- Preface
-
- Configure Authentication
- Configure the NCS4K-2H-W Card
- Configure LC Priority Shutdown
- Configure AINS
- Configure Line Cards Using CTC
- Configure Circuits
- Configure the Bridge and Roll
- Configure Performance Monitoring
- Smart Licensing
- Manage Alarm Profiles
- Configure High Availability
- Configuring PRBS
- Configuring Breakout
- Manage the Node
- Configure SNMP
- Upgrade a Fabric Card
- Cable Management Utility
- Configure Affinity for OTN using CTC
- Migration : NCS4K-ECU to NCS4K-ECU2
- 24 Low Rate (LR) Datapath
- Configure Link Layer Discovery Protocol Using CTC
-
- Configure Authentication
- Configure Access Control Lists
- Configure LC Priority Shutdown
- Configure Controllers
- Configure the OTN Circuits
- Configure the OTN Protection
- Configure SNMP
- Configure Performance Monitoring
- Configure Fault Management
- Configuring PRBS
- Configuring Breakout
- Configure High Availability1
- Configure Layer 3 VPNs
- Configure Flex LSP
- Configure ISIS
- Bidirectional Forwarding Detection
- OSPF-IPv4
- Configure Ethernet OAM
- Configure Ethernet Service Activation Test
- Ethernet Local Management Interface
- MPLS Traffic Engineering
- Configure Frequency Synchronization
- Configuring Point to Point Layer 2 Services
- VLAN over ODU
- BGP Route Reflect
- Configure Smart Licensing
- Configure Link Aggregation
- Configure Link Layer Discovery Protocol
- Configure Affinity for OTN
- System Upgrade
- Capture Logs
- Inter-Rack RP Pairing
- Inter-rack Timing
- Configure Ethernet Data Plane Loopback
- Configure Zero Touch Provisioning
- Implement LPTS
- System Messages
- Administrative and Service States
Configure
Authentication
This chapter describes the procedures to create users and configure authentication.
Understand Authentication
Authentication is a way of identifying a user before permitting access to the network and network services. When Authentication is enabled, the network access server uses information retrieved from the user's profile, which is located either in the local user database or on the security server, to configure the user's session. Once this is done, the user will be granted access to a requested service only if the information in the user profile allows it. Cisco NCS 4000 series uses the RADIUS/TACACS+ server for authenticating remote users.
RADIUS
Remote Authentication Dial In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for users who connect and use a network service. RADIUS is a client/server protocol that runs in the application layer that uses User Datagram Protocol (UDP) for transport.
The RADIUS server process runs in background on a UNIX or Microsoft Windows server and client would be the Cisco network element (NE). RADIUS clients run on Cisco routers and sends the authentication requests to a central RADIUS server that contains all the user authentication and network service access information.
TACACS+
Terminal Access Controller Access-Control System Plus (TACACS+) is a new protocol developed by Cisco and released as an open standard. TACACS+ uses TCP for transport. TACACS+ protocol is a security application that provides centralized validation of users attempting to gain access to a network element. Since, TCP is connection oriented protocol, TACACS+ does not have to implement transmission control. RADIUS, however, does have to detect and correct transmission errors like packet loss, timeout and others, as it rides on UDP that is connectionless. RADIUS encrypts only the user password as it travels from the RADIUS client to RADIUS server. All other information, for example, username, authorization, and accounting are transmitted in clear text. Therefore, it is vulnerable to various types of attacks. TACACS+ encrypts all the information mentioned above and therefore does not have the vulnerabilities present in the RADIUS protocol.
NTP-G23 Create Users and Assign Privileges
|
This procedure creates users and assigns their privilege levels. |
|
| Step 1 | Log into the node where you
need to create users.
| ||
| Step 2 | Complete the
“DLP-G54
Create a New User on a Single Node” task
or the
“DLP-G55
Create a New User on Multiple Nodes” task
as needed.
Stop. You have completed this procedure. | ||
| Step 3 | Complete the DLP-G282 Viewing and Terminating Active Logins as needed. | ||
| Step 4 | If you want to modify the
security policy settings, including password aging and idle user timeout
policies, complete the
NTP-G88 Modify Users and
Change Security procedure.
Stop. You have completed this procedure. |
DLP-G54 Create a Local User on a Single Node Using CTC
DLP-G282 Viewing and Terminating Retrieving Active Logins
|
Purpose |
This task allows you to view active CTC logins, retrieve the last activity time, and terminate all current logins. |
|
Tools/Equipment |
None |
|
Prerequisite Procedures |
|
|
Required/As Needed |
As needed |
|
Onsite/Remote |
Onsite or remote |
|
Security Level |
Superuser only |
| Step 1 | In node view or network view, click the Provisioning > Security > Active Logins tabs. The Active Logins tab displays the following information: |
| Step 2 | Click Logout to end the session of every logged-in user. This will log out all current users, excluding the initiating Superuser. |
| Step 3 | Click Retrieve Last Activity Time to display the most recent activity date and time for users in the Last Activity Time field. |
| Step 4 | Return to your originating procedure (NTP). |
Feedback