SlideShare a Scribd company logo
AAA
Authentication, Authorization, and Accounting
-By, Sagar Gor
AAA Server Communication Security
Communication between an authenticator (also referred to as a NAS, Network Access Server) and a AAA server is
commonly performed using RADIUS or TACACS+. The security of this communication can be summarized as follows:
 Both RADIUS and TACACS+ transactions are authenticated using a shared, static secret (or key) associated with
the device name or IP address but this secret is never sent over the network.
 RADIUS, per the standard, only encrypts the user password field. All other packet data is passed in clear text
and is thus vulnerable to sniffing.
 TACACS+ encrypts the full payload of the packet, thereby providing some confidentiality of data, though the
encryption algorithm is not very strong.
The general guidelines for securing AAA server communication are:
 Employ strong secrets for authentication of the AAA server and NAS.
 Regularly change the secrets used to authenticate the AAA server and NAS.
 Restrict AAA communication to the limited set of authorized AAA servers, and over the configured
AAA communication ports, using extended ACLs.
 Since RADIUS and TACACS+ do not support strong authentication and encryption, it is recommended
that an out-of-band (OOB) or IPSec management network be considered as a means of protecting
AAA server communication transactions from attack.
AAA Server Based Accounting Services
AAA server-based accounting enables the ability to track the services users are accessing, as well as the amount of
network resources they are consuming. When AAA server-based accounting is enabled, the network infrastructure
device reports user activity to the AAA server in the form of accounting records. Each accounting record contains
accounting attribute-value (AV) pairs and is stored on the AAA server. This data can then be analyzed for network
management, client billing, and/or auditing.
Cisco IOS software supports five different kinds of accounting:
 Network Accounting
Network accounting provides information for all PPP, SLIP, or ARAP sessions, including packet and byte counts.
 Connection Accounting
Connection accounting provides information about all outbound connections made from the network access server, such
as Telnet, local-area transport (LAT), TN3270, packet assembly-disassembly (PAD), and rlogin.
 EXEC Accounting
EXEC accounting provides information about user EXEC terminal sessions (user shells) on the network access server,
including username, date, start and stop times, the access server IP address, and (for dial-in users) the telephone
number the call originated from.
 Command Accounting
Command accounting provides information about the EXEC shell commands for a specified privilege level that are
being executed on a network access server. Each command accounting record includes a list of the commands
executed for that privilege level, as well as the date and time each command was executed, and the user who
executed it.
 System Accounting
System accounting provides information about all system-level events (for example, when the system reboots or
when accounting is turned on or off).
The Network Security Baseline is focused on securing the network infrastructure and critical network services.
Consequently, AAA-based accounting in Network Security Baseline includes:
 EXEC accounting
 Command accounting
 System accounting
AAA Best Practices

More Related Content

PDF
AAA & RADIUS Protocols
PPT
RADIUS
PPTX
PDF
Presentation cisco iron port email & web security
PPTX
Why Do I Need an SBC
PDF
Client-Side Penetration Testing Presentation
PDF
3 palo alto ngfw architecture overview
AAA & RADIUS Protocols
RADIUS
Presentation cisco iron port email & web security
Why Do I Need an SBC
Client-Side Penetration Testing Presentation
3 palo alto ngfw architecture overview

What's hot (20)

PPT
Wifi Security
PPTX
Wireshark
PPTX
802.1x
PDF
Ossec Lightning
PDF
20 palo alto site to site
PPTX
Access Management with Aruba ClearPass
PPTX
Security Information Event Management - nullhyd
PDF
Radius Protocol
PPT
Static Routing
PDF
Radius vs. Tacacs+
PDF
Clear pass policy manager advanced_ashwath murthy
PPT
BIG IP F5 GTM Presentation
PDF
8 palo alto security policy concepts
PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
PPT
Next generation firewall(ngfw)feature and benefits
PDF
Policy and firewall_filters
PDF
Owasp top 10
PDF
Managing and Optimizing RF Spectrum for Aruba WLANs
PPTX
OWASP Top 10 2021 Presentation (Jul 2022)
PDF
Avaya Session Border Controller (SBC)
Wifi Security
Wireshark
802.1x
Ossec Lightning
20 palo alto site to site
Access Management with Aruba ClearPass
Security Information Event Management - nullhyd
Radius Protocol
Static Routing
Radius vs. Tacacs+
Clear pass policy manager advanced_ashwath murthy
BIG IP F5 GTM Presentation
8 palo alto security policy concepts
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Next generation firewall(ngfw)feature and benefits
Policy and firewall_filters
Owasp top 10
Managing and Optimizing RF Spectrum for Aruba WLANs
OWASP Top 10 2021 Presentation (Jul 2022)
Avaya Session Border Controller (SBC)
Ad

Similar to AAA Best Practices (20)

DOCX
AAA server
PPTX
Security
PPTX
access controtggffffffffffffffdddddl.pptx
PPTX
Ccna sv2 instructor_ppt_ch3
PPTX
Network Security v1.0 -network Module 7.pptx
PPT
CCNA_Security_03.ppt
PPT
redes telematicas CISCO para ingenieros pre
PPTX
AAA Implementation
PDF
Computer Security - CCNA Security - Lecture 2
PPSX
SwitchSecurity SwitchSecurity SwitchSecurity SwitchSecurity
PDF
RADIUS in Action: Securing, Monitoring and Protecting Network Infrastructure
PDF
RADIUS in Action: Securing, Monitoring and Protecting Network Infrastructure
DOCX
RADIUS provides three services- authentication- authorization- and acc.docx
PPT
Installation et configuration de système
PPT
CCNA Security 06- AAA
PDF
Ch3-Authentication, Authorization, and Accounting.pdf
PDF
Ccna sec 01
PDF
AAA Protocol
PPTX
Computer security concepts
AAA server
Security
access controtggffffffffffffffdddddl.pptx
Ccna sv2 instructor_ppt_ch3
Network Security v1.0 -network Module 7.pptx
CCNA_Security_03.ppt
redes telematicas CISCO para ingenieros pre
AAA Implementation
Computer Security - CCNA Security - Lecture 2
SwitchSecurity SwitchSecurity SwitchSecurity SwitchSecurity
RADIUS in Action: Securing, Monitoring and Protecting Network Infrastructure
RADIUS in Action: Securing, Monitoring and Protecting Network Infrastructure
RADIUS provides three services- authentication- authorization- and acc.docx
Installation et configuration de système
CCNA Security 06- AAA
Ch3-Authentication, Authorization, and Accounting.pdf
Ccna sec 01
AAA Protocol
Computer security concepts
Ad

More from Sagar Gor (6)

PDF
Device software image verification
PDF
Firewalld
PPT
logical addressing
PPT
hardware addressing
PPT
Osi reference model
PPT
Introduction to networks
Device software image verification
Firewalld
logical addressing
hardware addressing
Osi reference model
Introduction to networks

Recently uploaded (20)

PPTX
newyork.pptxirantrafgshenepalchinachinane
PPTX
E -tech empowerment technologies PowerPoint
PDF
Introduction to the IoT system, how the IoT system works
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
artificial intelligence overview of it and more
PPTX
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPTX
t_and_OpenAI_Combined_two_pressentations
PPTX
Funds Management Learning Material for Beg
PPT
Ethics in Information System - Management Information System
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PDF
The Evolution of Traditional to New Media .pdf
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
newyork.pptxirantrafgshenepalchinachinane
E -tech empowerment technologies PowerPoint
Introduction to the IoT system, how the IoT system works
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Design_with_Watersergyerge45hrbgre4top (1).ppt
artificial intelligence overview of it and more
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
Mathew Digital SEO Checklist Guidlines 2025
t_and_OpenAI_Combined_two_pressentations
Funds Management Learning Material for Beg
Ethics in Information System - Management Information System
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
The Evolution of Traditional to New Media .pdf
SAP Ariba Sourcing PPT for learning material
Power Point - Lesson 3_2.pptx grad school presentation
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
isotopes_sddsadsaadasdasdasdasdsa1213.ppt

AAA Best Practices

  • 1. AAA Authentication, Authorization, and Accounting -By, Sagar Gor
  • 2. AAA Server Communication Security Communication between an authenticator (also referred to as a NAS, Network Access Server) and a AAA server is commonly performed using RADIUS or TACACS+. The security of this communication can be summarized as follows:  Both RADIUS and TACACS+ transactions are authenticated using a shared, static secret (or key) associated with the device name or IP address but this secret is never sent over the network.  RADIUS, per the standard, only encrypts the user password field. All other packet data is passed in clear text and is thus vulnerable to sniffing.  TACACS+ encrypts the full payload of the packet, thereby providing some confidentiality of data, though the encryption algorithm is not very strong. The general guidelines for securing AAA server communication are:  Employ strong secrets for authentication of the AAA server and NAS.  Regularly change the secrets used to authenticate the AAA server and NAS.  Restrict AAA communication to the limited set of authorized AAA servers, and over the configured AAA communication ports, using extended ACLs.  Since RADIUS and TACACS+ do not support strong authentication and encryption, it is recommended that an out-of-band (OOB) or IPSec management network be considered as a means of protecting AAA server communication transactions from attack.
  • 3. AAA Server Based Accounting Services AAA server-based accounting enables the ability to track the services users are accessing, as well as the amount of network resources they are consuming. When AAA server-based accounting is enabled, the network infrastructure device reports user activity to the AAA server in the form of accounting records. Each accounting record contains accounting attribute-value (AV) pairs and is stored on the AAA server. This data can then be analyzed for network management, client billing, and/or auditing. Cisco IOS software supports five different kinds of accounting:  Network Accounting Network accounting provides information for all PPP, SLIP, or ARAP sessions, including packet and byte counts.  Connection Accounting Connection accounting provides information about all outbound connections made from the network access server, such as Telnet, local-area transport (LAT), TN3270, packet assembly-disassembly (PAD), and rlogin.  EXEC Accounting EXEC accounting provides information about user EXEC terminal sessions (user shells) on the network access server, including username, date, start and stop times, the access server IP address, and (for dial-in users) the telephone number the call originated from.
  • 4.  Command Accounting Command accounting provides information about the EXEC shell commands for a specified privilege level that are being executed on a network access server. Each command accounting record includes a list of the commands executed for that privilege level, as well as the date and time each command was executed, and the user who executed it.  System Accounting System accounting provides information about all system-level events (for example, when the system reboots or when accounting is turned on or off). The Network Security Baseline is focused on securing the network infrastructure and critical network services. Consequently, AAA-based accounting in Network Security Baseline includes:  EXEC accounting  Command accounting  System accounting