Cisco NAC Appliance - Clean Access Manager Configuration Guide, Release 4.7(5)
User Management: Configuring User Roles and Local Users
Downloads: This chapterpdf (PDF - 286.0KB) The complete bookPDF (PDF - 18.67MB) | Feedback

User Management: Configuring User Roles and Local Users

Table Of Contents

User Management: Configuring User Roles and Local Users

Overview

Create User Roles

User Role Types

Unauthenticated Role

Normal Login Role

Client Posture Assessment Roles

Session Timeouts

Default Login Page

Traffic Policies for Roles

Add New Role

Role Properties

Modify Role

Edit a Role

Delete Role

Create Local User Accounts

Create or Edit a Local User


User Management: Configuring User Roles and Local Users


This chapter describes the following topics:

Overview

Create User Roles

Create Local User Accounts

For details on configuring authentication servers, see Chapter 7 "User Management: Configuring Authentication Servers."

For details on creating and configuring the web user login page and guest users, see Chapter 5 "Configuring User Login Page and Guest Access."

For details on configuring traffic policies for user roles, see Chapter 8 "User Management: Traffic Control, Bandwidth, Schedule."

Overview

This chapter describes the user role concept in Cisco NAC Appliance. It describes how user roles are assigned and how to create and configure them. It also describes how to create local users that are authenticated internally by the CAM (used primarily for testing).

Cisco NAC Appliance network protection features are configured for users by role and operating system. The following roles are employed when users are in the Cisco NAC Appliance network (i.e. during the time they are In-Band) and must be configured with traffic policies and session timeout:

Unauthenticated Role—Default system role for unauthenticated users (Agent or web login) behind a Clean Access Server. Web login users are in the unauthenticated role while network scanning is performed.

Normal Login Role—There can be multiple normal login roles in the system. A user is put into a normal login role after a successful login.

Client Posture Assessment Roles (Agent Temporary Role and Quarantine Role)—Agent users are in the Temporary role while Agent Requirements are checked on their systems. Both web login and Agent users are put in the Quarantine role when network scanning determines that the client machine has vulnerabilities.

Note that the Temporary and Quarantine roles are intended to have limited session time and network access in order for users to fix their systems.

When a user authenticates, either through the web login page or Agent, Cisco NAC Appliance determines the normal login role of the user and the requirements and/or network scans to be performed for the role. Cisco NAC Appliance then performs requirement checking and/or network scanning as configured for the role and operating system.

Note that while the role of the user is determined immediately after the initial login (in order to determine the scans or system requirements associated with the user), a user is not actually put into a normal login role until requirements are met, scanning has occurred and no vulnerabilities are found. If the client has not met requirements, the user stays in the Agent Temporary role until requirements are met or the session times out, including when the user reboots his/her client machine as part of a remediation step (if the required application installation process requires you to restart your machine, for example) and the Logoff NAC Agent users from network on their machine logoff or shutdown after <x> secs option in the CAM Device Management > Clean Access > General Setup > Agent Login web console page has not been enabled. If the user has met requirements but is found with network scanning vulnerabilities, the user can be assigned to a quarantine role or simply blocked, depending on the configuration.

Create User Roles

Roles are integral to the functioning of Cisco NAC Appliance and can be thought of in the following ways:

As a classification scheme for users that persists for the duration of a user session.

As a mechanism that determines traffic policies, bandwidth restrictions, session duration, posture assessment, and other policies within Cisco NAC Appliance for particular groups of users.

In general, roles should be set up to reflect the shared needs of distinct groups of users in your network. Before creating roles, you should consider how you want to allocate privileges in your network, apply traffic control policies, or group types of client devices. Roles can frequently be based on existing groups within your organization (for example, students/faculty/staff, or engineering/sales/HR). Roles can also be assigned to groups of client machines (for example, gaming boxes). As shown in Figure 6-1, roles aggregate a variety of user policies including:

Traffic policies

Bandwidth policies

VLAN ID retagging

Cisco NAC Appliance network port scanning plugins

Agent client machine requirements

Figure 6-1 Normal Login User Roles

User Role Types

The system puts a user in a role when the user attempts to log in. There are four default user role types in the system: Unauthenticated Role, Normal Login role, Agent Temporary role, and Quarantine role.

Unauthenticated Role

There is only one Unauthenticated Role and it is the system default role. If a configured normal login role is deleted, users in that role are reassigned to the Unauthenticated Role (see Delete Role). You can configure traffic and other policies for the Unauthenticated Role, but the role itself cannot be edited or removed from the system.

Users on the untrusted (managed) side of the Clean Access Server are in the Unauthenticated role prior to the initial web login or Agent login. When using web login/network scanning only, users remain in the Unauthenticated role until clients pass scanning (and are transferred to a normal login role), or fail scanning (and are either blocked or transferred to the quarantine role).

Normal Login Role

There can be multiple normal login roles (including "restricted access" roles) in the system. A user is put into a normal login role after a successful login. You can configure normal login roles to associate users with the following:

Network access traffic control policies—what parts of the network and which application ports can users can access while in the role.

VLAN ID:

For in-band users, retag traffic (to/from users in the role) destined to the trusted network to differentiate priority to the upstream router.

For out-of-band (OOB) users, set the Access VLAN ID for users in the role if using role-based configuration.

Cisco NAC Appliance network scanning plugins—the Nessus port scanning to perform, if any.

Agent requirements—the software package requirements client systems must have.

End-user HTML page(s) displayed after successful or unsuccessful web logins —the pages and information to show to web login users in various subnets/VLANs/roles. See Chapter 5 "Configuring User Login Page and Guest Access" for further details.

Typically, there are a number of normal login roles in a deployment, for example roles for Students, Faculty, and Staff (or Engineering, HR, Sales). You can assign normal login roles to users in several ways:

By the MAC address or subnet of a client device.
You can assign a role to a device or subnet through Device Management > Filters. See Global Device and Subnet Filtering for details.

By local user attributes. Local users are primarily used for testing and are authenticated internally by the Clean Access Manager rather than an external authentication server. You can assign a role to a local user through User Roles > Local Users. See Create Local User Accounts.

By external authentication server attributes. For users validated by an external authentication server, the role assigned can be based on:

The untrusted network VLAN ID of the user.
This allows you to use untrusted network information to map users into a user role.

The authentication attributes passed from LDAP and RADIUS authentication servers.
This allows you to use authentication attributes to map different users to different roles within Cisco NAC Appliance. If no mapping rules are specified, users are assigned the default role specified for the authentication server, after login. VLAN mapping and attribute mapping is done through User Management > Auth Servers > Mapping Rules.

For details, see Adding an Authentication Provider and Map Users to Roles Using Attributes or VLAN IDs.

Role Assignment Priority

Note that the order of priority for role assignment is as follows:

1. MAC address

2. Subnet / IP Address

3. Login information (login ID, user attributes from auth server, VLAN ID of user machine, etc.)

Therefore, if a MAC address associates the client with "Role A", but the user's login ID associates him or her to "Role B", "Role A" is used.

For additional details, see also Global Device and Subnet Filtering and Device Filters for Out-of-Band Deployment.

Client Posture Assessment Roles

You can implement client posture assessment in Cisco NAC Appliance as network scanning only (see Figure 12-1), Agent only, or Agent with network scanning. With posture assessment configured, two types of roles are used specifically for Cisco NAC Appliance:

Agent Temporary Role

When the Agent is used, the Agent Temporary role is assigned to users after authentication to allow the user limited network access to download and install required packages that will prevent the user's system from becoming vulnerable. The user is prevented from normal login role access to the network until the Agent requirements are met.

There is only one Agent Temporary role in the system. This role is only in effect when the user is required to use Agent to login and pass Agent requirements.

The Agent Temporary role is assigned to users for the following time periods:

a. From the login attempt until successful network access. The client system meets Agent requirements and is not found with vulnerabilities after network scanning. The user transfers from the Agent Temporary role into the user's normal login role.

b. From the login attempt until Agent requirements are met. The user has the amount of time configured in the Session Timer for the role to download and install required packages. If the user cancels or times out, the user is removed from the Agent Temporary role and must restart the login process. If the user downloads Agent requirements within the time allotted, the user stays in the Agent Temporary role and proceeds to network scanning (if enabled).


Note If the user reboots his/her client machine as part of a remediation step (if the required application installation process requires you to restart your machine, for example), and the Logoff NAC Agent users from network on their machine logoff or shutdown after <x> secs option in the CAM Device Management > Clean Access > General Setup > Agent Login web console page has not been enabled, the client machine remains in the Temporary role until the Session Timer expires and the user is given the opportunity to perform login/remediation again.

c. From the login attempt until network scanning finds vulnerabilities on the user system. If the client system meets Agent requirements, but is found to have vulnerabilities during network scanning, the user is transferred from the Agent Temporary role into the quarantine role.

Quarantine Role

With network scanning enabled, the purpose of the Agent quarantine role is to allow the user limited network access to resources needed to fix vulnerabilities that already exist on the user system. The user is prevented from normal login role access to the network until the vulnerabilities are fixed.

There can be one or multiple quarantine roles in the system. A user is put into a quarantine role if:

The user attempts to log in using the web login page, and network scanning finds a vulnerability on the user system.

The user logs in using the Agent and meets requirements but network scanning finds a vulnerability on the user system.

The user has the amount of time configured in the Session Timer for the role to access resources to fix vulnerabilities. If the user cancels or times out, the user is logged out of the quarantine role and must restart the login process. At the next login attempt, the client again goes through posture assessment.

When the user fixes vulnerabilities within the time allotted, if the Agent is used to log in, the user can go through network scanning again during the same session. If web login is used, the user must log out or time out then login again for the second network scanning to occur.


Note When using web login, the user should be careful not to close the Logout page (see Figure 5-11). If the user cannot not log out but reattempts to login before the session times out, the user is still considered to be in the original quarantine role and is not redirected to the login page.

Only when the user has met requirements and fixed vulnerabilities is the user allowed network access in the corresponding normal login role. You can map all normal login roles to a single quarantine role, or you can create and customize different quarantine roles. For example, multiple quarantine roles can be used if different resources are required to fix vulnerabilities for particular operating systems. In either case, a normal login role can only be mapped to one quarantine role. After the roles are created, the association between the normal role and quarantine role is set up in the Device Management > Clean Access > General Setup form. See Client Login Overview for details.

Session Timeouts

You can also limit network access with brief session timeouts and restricted traffic policy privileges. The session timeout period is intended to allow users only a minimum amount of time to complete posture assessment and remediation. A minimal timeout period for client posture assessment-related roles:

Limits the exposure of vulnerable users to the network.

Prevents users from full network access in the Temporary role. This is to limit users from circumventing rechecks if they fail a particular check, install the required package, restart their computers, but do not manually log out.

Factors in determining the timeout period appropriate for your environment include the network connection speed available to users and the download size of packages you will require.

You can additionally configure a Heartbeat Timer to log off all users if the CAS cannot connect to the clients after a configurable number of minutes. See Configure User Session and Heartbeat Timeouts for further details.

You can configure Max Sessions per User Account for a user role. This allows administrators to limit the number of concurrent machines that can use the same user credentials. The feature allows you to restrict the number of login sessions per user to a configured number. If the online login sessions for a username exceed the value specified (1-255; 0 for unlimited), the web login page or the Agent will prompt the user to end all sessions or end the oldest session at the next login attempt. See Role Properties for details.

Default Login Page

A default login page must be added and present in the system in order for both the web login and Agent users to authenticate.

The login page is generated by Cisco NAC Appliance and is shown to end users by role. When users first try to access the network from a web browser, an HTML login page appears prompting the users for a user name and password. Cisco NAC Appliance submits these credentials to the selected authentication provider and uses them determine the role in which to put the user. You can customize this web login page to target the page to particular users based on a user's VLAN ID, subnet, and operating system.


Caution If a default login page is not present, Agent users will see an error dialog when attempting login ("Clean Access Server is not properly configured, please report to your administrator.").

Note For L3 OOB deployments, you must also Enable Web Client for Login Page.

For details on creating and configuring the web user login page, see Chapter 5 "Configuring User Login Page and Guest Access." To quickly add a default login page, see Add Default Login Page.

Traffic Policies for Roles

When you first create a role, it has a default traffic filtering policy of "deny all" for traffic moving from the untrusted side to the trusted side, and "allow all" for traffic from the trusted side to the untrusted side. Therefore, after creating the role, you need to create policies to permit the appropriate traffic. See Chapter 8 "User Management: Traffic Control, Bandwidth, Schedule" for details on how to configure IP-based and host-based traffic policies for user roles.

In addition, traffic policies need to be configured for the Agent Temporary role and the quarantine role to prevent general access to the network but allow access to web resources or remediation sites necessary for the user to meet requirements or fix vulnerabilities.See Configure Policies for Agent Temporary and Quarantine Roles for details.

Add New Role

The Agent Temporary role and a Quarantine role already exist in the system and only need to be configured, However, normal login roles (or any additional quarantine roles) must first be added. Once a new role is created, it can then be associated to the traffic policies and other properties you customize in the web console for your environment.


Note For new roles, traffic policies must be added to allow traffic from the untrusted to the trusted network. See Chapter 8 "User Management: Traffic Control, Bandwidth, Schedule" next for details.

1. Go to User Management > User Roles > New Role (Figure 6-2).

Figure 6-2 Add New User Role

2. If you want the role to be active right away, leave Disable this role cleared.

3. Type a unique name for the role in the Role Name field.

4. Type an optional Role Description.

5. For the Role Type, choose either:

Normal Login Role - Assigned to users after a successful login. When configuring mapping rules for authentication servers, the attributes passed from the auth server are used to map users into normal login roles. Network scan plugins and Agent requirements are also associated to a normal login role. When users log in, they are scanned for plugins and/or requirements met (while in the unauthenticated/Temporary role). If users meet requirements and have no vulnerabilities, they gain access to the network in the normal login role.


Note Form fields that only apply to normal login roles are marked with an asterisk (*).

Quarantine Role - Assigned to users to quarantine them when network scanning finds a vulnerability on the user system. Note that a system Quarantine role already exists and can be configured. However, the New Role form allows you to add additional quarantine roles if needed.

6. See Role Properties for configuration details on each role setting.


Note If planning to use role-based profiles with an OOB deployment, you must specify the Access VLAN in the Out-of-Band User Role VLAN field when you create the user role. For further details see Out-of-Band User Role VLAN and Add Port Profile.

7. When finished, click Create Role. To restore default properties on the form click Reset.

8. The role now appears in the List of Roles tab.

9. If creating a role for testing purposes, the next step is to create a local user to associate to the role. See Create Local User Accounts next.

Role Properties

Table 6-1 details all the settings in the New Role (Figure 6-2) and Edit Role (Figure 6-4) forms.

Table 6-1 Role Properties  

Control
Description

Disable this role

Stops the role from being assigned to new users.

Role Name

A unique name for the role.

Role Description

An optional description for the role.

Role Type

Whether the role is a Normal Login Role or a client posture assessment-related role: Quarantine Role or Agent Temporary Role. See User Role Types for details.

Max Sessions per User Account (Case-Insensitive)

The Max Sessions per User Account option allows administrators to limit the number of concurrent machines that can use the same user credentials. The feature allows you to restrict the number of login sessions per user to a configured number. If the online login sessions for a username exceed the value specified (1 - 255; 0 for unlimited), the web login page or the Agent will prompt the user to end all sessions or end the oldest session at the next login attempt.

The Case-Insensitive checkbox allows the administrator to allow/disallow case-sensitive user names towards the max session count. For example, if the administrator chooses to allow case-sensitivity (box unchecked; default), then jdoe, Jdoe, and jDoe are all treated as different users. If the administrator chooses to disable case-sensitivity (box checked), then jdoe, Jdoe, and jDoe are treated as the same user.

Retag Trusted-side Egress Traffic with VLAN (In-Band)

Note This feature is deprecated and will be removed in future releases.

Out-of-Band User Role VLAN

Out-of-Band (OOB) Configuration —Retag Trusted-side Traffic with Role VLAN

Once a user has finished posture assessment and remediation, if needed, and the client device is deemed to be "certified," the switch port to which the client is connected can be assigned to a different Access VLAN based on the value specified in the Out-of-Band User Role VLAN field. Hence, users connecting to the same port (at different times) can be assigned to different Access VLANs based on this setting in their user role.

For OOB deployment, if configuring role-based VLAN switching for a controlled port, you must specify an Access VLAN ID when you create the user role. When an out-of-band user logs in from a managed switch port, the CAM will:

Determine the role of the user based on the user's login credentials.

Check if role-based VLAN switching is specified for the port in the Port Profile.

Switch the user to the Access VLAN, once the client is certified, according to the value specified in the Out-of-Band User Role VLAN field for the user's role.

Admins can specify VLAN Name or VLAN ID on the New/Edit User Role form. VLAN Name is case-sensitive. If specifying wildcards for VLAN Name, you can use: abc, *abc, abc*, *abc*. The switch will use the first match for wildcard VLAN Name. You can only specify numbers for VLAN ID If the switch cannot find the VLAN specified (e.g. VLAN Name is mistyped), the error will appear on the perfigo.log (not the Event Log).

For additional details, see Global Device and Subnet Filtering and Chapter 3 "Switch Management: Configuring Out-of-Band Deployment."

Bounce Switch Port After Login (OOB)

If you have first enabled the Bounce the port based on role settings after VLAN is changed option on the OOB Management > Profiles > Port > New/Edit page, the Agent does not renew the IP address on the client machine after login and posture assessment.

Note This option only applies when a port profile is configured to use it.

Refresh IP After Login (OOB)

When enabled, the switch port through which the user is accessing the network is not bounced when the VLAN changes from the Authentication VLAN to the Access VLAN. Instead, the Agent renews/refreshes the IP address on the client machine following login and posture assessment. This option only applies when the Port profile is configured to Bounce the port based on role settings after VLAN is changed under OOB Management > Profiles > Port > New/Edit (see Add Port Profile).

See DHCP Release/Renew with Agent/ActiveX/Java Applet for additional information on configuring client IP refresh/renew.

Note For information on Access to Authentication VLAN change detection for an OOB client machine, see Configure Access to Authentication VLAN Change Detection.

After Successful Login Redirect to

When successfully logged in, the user is forwarded to the web page indicated by this field. You can have the user forwarded to:

previously requested URL - (default) The URL requested by the user before being redirected to the login page.

this URL- To redirect the user to another page, type "http://" and the desired URL in the text field. Note that "http://" must be included in the URL.

Note Typically, a new browser is opened when a redirect page is specified. If pop-up blockers are enabled, Cisco NAC Appliance will use the main browser window as the Logout page in order to show login status, logout information and VPN information (if any).
See also Redirect the Login Success Page.

Redirect Blocked Requests to

If the user is blocked from accessing a resource by a "Block" IP traffic policy for the role, users are redirected when they request the blocked page. You can have the user forwarded to:

default access blocked page - The default page for blocked access.

this URL or HTML message- A particular URL or HTML message you specify in the text field.

See also Adding Traffic Policies for Default Roles.

Show Logged-on Users

The information that should be displayed to web users in the Logout page. After the web user successfully logs in, the Logout page pops up in its own browser and displays user status based on the combination of options you select:

User info - Information about the user, such as the user name.

Logout button - A button for logging the user off the network (web Logout page only).

See Specify Logout Page Information for an example of a Logout page.

Note For Agent users, a link to a VPN Info dialog is provided in the success login and taskbar menu if an Optional or Enforce VPN Policy is enabled for both the CAS and user role.


Modify Role

From the List of Roles tab (Figure 6-3), you can configure traffic and bandwidth policies for any user role. You can also edit the Agent Temporary role, Quarantine role, and any normal login role you have created.

Figure 6-3 List of Roles

Operations you can perform from the List of Roles tab are as follows:

The Policies button links to the Traffic Control tab and lets you set traffic filter policies for the role. For details, see Chapter 8 "User Management: Traffic Control, Bandwidth, Schedule."

The BW button links to the Bandwidth tab and lets you set upstream and downstream bandwidth restrictions by role. For details, see Control Bandwidth Usage.

The Edit button links to the Edit Role tab and lets you modify role properties. See Edit a Role below.

The Delete button removes the role and all associated polices from the system and assigns users to the Unauthenticated role. See Delete Role.

Specify a network access schedule for the role. For details, see Configure User Session and Heartbeat Timeouts.

Edit a Role

1. Go to User Management > User Roles > List of Roles.

2. Roles listed will include the following:

Temporary Role - Assigned to users to force them to meet Agent packages or requirements when Agent is required to be used for login and posture assessment. There is only one Agent Temporary Role which is already present in the system. This role can be edited but not added.

Quarantine Role - Assigned to users to quarantine them when network scanning finds a vulnerability on the user system. You can configure the system Quarantine role only or add additional quarantine roles if needed.

User-defined role - The user roles you have created.


Note You can configure traffic and bandwidth policies for the Unauthenticated Role, but otherwise this system default role cannot be edited or removed.

3. Click the Edit button next to a role to bring up the Edit Role form

Figure 6-4 Edit Role

4. Modify role settings as desired. See Role Properties for details.

5. Click Save Role.

Delete Role

To delete a role, click the Delete button next to the role in the List of Roles tab of the User Management > User Roles page. This removes the role and associated polices from the system and assigns users to the Unauthenticated role.

Users actively connected to the network in the deleted role will be unable to use the network. However, their connection will remain active. Such users should be logged off the network manually, by clicking the Kick User button next to the user in the Monitoring > Online Users > View Online Users page. The users are indicated in the online user page by a value of Invalid in the Role column.

Create Local User Accounts

A local user is one who is validated by the Clean Access Manager itself, not by an external authentication server. Local user accounts are not intended for general use (the users cannot change their password outside of the administrator web console). Local user accounts are primarily intended for testing or for guest user accounts. For testing purposes, a user should be created immediately after creating a user role.

Create or Edit a Local User

1. Go to User Management > Local Users > Local Users and:

Choose the New subtab option.

Choose the List subtab option and click the Edit icon for the user you want to update.

Figure 6-5 New Local User

2. If you want the user account to be active immediately, be sure to leave the Disable this account check box cleared.

3. Type a unique User Name for the user. This is the login name by which the user is identified in the system.

4. Type a password in the Password field and retype it in the Confirm Password field. The password value is case-sensitive.

5. Optionally, type a Description for the user.

6. Choose the default role for the user from the Role list. All configured roles appear in the list. If the role you want to assign the user does not exist yet, create the role in the User Roles page and modify the user profile with the new role.

7. When finished, click Create User.

The user now appears in the List of Local Users tab. From there, you can view user information, edit user settings such as the name, password, role, or remove the user.