
23-10
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
OL-20748-01
Chapter 23 Configuring Management Access
AAA for System Administrators
Like access lists, the FWSM matches a packet to each
icmp
statement in order. You should use specific
statements first, and general statements later. There is an implicit deny at the end. For example, if you
allow all addresses first, then deny a specific address after, then that address will be unintentionally
allowed because it matched the first statement.
Note
If you only want to allow the FWSM to ping a host (and thus allow the echo reply back to the interface),
and not allow hosts to ping the FWSM, you can enable the ICMP inspection engine instead of entering
the command above. See
Chapter 22, “Applying Application Layer Protocol Inspection.”
For example, to allow all hosts except the one at 10.1.1.15 to use ICMP to the inside interface, enter the
following commands:
hostname(config)#
icmp
deny host 10.1.1.15 inside
hostname(config)#
icmp
permit any inside
To allow the host at 10.1.1.15 to use only ping to the inside interface, enter the following commands:
hostname(config)#
icmp
permit host 10.1.1.15 inside
AAA for System Administrators
This section describes how to enable CLI authentication, command authorization, and command
accounting for system administrators. Before you configure AAA for system administrators, first
configure the local database or AAA server according to
Chapter 11, “Configuring AAA Servers and the
Local Database.”
Note
In multiple context mode, you cannot configure any AAA commands in the system configuration.
However, if you configure Telnet authentication in the admin context, then authentication also applies
to sessions from the switch to the FWSM (which enters the system execution space). See the
“Configuring Authentication for CLI and ASDM Access” section on page 23-10
for more information.
This section includes the following topics:
•
Configuring Authentication for CLI and ASDM Access, page 23-10
•
Configuring Authentication to Access Privileged EXEC Mode, page 23-13
•
Configuring Command Authorization, page 23-14
•
Configuring Command Accounting, page 23-22
•
Viewing the Current Logged-In User, page 23-22
•
Recovering from a Lockout, page 23-23
Configuring Authentication for CLI and ASDM Access
This section explains how to configure CLI authentication when you use Telnet or SSH, and how to
configure ASDM authentication. This section includes the following topics:
•
CLI Access Overview, page 23-11
•
ASDM Access Overview, page 23-11
Содержание 6500 - Catalyst Series 10 Gigabit EN Interface Module Expansion
Страница 35: ...P A R T 1 Getting Started and General Information ...
Страница 36: ......
Страница 297: ...P A R T 2 Configuring the Security Policy ...
Страница 298: ......
Страница 521: ...P A R T 3 System Administration ...
Страница 522: ......
Страница 613: ...P A R T 4 Reference ...
Страница 614: ......