This sample configuration initially blocks traffic from external hosts to all devices on the internal network until browser authentication is performed with the use of authentication proxy. The access list passed down from the server (permit tcp|ip|icmp any any) adds dynamic entries post-authorization to access-list 115 that temporarily allow access from the external PC to the internal network.
There are no specific requirements for this document.
The information in this document is based on these software and hardware versions:
Cisco IOS® Software Release 12.0.7.T
Cisco 3640 router
Note: The ip auth-proxy command is introduced in Cisco IOS Software Release 12.0.5.T. This configuration was tested with Cisco IOS Software Release 12.0.7.T.
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.
Refer to the Cisco Technical Tips Conventions for more information on document conventions.
In this section, you are presented with the information to configure the features described in this document.
This document uses this network setup:
This document uses this configuration:
Current configuration: ! version 12.0 service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname security-3640 ! aaa new-model aaa group server tacacs+ RTP server 184.108.40.206 ! aaa authentication login default group RTP none aaa authorization exec default group RTP none aaa authorization auth-proxy default group RTP enable secret 5 $1$H9zZ$z9bu5HMy4NTtjsvIhltGT0 enable password ww ! ip subnet-zero ! ip inspect name myfw cuseeme timeout 3600 ip inspect name myfw ftp timeout 3600 ip inspect name myfw http timeout 3600 ip inspect name myfw rcmd timeout 3600 ip inspect name myfw realaudio timeout 3600 ip inspect name myfw smtp timeout 3600 ip inspect name myfw sqlnet timeout 3600 ip inspect name myfw streamworks timeout 3600 ip inspect name myfw tftp timeout 30 ip inspect name myfw udp timeout 15 ip inspect name myfw tcp timeout 3600 ip auth-proxy auth-proxy-banner ip auth-proxy auth-cache-time 10 ip auth-proxy name list_a http ip audit notify log ip audit po max-events 100 cns event-service server ! process-max-time 200 ! interface FastEthernet0/0 ip address 220.127.116.11 255.255.255.0 ip access-group 101 in no ip directed-broadcast ip inspect myfw in no mop enabled ! interface FastEthernet1/0 ip address 18.104.22.168 255.255.255.0 ip access-group 115 in no ip directed-broadcast ip auth-proxy list_a ! ip classless ip route 0.0.0.0 0.0.0.0 22.214.171.124 ip route 126.96.36.199 255.255.255.0 188.8.131.52 ip http server ip http authentication aaa ! access-list 101 permit icmp 184.108.40.206 0.0.0.255 any access-list 101 permit tcp 220.127.116.11 0.0.0.255 any access-list 101 permit udp 18.104.22.168 0.0.0.255 any access-list 101 permit icmp 22.214.171.124 0.0.0.255 any access-list 101 permit tcp 126.96.36.199 0.0.0.255 any access-list 101 permit udp 188.8.131.52 0.0.0.255 any access-list 115 permit tcp host 184.108.40.206 host 220.127.116.11 eq www access-list 115 deny tcp any any access-list 115 deny udp any any access-list 115 permit icmp any 18.104.22.168 0.0.0.255 echo access-list 115 permit icmp any 22.214.171.124 0.0.0.255 echo-reply access-list 115 permit icmp any 126.96.36.199 0.0.0.255 packet-too-big access-list 115 permit icmp any 188.8.131.52 0.0.0.255 time-exceeded access-list 115 permit icmp any 184.108.40.206 0.0.0.255 traceroute access-list 115 permit icmp any 220.127.116.11 0.0.0.255 unreachable access-list 115 permit icmp any 18.104.22.168 0.0.0.255 administratively-prohibited dialer-list 1 protocol ip permit dialer-list 1 protocol ipx permit ! tacacs-server host 22.214.171.124 tacacs-server key cisco radius-server host 126.96.36.199 radius-server key cisco ! line con 0 transport input none line aux 0 line vty 0 4 password ww ! ! end
There is currently no verification procedure available for this configuration.
This section provides information you can use to troubleshoot your configuration.
For these commands, along with other troubleshooting information, refer to Troubleshooting Authentication Proxy.
Note: Refer to Important Information on Debug Commands before you issue debug commands.
The Cisco Support Community is a forum for you to ask and answer questions, share suggestions, and collaborate with your peers.
Refer to Cisco Technical Tips Conventions for information on conventions used in this document.