Administrator Guide for Cisco Trust Agent, Release 2.1, With Bundled Supplicant
Installing the Cisco Trust Agent on Linux Operating Systems

Table Of Contents

Installing the Cisco Trust Agent on Linux Operating Systems

Verifying System Requirements on Linux

Installation Files

Initial Deployments

CTA Scripting Interface Feature

Installing Cisco Trust Agent

General Installation Instructions

Extracting the Installation File and Accepting the EULA

Installing CTA from the Command Line

Creating a Custom CTA Installation Package

Upgrading to Cisco Trust Agent, Release 2.1

Verifying Cisco Trust Agent Installation on Linux

Verifying CTA is Running

Verifying CTA Package Information

Uninstalling Cisco Trust Agent on Linux


Installing the Cisco Trust Agent on Linux Operating Systems


This chapter provides system requirement and installation information for installing Cisco Trust Agent (CTA) on Red Hat Linux operating systems. Read this entire chapter before beginning the installation. There are advanced installation options detailed later in this chapter that you may want to use. For example, before deploying CTA on your network, you can create a custom installation package which allows you to set CTA configuration parameters and provision certificates and plug-ins. Proceeding in this manner could save you configuration time during the CTA deployment process.

See these other chapters for installation instructions for different operating systems:

Chapter 3, "Installing the Cisco Trust Agent on Macintosh Operating Systems"

Chapter 4, "Installing the Cisco Trust Agent on Windows Operating Systems"

This chapter contains the following sections:

Verifying System Requirements on Linux

Installation Files

Initial Deployments

CTA Scripting Interface Feature

Installing Cisco Trust Agent

General Installation Instructions

Extracting the Installation File and Accepting the EULA

Installing CTA from the Command Line

Creating a Custom CTA Installation Package

Upgrading to Cisco Trust Agent, Release 2.1

Verifying Cisco Trust Agent Installation on Linux

Verifying CTA is Running

Verifying CTA Package Information

Uninstalling Cisco Trust Agent on Linux

Verifying System Requirements on Linux

Before installing Cisco Trust Agent on a Linux operating system, verify that the target system meets the following requirements:

System Component
Requirement

System

Pentium class processor or better

Network connection

Operating System and Language Support

All available internationalized versions of these Linux operating systems support CTA 2.1.:

Red Hat Linux v9

Red Hat Enterprise Linux v3 (Enterprise, Advanced Server, and Workstation)

Red Hat Enterprise Linux v4 (Enterprise, Advanced Server, and Workstation)

Note Support for a localized operating system is different from localized version of CTA. The CTA interface and messages are presented in English.

Linux Installers

Red Hat Package Management (RPM) v4.2 or greater.

Hard Disk Space

20 MB

Memory

256 MB Red Hat Enterprise Linux v3 (Enterprise, Advanced, Workstation)

256 MB Red Hat Enterprise Linux v4 (Enterprise, Advanced, Workstation)

Listening Port

By default, Cisco Trust Agent listens on UDP port 21862.

You can change this port number. See, "The ctad.ini Configuration File" section on page 5-2 for more information.


Installation Files

The installation files for CTA for Linux are contained in the ctaadminex-linux-2.1.103-0.tar.gz file. That file may be downloaded from Cisco.com. Follow the procedures in "Installing Cisco Trust Agent" to use the file.

Initial Deployments

For large enterprise Linux deployments, administrators may want to deploy CTA with a customized package. This way all required certificates and plug-ins are administratively configured with no end-user interaction or interference. The customized packages can be delivered to many users at once using an automated software deployment mechanism.

CTA Scripting Interface Feature

The Scripting Interface feature allows software developers to write their own scripts to relay posture information, collected on the system, to CTA. The scripts would perform the equivalent function of a posture plugin. Users will not need this feature unless they intend to write posture scripts.

The Scripting Interface is installed by default on Linux installations.

Installing Cisco Trust Agent

In order to install Cisco Trust Agent you log in as the administrative user on the computer.

General Installation Instructions


Step 1 Download the ctaadminex-linux-2.1.103-0.tar.gz from Cisco.com. For the sake of this example, we will store the ctaadminex-linux-2.1.103-0.tar.gz file in /tmp.

Step 2 Follow the procedures in "Extracting the Installation File and Accepting the EULA" section.

Step 3 Install CTA using either of these methods:

Installing CTA from the Command Line

Creating a Custom CTA Installation Package

Extracting the Installation File and Accepting the EULA

After downloading the ctaadminex-linux-2.1.103-0.tar.gz file from Cisco.com, use this procedure to extract the CTA installation files and accept the end-user license agreement (EULA).


Step 1 Open a terminal window.

Step 2 Change the directory to the one that contains the ctaadminex-linux-2.1.103-0.tar.gz file. In our example, this directory is /tmp.

Step 3 At the prompt, type the following command and press <Enter>.

tar -zxvf ctaadminex-linux-2.1.103-0.tar.gz

The ctaadminex-linux-2.1.103-0.sh file is extracted and placed in the same directory as the ctaadminex-linux-2.1.103-0.tar.gz file.

Step 4 At the prompt, type ./ctaadminex-linux-2.1.103-0.sh and press <Enter>.

Step 5 When prompted, accept the EULA by typing "y" and pressing <Enter>. The CTA-2.1.103-0 subdirectory is created and the cta-linux-2.1.103-0.i386.rpm is unpacked and placed in that directory. In our example, this new directory would be /tmp/CTA-2.1.103-0.

Installing CTA from the Command Line


Step 1 Follow the procedure in the "Extracting the Installation File and Accepting the EULA" section.

Step 2 Open a terminal window on the client.

Step 3 Change the directory to the directory that contains the cta-linux-2.1.103-0.i386.rpm file. In our example, the directory is /tmp/CTA-2.1.103-0.

Step 4 At the prompt, type rpm -ivh cta-linux-2.1.103-0.i386.rpm and press <Enter>. You receive these messages indicating that CTA was installed.

Preparing... ################ 100%

1:cta-linux  ################ 100%

Step 5 Verify CTA installation using the procedures in "Verifying Cisco Trust Agent Installation on Linux" section.

Step 6 If a CA certificate or a matching root certificate from the Cisco Secure ACS server has not been installed on the network client on which you just installed CTA, you must install one or the other certificates. This enables CTA to establish a secure form of communication with the Cisco Secure ACS server. Refer to "Installing or Updating a Certificate on Linux Operating Systems, page 8-4" for information.

Creating a Custom CTA Installation Package

Use this section as an example of how to create a customized CTA installation on Linux systems.

The CTA installation file is a Red Hat Packet Manager (rpm) file and is installed with standard RPM commands. To create a custom installation package, you create a directory structure which includes the CTA installation file, .ini files, plugin subdirectory and certificate subdirectory. This directory structure can then be distributed by a software deployment mechanism, such as a script or a software deployment tool.

After the software deployment mechanism distributes the directory structure to the remote network clients, it runs the CTA installation file. The CTA installation file copies the contents of the directory structure to the proper locations on the remote network client. The software deployment mechanism does not need to recompile the CTA installation file to create a custom installation.

The customization choices in this procedure are optional. However, you will find that including some of these customizations is worthwhile. CTA is not a centrally managed product. If you do not plan to use the product defaults, it is to your benefit to pre-configure all available product settings before deploying CTA.

Please read this entire procedure before beginning. There are options detailed later in the instructions that you should be aware of before beginning.


Step 1 Before you create the custom installation package, install CTA on the client you will use to create the custom package. This will install the template ctad.ini file and give you exposure to the CTA installation process. Begin with the "General Installation Instructions" section to install CTA.

Step 2 Perform the procedure in the "Extracting the Installation File and Accepting the EULA" section.

Step 3 Change the directory to the one that contains the
cta-linux-2.1.103-0.i386.rpm file. In our example, this is the /tmp/CTA-2.1.103-0 directory.

Step 4 Create a certs subdirectory. For example: /tmp/CTA-2.1.103-0/certs

Copy the root certificate for your Cisco Secure ACS server to this directory. During installation, any certificates in this directory are added to the systems root certificate store.

If your Cisco Secure ACS server uses self-signed certificates, see the Cisco Secure ACS documentation for information about obtaining the certificate; if you use a CA server, refer to your CA server documentation.


Note This step is optional if a CA certificate or ACS root certificate have already been distributed to the network clients receiving this customized CTA installation. If these certificates have not been distributed, this step is required.


Step 5 Create a plugins subdirectory. For example: /tmp/CTA-2.1.103-0/plugins

Copy any third party plugins that you want to provision at installation time into this directory.

Step 6 Create a new ctad.ini file and store it in the installation directory at the same level as the cta-linux-2.1.103-0.i386.rpm file. In our example, this is the /tmp/CTA-2.1.103-0 directory.

The ctad.ini file is used to configure CTA communication settings, user notifications, and certificate validation rules. If you want to change the default communication settings, such as the port number CTA listens over, the maximum number of sessions, and session time-out values, include this file. Refer to Chapter 5, "Configuring Cisco Trust Agent" for instructions on how you should create and format this file.

Step 7 Create a new ctalogd.ini file and store it in the installation directory at the same level as the cta-linux-2.1.103-0.i386.rpm file. In our example, this is the /tmp/CTA-2.1.103-0 directory. Refer to Chapter 6, "Cisco Trust Agent Event Logging" for instructions on how you should create and format this file.

Step 8 A software deployment mechanism deploys the customized /tmp/CTA-2.1.103-0 directory to the appropriate network clients and saves it in a local directory.

Step 9 The software deployment mechanism installs CTA and its customizations by following the procedure in the "Installing CTA from the Command Line" section.

Upgrading to Cisco Trust Agent, Release 2.1

Use this procedure to upgrade your CTA installation:


Step 1 Download the ctaadminex-linux-2.1.103-0.tar.gz from Cisco.com. For the sake of this example, we will store the ctaadminex-linux-2.1.103-0.tar.gz file in /tmp.

Step 2 Follow the procedures in "Extracting the Installation File and Accepting the EULA" section.

Step 3 Install CTA using either of these methods:

Installing CTA from the Command Line. However, when you are ready to install the upgrade, change the installation command to the upgrade command. This is an example:

rpm -Uvh cta-linux-2.1.103-0.i386

Creating a Custom CTA Installation Package

Verifying Cisco Trust Agent Installation on Linux

After Cisco Trust Agent has been installed you will find the following directory structures containing CTA's executable files:

/opt/CiscoTrustAgent

/opt/PostureAgent

You may also verify which version of CTA is installed by following this procedure:


Step 1 Open a terminal window on the system.

Step 2 Type rpm -q cta-linux and press <Enter>.

The version of CTA is returned. In the case of CTA 2.1.103.0, this information will be returned: cta-linux-2.1.103-0.

Verifying CTA is Running


Step 1 Open a terminal window on the system.

Step 2 Type rpm -q cta-linux and press <Enter>.

Step 3 Type ps -A | grep cta and press <Enter.>

Step 4 Verify that the following daemons are running:

ctad

ctalogd

ctapsd

ctaeoud

If these daemons are not running, try rebooting the system. If the daemons still do not run, try reinstalling the application.

Verifying CTA Package Information


Step 1 Open a terminal window on the system.

Step 2 At any prompt, type rpm -q cta-linux and press <Enter>.

The full package name is returned, for example, cta-linux-2.1.103-0

Uninstalling Cisco Trust Agent on Linux

To uninstall Cisco Trust Agent, follow this procedure:


Step 1 Log in to the client as the root user.

Step 2 Open a terminal window.

Step 3 At the prompt, run the following command and press <Enter>.

#rpm -e cta-linux

Cisco Trust Agent is uninstalled. You do not need to reboot the system.


Note Certificates and plugin files are not deleted when CTA is uninstalled; they remain on the client.