Solved

PIX 501 authentication with LOCAL database

Posted on 2004-09-08
4
204 Views
Last Modified: 2013-11-16
Hi sirs,
Say I have a host behind a PIX 501 firewall; outside the PIX  there is a LAN:

LAN-----Router----PIX----HOST B

I will use PcAnywhere from a host (say HOST A)  on LAN to take control of HOST B.

I would like to perform authentication at the firewall, instead of doing it using Pc Anywhere.
Is it possible to do that WITHOUT using TACACS+ or RADIUS server ? I guess so, since these two should only be a solution for decentralizing database and administrative tasks. I was thinking about using the following command lines:

First: define users in the local DB with:
username <user> password <password> privilege <0-15>

Second:
aaa-server LOCAL protocol local
aaa authentication serial|telnet|ssh|http|enable console LOCAL (to enable authentication using local DB)


Am I wrong ? What would happen if I entered these aaa...lines ?

Thanks

Roberto

0
Comment
Question by:minicuc
  • 2
  • 2
4 Comments
 
LVL 79

Expert Comment

by:lrmoore
ID: 12012581
Nothing would happen, because you are making the PCAnywhere connection directly with HOST B, not with the firewall.
0
 

Author Comment

by:minicuc
ID: 12015817
Maybe I have been unclear, suppose NOT to use PC Anywhere, can I have authentication to access to HOST B happening at the firewall ? Are these the proper commands ?

Thanks
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 125 total points
ID: 12015997
Not unless you want to use a VPN to access host B. Then the authentication for the VPN can be local on the PIX, but then once you establish the VPN, you will STILL have to authenticate again on HOST B, depending on how you want to access it.

There is no method for the PIX to 'proxy' host authentication.
0
 

Author Comment

by:minicuc
ID: 12024209
While if I used an AAA server would it do the "proxy" authentication you talk about ?
Thanks in advance
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article assumes you have at least one Cisco ASA or PIX configured with working internet and a non-dynamic, public, address on the outside interface. If you need instructions on how to enable your device for internet, or basic configuration info…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Need to grow your business through quality cloud solutions? With everything required to build a cloud platform and solution, you may feel like the distance between you and the cloud is quite long. Help is here. Spend some time learning about the Con…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

947 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now