
17-9
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
OL-20748-01
Chapter 17 Applying AAA for Network Access
Configuring Authorization for Network Access
Configuring Authorization for Network Access
After a user authenticates for a given connection, the FWSM can use authorization to further control
traffic from the user.
This section includes the following topics:
•
Configuring Authorization, page 17-9
•
Configuring RADIUS Authorization, page 17-10
Configuring Authorization
You can configure the FWSM to perform network access authorization with .
After a user authenticates, the FWSM checks the authorization rules for matching traffic. If the traffic
matches the authorization statement, the FWSM sends the username to the server. The
server responds to the FWSM with information that the FWSM treats as a user-specific,
dynamic access list for that traffic, based on the user profile.
Note
If you have used the
access-group
command to apply access lists to interfaces, be aware of the following
effects of the
per-user-override
keyword on authorization by dynamic access lists:
•
Without the
per-user-override
keyword, traffic for a user session must be permitted by both the
interface access list and the dynamic access list.
•
With the
per-user-override
keyword, the dynamic access list determines what is permitted.
For more information, see the
access-group
command entry in the
Catalyst 6500 Series Switch and
Cisco 7600 Series Router Firewall Services Module Command Reference
.
Authentication and authorization statements are independent; however, any unauthenticated traffic
matched by an authorization statement will be denied. For authorization to succeed, a user must first
authenticate with the FWSM.
Note
We suggest that you identify the same traffic for authentication as for authorization. Due to the way the
FWSM uses the dynamic access list, if you have a more restrictive authorization statement than
authentication, then some connections are unexpectedly denied. When a user first authenticates, if the
connection matches the authentication statement and not the authorization statement, then later
connections for that user that match the authorization statement are denied (for as long as the uauth
session exists). Conversely, if the first connection matches the authorization statement, then later
connections that do not match the authorization statement but that match the authentication statement
are denied. Therefore, you need to match the authentication and authorization configurations.
See the documentation for your server for information about configuring network access
authorizations for a user.
To configure authorization, perform the following steps:
Step 1
Enable authentication. For more information, see the
“Enabling Network Access Authentication” section
on page 17-3
. If you have already enabled authentication, continue to the next step.
Step 2
To enable authorization, enter the following command:
Summary of Contents for 6500 - Catalyst Series 10 Gigabit EN Interface Module Expansion
Page 35: ...P A R T 1 Getting Started and General Information ...
Page 36: ......
Page 297: ...P A R T 2 Configuring the Security Policy ...
Page 298: ......
Page 521: ...P A R T 3 System Administration ...
Page 522: ......
Page 613: ...P A R T 4 Reference ...
Page 614: ......