© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 3 – Authentication, Authorization and Accounting.

Slides:



Advertisements
Similar presentations
© 2003, Cisco Systems, Inc. All rights reserved..
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Securing the Router Chris Cunningham.
CCNA2-1 Chapter 1 Introduction to Routing and Packet Forwarding CLI Configuration and Addressing.
Operating and Configuring Cisco IOS Devices © 2004 Cisco Systems, Inc. All rights reserved. Operating Cisco IOS Software INTRO v2.0—8-1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Troubleshooting Working at a Small-to-Medium Business or ISP – Chapter 9.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 1 - Modern Security Threats.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
S6C12 - AAA AAA Facts. AAA Defined Authentication, Authorization, and Accounting Central Management of AAA –Information in a single, centralized, secure.
Brian Dwyer – CITA370. Introduction  Network Device Security  Identity Management AAA Process Model ○ Authentication ○ Authorization ○ Accounting (Sometimes.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 2 – Securing Network Devices.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Implementing RADIUS AAA Phil & Rick. Content Terms and Concepts Access Control What is AAA? Benefits of AAA What is RADIUS? Microsoft IAS Overview Installation.
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. CCNA DHCP Deepdive November, 2011 Jaskaran Kalsi & Anton Merckushov Assoc.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 5 – Implementing Intrusion Prevention.
Cisco Networking Academy Training Program in Afghanistan.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 8 – Implementing Virtual Private Networks.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 5 City College.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—1-1 Small Network Implementation Introducing the Review Lab.
© 1999, Cisco Systems, Inc. 3-1 Configuring the Network Access Server for AAA Security.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration Cisco Networking Academy.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Chapter 3: Authentication, Authorization, and Accounting
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires.
Module 11: Remote Access Fundamentals
User Access to Router Securing Access.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Chapter 8: Implementing Virtual Private Networks
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 6 City College.
Chapter 3: Authentication, Authorization, and Accounting
NETWORK ADMINISTRATION CPIT 470 Instructor: Mrs Aisha Ehsan.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir CCNP-SWITCHING Mohamed Samir YouTube channel Double.
AAA Services Authentication -Who ? -Management of the user’s identity Authorization -What can the user do? -Management of the granted services Accounting.
Chapter 9: Implementing the Cisco Adaptive Security Appliance
Chapter 4: Implementing Firewall Technologies
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 6 Switch Configuration.
Configuring AAA Kamyar Miremadi Laila Sherif Summer 2005.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
© 2002, Cisco Systems, Inc. All rights reserved..
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Port Based Network Access Control
Understand User Authentication LESSON 2.1A Security Fundamentals.
Instructor Materials Chapter 8 Configuring Cisco Devices
© 2002, Cisco Systems, Inc. All rights reserved.
Instructor Materials Chapter 6 Building a Home Network
Information Security Professionals
– Chapter 3 – Device Security (B)
Securing Windows 7 Lesson 10.
Chapter 10: Advanced Cisco Adaptive Security Appliance
Presentation transcript:

© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 3 – Authentication, Authorization and Accounting

© 2012 Cisco and/or its affiliates. All rights reserved. 2 Explain the function and operation of the authentication, authorization, and accounting (AAA) protocol. Configure a Cisco router to perform AAA authentication with a local database. Describe how to configure Cisco ACS to support AAA for Cisco IOS routers. Configure server-based AAA.

© 2012 Cisco and/or its affiliates. All rights reserved Implementing AAA on Cisco Devices 3.1 Implement AAA (authentication, authorization, accounting) AAA using CCP on routers AAA using CLI on routers and switches AAA on ASA 3.2 Describe TACACS+ 3.3 Describe RADIUS 3.4 Describe AAA Authentication Authorization Accounting 3.5 Verify AAA functionality

© 2012 Cisco and/or its affiliates. All rights reserved. 4 AAA is a critical task that involves securing network devices to limit who can access them and how they can access them, as well as to account for the actions taken while accessing them. Local AAA authentication is configured on a device-by-device basis and has some advantages over basic authentication against the local database (local authentication). Centralized or server-based AAA is a scalable enterprise solution for AAA. The Cisco solution for server-based AAA is Cisco Secure Access Control Server (CSACS). Server-based AAA can be implemented with RADIUS (standards-based protocol) or TACACS+ (Cisco-proprietary protocol). Each option has a number of defining qualities that differentiate one from the other. AAA can be configured using the CLI or CCP. AAA technology is required for the implementation of several other features, such as Cisco Easy VPN for remote-access.

© 2012 Cisco and/or its affiliates. All rights reserved. 5 Chapter 3 Lab: Securing Administrative Access Using AAA and RADIUS Part 1: Basic Network Device Configuration Part 2: Configure Local Authentication Part 3: Configure Local Authentication Using AAA Part 4: Configure Centralized Authentication Using AAA and RADIUS

© 2012 Cisco and/or its affiliates. All rights reserved. 6

7

8

9

10 Cisco Configuration Professional (CCP) has replaced SDM to do the following: To configure AAA local authentication To configure centralized authentication with AAA and RADIUS

© 2012 Cisco and/or its affiliates. All rights reserved. 11 The chapter 3 lab introduces the major options for AAA configuration. Students use CLI and CCP tools to implement authentication both locally and centrally. Debug options for AAA are explored. This lab is divided into four parts. The local authentication part, the local authentication with AAA part, and the centralized authentication with RADIUS can be administered individually or in combination with the other parts as time permits. The main goal is to configure various types of user access authentication. R1 and R3 are on separate networks and communicate through R2, which simulates a connection to an ISP. Students can work in teams of two for router authentication configuration, one student configuring R1 and the other student configuring R3. Although switches are shown in the topology, students can omit the switches and use crossover cables between the PCs and routers R1 and R3.

© 2012 Cisco and/or its affiliates. All rights reserved. 12 When introducing AAA, point out that there are a wide variety of methods of authentication people and devices. Security protocols and security technologies are changing rapidly. The focus is on local authentication, local authentication with AAA, and centralized authentication with CSACS and RADIUS servers. A large organization requires a centralized mechanism for AAA. Use the Who, How, What mnemonic to explain AAA. Time permitting, discuss authentication options in general: biometrics, single sign-on, one-time password, PKI and digital certificates, security tokens, and smart cards. Many of these options are discussed at various points in the course.

© 2012 Cisco and/or its affiliates. All rights reserved. 13 Emphasize that local AAA authentication has some advantages over local authentication. Ask the students “What can be done with local AAA authentication that cannot be done with local authentication?” Explain that local AAA authentication gives one the ability to configure all or multiple lines at one time. Make sure to clarify the difference between character mode and packet mode. Character mode is used with tty, vty, auxiliary, and console access, while packet mode is used with dial-up and VPN access. Character mode uses the login, exec, and enable commands. Packet mode uses the ppp and network commands. Emphasize that centralized or server-based AAA is scalable. It is not practical to replicate a local database on 100 networking devices.

© 2012 Cisco and/or its affiliates. All rights reserved. 14 Compare and contrast TACACS+ and RADIUS: e99.shtml Emphasize that when using method lists with AAA, the methods are accessed in sequence only if an error occurs. If there is an authentication failure, the next method is NOT invoked. The aaa new-model command enables AAA. All subsequent commands depend on this first step. The AAA syntax is inherently difficult to understand and the implementation is awkward. Make a point that the main idea is to provide flexibility with authentication and authorization options.

© 2012 Cisco and/or its affiliates. All rights reserved. 15 To illustrate the power of AAA, conduct a demo with local AAA authentication to show how the vty and console lines are automatically secured with the default option. Note that a named list must be applied to a particular line before that method works for that line; the default method applies to that line in the mean time. Demonstrate how incorrect AAA configuration can lock you out of a router: Enable AAA local authentication prior to configuring a local username database. Show the AAA page in CCP to illustrate that AAA is enabled by default on CCP. Installing and configuring CSACS can be overwhelming. Use the two VoD’s under Tools for this course at cisco.netacad.net to see how an expert makes it easy for you.cisco.netacad.net

© 2012 Cisco and/or its affiliates. All rights reserved. 16 Ask students what they think the advantages to centralized authentication are? Possible answers include saving time over the long term, enhanced security, scalability, and ease of control and management. Discuss authentication methods in general and ask an open- ended question to students about what can be done to enhance authentication, especially given that more of our lives are connected with the Internet over time. See illustrate-need-for-stronger-authentication for discussion points. illustrate-need-for-stronger-authentication

© 2012 Cisco and/or its affiliates. All rights reserved. 17 There are many examples of security breaches that have occurred in the news lately. Ask students to research some of these and report back on how they could have been deterred better. Lead by example as a network engineer. Use sophisticated password rules and ask users to do the same. Every protocol that has an MD5 option or stronger (RIPv2, NTP, etc.), should implement that option. If there is an option for authentication and encryption, use both. Wireless LANs are the ideal stage for authentication scenarios because they are the most vulnerable. Secure your network as if it were as vulnerable as a WLAN.

© 2012 Cisco and/or its affiliates. All rights reserved xml/ios/sec_usr_aaa/configuration/15-2mt/sec-usr-aaa-15-2mt- book.html xml/ios/sec_usr_aaa/configuration/15-2mt/sec-usr-aaa-15-2mt- book.html Troubleshooting.html Troubleshooting.html

© 2011 Cisco and/or its affiliates. All rights reserved. 19