ROLE-BASED COMMAND-LINE INTERFACE ACCESS



Similar documents
Supported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access

Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example

Connecting to the Firewall Services Module and Managing the Configuration

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Enhanced Password Security - Phase I

Configuring Timeout, Retransmission, and Key Values Per RADIUS Server

Enhanced Password Security - Phase I

Flow-Based per Port-Channel Load Balancing

3.1 Connecting to a Router and Basic Configuration

Lab Configure Basic AP Security through IOS CLI

Configuring Access Service Security

Lab Configuring Basic Router Settings with the Cisco IOS CLI

Configuring Role-Based Access Control

APNIC Members Training Course Security workshop. 2-4 July, Port Vila Vanuatu. In conjunction with PACNOG 4

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

- The PIX OS Command-Line Interface -

Cisco ISE Command-Line Interface

Applicazioni Telematiche

Enabling Remote Access to the ACE

A Guide to Understanding SNMP

Backing Up and Restoring Data

CCNA Security. Chapter Two Securing Network Devices Cisco Learning Institute.

USB Disable for Cisco ISRs Feature Module

Encrypted Preshared Key

CISCO IOS NETWORK SECURITY (IINS)

Skills Assessment Student Training Exam

Objectives. Router as a Computer. Router components and their functions. Router components and their functions

HTTP 1.1 Web Server and Client

ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series

Lab Creating a Logical Network Diagram

Encrypted Preshared Key

Lab Load Balancing Across Multiple Paths

Lab 8.3.3b Configuring a Remote Router Using SSH

Lab Configuring PAT with SDM and Static NAT using Cisco IOS Commands

Angelos Stavrou. OF COURSE there is no Magic so lets see show things work in practice...

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example

Lab Configuring DHCP with SDM and the Cisco IOS CLI

Cisco Routers and Switches

One-Step Lockdown with Cisco SDM

Configuring NetFlow Switching

Module 6 Configure Remote Access VPN

Configure ISDN Backup and VPN Connection

Configuring the Content Routing Software

Troubleshooting the Firewall Services Module

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Firewall Authentication Proxy for FTP and Telnet Sessions

Configuring the Firewall Management Interface

Table of Contents. Configuring IP Access Lists

LAB Configuring NAT. Objective. Background/Preparation

Using LiveAction with Cisco Secure ACS (TACACS+ Server)

ICND1 Lab Guide Interconnecting Cisco Networking Devices Part 1 Version 2.0. Labs powered by

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.

Controlling Access to a Virtual Terminal Line

Chapter 1: Planning Maintenance for Complex Networks. TSHOOT v6 Chapter , Cisco Systems, Inc. All rights reserved.

Cisco Router Configuration Tutorial

Network Security 2. Module 6 Configure Remote Access VPN

Configuring a Router

LAN-Cell to Cisco Tunneling

Securing Networks with PIX and ASA

Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5

Lab Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips

How to Configure Web Authentication on a ProCurve Switch

Lab: Basic Router Configuration

Cisco Certified Security Professional (CCSP)

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Configuring a Leased Line

Lab Configure Local AAA on Cisco Router

Device Interface IP Address Subnet Mask Default Gateway

Blue Coat Systems. Reference Guide. WCCP Reference Guide. For SGOS 5.3

Lab Advanced Telnet Operations

Sampled NetFlow. Feature Overview. Benefits

Configuring CSS Remote Access Methods

Triple DES Encryption for IPSec

Troubleshooting the Firewall Services Module

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client

ICND IOS CLI Study Guide (CCENT)

Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Cisco IINS v2.

Lab 5.3.9b Managing Router Configuration Files Using TFTP

Configuring TACACS+, RADIUS, and Kerberos on Cisco Catalyst Switches

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

Lab Configuring Basic Router Settings with the Cisco IOS CLI

Using Two-Factor Authentication Configuration to Combat Cybersecurity Threats

Router Security Audit Logs

Configuring Simple Network Management Protocol (SNMP)

Remote Access VPN Business Scenarios

TACACS+ Authentication

Developing Network Security Strategies

Management Authentication using Windows IAS as a Radius Server

Configuration Guide. Independent T1 Timing. 6AOSCG A February 2012

This techno knowledge paper can help you if: You need to setup a WAN connection between a Patton Router and a NetGuardian.

RADIUS Server Load Balancing

Configuring SIP Support for SRTP

D-Link DAP-1360 Repeater Mode Configuration

Configuring Voice over IP

Firewall Load Balancing

Transferring Files Using HTTP or HTTPS

Comware versus Cisco IOS Command Guide

GLBP - Gateway Load Balancing Protocol

School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations

Blue Coat Systems. Reference Guide. WCCP Reference Guide. For SGOS

Transcription:

ROLE-BASED COMMAND-LINE INTERFACE ACCESS DENISE HELFRICH MARCH 2004 1

Agenda Role-Based Command-Line Interface (CLI) Access Overview Configuration Tasks CLI Views Lawful Intercept View How to access and use a view Resources Summary 2

ROLE-BASED CLI ACCESS 3

Role-Based User Views Administrator LAN Engineer DBMS/Application Engineer Service Desk Capacity Planner Show Etc Customized Access To Match Operational Needs WAN Engineer Config Show Etc 4

Role-Based CLI Access Benefits Security Enhances the security of a device by defining the set of CLI commands accessible to a user Availability Avoids unintentional executions of CLI commands by unauthorized personnel Operational Efficiency Greatly improves usability by prohibiting users from viewing CLI commands that are inaccessible to them 5

Role-Based CLI Access Functions Available in Cisco IOS Software Release 12.3(7)T Up to sixteen CLI Views Role-based views One root view Up to fifteen custom views Standard feature in all Cisco IOS Software images Lawful Intercept view Confidential electronic surveillance view One Lawful Intercept view Available in 3DES K9 images Export restrictions apply 6

How it Works An administrator must define views using the root view No default views Must have privilege level fifteen to access the root view Must create a view and specify the allowed commands A user can access a view Manually enter a view name and password View is automatically assigned via username login When users are in a view, they can only use commands specified for that view Users can switch between views if they know the view name and password 7

CLI VIEWS CONFIGURATION 8

How CLI View Relates to Other Configurations Authentication Authorization and Accounting (AAA) AAA must first be enabled with the aaa new-model command One view name is associated with a user in the local database or external AAA server At login, a user is placed in a view after the usual user authentication Privilege Level View name takes precedence over the privilege level User is placed in the privilege level if the view does not exist View Name Only one view name can be configured for a user If the view name is not configured, the user is set to existing privilege level View names and passwords are case sensitive 9

CLI View Configuration Tasks Prerequisite Configuration Task 1: login to Root view Task 2: configure a new view Task 3: access a CLI view Task 4: assign username view level 10

Prerequisite Configuration The enable password must exist Password encryption is recommended For better security, use enable secret password To access root view the passwords are: Enable secret (if present) Enable password (if enable secret is not present) AAA must first be enabled with the aaa new-model command Root view user must have privilege fifteen level assigned via the privilege command 11

Task 1: Login to Root View Router# enable view Router# enable view Password: enter enable or enable secret password *Mar 18 00:04:28.891: %PARSER-6-VIEW_SWITCH: successfully set to view 'root' Router# Note: % Authentication failed message returns if a user unsuccessfully authenticates 12

Task 2: Configure a New View Step 1: Create the New View and Enter Config-View Mode Router(config)# parser view view-name Router# configure terminal Router(config)# parser view Admin123 *Mar 18 01:07:56.167: %PARSER-6-VIEW_CREATED: view Admin123' successfully created. Router(config-view)# Notes: The no form of parser view view-name is used to delete the view View name is case sensitive 13

Task 2: Configure a New View (Cont.) Step 2: Create the View Password Router(config-view)# password 5 view-password Router(config-view)# password 5 Admin@Pswd Note: Password is case sensitive 14

Task 2: Configure a New View (Cont.) Step 3: Add Commands Allowed to Use for this View Router(config-view)# commands parser-mode {include include-exclusive} [all] command Router(config-view)# commands exec include show interfaces Router(config-view)# commands exec include all Router(config-view)# commands configure includeexclusive crypto Notes: Implicit deny all Must include the command Include-exclusive command includes command for this view while excluding it in all other views 15

Task 3: Access a CLI View Step 1: Manually Access a View Router# enable view view-name Router# enable view Admin123 Password: Admin@Pswd *Mar 18 02:15:18.035: %PARSER-6-VIEW_SWITCH: successfully set to view Admin123' Router# 16

Example: Acme Company Access Roles Network OPS Administrator Some EXEC Some Router Config No Security Config Security OPS Administrator Show Everything EXEC Copy Run only EXEC Crypto Security Config Operator Ping Show Hardware Show Interfaces Show Version WAN Engineer Everything 17

Acme Company Operator View Sample Configuration Router# enable view Password:secretpswd *Mar 18 02:15:18.035: %PARSER-6-VIEW_SWITCH: successfully set to view root' Router# configure Terminal Router(config)# parser view operator Router(config-view)#password 5 Oper@torPswd Router(config-view)#commands exec include ping Router(config-view)#commands exec include show hardware Router(config-view)#commands exec include show interfaces Router(config-view)#commands exec include show version Router(config-view)#exit Router(config)# 18

Acme Company Network Administrator View Sample Configuration Router(config)# parser view NetOps Router(config-view)#password 5 NetOps@Pswd Router(config-view)#commands exec include clear Router(config-view)#commands exec include copy Router(config-view)#commands exec include ping Router(config-view)#commands exec include all show Router(config-view)#commands exec include configure Router(config-view)#commands configure include access-list Router(config-view)#commands configure include clock Router(config-view)#commands configure include hostname Router(config-view)#commands configure include interface Router(config-view)#commands configure include ip Router(config-view)#commands configure include line Router(config-view)#exit Router(config)# 19

Acme Company Security Administrator View Sample Configuration Router(config)# parser view SecOps Router(config-view)#password 5 SecOps@Pswd Router(config-view)#commands exec include copy running-config Router(config-view)#commands exec include login Router(config-view)#commands exec include all show Router(config-view)#commands exec include-exclusive show crypto Router(config-view)#commands exec include-exclusive show key Router(config-view)#commands exec include configure terminal Router(config-view)#commands configure include access-list Router(config-view)#commands configure include-exclusive crypto Router(config-view)#commands configure include-exclusive key Router(config-view)#commands configure include-exclusive liview Router(config-view)#exit Router(config)# 20

Acme Company Security Engineer Sample Configuration Router(config)#username engineer privilege 15 password engr=9l1 Access to all EXEC and configuration commands Easiest method is to assign them a privilege fifteen level 21

View Capabilities Operator NetOps SecOps Router#enable view operator Password: Oper@torPswd * view 'operator' Router#? Exec commands: exit ping show Router#show? hardware interfaces version Router#enable view NetOps Password: NetOps@Pswd * view NetOps' Router#? Exec commands: clear configure copy enable exit ping show Router#show? controllers hardware interfaces version Router#configure terminal Router(config)#? access-list clock hostname interface ip line Router#enable view SecOps Password: SecOps@Pswd * view SecOps' Router#? Exec commands: configure copy enable exit login ping show Router#show? controllers crypto hardware interfaces key version Router#configure terminal Router(config)#? access-list crypto key li-view 22

Task 4: Assign Username View Level Router(config)# username name {privilege privilege-level view view-name] password password} Router(config)# username admin_o view operator password chf&9l$ Router(config)# username admin_n view NetOps password kz7pe%t Router(config)# username admin_s view SecOps password p8ewo*i User automatically enters an assigned view upon successful login User can manually switch views with enable view view-name view-password 23

Example: Login and Views for Admin_o User 24

LAWFUL INTERCEPT VIEW CONFIGURATION Role-Based Presentation_ID CLI Access 03/04 2004, Cisco Systems, 2004 Inc. Cisco All rights Systems, reserved. Inc. All rights reserved. 25

Lawful Intercept View Service Providers should be able to implement authorized and undetectable electronic surveillance Lawful Intercept is available in special 3DES Crypto K9 images found in hardware that supports Cisco IOS Software Release 12.3(7)T Able to monitor packets flowing through a Cisco router Copies packets and sends them to the Mediation Device for further processing Lawful Intercept user can only access lawful intercept commands that are held within the TAP-Management Information Base (MIB) Special set of Simple Network Management Protocol (SNMP) commands Stores information about calls and users One Lawful Intercept view 26

Lawful Intercept Configuration Tasks Task 1: login to Root view Task 2: configure a Lawful Intercept view Task 3: access Lawful Intercept view 27

Task 1: Login to Root View Router# enable view Router# enable view Password: enter enable or enable secret password *Mar 18 00:04:28.891: %PARSER-6-VIEW_SWITCH: successfully set to view 'root' Router# Note: % Authentication failed message returns if a user unsuccessfully authenticates 28

Task 2: Configure a Lawful Intercept View Step 1: Initialize Lawful Intercept View Router(config)# li-view li-password user username password password Router# configure terminal Router(config)# li-view 5eg4w0pi user li_admin password n*s3np7 *Mar 18 13:37:06.907: %PARSER-6-LI_VIEW_INIT: LI-View initialised. Router(config)#exit Notes: Only level fifteen privilege user can initialize a Lawful Intercept view At least one user must be specified 29

Task 2: Configure a Lawful Intercept View (Cont.) Step 2: (Optional) Create Users with the Lawful Intercept Option Upon Login Router(config)# username [lawful-intercept name][privilege privilegelevel view view-name] password password] Router# configure terminal Router(config)# username lawful-intercept LI-user1 password c9sq&v1 *Mar 18 13:37:06.907: %PARSER-6-LI_VIEW_INIT: LI-View initialised. Router(config)# 30

Task 2: Configure a Lawful Intercept View (Cont.) Step 3: (Optional) Edit Lawful Intercept View Router(config)# Router(config)#parser view view-name Router(config-view)# password 5 password Router(config-view)# name new-name Router(config-view)# commands parser-mode {include include-exclusive} [all] command Router(config-view)# exit Note: Lawful Intercept view defaults with all allowed commands 31

Task 3: Access Lawful Intercept View Router# Router# enable view li-view Password: enter li-password *Mar 18 15:38:36.151: %PARSER-6-VIEW_SWITCH: successfully set to view 'li-view' Router# 32

Monitoring Views and View Users Displays information about the view that the user is currently in Router# show parser view [all] Router# show parser view Current view is 'li-view' Router# Displays all users, who have access to a Lawful Intercept view Router# show users [lawful-intercept] Router# show users lawful-intercept li_admin LI-user1 Router# 33

Resources Cisco IOS Software Release 12.3(7)T www.cisco.com/go/release123t Lawful Intercept Design Guides www.cisco.com/en/us/partner/tech/tk583/tk799/tech_design_guides_list.h tml Cisco IOS Infrastructure Security www.cisco.com/go/autosecure/ Cisco IOS Software Collateral Library www.cisco.com/go/library/ 34

35