Contents

 

 

Agentless Network Access

4-12

 

 

 

 

 

 

 

 

 

 

 

Overview of Agentless Network Access

4-12

 

 

 

 

 

 

 

Host Lookup

4-13

 

 

 

 

 

 

 

 

 

 

 

 

 

Authentication with Call Check

 

4-14

 

 

 

 

 

 

 

 

 

Process Service-Type Call Check

4-15

 

 

 

 

 

 

 

PAP/EAP-MD5 Authentication

4-15

 

 

 

 

 

 

 

 

 

Agentless Network Access Flow

 

4-16

 

 

 

 

 

 

 

 

Adding a Host to an Internal Identity Store

4-17

 

 

 

 

 

 

Configuring an LDAP External Identity Store for Host Lookup

4-17

 

 

 

 

 

Configuring an Identity Group for Host Lookup Network Access Requests 4-18

 

 

Creating an Access Service for Host Lookup

4-18

 

 

 

 

 

 

Configuring an Identity Policy for Host Lookup Requests

4-19

 

 

 

 

 

Configuring an Authorization Policy for Host Lookup Requests 4-20

 

 

VPN Remote Network Access

4-20

 

 

 

 

 

 

 

 

 

 

 

Supported Authentication Protocols

4-21

 

 

 

 

 

 

 

 

Supported Identity Stores

4-21

 

 

 

 

 

 

 

 

 

 

 

Supported VPN Network Access Servers

4-22

 

 

 

 

 

 

Supported VPN Clients

4-22

 

 

 

 

 

 

 

 

 

 

 

Configuring VPN Remote Access Service

4-22

 

 

 

 

 

 

ACS and Cisco Security Group Access

4-23

 

 

 

 

 

 

 

 

Adding Devices for Security Group Access

4-24

 

 

 

 

 

 

Creating Security Groups

4-24

 

 

 

 

 

 

 

 

 

 

 

Creating SGACLs 4-25

 

 

 

 

 

 

 

 

 

 

 

 

Configuring an NDAC Policy

4-25

 

 

 

 

 

 

 

 

 

Configuring EAP-FAST Settings for Security Group Access

4-26

 

 

 

 

 

Creating an Access Service for Security Group Access 4-26

 

 

 

 

 

 

Creating an Endpoint Admission Control Policy

4-27

 

 

 

 

 

 

Creating an Egress Policy

4-27

 

 

 

 

 

 

 

 

 

 

 

Creating a Default Policy

4-28

 

 

 

 

 

 

 

 

 

 

 

RADIUS and TACACS+ Proxy Requests

4-29

 

 

 

 

 

 

 

 

Supported Protocols

4-30

 

 

 

 

 

 

 

 

 

 

 

 

Supported RADIUS Attributes

4-31

 

 

 

 

 

 

 

 

 

TACACS+ Body Encryption

4-31

 

 

 

 

 

 

 

 

 

 

Connection to TACACS+ Server

 

4-31

 

 

 

 

 

 

 

 

 

Configuring Proxy Service

4-32

 

 

 

 

 

 

 

 

 

 

Understanding My Workspace

 

 

 

 

 

 

 

 

 

 

C H A P T E R 5

5-1

 

 

 

 

 

 

 

 

 

 

 

Welcome Page

5-1

 

 

 

 

 

 

 

 

 

 

 

 

 

Task Guides 5-2

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

User Guide for Cisco Secure Access Control System 5.3

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

OL-24201-01

 

 

 

 

 

 

 

 

 

 

 

v

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Page 5
Image 5
Cisco Systems OL-24201-01 manual Configuring an Authorization Policy for Host Lookup Requests