Cisco Switch 使用 Cisco ISE 驗証

在Switch上的設定

hostname R6
enable algorithm-type scrypt secret {Password}
ip domain name abc.com
username admin algorithm-type scrypt secret {Password}

line vty 0 4
login local
transport input ssh
crypto key generate rsa

aaa new-model
tacacs-server host {ISE IP} key {Password}

設定好以上的設定就可以測試驗証

test aaa group tacacs+ {ID} {Password} new-code

正常的話會看到success, 但是還未能使用, 還要設定下面真正驗証的時候使用tacacs+, 下面的設定可以等ISE設好之後再設定

aaa authentication login default group tacacs+ local
aaa authorization exec default group tacacs+ local
aaa accounting exec default start-stop group tacacs+

打開ISE

Administration -> Identity Management -> External Identity Sources -> Active Directory -> Add

輸入AD domain

然後就會看到Completed

然後再增加相對的Devices

Administration -> Network Resources -> Network Devices -> Add

然後到可以登入的使用者

Administration -> Identity Management -> Identities -> Users -> Add

建立一個Network Administrators Group

Work Centers -> Device Administration -> User Identity Groups -> Add

Administration -> System -> Deployment -> Deployment Nodes

Enable "Enable Device Admin Service"

建立Profile之前先定義好Shell & Profile

Work Centers -> Device Administration -> Policy Elements -> Results -> TACACS Command Sets

Work Centers -> Device Administration -> Policy Elements -> Results -> TACACS Profiles

 Work Centers -> Device Administration -> Device Admin Policy Sets -> Policy Sets

建立一個新的Policy

Authentication Policy可以留待更覆習的情怳再更改, 現在主要看Authorization Policy, 在這裏設定一個Conditions, 如果是我們之前定義的Network Administrators而且是Cisco Devices的話, 就Permit

Comments

No comments yet. Why don’t you start the discussion?

發佈留言

發佈留言必須填寫的電子郵件地址不會公開。 必填欄位標示為 *

*