158
Configuring Switch-Based Authentication
Information About Configuring Switch-Based Authentication
Understanding Kerberos
Kerberos is a secret-key network authentication protocol, which was developed at the Massachusetts Institute of
Technology (MIT). It uses the Data Encryption Standard (DES) cryptographic algorithm for encryption and authentication
and authenticates requests for network resources. Kerberos uses the concept of a trusted third party to perform secure
verification of users and services. This trusted third party is called the
key distribution center
(KDC).
Kerberos verifies that users are who they claim to be and the network services that they use are what the services claim
to be. To do this, a KDC or trusted Kerberos server issues tickets to users. These tickets, which have a limited lifespan,
are stored in user credential caches. The Kerberos server uses the tickets instead of usernames and passwords to
authenticate users and network services.
Note:
A Kerberos server can be a switch that is configured as a network security server and that can authenticate users
by using the Kerberos protocol.
The Kerberos credential scheme uses a process called
single logon
. This process authenticates a user once and then
allows secure authentication (without encrypting another password) wherever that user credential is accepted.
This software release supports Kerberos 5, which allows organizations that are already using Kerberos 5 to use the same
Kerberos authentication database on the KDC that they are already using on their other network hosts (such as UNIX
servers and PCs).
In this software release, Kerberos supports these network services:
Telnet
rlogin
rsh (Remote Shell Protocol)
Table 5 lists the common Kerberos-related terms and definitions.
Summary of Contents for IE 4000
Page 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Page 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Page 108: ...104 Configuring Switch Clusters Additional References ...
Page 128: ...124 Performing Switch Administration Additional References ...
Page 130: ...126 Configuring PTP ...
Page 140: ...136 Configuring CIP Additional References ...
Page 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Page 192: ...188 Configuring Switch Based Authentication Additional References ...
Page 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Page 298: ...294 Configuring VLANs Additional References ...
Page 336: ...332 Configuring STP Additional References ...
Page 408: ...404 Configuring DHCP Additional References ...
Page 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Page 490: ...486 Configuring SPAN and RSPAN Additional References ...
Page 502: ...498 Configuring Layer 2 NAT ...
Page 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Page 930: ...926 Configuring IP Unicast Routing Related Documents ...
Page 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Page 978: ...974 Dying Gasp ...
Page 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Page 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Page 996: ...992 Ethernet CFM ...
Page 1066: ...1062 Using an SD Card SD Card Alarms ...