7-19
Cisco ASA Series Firewall CLI Configuration Guide
Chapter7 Configuring AAA Rules for Network Access
Configuring Authorization for Network Access
.
ip:inacl#n=ACE-n
ip:inacl#1=permit tcp 10.1.0.0 255.0.0.0 10.0.0.0 255.0.0.0
6. If the ACL required is more than approximately 4 KB in length, Cisco Secure ACS responds with
an access-challenge message that includes a portion of the ACL, formatted as described previously,
and a State attribute (IETF RADIUS attribute 24), which includes control data used by Cisco Secure
ACS to track the progress of the download. Cisco Secure ACS fits as many complete attribute-value
pairs into the cisco-av-pair RADIUS VSA as it can without exceeding the maximum RADIUS
message size.
The ASA stores the portion of the ACL received and responds with another access-request message
that includes the same attributes as the first request for the downloadable ACL, plus a copy of the
State attribute received in the access-challenge message.
This process repeats until Cisco Secure ACS sends the last of the ACL in an access-accept message.
Configuring Cisco Secure ACS for Downloadable ACLs
You can configure downloadable ACLs on Cisco Secure ACS as a shared profile component and then
assign the ACL to a group or to an individual user.
The ACL definition consists of one or more ASA commands that are similar to the extended access-list
command (see command reference), except without the following prefix:
access-list acl_name extended
The following example is a downloadable ACL definition on Cisco Secure ACS version 3.3:
+--------------------------------------------+
| Shared profile Components |
| |
| Downloadable IP ACLs Content |
| |
| Name: acs_ten_acl |
| |
| ACL Definitions |
| |
| permit tcp any host 10.0.0.254 |
| permit udp any host 10.0.0.254 |
| permit icmp any host 10.0.0.254 |
| permit tcp any host 10.0.0.253 |
| permit udp any host 10.0.0.253 |
| permit icmp any host 10.0.0.253 |
| permit tcp any host 10.0.0.252 |
| permit udp any host 10.0.0.252 |
| permit icmp any host 10.0.0.252 |
| permit ip any any |
+--------------------------------------------+
For more information about creating downloadable ACLs and associating them with users, see the user
guide for your version of Cisco Secure ACS.
On the ASA, the downloaded ACL has the following name:
#ACSACL#-ip-acl_name-number
The acl_name argument is the name that is defined on Cisco Secure ACS (acs_ten_acl in the preceding
example), and number is a unique version ID generated by Cisco Secure ACS.