Aruba Switch Series 2930 AAA (Authentication Authorization and Accounting)
AAA is authentication management protocol
AAA network security services provide the primary framework through which a network administrator can set-up access control on network points of entry or network access servers.
- Port No-49 TACACS uses
TCP services to delivery data.
- RADIUS uses Port No-1812 for authentication and authorization
and Port No-1813 for
accounting.
- All the AAA packets are
encrypted but RADIUS Only
the password are encrypted while the other information such as username,
accounting information etc are not encrypted.
1) Authentication identifies a user.
2) Authorization determines that what user can do on the network.
3) Accounting monitors
the network usage time for billing purposes.
AAA
information is typically stored in an external database or remote server such
as a RADIUS or TACACS+ server. The information can also be stored locally on
the access server or router.
Remote
security servers, such as RADIUS and TACACS+ servers, assign users specific
privileges by associating attribute-value pairs, which define the access rights
with the appropriate user. All authorization methods must be defined through
AAA.
What
is RADIUS Protocol
The
RADIUS (Remote Authentication Dial-In User Service) protocol carries authentication,
authorization, and configuration information between a network access server
(NAS) and a RADIUS authentication server.
Authentication
with RADIUS allows for a unique password for each user, instead of the need to
maintain and distribute switch-specific passwords to all users. RADIUS verifies
identity for the following types of primary password access to the switch:
1)
Serial
port (console)
2)
Telnet
3)
SSH
4)
SFTP/SCP
5)
Web
Agent
6)
Port-Access
(802.1X)
Aruba-OS switches support RADIUS accounting for web-based authentication and MAC
authentication sessions, collecting resource consumption data and forwarding it
to the RADIUS server. This data can be used for trend analysis, capacity planning,
billing, auditing, and cost analysis.
Requests
and responses carried by the RADIUS protocol are called RADIUS attributes. These attributes provide the
information needed by a RADIUS server to authenticate users and to establish
authorized network service for them. The RADIUS protocol also carries
accounting information between a network access server and a RADIUS accounting
server.
RADIUS
is a client/server protocol. The RADIUS client is typically a network access
server. The client passes user information to designated RADIUS servers and
acts on the response that is returned. RADIUS servers receive user connection
requests, authenticate the user, and then return the configuration information
necessary for the client to deliver service to the user.
What
is TACACS+ Protocol
TACACS
AAA systems are used as a single point of management to configuring and store
user accounts. They are often coupled with directories and management
repositories, simplifying the set up and maintenance of the end-user accounts.
In
the authorization function of the AAA system, network devices with Authentication
Services can provide fine-grained control over user capabilities for the
duration of the user’s session; for example, setting access control or session
duration.
Enforcement
of restrictions to a user account can limit available commands and levels of
access.
TACACS+
authentication provides a central server in which you can allow or deny access
to switches and other TACACS-aware devices in your network. TACACS employs a
central database that creates multiple unique user name and password sets with
their associated privilege levels. This central database can be accessed by
individuals via the Aruba-OS switch from either a console port or via Telnet.
TACACS+
uses an authentication hierarchy consisting of:
Remote
passwords assigned in a TACACS+ server
Local
passwords configured on the switch
v In
the event of a connection failure, a TACACS+ server defaults to locally
assigned passwords for authentication control.