06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

About Certification and EAP Protocols<br />

PEAP Authentication<br />

About the PEAP Protocol<br />

9-6<br />

The ACS host validates the client credentials as follows:<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

Chapter 9 System Configuration: Authentication and Certificates<br />

If the NAP agent sends a list of SoHs, the ACS sends the list to a Microsoft Network Policy <strong>Server</strong><br />

(NPS) by using the <strong>Cisco</strong> Host Credentials Authorization Protocol (HCAP). The NPS evaluates the<br />

SoHs. The ACS then sends an appropriate network access profile to the network access device<br />

(switch, router, VPN, and so on) to grant the authorized level of access to the client.<br />

If the NAP agent sends a health certificate rather than a list of SoHs, then ACS validates the<br />

certificate as the EAP-FAST session is established to determine the overall health state of the client.<br />

The ACS then sends the appropriate network access profile to the network to grant the authorized<br />

level of access to the client.<br />

You can configure ACS to process access requests from NAP clients by setting up one or more network<br />

access profiles that customize ACS to operate in the NAC/NAP environment. For details on how to<br />

configure ACS to function in a NAC/NAP environment, refer to Chapter 9 of the Configuration <strong>Guide</strong><br />

<strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> ACS 4.2, “NAC/NAP Configuration Scenario.”<br />

This section contains:<br />

About the PEAP Protocol, page 9-6<br />

PEAP and ACS, page 9-7<br />

PEAP and the Unknown <strong>User</strong> Policy, page 9-8<br />

Enabling PEAP Authentication, page 9-8<br />

The PEAP protocol is a client-server security architecture that you use to encrypt EAP transactions;<br />

thereby protecting the contents of EAP authentications.<br />

PEAP authentications always involve two phases:<br />

In phase1, the end-user client authenticates ACS. This action requires a server certificate and<br />

authenticates ACS to the end-user client, ensuring that the user or machine credentials sent in phase<br />

two are sent to a AAA server that has a certificate issued by a trusted CA. The first phase uses a TLS<br />

handshake to establish an SSL tunnel between the end-user client and the AAA server.<br />

Note Depending on the end-user client involved, the CA certificate <strong>for</strong> the CA that issued the ACS<br />

server certificate is likely to be required in local storage <strong>for</strong> trusted root CAs on the end-user<br />

client computer.<br />

In the second phase, ACS authenticates the user or machine credentials by using an EAP<br />

authentication protocol. The SSL tunnel that was created in phase1 protects the EAP authentication.<br />

The authentication type that is negotiated during the second conversation may be any valid EAP<br />

type, such as EAP-GTC (<strong>for</strong> Generic Token Card). Because PEAP can support any EAP<br />

authentication protocol, individual combinations of PEAP and EAP protocols are denoted with the<br />

EAP protocol in parentheses, such as PEAP (EAP-GTC). In phase two, PEAP supports the following<br />

authentication protocols:<br />

– EAP-MSCHAPv2<br />

– EAP-GTC<br />

OL-14386-02

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!