AAA servers in Common Criteria mode

Common Criteria mode requires that devices support NDcPP version 2.1. This protocol defines the communication of the device with AAA servers to take place over a TLS support session.

Even though you can configure multiple TLS support for TACACS+ or RADIUS servers, only one connection can be active at any time due to system limitations. If another TLS support for TACACS+ or RADIUS session is attempted at the same time as the first TACACS+ or RADIUS session, the connection attempt is rejected.

Additionally, since the TACACS+ or RADIUS server may accept only a single TACACS+ or RADIUS session over the TCP or the TLS support connection, it is recommended you use this only for authentication.

When the device is in Common Criteria Operational mode, and the device has been configured for a TLS support for TACACS+ or RADIUS server for authentication, only one administrator will be able to administer the device. In addition, accounting and authorizing using the TLS support for TACACS+ or RADIUS server will be disabled.

Following are the configuration commands to configure and use a RADIUS server over secure port.

device(config)# aaa authentication login default radius 
device(config)# aaa authorization commands 0 default radius 
device(config)# aaa accounting commands 0 default start-stop radius 
device(config)# radius-server host 10.24.12.107 ssl-auth-port 2083 default key Pass@123

For radius-server host command, 10.24.12.107 is the IP address of the radius server listening on secure port 2083 and has been configured with shared secret Pass@123 in the server configuration. Refer to the configuring a RADIUS server with TLS support for details on RADIUS server configuration.

When the RADIUS timeout is not configured, the default timeout of 3 seconds is used to establish connection to a server. When you use stunnel as TLS proxy server between the device and RADIUS server the timeout should be increased to atleast 6 seconds.

device(config)#radius-server timeout 6
Note

Note

You can modify the default Common Criteria policy to allow a non-TLS support for TACACS+ or RADIUS server, but this will make the device noncompliant with Common Criteria requirements.
For configuring TACACS+, use the following commands:
device(config)#aaa authentication login default tacacs+ local
 device(config)#aaa authentication login privilege-mode 
device(config)#tacacs-server host 10.24.12.107 ssl-auth-port 60591 authentication-only key My$ecret123
device(config)#tacacs-server timeout 15

10.24.12.107 is the TACACS+ server listening on TLS port 60591 and configured with secret key My$ecret123. Unlike RADIUS, TACACS+ server has not been validated with native support for TLS on the server side and stunnel proxy server has been used. The maximum recommended TACACS+ connection timeout is 15.

More than one server can be configured on device for both RADIUS and TACACS+ servers . The device connects to them in series depending on the order of configuration. If it is able to connect to a server then it does not connect to subsequent servers.

Verify the revocation status of certificate using OCSP

The switch will always perform OCSP revocation-check on the certificate when the authorityInfoAccess extension is present and indicates that the accessMethod to use OCSP (1.3.6.1.5.5.7.48.1) specifying the accessLocation, which is the URI of the OCSP responder. Only when the revocation staus is 'good' will the certificate be accepted.

When the switch cannot establish a connection to determine the validity of a certificate, then it will not accept the certificate. If the digital certificate does not have authorityInfoAccess extension with an OCSP URI, then no revocation check is performed on that certificate.