A10 5.0.1 Mas
A10 5.0.1 Mas
1
Management Access and Security
Guide
For A10 Thunder® Series TPS
7 October 2020
© 2020 A10 NETWORKS, INC. CONFIDENTIAL AND PROPRIETARY- ALL RIGHTS RESERVED
Information in this document is subject to change without notice.
PATENT PROTECTION
A10 Networks products are protected by patents in the U.S. and elsewhere. The following website is provided to satisfy the virtual patent marking provi-
sions of various jurisdictions including the virtual patent marking provisions of the America Invents Act. A10 Networks' products, including all Thunder
Series products, are protected by one or more of U.S. patents and patents pending listed at:
https://www.a10networks.com/company/legal-notices/a10-virtual-patent-marking
TRADEMARKS
A10 Networks trademarks are listed at:
https://www.a10networks.com/company/legal-notices/a10-trademarks
CONFIDENTIALITY
This document contains confidential materials proprietary to A10 Networks, Inc. This document and information and ideas herein may not be disclosed,
copied, reproduced or distributed to anyone outside A10 Networks, Inc. without prior written consent of A10 Networks, Inc.
Anyone who uses the Software does so only in compliance with the terms of the End User License Agreement (EULA), provided later in this document
or available separately. Customer shall not:
1. Reverse engineer, reverse compile, reverse de-assemble, or otherwise translate the Software by any means.
2. Sub-license, rent, or lease the Software.
DISCLAIMER
This document does not create any express or implied warranty about A10 Networks or about its products or services, including but not limited to fit-
ness for a particular use and non-infringement. A10 Networks has made reasonable efforts to verify that the information contained herein is accurate,
but A10 Networks assumes no responsibility for its use. All information is provided "as-is." The product specifications and features described in this pub-
lication are based on the latest information available; however, specifications are subject to change without notice, and certain features may not be
available upon initial product release. Contact A10 Networks for current information regarding its products or services. A10 Networks’ products and ser-
vices are subject to A10 Networks’ standard terms and conditions.
ENVIRONMENTAL CONSIDERATIONS
Some electronic components may possibly contain dangerous substances. For information on specific component types, please contact the manufac-
turer of that component. Always consult local authorities for regulations regarding proper disposal of electronic components in your area.
FURTHER INFORMATION
For additional information about A10 products, terms and conditions of delivery, and pricing, contact your nearest A10 Networks location, which can be
found by visiting www.a10networks.com.
Table of Contents
3
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder™ Series TPS
Contents
4
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder™ Series TPS
Contents
5
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder™ Series TPS
Contents
6
Feedback ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
ADMINISTRATOR ACCOUNTS
This chapter describes how to configure and modify administrator accounts for management access to ACOS
and provides the following information:
• Administrator Lockouts
By default, the ACOS device has one administrator account called admin. This account has global read/write
privileges and can configure additional administrator accounts with the following settings:
• A user interface that the administrator can use (CLI, GUI, or aXAPI)
7
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Additional Administrator Accounts
To configure an administrator account for “newadmin” who will have global read and write privileges:
1. Hover over System in the menu bar, then select Admin from the drop-down menu.
2. On the Users tab, click Create.
3. Enter “newadmin” in the Username field.
4. Enter and confirm the password for the new administrator account.
5. Verify that Enable is selected in the Status field (selected by default).
6. In the User Privilege field, select Read-Write.
7. In the Access Interface section, verify that all three user interfaces are selected (they should be selected
by default).
8. Click Apply.
9. Return to the Admin table and verify that the new administrator appears in the list.
8
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
2. To enable or disable access to a user interface, enter one of the following commands:
• To enable access to a user interface (for example, GUI access), enter the following command:
ACOS(config-admin:admin1)# access web
• To disable access to a user interface (for example, CLI) enter the following command:
ACOS(config-admin:admin1)# no access cli
To delete an admin account, you first must terminate any active sessions the administrator account has
open. The account is not deleted if open sessions exist.
9
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Additional Administrator Accounts
1. Use the show admin session command to view active admin sessions on the device:
ACOS(config)# show admin session
Id User Name Start Time Source IP Type Partition Authen Role
Cfg
------------------------------------------------------------------------------------------------
------------
*98 admin 03:11:31 IST Wed Aug 24 2016 172.17.0.224 CLI Local Read-
WriteAdmin Yes
100 admin2 03:16:08 IST Wed Aug 24 2016 172.17.12.238 CLI Local Read-
WriteAdmin No
2. Use the clear admin session command to clear a specific admin session. In this example, we will clear
session ID 100, for admin2:
ACOS(config)# clear admin session 100
3. Use the no admin command to delete the admin (in this example, we are deleting admin2):
ACOS(config)# no admin admin2
By this command, sessions (if any) with this admin will be automatically logout. Continue? [yes/
no]:yes
4. Use the show admin session and show admin commands to verify that the admin is removed (in this exam-
ple, admin2 should no longer appear in the output:
ACOS(config)# show admin session
Id User Name Start Time Source IP Type Partition Authen Role
Cfg
------------------------------------------------------------------------------------------------
------------
96 admin 02:53:18 IST Wed Aug 24 2016 172.17.0.224 WEB Local Read-
WriteAdmin No
*98 admin 03:11:31 IST Wed Aug 24 2016 172.17.0.224 CLI Local Read-
WriteAdmin Yes
ACOS(config)(UNSUPPORTED-PLATFORM)# show admin
10
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
This section describes how to recover in the event your admin password is lost.
This procedure can only be performed through the security console, and only within the first five minutes of
rebooting the ACOS device.
1. Use the show version or show hardware commands and record the serial number for your device.
2. Reboot the ACOS device.
3. Connect to the serial console.
4. When prompted for the user name and password, enter the following:
User Name: reset
Password: serial number for your device
Use the serial number recorded in step 1, or locate the serial number on the rear of your ACOS device.
5. After logging in, the CLI presents the following questions:
a. Do you want to reset admin password to default?[y/n]:
Answering y to this question resets the admin user name and password to the factory default admin
and a10.
b. Do you want to reset enable password to default?[y/n]:
Answering y to this question resets the enable password to the factory default, which is no password.
c. Do you want to erase startup config?[y/n]:
Answering y to this question clears the startup config, thus returning the device to its factory default
settings.
CAUTION: Answering y to this questions means you must reconfigure the device.
11
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Administrator Lockouts
6. Answer y to the first question so that you can log on to the device; answer the other two questions as
desired for your needs.
7. After you log on to the device, change the admin password for security purposes.
Administrator Lockouts
By default, there is no limit to the number of times you can enter an incorrect password with an administrator
account to log in. You can enable the ACOS device to lock administrator accounts for a period after a specific
number of invalid passwords have been entered.
• Lockout Parameters
Lockout Parameters
Table 1 lists the administrator lockout parameters that you can configure.
12
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
• To lock the administrator account after, for example, 5 failed login attempts and set the ACOS device to
remember the previous failed login for 10 minutes, enter the following commands:
ACOS(config)# admin-lockout reset-time 10
1. To view the lockout status of the account for “admin1”, enter the following command:
ACOS(config)# show admin admin1 detail
2. To unlock an admin account, access the configuration level for the admin, then enter the unlock com-
mand:
ACOS(config)# admin admin1
ACOS(config-admin:admin1)# unlock
13
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Administrator Lockouts
14
Feedback ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
By default, certain types of management access through the ACOS device’s Ethernet interfaces are blocked.
This chapter describes how to configure management access based on the interface.
You can enable or disable management access for each access type and interface. You also can use an
Access Control List (ACL) to permit or deny management access through the interface by using specific
hosts or subnets.
15
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Configuring Access by Using Access Control Lists
The management interface supports only one ACL, which can be bound to the interface as an enable-
management ACL or directly to the interface as a filter. To replace the current ACL with a different one, you
must first remove the ACL that is currently bound to the interface.
Additionally, if you apply an enable-management ACL to the management interface, an ACL for an individual
service is not supported. For example, you cannot enter the following rule on the management interface:
Data interfaces can support multiple ACLs, including multiple enable-management ACLs. If a data interface
has multiple enable-management ACLs, the ACLs are applied in the following order:
1. enable-management service
{ping | ssh | telnet | http | https} acl {id | name}
{ethernet port-num [to port-num] | ve ve-num
[to ve-num]}
16
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
Each ACL has an implicit deny any any rule at the end. If the management traffic’s source address does not
match a permit rule in the ACL, the implicit deny any any rule is used to deny access.
The following example command disables HTTP access to the out-of-band management interface:
To enable management access, enter the enable-management service command at the global configuration
level of the CLI:
The following example shows an ACOS device with 12 Ethernet data ports. In this example, all the access
settings are set to their default values:
17
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Regaining Access if You Accidentally Block All Access
18
Feedback ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
By default, access to the ACOS management GUI is enabled and is secure. A valid administrator username
and password are required to log in.
Default: 10 minutes
aXAPI Timeout Number of minutes an aXAPI session can remain 0-60 minutes. If you specify
idle before being terminated. Once the aXAPI ses- 0, sessions never time out.
sion is terminated, the session ID generated by the
ACOS device for the session is no longer valid. Default: 10 minutes
NOTE: If you disable HTTP or HTTPS access, sessions on the management GUI are
immediately terminated.
19
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Configure Web Access
• By default, the web server is enabled on the system. The following command disabled the web server:
ACOS(config)# web-service server disable
20
Feedback ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
ACOS provides an option to simplify management access through the CLI, with support for public key
authentication.
Public key authentication allows an ACOS administrator to log in through SSH without entering a password.
When the administrator enters a username and presses Enter, the SSH client on the administrator’s
computer sends a signature file for the administrator. The ACOS device compares the signature file to the
administrator’s public key that is stored on the ACOS device. If they match, the administrator is granted
access.
The following example show you how to generate a key pair from a remote client with the administrator
account admin2:
NOTE: At the passphrase prompts, press Enter and do not enter any characters.
21
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Importing the Public Key to the ACOS Device
NOTE: The admin account has root privileges and can manage the public certificates
for all administrators. Other administrators accounts can manage only the public
key that belongs to that administrators account.
The following example shows you how to import a public key for the administrator user admin2:
For more information, see the admin command in the Command Line Interface Reference, in the section were
the ssh-pubkey import command is described.
You can enter the ssh-pubkey list command to view the public keys on your system.
The num option specifies the key number on the ACOS device. You can display the key numbers and the keys
by entering the ssh-pubkey list command.
22
Feedback ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
You can configure the ACOS device to use remote servers for Authentication, Authorization, and Accounting
(AAA) for administrative sessions. The ACOS device supports RADIUS, TACACS+, and LDAP servers.
• Authentication
• Authorization
• Configure Accounting
For information about LDAP support, see “Lightweight Directory Access Protocol” on page 59.
Authentication
Authentication grants or denies access to the device based on the credentials provided by the user (admin
user name and password).
By default, when someone attempts to log in to the ACOS device, the device determines whether the
username and password exist in the local administrative database. Without additional configuration, the
authentication process stops at this point. If the administrator username and password exist in the local
database, the user is granted access; otherwise, access to the device is denied.
You can configure the ACOS device to also use external RADIUS, TACACS+ or LDAP servers for
authentication.
You can specify multiple methods for authenticating ACOS administrators. For example, you can configure
the ACOS device to try the these servers in the following order:
1. LDAP
23
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Authentication
2. TACACS+
3. RADIUS
4. Local database
In this example, the ACOS device tries to use the LDAP servers first. If no LDAP servers respond, the ACOS
device tries to use the TACACS+ servers. If no TACACS+ servers respond, the ACOS device tries the RADIUS
servers. If no RADIUS servers respond, the ACOS device uses the local database.
Tiered Authentication
You can enable the ACOS device to check the next method if the primary method does respond and
authentication fails. This option is called “tiered authentication”. For example, the primary method is RADIUS
and the next method is TACACS+. If RADIUS rejects the administrator, tiered authentication attempts to
authenticate the administrator by using TACACS+.
24
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
Table 4 provides information about the ACOS authentication behavior based on tiered authentication.
2. Only if no method1 servers reply, try method2. If a method2 server replies, permit or
deny access based on the server reply.
3. Only if no method2 servers reply, try method3. If a method3 server replies, permit or
deny access based on the server reply.
4. Only if no method3 servers reply, try method4. If authentication succeeds, the admin is
permitted. Otherwise, the admin is denied.
Multiple 1. Try method1. If a method1 server replies, permit access based on the server reply.
2. If no method1 servers reply or a method1 server denies access, try method2. If a meth-
od2 server replies, permit access based on the server reply.
3. If no method2 servers reply or a method2 server denies access, try method3. If a meth-
od3 server replies, permit access based on the server reply.
4. If no method3 servers reply or a method3 server denies access, try method4. If authen-
tication succeeds, the admin is permitted. Otherwise, the admin is denied.
By default, tiered authentication is disabled and is set to single. You can enable it on a global basis.
Authentication Process
You can specify whether to check the local database or the remote server first. Figure 1 and Figure 2 show
the authentication processes that are used if the ACOS device is configured to check remote AAA servers
first.
If the RADIUS, TACACS+, or LDAP server responds, the local database is not checked, and one of the
following situations occurs:
• If the administrator’s credentials are found on the RADIUS, TACACS+, or LDAP server, the administrator
is granted access.
• If the administrator credentials are not found on the RADIUS, TACACS+, or LDAP server, the administra-
tor is denied access.
If there is no response from RADIUS, TACACS+, or LDAP server, the ACOS device checks its local database for
the administrator name and password.
25
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Authentication
NOTE: An exception is made for the admin account; by default, the ACOS device always
uses local authentication for admin.
Local authentication can be disabled for admin, in which case the authentication
process is the same as for other administrator accounts. For more information,
see “Disabling Local Authentication for the Administrator Account by Using the
CLI” on page 27.
FIGURE 1 : Authentication Process When Remote Authentication Is First (two remote servers configured) –
RADIUS
26
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
FIGURE 2 : Authentication Process When Remote Authentication Is First (one remote server configured) –
TACACS+
Disabling Local Authentication for the Administrator Account by Using the CLI
By default, the ACOS device always locally authenticates admin even if RADIUS, TACACS+, or LDAP is used as
the primary authentication method.
To disable automatic local authentication for the administrator account, access the admin configuration level
for the admin you want to disable, then use the disable command. For example:
NOTE: If the RADIUS, TACACS+, or LDAP server can not be reached, the ACOS device
then uses local authentication for admin. This behavior is also used for other
administrator accounts when the remote AAA server can not be reached.
27
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Authentication
The ACOS Series supports RSA token-based RADIUS authentication, which provides additional login security
by requiring the administrator to enter a string and a token in addition to the username and password. This
enhancement supports the Access-Challenge function in RFC 2865.
After the administrator enters a username and a password, the ACOS device sends the credentials to the
RADIUS server. If the username and password are valid, and the server is configured to use token-based
authentication, the server replies with an Access-Challenge message. The ACOS device displays a prompt for
the required token.
The ACOS device attempts to verify the token, and one of the following situations occurs:
• If the token is invalid, even though the username and password are valid, access is denied.
By default, support for token-based RADIUS authentication is enabled and can not be disabled. No additional
configuration is required on the ACOS device.
In the following CLI example, an administrator initiates the log in process by entering a username and a
password. The ACOS device presents a challenge value and prompts for the response.
ACOS>
28
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
Authorization
You can configure authorization based on the following:
You can deny an administrator access to the ACOS device by using one or more of the following user
interfaces:
• CLI
• GUI
• aXAPI
A10-Admin-Access-Type
• cli
• web
• axapi
To authorize access to more than one user interface, enter a comma between each value. For example, to
authorize access to the CLI and web interfaces, enter cli,web.
a10-access-type=user-interface
29
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Authorization
• cli
• web
• axapi
To authorize access to more than one user interface, enter a comma between each value, for example,
a10-access-type=cli,web
The privileges for each admin are the same across all three user interfaces. For example, if you create an
admin with global read and write privileges, then the same privileges apply to both the CLI and GUI.
It is not required to assign a privilege level to an ACOS admin on the RADIUS or TACACS+ server used to
authenticate the admin. The ACOS device uses the GUI access role assigned to the admin in the admin’s
account on the ACOS device.
However, if a privilege level is assigned to the admin on the RADIUS or TACACS+ server, that privilege level
must match the privilege assigned to the admin in the ACOS configuration. Otherwise, the admin will be
denied access.
30
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
Table 5 lists the RADIUS and TACACS+ privilege levels that match the GUI privileges.
TABLE 5 : RADIUS / TACACS+ Privilege Levels and Matching GUI Access Roles
Privilege Level
GUI Access Role RADIUS TACACS+
ReadWriteAdmin 2 15
ReadOnlyAdmin 1 0
A10-Admin-Role = "ReadWriteAdmin"
NOTE: The A10-Admin-Privilege option applies only to GUI access. It does not restrict
CLI or aXAPI access.
a10-admin-role=role-name
NOTE: This attribute-value pair applies only to GUI access. It does not restrict CLI or
aXAPI access.
You can configure the ACOS device to use external RADIUS, TACACS+, or LDAP servers to authorize CLI
commands. After a successful authentication, the authenticated party is granted access to specific system
resources by authorization. For an ACOS administrator, authorization specifies the CLI levels that they can
access.
• backup
31
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Authorization
• config
• import
• locale
• reboot
• reload
• shutdown
The first line grants access to the User EXEC level and Privileged EXEC level. The administrator’s CLI session
begins at the User EXEC level. The administrator can access the Privileged EXEC level without entering an
enable password, but the administrator cannot access the configuration level:
ACOS> enable
ACOS#
The second line grants access to all levels, and the administrator’s CLI session begins at the Privileged EXEC
level:
ACOS#
For more information, see “RADIUS Authorization Based on Service-Type” on page 34.
32
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
• Configure the TACACS+ server to authorize or deny the execution of specific commands or command
groups.
• Configure the ACOS device to send commands to the TACACS+ server for authorization before execut-
ing those commands.
This authorization process does not apply to administrators who log in by using the GUI. For more
information, see “Authorizing Admin Privileges” on page 30.
You can use TACACS+ to authorize an administrator to execute commands at one of the following CLI access
levels:
• 15 (admin) – This is the most extensive level of authorization. The commands at all CLI levels, including
those used to configure administrative accounts, are sent to TACACS+ for authorization.
• 14 (config) – Commands at all CLI levels, except the commands that are used to configure administra-
tive accounts, are sent to TACACS+ for authorization. The commands that are used to configure admin-
istrator accounts are automatically allowed.
• 1 (admin) – This is the most extensive level of authorization and is the same as access level 15. The
commands at the Privileged EXEC and User EXEC levels are sent to TACACS+ for authorization, and the
commands at other levels are automatically allowed.
• 0 (user EXEC) – This is the equivalent of Read-only privileges. The commands at the User EXEC level
are sent to TACACS+ for authorization, and the commands at other levels are automatically allowed.
Access levels 1-15 grant access to the Privileged EXEC level or higher, without challenging the administrator
for the enable password. Access level 0 grants access only to the User EXEC level.
NOTE: Privilege level 1 supports Read-write or admin privileges. The highest privilege
level is 1 and 15 (Read-write), and the lowest privilege level is 0 (Read-only).
You can enable the following TACACS+ debug levels for troubleshooting:
• 0x1 – Common system events such as “trying to connect with TACACS+ servers” and “getting response
from TACACS+ servers”. These events are recorded in the syslog.
• 0x2 – Packet fields sent out and received by the Thunder Series device, not including the length fields.
These events are written to the terminal.
• 0x4 – Length fields of the TACACS+ packets will also be displayed on the terminal.
33
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Configure Accounting
• 0x8 – Information about TACACS+ MD5 encryption will be sent to the syslog.
The ACOS device supports the RADIUS Service-Type attribute values listed in Table 6:
ACOS>
Service-Type=NAS Prompt Allows access to the Privileged EXEC level of the CLI and read-only
access to the GUI. The Privileged EXEC level of the CLI is denoted by
the following prompt (as an example):
ACOS#
Service-Type=Administrative Allows access to the configuration level of the CLI and read-only
access to the GUI. The configuration level of the CLI is denoted by the
following prompt (as an example):
ACOS(config)#
By default, if the Service-Type attribute or the A10 vendor attribute is not used, successfully authenticated
administrators are authorized for read-only access. You can change the default privilege that is authorized by
RADIUS from read-only to read-write. To change the default access level authorized by RADIUS, enter the
following command at the global configuration level of the CLI:
Configure Accounting
Accounting keeps track of user activities while the user is logged on. You can configure the ACOS device to
use external RADIUS or TACACS+ for accounting for the following activities:
When the user logs in, the accounting process starts, and when the user logs off, the accounting process
stops.
• Commands
34
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
Table 7 shows the CLI levels in which you can use TACACS+ servers to track attempts to execute commands:
NOTE: Command levels 2-13 are equivalent to command level 1 (privileged EXEC).
The same debug levels that are available for TACACS+ Authorization are also available for TACACS+
Accounting. For more information, see “TACACS+ Authorization Debug Options” on page 33.
35
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Configuring Authentication, Authorization, Accounting and for Administrator Access
• If you are using RADIUS, specify the admin privileges for the CLI and GUI.
• If you are using LDAP, for more information, see “Lightweight Directory Access Protocol” on
page 59.
2. To use RADIUS, TACACS+, or LDAP for authentication:
a. Add the RADIUS, TACACS+, or LDAP server(s) to the ACOS device.
b. Add a RADIUS, TACACS+, or LDAP server as an authentication method to use with the local database.
c. To use more than one AAA protocol, see “Authentication” on page 23.
3. Configure the authorization:
a. Add the TACACS+, RADIUS, or LDAP servers for authentication, if necessary.
b. Specify the access level:
• If you are using TACACS+, specify the CLI command levels to be authorized.
• If you are using RADIUS, specify the admin privilege levels for CLI and GUI.
• If you are using LDAP, see “Lightweight Directory Access Protocol” on page 59.
4. Configure accounting:
a. Add the TACACS+, RADIUS, or LDAP servers for authorization, if necessary.
b. Specify whether to track logon/logoff activity.
You can track log ons and log offs, log offs only, or neither.
c. If you are using TACACS+, specify the command levels to track.
Configuring Authentication
You can configure remote authentication by using the GUI or the CLI.
There are no mandatory fields that need to be completed on the Authentication Settings page; you can
configure your desired global authentication settings as needed. Refer to the GUI online help for more
information about the fields on this page.
Click Apply when you are finished specifying your desired configuration.
36
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
The first RADIUS server configured will act as the primary server and the ACOS device will attempt to use this
server first for authentication. You can configure additional RADIUS servers as needed, if you want to have
any backup servers.
The first TACACS server configured will act as the primary server and the ACOS device will attempt to use this
server first for authentication. You can configure additional TACACS servers as needed, if you want to have
any backup servers.
37
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Configuring Authentication, Authorization, Accounting and for Administrator Access
The first LDAP server configured will act as the primary server and the ACOS device will attempt to use this
server first for authentication. You can configure additional LDAP servers as needed, if you want to have any
backup servers.
For more information on LDAP servers, refer to “Lightweight Directory Access Protocol” on page 59.
Password Self-Service
ACOS supports TACACS+ TAC_PLUS_AUTHEN_CHPASS (password change) messages. When this option is
enabled on the TACACS+ server, the server sends a TACACS+ TAC_PLUS_AUTHEN_CHPASS message in
response to an authentication request from the ACOS device. The ACOS device prompts the administrator for
the current and new passwords and sends the password change to the TACACS+ server. The ACOS device
then grants access to the administrator.
Password self-service is enabled by default and cannot be disabled and is activated only when the TACACS+
server sends a password change message.
38
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
To enable direct access to the Privileged EXEC level of the GUI for TACACS+-authenticated admins:
To enable access to the Privileged EXEC level of the CLI for TACACS+-authenticated administrators, enter the
following command at the global configuration level:
• RADIUS Authentication
• TACACS+ Authorization
• TACACS+ Accounting
RADIUS Authentication
The following commands configure a pair of RADIUS servers for remote authentication and configure the
ACOS device to use these servers before using the local database. Since the RADIUS server 10.10.10.12 is
added first, this server is used as the primary server. Server 10.10.10.13 is used only if the primary server is
unavailable.
39
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Remote AAA CLI Examples
TACACS+ Authorization
The following commands configure the ACOS device to use TACACS+ server 10.10.10.13 to authorize
commands at all CLI levels. In this example, the none option is not used. As a result, if TACACS+ authorization
cannot be performed, for example, due to server unavailability, the command is denied.
TACACS+ Accounting
The following commands configure the ACOS device to use the same TACACS+ server for the accounting of
log on, log off, and all command activity:
This example shows the ACOS commands that you can enter to complete the following tasks:
• Display the changes that you can make on the RADIUS server
The RADIUS server in this example is freeRADIUS, the IP address is 192.168.1.157, and the shared secret is
a10rad.
1. On the ACOS device, to add the RADIUS server and enable RADIUS authentication, enter run the follow-
ing commands:
ACOS(config)# radius-server host 192.168.1.157 secret a10rad
ACOS(config)# authentication type local radius
40
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
a. In the /usr/local/etc/raddb/clients.conf file, to add the ACOS device as a client, enter the following
commands:
client 192.168.1.0/24 {
secret = a10rad
shortname = private-network-1
}
NOTE: In this example, the ACOS device’s subnet is added as the client.
NOTE: After authenticating an administrator, the RADIUS server must return the
A10-Admin-Privilege attribute, with one of the values shown in the following
example.
# A10-Networks dictionary
# Created by Software Tools of A10 Networks.
#
VENDOR A10-Networks 22610
BEGIN-VENDOR A10-Networks
ATTRIBUTE A10-App-Name 1 string
ATTRIBUTE A10-Admin-Privilege 2 integer
ATTRIBUTE A10-Admin-Access-Type 4 string
ATTRIBUTE A10-Admin-Role 5 string
VALUE A10-Admin-Privilege Read-only-Admin 1
VALUE A10-Admin-Privilege Read-write-Admin 2
END-VENDOR A10-Networks
c. In the /usr/local/share/freeradius/dictionary directory, to add the file to the dictionary, enter the
following command:
$INCLUDE dictionary.a10networks #new added for a10networks
d. In the /usr/local/etc/raddb/users file, to add each ACOS admin as a user, enter the following com-
mands:
###################################
41
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Windows IAS Setup for RADIUS
1. On the IAS server, create the following access groups (see “Configure Access Groups” on page 42):
• ACOS-Admin-Read-Only
• ACOS-Admin-Read-Write
2. On the IAS server, configure a RADIUS client for the ACOS device (“Configure RADIUS Client for ACOS
Device” on page 44).
3. On the IAS server, configure the following remote access policies (“Configure Remote Access Policies” on
page 45):
• ACOS-Admin-Read-Only-Policy
• ACOS-Admin-Read-Write-Policy).
4. On the IAS server, add AD users to appropriate ACOS device access groups (“Add Active Directory Users
to ACOS Access Groups” on page 55).
5. Register the IAS server in AD (“Register the IAS Server in Active Directory” on page 56).
6. Configure RADIUS on the ACOS device (“Configuring RADIUS on the ACOS Device” on page 57).
7. Test the configuration by attempting to log onto the ACOS device with AD users added in step 4 (“Verify-
ing the Configuration” on page 57).
The following sections provide detailed steps for each of these tasks.
To configure access groups, select Start > All programs > Administrator tools > Active directory user
and computers.
42
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
If AD is not installed on the IAS server, you can use the following steps to add the users and groups. However,
the rest of this section assumes that AD will be used.
1. Open the Computer Management tool by selecting Start > Programs > Administrative Tools > Com-
puter Management.
2. Open the System Tools and Local Users and Groups items, if they are not already open.
3. Right click on Group and select New Group.
4. Enter the following information for the first group:
• Group Name – AX-Admin-Read-Only
• Group Description – Read-Only Access to ACOS devices
• Members – Add the members using the Add button.
5. Click Create.
6. Enter the following information for the second group:
• Group Name – AX-Admin-Read-Write
• Group Description – Read-Write to ACOS devices
• Members – Add members as desired using the Add button
7. Click Create.
43
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Windows IAS Setup for RADIUS
8. Click Close.
1. Open Internet Authentication Service, by selecting Start > Programs > Administrative Tools > Inter-
net Authentication Service.
2. Right-click on Client and select New Client.
3. Enter the following information in the Add Client dialog box:
• Friendly name – Useful name for the ACOS device; for example, ACOS2000_slb1
• Protocol – RADIUS
NOTE: 192.168.1.238 is the IP address of the ACOS device that will use the IAS server
for external RADIUS authentication.
4. Click Next.
5. Enter the following information in the Add RADIUS Client dialog box:
• Client address – IP address or domain name for the client (ACOS device)
44
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
NOTE: Do not select “Request must contain the Message Authenticator attribute”.
ACOS RADIUS authentication does not support this option.
6. Click Next.
45
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Windows IAS Setup for RADIUS
3. Click Next.
4. In the Add Remote Access Policy dialog box, click Add.
5. In the Select Attribute dialog box, double-click Client Friendly Name.
6. In the Client-Friendly-Name dialog box, enter the friendly name used to define the ACOS device (for
example, AX-Admin-Read-Only-Policy) and click OK.
7. In the same Add Remote Access Policy dialog box as before, click Add again.
8. In the Select Attribute dialog box, double-click Windows-Groups.
46
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
9. In the Groups dialog box, click Add, then double-click AX-Admin-Read-Only group, Click OK to add the
group, then click OK once more to confirm the groups.
47
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Windows IAS Setup for RADIUS
10.In the same Add Remote Access Policy dialog box as before, click Next.
48
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
49
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Windows IAS Setup for RADIUS
50
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
13. In the Edit Dial-in Profile dialog box, select the Authentication tab. Select the type of authentication you
are using: CHAP and PAP.
51
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Windows IAS Setup for RADIUS
16.In the Multivalued Attribute Information dialog box, click Add and enter the following:
52
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
53
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Windows IAS Setup for RADIUS
18.Click OK for the Configure VSA, Vendor-Specific Attribute Information, and Multivalued Attribute Infor-
mation dialog boxes.
19. Click Close in the Add Attributes dialog box.
20.Click OK in the Edit Dial-In Profile dialog box. Optionally, read the suggested help by clicking OK.
21. Click Finish in the Add Remote Access Policy dialog box.
22.To create the second Remote Access Policy, repeat the above steps with the following changes:
• Policy Friendly name – AX-Admin-Read-Write-Policy
• Group to add – AX-Admin-Read-Write
• Attribute value – 2
54
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
1. In the Active Directory management console, add the ACOS access group to the user, tester1:
55
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Windows IAS Setup for RADIUS
The IAS RADIUS server must be registered with AD. Otherwise, RADIUS will use compatibility mode instead of
AD to authenticate users.
56
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
To add the RADIUS server (IAS server) to the ACOS device, enter the following commands:
NOTE: Ensure that the shared secret is the same as the value that you specified for the
RADIUS client that you configured for the ACOS server on the IAS server.
In this example, 192.168.230.10 is the IP address of w2003-10.com, and shared-secret is the secret that you
entered in the step 5 in “Configure RADIUS Client for ACOS Device” on page 44.
57
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Windows IAS Setup for RADIUS
58
Feedback ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
This chapter describes how an ACOS device can use Lightweight Directory Access Protocol (LDAP), an AAA
protocol, to authenticate administrators and authorize management access based on the account
information on external LDAP servers.
Either OpenLDAP or Microsoft Active Directory (AD) can be used as the LDAP server.
2. To add the LDAP server(s) to the ACOS configuration, enter the ldap-server host command. For exam-
ple:
ACOS(config)# ldap-server host 192.168.4.0 cn cn dn example-dn-string port 638 ssl timeout 5
59
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Configuring an LDAP Server
4. Test the configuration by using an ACOS administrator account to log in to the LDAP server.
To enable LDAP authentication, enter the following command at the global configuration level of the CLI:
• To use backup methods, specify the methods in the order in which you want to use them. For more
information, see “Multiple Authentication Methods” on page 23 and “Tiered Authentication” on page 24.
For example:
ACOS(config)# authentication type ldap local radius tacplus
• To configure an LDAP server on the ACOS device, use the ldap-server host command at the global
configuration level of the CLI:
ACOS(config)# ldap-server host 192.168.101.24 cn UserName dn cn=UserName,dc=UserAccount,dc=exam-
ple,dc=com
Do not use quotation marks for the dn option. For example, the following DN string syntax is valid:
60
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
cn=xxx3,dc=mACOScrc,dc=com
To use nested OUs, specify the nested OU first, then the root. For example, a user account could be
nested in the following way:
Root OU= Service Accounts -> OU=StaffElevatedAccounts -> UserAccUser1
For more information about these commands, see “ldap-server” in the System Configuration and
Administration Guide.
To configure an OpenLDAP server and provide authentication and authorization for ACOS administrators:
1. Add the A10 schema file by copying the file and pasting it in the following location:
openldap_install_directory\schema
The following text is an example of the schema file that is required on the OpenLDAP server to provide
authentication and authorization to ACOS administrators:
61
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Configuring an OpenLDAP Server
attributetype ( 1.3.6.1.4.1.22610.300.1.1
NAME 'A10AdminRole'
DESC 'admin Role'
syntax 1.3.6.1.4.1.1466.115.121.1.15
SINGLE-VALUE )
attributetype ( 1.3.6.1.4.1.22610.300.1.2
NAME 'A10AdminPartition'
DESC 'admin Partition'
EQUALITY caseIgnoreMatch
SUBSTR caseIgnoreSubstringsMatch
syntax 1.3.6.1.4.1.1466.115.121.1.15 )
attributetype ( 1.3.6.1.4.1.22610.300.1.3
NAME 'A10AccessType'
DESC 'admin Access Type'
syntax 1.3.6.1.4.1.1466.115.121.1.15
SINGLE-VALUE )
objectclass ( 1.3.6.1.4.1.22610.300.2.1
NAME 'A10Admin' SUP top AUXILIARY
DESC 'A10 Admin object class '
MAY ( A10AdminRole $ A10AdminPartition $ A10AccessType ) )
The LDAP schema file for ACOS administrator authentication and authorization contains the following items:
• A10Admin – This is the object class for A10 Networks, and can contain one or more of the following
attribute types. You can specify the values to assign to these attributes in the definition file for the
administrator. (See “A10 Administrator Account Files for LDAP” on page 63.)
• A10AdminRole – This attribute type specifies the administrator’s role, which defines the scope of read-
write operations the administrator is allowed to perform on the ACOS device. The ACOS device has the
following predefined roles:
• ReadOnlyAdmin
• ReadWriteAdmin
• PartitionSlbServiceOperator
• PartitionReadOnly
• PartitionReadWrite
62
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
To specify one of these roles in the definition file for the administrator account, use the role name as the
attribute value. For example:
A10AdminRole: ReadWriteAdmin
If you do not use this attribute in the definition file for the administrator account, the ReadOnlyAdmin role
is assigned to the administrator.
• A10AdminPartition – This attribute type specifies the ACOS partition the administrator is authorized to
log onto.
• For the shared partition, enter “shared”. For example:
A10AdminPartition: shared
If you do not use this attribute in the definition file for the administrator account, the administrator is
allowed to log into the shared partition.
• A10AccessType – This attribute type specifies the user interface(s) the administrator authorized to use.
You can specify one or more of the following:
• cli – CLI
• web – GUI
• axapi – aXAPI
If you do not use this attribute in the definition file for the administrator account, the admin is allowed to
log in though any of these interfaces.
Administrator accounts managed by an LDAP server are stored in files on the server.
dn: cn=user1,dc=my-domain,dc=com
cn: user1
objectClass: top
objectClass: person
objectClass: organizationalPerson
objectClass: inetOrgPerson
objectClass: A10Admin
userPassword: 123456
sn: sn
ou: guest
63
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Configuring Microsoft Active Directory
A10AdminRole: ReadWriteAdmin
This file configures admin “user1”. The objectClass value A10Admin and the A10AdminRole attribute are specific
to A10 Networks and are defined in the schema file, which also must be added to the LDAP server.
Summary:
NOTE: If you plan to use the default settings for all the A10 attributes, you can skip this
step.
64
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
65
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Configuring Microsoft Active Directory
Here is an example of the session login by the read-only admin. Access to the configuration level by this
admin is not allowed.
ACOS>
66
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
ACOS>enable
Password: <blank>
ACOS#show admin session
Id User Name Start Time Source IP Type Partition Authen Role
Cfg
------------------------------------------------------------------------------------------
*99 test 13:08:10 CST Thu Jun 21 2012 192.168.100.148 CLI Ldap ReadOnlyAdmin
No
ACOS#config
^
% Unrecognized command.Invalid input detected at '^' marker.
ACOS#
67
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Configuring Microsoft Active Directory
68
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
ACOS>enable
Password: <blank>
ACOS#show admin session
Id User Name Start Time Source IP Type Partition Authen Role
Cfg
------------------------------------------------------------------------------------------
*101 test 13:22:16 CST Thu Jun 21 2012 192.168.100.148 CLI Ldap ReadWrite-
Admin No
ACOS# config
ACOS(config)#
NOTE: If you plan to use the default settings for all the A10 attributes, you can skip the
rest of this section.
CAUTION: Please add the attributes carefully. Once they are added, they can not be
changed or deleted.
The LDAP object class for A10 Networks is A10Admin, and can contain one or more of the following attribute
types. You can specify the values to assign to these attributes in the definition file for the admin.
• A10AdminRole
This attribute type specifies the administrator’s role, which defines the scope of read-write operations
that the administrator is allowed to perform on the ACOS device.
The following predefined roles are included on the ACOS device:
• ReadOnlyAdmin
• ReadWriteAdmin
• PartitionReadWrite
• PartitionSlbServiceOperator
• PartitionReadOnly
69
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Configuring Microsoft Active Directory
70
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
71
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Configuring Microsoft Active Directory
72
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
10.Enter the appropriate information in the Mandatory and Optional sections and click Finish.
73
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Configuring Microsoft Active Directory
74
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
75
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Configuring Microsoft Active Directory
76
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
Figure 12 and Figure 13 set the administrator role for administrator test to ReadWriteAdmin.
77
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Configuring Microsoft Active Directory
78
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
Login Example
Here is a login example for an administrator:
ACOS> enable
Password: <blank>
79
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Configuring Microsoft Active Directory
ACOS#
ACOS# show admin session
Id User Name Start Time Source IP Type Partition Authen Role
Cfg
------------------------------------------------------------------------------------------
*106 test 14:15:13 CST Thu Jun 21 2014 192.168.100.148 CLI Ldap ReadWriteAdmin
No
ACOS#
ACOS#config
ACOS(config)#
Figure 14 sets the access type for the administrator to web (GUI) and aXAPI. This configuration prohibits the
administrator from logging in through the CLI.
80
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
Login Example
The example below shows what happens if the admin tries to log in through the CLI:
81
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Configuring Microsoft Active Directory
82
Feedback ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
COMMAND AUDITING
This chapter describes how to enable and configure command auditing on your ACOS device.
• Administrator logins and log outs for CLI, GUI, and aXAPI sessions
• Configuration changes. All attempts to change the configuration are logged, even if they are unsuc-
cessful.
• CLI commands at the Privileged EXEC level (if audit logging is enabled for this level)
The audit log is maintained in a separate file, apart from the system log. The audit log messages displayed for
an admin depend upon the administrator’s privilege level. Administrators with Root, Read Write, or Read Only
privileges who view the audit log can view all messages, for all system partitions.
Administrators who have privileges only within a specific partition can view only the audit log messages
related to management of that partition.
83
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Enable and Configure Command Auditing
To enable command auditing from the CLI, use the audit enable command at the global configuration level.
This command logs configuration command only.
To log both configuration and Privileged EXEC commands, use the following command:
The following command sets the buffer size to 30,000. When the log is full, the oldest entries are removed to
make room for new entries. The default is 20,000 entries.
84
Feedback
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS
The following audit logs indicate configuration and operational actions related to virtual server “vip1”
performed using the GUI:
Jun 08 2014 09:06:04 [12] web: [admin] add virtual server [name:vip1, ip:1.1.1.1, vport1:8001(TCP).]
successfully.
Jun 08 2014 09:06:05 [12] web: [admin] edit virtual server [name:vip1, ip:1.1.1.1,
vport1:8001(TCP).] successfully.
Jun 08 2014 09:06:06 [12] web: [admin] disable virtual server [vip1] successfully.
Jun 08 2014 09:06:06 [12] web: [admin] enable virtual server [vip1] successfully.
Jun 08 2014 09:06:07 [12] web: [admin] delete virtual server [vip1] successfully.
The following audit logs indicate configuration actions related to virtual server “vip1” performed using the
aXAPI:
Jun 08 2014 09:06:13 [12] aXAPI: [admin] add virtual server [name:vip1, ip:1.1.1.1,
vport1:8001(TCP).] successfully.
Jun 08 2014 09:06:14 [12] aXAPI: [admin] edit virtual server [name:vip1, ip:1.1.1.1,
vport1:8001(TCP).] successfully.
Jun 08 2014 09:06:15 [12] aXAPI: [admin] delete virtual server [vip1] successfully.
85
FeedbackF
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder® Series TPS Fee
e
Audit Log Examples
86
ACOS 5.0.1 Management Access and Security Guide for A10 Thunder™ Series TPS
Contents
87