Table Of Contents
Release Notes for Network Admission Control Framework, Release 2.1
Network Admission Control Framework Overview
NAC Framework 2.1 Solution And Baseline
Network Access Devices and Operating Systems
Required NAC Framework 2.1 Components
Other NAC Framework 2.1 Components
Support for NAC Framework Environments that Deviate from the Baseline
NAC 2.1 Framework Baseline Features Available in NAC L2 802.1x Environments
Agentless Host Handling and MAC Authentication Bypass
Combinations of User and Machine Authentication
Configurable 802.1x Timeout Settings
IP Telephone and Device Mobility
Machine Access Restrictions with AD Groups
NAC Framework 2.1 Baseline Features Available in NAC L2 IP and NAC L3 IP Environments
Agentless Host Handling and EAP over UDP Bypass
Client Authorization During AAA Failure with Default Switch Policy
EAP over UDP Triggering Using DHCP Snooping and ARP Inspection
EAP over UDP Triggering Using IP and Interesting Traffic from IP Admission Access List
EAP over UDP Triggering Using IP Device Tracking
IOS Routers and Switches Support Non-Responsive Host or Agentless Host Handling
IP Telephone and Device Mobility
Session Management with EAP over UDP Timers
URL-Redirection, Access Control Lists, and Browser Auto-Launch
NAC Framework 2.1 Compatibility with Legacy 802.1x Supplicants
NAC Framework 2.1 Baseline Features Implemented on ACS
ACS Replicates Configuration Changes on Primary Server to Secondary Server
Browser Auto-Launch with UserNotificationTLV
External LDAP Database Has Failed or is Unreachable
External Policy Validation Server (HCAP) Has failed or is Unreachable
Microsoft Active Directory Has Failed or is Unreachable
Single Sign-on Access Allowed and GPOs Executed for a User Accessing Multiple Domains
NAC Framework 2.1 Baseline Features Implemented on CTA
Asynchronous Posture Status Query
Cisco Trust Agent 2.1 No Longer Supports Windows NT
Known Defects in NAC 2.1 Components
Known Defects in Catalyst 8.6(1) Operating System
Known Defects in CTA 2.1 Posture Agent
Known Defects in CTA 802.1x Wired Client
Getting Information About Defects Resolved by NAC 2.1
Cisco Product Security Overview
Reporting Security Problems in Cisco Products
Product Alerts and Field Notices
Obtaining Technical Assistance
Definitions of Service Request Severity
Obtaining Additional Publications and Information
Release Notes for Network Admission Control Framework, Release 2.1
These release notes pertain to Cisco's Network Admission Control Framework, Release 2.1 network solution.
This document contains a brief description of NAC, it lists which Cisco components are NAC 2.1 compatible, and the limitations of those components as they relate to NAC functionality.
For information about installation methods, system requirements, and changes of an individual component, see that component's release notes and documentation in the Technical Support & Documentation area of Cisco Systems's web site.
Contents
This document contains the following sections:
•
Network Admission Control Framework Overview
•
NAC Framework 2.1 Solution And Baseline
–
Network Access Devices and Operating Systems
–
Required NAC Framework 2.1 Components
–
Other NAC Framework 2.1 Components
–
Support for NAC Framework Environments that Deviate from the Baseline
•
NAC 2.1 Framework Baseline Features Available in NAC L2 802.1x Environments
–
Agentless Host Handling and MAC Authentication Bypass
–
Configurable 802.1x Timeout Settings
–
IP Telephone and Device Mobility
–
Machine Access Restrictions with AD Groups
•
NAC Framework 2.1 Baseline Features Available in NAC L2 IP and NAC L3 IP Environments
–
Agentless Host Handling and EAP over UDP Bypass
–
Client Authorization During AAA Failure with Default Switch Policy
–
EAP over UDP Triggering Using DHCP Snooping and ARP Inspection
–
EAP over UDP Triggering Using IP and Interesting Traffic from IP Admission Access List
–
EAP over UDP Triggering Using IP Device Tracking
–
IOS Routers and Switches Support Non-Responsive Host or Agentless Host Handling
–
IP Telephone and Device Mobility
–
Session Management with EAP over UDP Timers
–
URL-Redirection, Access Control Lists, and Browser Auto-Launch
•
NAC Framework 2.1 Baseline Features Implemented on ACS
–
ACS Replicates Configuration Changes on Primary Server to Secondary Server
–
Browser Auto-Launch with UserNotificationTLV
–
External LDAP Database Has Failed or is Unreachable
–
External Policy Validation Server (HCAP) Has failed or is Unreachable
–
Microsoft Active Directory Has Failed or is Unreachable
–
Single Sign-on Access Allowed and GPOs Executed for a User Accessing Multiple Domains
•
NAC Framework 2.1 Baseline Features Implemented on CTA
–
Asynchronous Posture Status Query
–
Cisco Trust Agent 2.1 No Longer Supports Windows NT
•
Known Defects in NAC 2.1 Components
–
Known Defects in Catalyst 8.6(1) Operating System
–
Known Defects in CTA 2.1 Posture Agent
–
Known Defects in CTA 802.1x Wired Client
•
Getting Information About Defects Resolved by NAC 2.1
•
Cisco Product Security Overview
•
Obtaining Technical Assistance
•
Obtaining Additional Publications and Information
Network Admission Control Framework Overview
Network Admission Control (NAC) is a set of technologies and solutions built on an industry initiative led by Cisco Systems. It uses the network infrastructure to enforce security policy compliance on all devices seeking to access network computing resources; thereby limiting damage from emerging security threats. Customers using NAC can allow network access only to compliant and trusted endpoint devices (PCs and servers, for example) and can restrict the access of noncompliant devices.
For more information about the NAC solution, see http://www.cisco.com/go/NAC.
Benefits of NAC
These are some of the benefits of NAC:
•
Dramatically improves network's security—NAC ensures that all endpoints conform to the latest security policy; regardless of the size or complexity of the network. With NAC in place, you can focus operations on prevention, rather than on reaction. As a result, you can protect against worms, viruses, spyware, and malicious software before they are introduced into your network.
•
Extends the value of your existing investments—Besides being integrated into the Cisco network infrastructure, NAC enjoys broad integration with antivirus, security, and management solutions from dozens of leading manufacturers.
•
NAC provides deployment scalability and comprehensive span of control—NAC provides admission control across all access methods (LAN, WAN, wireless, and remote access).
•
Increases enterprise resilience—NAC prevents noncompliant and rogue endpoints from affecting network availability.
•
Reduces operational expenses—NAC reduces the expense of identifying and repairing noncompliant, rogue, and infected systems.
NAC Architecture Overview
Figure 1 shows the components of a typical NAC deployment.
Figure 1 Components of a Typical NAC Deployment
Typical NAC components are:
•
End-user or host—Also known as the endpoint. The endpoint is a device such as a PC, workstation or server that is connected to a switch, access point, or router through a direct connection. In a NAC deployment, the host that is running the Cisco Trust Agent (CTA) application, collects posture data from the computer and from any NAC-compliant applications, such as Cisco Security Agent, that are installed on the computer.
A NAC agentless host (NAH) is an endpoint that is not running the Cisco CTA application.
•
Network Access device (NAD)—In a NAC deployment, the AAA client is called a NAD. The NAD is a Cisco network access device, such as a router or switch, which acts as a NAC enforcement point.
•
ACS—Cisco Secure Access Control Server (ACS) performs the validation of the endpoint device by using internal policies, external policy servers, or both, to which the posture credentials are forwarded.
•
External posture validation servers—These perform posture validation and return a posture token to ACS. In a NAC deployment with agentless hosts, you can configure ACS to invoke the services of a special type of posture validation server, called an audit server. An audit server uses out-of-band methods, such as port scans, to validate the health of the endpoint device, and reports the result as a posture token to ACS.
•
Remediation servers—Provide repair and upgrade services to hosts that do not comply with network admission requirements.
NAC Framework 2.1 Solution And Baseline
The NAC Framework 2.1 solution addresses a finite set of features and use cases. These features and use cases have been tested on a selected number of hardware and software components within a complete NAC Framework 2.1 environment. The use cases, features, and components that were tested together comprise the NAC Framework 2.1 baseline.
As a result of focusing our testing efforts on the NAC Framework 2.1 baseline, we are confident in the quality and effectiveness of that combination of use cases, features, and components.
Network Access Devices and Operating Systems
NAC Framework 2.1 functionality is implemented on a wide variety of Cisco devices. Specific hardware models were selected as part of a solution testing effort of features and use cases. These hardware models are listed in Table 1.
In Table 1, we recommend a certain operating system to be used with each of the NADs to ensure their best performance within the NAC Framework 2.1 solution.
Required NAC Framework 2.1 Components
These components are required for the implementation of NAC Framework 2.1:
•
Cisco Trust Agent, version 2.1.103.0 or later
•
Cisco Trust Agent 802.1x Wired Client, version 4.0.5.5189 or later
•
Cisco Secure Access Control Server for Windows, version 4.1.1.23 or later
Though other versions of these software components provide NAC functionality, these versions resolve serious defects and have been tested in the NAC Framework 2.1 environment. Previous versions of these software components are not supported.
Other NAC Framework 2.1 Components
These components are part of the NAC Framework 2.1 Baseline:
•
Cisco Security Agent (CSA), version 5.1.
•
Cisco IP Phone 7960.
Support for NAC Framework Environments that Deviate from the Baseline
For existing customers with ongoing NAC Framework pilot programs, we will work within their environment and make our best effort to ensure the success of their NAC Framework deployment. If problems arise which we know can be solved by upgrading or changing a component to one included in the baseline, we will advise our customers to do so.
New customers to the NAC Framework 2.1 solution will be advised to adopt the software versions of the components listed earlier before implementation.
NAC 2.1 Framework Baseline Features Available in NAC L2 802.1x Environments
The NAC components below are required to use the features described in this section:
•
Network access is controlled by a switch.
•
The switch ports are configured for IEEE 802.1x traffic.
•
The Cisco Trust Agent (CTA) and CTA 802.1x Wired Client are installed on the end points seeking access to the network.
•
An ACS server is configured to perform authentication and posture validation.
ACS Failover
Cisco Secure Access Control Server (ACS) machines can be installed redundantly. Network traffic from the switch to the current ACS can failover to the alternate ACS in these circumstances:
•
There is no network connectivity between the switch and the current ACS.
•
The current ACS server is not responding for some reason, and the RADIUS session is timing out.
Agentless Host Handling and MAC Authentication Bypass
If CTA and the CTA 802.1x Wired Client are not installed on a device seeking to gain network access, that device will not be able to authenticate itself or provide a posture to ACS. It is most likely that ACS will be configured to deny network access to any device that can not provide authentication or posture information.
When the switch determines that the CTA 802.1x Wired Client is not installed on the device, it uses the MAC authentication bypass feature to give it access to the network.
If the device's Machine Access Control (MAC) address is known, it can be added to a list of MAC addresses maintained on the ACS server or an external LDAP database. When the device seeks access to the network and fails because it does not have the CTA 802.1x Wired Client installed, the switch tries to verify the device's MAC address as one that can bypass authentication. If the MAC address is on the MAC authentication bypass list, the switch can verify the device and allow it on the network without authentication or posture assessment.
This feature is designed to address these use cases:
•
MAC Authentication Bypass used as a fallback position when 802.1x client is not present on the host.
•
An external LDAP database is used to maintain the list of MAC address for the MAC authentication bypass feature.
•
MAC address authentication using ACS internal database to maintain the list of MAC address.
Authentication Methods
User and machine authentication is configured using the CTA 802.1x Wired Client and Cisco Secure Access Control Server (ACS) and enforced by the switch.
User Authentication
NAC Framework 2.1 allows you to authenticate users' security credentials before they are allowed on the network. These are the security credentials that can be validated:
•
Username and password maintained in Microsoft Active Directory.
•
Username and password stored in ACS
•
User-certificate
The user authentication methods are designed to address these use-cases:
•
Allow for a user to be authenticated by a "single sign on" (SSO). The user needs only to enter their Microsoft Active Directory (AD) username and password at the "graphical identification and authentication" (GINA) login in order to be authenticated on the network.
•
Allow SSO on a host with multiple Microsoft user profiles in use.
•
Pass users Group Policy Objects (GPOs) after successful SSO authentication.
•
Authenticate the user based on a user name and password maintained separately from Microsoft AD.
•
Pass users GPOs after successful authentication using username and password maintained separately from Microsoft AD.
•
Allow user authentication with a user certificate.
•
Use EAP-MSCHAPv2 or EAP-TLS as the "inner method" of the EAP-FAST authentication protocol.
•
Allow for the expiration of the user PAC.
•
Allow user certificates to be passed through outer EAP-FAST tunnel.
•
Allow user certificates to be used in PAC provisioning.
•
Allow the use of chained user certificates.
•
Allow for the expiration of user certificates.
Machine Authentication
You may require a hardware device to be authenticated before it is allowed on the network. These are the security credentials that can be validated:
•
Machine password
•
Machine certificate
The machine authentication methods are designed to address these use-cases:
•
Allow machine authentication using a machine password.
•
Allow machine authentication with a machine certificate.
•
Allow machine authentication only.
•
Pass the host the proper GPOs after successful machine authentication.
•
Allow machine PAC provisioning to be performed using a valid machine certificate, machine password, or as a result of successful user authentication.
•
Allow machine certificates to be passed through outer EAP-FAST tunnel.
•
Allow the use of chained machine certificates.
•
Allow for the expiration of machine certificates.
Combinations of User and Machine Authentication
You can require a combination of both user and machine authentication.
Machine Authentication Only
This feature allows a computer to be authenticated using only the machine's credentials. Once the machine is powered up, and before the user logs in, the machine's credentials are sent for authentication. After the user logs in at the GINA login, the machine credentials are sent again as part of user authentication process.
Configurable 802.1x Timeout Settings
Use the "dot1x timeout" command on the switch stack or on a standalone switch to set IEEE 802.1x timers that regulate these functions:
•
The number of seconds that the switch remains in the quiet state following a failed authentication exchange with the client. This can be configured in IOS and CatOS.
•
The number of seconds that the switch ignores Extensible Authentication Protocol over LAN (EAPOL) packets from clients that have been successfully authenticated during this duration. This can be configured on IOS only.
•
The number of seconds between re-authentication attempts. This can be configured in IOS and CatOS.
•
The number of seconds that the switch waits for the retransmission of packets by the switch to the authentication server. This can be configured in IOS and CatOS.
•
The number of seconds that the switch waits for the retransmission of packets by the switch to the IEEE 802.1x client. This can be configured in IOS and CatOS.
•
The number of seconds that the switch waits for a response to an EAP-request/identity frame from the client before retransmitting the request. This can be configured in IOS and CatOS.
Use Cisco's Command Lookup Tool for a complete description of the "dot1x timeout" command.
IP Telephone and Device Mobility
User authentication, machine authentication, and MAC authentication bypass features function properly on a computer which is connected to the PC port on an IP Phone.
Machine Access Restrictions with AD Groups
Machine access restrictions (MAR) feature acts as an additional means of controlling authorization for Windows-authenticated EAP-TLS, EAP-FASTv1a, and Microsoft PEAP users, based on machine authentication of the computer used to access the network.
After successful machine authentication, ACS caches the value that was received in the Internet Engineering Task Force (IETF) RADIUS Calling-Station-Id attribute (31). When a user authenticates with an EAP-TLS, EAP-FASTv1a, or Microsoft PEAP end-user client, ACS searches the cache of Calling-Station-Id values from successful machine authentications for the Calling-Station-Id value received in the user authentication request.
If the machine has been previously authenticated, ACS assigns the user to a user group. If the machine has not been previously authenticated ACS assigns the user to the user group specified by Group map for successful user authentication without machine authentication list. This can include the <No Access> group. The user's access is then defined by their group profile settings.
However, user profile settings always override group profile settings. If a user profile grants an authorization that is denied by the group specified in the Group map for successful user authentication without machine authentication list, ACS grants the authorization.
VLAN Assignment
A host can be assigned to a particular VLAN, such as a corporate VLAN, a guest VLAN, or a remediation VLAN based on the host's posture and authentication information. To use this feature, network access must be managed by a switch and its ports must be configured to send and receive IEEE 802.1x traffic.
The VLAN assignment feature is designed to assign hosts to one of these VLANs:
•
Guest VLAN
•
AAA Failed VLAN
•
Critical-Authentication VLAN
•
Passed Authentication VLAN
•
Failed Authentication VLAN
NAC Framework 2.1 Baseline Features Available in NAC L2 IP and NAC L3 IP Environments
ACS Failover
Cisco Secure Access Control Server (ACS) machines can be installed redundantly. Network traffic from the switch or router to the current ACS can failover to the alternate ACS in these circumstances:
•
There is no network connectivity between the switch or router and the current ACS.
•
The current ACS server is not responding for some reason, and the RADIUS session is timing out.
Agentless Host Handling and EAP over UDP Bypass
If CTA is not installed on a device seeking to gain network access, that device will not be able to provide posture credentials to ACS. It is most likely that ACS will be configured to deny network access to any device that can not provide posture information.
When the NAD determines that CTA is not installed on the device, it uses the EoU bypass feature to give the device access to the network.
If the device's Machine Access Control (MAC) address or IP address are known, they can be added to an exception list maintained on the NAD, the ACS server or an external database. When the device seeks access to the network and fails because it does not have CTA installed, the NAD tries to verify the device's MAC address or IP address from the exception list. If the device's MAC address or IP address is on the exception list, the device's identity can be verified and the device can be allowed on the network without posture assessment.
This feature is designed to address these use cases:
•
Agentless host can be added to the EOU MAC address exception list in an EOU environment.
•
MAC address authentication using ACS internal database to maintain MAC address exception list.
Client Authorization During AAA Failure with Default Switch Policy
This feature applies in NAC L2 802.1x and NAC L2 IP environments. If the ACS is down and can not authenticate a session or determine a posture, the switch grants or denies network access based on the customer's default security policy which is stored on the switch.
EAP over UDP Triggering Using DHCP Snooping and ARP Inspection
NAD monitors DHCP (Dynamic Host Configuration Protocol) requests or ARP (Address Resolution Protocol) requests to initiate an EAP over UDP session. This is a feature of a NAC L2 IP environment.
EAP over UDP Triggering Using IP and Interesting Traffic from IP Admission Access List
The NAD initiates an EAP over UDP session if any traffic traverses the IP admission interface. You can also use an IP admission access list to allow or prevent certain traffic from triggering the EAP over UDP session. For example you might want to exclude ICMP traffic from triggering an EAP over UDP session. This is a feature of a NAC L3 IP environment.
EAP over UDP Triggering Using IP Device Tracking
IP device tracking is a feature of a switch. You must enable the IP device tracking feature to use NAC L2 IP validation.
When IP device tracking is enabled, and a host is detected by the switch, the switch adds an entry to its IP device tracking table. If NAC L2 IP validation is enabled on an interface, adding an entry to the IP device tracking table initiates EAP over UDP session so that posture assessment can be performed.
IOS Routers and Switches Support Non-Responsive Host or Agentless Host Handling
Network access devices (NADs) running the IOS operating system can participate in the investigation of "non-responsive" hosts. The NAD performs a URL redirect to a Web server where the user downloads an ActiveX or Java applet that scans the non-responsive host.
"Non-responsive" hosts are hosts that cannot provide posture credentials for any reason, such as Cisco Trust Agent (CTA) has not or can not be installed on the host. Without CTA installed, the host cannot respond to a NAC challenge.
IP Telephone and Device Mobility
The computer connected to the PC port on an IP phone will get posture validated successfully.
Session Management with EAP over UDP Timers
A switch or router queries the host and CTA indicates if status of the host has changed. It also perform session verification with a session timeout. If CTA does not respond to the session verification, the EOU session will timeout.
Status Query Challenge
Upon expiration of the status query timer, a status query challenge is sent to the host. If CTA indicates to the NAD there is a change in posture, the NAD starts posture revalidation.
URL-Redirection, Access Control Lists, and Browser Auto-Launch
The URL-redirection feature is intended for hosts requiring remediation. If a host requires remediation, the ACS would download an Access Control List (ACL) specifying the URL of the remediation server. All HTTP traffic from the host would be redirected to the remediation server.
The browser auto-launch feature provides a way to launch a browser window and direct it to a URL if a specific posture validation rule is triggered. This URL may provide system or application updates to the user or it may be a means to provide information or notices.
NAC Framework 2.1 Compatibility with Legacy 802.1x Supplicants
If Cisco Trust Agent (CTA) is installed on a host running Windows XP Professional with Service Pack 2, which has an 802.1x supplicant integrated in the Windows operating system, authentication and posture tasks are divided between the Microsoft (MS) 802.1x supplicant and CTA. This feature is designed to address these use cases:
•
User authentication is performed using PEAP and MSCHAPv2 by the Microsoft 802.1x supplicant. Posture validation is performed in an EAP over UDP session and managed by CTA.
•
The network access policy is applied by VLAN assignment determined by the MS 802.1x session and Access Control Lists are pushed to the switch using the NAC L2 IP session.
•
VLAN assignment can be determined by authentication managed by MS 802.1x supplicant or by posture managed by the NAC L2 IP session.
•
This mixed environment can manage a AAA failure scenario using one of these features:
–
Client Authorization During AAA Failure with Default Switch Policy
NAC Framework 2.1 Baseline Features Implemented on ACS
These are the NAC Framework 2.1 features that are implemented on Cisco Secure Access Control Server.
ACS Replicates Configuration Changes on Primary Server to Secondary Server
A change to the configuration on the primary ACS can be replicated on the secondary ACS server. Replication can be performed manually or it can be scheduled.
Browser Auto-Launch with UserNotificationTLV
The browser auto-launch feature provides a way to launch a browser window and direct it to a URL if a specific posture validation rule is triggered. This URL may provide system or application updates to the user or it may be a means to provide information or notices.
External LDAP Database Has Failed or is Unreachable
When ACS uses an external LDAP database for MAC Authentication Bypass (MAB) and there is a failure in verifying a valid MAC address and group, ACS assigns this MAC address to a pre-configured group and receives the authorization policy for that group.
When the external LDAP server becomes available, ACS uses configured Authorization policy to assign the corresponding RADIUS Authorization Components (RAC) which contains VLAN, timer, and other settings.
For the devices that were previously added to the unauthenticated MAC address group, their MAC addresses are reassessed at the end of a session timeout and they are reauthenticated.
External Policy Validation Server (HCAP) Has failed or is Unreachable
If an external policy server is down, then a posture token can be assigned to the corresponding vendor's application until the policy server is restored.
Microsoft Active Directory Has Failed or is Unreachable
These features are designed for a network environment using redundant Microsoft Active Directory (AD) servers:
•
If no AD server responds to the authentication request, the host will be authenticated by the secondary domain controller without causing interruptions on the host. The CTA 802.1x Wired Client indicates that the host has been authenticated.
•
If both AD servers fail during an 802.1x authentication session, the host will be put in a "AAA fail" VLAN.
•
If both AD servers fail during authentication, the host is put in a "AAA fail" VLAN. When an AD server recovers, existing clients are re-authenticated automatically and newer clients are authenticated successfully. The CTA 802.1x Wired Client indicates that the host has been authenticated.
Single Sign-on Access Allowed and GPOs Executed for a User Accessing Multiple Domains
Users can be authenticated by single sign-on on more than one domain if the domain on which ACS is installed has two-way trust established with the other domains, and if Microsoft Active Directory manages both domains.
After users are authenticated in either domain, they will receive their appropriate GPOs.
NAC Framework 2.1 Baseline Features Implemented on CTA
These features are available in NAC L2 802.1x, NAC L2 IP, and NAC L3 IP environments.
Asynchronous Posture Status Query
This asynchronous posture status query is implemented in two different ways on NAC L2 802.1x networks. This feature can not be used on NAC L2 IP or NAC L3 IP networks.
•
CTA can be configured to query posture plugins at regular intervals to determine if there has been a change to their application's status. If a posture plugin alerts CTA that there has been a change in posture status, CTA alerts the network access device which triggers a re-posturing of the host.
•
Some posture plugins monitor the status of their applications and report status changes to CTA upon detection. Such plugins are considered "asynchronous" plugins. When CTA receives the status change from an asynchronous plugin, CTA alerts the network access device, which triggers a re-posturing of the host. For example, the posture plugin for Cisco Security Agent (CSA) detects when the CSA security has been turned off.
Status Query Challenge
In the case of NAC L2 IP or NAC L3 IP network admission methods, upon expiration of the status query timer, a status query challenge is sent to the host. If CTA indicates to the NAD there is a change in posture, the NAD starts posture revalidation.
Posture Notification
Once the posture of the host has been determined, the user receives a pop-up message in a browser window reporting the results. The browser window may contain a clickable URL which can direct a user to information or remediation.
Instead of receiving a pop-up window with a clickable URL, a browser window, pointing to a specific URL, can be launched automatically and presented to the user. This is referred to as the "Browser auto-launch" feature.
Posture Validation
Posture is the result of an evaluation of the operating system and applications that are installed on a host. Cisco Trust Agent (CTA) gathers posture credentials from the host and forwards them to Cisco Secure Access Control Server (ACS) for evaluation. After ACS calculates the posture of the entire host, it informs the network access device of the result. Based on the posture the NAD enforces an access control rule for the host. A "Healthy" posture will receive full network access, while a "Quarantine" posture may send the host to a remediation VLAN where its operating system or applications may be updated.
NAC 2.1 Limitations
Cisco Trust Agent 2.1 No Longer Supports Windows NT
CTA 2.1 does not support Windows NT 4.0 Server or Windows NT 4.0 Workstation. CTA 2.0 was the last release to support Windows NT 4.0.
Known Defects in NAC 2.1 Components
This section describes problems known to exist in the various components that comprise the Network Admission Control 2.1 release.
Note
A "—" in the Explanation column means that no information was available at the time of publication. For the latest information on these defects logon to Cisco.com and launch the Cisco Software Bug Toolkit. To access the Cisco Software Bug Toolkit, go to http://www.cisco.com/pcgi-bin/Support/Bugtool/home.pl. (You will be prompted to log in to Cisco.com.)
Known Defects in Catalyst 8.6(1) Operating System
Table 2 describes defects found on Catalyst 6500 series switches running the CatOS 8.6(1) operating system. For a complete list of the features and defects for CatOS 8.6(1), refer to the CatOS's product release notes available at http://www.cisco.com.
Known Defects in CTA 2.1 Posture Agent
Table 3 describes problems known to exist in the posture agent functionality of Cisco Trust Agent, Release 2.1.103.0. This section excludes defects of the 802.1x Wired Client component of CTA 2.1. For a complete list of the features and defects for CTA, refer to CTA's product release notes available at http://www.cisco.com.
Known Defects in CTA 802.1x Wired Client
Table 4 lists the defects in the CTA 802.1x Wired Client 4.0.5.5189. This version was released with CTA 2.1. The CTA 802.1x Wired Client may also be referred to as the "supplicant." For a complete list of the features and defects for the CTA 802.1x Wired Client, refer to the CTA 2.1 product release notes available at http://www.cisco.com.
Known Defects in ACS 4.1
Table 5 describes defects in specific behaviors of ACS for Windows 4.1 and the ACS Solution Engine 4.1. These defects in ACS 4.1 may affect a NAC 2.1 implementation. For a complete list of the features and defects for ACS, refer to ACS's product release notes available at http://www.cisco.com.
Known Defects in CSA 5.1
Table 6 describes defects found in Cisco Security Agent (CSA) 5.1. For a complete list of the features and defects for CSA, refer to CSA's product release notes available at http://www.cisco.com.
Getting Information About Defects Resolved by NAC 2.1
To learn about the resolution of a specific defect, use the Cisco Software Bug Toolkit to find that information.
Step 1
Click on this link to launch the Cisco Software Bug Toolkit: http://www.cisco.com/pcgi-bin/Support/Bugtool/home.pl.
Step 2
Enter your CCO password when prompted.
Step 3
Type the number of the defect in the Enter Known Bug ID field.
Step 4
Click Search.
Obtaining Documentation
Cisco documentation and additional literature are available on Cisco.com. This section explains the product documentation resources that Cisco offers.
Cisco.com
You can access the most current Cisco documentation at this URL:
http://www.cisco.com/techsupport
You can access the Cisco website at this URL:
You can access international Cisco websites at this URL:
http://www.cisco.com/public/countries_languages.shtml
Product Documentation DVD
The Product Documentation DVD is a library of technical product documentation on a portable medium. The DVD enables you to access installation, configuration, and command guides for Cisco hardware and software products. With the DVD, you have access to the HTML documentation and some of the PDF files found on the Cisco website at this URL:
http://www.cisco.com/univercd/home/home.htm
The Product Documentation DVD is created and released regularly. DVDs are available singly or by subscription. Registered Cisco.com users can order a Product Documentation DVD (product number DOC-DOCDVD= or DOC-DOCDVD=SUB) from Cisco Marketplace at the Product Documentation Store at this URL:
http://www.cisco.com/go/marketplace/docstore
Ordering Documentation
You must be a registered Cisco.com user to access Cisco Marketplace. Registered users may order Cisco documentation at the Product Documentation Store at this URL:
http://www.cisco.com/go/marketplace/docstore
If you do not have a user ID or password, you can register at this URL:
http://tools.cisco.com/RPF/register/register.do
Documentation Feedback
You can provide feedback about Cisco technical documentation on the Cisco Support site area by entering your comments in the feedback form available in every online document.
Cisco Product Security Overview
Cisco provides a free online Security Vulnerability Policy portal at this URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
From this site, you will find information about how to do the following:
•
Report security vulnerabilities in Cisco products
•
Obtain assistance with security incidents that involve Cisco products
•
Register to receive security information from Cisco
A current list of security advisories, security notices, and security responses for Cisco products is available at this URL:
To see security advisories, security notices, and security responses as they are updated in real time, you can subscribe to the Product Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed. Information about how to subscribe to the PSIRT RSS feed is found at this URL:
http://www.cisco.com/en/US/products/products_psirt_rss_feed.html
Reporting Security Problems in Cisco Products
Cisco is committed to delivering secure products. We test our products internally before we release them, and we strive to correct all vulnerabilities quickly. If you think that you have identified a vulnerability in a Cisco product, contact PSIRT:
•
For emergencies only — security-alert@cisco.com
An emergency is either a condition in which a system is under active attack or a condition for which a severe and urgent security vulnerability should be reported. All other conditions are considered nonemergencies.
•
For nonemergencies — psirt@cisco.com
In an emergency, you can also reach PSIRT by telephone:
•
1 877 228-7302
•
1 408 525-6532
Tip
We encourage you to use Pretty Good Privacy (PGP) or a compatible product (for example, GnuPG) to encrypt any sensitive information that you send to Cisco. PSIRT can work with information that has been encrypted with PGP versions 2.x through 9.x.
Never use a revoked encryption key or an expired encryption key. The correct public key to use in your correspondence with PSIRT is the one linked in the Contact Summary section of the Security Vulnerability Policy page at this URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
The link on this page has the current PGP key ID in use.
If you do not have or use PGP, contact PSIRT to find other means of encrypting the data before sending any sensitive material.
Product Alerts and Field Notices
Modifications to or updates about Cisco products are announced in Cisco Product Alerts and Cisco Field Notices. You can receive these announcements by using the Product Alert Tool on Cisco.com. This tool enables you to create a profile and choose those products for which you want to receive information.
To access the Product Alert Tool, you must be a registered Cisco.com user. Registered users can access the tool at this URL:
http://tools.cisco.com/Support/PAT/do/ViewMyProfiles.do?local=en
To register as a Cisco.com user, go to this URL:
http://tools.cisco.com/RPF/register/register.do
Obtaining Technical Assistance
Cisco Technical Support provides 24-hour-a-day award-winning technical assistance. The Cisco Support website on Cisco.com features extensive online support resources. In addition, if you have a valid Cisco service contract, Cisco Technical Assistance Center (TAC) engineers provide telephone support. If you do not have a valid Cisco service contract, contact your reseller.
Cisco Support Website
The Cisco Support website provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The website is available 24 hours a day at this URL:
http://www.cisco.com/en/US/support/index.html
Access to all tools on the Cisco Support website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a user ID or password, you can register at this URL:
http://tools.cisco.com/RPF/register/register.do
Note
Before you submit a request for service online or by phone, use the Cisco Product Identification Tool to locate your product serial number. You can access this tool from the Cisco Support website by clicking the Get Tools & Resources link, clicking the All Tools (A-Z) tab, and then choosing Cisco Product Identification Tool from the alphabetical list. This tool offers three search options: by product ID or model name; by tree view; or, for certain products, by copying and pasting show command output. Search results show an illustration of your product with the serial number label location highlighted. Locate the serial number label on your product and record the information before placing a service call.
Tip
Displaying and Searching on Cisco.com
If you suspect that the browser is not refreshing a web page, force the browser to update the web page by holding down the Ctrl key while pressing F5.
To find technical information, narrow your search to look in technical documentation, not the entire Cisco.com website. After using the Search box on the Cisco.com home page, click the Advanced Search link next to the Search box on the resulting page and then click the Technical Support & Documentation radio button.
To provide feedback about the Cisco.com website or a particular technical document, click Contacts & Feedback at the top of any Cisco.com web page.Submitting a Service Request
Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3 and S4 service requests are those in which your network is minimally impaired or for which you require product information.) After you describe your situation, the TAC Service Request Tool provides recommended solutions. If your issue is not resolved using the recommended resources, your service request is assigned to a Cisco engineer. The TAC Service Request Tool is located at this URL:
http://www.cisco.com/techsupport/servicerequest
For S1 or S2 service requests, or if you do not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests are those in which your production network is down or severely degraded.) Cisco engineers are assigned immediately to S1 and S2 service requests to help keep your business operations running smoothly.
To open a service request by telephone, use one of the following numbers:
Asia-Pacific: +61 2 8446 7411
Australia: 1 800 805 227
EMEA: +32 2 704 55 55
USA: 1 800 553 2447For a complete list of Cisco TAC contacts, go to this URL:
http://www.cisco.com/techsupport/contacts
Definitions of Service Request Severity
To ensure that all service requests are reported in a standard format, Cisco has established severity definitions.
Severity 1 (S1)—An existing network is "down" or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.
Severity 2 (S2)—Operation of an existing network is severely degraded, or significant aspects of your business operations are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.
Severity 3 (S3)—Operational performance of the network is impaired while most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels.
Severity 4 (S4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations.
Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is available from various online and printed sources.
•
The Cisco Online Subscription Center is the website where you can sign up for a variety of Cisco e-mail newsletters and other communications. Create a profile and then select the subscriptions that you would like to receive. To visit the Cisco Online Subscription Center, go to this URL:
http://www.cisco.com/offer/subscribe
•
The Cisco Product Quick Reference Guide is a handy, compact reference tool that includes brief product overviews, key features, sample part numbers, and abbreviated technical specifications for many Cisco products that are sold through channel partners. It is updated twice a year and includes the latest Cisco channel product offerings. To order and find out more about the Cisco Product Quick Reference Guide, go to this URL:
•
Cisco Marketplace provides a variety of Cisco books, reference guides, documentation, and logo merchandise. Visit Cisco Marketplace, the company store, at this URL:
http://www.cisco.com/go/marketplace/
•
Cisco Press publishes a wide range of general networking, training, and certification titles. Both new and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press at this URL:
•
Internet Protocol Journal is s a quarterly journal published by Cisco for engineering professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL:
•
Networking products offered by Cisco, as well as customer support services, can be obtained at this URL:
http://www.cisco.com/en/US/products/index.html
•
Networking Professionals Connection is an interactive website where networking professionals share questions, suggestions, and information about networking products and technologies with Cisco experts and other networking professionals. Join a discussion at this URL:
http://www.cisco.com/discuss/networking
•
"What's New in Cisco Documentation" is an online publication that provides information about the latest documentation releases for Cisco products. Updated monthly, this online publication is organized by product category to direct you quickly to the documentation for your products. You can view the latest release of "What's New in Cisco Documentation" at this URL:
http://www.cisco.com/univercd/cc/td/doc/abtunicd/136957.htm
•
World-class networking training is available from Cisco. You can view current offerings at this URL:
http://www.cisco.com/en/US/learning/index.html
CCVP, the Cisco Logo, and the Cisco Square Bridge logo are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, LightStream, Linksys, MeetingPlace, MGX, Networking Academy, Network Registrar, Packet, PIX, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, StackWise, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0612R)