Administering the WMIC
Configuring the WMIC for Secure Shell
39
Cisco 3200 Series Wireless MIC Software Configuration Guide
To disable AAA, use the
no aaa new-model
command in global configuration mode. To disable
authorization, use the
no aaa authorization
{
network
|
exec
}
method1
command in global
configuration mode.
Configuring the WMIC for Secure Shell
This section describes how to configure the Secure Shell (SSH) feature.
Note
For complete syntax and usage information for the commands used in this section, see the “Secure Shell
Commands” section in the
Cisco IOS Security Command Reference for Release 12.2.
Understanding SSH
SSH is a protocol that provides a secure, remote connection to a Layer 2 or a Layer 3 device. There are
two versions of SSH: SSH version 1 and SSH version 2. Cisco IOS release 12.3(8)JK supports only SSH
version 1.
SSH provides greater security for remote connections than Telnet provides. When a device is
authenticated, SSH provides strong encryption. The SSH feature has an SSH server and an SSH
integrated client. The client supports these user authentication methods:
•
RADIUS (for more information, see the
“Controlling WMIC Access with RADIUS” section on
page 21
)
•
Local authentication and authorization (for more information, see the
“Configuring the WMIC for
Local Authentication and Authorization” section on page 38
)
Step 6
username
name
[
privilege
level
]
{
password
encryption-type
password
}
Enters the local database, and establish a username-based authentication
system.
Repeat this command for each user.
•
For
name
, specify the user ID as one word. Spaces and quotation
marks are not allowed.
•
(Optional) For
level
, specify the privilege level the user has after
gaining access. The range is from 0 to 15. Level 15 gives privileged
EXEC mode access. Level 0 gives user EXEC mode access.
•
For
encryption-type
, enter
0
to specify that an unencrypted password
follows. Enter
7
to specify that a hidden password follows.
•
For
password
, specify the password the user must enter to gain access
to the WMIC. The password must be from 1 to 25 characters, can
contain embedded spaces, and must be the last option specified in the
username
command.
Step 7
end
Returns to privileged EXEC mode.
Step 8
show running-config
Verifies your entries.
Step 9
copy running-config startup-config
(Optional) Saves your entries in the configuration file.
Command
Purpose
Содержание 3200 Series
Страница 14: ...xiv Cisco 3200 Series Wireless MIC Software Configuration Guide OL 6415 04 ...
Страница 120: ...Administering the WMIC Managing the System Time and Date 56 Cisco 3200 Series Wireless MIC Software Configuration Guide ...
Страница 136: ...Dynamic Frequency Selection Additional Information 6 Radio Channels and Transmit Frequencies OL 11491 03 ...
Страница 254: ...WIMIC Troubleshooting Error and Event Messages 12 Cisco 3200 Series Wireless MIC Software Configuration Guide ...
Страница 272: ...Supported MIBs Using FTP to Access the MIB Files 4 Cisco 3200 Series Wireless MIC Software Configuration Guide ...
Страница 314: ...Index IN 12 Cisco 3200 Series Wireless MIC Software Configuration Guide OL 6415 04 ...