Catalyst 9600 Switches)

Total Page:16

File Type:pdf, Size:1020Kb

Catalyst 9600 Switches) Security Configuration Guide, Cisco IOS XE Gibraltar 16.11.x (Catalyst 9600 Switches) First Published: 2019-04-17 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version. Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com go trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) © 2019 Cisco Systems, Inc. All rights reserved. CONTENTS Full Cisco Trademarks with Software License ? CHAPTER 1 Controlling Switch Access with Passwords and Privilege Levels 1 Restrictions for Controlling Switch Access with Passwords and Privileges 1 Restrictions and Guidelines for Reversible Password Types 1 Restrictions and Guidelines for Irreversible Password Types 2 Information About Controlling Switch Access with Passwords and Privileges 2 Preventing Unauthorized Access 2 Default Password and Privilege Level Configuration 3 Additional Password Security 3 Password Recovery 4 Terminal Line Telnet Configuration 4 Username and Password Pairs 4 Privilege Levels 4 AES Password Encryption and Master Encryption Keys 5 How to Configure Switch Access with Passwords and Privileges 5 Setting or Changing a Static Enable Password 5 Protecting Enable and Enable Secret Passwords with Encryption 6 Disabling Password Recovery 8 Setting a Telnet Password for a Terminal Line 10 Configuring Username and Password Pairs 11 Setting the Privilege Level for a Command 12 Changing the Default Privilege Level for Lines 13 Logging in to and Exiting a Privilege Level 14 Configuring an Encrypted Preshared Key 15 Monitoring Switch Access with Passwords and Privileges 16 Security Configuration Guide, Cisco IOS XE Gibraltar 16.11.x (Catalyst 9600 Switches) iii Contents Configuration Examples for Switch Access with Passwords and Privilege Levels 16 Example: Setting or Changing a Static Enable Password 16 Example: Protecting Enable and Enable Secret Passwords with Encryption 16 Example: Setting a Telnet Password for a Terminal Line 17 Example: Setting the Privilege Level for a Command 17 Example: Configuring an Encrypted Preshared Key 17 Feature History for Controlling Switch Access with Passwords and Privileges 17 CHAPTER 2 Configuring Login Block 19 Information About Login Enhancements-Login Block 19 Login Enhancements-Login Block Overview 19 Protecting Against Denial of Service and Dictionary Login Attacks 19 Delays Between Successive Login Attempts 20 Login Shutdown If DoS Attacks Are Suspected 20 How to Configure Login Enhancements-Login Block 20 Configuring Login Parameters 20 Verifying Login Parameters 22 Configuration Examples for Login Enhancements-Login Block 24 Example: Configuring Login Parameters 24 Feature History for Login Enhancements-Login Block 24 CHAPTER 3 Configuring Authentication 25 Prerequisites for Configuring Authentication 25 Restrictions for Configuring Authentication 25 Information About Authentication 26 Named Method Lists for Authentication 26 Method Lists and Server Groups 26 Login Authentication Using AAA 27 Login Authentication Using Enable Password 27 Login Authentication Using Kerberos 27 Login Authentication Using Line Password 28 Login Authentication Using Local Password 28 Login Authentication Using Group RADIUS 28 Security Configuration Guide, Cisco IOS XE Gibraltar 16.11.x (Catalyst 9600 Switches) iv Contents Login Authentication Using Group TACACS 28 Login Authentication Using Group Name 29 PPP Authentication Using AAA 29 PPP Authentication Using Kerberos 29 PPP Authentication Using Local Password 29 PPP Authentication Using Group RADIUS 30 PPP Authentication Using Group TACACS 30 PPP Authentication Using Group Name 30 AAA Scalability for PPP Requests 31 ARAP Authentication Using AAA 31 ARAP Authentication Allowing Authorized Guest Logins 31 ARAP Authentication Allowing Guest Logins 32 ARAP Authentication Using Line Password 32 ARAP Authentication Using Local Password 32 ARAP Authentication Using Group RADIUS 32 ARAP Authentication Using Group TACACS 32 ARAP Authentication Using a Group Name 33 NASI Authentication Using AAA 33 NASI Authentication Using Enable Password 33 NASI Authentication Using Group RADIUS 33 NASI Authentication Using Group TACACS 34 NASI Authentication Using Line Password 34 NASI Authentication Using Local Password 34 NASI Authentication Using Group Name 34 Specifying the Amount of Time for Login Input 35 Password Protection at the Privileged Level 35 Changing the Text Displayed at the Password Prompt 35 Double Authentication of PPP Sessions 35 How Double Authentication Works 36 Accessing the User Profile After Double Authentication 37 CHAP or PAP Authentication 37 Enabling PPP Encapsulation 38 Enabling PAP or CHAP 38 Security Configuration Guide, Cisco IOS XE Gibraltar 16.11.x (Catalyst 9600 Switches) v Contents Inbound and Outbound Authentication 39 Enabling Outbound PAP Authentication 39 Refusing PAP Authentication Requests 40 Creating a Common CHAP Password 40 Refusing CHAP Authentication Requests 40 Delaying CHAP Authentication Until Peer Authenticates 40 Using MS-CHAP 40 Domain Stripping 41 How to Configure Authentication 42 Configuring Login Authentication Using AAA 42 Configuring PPP Authentication Using AAA 44 Configuring ARAP Authentication Using AAA 46 Configuring NASI Authentication Using AAA 48 Preventing an Access Request with a Blank Username from Being Sent to the RADIUS Server 49 Configuring Message Banners for AAA Authentication 50 Configuring a Login Banner 50 Configuring a Failed-Login Banner 52 Configuring AAA Packet of Disconnect 53 Configuring Double Authentication 54 Enabling Automated Double Authentication 55 Configuring Domain Stripping at the Server Group Level 58 Configuring Non-AAA Authentication Methods 59 Configuring Line Password Protection 59 Establishing Username Authentication 60 Defining PPP Authentication Using MS-CHAP 62 Configuration Examples for Authentication 63 Example: Configuring Method Lists 63 Example: RADIUS Authentication 65 Example: TACACS Authentication 67 Example: Kerberos Authentication 68 Example: AAA Scalability 68 Example: Configuring Login and Failed-Login Banners for AAA Authentication 70 Example: AAA Packet of Disconnect Server Key 70 Security Configuration Guide, Cisco IOS XE Gibraltar 16.11.x (Catalyst 9600 Switches) vi Contents Example: Double Authentication 71 Example: Configuration of the Local Host for AAA with Double Authentication 71 Example: Configuration of the AAA Server for First-Stage PPP Authentication and Authorization 71 Example: Configuration of the AAA Server for Second-Stage Per-User Authentication and Authorization 72 Example: Complete Configuration with TACACS 73 Example: Automated Double Authentication 76 Feature History for Configuring Authentication 77 CHAPTER 4 Configuring Authorization 79 Prerequisites for Configuring Authorization 79 Information About Configuring Authorization 80 Named Method Lists for Authorization 80 AAA Authorization Methods 80 Authorization
Recommended publications
  • Authentication, Authorization and Accounting (AAA) Protocols
    Authentication, Authorization and Accounting (AAA) Protocols Agententechnologien in der Telekommunikation Sommersemester 2009 Babak Shafieian [email protected] A O T Agententechnologien in betrieblichen Anwendungen 10.06.2009 und der Telekommunikation Overview A O T Agententechnologien in der Telekommunikation - 2 TU Berlin Motivation (Why AAA?) Ö Telecommunications services are a global market worth over US$ 1.5 trillion in revenue. Home Entertainment Voice over IP (VoIP) Multimedia Conference Messaging/ Presence A O T Agententechnologien in der Telekommunikation - 3 TU Berlin Authentication (Who is [email protected]) Ö Authentication is the process of verifying user’s identity using credentials like username, password or certificates. Ö After the successful match of user’s authentication credentials with the credentials stored in the database of the service provider, the user is granted access to the network, otherwise the access is denied. A O T Agententechnologien in der Telekommunikation - 4 TU Berlin Authorization Ö Is the process of enforcing policies. It determines what types or qualities of network resources or specific services the user is permitted. Ö By using the access policy defined for a specific user, the service provider grants or rejects the access requests from the user. Ö Access policy could be applied on a per user or group basis. A O T Agententechnologien in der Telekommunikation - 5 TU Berlin Accounting Ö Is the process of keeping track of what the user is doing. Ö It includes: Amount of the time spent in the network (duration of session) Number of packets(or bytes) transmitted during a session. The accessed services during a session.
    [Show full text]
  • Operations T. Dahm Internet-Draft A. Ota Intended Status: Informational Google Inc Expires: July 30, 2020 D
    Operations T. Dahm Internet-Draft A. Ota Intended status: Informational Google Inc Expires: July 30, 2020 D. Medway Gash Cisco Systems, Inc. D. Carrel vIPtela, Inc. L. Grant January 27, 2020 The TACACS+ Protocol draft-ietf-opsawg-tacacs-17 Abstract This document describes the Terminal Access Controller Access-Control System Plus (TACACS+) protocol which is widely deployed today to provide Device Administration for routers, network access servers and other networked computing devices via one or more centralized servers. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on July 30, 2020. Copyright Notice Copyright (c) 2020 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents Dahm, et al. Expires July 30, 2020 [Page 1] Internet-Draft The TACACS+ Protocol January 2020 carefully, as they describe your rights and restrictions with respect to this document.
    [Show full text]
  • Cisco Products Quick Reference Guide December 2004
    Cisco SYSTEMS pII Cisco Product Quick Reference Guide December 2004 Table of Contents Introduction Routing Switching Wireless LAN Voice and IP Communications VPN and Security Content Networking Broadband and Dial Access Optical Networking lOS Software and Network Management 10 Storage Networking Cicro SYsTEr Cisco Products Quick Reference Guide December 2004 Corporate Headquarters Cisco Systems Inc 170 West Tasman Drive San Jose CA 951 34-1706 USA http//wvvw.cisco.com Tel 408 526-4000 800 553-NETS 6387 Customer Order Number 78-5983-13 Text Part Number 78-5983-13 Gisco Products Quick Reference Guide Copyright 2005 Cisco Systems Inc All rights reserved Gener Discbimer Although Cisco has attempted to provide accurate information in this Guide Cisco assumes no responsibility for the accuracy of the information Cisco may change the programs or products mentioned at any time without prior notice Mention of non-Cisco products or services is for information purposes only and constitutes neither an endorsement nor recommendation of such products or services or of any company that develops or sells such products or services ALL INFORMATION PROVIDED ON THIS WEB SITE IS PROVIDED AS IS WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED CISCO AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING WITHOUT LIMITATION THOSE OF MERCHANTABILITY FITNESS FOR PARTICULAR PURPOSE AND NONINFRJNGEMENT OR ARISING FROM COURSE OF DEALING USAGE OR TRADE PRACTICE CISCO AND ITS SUPPLIERS SHALL NOT BE LIABLE FOR ANY INDIRECT
    [Show full text]
  • Single Sign-On the Way It Should Be
    Single sign-on the way it should be 6 ways Citrix Workspace delivers seamless access to all apps while improving security and the user experience Contents Single sign-on (SSO) solutions .......................................................................3 Secure access to everything ...........................................................................5 Granular controls for SaaS apps and the web ...........................................6 Control over your user identity ......................................................................7 Security beyond user names and passwords ............................................8 Seamless integration with your existing environment ..........................9 Resolving issues faster with end-to-end visibility ............................... 10 ↑ Back← Pg. to 2 contents | Pg. 4 → Citrix.com 2 Single sign-on (SSO) solutions were designed to make life easier for employees and IT. They’re meant to reduce the cost of management and provide better security, all while delivering an improved user experience. However, many solutions fall short, covering only one type or a subset of application types. This forces you to implement several access solutions from different vendors to cover your entire application landscape — negating the productivity and user experience benefits you hoped for. The complexity this type of implementation creates also runs counter to the Zero Trust initiatives that many organizations are undertaking Citrix Workspace helps you unify all apps and data across your distributed IT architecture to provide single sign-on to all the applications and data people need to be productive. Working with your existing infrastructure, Citrix Access Control consolidates multiple remote access solutions, like traditional VPNs or SSO solutions, simplifying management for IT and providing unified access for employees. ↑ Back to contents ← Pg. 2 | Pg. 4 → 3 Citrix.com | e-book | Choosing a Single Sign-On Solution ↓ 6 benefits of the Citrix Workspace SSO solution ↑ ← Pg.
    [Show full text]
  • Operations T. Dahm Internet-Draft A. Ota Intended Status: Informational Google Inc Expires: January 9, 2017 D
    Operations T. Dahm Internet-Draft A. Ota Intended status: Informational Google Inc Expires: January 9, 2017 D. Medway Gash Cisco Systems, Inc. D. Carrel vIPtela, Inc. L. Grant July 8, 2016 The TACACS+ Protocol draft-ietf-opsawg-tacacs-04 Abstract TACACS+ provides Device Administration for routers, network access servers and other networked computing devices via one or more centralized servers. This document describes the protocol that is used by TACACS+. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on January 9, 2017. Copyright Notice Copyright (c) 2016 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect Dahm, et al. Expires January 9, 2017 [Page 1] Internet-Draft The TACACS+ Protocol July 2016 to this document.
    [Show full text]
  • 7750 SR OS System Management Guide
    7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R1 February 2012 Document Part Number: 93-0071-09-01 *93-0071-09-01* This document is protected by copyright. Except as specifically permitted herein, no portion of the provided information can be reproduced in any form, or by any means, without prior written permission from Alcatel-Lucent. Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective owners. The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein. Copyright 2012 Alcatel-Lucent Alcatel-Lucent. All rights reserved. Table of Contents Preface. .13 Getting Started Alcatel-Lucent 7750 SR Router Configuration Process . .17 Security Authentication, Authorization, and Accounting . .20 Authentication . .21 Local Authentication . .22 RADIUS Authentication . .22 TACACS+ Authentication. .25 Authorization . .26 Local Authorization. .27 RADIUS Authorization . .27 TACACS+ Authorization. .27 Accounting. .28 RADIUS Accounting . .28 TACACS+ Accounting . .28 Security Controls . .30 When a Server Does Not Respond . .30 Access Request Flow . .31 CPU Protection . .32 CPU Protection Extensions ETH-CFM . .36 Vendor-Specific Attributes (VSAs) . .38 Other Security Features . .39 Secure Shell (SSH) . .39 Per Peer CPM Queuing. .41 CPM Filters and Traffic Management . .42 TTL Security for BGP and LDP . .43 Exponential Login Backoff . .43 User Lockout . .45 Encryption . .46 802.1x Network Access Control . .46 TCP Enhanced Authentication Option. .46 Packet Formats . .48 Keychain. .49 Configuration Notes . .50 General . .50 Configuring Security with CLI . .51 Setting Up Security Attributes. .52 Configuring Authentication . .52 Configuring Authorization .
    [Show full text]
  • Centralized Authentication Services (Radius, Tacacs, Diameter)
    83-10-32 DATA SECURITY MANAGEMENT CENTRALIZED AUTHENTICATION SERVICES (RADIUS, TACACS, DIAMETER) Bill Stackpole INSIDE Key Features of an AAA Service; RADIUS: Remote Authentication Dial-in User Service; TACACS: Terminal Access Controller Access Control System; DIAMETER: Twice RADIUS? INTRODUCTION RADIUS, TACACS, and DIAMETER are classified as authentication, autho- rization, and accounting (AAA) servers. The Internet Engineering Task Force (IETF) chartered an AAA Working Group in 1998 to develop the authentication, authorization, and accounting requirements for network access. The goal was to produce a base protocol that supported a num- ber of different network access models, including traditional dial-in net- work access servers (NAS), Mobile-IP, and roaming operations (ROAMOPS). The group was to build upon the work of existing access providers like Livingston Enterprises. Livingston Enterprises originally developed RADIUS (Remote Authen- tication Dial-in User Service) for their line of network access servers (NAS) to assist timeshare and Internet service providers with billing infor- mation consolidation and connection configuration. Livingston based RA- DIUS on the IETF distributed security model and actively promoted it PAYOFF IDEA through the IETF Network Access Got the telecommuter, mobile workforce, VPN, Server Requirements Working Group multi-platform, dial-in user authentication blues? Need a centralized method for controlling and au- in the early 1990s. The client/server diting external accesses to your network? Then design was created to be open and RADIUS, TACACS, or DIAMETER may be just what extensible so it could be easily you have been looking for. Flexible, inexpensive, adapted to work with other third- and easy to implement, these centralized authen- party products.
    [Show full text]
  • Fortiauthenticator Administration Guide Contains the Following Sections
    FortiAuthenticator - Administration Guide Version 6.2.0 FORTINET DOCUMENT LIBRARY https://docs.fortinet.com FORTINET VIDEO GUIDE https://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE & SUPPORT https://support.fortinet.com FORTINET TRAINING & CERTIFICATION PROGRAM https://www.fortinet.com/support-and-training/training.html NSE INSTITUTE https://training.fortinet.com FORTIGUARD CENTER https://fortiguard.com/ END USER LICENSE AGREEMENT https://www.fortinet.com/doc/legal/EULA.pdf FEEDBACK Email: [email protected] January 15, 2021 FortiAuthenticator 6.2.0 Administration Guide 23-620-657445-20210115 TABLE OF CONTENTS Change Log 9 What's new in FortiAuthenticator 10 FortiAuthenticator 6.2.0 10 REST API enhancements 10 TACACS+ support 10 SAML IdP Proxy: 0365 Azure/ADFS hybrid support 10 Get Windows AD nested groups during SAML IdP configuration 10 REST API key visibility for Admin users 11 RADSEC support 11 SCEP enrollment requests search 11 LDAP group filter support for remote RADIUS realms 11 Sync certificate bindings to load balancers 11 Show Password toggle included in replacement messages 11 Legacy Self-service Portal disabled by default 12 Additional SCEP CRL/OCSP enrollment options 12 Revoked/expired user certificates hidden by default 12 Richer logs for self-registered users 12 Usernames included in FTM activation messages 12 FTC: Sync email and mobile number 13 SNMP trap for RAID status changes 13 Administrator password required before changes can be made to administrator accounts 13 FortiAuthenticator
    [Show full text]
  • Identity Awareness Reference Architecture and Best Practices
    CHECK POINT Identity Awareness Reference Architecture and Best Practices INTRODUCTION There is a wealth of contextual metadata available about network devices once they join a network. Traditional firewalls that enforce security policies defined with IP addresses are largely unaware of the user and device identities behind those IP addresses. They rely on static rule bases and are unable to enforce dynamic users and role-based access, or provide important metadata and context in logs and security reports. “New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations (employees, partners, and customers), device access methods, and hosting models. A strong digital IAM strategy protects the firm and its customers from sophisticated cybercrimin als and improves efficiencies.” Forrester 2018 [1] THE IDENTITY PROCESS Network Authentication, Authorization, and Accounting (AAA, pronounced "triple-A") has been in use since the dawn of the Internet. Authentication asks the question, "Who or what are you?" Authorization asks, "What are you allowed to do?" And finally, Accounting wants to know, "What did you do?" Authentication – Who or What are You? Check Point devices usually learn who the user is from other devices, but there are cases where Check Point authenticates the user, e.g. through remote VPN access or a captive portal where the user’s network request is redirected to a browser-based authentication page. The client platform may be Windows, macOS, Linux, Android or Apple iOS. The authentication method may be one or more of a username/password or a digital certificate in a Check Point database.
    [Show full text]
  • Diameter Next Generation's AAA Protocol Håkan Ventura
    Diameter next generation’s AAA protocol Master thesis in Information theory by Håkan Ventura LiTH-ISY-EX-3232-2002 2002-04-25 Diameter next generation’s AAA protocol Master thesis in Information theory at Linköpings Tekniska Högskola by Håkan Ventura LiTH-ISY-EX-3232-2002 Handledare: Miguel Garcia, Peter Cederstrand Examinator: Viiveke Fåk Linköping 2002-04-25 ii Avdelning, Institution Datum Division, Department Date 2002-04-25 Institutionen för Systemteknik 581 83 LINKÖPING Språk Rapporttyp ISBN Language Report category Svenska/Swedish Licentiatavhandling ISRN LITH-ISY-EX-3232-2002 X Engelska/English X Examensarbete C-uppsats Serietitel och serienummer ISSN D-uppsats Title of series, numbering Övrig rapport ____ URL för elektronisk version http://www.ep.liu.se/exjobb/isy/2002/3232/ Titel Diameter - Nästa generations AAA protocol Title Diameter - Next generation’s AAA protocol Författare Håkan Ventura Author Sammanfattning Abstract The need for AAA protocols in the world are increasing and todays most common protocols RADIUS and TACACS+, cannot cope with the fast advances in fields benefiting from the use of AAA protocols. This is why IETF has developed the protocol Diameter as a next generations AAA protocol. The objective of this thesis is to account for the work conducted with Diameter as well as to determine if it is going to become the major AAA protocol of the next generation. In this thesis, I describe what Diameter is, its close integration with the Mobile IP protocol and its other uses. As Diameter is based on RADIUS an introduction to AAA and RADIUS is given in order to comprehend where we are today and where we are going as well as to why.
    [Show full text]
  • Radius: a Remote Authentication Dial-In User Service
    InSight: RIVIER ACADEMIC JOURNAL, VOLUME 5, NUMBER 2, FALL 2009 RADIUS: A REMOTE AUTHENTICATION DIAL-IN USER SERVICE Daniel Szilagyi*, Arti Sood** and Tejinder Singh§ M.S. in Computer Science Program, Rivier College Abstract This paper provides an overview of RADIUS deployment in the network. It also introduces the various protocols, such as EAP, that is used to implement this service, and PAP, CHAP, MSCHAP, EAP-TLS, EAP-TTLS, EAP- LEAP, EAP-FAST, EAP-FAST that provide authentication mechanisms. These protocols are not discussed in detail but only to present the idea of workflow as to how the RADIUS works in conjunction with them. The role of RADIUS is outlined in point-to-point and VPN connection. Also the 802.1x framework and RADIUS are described briefly. The various AAA protocols are discussed briefly along with DIAMETER, an enhanced version of the RADIUS protocol. This paper is intended for readers with Computer Science or Information Technology background. 1. Overview With growing numbers of remote users like telecommuters using wireless laptops, PDA(s) trying to access the network, Remote Authentication Dial-In User Service (RADIUS) is widely used. RADIUS, a distributed service, provides centralized management of user access control and security. RADIUS manages and secures the Wireless Local Area Network (WLAN), remote Virtual Private Network (VPN), and wired access. RADIUS is available as a standalone service like Internet Authentication Service (IAS), Access Control Server (ACS) etc. It may also be embedded in the network devices such as routers, switches etc. Users are authenticated by the RADIUS server against a central database which stores profile data such as passwords, type of access, etc.
    [Show full text]
  • Session Layer Protocols: Dialog Management, Synchronization
    UNIT-IV UPPER LAYERS: - Session Layer Protocols: Dialog Management, Synchronization. Presentation layer functions: translation, encryption, compression. Cryptography : substitution and Transposition Ciphers, Data Encryption standards ( DES) , DES Chaining, Breaking DES, Public Key cryptography, Authentication protocols, Different compression coding techniques. Application layer protocols & services : Email, World Wide Web, file transfer protocol, remote file server, internet telephony & chatting. Session Layer Protocols: The session layer is layer 5 of the seven-layer OSI model of computer networking. The session layer provides the mechanism for opening, closing and managing a session between end-user application processes, i.e., a semi-permanent dialogue. Communication sessions consist of requests and responses that occur between applications. Session-layer services are commonly used in application environments that make use of remote procedure calls (RPCs). An example of a session-layer protocol is the OSI protocol suite session-layer protocol, also known as X.235 or ISO 8327. In case of a connection loss this protocol may try to recover the connection. If a connection is not used for a long period, the session-layer protocol may close it and re-open it. It provides for either full duplex or half-duplex operation and provides synchronization points in the stream of exchanged messages. Other examples of session layer implementations include Zone Information Protocol (ZIP) – the AppleTalk protocol that coordinates the name binding process, and Session Control Protocol (SCP) – the DECnet Phase IV session-layer protocol. Within the service layering semantics of the OSI network architecture, the session layer responds to service requests from the presentation layer and issues service requests to the transport layer.
    [Show full text]