13-12
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 13 Configuring AAA Servers and the Local Database
Configuring an LDAP Server
hostname(config-aaa-server-host)#
exit
hostname(config)#
aaa-server AuthInbound (inside) host 10.1.1.2
hostname(config-aaa-server-host)#
key TACPlusUauthKey2
hostname(config-aaa-server-host)#
exit
hostname(config)#
aaa-server AuthOutbound protocol radius
hostname(config-aaa-server-group)#
exit
hostname(config)#
aaa-server AuthOutbound (inside) host 10.1.1.3
hostname(config-aaa-server-host)#
key RadUauthKey
hostname(config-aaa-server-host)#
exit
hostname(config)#
aaa-server NTAuth protocol nt
hostname(config-aaa-server-group)#
exit
hostname(config)#
aaa-server NTAuth (inside) host 10.1.1.4
hostname(config-aaa-server-host)#
nt-auth-domain-controller primary1
hostname(config-aaa-server-host)#
exit
Example 13-2
shows commands that configure a Kerberos AAA server group named watchdogs, add a
AAA server to the group, and define the Kerberos realm for the server. Because
Example 13-2
does not
define a retry interval or the port that the Kerberos server listens to, the security appliance uses the
default values for these two server-specific parameters.
Table 13-2
lists the default values for all AAA
server host mode commands.
Note
Kerberos realm names use numbers and upper-case letters only. Although the security appliance accepts
lower-case letters for a realm name, it does not translate lower-case letters to upper-case letters. Be sure
to use upper-case letters only.
Example 13-2 Kerberos Server Group and Server
hostname(config)#
aaa-server watchdogs protocol kerberos
hostname(config-aaa-server-group)#
aaa-server watchdogs host 192.168.3.4
hostname(config-aaa-server-host)#
kerberos-realm EXAMPLE.COM
hostname(config-aaa-server-host)#
exit
hostname(config)#
Configuring an LDAP Server
This section describes using an LDAP directory with the security appliance for user authentication and
VPN authorization. This section includes the following topics:
•
Authentication with LDAP, page 13-12
•
Authorization with LDAP for VPN, page 13-14
•
LDAP Attribute Mapping, page 13-14
For example configuration procedures used to set up LDAP authentication or authorization, see
Appendix E, “Configuring an External Server for Authorization and Authentication”
.
Authentication with LDAP
During authentication, the security appliance acts as a client proxy to the LDAP server for the user, and
authenticates to the LDAP server in either plain text or using the Simple Authentication and Security
Layer (SASL) protocol. By default, the security appliance passes authentication parameters, usually a
username and password, to the LDAP server in plain text. Whether using SASL or plain text, you can
secure the communications between the security appliance and the LDAP server with SSL using the
ldap-over-ssl
command.
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......