Cisco Systems 4.2 manual Configure Password Policy, Privileges that you want to grant

Page 76

Chapter 5 Password Policy Configuration Scenario

Step 2: Configure Password Policy

 

Option

 

Description

 

 

 

 

 

 

Account Never

If you want to override the lockout options set up on the Administrator

 

Expires

Password Policy page (with the exception of manual lockout), check the check

 

 

 

 

box next to Account Never Expires. If you check this option, the account never

 

 

 

 

expires but password change policy remains in effect. The default value is

 

 

 

 

unchecked (disabled).

 

 

 

 

 

Account Locked

If you want to lock out an administrator who is denied access due to the account

 

 

 

 

policy options specified on the Password Policy page, check the check box for

 

 

 

 

Account Locked. When unchecked (disabled), this option unlocks an

 

 

 

 

administrator who was locked out.

 

 

 

 

Administrators who have the Administration Control privilege can use this

 

 

 

 

option to manually lock out an account or reset locked accounts. The system

 

 

 

 

displays a message that explains the reason for a lockout.

 

 

 

 

When an administrator unlocks an account, ACS resets the Last Password

 

 

 

 

Change and the Last Activity fields to the day on which the administrator

 

 

 

 

unlocks the account.

 

 

 

 

The reset of a locked account does not affect the configuration of the lockout

 

 

 

 

and unlock mechanisms for failed attempts.

 

 

 

 

Step 4

Click Grant All or Revoke All to globally add or remove all privileges,

Step 5

If you want to grant specific privileges to the administrator, check the check boxes that correspond to

 

the privileges that you want to grant.

 

 

 

 

 

 

 

Note

For more information on administrative privileges, see the “Add Administrator and Edit

 

 

 

Administrator Pages” section in Chapter 11 of the User Guide for Cisco Secure Access Control

 

 

 

Server 4.2, “Administrators and Administrative Policy.”

 

 

 

 

 

Step 6

Go to Step 2: Configure Password Policy, page 5-4(the next section of this chapter) and follow the steps

 

to specify password restrictions.

 

 

 

 

 

 

Step 2: Configure Password Policy

To configure password policy:

Step 1 On the Administration Control page, click Password Policy.

The Administrator Password Policy Setup page appears, shown in Figure 5-2.

Configuration Guide for Cisco Secure ACS 4.2

5-4

OL-14390-02

 

 

Image 76
Contents Configuration Guide for Cisco Secure ACS Americas HeadquartersPage N T E N T S Deploying ACS in a NAC/NAP Environment Error Messages Overview Profile Setup Profile Setup Audience OrganizationConventions Product DocumentationConvention Boldface fontAvailable Formats ACSTroubleshooting.html Related DocumentationOpenSSL/Open SSL Project License IssuesOpenSSL License Original SSLeay License Overview of ACS Configuration Summary of Configuration StepsClick Interface Configuration Click System ConfigurationPeap EAP-FAST EAP-TLS Leap EAP-MD5 Overview of ACS Configuration Summary of Configuration Steps Configuration Flowchart EAP-TLS, SSLOL-14390-02 Deploy the Access Control Servers Determining the Deployment ArchitectureWired LAN Access Access TypesSize Users Small LAN Environment Campus LANGeographically Dispersed Wired LAN ACS in a Campus LANWireless Access Topology Simple WlanCampus Wlan Regional Wlan Setting Large Enterprise Wlan Setting 6shows a regional WlanDial-up Access Topology Small Dial-Up Network AccessLarge Dial-Up Network Access Small Dial-up NetworkDetermining How Many ACSs to Deploy Scalability Placement of the Radius ServerNumber of Users LAN Versus WAN Deployment Number of LANs in the Network Number of Network Access ServersWAN Latency and Dependability Configuration components for replication-What is replicated Deploying ACS Servers to Support Server FailoverLoad Balancing and Failover Database Replication ConsiderationsDatabase Synchronization Considerations Replication DesignDeploying ACS in a NAC/NAP Environment Component DescriptionACS Cisco AAA server productRemote Access Policy Additional TopicsAdministrative Access Policy Security PolicySeparation of Administrative and General Users Database Considerations Network Latency and ReliabilityNumber of Users Type of DatabaseOL-14390-02 Configuring New Features in ACS New Global EAP-FAST Configuration OptionsOption Description PACUse PAC and Do Not Use PAC Options Disabling NetBIOS 2shows the new options on the NAP ProtocolsConfiguring ACS 4.2 Enhanced Logging Features To disable NetBIOS over TCP/ IP in Windows 2000, XP, orRight-clickMy Network Places and choose Properties Click Internet Protocol TCP/IP and choose PropertiesConfiguring Group Filtering at the NAP Level Click SubmitConfiguring Syslog Time Format in ACS Check the Disable Dynamic users check boxOption to Not Log or Store Dynamic Users Active Directory Multi-Forest SupportRSA Support on the ACS SE Click Database ConfigurationClick Submit and Restart Click Create New Configuration Click ConfigureClick RSA SecureID Token Server Click Upload scconf.recFTP Server Login Password Directory External User Databases Configuration page opensPurging the RSA Node Secret File FieldConfiguring RSA SecurID Token and Ldap Group Mapping Click Configure LdapClick Purge Node Secret Click RSA SecurID Token and Ldap Group MappingRSA SecurID Token and Ldap Group Mapping Configuration Choose Process all usernamesConfiguring New Features in ACS RSA Support on the ACS SE Configuring New Features in ACS RSA Support on the ACS SE Uid=joesmith,ou=members,ou=administrators,o=cisco Turning Ping On and Off New Rdbms Synchronization Features in ACS Release ACS 4.2 provides enhanced support for Rdbms SynchronizationUsing Rdbms Synchronization to Configure dACLs Enable dACLsCreate a Text File to Define the dACLs Check the Rdbms Synchronization check boxCode the information in the file as described in Table Example 4-1shows a sample text fileKeyword Value Sample accountActions CSV File Example 4-2shows a sample accountActions CSV fileAction Code Name Required Description Configure Rdbms Synchronization to Use a Local CSV FileClick Rdbms Synchronization Rdbms Synchronization Setup Page ACS for Windows Configuration Guide for Cisco Secure ACS OL-14390-02 Perform Rdbms Synchronization Running Rdbms Synchronization from the ACS GUIRunning CSDBSync Manually to Create the dACLs ACS for WindowsPerforming Rdbm Synchronization Using a Script View the dACLsEntry for the Sample dACL Explanation Error MessagesNAF User has write access to the ACS On the ACS is configured correctlyEnabled correctly in the ACS GUI Reading, Updating, and Deleting dACLsUpdatedacl ReaddaclDaclreplace DeletedaclUpdateuserdacl UNGN, VN Deleteuserdacl UngnCreating, Reading, Updating and Deleting AAA clients UpdatenasReadnas OL-14390-02 Password Policy Configuration Scenario Add and Edit a New Administrator Account Administration Control Configure Password Policy Server 4.2, Administrators and Administrative PolicyTo specify password restrictions Privileges that you want to grantAdministrator Password Policy Setup Specify Password Validation Options Specify Password Lifetime OptionsPassword Lifetime Options Password Inactivity OptionsConfigure Session Policy Specify Password Inactivity OptionsSpecify Incorrect Password Attempt Options Incorrect Password Attempt Options section, configureSession Policy Setup Configure Access Policy Click Access PolicyAccess Policy Setup page appears, as shown in Figure Before You BeginAccess Policy Setup Click the appropriate IP Address Filtering optionIP Address Ranges table contains ten rows for configuring IP address ranges. The ranges are always inclusive that is,Range includes the Start and End IP addresses Must differ only in the last octet Class C formatViewing Administrator Entitlement Reports Configuration ACS Certificate Setup to accessInstallation process. With SSL enabled, ACS begins using Displays an errorView Privilege Reports Click Entitlement ReportsOL-14390-02 Agentless Host Support Configuration Scenario Overview of Agentless Host SupportUsing Audit Servers and Game Group Feedback 1shows the flow of MAB informationConfigure a Radius AAA client See Configure a Radius AAA Client, page 6-5for detailsBasic Configuration Steps for Agentless Host Support Install ACSConfigure a Radius AAA Client Install and Set Up an ACS Security Certificate Click Submit + ApplyObtain Certificates and Copy Them to the ACS Host Go to selecteddrive\CertsEnable Security Certificates on the ACS Installation Select Install CertificateClick ACS Certificate Setup Click Install ACS Certificate Click SubmitTo install the CA Certificate Install the CA CertificateAdd a Trusted Certificate Configure an External Ldap Database for MAB Support Configure Ldap Support for MABCreate one or more Ldap database configurations in ACS Description of the Settings in the Sample Ldap Schema 802.1x device n 802.1x device n+1How the Subtrees Work How the Ldap User Groups Work1describes the attributes of the sample Ldap groups Create One or More Ldap Database Configurations in ACSClick Generic Ldap Specify the common Ldap configuration 6shows the Common Ldap Configuration sectionOL-14390-02 Ldap Server Configuration Sections ACS SE OnlyConfigure User Groups for MAB Segments Create a New NAP Enable Agentless Request ProcessingClick Add Profile Profile Setup page opens, shown in Figure Profile SetupYou are now ready to enable agentless request processing Enable Agentless Request Processing for a NAPCheck the check box for Allow Agentless Request Processing Configure MAB You are now ready to configure MAB settingsClick Internal ACS DB 13 MAC Address Input AreaConfigure Logging and Reports Configuring Reports for MAB ProcessingConfiguration Steps for Audit Server Support Configure Game Group FeedbackConfigure Security Certificates To configure PEAP-TLS Configure security certificatesConfigure global authentication settings Specify EAP-TLS optionsObtain Certificates and Copy Them to the ACS Host Enable Security Certificates on the ACS Installation Install the CA Certificate Add a Trusted CertificateClick Global Authentication Setup Configure Global Authentication SettingsGlobal Authentication Setup page opens, as shown in Figure Specify EAP-TLS Options Optional Configure Authentication PolicyEAPMSCHAP2 EAP-GTC Configuring Syslog Logging OverviewClick Logging Logging page opens, shown in FigureLogging Configuration Enable Logging Format of Syslog Messages in ACS Reports Facility CodesMessage Length Restrictions OL-14390-02 NAC Configuration Scenario Install ACSPerform Network Configuration Tasks This section describesAdd AAA Client Configure the AAA Server Click Submit and Apply Set Up System ConfigurationThis section describes the following tasks Click ACS Certificate Setup Set Up the ACS Certification AuthorityClick ACS Certification Authority Setup Choose ACS Certificate Setup Edit Certificate Trust List Edit the Certificate Trust ListSet Up Global Configuration Install the ACS CertificateInstall ACS Certificate page opens, as shown in Figure Click the Read certificate from file radio buttonSet Up Global Authentication Global Authentication Setup Page appears, as shown in FigureGlobal Authentication Setup Allow EAP-MSCHAPv2 Allow EAP-GTCAllow Posture Validation Click Submit + RestartClick EAP-FAST Configuration Set Up EAP-FAST ConfigurationEAP Fast Configuration page appears, as shown in Figure -8, this is ACS NAC Server. However, this can be any string Check the Allow EAP-FASTcheck boxProvisioning check boxes Configure Logs and Reports Configure the Logging LevelClick Service Control Check the Log to CSV Passed Authentications Report check box Check the Log to CSV Radius Accounting Report check box Set Up Administration Control Add Remote Administrator AccessClick Add Administrator Add Administrator page opens, as shown in Figure10 Add Administrator Click Grant All Configure Network Access Filtering Optional Set Up Shared Profile ComponentsClick Network Access Filtering Configure Downloadable IP ACLs 11 Edit Network Access FilteringAdding an ACL To add a new ACLChoose Shared Profile Components Downloadable IP ACLs List of dACLs appears, as shown in FigureAdding an ACE 13 Downloadable IP ACLs14 Downloadable IP ACL Content Saving the dACL Configure Radius Authorization ComponentsNew ACL appears on the list of downloadable ACLs Click Radius Authorization Components 16 Radius Authorization Components17 RAC Attribute Add/Edit 18 Attribute Selection for the CiscoFullAccess RAC 19 Attribute Selection for the CiscoRestricted RAC Number Attribute Name Description AttributeACL Configure an External Posture Validation Audit Server Add the Posture Attribute to the ACS DictionaryConfigure the External Posture Validation Audit Server Click Add Server20 External Posture Validation Audit Server Setup 21 Use These Audit Servers Section Configure Posture Validation for NAC Configure Internal Posture Validation PoliciesClick Internal Posture Validation Setup Click Add RuleClick Add Condition Set Add/Edit Condition page appears, as shown in FigureConfigure External Posture Validation Policies 26 Edit External Posture Validation Servers27 Add/Edit External Posture Validation Server Configure an External Posture Validation Audit Server 28 External Posture Validation Audit Server Setup 29 Use These Audit Servers Section Authorization Policy and NAC Audit 30 Audit Flow Settings and Game Group Feedback SectionsSet Up Templates to Create NAPs Sample NAC Profile TemplatesSample NAC Layer 3 Profile Template EAP-FAST GTCProfile Setup 31 Create Profile From Template32 Profile Setup Page for Layer 3 NAC Template EAP Configuration section, Posture Validation is enabled Protocols Policy for the NAC Layer 3 TemplateAuthentication Policy 34 Authentication Page for Layer 3 NAC Profile TemplateSample Posture Validation Rule Sample NAC Layer 2 TemplateFrom the Template drop-down list, choose NAC L2 IP To enable the profile setup Go to Network Access Profiles36 Profile Setup Page for NAC Layer 2 Template Default ACLs ACS and Attribute-Value PairsProtocols Settings 37shows the Protocols settings for the NAC Layer 2 template38 Authentication Settings for NAC Layer 2 Template Sample NAC Layer 2 802.1x Template 39 Sample Posture Validation Policy for NAC Layer 2 Template40 Create Profile From Template 41 Profile Setup Page for NAC Layer 2 802.1x Template 42 Protocols Setting for NAC Layer 802.1x Template Protocols PolicyAuthorization Policy Sample Wireless NAC L2 802.1x Template 45 Create Profile From Template 46 Profile Setup Page for Wireless NAC L2 802.1xTemplate 47 Protocols Setting for Wireless NAC 802.1x Template Authorization Policy Using a Sample Agentless Host Template 50 Create Profile From Template Profile Setup 52 Protocols Setting for Agentless Host for Layer 3 Template Choose Network Access Profiles Map Posture Validation Components to ProfilesChoose the relevant profile Posture Validation policy Enter a Name for the ruleClick Back to return to the Posture Validation policy Click Apply + RestartCheck the Do not reject when Audit failed check box Map an Audit Server to a ProfileCheck the Allow Agentless Request Processing check box Click Select AuditConfigure an external audit server Optional Configure Game Group FeedbackClick Apply and Restart Import a Device-Type Attribute File by Using CSUtil Import an Audit Vendor File by Using CSUtilImport NAC Attribute-Value Pairs Configure Database Support for Agentless Host Processing Enable Posture ValidationConfigure an External Audit Server Restart ACS Navigation bar, click System Configuration\ACSInstallDir\bin\CSUtil -addAVP filename 56 External Posture Validation Audit Server Setup 57 Use These Audit Servers Section 58 Audit Flow Settings and Game Group Feedback Sections Enable Game Group Feedback ACS Solution EngineMac Integrated Device UnixPDA Being authenticated Authentication agent installed, such as Cisco Trust AgentResource usage Posture-validation serverAuthenticate the device, instead of using an IP address GL-2GL-3 Microsoft, and RSA Security submitted to the Ietf Network accessRadius Attribute Component Adduser Updatenas UpdateuserdaclACE Configuring audit flow settings for 9-35,9-43,9-78 Audit servers ConfiguringCA certificate Installing Createuserdacl DeleteuserdaclNAP Configuring new features in ACS 4.2 ACS configuration forSpecifying Certificate Binary Comparison for Layer 2 NAC 802.1x templateNetbios NACNAC/NAP NAC L2 IPReliability Readdacl ReadnasReading dACLs Regional Wlan Related documentation RSAUsing Windows Certificate Import Wizard Installing the CA certificatePurging Node Secret file purging Sarbanes-Oxley Security policies Security protocolsSignificance Windows Certificate Import Wizard
Related manuals
Manual 94 pages 10.59 Kb Manual 34 pages 46.13 Kb

4.2 specifications

Cisco Systems, a global leader in IT and networking solutions, has consistently evolved to meet the demands of modern enterprises. One of its noteworthy offerings is Cisco Systems 4.2, a version that embodies a significant leap in networking technology and capability. With its rich set of features, Cisco Systems 4.2 caters to a wide range of industries, facilitating enhanced performance and security.

One of the main features of Cisco Systems 4.2 is its improved scalability. The architecture has been designed to support an ever-increasing number of devices and users, making it ideal for growing enterprises. The enhanced scalability allows organizations to expand their network capacities without compromising performance, ensuring seamless integration of new technologies and devices.

Another critical aspect of Cisco Systems 4.2 is its advanced security protocols. With cyber threats constantly evolving, Cisco prioritizes security in this version by offering robust features such as end-to-end encryption, improved firewall capabilities, and enhanced intrusion detection systems. These security enhancements provide organizations with peace of mind, knowing that their sensitive data and networks are well-protected from unauthorized access and potential threats.

Cisco Systems 4.2 also introduces intelligent automation features, which significantly streamline network management. Through the use of artificial intelligence and machine learning, Cisco enables organizations to automate routine tasks, reduce human error, and optimize performance. This automation not only enhances efficiency but also allows IT teams to focus on strategic initiatives rather than day-to-day maintenance.

Moreover, Cisco Systems 4.2 emphasizes infrastructure flexibility. The new architecture supports various deployment models, including on-premises, cloud, and hybrid environments. This flexibility enables organizations to adapt their networking strategies according to their specific needs and operational requirements, facilitating a more tailored approach to IT infrastructure.

Collaboration tools have also been enhanced in this version. Cisco Systems 4.2 integrates advanced communication solutions that empower teams to collaborate in real time, regardless of their geographical location. Features such as high-definition video conferencing, secure messaging, and file sharing enhance productivity and foster innovation across teams.

In summary, Cisco Systems 4.2 stands out as a forward-thinking networking solution with key features such as scalability, advanced security, intelligent automation, flexible infrastructure, and enhanced collaboration tools. These characteristics position Cisco Systems 4.2 as an invaluable asset for enterprises striving for digital transformation in an increasingly interconnected world. The ongoing innovation reflects Cisco's commitment to delivering cutting-edge technology solutions that drive business success and resilience.