- Converged Access: Solution Overview
- Converged Access: Predeployment Checklist
- Converged Access: Management
- Converged Access: Basic Configuration
- Converged Access: Securing Networks with AAA and Cisco ISE
- Converged Access: Enabling Wireless
- Converged Access: WLAN Configuration
- Converged Access: Wireless AP and RF
- Converged Access: Wireless QoS
Converged Access: Securing Networks with AAA and Cisco ISE
The Cisco Catalyst 3650 Series Switches and the Cisco Catalyst 3850 Series Switches are capable of providing both wireless connectivity and wired services to end users. Since, wireless networks are equally prone to unauthorized access and attacks, they require the same level of security as wired networks.
This chapter provides a step-by-step instructions for configuring authentication, authorization, and accounting (AAA) and Cisco Identity Service Engine (ISE), to enable the Converged Access on Cisco Catalyst 3850 Series Switches and Cisco Catalyst 3650 Series Switches.
- Overview of Securing Networks with AAA and Cisco ISE
- Configuring AAA
- Verifying Dot1x Protocol and RADIUS Server
- Adding a Cisco Catalyst 3850 Switch to Cisco ISE
- Configuring Authentication and Authorization Policies
Overview of Securing Networks with AAA and Cisco ISE
For wireless clients, AAA enables the Cisco Catalyst 3850 Series Switches to determine who the user is (authentication), what the user can do (authorization), and what the user did (accounting). AAA helps secure the wireless network in the corresponding enterprise against unauthorized access.
The authentication component of AAA is responsible for providing a method to identify (authenticate) wireless users. With AAA, you can define one or more authentication methods the device should use when authenticating a user. For example, you can specify two authentication methods, an external security server and a local user database on the device.
When authentication for a user is completed successfully, AAA's authorization is used to restrict the actions a user can perform and the services a user can access. For example, if network access to a temporary worker in an enterprise network needs to be limited, you can enforce this restriction using AAA's authorization component.
AAA's accounting component is responsible for keeping a record of authentication and authorization actions of wireless users, and related metrics such as tracking users who log in to the network after business hours.
![]() Note |
|
Configuring AAA
Verifying Dot1x Protocol and RADIUS Server
Use the following command to check if the dot1x protocol is enabled on the switch:
Device# show dot1x sysauthcontrol Enabled dot1x Protocol Version 3
Device# show radius server-group all server group group_Name Server(Radius_Server_IP:Auth_Port,Acct_Port) Transactions:
Adding a Cisco Catalyst 3850 Switch to Cisco ISE
Configuring Authentication and Authorization Policies
-
Choose Policy > Authentication to check if the Wired_802.1X and Wireless_802.1X authentication policies exist.
-
Choose Policy > Authorization and check if the Wired_802.1X and Wireless_802.1X authorization policies exist.
-
Choose Policy > Conditions > Compound Conditions, if required, to edit these policies.
To create an authorization policy for an employee on Corporate WLAN using dot1x, perform the following steps:
Step 1 | Choose Policy > Authorization. | ||
Step 2 | Click Drop First Down Arrow next to the Edit button and select Insert New Rule Above. | ||
Step 3 | Enter the name of the rule. | ||
Step 4 | Choose the following conditions from the Condition field: | ||
Step 5 | Provide the Permit Access using the Permissions field. | ||
Step 6 | Click
Save.
|