Kerberos Servers
|
7.0(1)
|
Support for Kerberos servers for AAA.
We introduced the following commands:
aaa-server
protocol , max-failed-attempts ,
reactivation-mode , aaa-server
host , kerberos-realm , server-port, clear aaa-server
statistics, clear configure aaa-server, show aaa-server, show
running-config aaa-server, timeout.
|
IPv6 addresses for AAA
|
9.7(1)
|
You can now use either an IPv4 or IPv6 address for the AAA server.
|
Increased limits for AAA server groups and servers per group.
|
9.13(1)
|
You can configure more AAA server groups. In single context mode, you can configure
200 AAA server groups (the former limit was 100). In multiple context mode, you can
configure 8 (the former limit was 4).
In addition, in multiple context mode, you can configure 8 servers per group (the
former limit was 4 servers per group). The single context mode per-group limit of 16
remains unchanged.
We modified the following commands to accept these new limits:
aaa-server , aaa-server host .
|
Kerberos Key Distribution Center (KDC) authentication.
|
9.8(4) and subsequent interim releases until 9.14(1)
|
You can import a keytab file from a Kerberos Key Distribution Center (KDC), and the
system can authenticate that the Kerberos server is not being spoofed before using
it to authenticate users. To accomplish KDC authentication, you must set up a
host/ASA_hostname service principal name
(SPN) on the Kerberos KDC, then export a keytab for that SPN. You then must upload
the keytab to the ASA, and configure the Kerberos AAA server group to validate the
KDC.
We added the following commands: aaa kerberos
import-keytab , clear aaa kerberos
keytab , show aaa kerberos keytab ,
validate-kdc .
|