C H A P T E R 9
Configuring Authentication
This chapter explains how to configure the authentication portion of Cisco???s authentication, authorization and accounting (AAA) services on the SN
The following tasks are covered:
???Prerequisite Tasks, page
???Using Authentication, page
???Configuration Tasks, page
???Configuring Authentication Services, page
???Creating Named Server Groups, page
???Creating Authentication Lists, page
???Testing Authentication, page
???Configuring
???Enabling iSCSI Authentication, page
???Verifying and Saving Configuration, page
The AAA function is always enabled for the storage router; it cannot be disabled.
Authentication parameters can be configured using CLI commands, as described in this chapter, or via the
Cisco SN
Chapter 9 Configuring Authentication
Prerequisite Tasks
Prerequisite Tasks
Before performing AAA configuration tasks on the storage router, make sure you have configured system parameters as described in Chapter 2,
Note AAA configuration settings are
Using Authentication
AAA is Cisco???s architectural framework for configuring a set of three independent security functions in a consistent, modular manner. Authentication provides a method of identifying users (including login and password dialog, challenge and response, and messaging support) prior to receiving access to the requested object, function, or network service.
The SN
???iSCSI
???Enable
???Login
iSCSI Authentication
When enabled, iSCSI drivers provide user name and password information each time an iSCSI TCP connection is established. iSCSI authentication uses the iSCSI Challenge Handshake Authentication Protocol (CHAP) authentication method.
iSCSI authentication can be enabled for specific SCSI routing instances. Each SCSI routing instance enabled for authentication can be configured to use a specific list of authentication services, or it can be configured to use the default list of authentication services.
For IP hosts that support
Note iSCSI authentication is available for SN
Cisco SN
Chapter 9 Configuring Authentication
Using Authentication
Enable Authentication
When configured, a user enters password information each time the CLI enable command is entered from the management console, or from a Telnet or SSH management session. If the storage router is configured to allow FTP access, Enable authentication also authenticates users attempting to login and establish an FTP session with the storage router.
Using RADIUS Security Servers
Because the enable command does not require you to enter a user name, RADIUS authentication services are passed the default user name, $enab15$, along with the entered password for authentication. If no authentication services are configured, the entered password is checked against the Administrator mode password configured for the storage router.
Using TACACS+ Security Servers
Because the enable command does not require you to enter a user name, TACACS+ authentication services are passed the user name used at login, along with the entered password, for authentication. If a user name was not needed for login, the storage router will prompt the user to enter a user name, along with the enable password, when the enable command is issued.
Login Authentication
When configured, you are prompted to enter a user name and password each time access to the storage router is attempted from the management console, or from a Telnet or SSH management session.
Authentication Services
Authentication is configured by defining the authentication services available to the storage router. iSCSI, Enable and Login authentication types use authentication services to administer security functions. If you are using remote security servers, AAA is the means through which you establish communications between the SN
Table
Table
Chapter 9 Configuring Authentication
Configuration Tasks
Table
Configuration Tasks
To configure iSCSI, Enable or Login authentication and the associated authentication services on the storage router, perform the following steps:
Step 1 Configure the desired authentication services, such as RADIUS, TACACS+ and the local username database.
Step 2 (Optional) Create named groups of RADIUS and TACACS+ servers.
Step 3 Create authentication lists.
Step 4 (Optional) Test authentication using configured authentication services.
Step 5 (Optional) Configure the user name and password for SCSI routing instances that will participate in
Step 6 Enable authentication for individual SCSI routing instances.
Step 7 Verify and save AAA and iSCSI authentication configuration.
Figure
Cisco SN
Chapter 9 Configuring Authentication
Configuration Tasks
Figure
When iSCSI authentication is enabled, the SCSI routing instance passes the user name and password from the iSCSI driver to AAA for authentication.
AAA uses the specified authentication list to determine
RADIUS TACACS+
Username database
local or
which services to use for the authentication attempt.
If authentication fails, the connection is refused and the host cannot obtain access to storage resources.
SCSI routing instance
Authentication services lists
AAA authentication services
IP host (and optionally SCSI routing instance) user name and password via
CHAP when iSCSI TCP
connection established
iSCSI drivers
Disk
SN
Disk controller
IP
controller
Tape controller
85749
Cisco SN
Chapter 9 Configuring Authentication
Configuration Tasks
Figure
group janus
Remote RADIUS servers IP 10.5.0.61
IP 10.6.0.53 Global Key: rad123SN
Remote TACACS+ servers IP 10.7.0.22 IP 10.7.0 41
IP 10.7.0.45 Global Key: tacacs123SN
Username database
labserver foo labserver2 foo2
RADIUS TACACS+
local or
Authentication services list: webservices2 local
group janus group tacacs+
AAA authentication services
SCSI routing instance: zeus
user name = zeusabc password=zeus123
IP hosts with iSCSI drivers
user name = labserver password = foo
IP
user name = labserver2 password = foo2
SN
Tape controller
Storage
85750
Cisco SN
Chapter 9 Configuring Authentication
Configuration Tasks
Figure
Figure
Remote RADIUS servers
When Enable authentication is enabled, authentication is required when the user attempts Administrator mode access via the CLI "enable" command.
The user is prompted for a password, which is sent along with the default user name
$enab15$ to AAA for
authentication.
AAA uses the default authentication list to determine which services to use for the authentication attempt.
If authentication fails, the request is refused and the user cannot obtain Administrator mode access to the SN
Authentication services list
the entered password is sent with default user name $enab15$
AAA authentication services
CLI command session processor
SN
"enable" command prompts for password
Telnet, SSH or console management session
105745
Cisco SN
Chapter 9 Configuring Authentication
Configuration Tasks
Figure
Telnet, SSH or console management session
105746
Cisco SN
Chapter 9 Configuring Authentication
Configuration Tasks
Figure
105747
Telnet, SSH or console management session
Cisco SN
Chapter 9 Configuring Authentication
Configuration Tasks
Figure
Figure
Remote RADIUS servers
When Login authentication is enabled, authentication is required when the user attempts Monitor mode access to the SN
The login process prompts the user for a user name andpass word, which are passed to AAA for authentication.
AAA uses the default authentication list to determine which services to use for the authentication attempt.
If authentication fails, the login request is refused and the user cannot obtain Monitor mode access to the SN
Remote TACACS+ servers
Login requires user name and password
Telnet, SSH or console management session
85753
Cisco SN
Chapter 9 Configuring Authentication
Configuration Tasks
Figure
Authentication services list: group sysadmin
monitor
AAA authentication services
CLI command session processor
user name: sysmonitor
password: ciscomonitor
Telnet, SSH or console management session
SN
85754
Cisco SN
Chapter 9 Configuring Authentication
Configuring Authentication Services
Configuring Authentication Services
Configuring authentication services consists of setting the appropriate parameters for the various AAA service options that can be used by the storage router. The storage router can use any or all of the supported services:
???RADIUS
???TACACS+
???Local username database
???Enable
???Monitor
Use the procedures that follow to configure the storage router to use each of these services.
Note See the iSCSI driver readme file for details on configuring CHAP user names and passwords for iSCSI authentication.
RADIUS Servers
Use the commands in the following procedure to configure RADIUS authentication services.
Cisco SN
Chapter 9 Configuring Authentication
Configuring Authentication Services
TACACS+ Hosts
Use the commands in the following procedure to configure TACACS+ authentication services.
Local Username Database
Use the commands in the following procedure to configure a local username database.
For iSCSI authentication, user name and password pairs must match the CHAP user name and password pairs configured for the iSCSI drivers that require access to storage via the SCSI routing instances that have iSCSI authentication enabled.
If other services are also used (such as RADIUS or TACACS+), these user name and password pairs must also be configured within the databases those services use for authentication purposes.
Cisco SN
Chapter 9 Configuring Authentication
Configuring Authentication Services
The following rules apply to passwords:
???Passwords are entered in clear text. However, they are changed to ???XXXXX??? in the CLI command history cache, and are stored in the local username database in an encrypted format.
???If the password contains embedded spaces, enclose it with single or double quotes.
???After initial entry, passwords display in their encrypted format. Use the show aaa command to display the local username database entries. The following is an example display:
username "foo" password "9 ea9bb0c57ca4806d3555f3f78a4204177a"
The initial ???9??? in the example display indicates that the password is encrypted.
???You can
???When entering a password, a zero followed by a single space indicates that the following string is not encrypted; 9 followed by a single space indicates that the following string is encrypted. To enter a password that starts with 9 or zero, followed by one or more spaces, enter a zero and a space and then enter the password string. For example, to enter the password ???0 123??? for the user named pat, enter this command:
username pat password ???0 0 123???
To enter the password ???9 73Zjm 5??? for user name lab1, use this command:
username lab1 password ???0 9 73Zjm 5???
Enable
Enable is a special authentication service; it is available for Enable and Login authentication only. The Enable service compares the password you entered with the Administrator mode password configured for the storage router. The requested access is granted only if the passwords match.
See Chapter 3, ???Configuring System Parameters,??? for more information about changing the
Administrator mode password.
Monitor
Monitor is a special authentication service; it is available for Enable and Login authentication only. The Monitor service compares the password you entered with the Monitor mode password configured for the storage router. The requested access is granted only if the passwords match.
See Chapter 3, ???Configuring System Parameters,??? for more information about changing the Monitor mode password.
Cisco SN
Chapter 9 Configuring Authentication
Creating Named Server Groups
Creating Named Server Groups
By default, you can use all configured RADIUS or TACACS+ servers for authentication. All configured RADIUS servers belong to the default group named radius. All configured TACACS+ servers belong to the default group named tacacs+.
You can also create named groups of RADIUS or TACACS+ servers, to be used for specific authentication purposes. For example, you can use a subset of all configured RADIUS servers for iSCSI authentication of IP hosts requesting access to storage via a specific SCSI routing instance.
In the example configuration shown in Figure
Radius Server Groups
Use the commands in the following procedure to create a named group of RADIUS servers.
TACACS+ Server Groups
Use the commands in the following procedure to create a named group of TACACS+ servers.
Cisco SN
Chapter 9 Configuring Authentication
Creating Authentication Lists
Creating Authentication Lists
iSCSI, Enable and Login authentication use lists of defined authentication services to administer security functions. The list that is created for Enable and Login authentication must be named default. iSCSI authentication supports a variety of authentication lists.
Use the procedures that follow according to the type of authentication required:
iSCSI authentication
Use the commands in the following procedure to build a unique list of authentication services to be used for iSCSI authentication.
Note If local or
Cisco SN
Chapter 9 Configuring Authentication
Creating Authentication Lists
Enable authentication
Use the commands in the following procedure to build a default list of authentication services to be used for Enable authentication. Building the default list completes the configuration of Enable authentication and makes it immediately effective.
???RADIUS servers are passed the default user name, $enab15$, along with the entered password for authentication purposes.
???TACACS+ servers are passed the user name used at login, along with the entered password, for authentication purposes. If a user name was not needed for login, the storage router prompts the user to enter a user name, along with the enable password, when the enable command is issued.
Tip You must configure the databases used by the RADIUS or TACACS+ servers with the appropriate user name and password information.
Note Local and
Login authentication
Use the commands in the following procedure to build a default list of authentication services to be used for Login authentication. Building the default list completes the configuration of Login authentication and makes it immediately effective.
Cisco SN
Chapter 9 Configuring Authentication
Testing Authentication
Testing Authentication
You can perform authentication testing at any time. For example, before enabling iSCSI authentication for a SCSI routing instance, you can test iSCSI authentication. The user name and password are passed to AAA, which performs authentication using the specified iSCSI authentication list.
The command response indicates a pass or fail status.
iSCSI Authentication
Use the commands in the following procedure to test iSCSI authentication.
Example
Sep 02 14:37:00:aaa:AS_NOTICE :Auth test request being queued
Sep 02 14:37:00:aaa:AS_NOTICE :Auth test request complete, status = pass
Enable Authentication
Use the commands in the following procedure to test Enable authentication.
Example
Sep 02 14:37:00:aaa:AS_NOTICE :Auth test request being queued
Sep 02 14:37:00:aaa:AS_NOTICE :Auth test request complete, status = pass
Cisco SN
Chapter 9 Configuring Authentication
Configuring
Login Authentication
Use the commands in the following procedure to test Login authentication.
Example
Sep 02 14:37:00:aaa:AS_NOTICE :Auth test request being queued
Sep 02 14:37:00:aaa:AS_NOTICE :Auth test request complete, status = pass
Configuring
When iSCSI authentication is enabled, the SCSI routing instance must authenticate the IP host during the iSCSI TCP connection process. IP hosts that cannot be authenticated are not allowed access to the storage resources. IP hosts may also require authentication of the SCSI routing instance during the iSCSI TCP connection process. If the SCSI routing instance cannot be authenticated, the IP host terminates the connection.
Use the commands in the following procedure to configure a user name and password for a SCSI routing instance that must be authenticated by IP hosts.
Cisco SN
Chapter 9 Configuring Authentication
Enabling iSCSI Authentication
Enabling iSCSI Authentication
iSCSI authentication is enabled for specific SCSI routing instances. By default, iSCSI authentication is not enabled.
Use the commands in the following procedure to enable iSCSI authentication using the authentication services configured in the specified authentication list.
Verifying and Saving Configuration
You can save the configuration at any time using either the save aaa bootconfig or save all bootconfig commands. Although AAA configuration changes are effective immediately, you must save the authentication configuration for it to be retained in the SN
Use the following procedure to verify and save authentication settings.
Cisco SN
Chapter 9 Configuring Authentication
Verifying and Saving Configuration
Example
username "labserver" password "9 491c083a73d7f89bc0205927d086cdd0d8" username "labserver2" password "9 5ccd52d543e0d3a5558afe8cbe2867dd41"
aaa group server radius "janus" server 10.5.0.61
aaa group server tacacs+ "sysadmin" server 10.7.0.22
aaa authentication iscsi webservices2 local group janus group tacacs+ aaa authentication login default group sysadmin monitor
Example
Cisco SN
Chapter 9 Configuring Authentication
Verifying and Saving Configuration
Cisco SN