eduroam home Configuration for Cisco ACS 5.3

Friday, July 13, 2012 - 13:06

Add National Proxies as RADIUS Clients

  1. Go to “Network Resources > Network Devices and AAA Clients” and click ‘Create’
  2. In the ‘Name:’ field enter ‘roaming0.ja.net’
  3. Under ‘IP Address’ select the ‘Single IP Address’ button and enter in the field the IP Address of the NRPS ‘194.82.174.185’
  4. Under ‘Authentication Options’ tick the ‘RADIUS’ box
  5. In the ‘Shared Secret:’ field enter the shared secret for roaming0 for you RADIUS Server.  This information can be obtained by visiting https://support.roaming.ja.net
  6. Click ‘Submit’
  7. Repeat the above steps for roaming1.ja.net and roaming2.ja.net

 

Add Local Wireless Infrastructure as RADIUS Clients

  1. Go to “Network Resources > Network Devices and AAA Clients” and click ‘Create’
  2. In the ‘Name:’ field, enter the name of the Network Access Server.  In most cases this will be your wireless controller or access point e.g. ‘wireless-controller’
  3. Under ‘IP Address’ select the ‘Single IP Address’ button and enter in the field the IP Address of the Client e.g. ’10.10.0.10’ or alternative enter ranges or subnets for multiple RADIUS Clients
  4. Under ‘Authentication Options’ tick the ‘RADIUS’ box
  5. In the ‘Shared Secret:’ field, enter the shared secret for the RADIUS Client.
  6. Click ‘Submit’
  7. Repeat the above steps for all of your Network Access Servers.

Add Local Authentication Store

To authenticate your own users you will need to add an authentication store.  The type and settings of authentication stores will vary from site to site. Please check the Cisco documentation for the exact details of how to configure ACS for the type of authentication store your site uses. 

 

Add Local Certificate Authority and RADIUS Server Certificate

Add the certificate authority for the RADIUS server certificate to ACS.

  1. Go to “Users and Identity Stores > Certificate Authorities”
  2. Click ‘Browse…’ for the ‘Certificate File:’ field and select your RADIUS server certificate authority
  3. Click ‘Submit’

Add the certificate for the RADIUS Server

There are a number of ways of installing a certificate for the EAP authentication of clients on the ACS.  Which method is used will depend upon the site.  The following describes installing a certificate from a file.

  1. Go to “System Administration > Configuration à Local Server Certificates à Local Certificates” and Click ‘Add’
  2. Select the ‘Import Server Certificate’ radio button and click ‘Next’
  3. In the ‘Certificate File:’ field click ‘Browse…’ and select your certificate file
  4. In the ‘Private Key File:’ field click ‘Browse…’ and select your certificate key file
  5. If you key file is password protected, enter the password in the ‘Private Key Password:’ field.
  6. Under ‘Protocol’ tick the ‘EAP: Used for EAP protocols that user SSL/TLS tunneling’ box
  7. Click ‘Finish’

Create an Access Service for local users

  1. Go to “Access Policies > Access Services” and click ‘Create’
  2. In the ‘Name:’ field enter a name for the service e.g. ‘Local Clients’
  3. Under ‘Access Service Policy Structure’ tick the ‘Based on service template’ radio button and click ‘Select’
  4. Choose ‘Network Access – Simple’ and click ‘OK’

  1. Click ‘Next’ and the tick the boxes for the EAP Types you wish to support. E.g. ‘Allow PEAP’
  2. Click the drop down arrow for the EAP Type and select the inner authentication methods required. E.g. ‘Allow EAP-MS-CHAPv2’
  3. Click ‘Finish’

 

Create a Policy for Permitting local Access

Add Compound Conditions to Service Selection Rules

If you haven’t implemented the Visited section, you will need to add ‘Compound Condition’ as an option in the ‘Service Selection Rules’

  1. Go to “Access Policies > Access Services > Service Selection Rules”, then click “Customize”
  2. From the “Available:” conditions add ‘Compound Condition’ to the “Selected:” list and click “OK”

Create a Service Selection Rule for Local Users

  1. Go to “Access Policies > Access Services à Service Selection Rules”
  2. Tick the box next ‘1’ and then click the drop down box on ‘Create’ and select ‘Create Above’
  3. In the ‘Name:’ field enter ‘local-realms’
  4. Under “Conditions” tick “Protocols” and then match on RADIUS
  5. Under “Conditions” tick “Compound Condition”
  6. From the “Dictionary:” drop down select ‘RADIUS-IETF’ and then choose the “Attribute” ‘User-Name’
  7. Change “Operator:” to ‘contains’, “Value” to ‘static’ and enter @
  8. Click “Add V” and then click “And >”
  9. Change “Operator:” to ‘ends with’, “Value” to ‘static’ and enter your sites realm e.g. camford.ac.uk
  10. Click “Add V” and repeat the previous step for all of your sites domains
  11. Under “Results à Service:” choose the previously defined local Access Service e.g. “Local Clients”
  12. Click “OK”

 

Choose an identity store for local users

After the policy has been created to divert local users to the correct Access Service, the Identity store needs to be defined for that service. To do this:

  1. Go to “Access Policies > Access Services à Local Clients à Identity”  where ‘Local Clients’ is the name of the Access Service for local users (as defined above).
  2. Under ‘Identity Source:’ choose your sites identity store e.g. Active Directory Server.
  3. Click ‘Save Changes’