cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1265
Views
15
Helpful
8
Replies

2FA + Static Login with IP Restriction

eshaq786
Level 1
Level 1

Hi

We have setup 2FA on our switches using Duo auth proxy. This is working fine.

However we would like to be able to add a static account with no 2FA so that our security scanning tool can login to the device to retrive config details etc. This login would come from a single IP address therefore we would like to restrict this login to that IP address.

This would need to work alongside our existing 2FA logins. Has anyone done this and can show us what we would need to do?

Below is our current login config:

aaa authentication login default group DUO

 

8 Replies 8

@eshaq786 you could configure a specific VTY line with a different authentication method list, which uses a different authentication server. Use the rotary command under VTY line and configure SSH on a specific port, which references the rotary number for that specific VTY line. You can also configure a specific ACL on that VTY line.

Example:

line vty 15
access-class 102 in
 rotary 16
 transport input ssh
 login authentication METHOD-LIST
!
ip ssh port 2016 rotary 16

You connect to the device using port SSH to port 2016

Can i use this method but use a static username stored locally on the device? Furthermore, can i then restrict this so that only a specified ip address can login using this method as it would be deemed insecure since it had no 2FA.

@eshaq786 yes you just reference a method list that uses local authentication. Yes you can apply an ACL just to that VTY line.

This is my existing VTY config

line con 0
password 7 xxxxx
logging synchronous
login authentication No-Radius-Login
line vty 0 4
password 7 xxxxxx
transport input ssh
line vty 5 15
password 7 xxxxxx
transport input ssh

If i issue just a line VTY 15, will that change the existing line vty 5 15 to vty 5 14? 

access-list 1 permit 192.168.1.10
line vty 15
access-class 1 in
 rotary 16
 transport input ssh
 login authentication No-Radius-Login
!
ip ssh port 2016 rotary 16

Does the ACL look right? Or do i need to add a deny in there as well?

@eshaq786 if you configure line 15, then lines 5 - 14 will remain the same.

Configuration looks ok.

PradeepSingh
Level 1
Level 1

Hi. 

If you have a static source IP for the scanning tool you easily can define a rule above the main rule in authentication section of ISE policy with source IP as condition in TACACS.Remote-Address Equals <scanning tool server ip> and choose ID store local or ID whatever is applicable. By this way you avoid modifying config on all devices.

Hi

Should have specified that I am not using TACACS to manage the switches.

Walker
Level 1
Level 1

Within the Device Admin policy, add the IP in the authentication condition and set the Identity store to internal users. Configure the security scanning tool username/pw in the local identity store.