161
Configuring Switch-Based Authentication
Information About Configuring Switch-Based Authentication
Kerberos Configuration
So that remote users can authenticate to network services, you must configure the hosts and the KDC in the Kerberos
realm to communicate and mutually authenticate users and network services. To do this, you must identify them to each
other. You add entries for the hosts to the Kerberos database on the KDC and add KEYTAB files generated by the KDC
to all hosts in the Kerberos realm. You also create entries for the users in the KDC database.
When you add or create entries for the hosts and users, follow these guidelines:
The Kerberos principal name
must
be in all lowercase characters.
The Kerberos instance name
must
be in all lowercase characters.
The Kerberos realm name
must
be in all uppercase characters.
Note:
A Kerberos server can be a switch that is configured as a network security server and that can authenticate users
by using the Kerberos protocol.
To set up a Kerberos-authenticated server-client system, follow these steps:
Configure the KDC by using Kerberos commands.
Configure the switch to use the Kerberos protocol.
Local Authentication and Authorization
You can configure AAA to operate without a server by setting the switch to implement AAA in local mode. The switch
then handles authentication and authorization. No accounting is available in this configuration.
Secure Shell
To use this feature, you must install the cryptographic (encrypted) software image on your switch. You must obtain
authorization to use this feature and to download the cryptographic software files from Cisco.com. For more information,
see the release notes for this release.
For SSH configuration examples, see the “SSH Configuration Examples” section in the “Configuring Secure Shell”
chapter of the
Cisco IOS Security Configuration Guide, Cisco IOS Release 12.2
.
SSH in IPv6 functions the same and offers the same benefits as SSH in IPv4. IPv6 enhancements to SSH consist of
support for IPv6 addresses that enable a Cisco router to accept and establish secure, encrypted connections with remote
IPv6 nodes over an IPv6 transport.
SSH
SSH is a protocol that provides a secure, remote connection to a device. SSH provides more security for remote
connections than Telnet does by providing strong encryption when a device is authenticated. This software release
supports SSH Version 1 (SSHv1) and SSH Version 2 (SSHv2).
SSH Servers, Integrated Clients, and Supported Versions
The SSH feature has an SSH server and an SSH integrated client, which are applications that run on the switch. You can
use an SSH client to connect to a switch running the SSH server. The SSH server works with the SSH client supported
in this release and with non-Cisco SSH clients. The SSH client also works with the SSH server supported in this release
and with non-Cisco SSH servers.
The switch supports an SSHv1 or an SSHv2 server.
Summary of Contents for IE 4000
Page 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Page 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Page 108: ...104 Configuring Switch Clusters Additional References ...
Page 128: ...124 Performing Switch Administration Additional References ...
Page 130: ...126 Configuring PTP ...
Page 140: ...136 Configuring CIP Additional References ...
Page 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Page 192: ...188 Configuring Switch Based Authentication Additional References ...
Page 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Page 298: ...294 Configuring VLANs Additional References ...
Page 336: ...332 Configuring STP Additional References ...
Page 408: ...404 Configuring DHCP Additional References ...
Page 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Page 490: ...486 Configuring SPAN and RSPAN Additional References ...
Page 502: ...498 Configuring Layer 2 NAT ...
Page 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Page 930: ...926 Configuring IP Unicast Routing Related Documents ...
Page 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Page 978: ...974 Dying Gasp ...
Page 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Page 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Page 996: ...992 Ethernet CFM ...
Page 1066: ...1062 Using an SD Card SD Card Alarms ...