cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1171
Views
22
Helpful
8
Replies

logins via radius

mikedurbin
Level 1
Level 1

Hello. I was wondering if anyone had implemented a radius server that would allow for logins to switches and routers to be able to control what level of access a user had. An example might be that if the main network guy wanted full access, he could log in and authenticate through a radius server (something like IAS) and get the level of permissions he needs to administer the switch. And the JR network guy comes along and does the same, but with a smaller set of abilities. Can this be done with radius authentication integrated with AD?

8 Replies 8

Edison Ortiz
Hall of Fame
Hall of Fame

You need TACACS+

http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a0080094e99.shtml

Router Management

RADIUS does not allow users to control which commands can be executed on a router and which cannot. Therefore, RADIUS is not as useful for router management or as flexible for terminal services.

HTH,

__

Edison.

Please rate helpful posts

As Edison says for command authorisation you need TACACS+. However......

I have implemented what I think is a good workaround using MS IAS. What I have is multiple IAS polcies for terminal access, each one representing a privilege level, in the advanced settings for each policy I push down a Cisco AV pair that sets the privilege level (shell:priv-lvl=15). In AD I have the equivalent Security Groups configured and I make users members of the relevant group. I.e. someone who requires full access to the switches and routers has Level-15 access and matches the Level-15 IAS policy. Someone who can only login and get level-0 privilege matches the Level-0 policy and gets the AV pair shell:priv-lvl=0.

You also need to configure your IOS devices to change the privilege level of certain commands, however once you have a template it is pretty easy to apply this to all your IOS devices.

As I said this isn't a replacement for TACACS+ as that allows each command to be authorised, but I think it's a neat workaround. Plus if you use IAS as the Radius Server it's included in the OS.

HTH

Andy

Ive never used a Tacacs server before. Is there a free version available?

Also, I like the IAS solution andrew, as Im a little more familiar with it. Is there any way you could provide more detail on that?

With regards to IAS this is what I have done, however you can make it more or less complex as I only have three privilege levels:

I have created three Global Security Groups in AD - each representing an IOS privilege level - Level-0, Level-1 and Level-15.

I then make the user a member of the appropriate group.

In IAS I then have three separate policies, each representing the Privilege Level (I actually have more but the policy conditions are different - i.e. VPN, dot1x etc).

For admission to each IAS policy I match against 'Windows-Group matches=xxxx' where 'xxxx' represents the AD Global Security group. 'NAS-Port-Type matches=Async (modem) or Virtual (VPN)' & 'Authentication Type matches=PAP'

In the advanced Tab for each policy I have the two RADIUS Standard attributes 'Reply-Message' and 'Service-Type' selected, plus the Cisco-AV-Pair. The Service-Type is set to 'NAS Prompt' and the Reply-Message is set to 'Level X login successful, access time recorded' - this is just text though and is displayed after a user sucessfully logs in and can be anything you wish. The Cisco-AV-Pair is set to 'shell:priv-lvl=X' where 'X' is the privilege level.

On each of the IOS devices I have the configuration:

aaa new-model

!

!

aaa group server radius IAS-Servers

server 10.1.1.1 auth-port 1812 acct-port 1813

server 10.2.2.2 auth-port 1812 acct-port 1813

ip radius source-interface Loopback0

!

aaa authentication login default group IAS-Servers local

aaa authentication enable default group IAS-Servers enable

aaa authorization console

aaa authorization exec default group IAS-Servers if-authenticated

!

radius-server host 10.1.1.1 auth-port 1812 acct-port 1813 key xxxxxxxxxxxx

radius-server host 10.2.2.2 auth-port 1812 acct-port 1813 key xxxxxxxxxxxx

!

There are additional commands on some IOS devices for different access (VPN, 802.1x & WEBVPN), however this is the basics and you should be able to work out how to get the other stuff working quite easily.

Additionally I have added some commands to change the privilege level of certain commands using the global configuration command:

privilege level X

HTH

Andy

Thanks Andrew. Thank you very much.

Andy ,

I have something like you have in the IAS set-up , but I cant get the accounting to work properly. It displays usernaem/workstation , but does not want to log the commands issued on the device.

Any advice?

Thanks,

Vlad

I don't think this is possible with Radius. I just tried adding the command 'aaa accounting commands 15 default start-stop group Radius-Servers' and I get an error telling me the server-group 'Radius-Servers' is not a tacacs+ server group:

091058: Feb 21 12:23:14: %AAAA-4-SERVNOTACPLUS: The server-group "Radius-Servers" is not a tacacs+ server group. Please define "Radius-Servers" as a tacacs+ server group.

This was on a Catalyst 3550 running the latest IOS.

Andy

I can't seem to get my wireless AP1230 to work. All my AP hostname start with "caap" so I have

Remote Access Policy:

Client-Friendly-Name matches "caap*"

Windows-Group is tied to my AD security group

Service-Type is set to Radius Login

Cisco-AV-Pair is set to shell:priv-lvl=15

and "Grant Remote Access permission" is checked

On the AP, I have

aaa authentication login SECURE group radius local enable

aaa authorization exec SECURE group radius local

radius-server host auth-port 1812 acct-port 1813 key xxxxx

radius-server host auth-port 1812 acct-port 1813 key xxxxx

line vty 0 15

authorization exec SECURE

login authentication SECURE

This works for my routers/switches but not for the AP. Any ideas why AP are different?

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card