Cisco Systems ASA 5580 Network Router User Manual


  Open as PDF
of 2086
 
69-41
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter 69 General VPN Setup
ACL Manager
Note This feature does not work as intended if you enable interactive hardware client authentication.
IEEE 802.1X is a standard for authentication on wired and wireless networks. It provides wireless
LANs with strong mutual authentication between clients and authentication servers, which can
provide dynamic per-user, per-session wireless encryption privacy (WEP) keys, removing
administrative burdens and security issues that are present with static WEP keys.
Cisco Systems has developed an 802.1X wireless authentication type called Cisco LEAP. LEAP
implements mutual authentication between a wireless client on one side of a connection and a
RADIUS server on the other side. The credentials used for authentication, including a password, are
always encrypted before they are transmitted over the wireless medium.
Note Cisco LEAP authenticates wireless clients to RADIUS servers. It does not include RADIUS
accounting services.
LEAP users behind a hardware client have a circular dilemma: they cannot negotiate LEAP
authentication because they cannot send their credentials to the RADIUS server behind the central
site device over the tunnel. The reason they cannot send their credentials over the tunnel is that they
have not authenticated on the wireless network. To solve this problem, LEAP Bypass lets LEAP
packets, and only LEAP packets, traverse the tunnel to authenticate the wireless connection to a
RADIUS server before individual users authenticate. Then the users proceed with individual user
authentication.
LEAP Bypass works as intended under the following conditions:
The interactive unit authentication feature (intended for wired devices) must be disabled. If
interactive unit authentication is enabled, a non-LEAP (wired) device must authenticate the
hardware client before LEAP devices can connect using that tunnel.
Individual user authentication is enabled (if it is not, you do not need LEAP Bypass).
Access points in the wireless environment must be Cisco Aironet Access Points. The wireless
NIC cards for PCs can be other brands.
The Cisco Aironet Access Point must be running Cisco Discovery Protocol (CDP).
The ASA 5505 or VPN 3002 can operate in either client mode or network extension mode.
LEAP packets travel over the tunnel to a RADIUS server via ports 1645 or 1812.
Note Allowing any unauthenticated traffic to traverse the tunnel might pose a security risk.
Allow C—Restricts the use of Network Extension Mode on the hardware client. Choose the option
to let hardware clients use Network Extension Mode. Network Extension Mode is required for the
hardware client to support IP phone connections, because the Call Manager can communicate only
with actual IP addresses.