
30-32
Catalyst 4500 Series, Catalyst 2948G, Catalyst 2948G-GE-TX, and Catalyst 2980G Switches Software Configuration Guide—Release 8.2GLX
78-15908-01
Chapter 30 Configuring Switch Access Using AAA
Configuring Authentication
This example shows how to enable Kerberos as the login authentication method for the console and
verify the configuration:
Console> (enable) set authentication login kerberos enable console
kerberos login authentication set to enable for console session.
Console> (enable) show authentication
Login Authentication: Console Session Telnet Session
--------------------- ---------------- ----------------
tacacs disabled disabled
radius disabled disabled
kerberos enabled(primary) enabled(primary)
local enabled enabled
Enable Authentication:Console Session Telnet Session
---------------------- ----------------- ----------------
tacacs disabled disabled
radius disabled disabled
kerberos enabled(primary) enabled(primary)
local enabled enabled
Console> (enable)
Defining the Kerberos Local-Realm
The Kerberos realm is a domain consisting of users, hosts, and network services that are registered to a
Kerberos server. To authenticate a user defined in the Kerberos database, the switch must know the host
name or IP address of the host running the KDC and the name of the Kerberos realm.
To configure the switch to authenticate to the KDC in a specified Kerberos realm, perform this task in
privileged mode:
Note
Make sure that you enter the realm in uppercase letters. Kerberos will not authenticate users if the realm
is in lowercase letters.
This example shows how to define a local realm and how to verify the configuration:
Console> (enable) set kerberos local-realm CISCO.COM
Kerberos local realm for this switch set to CISCO.COM.
Console> (enable) show kerberos
Kerberos Local Realm:CISCO.COM
Kerberos server entries:
Realm:CISCO.COM, Server:187.0.2.1, Port:750
Kerberos Domain<->Realm entries:
Domain:cisco.com, Realm:CISCO.COM
Kerberos Clients NOT Mandatory
Kerberos Credentials Forwarding Enabled
Kerberos Pre Authentication Method set to None
Kerberos config key:
Kerberos SRVTAB Entries
Srvtab Entry 1:host/[email protected] 0 932423923 1 1 8 01;;8>00>50;0=0=0
Console> (enable)
Task
Command
Define the default realm for the switch.
set kerberos local-realm kerberos-realm