
Setting Up Security-Card Authentication
How security cards work
If you can configure your network site to require that users change passwords several times per day, you use an external authentication server, such as a Security Dynamics ACE/Server or an Enigma Logic SafeWord server. The external server syncs up with hand-held personal security cards. These devices are typically the size of a credit card. The security card provides a user with a current password in real time. The LCD on the user's card displays the current, one-time-only password required to gain access at that moment to the secure network. Security card authentication with RADIUS
Figure 5-1 illustrates an environment that includes an Ascend Pipeline as the calling unit, a MAX functioning as a Network Access Server (NAS), a RADIUS server, and an external authentication server.
Figure 5-1. Using an external authentication server

This user is a client of the MAX. The user can be in terminal-server mode or use the APP Server utility during the authentication phase. When authentication is complete, the user can switch to PPP mode.
The MAX is a client of the RADIUS server.
In this case, the RADIUS server is a client of the authentication server.
If the authentication server is an ACE/Server, the user has a SecurID token card that displays a randomly generated access code, which changes every 60 seconds.
If the user enters an incorrect password, the ACE./Server or SafeWord server returns another challenge and the user can again attempt to enter the correct password. The server sends up to three challenges. After three incorrect entries, the MAX terminates the call.
The direct method is useful for installations in which other RADIUS features are not required, because it decreases the complexity of the system, making it easier to configure and maintain. In addition, direct ACE/Server authentication supports the New PIN Mode feature, which allows a dial-in user to change the personal identifying number (PIN). For information about the New PIN Mode feature, see New PIN Mode.
You can also configure ACE/Server authentication to use PAP-TOKEN-CHAP authentication. For more information, see Configuring PAP-TOKEN-CHAP when using direct ACE authentication.
Overview of security-card authentication methods
When setting up SafeWord and ACE/Server security-card authentication of incoming calls, you can specify PAP-TOKEN, CACHE-TOKEN, or PAP-TOKEN-CHAP authentication. You can also specify that users request one of these authentication types when dialing out through the MAX. This section provides an overview of token-based authentication.
Setting up incoming security-card calls
When the MAX receives an incoming security-card password from a user, it must forward the authentication request to RADIUS (unless you are using direct authentication). The RADIUS server, in turn, forwards the request to an ACE/Server or SafeWord server. The security-card caller must have a valid RADIUS user profile. Therefore, you must carry out both of the following tasks:
You can set up the ACE/Server for use without RADIUS (as described in Configuring direct SecurID ACE authentication). This method does not permit use of the APP Server utility to authenticate PPP dial-in users.
To configure the Ace/Server to use PAP-TOKEN-CHAP authentication, see Configuring PAP-TOKEN-CHAP when using direct ACE authentication.
If you are using Defender without RADIUS, see Configuring direct Defender server authentication.
Setting up outgoing security-card calls
Most sites use the MAX as an NAS for incoming security-card calls. However, you can also configure the MAX as the calling unit to allow a security-card user on the local network to call out to an NAS at a secure site.
The APP Server utility enables a user to respond to token password challenges received from an external authentication server, such as an ACE/Server or SafeWord server. To allow users to supply token passwords from a host on the local network, you must configure the MAX to communicate with the APP Server utility on that host.
Location |
Parameters with sample values |
|---|---|
|
Ethernet\>Mod Config\>DNS
|
Password Host=10.0.0.1
|
|
Ethernet > Mod Config > Auth
|
Password Port=10 Password Server=Yes
|
The parameters listed in Table 5-1 apply only to outgoing calls that use security-card authentication. For the authentication-server parameters to have their intended effect, your system must meet the following conditions:
Valid port numbers range from 0 to 65535. The default value is 0 (zero), which specifies that the authentication server does not monitor a UDP port.
To set up the MAX to communicate with the APP Server utility, set the APP Server, APP Host, and MAX Port parameters. Proceed as follows:
This setting enables the MAX to communicate password challenges to the host running the APP Server utility.
If the host obtains its address at boot time from a BOOTP or DHCP server, or if it has no IP address, you can specify the IP broadcast address (255.255.255.255).APP Host=10.65.212.1
The default for the APP Server is UDP port 7001. If you change this number, you must specify the new UDP port number in the APP Server utility (DOS), the
WIN.INI file (Windows), or the /etc/services file (UNIX). The MAX and the host running the APP Server utility must agree on the UDP port number.
The response to the initial password challenge authenticates the base channel of the call. If bandwidth requirements result in an attempt to add a channel to the call, the system challenges the user for a password.
To request PAP-TOKEN authentication for an outgoing call, set the Send Auth and Send PW parameters. Proceed as follows:
The Send Auth parameter specifies the authentication type requested by the caller.
The MAX sends the value of the Send PW parameter as part of the initial session negotiation. If the session then presents a password challenge, the user types in the current one-time-only password displayed on the security card.
To request CACHE-TOKEN authentication for an outgoing call, set the Send Auth and Send PW parameters.
The Send Auth parameter specifies the authentication type requested by the caller.
The MAX sends the value of the Send PW parameter as part of the initial session negotiation. The system prompts the user for a token password and uses this password to authenticate the base channel of the call by means of CHAP. The RADIUS server caches the encrypted password for the period specified by the Ascend-Token-Expiry attribute, or for the amount of idle time specified by the Ascend-Token-Idle attribute. When the system adds channels to a call or places a new call, it uses the cached password to authenticate the channels.
If the calling unit requests PAP-TOKEN-CHAP authentication but the RADIUS user profile at the remote end is not set up for PAP-TOKEN-CHAP, the remote end uses PAP-TOKEN authentication instead.
To request PAP-TOKEN-CHAP authentication for an outgoing call, set the parameters as follows.
The Send Auth parameter specifies the authentication type requested by the caller.
The MAX sends the value of the Send PW parameter as part of the initial session negotiation. If the session then presents a password challenge, the user types in the current one-time-only password displayed on the security card.
When the MAX adds more channels after establishing the call's base channel, CHAP encrypts the auxiliary password specified by Aux Send PW and transmits it to the remote end.
Previous versions of the APP Server utility enabled a single user to respond to password challenges from a remote ACE/Server or SafeWord server. The current version supports multiple tokens (for a user name as well as the current password) so more than one user can use the APP Server to respond to password challenges.
ftp.ascend.com as a single tar archive that contains all five versions of the utility.The tar file expands into five directories, one for each version of the utility:
appsrvds.exe (for DOS)
appsrv31.exe (for Windows 3.1)
appsrv95.exe (for Windows 95)
appsrvnt.exe (for Windows NT)
appsrvr.ini. You can create the text file with any text editor. The file must reside in the directory in which the APP Server utility is located.The banner can contain up to 200 characters and five lines of text. The first line of the file must contain the text
[BANNER]. For example, you might set up the file as follows:
[BANNER]
line1=The security password has changed. Please consult your
line2=card and enter the current password now.
line3=You have 60 seconds to enter the new password.
\ascend directory below the root directory.
appsrvds.exe into the \ascend directory.
appsrvr.ini file exists, copy the file into the \ascend directory.
For more information about the appsrvr.ini file, see Creating banner text for the password prompt.
autoexec.bat file and add a command line to start appsrvds.exe.
The
appsrvds.exe DOS utility does not require an IP stack or IP address, but it does require an ODI driver. appsrvds.exe after the line that loads the network ODI driver and before the line that loads the network protocol stack (TCP/IP, IPX, or another supported protocol). For example:
C:\novell\lsl.com
C:\novell\xxxodi.com
C:\ascend\appsrvds.exe
REM Protocol Stack is loaded next
autoexec.bat file.
/t-Specifies a time delay between connection attempts (in seconds).
/y-Specifies the number of cycle counts (attempts to connect) before timeout.
/m-Specifies the MAC address (in decimal format) of the PC running the utility.
/p-Specifies a UDP port number for communicating with the MAX.
/b-Specifies a UDP port for broadcast messages.
/f-Suppresses the call at startup.
/d-Disconnects the call.
/c-Specifies the name of the Connection profile to use to connect to the remote secure network.
/?-Displays a help screen.
/p or /b option. If you specify a number other
than 7001 in the APP Port parameter, you must use the /p or /b option to specify the same
port.
autoexec.bat file does not specify which Connection profile to use,
the system prompts you for a Connection profile name as the system boots.
For example, consider this command line:
C:\ascend\appsrvds.exe /cChicago /t20 /p7005
This line specifies a Connection profile named Chicago, assigns a 20-second time delay between connection attempts, and designates UDP port 7005 for communicating with the MAX.Now, consider the following command line:
C:\ascend\appsrvds.exe /cChicago /m00805110C7A44 /p7523 /t65 /b7112
This line specifies a Connection profile named Chicago, specifies 00805110C7A44 as the MAC address of the PC running the utility, designates UDP port 7523 for communicating with the MAX, assigns a 65-second time delay between connection attempts, and designates port 7112 for sending broadcast messages (to initiate a call).
\ascend directory below the root directory.
appsrv31.exe into the \ascend directory.
appsrvr.ini file exists, copy that file into the \ascend directory.
For details about the appsrvr.ini file, see Creating banner text for the password prompt.
To create an icon and add the APP Server to the startup group, proceed as follows:
Ascend
appsrv31.exe. In the Program Manager, choose File\>New\>Program Item.
xas-w95.exe into a temporary directory.
The
xas-w95.exe zip file expands to several files that constitute the Setup program for Windows 95.
appsrv95.exe.
xas-nt.exe into a temporary directory.
The
xas-nt.exe zip file expands to several files that constitute the Setup program for Windows NT.
There are three icons provided during installation that enable you to temporarily disable the APP Server, manually control when it runs, or remove it from the system.
Installing the APP Server utility for UNIX
To install the APP Server utility on a UNIX host:
appsrvr source file (make).
/etc/services file, assigning UDP port 7001 to the APP Server utility.
appServer 7001/udpIf port 7001 is already assigned for a different purpose, you can use a different port for the APP Server utility by adding a line such as the following to the services file:
appServer port_num/udpThe
port_num argument is the port number the utility uses. Make sure you specify the same number for the APP Port parameter on the MAX.
./appsvrWhen you run the utility in unicast mode, it transmits packets on the specified UDP port with the source address set to its own IP address. When the MAX receives the packets on the specified UDP port, it returns them to the specified IP address.
./appsrvr -bThe
-b argument sets a socket option to allow broadcast transmissions and inhibits the utility's error messages about receiving invalid APP frame types when it receives its own transmissions.
Dialing a connection to a secure site
This sections describes how to initiate a connection to a remote network from a terminal server and from a DOS, Windows, or UNIX workstation. Connecting to a remote network from the terminal server
To make an outgoing call to a secure site from a terminal server session, perform all the steps of the following procedure. For a modem connection, begin at step 2.
set passwordThe following message appears:
Entering Password Mode...Then the prompt changes to the display following text:
[^C to exit] Password Mode>
The remote NAS returns a challenge prompt similar to the following:
From: hostname
0-Challenge: challenge
Enter next password:where hostname
is the name of the NAS you are calling. It is optional on some systems. If the Send Auth parameter is configured incorrectly, no challenge prompt appears, or you see an error message such as the following:
From: hostname
Received unexpected PAP Challenge!... check PPP Auth Mode
You have 60 seconds to enter the password correctly. When you enter the correct password, the MAX establishes the connection to the secure network. If you do not specify the correct password within 60 seconds, the login attempt times out. If you enter the password incorrectly, the challenge prompt displays again, up to three times.
From: hostnamewhere
0-Challenge: challenge
Enter next password:
hostname is the name of the NAS the user is calling. It is optional on some systems. If the Send Auth parameter is configured incorrectly, no challenge prompt appears or you see an error message such as the following:
From: hostnameYou have 60 seconds to enter the password correctly. When you enter the correct password, the MAX establishes the connection to the secure network. If you do not specify the correct password within 60 seconds, the login attempt times out. If you enter the password incorrectly, the challenge prompt appears again, up to three times.
Received unexpected PAP Challenge!... check PPP Auth Mode
If more than one user uses the APP Server to log into a remote secure network through the MAX, each user must include a user name in the following format:
password.username
The Settings dialog box opens.
You can specify up to 32 characters. Do not enter spaces.
After the initial session negotiation, the remote ACE/Server or SafeWord server returns a password challenge in a dialog box. You have 60 seconds to obtain the current dynamic password from the security card and enter it correctly.
From: hostnamewhere hostname is the name of the NAS you are calling. It is optional on some systems.
0-Challenge: challenge (or null challenge, depending on your setup)
Enter next password:
If the Send Auth parameter is configured incorrectly, no challenge prompt appears, or you see an error message such as the following:
From: hostnameYou have 60 seconds to enter the password correctly. When you enter the correct password, the MAX establishes the connection to the secure network. If you do not specify the correct password within 60 seconds, the login attempt times out. If you enter the password incorrectly, the challenge prompt appears again, up to three times.
Received unexpected PAP Challenge!... check PPP Auth Mode
If more than one user uses the APP Server to log into a remote secure network through the MAX, each user must include a user name in the following format:
password.username
How the SecurID ACE/Server works without RADIUS
Users dialing into a MAX who are authenticated by a SecurID ACE server directly (without RADIUS) can specify that one of the MAX unit's local profiles provide the values for the session parameters. When a user dials into the MAX, the usual banner and prompt appear. For example:
** Ascend Pipeline Terminal Server **
Login:When the user enters a name, the screen prompts for a password:
Password:At this point, the user must enter his or her PIN, followed by the numbers currently displayed on the SecurID token card.
If the login is correct, the terminal-server prompt appears:
ascend%If the login is incorrect, the following message appears:
** Bad Passwordand the Ascend unit requests another login. The user gets three chances to enter a valid login name/password (or passcode) combination.
Wait for the code on your token to change, then enter the new code (without PIN).
Passcode:The user must wait until the number displayed on the token card changes, and then type in that number without the PIN. If the user enters a correct code, the terminal server command prompt or menu appears. If the user enters an incorrect code, the Ascend unit displays a
**Bad Password** message and the user's token remains in NextCode mode.
After the normal authentication, the Ascend unit displays one of the following three messages:
Enter your new PIN, containing 4 to 8 digits:
or
<Return> to generate a new PIN and display it on the screen:
or
<Ctrl C> to cancel the New PIN procedure:
Enter your new PIN, containing 4 to 8 digits:
Press <Return> to generate a new PIN and display it on the screen:
Please re-enter new PIN:The user types in the new PIN. If the PINs match, the new PIN is sent to the server, the user is informed that the PIN has changed, and the following message appears:
Wait for the code on your token to change, then log in with the new PIN
Login:If, after the second verifying PIN entry, the MAX detects that the user has entered two different PINs, the following message appears:
PINs do not match. Please try again.
Login:The user must log in again. The server then asks the user to choose a new PIN.
ARE YOU PREPARED TO HAVE THE SYSTEM GENERATE A PIN? (y or n) [n]:If the user presses
y or Y, the screen displays a new PIN chosen by the ACE server. For example:
Your new PIN: 6467
Press Enter to clear screen:The user must immediately memorize the PIN, and then press Enter. The screen clears, the PIN is sent back to the MAX for confirmation, and if the ACE server accepts the PIN, the MAX displays the following message:
Wait for the code on your token to change, then log in with the new PIN
Login:
Configuring direct SecurID ACE authentication
If you configure the SecurID ACE as the external authentication server for your MAX, any calls that are not authenticated by local Connection profiles are forwarded to the ACE server for authentication. If you require your MAX to reach more than one authentication server, see the RADIUS Configuration Guide. Other software products, such as Ascend's Access Control, support multiple external authentication servers through the MAX.
X0-X00 Mod Config
Auth
>Auth=SECURID
Auth Host #1=137.175.80.24
Auth Host #2=0.0.0.0
Auth Host #3=0.0.0.0
Auth Port=2626
Auth Timeout=10
Auth Key=N/A
Auth Pool=No
APP Server=No
APP Host=N/A
APP Port=
SecurID DES encryption=N/A
SecurID host retries=N/A
SecurID NodeSecret=N/A
Auth Host #2 and Auth Host #3 are not applicable, because the MAX can support only one SecurID ACE authentication server at this time.
For example, you might specify the following setting:
Auth Port=1545
If the MAX does not receive a response within the time specified by Auth Timeout, it assumes the SecurID ACE server has become nonfunctional.
The default value is 3.
The syntax is:
[where:CallType][ rp=password] [la=ipaddress] [prf=conn-prof] [|[CallType][ rp=password] [la=ipaddress] [prf=conn-prof] ]
rp=joebob prf=johnOne way to limit the likelihood of overwriting is to place the
prf parameter before the rp or la parameter.Authentication fails if string values in a shell setting are unrecognized or in error. Observe the following rules in specifying strings:
string value'), double quotes ("string value") or square brackets ([string's value]) to delimit strings only when the string contains a space or one of the other delimiters.
sdadmin program does not check to ensure compliance with the limitation.

Notice that the previous setting just fits in the permitted space, with 64 characters. If the setting were any longer, the end of
modemroute would be cut off and authentication would fail for analog calls. The same setting could be shortened to the following:

Another way to save space is to place parameters that are common to both analog and digital calls in a section that precedes the parameters that set analog or digital specifics. For example:

The section with common parameters can precede or follow the call-type-specific parameters. In the following example, the common parameters follow the specific parameters:

You do not need to include separate sections for each call type in your user settings. For example, in the following setting, the general assignment statements suffice without specifying sections for different call types:

You can also have just one call type or the other. In the example that follows, the digital caller's settings are specified. The analog settings are not set explicitly. Consequently, the Default or Answer profile is applied to analog callers, depending on the setting of the Use Answer as Default parameter in the Answer profile:

securiddebug, which is a toggle that turns the display on and off.Verify that you have not exceeded the 64 character limit. If the final parameter is not complete, you have exceeded the limit. For security, this debug mode does not display the password string.
Because debug mode does not display the password string, you cannot tell directly from the debug output whether the
rp parameter is being truncated. If you encounter problems with the second and subsequent channels of an MP call being automatically authenticated, the problem could be that the end of the rp parameter is being cut off.
To set the static password to use during PAP-TOKEN-CHAP for a particular user:
sdadmin program on the ACE server machine.
rp="password"rp stands for Receive Password and password is the password to be configured in step 8 as the Aux Send PW on the calling router (usually a Pipeline).
For example, if you type
rp="Little Big":
However,rp=/Little Big/
rp=[Little Big] is not identical and would an produce error, because the left bracket and right bracket are different characters.
rp in step 6.
Configuring direct Defender server authentication
This section describes how to configure the Defender as your MAX unit's external authentication server. When you configure the Defender as an external authentication server, any calls that are not authenticated by local Connection profiles are forwarded to the Defender server for authentication.
How Defender server authentication works
Table 5-2 show the three major stages in authentication using AssureNet Pathways' Defender. The behavior of the MAX depends on the stage of the call dialing the MAX is in when it loses the connection with the host.
When no authentication host is available
If a MAX cannot establish contact with any of the authentication hosts in Ethernet > Mod Config > Auth > Auth Host n parameter, it drops all sessions, including calls in Stage 1.
X0-X00 Mod Config
Auth
>Auth=Defender
Auth Host #1=137.175.80.24
Auth Host #2=0137.174.81.0
Auth Host #3=0137.174.80.25
Auth Port=2626
Auth Timeout=10
Auth Key=****************
Auth Pool=No
APP Server=No
APP Host=N/A
APP Port=N/A
SecurID DES encryption=N/A
SecurID host retries=N/A
SecurID NodeSecret=N/A
Auth Key is used as a DES secret key shared between the Ascend unit and the Defender authentication server. This key is also used for authentication by the Ascend unit in its role as a Defender authentication agent.
Type a port number from 0 to 65535. The default value is 0 (zero). If you accept this value, the Ascend unit can use any port number from 1024 to 2000.
Copyright © 1998, Ascend Communications, Inc. All rights reserved.