Global Configuration - AAA

The Unified Profile Global Configuration AAA Screen displays all configured Global AAA Profiles and used to create, edit, delete, and assign a Global AAA Profile. AAA Profiles are used to define specific AAA parameters that can be used in an Access Auth Profile or an Captive Portal Profile. This Global AAA Profile can be assigned and automatically applied to all UNP ports which have not been assigned an AAA Profile. In the absence of port template's AAA profile, the Global AAA Profile can be applied on AOS 8.x Switches.

An AAA Profile can be created to configure user access to the network as well as user access to network devices. The following use cases are supported:

The following use case is not supported:

Creating a Global AAA Profile

Click on the Add icon to bring up the Create AAA Screen. Enter a profile name in the AAA Name field, then follow the instructions below to configure a profile for Network Access or Switch Access.

User's Access to Network

If necessary, click on "User's Access To Network" to open the configuration window. Configure a profile for network access as described below, then click on the Create button.

Authentication Servers

Accounting Servers

Advanced Settings

Advanced settings are not supported on wireless devices and will be ignored when applied to those devices.

MAC Auth

802.1X

Captive Portal

RADIUS

User's Access to Switches

If necessary, click on "User's Access To Switches" to open the configuration window. Select the Authentication Server(s) for the different types of switch access, and select an Accounting Server. If necessary, click on the "Add New" link to go to the RADIUS Server Management Screen and create a new Authentication Server. You can also select a UPAM RADIUS Server for Authentication and Accounting.

UPAM RADIUS Server Use Cases

An AAA Profile can be created to configure user access to the network, as well as user access to network devices. The following use cases are supported for UPAM Radius Server.

Use Case

Database for ASA

Database for 802.1X/
MAC Authentication

Setting to be Used in UPAM - Authentication Access Policy Page

Sample Policy That Could Be Used in UPAM - Authentication Access Policy Page

UPAM for Network/Switch Authentication/Client Authentication

UPAM DB

UPAM DB

Enable ASA

  • No explicit Access Policy needed for ASA
  • Any other Access Policy as required for 802.1x/MAC

UPAM for Network/Switch Authentication (ASA), External RADIUS for Client Authentication.

UPAM DB

External RADIUS DB (UPAM acts as Proxy to External RADIUS Server)

Enable ASA

  • No explicit Access Policy needed for ASA
  • For 802.1x - Network Type = Wired + Authentication Type = 802.1X
  • For MAC - Network Type = Wired + Authentication Type = MAC

External RADIUS for Network/Switch Authentication (ASA), UPAM for Client Authentication

Use Case Not Supported

Use Case Not Supported

Use Case Not Supported

  • Use Case Not Supported

External RADIUS for both Network/Switch Auth (ASA) and Client Authentication

Use Case Not Supported

Use Case Not Supported

Use Case Not Supported

  • Use Case Not Supported

Editing a Global AAA Profile

Select the profile in the AAA Screen and click on the Edit icon to bring up the Edit AAA Screen. Edit the fields as described above then click on the Apply button.

Note: You cannot edit the Profile Name.

Assigning a Global AAA Profile

When you click the Apply To Devices button, the Assign AAA Screen appears. Click on on the Devices ADD button to select devices. The device(s) will appear in the List of Selected Devices. If necessary, click on the Devices EDIT button to add/remove devices from the list. When you are finished, click on the Apply button.

Deleting a Global AAA Profile

Select the profile in the AAA Screen, click on the Delete icon, then click OK at the confirmation prompt.