Task 5: (Optional) Configure R1 AAA Services and Access the RADIUS Server Using SDM
You can also use SDM to configure the router to access the external RADIUS server.
Note: If you configured R1 to access the external RADIUS server using Cisco IOS in Task 3, you can skip this task. If you performed Task 3 and you want to perform this task, restore the router to its basic configuration as described Task 1 of this part, except log in initially as RadUser with the password RadUserpass. If the RADIUS server is unavailable at this time, you will still be able to log in to the console.
If you do not perform this task, read through the steps to become familiar with the SDM process.
Step 1: Implement AAA services and HTTP router access prior to starting SDM.
-
From the CLI global config mode, enable a new AAA model.
R1(config)#aaa new-model
-
Enable the HTTP server on R1.
R1(config)#ip http server
Step 2: Access SDM and enable the command preview option.
-
Open a browser on PC-A. Start SDM by entering the R1 IP address 192.168.1.1 in the address field.
-
Log in with no username and the enable secret password cisco12345.
-
In the Password Needed – Networking dialog box, enter cisco12345 in the Password field and click Yes.
-
Configure SDM to allow you to preview commands before sending them to the router. Select Edit > Preferences.
-
In the User Preferences window, check the Preview commands before delivering to router check box and click OK.
Step 3: Configure R1 AAA to access the WinRADIUS server.
-
Click the Configure button at the top of the screen.
-
Select Additional Tasks > AAA > AAA Servers and Groups > AAA Servers.
-
In the AAA Servers window, click Add.
-
In the Add AAA Server window, verify that RADIUS is in the Server Type field.
-
In the Server IP or Host field, enter the IP address of PC-A, 192.168.1.3.
-
Change the Authorization Port from 1645 to 1812, and change the Accounting Port from 1646 to 1813 to match the RADIUS server port number settings.
-
Check the Configure Key check box.
-
Enter WinRadius in both the New Key and Confirm Key fields.
-
In the Deliver Configuration to Router window, click Deliver, and in the Commands Delivery Status window, click OK.
-
What command was delivered to the router? radius-server host 192.168.1.3 auth-port 1812 acct-port 1813 key WinRadius. This is the same Cisco IOS command that would have been entered at the CLI in Task 4, Step 8b.
Step 4: Configure the R1 AAA login method list for RADIUS.
-
Click the Configure button at the top of the screen.
-
Select Additional Tasks > AAA > Authentication Policies > Login.
-
In the Authentication Login window, click Add.
-
In the Select Method List(s) for Authentication Login window, choose group radius and click OK.
-
In the Select Method List(s) for Authentication Login window, choose local as a second method and click OK.
-
In the Deliver Configuration to Router window, click Deliver and in the Commands Delivery Status window, click OK.
-
What command(s) were delivered to the router? aaa authentication login default group radius local. This is similar to the IOS command that would have been entered at the CLI in the Task 3, Step 2. except that “none” was specified as the backup option to radius.
Step 5: Test your configuration.
-
If you restarted the RADIUS server, you must recreate the user RadUser with a password of RadUserpass by selecting Operation > Add User.
-
Clear the log on the WinRadius server by selecting Log > Clear.
-
Test your configuration by opening a Telnet session from PC-A to R1.
C:>telnet 192.168.1.1
-
At the login prompt, enter the username RadUser defined on the RADIUS server and a password of RadUserpass.
-
Were you able to login to R1? Yes
Task 6. Reflection -
Why would an organization want to use a centralized authentication server rather than configuring users and passwords on each individual router? Answers will vary. Updating local databases on network devices is not a scalable solution. A centralized authentication server greatly reduces the administration time required when there are additions or removals to the user list. This is especially true in a large network where the number of updates required might be high enough that a dedicated person could be required.
-
Contrast local authentication and local authentication with AAA. Answers will vary. With local authentication alone, specific usernames or accounts can be defined in the local router database, with varying privilege levels, that can apply to the router as a whole. When the console, vty, and AUX lines are configured to refer to this local database, the user is prompted for a username and a password when using any of these lines to access the router. Additional control over the login process can be achieved using AAA. For basic authentication, AAA can be configured to access the local database for user logins and various fallback procedures can be defined.
-
Based on the Academy online course content, web research, and the use of RADIUS in this lab, compare and contrast RADIUS with TACACS+. Answers will vary but could include the following:
-
RADIUS is an IETF standard based on RFC 2865, and a number of freeware versions of it are available. TACACs+ is Cisco proprietary.
-
RADIUS uses UDP while TACACS+ uses TCP.
-
RADIUS encrypts only the password in the access-request packet from the client to the server. The remainder of the packet is unencrypted. TACACS+ encrypts the entire body of the packet, but leaves a standard TACACS+ header.
-
RADIUS combines authentication and authorization. TACACS+ uses the AAA architecture, which separates AAA. This allows separate authentication solutions that can still use TACACS+ for authorization and accounting.
Router Interface Summary Table
-
Router Interface Summary
|
Router Model
|
Ethernet Interface #1
|
Ethernet Interface #2
|
Serial Interface #1
|
Serial Interface #2
|
1700
|
Fast Ethernet 0 (FA0)
|
Fast Ethernet 1 (FA1)
|
Serial 0 (S0)
|
Serial 1 (S1)
|
1800
|
Fast Ethernet 0/0 (FA0/0)
|
Fast Ethernet 0/1 (FA0/1)
|
Serial 0/0/0 (S0/0/0)
|
Serial 0/0/1 (S0/0/1)
|
2600
|
Fast Ethernet 0/0 (FA0/0)
|
Fast Ethernet 0/1 (FA0/1)
|
Serial 0/0 (S0/0)
|
Serial 0/1 (S0/1)
|
2800
|
Fast Ethernet 0/0 (FA0/0)
|
Fast Ethernet 0/1 (FA0/1)
|
Serial 0/0/0 (S0/0/0)
|
Serial 0/0/1 (S0/0/1)
|
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many interfaces the router has. There is no way to effectively list all the combinations of configurations for each router class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device. The table does not include any other type of interface, even though a specific router may contain one. An example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be used in Cisco IOS commands to represent the interface.
|
Device Configs - Part 1 and 2 combined for R1 and R3
Router R1 (After parts 1 and 2 of this lab)
R1#sh run
Building configuration...
Current configuration : 1536 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname R1
!
boot-start-marker
boot-end-marker
!
security passwords min-length 10
logging message-counter syslog
enable secret 5 $1$UNul$LMmwJgKj4Ze1OBToirDDJ.
!
no aaa new-model
dot11 syslog
ip source-route
!
ip cef
no ip domain lookup
!
no ipv6 cef
multilink bundle-name authenticated
!
username user01 password 7 06131C245E1E5809040401
archive
log config
hidekeys
!
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1/0
!
interface FastEthernet0/1/1
!
interface FastEthernet0/1/2
!
interface FastEthernet0/1/3
!
interface Serial0/0/0
ip address 10.1.1.1 255.255.255.252
clock rate 64000
!
interface Serial0/0/1
no ip address
shutdown
clock rate 2000000
!
interface Vlan1
no ip address
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 10.1.1.2
no ip http server
no ip http secure-server
!
control-plane
!
banner motd ^CUnauthorized access strictly prohibited and prosecuted to the ful
l extent of the law^C
!
line con 0
exec-timeout 0 0
password 7 00071A150754080901314D5D1A
logging synchronous
login local
line aux 0
exec-timeout 5 0
password 7 110A1016141D0A191C3A2A373B
login local
line vty 0 4
exec-timeout 5 0
password 7 070C285F4D060F110E020A1F17
login local
!
scheduler allocate 20000 1000
end
Router R2 (After part 1 of this lab)
R2#sh run
Building configuration...
Current configuration : 1503 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname R2
!
boot-start-marker
boot-end-marker
!
security passwords min-length 10
logging message-counter syslog
enable secret 5 $1$BdPR$JZoTKMuMXf7Zd4JKCEPQi1
!
no aaa new-model
dot11 syslog
ip source-route
!
ip cef
no ip domain lookup
!
no ipv6 cef
multilink bundle-name authenticated
!
archive
log config
hidekeys
!
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1/0
!
interface FastEthernet0/1/1
!
interface FastEthernet0/1/2
!
interface FastEthernet0/1/3
!
interface Serial0/0/0
ip address 10.1.1.2 255.255.255.252
!
interface Serial0/0/1
ip address 10.2.2.2 255.255.255.252
clock rate 64000
!
interface Vlan1
no ip address
!
ip forward-protocol nd
ip route 192.168.1.0 255.255.255.0 10.1.1.1
ip route 192.168.3.0 255.255.255.0 10.2.2.1
no ip http server
no ip http secure-server
!
control-plane
!
banner motd ^CUnauthorized access strictly prohibited and prosecuted to
the full extent of the law^C
!
line con 0
exec-timeout 0 0
password 7 00071A150754080901314D5D1A
logging synchronous
login
line aux 0
exec-timeout 5 0
password 7 01100F175804071A395C4F1A0A
login
line vty 0 4
exec-timeout 5 0
password 7 00071A1507541D1216314D5D1A
login
!
scheduler allocate 20000 1000
end
R2#
Router R3 (After parts 1 and 2 of this lab)
R3#sh run
Building configuration...
Current configuration : 1535 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname R3
!
boot-start-marker
boot-end-marker
!
security passwords min-length 10
logging message-counter syslog
enable secret 5 $1$mciB$zaprLqKopLnfRgx3DsLE5.
!
no aaa new-model
dot11 syslog
ip source-route
!
ip cef
no ip domain lookup
!
no ipv6 cef
multilink bundle-name authenticated
!
username user01 password 7 120C1612005B5D142B3837
archive
log config
hidekeys
!
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 192.168.3.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1/0
!
interface FastEthernet0/1/1
!
interface FastEthernet0/1/2
!
interface FastEthernet0/1/3
!
interface Serial0/0/0
no ip address
shutdown
no fair-queue
clock rate 2000000
!
interface Serial0/0/1
ip address 10.2.2.1 255.255.255.252
!
interface Vlan1
no ip address
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 10.2.2.2
no ip http server
no ip http secure-server
!
control-plane
!
banner motd ^CUnauthorized access strictly prohibited and prosecuted to
the full extent of the law^C
!
line con 0
exec-timeout 0 0
password 7 05080F1C22434D061715160118
logging synchronous
login local
line aux 0
exec-timeout 5 0
password 7 104D000A0618131E14142B3837
login local
line vty 0 4
exec-timeout 5 0
password 7 110A1016141D1D181D3A2A373B
login local
!
scheduler allocate 20000 1000
end
Router R1 (Commands added for Part 4 of this lab)
R1(config)#aaa new-model
R1(config)#aaa authentication login default group radius none
R1(config)#radius-server host 192.168.1.3 auth-port 1812 acct-port 1813 key WinRadius
R1(config)#aaa authentication login TELNET_LINES group radius
R1(config)#line vty 0 4
R1(config-line)#login authentication TELNET_LINES
R1(config-line)#
Router R3 (Commands added for Part 3 of this lab)
R3(config)#username Admin01 privilege 15 secret Admin01pass
R3(config)#aaa new-model
R3(config)#aaa authentication login default local none
R3(config)#aaa authentication login TELNET_LINES local
R3(config)#line vty 0 4
R3(config-line)#login authentication TELNET_LINES
All contents are Copyright © 1992–2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page of
Share with your friends: |