ACOS 4.1.1-P11 Management Access and Security Guide: For A10 Thunder Series and AX™ Series 29 May 2019
ACOS 4.1.1-P11 Management Access and Security Guide: For A10 Thunder Series and AX™ Series 29 May 2019
1-P11
Management Access and Security Guide
for A10 Thunder® Series and AX™ Series
29 May 2019
© 2019 A10 NETWORKS, INC. CONFIDENTIAL AND PROPRIETARY- ALL RIGHTS RESERVED
Information in this document is subject to change without notice.
PATENT PROTECTION
A10 Networks products are protected by patents in the U.S. and elsewhere. The following website is provided to satisfy the virtual pat-
ent marking provisions of various jurisdictions including the virtual patent marking provisions of the America Invents Act. A10 Net-
works' products, including all Thunder Series products, are protected by one or more of U.S. patents and patents pending listed at:
https://www.a10networks.com/company/legal-notices/a10-virtual-patent-marking
TRADEMARKS
A10 Networks trademarks are listed at:
https://www.a10networks.com/company/legal-notices/a10-trademarks
CONFIDENTIALITY
This document contains confidential materials proprietary to A10 Networks, Inc. This document and information and ideas herein may
not be disclosed, copied, reproduced or distributed to anyone outside A10 Networks, Inc. without prior written consent of A10 Net-
works, Inc.
Anyone who uses the Software does so only in compliance with the terms of the End User License Agreement (EULA), provided later
in this document or available separately. Customer shall not:
1. Reverse engineer, reverse compile, reverse de-assemble, or otherwise translate the Software by any
means.
2. Sub-license, rent, or lease the Software.
DISCLAIMER
This document does not create any express or implied warranty about A10 Networks or about its products or services, including but
not limited to fitness for a particular use and non-infringement. A10 Networks has made reasonable efforts to verify that the informa-
tion contained herein is accurate, but A10 Networks assumes no responsibility for its use. All information is provided "as-is." The
product specifications and features described in this publication are based on the latest information available; however, specifications
are subject to change without notice, and certain features may not be available upon initial product release. Contact A10 Networks for
current information regarding its products or services. A10 Networks’ products and services are subject to A10 Networks’ standard
terms and conditions.
ENVIRONMENTAL CONSIDERATIONS
Some electronic components may possibly contain dangerous substances. For information on specific component types, please contact
the manufacturer of that component. Always consult local authorities for regulations regarding proper disposal of electronic compo-
nents in your area.
FURTHER INFORMATION
For additional information about A10 products, terms and conditions of delivery, and pricing, contact your nearest A10 Networks
location, which can be found by visiting www.a10networks.com.
Table of Contents
page 3
ACOS 4.1.1-P11 Management Access and Security Guide
Contents
page 4
ACOS 4.1.1-P11 Management Access and Security Guide
Contents
page 5
ACOS 4.1.1-P11 Management Access and Security Guide
Contents
Configuring Authentication..................................................................................................70
Configuring Remote Authentication by Using the GUI ....................................................................... 70
Configuring Global Authentication Settings on the ACOS Device ............................................. 70
Configuring a RADIUS Server ........................................................................................................... 70
Configuring a TACACS+ Server ........................................................................................................ 71
Configuring an LDAP Server ............................................................................................................. 72
Configuring Remote Authentication by Using the CLI ....................................................................... 73
Additional TACACS+ Authentication Options .....................................................................73
Password Self-Service .............................................................................................................................. 74
Configuring Access to the Privileged EXEC Level ............................................................................... 74
Configuring Access to the Privileged EXEC Level by Using the GUI ......................................... 74
Configuring Access to the Privileged EXEC Level in the CLI ...................................................... 74
Configuring Access to the Privileged EXEC Level by Using the CLI ......................................... 75
TACACS Server Number Increment and the Limitation ..................................................................... 75
Overview ............................................................................................................................................... 75
Known Issues or Limitations ............................................................................................................ 75
Requirements ...................................................................................................................................... 76
Scenario ................................................................................................................................................ 76
GUI ......................................................................................................................................................... 76
CLI .......................................................................................................................................................... 76
aXAPI ..................................................................................................................................................... 76
Important .............................................................................................................................................. 77
CLI Examples ........................................................................................................................77
RADIUS Authentication ............................................................................................................................. 77
TACACS+ Authorization ........................................................................................................................... 77
TACACS+ Accounting ............................................................................................................................... 78
RADIUS Server Setup ................................................................................................................................ 78
Windows IAS Setup for RADIUS ..........................................................................................80
Configuring Windows IAS for ACOS RADIUS Authentication ........................................................... 81
Configuring Access Groups ..................................................................................................................... 81
If the Active Directory is Not Installed ............................................................................................ 81
Configuring RADIUS Client for ACOS Device ........................................................................................ 83
Configuring Remote Access Policies ..................................................................................................... 84
Adding Active Directory Users to ACOS Access Groups ................................................................... 94
Registering the IAS Server in Active Directory ..................................................................................... 95
Configuring RADIUS on the ACOS Device ............................................................................................. 96
Verifying the Configuration ...................................................................................................................... 96
Additional Reference Information .......................................................................................96
page 6
ACOS 4.1.1-P11 Management Access and Security Guide
Contents
page 7
ACOS 4.1.1-P11 Management Access and Security Guide
Contents
page 8
Feedback ACOS 4.1.1-P11 Management Access and Security Guide
Administrator Accounts
This chapter describes how to configure and modify administrator accounts for management access
to ACOS.
Feedback page 9
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Overview of Administrator Accounts FFee
e
If an ACOS object is configured in the shared partition, it is available to processes and users of all the
ADPs. However, if an ACOS object is created in an ADP, it is available only to processes and users in
that ADP. In other words, partitioning allows the ACOS device to be logically segmented to support sep-
arate systems for separate customers. This provides isolation of configuration objects and also iso-
lates administration of these components.
Each ADP has its own set of Layer 3 - 7 independently running processes. Communication between
partitions is through routed interfaces.
NOTE: ADPs are also called L3V partitions in the ACOS user guides and reference
books.
The section Configuration Instructions and Examples shows how create administrator accounts.
page 10
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Overview of Administrator Accounts
page 11
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Configuration Instructions and Examples FFee
e
• Overview
Overview
The “admin” account has global read/write privileges and can configure additional administrator
accounts with the following settings:
• A user interface that the administrator can use (CLI, GUI, or aXAPI)
NOTE: If you are configuring an administrator account for an L3V partition, see
“Configuring Partition Admin Accounts” in the Configuring Application
Delivery Partitions guide.
page 12
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Configuration Instructions and Examples
page 13
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Configuration Instructions and Examples FFee
e
2. Check the status and privileges of the newly created admin1. By default, global read-only privilege is
granted to the CLI, the GUI (Web), and the AXAPI:
1. To change admin interfaces that admin1 has access to, enter the access command specifying the
allowed interfaces:
ACOS(config-admin:adminuser1)# access cli axapi
Modify Admin User successful!
page 14
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Configuration Instructions and Examples
By default, only the ACOS root admin is authorized for HM privilege. It should only be enabled only for
other admins sufficiently trusted to perform these operations without malicious purpose or malicious
content which could otherwise compromise security in the ACOS system and its deployed environ-
ment.
For deployments using the external health monitor feature, the most secure configuration would be to
not enable this privilege for configured admins and have all health monitor file operations performed by
the ACOS root admin.
Deployments not using the external health monitor feature of ACOS should avoid enabling this privilege
for any admins.
For more information, see Authorization (page 61), A10 Schema File for OpenLDAP (page 101), and the
Application Delivery and Server Load Balancing Guide (Using External Health Methods section)
1. To authorize external health monitor privileges, in addition to all read/write access, enter the priv-
ilege hm command.
ACOS(config-admin:adminuser1)# privilege hm
Modify Admin User successful!
page 15
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Configuration Instructions and Examples FFee
e
• Overview
page 16
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Configuration Instructions and Examples
Overview
An administrator with root privileges can delete other administrator accounts.
To delete an admin account, you first must terminate any active sessions the administrator
account has open. The account is not deleted if open sessions exist.
This procedure can only be performed through the security console, and only within the first five min-
utes of rebooting the ACOS device.
1. Use the show version or show hardware commands and record the serial number for your device.
2. Reboot the ACOS device.
3. Connect to the serial console.
4. When prompted for the user name and password, enter the following:
User Name: reset
Password: serial number for your device
page 17
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Configuring the Administrator Lockout Feature FFee
e
Use the serial number recorded in step 1, or locate the serial number on the rear of your ACOS
device.
5. After logging in, the CLI presents the following questions:
a. Do you want to reset admin password to default?[y/n]:
Answering y to this question resets the admin user name and password to the factory default
admin and a10.
CAUTION: Answering y to this questions means you must reconfigure the device.
6. Answer y to the first question so that you can log on to the device; answer the other two questions
as desired for your needs.
7. After you log on to the device, change the admin password for security purposes.
Administrator lockout occurs after a number of failed login attempts. This topic shows how to enable
this feature and specify the parameters that determine how it operates.
By default, administrator lockout is not enabled and there is no limit to the number of times you can
enter an incorrect password with an administrator account to log in.
page 18
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Configuring the Administrator Lockout Feature
3. Enter values in the Duration, Threshold and Reset Time fields. These fields determine the
parameters of the administrator lockout feature.
4. After you have entered values, select the Enable checkbox and click OK.
To lock an administrator account after 15 failed attempts, enter the following command:
page 19
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Additional CLI Reference Information FFee
e
To lock an administrator account permanently or until the root administrator unlocks the account,
enter the following command:
To view the lockout status of the account for admin1, enter the following command:
page 20
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Additional CLI Reference Information
This section lists commands that are relevant to the examples and instructions of this chapter.
ACOS# configure
ACOS(config)# admin adminuser1
ACOS(config-admin:adminuser1)#
The following CLI commands are available in the admin configuration mode:
ACOS# configure
ACOS(config)# admin adminuser1
The following global configuration commands are relevant to the features configured in this chapter:
admin
page 21
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Additional CLI Reference Information FFee
e
admin-lockout
page 22
Feedback ACOS 4.1.1-P11 Management Access and Security Guide
Role-Based Access (RBA) provides the ability to fine-tune the permissions and privileges of admin
accounts.
An RBA role is a named bundle of individual administrative privileges that can be bound collectively, like
a template, to admin accounts. Using roles provides a consistent and efficient method of setting the
privileges of administrators that have similar roles or the same role.
An RBA group is a named collection of individual admin accounts that can be bound either to individual
privileges or to RBA roles or both.
Because you can bind individual privileges to admin accounts upon which a role is also bound, you can
insert individual differences in privilege as needed.
• Overview
Overview
Before you can fine tune your admin accounts using RBA consider the following:
Feedback page 23
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Overview of How RBA Fine Tunes Admin Accounts FFee
e
• The admin user accounts must be created before they can be fine tuned using RBA. See Configu-
ration Instructions and Examples for instructions.
• If you plan to use an RBA role, it must be configured before it can be bound to admin accounts.
1. Enable RBA.
2. Create RBA user(s) with the same name(s) as existing admin accounts. Optionally, create an RBA
group that includes multiple admin accounts.
3. Specify the partition for the RBA user or group. You can specify the shared partition in this step.
NOTE: RBA privileges for users or groups must be set per partition, including the
shared partition. The shared partition is described in the Configuring
Application Delivery Partitions guide.
4. Inside the partition, bind individual privileges or RBA role to the RBA user or group.
You can configure privileges explicitly using the lineage of the object class with the permitted opera-
tion (for example, slb.virtual-server read) or you specify a role (for example, role1). See Object
Class Lineage for instructions on using object class lineage for RBA privileges. A role is a collection
of explicitly specified privileges. See Configuring an RBA Role for instructions on configuring RBA
roles.
5. You can give the RBA users and groups to have privileges in multiple partitions. Optionally, repeat
steps 3 and 4 for additional partitions.
page 24
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
RBA Configuration Examples
If you enter or selected slb as the lineage, it means the permitted operations associated with slb apply
to all the various types of SLB objects in ACOS.
The next section describes what happens if you configured multiple lineages and multiple permitted
operations for the same user (or role).
Privileges for a longer (and more specific) object take precedence over a shorter and less specific
ACOS object.
page 25
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
RBA Configuration Examples FFee
e
NOTE: To configure an RBA role, follow the same steps as configuring an RBA
user, but in the second step select Role from the drop down list of the
RBA tab.
page 26
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
RBA Configuration Examples
NOTE: Because of the “Longest Match Takes Precedence Rule” in the following
sections, admin1 does not have write access to SLB virtual-servers and
does not any access SLB real servers. However, for all other SLB objects
in ACOS, the admin1 account has read/write access.
NOTE: If there is a configured RBA role that specifies all the permissions that
you want to grant the user, you can apply the role at the partition level
rather than configuring each privilege separately by using the Role List
field instead of the Rule List field on this screen (see Configuring an
RBA Role).
2. Enable RBA.
3. Create the RBA user with the same name as the existing admin user.
4. Specify the admin partition of the RBA user. If the admin partition does not already exist for the
administrator, this step assigns the RBA user to it.
5. Configure the RBA privileges for the user in the partition the object class lineage syntax. Alterna-
tively to this step, you can assign privileges using RBA roles. See step 6.
page 27
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
RBA Configuration Examples FFee
e
Specify the privileges by starting with the highest CLI level and then using a dot (.) to indicate the
next level.
In the following, the first configuration line gives the adminuser1 read-write privileges to all SLB
commands, the second line gives the user read-only privilege to the SLB virtual-server commands,
and the third line give the user no-access to SLB real server commands:
6. Alternatively to step 5, assign an RBA role or roles (Configuring an RBA Role) that specifies all the
privileges that you want to grant the user, you can apply the role at the partition level rather than
configuring each privilege separately. For example:
page 28
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
RBA Configuration Examples
To restrict the user to a subset of options available at the command level, enter a dot (.) followed by a
keyword option. For example, the following commands restricts adminuser1 to read-only access to the
slb virtual-server commands and no access to slb server commands, but it does restrict the use of
other slb commands.
NOTE: Longest match takes precedence. The longer and more specific slb.vir-
tual-server and slb.server command lineages take precedence over
the less specific and shorter slb set of command lineage.
The following example configures RBA for user adminuser3. In partition Partition1, this user has read
privileges for SLB virtual server objects (that is commands), write privileges for SLB server objects, but
no access to all other SLB objects. In partition Partition2, this user has all privileges defined by RBA
role role1:
NOTE: The keyword root in a privilege command specifies the root level of the
CLI command set. Root includes the entire set of ACOS commands. The
default admin user has root read-write privileges.
page 29
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
RBA Configuration Examples FFee
e
After creating a group, select the users to add to the group or select a partition for which you want to
modify the permissions. You can add users at any time, so you do not need to create users before cre-
ating the group; if you specify a user that does not already exist, the user will be created along with the
group. The group’s permissions are configurable for multiple partitions, although each partition must
be configured separately.
page 30
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
RBA Configuration Examples
1. Enable RBA:
2. Select existing admin user accounts to which to add RBA attributes. See the configuration Using
the CLI to Configure Admin Accounts for a step-by-step configuration of admin user accounts. In
this example, create an RBA group that includes both adminuser2 and adminuser3:
page 31
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
RBA Configuration Examples FFee
e
NOTE: User privileges take precedence over group privileges. An individual user’s
privileges whether assigned by role or individually take precedence over
the group privileges whether assigned by role or individually.
Because longest match takes precedence, admin users that are assigned the role, slb1
• have permission to create, edit, or delete all ACOS SLB objects (such as slb configuration com-
mands) except SLB virtual servers and SLB (real) servers.
page 32
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Additive and Subtractive Methods
• have permission to view the configuration and status of SLB virtual servers.
Specify the privileges by starting with the highest level and enter a dot (.) to indicate the next level. For
example, to configure write access at the SLB command level, read-only privileges for SLB virtual-serv-
ers, but no access to SLB servers, enter the following commands:
Because longest match takes precedence, admin users that are assigned the role, role1
• have permission to create, edit, or delete all ACOS SLB objects (such as slb configuration com-
mands) except SLB virtual servers and SLB (real) servers.
• have permission to view the configuration and status of SLB virtual servers.
NOTE: Individual privileges take precedence over role privileges. If the user or group
has individual permissions defined in addition to the role, a combination
of the individual and role permissions are applied. If there are conflicting
privileges between a group’s uniquely configured privileges and an RBA
role’s privileges, the group’s unique privileges are used.
• Overview
page 33
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Additive and Subtractive Methods FFee
e
Overview
There are two ways in which you can configure object privileges using RBA:
• Additive RBA, which is more useful for granting admins privileges to access certain objects. For
more information, see Understanding Additive RBA.
• Subtractive RBA, which is more useful to denying admins privileges to access certain objects.
For more information, see Understanding Subtractive RBA.
1. Use the root no-access command to overwrite the default write privileges of the admin, thus
removing all of the admin’s create, edit, and delete privileges.
2. Use RBA commands to selectively add the desired privileges.
Consider the following example with admin admin_so who has write privileges by default. The admin is
able to create a health monitor with the default privileges:
The RBA configuration will remove all of the default write privileges (root no-access), and allow only
creation of SLB objects (slb write):
When admin_so tries to configure a health monitor again, they will not be able to:
But admin_so is able to configure SLB objects, as defined by the RBA configuration:
page 34
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Additional CLI Reference Information
The user admin_so had their default write privileges removed, and SLB privileges added back to their
profile.
Now, we add the RBA configuration to give no-access privileges to user admin_nt for SLB templates:
When admin_nt tries to run the show command again, no SLB template are visible:
The admin admin_nt will still have all normal privileges to create, edit, or delete all other objects on the
device, just not SLB templates as this has been subtracted from the user’s privileges.
page 35
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Additional CLI Reference Information FFee
e
• Overview
Overview
The following commands are described in the Command Line Interface Reference.
NOTE: The clear, do, end, exit, no, show. user-tag, and write commands are not
shown in the following because they are common to all CLI modes and
not specific to any configuration mode.
ACOS(config)# rba ?
group RBA configuration for a group
role Role configuration for RBA support
user RBA configuration for a user
enable Enable RBA
disable Disable RBA
page 36
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Additional CLI Reference Information
page 37
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Additional CLI Reference Information FFee
e
page 38
Feedback ACOS 4.1.1-P11 Management Access and Security Guide
By default, certain types of management access through the ACOS device’s Ethernet interfaces are
blocked.
This chapter describes how to configure management access based on the interface.
You can enable or disable management access for each access type and interface.
You also can use an Access Control List (ACL) to permit or deny management access through the
interface by using specific hosts or subnets.
Feedback page 39
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Configuring Access by Using Access Control Lists FFee
e
To replace the current ACL with a different one, you must first remove the ACL that is currently bound
to the interface.
Additionally, if you apply an enable-management ACL to the management interface, an ACL for an indi-
vidual service is not supported.
For example, you cannot enter the following rule on the management interface:
The following commands enables Telnet access to Ethernet data interface 6 with ACL 1:
page 40
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Configuring Management Access Through Ethernet Interfaces
The user can configure management access through Ethernet interfaces in one of the following ways.
page 41
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Viewing the Current Management Access Settings FFee
e
The following example command disables HTTP access to the out-of-band management interface:
The following example shows an ACOS device with 12 Ethernet data ports. In this example, all the
access settings are set to their default values:
page 42
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Regaining Access if You Accidentally Block All Access
If you accidentally enter the all option for all interfaces, which locks you out of the device completely,
you can still access the CLI by connecting a computer to the ACOS device’s serial port.
page 43
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Additional CLI Reference Information FFee
e
page 44
Feedback ACOS 4.1.1-P11 Management Access and Security Guide
By default, access to the ACOS management HTTP Graphical User Interface (GUI) is enabled and is
secure. A valid administrator username and password are required to log in.
Feedback page 45
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Configuring the Web Access FFee
e
NOTE: If you disable HTTP or HTTPS access, sessions on the management GUI
are immediately terminated.
• By default, the web server is enabled on the system. The following command disables the web
server:
ACOS(config)# web-service server disable
page 46
Feedback ACOS 4.1.1-P11 Management Access and Security Guide
• Overview
Overview
ACOS provides an option to simplify management access through the CLI, with support for public key
authentication.
Public key authentication allows an ACOS administrator to log in through SSH without entering a pass-
word. When the administrator enters a username and presses Enter, the SSH client on the administra-
tor’s computer sends a signature file for the administrator.
The ACOS device compares the signature file to the administrator’s public key that is stored on the
ACOS device. If they match, the administrator is granted access.
The following example show you how to generate a key pair from a remote client with the administrator
account admin2:
Feedback page 47
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Importing the Public Key to the ACOS Device FFee
e
NOTE: At the passphrase prompts, press Enter and do not enter any charac-
ters.
NOTE: The admin account has root privileges and can manage the public certifi-
cates for all administrators. Other administrators accounts can manage
only the public key that belongs to that administrators account.
The following example shows you how to import a public key for the administrator user admin2:
NOTE: For more information, see the admin command in the Command Line
Interface Reference, in the section were the ssh-pubkey import command
is described.
You can enter the ssh-pubkey list command to view the public keys on your system.
page 48
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Deleting a Public Key
The num option specifies the key number on the ACOS device. You can display the key numbers and the
keys by entering the ssh-pubkey list command.
ACOS(config-admin:adminuser1)# ssh-pubkey ?
delete Delete an authorized public key
import Import an authorized public key
list List all authorized public keys
page 49
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Additional Reference Information FFee
e
page 50
Feedback ACOS 4.1.1-P11 Management Access and Security Guide
The following topics are covered in this chapter. The topics provide the necessary information on the
RADIUS and TACACS+ features.
• Authentication
• Authorization
• Configuring Authentication
• CLI Examples
You can configure the ACOS device to use remote servers for Authentication, Authorization, and
Accounting (AAA) for administrative sessions.
NOTE: For information about LDAP support, see Lightweight Directory Access
Protocol (LDAP).
Authentication
This topic contains the following sections:
• Overview
• Tiered Authentication
• Authentication Process
Feedback page 51
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Authentication FFee
e
Overview
Authentication grants or denies access to the device based on the credentials provided by the user
(admin user name and password).
By default, when someone attempts to log in to the ACOS device, the device determines whether the
username and password exist in the local administrative database. Without additional configuration,
the authentication process stops at this point.
If the administrator username and password exist in the local database, the user is granted access;
otherwise, access to the device is denied.
You can configure the ACOS device to also use external RADIUS, TACACS+ or LDAP servers for authen-
tication.
1. LDAP
2. TACACS+
3. RADIUS
4. Local database
In this example, the ACOS device tries to use the LDAP servers first. If no LDAP servers respond, the
ACOS device tries to use the TACACS+ servers.
If no TACACS+ servers respond, the ACOS device tries the RADIUS servers.
If no RADIUS servers respond, the ACOS device uses the local database.
Tiered Authentication
In addition to selecting multiple methods of authentication, if the primary authentication method is
unavailable, you can configure the ACOS device to use tiers of authentication and configure backup
authentication methods.
By default, the backup authentication method is used only if the primary method does not respond. If
the primary method responds and denies access, the secondary method is not used. The administrator
is not granted access.
page 52
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Authentication
You can enable the ACOS device to check the next method if the primary method does respond and
authentication fails. This option is called “tiered authentication”.
For example, the primary method is RADIUS and the next method is TACACS+. If RADIUS rejects the
administrator, tiered authentication attempts to authenticate the administrator by using TACACS+.
Table 4 provides information about the ACOS authentication behavior based on tiered authentication.
3. Only if no method2 servers reply, try method3. If a method3 server replies, permit or deny
access based on the server reply.
4. Only if no method3 servers reply, try method4. If authentication succeeds, the admin is per-
mitted. Otherwise, the admin is denied.
Multiple 1. Try method1. If a method1 server replies, permit access based on the server reply.
2. If no method1 servers reply or a method1 server denies access, try method2. If a method2
server replies, permit access based on the server reply.
3. If no method2 servers reply or a method2 server denies access, try method3. If a method3
server replies, permit access based on the server reply.
4. If no method3 servers reply or a method3 server denies access, try method4. If authentica-
tion succeeds, the admin is permitted. Otherwise, the admin is denied.
By default, tiered authentication is disabled and is set to single. You can enable it on a global basis.
Authentication Process
This section contains the following sub-sections:
• Scenario
• Disabling Local Authentication for the Administrator Account by Using the CLI
page 53
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Authentication FFee
e
Scenario
You can specify whether to check the local database or the remote server first. Figure 2 and Figure 3
show the authentication processes that are used if the ACOS device is configured to check remote AAA
servers first.
If the RADIUS, TACACS+, or LDAP server responds, the local database is not checked, and one of the
following situations occurs:
• If the administrator’s credentials are found on the RADIUS, TACACS+, or LDAP server, the admin-
istrator is granted access.
• If the administrator credentials are not found on the RADIUS, TACACS+, or LDAP server, the
administrator is denied access.
If there is no response from RADIUS, TACACS+, or LDAP server, the ACOS device checks its local data-
base for the administrator name and password.
NOTE: An exception is made for the admin account; by default, the ACOS device
always uses local authentication for admin.
Local authentication can be disabled for admin, in which case the authen-
tication process is the same as for other administrator accounts.
NOTE: For more information, see Disabling Local Authentication for the Admin-
istrator Account by Using the CLI.
page 54
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Authentication
FIGURE 2 Authentication Process When Remote Authentication Is First (Two Remote Servers Configured)
– RADIUS
ĚŵŝŶĞŶƚĞƌƐ
ƵƐĞƌŶĂŵĞĂŶĚ
ƉĂƐƐǁŽƌĚƚŽ
ůŽŐŝŶ͘
hƐĞƌŶĂŵĞĂŶĚ
ƉĂƐƐǁŽƌĚĂƌĞ
Z/h^ƐĞƌǀĞƌ ƌĞĚĞŶƚŝĂůƐĨŽƵŶĚŽŶ
ƐĞŶƚƚŽƚŚĞ zĞƐ EŽ
ƌĞƐƉŽŶĚƐ͍ Z/h^ƐĞƌǀĞƌ͍
ƉƌŝŵĂƌLJ
Z/h^ƐĞƌǀĞƌ͘
EŽ zĞƐ
ƵƚŚĞŶƚŝĐĂƚŝŽŶ
hƐĞƌŶĂŵĞĂŶĚ ƵƚŚĞŶƚŝĐĂƚŝŽŶĨĂŝůƐ͘
ƐƵĐĐĞĞĚƐ͘ĚŵŝŶŝƐ
ƉĂƐƐǁŽƌĚĂƌĞƐĞŶƚƚŽ ĚŵŝŶŝƐĚĞŶŝĞĚĂĐĐĞƐƐ͘
ŐƌĂŶƚĞĚĂĐĐĞƐƐ͘
ďĂĐŬƵƉZ/h^ zĞƐ ƵƚŚĞŶƚŝĐĂƚŝŽŶƉƌŽĐĞƐƐ
ƵƚŚĞŶƚŝĐĂƚŝŽŶƉƌŽĐĞƐƐ
ƐĞƌǀĞƌ͘ ĞŶĚƐ͘
ĞŶĚƐ͘
zĞƐ
ĂĐŬƵƉZ/h^ ƌĞĚĞŶƚŝĂůƐĨŽƵŶĚŽŶ
EŽ
ƐĞƌǀĞƌƌĞƐƉŽŶĚƐ͍ ůŽĐĂůĚĂƚĂďĂƐĞ͍
EŽ
hƐĞƌŶĂŵĞĂŶĚ
ƉĂƐƐǁŽƌĚĂƌĞƐĞŶƚƚŽ
ůŽĐĂůĚĂƚĂďĂƐĞ͘
page 55
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Authentication FFee
e
FIGURE 3 Authentication Process When Remote Authentication Is First (One Remote Server Configured) –
TACACS+
ĚŵŝŶĞŶƚĞƌƐ
ƵƐĞƌŶĂŵĞĂŶĚ
ƉĂƐƐǁŽƌĚƚŽ
ůŽŐŝŶ͘
hƐĞƌŶĂŵĞĂŶĚ
ƉĂƐƐǁŽƌĚĂƌĞ
d^нƐĞƌǀĞƌ ƌĞĚĞŶƚŝĂůƐĨŽƵŶĚŽŶ
ƐĞŶƚƚŽƚŚĞ zĞƐ EŽ
ƌĞƐƉŽŶĚƐ͍ Z/h^ƐĞƌǀĞƌ͍
d^н
ƐĞƌǀĞƌ͘
EŽ zĞƐ
ƌĞĚĞŶƚŝĂůƐĨŽƵŶĚŽŶ
zĞƐ
ůŽĐĂůĚĂƚĂďĂƐĞ͍
EŽ
Disabling Local Authentication for the Administrator Account by Using the CLI
By default, the ACOS device always locally authenticates admin even if RADIUS, TACACS+, or LDAP is
used as the primary authentication method.
To disable automatic local authentication for the administrator account, access the admin configura-
tion level for the admin you want to disable, then use the disable command. For example:
NOTE: If the RADIUS, TACACS+, or LDAP server can not be reached, the ACOS
device then uses local authentication for admin. This behavior is also
used for other administrator accounts when the remote AAA server can
not be reached.
page 56
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Authentication
After the administrator enters a username and a password, the ACOS device sends the credentials to
the RADIUS server. If the username and password are valid, and the server is configured to use token-
based authentication, the server replies with an Access-Challenge message. The ACOS device displays
a prompt for the required token.
The ACOS device attempts to verify the token, and one of the following situations occurs:
• If the token is invalid, even though the username and password are valid, access is denied.
By default, support for token-based RADIUS authentication is enabled and can not be disabled. No
additional configuration is required on the ACOS device.
You can configure token-based authentication for RADIUS by using the GUI or the CLI.
ACOS>
page 57
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Authorization FFee
e
Authorization
This topic contains the following sections:
• CLI
• GUI
• aXAPI
The user can also permit or deny administrator access to edit, create, import, or delete External Health
Monitor files. By default, administrators are not allowed to manage External Health Monitor files.
• RADIUS Configuration for User Interface and External Health Monitor Access
• TACACS+ Configuration for User Interface and External Health Monitor Access
RADIUS Configuration for User Interface and External Health Monitor Access
To configure RADIUS authorization based on user interface and External Health Monitor access, use:
A10-Admin-Access-Type
page 58
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Authorization
The following A10-Admin-Access-Type values provide access to the corresponding user interface:
• cli
• web
• axapi
To authorize access to more than one user interface, enter a comma between each value. For example,
to authorize access to the CLI and web interfaces, enter cli,web.
The following A10-Admin-Access-Type value provides access to configure External Health Monitors:
• hm
An A10-Admin-Access-Type command that includes the hm value must also include at least one user
interface value.
For example, to authorize access to the CLI and web interfaces, enter cli,web.
SECURITY: The hm value should be enabled only for other admins sufficiently trusted
to perform these operations without malicious purpose or malicious con-
tent which could otherwise compromise security in the ACOS system
and its deployed environment.
For more information, see the Application Delivery and Server Load Bal-
ancing Guide (Using External Health Methods section) and “Configuring
LDAP for ACOS Administrators” on page 99.
TACACS+ Configuration for User Interface and External Health Monitor Access
To configure authorization based on the user interface and External Health Monitor access, enter the
following Attribute Value Pair (AVP):
a10-access-type=user-interface
• cli
• web
• axapi
• hm
An AVP pair statement that includes the hm option must also specify a second option. To authorize
access to more than one user interface, enter a comma between each value, for example,
a10-access-type=cli,hm
page 59
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Authorization FFee
e
SECURITY: The hm value should be enabled only for other admins sufficiently trusted
to perform these operations without malicious purpose or malicious con-
tent which could otherwise compromise security in the ACOS system
and its deployed environment.
For more information, see the Application Delivery and Server Load Bal-
ancing Guide (Using External Health Methods section) and “Configuring
LDAP for ACOS Administrators” on page 99.
It is not required to assign a privilege level to an ACOS admin on the RADIUS or TACACS+ server used
to authenticate the admin. The ACOS device uses the GUI access role assigned to the admin in the
admin’s account on the ACOS device.
However, if a privilege level is assigned to the admin on the RADIUS or TACACS+ server, that privilege
level must match the privilege assigned to the admin in the ACOS configuration. Otherwise, the admin
will be denied access.
page 60
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Authorization
Table 5 lists the RADIUS and TACACS+ privilege levels that match the GUI privileges.
TABLE 5 RADIUS / TACACS+ Privilege Levels and Matching GUI Access Roles
Privilege Level
GUI Access Role RADIUS TACACS+ Partition Role
ReadWriteAdmin 1 2 15 N
ReadOnlyAdmin 1 0 N
PartitionReadWrite 8 9 Y
PartitionSlbServiceOp- 11 6 Y
erator
PartitionReadOnly 12 5 Y
1. The ReadWriteAdmin role includes enabled support for External Health Monitor file access as described above.
The Partition Role column indicates whether the privilege is for a partition admin and requires specifi-
cation of an L3V partition name. If the privilege level for a partition role is specified on the RADIUS or
TACACS+ server, the partition name also must be specified on the server. If the privilege level is for a
non-partition role, it is invalid to specify a partition name on the server.
NOTE: The LDAP configuration on L3V partitions are private and overwrite any
LDAP configuration on the shared L3V partition. However, AAA configu-
ration (RADIUS-server, TACAS-server, authentication, authorization, and
accounting) for administrators is global and not partition specific. When
you enter the show running config command from an L3V partition, the
local partition LDAP configuration is displayed while the shared partition
AAA is displayed.
SECURITY: Given that the ReadWriteAdmin roll enables External Health Monitor File
access, it should only be assigned for admins sufficiently trusted to per-
form these operations as performing without malicious purpose or mali-
cious content which could otherwise compromise security in the ACOS
system and its deployed environment.
For more information, see the Application Delivery and Server Load Bal-
ancing Guide (Using External Health Methods section) and “Configuring
LDAP for ACOS Administrators” on page 99.
A10-Admin-Role = "PartitionReadWrite"
page 61
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Authorization FFee
e
NOTE: The A10-Admin-Privilege option applies only to GUI access. It does not
restrict CLI or aXAPI access.
a10-admin-role=role-name
NOTE: This attribute-value pair applies only to GUI access. It does not restrict
CLI or aXAPI access.
• Overview
Overview
You can configure the ACOS device to use external RADIUS, TACACS+, or LDAP servers to authorize
CLI commands.
After a successful authentication, the authenticated party is granted access to specific system
resources by authorization.
For an ACOS administrator, authorization specifies the CLI levels that they can access.
• backup
• config
• import
• locale
• reboot
• reload
page 62
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Authorization
• shutdown
The first line grants access to the User EXEC level and Privileged EXEC level. The administrator’s CLI
session begins at the User EXEC level. The administrator can access the Privileged EXEC level without
entering an enable password, but the administrator cannot access the configuration level:
ACOS> enable
ACOS#
The second line grants access to all levels, and the administrator’s CLI session begins at the Privileged
EXEC level:
ACOS#
page 63
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Authorization FFee
e
• Overview
Overview
To configure TACACS+ CLI authorization, complete the following tasks:
• Configure the TACACS+ server to authorize or deny the execution of specific commands or com-
mand groups.
• Configure the ACOS device to send commands to the TACACS+ server for authorization before
executing those commands.
This authorization process does not apply to administrators who log in by using the GUI.
• 15 (admin) – This is the most extensive level of authorization. The commands at all CLI levels,
including those used to configure administrative accounts, are sent to TACACS+ for authoriza-
tion.
• 14 (config) – Commands at all CLI levels, except the commands that are used to configure
administrative accounts, are sent to TACACS+ for authorization. The commands that are used to
configure administrator accounts are automatically allowed.
• 1 (admin) – This is the most extensive level of authorization and is the same as access level 15.
The commands at the Privileged EXEC and User EXEC levels are sent to TACACS+ for authoriza-
tion, and the commands at other levels are automatically allowed.
• 0 (user EXEC) – This is the equivalent of Read-only privileges. The commands at the User EXEC
level are sent to TACACS+ for authorization, and the commands at other levels are automatically
allowed.
Access levels 1-15 grant access to the Privileged EXEC level or higher, without challenging the adminis-
trator for the enable password. Access level 0 grants access only to the User EXEC level.
page 64
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Authorization
• 0x1 – Common system events such as “trying to connect with TACACS+ servers” and “getting
response from TACACS+ servers”. These events are recorded in the syslog.
• 0x2 – Packet fields sent out and received by the Thunder Series device, not including the length
fields. These events are written to the terminal.
• 0x4 – Length fields of the TACACS+ packets will also be displayed on the terminal.
• 0x8 – Information about TACACS+ MD5 encryption will be sent to the syslog.
• Overview
Overview
If the ACOS device is configured with L3V partitions, you can specify which partitions a remotely
authenticated administrator can access. You can authorize an administrator to access up to 8 parti-
tions. The partition name that is specified on the RADIUS or TACACS+ server must match the partition
name that is specified in the administrator’s account configuration on the ACOS device.
NOTE: For administrators with global access, which means access to the
shared partition, do not specify a partition name.
A10-Admin-Partition = "partition1"
page 65
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Authorization FFee
e
To authorize an administrator for access to multiple partitions, use the following syntax:
A10-Admin-Partition = "partition-name1”
A10-Admin-Partition += " partition-name2”
A10-Admin-Partition += " partition-name3”
A10-Admin-Partition += " partition-name4”
A10-Admin-Partition += " partition-name5”
A10-Admin-Partition += " partition-name6”
A10-Admin-Partition += " partition-name7”
A10-Admin-Partition += " partition-name8”
• To authorize an administrator to access only the resources in a specific L3V partition, use the fol-
lowing AVP:
a10-partition=partition-name
a10-partition = partition-name1,partition-name2,
partition-name3,partition-name4,partition-name5,
partition-name6,partition-name7,partition-name8
NOTE: For more information, see A10 Schema File for OpenLDAP.
page 66
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Configuring Accounting Options
ACOS>
Service-Type=NAS Prompt Allows access to the Privileged EXEC level of the CLI and read-
only access to the GUI. The Privileged EXEC level of the CLI is
denoted by the following prompt (as an example):
ACOS#
Service-Type=Administrative Allows access to the configuration level of the CLI and read-only
access to the GUI. The configuration level of the CLI is denoted by
the following prompt (as an example):
ACOS(config)#
By default, if the Service-Type attribute or the A10 vendor attribute is not used, successfully authenti-
cated administrators are authorized for read-only access. You can change the default privilege that is
authorized by RADIUS from read-only to read-write. To change the default access level authorized by
RADIUS, enter the following command at the global configuration level of the CLI:
• Overview
page 67
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Configuring Accounting Options FFee
e
Overview
The user can configure the ACOS device to use external RADIUS or TACACS+ for accounting for the fol-
lowing activities:
When the user logs in, the accounting process starts, and when the user logs off, the accounting
process stops.
• Commands
page 68
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Configuring Authentication, Authorization, Accounting (AAA) and for Administrator Access
page 69
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Configuring Authentication FFee
e
Configuring Authentication
This topic contains the following sections:
You can configure remote authentication by using the GUI or the CLI.
There are no mandatory fields that need to be completed on the Authentication Settings page; you can
configure your desired global authentication settings as needed.
Refer to the GUI online help for more information about the fields on this page.
Click Authentication Settings when you are finished specifying your desired configuration.
page 70
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Configuring Authentication
5. In the Secret field, enter the shared secret (password) expected by the server when it receives
requests.
6. Complete the other fields on this page as desired; refer to the online help for additional informa-
tion.
7. Click Create.
The first RADIUS server configured will act as the primary server and the ACOS device will attempt to
use this server first for authentication.
You can configure additional RADIUS servers as needed, if you want to have any backup servers.
1. Navigate to System >> Admin >> External Authentication >> TACACS Host.
2. Click Create to designate a TACACS+ server and enter settings.
3. Enter the hostname or IP address of the server in the Server field.
4. In the Type field, indicate whether the specified server is an IPv4 or IPv6 address, or a name.
5. In the Secret Value field, enter the password expected by the server when it receives requests.
6. Complete the other fields on this page as desired; refer to the online help for additional informa-
tion.
page 71
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Configuring Authentication FFee
e
7. Click Create.
The first TACACS server configured will act as the primary server and the ACOS device will attempt to
use this server first for authentication.
You can configure additional TACACS servers as needed, if you want to have any backup servers.
page 72
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Additional TACACS+ Authentication Options
7. Click Create.
The first LDAP server configured will act as the primary server and the ACOS device will attempt to use
this server first for authentication.
You can configure additional LDAP servers as needed, if you want to have any backup servers.
For more information on LDAP servers, refer to Lightweight Directory Access Protocol (LDAP).
• Password Self-Service
page 73
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Additional TACACS+ Authentication Options FFee
e
Password Self-Service
ACOS supports TACACS+ TAC_PLUS_AUTHEN_CHPASS (password change) messages. When this
option is enabled on the TACACS+ server, the server sends a TACACS+ TAC_PLUS_AUTHEN_CHPASS
message in response to an authentication request from the ACOS device. The ACOS device prompts
the administrator for the current and new passwords and sends the password change to the TACACS+
server. The ACOS device then grants access to the administrator.
Password self-service is enabled by default and cannot be disabled and is activated only when the
TACACS+ server sends a password change message.
page 74
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Additional TACACS+ Authentication Options
• Overview
• Requirements
• Scenario
• GUI
• CLI
• aXAPI
• Important
Overview
There is a need to increase the limit of the number of the TACACS server from two to three, due to the
following necessities.
• The Exchange server has three TACACS servers for their thousands of devices which are func-
tionally deployed and active with high volume or traffic.
• These deployed devices are running into the limit of two servers configured as the maximum
number of servers on ACOS.
• The user experience and traffic are enhanced once the limit is increased from the current limit of
two TACACS servers to three servers or as an optional number that user can configure.
page 75
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Additional TACACS+ Authentication Options FFee
e
• The TACACS monitor needs to be configured to use the most recently used server as the primary
server.
• The hard limit on the number of the TACACS server is increased to three servers and it starts
behaving in the following modes:
• Active: The first configured server as the Active Server.
• Standby: The other remaining two servers as the Standby Servers.
• In the eventuality of the request going to the first server, and fails, then the request is sent to the
other two servers, as well to check, whether if it passes the other servers or not.
Requirements
To configure the three TACACS servers in running the configuration, the user must ensure the follow-
ing:
• The first assigned or dedicated server must be Active and the other two servers must be on the
Standby Mode.
• The authorization request of any given session must go to the server, which authenticates the
session.
Scenario
The scenario of this feature is as the following:
• The second and the third servers are considered as the Standby Servers.
• The user uses the logic of requests which is sent to the most recently used server.
• If not, then the active server gets the requests by Default.
GUI
For this, there are no GUI changes required.
CLI
For this, there are no new CLI changes required or introduced.
aXAPI
For this, there are no changes in aXAPI regarding TACACS.
page 76
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
CLI Examples
Important
In this scenario, the following are the important points to consider:
• The new CLI or aXAPI changes or corrections must not work in L3V partitions.
CLI Examples
This topic contains the following sections:
• RADIUS Authentication
• TACACS+ Authorization
• TACACS+ Accounting
RADIUS Authentication
The following commands configure a pair of RADIUS servers for remote authentication and configure
the ACOS device to use these servers before using the local database. Since the RADIUS server
10.10.10.12 is added first, this server is used as the primary server. Server 10.10.10.13 is used only if the
primary server is unavailable.
TACACS+ Authorization
The following commands configure the ACOS device to use TACACS+ server 10.10.10.13 to authorize
commands at all CLI levels. In this example, the none option is not used. As a result, if TACACS+ autho-
rization cannot be performed, for example, due to server unavailability, the command is denied.
page 77
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
CLI Examples FFee
e
TACACS+ Accounting
The following commands configure the ACOS device to use the same TACACS+ server for the account-
ing of log on, log off, and all command activity:
• Display the changes that you can make on the RADIUS server
The RADIUS server in this example is freeRADIUS, the IP address is 192.168.1.157, and the shared
secret is a10rad.
1. On the ACOS device, to add the RADIUS server and enable RADIUS authentication, enter run the
following commands:
client 192.168.1.0/24 {
secret = a10rad
shortname = private-network-1
}
page 78
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
CLI Examples
NOTE: In this example, the ACOS device’s subnet is added as the client.
NOTE: After authenticating an administrator, the RADIUS server must return the
A10-Admin-Privilege attribute, with one of the values shown in the follow-
ing example.
# A10-Networks dictionary
# Created by Software Tools of A10 Networks.
#
VENDOR A10-Networks 22610
BEGIN-VENDOR A10-Networks
ATTRIBUTE A10-App-Name 1 string
ATTRIBUTE A10-Admin-Privilege 2 integer
ATTRIBUTE A10-Admin-Partition 3 string
ATTRIBUTE A10-Admin-Access-Type 4 string
ATTRIBUTE A10-Admin-Role 5 string
VALUE A10-Admin-Privilege Read-only-Admin 1
VALUE A10-Admin-Privilege Read-write-Admin 2
VALUE A10-Admin-Privilege Partition-SlbService-Operator 11
VALUE A10-Admin-Privilege Partition-Read_write 8
VALUE A10-Admin-Privilege Partition-Read-Only 12
END-VENDOR A10-Networks
d. In the /usr/local/etc/raddb/users file, to add each ACOS admin as a user, enter the following
commands:
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # #
page 79
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Windows IAS Setup for RADIUS FFee
e
A10-Admin-Privilege = Read-write-Admin,
# this is partition read-write, has role PartitionReadWrite, only login from web.
prw_r_w Cleartext-Password := "111111"
A10-Admin-Privilege = Partition-Read-Write,
A10-Admin-Partition = "aa",
A10-Admin-Role = "PartitionReadWrite",
A10-admin-Access-type = "web"
page 80
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Windows IAS Setup for RADIUS
NOTE: These steps assume that IAS and Active Directory (AD) are already
installed on the Windows 2003 server.
1. On the IAS server, create the following access groups (see Configuring Access Groups):
• ACOS-Admin-Read-Only
• ACOS-Admin-Read-Write
2. On the IAS server, configure a RADIUS client for the ACOS device (Configuring RADIUS Client for
ACOS Device).
3. On the IAS server, configure the following remote access policies (Configuring Remote Access Pol-
icies):
• ACOS-Admin-Read-Only-Policy
• ACOS-Admin-Read-Write-Policy).
4. On the IAS server, add AD users to appropriate ACOS device access groups (Adding Active Direc-
tory Users to ACOS Access Groups).
5. Register the IAS server in AD (Registering the IAS Server in Active Directory).
6. Configure RADIUS on the ACOS device (Configuring RADIUS on the ACOS Device).
7. Test the configuration by attempting to log onto the ACOS device with AD users added in step 4
(Verifying the Configuration).
The following sections provide detailed steps for each of these tasks.
page 81
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Windows IAS Setup for RADIUS FFee
e
1. Open the Computer Management tool by selecting Start > Programs > Administrative Tools >
Computer Management.
2. Open the System Tools and Local Users and Groups items, if they are not already open.
3. Right click on Group and select New Group.
4. Enter the following information for the first group:
• Group Name – AX-Admin-Read-Only
• Group Description – Read-Only Access to ACOS devices
• Members – Add the members using the Add button.
5. Click Create.
6. Enter the following information for the second group:
• Group Name – AX-Admin-Read-Write
• Group Description – Read-Write to ACOS devices
• Members – Add members as desired using the Add button
7. Click Create.
8. Click Close.
page 82
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Windows IAS Setup for RADIUS
1. Open Internet Authentication Service, by selecting Start > Programs > Administrative Tools >
Internet Authentication Service.
2. Right-click on Client and select New Client.
3. Enter the following information in the Add Client dialog box:
• Friendly name – Useful name for the ACOS device; for example, ACOS2000_slb1
• Protocol – RADIUS
NOTE: 192.168.1.238 is the IP address of the ACOS device that will use the IAS
server for external RADIUS authentication.
4. Click Next.
5. Enter the following information in the Add RADIUS Client dialog box:
• Client address – IP address or domain name for the client (ACOS device)
• Client-Vendor – RADIUS Standard
page 83
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Windows IAS Setup for RADIUS FFee
e
• Shared secret – Secret to be shared between IAS and ACOS. You also will need to enter this in
the RADIUS configuration on the ACOS device.
• Confirm shared secret – Same as above
NOTE: Do not select “Request must contain the Message Authenticator attri-
bute”. ACOS RADIUS authentication does not support this option.
6. Click Next.
page 84
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Windows IAS Setup for RADIUS
3. Click Next.
4. In the Add Remote Access Policy dialog box, click Add.
5. In the Select Attribute dialog box, double-click Client Friendly Name.
6. In the Client-Friendly-Name dialog box, enter the friendly name used to define the ACOS device (for
example, AX-Admin-Read-Only-Policy) and click OK.
7. In the same Add Remote Access Policy dialog box as before, click Add again.
8. In the Select Attribute dialog box, double-click Windows-Groups.
page 85
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Windows IAS Setup for RADIUS FFee
e
9. In the Groups dialog box, click Add, then double-click AX-Admin-Read-Only group, Click OK to add
the group, then click OK once more to confirm the groups.
page 86
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Windows IAS Setup for RADIUS
10.In the same Add Remote Access Policy dialog box as before, click Next.
page 87
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Windows IAS Setup for RADIUS FFee
e
page 88
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Windows IAS Setup for RADIUS
page 89
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Windows IAS Setup for RADIUS FFee
e
13.In the Edit Dial-in Profile dialog box, select the Authentication tab. Select the type of authentication
you are using: CHAP and PAP.
page 90
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Windows IAS Setup for RADIUS
16.In the Multivalued Attribute Information dialog box, click Add and enter the following:
page 91
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Windows IAS Setup for RADIUS FFee
e
page 92
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Windows IAS Setup for RADIUS
18.Click OK for the Configure VSA, Vendor-Specific Attribute Information, and Multivalued Attribute
Information dialog boxes.
19.Click Close in the Add Attributes dialog box.
20.Click OK in the Edit Dial-In Profile dialog box. Optionally, read the suggested help by clicking OK.
21.Click Finish in the Add Remote Access Policy dialog box.
22.To create the second Remote Access Policy, repeat the above steps with the following changes:
• Policy Friendly Name – AX-Admin-Read-Write-Policy
• Group to Add – AX-Admin-Read-Write
• Attribute Value – 2
page 93
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Windows IAS Setup for RADIUS FFee
e
1. In the Active Directory management console, add the ACOS access group to the user, tester1:
page 94
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Windows IAS Setup for RADIUS
page 95
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Additional Reference Information FFee
e
NOTE: Ensure that the shared secret is the same as the value that you specified
for the RADIUS client that you configured for the ACOS server on the IAS
server.
In this example, 192.168.230.10 is the IP address of w2003-10.com, and shared-secret is the secret
that you entered in the step 5 in Configuring RADIUS Client for ACOS Device.
ACOS(config)# radius-server ?
default-privilege-read-write Specify the RADIUS default privilege
host Specify the RADIUS server's hostname or IP address
ACOS(config)# authentication ?
console Configure console authentication type
enable The enable-password authentication type
page 96
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Additional Reference Information
ACOS(config)# tacacs-server ?
host Specify the hostname of TACACS+ server
monitor Configure TACACS+ servers
ACOS(config)# authorization ?
commands Commands level for authorization
debug Specify the debug level for authorization
ACOS(config)# accounting ?
commands Enable level for commands accounting
debug Specify the debug level for accounting
exec Configuration for EXEC <shell> accounting
page 97
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Additional Reference Information FFee
e
page 98
Feedback ACOS 4.1.1-P11 Management Access and Security Guide
This chapter describes how an ACOS device can use Lightweight Directory Access Protocol (LDAP), an
AAA protocol, to authenticate administrators and authorize management access based on the account
information on external LDAP servers.
• LDAP Overview
LDAP Overview
You can use one of the following types of LDAP servers:
• OpenLDAP
Feedback page 99
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Configuring an LDAP Server FFee
e
2. To add the LDAP server(s) to the ACOS configuration, enter the ldap-server host command. For
example:
You can configure an LDAP server by using the GUI or the CLI.
page 100
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Configuring an LDAP Server
• IPv6
6. Complete one of following tasks:
• If you selected Name, complete the following steps:
a. Select either Domain Name or Common Name.
b. If you selected Domain Name, enter the Domain Name in its text box.
c. If you selected Common Name, enter both the Common Name and the Distinguished
Name in their text boxes.
Do not use quotation marks for the distinguished names. For example:
• The string syntax cn=xxx3,dc=mACOScrc,dc=com DN string syntax is valid.
• The string “cn=xxx3,dc=mACOScrc,dc=com” is not valid.
To use nested OUs, specify the nested OU first, then the root.
d. Enter a port number in the Port text box or accept the default.
e. Enter a timeout value in the Timeout (Seconds) text box or accept the default.
The Timeout field displays the maximum number of seconds that the ACOS device waits for a
reply from the LDAP server for a given request. You can specify 1-60 seconds. If the LDAP
server does not reply before the timeout, authentication of the admin fails.
f. Determine whether you want to enable or disable SSL.
g. Click Create.
h. Verify that you have returned to the System >> Admin >> External Authentication >> LDAP
window and that an LDAP server has been created.
• If you selected IPv4, complete the following steps:
a. Enter the host IP address of the LDAP server in the Server text box.
b. Select either Common Name or Domain Name.
If you selected Common Name, enter both the Common Name and the Distinguished
Name in their text boxes.
If you selected Domain Name, enter the Domain Name in its text boxes.
c. Enter a port number in the Port text box or accept the default.
d. Enter a timeout value in the Timeout (Seconds) text box or accept the default.
The Timeout field displays the maximum number of seconds that the ACOS device waits for a
reply from the LDAP server for a given request. You can specify 1-60 seconds. If the LDAP
server does not reply before the timeout, authentication of the admin fails.
e. Determine whether you want to enable or disable SSL.
page 101
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Configuring an LDAP Server FFee
e
a. Enter the host IPv6 address of the LDAP server in the Server text box.
b. Select either Common Name or Domain Name.
If you selected Common Name, enter both the Common Name and the Distinguished
Name in their text boxes.
If you selected Domain Name, enter the Domain Name in its text boxes.
c. Enter a port number in the Port text box or accept the default.
d. Enter a timeout value in the Timeout (Seconds) text box or accept the default.
The Timeout field displays the maximum number of seconds that the ACOS device waits for a
reply from the LDAP server for a given request. You can specify 1-60 seconds. If the LDAP
server does not reply before the timeout, authentication of the admin fails.
e. Determine whether you want to enable or disable SSL.
f. Click Create. Verify that you have returned to the
g. Verify that you have returned to the System >> Admin >> External Authentication >> LDAP
window and that an LDAP server has been created.
• To use backup methods, specify the methods in the order in which you want to use them. For
more information, see Multiple Authentication Methods and Tiered Authentication.
For example:
ACOS(config)# authentication type ldap local radius tacplus
• To configure an LDAP server on the ACOS device, use the ldap-server host command at the
global configuration level of the CLI:
page 102
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Configuring an OpenLDAP Server
Do not use quotation marks for the dn option. For example, the following DN string syntax is valid:
cn=xxx3,dc=mACOScrc,dc=com
“cn=xxx3,dc=mACOScrc,dc=com”
To use nested OUs, specify the nested OU first, then the root. For example, a user account could be
nested in the following way:
For more information about these commands, see the Command Line Interface Reference.
• Overview
Overview
When logging in to the ACOS device via LDAP, the ACOS devices needs to send LDAP packets to LDAP
server (for example, OpenLDAP or Windows AD). OpenLDAP can be installed on Windows or Linux.
page 103
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Configuring an OpenLDAP Server FFee
e
To configure an OpenLDAP server and provide authentication and authorization for ACOS administra-
tors:
1. Add the A10 schema file by copying the file and pasting it in the following location:
openldap_install_directory\schema
NOTE: For more information, see A10 Schema File for OpenLDAP.
NOTE: For more information, see A10 Administrator Account Files for LDAP.
attributetype ( 1.3.6.1.4.1.22610.300.1.1
NAME 'A10AdminRole'
DESC 'admin Role'
syntax 1.3.6.1.4.1.1466.115.121.1.15
SINGLE-VALUE )
attributetype ( 1.3.6.1.4.1.22610.300.1.2
NAME 'A10AdminPartition'
DESC 'admin Partition'
EQUALITY caseIgnoreMatch
SUBSTR caseIgnoreSubstringsMatch
syntax 1.3.6.1.4.1.1466.115.121.1.15 )
attributetype ( 1.3.6.1.4.1.22610.300.1.3
NAME 'A10AccessType'
DESC 'admin Access Type'
syntax 1.3.6.1.4.1.1466.115.121.1.15
SINGLE-VALUE )
page 104
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Configuring an OpenLDAP Server
objectclass ( 1.3.6.1.4.1.22610.300.2.1
NAME 'A10Admin' SUP top AUXILIARY
DESC 'A10 Admin object class '
MAY ( A10AdminRole $ A10AdminPartition $ A10AccessType ) )
The LDAP schema file for ACOS administrator authentication and authorization contains the following
items:
• A10Admin – This is the object class for A10 Networks, and can contain one or more of the fol-
lowing attribute types. You can specify the values to assign to these attributes in the definition
file for the administrator. (See A10 Administrator Account Files for LDAP.)
• A10AdminRole – This attribute type specifies the administrator’s role, which defines the scope of
read-write operations the administrator is allowed to perform on the ACOS device. The ACOS
device has the following predefined roles:
• ReadOnlyAdmin
• ReadWriteAdmin
• PartitionSlbServiceOperator
• PartitionReadOnly
• PartitionReadWrite
To specify one of these roles in the definition file for the administrator account, use the role name
as the attribute value.
For example:
A10AdminRole: ReadWriteAdmin
If you do not use this attribute in the definition file for the administrator account, the ReadOnlyAd-
min role is assigned to the administrator.
• A10AdminPartition – This attribute type specifies the ACOS partition the administrator is autho-
rized to log onto.
• For the shared partition, enter “shared”.
For example:
A10AdminPartition: shared
A10AdminPartition: privpart1
page 105
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Configuring an OpenLDAP Server FFee
e
If you do not use this attribute in the definition file for the administrator account, the administrator
is allowed to log into the shared partition.
• A10AccessType – This attribute type specifies the user interface(s) for which the administrator
is authorized and whether the administrator is authorized to create, import, or modify External
Health Monitor files. The user can specify one or more of the following:
• cli – CLI
• web – GUI
• axapi – aXAPI
• hm – External Health Monitors
An administrator is not allowed to log into the device if the corresponding admin account does not
enable at least one of the cli, web, or axapi parameters.
The hm parameter attribute can only be specified for administrator accounts with system-wide,
read+write (R/W) privilege to allow them to be able to create, import, or modify External Health
Monitor files.
SECURITY The hm attribute should be enabled only for other admins sufficiently
trusted to perform these operations without malicious or malicious con-
tent which could otherwise compromise security in the ACOS system
and its deployed environment.
For more information, see the Application Delivery and Server Load Balanc-
ing Guide (Using External Health Methods section) and “Configuring LDAP
for ACOS Administrators” on page 99.
dn: cn=user1,dc=my-domain,dc=com
cn: user1
objectClass: top
objectClass: person
objectClass: organizationalPerson
objectClass: inetOrgPerson
objectClass: A10Admin
userPassword: 123456
sn: sn
ou: guest
A10AdminRole: ReadWriteAdmin
page 106
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Configuring Microsoft Active Directory
This file configures admin “user1”. The objectClass value A10Admin and the A10AdminRole attribute are
specific to A10 Networks and are defined in the schema file, which also must be added to the LDAP
server.
In this example, the A10AdminPartition and A10AccessType attributes are omitted. The default values
are used (See A10 Schema File for OpenLDAP).
• Overview
• Summary
Overview
You can configure Microsoft Active Directory for LDAP authentication and authorization of ACOS
administrators. When the user logs into the ACOS device, the device sends the user name and pass-
word to Active Directory to validate the credentials.
Summary
1. Install Active Directory on your Windows server.
For more information, see http://technet.microsoft.com/en-us/library/jj574166.aspx.
2. Configure the administrator accounts.
4. (Optional) Add the A10 LDAP attribute types to the server. See Adding A10 LDAP Attribute Types.
page 107
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Configuring ACOS Administrator Accounts FFee
e
NOTE: If you plan to use the default settings for all the A10 attributes, you can
skip this step.
page 108
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Configuring ACOS Administrator Accounts
The following is an example of the session login by the read-only admin. Access to the configuration
level by this admin is not allowed.
page 109
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Configuring ACOS Administrator Accounts FFee
e
ACOS>
ACOS> enable
Password: <blank>
ACOS# show admin session
Id User Name Start Time Source IP Type Partition Authen
Role Cfg
------------------------------------------------------------------------------------
------
*99 test 13:08:10 CST Thu Jun 21 2012 192.168.100.148 CLI Ldap
ReadOnlyAdmin No
ACOS# config
^
% Unrecognized command.Invalid input detected at '^' marker.
ACOS#
page 110
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Configuring ACOS Administrator Accounts
page 111
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
A10 LDAP Object Class and Attribute Types FFee
e
ACOS> enable
Password: <blank>
ACOS# show admin session
Id User Name Start Time Source IP Type Partition Authen
Role Cfg
------------------------------------------------------------------------------------
------
*101 test 13:22:16 CST Thu Jun 21 2012 192.168.100.148 CLI Ldap
ReadWriteAdmin No
ACOS# config
ACOS(config)#
• Overview
Overview
You can add A10 LDAP attribute types to the server.
page 112
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
A10 LDAP Object Class and Attribute Types
NOTE: If you plan to use the default settings for all the A10 attributes, you can
skip the rest of this section.
CAUTION: Please add the attributes carefully. Once they are added, they can not be
changed or deleted.
The LDAP object class for A10 Networks is A10Admin, and can contain one or more of the following
attribute types. You can specify the values to assign to these attributes in the definition file for the
admin.
• A10AdminRole
This attribute type specifies the administrator’s role, which defines the scope of read-write opera-
tions that the administrator is allowed to perform on the ACOS device.
The following predefined roles are included on the ACOS device:
• ReadOnlyAdmin
• ReadWriteAdmin
• PartitionReadWrite
• PartitionSlbServiceOperator
• PartitionReadOnly
page 113
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
A10 LDAP Object Class and Attribute Types FFee
e
• cli
• web
• axapi
• hm – External Health Monitors
When you do not enable these attributes in the definition file for the administrator account, the
admin is not allowed to log in though any of these interfaces. Furthermore, the admin cannot cre-
ate, import, or modify External Health Monitor files. The hm parameter can only be specified for
administrator accounts with system-wide, read and write (R/W) privilege.
page 114
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
A10 LDAP Object Class and Attribute Types
page 115
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
A10 LDAP Object Class and Attribute Types FFee
e
9. Enter the appropriate information in the Identification and Inheritance and Type sections and
click Next.
page 116
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
A10 LDAP Object Class and Attribute Types
10.Enter the appropriate information in the Mandatory and Optional sections and click Finish.
page 117
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
A10 LDAP Object Class and Attribute Types FFee
e
page 118
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
A10 LDAP Object Class and Attribute Types
page 119
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
A10 LDAP Object Class and Attribute Types FFee
e
page 120
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
A10 LDAP Object Class and Attribute Types
• Scenario
• Log-in Example
Scenario
Figure 16 and Figure 17 set the administrator role for administrator test to ReadWriteAdmin.
page 121
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
A10 LDAP Object Class and Attribute Types FFee
e
page 122
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
A10 LDAP Object Class and Attribute Types
Log-in Example
The following is a login example for an administrator:
ACOS> enable
Password: <blank>
page 123
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
A10 LDAP Object Class and Attribute Types FFee
e
ACOS#
ACOS# show admin session
Id User Name Start Time Source IP Type Partition Authen
Role Cfg
------------------------------------------------------------------------------------
------
*106 test 14:15:13 CST Thu Jun 21 2014 192.168.100.148 CLI Ldap
ReadWriteAdmin No
ACOS#
ACOS# config
ACOS(config)#
• Scenario
• ACOS Configuration
• Log-in Example
Scenario
The following screen configures admin test as an L3V partition administrator and assigns the adminis-
trator to partition test1.
NOTE: The shared partition does to need to be added to the LDAP server. If the
A10AdminPartition attribute is not set, the admin is permitted to access
the shared partition.
ACOS Configuration
The following is the partition configuration on the ACOS device:
ACOS# configure
ACOS(config)# partition test1 id 1
page 124
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
A10 LDAP Object Class and Attribute Types
Log-in Example
When administrator test logs in, the session opens in partition test1.
page 125
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
A10 LDAP Object Class and Attribute Types FFee
e
ACOS2500-1[test1]>
ACOS2500-1[test1]> enable
Password: <quick>
ACOS2500-1[test1]#
ACOS2500-1[test1]# config
ACOS2500-1[test1](config)# show admin session
Id User Name Start Time Source IP Type Partition Authen
Role Cfg
------------------------------------------------------------------------------------
------
*108 test 14:22:51 CST Thu Jun 21 2012 192.168.100.148 CLI test1 Ldap
PatitionReadWriteYes
• Scenario
• Log-in Example
Scenario
Figure 19 sets the access type for the PartitionReadWrite administrator to web (GUI) and aXAPI. This
configuration prohibits the administrator from logging in through the CLI.
page 126
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
A10 LDAP Object Class and Attribute Types
Log-in Example
The following example shows what happens if the admin tries to log in through the CLI:
page 127
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Additional Information for Reference FFee
e
NOTE: To understand these options and how they affect the authentication pro-
cess, go to the Command Line Interface Reference.
ACOS(config)# authentication ?
console Configure console authentication type
enable The enable-password authentication type
login The login mode
mode Configure authentication mode
multiple-auth-reject Multiple same user login reject
type The login authentication type
page 128
Feedback ACOS 4.1.1-P11 Management Access and Security Guide
Command Auditing
This chapter describes how to enable and configure command auditing on your ACOS device.
• Overview
Overview
You can enable command auditing to log the commands entered by ACOS administrators. Command
auditing logs the following types of system management events:
• Administrator logins and log outs for CLI, GUI, and aXAPI sessions
• Configuration changes. All attempts to change the configuration are logged, even if they are
unsuccessful.
• CLI commands at the Privileged EXEC level (if audit logging is enabled for this level)
NOTE: Previously, the audit log (including all of the aXAPI messages) was being
displayed in the console, which affected the scroll back buffers for termi-
nal programs. Starting in release 2.7.2, the audit log is no longer dis-
played, and the API calls are no longer displayed in the console.
The audit log is maintained in a separate file, apart from the system log. The audit log messages dis-
played for an admin depend upon the administrator’s privilege level. Administrators with Root, Read
Write, or Read Only privileges who view the audit log can view all messages, for all system partitions.
Administrators who have privileges only within a specific partition can view only the audit log mes-
sages related to management of that partition.
To log both configuration and Privileged EXEC commands, use the following command:
The following command sets the buffer size to 30,000. When the log is full, the oldest entries are
removed to make room for new entries. The default is 20,000 entries.
page 130
ACOS 4.1.1-P11 Management Access and Security Guide
Feedback
Examples for Audit Log
The following audit logs indicate configuration and operational actions related to virtual server “vip1”
performed using the GUI:
Jun 08 2014 09:06:04 [12] web: [admin] add virtual server [name:vip1, ip:1.1.1.1,
vport1:8001(TCP).] successfully.
Jun 08 2014 09:06:05 [12] web: [admin] edit virtual server [name:vip1, ip:1.1.1.1,
vport1:8001(TCP).] successfully.
Jun 08 2014 09:06:06 [12] web: [admin] disable virtual server [vip1] successfully.
Jun 08 2014 09:06:06 [12] web: [admin] enable virtual server [vip1] successfully.
Jun 08 2014 09:06:07 [12] web: [admin] delete virtual server [vip1] successfully.
The following audit logs indicate configuration actions related to virtual server “vip1” performed using
the aXAPI:
Jun 08 2014 09:06:13 [12] aXAPI: [admin] add virtual server [name:vip1, ip:1.1.1.1,
vport1:8001(TCP).] successfully.
Jun 08 2014 09:06:14 [12] aXAPI: [admin] edit virtual server [name:vip1, ip:1.1.1.1,
vport1:8001(TCP).] successfully.
Jun 08 2014 09:06:15 [12] aXAPI: [admin] delete virtual server [vip1] successfully.
page 131
ACOS 4.1.1-P11 Management Access and Security Guide
FeedbackFF
Additional Information for Reference FFee
e
ACOS(config)# audit ?
enable Enable audit service
size Config audit buffer size, default is 20,000
page 132
ACOS 4.1.1-P11 Management Access and Security Guide