Module 7 Flashcards
is a technology that allows authentication and authorization of users based on user ID and password. ___ can be configured locally on networking devices or AAA servers can be used. Accounting can log details of user sessions for the purposes of billing or for visibility into user behavior.
AAA
Network and administrative AAA security in the Cisco environment has three functional components:
Authentication - Users and administrators must prove their identity before accessing the network and network resources. Authentication can be established using username and password combinations, challenge and response questions, token cards, and other methods. For example: “I am user ‘student’ and I know the password to prove it.”
Authorization - After the user is authenticated, authorization services determine which resources the user can access and which operations the user is allowed to perform. An example is “User ‘student’ can access host serverXYZ using SSH only.”
Accounting and auditing - Accounting records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made. Accounting keeps track of how network resources are used. An example is “User ‘student’ accessed host serverXYZ using SSH for 15 minutes.”
Cisco provides two common methods of implementing AAA services:
Local AAA Authentication -Local AAA uses a local database for authentication. This method is sometimes known as self-contained authentication. In this course, it will be referred to as local AAA authentication. This method stores usernames and passwords locally in the Cisco router, and users authenticate against the local database, as shown in the figure. This database is the same one that is required for establishing role-based CLI. Local AAA is ideal for small networks.
Server-Based AAA Authentication - With the server-based method, the router accesses a central AAA server, such as the Cisco Secure Access Control System (ACS) for Windows, which is shown in the figure. The central AAA server contains the usernames and password for all users. The router uses either the Remote Authentication Dial-In User Service (RADIUS) or Terminal Access Controller Access Control System (TACACS+) protocols to communicate with the AAA server. When there are multiple routers and switches, server-based AAA is more appropriate because accounts can be administered from a central location rather than on individual devices.
The client establishes a connection with the router.
The AAA router prompts the user for a username and password.
The router authenticates the username and password using the local database and the user is provided access to the network based on information in the local database.
Local AAA Authentication
The client establishes a connection with the router.
The AAA router prompts the user for a username and password.
The router authenticates the username and password using a AAA server.
The user is provided access to the network based on information on the remote AAA server.
Server-Based AAA Authentication
When a user has been authenticated, a session is established between the router and the server.
The router requests authorization from the AAA server for the client’s requested service.
The AAA server returns a PASS/FAIL for authorization.
AAA Authorization
controls what users can and cannot do on the network after they are authenticated.
is automatic and does not require users to perform additional steps after authentication.
is implemented immediately after the user is authenticated.
Authorization
collects and reports usage data. This data can be used for such purposes as auditing or billing. The collected data might include the start and stop connection times, the commands executed, the number of packets, and the number of bytes.
AAA Accounting
When a user has been authenticated, the AAA accounting process generates a start message to begin the accounting process.
When the user finishes, a stop message is recorded and the accounting process ends.
AAA Accounting
types of information that are collected by AAA accounting.
Network Accounting
Connection Accounting
EXEC Accounting
System Accounting
Command Accounting
records what the user does.
Accounting
uses a created set of attributes that describe the user’s rights and permissions on the network.
Authorization
is used to determine the identity of a user prior to allowing access to the network.
Authentication
collects and reports usage data so that it can be used for auditing or billing users.
Accounting
proves the identity of users and administrators.
Authentication
determines what a user can and can not do on the network.
Authorization
controls the resources that a user can access and the operations that the user is allowed to perform.
Authorization
can provide leverage against individuals who perform malicious actions.
Accounting
controls who is permitted to access the network
Authentication
Configure Local AAA Authentication
Step 1. Add usernames and passwords to the local router database for users that need administrative access to the router.
R1(config)# username JR-ADMIN algorithm-type scrypt secret Str0ng5rPa55w0rd
R1(config)# username ADMIN algorithm-type scrypt secret Str0ng5rPa55w0rd
Step 2. Enable AAA globally on the router.
R1(config)# aaa new-model
Step 3. Configure AAA parameters on the router.
R1(config)# aaa authentication login default local-case
Step 4. Confirm and troubleshoot the AAA configuration.
Authentication methods
Router(config)# aaa authentication login {default | list-name} method1…[ method4 ]
This command secures AAA user accounts by locking out accounts that have excessive failed attempts.
aaa local authentication attempts max-fail
Router(config)# aaa local authentication attempts max-fail [number-of-unsuccessful-attempts]
To display a list of all locked-out users, use the
show aaa local user lockout
R1# show aaa local user lockout
To display the attributes that are collected for one AAA session, use the
to show the unique ID of a session
show aaa user
R1# show aaa sessions
___ is an identity and access control policy platform that enables enterprises to enforce compliance, enhance infrastructure security, and streamline their service operations. The architecture of _____ allows enterprises to gather real-time contextual information from networks, users, and devices.
Cisco Identity Services Engine (ISE)