5-6
Cisco SCE8000 Software Configuration Guide, Rel 3.1.6S
OL-16479-01
Chapter 5 Configuring the Management Interface and Security
Configuring the Available Interfaces
Configuring the Available Interfaces
The system allows you to configure the Telnet and SNMP interfaces according to the manner in which
you are planning to manage the SCE platform and the external components of the system.
•
Authentication, Authorization, and Accounting, page 5-6
•
Configuring Access Control Lists (ACLs), page 5-19
•
Managing the Telnet Interface, page 5-21
•
Configuring the SSH Server, page 5-22
•
Enabling the SNMP Interface, page 5-25
Authentication, Authorization, and Accounting
•
Information About Authentication, Authorization, and Accounting, page 5-6
•
How to Configure the SCE Platform Client, page 5-9
•
How to Manage the User Database, page 5-12
•
Configuring AAA Login Authentication, page 5-16
•
Configuring AAA Privilege Level Authorization Methods, page 5-17
•
Configuring AAA Accounting, page 5-18
•
•
Information About Authentication, Authorization, and Accounting
•
Authentication, Authorization, and Accounting, page 5-6
•
Login Authentication, page 5-7
•
•
Privilege Level Authorization, page 5-7
•
General AAA Fallback and Recovery Mechanism, page 5-8
•
Authentication, Authorization, and Accounting
is a security application that provides centralized authentication of users attempting to gain
access to a network element. The implementation of protocol allows customers to configure
one or more authentication servers for the SCE platform, providing a secure means of managing the SCE
platform, as the authentication server will authenticate each user. This then centralizes the authentication
database, making it easier for the customers to manage the SCE platform.
services are maintained in a database on a server running, typically, on a UNIX
or Windows NT workstation. You must have access to and must configure a server before the
configured features on your network element are available.
The protocol provides authentication between the network element and the ACS,
and it can also ensure confidentiality, if a key is configured, by encrypting all protocol exchanges
between a network element and a server.