145
Configuring Switch-Based Authentication
Information About Configuring Switch-Based Authentication
Telnet Password for a Terminal Line
When you power-up your switch for the first time, an automatic setup program runs to assign IP information and to create
a default configuration for continued use. The setup program also prompts you to configure your switch for Telnet access
through a password. If you did not configure this password during the setup program, you can configure it now through
the command-line interface (CLI).
Username and Password Pairs
You can configure username and password pairs, which are locally stored on the switch. These pairs are assigned to
lines or ports and authenticate each user before that user can access the switch. If you have defined privilege levels, you
can also assign a specific privilege level (with associated rights and privileges) to each username and password pair.
Multiple Privilege Levels
By default, the Cisco IOS software has two modes of password security: user EXEC and privileged EXEC. You can
configure up to 16 hierarchical levels of commands for each mode. By configuring multiple passwords, you can allow
different sets of users to have access to specified commands.
For example, if you want many users to have access to the
clear line
command, you can assign it level 2 security and
distribute the level 2 password fairly widely. But if you want more restricted access to the
configure
command, you can
assign it level 3 security and distribute that password to a more restricted group of users.
When you set a command to a privilege level, all commands whose syntax is a subset of that command are also set to
that level. For example, if you set the
show ip traffic
command to level 15, the
show
commands and
show ip
commands
are automatically set to privilege level 15 unless you set them individually to different levels.
To return to the default privilege for a given command, use the
no privilege
mode
level
level
command
global
configuration command.
Users can override the privilege level you set using the
privilege level
line configuration command by logging in to the
line and enabling a different privilege level. They can lower the privilege level by using the
disable
command. If users
know the password to a higher privilege level, they can use that password to enable the higher privilege level. You might
specify a high level or privilege level for your console line to restrict line usage.
To return to the default line privilege level, use the
no privilege level
line configuration command.
Switch Access with
This section describes how to enable and configure Terminal Access Controller Access Control System Plus (),
which provides detailed accounting information and flexible administrative control over authentication and authorization
processes. is facilitated through authentication, authorization, accounting (AAA) and can be enabled only
through AAA commands.
is a security application that provides centralized validation of users attempting to gain access to your switch.
services are maintained in a database on a daemon typically running on a UNIX or Windows NT
workstation. You should have access to and should configure a server before the configuring
features on your switch.
provides for separate and modular authentication, authorization, and accounting facilities. allows
for a single access control server (the daemon) to provide each service—authentication, authorization, and
accounting—independently. Each service can be tied into its own database to take advantage of other services available
on that server or on the network, depending on the capabilities of the daemon.
Summary of Contents for IE 4000
Page 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Page 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Page 108: ...104 Configuring Switch Clusters Additional References ...
Page 128: ...124 Performing Switch Administration Additional References ...
Page 130: ...126 Configuring PTP ...
Page 140: ...136 Configuring CIP Additional References ...
Page 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Page 192: ...188 Configuring Switch Based Authentication Additional References ...
Page 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Page 298: ...294 Configuring VLANs Additional References ...
Page 336: ...332 Configuring STP Additional References ...
Page 408: ...404 Configuring DHCP Additional References ...
Page 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Page 490: ...486 Configuring SPAN and RSPAN Additional References ...
Page 502: ...498 Configuring Layer 2 NAT ...
Page 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Page 930: ...926 Configuring IP Unicast Routing Related Documents ...
Page 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Page 978: ...974 Dying Gasp ...
Page 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Page 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Page 996: ...992 Ethernet CFM ...
Page 1066: ...1062 Using an SD Card SD Card Alarms ...