Stripping an user domain with ACS 5.2: In this document we will see how to configure ACS as a proxy to itself to strip a part of the username.
In some cases, it is required to remove the DNS suffix to authenticate the user, and if it’s possible in LDAP configuration, there are no such options in other identity stores, but luckily there’s an option to rewrite the username when you are using ACS as a radius proxy.
Note: this is working only with pure radius request, not with EAP inside Radius.
I will use a catalyst 3560 to test user credentials using the test aaa group command.
Attempting authentication test to server-group radius using radius
User authentication request was rejected by server.
To configure the proxy, we need to understand the process:
• The Switch will send the access-request to the ACS
• The access-request will match the proxy access rule and username will be translated, then ACS will proxy the modified access-request to itself
• The proxied access-request will match another rule which will indicate how to authenticate the user.
So we will need to create a proxy entry, then a rule to send traffic to this proxy, and then other rules to authenticate proxied traffic.
Creating the proxy
Go to network resources, and click external RADIUS servers, then click the Create button (figure 1).
Create proxy with the ACS IP Address as hostname (I used the loopback, but you can use a DNS entry or the interface address, but notice that if you change the IP or that the DNS is down, the proxy configuration will be broke) and choose a shared secret (remember it).
Then go to the “Network Devices and AAA Clients” and create a client with the ACS IP you used in the prior step (loopback or Eth0), and use the same radius shared secret as above.
After that, go to the access policies menu and click on the access services link, then create an access service with ‘User selected service type’ as RADIUS Proxy, select your external radius server (which is, in fact, your ACS) and in the advanced drop down menu, you can choose the strips options you need, and click finish.
Refer to the figure 4.
Now, create a Service Selection Rule to identify the Radius traffic that needs the username to be stripped and select the access rule that you have created which sends traffic to the proxy. I will match the radius traffic from my switch (see figure 6).
Don’t forget to move up the newly created rule so that the traffic does not match another rule before (see figure 7).
Now that we configured the ACS to strip domain name, and send back the authentication request to itself, we must configure it to handle this request.
Start by creating a new Access Service, and set the identity store of your choice (I use local store for testing purpose but you can set active directory or whatever you want).
Then go back to the service selection rule, and create a rule that will match incoming radius traffic from ACS and send it to your Access Service (see figure 9).
The final service section rules should look like figure 10.
And now the final step, test! Normally you would see your stripped username in the ACS monitoring view (in radius authentication – see figure 11)
This document described the Configuration of ACS 5.X to strip a domain name or prefix name from an incoming radius request by proxying to itself. Same features should be available in ACS 4.X. Please note that the proxy feature can't modify the username from an EAP Request as each EAP Method has its own way to exchange the username and it might be ciphered.
User wishes to disable auto complete for username and password on the ACS 5.3 GUI login page.
Try to update to the patch 126.96.36.199.7
Resolved Issues in Cumulative Patch ACS 188.8.131.52.7
CSCub40498 : The password field in ACS 5.3 has the autocomplete operation enabled.
Sometimes it can be the browser issue also as the password has been saved in the browser cache you can clear the browser for history of passwords save.
Hi all,As I have firewall and L3 switches connected in an infrastructure.Cisco FirePOWER is configured with Global OSPF as VRF is not supported.Cisco Switch is configured both Global and VRF OSPF.Before the following hardening is performed, the routing is...
I'm using the ASA 5516.ASA and ASA are connected on a dedicated line, and two lines in different bands are connected to the ASA interface.I would like to use IPSEC VPN and will use IKE V2.What I'm curious about here is that if Line 1 loses its VPN connect...
Hi All,All the internet traffic that egress from the exit point gets source-natted to the public ip on the interface having the ISP link. Now, if the source-nat on the interface is turned off then many applications stop working or being accessible. There ...
I am having an issue with incoming rules. Here is my running config. : Saved:: Serial Number: JAD21290D2D: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores):ASA Version 9.8(1)!hostname ciscoasaenable password $sha512$500...