Router AAA Configuration Quiz
32 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of authentication?

  • Ensuring a device or end-user is legitimate (correct)
  • To allow or disallow users access to certain areas and programs on the network
  • Separating authentication from authorization
  • To configure routers to restrict user functions
  • How does TACACS+ differ from RADIUS in terms of authentication and authorization?

  • RADIUS separates authentication from authorization
  • RADIUS and TACACS+ have the same authentication and authorization process
  • TACACS+ uses combined authentication and authorization processes
  • TACACS+ does not separate authentication from authorization (correct)
  • What can a router be configured to do after successful authentication?

  • Control the functions a user can perform on the network (correct)
  • Prevent user access to the network
  • Allow all users unlimited access
  • Restrict users from authenticating again
  • Which protocol allows for the separation of authentication and authorization?

    <p>TACACS+</p> Signup and view all the answers

    What does AAA stand for in the context of network security?

    <p>Authentication, Authorization, Accounting</p> Signup and view all the answers

    What does the 'default' keyword do in the context of authentication methods?

    <p>Applies the authentication method to all lines unless specifically overridden</p> Signup and view all the answers

    How is case sensitivity handled in authentication using the localcase keyword?

    <p>Both passwords and usernames are case-sensitive</p> Signup and view all the answers

    What does the 'named list' refer to in authentication methods?

    <p>A character string used to name the list of custom authentication methods for users logging in</p> Signup and view all the answers

    What happens if the first listed authentication method fails during a login attempt?

    <p>The next listed authentication method is attempted</p> Signup and view all the answers

    In what scenario would an admin apply a special login for SSH while keeping the default login method for console?

    <p>To provide different authentication for different users</p> Signup and view all the answers

    How can different method lists be applied to different interfaces and lines?

    <p><code>login authentication listname</code> line configuration command</p> Signup and view all the answers

    What command is used to remove a custom authentication method list from an interface and return to the default method list?

    <p>no aaa authentication login</p> Signup and view all the answers

    How can additional security be implemented to secure AAA user accounts by locking out users with excessive failed attempts?

    <p>aaa local authentication attempts max-fail command</p> Signup and view all the answers

    What happens when a user account is locked due to excessive failed authentication attempts?

    <p>The account stays locked until cleared by an administrator</p> Signup and view all the answers

    What command is used to clear a locked-out user account by an administrator?

    <p>clear aaa local user lockout</p> Signup and view all the answers

    How is the 'login delay' command different from locking a user account due to failed attempts?

    <p>'login delay' only introduces a delay between login attempts without locking the account</p> Signup and view all the answers

    What unique action occurs when a user logs into a Cisco router using AAA authentication?

    <p>A unique session ID is assigned to the user's session</p> Signup and view all the answers

    What command is used to enable AAA?

    <p>aaa new-model</p> Signup and view all the answers

    Which command is used to globally enable 802.1X port-based authentication?

    <p>dot1x system-auth-control</p> Signup and view all the answers

    What is the purpose of the 'dot1x pae' command?

    <p>Configure the interface as an authenticator</p> Signup and view all the answers

    Which AAA method allows devices to validate users against a local database?

    <p>Local database authentication</p> Signup and view all the answers

    Why is it important to separate authentication, authorization, and accounting in a network?

    <p>To enhance network security</p> Signup and view all the answers

    What is the main advantage of TACACS+ over RADIUS?

    <p>Encrypts all exchanges</p> Signup and view all the answers

    Which protocol is more commonly used by VoIP service providers for passing login credentials of a SIP endpoint?

    <p>RADIUS</p> Signup and view all the answers

    What does the DIAMETER protocol use as a transport protocol?

    <p>SCTP</p> Signup and view all the answers

    Which authentication protocol is planned as a replacement for RADIUS?

    <p>DIAMETER</p> Signup and view all the answers

    Which server can be configured to handle authentication and authorization on Cisco devices?

    <p>Microsoft Active Directory only</p> Signup and view all the answers

    Which protocol uses UDP port 1646 or 1813 for accounting purposes?

    <p>RADIUS</p> Signup and view all the answers

    What kind of authentication does RADIUS combine into one process?

    <p>Authentication and Authorization</p> Signup and view all the answers

    Which protocol provides separate AAA services, allowing implementation flexibility?

    <p>TACACS+</p> Signup and view all the answers

    What is one feature of Cisco Secure ACS regarding device administration?

    <p>Flexible and detailed administration with full auditing and reporting capabilities</p> Signup and view all the answers

    What server is Microsoft's implementation of a AAA server using RADIUS called?

    <p>NPS (Network Policy Server)</p> Signup and view all the answers

    Study Notes

    AAA (Authentication, Authorisation, and Accounting)

    • AAA is used to secure a network, allowing all devices to refer to a central database and separating authentication, authorisation, and accounting.

    Authentication

    • Authentication ensures a device or end-user is legitimate.
    • Authorisation allows or disallows authenticated users access to certain areas and programs on the network.
    • Routers can be configured to restrict the user to performing only certain functions after successful authentication.

    TACACS+ vs. RADIUS

    • TACACS+ separates authentication from authorisation.
    • RADIUS does not separate authentication from authorisation.
    • TACACS+ is considered more secure because all exchanges are encrypted.
    • RADIUS only encrypts user passwords, but does not encrypt user names, accounting information, or any other info carried in radius message.

    Configuring Server-Based Authentication

    • Four basic steps to configure server-based authentication:
    • Identify the TACACS+ and RADIUS server(s) the AAA service should consult when authenticating and authorising users.
    • Configure the router to use the TACACS+ or RADIUS server for authentication.
    • Use the aaa commands to enable AAA and specify the authentication methods.
    • Troubleshoot server-based AAA authentication.

    Cisco Secure ACS

    • The Cisco Secure Access Control System (ACS) is a centralised solution that ties together an enterprise’s network access policy and identity strategy.
    • Supports TACACS+ and RADIUS protocols.
    • Features include:
      • Distributed architecture for medium and large-scale deployments
      • Intuitive, lightweight web-based GUI
      • Administrator authentication through Microsoft Active Directory and LDAP
      • Automated reports sent through email
      • Integrated advanced monitoring, reporting, and troubleshooting capabilities using SNMP traps for Cisco Secure ACS health status
      • Encrypted (secure) syslogs
      • Flexible and detailed device administration in with full auditing and reporting capabilities

    Integrating AAA with Active Directory

    • Microsoft Active Directory (AD) is a directory service for Windows domain networks and part of most Windows Server OS’s.
    • AD domain controller used to enforce security policies by authenticating and authorising users logging into the Windows domain.
    • Can be used to handle authentication and authorisation on Cisco devices.

    802.1X Port-Based Authentication

    • A method list can be applied to different interfaces and lines using the aaa authentication login command.
    • Named list must be explicitly enabled on the line using the login authentication command.
    • To remove a custom authentication method list from an interface and return to the default method list, use the no authentication login command.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on configuring AAA (Authentication, Authorization, and Accounting) on a local router, including adding user credentials, enabling AAA globally, setting parameters, and troubleshooting configurations. Learn about the aaa authentication login command and the use of default keywords.

    More Like This

    Router Configuration Mastery Quiz
    5 questions
    Router Configuration Basics Quiz
    12 questions
    2101 Ch10:  Router Configuration
    25 questions
    Use Quizgecko on...
    Browser
    Browser