- Prerequisites for NAC-Auth Fail Open
- Restrictions for NAC-Auth Fail Open
- Information About Network Admission Control
- How to Configure NAC-Auth Fail Open
- Configuring a NAC Rule-Associated Policy Globally for a Device
- Applying a NAC Policy to a Specific Interface
- Configuring Authentication and Authorization Methods
- Configuring RADIUS Server Parameters
- Displaying the Status of Configured AAA Servers
- Displaying the NAC Configuration
- Displaying the EAPoUDP Configuration
- Enabling EOU Logging
- Configuration Examples for NAC-Auth Fail Open
- Additional References
- Feature Information for NAC-Auth Fail Open
NAC-Auth Fail Open
In network admission control (NAC) deployments, authentication, authorization, and accounting (AAA) servers validate the antivirus status of clients before granting network access. This process is called posture validation. If the AAA server is unreachable, clients do not have access to the network. The NAC--Auth Fail Open feature enables the administrator to apply a policy that allows users to have network access when the AAA server is unreachable. The administrator can configure a global policy that applies to a device, or a rule-based policy that applies to a specific interface.
When the AAA server returns to a reachable status, the posture validation process resumes for clients that are using the NAC--Auth Fail Open policy.
Prerequisites for NAC-Auth Fail Open
You can configure this feature in networks using NAC and an AAA server for security. NAC is implemented on Cisco IOS routers running Cisco IOS Release 12.3(8)T or a later release.
Restrictions for NAC-Auth Fail Open
To apply local policies to a device or an interface when the AAA server is unreachable, you must configure the aaa authorization network default local command.
Information About Network Admission Control
Controlling Admission to a Network
NAC protects networks from endpoint devices or clients (such as PCs or servers) that are infected with viruses by enforcing access control policies that prevent infected devices from adversely affecting the network. It checks the antivirus condition (called posture ) of endpoint systems or clients before granting the devices network access. NAC keeps insecure nodes from infecting the network by denying access to noncompliant devices, placing them in a quarantined network segment or giving them restricted access to computing resources.
NAC enables network access devices (NADs) to permit or deny network hosts access to the network based on the state of the antivirus software on the host. This process is called posture validation.
Posture validation consists of the following actions:
- Checking the antivirus condition or credentials of the client.
- Evaluating the security posture credentials from the network client.
- Providing the appropriate network access policy to the NAD based on the system posture.
Network Admission Control When the AAA Server Is Unreachable
Typical deployments of NAC use a AAA server to validate the client posture and to pass policies to the NAD. If the AAA server is not reachable when the posture validation occurs, the typical response is to deny network access. Using NAC--Auth Fail Open, an administrator can configure a default policy that allows the host at least limited network access while the AAA server is unreachable.
This policy offers these two advantages:
- While AAA is unavailable, the host continues to have connectivity to the network, although it may be restricted.
- When the AAA server is once again reachable, users can be validated again, and their policies can be downloaded from the access control server (ACS).
Note |
When the AAA server is unreachable, the NAC--Auth Fail Open policy is applied only when there is no existing policy associated with the host. Typically, when the AAA server becomes unreachable during revalidation, the policies already in effect for the host are retained. |
How to Configure NAC-Auth Fail Open
You can configure NAC--Auth Fail Open policies per interface, or globally for a device. Configuring NAC--Auth Fail Open is optional, and includes the following tasks:
- Configuring a NAC Rule-Associated Policy Globally for a Device
- Applying a NAC Policy to a Specific Interface
- Configuring Authentication and Authorization Methods
- Configuring RADIUS Server Parameters
- Displaying the Status of Configured AAA Servers
- Displaying the NAC Configuration
- Displaying the EAPoUDP Configuration
- Enabling EOU Logging
Configuring a NAC Rule-Associated Policy Globally for a Device
This task creates a NAC rule and associates a policy to be applied while the AAA server is unreachable. You can apply a policy globally to all interfaces on a network access device, if you want to provide the same level of network access to all users who access that device.
An AAA server must be configured and NAC must be implemented on the NAD.
DETAILED STEPS
Applying a NAC Policy to a Specific Interface
An IP admission rule with NAC--Auth Fail Open policies can be attached to an interface. This task attaches a NAC--Auth Fail Open policy to a rule, and applies the rule to a specified interface on a device.
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
|
Example: Router# configure terminal |
Enters global configuration mode. |
|
Example: Router (config)# interface fastEthernet 2/1 |
Enters interface configuration mode. |
|
Example: Router (config-if)# ip access-group ACL15 in |
Controls access to the specified interface. |
|
Example: Router (config-if)# ip admission AAA_DOWN |
Attaches the globally configured IP admission rule to the specified interface(s). To remove the rule on the interface, use the no form of the command. |
|
Example: Router (config)# exit |
Returns to global configuration mode.
|
Configuring Authentication and Authorization Methods
This task configures the authentication and authorization methods for the device. The access granted using these methods remain in effect for users who attempt reauthorization while the AAA server is unavailable. These methods must be configured before you configure any policy to be applied to users who try to access the network when the AAA server is unreachable.
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
|
Example: Router# configure terminal |
Enters global configuration mode. |
|
Example: Router (config)# aaa new-model |
Enables AAA. |
|
Example: Router (config)# aaa authentication eou default group radius |
Sets authentication methods for Extensible Authorization Protocol over User Datagram Protocol (EAPoUDP). To remove the EAPoUDP authentication methods, use the use the no form of the command. |
|
Example: Router (config)# aaa authorization network default local |
Sets the authorization method to local. To remove the authorization method, use the no form of the command. |
Configuring RADIUS Server Parameters
Identifying the RADIUS Server
A RADIUS server can be identified by:
- hostname
- IP address
- hostname and a specific UDP port number
- IP address and a specific UDP port number
The combination of the RADIUS server IP address and a specific UDP port number creates a unique identifier, which enables RADIUS requests to be sent to multiple UDP ports on a server at the same IP address. If two different host entries on the same RADIUS server are configured for the same service--for example, authentication--the second host entry configured acts as the backup to the first one. The RADIUS host entries are tried in the order that they were configured.
Determining When the RADIUS Server Is Unavailable
Because the NAC--Auth Fail Open feature applies a local policy when the RADIUS server is unavailable, you should configure "dead criteria" that identify when the RADIUS server is unavailable. There are two configurable dead criteria:
- time--the interval (in seconds) without a response to a request for AAA service
- tries--the number of consecutive AAA service requests without a response
If you do not configure the dead criteria, they are calculated dynamically, based on the server configuration and the number of requests being sent to the server.
You can also configure the number of minutes to wait before attempting to resume communication with a RADIUS server after it has been defined as unavailable.
DETAILED STEPS
Command or Action | Purpose | |||||
---|---|---|---|---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
||||
|
Example: Router# configure terminal |
Enters global configuration mode. |
||||
|
Example: Router (config)# radius-server dead-criteria time 30 tries 20 Example:
|
(Optional) Sets the conditions that are used to decide when a RADIUS server is considered unavailable or dead .
|
||||
|
Example: Router (config)# radius-server deadtime 60 |
(Optional) Sets the number of minutes that a RADIUS server is not sent requests after it is found to be dead. The range is from 0 to 1440 minutes (24 hours). The default is 0 minutes. |
||||
|
Example: Router (config)# radius-server host 10.0.0.2 acct-port 1550 auth-port 1560 test username user1 idle-time 30 key abc1234 Example:
|
(Optional) Configures the RADIUS server parameters by using these keywords:
To configure multiple RADIUS servers, reenter this command. |
||||
|
Example: Router (config)# radius-server attribute 8 include-in-access-req |
If the device is connected to nonresponsive hosts, configures the device to send the Framed-IP-Address RADIUS attribute (attribute[8]) in access-request or accounting-request packets. To configure the device to not send the Framed-IP-Address attribute, use the no radius-server attribute 8 include-in-access-req global configuration command. |
||||
|
Example: Router (config)# radius-server vsa send authentication |
Configures the network access server to recognize and use vendor-specific attributes (VSAs). |
||||
|
Example: Router (config)# end |
Returns to privileged EXEC mode. |
Displaying the Status of Configured AAA Servers
This task displays the status of the AAA servers you have configured for the device.
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
|
Example: Router# show aaa servers |
Displays the status of the AAA servers configured for the device. |
Displaying the NAC Configuration
This task displays the current NAC configuration for the device.
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
|
Example: Router# show ip admission configuration |
Displays all the IP admission control rules configured for the device. |
Displaying the EAPoUDP Configuration
This task displays information about the current EAPoUDP configuration for the device, including any NAC--Auth Fail Open policies in effect.
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
|
Example: Router# show eou ip 10.0.0.1 |
Displays information about the EAPoUDP configuration for the specified interface. |
Enabling EOU Logging
A set of new system logs is included in Cisco IOS Release 12.4(11)T. These new logs track the status of the servers defined by the methodlist, and the NAC Auth Fail policy configuration. You should enable EOU logging to generate syslog messages that notify you when the AAA servers defined by the methodlist are unavailable, and display the configuration of the NAC--Auth Fail Open policy. The display shows whether a global or rule-specific policy is configured for the NAD or interface. If no policy is configured, the existing policy is retained.
This task enables EOU logging.
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router# configure terminal |
Enters global configuration mode. |
|
Example: Router (config) # eou logging |
Enables EOU logging. |
Configuration Examples for NAC-Auth Fail Open
- Sample NAC-Auth Fail Open Configuration Example
- Sample RADIUS Server Configuration Example
- show ip admission configuration Output Example
- show eou Output Example
- show aaa servers Output Example
- EOU Logging Output Example
Sample NAC-Auth Fail Open Configuration Example
The example below shows how to configure the NAC--Auth Fail Open feature:
Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# ip admission name AAA_DOWN eapoudp event timeout aaa policy identity global_policy Switch(config)# aaa new-model Switch(config)# aaa authorization network default local Switch(config)# aaa authentication eou default group radius Switch(config)# identity policy global_policy Switch(config-identity-policy)# ac Switch(config-identity-policy)# access-group global_acl Switch(config)# ip access-list extended global_acl Switch(config-ext-nacl)# permit ip any any Switch(config-ext-nacl)# exit
Sample RADIUS Server Configuration Example
The example below shows that the RADIUS server is considered unreachable after 3 unsuccessful tries:
Switch(config)# radius-server host 10.0.0.4 test username administrator idle-time 1 key sample Switch(config)# radius-server dead-criteria tries 3 Switch(config)# radius-server deadtime 30 Switch(config)# radius-server vsa send authentication Switch(config)# radius-server attribute 8 include-in-access-req Switch(config)# int fastEthernet 2/1 3 Switch(config-if)# ip admission AAA_DOWN Switch(config-if)# exit
show ip admission configuration Output Example
The following example shows that a policy called "global policy" has been configured for use when the AAA server is unreachable:
Switch# show ip admission configuration
Authentication global cache time is 60 minutes Authentication global absolute time is 0
minutes Authentication global init state time is 2 minutes Authentication Proxy Watch-list
is disabled
Authentication Proxy Rule Configuration
Auth-proxy name AAA_DOWN
eapoudp list not specified auth-cache-time 60 minutes
Identity policy name global_policy for AAA fail policy
show eou Output Example
The example below shows the configuration of the AAA servers defined for a NAC--Auth Fail policy configuration:
Router# show eou ip 10.0.0.1 Address : 10.0.0.1 MAC Address : 0001.027c.f364 Interface : Vlan333 ! Authtype is show as AAA DOWN when in AAA is not reachable. AuthType : AAA DOWN ! AAA Down policy name: AAA Down policy : rule_policy Audit Session ID : 00000000011C11830000000311000001 PostureToken : ------- Age(min) : 0 URL Redirect : NO URL REDIRECT URL Redirect ACL : NO URL REDIRECT ACL ACL Name : rule_acl Tag Name : NO TAG NAME User Name : UNKNOWN USER Revalidation Period : 500 Seconds Status Query Period : 300 Seconds Current State : AAA DOWN
show aaa servers Output Example
The example below shows sample status information for a configured AAA server:
Switch# show aaa servers
RADIUS: id 1, priority 1, host 10.0.0.4, auth-port 1645, acct-port 1646
State: current UP, duration 5122s, previous duration 9s
Dead: total time 79s, count 3
Authen: request 158, timeouts 14
Response: unexpected 1, server error 0, incorrect 0, time 180ms
Transaction: success 144, failure 1
Author: request 0, timeouts 0
Response: unexpected 0, server error 0, incorrect 0, time 0ms
Transaction: success 0, failure 0
Account: request 0, timeouts 0
Response: unexpected 0, server error 0, incorrect 0, time 0ms
Transaction: success 0, failure 0
Elapsed time since counters last cleared: 2h13mS
EOU Logging Output Example
The example below shows the display when EOU logging is enabled:
Router (config)# eou logging EOU-5-AAA_DOWN: AAA unreachable. METHODLIST=Default| HOST=17.0.0.1| POLICY=Existing policy retained. EOU-5-AAA_DOWN: AAA unreachable. METHODLIST=Default| HOST=17.0.0.1| POLICY=aaa_unreachable_policy
Additional References
Related Documents
Related Topic |
Document Title |
---|---|
Configuring NAC |
Network Admission Control module. |
Security commands |
Cisco IOS Security Command Reference |
Standards
Standard |
Title |
---|---|
IEEE 802.1x |
IEEE Standard 802.1X - 2004 Port-Based Network Access Control |
MIBs
MIB |
MIBs Link |
---|---|
None. |
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: |
Technical Assistance
Description |
Link |
---|---|
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password. |
Feature Information for NAC-Auth Fail Open
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 1 | Feature Information for NAC--Auth Fail Open |
Feature Name |
Releases |
Feature Information |
---|---|---|
NAC--Auth Fail Open |
12.3(8)T |
In network admission control (NAC) deployments, authentication, authorization, and accounting (AAA) servers validate the antivirus status of clients before granting network access. This process is called posture validation. If the AAA server is unreachable, clients do not have access to the network. The NAC--Auth Fail Open feature enables the administrator to apply a policy that allows users to have network access when the AAA server is unreachable. The administrator can configure a global policy that applies to a device, or a rule-based policy that applies to a specific interface. When the AAA server returns to a reachable status, the posture validation process resumes for clients that are using the NAC--Auth Fail Open policy. This feature was introduced in Cisco IOS Release 12.3(8)T. The following commands were introduced or modified: ip admission, ip admission name, show eou, show ip admission |
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.