19-4
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 19 Applying AAA for Network Access
Configuring Authentication for Network Access
Step 1
Using the
aaa-server
command, identify your AAA servers. If you have already identified your AAA
servers, continue to the next step.
For more information about identifying AAA servers, see the
“Identifying AAA Server Groups and
Servers” section on page 13-9
.
Step 2
Using the
access-list
command, create an access list that identifies the source addresses and destination
addresses of traffic you want to authenticate. For steps, see the
“Adding an Extended Access List”
section on page 16-5
.
The
permit
ACEs mark matching traffic for authentication, while
deny
entries exclude matching traffic
from authentication. Be sure to include the destination ports for either HTTP, HTTPS, Telnet, or FTP in
the access list because the user must authenticate with one of these services before other services are
allowed through the security appliance.
Step 3
To configure authentication, enter the following command:
hostname(config)#
aaa authentication match
acl_name
interface_name
server_group
Where
acl_name
is the name of the access list you created in
Step 2
,
interface_name
is the name of the
interface as specified with the
nameif
command, and
server_group
is the AAA server group you created
in
Step 1
.
Note
You can alternatively use the
aaa authentication
include
command (which identifies traffic within the
command). However, you cannot use both methods in the same configuration. See the
Cisco Security
Appliance Command Reference
for more information.
Step 4
(Optional) To enable the redirection method of authentication for HTTP or HTTPS connections, enter
the following command:
hostname(config)#
aaa authentication listener http
[
s
]
interface_name
[
port
portnum
]
redirect
where the
interface_name
argument is the interface on which you want to enable listening ports.
The
port
portnum
argument specifies the port number that the security appliance listens on; the defaults
are 80 (HTTP) and 443 (HTTPS). You can use any port number and retain the same functionality, but be
sure your direct authentication users know the port number; redirected traffic is sent to the correct port
number automatically, but direct authenticators must specify the port number manually.
Enter this command separately for HTTP and for HTTPS.
Step 5
(Optional) If you are using the local database for network access authentication and you want to limit
the number of consecutive failed login attempts that the security appliance allows any given user
account, use the following command:
hostname(config)#
aaa local authentication attempts max-fail
number
Where number is between 1 and 16.
For example:
hostname(config)#
aaa local authentication attempts max-fail 7
Tip
To clear the lockout status of a specific user or all users, use the
clear aaa local user lockout
command.
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......