Cisco ASA Series Cli Configuration Manual page 1042

Software version 9.0 for the services module
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

Configuring Authorization for Network Access
Configuring Authorization for Network Access
After a user authenticates for a given connection, the ASA can use authorization to further control traffic
from the user.
This section includes the following topics:
Configuring TACACS+ Authorization
You can configure the ASA to perform network access authorization with TACACS+. You identify the
traffic to be authorized by specifying access lists that authorization rules must match. Alternatively, you
can identify the traffic directly in authorization rules themselves.
Tip
Using access lists to identify traffic to be authorized can greatly reduced the number of authorization
commands that you must enter. This is because each authorization rule that you enter can specify only
one source and destination subnet and service, whereas an access list can include many entries.
Authentication and authorization statements are independent; however, any unauthenticated traffic
matched by an authorization rule will be denied. For authorization to succeed:
1.
2.
3.
4.
5.
See the documentation for your TACACS+ server for information about configuring network access
authorizations for a user.
Cisco ASA Series CLI Configuration Guide
1-14
Configuring TACACS+ Authorization, page 1-14
Configuring RADIUS Authorization, page 1-17
A user must first authenticate with the ASA.
Because a user at a given IP address only needs to authenticate one time for all rules and types, if
the authentication session has not expired, authorization can occur even if the traffic is not matched
by an authentication rule.
After a user authenticates, the ASA checks the authorization rules for matching traffic.
If the traffic matches the authorization rule, the ASA sends the username to the TACACS+ server.
The TACACS+ server responds to the ASA with a permit or a deny for that traffic, based on the user
profile.
The ASA enforces the authorization rule in the response.
Chapter 1
Configuring AAA Rules for Network Access

Advertisement

Table of Contents
loading

Table of Contents