SESM in LDAP mode in which SESM is involved with automatic connection.

Configuring a Service for Automatic Connection

A subscriber profile specifies services for automatic connection. The subscriber profile also controls whether or not the service is hidden or not. If an auto connect service is hidden, it does not appear in the service list displayed on a service connection page.

In RADIUS mode, to configure a service for automatic connection, use the Account-Info A attribute in the subscriber profile. See Table C-6 for more information.

In LDAP mode, to configure a service for automatic connection:

Configuring SESM to Request Automatic Connections in LDAP Mode

In LDAP mode, the SSG performs automatic connections if it has the service list. If SSG does not have the service list, the SESM application can perform the automatic connections. During RDP installation, the Add Services option configures RDP to either:

The service information consumes memory on the SSG host.

In this case, you can configure the SESM application to perform automatic connections. The following line in the application MBean configuration file (for example, nwsp/config/nwsp.xml) controls whether the SESM web application performs automatic connections:

    <Set name="autoConnect" type="boolean">false</Set>
Change the value to true to enable automatic connections by the SESM web application.

To change the setting of the RDP service list option, reinstall RDP.

Subscriber Experiences with Automatic Connections

This section describes the behavior of the SESM portal application regarding automatically connected services.

Connection Status for Auto Connect Services

The status page in an SESM portal shows the status for all services, including automatically connected services. In NWSP, the selection page includes service status indicators for each service listed. Hidden services are not listed. See the "Configuring a Service for Automatic Connection" section for an explanation of a hidden service.

Immediately after logging in, the service status for auto connect services might display as not connected. This happens if the service indicators display before the connection is completed. Proxy and tunnel services, for example, can take a while to connect. If the subscriber refreshes the window or selects the status window, the automatically connected services display with a connected status.

Pop-Up Window for Auto Connect Services

If the subscriber's home URL is set to an autoconnect service, the pop-up window for the service might appear before the connection completes. If this occurs, the following message appears in the pop-up window:

Page cannot be displayed.

The URL is correct. If the subscriber waits a short time and resubmits the request using the URL already displayed in the window, the service pages appear.

Changing the Auto Connect Property for a Service

In LDAP mode, a subscriber can use the SESM self-management features to select or deselect the auto connect property. These changes are recorded immediately in the LDAP directory, but the change is not effective immediately. Changes are not visible in SESM until the cache timeout period in RDP elapses.

For example, a subscriber might select the auto connect property for a service, log out of SESM, log back in, and notice that the service was not automatically connected. Caching in the RDP causes this delay.

Caching in RDP improves system performance. The deployer can turn off caching or reduce the cache period, but those actions impact performance.

Disconnecting Auto Connect Services

A subscriber can disconnect an auto connected service at any time. The disconnected status persists as long as the subscriber remains authenticated. The SESM single sign-on option affects whether a subscriber remains authenticated across SESM sessions. If the subscriber has to reauthenticate after the SESM session expires, the SSG reconnects all auto connect services.

The SESM session might expire, for example, because the subscriber closed the browser or navigated away from the SESM pages. When the SESM session expires:

We recommend running SESM portal applications with single sign-on turned on.

Location Awareness

This section describes the SESM location awareness features. It includes the following topics:

You can enhance location awareness features with arbitrary attributes, as described in the "Arbitrary Attributes" section.

Overview of Location Awareness

The SESM location awareness feature relies on the physical location characteristics of an edge session. SESM obtains this location information from the SSG as part of the session's initial connection request. The specific attributes used to determine the location, and hence the location branding, are configurable. The location attributes can consist of the client IP address., client subnet, MAC address, VPI/VCI, SSG subinterface, and MSISDN, depending on the network deployment, and are valid even before the session authenticates.

The SESM portal can use the location as a dimension in the user shape to help determine the resources to use in the returned JSPs.


Note   Location and locale are two different dimensions of the user shape. The locale dimension identifies subscriber language and character set preferences. SESM obtains the locale from the subscriber browser settings. The locale is available before the subscriber authenticates.

Some examples of using location information in customized SESM portals are:

Location Awareness Configuration Methods

SESM offers two ways to configure location awareness. Table 10-1 describes these two methods.


Table 10-1: Location Attributes
Feature MBean Attributes That Determine Location Restrictions

Location awareness using complete ID attributes

Note   This is the recommended method for defining location awareness.

Location MBean

One of the following attributes or a combination of attributes:

More attributes might be added in future releases.

Requires the SSG complete ID feature in one of the following Cisco IOS releases:

  • Release 12.3(1)T

  • Release 12.2(8)B, X train

Location awareness using IP subnets

SSG MBean

One of the following:

  • If the port-bundle host key feature is used—SSG IP address subnetwork ranges

  • If the port-bundle host key feature is not used—Subscriber IP address subnetwork ranges

Does not work if load balancing is implemented.

Will be phased out in future releases.

If both of the above location awareness methods are configured for the same SESM portal, the location derived from the IP subnet method takes precedence. If the session does not match the criteria configured for the IP subnet method (in the SSG MBean), then the portal examines the complete ID criteria in the Location MBean.

Using Location to Control the Look and Feel of Portal Pages

When the SESM portal identifies the location (based on configured attributes), it sets the "LOCATION" attribute in the SESMSession object created for the subscriber. For the location determination to be meaningful, the portal must use the "LOCATION" attribute. For example:

Location Names

Any value is acceptable for a location name, but the name must match the intended uses. For example:

    nwsp
      webapp    london    newyork    paris

Configuring Location Awareness Based on Complete ID Attributes

The complete ID is the complete set of identifying attributes available about an edge session. SSG makes this set of attributes available to SESM. The SESM location awareness feature uses a subset of the complete ID attributes. The complete ID attributes that are currently supported for location awareness are listed in Table 10-1.


Note   To use location awareness based on complete ID, your SSG platforms must be running Cisco IOS Release 12.3(1)T or the X train for Release 12.2(8)B.

Use the Location MBean to define location names and the attributes that are associated with each location. For information about the Location MBean, see the "Multikey Authentication" section.

Using Multiple Attributes for the Same Location

You can use multiple attributes to define a location. For example, the installed nwsp.xml file configures a "paris" location that applies to all sessions with a VPI from 1 to 3 on the subinterface ATM3/0. Both requirements must match for the location to apply to a session.

Each attribute definition in a location is restricted to one value or one range. However, you can define more than one location with the same name using the same attributes, but with different attribute values. For example, you could define two "london" locations, each one using a different IP address range.

Using Duplicate, Overlapping and Nested Attributes for Different Locations

This section describes the situation when a session's attributes match the criteria for more than one location. SESM offers two ways to resolve the location in these cases:

Implementing Nested and Overlapping Locations

To implement nested or overlapping locations, you can customize the portal to use the getLocations method. This method returns an iterator over all the locations that match the attributes for the session, in the order that the locations appear in the configuration file.

Overlapping Locations

Overlapping locations occur when there is a possibility of sessions existing that match more than one location. They may or may not be defined on the basis of the same parameter types.

In the following example, two locations overlap for sessions with a client IP address in the range 10.4.0.0 to 10.8.0.0.

In the following example, two locations overlap for sessions with a client IP address in the range 10.0.0.0 to 10.8.0.0 that are connected via the subinterface Ethernet 0/0.

Nested Locations

Nested locations are a specialization of the overlapping concept. Nesting occurs when one location is a subset of another. In the following example, Location A is nested inside location B.

When defining nested interfaces, it is usually best to define the smallest location first. In the example above, this would be Location A. This is because only the first match is returned when looking for a single location, so any nested locations would effectively get hidden if they were not placed in the configuration before the location they are nested inside.

There is no restriction on how deeply locations can be nested.

Configuring Location Awareness Based on IP Address Subnets

To configure locations based on IP address subnets, use the SSG MBean. Use setSubnetAttribute entries with the SESSION_LOCATION argument. The following example from nwsp.xml shows the attributes required for location awareness:

<Call name="setSubnetAttribute"><Arg>ipAddress</Arg><Arg>mask</Arg>
    <Arg>SESSION_LOCATION</Arg><Arg>location</Arg></Call>

Table 5-5 describes how to format subnet entries. The following points relate specifically to location awareness:

Example 1—Location Associated with Subscriber IP Addresses

The following example associates locations with subscriber subnets. The example associates a different subscriber network with each of the three example locations defined in Step 2. In the NWSP application, when subscribers from the 144.0.0.0 network point their browsers to the NWSP URL, they receive a page containing the words New York under the NWSP logo.

<Call name="setSubnetAttribute"><Arg>10.0.0.0</Arg><Arg>255.0.0.0</Arg>
    <Arg>SESSION_LOCATION</Arg><Arg>london</Arg></Call>
<Call name="setSubnetAttribute"><Arg>1.0.0.0</Arg><Arg>255.0.0.0</Arg>
    <Arg>SESSION_LOCATION</Arg><Arg>paris</Arg></Call>
<Call name="setSubnetAttribute"><Arg>144.0.0.0</Arg><Arg>255.0.0.0</Arg>
    <Arg>SESSION_LOCATION</Arg><Arg>newyork</Arg></Call>
Example 2—Location Associated with SSG IP Address

When the port-bundle host key feature is configured on the SSG, location must be associated with an SSG IP address, rather than the subscriber's IP address. In the following example, the IP address is an SSG source IP address included in the port mappings during port-bundle host key configuration.

<Call name="setSubnetAttribute"><Arg>10.52.199.20</Arg><Arg>255.255.255.255</Arg>
    <Arg>SESSION_LOCATION</Arg><Arg>london</Arg></Call>

Demonstrating Location Awareness

The NWSP application illustrates location awareness by changing the look of the banner on the NWSP logon page. The location determines which city name appears in the NWSP logo. The installed nwsp/docroot directory includes subdirectories for three locations: london, paris, and newyork. These subdirectories contain the images used in this demonstration. If you want to use different city values, you must provide the corresponding images. The application code that displays the banner is in locationDimension.jsp.

Demonstration Procedure Using Complete ID Attributes

To demonstrate location awareness based on Complete ID attributes, use the following procedure:


Step 1   Install SESM in RADIUS or LDAP mode, using a typical or custom installation. (Do not use Demo.)

Step 2   Comment out the location subnet entries in the SSG MBean.

Step 3   Edit the Location MBean to include a specific IP address for the "paris" location. Use the IP address of a client machine that is available for the demonstration. Use the same IP address in the start and end parameters.

For example:

    <Set name="name">london</Set> <Set name="parameters"> <Array class="com.cisco.sesm.core.location.LocationParameter"> <Item> <New class="com.cisco.sesm.core.location.IPRangeParam"> <Set name="start" type="String">needIPaddress</Set> <Set name="end" type="String">needIPaddress</Set> </New> </Item> </Array> </Set>

Step 4   Add a new location to the Location MBean for "newyork." (Use this value because the installed files include a subdirectory and an image for the newyork value.) For example, insert these lines into the locations array:

<Item> <New class="com.cisco.sesm.core.location.Location">
    <Set name="name">newyork</Set> <Set name="parameters">
      <Array class="com.cisco.sesm.core.location.LocationParameter">    <Item>       <New class="com.cisco.sesm.core.location.IPRangeParam">          <Set name="start" type="String">needIPaddress</Set>          <Set name="end" type="String">needIPaddress</Set>       </New>    </Item> </Array>
    </Set>
</New> </Item>

Step 5   Start NWSP using the NWSP startup script.

Step 6   Open browsers on each of the client systems.

Step 7   From each browser, go to the SESM URL. For example, go to http://serverName:8080.

Step 8   Notice the images in the banners on each browser. One should say London; the other should say New York.

Step 9   On a third machine, repeat steps 7 through 9. The banner should not include a city name, because the third browser's IP address is not associated with any location in the configuration file.


Demonstration Procedure Using Subnet Entries

To demonstrate location awareness based on subnet entries, use the following procedure:


Step 1   Install SESM in Demo mode.

Step 2   Edit setSubnetAttribute parameters in the SSG MBean to include specific IP addresses for two different client machines that are available for the demonstration. For example:

<Call name="setSubnetAttribute"><Arg>NEED_REAL_IP_ADDRESS</Arg><Arg>255.0.0.0</Arg>
    <Arg>SESSION_LOCATION</Arg><Arg>london</Arg></Call>
<Call name="setSubnetAttribute"><Arg>NEED_REAL_IP_ADDRESS</Arg><Arg>255.0.0.0</Arg>
    <Arg>SESSION_LOCATION</Arg><Arg>paris</Arg></Call>

Step 3   Start NWSP using the NWSP startup script.

Step 4   Open browsers on each of the client systems.

Step 5   From each browser, go to the SESM URL. For example, go to http://serverName:8080.

Step 6   Notice the images in the banners on each browser. One should say London; the other should say Paris.

Step 7   On a third machine, repeat steps 7 through 9. The banner should not include a city name, because the third browser's IP address is not associated with any location in the configuration file.


Arbitrary Attributes

This section describes the arbitrary attribute feature. It includes the following sections:

Description of Arbitrary Attributes

The arbitrary attribute feature lets the deployer create any arbitrary attribute and associate it with other known attributes. To use the arbitrary attribute feature, you configure a multidimensional table consisting of the known attribute values and the arbitrary attributes you are associating.

For example, NWSP uses arbitrary attributes to associate URLs with locations. In this case, the elements in the multi-dimensional table are as follows:

At run time, SESM constructs a reference table holding all of the configured values. The arbitrary attribute values are available for use by the SESM portal. For example, NWSP uses arbitrary attributes associated with locations to help determine the initial URL for an Internet service pop-up window.

Configuring Arbitrary Attributes

To configure the SESM portal to associate arbitrary attribute values to locations, use the following procedure:


Step 1   In the WebApp MBean, use addDimension calls to configure the arbitrary attribute reference table.

Step 2   The format for an addDimension call is:

<Call name="addDimension"> <Arg type="int">attributeID</Arg> <Arg>attributeKey</Arg> <Arg>attributeResult</Arg>

An example from nwsp.xml is:

<Call name="addDimension"> <Arg type="int">1</Arg> <Arg>london</Arg> <Arg>
http:\\www.london.com</Arg>

Where:


Demonstrating Arbitrary Attribute Assignments in NWSP

The arbitrary attribute used in this demo determines the first URL that the browser attempts to display after the subscriber connects to an Internet service. The code that implements this demo is in initUser.jsp. The code determines the initial URL as follows (the second item uses the arbitrary attribute feature):

    1. If the subscriber request was captured by the SESM Captive Portal application, the subscriber's initial URL request is used.

    2. Otherwise, if a location in an addDimension call matches the LOCATION attribute from the SESMSession object, the URL associated with the location is used.

    3. Otherwise, if the subscriber profile includes a non-blank H attribute, that URL is used.

Demonstration Procedure

To demonstrate the use of an arbitrary attribute to control an item on a JSP page, use the following procedure.


Step 1   Configure location awareness. You can use either location awareness method: subnets configured in the SSG MBean, or complete ID attributes configured in the Location MBean.

Step 2   Edit the parameters to the addDimension calls in the WebApp MBean. Make sure the second argument in the addDimension call matches exactly the location strings you defined for location awareness. The installed nwsp.xml file contains the following lines:

<Call name="addDimension"> <Arg type="int">1</Arg> <Arg>london</Arg> <Arg>
http://www.london.com</Arg> </Call> <Call name="addDimension"> <Arg type="int">1</Arg> <Arg>paris</Arg> <Arg>http://www.paris-france.org/</Arg> </Call>

Step 3   Start NWSP using the NWSP startup script.

Step 4   Start a browser on a system whose location was configured in Step 1.

Step 5   Go to the NWSP URL.

Step 6   Login using the following values:

Step 7   Select the Internet service from the NWSP service list (if the Internet service was not automatically configured.)

A service pop-up window appears, attempting to go to the URL in the addDimension call. For example, the london location attempts to go to www.london.com.


Personal Firewalls

This section describes how to configure and use the SESM personal firewall features. Topics are:

Overview of Firewall Features

The SESM personal firewall feature provides a way for subscribers to restrict or permit traffic to and from their connection by making choices on web portal pages. Deployers can also apply firewall controls on subscriber traffic.

The NWSP application includes two personal firewall pages:

The deployer-imposed firewall controls cannot be changed by the subscriber. The deployer-imposed controls are added to subscriber profiles using CDAT. These controls have a higher priority and can therefore override the personal firewalls entered by subscribers.

Required Deployment Options

The SESM firewall features are supported only when SESM is running in LDAP mode with RDP deployed in non-Proxy mode. The SSG (or some other cooperating network element that can process extended access control lists) is required.

Underlying Technology

The underlying technology for the SESM personal firewall features is extended access control lists (ACLs). The ACLs are attributes in subscriber profiles in an LDAP directory.

The ACLs are stored in the subscriber profiles as a standard RADIUS attribute with number 26 (vendor specific attribute), subattribute number 1 (Cisco AV-pair). A subscriber profile might have many ACL entries, which together determine which traffic is permitted and denied on the connection.

The ACLs are added to the profile in two ways:

SESM and SSG (or another cooperating network element) implement the personal firewall ACLs as follows:

Firewall Priorities

The SSG or other cooperating network element applies the ACLs in a subscriber's profile, in a prioritized order, to each packet. When the conditions specified in an ACL match the packet, the permit or deny action specified in the ACL is applied to the packet, and no further ACLs are examined for that packet.The order in which ACLs are applied affects the filtering outcome.

In the SESM ACLs in a subscriber profile, priority is based on an ACL number . (The lowest ACL number is applied first.) The ACL numbering scheme used by SESM enforces the following general priorities:

See the "ACL Number Assignments" section for a description of how SESM assigns the ACL numbers to ensure that the most specific ACLs are applied first, and the more general ACLs last.

My Firewall Page

Figure 10-1 shows the NWSP My Firewall page as it appears if there are no ACLs in the subscriber profile, or if the only ACLs in the profile are deployer-imposed ACLs. (Deployer-imposed ACLs are ones with ACL numbers in the 100 to 109 range.)


Figure 10-1:
My Firewall Page in NWSP


A description of the My Firewall page follows.

When a subscriber profile contains one or more ACLs, an implicit default denies all other traffic not addressed by the existing ACLs. This deny-all-else implicit default is imposed by the Cisco router hosting the SSG or other cooperating network element.

The Permit All Else or Deny All Else radio buttons offer a way for the subscriber to explicitly impose a default behavior. A deployer could decide not to display these buttons and allow the implicit behavior to operate. In this case, the page would not need the Deny button next to each application.

When firewalls are enabled, the subscriber must consider whether to permit or deny traffic for each of the applications listed on the Firewall page. To do this, the subscriber can:

Lists the applications available for firewall settings. This list is configured by the deployer, as described in the "Configuring the Firewall Pages" section. For each application in the list, the subscriber can specify whether to deny or permit traffic. The ACLs that NWSP generates for this page will specify that all source and all destination IP addresses are subject to the control being defined in the ACL.

First Time Access of My Firewall Page

The default state of a subscriber profile is one in which no ACLs are defined. The first time the subscriber goes to the My Firewall page, the settings are:

When ACLs exist in the subscriber profile, the SESM portal analyzes the ACLs and renders the page based on the ACLs, as described in the previous section.

Advanced Firewall Page

Figure 10-2 shows the Advanced Firewall page.


Figure 10-2:
Advanced Firewall Page in NWSP


A description of the Advanced Firewall page follows.

See the Subscriber Edge Services Manager Web Developer Guide and the SESM javadoc for more information about development options for JSP pages.

The mask for ACLs is inverted from the more familiar net mask. Bits in the mask are zero if the respective bit in the address should match. For example, if the ACL should filter addresses x.x.x.0, then the mask is 0.0.0.255.

Configuring the Firewall Pages

To configure the SESM firewall features, use the Firewall MBean, described in the "Firewall MBean" section.

Configuring the Application/Protocol List on the My Firewall Page

The Application/Protocol list on the My Firewall page is configured by the deployer as follows:

Configuring the Drop Down Lists on the Advanced Firewall Page

The contents of the drop down lists on the Advanced Firewall page are configured by the deployer as follows:

ACLs Generated from Entries on the Firewall Pages

This section describes the ACLs that are automatically generated by the SESM portal. The section includes the following topics:

Viewing Generated ACLs

The deployer administrators can view all ACLs in a subscriber profile using CDAT. The ACLs appear in the Local RADIUS attribute field. The field contains all ACLs automatically generated by the SESM portal as a result of subscriber actions on the basic and advanced firewall pages, as well as any administrative ACLs directly entered by the deployer.

Depending upon CDAT privileges, which are assigned within CDAT, the administrator might be permitted to add, change and delete ACLs from the profile through CDAT.

NWSP does not provide a way for subscribers to view the generated ACLs.

Generated ACLs for the My Firewall Page

This section describes the ACLs that are automatically generated by NWSP from entries on the My Firewall page.The My Firewall page always results in ACLs that filter on:

Subscribers must use the Advanced Firewall page to create ACLs that filter on specific addresses or multiple port numbers.

The ACLs generated from the My Firewall page are in the following form:

[inacl# | outacl#]Number=permission protocol any any eq portNumber [established]

Where:

All TCP connections require a return path. A block on upstream traffic also affects the traffic traveling in the opposite direction, and vice-versa, if there is no ACL allowing established connections in the same direction as the block. For example, blocks on downstream traffic and an ACL allowing established connections on downstream traffic would allow the TCP upstream traffic.

The choice of whether to control the in or out direction in the My Firewall ACLs is a matter of preference for the deployer to decide. All ACLs generated from the My Firewall page use the same direction.

For more information, see the "Firewall MBean" section.

My Firewall Example

Figure 10-3 shows an example My Firewall page.


Figure 10-3: My Firewall Example


The settings shown in Figure 10-3 result in the following ACLs:

Cisco_AV:ip:inacl#196=deny ip any any

Cisco_AV:ip:outacl#196=deny ip any any

Cisco_AV:ip:outacl#129=permit tcp any any established

Cisco_AV:ip:inacl#128=deny tcp any any eq 21

Cisco_AV:ip:inacl#128=permit tcp any any eq 23

Cisco_AV:ip:inacl#158=permit tcp any any eq 25

Cisco_AV:ip:inacl#158=permit tcp any any eq 109

Cisco_AV:ip:inacl#158=permit tcp any any eq 110

Cisco_AV:ip:inacl#158=permit tcp any any eq 143

Cisco_AV:ip:inacl#138=permit tcp any any eq 80

Cisco_AV:ip:inacl#138=permit tcp any any eq 443

Generated ACLs for the Advanced Firewall Page

This section describes the ACLs that are automatically generated by the SESM portal based on subscriber entries on the Advanced Firewall page. The ACLs generated from the Advanced Firewall page are in the following form:

{inacl# | outacl#}Number=permission protocol {any | sourceIPaddress sourceMask} [operator port]
{any | destinationIPaddress destinationMask} [operator port] [established]

Where:

All connections have a return path. A block on upstream traffic also affects the traffic traveling in the opposite direction, and vice-versa. The choice of whether to control the in or out direction in the Advanced Firewall is a matter of preference for the subscriber.

Advanced Firewall Example

Figure 10-4 shows sample settings on the Advanced Firewall page.


Figure 10-4: Advanced Firewall Example


The settings shown in Figure 10-4 result in the following ACLs:

Cisco_AV:ip:inacl#118=permit tcp any any eq 21

Cisco_AV:ip:outacl#118=deny tcp any eq 21 any

Cisco_AV:ip:inacl#193=permit ip any any

Cisco_AV:ip:outacl#193=permit ip any any

ACL Number Assignments

ACL numbers affect the order in which the SSG or other cooperating network element applies ACLs to the packet. Lower numbers are processed first. ACL processing stops the first time the ACL conditions match the packet information, and the deny or permit action in the matching ACL is carried out. The ACL number, therefore, can affect the filtering outcome.

ACL numbers are not permanent. Each time a subscriber uses the firewall pages to add or change ACL entries, the SESM portal reexamines all ACLs in the subscriber's profile and reassigns ACL numbers.

When the portal assigns ACL numbers to the automatically generated ACLs, it enforces the conventions and priorities described in Table 5-1.


Table 10-2: ACL Numbers for Automatically Generated ACLs
Priority ACL Number Explanation

Highest Priority

100 - 109

Reserved for administrative ACLs.

110 - 119

ACLs from the Advanced Firewall page, when no application is specified. The explanation below for the 3rd digit applies to these ACLs as well.

120 - 189

ACLs from the My Firewall page. The numbers within this range are assigned as follows:

  • 1st digit—Is always 1 (1xx)

  • 2nd digit—Indicates the number of ACL entries that currently exist in the subscriber's profile for the same application:

    • 12x—Applications with 1 ACL entry

    • 13x—Applications with 2 ACL entries

    • ...and so on

    • 18x—applications with 7 or more ACL entries

  • 3rd digit—Indicates how specific the IP addresses and ports are, with lower numbers (higher priority) given to ACLs containing the most specific address and port information:

    • 1x0—Not used.

    • If neither source nor destination addresses are "any":

    1x1—Both source and destination ports are specified
    1x2—Either source or destination port is specified
    1x3—Neither source nor destination port is specified
    • If either source or destination addresses is "any"

    1x4—Both source and destination ports are specified
    1x5—Either source or destination port is specified
    1x6—Neither source nor destination port is specified
    • If both source and destination ports are "any"

    1x7—Both source and destination ports are specified
    1x8—Either source or destination port is specified
    1x9—Neither source nor destination port is specified

Example: A profile contains two ACLs for the same application, both with specific source addresses, destination addresses of "any", and no ports. The ACL number for both is 136.

190 not used

191 - 193

Internet protocol (IP) settings on the Advanced Firewall page:

  • 191—Both source and destination addresses are specified

  • 192—Either source or destination address is specified

  • 193—Neither source nor destination address is specified

Lowest priority

194 - 196

Internet protocol (IP) settings on the My Firewall page:

  • 194—Both source and destination addresses are specified

  • 195—Either source or destination address is specified

  • 196—Neither source nor destination address is specified

Subscriber Experiences with Personal Firewalls

This section describes how the personal firewall feature works from the subscriber point of view.

Creating Personal Firewalls

Subscribers create their personal firewalls by clicking radio buttons on the My Firewall page. The SESM portal creates the ACLs based on the information from the My Firewall page and adds the ACLs to the subscriber profile in the LDAP directory.

When New ACLs Take Effect

Although the LDAP directory is updated with the new information, the new ACLs do not take effect until a subscriber reauthenticates (logs out and logs in again). Also, the RDP cache must be refreshed, which by default takes 10 minutes. Due to the possibility of just having missed a refresh, the minimum guaranteed time is double the cache refresh time.

Interaction Between Entries on the My Firewall and Advanced Firewall Pages

The ACLs created from the Advanced Firewall pages have higher priority than ACLs created from the My Firewall page. Therefore, the subscriber might see filtering information on the My Firewall page that does not get applied to traffic because it is overridden by filters on the Advanced Firewall page.

Similarly, ACLs created by administrators (if they use the reserved ACL numbers 100 through 109) have the highest priority. Therefore, the subscriber might see filters on either the My Firewall or Advanced Firewall page that does not get applied to traffic because it is overridden by the administrative filters.

Safeguards

SESM and SSG include the following safeguards regarding firewalls:

Deployer-Imposed Firewalls

This section describes how to configure and use the administrative firewall feature. It includes the following topics:

Restrictions

Deployer-imposed firewalls can be used in conjunction with the subscriber self-configured firewalls, with the following restrictions:

In SESM Release 3.1(7), you must enter a correctly formatted ACL in CDAT. CDAT does not analyze or validate your ACL entry.


Caution   The SSG does not allow a subscriber to authenticate if the profile contains an incorrectly formatted ACL.

The ACL numbers from 100 to 109 are reserved for administrator use. By using these numbers, you ensure that these ACLs are processed first, making them the highest priority.

If you create ACLs in CDAT using ACL numbers in the range from 110 to 196, (the ACLs reserved for use by the subscriber self-configured ACLs), you risk the following:

Procedure for Entering ACLs in CDAT

To enter deployer-imposed ACLs, use the following procedure:


Step 1   Start the CDAT application.

Step 2   Log in as an administrator with permissions to modify subscriber profiles.

Step 3   Access the subscriber or group profile.

Step 4   Enter the ACLs in the Local RADIUS attribute field, using the format described in the following section.

Step 5   If a subscriber is currently logged into an SESM session, the new ACLs do not take effect until the subscriber reauthenticates (logs out and logs in again). Also, the RDP cache needs to be refreshed, which by default takes 10 minutes. Due to the possibility of just having missed a refresh, the minimum guaranteed time is double the cache refresh time.


ACL Format for CDAT Entries

This section describes the format of the firewall entries in the Local RADIUS attribute field in CDAT. The ACLs entered in CDAT can use the full range of ACL options as described in the Cisco IOS documentation for extended ACLs.

The general format for the Local RADIUS attribute field is:

attribute:value

In the case of the firewall ACL entries:

The format of the ACLs entered by administrators is:

Cisco_AV:ip:directionacl#ACLnumber=permission protocol source destination

Where:

ACLs whose numbers are in the range 100 to 109 will have higher priority than any ACLs created by subscribers using the My Firewall page. (The range of ACL numbers reserved for use by the My Firewall page is 110 to 196.)

ACLs whose numbers are in the range 100 to 109 cannot be modified by the subscriber (because the My Firewall page will not modify ACLs whose numbers are in that range), although the subscriber can delete those ACLs along with all others with the Disable Firewall button.

{any | IPaddress mask} [portOperator portNumber]

where portOperator values are: lt (less than), gt (greater than), eq (equal), neq (not equal), and range (inclusive range). The range operator requires two port numbers. All other operators require one port number.

Example

The following examples, using ACL number 100, were set by an administrator in CDAT.

Cisco_AV:ip:inacl#100=permit tcp any 10.0.0.0 0.0.0.0 eq 80

Cisco_AV:ip:outacl#100=permit tcp any any established


Note   There is an implicit deny at the end of an ACL list. When an ACL list exists, only explicitly permitted traffic is permitted.

References for More Information about Access Control Lists

The SESM firewall feature creates extended ACLs. For more information about ACL formats and processing, refer to the Cisco IOS documentation on extended ACLs. The following references point to documentation for Cisco IOS Release 12.2:

http://www.cisco.com /
univercd/cc/td/doc/product/software/ios122/122cgcr/fipr_c/ipcprt1/1cfip.htm#xtocid14

http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fipras_r/1rfip1.htm

Multikey Authentication

To implement multikey authentication:

    1. Add the authentication fields to the portal logon page.

This step requires portal customization. SESM is installed with an example 3-field authentication page that you can implement The example authentication fields are: username, password and telephone number. (Telephone number is the RADIUS attribute CALLING_STATIOIN_ID).

To change the NWSP logon page to prompt for these three keys and process them:

<servlet-class>com.cisco.sesm.webapp.control.AccountLogonControl</servlet-class>
to: <servlet-class>com.cisco.sesm.webapp.control.AccountLogon3KeyControl</servlet-class>
<param-value>/pages/accountLogon.jsp</param-value>
to: <param-value>/pages/accountLogon3Key.jsp</param-value>

    2. In LDAP mode, configure RDP to authenticate on the same fields that are specified on the logon page.

You can configure RDP to use any number of fields for authentication. Any standard RADIUS attribute field is a valid key.

    3. In RADIUS mode, logic to authenticate with multiple keys must exist in the RADIUS server you are using. Verify that this logic exists with your RADIUS server vendor.

    4. Make sure that the subscriber profiles includes the values against which to authenticate. In LDAP mode, administrators can enter the APN and NAS identifier attributes as group values. See the Cisco Distributed Administration Tool Guide for more information.

Quality of Service

Quality of Service (QoS) features control IP traffic transmission rates. The QoS features in SESM deployments are implemented using SSG hierarchical policing features. See the SSG documentation for information about enabling and configuring hierarchical policing. See the "Related Documentation" section for an URL to the online location of SSG documents.

SSG supports per-subscriber and per-service hierarchical policing. The parameters that implement these policies are specified in subscriber and service profiles:

See the "Configuring Service Profiles" section and the "Configuring Subscriber Profiles" section for a summary of RADIUS profile formats. See the Cisco Distributed Administration Tool Guide for information about creating profiles in an LDAP directory.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Fri Oct 18 10:01:13 PDT 2002
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.