![](http://img1.51cto.com/attachment/201009/213209963.jpg)
Setp 1.路由器基本配置
r1(config)#show ip int b
Interface
IP-Address OK? Method Status Protocol
FastEthernet0/0
192.168.1.254 YES manual up up
FastEthernet1/0
192.168.10.254 YES manual up up
r1(config)#exit
r1#ping 192.168.1.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 20/53/76 ms
r1#ping 192.168.10.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.10.1, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 40/67/96 ms
r2#show ip int b
Interface
IP-Address OK? Method Status Protocol
FastEthernet0/0
192.168.1.253 YES manual up up
FastEthernet1/0
192.168.10.253 YES manual up up
r2#ping 192.168.1.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 28/47/72 ms
r2#ping 192.168.10.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.10.1, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 36/42/48 ms
Setp 2.ACS基本配置
1.安装AD-benet.com
![](http://img1.51cto.com/attachment/201009/213246672.jpg)
2.安装ACS(必需安装java)
![](http://img1.51cto.com/attachment/201009/213318644.jpg)
3.调整IE安全级别
![](http://img1.51cto.com/attachment/201009/213448997.jpg)
4.在AD中创建相应的OU、组、用户。其中hw用于raduis 、cisco用于tacacs+
![](http://img1.51cto.com/attachment/201009/213539127.jpg)
5.勾选network device groups显示相应界面
![](http://img1.51cto.com/attachment/201009/215349147.jpg)
6.定义tacacs+ 及raduis 客户端及服务器信息
![](http://img1.51cto.com/attachment/201009/213857700.jpg)
![](http://img1.51cto.com/attachment/201009/213924912.jpg)
![](http://img1.51cto.com/attachment/201009/214015794.jpg)
7.AD组及ACS组关联
![](http://img1.51cto.com/attachment/201009/214126829.jpg)
.8. 重新启动服务
![](http://img1.51cto.com/attachment/201009/214313486.jpg)
Setp 3.测试PC基本配置
![](http://img1.51cto.com/attachment/201009/214347215.jpg)
Setp 4.R1做为tacacs+客户端配置及测试
r1(config)#aaa new-model
r1(config)#tacacs-server host 192.168.10.1 key cisco
r1(config)#aaa authentication login cisco group tacacs+ local
r1(config)#line vty 0 4
r1(config-line)#login authentication cisco
r1(config-line)#exit
r1(config)#exit
r1#test aaa group tacacs+ cisco 1 new-code
Trying to authenticate with Servergroup tacacs+
Sending password
User successfully authenticated
![](http://img1.51cto.com/attachment/201009/214413663.jpg)
Setp 5.R2做为raduis客户端配置及测试
r2(config)#aaa new-model
r2(config)#radius-server host 192.168.10.1 key cisco
r2(config)#aaa authentication login cisco group radius local
r2(config)#line vty 0 4
r2(config-line)#login authentication cisco
r2(config-line)#exit
r2(config)#exit
r2#test aaa group radius hw 1 new-code
Trying to authenticate with Servergroup radius
User successfully authenticated
![](http://img1.51cto.com/attachment/201009/214434987.jpg)
Setp 6 ACS 用户验证及ebable密码
1.路由器启用enabe密码认证
r1(config)#aaa authentication enable default group tacacs+ enable
2.在ACS上新建用户A设置login及enable密码
![](http://img1.51cto.com/attachment/201009/215916808.jpg)
![](http://img1.51cto.com/attachment/201009/214649414.jpg)
3.PC登入R1测试
![](http://img1.51cto.com/attachment/201009/215441276.jpg)
setp 7 级别授权
1.路由器启用级别授权及测试失败结果图
r1(config)#aaa authorization exec default group tacacs+ local
![](http://img1.51cto.com/attachment/201009/215505382.jpg)
2.ACS进行级别授权
![](http://img1.51cto.com/attachment/201009/215531420.jpg)
3.登入R1测试成功
![](http://img1.51cto.com/attachment/201009/215546288.jpg)
Setp 8 15级别命令授权
1.R1上启用命令授权
r1(config)#aaa authorization commands 15 default group tacacs+ local
2.ACS上面没做配置之前测试结果图
![](http://img1.51cto.com/attachment/201009/215600395.jpg)
3.ACS配置命令授权
![](http://img1.51cto.com/attachment/201009/215617510.jpg)
4.登入测试,只能使用指定命令
![](http://img1.51cto.com/attachment/201009/215630786.jpg)
Setp 10 审计
1.R1路由器审计所有级别配置
r1(config)#no aaa authorization commands 15 default group tacacs+ local
r1(config)#aaa accounting commands 15 default start-stop group tacacs+
r1(config)#aaa accounting commands 1 default start-stop group tacacs+
r1(config)#aaa accounting commands 0 default start-stop group tacacs+
r1(config)#aaa accounting commands 2 default start-stop group tacacs+
2.telnet R1测试输入部分命令
![](http://img1.51cto.com/attachment/201009/215646832.jpg)
3.ACS查看审计结果图
![](http://img1.51cto.com/attachment/201009/215703592.jpg)
实验总结:
R1采用ACS -tacacs+认证授权审计.
1. 认证调用AD-ciscogroup组里Cisco用户进行login认证.AD-Cisco用户enable密码实验没有做成功(在ACS上新建用户a来做enable认证),没有找出原因.
2. 在Tacacs+上对AD用户cisco进行级别和命令授权.
3. 在Tacacs+上对级别0\1\2\15级别命令进行审计
R2采用ACS-raduis认证
1. 认证周用AD-hwgroup组里hw进行login认证