Cisco AAA/Identity/Nac :: How To Configure Custom Attribute ACS 5.1

May 30, 2011

I want to configure RBAC for ANM 4,2 using tacacs+ and ACS 5.1 [code]

When the admin user logs in, this policy element is triggerd, but the Role is not sent back.How to configure the Custom Attribute?

View 1 Replies


ADVERTISEMENT

Cisco AAA/Identity/Nac :: ACS 4.2 Tacacs Custom Attribute For Nexus 1000V

Jul 18, 2011

how to add tacacs custom attribute to ACS 4.2 for Nexus 1000V:shell:roles="network-admin admin-vdc"In the interface configuration I've added new service, service - shell, protocol - tacacs+.In the group settings I've enabled this attribute configuration. And it is not works. Default privilege level is assigned to any user with access allowed.

View 8 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.3 Additional LDAP Attribute Retrieval

Aug 28, 2012

I'm authenticating users against Active Directory and want to also check additionals attributes from LDAP. In ACS 5.3. it was possible to set this up via External Identity Sequence, but in ISE I don't see this possibility. I can set sequence only for authentication, but not for additional attribute retrieval.
 
When I set a condition in a policy that an LDAP attribute must match with some value, the attribute is not retrieved and autorization ends on default Deny Access.

View 17 Replies View Related

Cisco AAA/Identity/Nac :: MS-CHAPv2 Attribute Error In ASA Querying AD Via ACS 5.2

Jun 28, 2011

We have just set up a Secure ACS 5.2 VM to provide authentication for Anyconnect VPN clients.  The clients connect to an ASA 5520, which queries the ACS, which in turn queries Active Directory directly.  All seemed to work OK, but I noticed it was using PAP.  Following some docs, MS-CHAPv2 was enabled via the "Password-management" command.  This broke the configuration and the error on the ACS was:
 
11309 Incorrect RADIUS MS-CHAP v2 attribute Some references suggest that the ASA and ACS should talk MSCHAPv2 without additional config, so I guess it must be the ASA config for the tunnel-group.  There are additional secondary authentication and authorisation pages on ASDM, that I suspect might be necessary to use mschap.

View 1 Replies View Related

Cisco AAA/Identity/Nac :: ACS 3.3 / RADIUS Vendor-Specific Attribute?

Feb 21, 2005

I'm using Cisco ACS 3.3 for RADIUS. How to do I make Vendor-Specific attribute available? (Attribute number 26, format: OctetString) The online help makes reference to it, but does not tell you how to make it available.

View 9 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.3 Suppress Radius Class / CACS Attribute

May 13, 2013

ACS 5.3 always sends the class=cacs:xyz attribute in an authentication response. How can I suppress that behaviour? The Cisco Email Security Appliance doesn't support multiple class attributes (defect 49096) and even treats  guest users as administrators.

View 2 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.3 / 11014 RADIUS Packet Contains Invalid Attribute(s)?

Mar 19, 2012

how I can determine what attribute is coming up as 'invalid' ?Tried full debug and looked at all the logs - nothing.

View 1 Replies View Related

Cisco AAA/Identity/Nac :: 3650 - Radius Return Attribute To Set Duplex Settings?

Feb 28, 2012

I am doing 802.1X for a user on Cisco 3650 and wanted the Radius Server to return an attribute to set the Duplex setting of the port. with the correct Radius Return Attribute.

View 4 Replies View Related

Cisco AAA/Identity/Nac :: ASA 5505 Does Some LDAP Attribute Mapping To Get Group Membership For DAP

Dec 21, 2012

I have a working ASA 5505 that is used for remote access.  It authenticates users via RADIUS (Microsoft AD using two IAS servers), it also authorises users via LDAP and it does some LDAP attribute mapping to get group membership for DAP.  This is all working fine however recently I enabled IPv6 to do some testing.  I have a /126 subnet on the Inside interface (maps to its equivalent /30 IPv4 subnet) and OSPFv3 running so the ASA has visibility of the internal IPv6 networks.  DNS client is enabled in the ASA and all the authentication servers are entered as hostnames.  The two RADIUS servers only have A records and the two LDAP servers (Windows DC's) have both A and AAAA records.  My plan was to begin test IPv6 on the AnyConnect VPN clients (once I was happy the ASA was working fine with IPv6).

When I initially enabled IPv6 everything continued to work as before, however I had to reboot the ASA today and after it all came back up authorisation stopped working.  I did a bit of troubleshooting and the ASA is complaining of not being able to resolve the addresses of the two LDAP servers.  From the CLI I can ping the hostnames and the LDAP servers resolve to IPv6 addresses and the RADIUS servers resolve to IPv4 addresses.  When I issue the command 'show aaa-server LDAP' (LDAP is the name of the group) I see the servers listed but the address displays 0.0.0.0:
 
Prior to the reboot both the LDAP servers were showing thier addresses (IPv4) correctly.  I can workaround it by disabling IPv6 on the ASA, letting it lookup the (IPv4) addresses of the LDAP servers (so they appear in the 'Server Address:' field above) and then re-enabling IPv6.  Strangely deleting and re-adding the servers just with their IPv4 addresses also fails but I haven't fully tested this.  I don't know but I think I would have the same behaviour if the RADIUS servers also had AAAA records.
 
I assume when IPv6 is enabled on the ASA it will perform AAAA lookups as well as A lookups but the LDAP client cannot use IPv6?  Just guessing at the moment as I haven't managed to get a LAN capture. [code]

View 1 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.3 - Custom Attributes And Wireless Groups?

May 13, 2012

I have been tasked with migrating from ACS 4 to ACS 5.3. I havent had any training and so i am finding it a bit different. Currently i have this issue -
 
I have a group in  the ACS 4 for users accessing via wireless on the ACS - Code...

View 4 Replies View Related

Cisco AAA/Identity/Nac :: Multiple Instance Of Custom Attributes ACS 5.x?

Nov 27, 2011

is there a way to have multiple instances of user custom attributes and insert those as multiple instances of the A/V Pair in the authorisation profile in ACS 5.2/5.3 ?Background: We have to migrate a ACS 4.2 to 5.3. In ACS 4.2 our client used the multiline attribute
 
Number
#Name
#Description
#Type of Value
#Inbound/Outbound

[code]....

to specify multiple routes to various networks in the RADIUS reply spcific for every single PPP username of routers dialing in.Using the internal user database, extended by a string attribute and using that attribute as source of a dynamic value in the access-policy works basically. But as I have only ONE single line instance of the attribute for every user, I can only return ONE framed-route.We have lots of cases where multiple routes have to be assigned to one router.I 'd like to avoid defining a seperate access profile for every remote RAS router for external PPP Dial-In...[URL]

View 1 Replies View Related

AAA/Identity/Nac :: ACS 5.1 Custom Smtp Port Number?

May 31, 2012

I have a ACS 5.1, My mailing server does not run on standard port number of smtp (25). Need to know if i can customize the port number suiting my mailing server requirement.

View 0 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.2 - Adding Custom Attributes For Juniper Netscreen TACACS+?

Aug 9, 2011

I am trying add custom attributes for Juniper Netscreen TACACS+ authentication to a v5.2 ACS. The advice is to add it to the group as follows:
 
ervice = netscreen {
vsys = root
privilege = read-write
} I know how to add this to a version v4.x ACS

However, I do not know how to apply this to the custom attribiutes to a v5.x ACS?do I add the vsys and privilege attribute seperately or together? What should be the attribute name? netscreen? Should it be mandatory?

View 4 Replies View Related

Cisco VPN :: ASA 8.4.x - Sending A Client Attribute To Radius Server

Dec 11, 2011

I'm using an ASA version 8.4.2 and a Radius Server.
 
Is-it possible to configure ASA for sending the name of the connection profile to the Radius Server ?
 
By default, the radius server doesn't receive this information.

View 1 Replies View Related

Cisco VPN :: ASA 8.4 Ldap Attribute-map Does Not Support Special Characters

Sep 20, 2011

After trying for several hours to configure ldap attribute to cisco attribute mapping,  I found that special characters are not supported by ldap attribute-map at least on 8.4
 
Here is the problematic configuration:
 
ldap attribute-map ldap_memberof_map
map-name  memberOf Group-Policy
map-value memberOf

[Code].....

View 1 Replies View Related

Cisco WAN :: 7206 - PPPoE B-RAS And Framed-route Attribute

Mar 27, 2012

I'm configuring a Cisco 7206 NPE-G2 as B-RAS for PPPoE over a Gigabit Ethernet interface. Everything is OK but I'm having problems when i try to pass the framed-route attribute from the RADIUS to assign a /29 sub net to a PPPoE client, the 7206 seems to skip it and no route is installed in the routing table. 

This is the configuration: 
upgrade fpd auto
version 15.0
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
[code]......
 
I tried also with Cisco-AVpair ip:route with the same results.

View 3 Replies View Related

Cisco VPN :: ASA 5540 - AnyConnect Profile As Radius Attribute

Nov 25, 2012

Is it possible to send profile name as an Radius atribute during client authentication? I would like to match users depends on profile name to sperate Identity Stores in my ACS. ASA 5540 8.4, anyconnect 3.1.01065, ACS 5.1

View 3 Replies View Related

Cisco VPN :: 5520 Attribute Mapping Not Taking Affect

Oct 2, 2012

I'm in the throes of configuring my 5520 to supply different group policies based on LDAP group membership. I'm finding that no matter what I do only the default group is applied. I'm sure it'll be a simple fix - but I just can't see it. [code]

View 4 Replies View Related

Cisco VPN :: ACS 5.3 / Assign Group Membership Attribute To DAP For Radius Logins Via SSL

May 14, 2012

Basically I want to query Radius for AD group membership and apply a set of Bookmarks based on that group. I would use LDAP, but we have two domains and I need both to be available for login, so I am using ACS 5.3 as a proxy. I saw that using attribute 4242 for DAP for group membership, but what is the Group syntax?

View 1 Replies View Related

Cisco AAA/Identity/Nac :: How To Configure MAB In ACS 5.2 Or 5.3

May 8, 2012

How to configure MAB (Mac Authentication Bypas) in ACS 5.2 or ACS 5.3.I have running tacas+ & radius on the ACS with a local database
 
I have entered already a list of MAC address in the Users and Identity Stores / Internal Identy Stores / Hosts .Also I have already a Access Policies configured. Access Policies / Service Selection Rules / MAB
 
And a group "Host Lookup" Host Lookup has the service type : Network Access And policy structure : Identity & Authorization.

View 1 Replies View Related

Cisco Switching/Routing :: Radius-server Attribute 61 Extended On ASR1004

Nov 9, 2011

We faced with problem after upgrade ASR from 12(2) 33 XNE2. I know that this is an old XE release but our Radius deny authization from ASR with more new XE version. Here is our radius attribute configuretion:
 
!
radius-server attribute 44 include-in-access-req
radius-server attribute nas-port format d
radius-server host x.x.x.x auth-port 1812 acct-port 1813 non-standard

[Code]....

How can I add in my configuration that ASR send necesserry NAS-Port-Type - VPDN

I couldn't found out any info ((( for radius-server attribute 61 extended

View 1 Replies View Related

Cisco AAA/Identity/Nac :: To Configure MS ACS 4.1.1.23 To Allow Linux TACACS

Sep 20, 2011

I am running ACS 4.1.1.23 on a Microsoft server and I am trying to get TACACS to work with two Linux servers.  The servers are capable of TACACS, are using port 49 and have the correct shared secret.  I believe I do not have the devices configured properly on the ACS side.  These 2 servers currently are using RADIUS and we are getting bit by the bug where the ACS application will start rejecting RADIUS authentication requests but still accept TACACS requests.

View 6 Replies View Related

Cisco AAA/Identity/Nac :: Configure ACS 5.1 Appliance To Connect To AD

Jun 18, 2011

This is a new installation.I did to configure the ACS to connect to the AD to authenticate users and retrieve the user information for group mapping as following step. Go to Users and Identity Stores > External Identity Stores > Active Directory, and enter the domain name and provide a username/password that will allow connect to the domain.Next, click on the Test Connection button to validate joining the domain.
I got success test connection. But when I click Save Changes. I got error .

View 5 Replies View Related

Cisco AAA/Identity/Nac :: How To Configure LAN Teaming In ACS 1121

Mar 27, 2011

how to configure LAN teaming in Cisco ACS 1121. My requirement is to have virtual IP in the server with two physical IPs in the available 2 interface in the server.

View 1 Replies View Related

Cisco AAA/Identity/Nac :: How To Configure Radius Failover In ACS 5.1

Aug 21, 2011

I need to configure the ACS 5.1 to meet the following requirement :-
 
1. ACS 5.1 will point to a RSA SecurID as the first authentication mechanism for the validation of user credential

2. In the event that RSA SecurID is not reachable, the ACS 5.1 shall point to its local user database.
 
 I had no problem configuring for Point (1), but I am not able to let it failover to the local user database.

View 11 Replies View Related

Cisco Firewall :: How To Configure Identity In ASA 5520

Nov 4, 2011

i have an ASA 5520 with ios 8.4 and asdm 6.4.
 
my configureation is below 
my asa interfaces 
inside ip
172.16.0.0/22

[Code]..... 
 
so now i want to configure my asa to give access to user based. what configurations should i use to do so.
 
i have attached the Edit Active Directory Server  dialuge box so what should i put there in the box's

View 1 Replies View Related

Cisco AAA/Identity/Nac :: How To Configure Airespace In Secure ACS V5.3

Mar 10, 2013

Cisco Airespace configuration in Cisco Secure ACS v5.3. We're migrating to ACS v5.3 but we're encountering an issue with Cisco Airespace. It is only working on ACS4.1 but when we tried to move it to Cisco Secure ACS v5.3, it is not working.

View 7 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.2 Configure Command Set Only To Allow Interface Access?

Jul 6, 2011

I had insatalled the ACS 5.2 on Vmware . As per my requirement i need to configure a user to restricted privilege so that he should be able to execute only the below commands on the switch .
 
-Show ver
-Show interfaces
-Show ip Interface Brief
-Configure terminal
-Interface <interface name >
-Shutdown
-No shutdown
 
The users should not be authorized to execute any other commands than above listed one .After the configuration i was not able to restrict the config mode commands . Once the user is  authoized for  Configure terminal access  he will have full access on the device. How to configure the command set only to allow  interface access and he should be able to apply Shutdown and No shutdown command .

View 6 Replies View Related

Cisco AAA/Identity/Nac :: VSA 218 - Configure IP Pool Selection By RADIUS On ACS 5-3-0-40-7?

Feb 18, 2013

I'm trying to configure IP pool selection by RADIUS on ACS 5-3-0-40-7.So, I went to configuring the cisco-assign-ip-pool (Cisco VSA 218) attribute within some test authorization profile but discovered that cisco-assign-ip-pool is an integer (?!) and (therefore) accepts digits only.

As far as I can remember, we used to put pool *names* within ip:addr-pool

(something along those lines: cisco-avpair = "ip:addr-pool=test-pool-1").

So how should we configure the values for this attribute in ACS 5?

View 4 Replies View Related

Cisco AAA/Identity/Nac :: Configure ACS 5.2 And Checkpoint For Firewall Admin

Aug 5, 2012

how to configure ACS 5.2 for device administration of Checkpoint firewalls and security management servers?

View 4 Replies View Related

Cisco AAA/Identity/Nac :: Configure Users On ACS 4 To Authenticate Password With RSA 6.1

Apr 16, 2013

I have ACS 4 integrated with RSA 6.1, where users of ACS can authenticate their passwords with the rsa server.I am migrating users to ACS 5, and I want to integrate with rsa.
 
I am configuring rsa as “rsa secureID token servers”.But how should I configure the users on acs to authenticate the password with rsa?
 
Previously on acs 4, on the user page, in password field, I select authenticate with external DB, Also, any guide for the config on  rsa 6.1 side (with acs 5)

View 1 Replies View Related

Cisco AAA/Identity/Nac :: How To Configure User Authentication Via TACACS On UCS 1.4 With ACS 5.2

Aug 18, 2011

how do i configure user authentication via TACACS on UCS 1.4 with ACS 5.2?  My TACACs connection works, and my user authentication is successful, but i can only get read-only rights.  I have tried several versions of "cisco-av-pair= role=admin" both as mandatory attributes named role and as cisco-av-pair=role , with "admin" as the value, and i still get read-only.
 
When i attempt to find any documentation, it only describes ACS 4.2, which is another problem i have with most documentation for new cisco products (i have this exact issue with my NAMs, nothing i do to change the attributes results in successfully logging into the NAM, and all config guides are written in 4.2 speak).
 
is there any possiblity cisco is going to release some documentation on how to convert 4.2 speak to 5.2 speak?

View 8 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.1 - How To Configure Rules To Allow 802.1x And Device Access

Aug 21, 2011

I am new to ACS 5.1.I need to configure the ACS to act as the 802.1x authentication Server, as well as, act as the Radius Server for the authentication and authorization process when I access the switch.
 
I had created Two rules (under the Access policy) to cater for the two scenario, it will always "stuck" at the 1st rule. For e.g. Rule-1 is meant for the 802.1x, Rule 2 is meant for the AAA process. When I tested with 802.1x, it worked perfectly. But when I tested to login to the switch, it always failed. Based on the log, Rule1 is not able to fulfill my requirement (of course it can't). I thought the rules check process will proceed with Rule-2, but apparently it did not.

View 2 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved