Solved

ACS 5.4 Base License "500" Reached Max # of IP Addresses in Network Devices: (used IP Ranges)

Posted on 2014-01-17
2
1,146 Views
Last Modified: 2014-01-23
We recently came to realize that we have maxed out our base license for IP addresses in Network Devices. We made the mistake of using "IP Ranges" for all of our Network Devices and AAA Clients, which according to what I've read is the quickest way to deplete the Base License Devices quickly.

What are some work around ideas, which don't count against the 500 Base License? Is using the "Default Network Device" under Network Resources in ACS 5.4, for AAA clients that haven't been defined in ACS, along with specifying specific 'unknown' location, the only solution that doesn't count against the 500 base device limit?

The way we are set-up now, is that we use TACACS+/RADIUS sourced loopbacks and common Managment VLAN, L3 SVI for TACACS+ remote access,  and for Radius 802.1X authentication implemented on switch ports for PC's. We are still in the rollout phase of 802.1X, and looking at a way to modify our ACS to still allow authentication for dot1x and also allow remote access to all our network devices (all Cisco).
 
Also, on our routers and main L3 access switches (which has typically one or two other L3/L2 access switches hanging off of it) we source the TACACS+/RADIUS server from a loopback, and use a common Management VLAN L3 SVI to source the TACACS+/RADIUS servers (Same ACS server IPs) on all of our ES modules and tail end Cisco 3750/3560 access switches. The question is, would this be considered optimal or should we use loopbacks for sourcing on all L3 switches? Does it really matter if sourced from a loopback or L3 SVI? And is it best practice to seperate your source interface on devices for your TACACS+ and RADIUS servers, such as loopback 0 for RADIUS and loopback 1 for TACACS+? Someone mentioned that to me as a better practice, but unclear if it really matters in the grand scheme of things. We haven't seen any issues in our network setup, with using the same source interface for both TACACS+ and RADIUS server.
0
Comment
Question by:laake9999
2 Comments
 
LVL 46

Accepted Solution

by:
Craig Beck earned 250 total points
ID: 39791163
Each AAA client counts as 1 off the licence count.  There is nothing you can do to fool this.

You don't have to use a Loopback to source RADIUS/TACACS.  It's more important to use Loopbacks for routing, for example, where you want the interface which handles routing updates to be always up.  With the RADIUS/TACACS source it is fine to source the traffic from your management SVI or L3 interface if you want to.
0
 
LVL 63

Assisted Solution

by:btan
btan earned 250 total points
ID: 39791536
The licence is based on unique ip address as stated. This includes the subnet masks that you configure. For example, a subnet mask of 255.255.255.0 implies 256 unique IP addresses and hence the number of devices is 256. There is unlimited licence but really limited by hardware performance eventually.
http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.2/user/guide/admin_config.html#wpxref68935

Loopback is also chosen for security routes on those dedicated mgmt and main routing stated in the article. It shared a well-protected TACACS+ server accessed only from the router's loopback interface address block offers more security of user and enable accounts. http://www.ciscopress.com/articles/article.asp?p=27137
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question