Configuring AAA
Configuring AAA
Configuring AAA
This chapter describes how to configure Authentication, Authorization, and Accounting (AAA) on
Cisco 1000 Series Connected Grid Routers (hereafter referred to as the Cisco CG-OS router).
This chapter includes the following sections:
• Information About AAA, page 4-1
• Prerequisites for AAA, page 4-5
• Guidelines and Limitations for AAA, page 4-6
• Default Settings, page 4-6
• Configuring AAA, page 4-6
• Displaying and Clearing the Local AAA Accounting Log, page 4-12
• Verifying Configuration, page 4-12
• Configuration Example, page 4-13
Cisco 1000 Series Connected Grid Routers Security Software Configuration Guide
OL-25632-03 4-1
Chapter 4 Configuring AAA
Information About AAA
Based on the user ID and password combination that you provide, the Cisco CG-OS router performs
local authentication or authorization using the local database or remote authentication or authorization
using one or more AAA servers. A pre-shared secret key provides security for communication between
the Cisco CG-OS router and AAA servers. You can configure a common secret key for all AAA servers
or for only a specific AAA server.
AAA security provides the following services:
• Authentication—Identifies users, including login and password dialog, challenge and response,
messaging support, and, depending on the security protocol that you select, encryption.
Authentication is the process of verifying the identity of the person or device accessing the Cisco CG-OS
router, which is based on the user ID and password combination provided by the entity trying to access
the Cisco CG-OS router. The Cisco CG-OS routers allow you to perform local authentication (using the
local lookup database) or remote authentication (using one or more RADIUS or TACACS+ servers).
• Authorization—Provides access control.
AAA authorization is the process of assembling a set of attributes that describe what the user is
authorized to perform. Authorization in Cisco CG-OS is provided by attributes that are downloaded
from AAA servers. Remote security servers, such as RADIUS and TACACS+, authorize users for
specific rights by associating attribute-value (AV) pairs, which define those rights with the
appropriate user.
• Accounting—Provides the method for collecting information, logging the information locally on the
Cisco CG-OS router, and sending the information to the AAA server for billing, auditing, and
reporting.
The accounting feature tracks and maintains a log of every management session used to access the
Cisco CG-OS router. You can use this information to generate reports for troubleshooting and
auditing purposes. You can store accounting logs locally on the Cisco CG-OS router or send them
to remote AAA servers.
Note Cisco CG-OS software supports authentication, authorization, and accounting independently. For
example, you can configure authentication and authorization without configuring accounting.
Cisco 1000 Series Connected Grid Routers Security Software Configuration Guide
4-2 OL-25632-03
Chapter 4 Configuring AAA
Information About AAA
• It is more efficient to define and manage user attributes for Cisco CG-OS routers within centralized
AAA servers, which can be a shared resource for multiple routers rather than configuring local AAA
services on each Cisco CG-OS router independently. Additionally, AAA Server Groups can provide
additional redundancy.
You can specify the following authentication methods for the AAA services:
• RADIUS server groups—Uses the global pool of RADIUS servers for authentication
• Specified server groups—Uses specified RADIUS or TACACS+ server groups for authentication
• Local—Uses the local username or password database for authentication
• None—Uses only the username
Note If the chosen authentication method employs all RADIUS servers, rather than a specific server group,
the Cisco CG-OS router chooses the RADIUS server from the global pool of configured RADIUS
servers, in the order of configuration. Servers from this global pool can also be configured within a
RADIUS server group on the Cisco CG-OS router.
Table 4-2 shows the AAA authentication methods that you can configure for the AAA services.
Cisco 1000 Series Connected Grid Routers Security Software Configuration Guide
OL-25632-03 4-3
Chapter 4 Configuring AAA
Information About AAA
Note For console login authentication and user login authentication, and user management session
accounting, the Cisco CG-OS router queries each option in the order specified. The local option is the
default method when other configured options fail.
Cisco 1000 Series Connected Grid Routers Security Software Configuration Guide
4-4 OL-25632-03
Chapter 4 Configuring AAA
Prerequisites for AAA
Start
Incoming
Incoming Local
access
access
request to
router
switch
Remote
No more
First or Local
servers left Success Access
next server database
lookup permitted
lookup
Found a Failure
RADIUS server
RADIUS Denied
No Lookup Failure access
response
Accept
Access
346597
permitted
Note “No more servers left” means that there is no response from any server within available server groups.
Cisco 1000 Series Connected Grid Routers Security Software Configuration Guide
OL-25632-03 4-5
Chapter 4 Configuring AAA
Guidelines and Limitations for AAA
Default Settings
Table 4-3 lists the default settings for AAA parameters.
Parameters Default
Console authentication method Local
Default authentication method Local
Login authentication failure messages Disabled
Default accounting method Local
Accounting log display length 250 KB
Configuring AAA
This section includes the following topics:
• Process for Configuring AAA, page 4-6
• Configuring Default Login Authentication Methods, page 4-7
• Enabling the Default User Role for Authentication, page 4-8
• Enabling Login Authentication Failure Messages, page 4-8
• Configuring AAA Accounting Default Methods, page 4-9
• Using AAA Server VSAs, page 4-10
Step 1 When you want to use remote RADIUS or TACACS+ servers for authentication, and to configure the
hosts on your Cisco CG-OS router, refer to Chapter 2, “Configuring RADIUS” and Chapter 3,
“Configuring TACACS+”).
Step 2 Enable the Default User Role for Authentication. (See Enabling the Default User Role for
Authentication, page 4-8.)
Cisco 1000 Series Connected Grid Routers Security Software Configuration Guide
4-6 OL-25632-03
Chapter 4 Configuring AAA
Configuring AAA
Step 3 Enable the Login Authentication Failure Messages. (See Enabling Login Authentication Failure
Messages, page 4-8.)
Step 4 Configure default login authentication methods for user logins. (See Configuring Default Login
Authentication Methods, page 4-7.)
Step 5 Configure default AAA accounting default methods. (See Configuring AAA Accounting Default
Methods, page 4-9.)
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters global configuration mode.
Step 2 aaa authentication login default {group Configures the default authentication methods.
group-list [none]| local
group-list—Space-separated list of server groups
that can include any configured RADIUS or
TACACS+ server group name.
local—Specifies the local database of the
Cisco CG-OS router for authentication.
none—Uses no authentication.
The default login method is local, which the
Cisco CG-OS router uses when no methods are
configured or when all the configured methods fail
to respond.
Step 3 show aaa authentication (Optional) Displays the configuration of the default
login authentication methods.
Step 4 copy running-config startup-config (Optional) Copies the running configuration to the
startup configuration.
EXAMPLE
This example shows how to configure default login authentication methods for the Cisco CG-OS router.
router# configure terminal
router(config)# aaa authentication login default group va_reston2
Cisco 1000 Series Connected Grid Routers Security Software Configuration Guide
OL-25632-03 4-7
Chapter 4 Configuring AAA
Configuring AAA
Note Although references to a default VDC might be seen in CLI displays, the Cisco CG-OS router does not
support the configuration of more than one VDC. The Cisco CG-OS router only supports a default VDC.
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters global configuration mode.
Step 2 aaa user default-role Enables the default user role for AAA
authentication. The default is enabled.
You can disable the default user role feature by
using the no form of this command.
Step 3 show aaa user default-role (Optional) Displays the AAA default user role
configuration as either enabled or disabled on the
Cisco CG-OS router.
Step 4 copy running-config startup-config (Optional) Copies the running configuration to the
startup configuration.
EXAMPLE
This example shows how to enable the default user role of network-operator for remote authentication
to the Cisco CG-OS router through a AAA (RADIUS or TACACS+) server.
router# configure terminal
router(config)# aaa user default-role
router(config)# copy running-config startup-config
Cisco 1000 Series Connected Grid Routers Security Software Configuration Guide
4-8 OL-25632-03
Chapter 4 Configuring AAA
Configuring AAA
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters global configuration mode.
Step 2 aaa authentication login error-enable Enables login authentication failure messages. The
default is disabled.
Step 3 show aaa authentication login error-enable (Optional) Displays whether the login failure
message configuration is enabled or disabled.
Step 4 copy running-config startup-config (Optional) Copies the running configuration to the
startup configuration.
EXAMPLE
This example shows how to enable authentication failure messages on the Cisco CG-OS router that will
appear on a user (client) terminal when authentication with a RADIUS or TACACS+ server fails.
router# configure terminal
router(config)# aaa authentication login error-enable
router(config)# copy running-config startup-config
Note When you configure server groups and the server groups do not respond, by default, the local database
on the Cisco CG-OS router is used for authentication.
Cisco 1000 Series Connected Grid Routers Security Software Configuration Guide
OL-25632-03 4-9
Chapter 4 Configuring AAA
Configuring AAA
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters global configuration mode.
Step 2 aaa accounting default {group Configures the default accounting method.
server-group-name | local}
server-group-name– List the server groups on which
you want to store accounting logs.
radius–Uses the global pool of RADIUS servers for
accounting.
local– Uses the local database of the Cisco CG-OS
router for accounting.
The default method is local, which is used when you
do not configure any options or when all the
configured server groups fail to respond.
Step 3 show aaa accounting (Optional) Displays the configured default AAA
accounting method.
Step 4 copy running-config startup-config (Optional) Copies the running configuration to the
startup configuration.
EXAMPLE
This example shows how to configure the Cisco CG-OS router to use default accounting methods
employed by RADIUS servers.
router# configure terminal
router(config)# aaa accounting default group va_reston3
router(config)# copy running-config startup-config
About VSAs
The Internet Engineering Task Force (IETF) draft standard specifies attribute 26 as the method for
communicating VSAs between the network access server and the RADIUS server. VSAs allow vendors
to support their own extended attributes that are not suitable for general use. The Cisco RADIUS
implementation supports one vendor-specific option using the format recommended in the specification.
The Cisco vendor ID is 9, and the supported option is vendor type 1, which is named cisco-av-pair. The
value is a string with the following format:
protocol : attribute separator value *
Cisco 1000 Series Connected Grid Routers Security Software Configuration Guide
4-10 OL-25632-03
Chapter 4 Configuring AAA
Configuring AAA
The protocol is a Cisco attribute for a particular type of authorization, the separator is = (equal sign) for
mandatory attributes, and * (asterisk) indicates optional attributes.
When you use RADIUS servers for authentication on the Cisco CG-OS router, the RADIUS protocol
directs the RADIUS server to return user attributes, such as authorization information, along with
authentication results. This authorization information is specified through VSAs.
VSA Format
Cisco CG-OS supports the following VSA protocol options:
• Shell—Protocol used in access-accept packets to provide user-profile information.
• Accounting—Protocol used in accounting-request packets. When a value contains any white spaces,
put it within double quotation marks.
Cisco CG-OS supports the following attributes:
• roles—Lists all the roles assigned to the user. The value field is a string that stores the list of group
names delimited by white space. For example, if you belong to roles network-operator, the value
field would be “network-operator.” This subattribute is sent in the VSA portion of the
Access-Accept frames from the RADIUS server, and it can only be used with the shell protocol
value. These examples use the roles attribute:
shell:roles=“network-operator vdc-admin”
shell:roles*“network-operator” vdc-admin
If you do not specify the role option in the cisco-av-pair attribute, the default user role is
network-operator.
For more information on user roles, see Chapter 7, “Configuring User Accounts and RBAC.”
Cisco 1000 Series Connected Grid Routers Security Software Configuration Guide
OL-25632-03 4-11
Chapter 4 Configuring AAA
Displaying and Clearing the Local AAA Accounting Log
Command Purpose
show accounting log [size | start-time year Displays the contents of the AAA accounting log
month day hh:mm:ss] on the Cisco CG-OS router.
size–Use to limit command output from the
accounting log. The range is from 0 to 250000
bytes. By default, the command output contains
up to 250000 bytes of the accounting log.
Note The AAA accounting log is local to the Cisco CG-OS router.
Verifying Configuration
To display AAA configuration information, enter any or all of the following commands:
Command Purpose
show aaa accounting Displays AAA accounting configuration.
show aaa authentication [login error-enable] Indicates if the AAA authentication login
error-enable option is enabled or disabled on the
Cisco CG-OS router.
show aaa groups Displays the AAA server group names configured
on the Cisco CG-OS router.
show running-config aaa [all] Displays the AAA configuration in the running
configuration.
show startup-config aaa Displays the AAA configuration in the startup
configuration.
For detailed information about the fields in the output from these commands, see the
Command Lookup Tool on [Link].
Cisco 1000 Series Connected Grid Routers Security Software Configuration Guide
4-12 OL-25632-03
Chapter 4 Configuring AAA
Configuration Example
Configuration Example
The following example shows how to configure AAA:
aaa authentication login default group va_reston2
aaa accounting default group va_reston3
Cisco 1000 Series Connected Grid Routers Security Software Configuration Guide
OL-25632-03 4-13
Chapter 4 Configuring AAA
Configuration Example
Cisco 1000 Series Connected Grid Routers Security Software Configuration Guide
4-14 OL-25632-03