Cisco Products Quick Reference Guide December 2004

Total Page:16

File Type:pdf, Size:1020Kb

Cisco Products Quick Reference Guide December 2004 Cisco SYSTEMS pII Cisco Product Quick Reference Guide December 2004 Table of Contents Introduction Routing Switching Wireless LAN Voice and IP Communications VPN and Security Content Networking Broadband and Dial Access Optical Networking lOS Software and Network Management 10 Storage Networking Cicro SYsTEr Cisco Products Quick Reference Guide December 2004 Corporate Headquarters Cisco Systems Inc 170 West Tasman Drive San Jose CA 951 34-1706 USA http//wvvw.cisco.com Tel 408 526-4000 800 553-NETS 6387 Customer Order Number 78-5983-13 Text Part Number 78-5983-13 Gisco Products Quick Reference Guide Copyright 2005 Cisco Systems Inc All rights reserved Gener Discbimer Although Cisco has attempted to provide accurate information in this Guide Cisco assumes no responsibility for the accuracy of the information Cisco may change the programs or products mentioned at any time without prior notice Mention of non-Cisco products or services is for information purposes only and constitutes neither an endorsement nor recommendation of such products or services or of any company that develops or sells such products or services ALL INFORMATION PROVIDED ON THIS WEB SITE IS PROVIDED AS IS WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED CISCO AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING WITHOUT LIMITATION THOSE OF MERCHANTABILITY FITNESS FOR PARTICULAR PURPOSE AND NONINFRJNGEMENT OR ARISING FROM COURSE OF DEALING USAGE OR TRADE PRACTICE CISCO AND ITS SUPPLIERS SHALL NOT BE LIABLE FOR ANY INDIRECT SPECIAL CONSEQUENTIAL OR INCIDENTAL DAMAGES INCLUDIN WITHOUT LIMITATION LOST PROFITS OR REVENUES COSTS OF REPLACEMENT GOODS OR SERVICES LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OF THE GUIDE OR ANY CISCO PRODUCT OR SERVICE OR DAMAGES RESULTING FROM USE OF OR RELIANCE ON THE INFORMATION PROVIDED EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES Many of the Cisco products and services identified in this Guide are provided with written software licenses and limited warranties Those licenses and warranties provide the purchasers of those products with certain rights Nothing in this Guide shall be deemed to expand alter or modify any warranty or license provided by Cisco with any Cisco product or to create any new or additional warranties or licenses Introduction General Disclaimer Register Your Cisco Product Quick Reference Guide CPQRG CPQRG Background How to Get More Complete Product Information Cisco Systems Overview ii Partner and Customer Support ii Cisco Authorized Refurbished Equipment Select Countries Only ii Cisco Systems Capital Financing iii Cisco Channel Partner Program iii Product Warranty Information iv Cisco Services Helpful Cisco Web Sites vi CHAPTER Routing Routing at Glance 1-1 Cisco Routers Port Matrix 1-3 Memory Information for Routers 1-4 Cisoo 7000 Series Port Adapter Compatibility Matrix 1-6 Cisco SOHO Series Ethernet ADSL over lSDN ADSL and G.SHDSL Routers 1-8 Cisco BOO Series 1-9 Cisco 1800 Series 1-11 Cisco 1700 Series 1-14 Cisco 2800 Series 1-18 Cisco 2600 Series 1-24 Cisco 3800 Series 1-29 Cisco 3700 Series 1-32 Cisco 7200 Series 1-36 Cisco 7300 Series 1-38 Cisco 7500 Series 1-40 Cisco 7600 Series 1-43 Cisco 10000 Series 1-45 Cisco 10720 Series 1-41 Cisco 12000 Series 1-49 CHAPTER LAN Switching LAN Switching Products at Glance 21 Cisco LAN and MAN Products Port Matrix 2-2 Cisco Catalyst 2900 Series 2-3 Cisco Catalyst 2940 Series 2-4 Cisco Catalyst 2950 Series Intelligent Ethernet Switches 2-6 Cisco Catalyst 2970 Series 2-10 Cisco Catalyst 3500 Series XL 2-11 Cisco Catalyst 3550 Series Intelligent Ethernet Switches 2-12 Cisco Catalyst 3750 Series Ethernet Switches 2-15 Cisco Catalyst 4500 Series 218 Cisco Catalyst 4900 Series Fixed Configuration 2-20 Cisco Catalyst 6500 Series 2-21 Cisco Catalyst 0500 Multiservice Switch Routers 2-24 CHAPTER Wireless LAN Wireless LAN at Glance IEEE 802.11 a/b/g 3-1 Cisco Aironet 130A6 Series Access Point 3-2 Cisco Aironet 1100 Series Access Points 3-3 Cisco Aironet 1230AG Series Access Point 3-5 Cisco Aironet 1200 Series Access Points 3-6 Cisco Aironet 1300 Series 3-8 Cisco Aironet 802.llab/g Wireless Cardbus and PCI Adapters 310 Cisco Aironet 0Hz 54 Mbps Wireless Client Adapter 3-11 Cisco Aironet 350 Series Client Adapters 3-12 Cisco Aironet 1400 Series Wireless Bridge 314 Cisco Aironet 350 Series Workgroup Bridge 3-16 Cisco Aironet 350 Series Wireless Bridge 3-11 Cisco Aironet Antennas and Accessories 3-18 CHAPTER Voice and IP Communications Voice and IP Communications at Glance 41 Cisco CallManager4.1 4-3 Cisco UnityUnified Messaging and Voice Mail 4-7 Cisco CallManager Express 4-9 Cisco Unity Express 4-10 Cisco Emergency Responder 4-11 Cisco Contact Center IPCC Enterprise Edition 4-12 Cisco IPCC Hosted Edition 4-13 Cisco IPCC Express Edition 4-14 Cisco IVR 4-15 Cisco Customer Voice Portal 4-16 Cisco 1CM Enterprise Edition 4-16 Cisco Communicator 411 Cisco VT Advantage 4-18 Cisco Personal Assistant 4-18 Cisco Survivable Remote Site Telephony SRST 4-20 Cisco Manager Assistant 4-21 Cisco Conference Connection 4-21 Cisco 7900 Series Phones 4-21 Cisco ATA Series of Analog Telephone Adaptors 4-23 Cisco MCS 7800 Series Media Convergence Servers 4-24 Cisco MCS 7815-lI 4-24 Cisco MCS 7825-Hi and Cisco MCS 7825-Il 4-24 Cisco MCS 7825H-3000 4-24 Cisco MCS 78251-3000 4-25 Cisco MCS 7835-Hi and Cisco MCS 7835-li 4-25 Cisco MCS 7845-Hi and Cisco MCS 7845-li 4-25 Cisco Voice Gateways 4-26 Cisco VS 224 Voice Gateway 4-26 Cisco VG248 Voice Gateway 4-26 Cisco MeetingPlace 4-21 Cisco IPjVC 3500 Series Videoconferencing Products 4-28 Cisco IP/TV5.2 4-29 Cisco Voice Router Bundles 4-30 Cisco CaliManager Express Bundles 4-30 Cisco Survivable Remote Site SRST Bundles 4-31 Cisco V3PN Bundles 4-32 CHAPTER VPNandSecurity VPN and Security Products at Glance 5-1 Cisco PIX Security Appliance Series 5-2 Cisco VPN 3000 Family 5-5 5-8 Cisco Security Router Bundles with Integrated Network Security Cisco Security Agent 5-9 Cisco Secure Access Control Server ACS for Windows 5-10 Cisco Secure Access Control Solution Engine 5-12 Cisco Secure User Registration Tool 5-13 Cisco OS Firewall 5-14 CHAPTER Content Networking Content Networking at Glance 6-1 Content Networking Overview 6-2 Cisco Contdnt Engines CE 6-2 Cisco CSS 11500 Series Content Services Switches 6-4 Cisco Content Distribution Manager 6-5 Cisco Content Router 6-7 Cisco Content Switching Module 6-8 Cisco SSL Module for Catalyst 6500 6-9 Cisco ii 000 Series Secure Content Accelerator SCA ii 000 6-10 Cisco DistributedDirector 6-11 Cisco 555 4480 Global Site Selector 6-12 CHAPTER Broadband and Dial Access Broadband and Dial Access Products at Glance 7-1 Remote Dial AccessData and Voice VoIP 7-1 Broadband Cable 7-1 DSL IDigital Subscriber Une Access 7-2 ATM Multiservice WAN Switching 7-3 Long Reach Ethernet 7-3 Memory Information for Access Routers 7-3 Cisco A35350 Universal Gateway 7-4 Cisco AS5400 Series Universal Gateways 7-7 Cisco ASEB5D Universal Gateway 7-9 SS7 Signaling Softswitch Products 7-11 Cisco PGW 2200 Softswitch 7-li Key Features 7-11 For More Information 7-11 Cisco BIG 10200 Softswitch 7-11 When to Sell 7-12 Key Features 7-12 For More Information 1-12 Cisco uBR7100 Series Universal Broadband Router 7-12 Cisco uBR7246VXR Universal Broadband Router 7-13 Cisco uBR10012 Universal Broadband Router 1-14 Cisco uBR 3x10 HF Switch 7-15 Broadband CableCustomer Premise Equipment CPE 7-16 Cisoo uBROOB Series Cable Access Router 7-16 Key Features 7-17 Video Edge OAM Equipment 7-17 Cisco uMG9B2O OAM Gateway 7-17 Remote Cable AccessNetwork Management Products 1-18 Cisco Broadband Troubleshooter 7-18 Cisco Broadband Contigurator 7-18 Cisco Cable Diagnostic Manager 7-19 DSL Remote AccessCustomer Premise Equipment CPE 7-19 Broadband Services Aggregation 7-20 Cisco 7200 Series 1-20 Cisco 7301 Series 1-20 Cisco 10000 Series 7-20 ATM Multiservice WAN Switching 1-21 Cisco DPX 86D0 SeriesAdvanced ATM Multiservice Switches 7-21 Cisco MGX B850 ATM Multiservice Switch 7-21 Cisco MGX 8830 ATM Multiservice Switch 7-22 Cisco Long Reach Ethernet Solution 7-22 2950 LRE Series Ethernet Switches 7-22 Catalyst Intelligent Cisco 575 and 585 LRE CPE Devices 7-23 LRE POTS 7-23 Cisco 48 Splitter Cisco Building Broadband Service Manager BBSM Version 5.3 7-24 CHAPTER OpticalNetworking Optical Networking at Glance 8-1 8-3 Sample Metro Optical Transport Solution Overview Cisco ONS 15216 Metro DWDM Series 8-3 Cisco ONS 15302/15305 SDH Multiservice Access Platforms MSAP 8-4 Cisco ONS 15454 and 15327 Multiservice Provisioning Platforms 8-4 Cisco ONS 15501 Erbium Doped Fiber Amplifier 8-5 Cisoo ONS 15530 8-5 Cisco ONS 15540 Extended Services Platform ESPx 8-6 Cisco ONS 15454 SONET/SDH Multiservice Transport Platform MSTP 8-7 Cisco ONS 15600 Multiservice Switching Platform 8-8 8-8 Cisco Transport Manager CTM 5.0 Optical Element/Network Management CHAPTER Cisco WS Software and Network Management Cisco los Software and Network Management at Glance 9-1 Cisco lOS Software 9-3 Key Features 9-3 Security 9-3 9-3 Nigh Availability Management Instrumentation 9-3 Routing 9-4 Multicast 9-4 Multiprotocol Label Switching IMPLSI 8-4 Quality of Service QoS 9-5 lPv6 9-5 lOS Packaging and Licensing 9-5 The of Feature Inheritance 9-5 Principle Feature Set Naming Conventions 9-5 Cisco 105 Trains 9-6 Cisco lOS Releases 9-1 Key Cisco lOS Tools 9-9 Cisco Network Management Overview 9-9 CiscoWorks Small Network Management Solution 9-9 CiscoWorks LAN Management Solution 9-11 CiscoWorks VPN/Security Management Solution 9-12
Recommended publications
  • Authentication, Authorization and Accounting (AAA) Protocols
    Authentication, Authorization and Accounting (AAA) Protocols Agententechnologien in der Telekommunikation Sommersemester 2009 Babak Shafieian [email protected] A O T Agententechnologien in betrieblichen Anwendungen 10.06.2009 und der Telekommunikation Overview A O T Agententechnologien in der Telekommunikation - 2 TU Berlin Motivation (Why AAA?) Ö Telecommunications services are a global market worth over US$ 1.5 trillion in revenue. Home Entertainment Voice over IP (VoIP) Multimedia Conference Messaging/ Presence A O T Agententechnologien in der Telekommunikation - 3 TU Berlin Authentication (Who is [email protected]) Ö Authentication is the process of verifying user’s identity using credentials like username, password or certificates. Ö After the successful match of user’s authentication credentials with the credentials stored in the database of the service provider, the user is granted access to the network, otherwise the access is denied. A O T Agententechnologien in der Telekommunikation - 4 TU Berlin Authorization Ö Is the process of enforcing policies. It determines what types or qualities of network resources or specific services the user is permitted. Ö By using the access policy defined for a specific user, the service provider grants or rejects the access requests from the user. Ö Access policy could be applied on a per user or group basis. A O T Agententechnologien in der Telekommunikation - 5 TU Berlin Accounting Ö Is the process of keeping track of what the user is doing. Ö It includes: Amount of the time spent in the network (duration of session) Number of packets(or bytes) transmitted during a session. The accessed services during a session.
    [Show full text]
  • Operations T. Dahm Internet-Draft A. Ota Intended Status: Informational Google Inc Expires: July 30, 2020 D
    Operations T. Dahm Internet-Draft A. Ota Intended status: Informational Google Inc Expires: July 30, 2020 D. Medway Gash Cisco Systems, Inc. D. Carrel vIPtela, Inc. L. Grant January 27, 2020 The TACACS+ Protocol draft-ietf-opsawg-tacacs-17 Abstract This document describes the Terminal Access Controller Access-Control System Plus (TACACS+) protocol which is widely deployed today to provide Device Administration for routers, network access servers and other networked computing devices via one or more centralized servers. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on July 30, 2020. Copyright Notice Copyright (c) 2020 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents Dahm, et al. Expires July 30, 2020 [Page 1] Internet-Draft The TACACS+ Protocol January 2020 carefully, as they describe your rights and restrictions with respect to this document.
    [Show full text]
  • Single Sign-On the Way It Should Be
    Single sign-on the way it should be 6 ways Citrix Workspace delivers seamless access to all apps while improving security and the user experience Contents Single sign-on (SSO) solutions .......................................................................3 Secure access to everything ...........................................................................5 Granular controls for SaaS apps and the web ...........................................6 Control over your user identity ......................................................................7 Security beyond user names and passwords ............................................8 Seamless integration with your existing environment ..........................9 Resolving issues faster with end-to-end visibility ............................... 10 ↑ Back← Pg. to 2 contents | Pg. 4 → Citrix.com 2 Single sign-on (SSO) solutions were designed to make life easier for employees and IT. They’re meant to reduce the cost of management and provide better security, all while delivering an improved user experience. However, many solutions fall short, covering only one type or a subset of application types. This forces you to implement several access solutions from different vendors to cover your entire application landscape — negating the productivity and user experience benefits you hoped for. The complexity this type of implementation creates also runs counter to the Zero Trust initiatives that many organizations are undertaking Citrix Workspace helps you unify all apps and data across your distributed IT architecture to provide single sign-on to all the applications and data people need to be productive. Working with your existing infrastructure, Citrix Access Control consolidates multiple remote access solutions, like traditional VPNs or SSO solutions, simplifying management for IT and providing unified access for employees. ↑ Back to contents ← Pg. 2 | Pg. 4 → 3 Citrix.com | e-book | Choosing a Single Sign-On Solution ↓ 6 benefits of the Citrix Workspace SSO solution ↑ ← Pg.
    [Show full text]
  • Operations T. Dahm Internet-Draft A. Ota Intended Status: Informational Google Inc Expires: January 9, 2017 D
    Operations T. Dahm Internet-Draft A. Ota Intended status: Informational Google Inc Expires: January 9, 2017 D. Medway Gash Cisco Systems, Inc. D. Carrel vIPtela, Inc. L. Grant July 8, 2016 The TACACS+ Protocol draft-ietf-opsawg-tacacs-04 Abstract TACACS+ provides Device Administration for routers, network access servers and other networked computing devices via one or more centralized servers. This document describes the protocol that is used by TACACS+. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on January 9, 2017. Copyright Notice Copyright (c) 2016 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect Dahm, et al. Expires January 9, 2017 [Page 1] Internet-Draft The TACACS+ Protocol July 2016 to this document.
    [Show full text]
  • 7750 SR OS System Management Guide
    7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R1 February 2012 Document Part Number: 93-0071-09-01 *93-0071-09-01* This document is protected by copyright. Except as specifically permitted herein, no portion of the provided information can be reproduced in any form, or by any means, without prior written permission from Alcatel-Lucent. Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective owners. The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein. Copyright 2012 Alcatel-Lucent Alcatel-Lucent. All rights reserved. Table of Contents Preface. .13 Getting Started Alcatel-Lucent 7750 SR Router Configuration Process . .17 Security Authentication, Authorization, and Accounting . .20 Authentication . .21 Local Authentication . .22 RADIUS Authentication . .22 TACACS+ Authentication. .25 Authorization . .26 Local Authorization. .27 RADIUS Authorization . .27 TACACS+ Authorization. .27 Accounting. .28 RADIUS Accounting . .28 TACACS+ Accounting . .28 Security Controls . .30 When a Server Does Not Respond . .30 Access Request Flow . .31 CPU Protection . .32 CPU Protection Extensions ETH-CFM . .36 Vendor-Specific Attributes (VSAs) . .38 Other Security Features . .39 Secure Shell (SSH) . .39 Per Peer CPM Queuing. .41 CPM Filters and Traffic Management . .42 TTL Security for BGP and LDP . .43 Exponential Login Backoff . .43 User Lockout . .45 Encryption . .46 802.1x Network Access Control . .46 TCP Enhanced Authentication Option. .46 Packet Formats . .48 Keychain. .49 Configuration Notes . .50 General . .50 Configuring Security with CLI . .51 Setting Up Security Attributes. .52 Configuring Authentication . .52 Configuring Authorization .
    [Show full text]
  • Catalyst 9600 Switches)
    Security Configuration Guide, Cisco IOS XE Gibraltar 16.11.x (Catalyst 9600 Switches) First Published: 2019-04-17 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Centralized Authentication Services (Radius, Tacacs, Diameter)
    83-10-32 DATA SECURITY MANAGEMENT CENTRALIZED AUTHENTICATION SERVICES (RADIUS, TACACS, DIAMETER) Bill Stackpole INSIDE Key Features of an AAA Service; RADIUS: Remote Authentication Dial-in User Service; TACACS: Terminal Access Controller Access Control System; DIAMETER: Twice RADIUS? INTRODUCTION RADIUS, TACACS, and DIAMETER are classified as authentication, autho- rization, and accounting (AAA) servers. The Internet Engineering Task Force (IETF) chartered an AAA Working Group in 1998 to develop the authentication, authorization, and accounting requirements for network access. The goal was to produce a base protocol that supported a num- ber of different network access models, including traditional dial-in net- work access servers (NAS), Mobile-IP, and roaming operations (ROAMOPS). The group was to build upon the work of existing access providers like Livingston Enterprises. Livingston Enterprises originally developed RADIUS (Remote Authen- tication Dial-in User Service) for their line of network access servers (NAS) to assist timeshare and Internet service providers with billing infor- mation consolidation and connection configuration. Livingston based RA- DIUS on the IETF distributed security model and actively promoted it PAYOFF IDEA through the IETF Network Access Got the telecommuter, mobile workforce, VPN, Server Requirements Working Group multi-platform, dial-in user authentication blues? Need a centralized method for controlling and au- in the early 1990s. The client/server diting external accesses to your network? Then design was created to be open and RADIUS, TACACS, or DIAMETER may be just what extensible so it could be easily you have been looking for. Flexible, inexpensive, adapted to work with other third- and easy to implement, these centralized authen- party products.
    [Show full text]
  • Fortiauthenticator Administration Guide Contains the Following Sections
    FortiAuthenticator - Administration Guide Version 6.2.0 FORTINET DOCUMENT LIBRARY https://docs.fortinet.com FORTINET VIDEO GUIDE https://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE & SUPPORT https://support.fortinet.com FORTINET TRAINING & CERTIFICATION PROGRAM https://www.fortinet.com/support-and-training/training.html NSE INSTITUTE https://training.fortinet.com FORTIGUARD CENTER https://fortiguard.com/ END USER LICENSE AGREEMENT https://www.fortinet.com/doc/legal/EULA.pdf FEEDBACK Email: [email protected] January 15, 2021 FortiAuthenticator 6.2.0 Administration Guide 23-620-657445-20210115 TABLE OF CONTENTS Change Log 9 What's new in FortiAuthenticator 10 FortiAuthenticator 6.2.0 10 REST API enhancements 10 TACACS+ support 10 SAML IdP Proxy: 0365 Azure/ADFS hybrid support 10 Get Windows AD nested groups during SAML IdP configuration 10 REST API key visibility for Admin users 11 RADSEC support 11 SCEP enrollment requests search 11 LDAP group filter support for remote RADIUS realms 11 Sync certificate bindings to load balancers 11 Show Password toggle included in replacement messages 11 Legacy Self-service Portal disabled by default 12 Additional SCEP CRL/OCSP enrollment options 12 Revoked/expired user certificates hidden by default 12 Richer logs for self-registered users 12 Usernames included in FTM activation messages 12 FTC: Sync email and mobile number 13 SNMP trap for RAID status changes 13 Administrator password required before changes can be made to administrator accounts 13 FortiAuthenticator
    [Show full text]
  • Identity Awareness Reference Architecture and Best Practices
    CHECK POINT Identity Awareness Reference Architecture and Best Practices INTRODUCTION There is a wealth of contextual metadata available about network devices once they join a network. Traditional firewalls that enforce security policies defined with IP addresses are largely unaware of the user and device identities behind those IP addresses. They rely on static rule bases and are unable to enforce dynamic users and role-based access, or provide important metadata and context in logs and security reports. “New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations (employees, partners, and customers), device access methods, and hosting models. A strong digital IAM strategy protects the firm and its customers from sophisticated cybercrimin als and improves efficiencies.” Forrester 2018 [1] THE IDENTITY PROCESS Network Authentication, Authorization, and Accounting (AAA, pronounced "triple-A") has been in use since the dawn of the Internet. Authentication asks the question, "Who or what are you?" Authorization asks, "What are you allowed to do?" And finally, Accounting wants to know, "What did you do?" Authentication – Who or What are You? Check Point devices usually learn who the user is from other devices, but there are cases where Check Point authenticates the user, e.g. through remote VPN access or a captive portal where the user’s network request is redirected to a browser-based authentication page. The client platform may be Windows, macOS, Linux, Android or Apple iOS. The authentication method may be one or more of a username/password or a digital certificate in a Check Point database.
    [Show full text]
  • Diameter Next Generation's AAA Protocol Håkan Ventura
    Diameter next generation’s AAA protocol Master thesis in Information theory by Håkan Ventura LiTH-ISY-EX-3232-2002 2002-04-25 Diameter next generation’s AAA protocol Master thesis in Information theory at Linköpings Tekniska Högskola by Håkan Ventura LiTH-ISY-EX-3232-2002 Handledare: Miguel Garcia, Peter Cederstrand Examinator: Viiveke Fåk Linköping 2002-04-25 ii Avdelning, Institution Datum Division, Department Date 2002-04-25 Institutionen för Systemteknik 581 83 LINKÖPING Språk Rapporttyp ISBN Language Report category Svenska/Swedish Licentiatavhandling ISRN LITH-ISY-EX-3232-2002 X Engelska/English X Examensarbete C-uppsats Serietitel och serienummer ISSN D-uppsats Title of series, numbering Övrig rapport ____ URL för elektronisk version http://www.ep.liu.se/exjobb/isy/2002/3232/ Titel Diameter - Nästa generations AAA protocol Title Diameter - Next generation’s AAA protocol Författare Håkan Ventura Author Sammanfattning Abstract The need for AAA protocols in the world are increasing and todays most common protocols RADIUS and TACACS+, cannot cope with the fast advances in fields benefiting from the use of AAA protocols. This is why IETF has developed the protocol Diameter as a next generations AAA protocol. The objective of this thesis is to account for the work conducted with Diameter as well as to determine if it is going to become the major AAA protocol of the next generation. In this thesis, I describe what Diameter is, its close integration with the Mobile IP protocol and its other uses. As Diameter is based on RADIUS an introduction to AAA and RADIUS is given in order to comprehend where we are today and where we are going as well as to why.
    [Show full text]
  • Radius: a Remote Authentication Dial-In User Service
    InSight: RIVIER ACADEMIC JOURNAL, VOLUME 5, NUMBER 2, FALL 2009 RADIUS: A REMOTE AUTHENTICATION DIAL-IN USER SERVICE Daniel Szilagyi*, Arti Sood** and Tejinder Singh§ M.S. in Computer Science Program, Rivier College Abstract This paper provides an overview of RADIUS deployment in the network. It also introduces the various protocols, such as EAP, that is used to implement this service, and PAP, CHAP, MSCHAP, EAP-TLS, EAP-TTLS, EAP- LEAP, EAP-FAST, EAP-FAST that provide authentication mechanisms. These protocols are not discussed in detail but only to present the idea of workflow as to how the RADIUS works in conjunction with them. The role of RADIUS is outlined in point-to-point and VPN connection. Also the 802.1x framework and RADIUS are described briefly. The various AAA protocols are discussed briefly along with DIAMETER, an enhanced version of the RADIUS protocol. This paper is intended for readers with Computer Science or Information Technology background. 1. Overview With growing numbers of remote users like telecommuters using wireless laptops, PDA(s) trying to access the network, Remote Authentication Dial-In User Service (RADIUS) is widely used. RADIUS, a distributed service, provides centralized management of user access control and security. RADIUS manages and secures the Wireless Local Area Network (WLAN), remote Virtual Private Network (VPN), and wired access. RADIUS is available as a standalone service like Internet Authentication Service (IAS), Access Control Server (ACS) etc. It may also be embedded in the network devices such as routers, switches etc. Users are authenticated by the RADIUS server against a central database which stores profile data such as passwords, type of access, etc.
    [Show full text]
  • Session Layer Protocols: Dialog Management, Synchronization
    UNIT-IV UPPER LAYERS: - Session Layer Protocols: Dialog Management, Synchronization. Presentation layer functions: translation, encryption, compression. Cryptography : substitution and Transposition Ciphers, Data Encryption standards ( DES) , DES Chaining, Breaking DES, Public Key cryptography, Authentication protocols, Different compression coding techniques. Application layer protocols & services : Email, World Wide Web, file transfer protocol, remote file server, internet telephony & chatting. Session Layer Protocols: The session layer is layer 5 of the seven-layer OSI model of computer networking. The session layer provides the mechanism for opening, closing and managing a session between end-user application processes, i.e., a semi-permanent dialogue. Communication sessions consist of requests and responses that occur between applications. Session-layer services are commonly used in application environments that make use of remote procedure calls (RPCs). An example of a session-layer protocol is the OSI protocol suite session-layer protocol, also known as X.235 or ISO 8327. In case of a connection loss this protocol may try to recover the connection. If a connection is not used for a long period, the session-layer protocol may close it and re-open it. It provides for either full duplex or half-duplex operation and provides synchronization points in the stream of exchanged messages. Other examples of session layer implementations include Zone Information Protocol (ZIP) – the AppleTalk protocol that coordinates the name binding process, and Session Control Protocol (SCP) – the DECnet Phase IV session-layer protocol. Within the service layering semantics of the OSI network architecture, the session layer responds to service requests from the presentation layer and issues service requests to the transport layer.
    [Show full text]