EasyManua.ls Logo

Cisco TrustSec User Manual

Cisco TrustSec
208 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #82 background imageLoading...
Page #82 background image
6-4
Cisco TrustSec Configuration Guide
OL-22192-01
Chapter 6 Configuring Endpoint Admission Control
Web Authentication Proxy Configuration
Web Authentication Proxy Configuration
Web Authentication Proxy (WebAuth) allows the user to use a web browser to transmit their login
credentials to the Cisco Secure ACS though a Cisco IOS web server on the access device. WebAuth can
be enabled independently. It does not require 802.1X or MAB to be configured.
The following example is a basic WebAuth configuration on a Gigabit Ethernet port:
switch(config)# ip http server
switch(config)# ip access-list extended POLICY
switch(config-ext-nacl)# permit udp any any eq bootps
switch(config-ext-nacl)# permit udp any any eq domain
switch(config)# ip admission name HTTP proxy http
switch(config)# fallback profile FALLBACK_PROFILE
switch(config-fallback-profile)# ip access-group POLICY in
switch(config-fallback-profile)# ip admission HTTP
switch(config)# interface GigabitEthernet2/1
switch(config-if)# authentication port-control auto
switch(config-if)# authentication fallback FALLBACK_PROFILE6500(config-if)#ip access-group
POLICY in
For additional information on configuring web-based authentication, see the configuration guide for
your access switch.
For additional information on the ip http server command, see the Cisco IOS Network Management
Command Reference entry at the at the following URL:
http://www.cisco.com/en/US/docs/ios/netmgmt/command/reference/nm_08.html#wp1022387
Verifying Web Authentication Proxy Configuration
To verify the Web Authentication Proxy configuration, access the interface IP address with a web
browser. If configured correctly, the access device generates a challenge and accepts valid login
information.
To verify the Web Authentication proxy configuration with the CLI, use the show authentication
interface command.
switch# show authentication interface gigabitEthernet 2/1
Client list:
Interface MAC Address Domain Status Session ID
Gi2/1 000c.293a.048e DATA Authz Success AC1AD01F0000000904BBECD8
Available methods list:
Handle Priority Name
1 2 webauth
Runnable methods list:
Handle Priority Name
1 0 webauth

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Cisco TrustSec and is the answer not in the manual?

Cisco TrustSec Specifications

General IconGeneral
CategoryNetwork Security
FunctionalityProvides role-based access control, network segmentation, and policy enforcement.
Key ComponentsSecurity Group Tags (SGT), Security Exchange Protocol (SXP).
Authentication Methods802.1X, MAC Authentication Bypass (MAB), Web Authentication
Security Group Tagging (SGT)Assigns security group tags to users and devices for identity-based segmentation.
Security Exchange Protocol (SXP)A protocol used to propagate SGT information across network devices.
Policy EnforcementEnforces security policies based on SGTs and SGACLs.
BenefitsEnhanced security, simplified policy management, and improved compliance.
EncryptionSupports encryption for data in transit through IPsec and MACsec.
ScalabilityScalable to large enterprise networks with thousands of devices.
CompatibilityCompatible with a wide range of Cisco network devices.
DescriptionCisco TrustSec is a security architecture framework designed to build secure networks. It uses identity-based access control to segment the network and enforce policies based on user roles and device types, rather than relying solely on IP addresses.

Summary

Cisco TrustSec Overview

Information about Cisco TrustSec Architecture

Describes the elements and processes that create the Cisco TrustSec network.

Authentication

Covers topics related to device and user authentication within Cisco TrustSec.

Security Group-Based Access Control

Details access control policies based on security groups and SGTs.

Configuring the Cisco TrustSec Solution

Configuring Identities, Connections, and SGTs

Configuring Credentials and AAA for a Cisco TrustSec Seed Device

Details steps to configure credentials and AAA for a Cisco TrustSec seed device.

Configuring Credentials and AAA for a Cisco TrustSec Non-Seed Device

Details steps to configure credentials and AAA for a Cisco TrustSec non-seed device.

Enabling Cisco TrustSec Authentication and MACsec in 802.1X Mode on an Uplink Port

Explains how to enable TrustSec authentication and MACsec using 802.1X on an uplink port.

Configuring Cisco TrustSec and MACsec in Manual Mode on an Uplink Port

Guides on manually configuring Cisco TrustSec and MACsec on an uplink port.

Manually Configuring IP-Address-to-SGT Mapping

Discusses mapping IP addresses to SGTs manually.

Subnet to SGT Mapping

Details mapping SGTs to all host addresses within a specified subnet.

VLAN to SGT Mapping

Explains binding SGTs to packets from a specified VLAN.

Layer 3 Logical Interface to SGT Mapping (L3IF–SGT Mapping)

Maps SGTs to traffic of any Layer 3 interface.

Configuring SGT Exchange Protocol over TCP (SXP) and Layer 3 Transport

Configuring Cisco TrustSec SXP

Describes how to configure the SGT Exchange Protocol (SXP) on switches.

Configuring an SXP Peer Connection

Details how to configure SXP peer connections on both devices.

Configuring Layer 3 SGT Transport Between Cisco TrustSec Domains

Guides on configuring Layer 3 SGT Transport for cross-domain traffic.

Configuring SGACL Policies

SGACL Policy Configuration Process

Outlines the steps to configure and enable Cisco TrustSec SGACL policies.

Manually Configuring SGACL Policies

Guides on manually configuring SGACL policies by binding ACLs to SGTs.

Configuring Endpoint Admission Control

Information About Endpoint Admission Control

Explains endpoint authentication and authorization methods in TrustSec networks.

802.1X Authentication Configuration

Details the basic 802.1X configuration for a Gigabit Ethernet port.

MAC Authentication Bypass Configuration

Explains MAC Authentication Bypass (MAB) for non-802.1X capable clients.

Cisco TrustSec Command Summary

Related product manuals