Re: [c-nsp] Router 2 factor authentication

2010-08-26 Thread Mark Tech
Hi Dominik
Your solution sounds like what I'm looking for. Are you using RADIUS or TACACS 
as your AAA?

With regard to the cli that you will see from the router, do you just enter 
username and passwd+PIN

In answer to Ben's question, this is also for compliance reasons as well

Regards

Mark

- Original Message 
From: Dominik Bay d@rrbone-bb.net
To: cisco-nsp@puck.nether.net
Sent: Thu, August 26, 2010 6:28:22 AM
Subject: Re: [c-nsp] Router 2 factor authentication

On Thu, 26 Aug 2010 10:42:28 +1000
Ben Steele b...@bensteele.org wrote:

 Out of curiosity can you tell me what led you to wanting 2FA for these
 devices, and how the traditional acl/tacacs method failed your
 requirements?

We are using RSA SecurID on P and PE Routers to secure the core network
and fullfil customer demands. 2FA on CE Routers is depending on the
customer-needs, those who asked for it on the PE and P are usually
having it on their CEs too.
On OOB Devices it's a 2-step auth with encryption and
callback.

Regards,
Dominik
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Router 2 factor authentication

2010-08-26 Thread Dominik Bay
Hi Mark,

On Thu, 26 Aug 2010 01:45:17 -0700 (PDT)
Mark Tech techcon...@yahoo.com wrote:

 Hi Dominik
 Your solution sounds like what I'm looking for. Are you using RADIUS
 or TACACS as your AAA?
 
 With regard to the cli that you will see from the router, do you just
 enter username and passwd+PIN

we are using Cisco ACS with RSA ACE integration for these devices.
You will get a standard prompt like:

TACACS+ Username: myuser
Password: token-pin+token-one-time-password

The login is fast, and from what I hear the ACS+ACE setup is stable
enough to not being punished by your server operations team for
choosing this solution. :-)

Kind regards,
Dominik
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Router 2 factor authentication

2010-08-26 Thread John Kougoulos




we are using Cisco ACS with RSA ACE integration for these devices.
You will get a standard prompt like:

TACACS+ Username: myuser
Password: token-pin+token-one-time-password

The login is fast, and from what I hear the ACS+ACE setup is stable
enough to not being punished by your server operations team for
choosing this solution. :-)



In a configuration (ACS+ACE) I had done several years ago, the prompt was 
the standard SecurID:


Username:
Enter PASSCODE:

Standard authentication was working ok, in some cisco documentation it was 
recommended to increase the tacacs timeout to 30 or 60 seconds as far as I 
can remember because the ACE server may delay it's response. What you 
should also test is if the setup supports Next Tokencode modes etc.


The problem, IMHO, with SecurID for management access of network devices, 
is that you have to wait 1 minute to logon to another device. So it's ok 
for provisioning tasks, but when you have a problem and you need to login 
instantly to 4-5 devices, it's rather unpleasant to wait 1 minute between 
logons.


Regards,
John
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Router 2 factor authentication

2010-08-26 Thread Tim Franklin
 The problem, IMHO, with SecurID for management access of network
 devices, is that you have to wait 1 minute to logon to another
 device. So it's ok for provisioning tasks, but when you have a
 problem and you need to login instantly to 4-5 devices, it's
 rather unpleasant to wait 1 minute between logons.

Don't know if SecurID have something similar, but I've done some ACS 
integration with a Vasco back-end, using OTP-style tokens that generate a new 
passcode good for one login only with each press of the button.  Much more 
useful in a network ops environment.

Regards,
Tim.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Router 2 factor authentication

2010-08-25 Thread Mark Tech
Hi
I am looking for a 2FA solution in order to connect to Cisco devices. I would 
like to use either Radius or TACACS as the AAA part, however I'd like to know 
whether/how I could interconnect this to a 2nd auth such as a token based RSA 
securID platform

I'd appreciate any input if this is possible at all?

Regards

Mark



  
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Router 2 factor authentication

2010-08-25 Thread Heath Jones
How about users appending the token digits to the password? Of course this
would mean your storing plain text passwords on the tacacs server
somewhere..



On 25 August 2010 21:06, Mark Tech techcon...@yahoo.com wrote:

 Hi
 I am looking for a 2FA solution in order to connect to Cisco devices. I
 would
 like to use either Radius or TACACS as the AAA part, however I'd like to
 know
 whether/how I could interconnect this to a 2nd auth such as a token based
 RSA
 securID platform

 I'd appreciate any input if this is possible at all?

 Regards

 Mark




 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Router 2 factor authentication

2010-08-25 Thread Chris Mason
 I am looking for a 2FA solution in order to connect to Cisco devices. I
 would
 like to use either Radius or TACACS as the AAA part, however I'd like to
 know
 whether/how I could interconnect this to a 2nd auth such as a token based
 RSA
 securID platform

 I'd appreciate any input if this is possible at all?

I haven't used it for a while but doesn't Cisco ACS support token
based authentication using an RSA SecurID server as it's
authentication method?

Chris
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Router 2 factor authentication

2010-08-25 Thread Daniel Roesen
On Wed, Aug 25, 2010 at 01:06:24PM -0700, Mark Tech wrote:
 I am looking for a 2FA solution in order to connect to Cisco devices. I would 
 like to use either Radius or TACACS as the AAA part, however I'd like to know 
 whether/how I could interconnect this to a 2nd auth such as a token based RSA 
 securID platform
 
 I'd appreciate any input if this is possible at all?

RSA ACE server:

http://www.rsa.com/node.aspx?id=1156

I've read that is does RADIUS by itself. If that ain't enough for your
needs, a Cisco ACS might act as a mediator:

http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a0080094650.shtml

Best regards,
Daniel

-- 
CLUE-RIPE -- Jabber: d...@cluenet.de -- d...@ircnet -- PGP: 0xA85C8AA0
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Router 2 factor authentication

2010-08-25 Thread Michael K. Smith - Adhost
Hello Mark:


 -Original Message-
 From: cisco-nsp-boun...@puck.nether.net [mailto:cisco-nsp-
 boun...@puck.nether.net] On Behalf Of Mark Tech
 Sent: Wednesday, August 25, 2010 1:06 PM
 To: cisco-nsp@puck.nether.net
 Subject: [c-nsp] Router 2 factor authentication
 
 Hi
 I am looking for a 2FA solution in order to connect to Cisco devices.
I would
 like to use either Radius or TACACS as the AAA part, however I'd like
to know
 whether/how I could interconnect this to a 2nd auth such as a token
based
 RSA
 securID platform
 
 I'd appreciate any input if this is possible at all?
 
 Regards
 
 Mark

We use the SecurID 7.0 servers from RSA and those boxes have the
opensource ACS client as part of the installation.  Or, you can also use
their internal Radius server as well.  Or, if you have already invested
in ACS you can have the ACS authenticate against tokens directly.

Regards,

Mike

--
Michael K. Smith - CISSP, GSEC, GISP
Chief Technical Officer - Adhost Internet LLC mksm...@adhost.com
w: +1 (206) 404-9500 f: +1 (206) 404-9050
PGP: B49A DDF5 8611 27F3  08B9 84BB E61E 38C0 (Key ID: 0x9A96777D)


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Router 2 factor authentication

2010-08-25 Thread Ben Steele
Out of curiosity can you tell me what led you to wanting 2FA for these
devices, and how the traditional acl/tacacs method failed your requirements?

Of course anyone who has implemented it is free to chime in, just generally
interested in peoples security concerns around this and how you feel it
mitigates whatever risks you were associating with it, also curious if it
affected the way you handle OOB access aswell.

Ben

On Thu, Aug 26, 2010 at 6:06 AM, Mark Tech techcon...@yahoo.com wrote:

 Hi
 I am looking for a 2FA solution in order to connect to Cisco devices. I
 would
 like to use either Radius or TACACS as the AAA part, however I'd like to
 know
 whether/how I could interconnect this to a 2nd auth such as a token based
 RSA
 securID platform

 I'd appreciate any input if this is possible at all?

 Regards

 Mark




 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Router 2 factor authentication

2010-08-25 Thread Michael K. Smith - Adhost
Hello Ben:

 -Original Message-
 From: cisco-nsp-boun...@puck.nether.net [mailto:cisco-nsp-
 boun...@puck.nether.net] On Behalf Of Ben Steele
 Sent: Wednesday, August 25, 2010 5:42 PM
 To: Mark Tech
 Cc: cisco-nsp@puck.nether.net
 Subject: Re: [c-nsp] Router 2 factor authentication
 
 Out of curiosity can you tell me what led you to wanting 2FA for these
 devices, and how the traditional acl/tacacs method failed your
 requirements?
 
 Of course anyone who has implemented it is free to chime in, just
generally
 interested in peoples security concerns around this and how you feel
it
 mitigates whatever risks you were associating with it, also curious if
it
 affected the way you handle OOB access aswell.
 
 Ben
 
In our case it's for compliance reasons.  There are requirements within
scope for many models that  require two-factor authentication.  For OOB,
we use 2-factor to an OOB network that doesn't have any outside
connectivity beyond our border firewalls.  Granted, we are only in a few
locations and do all of our OOB using IP addressed devices.  If I had a
dial-in AUX device at some remote location I would ask for mitigating
circumstances for that device.

Regards,

Mike
--
Michael K. Smith - CISSP, GSEC, GISP
Chief Technical Officer - Adhost Internet LLC mksm...@adhost.com
w: +1 (206) 404-9500 f: +1 (206) 404-9050
PGP: B49A DDF5 8611 27F3  08B9 84BB E61E 38C0 (Key ID: 0x9A96777D)



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Router 2 factor authentication

2010-08-25 Thread Dominik Bay
On Thu, 26 Aug 2010 10:42:28 +1000
Ben Steele b...@bensteele.org wrote:

 Out of curiosity can you tell me what led you to wanting 2FA for these
 devices, and how the traditional acl/tacacs method failed your
 requirements?

We are using RSA SecurID on P and PE Routers to secure the core network
and fullfil customer demands. 2FA on CE Routers is depending on the
customer-needs, those who asked for it on the PE and P are usually
having it on their CEs too.
On OOB Devices it's a 2-step auth with encryption and
callback.

Regards,
Dominik
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/