San Local Ldap
San Local Ldap
Local authentication using Lightweight Directory Access Protocol (LDAP) allows an endpoint to be
authenticated using 802.1X, MAC authentication bypass (MAB), or web authentication with LDAP as a
backend. Local authentication in Identity-Based Networking Services also supports associating an
authentication, authorization, and accounting (AAA) attribute list with the local username. This module
provides information about configuring local authentication for Identity-Based Networking Services.
Identity-Based Networking Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
1
Configuring Local Authentication Using LDAP
AES Key Wrap
SUMMARY STEPS
1. enable
2. configure terminal
3. aaa new-model
4. aaa local authentication {method-list-name | default} authorization {method-list-name | default}
5. username name aaa attribute list aaa-attribute-list [password password]
6. exit
DETAILED STEPS
Example:
Device# configure terminal
Identity-Based Networking Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
2
Configuring Local Authentication Using LDAP
Configuring MAC Filtering Support
Example:
Device(config)# aaa local authentication default
authorization default
Step 5 username name aaa attribute list aaa-attribute-list Associates a AAA attribute list with a local username.
[password password]
Example:
Device(config)# username USER_1 aaa attribute list
LOCAL_LIST password CISCO
SUMMARY STEPS
1. enable
2. configure terminal
3. aaa new-model
4. aaa group server radius group-name
5. subscriber mac-filtering security-mode {mac | none | shared-secret}
6. mac-delimiter {colon | hyphen | none | single-hyphen}
7. exit
8. username mac-address mac [aaa attribute list aaa-attribute-list]
9. exit
DETAILED STEPS
Identity-Based Networking Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
3
Configuring Local Authentication Using LDAP
Configuring MAC Filtering Support
Example:
Device# configure terminal
Step 4 aaa group server radius group-name Groups different RADIUS server hosts into distinct lists.
Example:
Device(config)# aaa group server radius
RAD_GROUP1
Step 5 subscriber mac-filtering security-mode {mac | none | Specifies the RADIUS compatibility mode for MAC
shared-secret} filtering.
• The default value is none.
Example:
Device(config-sg-radius)# subscriber
mac-filtering security-mode mac
Step 6 mac-delimiter {colon | hyphen | none | single-hyphen} Specifies the MAC delimiter for RADIUS compatibility
mode.
Example: • The default value is none.
Device(config-sg-radius)# mac-delimiter hyphen
Step 8 username mac-address mac [aaa attribute list Allows a MAC address to be used as the username for
aaa-attribute-list] MAC filtering done locally.
Example:
Device(config)# username 00-22-WP-EC-23-3C mac
aaa attribute list AAA_list1
Identity-Based Networking Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
4
Configuring Local Authentication Using LDAP
Enabling AES Key Wrap
SUMMARY STEPS
1. enable
2. configure terminal
3. radius-server host {hostname | ip-address} key-wrap encryption-key encryption-key
message-auth-code-key encryption-key [format {ascii | hex}]
4. aaa new-model
5. aaa group server radius group-name
6. server ip-address [auth-port port-number] [acct-port port-number]
7. key-wrap enable
8. end
DETAILED STEPS
Example:
Device# configure terminal
Step 3 radius-server host {hostname | ip-address} key-wrap Defines a RADIUS server host.
encryption-key encryption-key message-auth-code-key
encryption-key [format {ascii | hex}]
Example:
Device(config)# radius-server host 10.10.1.2 key-wrap
encryption-key testkey99 message-auth-code-key
testkey123
Step 5 aaa group server radius group-name Groups different RADIUS server hosts into distinct
lists.
Example:
Device(config)# aaa group server radius RAD_GROUP1
Identity-Based Networking Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
5
Configuring Local Authentication Using LDAP
Configuration Examples for Local Authentication Using LDAP
Example:
Device(config-sg-radius)# server 10.10.1.2
Step 7 key-wrap enable Enables AES key wrap for this RADIUS server.
Example:
Device(config-sg-radius)# key-wrap enable
Identity-Based Networking Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
6
Configuring Local Authentication Using LDAP
Additional References
!
radius-server host 10.10.1.2
!
Additional References
Related Documents
Address Resolution Protocol (ARP) commands Cisco IOS IP Addressing Services Command
Reference
Standard/RFC Title
RFC 5176 Dynamic Authorization Extensions to RADIUS
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
Identity-Based Networking Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
7
Configuring Local Authentication Using LDAP
Feature Information for Local Authentication Using LDAP
Identity-Based Networking Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
8