Configuring NTLM Authentication on the Cisco 4000 Series ISRs
Information about NTLM Basic Authentication
Configuring the NTLM Authentication
Transparent Authentication with NTLM
Network/IP-Based Authentication Bypass
Browser-Based Authentication Bypass
Authentication Failure and Watch-list behaviour
IP HTTP Server and IP HTTP Secure-Server
Nested LDAP with NTLM Authentication
Feature Information for NTLM Authentication on the Cisco 4000 Series ISR
This document describes how to configure NTLM Authentication on Cisco 4000 Series ISRs. The Cisco 4000 Series ISRs with NTLM Authentication and Cloud Web Security solution can enable branch offices to intelligently redirect web traffic to the cloud to enforce granular security policies over user web traffic. With this solution, you can deploy market-leading web security quickly and easily to protect branch office users from web-based threats such as viruses, while saving bandwidth, money, and resources.
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Cisco 4000 Series ISR uses Windows NT Lan Manager (NTLM) to retrieve user credentials transparently from the client application without prompting end users for authentication. If the client application cannot send user credentials transparently, Cisco 4000 Series ISR prompts users to enter credentials. When using NTLM authentication, you can choose two modes: active or passive. The default mode for NTLM authentication is active. To enable passive mode, configure the command ip admission name rule1 ntlm passive.
In NTLM active mode, Cisco 4000 Series routers gather both the username and password from the client during the TCP handshake process and verify these against the Active Directory domain controller. In NTLM passive mode, Cisco 4000 Series routers only query for the user group information and do not verify the password, which reduces the number of transactions between Cisco 4000 Series routers and the domain controller.
To configure the NTLM authentication, perform these steps.
4. ldap server ldap-server-name
7. search-filter user-object-type top
10. aaa group server ldap group-name
12. aaa authentication login default group group-name
13. aaa authorization network default group group-name
14. ip admission name admission-name ntlm | passive | list access-list | absolute-timer absolute-time in minutes | inactivity-time inactivity-time in minutes |
15. ip admission virtual-ip ip-address virtual-host hostname
17. ip admission admission-name
21. ip admission absolute-timer absolute-time in minutes
22. ip admission inactivity-timer inactivity-time in minutes
23. ip admission init-state-time init-state-time in minutes
Users are transparently authenticated by using NTLM when they access the web using a web browsers on the Windows operating system. For example, users are transparently authenticated through Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome on Windows; however, the users are prompted for authentication credentials when using Apple Safari on an Apple Macintosh or Opera on any operating system.
To ensure that users are transparently authenticated using Microsoft Internet Explorer, Mozilla Firefox, and Chrome on the Windows operating system, perform the following steps:
1. Define a virtual-ip and a virtual-host (resolvable to virtual-ip) on the Cisco 4000 Series ISR using the ip admission command.
Note You can specify a single-word hostname as the virtual-host. The virtual-ip must not be used by any other device or configured on the Cisco 4000 Series ISR.
2. Configure the third-party software to ensure it transparently authenticates users using the virtual-host.
– If a virtual-host is defined, you can create a DNS A record resolving the virtual-host specified in Step 1 (webproxy) to the virtual-ip specified in Step1 (10.1.1.1).This method works because Internet Explorer and Chrome consider a single word hostname as a local intranet server. Or
– Add the the virtual-ip/virtual-host to the Internet Explorer Local Intranet Zone. If only the virtual-ip is defined, then add its IP address (for example, http://10.1.1.1) to the Local Intranet Zone. If the virtual-host is defined, then add its hostname (for example, http://webproxy) to the Local Intranet Zone. For more information on adding a URL to the Internet Explorer Local Intranet Zone, see the Internet Explorer documentation.
Use network/IP-based or browser-based authentication bypass to disable the authentication for users.
To configure Cisco 4000 Series ISR router to bypass authentication for certain subnets and users, you must either know the IP addresses of the users you do want to authenticate, or the IP addresses of users you do not want to authenticate. Create an ACL to permit user authentication or deny user authentication. The ACL rule must associated with the ip admission command.
The following example shows how to authenticate users whose IP addresses are known:
The following example shows how not to authenticate users whose IP addresses are known:
Note This configuration is mostly used only in proof-of-concept or pilot phases where only a subset of users access Cisco Cloud Web Security. For production deployments, typically all corporate users are asked for authentication. For guest users, it is recommended to have a separate VLAN or a network that does not apply authentication. The bypass authentication configuration should only be used if a separate guest VLAN/network is not possible.
Transparent authentication can be done through NTLM authentication. However, some web browsers that do not support transparent NTLM authentication, such as Mozilla Firefox or Apple Safari, will use authentication prompts.
The Browser-Based Authentication Bypass features uses the user agent string sent by the web browser to bypass authentication. A list of user agent strings can be configured on the Cisco 4000 Series ISRs. Before the authentication, the Cisco 4000 Series ISRs checks if the user agent string from a user’s device matches the configured list. If there is a match, authentication is bypassed, and the user can access the Internet with guest Cloud Web Security policies. If there is no match, user authentication is required. Web browsers that support transparent NTLM authentication, the authentication happens in the background, and users are not prompted for credentials.
The Cisco 4000 Series ISR does a match on the user agent string configured with the user agent string sent by the web browser. Web browsers may change the user agent string that is used to identify the browser. As a best practice, the Network administrators should periodically update the list of user agent strings on the Cisco 4000 Series ISR router. To find the user agent string that your web browser is sending, go to http://whatsmyuseragent.com. A list of user agent strings is also available at http://techpatterns.com/forums/about304.html
A sample user agent string for an iPad 3 would be the following: “Mozilla/5.0 (iPad; CPU OS 5_1 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko) Version/5.1 Mobile/9B176 Safari/7534.48.3”Typically most smartphones or tablets have the following user agent strings:
Use the commands below to configure browser based authentication bypass rule along with NTLM rule:
The following is a sample parameter map (to match common bring-your-own devices) that uses the user agent strings given above:
If a user fails authentication, the configured guest access policies are applied. The following are the causes of user authentication failures:
Default guest access is enabled by default. However, you can configure the maximum number of login attempts that are required before a user can fall back to the default guest access policy. The default maximum login attempt value is 5. This means that a user must fail five consecutive login attempts before falling back to the default access policy.
To change the maximum login attempt value, configure the following command:
While determining the maximum login attempt value, understand the risks of corporate users entering wrong username and password. If the value is too less, some corporate users may be moved to the default guest policy with the multiple authentication pop-up messages. We recommend that you configure a maximum login attempt value of at least two to prevent corporate users from being authenticated as guests very often.
If a user fails authentication multiple times and max-login-attempts expire, that user is authenticated as a guest user and gets guest access. If watch-list is enabled as below:
ip admission watch-list enable
that user is added to the watch-list and the session state will be shown as SERVICE_DENIED. The user entry will be there in watch-list and the session state will remain in SERVICE_DENIED state for a default of 2 minutes, after which the session will be moved to the INIT state and the user will once again be prompted for credentials. Adjusting the time between authentication prompts can be adjusted by configuring the watch-list timeout as below:
ip admission watch-list expiry-time [ time in minutes ]
For example, to ensure the user does not get re-prompted for credentials for 24 hours, configure the following:
ip admission watch-list expiry-time 1440
We recommend not to set the watch-list expiry timer to a very high value so that users are not prompted for credentials frequently. Setting zero (time of forever) is also not recommended as the user is never prompted for authentication and will not have granular user policies applied.
Domain users who use transparent Windows NT Lan Manager (NTLM) authentication with supported browsers cannot login to the domain with invalid credentials. Because the device/domain will not let a user login to a network with invalid credentials, the domain will always have the correct username and user group, which ensures that the user always receives the granular user policies defined in the Cloud Web Security portal. If the password of a user expires, the user must log off and relogin to the domain with the new password.
The default guest access policy is available to users who use non-transparent NTLM authentication methods and fail authentication.
The following users are considered as non-domain users:
During authentication, non-domain users must specify the domain name (cisco\user1) and the password. If a user enters only the username and password, the client PC considers the hostname/computer name as the domain name and the user may not be authenticated, even when proper credentials were given.
For example, a corporate user User1 who uses a Mozilla Firefox web browser (that does not support transparent NTLM authentication by default) belongs to the “humanresources” domain. User1 must log into the domain with the username “humanresources\user1” to be recognized as a corporate user who has access to corporate policies configured on Cloud Web Security. If User1 logs in as just "user1", the user is authenticated as a guest user and only the default policy is applied.
When you enable the ip http server alone, HTTP requests will get intercepted for authentication and HTTPS request will pass through. Authentication that happens over HTTP is not secured. When you enable the ip http secure-server alone, HTTPS requests will get intercepted for authentication and HTTP requests will pass through. Authentication that happens over HTTPS is secured.
When you enable both ip http server and ip http secure-server, then both HTTP and HTTPS requests will get intercepted for authentication and authentication that happens over HTTPS and is secured. In this case, authentication happens over HTTPS even for HTTP requests.
With this support, the LDAP client module can fetch both direct and nested user-group information for a user.
An LDAP search query retrieves the authorization profile of a user from an LDAP server to find direct user group members. Each of these direct user groups can be part of multiple groups and thus form a nested-user group.
Nested-level search will only occur within the base domain scope specified in the LDAP server configuration. When nested LDAP is enabled, it is important to note that performance is directly related to the level of nested depths and users in the AD domain. Nested LDAP lookup requires a recursive search through the AD Domain until the last node is found and therefore may introduce latency in the authentication process compared to non-nested LDAP search. For optimal performance, a nested AD depth of no more than 4-5 levels is recommended.
The following is a sample configuration on Cisco 4000 Series ISRs with NTLM authentication:
The following example shows how to display ip admission cache information:
The following example shows how to display ip admission detail information for a particular client session:
To locate and download MIBs for selected platforms, Cisco IOS releases and feature sets, use Cisco MIB locator http://www.cisco.com/go/mibs |
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator www.cisco.com/go/cfn to find information about platform support and Cisco software image support. An account on Cisco.com is not required.