An AAA policy enables administrators to define access control settings governing network permissions. External RADIUS and LDAP servers (AAA servers) also provide user database information and user authentication data. Each WLAN maintains its own unique AAA configuration.
AAA provides a modular way of performing the following services:
Authentication — Provides a means for identifying users, including login and password dialog, challenge and response, messaging support and (depending on the security protocol), encryption. Authentication is the technique by which a user is identified before allowed access to the network. Configure AAA authentication by defining a list of authentication methods, and then applying the list to various interfaces. The list defines the authentication schemes performed and their sequence. The list must be applied to an interface before the defined authentication technique is conducted.
Authorization — Authorization occurs immediately after authentication. Authorization is a method for remote access control, including authorization for services and individual user accounts and profiles. Authorization functions through the assembly of attribute sets describing what the user is authorized to perform. These attributes are compared to information contained in a database for a given user and the result is returned to AAA to determine the user's actual capabilities and restrictions. The database could be located locally or be hosted remotely on a RADIUS server. Remote RADIUS servers authorize users by associating attribute-value (AV) pairs with the appropriate user. Each authorization method must be defined through AAA. When AAA authorization is enabled it‘s applied equally to all interfaces.
Accounting — Collects and sends security server information for billing, auditing, and reporting user data; such as start and stop times, executed commands (such as PPP), number of packets, and number of bytes. Accounting enables wireless network administrators to track the services users are accessing and the network resources they are consuming. When accounting is enabled, the network access server reports user activity to a RADIUS security server in the form of accounting records. Each accounting record is comprised of AV pairs and is stored locally on the access control server. The data can be analyzed for network management, client billing, and/or auditing. Accounting methods must be defined through AAA. When AAA accounting is activated, it is applied equally to all interfaces on the access servers.
Use the (config) instance to configure AAA policy commands. To navigate to the config-aaa-policy instance, use the following commands:
nx9500-6C8809(config)#aaa-policy test nx9500-6C8809(config-aaa-policy-test)#? AAA Policy Mode commands: accounting Configure accounting parameters attribute Configure RADIUS attributes in access and accounting requests authentication Configure authentication parameters health-check Configure server health-check parameters mac-address-format Configure the format in which the MAC address must be filled in the Radius-Request frames no Negate a command or set its defaults proxy-attribute Configure radius attribute behavior when proxying through controller or rf-domain-manager server-pooling-mode Configure the method of selecting a server from the pool of configured AAA servers use Set setting to use clrscr Clears the display screen commit Commit all changes made in this session do Run commands from Exec mode end End current mode and change to EXEC mode exit End current mode and down to previous mode help Description of the interactive help system revert Revert changes --More-- nx9500-6C8809(config-aaa-policy-test)#
ap505-13403B(config-aaa-policy-test)#? AAA Policy Mode commands: accounting Configure accounting parameters attribute Configure RADIUS attributes in access and accounting requests authentication Configure authentication parameters health-check Configure server health-check parameters mac-address-format Configure the format in which the MAC address must be filled in the Radius-Request frames no Negate a command or set its defaults proxy-attribute Configure radius attribute behavior when proxying through controller or rf-domain-manager server-pooling-mode Configure the method of selecting a server from the pool of configured AAA servers use Set setting to use clrscr Clears the display screen commit Commit all changes made in this session do Run commands from Exec mode end End current mode and change to EXEC mode exit End current mode and down to previous mode help Description of the interactive help system revert Revert changes service Service Commands show Show running system information write Write running configuration to memory or terminal ap505-13403B(config-aaa-policy-test)#