Section 3 - Lecture 22 - AUTHENTCATION - AAA - DOCUMENT.pdf
(
445 KB
)
Pobierz
pr
xa
m
ite
itexampractice.net
ac
CCNA Security
AAA
tic
e.
ne
t
CCNA Security – AAA
In this lesson...
✓
What is AAA?
✓
Radius
✓
Tacacs
✓
ACS
ite
xa
m
pr
ac
✓
How to enable and use AAA
tic
e.
ne
t
2
CCNA Security – AAA
What is AAA
ite
xa
Accounting:
The last "A" is for accounting. It provides
a way of collecting security information
that you can use for billing, auditing, and reporting. You can use accounting to see what users do once
they are authenticated and authorized. For example, with accounting, you could get a log of when users
logged in and when they logged out.
[techrepublic.com]
m
pr
Authorization:
After initial authentication, authorization looks at what that authenticated user has
access to do. RADIUS or TACACS+ security servers perform authorization
for specific privileges
by
defining attribute-value (AV) pairs, which would be specific to the individual user rights. In the Cisco
IOS, you can define AAA authorization with a named list or authorization method.
ac
tic
Authentication:
Identifies users by
login and password
using challenge and response methodology
before the user even gains access to the network. Depending on your security options, it can also
support encryption.
e.
ne
t
3
CCNA Security – AAA
What is AAA
Remote Client
1
pr
1.
2.
3.
ac
2
ite
xa
The client establishes a connection with the router.
The router prompts the user for a username and password.
The router authenticates the username and password in the local
database. The user is authorized to access the network based on
information in the local database.
m
tic
e.
Perimeter
Router
3
ne
t
4
CCNA Security – AAA
What is AAA
1
2
Perimeter
Router
tic
3
4
e.
ac
Cisco Secure
ACS for
Windows Server
Cisco Secure
ACS Solution
Engine
Remote Client
1.
2.
3.
4.
The client establishes a connection with the router.
The router prompts the user for a username and password.
The router passes the username and password to the Cisco Secure ACS (server or
engine).
The Cisco Secure ACS authenticates the user. The user is authorized to access
the router (administrative access) or the network based on information found in
the Cisco Secure ACS database.
ite
xa
m
pr
ne
t
5
Plik z chomika:
qfx
Inne pliki z tego folderu:
Section 3 - Lecture 17 - TWO FACTOR AUTHENTICATION ON AN ASA FIREWALL.mp4
(36464 KB)
Section 3 - Lecture 18 - INTRODUCTION TO WPA ENTERPRISE (802.1X WIRELESS).mp4
(29535 KB)
Section 3 - Lecture 22 - AUTHENTCATION - AAA - DOCUMENT.pdf
(445 KB)
Inne foldery tego chomika:
Section 1 - Introduction to the series
Section 2 - Basic CCNA Security and Network Security Concepts
Section 4 - ASA Firewalls - real world labs
Section 5 - Virtual Private Networks (VPNs) - real world labs
Section 6 - Monitoring
Zgłoś jeśli
naruszono regulamin