This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| network_stuff:cisco:acs [2016/02/05 20:45] – external edit 127.0.0.1 | network_stuff:cisco:acs [2023/11/02 14:38] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 5: | Line 5: | ||
| + | ACS | ||
| + | Skip to end of metadata | ||
| + | |||
| + | Created by JAIME SANTOS , last modified on Mar 08, 2017 | ||
| + | |||
| + | Go to start of metadata | ||
| + | |||
| + | Use IE from Orion server to access ACS | ||
| + | To see logging.. | ||
| + | |||
| + | Monitoring and reports > Launch Monitoring and Report Viewer > Catalog > Access Service > Access_Service_Authentication_Summary | ||
| + | |||
| + | Reports > Favorite | ||
| + | |||
| + | Launch Monitoring and Rep. View > Monitoring and Reports > Reports > (report manager, you can export reports to kiwi ftp folder) | ||
| + | |||
| + | Authentications - RADIUS - Today | ||
| + | Access Policies | ||
| + | |||
| + | Use Chrome(even if half of the menues are black) and always https:// | ||
| + | |||
| + | Check user groups in AD | ||
| + | Check the corresponing policy in: Access Policies > CLIENT-AUTH-RADIUS-ACCESS > Authorization ... Here we can find the profile. | ||
| + | If the group is in the 'any of these' ldap groups, then we need to add it: | ||
| + | External Identity Stores > LDAP > Directory groups | ||
| + | To get the whole directory group string for a certain group, we can use PALO cli | ||
| + | Then we go back to Access Policies > CLIENT-AUTH-RADIUS-ACCESS > Authorization and we add the group. | ||
| + | |||
| + | Users and Identity Stores > ... > External Identity Stores > LDAP > Edit: " | ||
| + | |||
| + | # Search for the user name. Find new group name: | ||
| + | |||
| + | CN=RolePerm-ProdSupport - EU - Trax, | ||
| + | |||
| + | Go to " | ||
| + | |||
| + | |||
| + | |||
| + | #Client AAA on the Cisco ASA | ||
| + | |||
| + | # | ||
| + | |||
| + | access-list CLIENT-AUTH-ACL extended permit tcp object-group CLIENT-AUTH-NETWORKS object CLIENT-AUTH-IP eq telnet | ||
| + | |||
| + | |||
| + | |||
| + | |||
| + | |||
| + | object-group network CLIENT-AUTH-NETWORKS | ||
| + | |||
| + | | ||
| + | |||
| + | | ||
| + | |||
| + | | ||
| + | |||
| + | |||
| + | |||
| + | object network CLIENT-AUTH-IP | ||
| + | |||
| + | host 10.8.1.14 | ||
| + | |||
| + | | ||
| + | |||
| + | |||
| + | |||
| + | #AAA Configuration | ||
| + | |||
| + | aaa authentication match CLIENT-AUTH-ACL corp MKTX_RADIUS | ||
| + | |||
| + | aaa authentication match CLIENT-AUTH-ACL qa MKTX_RADIUS | ||
| + | |||
| + | aaa authentication match CLIENT-AUTH-ACL guest MKTX_RADIUS | ||
| + | |||
| + | |||
| + | |||
| + | **aaa-server MKTX_RADIUS protocol radius** | ||
| + | |||
| + | **aaa-server MKTX_RADIUS (security) host 10.40.100.200** | ||
| + | |||
| + | | ||
| + | |||
| + | key ***** | ||
| + | |||
| + | | ||
| + | |||
| + | | ||
| + | |||
| + | | ||
| + | |||
| + | aaa-server MKTX_RADIUS (corp) host 10.8.254.200 | ||
| + | |||
| + | | ||
| + | |||
| + | key ***** | ||
| + | |||
| + | # | ||
| + | |||
| + | Access services -> CLIENT-AUTH-RADIUS-ACCESS -> Authorisation | ||
| + | |||
| + | |||
| + | |||
| + | There should be authorisation profiles for various teams and selecting one of the profiles reveal the Authorisation profile | ||
| + | |||
| + | |||
| + | |||
| + | policy elements -> authorisation and permissions -> network access -> authorisation profiles -> select one of the authorisation profile -> where you can find the ACL uner Filter-ID ACL which correlates to the ACL on the ASA. | ||
| + | |||
| + | |||
| + | ---- | ||
| + | __RADIUS NAS ATTRIBUTES__ | ||
| + | \\ | ||
| + | [[http:// | ||
| + | \\ | ||
| + | This is normallly a file that needs to be placed in the radius servers (eg: ISE) so it accepts authentication messages from the client. | ||