CCNA Security: Chapter Three Authentication, Authorization, and Accounting
CCNA Security: Chapter Three Authentication, Authorization, and Accounting
Chapter Three
Authentication, Authorization,
and Accounting
• Local Authentication
• Enhancements to Local Authentication
• Describe the purpose of AAA and the various
implementation techniques
• Implement AAA using the local database
• Implement AAA using TACACS+ and RADIUS
protocols
• Implement AAA Authorization and Accounting
Accounting
What did you spend it on?
Username: Admin
Password: cisco12
Internet % Login invalid
R1 R1 Firewall R2
LAN 1 Internet Internet
LAN 3
Console Port
Administrator
Commands to establish a
login password on the
console line
© 2009 Cisco Learning Institute. 12
Creating Users
Parameter Description
name This parameter specifies the username.
0 (Optional) This option indicates that the plaintext
password is to be hashed by the router using MD5.
password This parameter is the plaintext password to be
hashed using MD5.
5 This parameter indicates that the encrypted-secret
password was hashed using MD5.
encrypted-secret This parameter is the MD5 encrypted-secret
password that is stored as the encrypted user
password.
© 2009 Cisco Learning Institute. 13
Enhanced Login Features
The following commands are available to configure a Cisco
IOS device to support the enhanced login features:
• Packet Mode
A user sends a request to
establish a connection through
the router with a device on the
network
2
3
Self-Contained AAA
1. The client establishes a connection with the router.
2. The AAA router prompts the user for a username and password.
3. The router authenticates the username and password using the local database and the user is authorized to access the network
based on information in the local database.
2 3
4
Server-Based AAA
1. The client establishes a connection with the router.
2. The AAA router prompts the user for a username and password.
3. The router authenticates the username and password using a remote AAA server.
4. The user is authorized to access the network based on information on the remote AAA Server.
R1# conf t
R1(config)# username JR-ADMIN secret Str0ngPa55w0rd
R1(config)# username ADMIN secret Str0ng5rPa55w0rd
R1(config)# aaa new-model
R1(config)# aaa authentication login default local-case
R1(config)# aaa local authentication attempts max-fail 10
router(config)#
aaa authentication login {default | list-name}
method1…[method4]
Command Description
Keywords Description
enable Uses the enable password for authentication. This keyword cannot be used.
router(config)#
aaa local authentication attempts max-fail [number-of-
unsuccessful-attempts]
R1# conf t
R1(config)# username JR-ADMIN secret Str0ngPa55w0rd
R1(config)# username ADMIN secret Str0ng5rPa55w0rd
R1(config)# aaa new-model
R1(config)# aaa authentication login default local-case enable
R1(config)# aaa authentication login TELNET-LOGIN local-case
R1(config)# line vty 0 4
R1(config-line)# login authentication TELNET-LOGIN
2. Click Add
3. Enter username
and password
4. Choose 15
5. Check the box and
select a view
6. Click OK
© 2009 Cisco Learning Institute. 29
Configure Login Authentication
3. Click Add
4. Choose local
5. Click OK
6. Click OK
Local Authentication
1. The user establishes a connection with the router.
2. The router prompts the user for a username and password authenticating
the user using a local database.
Cisco Secure ACS
for Windows Server
Perimeter
1 Router
3
2
4
Remote User
Server-Based Authentication
1. The user establishes a connection with the router.
2. The router prompts the user for a username and password.
3. The router passes the username and password to the Cisco Secure ACS (server or engine).
4. The Cisco Secure ACS authenticates the user. The user is authorized to access the router (administrative access) or the
network based on information found in the Cisco Secure ACS database.
TACACS+ RADIUS
Functionality Separates AAA according to the AAA Combines authentication and
architecture, allowing modularity of authorization but separates
the security server implementation accounting, allowing less flexibility in
implementation than TACACS+.
Standard Mostly Cisco supported Open/RFC standard
JR-ADMIN JR-ADMIN
Password prompt?
Accept/Reject
Access-Request
Username? (JR_ADMIN, “Str0ngPa55w0rd”)
JR-ADMIN Access-Accept
Password?
Str0ngPa55w0rd
4. Click configure
5. Configure options
4. Click Submit
© 2009 Cisco Learning Institute. 50
Configuring Server-Based AAA
Authentication
2. Click Add
3. Choose TACACS+
192.168.1.101 4. Enter the IP address
(or hostname) of the
AAA server
5. Check the Single
Connection check box to
maintain a single
connection
2. Click Add
3. Choose User Defined
5. Click Add
8. Click Add to add a backup method 9. Choose enable from the list
Click OK twice
© 2009 Cisco Learning Institute. 55
Apply Authentication Policy
1. Choose Configure>Additional Tasks>Router Access>VTY
2. Click Edit
Display “show
Accept
version” output
Do not permit
Reject
“configure terminal”
R1# conf t
R1(config)# username JR-ADMIN secret Str0ngPa55w0rd
R1(config)# username ADMIN secret Str0ng5rPa55w0rd
R1(config)# aaa new-model
R1(config)# aaa authentication login default group tacacs+
R1(config)# aaa authentication login TELNET-LOGIN local-case
R1(config)# aaa authorization exec default group tacacs+
R1(config)# aaa authorization network default group tacacs+
R1(config)# line vty 0 4
R1(config-line)# login authentication TELNET-LOGIN
R1(config-line)# ^Z
2. Click Add
3. Choose Default
4. Click Add
2. Click Add
3. Choose Default
4. Click Add
R1# conf t
R1(config)# username JR-ADMIN secret Str0ngPa55w0rd
R1(config)# username ADMIN secret Str0ng5rPa55w0rd
R1(config)# aaa new-model
R1(config)# aaa authentication login default group tacacs+
R1(config)# aaa authentication login TELNET-LOGIN local-case
R1(config)# aaa authorization exec group tacacs+
R1(config)# aaa authorization network group tacacs+
R1(config)# aaa accounting exec start-stop group tacacs+
R1(config)# aaa accounting network start-stop group tacacs+
R1(config)# line vty 0 4
R1(config-line)# login authentication TELNET-LOGIN
R1(config-line)# ^Z