Mac address based authentication with TACACS

Answered Question
Dec 14th, 2009

Hello everyone!

I know there is a change in RADIUS to authenticate a user using his mac-address. Is it possible with TACACS?

I have this problem too.
0 votes
Correct Answer by ansalaza about 6 years 11 months ago

Here is an example on how to setup an AP against ACS:

Set Up the AP on the ACS

Complete these steps to set up the AP on the ACS:

  1. On the ACS server, click Network Configuration on             the left.

  2. To add a AAA client, click Add             Entry.

  3. Enter these values in the boxes:

    • AAA Client IP Address—IP_of_your_AP

    • Key—Make up a key (make sure the key matches the AP shared secret                 key)

    • Authenticate Using—RADIUS (Cisco Aironet)

  4. Click Submit & Restart.

MAC Authentication

Add a MAC Address to ACS

Complete these steps:

  1. From the ACS main menu, click on the User Setup button.

  2. In the User text box, enter the MAC address to add to the user             database.

    Note: The MAC address must be exactly as it is sent by the AP for both                 the username and the password. If authentication fails, check the failed                 attempts log to see how the MAC is being reported by the AP. Do not cut and                 paste the MAC address, as this can introduce phantom characters.

  3. On the User Setup screen, enter the MAC address in the Secure-PAP             password text box.

    Note: The MAC address must be exactly as it is sent by the AP for both                 the username and the password. If authentication fails, check the failed                 attempts log to see how the MAC is being reported by the AP. Do not cut and                 paste the MAC address, as this can introduce phantom characters.

  4. Check the Separate (CHAP/MS-CHAP) box.

  5. Enter a password for CHAP/MS-CHAP (this password should be             different from the MAC address).

  6. Click Submit.

IOS AP Web Interface

Complete these steps:

  1. Choose Security > Server             Manager.

  2. From the Current Server List drop-down list, choose             RADIUS.

  3. Enter the ACS IP address.

  4. Enter the shared secret (must match the key in             ACS).

  5. Click Apply.

  6. From the EAP Authentication drop-down list, choose the RADIUS             server's IP address.

  7. Click Apply.

SSID Manager (WEP Encryption Only)

Complete these steps for WEP encryption only:

  1. Choose the SSID from the Current SSID List, or enter a new SSID in             the SSID field.

  2. Check the Open Authentication box.

  3. From the drop-down list, choose with EAP.

  4. Check the Network EAP box.

  5. Click Apply.

Encryption Manager (WEP Encryption Only)

Complete these steps for WEP encryption only:

  1. Choose Security > Encryption             Manager.

  2. Click the WEP Encryption radio button.

  3. From the drop-down list, choose Mandatory.

  4. Click the Encryption Key 1 radio button.

  5. Enter the key.

  6. From the Key Size drop-down list, choose 128.

  7. Click Apply.

http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00805e7a13.shtml#mac

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 5 (1 ratings)
Loading.
fgasimzade Mon, 12/14/2009 - 10:13

Thank you for your answer and the link.

Everyone says EAP is not supported in TACACS, but there is EAP configuration in TACACS, especially PEAP, LEAP and etc.

ansalaza Mon, 12/14/2009 - 10:46

EAP for TACACS? Do you see it in ACS? Could you instruct us where that is?

fgasimzade Mon, 12/14/2009 - 10:51

Sure. Go to System Configuration, and then to Global Authentication Setup, you will find PEAP, LEAP and other EAP settings

ansalaza Mon, 12/14/2009 - 11:05

In this section we are not really looking at the TACACS options. We are actually looking at what the ACS Server supports for EAP authentication types:

http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_server_for_windows/4.2/user/guide/SCAuth.html#wp349274

ACS supports both protocols Radius and TACACS, but TACACS does not support the EAP methods...so if we have a Radius Client (Switch, AP...) then we can setup MAC authentication, please look at this example:

http://www.cisco.com/en/US/docs/ios/sec_user_services/configuration/guide/standalone_mab_ps6441_TSD_Products_Configuration_Guide_Chapter.html#wp1056526

fgasimzade Mon, 12/14/2009 - 11:12

Ok, thank you.

So how can I configure MAC address based authentication with ACS to grand wireless access only to specific users?

Correct Answer
ansalaza Mon, 12/14/2009 - 11:22

Here is an example on how to setup an AP against ACS:

Set Up the AP on the ACS

Complete these steps to set up the AP on the ACS:

  1. On the ACS server, click Network Configuration on             the left.

  2. To add a AAA client, click Add             Entry.

  3. Enter these values in the boxes:

    • AAA Client IP Address—IP_of_your_AP

    • Key—Make up a key (make sure the key matches the AP shared secret                 key)

    • Authenticate Using—RADIUS (Cisco Aironet)

  4. Click Submit & Restart.

MAC Authentication

Add a MAC Address to ACS

Complete these steps:

  1. From the ACS main menu, click on the User Setup button.

  2. In the User text box, enter the MAC address to add to the user             database.

    Note: The MAC address must be exactly as it is sent by the AP for both                 the username and the password. If authentication fails, check the failed                 attempts log to see how the MAC is being reported by the AP. Do not cut and                 paste the MAC address, as this can introduce phantom characters.

  3. On the User Setup screen, enter the MAC address in the Secure-PAP             password text box.

    Note: The MAC address must be exactly as it is sent by the AP for both                 the username and the password. If authentication fails, check the failed                 attempts log to see how the MAC is being reported by the AP. Do not cut and                 paste the MAC address, as this can introduce phantom characters.

  4. Check the Separate (CHAP/MS-CHAP) box.

  5. Enter a password for CHAP/MS-CHAP (this password should be             different from the MAC address).

  6. Click Submit.

IOS AP Web Interface

Complete these steps:

  1. Choose Security > Server             Manager.

  2. From the Current Server List drop-down list, choose             RADIUS.

  3. Enter the ACS IP address.

  4. Enter the shared secret (must match the key in             ACS).

  5. Click Apply.

  6. From the EAP Authentication drop-down list, choose the RADIUS             server's IP address.

  7. Click Apply.

SSID Manager (WEP Encryption Only)

Complete these steps for WEP encryption only:

  1. Choose the SSID from the Current SSID List, or enter a new SSID in             the SSID field.

  2. Check the Open Authentication box.

  3. From the drop-down list, choose with EAP.

  4. Check the Network EAP box.

  5. Click Apply.

Encryption Manager (WEP Encryption Only)

Complete these steps for WEP encryption only:

  1. Choose Security > Encryption             Manager.

  2. Click the WEP Encryption radio button.

  3. From the drop-down list, choose Mandatory.

  4. Click the Encryption Key 1 radio button.

  5. Enter the key.

  6. From the Key Size drop-down list, choose 128.

  7. Click Apply.

http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00805e7a13.shtml#mac

Actions

This Discussion