SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
AAA Protocol
AAA stands for Authentication, Authorization and Accounting.
This protocol was defined by the Internet Engineering Task Force in RFC 6733 and is intended to provide
an Authentication, Authorization, and Accounting (AAA) framework for applications such as network
access or IP mobility in both local and roaming situations.
 Authentication is the process of identifying an individual, usually based on a username and
password. Authentication is based on the idea that each individual user will have unique
information that sets him or her apart from other users.
 Authorization is the process of granting or denying a user access to network resources once the
user has been authenticated through the username and password. The amount of information
and the amount of services the user has access to depend on the user's authorization level.
 Accounting is the process of keeping track of a user's activity while accessing the network
resources, including the amount of time spent in the network, the services accessed while there
and the amount of data transferred during the session. Accounting data is used for trend
analysis, capacity planning, billing, auditing and cost allocation.
AAA is used in scenarios where a NAS(Network Access Server) or a RAS(Remote Access server) Acts like a
switch granting or denying access to the internet or intranet for a user based on AAA authentication &
authorization.
Elements of Authentication
When performing authentication, numerous elements can be evaluated before a PDP reaches its access
decision. At a high level, these elements can be broken down into three categories: the principal itself
(the user, device, or service requesting access), the credential the principal submits (shared key, one-
time password, digital certificate, or biometric credential), and the contextual information describing
the transaction (location, time of day, software state, and so on).
Figure 1 AAA Working
AAA Protocol
 Principal: The principal is the entity requesting authorization. It is generally some combination of
user, device, or service. When concerned with a user, the PIP can provide attributes about the
user such as role or group affiliations, job title, e-mail address, physical address, and so on.
 Credential: The next element the PDP considers is the credential the user or device submits as
proof of identity. There are four main types of credentials: shared key (password), one-time
password (OTP), digital certificate, and biometric credential. This section examines each of these
types. The first and most widely used form of credential is the shared key, typically a user
password. AAA deployments that use shared keys can be subdivided based on the protocol the
system uses to verify the password, including the Password Authentication Protocol (PAP),
Challenge Handshake Authentication Protocol (CHAP), and Microsoft CHAP Extensions (MS-
CHAP) Versions 1 and 2. PAP authentication is a plaintext authentication method that is not
recommended for use in security-sensitive environments.
Authorization Approaches
At its core, authorization means determining what a client is allowed to do on the network. However,
the granularity of this authorization is only as good as the sophistication of the PDP and the
enforcement capabilities of the PEP. This section examines the authorization options for network AAA,
including Layer 2 segmentation, Layer 3 filtering, and Layer 7 entitlements. It closes with an examination
of some of the challenges encountered when sending or "provisioning" the authorizations from the PDP
to the PEP.
 Null Authorization (Authentication Only): Strangely the most common authorization in AAA is
no authorization at all. After the authentication event occurs, the client is immediately granted
full access to the network. This characteristic is a holdover from the original goal of remote-
access AAA: to perform an authentication check that simply determines whether the client
should be trusted as if it were connected to the organization's home network.
 Layer 2 Segmentation: For wireless access points and Ethernet switches, the most common form
of authorization enforcement is Layer 2 segmentation, which works by splitting the network into
multiple logical segments, isolating certain classes of client from one another.
 Layer 3 Filtering: Layer 3 filtering authorizes access to resources through ACLs configured on
Layer 3 devices (routers, Ethernet switches, security gateways, and so on). These ACLs (which
generally encompass Layer 4 of the OSI stack as well) can enforce authorizations to a range of
hosts, specific hosts, or services on those hosts. As mentioned earlier, Layer 3 filtering can be
combined with Layer 2 segmentation to provide aggregate authorizations for an entire VLAN.
 Layer 7 Entitlements: Increasingly, security gateways are able to go beyond Layer 3 and 4
filtering and are starting to become application-aware, meaning that the authorizations handed
from the PDP to the PEP can be very granular, focusing on the specific applications that are
needed rather than broader filters based on segments or hosts on the network. Because this
technology is still relatively new, there are no standards yet to make this interaction work
AAA Protocol
transparently. As a result, most granular application filters are written on the PEP itself in order
to allow the PDP to trigger a pre-existing profile on the PEP.
 Provisioning Challenges: In AAA parlance, the term "provisioning" refers to communicating a
user's session rights and constraints to the PEP so that the PEP can grant and enforce these
permissions. One of the most difficult aspects of provisioning access rights on a PEP is
communicating the decision of the PDP in a format the PEP can understand. This fact is one of
the reasons that many PEPs come with a lightweight PDP. This approach solves the narrow
problem for that PEP but creates management challenges when coordinating network AAA
across a broader enterprise, because the enterprise AAA policies must be implemented
individually on each unique type of PEP on the network. Because RADIUS is the most commonly
used network AAA protocol, it is natural to communicate the PDP decision using that protocol.
RADIUS attributes such as the "filter-id" allow the PDP to trigger a preexisting filter on the PEP.
Network Access Server (NAS)
The Network Access Server (NAS) is a service element that clients dial in order to get access to the
network. An NAS is a device having interfaces both to the backbone and to the POTS or ISDN, and
receives calls from hosts that want to access the backbone by dialup services. NAS is located at an
Internet provider's point of presence to provide Internet access to its customers.
A Network Access Server is:
 A single point of access to a remote resource.
 A Remote Access Server, because it allows remote access to a network.
 An Initial Entry Point to a network.
 A Gateway to guard to protected resource.
Figure 2 Basic Architecture of NAS/Radius/AAA
AAA Protocol
AAA Flow
1. The client attempts to connect to the network, is challenged for identity information, and sends
this information to the PEP. In this example, let's assume the client is a laptop with a worker
attempting to access an organization's VPN from a remote location. Additionally, we'll assume
this is a valid, permitted use of the network.
2. The PEP sends the collected identity information to the PDP. In some cases (discussed in part two
of this article), the PEP cannot see the specific identity information provided but instead relays
the information directly to the PDP.
3. The PDP queries any configured PIPs for information about the client and validates that the
credential provided by the client is valid. In this example, the PIP is an LDAP directory.
Figure 3 A Client Connects to a AAA-Protected Network
AAA Protocol
4. The PIP returns a success or failure message from the credential validation step and sends
additional information about the client to the PDP for evaluation. This information could include
the role of the user, the home location for the user, and so on.
5. The PDP evaluates information learned about the client through the client, PEP, and PIP; the role
of the PEP and PIP that serviced the request; and any contextual information (such as time of
day) against its configured policies. Based on this information, the PDP makes an authorization
decision.
6. The PDP sends the PEP the authentication result and any authorizations specific to the client.
These authorizations trigger specific PEP actions to apply to the client. For example, the
authorization data might trigger specific Access Control Lists (ACLs) or IP pool assignments for
the client.
7. The PDP also sends the result of this transaction to the accounting system.
8. The PEP applies the authorization profile learned from the PDP and sends the "authentication
successful" message to the client. The PEP can also be configured to send accounting information
on this new connection to the accounting and reporting system.
9. The client accesses the production network through the PEP.
Types of AAA Servers
 Access Network AAA (AN-AAA): Communicates with the RNC in the Access Network (AN) to
enable authentication and authorization functions to be performed at the AN. The interface
between AN and AN-AAA is known as the A12 interface.
 Broker AAA (B-AAA): Acts as an intermediary to proxy AAA traffic between roaming partner
networks (i.e., between the H-AAA server in the home network and V-AAA server in the serving
network). B-AAA servers are used in CRX networks to enable CRX providers to offer billing
settlement functions.
 Home AAA (H-AAA): The AAA server in the roamer's home network. The H-AAA is similar to the
HLR in voice. The H-AAA stores user profile information, responds to authentication requests,
and collects accounting information.
 Visited AAA (V-AAA): The AAA server in the visited network from which a roamer is receiving
service. The V-AAA in the serving network communicates with the H-AAA in a roamer's home
network. Authentication requests and accounting information are forwarded by the V-AAA to
the H-AAA, either directly or through a B-AAA.
AAA Protocol
Core Components of AAA
 Client: The client is the device attempting to access the network. The client either authenticates
itself, or it acts as a proxy to authenticate the user.
 Policy Enforcement Point (Authenticator): The Policy Enforcement Point (PEP) is sometimes
called the authenticator or dial-in server, VPN concentrator, firewall, gateway General Packet
Radio Service (GPRS) support node, Ethernet switch, wireless access point, or an inline security
gateway. The PEP is responsible for enforcing the terms of a client's access. This enforcement
varies based on the capabilities of the PEP and is discussed later in this article.
 Policy Information Point: The Policy Information Point (PIP) is a repository of information to help
make the access decision. It could be a database of device IDs, a user directory such as the
Lightweight Directory Access Protocol (LDAP), a one-time password (OTP) token server, or any
other system that houses data relevant to a device or user access request.
 Policy Decision Point (AAA Server): The Policy Decision Point (PDP) is the brain of the AAA
decision. It collects the access request from the client through the PEP. It also queries any
relevant PIPs to gather the information it needs to make the access decision. The PDP, as its
name implies, is the entity that makes the final decision around network access. It also can send
specific authorizations back to the PEP that apply settings or constraints to the client's network
traffic.
 Accounting and Reporting System: Whether on a dedicated system or built as part of a PDP,
tracking use of the network with accounting is one of the best features of AAA. With all forms of
network access now offering controlled access, the AAA service can tell you who got on the
network, from where, and what that person was granted access to.
AAA Protocols
Radius is an AAA protocol for applications such as Network Access or IP Mobility. Besides Radius, we
have the following protocols in AAA:
Terminal Access Controller Access Control System (TACACS)
TACACS is a remote authentication protocol that is used to communicate with an authentication server
commonly used in Unix networks. TACACS allows a remote access server to communicate with an
authentication server in order to determine if the user has access to the network.
TACACS+
TACACS+ provides access control for routers, network access servers, and other networked computing
devices via one or more centralized servers. It uses TCP and provides separate authentication,
authorization, and accounting services. It works on port 49.
AAA Protocol
DIAMETER
Diameter is a planned replacement of Radius.
Benefits of Using AAA
AAA provides the following benefits:
 Increased flexibility and control of access configuration
 Scalability
 Standardized authentication methods, such as RADIUS and TACACS+
 Multiple backup devices
Choosing between RADIUS and TACACS
 RADIUS Advantages
The main advantage of RADIUS is availability. Although all modern Cisco devices support TACACS+,
support outside the Cisco community is limited. If you work on a mixed vendor network, RADIUS is likely
the best option available.
 TACACS+ Advantages
As an extension of the RADIUS protocol, TACACS+ implements most of the features of RADIUS. The
advantages of TACACS+ are in how it changes the implementation of RADIUS, as well as how it extends
the protocol to meet the needs of modern networks.
1. TACACS+ uses TCP instead of UDP. TCP guarantees communication between the client and
server. Unlike UDP, which is connectionless, TCP initiates a connection with the server and is not
as susceptible to situations such as network congestion and server crashes.
2. TACACS+ encrypts all of the data in the TACACS+ packet. Although RADIUS does encrypt the
password in the packet, it doesn't protect against other data interception such as username and
accounting information.
3. TACACS+ allows for different methods of authentication, authorization, and accounting. RADIUS
couples authentication and authorization, making it difficult to use different servers for these
purposes.
4. TACACS+ allows a network administrator to define what commands a user may run. This fine
grain level of control allows more controlled access for a greater number of users on a network.
When choosing an AAA protocol to use on a Cisco-based network, TACACS+ is the obvious choice.
RADIUS (or a combination of TACAS+ and RADIUS) may be required if the network uses non-Cisco
devices that do not support the TACACS+ protocol.
AAA Protocol
Basic AAA Configuration on IOS
Steps to configuring AAA:
 Enable AAA
Router(config)# aaa new-model
 Configure authentication, using RADIUS or TACACS+
There are two approaches to configuring TACACS+ servers. In the first, servers are specified in
global configuration mode using the command tacacs-server to specify an IP address and shared
secret key for each server:
Router(config)# tacacs-server host 192.168.1.3 key MySecretKey1
Router(config)# tacacs-server host 192.168.2.3 key MySecretKey2
This approach is sufficient for many deployments, but is problematic if you want to reference
only a subset of the defined servers for a certain AAA function. For example, suppose you want
to use one TACACS+ server for control plane authentication on the router itself, and the second
server for authenticating PPP connections. In this case, you would assign the servers to named
AAA server groups:
Router(config)# aaa group server tacacs+ LoginAuth
Router(config-sg-tacacs+)# server 192.168.1.3
Router(config)# aaa group server tacacs+ PPPAuth
Router(config-sg-tacacs+)# server 192.168.2.3
 Define the method lists for authentication
Router(config)# aaa authentication login default group tacacs+ local
The above method list handles only the authentication aspect of AAA. By itself, this list only
allows us to authenticate as a user with privilege level 1 (user exec mode). To communicate a
heightened privilege level (e.g. privilege level 15, or "enable mode") from the TACACS+ server,
we also need to define an authorization method list for IOS shell creation.
Router(config)# aaa authorization exec default group tacacs+ local
 Apply the method lists per line/ per interface
Router(config)# line console 0
Router(config-line)# login authentication default
Router(config)# line vty 0 15
Router(config-line)# login authentication default

More Related Content

What's hot (20)

PDF
AAA & RADIUS Protocols
Peter R. Egli
 
PDF
Application layer security protocol
Kirti Ahirrao
 
PDF
Routing in Mobile Ad hoc Networks
Sayed Chhattan Shah
 
PDF
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
PPTX
Kerberos
Rahul Pundir
 
PPTX
Ftp: a slideshow on File transfer protocol
Lina Guha Roy
 
PDF
TACACS Protocol
Netwax Lab
 
PPTX
SMS
JAINIK PATEL
 
PPT
Authentication Protocols
Trinity Dwarka
 
PPTX
Cisco Identity Services Engine (ISE)
Anwesh Dixit
 
PDF
IPSec (Internet Protocol Security) - PART 1
Shobhit Sharma
 
PPTX
Transport Layer Security (TLS)
Arun Shukla
 
PPT
Secure Socket Layer
Naveen Kumar
 
PDF
symmetric key encryption algorithms
Rashmi Burugupalli
 
PPTX
x.509-Directory Authentication Service
Swathy T
 
PPTX
Distributed web based systems
Reza Gh
 
PPT
DHCP
Kashif Latif
 
PPTX
IEEE 802.1 x
Anwesh Dixit
 
PPT
RADIUS
amogh_ubale
 
AAA & RADIUS Protocols
Peter R. Egli
 
Application layer security protocol
Kirti Ahirrao
 
Routing in Mobile Ad hoc Networks
Sayed Chhattan Shah
 
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
Kerberos
Rahul Pundir
 
Ftp: a slideshow on File transfer protocol
Lina Guha Roy
 
TACACS Protocol
Netwax Lab
 
Authentication Protocols
Trinity Dwarka
 
Cisco Identity Services Engine (ISE)
Anwesh Dixit
 
IPSec (Internet Protocol Security) - PART 1
Shobhit Sharma
 
Transport Layer Security (TLS)
Arun Shukla
 
Secure Socket Layer
Naveen Kumar
 
symmetric key encryption algorithms
Rashmi Burugupalli
 
x.509-Directory Authentication Service
Swathy T
 
Distributed web based systems
Reza Gh
 
IEEE 802.1 x
Anwesh Dixit
 
RADIUS
amogh_ubale
 

Viewers also liked (20)

ODP
AAA in a nutshell
Mohamed Daif
 
PPT
Implementing Cisco AAA
dkaya
 
PDF
The Three Musketeers (Authentication, Authorization, Accounting)
Sarah Conway
 
PPT
CCNA Security 06- AAA
Ahmed Habib
 
PPT
A A A
Cristian Vat
 
PPTX
Security
Akram Salih
 
PPTX
Authentication, authorization, and accounting Nawaf-Sultan
Nawaf_alghamdi
 
ODP
Authentication Concepts
Charles Southerland
 
PPT
High Risk EVAR
Pascual Lozano-Vilardell
 
PPT
Design and Performance Optimization of Authentication, Authorization, and Acc...
saidzaghloul
 
PDF
Cisco acs configuration guide
RichardsCCNA
 
PPT
Keamanan Jaringan - Pertemuan 4
Abrianto Nugraha
 
PPTX
Capturing Network Traffic into Database
Tigran Tsaturyan
 
PPTX
Wireshar training
Luke Luo
 
PPTX
Convert Wireshark PCAP Files to Sequence Diagrams
EventHelix.com Inc.
 
PPT
20 años de EVAR
Pascual Lozano-Vilardell
 
PPTX
Authentication and Authorization in Asp.Net
Shivanand Arur
 
PPTX
Radius server,PAP and CHAP Protocols
Dhananjay Aloorkar
 
PPTX
STEMI and Acute Coronary Syndromes
Rommie Duckworth
 
PDF
Wireless Technology
Netwax Lab
 
AAA in a nutshell
Mohamed Daif
 
Implementing Cisco AAA
dkaya
 
The Three Musketeers (Authentication, Authorization, Accounting)
Sarah Conway
 
CCNA Security 06- AAA
Ahmed Habib
 
Security
Akram Salih
 
Authentication, authorization, and accounting Nawaf-Sultan
Nawaf_alghamdi
 
Authentication Concepts
Charles Southerland
 
High Risk EVAR
Pascual Lozano-Vilardell
 
Design and Performance Optimization of Authentication, Authorization, and Acc...
saidzaghloul
 
Cisco acs configuration guide
RichardsCCNA
 
Keamanan Jaringan - Pertemuan 4
Abrianto Nugraha
 
Capturing Network Traffic into Database
Tigran Tsaturyan
 
Wireshar training
Luke Luo
 
Convert Wireshark PCAP Files to Sequence Diagrams
EventHelix.com Inc.
 
20 años de EVAR
Pascual Lozano-Vilardell
 
Authentication and Authorization in Asp.Net
Shivanand Arur
 
Radius server,PAP and CHAP Protocols
Dhananjay Aloorkar
 
STEMI and Acute Coronary Syndromes
Rommie Duckworth
 
Wireless Technology
Netwax Lab
 
Ad

Similar to AAA Protocol (20)

PDF
The authenticated network architecture
Motty Ben Atia
 
PPT
8.X Sec & I Pv6
phanleson
 
PDF
Alepo aaa transformation webinar with telesemana
Rafael Junquera
 
PDF
Ccna sec 01
EduclentMegasoftel
 
PPSX
SwitchSecurity SwitchSecurity SwitchSecurity SwitchSecurity
VahidMouasvi
 
PDF
Enterprise Edge Security with Cisco ISE
Fast Lane Consulting and Education, Inc.
 
PDF
Unit 5 - Designing Internet Systems and Servers - IT
Deepraj Bhujel
 
PDF
Ii2514901494
IJERA Editor
 
PDF
Self-Protecting Information for De-Perimiterised Electronic Relationships
Jeremy Hilton
 
PPTX
AAA Best Practices
Sagar Gor
 
PPT
Chapter No 19 - Network and Security-by-MIT
KamranHussainAwan
 
PDF
IEEE 802.1X and Axis’ Implementation
Axis Communications
 
PPT
Ip security
Dr.K.Sreenivas Rao
 
PPTX
Cryptography and Network security # Lecture 8
Kabul Education University
 
DOCX
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
bartholomeocoombs
 
PPT
Ip sec
shifanabasheer
 
PPTX
WINSEM2023-24_BCSE354E_ETH_VL2023240501654_2024-01-11_Reference-Material-I.pptx
saurav1153e
 
PPTX
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
PragyanshuParadkar1
 
The authenticated network architecture
Motty Ben Atia
 
8.X Sec & I Pv6
phanleson
 
Alepo aaa transformation webinar with telesemana
Rafael Junquera
 
Ccna sec 01
EduclentMegasoftel
 
SwitchSecurity SwitchSecurity SwitchSecurity SwitchSecurity
VahidMouasvi
 
Enterprise Edge Security with Cisco ISE
Fast Lane Consulting and Education, Inc.
 
Unit 5 - Designing Internet Systems and Servers - IT
Deepraj Bhujel
 
Ii2514901494
IJERA Editor
 
Self-Protecting Information for De-Perimiterised Electronic Relationships
Jeremy Hilton
 
AAA Best Practices
Sagar Gor
 
Chapter No 19 - Network and Security-by-MIT
KamranHussainAwan
 
IEEE 802.1X and Axis’ Implementation
Axis Communications
 
Ip security
Dr.K.Sreenivas Rao
 
Cryptography and Network security # Lecture 8
Kabul Education University
 
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
bartholomeocoombs
 
WINSEM2023-24_BCSE354E_ETH_VL2023240501654_2024-01-11_Reference-Material-I.pptx
saurav1153e
 
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
PragyanshuParadkar1
 
Ad

More from Netwax Lab (20)

PDF
Eincop Netwax Lab: Lab 1 static route
Netwax Lab
 
PDF
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Netwax Lab
 
PDF
Eincop Netwax Lab: Redistribution
Netwax Lab
 
PDF
Eincop Netwax Lab: Route Redistribution
Netwax Lab
 
PDF
Nxll12 zone based firewall
Netwax Lab
 
PDF
Nxll11 bgp
Netwax Lab
 
PDF
Nxll09 access list
Netwax Lab
 
PDF
Nxll21 ospf filtering & summarization
Netwax Lab
 
PDF
Nxll10 v lan and trunking
Netwax Lab
 
PDF
Nxll16 basic asa v8.2
Netwax Lab
 
PDF
Nxll20 na ting
Netwax Lab
 
PDF
Nxll14 cut through-proxy on asa
Netwax Lab
 
PDF
Nxll17 dynamic routing with asa
Netwax Lab
 
PDF
Nxll18 vpn (s2 s gre & dmvpn)
Netwax Lab
 
PDF
Nxll19 vrrp (virtual router redundancy protocol)
Netwax Lab
 
PDF
Nxll22 role based cli
Netwax Lab
 
PDF
Nxll25 hsrp with failover
Netwax Lab
 
PDF
Nxll26 bgp ii
Netwax Lab
 
PDF
Nxll28 ospf iii
Netwax Lab
 
PDF
Nxll23 i pv6
Netwax Lab
 
Eincop Netwax Lab: Lab 1 static route
Netwax Lab
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Netwax Lab
 
Eincop Netwax Lab: Redistribution
Netwax Lab
 
Eincop Netwax Lab: Route Redistribution
Netwax Lab
 
Nxll12 zone based firewall
Netwax Lab
 
Nxll11 bgp
Netwax Lab
 
Nxll09 access list
Netwax Lab
 
Nxll21 ospf filtering & summarization
Netwax Lab
 
Nxll10 v lan and trunking
Netwax Lab
 
Nxll16 basic asa v8.2
Netwax Lab
 
Nxll20 na ting
Netwax Lab
 
Nxll14 cut through-proxy on asa
Netwax Lab
 
Nxll17 dynamic routing with asa
Netwax Lab
 
Nxll18 vpn (s2 s gre & dmvpn)
Netwax Lab
 
Nxll19 vrrp (virtual router redundancy protocol)
Netwax Lab
 
Nxll22 role based cli
Netwax Lab
 
Nxll25 hsrp with failover
Netwax Lab
 
Nxll26 bgp ii
Netwax Lab
 
Nxll28 ospf iii
Netwax Lab
 
Nxll23 i pv6
Netwax Lab
 

Recently uploaded (20)

PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PDF
Researching The Best Chat SDK Providers in 2025
Ray Fields
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PPTX
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PPTX
Agentic AI in Healthcare Driving the Next Wave of Digital Transformation
danielle hunter
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
introduction to computer hardware and sofeware
chauhanshraddha2007
 
PDF
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
PDF
NewMind AI Weekly Chronicles – July’25, Week III
NewMind AI
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Per Axbom: The spectacular lies of maps
Nexer Digital
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
Researching The Best Chat SDK Providers in 2025
Ray Fields
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Agentic AI in Healthcare Driving the Next Wave of Digital Transformation
danielle hunter
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
introduction to computer hardware and sofeware
chauhanshraddha2007
 
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
NewMind AI Weekly Chronicles – July’25, Week III
NewMind AI
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Per Axbom: The spectacular lies of maps
Nexer Digital
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 

AAA Protocol

  • 1. AAA Protocol AAA stands for Authentication, Authorization and Accounting. This protocol was defined by the Internet Engineering Task Force in RFC 6733 and is intended to provide an Authentication, Authorization, and Accounting (AAA) framework for applications such as network access or IP mobility in both local and roaming situations.  Authentication is the process of identifying an individual, usually based on a username and password. Authentication is based on the idea that each individual user will have unique information that sets him or her apart from other users.  Authorization is the process of granting or denying a user access to network resources once the user has been authenticated through the username and password. The amount of information and the amount of services the user has access to depend on the user's authorization level.  Accounting is the process of keeping track of a user's activity while accessing the network resources, including the amount of time spent in the network, the services accessed while there and the amount of data transferred during the session. Accounting data is used for trend analysis, capacity planning, billing, auditing and cost allocation. AAA is used in scenarios where a NAS(Network Access Server) or a RAS(Remote Access server) Acts like a switch granting or denying access to the internet or intranet for a user based on AAA authentication & authorization. Elements of Authentication When performing authentication, numerous elements can be evaluated before a PDP reaches its access decision. At a high level, these elements can be broken down into three categories: the principal itself (the user, device, or service requesting access), the credential the principal submits (shared key, one- time password, digital certificate, or biometric credential), and the contextual information describing the transaction (location, time of day, software state, and so on). Figure 1 AAA Working
  • 2. AAA Protocol  Principal: The principal is the entity requesting authorization. It is generally some combination of user, device, or service. When concerned with a user, the PIP can provide attributes about the user such as role or group affiliations, job title, e-mail address, physical address, and so on.  Credential: The next element the PDP considers is the credential the user or device submits as proof of identity. There are four main types of credentials: shared key (password), one-time password (OTP), digital certificate, and biometric credential. This section examines each of these types. The first and most widely used form of credential is the shared key, typically a user password. AAA deployments that use shared keys can be subdivided based on the protocol the system uses to verify the password, including the Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), and Microsoft CHAP Extensions (MS- CHAP) Versions 1 and 2. PAP authentication is a plaintext authentication method that is not recommended for use in security-sensitive environments. Authorization Approaches At its core, authorization means determining what a client is allowed to do on the network. However, the granularity of this authorization is only as good as the sophistication of the PDP and the enforcement capabilities of the PEP. This section examines the authorization options for network AAA, including Layer 2 segmentation, Layer 3 filtering, and Layer 7 entitlements. It closes with an examination of some of the challenges encountered when sending or "provisioning" the authorizations from the PDP to the PEP.  Null Authorization (Authentication Only): Strangely the most common authorization in AAA is no authorization at all. After the authentication event occurs, the client is immediately granted full access to the network. This characteristic is a holdover from the original goal of remote- access AAA: to perform an authentication check that simply determines whether the client should be trusted as if it were connected to the organization's home network.  Layer 2 Segmentation: For wireless access points and Ethernet switches, the most common form of authorization enforcement is Layer 2 segmentation, which works by splitting the network into multiple logical segments, isolating certain classes of client from one another.  Layer 3 Filtering: Layer 3 filtering authorizes access to resources through ACLs configured on Layer 3 devices (routers, Ethernet switches, security gateways, and so on). These ACLs (which generally encompass Layer 4 of the OSI stack as well) can enforce authorizations to a range of hosts, specific hosts, or services on those hosts. As mentioned earlier, Layer 3 filtering can be combined with Layer 2 segmentation to provide aggregate authorizations for an entire VLAN.  Layer 7 Entitlements: Increasingly, security gateways are able to go beyond Layer 3 and 4 filtering and are starting to become application-aware, meaning that the authorizations handed from the PDP to the PEP can be very granular, focusing on the specific applications that are needed rather than broader filters based on segments or hosts on the network. Because this technology is still relatively new, there are no standards yet to make this interaction work
  • 3. AAA Protocol transparently. As a result, most granular application filters are written on the PEP itself in order to allow the PDP to trigger a pre-existing profile on the PEP.  Provisioning Challenges: In AAA parlance, the term "provisioning" refers to communicating a user's session rights and constraints to the PEP so that the PEP can grant and enforce these permissions. One of the most difficult aspects of provisioning access rights on a PEP is communicating the decision of the PDP in a format the PEP can understand. This fact is one of the reasons that many PEPs come with a lightweight PDP. This approach solves the narrow problem for that PEP but creates management challenges when coordinating network AAA across a broader enterprise, because the enterprise AAA policies must be implemented individually on each unique type of PEP on the network. Because RADIUS is the most commonly used network AAA protocol, it is natural to communicate the PDP decision using that protocol. RADIUS attributes such as the "filter-id" allow the PDP to trigger a preexisting filter on the PEP. Network Access Server (NAS) The Network Access Server (NAS) is a service element that clients dial in order to get access to the network. An NAS is a device having interfaces both to the backbone and to the POTS or ISDN, and receives calls from hosts that want to access the backbone by dialup services. NAS is located at an Internet provider's point of presence to provide Internet access to its customers. A Network Access Server is:  A single point of access to a remote resource.  A Remote Access Server, because it allows remote access to a network.  An Initial Entry Point to a network.  A Gateway to guard to protected resource. Figure 2 Basic Architecture of NAS/Radius/AAA
  • 4. AAA Protocol AAA Flow 1. The client attempts to connect to the network, is challenged for identity information, and sends this information to the PEP. In this example, let's assume the client is a laptop with a worker attempting to access an organization's VPN from a remote location. Additionally, we'll assume this is a valid, permitted use of the network. 2. The PEP sends the collected identity information to the PDP. In some cases (discussed in part two of this article), the PEP cannot see the specific identity information provided but instead relays the information directly to the PDP. 3. The PDP queries any configured PIPs for information about the client and validates that the credential provided by the client is valid. In this example, the PIP is an LDAP directory. Figure 3 A Client Connects to a AAA-Protected Network
  • 5. AAA Protocol 4. The PIP returns a success or failure message from the credential validation step and sends additional information about the client to the PDP for evaluation. This information could include the role of the user, the home location for the user, and so on. 5. The PDP evaluates information learned about the client through the client, PEP, and PIP; the role of the PEP and PIP that serviced the request; and any contextual information (such as time of day) against its configured policies. Based on this information, the PDP makes an authorization decision. 6. The PDP sends the PEP the authentication result and any authorizations specific to the client. These authorizations trigger specific PEP actions to apply to the client. For example, the authorization data might trigger specific Access Control Lists (ACLs) or IP pool assignments for the client. 7. The PDP also sends the result of this transaction to the accounting system. 8. The PEP applies the authorization profile learned from the PDP and sends the "authentication successful" message to the client. The PEP can also be configured to send accounting information on this new connection to the accounting and reporting system. 9. The client accesses the production network through the PEP. Types of AAA Servers  Access Network AAA (AN-AAA): Communicates with the RNC in the Access Network (AN) to enable authentication and authorization functions to be performed at the AN. The interface between AN and AN-AAA is known as the A12 interface.  Broker AAA (B-AAA): Acts as an intermediary to proxy AAA traffic between roaming partner networks (i.e., between the H-AAA server in the home network and V-AAA server in the serving network). B-AAA servers are used in CRX networks to enable CRX providers to offer billing settlement functions.  Home AAA (H-AAA): The AAA server in the roamer's home network. The H-AAA is similar to the HLR in voice. The H-AAA stores user profile information, responds to authentication requests, and collects accounting information.  Visited AAA (V-AAA): The AAA server in the visited network from which a roamer is receiving service. The V-AAA in the serving network communicates with the H-AAA in a roamer's home network. Authentication requests and accounting information are forwarded by the V-AAA to the H-AAA, either directly or through a B-AAA.
  • 6. AAA Protocol Core Components of AAA  Client: The client is the device attempting to access the network. The client either authenticates itself, or it acts as a proxy to authenticate the user.  Policy Enforcement Point (Authenticator): The Policy Enforcement Point (PEP) is sometimes called the authenticator or dial-in server, VPN concentrator, firewall, gateway General Packet Radio Service (GPRS) support node, Ethernet switch, wireless access point, or an inline security gateway. The PEP is responsible for enforcing the terms of a client's access. This enforcement varies based on the capabilities of the PEP and is discussed later in this article.  Policy Information Point: The Policy Information Point (PIP) is a repository of information to help make the access decision. It could be a database of device IDs, a user directory such as the Lightweight Directory Access Protocol (LDAP), a one-time password (OTP) token server, or any other system that houses data relevant to a device or user access request.  Policy Decision Point (AAA Server): The Policy Decision Point (PDP) is the brain of the AAA decision. It collects the access request from the client through the PEP. It also queries any relevant PIPs to gather the information it needs to make the access decision. The PDP, as its name implies, is the entity that makes the final decision around network access. It also can send specific authorizations back to the PEP that apply settings or constraints to the client's network traffic.  Accounting and Reporting System: Whether on a dedicated system or built as part of a PDP, tracking use of the network with accounting is one of the best features of AAA. With all forms of network access now offering controlled access, the AAA service can tell you who got on the network, from where, and what that person was granted access to. AAA Protocols Radius is an AAA protocol for applications such as Network Access or IP Mobility. Besides Radius, we have the following protocols in AAA: Terminal Access Controller Access Control System (TACACS) TACACS is a remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network. TACACS+ TACACS+ provides access control for routers, network access servers, and other networked computing devices via one or more centralized servers. It uses TCP and provides separate authentication, authorization, and accounting services. It works on port 49.
  • 7. AAA Protocol DIAMETER Diameter is a planned replacement of Radius. Benefits of Using AAA AAA provides the following benefits:  Increased flexibility and control of access configuration  Scalability  Standardized authentication methods, such as RADIUS and TACACS+  Multiple backup devices Choosing between RADIUS and TACACS  RADIUS Advantages The main advantage of RADIUS is availability. Although all modern Cisco devices support TACACS+, support outside the Cisco community is limited. If you work on a mixed vendor network, RADIUS is likely the best option available.  TACACS+ Advantages As an extension of the RADIUS protocol, TACACS+ implements most of the features of RADIUS. The advantages of TACACS+ are in how it changes the implementation of RADIUS, as well as how it extends the protocol to meet the needs of modern networks. 1. TACACS+ uses TCP instead of UDP. TCP guarantees communication between the client and server. Unlike UDP, which is connectionless, TCP initiates a connection with the server and is not as susceptible to situations such as network congestion and server crashes. 2. TACACS+ encrypts all of the data in the TACACS+ packet. Although RADIUS does encrypt the password in the packet, it doesn't protect against other data interception such as username and accounting information. 3. TACACS+ allows for different methods of authentication, authorization, and accounting. RADIUS couples authentication and authorization, making it difficult to use different servers for these purposes. 4. TACACS+ allows a network administrator to define what commands a user may run. This fine grain level of control allows more controlled access for a greater number of users on a network. When choosing an AAA protocol to use on a Cisco-based network, TACACS+ is the obvious choice. RADIUS (or a combination of TACAS+ and RADIUS) may be required if the network uses non-Cisco devices that do not support the TACACS+ protocol.
  • 8. AAA Protocol Basic AAA Configuration on IOS Steps to configuring AAA:  Enable AAA Router(config)# aaa new-model  Configure authentication, using RADIUS or TACACS+ There are two approaches to configuring TACACS+ servers. In the first, servers are specified in global configuration mode using the command tacacs-server to specify an IP address and shared secret key for each server: Router(config)# tacacs-server host 192.168.1.3 key MySecretKey1 Router(config)# tacacs-server host 192.168.2.3 key MySecretKey2 This approach is sufficient for many deployments, but is problematic if you want to reference only a subset of the defined servers for a certain AAA function. For example, suppose you want to use one TACACS+ server for control plane authentication on the router itself, and the second server for authenticating PPP connections. In this case, you would assign the servers to named AAA server groups: Router(config)# aaa group server tacacs+ LoginAuth Router(config-sg-tacacs+)# server 192.168.1.3 Router(config)# aaa group server tacacs+ PPPAuth Router(config-sg-tacacs+)# server 192.168.2.3  Define the method lists for authentication Router(config)# aaa authentication login default group tacacs+ local The above method list handles only the authentication aspect of AAA. By itself, this list only allows us to authenticate as a user with privilege level 1 (user exec mode). To communicate a heightened privilege level (e.g. privilege level 15, or "enable mode") from the TACACS+ server, we also need to define an authorization method list for IOS shell creation. Router(config)# aaa authorization exec default group tacacs+ local  Apply the method lists per line/ per interface Router(config)# line console 0 Router(config-line)# login authentication default Router(config)# line vty 0 15 Router(config-line)# login authentication default