Cisco AS5800 Specifications Page 177

  • Download
  • Add to my manuals
  • Print
  • Page
    / 334
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 176
4-39
Cisco AS5800 Operations, Administration, Maintenance, and Provisioning Guide
DOC-7810814=
Chapter 4 Administration
Access Service Security
Note The authentication method lists used in this example use names other than default.
However, you generally specify default as the list name for most lines and interfaces, and
apply different named lists on an exception basis. These names are used only for illustrative
purposes.
hostname 5800-1
!
tacacs-server host aaa
tacacs-server key 007
!
aaa authentication login rtp-office tacacs+
aaa authentication ppp marketing if-needed tacacs+
!
line console0
login authentication rtp-office
!
tacacs-server host aaa
tacacs-server key 007
!
aaa authentication login rtp-office tacacs+
aaa authentication ppp marketing if-needed tacacs+
!
line console0
login authentication rtp-office
!
interface group-async0
ppp authentication chap marketing
group-range 2/2/0 2/2/47
!
line 2/2/0 2/2/47
The following example shows how to create the following authentication lists:
A RADIUS server named AAA is polled for authentication information (so you do not need to
define a local username database). The shared key between the Cisco AS5800 and the RADIUS
security server is 007.
A login authentication list named fly is created, then applied to all lines that users can log in to,
except the console port. In this example, the console port is physically secure and does not need
password protection. The Cisco AS5800 is locked in a closet and secured behind a deadbolt lock.
Page view 176
1 2 ... 172 173 174 175 176 177 178 179 180 181 182 ... 333 334

Comments to this Manuals

No comments