Configure ASR9K TACACS with ISE

Reference

本文章是自己配置ISE过程的总结,主要参考的是上面文章, 其中最主要的是第一篇(知乎),我认为是最全的ISE配置介绍。

ISE Setup(3.1)

ISE启用设备管理

Administration->System->Deployment

关闭系统密码策略

Administration->System->Admin Access->Authentication->Password Policy

取消所有的选项。

关闭网络设备用户认证的密码策略

Administration-> Identity Management -> Settings ->User Authentication Settings ->Password Policy

添加网络设备

Administration-> Network Resources -> Network Devices

创建用户组/用户

Administration->Identity Management ->User Identity Groups

新创建两个组,Admin和read_only.

Administration->Identity Management ->Identities

创建两个用户, 并加入之前创建的两个组中.

TACACS 认证授权

认证

Work Centers -> Device Administration ->Device Admin Policy Sets -> Policy Sets

认证保持默认的default 策略, All_User_ID_Stores

授权

我们需要先去创建几个授权策略, 路径: Work Centers -> Device Administration ->Policy Elements -> Results – >Tacacs Command Sets /Tacacs Profiles

Tacacs Profiles

Profiles 来定义用户属于哪个权限组,比如如下创建两个profile, tacacs_1和tacacs_2

以tacacs_15为例,Value字段为“#priv15”, #号后面代表的usergroup name, 是IOS XR设备上客户自定义的usergroup name.

参考配置案例

当然你可以使用设备本身存在的一些usergroup, 如#sysadmin, #root-system等

RP/0/RSP0/CPU0:ASR9001-B#show aaa usergroup ?
  |              Output Modifiers
  priv1          Name of the usergroup
  priv2          Name of the usergroup
  priv5          Name of the usergroup
  priv6          Name of the usergroup
  priv10         Name of the usergroup
  priv15         Name of the usergroup
  root-lr        Name of the usergroup
  netadmin       Name of the usergroup
  operator       Name of the usergroup
  sysadmin       Name of the usergroup
  ugtestct       Name of the usergroup
  retrieval      Name of the usergroup
  maintenance    Name of the usergroup
  root-system    Name of the usergroup
  provisioning   Name of the usergroup
  read-only-tg   Name of the usergroup
  serviceadmin   Name of the usergroup
  cisco-support  Name of the usergroup
  WORD           Name of the usergroup
Tacacs Command Sets

Command Sets是在profile的基础上再次定义哪些命令你可执行,或不可执行。

如下我们配置几个command sets测试, deny all/permit all/others

Arguments 可以使用正则表达式
授权关联Profile

Work Centers -> Device Administration ->Device Admin Policy Sets -> Policy Sets

“Insert New Row above”, 创建两个policy.

“Conditions”我们用之前创建的用户组来区分,比如用户组属于read_only和Admin, 我们可以分别设置profile 和command set.

验证:

#priv1, “show bgp ipv4 unicast” 这个命令被command_set deny 掉了。

RP/0/RSP0/CPU0:ASR9001-B#show user group 
Mon Feb 21 04:11:30.571 UTC
priv1
RP/0/RSP0/CPU0:ASR9001-B#show user tasks 
Mon Feb 21 04:11:35.231 UTC
Task:       basic-services  : READ    WRITE    EXECUTE         
Task:                  bgp  : READ                             
Task:            interface  : READ                             
Task:                 ipv4  : READ                             
Task:                 isis  : READ                             
RP/0/RSP0/CPU0:ASR9001-B#     
RP/0/RSP0/CPU0:ASR9001-B#show bgp ipv4 unicast 
Command authorization failed
% Incomplete command.
RP/0/RSP0/CPU0:ASR9001-B#show bgp summary 
Mon Feb 21 04:29:56.690 UTC
BGP router identifier 11.1.1.1, local AS number 64072
BGP generic scan interval 60 secs
Non-stop routing is enabled
BGP table state: Active
Table ID: 0xe0000000   RD version: 4
BGP main routing table version 4
BGP NSR Initial initsync version 4294967295 (Not Reached)
BGP NSR/ISSU Sync-Group versions 0/0
BGP scan interval 60 secs

BGP is operating in STANDALONE mode.


Process       RcvTblVer   bRIB/RIB   LabelVer  ImportVer  SendTblVer  StandbyVer
Speaker               4          1          4          0           1           0

Neighbor        Spk    AS MsgRcvd MsgSent   TblVer  InQ OutQ  Up/Down  St/PfxRcd
100.1.12.1        0 18084       0       0        0    0    0 00:00:00 Idle
172.16.10.161     0 18084       0       0        0    0    0 00:00:00 Idle

RP/0/RSP0/CPU0:ASR9001-B#

#priv15

RP/0/RSP0/CPU0:ASR9001-B#show user group 
Mon Feb 21 04:29:08.725 UTC
priv15
RP/0/RSP0/CPU0:ASR9001-B#show us
usb  user  users  
RP/0/RSP0/CPU0:ASR9001-B#show user
user  users  
RP/0/RSP0/CPU0:ASR9001-B#show user tasks 
Mon Feb 21 04:29:14.366 UTC
Task:                  aaa  : READ    WRITE    EXECUTE    DEBUG
Task:                  acl  : READ    WRITE    EXECUTE    DEBUG
Task:                admin  : READ    WRITE    EXECUTE    DEBUG
<snip>
Task:                 vpdn  : READ    WRITE    EXECUTE    DEBUG
Task:                 vrrp  : READ    WRITE    EXECUTE    DEBUG
RP/0/RSP0/CPU0:ASR9001-B#
           

No comments

Comments feed for this article

Reply

Your email address will not be published. Required fields are marked *