Kompetenčné centrum. Martin Jenčo martin.jenco@alefnula.sk V 1.0



Similar documents
Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

Security. AAA Identity Management. Premdeep Banga, CCIE # Cisco Press. Vivek Santuka, CCIE # Brandon J. Carroll, CCIE #23837

Securing Networks with PIX and ASA

On-boarding and Provisioning with Cisco Identity Services Engine

Cisco Secure Control Access System 5.8

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example

ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series

Cisco Secure Access Control Server 4.2 for Windows

Cisco Secure Access Control System 5.5

Management, Logging and Troubleshooting

Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller

How To Use Cisco Identity Based Networking Services (Ibns)

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists

Installing and Using the vnios Trial

Savvius Insight Initial Configuration

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

TrustSec How-To Guide: On-boarding and Provisioning

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Cisco TrustSec How-To Guide: Guest Services

Virtual Managment Appliance Setup Guide

Using LiveAction with Cisco Secure ACS (TACACS+ Server)

Virtual Web Appliance Setup Guide

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

WatchGuard Training. Introduction to WatchGuard Dimension

SOA Software API Gateway Appliance 7.1.x Administration Guide

PZVM1 Administration Guide. V1.1 February 2014 Alain Ganuchaud. Page 1/27

Common Services Platform Collector 2.5 Quick Start Guide

About the VM-Series Firewall

Barracuda SSL VPN Administrator s Guide

Guideline for setting up a functional VPN

NETASQ SSO Agent Installation and deployment

ACE Management Server Deployment Guide VMware ACE 2.0

Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide

Setting Up Scan to SMB on TaskALFA series MFP s.

vshield Administration Guide

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Websense Support Webinar: Questions and Answers

Bluesocket virtual Wireless Local Area Network (vwlan) FAQ

Configuring Sponsor Authentication

BorderWare Firewall Server 7.1. Release Notes

Freshservice Discovery Probe User Guide

Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Securing Cisco Network Devices (SND)

Install Guide for JunosV Wireless LAN Controller

VMware Identity Manager Connector Installation and Configuration

pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be.

NMS300 Network Management System

Aerohive Networks Inc. Free Bonjour Gateway FAQ

Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

DIGIPASS Authentication for Cisco ASA 5500 Series

PHD Virtual Backup for Hyper-V

How to Configure Web Authentication on a ProCurve Switch

Configure ISE Version 1.4 Posture with Microsoft WSUS

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Cisco ISE Command-Line Interface

Cisco Application Networking Manager Version 2.0

Installing the Operating System or Hypervisor

Brocade Certified Layer 4-7 Professional Version: Demo. Page <<1/8>>

Scenario: Remote-Access VPN Configuration

VMware vcenter Log Insight Getting Started Guide

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.

Rebasoft Auditor Quick Start Guide

OnCommand Performance Manager 1.1

How to Configure an Initial Installation of the VMware ESXi Hypervisor

ClearPass Policy Manager 6.1

Deployment Guide A10 Networks/Infoblox Joint DNS64 and NAT64 Solution

Scenario: IPsec Remote-Access VPN Configuration

GRAVITYZONE HERE. Deployment Guide VLE Environment

SevOne NMS Download Installation and Implementation Guide

Test Case 3 Active Directory Integration

iboss Enterprise Deployment Guide iboss Web Filters

Virtual Appliance Setup Guide

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

Online Help StruxureWare Data Center Expert

Policy Management: The Avenda Approach To An Essential Network Service

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Cisco Trust and Identity Management Solutions

Barracuda Link Balancer Administrator s Guide

Firewall VPN Router. Quick Installation Guide M73-APO09-380

F-Secure Internet Gatekeeper Virtual Appliance

Installing, Uninstalling, and Upgrading Service Monitor

VMware vshield Zones R E V I E W E R S G U I D E

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

P160S SIP Phone Quick User Guide

LifeSize Video Communications Systems Administrator Guide

Advanced Configuration Steps

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Troubleshooting the Firewall Services Module

System Maintenance and Troubleshooting

F-Secure Messaging Security Gateway. Deployment Guide

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Ports Reference Guide for Cisco Virtualization Experience Media Engine for SUSE Linux Release 9.0

Ruckus Wireless ZoneDirector Command Line Interface

Transcription:

Kompetenčné centrum Martin Jenčo martin.jenco@alefnula.sk V 1.0

Cisco Secure ACS v5.1

Table of Contents Identity ACS v5.1 overview ACS v5.1 feature Rule-based policy model Demo Management Monitoring and Reporting Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 3

Table of Contents Integration with Windows AD and LDAP Runtime system, HA Migration Not supported Licensing Platform option More Information Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 4

Table of Contents Identity Tacacs, Radius ACS overview ACS v5.1 overview ACS v5.1 feature Rule-based policy model Demo Management Monitoring and Reporting Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 5

Identity Identity management Local management (single device) Central user management (corporate network) (Cisco ACS, MS AD, LDAP) Internet Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 6

Identity AAA Authentication (Who you are) Authorization (What you can do) Accounting (What you did) Internet FTP Web RADIUS TACACS+ Corporate DMZ AUTHIN 10.0.1.2 AUTHOUT 10.0.1.3 Headquarters Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 7

Tacacs and Radius, compare RADIUS 1. RFC 2865, old 2138 2. UDP 1812/1813, old UDP 1645/1646 3. Client/Server model 4. Encrypts only the password TACACS+ 1. Cisco proprietary protocol 2. TCP 49 3. Client/Server model 4. Encrypts the entire body of the packet 5. Multiprotocol support (Apple Talk, NetBIOS, X.25, ) 6. Two methods of commands authorization (per command, privilege level) Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 8

Tacacs and Radius, utilize Tacacs admin connections to the box (administrative access) Radius user connections to the company (user access) Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 9

ACS overview ACS is the point in the network that establishes identity integration point for network access control and identity management ACS provide: Standard AAA (Authentication, Authorization, Accounting) RADIUS services for managing user access TACACS+ functionality for managing administrative access to network devices Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 10

Table of Contents Identity ACS v5.1 overview ACS v5.1 feature Rule-based policy model Demo Management Monitoring and Reporting Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 11

ACS v5.1 overview Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 12

ACS v5.1 overview Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 13

Table of Contents Identity ACS v5.1 overview ACS v5.1 feature Architecture Rule-based policy model Demo Management Monitoring and Reporting Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 14

ACS 5.1 Feature Highlights Rules-based policy model Improved management interfaces Integrated monitoring, reporting and troubleshooting capabilities Improved integration with Windows AD and LDAP Revised high-performance runtime system New platform architecture, distributed deployment Support for the Cisco identity solution features and Cisco TrustSec solutions Shell Access Control Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 15

Architecture of ACS Key architecture 1. Includes both RADIUS & TACACS+ for complete N/W control and operation flexibility 2. Multiple identity interfaces allows flexible integration to multiple DB and ID resources 3. Replication mechanism allows deployment of multiple instances increasing availability and robustness 4. Administration of large scale deployments Device Protocols ACS Management ACS Runtime Reporting & Troubleshooting Policy & Inventory Accounting & logging Identity interfaces Posture & audit protocols 5. Industry leading reporting, troubleshooting & compliance tools Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 16

Table of Contents Identity ACS v5.1 overview ACS v5.1 feature Rule-based policy model Compare with Group-based Authorization policy Identity policy Access services Demo Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 17

Rule-based policy model Allow much grater flexibility in addressing policy needs Attribute-driven approach enables dynamic, context based policy Granular policy building blocks Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 18

Group-based policy model (ACS 4.x) Group based model works well if identity is the main condition for granting access Not suitable when you wish to authorize access based on more complex conditions Problem if one user is in different circumstances (location, connection profile, time, ) Permission = static Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 19

Rule-based/group-based model Group-based policy 1. Limited flexibility 2. Harder to manage evolving policy needs 3. Main condition for access = identity Rule-based policy 1. Attribute-driven approach enables dynamic, context based policy 2. Compose-able policy, Granular policy building blocks 3. Policies that reflect the real world 4. Better flexibility Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 20

Today needs Security Camera G/W Agentless asset MAC: F5 AB 8B 65 00 D4 Vicky Sanchez Employee Marketing Wireline 3pm Rossi Barks Employee HR Wireline 11am Laptop Managed asset Main Laboratory 11am Sergei Balazov Contractor IT Wireline 10am Susan Kowalski Employee CEO Remote Access 10pm Bill Graves Employee R&D Wireless 2pm Francois Didier Consultant HQ - Strategy Remote Access 6pm IP Phone G/W Managed asset Finance dept. 12:00pm Printer Agentless asset MAC: B2 CF 81 A4 02 D7 Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 21

Rule-based policy model Static access is not enough (Who they are) Identity is too dynamic Variable dynamic circumstances: Where (location) When (time, date) How (wired, wireless, remote) Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 22

ACS 5: Rule-based policy Identity Information Group: Network Administrator Other Conditions Time & Date Auth. Profiles Engineering Human Resources Group: Full-time Employee + Posture Location Login VLAN Guest Group: Guest Access Type Quarantine Deny Access Authorization based on identity plus context Conditions are specified as policy rules - IF <conditions> THEN <permission> Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 23

Group-based policies Authorization User Groups Based on your User Group Only condition = identity Everyone in group = same restrictions Everyone in group = same permissions NetAdmin Group Permissions Full Access Restrictions None Employee Group Permissions Employee_VLAN Restrictions None Guest Group Permissions Guest_VLAN Restrictions Time_od_Day Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 24

Rule-based policies Identity Attributes Separate identity Separate the permission Group is now simply an identity classification No longer contains any access permissions NetAdmin Group Permissions Full Access Restrictions None Employee Group Permissions Employee_VLAN Restrictions None Guest Group Permissions Guest_VLAN Restrictions Time/Date Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 25

Rule-based policies Identity Attributes Session Attributes Environment Permissions NetAdmin Group Employee Group Guest Group Location Access Type Wireless Wired VPN End Station Health Time Date Usage/Quotas Etc. Full Access Read-only Access Employee_VLAN Guest_VLAN Voice_VLAN Downloadable ACL QoS Settings Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 26

Rule-based policies IF <conditions> THEN <Apply resulting permissions> NetAdmin Group Employee Group Guest Group Location Access Type Wireless Wired VPN End Station Health Time Date Usage/Quotas Etc. Full Access Read-only Access Employee_VLAN Guest_VLAN Voice_VLAN Downloadable ACL QoS Settings QUARANTINE DENY_ACCESS Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 27

Rule-based policies IF <conditions> THEN <Apply resulting permissions> NetAdmin Group Employee Group Guest Group Location Access Type Wireless Wired VPN End Station Health Time Date Usage/Quotas Etc. AUTHORIZATION PROFILE RTP campus SJ_Campus Quarantine Deny Access Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 28

Rule-based policies - Example Employee Group With Rule-Based Policies The same class of users ( Employee ) can get different authorization depending on non-identity conditions (e.g. posture or location) CONDITIONS RESULT ID GROUP POSTURE LOCATION Authorization PROFILE Employee Compliant RTP RTP_Campus Employee Compliant San_Jose SJ_Campus Employee Non-Compliant QUARANTINE IF NO MATCH DENY_ACCESS Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 29

Rule-based policies - Example Employee Group With Rule-Based Policies The same class of users ( Employee ) can get different authorization depending on non-identity conditions (e.g. posture or location) CONDITIONS RESULT ID GROUP POSTURE LOCATION Authorization PROFILE Rule Employee Employee Compliant Compliant RTP San_Jose RTP_Campus SJ_Campus Employee Non-Compliant QUARANTINE IF NO MATCH DENY_ACCESS Rule IF (ID_Group = Employee) and (Posture = Compliant) and (Location = San_Jose) THEN Apply SJ_Campus Authorization Profile Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 30

Rule-based policies Authorization Policy Employee Group Authorization Policy is a set of rules to select the Authorization Profile based on various conditions Authorization Policy CONDITIONS RESULT ID GROUP POSTURE LOCATION Authorization PROFILE Rule Employee Employee Compliant Compliant RTP San_Jose RTP_Campus SJ_Campus Policy Employee IF NO MATCH Non-Compliant QUARANTINE DENY_ACCESS Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 31

Rule-based policies Identity Policy Network Access / Device Admin Who are you?.. Username / Password What else do I know about you? Location of access point Access Method (VPN, Wireless) ACS Identity Classification Username password Identity Stores Authentication & Identity Attributes X509 Cert Identity Policy Authentication Method Identity Store X509 Certificate Certificate Profile MSCHAPv2 CORP_AD If no match Deny Access Internal ACS External Stores: Active Directory LDAP X509 Certificate Identity Policy is a set of rules to select the Identity Store based on various conditions Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 32

Rule-based policies Access Services Network Access POLICY: Set of RULES Identity Policy Authentication Method X509 Certificate MSCHAPv2 If no match Identity Store Certificate Profile CORP_AD Deny Access CONDITIONS RESULT Auth. Policy ID GROUP Employee Employee POSTURE Compliant Compliant LOCATIO N RTP San_Jose Authorization PROFILE RTP_Campus SJ_Campus Employee Non-Compliant QUARANTINE IF NO MATCH DENY_ACCESS ACS v5 SYSTEM Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 33

Rule-based policies Access Services Network Access / Device Admin Who are you?.. What else do I know about you? RADIUS Access request / TACACAS+ NAD Info, Attributes, Protocols, Date/Time, Credentials ACCESS SERVICE: Set of POLICIES RADIUS Access Service Selection Policy TACACS Identity Policy POLICY: Set of RULES Authentication Method Identity Store X509 Certificate Certificate Profile MSCHAPv2 CORP_AD If no match Deny Access Access Service A Identity Policy A Auth. Policy A Access Service B Identity Policy B Auth. Policy B Access Service C Identity Policy C Group Mapping C Ext. Policy C Auth. Policy C CONDITIONS RESULT Auth. Policy ID GROUP Employee Employee POSTURE Compliant Compliant LOCATIO N RTP San_Jose Authorization PROFILE RTP_Campus SJ_Campus ACS v5 SYSTEM Employee Non-Compliant QUARANTINE IF NO MATCH DENY_ACCESS RESPONSE Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 36

Table of Contents Identity ACS v5.1 overview ACS v5.1 feature Rule-based policy model Demo Management Monitoring and Reporting Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 37

Table of Contents Identity ACS v5.1 overview ACS v5.1 feature Rule-based policy model Demo Management Quick start Monitoring and Reporting Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 39

Improved management interfaces Completely rewritten GUI One click view Quick start Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 40

Improved management interfaces Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 41

Improved management interfaces Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 42

Improved management interfaces Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 43

Quick start Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 44

Table of Contents Identity ACS v5.1 overview ACS v5.1 feature Rule-based policy model Demo Management Monitoring and Reporting Alarms Troubleshooting tools Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 45

Integrated monitoring, reporting and troubleshooting capabilities Centralized Predefined reports Customized reports Proactive system and performance monitoring Treshold based alarm generation Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 46

ACS 4.2 Reports and Activity Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 47

ACS 5.1 Monitoring & reports Component Integrated advanced monitoring, reporting & troubleshooting capabilities for maximum control and visibility Easy to use GUI Flexible presentation tools Consolidation of data across an ACS deployment Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 48

ACS 5.1 Monitoring & Reports Benefits Global control and view of access Monitor Cisco Secure ACS health and operations from a single point Visibility into network access patterns and traffic End-to-end troubleshooting Proactively detect and troubleshoot network access issues Compliance Audit ACS administration Audit device administration activities Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 49

Monitoring and Reports Highlights Basic License Features Dashboard Real-time display of system and AAA health metrics Reports Pre-defined & custom reports Favorite reports Troubleshooting Reports & tools Standard Log Data Storage (1 month data age-out) Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 50

Monitoring and Reports Highlights Advanced Monitoring & Reporting License Features Alarms Define conditions and thresholds to generate alarms Display of alarms in Monitoring Dashboard Session Directory Directory of all sessions, showing key data (username, MAC address, IP address, session identifier, NAD, port, policy decision, posture, etc). AAA Accounting start/stop for session start/stop Troubleshooting Tools Connectivity tests (ping/nslookup/traceroute) on any device Extended Log Data Storage (up to 1 year data age-out) Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 51

ACS 5.1: Reports Authentication AAA Authentication summary, failed authentication summary, MAC authentication reports, access service authentication reports RADIUS/TACACS+ authentication and accounting,tacacs+ authorization Health/Operations Status Diagnostics, health summary ACS Administration Administrator logins, configuration changes Command Audit Command audit by user/device, command authorization by user/device Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 52

Authentication Report Snapshot Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 53

ACS 5: Session Directory Report Reports details of RADIUS & TACACS sessions (Active, History and Lookup) Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 54

ACS 5.1: Alarm Types Authentication activity alarms Passed or failed authentications over a period of time Inactivity over a period of time Audit alarms Command accounting, command authorization (TACACS+) ACS configuration commands Health alarms ACS system process, metrics AAA throughput RADIUS traffic volume Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 55

ACS 5.1 Alarms Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 56

ACS 5.1: Troubleshooting Tools Authentication Query Displays used MAC addresses for any particular user and passed/failed authentication activity Authentication Failure Code Customization Administrator can customize ACS failure code root cause and resolution information Connectivity to ACS To test connectivity and download package.cab file from server Connectivity test ping / nslookup / traceroute commands Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 57

ACS 5.1: Troubleshooting Tools Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 58

ACS 5.1: Troubleshooting Tools Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 59

ACS 5.1: Troubleshooting Tools Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 60

ACS 5.1: Troubleshooting Tools Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 61

Contents Integration with Windows AD and LDAP Runtime system, HA Migration Not supported Licensing Platform option More Information Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 62

Improved integration with Windows AD and LDAP Ease to use AD group selection Directory attributes Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 63

Improved integration with Windows AD and LDAP Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 64

Improved integration with Windows AD and LDAP Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 65

Contents Integration with Windows AD and LDAP Runtime system, HA Distributed deployment Incremental replication Shell access Migration Not supported Licensing Platform option Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 66

Revised high-performance runtime system Linux based Optimized system Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 67

Revised high-performance runtime system Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 68

New platform architecture, distributed deployment HW or SW based High availability Primary/Secondary instance Full/Incremental replication Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 69

New platform architecture, distributed deployment Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 70

Incremental Replication ACS 4.X send complete copy to the secondary instance ACS 5.1: Any configuration changes are immediately replicated to the secondary instance INCREMENTAL, only the configuration changes made since the last replication are propagated to the secondary instance Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 71

Support for the Cisco identity solution features Cisco identity solutions Cisco TrustSec require that all network devices have an established identity, and must be authenticated and authorized before they start operating in the network Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 72

Shell access control Acces to console Config as router or switch Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 73

Contents Integration with Windows AD and LDAP Runtime system, HA Migration Not supported Licensing Platform option More Information Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 74

Migration and Upgrades ACS 5.1 includes a migration tool to assist in migrating existing ACS data The new ACS 5.0 policy model may require that some policies be reconfigured Customers not ready for migration to ACS 5.1 can run ACS 4.2 on the new 1120 appliance Purchase 5.1 on 1120 Contact ACS Product Marketing to get electronic access to ACS 4.2 software A sales order number will be required 4.2 on 1120 image is available since 2009 Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 75

Migration and Upgrades Migration from Cisco Secure ACS release 4.x to ACS 5.1 with Migration Utility Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 76

Migration and Upgrades Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 77

Contents Integration with Windows AD and LDAP Runtime system, HA Migration Not supported Licensing Platform option More Information Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 78

Not supported TACACS+ Proxy Terminal server access control Application access control for CiscoWorks CSUtil features Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 79

Contents Integration with Windows AD and LDAP Runtime system, HA Migration Not supported Licensing Base Add-On Other features Platform option Next releases Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 81

Licensing Base license (up to 500 managed devices) Add-on licenses Advanced Monitoring and Reporting license TrustSec Access Control License Large Deployment License Evaluation license Not-For-Resale license Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 82

Licensing Base licenses and add-on licenses Provided as Product Activation Keys (PAK) Must be registered on Cisco.com to obtain license file www.cisco.com/go/license Customer evaluation (90-day) ACS 5.0 evaluation software is available at: http://www.cisco.com/cgi-bin/tablebuild.pl/acs5-eval Certified/Specialized Partner NFR Program http://www.cisco.com/web/partners/sell/smb/programs_ and_promotions/index.html Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 83

Licensing Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 84

Base License Features Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 85

Advanced License Features Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 86

Other ACS 5.1 Features Enhanced external DB and policy server integration Reference external (AD, LDAP) policy information directly in access policy rules Use attributes in conditions or authorization results Retrieve real-time data from external policy servers Large-scale, distributed deployment model One primary and multiple secondary servers Incremental configuration replication Centralized software updates Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 87

Should I use ACS 5.1 or 4.2? ACS 5.1 supports many access scenarios, but not all ACS 4.2 features Additional ACS 5.x releases are planned for 2011 Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 88

Contents Migration Not supported Licensing Platform option Hardware VmWare Installation Status Config More Information Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 89

ACS 5.1 Platform Options Linux Appliance One rack-unit (1RU) securityhardened, Linux-based appliance VMWare version Software application and Linux operating system image for installation on VMware ESX 3.5/Server 2.0 Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 90

ACS 5.1 VMWare system requirements 1 CPU or more 2 GB RAM or greater Exactly 60 GB HDD 1 Network Interface Card 1 CD/DVD drive Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 91

ACS 5.1 VMWare system requirements Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 92

Instalation Input data for Instalation: localhost login: setup Enter hostname[]: acs-server-1 Enter IP address[]: 209.165.200.225 Enter IP default netmask[]: 255.255.255.0 Enter IP default gateway[]: 209.165.200.1 Enter default DNS domain[]: mycompany.com Enter Primary nameserver[]: 209.165.200.254 Add/Edit another nameserver? Y/N : n Enter username [admin]: admin Enter password: Enter password again: Pinging the primary nameserver... Do not use `Ctrl-C' from this point on... Appliance is configured Installing applications... Installing acs... Generating configuration... Rebooting... Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 93

Status check acs51/admin# sh application status acs ACS role: PRIMARY Process 'database' running Process 'management' running Process 'runtime' running Process 'adclient' running Process 'view-database' running Process 'view-jobmanager' running Process 'view-alertmanager' running Process 'view-collector' running Process 'view-logprocessor' running acs51/admin# Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 94

Status check Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 95

Config acs51/admin# sh run Generating configuration...! hostname acs51! ip domain-name alef0.sk! interface GigabitEthernet 0 ip address 172.17.35.31 255.255.255.0! ip name-server 172.16.30.2 10.2.2.10! ip default-gateway 172.17.35.1! clock timezone Europe/Bratislava! ntp server 172.16.35.10! username admin password hash $1$.cHgc4XL$6D/77Us9Bf0zBCVuQUiE91 role admin! service sshd! repository FTP1 url ftp://172.17.35.10/backup/ user cisco password hash 4d44fce7075d615df49497a39a35c2e87f591615 repository TFTP1 url tftp://172.17.35.20! password-policy lower-case-required upper-case-required digit-required no-username disable-cisco-passwords min-password-length 6! logging localhost logging loglevel 6! cdp timer 60 cdp holdtime 180 cdp run GigabitEthernet 0! icmp echo on! acs51/admin# Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 96

Contents Integration with Windows AD and LDAP Runtime system, HA Migration Not supported Licensing Platform option More Information Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 99

More Information ACS 5.1 home page http://www.cisco.com/go/acs ACS Resource Center (Internal Wiki) http://zed.cisco.com/confluence/display/acsrc/acs+resource+center ACS 5.1 documentation http://cisco.com/en/us/products/ps9911/tsd_products_support_seri es_home.html ACS 4.2 and 5.1 comparison http://cisco.com/en/us/docs/net_mgmt/cisco_secure_access_control _system/5.0/user/guide/migrate.html#wp1052549 Contact the ACS marketing team acs-mkt@cisco.com Nazev skoleni a verze Copyright Alef Nula, a.s. www.alef0.cz 100

Ďakujem za pozornosť