This sample configuration initially blocks traffic from a host device
(at 220.127.116.11) on the external network to all devices on the internal network
until you perform browser authentication with the use of authentication proxy.
The access list passed down from the server (permit tcp|ip|icmp
any any) adds dynamic entries post-authorization to access list
115 that temporarily allow access from the host device to the internal network.
There are no specific requirements for this document.
The information in this document is based on these software and
Note: The ip auth-proxy command was introduced
in Cisco IOS Software Release 12.0.5.T. This configuration was tested with
Cisco IOS Software Release 12.0.7.T.
The information in this document was created from the devices in a
specific lab environment. All of the devices used in this document started with
a cleared (default) configuration. If your network is live, make sure that you
understand the potential impact of any command.
Refer to the
Technical Tips Conventions for more information on document
In this section, you are presented with the information to configure
the features described in this document.
Note: Use the
(registered customers only)
to obtain more information on the commands used in this
This document uses this network setup:
This document uses this configuration:
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!--- Turn on authentication.
!--- Define the server group and servers for TACACS+ or RADIUS.
aaa group server tacacs+|radius RTP
!--- Define what you need to authenticate.
aaa authentication login default group RTP none
aaa authorization exec default group RTP none
aaa authorization auth-proxy default group RTP
enable secret 5 $1$H9zZ$z9bu5HMy4NTtjsvIhltGT0
enable password ww
!--- You want the router name to appear as banner.
ip auth-proxy auth-proxy-banner
!--- You want the access-list entries to timeout after 10 minutes.
ip auth-proxy auth-cache-time 10
!--- You define the list-name to be associated with the interface.
ip auth-proxy name list_a http
ip audit notify log
ip audit po max-events 100
cns event-service server
ip address 18.104.22.168 255.255.255.0
no ip directed-broadcast
no mop enabled
ip address 22.214.171.124 255.255.255.0
!--- Apply the access-list to the interface.
ip access-group 115 in
no ip directed-broadcast
!--- Apply the auth-proxy list-name.
ip auth-proxy list_a
ip route 126.96.36.199 255.255.255.0 188.8.131.52
!--- Turn on the http server and authentication.
ip http server
ip http authentication aaa
!--- This is our access-list for auth-proxy testing -
!--- it denies only one host, 184.108.40.206, access - to minimize disruption
!--- to the network during testing.
access-list 115 permit tcp host 220.127.116.11 host 18.104.22.168 eq www
access-list 115 deny icmp host 22.214.171.124 any
access-list 115 deny tcp host 126.96.36.199 any
access-list 115 deny udp host 188.8.131.52 any
access-list 115 permit udp any any
access-list 115 permit tcp any any
access-list 115 permit icmp any any
dialer-list 1 protocol ip permit
dialer-list 1 protocol ipx permit
!--- Define the server(s).
tacacs-server host 184.108.40.206
tacacs-server key cisco
radius-server host 220.127.116.11
radius-server key cisco
line con 0
transport input none
line aux 0
line vty 0 4
There is currently no verification procedure available for this
This section provides information you can use in order to troubleshoot
For these commands, along with other troubleshooting information, refer
Note: Refer to
Information on Debug Commands before you issue