Radius

Telnet Default Authorization

Description

A RADIUS server is added to a RADIUS group which is added to an AAA list. This list is assigned to the login system’s authentication. In this scenario, the default authorization mapping is used, which maps the standard level to monitor and the privileged level to admin. The device then starts a Telnet session with itself to check that it can only run the commands that role is authorized to run.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set service telnet
set system aaa group radius radgroup1 server serv1
set system aaa list list1 method 1 group radius radgroup1
set system aaa server radius serv1 address 10.215.168.1
set system aaa server radius serv1 encrypted-key U2FsdGVkX1/XBH4DpjrAtw0BPV1CP/ETEdphEJ4DYHH0kMlGhGKPQpVyyRMIg5tov0bIyi20dnWM543HAXLZ7A==
set system login aaa authentication list1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.240 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.240/0.240/0.240/0.000 ms

Step 3: Init a Telnet connection from DUT0 to IP address 127.0.0.1 :

admin@DUT0$ telnet 127.0.0.1
Show output
Trying 127.0.0.1...
Connected to 127.0.0.1.
Escape character is '^]'.

Linux 6.1.90 (osdx) (pts/1)

osdx login:
Password:

Welcome to Teldat OSDx v4.1.1.1

This system includes free software.
Contact Teldat for licenses information and source code.

testing@osdx$

Step 4: Run command service cnm restart at DUT0 and expect this output:

Show output
CLI Error: Insufficient privileges

Step 5: Run command show running at DUT0 and expect this output:

Show output
CLI Error: Insufficient privileges

Step 6: Run command show date at DUT0 and expect this output:

Show output
Wed 17 Jul 2024 16:09:33 UTC +00:00

Step 7: Init a Telnet connection from DUT0 to IP address 127.0.0.1 :

admin@DUT0$ telnet 127.0.0.1
Show output
Trying 127.0.0.1...
Connected to 127.0.0.1.
Escape character is '^]'.

Linux 6.1.90 (osdx) (pts/1)

osdx login:
Password:

Welcome to Teldat OSDx v4.1.1.1

This system includes free software.
Contact Teldat for licenses information and source code.

testadmin@osdx$

Step 8: Run command service cnm restart at DUT0 and expect this output:

Show output
service inactive. doing nothing.

Step 9: Run command show running at DUT0 and expect this output:

Show output
# Teldat OSDx VM version v4.1.1.1
# Wed 17 Jul 2024 16:09:35 UTC +00:00
# Warning: Configuration has not been saved
set interfaces ethernet eth0 address 10.215.168.64/24
set service telnet
set system aaa group radius radgroup1 server serv1
set system aaa list list1 method 1 group radius radgroup1
set system aaa server radius serv1 address 10.215.168.1
set system aaa server radius serv1 encrypted-key U2FsdGVkX1/XBH4DpjrAtw0BPV1CP/ETEdphEJ4DYHH0kMlGhGKPQpVyyRMIg5tov0bIyi20dnWM543HAXLZ7A==
set system login aaa authentication list1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 10: Run command show date at DUT0 and expect this output:

Show output
Wed 17 Jul 2024 16:09:35 UTC +00:00

Telnet Privilege Map

Description

A RADIUS server is added to a RADIUS group which is added to an AAA list. This list is assigned to login system’s authentication. Finally, the RADIUS privilege levels are mapped to locally defined roles. The device then starts a Telnet session with itself to check that it can only run the commands that role is authorized to run.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set service telnet
set system aaa authorization privilege-map radius privileged role monitor
set system aaa authorization privilege-map radius standard role admin
set system aaa group radius radgroup1 server serv1
set system aaa list list1 method 1 group radius radgroup1
set system aaa server radius serv1 address 10.215.168.1
set system aaa server radius serv1 encrypted-key U2FsdGVkX1+t/yrUnB5EX0gwd1pdO+gOIw10RhO7fFEhSWX4EqGKY2ShkDG0Geuj+lKQPeTHF1zYnP9iu4OL9g==
set system login aaa authentication list1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.180 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.180/0.180/0.180/0.000 ms

Step 3: Init a Telnet connection from DUT0 to IP address 127.0.0.1 :

admin@DUT0$ telnet 127.0.0.1
Show output
Trying 127.0.0.1...
Connected to 127.0.0.1.
Escape character is '^]'.

Linux 6.1.90 (osdx) (pts/1)

osdx login:
Password:

Welcome to Teldat OSDx v4.1.1.1

This system includes free software.
Contact Teldat for licenses information and source code.

testing@osdx$

Step 4: Run command service cnm restart at DUT0 and expect this output:

Show output
service inactive. doing nothing.

Step 5: Run command show running at DUT0 and expect this output:

Show output
# Teldat OSDx VM version v4.1.1.1
# Wed 17 Jul 2024 16:09:40 UTC +00:00
# Warning: Configuration has not been saved
set interfaces ethernet eth0 address 10.215.168.64/24
set service telnet
set system aaa authorization privilege-map radius privileged role monitor
set system aaa authorization privilege-map radius standard role admin
set system aaa group radius radgroup1 server serv1
set system aaa list list1 method 1 group radius radgroup1
set system aaa server radius serv1 address 10.215.168.1
set system aaa server radius serv1 encrypted-key U2FsdGVkX1+t/yrUnB5EX0gwd1pdO+gOIw10RhO7fFEhSWX4EqGKY2ShkDG0Geuj+lKQPeTHF1zYnP9iu4OL9g==
set system login aaa authentication list1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 6: Run command show date at DUT0 and expect this output:

Show output
Wed 17 Jul 2024 16:09:40 UTC +00:00

Step 7: Init a Telnet connection from DUT0 to IP address 127.0.0.1 :

admin@DUT0$ telnet 127.0.0.1
Show output
Trying 127.0.0.1...
Connected to 127.0.0.1.
Escape character is '^]'.

Linux 6.1.90 (osdx) (pts/1)

osdx login:
Password:

Welcome to Teldat OSDx v4.1.1.1

This system includes free software.
Contact Teldat for licenses information and source code.

testadmin@osdx$

Step 8: Run command service cnm restart at DUT0 and expect this output:

Show output
CLI Error: Insufficient privileges

Step 9: Run command show running at DUT0 and expect this output:

Show output
CLI Error: Insufficient privileges

Step 10: Run command show date at DUT0 and expect this output:

Show output
Wed 17 Jul 2024 16:09:42 UTC +00:00

SSH Default Authorization

Description

A RADIUS server is added to a RADIUS group which is added to an AAA list. This list is assigned to the SSH service’s authentication. In this scenario, the default authorization mapping is used, which maps the standard level to monitor and the privileged level to admin. The device then starts an SSH session with itself to check that it can only run the commands that role is authorized to run.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set service ssh aaa authentication list1
set system aaa group radius radgroup1 server serv1
set system aaa list list1 method 1 group radius radgroup1
set system aaa server radius serv1 address 10.215.168.1
set system aaa server radius serv1 encrypted-key U2FsdGVkX19J6OAzZnS/t9KwBzdjtUIjyr3URrzcmB7jl/zqs3sTMjUyx/xK97UQrM3HqJmRYU2WIwy8dy03ug==
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.352 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.352/0.352/0.352/0.000 ms

Step 3: Init an SSH connection from DUT0 to IP address 127.0.0.1 with the user testing:

admin@DUT0$ ssh testing@127.0.0.1 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null
Show output
Warning: Permanently added '127.0.0.1' (ED25519) to the list of known hosts.
testing@127.0.0.1's password:
Welcome to Teldat OSDx v4.1.1.1

This system includes free software.
Contact Teldat for licenses information and source code.

testing@osdx$

Step 4: Run command service cnm restart at DUT0 and expect this output:

Show output
CLI Error: Insufficient privileges

Step 5: Run command show running at DUT0 and expect this output:

Show output
CLI Error: Insufficient privileges

Step 6: Run command show date at DUT0 and expect this output:

Show output
Wed 17 Jul 2024 16:09:49 UTC +00:00

Step 7: Init an SSH connection from DUT0 to IP address 127.0.0.1 with the user testadmin:

admin@DUT0$ ssh testadmin@127.0.0.1 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null
Show output
Warning: Permanently added '127.0.0.1' (ED25519) to the list of known hosts.
testadmin@127.0.0.1's password:
Welcome to Teldat OSDx v4.1.1.1

This system includes free software.
Contact Teldat for licenses information and source code.

Last login: Wed Jul 17 16:09:49 2024 from 127.0.0.1
testadmin@osdx$

Step 8: Run command service cnm restart at DUT0 and expect this output:

Show output
service inactive. doing nothing.

Step 9: Run command show running at DUT0 and expect this output:

Show output
# Teldat OSDx VM version v4.1.1.1
# Wed 17 Jul 2024 16:09:50 UTC +00:00
# Warning: Configuration has not been saved
set interfaces ethernet eth0 address 10.215.168.64/24
set service ssh aaa authentication list1
set system aaa group radius radgroup1 server serv1
set system aaa list list1 method 1 group radius radgroup1
set system aaa server radius serv1 address 10.215.168.1
set system aaa server radius serv1 encrypted-key U2FsdGVkX19J6OAzZnS/t9KwBzdjtUIjyr3URrzcmB7jl/zqs3sTMjUyx/xK97UQrM3HqJmRYU2WIwy8dy03ug==
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 10: Run command show date at DUT0 and expect this output:

Show output
Wed 17 Jul 2024 16:09:50 UTC +00:00

SSH Privilege Map

Description

A RADIUS server is added to a RADIUS group which is added to an AAA list. This list is assigned to SSH service’s authentication. Finally, the RADIUS privilege levels are mapped to locally defined roles. The device then starts an SSH session with itself to check that it can only run the commands that role is authorized to run.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set service ssh aaa authentication list1
set system aaa authorization privilege-map radius privileged role monitor
set system aaa authorization privilege-map radius standard role admin
set system aaa group radius radgroup1 server serv1
set system aaa list list1 method 1 group radius radgroup1
set system aaa server radius serv1 address 10.215.168.1
set system aaa server radius serv1 encrypted-key U2FsdGVkX19R+jYjkhh4VXclas7aVsBCKOF6KD+SPteswo9cJLmykNpdR+sBWI3O3cHUP0GToUPCrULAQw25Lw==
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.219 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.219/0.219/0.219/0.000 ms

Step 3: Init an SSH connection from DUT0 to IP address 127.0.0.1 with the user testing:

admin@DUT0$ ssh testing@127.0.0.1 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null
Show output
Warning: Permanently added '127.0.0.1' (ED25519) to the list of known hosts.
testing@127.0.0.1's password:
Welcome to Teldat OSDx v4.1.1.1

This system includes free software.
Contact Teldat for licenses information and source code.

testing@osdx$

Step 4: Run command service cnm restart at DUT0 and expect this output:

Show output
service inactive. doing nothing.

Step 5: Run command show running at DUT0 and expect this output:

Show output
# Teldat OSDx VM version v4.1.1.1
# Wed 17 Jul 2024 16:09:56 UTC +00:00
# Warning: Configuration has not been saved
set interfaces ethernet eth0 address 10.215.168.64/24
set service ssh aaa authentication list1
set system aaa authorization privilege-map radius privileged role monitor
set system aaa authorization privilege-map radius standard role admin
set system aaa group radius radgroup1 server serv1
set system aaa list list1 method 1 group radius radgroup1
set system aaa server radius serv1 address 10.215.168.1
set system aaa server radius serv1 encrypted-key U2FsdGVkX19R+jYjkhh4VXclas7aVsBCKOF6KD+SPteswo9cJLmykNpdR+sBWI3O3cHUP0GToUPCrULAQw25Lw==
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 6: Run command show date at DUT0 and expect this output:

Show output
Wed 17 Jul 2024 16:09:56 UTC +00:00

Step 7: Init an SSH connection from DUT0 to IP address 127.0.0.1 with the user testadmin:

admin@DUT0$ ssh testadmin@127.0.0.1 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null
Show output
Warning: Permanently added '127.0.0.1' (ED25519) to the list of known hosts.
testadmin@127.0.0.1's password:
Welcome to Teldat OSDx v4.1.1.1

This system includes free software.
Contact Teldat for licenses information and source code.

Last login: Wed Jul 17 16:09:56 2024 from 127.0.0.1
testadmin@osdx$

Step 8: Run command service cnm restart at DUT0 and expect this output:

Show output
CLI Error: Insufficient privileges

Step 9: Run command show running at DUT0 and expect this output:

Show output
CLI Error: Insufficient privileges

Step 10: Run command show date at DUT0 and expect this output:

Show output
Wed 17 Jul 2024 16:09:57 UTC +00:00