Post

Cisco Access Control System (ACS)


Cisco Secure Access Control System (ACS) is a comprehensive network access policy solution that provides authentication, authorization, and accounting (AAA) services. It enables organizations to centrally manage network access policies, ensuring secure and efficient access to network resources by validating user credentials and enforcing security policies.


Installing ACS

Deploy the ACS VM as usual

x


Connect the console and select the boot option

x


The package installation will start

x


After installation finishes, type “setup” and configure the networking stuff

x


Next the Web UI should be accessible

x


Finally select the license

x


Now the ACS is up and running

x


Configuring TACACS Device Admin

Adding Network Acccess Device

On Network Resources, add the Network Device

x

Creating User

Next create an internal user used for authentication

x

Configuring Shell Profiles

Next create a shell profile providingg full access to the NAD

x


Here we configure the privilege level to be 15 which is the highest for cisco devices

x

Configuring Command Sets

After that create a command sets allowing full access to all available commands

x

Configuring Identity

Here we configure the identity source for user authentication

x

Configuring Authorizaton Policy

Finally configure the Authorization Policy to use the Device Type as the condition and Shell Results & Command Sets created earlier as the results

x


Then create a new rule for the TACACS authentication

x


Configuring TACACS on Cisco Router

Next configure the NAD to use the ACS for TACACS authentication

x


Run show tacacs to show the configured server

x


Loggin in to NAD

Now when we try logging in using ACS user, we should be able to access the device

x


Back on the ACS, we can see the rule being hit

x


This post is licensed under CC BY 4.0 by the author.