In This Section: |
This chapter describes how to manage passwords, user accounts, roles, authentication servers, system groups, and Gaia WebUI clients.
Note - When a user logs in to Gaia, the WebUI navigation tree displayed and CLI commands that are available depend on the role or roles assigned to the user. If the user's roles do not provide access to a feature, the user does not see the feature in the WebUI navigation tree or in the list of commands. If the user has read-only access to a feature, they can see the WebUI page but the controls are disabled. Similarly, the user can run |
A Gaia user can change his or her own Gaia password.
To change your current user password:
Description |
Change your own Gaia password, in an interactive dialog. |
Syntax |
set selfpasswd |
Warning |
It is not recommended to use |
Use the WebUI and CLI to manage user accounts. You can:
These users are created by default and cannot be deleted:
New users have read‑only privileges to the WebUI and CLI by default. You must assign one or more roles before they can log in.
Note - You can assign permissions to all Gaia features or a subset of the features without assigning a user ID of 0. If you assign a user ID of 0 to a user account (you can do this only in the CLI), the user is equivalent to the Admin user and the roles assigned to that account cannot be modified. |
||
Note - Do not define a new user for external users. An external user is one that is defined on an authentication server (such as RADIUS or TACACS) and not on the local Gaia system. |
When you create a user you can add pre-defined roles (privileges) to the user. For more information, see "Role-Based Administration".
Warning - A user with read and write permission to the Users feature can change the password of another user, or an admin user. Therefore, write permission to the Users feature should be assigned with caution. |
To see a list of all users
Choose User Management > Users in the navigation tree.
You can also see your username in the toolbar of the WebUI.
To add a user
/home
To delete a user
Item |
Description |
---|---|
Login Name |
Name used to identify the user. The valid characters are alphanumeric characters, dash (-), and underscore (_). Range: 1-32 characters |
Real Name |
User's real name or other informative label. |
Home directory |
This is the full Linux path name of a directory where the user will log in. The home directory for all users must be in /home. |
Shell |
|
Password |
Use this field to enter a new password if you are changing it. Range: 6-128 characters. All printable characters are allowed. Note - If you use an asterisk (*) in a password, users with that password are unable to log in. |
Reset Password |
Change the user password. Important - After resetting the password, tell the user to immediately change their password in User Management > Change My Password. |
Confirm Password |
Re-enter the new password if you are changing it. |
User must change password at next logon |
Important - After selecting this option, tell the user to immediately change their password in User Management > Change My Password. |
Access Mechanisms |
Choose whether the user is able to access Gaia from the command line, from the WebUI, both, or neither. |
Roles |
Assign a role to the user. Define the roles in User Management > Roles. |
Description |
Manage user accounts. You can add users, edit the home directory of the user, edit the default shell for a user, give a password to a user, and give privileges to users. |
||
Syntax |
To add a user account:
To modify a user account:
To delete an existing user:
To view summary information about all users:
To view information about a user
|
||
Comments |
You can use the |
||
Parameter |
Description |
||
|
Unique login username - an alphanumeric string, 1 to 32 characters long, that can contain dashes (-) and underscores (_), but not spaces. |
||
|
If set to |
||
|
Numeric ID ( |
||
|
User's home directory, where the user is placed on login. Enter the full Linux path name, under |
||
|
Unlock the user, if the user was locked-out. The password expiration date is adjusted, if necessary. |
||
|
Set a new password for the user. |
||
|
Set a password for the new user. |
||
|
An encrypted representation of the password. The password is not visible as text on the terminal command line or in the command history. |
||
|
User description, mos commonly user's real name - an alphanumeric string that can contain spaces. The default is the username with capitalized first letter. |
||
|
User's command interpreter (shell), which is invoked when the user logs in. The default shell is
|
||
|
Unique user ID (Integer |
Role-based administration (RBA) lets you create administrative roles for users. With RBA, an administrator can allow Gaia users to access specified features by including those features in a role and assigning that role to users. Each role can include a combination of administrative (read/write) access to some features, monitoring (read‑only) access to other features, and no access to other features.
You can also specify which access mechanisms (WebUI or the CLI) are available to the user.
Note - When users log in to the WebUI, they see only those features that they have read-only or read/write access to. If they have read-only access to a feature, they can see the settings pages, but cannot change the settings. |
Gaia includes these predefined roles:
You cannot delete or change the predefined roles.
Note - Do not define a new user for external users. An external user is one that is defined on an authentication server (such as RADIUS or TACACS) and not on the local Gaia system. |
Roles are defined in the User Management > Roles page of the WebUI.
To see a list of existing roles, select User Management > Roles in the navigation tree.
To add new role or change an existing role:
Important - A user with read/write permission to the User Management feature can change a user password, including that of the admin user. Be careful when assigning roles that include this permission. |
To delete a role:
Note - You cannot delete the adminRole, or monitorRole default roles. |
You can assign many users to a role from the Roles window.
To assign users to a role:
You can assign the many roles to a user from the Users page. You must work with the Users page to define access mechanism permissions (Web and/or command line) for users. A
To assign roles and access mechanisms to a user:
Description |
|
|||||||||||||||
Syntax |
add rba role <Name> domain-type System readonly-features <List> readwrite-features <List> add rba user <User name> access-mechanisms [Web-UI | CLI] add rba user <User Name> roles <List> delete rba role <Name> delete rba role <Name> readonly-features <List> readwrite-features <L delete rba user <User Name> access-mechanisms [Web-UI | CLI] delete rba user <User Name> roles <List> |
|||||||||||||||
Parameters |
|
|
||||||||||||||
Examples |
|
|||||||||||||||
Comments |
|
To define a new role or add features to an existing role:
Run:
add rba role <Name> domain-type System readonly-features <List>
readwrite-features <List>
role <Name>
- Role name as a character string that contains letters, numbers or the underscore (_) character. The role name must with a letter.readonly-features <List>
- Comma separated list of Gaia features that have read only permissions in the specified role.readwrite-features <List>
- Comma separated list of Gaia features that have read/write permissions in the specified role.To remove features from an existing role:
Run:
delete rba role <Name> readonly-features <List> readwrite-features <List>
role <Name>
- Role name as a character string that contains letters, numbers or the underscore (_) character. The role name must with a letter.readonly-features <List>
- Comma separated list of Gaia features that have read only permissions in the specified role.readwrite-features <List>
- Comma separated list of Gaia features that have read/write permissions in the specified role.To assign or remove roles to a user:
Run:
add rba user <User Name> roles <List>
delete rba user <User Name> roles <List>
user <User name>
- User to which access mechanism permissions and roles are assigned.roles <List>
- Comma separated list of role names that are assigned to or removed from the specified user.To Assign or remove access mechanisms (WebUI or CLI) for a user:
Run:
add rba user <User name> access-mechanisms [Web-UI | CLI]
delete rba user <User Name> access-mechanisms [Web-UI | CLI]
user <User name>
- Comma separated list of role names that are assigned to or removed from the specified user.Web-UI
- Add or remove permissions to use the WebUI.CLI
- Add or remove permissions to use the Gaia CLI.This section explains how to configure your platform to:
One of the important elements of securing your Check Point network security platform is to set user passwords and create a good password policy.
Note - The password policy does not apply to nonlocal users that authentication servers such as RADIUS manage their login information and passwords. Also, it does not apply to non-password authentication, such as the public key authentication supported by SSH. |
To set and change user passwords, see Users and Change My Password.
Password Strength
Strong, unique passwords that use a variety of character types and require password changes, are key factors in your overall network security.
Password History Checks
The password history feature prevents from users using a password they have used before when they change their password. The number of already used passwords that this feature checks against is defined by the history length. Password history check is enabled by default.
The password history check
These are some considerations when using password history:
Mandatory Password Change
The mandatory password change feature requires users to use a new password at defined intervals.
Forcing users to change passwords regularly is important for a strong security policy. You can set user passwords to expire after a specified number of days. When a password expires, the user is forced to change the password the next time the user logs in. This feature works together with the password history check to get users to use new passwords at regular intervals.
The mandatory password change feature does not apply to SNMPv3 USM user pass phrases.
Deny Access to Unused Accounts
You can deny access to unused accounts. If there has been no successful login attempt in a set period of time, the user is locked out and cannot log in. You can also configure the allowed number of days of non-use before a user is locked-out.
Deny Access After Failed Login Attempts
You can deny access after too many failed login attempts. The user cannot log in for a configurable period of time. You can also allow access again after a user has been locked out. Also, you can configure the number of failed login attempts that a user is allowed before being locked out. When one login attempt succeeds, counting of failed attempts stops, and the count is reset to zero.
Parameter |
Description |
Minimum Password Length |
The minimum number of characters of a password that is to be allowed for users or SNMP users. Does not apply to passwords that have already been set.
|
Disallow Palindromes |
A palindrome is a sequence of letters, numbers, or characters that can be read the same in each direction.
|
Password Complexity |
The required number of character types. Character types are: Upper case alphabetic (A-Z), Lower case alphabetic (a-z), Digits (0-9), Other (everything else). A value of "1" effectively disables this check. Changes to this setting do not affect existing passwords.
|
Parameter |
Description |
Check for Password Reuse |
Check for reuse of passwords. When a user's password is changed, the new password is checked against the recent passwords for the user. An identical password is not allowed. The number of passwords kept in the record is set by
|
History Length |
The number of former passwords to keep and check against for each user.
|
Parameter |
Description |
Password Expiration |
The number of days for which a password is valid. After that time, the password expires. The count starts when the user changes their passwords. Users are required to change an expired password the next time they log in. If set to
|
Warn users before password expiration |
The number of days before the password expires that the user starts getting warned they will have to change it. A user that does not log in will not see the warning.
|
Lockout users after password expiration |
Lockout users after password expiration. After a user's password has expired, they have this number of days to log in and change it. If they do change their password within that number of days they will be unable to log in: They are locked out. A value of
|
Force users to change password at first login after password was changed from Users page |
Force users to change password at first login after their password was changed using the command
|
Parameter |
Description |
Deny access to unused accounts |
Deny access to unused accounts. If there has been no successful login attempt in a set period of time, the user is locked out and cannot log in.
|
Days of non-use before lock-out |
Days of non-use before lock-out. The number of days in which a user has not (successfully) logged in before that user is locked out. This only takes effect if Deny access to unused accounts is selected.
|
Note - These configurations do not apply to the admin user. The admin user is not blocked irrespective of failed login attempts.
Parameter |
Description |
Deny access after failed login attempts |
If the configured limit is reached, the user is locked out (unable to log in) for a configurable period of time. Warning: Enabling this leaves you open to a "denial of service" -- if an attacker issues unsuccessful login attempts often enough you will be locked out. Please consider the advantages and disadvantages of this option, in light of your security policy, before enabling it.
|
Maximum number of failed attempts allowed |
This only takes effect if Deny access after failed attempts is enabled. The number of failed login attempts that a user is allowed before being locked out. After making that many successive failed attempts, future attempts will fail. When one login attempt succeeds, counting of failed attempts stops, and the count is reset to zero,
|
Allow access again after time |
Allow access again after a user has been locked out (due to failed login attempts). The user is allowed access after the configured time if there have been no login attempts during that time). This setting only takes effect if Deny access after failed login attempts is selected.
Examples: 60 - 1 minute 300 - 5 minutes 3600 - 1 hour 86400 - 1 day 604800 - 1 week |
Use these commands to set a policy for managing user passwords.
set password-controls min-password-length <6-128> palindrome-check <on |off> complexity
|
Parameter |
Description |
|
The minimum number of characters of a password that is to be allowed for users or SNMP users. Does not apply to passwords that have already been set.
|
|
A palindrome is a sequence of letters, numbers, or characters that can be read the same in each direction. On prevents passwords that are palindromes.
|
|
The required number of character types. Character types are: Upper case alphabetic (A-Z), Lower case alphabetic (a-z), Digits (0-9), Other (everything else). A value of "1" effectively disables this check. Changes to this setting do not affect existing passwords.
|
set password-controls history-checking <on|off> history-length <1-1000> |
Parameter |
Description |
|
Check for reuse of passwords. When a user's password is changed, the new password is checked against the recent passwords for the user. An identical password is not allowed. The number of passwords kept in the record is set by
|
|
The number of former passwords to keep and check against for each user.
|
set password-controls password-expiration
expiration-warning-days
expiration-lockout-days
force-change-when
|
Parameter |
Description |
|
The number of days for which a password is valid. After that time, the password expires. The count starts when the user changes their passwords. Users are required to change an expired password the next time they log in. If set to
|
|
The number of days before the password expires that the user starts getting warned they will have to change it. A user that does not log in will not see the warning.
|
|
Lockout users after password expiration. After a user's password has expired, they have this number of days to log in and change it. If they do change their password within that number of days they will be unable to log in: They are locked out. A value of
|
|
Force users to change password at first login after their password was changed using the command
|
set password-controls deny-on-nonuse enable
deny-on-nonuse allowed-days
|
Parameter |
Description |
|
Deny access to unused accounts. If there has been no successful login attempt in a set period of time, the user is locked out and cannot log in.
|
|
Days of non-use before lock-out. The number of days in which a user has not (successfully) logged in before that user is locked out. This only takes effect if
|
set password-controls deny-on-fail allow-after
deny-on-fail failures-allowed
deny-on-fail enable
|
Note - These configurations do not apply to the admin user. The admin user is not blocked irrespective of failed login attempts.
Parameter |
Description |
|
Deny access after too many failed login attempts. If the configured limit is reached, the user is locked out (unable to log in) for a configurable period of time. Warning: Enabling this leaves you open to a "denial of service" -- if an attacker issues unsuccessful login attempts often enough you will be locked out. Please consider the advantages and disadvantages of this option, in light of your security policy, before enabling it.
|
|
This only takes effect if The number of failed login attempts that a user is allowed before being locked out. After making that many successive failed attempts, future attempts will fail. When one login attempt succeeds, counting of failed attempts stops, and the count is reset to zero,
|
|
Allow access again after a user has been locked out (due to failed login attempts). The user is allowed access after the configured time if there have been no login attempts during that time). This setting only takes effect if
Examples: 60 - 1 minute 300 - 5 minutes 3600 - 1 hour 86400 - 1 day 604800 - 1 week |
|
This only takes effect if The number of failed login attempts that a user is allowed before being locked out. After making that many successive failed attempts, future attempts will fail. When one login attempt succeeds, counting of failed attempts stops, and the count is reset to zero,
|
Use these commands to view password Policy configuration
show password-controls all complexity deny-on-fail allow-after deny-on-fail enable deny-on-fail failures-allowed deny-on-nonuse allowed-days deny-on-nonuse enable expiration-lockout-days expiration-warning-days force-change-when history-checking history-length min-password-length palindrome-check password-expiration |
Example
> show password-controls all Password Strength Minimum Password Length 6 Password Complexity 2 Password Palindrome Check on Password History Password History Checking off Password History Length 10 Mandatory Password Change Password Expiration Lifetime 5 Password Expiration Warning Days 8 Password Expiration Lockout Days never Force Password Change When no Configuration Deny Access to Unused Accounts Deny Access to Unused Accounts off Days Nonuse Before Lockout 365 |
You can configure Gaia to authenticate Gaia users even when they are not defined locally. This is a good way of centrally managing the credentials of multiple Security Gateways. To define non-local Gaia users, you define Gaia as a client of an authentication server.
Gaia supports these types of authentication servers:
RADIUS
RADIUS (Remote Authentication Dial-In User Service) is a client/server authentication system that supports remote-access applications. User profiles are kept in a central database on a RADIUS authentication server. Client computers or applications connect to the RADIUS server to authenticate users.
You can configure your Gaia computer to connect to more than one RADIUS server. If the first server in the list is unavailable, the next RADIUS server in the priority list connects.
TACACS
The TACACS+ (Terminal Access Controller Access Control System) authentication protocol users a remote server to authenticate users for Gaia. All information sent to the TACACS+ server is encrypted.
Gaia supports TACACS+ for authentication only. Challenge-response authentication, such as S/Key, is not supported.
You can configure TACACS+ support separately for different services. The Gaia WebUI service is one of those for which TACACS+ is supported and is configured as the http service. When TACACS+ is configured for use with a service, Gaia contacts the TACACS+ server each time it needs to examine a user password. If the server fails or is unreachable, the user is authenticated via local password mechanism. If the user fails to authenticate via the local mechanism, the user is not allowed access.
Note - For TACACs authentication to work on a Virtual System, see the VSX guide administration Guide.
To configure a RADIUS server:
The Add New RADIUS Server window opens.
RADIUS Server Parameters
Parameter |
Description |
---|---|
Priority |
The RADIUS server priority is an integer between 0 and 999 (default=0). When there two or more RADIUS servers, Gaia connects to the server with the highest priority. Low numbers have the higher priority. |
Host |
RADIUS server host name or IP address (IPv4 or IPv6). |
UDP Port |
RADIUS server UDP port. The default port is 1812 as specified by the RADIUS standard. The range of valid port numbers is 1 to 65535. Warning - Firewall software frequently blocks traffic on port 1812. Make sure that you define a firewall rule to allow port 1812 traffic between the RADIUS server and Gaia. |
Shared Secret |
Shared secret used for authentication between the authentication server and the Gaia client. Enter the shared secret text string without a backslash. Make sure that the shared string defined on the Gaia client matches that which is defined on the authentication server. Some RADIUS servers have a maximum shared secret string length of 15 or 16 characters. See the documentation for your RADIUS server. |
Timeout in Seconds |
Optional: Enter the timeout period in seconds. The default value is 3. If there is no response after the timeout period, Gaia tries to connect to a different server. |
Network Access Server (NAS) |
Optional: An IP address of the Security Gateway interface. This parameter records the IP address that the RADIUS packet comes from. This address is stored in the RADIUS packet even when the packet goes through NAT or some other address translation, that changes the source IP of the packet. The NAS-IP-Address is defined in RFC2865. If no NAS IP Address is chosen, the IPv4 address of the Gaia host is used. |
Super User ID |
Optional: The UID for the RADIUS super user. Select 0 or 96. If the UID is 0 there is no need to run the |
To edit a RADIUS server:
The Edit RADIUS Server window opens.
To delete a RADIUS server:
The Remove RADIUS Server window opens.
Description
Use the
commands to add, configure, and delete Radius authentication servers.aaa radius-servers
Syntax
To configure RADIUS for use in a single authentication profile:
add aaa radius-servers priority VALUE host VALUE [ port VALUE ]
prompt-secret timeout VALUE
secret VALUE timeout VALUE
To delete a RADIUS configuration:
delete aaa radius-servers
priority VALUE
NAS-IP
To change the configuration of a RADIUS entry:
set aaa radius-servers priority VALUE
host VALUE
new-priority VALUE
port VALUE
prompt-secret
secret VALUE
timeout VALUE
set aaa radius-servers
super-user-uid VALUE
NAS-IP VALUE
To view a list of all servers associated with an authentication profile:
show aaa radius-servers list
To view the RADIUS server configuration:
show aaa radius-servers priority VALUE
host
port
timeout
show aaa radius-servers
super-user-uid
NAS-IP
Parameters
Parameter |
Description |
|
The RADIUS server priority is an integer between 0 and 999 (default=0). When there two or more RADIUS servers, Gaia connects to the server with the highest priority. Low numbers have the higher priority. |
|
The priority of the new RADIUS server |
|
Host name or the IP address (IPv4 or IPv6) of the RADIUS server |
|
UDP port on the RADIUS server. This value must match the port as configured on the RADIUS server. Typically this 1812 (default) or 1645 (non-standard but a commonly used alternative). |
|
Shared secret (password) text string. The system prompts you to enter the value. |
|
The number of seconds to wait for the server to respond. The default value 3 seconds. |
|
The shared secret used to authenticate the RADIUS server and the local client. You must define this value on your RADIUS server. |
|
The UID for the RADIUS super user. Select 0 or 96. If the UID is 0 there is no need to run the |
|
An IP address of the Security Gateway interface. This parameter records the IP address that the RADIUS packet comes from. This address is stored in the RADIUS packet even when the packet goes through NAT or some other address translation, that changes the source IP of the packet. The NAS-IP-Address is defined in RFC2865. If no NAS IP Address is chosen, the IPv4 address of the Gaia host is used. |
Example
show aaa radius-servers priority 1 host
Gaia acts as a RADIUS client. You must define a role for the RADIUS client, and the features for that role.
To configure Gaia as a RADIUS Client
radius-group-any
XXX
, for example), define the role:radius-group-XXX
For instructions, see Roles.
Note - Do not define a new user for external users. An external user is one that is defined on an authentication server (such as RADIUS or TACACS) and not on the local Gaia system. |
Non-local users can be defined on a RADIUS server and not in Gaia. When a non-local user logs in to Gaia, the RADIUS server authenticates the user and assigns the applicable permissions. You must configure the RADIUS server to correctly authenticate and authorize non-local users.
Note - If you define a RADIUS user with a null password (on the RADIUS server), Gaia cannot authenticate that user. |
To configure a RADIUS server for non-local Gaia users
Steel-Belted RADIUS server
/etc/radius-dictionaries/checkpoint.dct
to the server directory.vendor.ini
file on RADIUS server (keep in alphabetical order with the other vendor products in this file):vendor-product = Check Point Gaia dictionary = nokiaipso ignore-ports = no port-number-usage = per-port-type help-id = 2000 |
dictiona.dcm
file the line: “@checkpoint.dct”
FreeRADIUS server
/etc/radius-dictionaries/dictionary.checkpoint
(on Gaia) to /etc/freeradius/
(on the RADIUS server)./etc/freeradius/dictionary
the line: “$INCLUDE dictionary.checkpoint”
OpenRADIUS server
/etc/radius-dictionaries/dict.checkpoint
/etc/openradius/subdicts/
$include subdicts/dict.checkpoint
/etc/openradius/dictionaries
dict.ascend
Add this Check Point Vendor-Specific Attribute to users in your RADIUS server user configuration file:
CP-Gaia-User-Role = "role1,role2,...
For example:
CP-Gaia-User-Role = "adminrole, backuprole, securityrole"
Note - Make sure the role names match the existing roles in the Gaia system.
CP-Gaia-SuperUser-Access = <0|1>
- This user cannot receive superuser permissions0
- This user can receive superuser permissions1
To log in as a superuser
A user with super user permissions can use the Gaia shell to do system-level operations, including working with the file system. Super user permissions are defined in the Check Point Vendor-Specific Attributes.
Users that have a UID of 0 have super user permissions. They can run all the commands that the root user can run. Users that have a UID of 96 must run the
command to get super user permissions. The UIDs of all non-local users are defined in the file sudo
/etc/passwd
To get super user permissions (for users that have a UID of 96)
sudo /usr/bin/su -
The user now has superuser permissions
To configure a TACACS+ server:
The Add new TACACS+ Server window opens.
TACACS+ Parameters
Parameter |
Description |
---|---|
Priority |
The priority of the TACACS+ server. Must be unique for this operating system. The priority is used to:
|
Server |
The TACACS+ server IPv4 address. |
Shared Key |
The shared secret used for authentication between the authentication server and the Gaia client. Enter the shared secret text string without a backslash. Make sure that the shared string defined on the Gaia client matches that which is defined on the authentication server. |
Timeout in Seconds |
The maximum number of seconds to wait for the server to respond. |
To disable TACACS+ authentication:
To disable a TACACS+ server:
To make sure the logged in user is enabled for Tacacs+, run:
show tacacs_enable
Description |
Use the |
Syntax |
To add a TACACS+ server: add aaa tacacs-servers priority VALUE server VALUE key VALUE timeout VALUE To change the configuration of a TACACS+ server entry: set aaa tacacs-servers priority VALUE key VALUE new-priority VALUE server VALUE timeout VALUE set aaa tacacs-servers state VALUE To delete TACACS+ server from the list of servers: delete aaa tacacs-servers priority VALUE To see the configuration of the TACACS+ servers show aaa tacacs-servers list priority VALUE server priority VALUE timeout state |
Parameters
Parameter |
Description |
|
|
The priority of the TACACS+ server. Must be unique for this operating system. The priority is used to:
|
|
|
The TACACS+ server IPv4 address.
|
|
|
The shared secret used for authentication between the authentication server and the Gaia client. Enter the shared secret text string without a backslash. Make sure that the shared string defined on the Gaia client matches that which is defined on the authentication server.
|
|
|
The maximum number of seconds to wait for the server to respond.
|
|
|
The new priority. |
|
|
Range: On - Enable TACACS+ authentication for all servers. Off - Disable TACACS+ authentication for all servers. |
|
|
The list of TACACS+ servers that this system is configured to use. |
|
Example |
|
Gaia acts as a TACACS+ client for Gaia users that are defined on the TACACS+ server and are not defined locally on Gaia. The admin user must define a role called
for the TACACS+ users, and the features for the TACP-0 role. TACP-0
Privilege Escalation
The Gaia admin user can define roles that make it possible for Gaia users to temporarily get higher privileges than their regular privileges. For example, Gaia user Fred needs to configure the firewall, but his role does not support firewall configuration. To configure the firewall, Fred uses his user name together with a password given him by the admin user. This password let him change role to one that allows him to configure the firewall.
There are sixteen different privilege levels (0 – 15) defined in TACACS+. Each level can be mapped to a different Gaia role. For example, privilege level 0: monitor-only. Privilege level 1: Basic network configuration. Privilege level 15: admin user.
By default all non-local TACACS+ Gaia users are assigned the role
. The Gaia admin can define for them roles with the name TACP-0
, that give them different privileges. TACP-N
is a number from 1 to 15. The TACACS+ users can changes their own privileges by moving to another TACP-N role. To do this, the TACACS+ users need to get a password from the Gaia admin user. N
To configure Gaia as a TACACS+ Client:
admin
user.TACP-0
For instructions, see Roles.
TACP-N
where N
is a number from 1 to 15, and define the features for each role.To raise TACP privileges using the CLI:
After you are authenticated by the TACACS server, you will see the clish prompt. At this point you have the privileges of the TACP-0 role.
tacacs_enable TACP-N
Where N is the new TACP role (an integer from 1 to 15).
To go back to the TACP-0 role, press Ctrl+D.
To show if the currently logged in user is authenticated by TACACS+, run:
show tacacs_enable
To raise privileges using the WebUI
After you are authenticated by the TACACs server you have the privileges of the TACP-0 role.
TACP-N
role (N
is a number from 1 to 15), click Enable at the top of the Overview page.To go back to the TACP-0 role from a different TACP-N role, press Cntl+D or enter exit at the command prompt. The user automatically exits the current shell and goes back to TACP-0.
You can define Gaia users on a TACACS server instead of defining them on the Gaia computer. Gaia users that are defined on a TACACS server are called non-local users. Cisco ACS servers are the most commonly used TACACS+ servers. For help with the configuration of a Cisco ACS server as a TACACS+ server for Gaia clients, see sk98733.
Note - sk98733 is an example of best practices and not a replacement for the official Cisco documentation. |
When a non-local user logs in to Gaia, the TACACS server authenticates the user and assigns the permissions to the user. You must configure the TACACS server to correctly authenticate and authorize non-local Gaia users.
Note - If you define a TACACS user with a null password (on the TACACS server), Gaia cannot authenticate that user. |
You can define and configure groups with Gaia as you can with equivalent Linux‑based systems. This function is retained in Gaia for advanced applications and for retaining compatibility with Linux.
Use groups for these purposes:
For other functions that are related to groups, use the role‑based administration feature, described in "Role-Based Administration".
All users are assigned by default to the
group. You can edit a user’s primary group ID (using clish) to be something other than the default. However, you can still add the user to the users
group. The list of members of the users
group includes only users who are explicitly added to the group. The list of does not include users added by default.users
To see a list of all groups:
Choose User Management > System Groups in the navigation tree.
To add a group:
Group ID ranges 0-99 and 65531-65535 are reserved for system use. (GID 0 is reserved for users with root permissions and GID 10 is reserved for the predefined
groups). If you specify a value in the reserved ranges, an error message is displayed.Users
To add a member to a group:
To delete a member from a group:
To delete a group:
Description |
The commands in this section allow you to manage groups. |
||||||||
Syntax |
To view existing group members: show group VALUE To see existing groups: show groups To set the Group ID: set group VALUE gid VALUE To add a group or a group member: add group VALUE gid VALUE add group VALUE member VALUE To delete a group or a group member delete group VALUE member VALUE |
||||||||
Parameters |
|
GUI Clients are trusted hosts from which Administrators are allowed to log in to the Security Management Server.
Define which GUI clients (SmartConsoles) can connect to the Security Management Server.
To configure the GUI clients:
The Add GUI Client window opens.
All clients are allowed to log in, regardless of their IP address. This option only shows if ANY was not defined during the initial configuration.
Note - GUI clients can be deleted on the User Management > GUI Clients page. |
cpconfig
.A list of configuration options shows. For example:
Configuration Options: ---------------------- (1) Licenses and contracts (2) Administrator (3) GUI Clients (4) SNMP Extension (5) PKCS#11 Token (6) Random Pool (7) Certificate Authority (8) Certificate's Fingerprint (9) Disable Check Point SecureXL (10) Configure Check Point CoreXL (11) Automatic start of Check Point Products |
You can add or delete hosts, or create a new list.
New GUI clients can be added using these formats: