<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: radius authentication for ssh and http in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198194#M344771</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear sir,&lt;/P&gt;&lt;P&gt;It might be possible that Some Radius attributes might not be natively understood by some vendors.So in such cases to support authentication and authorization of the security appliance user you might have to load the security appliance attributes into the RADIUS server. Please refer the following link for details:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/extsvr.html#wp1583736" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/extsvr.html#wp1583736&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Sunil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 02 Apr 2009 08:02:18 GMT</pubDate>
    <dc:creator>ksumenon</dc:creator>
    <dc:date>2009-04-02T08:02:18Z</dc:date>
    <item>
      <title>radius authentication for ssh and http</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198189#M344596</link>
      <description>&lt;P&gt;how to differentiate between the console and http authtications in radius server while authenticating users for a pix firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does pix send any attributes to the radiuss server to indicate where the user is trying to login?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:24:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198189#M344596</guid>
      <dc:creator>vasu</dc:creator>
      <dc:date>2019-03-10T23:24:09Z</dc:date>
    </item>
    <item>
      <title>Re: radius authentication for ssh and http</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198190#M344659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ip http authentication command enables you to specify a particular authentication method for HTTP server users. The HTTP server uses the enable password method to authenticate a user at privilege level 15. The ip http authentication command now lets you specify enable, local, TACACS, or authentication, authorization, and accounting (AAA) HTTP server user authentication.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Apr 2009 15:51:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198190#M344659</guid>
      <dc:creator>wong34539</dc:creator>
      <dc:date>2009-04-01T15:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: radius authentication for ssh and http</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198191#M344699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;See these commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server ADMIN protocol radius&lt;/P&gt;&lt;P&gt; reactivation-mode depletion deadtime 0&lt;/P&gt;&lt;P&gt;aaa-server ADMIN host 192.168.0.1&lt;/P&gt;&lt;P&gt; timeout 30&lt;/P&gt;&lt;P&gt; key XXXXXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server HTTPCLIENTS protocol radius&lt;/P&gt;&lt;P&gt; reactivation-mode depletion deadtime 0&lt;/P&gt;&lt;P&gt; max-failed-attempts 5&lt;/P&gt;&lt;P&gt;aaa-server HTTPCLIENTS host 192.168.0.1&lt;/P&gt;&lt;P&gt; timeout 30&lt;/P&gt;&lt;P&gt; key XXXXXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication ssh console ADMIN&lt;/P&gt;&lt;P&gt;aaa authentication include http inside 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 HTTPCLIENTS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the above example, see the radius host (192.168.0.1). We could also &amp;#127;&amp;#127;&amp;#127;configure a single RADIUS entry but I am trying to differenciate between the ADMIN and HTTPCLIENTS authentication request at the RADIUS end. But, in the RADIUS server, there is no attribute that we receive which show the difference in the purpose or the level of access being attempted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying with a Microsoft Windows 2003 RADIUS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Apr 2009 04:47:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198191#M344699</guid>
      <dc:creator>vasu</dc:creator>
      <dc:date>2009-04-02T04:47:18Z</dc:date>
    </item>
    <item>
      <title>Re: radius authentication for ssh and http</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198192#M344726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Authenticated access to the PIX Firewall console has different types of prompts depending on the option you choose with the aaa authentication [serial | enable | telnet | ssh] console command. While the enable and ssh options allow three tries before stopping with an access denied message, both the serial and telnet options cause the user to be prompted continually until successfully logging in. The serial option requests a username and password before the first command line prompt on the serial console connection. The telnet option forces you to specify a username and password before the first command line prompt of a Telnet console connection. The enable option requests a username and password before accessing privileged mode for serial, Telnet, or SSH connections. The ssh option requests a username and password before the first command line prompt on the SSH console connection. The ssh option allows a maximum of three authentication attempts.&lt;/P&gt;&lt;P&gt;8. Authenticated access to the PIX Firewall console has different types of prompts depending on the option you choose with the aaa authentication console command:&lt;/P&gt;&lt;P&gt;a. enable option-Allows three tries before stopping with "Access denied." The enable option requests a username and password before accessing privileged mode for serial or Telnet connections.&lt;/P&gt;&lt;P&gt;b. serial option-Causes the user to be prompted continually until successfully logging in. The serial option requests a username and password before the first command line prompt on the serial console connection.&lt;/P&gt;&lt;P&gt;c. telnet option-Causes the user to be prompted continually until successfully logging in. The telnet option forces you to specify a username and password before the first command line prompt of a Telnet console connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Sunil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Apr 2009 06:15:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198192#M344726</guid>
      <dc:creator>ksumenon</dc:creator>
      <dc:date>2009-04-02T06:15:05Z</dc:date>
    </item>
    <item>
      <title>Re: radius authentication for ssh and http</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198193#M344761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My confusion is not around how pix does this. Please read this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I am configuring pix to support authentication for both ssh console and url auth, pix does not send different properties to the radius server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That makes it difficult for the radius server to differenciate the users who needs to allow while url auth is being requested and ssh console is being requested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my case, if I allow some one to perform url auth they will automatically be able to connect to the ssh console. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are using two seperate radius servers currently so that the ssh console requests can be handled more restrictively.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way I can use one radius server for both the purposes?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Apr 2009 06:27:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198193#M344761</guid>
      <dc:creator>vasu</dc:creator>
      <dc:date>2009-04-02T06:27:24Z</dc:date>
    </item>
    <item>
      <title>Re: radius authentication for ssh and http</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198194#M344771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear sir,&lt;/P&gt;&lt;P&gt;It might be possible that Some Radius attributes might not be natively understood by some vendors.So in such cases to support authentication and authorization of the security appliance user you might have to load the security appliance attributes into the RADIUS server. Please refer the following link for details:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/extsvr.html#wp1583736" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/extsvr.html#wp1583736&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Sunil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Apr 2009 08:02:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198194#M344771</guid>
      <dc:creator>ksumenon</dc:creator>
      <dc:date>2009-04-02T08:02:18Z</dc:date>
    </item>
    <item>
      <title>Re: radius authentication for ssh and http</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198195#M344788</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;nope .. that document does not talk much about radius authentication. it mainly talked about ldap.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Apr 2009 09:46:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198195#M344788</guid>
      <dc:creator>vasu</dc:creator>
      <dc:date>2009-04-02T09:46:08Z</dc:date>
    </item>
    <item>
      <title>Re: radius authentication for ssh and http</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198196#M344804</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just wanted to cross check if you have referred the "Configuring an External RADIUS Server" section of the document?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Sunil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Apr 2009 10:15:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198196#M344804</guid>
      <dc:creator>ksumenon</dc:creator>
      <dc:date>2009-04-02T10:15:41Z</dc:date>
    </item>
    <item>
      <title>Re: radius authentication for ssh and http</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198197#M344813</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes. I did.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Apr 2009 10:21:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198197#M344813</guid>
      <dc:creator>vasu</dc:creator>
      <dc:date>2009-04-02T10:21:02Z</dc:date>
    </item>
    <item>
      <title>Re: radius authentication for ssh and http</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198198#M344823</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using Network Access Restrictions (NAR) in ACS will be a good idea to restrict the Telnet/SSH Console access to the network devices in either case of users from internal (ACS) or external database (AD). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rest of the URL authentication will work fine on the same ACS. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;Ahmed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 04 Apr 2009 09:17:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198198#M344823</guid>
      <dc:creator>itlogical</dc:creator>
      <dc:date>2009-04-04T09:17:52Z</dc:date>
    </item>
    <item>
      <title>Re: radius authentication for ssh and http</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198199#M344825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But I don't have an ACS. I am trying to integrate AD and PIX using RADIUS (Microsoft IAS).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any other alternative to the ACS?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 04 Apr 2009 13:08:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198199#M344825</guid>
      <dc:creator>vasu</dc:creator>
      <dc:date>2009-04-04T13:08:56Z</dc:date>
    </item>
    <item>
      <title>Re: radius authentication for ssh and http</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198200#M344826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think management authorization will work in your scenario which is explained in the section of "Limiting User CLI and ASDM Access with Management Authorization" with specific service-type 5(remote-access)at the following link&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/mgaccess.html#wp1070306" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/mgaccess.html#wp1070306&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 Apr 2009 10:41:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-for-ssh-and-http/m-p/1198200#M344826</guid>
      <dc:creator>sahmedshahcsd</dc:creator>
      <dc:date>2009-04-05T10:41:25Z</dc:date>
    </item>
  </channel>
</rss>

