AAA server

H

ANALYSIS ON AAA SERVICE

GROUP-3
Page | 1
COMP1161
T411- Wireless Networking
Security and Advance Data Network Technology
“Analysis on AAA Service”
Submitted by:
ANANDU KARTHIKYEAN 101238315
NAIK HETVI 101212340
UMANG PATEL 101235317
HIRWA JANI 101255327
Submitted to:
Prof. Jacky Min
GROUP-3
Page | 2
Introduction
Definition: -
AAA is an abbreviation of authentication, authorization, and accounting. Sometimes it is referred
as “Triple-A”. It represents the big tree in terms of IP based network management and policy
administration. A AAA server is a framework program that handles the request of user for all
kinds of resources. It gives access to users with verification of their information and keep its
record of information been assigned to user.
Authentication is the process of identifying a user uniquely by their username and password. It
compares the data stored in database and the user provided login credentials and then give
access. If the user’s login is same, then the permission is granted and if it does not match then the
access is denied.
Example: “who are you?” gets authenticate with “I am user ‘student’ and my password
‘validate’ proves it.”
Authorization is the process of allowing or restricting the user to access the network resources
after the authentication of user through username and password. The level of authorization
determines the user’s authority to type or quality of data.
Example: “what did you do? What can you access?” gets authorize with “User ‘student’ can
access host ‘server XYZ’ using Telnet.”
GROUP-3
Page | 3
Accounting is the process of keeping record of user’s activity while using network resources like
keeping track of time spent, data accessed or transferred during session. This stage is used for
authorization control, billing, trend analysis, resource utilization and planning for data capacity
required for business operations.
Example: “what did you do? How long did you do it? How often did you do it?” is
accounted by “User ‘student’ accessed host ‘server XYZ’ using Telnet for ’15
minutes’.”
Framework of AAA:
The AAA server typically interacts with network access and gateway servers and with databases
and directories containing user information. The current standard by which devices or
applications communicate with a AAA server is the Remote Authentication Dial-In User Service
(RADIUS).
GROUP-3
Page | 4
The following options can be used to implement AAA on Cisco devices:
 Cisco Secure ACS Solution Engine – a dedicated server that contains the usernames,
passwords, and other information about what users are allowed to access and when.
 Cisco Secure ACS for Windows Server – a software package installed on a Windows
system that provide AAA services.
 Cisco Secure ACS- in a virtual machine
 Local database – also known as local authentication and authorization, this option uses
the local router database for AAA purposes.
GROUP-3
Page | 5
Implementing Cisco AAA: -
Implementing AAA Using LocalServices:
o Step1: The client establishes connection with the router.
o Step2: The router prompts the user for their username and password.
o Step3: The router authenticates the username and password in the local
database. The user is authorized to access the network based on information
in the local database.
Remote client
Router
Step1
Step2
Step3
GROUP-3
Page | 6
Implementing Authentication Using External Servers:
o Step1: The client establishes a connection with the router.
o Step2: The router communicates with the Cisco Secure ACS (server or
appliance).
o Step3: The Cisco Secure ACS prompts the user for their username and
password.
o Step4: The Cisco Secure ACS authenticates the user. The user is authorized
to access the network based on information found in the Cisco Secure ACS
database.
Remote client
Router
ACS FOR WINDOWS
SERVER
ACS
SOLUTION
ENGINE
Step1
Step2
Step3
Step4
GROUP-3
Page | 7
RADIUS and TACACS+:-
Two different protocols are used to communicate between the AAA security
servers and authenticating devices. Cisco secure ACS (access controlserver)
supports bothRADUIS and TACACS+.
TACACS+:-
Terminal Access Controller Access ControlSystem (TACASCS+)is a protocol
which is used for the communication of the Client and ACS server. It uses TCP
port number 49 which makes it reliable.
RADIUS: -
Remote Access Dial In User Service (RADIUS) is an open standard protocolused
for the communication between any AAA client and ACS server. If one of client or
server is from any other vendor than CISCO;then we must use RADIUS. It uses
port number 1812 for authentication and authorization 1813 for accounting.
Cisco secure ACS
Firewall
Router
N/W access
server
Security server
GROUP-3
Page | 8
TACACS+ remains more secure than RADIUS but RADIUS have robust application
programming interface for strong accounting.
Similarities:
The process is start by Network Access Device (NAD – client of TACACS+ or RADIUS). NAD
contact the TACACS+ or RADIUS server and transmit the request for authentication (username
and password) to the server. First, NAD obtain username prompt and transmit the username to
the server and then again, the server is contact by NAD to obtain password prompt and then the
password is sent to the server.
The server replies with access-accept message if the credentials are valid otherwise send an
access-reject message to the client. Further authorisation and accounting are different in both
protocols as authentication and authorisation is combined in RADIUS.
Advantages (TACACS+ over RADIUS)
 As TACACS+ uses TCP therefore more reliable than RADIUS.
 TACACS+ provides more control over the authorization of commands while in
RADIUS, no external authorization of commands is supported.
 All the AAA packets are encrypted in TACACS+ while only the passwords are encrypted
in RADIUS i.e. more secure.
Advantages (RADIUS over TACACS+)
 As it is open standard therefore RADIUS can be used with other vendors device while
because TACACS+ is Cisco proprietary, it can be used with Cisco devices only.
 It has more extensive accounting support than TACACS+.
GROUP-3
Page | 9
Comparison:-
Parameters TACACS+ RADIUS
Functionality Separates AAA Combines Auth
TransportProtocol TCP UDP
CHAP Bidirectional Unidirectional
ProtocolSupport Multi-protocol support No ARA no NETBEUI
Confidentiality Entire packet-encrypted Password encrypted
Accounting Limited Extensive
GROUP-3
Page | 10
DIFFERENCES:-
TACACS+ RADIUS
Cisco proprietary protocol open standard protocol
It uses TCP as transmission protocol It uses UDP as transmission protocol
It uses TCP port number 49. It uses UDP port number 1812 for
authentication and authorization and 1813 for
accounting.
Authentication, Authorization and
Accounting is separated in TACACS+.
Authentication and Authorization is
combined in RADIUS.
All the AAA packets are encrypted. Only the password is encrypted while the
other information such as username,
accounting information etc. are not encrypted.
preferably used for ACS. used when ISE is use.
It provides more granular control i.e. can
specify the command for authorization.
No external authorization of commands
supported.
TACACS+ offers multiprotocol support No multiprotocol supports.
Used for device administration. used for network access
GROUP-3
Page | 11
CONCULSION:-
 AAA services is higher degree privileged EXCE authentication.
 The AAA server typically interacts with network access and gateway
servers and with databases and directories containing user
information.
 RADIUS and TACACS+ are two main protocols which plays
important role in communicating between AAA server and
Authenticating Device.
 Implementation AAA Server can be done by Local server and
Extended Servers.
 AAA can be used in CDMA.
REFERENCES:-
GROUP-3
Page | 12
 https://www.dialogic.com/glossary/aaa-server-authentication-authorization-and-
accounting
 https://searchsecurity.techtarget.com/definition/AAA-server
 https://www.slideshare.net/mobile/ahmadtaweel2/aaa-implementation
 https://geek-university.com/ccna-security/aaa-explained/
 https://www.google.com/amp/s/www.geeksforgeeks.org/difference-between-tacacs-and-
radius/amp/
 Lecture notes.

Recomendados

AAA Implementation por
AAA ImplementationAAA Implementation
AAA ImplementationAhmad El Tawil
2.1K visualizações29 slides
Authentication, authorization, accounting(aaa) slides por
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesrahul kundu
5.5K visualizações7 slides
Network Security por
Network SecurityNetwork Security
Network SecurityMAJU
38.7K visualizações52 slides
Man in The Middle Attack por
Man in The Middle AttackMan in The Middle Attack
Man in The Middle AttackDeepak Upadhyay
13K visualizações24 slides
Security Threats at OSI layers por
Security Threats at OSI layersSecurity Threats at OSI layers
Security Threats at OSI layersDepartment of Computer Science
10.7K visualizações32 slides
System hacking por
System hackingSystem hacking
System hackingCAS
2.6K visualizações28 slides

Mais conteúdo relacionado

Mais procurados

Network Security ppt por
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
2.1K visualizações22 slides
SSL/TLS Handshake por
SSL/TLS HandshakeSSL/TLS Handshake
SSL/TLS HandshakeArpit Agarwal
1.2K visualizações41 slides
Network management and security por
Network management and securityNetwork management and security
Network management and securityAnkit Bhandari
4.3K visualizações18 slides
public key infrastructure por
public key infrastructurepublic key infrastructure
public key infrastructurevimal kumar
23.4K visualizações24 slides
Seminar (network security) por
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
8.2K visualizações25 slides
Web Security por
Web SecurityWeb Security
Web SecurityDipika Bambhaniya
10.6K visualizações52 slides

Mais procurados(20)

Network Security ppt por SAIKAT BISWAS
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS2.1K visualizações
SSL/TLS Handshake por Arpit Agarwal
SSL/TLS HandshakeSSL/TLS Handshake
SSL/TLS Handshake
Arpit Agarwal1.2K visualizações
Network management and security por Ankit Bhandari
Network management and securityNetwork management and security
Network management and security
Ankit Bhandari4.3K visualizações
public key infrastructure por vimal kumar
public key infrastructurepublic key infrastructure
public key infrastructure
vimal kumar23.4K visualizações
Seminar (network security) por Gaurav Dalvi
Seminar (network security)Seminar (network security)
Seminar (network security)
Gaurav Dalvi8.2K visualizações
Web Security por Dipika Bambhaniya
Web SecurityWeb Security
Web Security
Dipika Bambhaniya10.6K visualizações
Web Security por Bharath Manoharan
Web SecurityWeb Security
Web Security
Bharath Manoharan80.6K visualizações
Network Security por Raymond Jose
Network SecurityNetwork Security
Network Security
Raymond Jose10.1K visualizações
Network security por Estiak Khan
Network securityNetwork security
Network security
Estiak Khan1.2K visualizações
Firewall and Types of firewall por Coder Tech
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
Coder Tech4.1K visualizações
AAA Protocol por Netwax Lab
AAA ProtocolAAA Protocol
AAA Protocol
Netwax Lab3.4K visualizações
Secure shell ppt por sravya raju
Secure shell pptSecure shell ppt
Secure shell ppt
sravya raju16.6K visualizações
Ip address and subnetting por IGZ Software house
Ip address and subnettingIp address and subnetting
Ip address and subnetting
IGZ Software house36.9K visualizações
Intrusion prevention system(ips) por Papun Papun
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
Papun Papun9.9K visualizações
Information Security Lecture Notes por FellowBuddy.com
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com3.3K visualizações
Cia security model por Imran Ahmed
Cia security modelCia security model
Cia security model
Imran Ahmed19.1K visualizações

Similar a AAA server

AAA Best Practices por
AAA Best PracticesAAA Best Practices
AAA Best PracticesSagar Gor
299 visualizações5 slides
Computer Security - CCNA Security - Lecture 2 por
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Benha University
1K visualizações52 slides
Radius1 por
Radius1Radius1
Radius1balamurugan.k Kalibalamurugan
679 visualizações22 slides
Radius Protocol por
Radius ProtocolRadius Protocol
Radius ProtocolNetwax Lab
1.9K visualizações9 slides
Implementing 802.1x Authentication por
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
15.3K visualizações30 slides
AAA & RADIUS Protocols por
AAA & RADIUS ProtocolsAAA & RADIUS Protocols
AAA & RADIUS ProtocolsPeter R. Egli
14.4K visualizações12 slides

Similar a AAA server(20)

AAA Best Practices por Sagar Gor
AAA Best PracticesAAA Best Practices
AAA Best Practices
Sagar Gor299 visualizações
Computer Security - CCNA Security - Lecture 2 por Benha University
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
Benha University1K visualizações
Radius Protocol por Netwax Lab
Radius ProtocolRadius Protocol
Radius Protocol
Netwax Lab1.9K visualizações
Implementing 802.1x Authentication por dkaya
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
dkaya15.3K visualizações
AAA & RADIUS Protocols por Peter R. Egli
AAA & RADIUS ProtocolsAAA & RADIUS Protocols
AAA & RADIUS Protocols
Peter R. Egli14.4K visualizações
RADIUS por amogh_ubale
RADIUSRADIUS
RADIUS
amogh_ubale6.7K visualizações
From Cisco ACS to ISE por Mahzad Zahedi
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE
Mahzad Zahedi6.6K visualizações
EAP-TLS (extended version) por Karri Huhtanen
EAP-TLS (extended version)EAP-TLS (extended version)
EAP-TLS (extended version)
Karri Huhtanen262 visualizações
Radius server,PAP and CHAP Protocols por Dhananjay Aloorkar
Radius server,PAP and CHAP ProtocolsRadius server,PAP and CHAP Protocols
Radius server,PAP and CHAP Protocols
Dhananjay Aloorkar4.8K visualizações
5 ip security dataplace security por SagarR24
5 ip security dataplace security5 ip security dataplace security
5 ip security dataplace security
SagarR24292 visualizações
5 ip security aaa and acl por SagarR24
5 ip security aaa and acl5 ip security aaa and acl
5 ip security aaa and acl
SagarR24187 visualizações
Tableau Security Model.pptx por AnkurSharma561446
Tableau Security Model.pptxTableau Security Model.pptx
Tableau Security Model.pptx
AnkurSharma56144632 visualizações
Radius vs. Tacacs+ por Netwax Lab
Radius vs. Tacacs+Radius vs. Tacacs+
Radius vs. Tacacs+
Netwax Lab1.7K visualizações
5 ip security asa-partb por SagarR24
5 ip security asa-partb5 ip security asa-partb
5 ip security asa-partb
SagarR24125 visualizações
WLAN and IP security por Chaitanya Tata, PMP
WLAN and IP securityWLAN and IP security
WLAN and IP security
Chaitanya Tata, PMP1.2K visualizações

Mais de hetvi naik

plan for penetration test por
plan for penetration testplan for penetration test
plan for penetration testhetvi naik
34 visualizações3 slides
Final ppt g08 por
Final ppt g08Final ppt g08
Final ppt g08hetvi naik
35 visualizações10 slides
Team black por
Team blackTeam black
Team blackhetvi naik
27 visualizações13 slides
Cleaning equipment por
Cleaning equipmentCleaning equipment
Cleaning equipmenthetvi naik
497 visualizações26 slides
disadvantages of learning foreign language por
disadvantages of learning foreign languagedisadvantages of learning foreign language
disadvantages of learning foreign languagehetvi naik
342 visualizações2 slides
Face detection and recognition report with pi in single poster por
Face detection and recognition report with pi in single posterFace detection and recognition report with pi in single poster
Face detection and recognition report with pi in single posterhetvi naik
511 visualizações1 slide

Mais de hetvi naik(16)

plan for penetration test por hetvi naik
plan for penetration testplan for penetration test
plan for penetration test
hetvi naik34 visualizações
Final ppt g08 por hetvi naik
Final ppt g08Final ppt g08
Final ppt g08
hetvi naik35 visualizações
Team black por hetvi naik
Team blackTeam black
Team black
hetvi naik27 visualizações
Cleaning equipment por hetvi naik
Cleaning equipmentCleaning equipment
Cleaning equipment
hetvi naik497 visualizações
disadvantages of learning foreign language por hetvi naik
disadvantages of learning foreign languagedisadvantages of learning foreign language
disadvantages of learning foreign language
hetvi naik342 visualizações
Face detection and recognition report with pi in single poster por hetvi naik
Face detection and recognition report with pi in single posterFace detection and recognition report with pi in single poster
Face detection and recognition report with pi in single poster
hetvi naik511 visualizações
BMC report for face detection and recognition using pi-3 por hetvi naik
BMC report for face detection and recognition using pi-3BMC report for face detection and recognition using pi-3
BMC report for face detection and recognition using pi-3
hetvi naik84 visualizações
Face detection and recognition report por hetvi naik
Face detection and recognition reportFace detection and recognition report
Face detection and recognition report
hetvi naik2.1K visualizações
Face detection and recognition with pi por hetvi naik
Face detection and recognition with piFace detection and recognition with pi
Face detection and recognition with pi
hetvi naik1.5K visualizações
Face recognition with pi por hetvi naik
Face recognition with piFace recognition with pi
Face recognition with pi
hetvi naik281 visualizações
Wireless power transfer report por hetvi naik
Wireless power transfer reportWireless power transfer report
Wireless power transfer report
hetvi naik698 visualizações
wireless power transfer por hetvi naik
wireless power transferwireless power transfer
wireless power transfer
hetvi naik88 visualizações
Nb iot (naik hetvi) por hetvi naik
Nb iot (naik hetvi)Nb iot (naik hetvi)
Nb iot (naik hetvi)
hetvi naik101 visualizações
GRO n GO por hetvi naik
GRO n GO GRO n GO
GRO n GO
hetvi naik134 visualizações
Region filling por hetvi naik
Region fillingRegion filling
Region filling
hetvi naik5.1K visualizações
Number plate recogition por hetvi naik
Number plate recogitionNumber plate recogition
Number plate recogition
hetvi naik1.6K visualizações

Último

802.11 Computer Networks por
802.11 Computer Networks802.11 Computer Networks
802.11 Computer NetworksTusharChoudhary72015
13 visualizações33 slides
SUMIT SQL PROJECT SUPERSTORE 1.pptx por
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptxSumit Jadhav
22 visualizações26 slides
Design_Discover_Develop_Campaign.pptx por
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptxShivanshSeth6
45 visualizações20 slides
DESIGN OF SPRINGS-UNIT4.pptx por
DESIGN OF SPRINGS-UNIT4.pptxDESIGN OF SPRINGS-UNIT4.pptx
DESIGN OF SPRINGS-UNIT4.pptxgopinathcreddy
19 visualizações47 slides
_MAKRIADI-FOTEINI_diploma thesis.pptx por
_MAKRIADI-FOTEINI_diploma thesis.pptx_MAKRIADI-FOTEINI_diploma thesis.pptx
_MAKRIADI-FOTEINI_diploma thesis.pptxfotinimakriadi
10 visualizações32 slides
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptxlwang78
165 visualizações19 slides

Último(20)

SUMIT SQL PROJECT SUPERSTORE 1.pptx por Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav 22 visualizações
Design_Discover_Develop_Campaign.pptx por ShivanshSeth6
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptx
ShivanshSeth645 visualizações
DESIGN OF SPRINGS-UNIT4.pptx por gopinathcreddy
DESIGN OF SPRINGS-UNIT4.pptxDESIGN OF SPRINGS-UNIT4.pptx
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy19 visualizações
_MAKRIADI-FOTEINI_diploma thesis.pptx por fotinimakriadi
_MAKRIADI-FOTEINI_diploma thesis.pptx_MAKRIADI-FOTEINI_diploma thesis.pptx
_MAKRIADI-FOTEINI_diploma thesis.pptx
fotinimakriadi10 visualizações
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78165 visualizações
Web Dev Session 1.pptx por VedVekhande
Web Dev Session 1.pptxWeb Dev Session 1.pptx
Web Dev Session 1.pptx
VedVekhande13 visualizações
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) por Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Tsuyoshi Horigome39 visualizações
GDSC Mikroskil Members Onboarding 2023.pdf por gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil59 visualizações
sam_software_eng_cv.pdf por sammyigbinovia
sam_software_eng_cv.pdfsam_software_eng_cv.pdf
sam_software_eng_cv.pdf
sammyigbinovia9 visualizações
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... por csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn6 visualizações
fakenews_DBDA_Mar23.pptx por deepmitra8
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
deepmitra816 visualizações
Proposal Presentation.pptx por keytonallamon
Proposal Presentation.pptxProposal Presentation.pptx
Proposal Presentation.pptx
keytonallamon63 visualizações
Design of machine elements-UNIT 3.pptx por gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy34 visualizações
MongoDB.pdf por ArthyR3
MongoDB.pdfMongoDB.pdf
MongoDB.pdf
ArthyR349 visualizações
REACTJS.pdf por ArthyR3
REACTJS.pdfREACTJS.pdf
REACTJS.pdf
ArthyR335 visualizações
Ansari: Practical experiences with an LLM-based Islamic Assistant por M Waleed Kadous
Ansari: Practical experiences with an LLM-based Islamic AssistantAnsari: Practical experiences with an LLM-based Islamic Assistant
Ansari: Practical experiences with an LLM-based Islamic Assistant
M Waleed Kadous7 visualizações
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf por AlhamduKure
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdfASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
AlhamduKure6 visualizações
SPICE PARK DEC2023 (6,625 SPICE Models) por Tsuyoshi Horigome
SPICE PARK DEC2023 (6,625 SPICE Models) SPICE PARK DEC2023 (6,625 SPICE Models)
SPICE PARK DEC2023 (6,625 SPICE Models)
Tsuyoshi Horigome36 visualizações

AAA server

  • 1. GROUP-3 Page | 1 COMP1161 T411- Wireless Networking Security and Advance Data Network Technology “Analysis on AAA Service” Submitted by: ANANDU KARTHIKYEAN 101238315 NAIK HETVI 101212340 UMANG PATEL 101235317 HIRWA JANI 101255327 Submitted to: Prof. Jacky Min
  • 2. GROUP-3 Page | 2 Introduction Definition: - AAA is an abbreviation of authentication, authorization, and accounting. Sometimes it is referred as “Triple-A”. It represents the big tree in terms of IP based network management and policy administration. A AAA server is a framework program that handles the request of user for all kinds of resources. It gives access to users with verification of their information and keep its record of information been assigned to user. Authentication is the process of identifying a user uniquely by their username and password. It compares the data stored in database and the user provided login credentials and then give access. If the user’s login is same, then the permission is granted and if it does not match then the access is denied. Example: “who are you?” gets authenticate with “I am user ‘student’ and my password ‘validate’ proves it.” Authorization is the process of allowing or restricting the user to access the network resources after the authentication of user through username and password. The level of authorization determines the user’s authority to type or quality of data. Example: “what did you do? What can you access?” gets authorize with “User ‘student’ can access host ‘server XYZ’ using Telnet.”
  • 3. GROUP-3 Page | 3 Accounting is the process of keeping record of user’s activity while using network resources like keeping track of time spent, data accessed or transferred during session. This stage is used for authorization control, billing, trend analysis, resource utilization and planning for data capacity required for business operations. Example: “what did you do? How long did you do it? How often did you do it?” is accounted by “User ‘student’ accessed host ‘server XYZ’ using Telnet for ’15 minutes’.” Framework of AAA: The AAA server typically interacts with network access and gateway servers and with databases and directories containing user information. The current standard by which devices or applications communicate with a AAA server is the Remote Authentication Dial-In User Service (RADIUS).
  • 4. GROUP-3 Page | 4 The following options can be used to implement AAA on Cisco devices:  Cisco Secure ACS Solution Engine – a dedicated server that contains the usernames, passwords, and other information about what users are allowed to access and when.  Cisco Secure ACS for Windows Server – a software package installed on a Windows system that provide AAA services.  Cisco Secure ACS- in a virtual machine  Local database – also known as local authentication and authorization, this option uses the local router database for AAA purposes.
  • 5. GROUP-3 Page | 5 Implementing Cisco AAA: - Implementing AAA Using LocalServices: o Step1: The client establishes connection with the router. o Step2: The router prompts the user for their username and password. o Step3: The router authenticates the username and password in the local database. The user is authorized to access the network based on information in the local database. Remote client Router Step1 Step2 Step3
  • 6. GROUP-3 Page | 6 Implementing Authentication Using External Servers: o Step1: The client establishes a connection with the router. o Step2: The router communicates with the Cisco Secure ACS (server or appliance). o Step3: The Cisco Secure ACS prompts the user for their username and password. o Step4: The Cisco Secure ACS authenticates the user. The user is authorized to access the network based on information found in the Cisco Secure ACS database. Remote client Router ACS FOR WINDOWS SERVER ACS SOLUTION ENGINE Step1 Step2 Step3 Step4
  • 7. GROUP-3 Page | 7 RADIUS and TACACS+:- Two different protocols are used to communicate between the AAA security servers and authenticating devices. Cisco secure ACS (access controlserver) supports bothRADUIS and TACACS+. TACACS+:- Terminal Access Controller Access ControlSystem (TACASCS+)is a protocol which is used for the communication of the Client and ACS server. It uses TCP port number 49 which makes it reliable. RADIUS: - Remote Access Dial In User Service (RADIUS) is an open standard protocolused for the communication between any AAA client and ACS server. If one of client or server is from any other vendor than CISCO;then we must use RADIUS. It uses port number 1812 for authentication and authorization 1813 for accounting. Cisco secure ACS Firewall Router N/W access server Security server
  • 8. GROUP-3 Page | 8 TACACS+ remains more secure than RADIUS but RADIUS have robust application programming interface for strong accounting. Similarities: The process is start by Network Access Device (NAD – client of TACACS+ or RADIUS). NAD contact the TACACS+ or RADIUS server and transmit the request for authentication (username and password) to the server. First, NAD obtain username prompt and transmit the username to the server and then again, the server is contact by NAD to obtain password prompt and then the password is sent to the server. The server replies with access-accept message if the credentials are valid otherwise send an access-reject message to the client. Further authorisation and accounting are different in both protocols as authentication and authorisation is combined in RADIUS. Advantages (TACACS+ over RADIUS)  As TACACS+ uses TCP therefore more reliable than RADIUS.  TACACS+ provides more control over the authorization of commands while in RADIUS, no external authorization of commands is supported.  All the AAA packets are encrypted in TACACS+ while only the passwords are encrypted in RADIUS i.e. more secure. Advantages (RADIUS over TACACS+)  As it is open standard therefore RADIUS can be used with other vendors device while because TACACS+ is Cisco proprietary, it can be used with Cisco devices only.  It has more extensive accounting support than TACACS+.
  • 9. GROUP-3 Page | 9 Comparison:- Parameters TACACS+ RADIUS Functionality Separates AAA Combines Auth TransportProtocol TCP UDP CHAP Bidirectional Unidirectional ProtocolSupport Multi-protocol support No ARA no NETBEUI Confidentiality Entire packet-encrypted Password encrypted Accounting Limited Extensive
  • 10. GROUP-3 Page | 10 DIFFERENCES:- TACACS+ RADIUS Cisco proprietary protocol open standard protocol It uses TCP as transmission protocol It uses UDP as transmission protocol It uses TCP port number 49. It uses UDP port number 1812 for authentication and authorization and 1813 for accounting. Authentication, Authorization and Accounting is separated in TACACS+. Authentication and Authorization is combined in RADIUS. All the AAA packets are encrypted. Only the password is encrypted while the other information such as username, accounting information etc. are not encrypted. preferably used for ACS. used when ISE is use. It provides more granular control i.e. can specify the command for authorization. No external authorization of commands supported. TACACS+ offers multiprotocol support No multiprotocol supports. Used for device administration. used for network access
  • 11. GROUP-3 Page | 11 CONCULSION:-  AAA services is higher degree privileged EXCE authentication.  The AAA server typically interacts with network access and gateway servers and with databases and directories containing user information.  RADIUS and TACACS+ are two main protocols which plays important role in communicating between AAA server and Authenticating Device.  Implementation AAA Server can be done by Local server and Extended Servers.  AAA can be used in CDMA. REFERENCES:-
  • 12. GROUP-3 Page | 12  https://www.dialogic.com/glossary/aaa-server-authentication-authorization-and- accounting  https://searchsecurity.techtarget.com/definition/AAA-server  https://www.slideshare.net/mobile/ahmadtaweel2/aaa-implementation  https://geek-university.com/ccna-security/aaa-explained/  https://www.google.com/amp/s/www.geeksforgeeks.org/difference-between-tacacs-and- radius/amp/  Lecture notes.