i
Contents
Configuring AAA ···························································································· 1
About AAA·························································································································································· 1
AAA implementation ··································································································································· 1
AAA basic network diagram ······················································································································· 1
HWTACACS ··············································································································································· 2
User management based on ISP domains and user access types···························································· 3
Authentication, authorization, and accounting methods············································································· 4
AAA extended functions ····························································································································· 5
AAA for VPNs ············································································································································· 5
Protocols and standards ···························································································································· 5
AAA tasks at a glance ········································································································································ 5
Configuring local users······································································································································· 6
About local users ········································································································································ 6
Local user configuration tasks at a glance ································································································· 7
Configuring attributes for device management users················································································· 7
Configuring user group attributes ··············································································································· 8
Verifying and maintaining local users ········································································································· 9
Configuring HWTACACS ··································································································································· 9
HWTACACS tasks at a glance··················································································································· 9
Creating an HWTACACS scheme ··········································································································· 10
Specifying the HWTACACS authentication servers ················································································· 10
Specifying the HWTACACS authorization servers ··················································································· 10
Specifying the HWTACACS accounting servers ······················································································ 11
Specifying the shared keys for secure HWTACACS communication ······················································ 12
Specifying an MPLS L3VPN instance for the scheme ············································································· 12
Setting HWTACACS timers ······················································································································ 13
Specifying the source IP address of outgoing HWTACACS packets ······················································· 14
Setting the username format and traffic statistics units ············································································ 15
Setting the DSCP priority for HWTACACS packets ················································································· 16
Specifying the action to take for AAA requests if all HWTACACS servers are blocked ··························· 16
Configuring HWTACACS stop-accounting packet buffering ···································································· 16
Verifying and maintaining HWTACACS ··································································································· 17
Creating an ISP domain ··································································································································· 17
About ISP domains ·································································································································· 17
Restrictions and guidelines for ISP domain configuration ········································································ 18
Creating an ISP domain ··························································································································· 18
Specifying the default ISP domain ··········································································································· 18
Specifying an ISP domain for users that are assigned to nonexistent domains ······································ 19
Configuring ISP domain attributes ··················································································································· 19
Setting ISP domain status ························································································································ 19
Configuring authorization attributes for an ISP domain············································································ 19
Including the idle timeout period in the user online duration to be sent to the server ······························ 20
Specifying the user address type in an ISP domain················································································· 20
Configuring AAA methods for an ISP domain ·································································································· 20
Configuring authentication methods for an ISP domain ··········································································· 20
Configuring authorization methods for an ISP domain ············································································· 22
Configuring accounting methods for an ISP domain ················································································ 23
Verifying and maintaining ISP domains ··································································································· 24
Setting the maximum number of concurrent login users ·················································································· 24
Enabling password change prompt logging ····································································································· 24
Configuring user online and offline recording··································································································· 25
About user online and offline recording···································································································· 25
Restrictions and guidelines for user online and offline recording configuration ······································· 25
Enabling user online failure recording ······································································································ 25
Enabling user offline recording ················································································································· 26
Verifying and maintaining user online and offline records········································································ 26
AAA configuration examples ···························································································································· 27