Cisco Catalyst 6880-X Specifications Page 69

  • Download
  • Add to my manuals
  • Print
  • Page
    / 111
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 68
Distribution Layer April 2014
66
Step 10: If your network operational support is centralized, you can increase network security by using an
access list to limit the networks that can access your device. In this example, only devices on the 10.4.48.0/24
network will be able to access the device via SSH or SNMP.
access-list 55 permit 10.4.48.0 0.0.0.255
line vty 0 15
access-class 55 in
!
snmp-server community [SNMP RO name] RO 55
snmp-server community [SNMP RW name] RW 55
If you configure an access-list on the vty interface, you may lose the ability to use ssh
to log in from one device to the next for hop-by-hop troubleshooting.
Caution
Step 11: Configure local login and password
The local login account and password provides basic device access authentication to view platform operation.
The enable password secures access to the device configuration mode. By enabling password encryption, you
prevent the use of plain text passwords when viewing configuration files. The aaa new-model command enables
new access control commands and functions, and causes the local username and password on the router to be
used in the absence of other AAA statements.
username admin password [password]
enable secret [secret password]
service password-encryption
aaa new-model
By default, https access to the switch will use the enable password for authentication.
Step 12: If you want to reduce operational tasks per device, configure centralized user authentication by using
the TACACS+ protocol to authenticate management logins on the infrastructure devices to the AAA server.
As networks scale in the number of devices to maintain, there is an operational burden to maintain local user
accounts on every device. A centralized AAA service reduces operational tasks per device and provides an audit
log of user access for security compliance and root cause analysis. When AAA is enabled for access control, all
management access to the network infrastructure devices (SSH and HTTPS) is controlled by AAA.
TACACS+ is the primary protocol used to authenticate management logins on the infrastructure devices to the
AAA server. A local AAA user database is also defined on each network infrastructure device in order to provide
a fallback authentication source in case the centralized TACACS+ server is unavailable.
tacacs server TACACS-SERVER-1
address ipv4 10.4.48.15
key [secret key]
!
aaa group server tacacs+ TACACS-SERVERS
server name TACACS-SERVER-1
!
aaa authentication login default group TACACS-SERVERS local
aaa authorization exec default group TACACS-SERVERS local
aaa authorization console
ip http authentication aaa
Page view 68
1 2 ... 64 65 66 67 68 69 70 71 72 73 74 ... 110 111

Comments to this Manuals

No comments