First, the experimental topology:
Second, the experimental requirements:
ASA linkage External product ACS to do a certification, in this way control internal user traffic, in fact, can also do authorization, audit.
Sometimes it is inconvenient to grasp the flow control alone, because there may be many users connected to the network, such as General Manager, deputy general Manager, General Staff, so this time to use the user, password to control. Allow logins, different authorizations for different users, and so on.
General authentication can be turned on for 4 high traffic authentication: Http, Https, FTP, Telnet.
1, Hope R2 in remote login R1 time also through a verification, enter the user name password, verify success can log in R1;
2, for inside network access outside network configuration through authentication;
3, the authentication server uses the ACS;
4, adjust the authentication timeout time, absolute timeout time 1 hours, idle timeout time 10 minutes;
5, Effect: R2 Telnet R1 time, will be asked to enter the ACS authentication user name, password, correct after the input R1 real user name, password.
Third, command deployment:
1. Deploy the Aaa-server configuration on the ASA:
ASA (config) # Aaa-server Zhou Protocol Tacacs +
ASA (config-aaa-server-group) # Aaa-server Zhou (DMZ) host 10.1.2.254
ASA (config-aaa-server-host) # Key Zhou
2. ASA Test:
ASA (config) # test aaa-server authentication Zhou username bb password bbbb
Server IP Address or name:10.1.2.254 (timeout:12 seconds)
Info:authentication Successful
Note: first half and 3-authenticated admin access: ACS linkage is the same
3, R2 go to R1 telnet traffic first with an ACL to catch up:
ASA (config) # access-list Tel extended permit TCP host 10.1.1.2 host 202.100.1.1 eq telnet
4. Send the ACL crawl traffic to ACS authentication:
ASA (config) # AAA authentication Match Tel inside Zhou//acs's name is Zhou
Four, verify:
R2 telnet R1:
R2#telnet 202.100.1.1
Trying 202.100.1.1 ... Open
Username:bb
Password:
User Access Verification
Username:aa
Password:
R1>
9-Cisco Firewall: Cut through:telnet Cross Certification