19-9
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 19 Applying AAA for Network Access
Configuring Authorization for Network Access
After a user authenticates, the security appliance checks the authorization rules for matching traffic. If
the traffic matches the authorization statement, the security appliance sends the username to the
server. The server responds to the security appliance with a permit or a deny for
that traffic, based on the user profile. The security appliance enforces the authorization rule in the
response.
See the documentation for your server for information about configuring network access
authorizations for a user.
To configure authorization, perform the following steps:
Step 1
Enable authentication. For more information, see the
“Enabling Network Access Authentication” section
on page 19-3
. If you have already enabled authentication, continue to the next step.
Step 2
Using the
access-list
command, create an access list that identifies the source addresses and destination
addresses of traffic you want to authorize. For steps, see the
“Adding an Extended Access List” section
on page 16-5
.
The
permit
ACEs mark matching traffic for authorization, while
deny
entries exclude matching traffic
from authorization. The access list you use for authorization matching should contain rules that are equal
to or a subset of the rules in the access list used for authentication matching.
Note
If you have configured authentication and want to authorize all the traffic being authenticated,
you can use the same access list you created for use with the
aaa authentication match
command.
Step 3
To enable authorization, enter the following command:
hostname(config)#
aaa authorization match
acl_name
interface_name server_group
where
acl_name
is the name of the access list you created in
Step 2
,
interface_name
is the name of the
interface as specified with the
nameif
command or by default, and
server_group
is the AAA server group
you created when you enabled authentication.
Note
Alternatively, you can use the
aaa authorization include
command (which identifies traffic
within the command) but you cannot use both methods in the same configuration. See the
Cisco
Security Appliance Command Reference
for more information.
The following commands authenticate and authorize inside Telnet traffic. Telnet traffic to servers other
than 209.165.201.5 can be authenticated alone, but traffic to 209.165.201.5 requires authorization.
hostname(config)#
access-list TELNET_AUTH extended permit tcp any any
eq telnet
hostname(config)#
access-list SERVER_AUTH extended permit tcp any host 209.165.201.5 eq
telnet
hostname(config)#
aaa-server AuthOutbound protocol
hostname(config-aaa-server-group)#
exit
hostname(config)#
aaa-server AuthOutbound (inside) host 10.1.1.1
hostname(config-aaa-server-host)#
key TACPlusUauthKey
hostname(config-aaa-server-host)#
exit
hostname(config)#
aaa authentication match TELNET_AUTH inside AuthOutbound
hostname(config)#
aaa authorization match SERVER_AUTH inside AuthOutbound
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......