Administrator Guide for Cisco Trust Agent, Release 2.1, With Bundled Supplicant
Index

Table Of Contents

Numerics - A - B - C - D - E - H - I - L - M - N - O - P - R - S - T - U - W -

Index

Numerics

802.1x Wired Client 4-4, 9-1

administrative version 9-4

administrator's main window 9-8

authentication methods 9-16

authentication policies 9-24

authentication policy summary 9-12

authentication retries 9-34

automatically establish machine connection 9-27

changing authentication profile 9-44

changing deployment packages 9-44

client version 9-4

connection status description 9-8

connection status details 9-10

connection status window 9-14

creating authentication policies 9-26

creating authentication profiles 9-35

creating machine and user authentication deployment package 9-38

creating machine only authentication deployment package 9-40

creating user authenticaton deployment package 9-36

credential revalidation 9-23

credentials expiring 9-23

deploying end-user 802.1x wired clients 9-35

deploying trusted servers 9-31

description 9-1

enabling connection status 9-9

features 9-3

forcing credential revalidation 9-23

installing 4-17

installing authentication profiles 9-43

installing deployment packages 9-43

installing server certificates for machine connection 9-42

installing server certificates for user connection 9-43

launching client 9-11

logging 10-1

Machine Auth (Boot-time) 9-28

Machine Auth (Logon time) 9-28

machine authentication description 9-16

machine authentication only 9-27

machine authentication requirements 9-16

machine certificate credentials 9-22

machine connections after PAC 9-19

machine connections before PAC 9-18

machine credentials 9-21

machine SID credentials 9-22

main window description 9-7

manually connecting to a port 9-12

manually disconnecting from a port 9-12

network adapter information box 9-11

network configuration summary window 9-13

networks.xml file 9-25, 9-26

opening client 9-11

overview 9-16

overview of EAP-FAST connections 9-17, 9-18

policy.xml file 9-24, 9-26

request password 9-27

role in NAC 9-1

send anonymous in clear 9-33

sent username in clear 9-33

station policy window 9-26

system report 10-1, 10-15, 10-16

technical log 10-1, 10-2

technical log content 10-5

technical log format 10-3

troubleshooting 10-1

trusted server validation 9-29

user and machine authentication description 9-16

user authentication description 9-16

user certificate credentials 9-20, 9-21

user connections after PAC 9-18

user connections before PAC 9-17

user credential provisioning 9-20

user credentials 9-20

user credentials area 9-27

user identity protection 9-32

user interface 9-4, 9-26

user password credentials 9-20, 9-21

use single sign-on 9-27

viewing access device status 9-13

Windows operating system support 4-3

Windows service 4-30

A

ACS

see Cisco Secure Access Control Server

asynchronous status query 5-19

authentication profiles

adding to custom installation 4-25

authentication servers 1-2

B

browser auto-launch feature 5-24

C

Certificate DN matching 5-25

certificates

ACS root certificate 8-3

adding to custom installation 2-6, 3-13, 4-24

certificate formats allowed 8-3

certificate utility 8-3

clearing Linux certificate store 8-9

clearing Mac OS X certificate store 8-10

converting DER to PEM format 8-14

ctaCert.exe utility 8-3

CTA supported certificates 8-3

deleting from Linux certificate store 8-8

deleting from Mac OS X certificate store 8-7

DN matching 5-25

for machine and user authentication 8-13

for machine authentication 8-10

for user authentication 8-12

importing user certificate 8-12

installing 8-3, 8-4

installing on Linux 8-4

installing on Mac OS X 8-4

installing on Windows 8-5

listing certificates in Linux certificate store 8-6

listing certificates in store 8-6

obtaining from Cisco Secure ACS 8-3

updating 8-3, 8-4

updating on Linux 8-4

updating on Mac OS X 8-4

updating on Windows 8-5

use with Cisco Trust Agent 8-1

certificate utility

about 8-3

adding certficate to Windows store 8-5

command parameters in Windows 8-5

deleting certificates in Mac OS X store 8-9

Linux operating system

clearing all certificates from store 8-9

deleting certificates from store 8-8

listing certificates in store 8-6

listing certificates in store 8-6

Mac OS X

clearing all certificates from store 8-10

listing certificates in store 8-7

using on Linux 8-6

using on Windows 8-5

Cisco Secure Access Control Server (ACS) xi, 1-2

certificates 8-1

managing stale posture data 11-22

role in NAC 1-2

role in posture validation1-2to 1-4

write_time_stamp.ini file 11-23

Cisco Security Agent (CSA) 1-2

role in NAC 1-2

used to install CTA B-1

ciscotauser

permissions for posture scripts 11-15

Cisco Trust Agent (CSA)

use of certificates 8-1

Cisco Trust Agent (CTA) xi

802.1x Wired Client 9-1

additional features 4-4

alternate methods of installing B-1

configuring 5-1

deployment options 1-5

installing on Linux operating systems 2-1

installing on Mac OS X 3-1

installing on Windows operating systems 4-1

installing using Cisco Security Agent B-1

Linux daemons

ctad 2-8

ctaeoud 2-9

ctalogd 2-9

ctapsd 2-9

logging 6-1

Mac OS X daemons

ctad 3-16

ctaeoud 3-16

ctalogd 3-16

ctapsd 3-16

open-source license acknowledgement C-1

overview 1-1

purpose xi

role in NAC 1-1

role in posture validation1-2to 1-4

scripting interface 11-1

statistics utility A-1

supplicant 9-1

use of posture plugins 7-1

Windows daemons

Cisco Posture Server Daemon 4-30

Cisco Systems Inc. CTA Posture State Daemon 4-30

Cisco Trust Agent EoU Daemon 4-30

Cisco Trust Agent Logger Daemon 4-30

Clickable URL feature 5-23

clogcli utility 6-4

clearing current log files 6-5

collecting log files 6-10

commands 6-5

disabling logging 6-5

enabling logging 6-6

location on Linux operating system 6-4

location on Mac OS X 6-4

location on Windows operating system 6-4

logging level explanation 6-11

running 6-5

setting log file location 6-7

setting logging level 6-8

zipit command 6-10

configuration files

ctad.ini file 5-2

ctalogd.ini file 6-13

configuring Cisco Trust Agent 5-1, 5-16, 5-17, 5-18, 5-19

behavior of posture notifications 5-7

blocking or non-blocking plugins 5-5

clearing or saving old posture notifications 5-10

configuring status query timer 5-6

ctad.ini file 5-2

ctalogd.ini file 6-4

defining communication port for EAPoUDP 5-6

displaying posture messages in GUI 5-9

display time of pop-up notifications 5-9

distinguished name matching 5-11

distinguished name matching parameters 5-11

EAP over UDP communication 5-12

EAP over UDP session idle timeout 5-7

editing the ctad.ini file 5-3

enabling or disabling pop-up posture messages 5-8

font used to display messages in terminal 5-10

for Windows XP SP-2 or SP-3 firewall 5-7

logging 6-4

maximum EAP over UDP sessions 5-7

notification pop-up modality 5-8

parameter descriptions 5-4

pop-up notifications received before logon 5-9

posture plugin interaction with CTA 5-13

posture plugins 5-13

posture pop-up notifications 5-20, 5-23

posture pop-up notifications on Linux 5-21

posture pop-up notifications on Mac OS X 5-22

posture pop-up notifications on Windows 5-20

query plugin for posture status 5-19

receive posture message after obtaining IP address 5-8

saving posture notifications 5-9

scripting interface parameter 5-11

setting application-specific posture message 5-6

setting browser path on Linux 5-10

setting default posture message size 5-6

time before posture database record is outdated 5-11

timeout for non-blocking plugins 5-5

user notifications 5-20, 5-23

user notifications on Linux 5-21

user notifications on Mac OS X 5-22

user notifications on Windows 5-20

Windows

SysModal parameter 5-21

CSA

see Cisco Security Agent

ctacert utility

See certificate utility

ctad.ini file

[EAPoUDP] section description 5-6

[Scripting_Interface]section 5-11

[ServerCertDNVerification] section 5-11, 5-25

[UserNotifies] section 5-7

about 5-2

adding to custom installation 2-7, 3-13, 4-25

configuring Validation-Flag TLV 5-4

ctad-temp.ini 5-2

delta_stale 11-21

editing 5-3

location 5-2

parameter descriptions 5-4

BootTimeUDPExemptions 5-7

BrowserPath 5-10

ClearOldNotification 5-10

delta_stale 5-11

DisplayType 5-9

EnableLogonNotifies 5-9

EnableNotifies 5-8

EnableVFT 5-4

LocalPort 5-6

LogonMsgTimeout 5-9

MaxSessions 5-7

MsgTimeout 5-9

PPInterfaceType 5-5

PPMsgSize 5-6

PPWaitTimeout 5-5

Rule X 5-11

SessionIdleTimeout 5-7

SQTimer 5-6

SysModal 5-8

TermFont 5-10

TotalRules 5-11

userActionDelayTimeout 5-8

ctad-temp.ini file

See ctad.ini file

ctalogd.ini file

[LogLevel] section 5-24

adding to custom installation 2-7, 4-25

including in custom installation 3-13

ctalogd-temp.ini file 6-13

example of 6-13

location on Linux operating system 6-13

location on Mac OS X 6-13

location on Windows operating system 6-13

See also ctalogd.ini file

CTA posture plugin 7-2, 7-5

application posture-token attribute 7-6

attributes of 7-6

for Linux operating system 7-6

for Mac OS X 7-6

for Windows operating system 7-6

kernel-version attribute 7-6

machine posture state attribute 7-6, 7-8

operating system attribute 7-7

operating system version attribute 7-7

operating sytsem release attribute 7-6

posture agent name attribute 7-7

posture agent version attribute 7-7

posture message attribute 7-8

posture token attribute 7-8

ctascriptPP.dll 11-1

description of 11-5

ctascriptpp.so 11-1

description of 11-5

ctasi 11-1

invoked by posture script 11-18

location of executable on Linux 11-19

location of executable on Mac OS X 11-19

ctasi.exe 11-1

location on Windows 11-19

ctastat utility

identifying CTA information A-3

identifying session information A-3

output A-3

overview A-1

running on Linux A-2

running on Mac OS X A-2

running on Windows A-2

sample output A-4

customized installation

deployment considerations 1-5

Linux operating system 2-5

benefits of 2-6

including certificates 2-6

including ctad.ini file 2-7

including ctalogd.ini file 2-7

including posture plugins 2-7

Mac OS X

benefits of 3-12

ctad.ini file 3-13

including certificates 3-13

including ctad.ini file 3-13

including ctalogd.ini file 3-13

including posture plugins 3-13

Windows operating system 4-22, 4-24

802_1x directory 4-25

benefits of 4-24

including authentication profiles 4-25

including certificates 4-24

including ctad.ini file 4-25

including ctalogd.ini file 4-25

including plugins 4-24

installation directory 4-24

install customized package 4-25

D

delta_stale parameter 11-21

deploying Cisco Trust Agent 1-5, 2-3

benefit of custom package 2-3

initial deployment options 2-3

distinguished name matching

See DN matching

DN matching

about 5-25, 8-14

about rules 8-14

attributes supported 5-26

issuer attributes 5-26

parameters in ctad.ini file 5-11

rule length 5-25

rules 5-25

sub-rule operators 5-25

sub-rules 5-25

when occurs 8-14

documentation

additional reading xiv

text conventions xiii

E

EAP-FAST connections

machine credentials context 9-18

overview 9-17, 9-18

user logon context 9-17

EAP over UDP

configuring communication 5-12

configuring communication port 5-6

H

host posture plugin 7-2

attributes of 7-3

Linux package attribute 7-3

Linux package information 7-4

location on Linux 7-2

location on Mac OS X 7-2

location on Windows 7-2

MAC address attribute 7-3

MAC address information 7-3

machine name attribute 7-3

Mac OS X package attribute 7-3

Mac OS X package information 7-5

Windows hot fix attribute 7-3

Windows service pack attribute 7-3

I

installation files

Linux operating system 2-3

Mac OS X operating system 3-3

Windows operating system

CTA with 802.1x Wired Client 4-5

CTA without 802.1x Wired Client 4-5

discontinued versions 4-5

installation procedures

Linux operating system 2-4

accepting EULA 2-4

command line procedure 2-5

customized installation 2-5

extracting install file 2-4

general instructions 2-4

package information 2-9

uninstalling CTA 2-9

upgrading CTA 2-7

verifying installation 2-8

Mac OS X 3-3, 3-16

accepting EULA 3-4

command line procedure 3-4

extracting install file 3-4

general instructions 3-3

installation wizard 3-6

repairing 3-14

uninstalling scripting interface 3-17

upgrading 3-14

verifying installation 3-16

Windows operating system 4-5

accepting EULA 4-6

custom installation package 4-22

customized installation 4-24

extracting MSI file 4-6

general instructions 4-6

installation directory 4-24

installation wizard 4-11, 4-13

install customized package 4-25

installing 802.1x Wired Client 4-17

installing scripting interface 4-17

uninstalling 4-31

upgrading 4-27

upgrading from CTA 1.0 4-27

upgrading from CTA 2.0 4-28

upgrading from CTA 2.0.1 4-29

using MSI commands 4-7

verify CTA installation 4-30

L

licenses

for open-source software C-1

log files

about 6-2

collecting all log files 6-10

creating 6-2

format 6-3

location on Linux operating systems 6-2

location on Mac OS X 6-2

location on Windows operating systems 6-2

naming convention 6-3

persistance 6-4

taking up disk space 6-4

logging

about CTA logging 6-2

Cisco Trust Agent 6-1

clearing current log files 6-5

clogcli utility 6-4, 6-5

collecting all log files 6-10

configuring for large deployments 6-11

ctalogd-temp.ini file 6-13

default setting 6-1

disabling logging 6-5

enabling logging 6-6

log files 6-2

logging level explanation 6-11

notifications 5-24

running 6-5

setting log file location 6-7

setting logging level 6-8

M

machine and user authentication

configuring by using certificates 8-13

machine authentication

configuring by using certificates 8-10

requesting machine certificate 8-11

N

NAC-L2-IP method 5-12

NAC-L3-IP method 5-12

NAD

See network access device

network access device (NAD) xi, 1-2

role in NAC 1-2

role in posture validation1-2to 1-4

Network Admission Control (NAC) xi

objective of 1-1

overview 1-1

network client

definition of 1-5

network clients 1-1

notifications

logging 5-24

posture 7-1

O

open source

software licenses C-1

open-source software

license acknowledgement C-1

P

posture credentials xi, 7-1

relayed by scripting interface 11-3

transfer from plugin to CTA to ACS 7-1

posture data file 11-3, 11-7

attribute definitions 11-11

creating files for Linux 11-8

creating files for Mac OS X 11-8

creating files for Windows 11-9

description of 11-7

location on Linux 11-8

location on Mac OS X 11-8

location on Windows 11-9

requirements of 11-8

sample 11-9

syntax for attribute datatype values 11-12

syntax of 11-8

posture notifications

clearing or saving old posture notifications 5-10

configuring browser auto-launch feature 5-23

configuring clickable URL feature 5-23

configuring display time of pop-up notifications 5-9

configuring pop-up notifications received before logon 5-9

configuring pop-up window 5-8

displaying posture messages in GUI 5-9

enabling or disabling pop-up message 5-8

font used to display messages in terminal 5-10

how they are sent 5-20

pop-up box modality 5-8

pop-up message parameters 5-7

saving pop-up notifications 5-9

setting browser path on Linux 5-10

posture plugins

adding to custom installation 2-7, 3-13, 4-24

application posture-token attribute 7-6

application-specific posture message size 5-17

asynchronous status query 5-19

configuring application-specific message size 5-6

configuring application-specific posture message size 5-17

configuring blocking or non-blocking interface 5-5, 5-13

configuring default message size 5-16

configuring default posture message size 5-6

configuring host posture plugin message size 5-18

configuring interaction with CTA 5-13

configuring status query timer 5-6

configuring Symantec posture plugin message size 5-19

configuring timeout for non-blicking plugins 5-5

configuring to query for status change 5-19

CTA posture plugin 7-2, 7-5

default message size 5-16

definition of 7-1

example of blocking and non-blocking interface 5-14

host posture plugin 7-2

host posture plugin message size 5-18

installation process overview 7-9

installed by default 7-2

installing 7-9

kernel-version attribute 7-6

Linux host 7-2

Linux installation directory 7-9

Linux package attribute 7-3

MAC address attribute 7-3

machine name attribute 7-3

machine posture state attribute 7-6, 7-8

Mac OS X host 7-2

Mac OS X installation directory 7-9

Mac OS X package attribute 7-3

operating system attribute 7-7

operating system release attribute 7-6

operating system version number attribute 7-7

posture agent name attribute 7-7

posture agent version attribute 7-7

posture message attribute 7-8

quarantined plugin 7-10

scripting interface 11-3

scripting interface plugin 7-9

script substituting as 7-9

system posture token attribute 7-8

upgrading 7-9

Windows host 7-2

Windows hot fix attribute 7-3

Windows installlation directory 7-9

Windows service pack attribute 7-3

posture scripts 11-3, 11-7

ciscotauser 11-15

invoking ctasi 11-18

location for new scripts 11-14

registering 11-14

requirements of 11-7

user permissions 11-15

posture token

definition of 7-1

posture validation 1-1

authentication servers 1-2

components of 1-1

definition of 1-1

network clients 1-1

posture validation servers 1-2

process1-2to 1-4

posture validation servers 1-2

role in NAC 1-2

R

repairing CTA

Mac OS X 3-14

Windows 4-8

S

scripting interface 4-4

adding attributes to ACS 11-15

asynchronous status change notification 11-20

creating posture data files 11-8, 11-9

ctascript.so 11-1

ctascriptPP.dll 11-1

ctasi 11-1

ctasi.exe 11-1

executable file 11-4

file name conventions 11-1

information file 11-3, 11-5

information file parameter descriptions 11-6

installing 2-3, 3-5, 3-10, 4-17

interaction with CTA 11-1

invoking ctasi executable 11-18

invoking on Linux 11-19

invoking on Mac OS X 11-19

invoking on Windows 11-18

making it accept the posture data file 11-19

making it ignore the posture data file 11-19

managing stale posture data 11-21

overview 11-3

posture data file 11-3, 11-7

posture data file attributes 11-11

posture plugin 7-9, 11-3

posture plugin description 11-5

posture scripts 11-3, 11-7

posture-validation attribute definiton file 11-16

registering posture scripts 11-14

relaying posture credentials 11-3

reporting status change at layer 2 11-20

reporting status change at layer 3 11-20

role in NAC 11-1

sample posture data file 11-9

stale posture data 11-20

status change 11-20

syntax for attribute datatype values 11-12

uninstalling 3-17

scripting interface posture plugin 7-9

description of 11-5

supplicant

logging 10-1

See 802.1x Wired Client

system requirements

Linux installer 2-2

Linux operating system 2-2

hard disk space 2-2

listening port 2-3

memory 2-3

operating systems version 2-2

processor 2-2

Mac OS X 3-2

hard disk space 3-2

listening port 3-2

memory 3-2

operating systems version 3-2

processor 3-2

Windows operating system 4-2

hard disk space 4-2

installer 4-2

listening port 4-2

memory 4-2

processor 4-2

system requirements 4-2

T

Text conventions xiii

transport layer security (TLS) 5-25

U

uninstalling CTA

Linux operating system 2-9

Mac OS X 3-16

Windows operating system 4-31

upgrading CTA

compatibility of authentication profiles from CTA 2.0 4-28

Linux operating system 2-7

Mac OS X 3-14

Windows operating system

from CTA 1.0 4-27

from CTA 2.0 4-28

from CTA 2.0.1 4-29

user authentication

configuring by using certificates 8-12

importing user certificate 8-12

user credentials

expiring 9-23

forcing revalidation 9-23

user notifications

logging notifications 5-24

posture notifications 7-1

W

Windows MSI commands

4-7

changing installation directory 4-10

installing 4-7

installing optional features 4-9

quiet mode 4-11

reboot options 4-11

reinstalling or repairing 4-8

uninstalling 4-8

Windows operating systems

support for 802.1x Wired Client 4-3

support for CTA 4-3