Cisco AAA/Identity/Nac :: ACS5 / One User / Two Credentials (external Token Versus Cert)

Nov 30, 2011

I have ACS4 and i am planning to upgrade to ACS5.I would like to have such a rules:I have user1, one ASA device which is VPN concentrator for remote users.ASA have two different tunnel-groups: one which allow for logging via certificate (with mandatory pki authorization thru ACS) with disabled Xauth,and second tunnel-group with allow login thru typical Xauth with authorization thru ACS which users external database (RSA Tokens).So i have one user1 which can login thru VPN using RSA tokencode or certificate.For example: on phone user1 uses certificate, and on PC station the same user1 uses token password.For tunnel-group with pki authorization ASA checks username in ACS and in typical scenario login="CN from certificate" and password="CN from certificate". So we would need "two credentials" for the user - one for pki authorization, and second one external database (RSA token).Is such scenatio possible under ACS 5 ? where one user uses different credentials based on tunnel-group usage ?

View 2 Replies


ADVERTISEMENT

AAA/Identity/Nac :: ACS5 Try To Authenticate User In External Database

Jan 16, 2012

Is it possible to create on ACS5 rule which will:

1. Try to authenticate user in external database1 (radius)
2. When external database1 returns FAIL (because of bad password) ACS5 should try to authenticate user in another external database2 (radius)

View 5 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.2 User Authentication With Token And Password?

Jul 19, 2011

I am migrating from ACS 4.2 to 5.2. In 4.2 you could assign one user to auth via Internal Database and another user to auth via Radius Token Server. I cannot find how to do this with 5.2. There is a note in the doc that states 'Identity-related attributes are not available as conditions in a service selection policy'. Does this mean that you can only choose one auth method for all users? If it is possible to have multiple methods, how am I able to accomplish this?

View 1 Replies View Related

Cisco AAA/Identity/Nac :: Wp1430161 Downloadable ACL Dependent On User Credentials?

May 7, 2012

I have been reading article url....wp1430161 and I am trying to get my head around the type of port authentication Methods & Modes I am going to require for a Proof of Concept using a Cisco ISE as the Authentication Server.
 
The switchport will have a single IP Phone in a Voice VLAN and then a Single host in a Data VLAN. Reading this article, I think I should be configuring "802.1x" authentication method using "Single Host" Mode.
 
However will that support a Downloadable ACL dependent on the user credentials? And will it allow a restricted ACL to be downloaded if authentication of the Machine or the User fails.? I dont really want to create & manage Guest & Remediation VLANs with thier respective ACLs on every switch in my enterprise, including our remote branch offices.

View 1 Replies View Related

Cisco AAA/Identity/Nac :: How Does Acs Export User Records Via ACS5.3

Nov 29, 2011

I want to export the ACS local user's records.Then import to other ACS5.3 server.But the export file not the user's password record.I cannot import it well....

View 1 Replies View Related

Cisco AAA/Identity/Nac :: Assign Fixed IP Address To User In ACS5.2?

Aug 8, 2011

My company requires each user dial-in must be a  fixed IP; The old acs4 can,but I cannot  find the same configration item in the ACS5.2

View 2 Replies View Related

Cisco AAA/Identity/Nac :: ACS5.1 - Unable To Authenticate AD User With Empty Password

May 30, 2011

Our customer has the business needs to authenticate remote users against AD with empty password. I've seen ACS5.1 release note where mentioned about resolved issue: #CSCte72751 #ACS 5.1 drops authentication with empty password.

I tried to authenticate dial-in users through Tacacs and Radius against AD with empty password but without success. ACS points to wrong AD password. Is it possible to authneticate remote users with empty password?

View 3 Replies View Related

Cisco AAA/Identity/Nac :: ACS5.2 - Establish Independent User Group / Only VPN Username And Password

Mar 28, 2012

My question is on ASA and ACS5.2 users.Have my ASA SSL VPN and IPSEC VPN, the my ACS5.2 many users, for example, wireless user.I would now like to establish an independent user group, only the VPN user name and password, while both the ASA VPN can only allow users in this independent group of ACS5.2 VPN login, how to configure?

View 1 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.x Identity Store Sequence And Token Validation

Dec 3, 2012

We have a ACS 4.3.2 installed with users authenticating against an Active Directory database. The AD database not only authenticate the users but also assigns the group that is used to select IP address pool.Now the requirements require to use token authentication with SafeNet. This authentication uses the same username but the password is composed of the original password + OTP.The problem is that the SafeNet server doesn't return the group membership.I've read about the Identity Store Sequence in ACS 5.x and I think I could use it in the following sequence:! configure an Authentication Sequence using the SafeNet token server (this works with ACS 4.x)I configure an Attribute Retrieval Sequence against the AD database. This would use the username only, no password and would retrieve the group membership.

View 1 Replies View Related

AAA/Identity/Nac :: CSACSE-1113-K9 / ACS 4.2.1.15 External User Database

Mar 9, 2012

Having CSACSE-1113-K9 with ACS 4.2.15.I want to configure windows user database under extrenal user database but i get an error  (attached) 'An error has occured while processing the Authen DLL Configure pagebecasue an error occured.I tried to stop the services and start agian but the same issue. The eappliance is secondary (backup) ACS. On the primary it is working fine.

View 1 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.3 - External Proxy Service User Logs?

Apr 11, 2012

We are currently using Cisco ACS 5.3.0.40.2. One of the Services Selection Policy it hosts is:
 
Receive Authentication request from a wireless controller for a wireless userIf the wireless user's username contains a particular domain suffix, the request is proxied to an external proxy server using an External Proxy service (configured for both local/remote accounting)On receiving an Acccess-Accept from the external proxy, the user is given access and ACS 5 will start logging account packets for the username (nothing appears in the RADIUS authentication logs - ACS 5 it seems doesn't log proxied authentication requests) The above setup works fine in most instances. We start to have problems when an external proxy server strips the domain suffix off the username in the Access-Accept packet e.g.
 
ACS 5 proxies an Access-Request to an external proxy server (with Username = someuser@somwhere.com)The external proxy replies with an Access-Accept (with Username = someuser)The user 'someuser' is given access but subsequent accounting attempts fail because their username (without the domain suffix) doesn't match the Service Selection PolicyIs there any way to get ACS 5.3 to log proxied authentication requests? If not, can I configure ACS 5.3 to use the username in the Access-Request packet (rather than the username in the Access-Accept packet) for accounting?

View 2 Replies View Related

AAA/Identity/Nac :: ACS 4.0 / 4500 Switch - External DB User Invalid Or Bad Password

Apr 19, 2011

I have problem with Cisco ACS 4.0 "Windows" with core 4500 switch "cat4500-ENTSERVICESK9-M 12.2"  the problem shows only on one device  "x.x.x.x" the problem is " Authen failed-------badcred------External DB user invalid or bad password" i can see it in failed attempt. on the same side i can see in Passed Authentications for same record "Authen OK", i can login to the mentioned switch using my ACS credentials and not local database credentials
 
can debug this from ACS if not how can view the authentication records from core switch?

View 8 Replies View Related

Cisco :: Upgrade From LMS 3.0.1 To 3.1 Or 3.2 - INVREP0102 / User Credentials Are Invalid

Feb 20, 2012

How to upgrade from LMS 3.0 December 2007 update to LMS 3.1 or LMS 3.2. The problem is the large number of C2960S-24TS-L  switches that my organization has and cannot managed them.. I tried to upgrade devices through Software Center but always Ciscoworks informs me with the following message."Error while downloading package information from [URL] for the selected  products. See the log file for details". Also i can not run EOL/EOS inventory report. The message is " INVREP0102: Cisco.com user credentials are invalid. Enter correct credentials." I check my credentials and is right. The server  has access to www through proxy without any restrictions. In the past I've already updated devices through the software center. Also in the past i ve run EOS/EOL inventory reports.The LMS 3.0 December 2007 has the following products LMS3.0.116 May 2008  
 
CiscoWorks  Common Services3.1.102 Jul 2009, 07:44:58 EEST2.Campus  Manager5.0.511 Oct 2009, 07:36:10 EEST3.CiscoView6.1.702 Jul 2009, 07:45:05 EEST4.CiscoWorks  Assistant1.0.102 Jul 2009, 07:45:05 EEST5.Device Fault  Manager3.0.512 Jun 2010, 07:31:48 EEST6.Internetwork Performance Monitor4.0.102 Jul 2009, 07:45:11 EEST7.Integration  Utility1.7.102 Jul 2009, 07:45:14 EEST8.LMS Portal1.0.102 Jul 2009, 07:45:16 EEST9.Resource  Manager Essentials4.1.102 Jul 2009, 07:45:17 EEST

View 1 Replies View Related

User Can't Login Into Domain With Right Credentials In Active Directory

Feb 19, 2013

user can't login into domain with right credentials in active directory

View 6 Replies View Related

Cisco AAA/Identity/Nac :: ACS5.3 - Configuring Multiple Identity Sources

Aug 28, 2012

I have an ACS 5.3 cluster, that is configured to use AD. There are a few wireless devices, and monitoring tools that do not have AD accounts. I would like to configure ACS to first check AD for the user authentication, and if that fails to roll over to the local (Internal Users) identity source where I can define these user accounts.
 
It seems that when the authentication hits the initial Identity Policy rule, it never moves onto the next one if the first fails.
 
Attached are screen shots that show how i'm configured for the test, i have a local user defined and I'm trying to log into the firewalls.
 
- Identity Definition : Screen shot of the main ACS definition for the rule i'm testing that's not working
- Identity Rule 1 : The configuration of rule 1 that if it fails i need it to move onto rule 2.
- Log Output : Screen shot for one of the failed attempts from the ACS View Log server.
 
Reason I need to configure it this way is:

- Wireless users authenticate to wireless using AD user accounts. Some hand held scanners do not support that and will need to authenticate using the MAC address.
- Authentication to Network devices for managment uses AD accounts. We have some monitoring tools that do not have AD accounts, and will need to    be able to log into Network devices to issue some commands (Examples: Cisco Prime LMS and NCS, Infoblox NetMRI).

View 4 Replies View Related

Cisco AAA/Identity/Nac :: 802.1x Credentials Failure With ACS 5.2

Jun 20, 2011

I recently tried to deploy an ACS appliance with version 5.2 installed on it for a customer.
 
After setting up the WLC to use the ACS as a radius server, and successfully testing connection from the ACS to the AD, I get an error message " 12321 PEAP failed SSL/TLS handshake because the client rejected the ACS local-certificate" anytime a client tries to connect to the network.
 
This is surprising because I had already generated a certficate for the ACS from a CA and binded the CA signed certificate with the ACS, I also specified the CA in the client machine's wireless properties and checked the "validate certificate" button.
 
When I tried to connect using the internal identity store, the client was successfully authenticated without any certificate issues.

View 1 Replies View Related

Cisco AAA/Identity/Nac :: 5508 ISE Integration With PEAP (Server Side Cert)

Oct 20, 2012

We are currently evaluating ISE and I am stuck with the PEAP authentication (with Server side Cert).Our current setup consists of two 5508 controllers, 30+ access point. For authentication we are using PEAP with (server side Cert). We have an IAS server which is also acting as a CA server. We are using Cisco’s NAM as a supplicant on Windows XP & 7 workstations. I would like to use ISE for authentication. I would like to use PEAP with Server side Cert (similar setup like IAS). I want ISE to perform the same function in addition to profiling etc.....
 
I was able to integrate ISE with Active Directory but could not get it working with PEAP (server side Cert). I would also like to know if they used Microsoft’s CA server or Open SSL CA server or a third party CA server (Go Daddy, VeriSign etc.)Can you we ISE as a CA server just the way we used Microsoft’s IAS Server as a CA Server?

View 8 Replies View Related

Cisco AAA/Identity/Nac :: ACS5.1 Getting Disconnected From AD?

Jul 30, 2010

I managed to connect acs5.1 to the AD , user's will be able to get  authenticated against the AD when the state is shown "CONNECTED'. This will work ok for a day or so and goes into a 'DISCONNECTED' state , users will no more be able to authenticate . Is this a known error , or is this an error from the microsoft ws2k3 server side ?

View 3 Replies View Related

Cisco AAA/Identity/Nac :: ACS5 - Replacement For IP Pools

Jan 26, 2013

I know ACS 5 lacks the IP Pools of earlier ACS versions. I'm looking at a 4 to 5 migration and was thinking of just configuring the IP Pools on the router ("ip pool local" etc) and sending back a RADIUS Cisco Attribute pair with the name of the pool. (Seemed like a neat fix, needs no extra kit, etc.)
 
I could have sworn that attribute pair existed... but I can't find it in ACS5! What's it's name?! Where is it!? Or have I gone mad!? (And, if I have gone mad, how would you go about fixing it?)

View 2 Replies View Related

Cisco Wireless :: 1142N / Internal Versus External Antenna Coverage

Mar 19, 2013

I have a few 1142N Aironets with internal antennas in place, and I am not thrilled by its coverage. I want to extend my wireless network because of a new building which led me to the following question;Is there is any difference in wireless coverage when using external dipole antenna’s (the small ones, for example the AIR-ANT2524 for a new 2600 Aironet) versus the internal (dipole) antenna’s. I am aware you have more options when using external antenna’s, such as omni, directional, outdoor etc.
 
For an indoor office or warehouse deployment, where temperature is not a concern, why would I buy for example the 2600E with 4 dipole antenna’s over  the 2600i?I have read most Aironet datasheets and their antenna options, but can’t find a word about the advantages of external dipole antennas. I would expect external antennas would give better coverage.. is this true?

View 1 Replies View Related

Cisco AAA/Identity/Nac :: ACS5.2 Authentication With Fortigate Firewall

Jun 10, 2013

I am trying to configure Fortigate firewall for device authentication through TACACS+ using Cisco ACS 5.2.
 
I was wondering if any one had an experience to worked on this scenario. I am looking for authorization command attibute to grant admin access.

View 1 Replies View Related

Cisco AAA/Identity/Nac :: Sync / Copy AAA Clients Between Two ACS5.2

May 17, 2011

we are moving network devices (200+) authentication/authorization/accounting to new ACS5.2, is there any easy way to copy/sync all those AAA clients configuration to another ACS5.2 server? I don't need other configuration to be synced/copied to another ACS5.2 server

View 8 Replies View Related

Cisco AAA/Identity/Nac :: ACS5.1 - AD And RADIUS Attributes Mapping

Aug 18, 2010

I'm trying to dynamically assign  IP address for VPN users from AD (without IAS service). I know that there is a restriction that "Dial-in users are not supported by AD in ACS (note in "acsuserguide51") but Im not exacly sure what can and can't do with it. In "Authorization Profiles" in RADIUS Attributes tab I try to mannually add specific Attribute (Framed-IP-Address).
 
I have no problem (everything works just fine) with static address assignment in a way as below:

AD is already integrated with ACS and I've managed to download Directory attributes especially msRADIUSFramedIPAddress
 
When I change "Attribute Value" from static to dynamic type I see  the option to select AD (but "Select" which should list all available attributes is empty)
 
I know that I can do it directly (ASA <-> AD attribute mapping) but I want ACS to do it

View 5 Replies View Related

AAA/Identity/Nac :: ACS5.2 - Implementing IP Phones In Network?

Oct 13, 2011

We have customer with implementation ACS5.2 in Windows environment. Now they want to implement IP phones in the network.

View 0 Replies View Related

AAA/Identity/Nac :: ACS5.3 Command Set Regular Expressions

Jul 9, 2012

I am trying to secure changes to switches using ACS 5.3 and allowing our technicians to only change the vlan for user ports on the switches.  How can I use regular expressions to filter out the 1/1/# ports so that those ports cannot be accessed in config mode?  If I allow the following, it allows access to all interfaces with 'gi' in them.

View 1 Replies View Related

Cisco AAA/Identity/Nac :: ACS5.2 Command Sets Permit All Commands

Mar 3, 2011

I have everything working on a new 5.2 ACS but:I can only make a command set that permits things and denies all.I thought with the check box. Permit any command that is not in the table below" one could allow all and specifically deny commands.and that would allow the user to do all commands except for conf and set.  But it doesn't seem to adminstratively block it, it allows them to still "conf" for instance.
 
Then it works as expected, it allows the commands that are permitted and denying all unspecified commands.I know I am in the right command set because the changes I make are reflected immediately.Can someone test the "Permit any command that is not in the table below' and tell me if it works?  I can make it work with the unchecked box, sure, but it would be nice to get it to work.

View 3 Replies View Related

Cisco AAA/Identity/Nac :: Command Auth Failure On ASA5510 Using ACS5.1

Jun 11, 2012

I'm having trouble getting things working on a pair of ASA5510's using Cisco Secure ACS v5.1. We were previously using a much older version of ACS to these (and a lot of other) devices which worked OK for remote access for read/write use. Am in the process of migrating to the new ACS software and have got it working OK to everything (many Cisco switches and other IOS devices) except these ASA5510s.
 
I can get TACACS authenticating fine and am able to log on and go into enable mode. Any subsequent commands are then met with 'command authorization failure', including 'show run', 'conf t' and even 'exit'!
 
My ASA5510 config has not changed, other than to define the new AAA server, which leads me to think its something to do with how I have the ACS user profile set up. I have configured the ACS5.1 device administration Shell Profile to have the maximum privilege level (15) and the command set I'm using has the box checked 'permit any command that is not in the table below'.

View 7 Replies View Related

Cisco AAA/Identity/Nac :: ACS5.2 Backup And Restore On A Different Software Version?

Oct 3, 2011

We are trying to make a restore from the backup done on ACS version 5.1 to a new appliance running ACS5.2 Before doing it I found this note in Cisco ACS user guide:
 
Note: You cannot back up data from an earlier version of ACS and restore it to a later version. Backup and restore must be performed on the same version of ACS. If you need the data on a different version of the ACS, you can perform an upgrade after you restore the data. Refer to the Installation and Setup Guide for Cisco Secure Access Control System 5.1 for more information on upgrading ACS to later versions.
 
How should I understand it? This note has conflicting statements. We can't restore to a later version but if you need data on a different version of ACS you can perform an upgrade AFTER YOU RESTORE the data. Doesn't it mean that the restore will still work? How would I do the upgrade to version 5.2 or even version 5.3 that was announced to be released very soon? I didn't find anything on the software upgrade in ACS5.1 guide.

View 4 Replies View Related

Cisco AAA/Identity/Nac :: ACS5.2 - Allow Show Running Configuration Without Enable

May 24, 2012

I am using ACS5.2 I want user to access the device with all necessary command like show run/ver/int/log… I try to set user privilege using Shell from 1 to 10 but show run doesn't work.

View 15 Replies View Related

Cisco AAA/Identity/Nac :: Invoke IP POOL Defined On VPN 3000 To ACS5.3?

Aug 27, 2012

I configured an ip pool on VPN 3000 concetnrator. i wanted to an attribute to use on the nework access profile on the acs 5.3. i was advised to use pool name. However, we don't have pool name attribute on VPN concentrator. only, IP range and subnet mask. how do i refer an IP pool on VPN concentrator in ACS5.3? is there another attribute I can use on ACS5.3 to invoke a pool on CVPN3000, like ip range...?

View 2 Replies View Related

Cisco AAA/Identity/Nac :: ACS5.1.0.44 Authentication Base AD Group Member

Nov 25, 2012

I had a problem about authentication use AD group member.  Below webiside is the way I config on ACS.

[URL]

I'm using ACS 5.1.0.44 and this version has a bug , ACS cannot read AD group.  I have to add it manually .    After I change the access policy from Internal user to AD1. I can use anyone AD ID to pass authenticaiton. I finished all config from the website had same result.

I checked the access polices -- default device admin -- authorization  , the new rules I created had no hit count.  How can I make sure that I make a right config ?

View 2 Replies View Related

Cisco AAA/Identity/Nac :: ACS5.1 - Machine Certificate And AD-Account-Verification

Aug 2, 2011

We plan to use machine certificates on our notebooks with Windows Vista. Our authenticating server is Cisco ACS 5.1. To access the wireless network we want to use the machine certificate of the notebook and a verification of the corresponding computer account in the Active Directory. What authentication method is the best to check the machine certificate and if in the Active Directory exist the enabled corresponding computer account ? How to configure the ACS and the notebook to use it like described ?

View 1 Replies View Related

Cisco AAA/Identity/Nac :: ACS5.3 - Difference Between WebVPN And IPSEC Radius

Aug 14, 2012

I am using Cisco ACS5.3 to authenticate users (using radius) for a cisco ASA firewall for both WebVPN and IPSEC client connections.  I have been able to do this successfully.  However I need to be able to deply Cisco vendor specific attributes (VSA) for both IPSEC and WebVPN sessions using authorisation profiles.   Ideally I don't want to have to combine the attributes required for both services in the same authorisation profile, as I will have to produce alot of different profiles for the different combinations.
 
The only way I can see that you could possibilly do this is by having service selection rules that can differentiate between WebVPN and IPSEC Radius authentication requests.  I have experimented inbound VSA's without success.  Is this possible?

View 1 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved