Cisco AAA/Identity/Nac :: ACS 5.2 AAA Role Based In Nexus 5.1

Feb 7, 2011

I am using ACS 5.2 and attempting to authorize users through TACACS to Nexus 5.1 code.  I seem to have ACS setup correctly based on documentation I received through here.  The problem is that the NX/OS doesnt seem to be operating as expected. 

View 2 Replies


ADVERTISEMENT

Cisco AAA/Identity/Nac :: Nexus 5K With Free-Radius Assigning Network-operator Role

Apr 26, 2011

my customer has FreeRadius, and I'm trying to get the server to assign a network admin role to a 5K running 5.0.3 code.This is based on the example given in this document: url...The server authenticates the user name, but will only put the user into the network operator role. This is confirmed by checking the output of show user-account and debug security user-db.The Radius test using the same credentials passes the authentication test. I'm sure the problem is that the N5K dosent understand the VSA format of the attribute, and that this is a simple syntax problem.

View 2 Replies View Related

Cisco WAN :: Role Based CLI In C2800Nm

Sep 20, 2011

I am having a problem trying to get to my root view. I am trying to set up some views to allow restricted access to one of our routers.I am running C2800NM-ADVIPSERVICESK9-M Version 12.4(20)T as the IOS and have the following AAA entries in my config

View 1 Replies View Related

Cisco Switching/Routing :: 6509 User / Role Based Commands

Sep 8, 2012

I  want to give limited access to our first level support so that they can execute certain basic commands like, port vlan change, access port shut/no-shut on Cisco 6509 and 3750E switches IOS based. I want to restrict them to only few options so they can not make changes to uplink (TenGig) ports and can not issue reload command etc. We do not have TACACS. What is the best way to achieve this?

View 2 Replies View Related

Cisco Switching/Routing :: Role Base Access Control On Nexus 5000?

Oct 25, 2011

Login to N5k is managed centrally from a cisco ACS server ver 5.2
 
Goal: Role base access for (1) Network Admin and (2) Storage admin in such a way that network guy  and storage guy has  controll on their seperate domain.

View 1 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.2 And Role-base CLI Views?

May 3, 2011

Is there any way to link the Role-based CLI views created in the AAA  client to the user created in the ACS 5.2 server? I know that you could do  that in ACS 4.2 by using the “cli-view-name” attribute.What  I have in mind is to login with some user and that the ACS 5.2 server  links this user with a view previously created in the AAA client:This is what I would like to achieve:view configured in the AAA client:parser view DiData  secret 5 $1$jPNA$gr9o8gGNmWh9sk8Axbfx91  commands exec include copy running-config ftp  commands exec include copy running-config  commands exec include copy startup-config ftp  commands exec include copy startup-config  commands exec include copy  commands exec include all show Login to the device using a user created on ACS 5.2 and linked to the above DiData view:
 
telnet xx.xx.xx.xx
 username: cenetacspassword:
 Router#?Exec commands:  <1-99>  Session number to resume  copy    Copy from one file to another  enable  Turn on privileged commands  exit    Exit from the EXEC  show    Show running system information
 Router#

Typing the command "enable view something" is not an option for us.

View 1 Replies View Related

Cisco :: Nexus 1000v QoS Based On IP ACL?

Mar 28, 2012

I want to apply QoS policy on a particular VM for specified port range only. I  have created following script file but that doesnt work. I mean it doesnt apply any policy on vm residing on Veth1.
 
config t
ip access-list acl_in
101 deny tcp any any eq 443
exit

[Code].....

View 1 Replies View Related

Cisco WAN :: Use Nexus Technology Over 6500 Based VSS In Enterprise

Feb 1, 2011

we need to use Nexus technology over 6500 based VSS in entreprise ?

View 1 Replies View Related

Cisco WAN :: Nexus 7010 - Advertise Default Route Based On HSRP State

Sep 24, 2012

I've got two Nexus 7010's running HSRP north bound to a pair of ASA's, and BGP south bound to four 6509's. Is it possible to advertise default route to BGP neighbor (or prefer it via MED), only if the node is HSRP-active?

Essentially the goal is to create symmetry for inbound/outbound traffic. Only way I can think of so far is via an EEM script, so that when it sees  HSRP go active via syslog, it would kick off an action to remove ASN prepend,  or reduce MED, and the opposite if HSRP goes standby.

View 2 Replies View Related

Cisco Switching/Routing :: Prioritization Of Voice Traffic On An Uplink On Nexus 5500 Based On DSCP EF?

Jan 20, 2013

I have a Nexus 5500 which is the core of our network and we have access layer switches uplinked to it. I know by default the qos markings will be trusted.

1. On a trunk uplink from an access layer switch to the Nexus, I have "mls qos trust dscp". Will the DSCP marking be preserved when it reaches the Nexus?

2. How do I do prioritization of voice traffic on an uplink on Nexus based on DSCP EF?

View 3 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.3 Group Mapping Based On (G-CRP-SEC-ENG)

Apr 30, 2012

I am configuring a new ACS 5.3 system. Part of the rules is that I want to match the users specific AD group membership, and match appropriatly to an identity group.What i'm trying to do is say that if the user is a member of the AD Group (G-CRP-SEC-ENG) then associate them with the Identity Group SEC-ENG. The under the access service, authorization portion, i assign shell profiles and command sets based on Identity Group.It seems that the ACS server will not match the AD Group for the user, and it will match the Default of teh Group Mapping portion of the policy every time.
 
I tried several configuration choices from : AD1:ExternalGroups contains any <string showing in AD>, AD1:memberOf <group>.Is there something special i need to do in the Group Mapping Policy to get it to match and active directory group and result in assigning the host to an Identity Group?

View 7 Replies View Related

Cisco AAA/Identity/Nac :: Device Access Based Upon NDG Using ACS 5.2?

Mar 15, 2012

I have 2 types of network, DC & Office. I have 3 types of users NOC, Office & DC. Office network devices are in Office NDG, DC network devices are in DC NDG. Becasue of such config, Office network users can only access Office devices & DC network users can only access DC network devices....Now i have NOC users, who wants access to both Office & DC network devices. How can i achieve this?

View 6 Replies View Related

Cisco AAA/Identity/Nac :: ACS 4.2 Certificate Based Authentication And Windows 7

Jan 9, 2012

We use a combination of Cisco ACS and Cisco catalyst 3560 switches for network authentication and authorization. Clients (Windows XP) have a certificate installed which will grand access to the network and put them in the correct VLAN. So far, so good. Some users are testing with Windows 7 in the same set-up as above and run into strange behaviour. The problem is that after a random timer the machine gets de-authenticated and nothing besides a reboot works to get the computer authenticated again (from a Windows point of view). It looks like this only happens to users who are using a certificate to authenticate, Windows 7 MAC bypass users have no such problems. If it occurs, the following logging appears in ACS: [code] We are using ACS 4.2(0) Build 124 and 3560-48PS switches with IOS 12.2(55).

View 4 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.3 Authorization Of User Based On MAC Address

Aug 23, 2012

A short background. Our corporate SSID is being migrated from using PEAPv0 to EAP-TLS. This restricts access only to company notebooks. Additionally we have barcode scanners which are used to inventory assets. Those devices are not able to use EAP-TLS as they cannot be integrated in the domain and being unable to do certificate based authentication.
 
As a workaround we planned to use another SSID with access to the same network but using PEAPv0 as authentication method, basically the same SSID but with a different name. As this naturally allows anyone to access the corporate network with a valid username/password I now wanted to add another step into the authentication process - the MAC of the device. I know I can do the filtering at the WLAN controller, but as it has a limited database as well as the fact that it is cumbersome to maintain the MAC list on all the controllers I thought I can do it over our ACS system.
 
I am now trying to accomplish the following: The user gets authenticated via the internal user store, which is succesful. Now I want to authorize the user via the MAC address, which is stored in the internal host store of the ACS, if access is granted or not.
 
For this I created the following policy:
 
Service Selection Policy -- (Rule based result selection)

-- (NDG:Device Type in All Device Types:Wireless And RADIUS-IETF:Called-Station-ID contains <SSID>) | Result: PEAP access

-- Default | Result: DenyAccess
 
Service PEAP access Identity: Internal Users -- (Single result selection) Authorization -- (Rule based result selection) -- Internal Hosts:HostIdentityGroup in All Groups:Valid_MACs
 
When I then try to access the wireless network I won't get authenticated. The error I get, when I look into the logs is: 15039 Selected Authorization Profile is DenyAccess
 
Is it not possible to use one identity store as "attribute database" for the other identity store?

View 5 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.3 - Certificate Based Network Access Using AD

Mar 23, 2012

How to implement certificate based 802.1x authentication network access using ACS5.3 & external identity store as AD.

View 13 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.2 Assign VLAN Based On AD Group?

Apr 18, 2011

I'm trying to configure ACS 5.2 to assign the VLAN to a user dynamically based on the AD group that the user belongs to. I've gone into:
 
Users and Identity Stores -> External Identity Stores -> Active Directory -> Directory Groups tab
 
and selected the group name from the AD. If I understand correctly, I should now see this group under:
 
Policy Elements -> Authorization and Permissions -> Network Access -> Authorization Profiles -> Common Tasks -> VLAN ID/Name
 
However, it does not. Am I missing something?

View 2 Replies View Related

Cisco AAA/Identity/Nac :: ACS 4.2 - IP Pool Allocation Based On NAS Port IP Address

Jul 7, 2010

using ACS 4.2 and I can't find a way to bind an incoming NAS port to a specifc IP Pool:
 
When a user connects the request to auth comes from 2 possible NAS ports randomly (this cannot change). Depending on which NAS makes the requests determines the IP range required, so I need 2 IP Pools. There is no way to say 'if request comes from NAS1 give IP from Pool1 and if request comes from NAS2 give IP from Pool2'
 
I have gone around and around with NAFs and NARs, but cannot do this.I can create 2 ACS groups with the specific NAS and specific IP pool within, but then I cannot have a single username bound to both groups.
 
I moved the auth to an AD group in the hope that I could bind that single AD group to the 2 ACS groups; and so have a single username, but no joy.

View 8 Replies View Related

AAA/Identity/Nac :: 3750 Using AV-Pairs To Add A Description To Port Based

May 9, 2013

I recently saw a Cisco demo of ISE with a customer and the Cisco SE was setting the port description to the logged in username (dot1x). I can't find any docs on doing this. I did find some old ACS docs that mention using an AV pair and sending aaa:suplicant-name in the result, but that isn't working. I'm trying this on a 3750. and using ISE.

View 3 Replies View Related

Cisco AAA/Identity/Nac :: WLC 7.4 / ISE Authentication Via Active Directory Based On SSID And AD Group?

Apr 15, 2013

I am deploying ISE with WLC 7.4. I have two SSID(s) running in my network 1. Corporate & 2. Services. I have a domain setup lets say "AD.com" with 4 groups 1. Corporate, 2. Services, 3. Employees, 4. Contractors.Here is an example of the scenario that I want:
 
AD.com Group : Corporate's User : 1. C_USER1
2. C_USER2
3. C_USER3
4. C_USER4
5. C_USER5

[code]....
 
Now what I want to do is have 802.1x authentication on my Corporate SSID that will check in AD.com, ONLY AND in ONLY corporate group for authentication. That is only C_USER1 to C_USER5 are allowed to connect to it. Users from any other AD group shouldnt be authenticated on this SSID.The same for the services group & SSID.

View 2 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.2 RADIUS Authentication Based On IMEI And MSISDN Attributes

Apr 19, 2011

I've been working on trying to get RADUIS authentication working for devices connecting to our corporate mobile APN.  Out APN provider sends us Username & Password attributes which I can authenticate fine using ACS 5.2 but I'm having a problem using other attributes sent in the Access-Request.  We have mobile SIM cards with an MSISDN value match with a physical device with an IMEI value.  The SIM cards cannot be used in other devices, only their matched device.  The provider passes us the MSISDN attribute under RADIUS-IETF 31 and the IMEI under a VSA of 3GPP-IMEI
 
What is the best way of being able to authenticate a user and match the MSISDN and IMEI associated to that user?

View 1 Replies View Related

AAA/Identity/Nac :: ACS 5.3 RADIUS Authentication Based On IMESI & MSISDN Attributes

Jan 9, 2012

I'm trying to find out the options for authenticating remote users via IMEI and MISDN values via ACS 5.3/I'm unfamiliar with the Radius attribute options here and what kind of request/response we can utilise.  Also previously I could define IP pools on ACS 4 but can't seem to do that now.  Is there a way have ACS 5.3 to provide a DHCP server address for the connection ?

View 6 Replies View Related

Cisco AAA/Identity/Nac :: ASA-5510 / IPSec Client Authentication Based On AD Group Membership?

Aug 26, 2009

Looking to fine tune Cisco IPSec client RA-VPN authentication on our ASA-5510.  Currently using NT Domain authentication.  It's been working fine for quite a while but is too broad a brush.  It authenticates anyone who is in the domain.  We need to only authenticate folks who are in a specific AD remote access security group.  I'm testing LDAP but am getting the same results.  I can get it to authenticate based on overall domain membership but can't seem to figure out how to check group membership. 
 
We've updated to ASA 8.2(1) and ASDM 6.2(1).  It seems to have more LDAP functionality but I'm not an LDAP expert.  I've posted an image of the LDAP server dialog from the ASDM.  I originally tried putting the Group DN in the Base DN field but kept getting a "can't find user" error when testing.  I also tried adding the group info in the "LDAP parameters for group search" field at the bottom.  But it doesn't seem to be looking there.  Note that the current value is the Group Base DN only.  I also tried putting "memberOf=" in front of that.  Still no luck.  The values shown in the image work for simple domain membership.

View 3 Replies View Related

Cisco AAA/Identity/Nac :: Configure IEEE 802.1x Port-based Authentication On Switches / Preferable 2960 Series

Aug 14, 2011

I want to configure IEEE 802.1x port-based authentication on cisco switches, preferable 2960 series. Which models support this feature?. I have try with some older switches but it doesn't works properly on everyone. I have upgraded them whitout better results, there is namely an issue with TLS handshaking on some switches which produces authentication to fail.

View 1 Replies View Related

Cisco AAA/Identity/Nac :: Compatible Nexus 5020 5.0.2.N2.1 With Tac Plus?

Sep 10, 2012

I have a problem with the switches Nexus, is impossible authenticate from tac_plus. In other company, I configured ACS for authenticate the Nexus Switches and OK The configuration of my tac_plus is:
 
user = gian {
login = cleartext prueba
member = nexus
group = nexus {
default service = permit
service = shell {
#double-quote-values = yes
#shell:roles=""network-admin""
cisco-av-pair*shell:roles="network-admin"
   
The configuration of switch is:
 
tacacs-server host xx.xx.xx.xx key 7 "xxxxx"aaa group server tacacs+ AAA_TACACS_SERVER    server xx.xx.xx.xx    source-interface mgmt0
aaa authentication login default group AAA_TACACS_SERVERaaa authorization commands default group AAA_TACACS_SERVER localaaa accounting default group AAA_TACACS_SERVER

View 4 Replies View Related

Cisco AAA/Identity/Nac :: Adding Nexus 5596 To ACS V4.2?

Jan 28, 2013

Does ACS v4.2 support the addition of the Nexus switches?  We have a few new Nexus devices that have been added to ACS, but cannot be accessed successfully.  A msg re: role based authentication is received.  Do I have to do something special in ACS to support this?
 
Nexus 5596 v5.1(3)N2(1)

View 4 Replies View Related

Cisco AAA / Identity / Nac :: Nexus 7009 - Integration Of ACS With RSA

May 29, 2012

We have Nexus7009 at client network but due to limitation of Nexus switches that they can not be directly integrate Nexus with RSA so client has purchased cisco ACS for the AAA. We are able to do the authentication and authorization via ACS.However clients wants to further integrate the ACS with RSA so that authentication should happen via RSA and authorization should happen ACS. Is that possible ? if yes, how can i configure the ACS ?

View 5 Replies View Related

What Is The Role Of Isp In The Vpn Connection

Dec 14, 2011

Does vpn connection need ISP support. If it does, in which step does ISP give service?

View 6 Replies View Related

Cisco AAA/Identity/Nac :: Radius Authentication With ISE And Nexus 7000

Mar 24, 2013

i am trying to assign a right role for a user who authenticates to nexus 7k switch via radius. i am using cisco ISE version 1.1.1.268 and the nexus version is    5.0.2,I have created a role on nexus.

View 1 Replies View Related

Cisco AAA/Identity/Nac :: Nexus 7009 Using Radius Authentication?

Mar 13, 2012

I have setup my radius server access on the Nexus but am unable to authenticate through putty. If I do a radius-server test on the Nexus it says I authenticate. Here is the log I am getting.
 
 2012 Mar 14 16:03:21 switch-a %AUTHPRIV-4-SYSTEM_MSG: pam_unix(aaa:auth): check
pass; user unknown - aaad

[Code].....

View 1 Replies View Related

Cisco AAA/Identity/Nac :: TACACS Nexus 5548 Authorization?

Jan 3, 2012

I am having an issue with authorization on the Nexus 5548. Note: The tacacs configuration has and still works correctly with all non-Nexus gear.
 
Authentication succeeds, and initiatial authorization passes. However, all sh and config commands fail, though AAA Autho Config-Commands .... and Commands Default Group <Grp Name), are configured.
 
ACS generates the following error: 13025 Command failed to match a Permit rule. The Selected Command Set is DenyAllCommands. I created an AllowAll, but am unclear how to associate this with Access Policy.

View 1 Replies View Related

AAA/Identity/Nac :: Log File Size On ACS 5.3 With Nexus 1000v

Sep 13, 2012

how do i set limit on the log file size in ACS 5.3. I had the same issue with Nexus 1000v but there is a command that enables you to set log file nane and size. it is getting bulky.

View 7 Replies View Related

Cisco :: CiscoWorks LMS 3.2 With TACACS Role Authentication?

Jan 4, 2011

I'm trying to get user authentication backed off to ACS 5.1, I've got it working but not the way I'd like.  This is using the TACACS settings not ACS mode.I've created a local user in CW and assigned it to the correct roles, then created a user in ACS with the same name and a different password and this works fine.My question is can I set the roles on the TACACS server using a shell profile/custom attributes.  All the documentation I can find is for ACS v4?

View 15 Replies View Related

Cisco AAA/Identity/Nac :: ACS 4.2 Tacacs Custom Attribute For Nexus 1000V

Jul 18, 2011

how to add tacacs custom attribute to ACS 4.2 for Nexus 1000V:shell:roles="network-admin admin-vdc"In the interface configuration I've added new service, service - shell, protocol - tacacs+.In the group settings I've enabled this attribute configuration. And it is not works. Default privilege level is assigned to any user with access allowed.

View 8 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved