06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 14 Network <strong>Access</strong> Profiles<br />

Table 14-3 Posture Validation <strong>for</strong> NAC Layer 3 IP Sample<br />

Section Object Value<br />

Internal<br />

posture policy<br />

NAC L2 IP<br />

OL-14386-02<br />

NAC-SAMPLE-CTA-<br />

POLICY<br />

Condition System Posture<br />

Token<br />

Rule 1 <strong>Cisco</strong>:PA:PA-Name<br />

contains CTA and<br />

<strong>Cisco</strong>:PA:PA-Version >=1.0<br />

<strong>Cisco</strong>:PA:Healthy N/A<br />

Default N/A <strong>Cisco</strong>:PA:Quarantine N/A<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

Using Profile Templates<br />

Notification<br />

String<br />

Table 14-4 describes the Shared Profile Components in the NAC Layer 3 IP Sample Profile Template.<br />

Table 14-4 Shared Profile Components <strong>for</strong> NAC Layer 3 IP Sample<br />

Type Object Value<br />

RADIUS NAC-SAMPLE-HEALTHY-L3-RAC [027]Session-Timeout = 36,000<br />

Authorization<br />

Components<br />

[26/9/1]cisc-av-pair status-query-timeout=300<br />

[029] Termination-Action RADIUS-Request (1)<br />

NAC-SAMPLE-QUARANTINE-L3-RA [027]Session-Timeout = 3,600<br />

C<br />

[26/9/1]cisc-av-pair status-query-timeout=30<br />

Downloadable<br />

IP ACLs<br />

[029] Termination-Action RADIUS-Request (1)<br />

NAC-SAMPLE-HEALTHY-ACL ACL Content<br />

Name<br />

Content NAF<br />

NAC-SAMPLE-QUARANTINE-ACL L3-EXAMPLE permit ip any<br />

any<br />

(All-AAA-Clients)<br />

Be<strong>for</strong>e you use this template, ensure that you have checked the Enable EAP Configuration > Allow<br />

Posture Validation option in the Global Authentication Setup page.<br />

You can use NAC Layer 2 IP on an access port on an edge switch to which an endpoint system or client<br />

is connected. The device (host or client) can be a PC, a workstation, or a server that is connected to the<br />

switch access port through a direct connection, an IP phone, a hub, or a wireless access point.<br />

When NAC Layer 2 IP is enabled, UDP only works with IPv4 traffic. The switch checks the antivirus<br />

condition of the endpoint devices or clients and en<strong>for</strong>ces access-control policies.<br />

This template sets Advanced Filtering and Authentication properties with NAC-L2-IP Configuration<br />

automatically.<br />

ACS and AV Pairs<br />

When you enable NAC Layer 2 IP validation, ACS provides NAC AAA services by using RADIUS. ACS<br />

gets in<strong>for</strong>mation about the antivirus credentials of the endpoint system and validates the antivirus<br />

condition of the endpoint.<br />

You can set these Attribute-Value (AV) pairs on ACS by using the RADIUS cisco-av-pair vendorspecific<br />

attributes (VSAs).<br />

14-11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!