Cisco AS5800 Specifications Page 152

  • Download
  • Add to my manuals
  • Print
  • Page
    / 334
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 151
4-14
Cisco AS5800 Operations, Administration, Maintenance, and Provisioning Guide
DOC-7810814=
Chapter 4 Administration
Access Service Security
Remote Security Database
As your network expands, you need a centralized security database that provides username and password
information each access server in the network. This centralized security database resides in a security
server.
A centralized security database helps establish consistent remote access policies throughout a
corporation. An example of a remote security database server is the CiscoSecure product from
Cisco Systems. CiscoSecure is a UNIX security daemon, with which the administrator creates a database
that defines the network users and their privileges. CiscoSecure uses a central database that stores user
and group profiles with authentication and authorization information.
The Cisco AS5800 exchanges user authentication information with a TACACS+ or RADIUS database
on the security server by transmitting encrypted TACACS+ or RADIUS packets across the network.
For specific information about the interaction between the security server and the Cisco AS5800, refer
to the security configuration guide in the Cisco IOS configuration guides and command references
documentation.
Configuring RADIUS
This section describes the Remote Authentication Dial-In User (RADIUS) security system, defines its
operation, and identifies appropriate and inappropriate network environments for using RADIUS
technology. RADIUS Configuration Task List, page 4-16 describes how to configure RADIUS with the
authentication, authorization, and accounting (AAA) command set. RADIUS Configuration Examples,
page 4-20 offers two possible implementation scenarios.
This section includes the following topics:
RADIUS Overview, page 4-14
RADIUS Operation, page 4-15
RADIUS Configuration Task List, page 4-16
For a complete description of the commands used in this section, refer to information on RADIUS
commands in the security command reference for your Cisco IOS release. To locate documentation of
other commands that appear in this section, use the command reference master index or search online.
RADIUS Overview
RADIUS is a distributed client/server system that secures networks against unauthorized access. In the
Cisco implementation, RADIUS clients run on Cisco routers and send authentication requests to a
central RADIUS server. The server contains all user authentication and network service access
information.
RADIUS is a fully open protocol, distributed in source code format, that can be modified to work with
any security system currently available on the market.
Cisco supports RADIUS under its AAA security paradigm. RADIUS can be used with other AAA
security protocols, such as TACACS+, Kerberos, or local username lookup. RADIUS is supported on
all Cisco platforms.
RADIUS has been implemented in a variety of network environments that require high levels of security
while maintaining network access for remote users.
Page view 151
1 2 ... 147 148 149 150 151 152 153 154 155 156 157 ... 333 334

Comments to this Manuals

No comments