
16-9
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Chapter 16 Applying AAA for Network Access
Configuring Authorization for Network Access
The downloaded ACL on the security appliance consists of the following lines:
access-list #ACSACL#-ip-acs_ten_acl-3b5385f7 permit tcp any host 10.0.0.254
access-list #ACSACL#-ip-acs_ten_acl-3b5385f7 permit udp any host 10.0.0.254
access-list #ACSACL#-ip-acs_ten_acl-3b5385f7 permit icmp any host 10.0.0.254
access-list #ACSACL#-ip-acs_ten_acl-3b5385f7 permit tcp any host 10.0.0.253
access-list #ACSACL#-ip-acs_ten_acl-3b5385f7 permit udp any host 10.0.0.253
access-list #ACSACL#-ip-acs_ten_acl-3b5385f7 permit icmp any host 10.0.0.253
access-list #ACSACL#-ip-acs_ten_acl-3b5385f7 permit tcp any host 10.0.0.252
access-list #ACSACL#-ip-acs_ten_acl-3b5385f7 permit udp any host 10.0.0.252
access-list #ACSACL#-ip-acs_ten_acl-3b5385f7 permit icmp any host 10.0.0.252
access-list #ACSACL#-ip-acs_ten_acl-3b5385f7 permit ip any any
Configuring Any RADIUS Server for Downloadable ACLs
You can configure any RADIUS server that supports Cisco IOS RADIUS VSAs to send user-specific
ACLs to the security appliance in a Cisco IOS RADIUS cisco-av-pair VSA (VSA number 1). Cisco IOS
RADIUS VSAs are identified by RADIUS vendor ID 9.
In the cisco-av-pair VSA, configure one or more ACEs that are similar to the access-list extended
command (see the “Adding an Extended Access List” section on page 13-9), except that you replace the
following command prefix:
access-list
acl_name
extended
with the following text:
ip:inacl#
nnn
=
The nnn argument is a number in the range from 0 to 999999999 that identifies the order of the command
statement to be configured on the security appliance. If this parameter is omitted, the sequence value is
0, and the order of the ACEs inside the cisco-av-pair RADIUS VSA is used.
The following example is an ACL definition as it should be configured for a cisco-av-pair VSA on a
RADIUS server:
ip:inacl#1=permit tcp 10.1.0.0 255.0.0.0 10.0.0.0 255.0.0.0
ip:inacl#99=deny tcp any any
ip:inacl#2=permit udp 10.1.0.0 255.0.0.0 10.0.0.0 255.0.0.0
ip:inacl#100=deny udp any any
ip:inacl#3=permit icmp 10.1.0.0 255.0.0.0 10.0.0.0 255.0.0.0
For information about making unique per user the ACLs that are sent in the cisco-av-pair attribute, see
the documentation for your RADIUS server.
On the security appliance, the downloaded ACL name has the following format:
AAA-user-
username
The username argument is the name of the user that is being authenticated.
The downloaded ACL on the security appliance consists of the following lines. Notice the order based
on the numbers identified on the RADIUS server.
access-list AAA-user-bcham34-79AD4A08 permit tcp 10.1.0.0 255.0.0.0 10.0.0.0 255.0.0.0
access-list AAA-user-bcham34-79AD4A08 permit udp 10.1.0.0 255.0.0.0 10.0.0.0 255.0.0.0
access-list AAA-user-bcham34-79AD4A08 permit icmp 10.1.0.0 255.0.0.0 10.0.0.0 255.0.0.0
access-list AAA-user-bcham34-79AD4A08 deny tcp any any
access-list AAA-user-bcham34-79AD4A08 deny udp any any
Kommentare zu diesen Handbüchern