06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 9 System Configuration: Authentication and Certificates<br />

Provisioning Modes<br />

Types of PACs<br />

OL-14386-02<br />

About Certification and EAP Protocols<br />

Regardless of the master key TTL values that you define, a user will require PAC provisioning when the<br />

user does not use EAP-FAST to access the network be<strong>for</strong>e the master key that generated the user’s PAC<br />

has expired. For example, if the master key TTL is one week old and the retired master key TTL is one<br />

week old, each EAP-FAST end-user client used by someone who goes on vacation <strong>for</strong> two weeks will<br />

require PAC provisioning.<br />

ACS supports out-of-band and in-band provisioning modes. The in-band provisioning mode operates<br />

inside an Authenticated Diffie-Hellman Key Agreement Protocol (ADHP) tunnel be<strong>for</strong>e the peer<br />

authenticates the ACS server.<br />

Since an unauthenticated server is provisioned, it is not possible to use a plain text password; so only<br />

MS-CHAP credentials can be used inside the tunnel. MS-CHAPv2 is used to prove the peer's identity<br />

and receives a PAC <strong>for</strong> further authentication sessions. This method minimizes the risk of exposing the<br />

user's credentials.<br />

EAP-FAST has been enhanced to support an authenticated tunnel (using the server certificate) inside<br />

which PAC provisioning occurs. The new cipher suites that are enhancements to EAP-FAST and<br />

specifically the server certificate are used.<br />

Since the server is authenticated as part of setting up the tunnel, weaker EAP methods, such EAP-GTC<br />

can be used inside the tunnel to provide supplicant authentication.<br />

At the end of a provisioning session that uses an authenticated tunnel, network access can be granted;<br />

since the server and user have authenticated each other.<br />

ACS supports the following EAP types inside the tunnel <strong>for</strong> provisioning:<br />

EAP-GTC<br />

EAP-MS-CHAPv2<br />

EAP-TLS<br />

Note By default, when using the EAP-GTC and EAP-MSCHAP inner methods, ACS allows up to<br />

three additional authentication attempts inside the SSL tunnel if the initial authentication<br />

attempt fails. After the fourth failed authentication attempt inside the SSL tunnel, ACS will<br />

terminate the EAP conversation, resulting in a RADIUS <strong>Access</strong>-Reject.<br />

ACS provisions supplicants with a PAC that contains a shared secret that is used in building a TLS tunnel<br />

between the supplicant and ACS. ACS provisions supplicants with PAC that have a wider contextual use.<br />

The following types of PACs are provisioned to ACS, as per server policies:<br />

Tunnel (Shared Secret) PAC, user or machine—Distributed shared secret between the peer and<br />

ACS that is used to establish a secure tunnel and convey the policy of what must and can occur in<br />

the tunnel. The policy can include EAP methods, TLV exchanges, and identities that are allowed in<br />

the tunnel. It is up to the server policy to include what's necessary in PAC to en<strong>for</strong>ce the policy in<br />

subsequent authentications that use the PAC. For example, in EAP-FAST Protocol Version 1, user<br />

identity I-ID is included as the part of the server policy. It limits the inner EAP methods to be carried<br />

only on the user identity that is provisioned. Other types of in<strong>for</strong>mation can also be included, such<br />

as which EAP method and which cipher suite is allowed, <strong>for</strong> example. If the server policy is not<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

9-13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!