Cisco AAA/Identity/Nac :: 1900 Series ISR Router - Local User Management VPN
Oct 3, 2012
I'm a bit new to Cisco and i find this AAA a bit confusing..I've turend on AAA by:aaa new-model
Can I use this "default" list for WebVPN ? And what would be a different if i create new "sslvpn" list..Also when I'll be creating user for VPN remote access.. that user will also exist in local database and have access to router via SSH?Because the research I've done it doesn't seem you can group users in different "aaa groups" e.g. user admin belongs under "admin" aaa group which can do ssh to router, users for VPN can only do remote VPN access and not SSH and login into router.i saw ASA has some attribute for users called remote-user
•admin, in which users are allowed access to the configuration mode. This option also allows a user to connect via remote access.
•nas-prompt, in which users are allowed access to the EXEC mode.
•remote-access, in which users are allowed access to the network.
But i can't find this option in IOS on my 1900 Series ISR router.
I want to have a local user in ACS that is permitted to login to routers. I have TACACS with AD already working but cannot get a local user to work. I used to do this in ACS 4.x.I created a user in the internal identity store.I tried configuring a policy to allow this users TACACS authentication multiple ways to no avail. I cannot find a config example doc and cannot figure it out from the user guide as the documention is sorely lacking.
Is there a router (1900-3900 series router) that will support a 100FX fiber connection. We use to use 2800-3800 and 2600-3700 series routers with FX fiber interface now these routers are no longer available and our need for 100Mbps FX is still a requirement.
I've got a problem with DHCP running on a cisco 1900 series router, 1921 to be precise. The Data VLAN works perfectly, i configured a ip helper address and its working. Problem tough is VLAN 20. This is the voice vlan. As u can see in the config below, this has been configured using VRRP and VRF for failover purposes. I did more of these configurations, and they all worked fine, just not with this particular router!
As u will notice i deleted all the not needed to know information or i X'ed it!
Jan-Aart version 15.1 service timestamps debug datetime msec
how I can assign a static IP to a user in ACS 5.2. I am able to do it in ACS 4.2, but I don't see the same options under 5.2. General idea is that users authenticate from our VPN appliance via RADIUS, and upon authentication, their static IP is passed back to the VPN device. I can attach an arbitrary field to my local users by going to System Administration -> Configuration -> Dictionaries -> Identity -> Internal Users, but how do I get that IP address passed back when the user is authenticated via Radius?
I know the way to configure the ASA to fallback to LOCAL authentication, if the Radius server is not available.
Now we would like to authenticate the local users, if the user is not found in the AD. Is this possible and how can I configure this with the new policies? I tested it with "dropping" when the user is not found in the AD, but then the Radius server will be marked as "dead" and the other AD users can't login for a given period. Maybe we can configure the dead time to 0, but this is not as nice it could be.
i have a cisco 1900 series router from the isp and we connect it the our router the rv042 small biz, and we have here a cisco catalyst 2950 switch with just default configuration connected to the hosts.
my problem is from time to time that the connection is lost there is no connection with the router and the only solution is to turn off and on the cisco 1900 router and the connection will be back.
do we need to configure the routers and switches? what do you need to configure?
i am running NX-OS image n5000-uk9.5.1.3.N1.1.bin on the nexus 5020 platform.i have configured authorization with tacacs+ on ACS server version 5.2 with fall back to switch local database.a user test with priv 15 is craeted on ACS server, password test2 everything works fine, until i create the same username on the local database with privilege 0. ( it doesnt matter if the user in local database was created before user in ACS or after ) e.g.: username test password test1 role priv-0 (note passwords are different for users in both databases)
after i create the same user in local database with privilege 0,if i try to connect to the switch with this username test and password defined on ACS, i get only privilege 0 authorization, regardless, that ACS server is up and it should be primary way to authenticate and authorizate the user.
I am trying to configure an ASA 5505 running 8.3 to allow a priv 15 local user to be able to ssh into the device and be placed into priv 15 mode without having to execute the enable command and type the enable password.Right now when you log in as a priv 15 user you still have to execute the enable command and type the enable password to get to priv 15.
I bought 1921-SEC-k9 so i have security license installed: Technology Package License Information for Module:'c1900' [code] Now I'd like to know if SSL VPN comes with that license or do I need to buy additional VPN SSL license to use it? If so.. i'd just use IPsec... i need client-to-site configuration.. can you point me to tutorial or just a basic config.. because for ipsec i just find site-to-site tutorials on internet.
I can see the console on the router. (Using the USB console connected to a Macintosh.) I was configuring the router though this console connection, and I created a new user (priv level 15) and removed the default 'cisco' user. So I'm stuck at the username/password login prompt now.
I decided to do the password recovery procedure (via the cisco doc I found etc), but I cannot break into ROMMON during the boot process. I'm not sure if that's because my Mac isn't sending the break, or what.
The pw recovery doc says you can "remove flash" if you can't break into the boot sequence. However, I cannot find any instructions on how to remove the flash. I've opened the router, and I see one very small daughter card on the main board that I think is the flash, but I'm not about to start arbitrarly prying parts off.
Sure this is a simple one. New to the 1900 series routers, have a 1921 with IOS 15.1. Noticed that there is a standard interface labeled Embedded-Service-Engine0/0. What the purpose of this is? Cannot seem to find any detail on it. See extract from default config below.
We have been using a dhcp and tftp server to automatically configure branch WAN routers such as 1751's and 1841's for years but, have recently purchased a 1921 and 1941 as possible next generation replacements. The problem is when the 1900 series power up instead of getting a dhcp address directions to the tftp server it boots up and asks for the user name to be immediately changed or you will be "locked out". Any workaround to this so that I can again go back to download my common configuration? Or any other way of automatically configuring the newer version ios? Doing extra steps for 500 WAN branch routers is time consuming. Doing configurations without automation for that many is moving in the wrong direction.
I am using 3945E Router as Easy VPN Server, with 15.1 IOS. On router I have bunch on usernames for VPN authentication, I want to restrict Router management access for them(ssh,telnet, http and so on).
Currently 2811 series router is configured for site to site VPN, CAN I configure USER VPN on the same box. We want Users to connect to VPN Server using Cisco VPN Client. best authentication method for USER VPN
I just found a slightly unsettling bug in the E4200v2 (running the latest firmware 2.0.36 build 126507).Administration > Local Management Access > Access via Wireless ... set to DISABLED. HOWEVER, when I attempted to access the web interface on a handy iPAD I had absolutely no problem getting through to the web interface (after providing username and passsword).Limiting access to wired clients seems like a simple a prudent measure ... which is why this option is there for the paranoid among us.This seems like a black-and-white bug.
I am using an E2500 as an access point, which is working fine. I have an Ethernet cable on one of the LAN ports of the E2500 connected to a LAN port on my gateway router. The LAN address of the E2500 is 192.168.7.3 and the LAN address of the gateway router is 192.168.7.1. Clients on the E2500 wireless network have no problems getting to the Internet through the gateway router. Clients on the E2500 wireless network can reach the E2500 local management port at 192.168.7.3 on port 80. On the gateway router I am forwarding WAN port 8083 to LAN address 192.168.7.3 at port 80. But I cannot access the E2500 local management interface via the gateway router. The E2500 should see the request as from 192.168.3.1 due to NAT in the gateway router, right? I can reach any of my actual access points this way, just not a router being used as an access point. Security/design limitation of the router?
We are running ACS 5.2 patch 6 and want to restrict access for users to be able to add devices to the system.For example, admin person in site A can only add devices into the site A group and cannot see/access other sites groups.
I'm trying to add an extended ACL (120) to an 800 series router (887) using Network Objects to allow the management user IP range full access to IP services and restricted access to email only for standard user IP range. However as soon as I apply the ACL to the outbound of my Vlan no matter what is in the ACL my PC looses internet connectivity. I've tried adding an explict allow for my IP address and still no access so I'm thinking possible a NAT issue, please have a look at my attached config and let me know what you think. Would I be better trying to control data flow with ZBF? I want to restrict standard users to email access only during the work day with web access and IM access after hours along with blocking all P2P programs for standard users at any time. Management group will have unrestricted access to all IP protocols. My original plan was to use time based ACL's!
I just bought a new Cisco SRP527w and I'm just new on this kind of equipment. I can't locate the user management tab as I'm trying to change the default password.Also, I can't access the internet. My dsl modem rj45 is connected to the WAN/LAN port with IP Static settings.
We have just bought 4 WAP4410N. These units will be handling wireless network at the edge of our network, only allowing for Internet access.We will be creating two SSID's, one for employees and another for guests, with different wireless password rotation policies, intended to be changed automatically by an application using SSH.Is it possible in any way to create another SSH user just for this purpose? I do feel unconfortable using the management user for this (call it paranoia!). The same with having SSH accessible from the wireless end. Any way I can tweak sshd and having it persist between reboots? Also, another issue is that we have the AP's configured for e-mailing the log however we don't receive it. Connectivity and sending has been tested with snmpc on console and everything seems to be OK.
We have quite a few 3560 & 2960 on our edge network - what I have been looking at was to access switches via web-interface i.e. web-browser. Only problem with this is it always gives you access on privilige level 15 which is not ideal as not all who we decide to give access to these switches will be admin and allowed to configure these swicthes - In the 3560/2960 data-sheet states:
"Alternatively, a local username and password database can be configured on the switch itself. Fifteen levels of authorization on the switch console and two levels on the Web-based management interface provide the ability to give different levels of configuration capabilities to different administrators"
Where as there is no mention of how to configure these two levels of Web-based management in the configuration guide.
We are currently looking to upgrade (re-design) our wireless network at our college. Any experience going from a local, controller-based wireless network to a cloud-based controller? If so, what have you found the pros and cons to be?
If you thought about going to a “cloud solution”, what stopped you?
We are currently running wireless at our 3 primary campus locations, and looking to add it to our 3 satellite locations. We use 4402 WLCs at our primary locations with a mix of 1140 and 1240 APs.
I want to limit a local user's access to some specific groups of devices. In Role Management Setup I can define which service they can access, but I want to restrict it to a specific device as well.
Only fifteen users are allowed to connect on the WLAN Controller WLANs provided on the 600 series at any one time. A sixteenth user cannot authenticate until one of the first clients de-authenticates or a timeout occurred on the controller. Note: This number is cumulative across the controller WLANs on the 600 series. For example, if two controller WLANs are configured and there are fifteen users on one of the WLANs, no users will be able to join the other WLAN on the 600 series at that time. This limit does not apply to the local private WLANs that the end user configures on the 600 series designed for personal use and clients connected on these private WLANs or on the wired ports do not affect these limits. This is from the Configuration Guide for teh 600 series Office Extend AP. Is this count per AP or total per WLC? If I have 10 APs deployed to our remote users, can each AP support two simultaneous users? Would I need to use separate WLANs for each OEAP?
A quick query regarding setting up a local user on a Cisco 2811. I have setup a few users as they need to have remote VPN access into our edge router, this works fine and I'm happy with it. The only thing is that when they come into the office they now have logins to get onto the router, they do not have the enable secret so they can't exactly do a lot (plus I've created them with privilege 0 which cuts a few extra CLI options) but I'd rather not allow them access at all if possible.If they weren't on DHCP then I could setup an access-list but this isn't really an option, I could also set me up statically and deny everyone else, but yet again I'd rather not.Is there anyway to restrict telnet/ssh access based on user alone? So when they put in their login it just boots them out. I could setup something like RADIUS (and therefore remove the local users completely) but I think it will be a bit over kill for the sake of a couple of users.
We are wanting to use local database users to authenticate our SSH connections to our 6500 cores.
We have added the usernames and password into the 6500 using
username anameduser password astrongpassword or username anameduser secret astrongpassword
We where expecting the commands to be the same as other iOS devices example C3750 we would add.
Line vty 0 4 login local
And this would allow us to use the local user database to authenticate our ssh sessions.
The login local commands are not availbe on the 6500s and we have not found any documentation on how to impliment a local database for this purpose except in a CatOS 6500.
I have a 3845 router (12.4(13r)T10) with ZBF. On my LAN there is a user who need to access a remote IPSEC VPN server. He is able to get the tunnel but afterwards he cannot connect to any service in the remote LAN. As I'm using zbf I think that I should inspect traffic from my LAN zone to EXT zone, There is a document that describe a solution to this? What IP adressess should I use?
I have a 3845 router (12.4(13r)T10) with ZBF. On my LAN there is a user who need to access a remote IPSEC VPN server. He is able to get the tunnel but afterwards he cannot connect to any service in the remote LAN. As I'm using zbf I think that I should inspect traffic from my LAN zone to EXT zone