Cisco AS5800 Specifications Page 164

  • Download
  • Add to my manuals
  • Print
  • Page
    / 334
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 163
4-26
Cisco AS5800 Operations, Administration, Maintenance, and Provisioning Guide
DOC-7810814=
Chapter 4 Administration
Access Service Security
Step 1 Enter the cleartext password used to gain access to privileged EXEC mode. Do not specify an encryption
type.
5800-1(config)# enable secret password
5800-1(config)#
Step 2 Type the exit command to exit out of global configuration mode.
5800-1(config)# exit
5800-1#
Step 3 Enter the show running-config command to view the encrypted version of the cleartext password that
was entered in Step 1. The encrypted password is noted with **.
5800-1# show running-config
Building configuration...
Current configuration:
!
version x AA
! some of the configuration skipped
enable secret 5 $1$h7dd$VTNs4.BAfQMUU0Lrvw6570**
! the rest of the configuration skipped
Note Encryption type 5 is the only valid encryption type for enable secret.
Step 4 Type Ctrl-Z to return to privileged EXEC mode.
5800-1(config)# Ctrl-Z
5800-1#
Step 5 Save changes.
5800-1# copy running-config startup-config
You can also specify additional protection for privileged EXEC mode, including the following:
Privilege levels for Cisco IOS software commands
Privileged EXEC passwords for different privilege levels
Privilege levels for specific lines on the Cisco AS5800
Encrypt passwords using service password-encryption
For more information about these security tools, refer to the security configuration guide for your
Cisco IOS release in the Cisco IOS configuration guides and command references documentation.
Communicating Between the Access and Security Servers
This section describes the Cisco IOS software commands that enable the Cisco AS5800 to communicate
with a security server. This procedure is similar for communicating with TACACS+ and RADIUS
servers, and the following sections describe the process.
If you are using a remote security server for authentication and authorization, you must configure the
security server before performing the tasks described in this section. TACACS+ Security Examples, page
4-38 shows typical TACACS+ and RADIUS server entries corresponding to the Cisco AS5800 security
configurations.
Page view 163
1 2 ... 159 160 161 162 163 164 165 166 167 168 169 ... 333 334

Comments to this Manuals

No comments