Examples of Cisco APE Scenarios

Size: px
Start display at page:

Download "Examples of Cisco APE Scenarios"

Transcription

1 CHAPTER 5 This chapter describes three example scenarios with which to use Cisco APE: Access to Asynchronous Lines, page 5-1 Cisco IOS Shell, page 5-3 Command Authorization, page 5-5 Note For intructions on how to configure Cisco IOS commands, refer to the Cisco IOS Security Configuration Guide, Release 12.2 at the following URL: Access to Asynchronous Lines To configure access to asynchronous lines, follow these example tasks: Task 2: Configuring Cisco APE through the Management UI You must configure Cisco IOS to request authentication and authorization using TACACS+ for reverse access to serial lines: Set up AAA configuration: aaa new-model aaa authentication login vtymethod group tacacs+ aaa authorization reverse-access vtymethod group tacacs+ Configure the TACACS server with the IP address of Cisco APE ( ) and secret shared with Cisco APE: tacacs-server host tacacs-server key SECRET Specify the IP alias to the async line: ip alias

2 Access to Asynchronous Lines Chapter 5 Step 4 Set up the async line with authentication and authorization: line no exec exec-timeout 0 0 authorization reverse-access vtymethod transport input telnet Task 2: Configuring Cisco APE Through the Management UI Step 4 From the management UI, add an authorization device. For instructions on how to add an authorization device, see Adding an Authorization Device section on page Example: Name the authorization device IOSBOX, the shared secret SECRET and the IP address On the Users page in the management interface, add a user, and enter a location for the user. For instructions on how to add a user, see Adding a User section on page 4-4. Example: Add the user Joe to the root location (/). Add a resource for the asynchronous line. Enter a name for the resource, the authorization device that controls it (Cisco IOS device) and an authorization ID (which for async lines is ttyxx). Resources also have a location and a type. You must give the resource a network port and IP address, which is what is used to telnet to the device. For instructions on how to add a resource, see Adding a Resource section on page 4-7. Example: Name the resource Switch1, the authorization device IOSBOX, the authorization ID tty33, the location root location (/), and the resource type root resource type (/). The IP address assigned to this resource is and the port is 23 (Telnet). By using the management UI, create a role that provides access to the async line. Enter a name and permission for the role. Example: Name the role Test1 and the permission Resource Access. Add a user Joe and the resource Switch1 to the role. Operation Here is a typical sequence of what happens after you have completed the configuration tasks during normal operation: 1. The operator starts the web browser and connects to the operator URL in Cisco APE, which prompts for a username and password. 2. The operator enters the username (Joe), and a password, and submits the form. 3. Cisco APE evaluates the username and password, and the operator sees a web page that shows only the resources that are accessible. In this case, the hypertext link Switch1 is linked to Telnet:// :23/. 4. The operator then selects this link, which launches the default telnet client on the system with a connection to on port The authorization device (IOSBOX) accepts the connection; the device initiates authentication requests with Cisco APE by using TACACS+ authentication start message. 5-2

3 Chapter 5 Cisco IOS Shell 6. Cisco APE sends a username prompt to the authorization device (IOSBOX). 7. The authorization device displays the username prompt to the user in the telnet session. 8. The user enters the username. 9. The authorization device sends the username to Cisco APE by using TACACS Cisco APE sends a password prompt to the authorization device, which displays the prompt to the user in the Telnet session. 11. The user enters a password. 12. The authorization device sends the password to Cisco APE. Cisco APE validates the authentication and returns a success message. 13. The authorization device sends a TACACS+ authorization request for reverse telnet access to the tty line to Cisco APE. 14. Cisco APE checks the user's roles to see if the user has the resource access permission on this resource and returns with a success message. 15. The authorization device allows access to the line. The user can now access the device connected to the line. Cisco IOS Shell To configure Cisco IOS Shell, follow these example tasks: Task 2: Configuring Cisco APE through the Management UI You must configure Cisco IOS to request authentication and authorization by using TACACS+ for exec access to the router shell: Set up AAA configuration: aaa new-model aaa authentication login vtymethod group tacacs+ aaa authorization exec vtymethod group tacacs+ Configure the TACACS server with the IP address of Cisco APE and shared secret with Cisco APE: tacacs-server host tacacs-server key SECRET Set up shell vty with authentication and authorization: line vty 0 4 authorization exec vtymethod login authentication vtymethod 5-3

4 Cisco IOS Shell Chapter 5 Task 2: Configuring Cisco APE Step 4 To add an authorization device, from the Add Authorization Devices page on the Cisco APE Management interface, enter a name, an IP address, and the shared secret. For instructions on how to add an authorization device, see Adding an Authorization Device section on page Example: Name the authorization device IOSBOX, the secret is SECRET, and the IP address is To add a user, on the Add Users page on the management UI, enter a username, password, and a location. For instructions on how to add a user, see Adding a User section on page 4-4. Example: Add the user Joe to the root location (/). To add a resource for the Cisco IOS shell, from the Add Resources page on the Management UI, enter a name, the authorization device that controls it (Cisco IOS device) and an authorization ID (which for shell access is shell). Select a location and a type of resource. Enter the network port and IP address, which will be used to telnet to the device. For instructions on how to add a resource, see Adding a Resource section on page 4-7. Example: Name the resource IOSShell1, the authorization device IOSBOX, the authorization ID shell, the location root location (/), and the resource type root resource type (/). The IP address assigned to this resource is left as default, which will be and the port is 23 (Telnet). From the Add Roles page on the Management UI, create a role that provides access to the asynchronous line. Enter a name and permissions for the role. Example: Name the role Test1 and the permission Resource Access. Add the user Joe, and the resource IOSShell1 to the role. Operation Here is a typical sequence of what happens during normal operation after you have completed the configuration: 1. The operator starts the web browser and connects to the Operators UI in Cisco APE, which prompts for a username and password. 2. The operator enters the username (Joe) and password, and submits the form. 3. Cisco APE evaluates the username and password, and the user sees a web page that only shows the resources that are accessible. In this case, the hypertext link IOSShell1 is linked to Telnet:// /. 4. The operator then selects this link, which starts the default Telnet client on the system with a connection to on port The authorization device (IOSBOX) accepts the connection; then the device initiates authentication requests with Cisco APE using TACACS+ authentication start message. 6. Cisco APE sends a username prompt to the authorization device (IOSBOX), which displays the username prompt to the user in the Telnet session. 7. The user enters the username. 8. The authorization device sends the username to Cisco APE using TACACS+. 9. Cisco APE sends a password prompt to the authorization device. 10. The authorization device displays the prompt to the user in the Telnet session. 11. The user enters a password. 5-4

5 Chapter 5 Command Authorization 12. The authorization device sends the password to Cisco APE. 13. Cisco APE validates the authentication and returns success. 14. The authorization device sends a TACACS+ authorization request for shell access to the Cisco IOS shell (authorization device) to Cisco APE. 15. Cisco APE checks the user's roles to see if the user has the resource access permission on this resource and returns a success message. 16. The authorization device allows access to the shell. The user can now access the Cisco IOS shell. Command Authorization To configure command authorization, follow these example tasks: Task 2: Configuring Cisco APE through the Management UI You must configure Cisco IOS to request authentication and authorization using TACACS+ for authorization of commands at a particular privilege level (the default for all commands is a level 1 or 15): Set up AAA configuration: aaa new-model aaa authentication login vtymethod group tacacs+ aaa authorization exec vtymethod group tacacs+ aaa authorization commands 1 vtymethod group tacacs+ aaa authorization commands 15 vtymethod group tacacs+ Configure the TACACS server with the IP address of Cisco APE and secret shared with Cisco APE: tacacs-server host tacacs-server key SECRET Set up shell vty with authentication and authorization: line vty 0 4 authorization exec vtymethod authorization commands 15 vtymethod authorization commands 1 vtymethod login authentication vtymethod Task 2: Configuring Cisco APE Through the Management Interface On the Cisco APE Management Interface, add an authorization device. Enter a name, IP address, and shared secret. For instructions on how to add an authorization device, see Adding an Authorization Device section 5-5

6 Command Authorization Chapter 5 Step 4 Step 5 on page Example: Name the authorization device IOSBOX, the shared secret SECRET, and the IP address From the Add Users page on the Cisco APE Management Interface, add a user by entering a username and a password. Enter a location for the user. For instructions on how to add a user, see Adding a User section on page 4-4. Example: Add the user Joe to the root location (/). From the Add Resources page, add a resource for the Cisco IOS shell. Enter a name, the authorization device that controls it (Cisco IOS device), and an authorization ID. Enter a location, a type, a network port and IP address, which is used to telnet to the device. For instructions on how to add a resource, see Adding a Resource section on page 4-7. Example: Name the resource IOSShell1, the authorization device IOSBOX, the authorization ID shell, the location root location (/), and the resource type root resource type (/). Assign the default IP address to this resource, which is and the port is 23 (Telnet). From the Add Roles page, create a role that provides access to the async line. Enter a name and permissions. For instructions on how to add a role, see Adding a Role section on page 4-14 Example: Name the role Test1, and the permission Resource Access. The user Joe and the resource IOSShell1 are added to the role. From the Add CLI Permissions page, add the permission to execute Cisco IOS CLI Permissions to the role. For instructions on how to add a CLI permission, see Adding a Command Line Interface Permission section on page 4-16 In this example, allow the operators in this role to have access to the pad command except the command "pad 1234". To do this, add the following CLI permissions: pad 1234 exclude pad.* include The first permission excludes the command from the list of commands allowed by this role. The second permission allows all forms of the pad command to be run. The exclusions take precedence so in this case all forms of the pad command except pad 1234 are allowed. All other commands are denied. Note Note that the exclusion only applies to this role. The user may have access to another role that provides access to the pad 1234 command, which would allow access to the user. Operation Here is a typical sequence of what happens during normal operation, after you have completed the configuration: 1. The operator starts the web browser, and connects to the Operators Interface in Cisco APE, and enters his username (Joe) and password, and submits the form. 2. Cisco APE evaluates the username and password, and then opens a web page that shows only the resources that are accessible. In this case, the hypertext link IOSShell1 is linked to Telnet:// /. 3. The operator then selects this link, which launches the default Telnet client on the system with a connection to on port

7 Chapter 5 Command Authorization 4. The authorization device (IOSBOX) accepts the connection and then initiates authentication requests with Cisco APE by using TACACS+ authentication start message. 5. Cisco APE sends a username prompt to the authorization device (IOSBOX), which displays the username prompt to the user in the Telnet session. 6. The user enters a username. 7. The authorization device sends the username to Cisco APE using TACACS+. 8. Cisco APE sends a password prompt to the authorization device. 9. The authorization device displays the prompt to the user in the Telnet session. 10. The user enters a password. 11. The authorization device sends the password to Cisco APE. 12. Cisco APE validates the authentication and returns a success message. 13. The authorization device sends a TACACS+ authorization request for shell access to the Cisco IOS shell (authorization device) to Cisco APE. 14. Cisco APE checks the user's roles to see if he has the resource access permission on this resource and returns Success. 15. The authorization device allows access to the shell. 16. The user can now access the Cisco IOS shell. 17. The user enters the command pad The Authorization device (Cisco IOS) checks the privilege level of the command. Since it is a level 1 command, the authorization device requests authorization for this command from Cisco APE using TACACS+ authorization request. 19. Cisco APE checks to see if any of the user's roles allows this command. Since one role permits the user to do so, the user is allowed to issue this command. 5-7

8 Command Authorization Chapter 5 5-8

Configuring Local Authentication

Configuring Local Authentication This chapter describes local authentication. This chapter also describes procedures to configure local authentication and privilege levels. This chapter includes the following topics: Understanding Authentication,

More information

TACACS Device Access Control with Cisco Active Network Abstraction

TACACS Device Access Control with Cisco Active Network Abstraction TACACS Device Access Control with Cisco Active Network Abstraction Executive Summary Cisco Active Network Abstraction (ANA) is an extensible and scalable product suite that resides between the network

More information

Configuring Authorization

Configuring Authorization Configuring Authorization AAA authorization enables you to limit the services available to a user. When AAA authorization is enabled, the network access server uses information retrieved from the user

More information

PT Activity: Configure AAA Authentication on Cisco Routers

PT Activity: Configure AAA Authentication on Cisco Routers PT Activity: Configure AAA Authentication on Cisco Routers Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask R1 Fa0/0 192.168.1.1 255.255.255.0 S0/0/0 10.1.1.2

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

Console Port, Telnet, and SSH Handling

Console Port, Telnet, and SSH Handling Console Port Overview, on page 1 Connecting Console Cables, on page 1 Installing USB Device Drivers, on page 1 Console Port Handling Overview, on page 2 Telnet and SSH Overview, on page 2 Persistent Telnet,

More information

Configuring Authorization

Configuring Authorization The AAA authorization feature is used to determine what a user can and cannot do. When AAA authorization is enabled, the network access server uses information retrieved from the user s profile, which

More information

Configuration Example: TACACS Administrator Access to Converged Access Wireless LAN Controllers

Configuration Example: TACACS Administrator Access to Converged Access Wireless LAN Controllers Configuration Example: TACACS Administrator Access to Converged Access Wireless LAN Controllers This document provides a configuration example for Terminal Access Controller Access Control System Plus

More information

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+ Finding Feature Information, page 1 Prerequisites for TACACS+, page 1 Information About TACACS+, page 3 How to Configure TACACS+, page 7 Monitoring TACACS+, page 16 Finding Feature Information Your software

More information

Configuring Secure Shell (SSH)

Configuring Secure Shell (SSH) Prerequisites for Configuring Secure Shell, page 1 Restrictions for Configuring Secure Shell, page 2 Information About Configuring Secure Shell, page 2 How to Configure Secure Shell, page 4 Monitoring

More information

XML Transport and Event Notifications

XML Transport and Event Notifications 13 CHAPTER The chapter contains the following sections: TTY-Based Transports, page 13-123 Dedicated Connection Based Transports, page 13-125 SSL Dedicated Connection based Transports, page 13-126 TTY-Based

More information

TACACS+ on an Aironet Access Point for Login Authentication Configuration Example

TACACS+ on an Aironet Access Point for Login Authentication Configuration Example TACACS+ on an Aironet Access Point for Login Authentication Configuration Example Document ID: 70149 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram

More information

XML Transport and Event Notifications

XML Transport and Event Notifications CHAPTER 13 This chapter contains these sections: TTY-Based Transports, page 13-129 Dedicated Connection Based Transports, page 13-131 SSL Dedicated Connection based Transports, page 13-133 TTY-Based Transports

More information

HTTP 1.1 Web Server and Client

HTTP 1.1 Web Server and Client The feature provides a consistent interface for users and applications by implementing support for HTTP 1.1 in Cisco IOS XE software-based devices. When combined with the HTTPS feature, the feature provides

More information

AAA and the Local Database

AAA and the Local Database This chapter describes authentication, authorization, and accounting (AAA, pronounced triple A ). AAA is a a set of services for controlling access to computer resources, enforcing policies, assessing

More information

Configuring Switch-Based Authentication

Configuring Switch-Based Authentication CHAPTER 7 This chapter describes how to configure switch-based authentication on the switch. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. This chapter consists

More information

Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+)

Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+) Finding Feature Information, page 1 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), page 1 Information About TACACS+, page 3 How to Configure

More information

Configuring Local Authentication and Authorization

Configuring Local Authentication and Authorization Configuring Local Authentication and Authorization Finding Feature Information, page 1 How to Configure Local Authentication and Authorization, page 1 Monitoring Local Authentication and Authorization,

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

Lab AAA Authorization and Accounting

Lab AAA Authorization and Accounting Lab 11.3.2 AAA Authorization and Accounting Objective Scenario Step 1 In this lab, the student will use the exec-timeout command to control the amount of time before an idle telnet or console session is

More information

Configuring Basic AAA on an Access Server

Configuring Basic AAA on an Access Server Configuring Basic AAA on an Access Server Document ID: 10384 Contents Introduction Before You Begin Conventions Prerequisites Components Used Network Diagram General AAA Configuration Enabling AAA Specifying

More information

Configuring the CSS as a Client of a TACACS+ Server

Configuring the CSS as a Client of a TACACS+ Server CHAPTER 4 Configuring the CSS as a Client of a TACACS+ Server The Terminal Access Controller Access Control System (TACACS+) protocol provides access control for routers, network access servers (NAS),

More information

Internetwork Expert s CCNA Security Bootcamp. Securing Cisco Routers. Router Security Challenges

Internetwork Expert s CCNA Security Bootcamp. Securing Cisco Routers. Router Security Challenges Internetwork Expert s CCNA Security Bootcamp Securing Cisco Routers http:// Router Security Challenges As the system gets more complex, as do the vulnerabilities Key part of security team s job is to be

More information

Configuring TACACS+ Information About TACACS+ Send document comments to CHAPTER

Configuring TACACS+ Information About TACACS+ Send document comments to CHAPTER 4 CHAPTER This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on NX-OS devices. This chapter includes the following sections: Information

More information

Configuring Secure Shell (SSH)

Configuring Secure Shell (SSH) Starting with Cisco IOS XE Denali 16.3.1, Secure Shell Version 1 (SSHv1) is deprecated. Finding Feature Information, on page 1 Prerequisites for Configuring Secure Shell, on page 1 Restrictions for Configuring

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server 4 CHAPTER Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

Configuring Secure Shell (SSH)

Configuring Secure Shell (SSH) Finding Feature Information, on page 1 Prerequisites for Configuring Secure Shell, on page 1 Restrictions for Configuring Secure Shell, on page 2 Information About Configuring Secure Shell, on page 2 How

More information

Configuring Secure Shell (SSH)

Configuring Secure Shell (SSH) Finding Feature Information, page 1 Prerequisites for Configuring Secure Shell, page 1 Restrictions for Configuring Secure Shell, page 2 Information about SSH, page 2 How to Configure SSH, page 5 Monitoring

More information

Configuring Secure Shell (SSH)

Configuring Secure Shell (SSH) Finding Feature Information, page 1 Prerequisites for Configuring the Switch for Secure Shell (SSH) and Secure Copy Protocol (SCP), page 1 Restrictions for Configuring the Switch for SSH, page 2 Information

More information

Configuring Security for the ML-Series Card

Configuring Security for the ML-Series Card 19 CHAPTER Configuring Security for the ML-Series Card This chapter describes the security features of the ML-Series card. This chapter includes the following major sections: Understanding Security, page

More information

Configuring the WMIC for the First Time

Configuring the WMIC for the First Time Configuring the WMIC for the First Time This document describes how to configure basic settings on a Cisco Wireless Mobile Interface Card (WMIC) for the first time. Before You Start Before you install

More information

Configuring Secure Shell (SSH)

Configuring Secure Shell (SSH) Finding Feature Information, page 1 Prerequisites for Configuring the Switch for Secure Shell (SSH) and Secure Copy Protocol (SCP), page 1 Restrictions for Configuring the ControllerDevice for SSH, page

More information

Network security session 9-2 Router Security. Network II

Network security session 9-2 Router Security. Network II Network security session 9-2 Router Security Network II Router security First line of defense of the network Compromise of a router can lead to many issues: Denial of network services Degrading of network

More information

Firewall Authentication Proxy for FTP and Telnet Sessions

Firewall Authentication Proxy for FTP and Telnet Sessions Firewall Authentication Proxy for FTP and Telnet Sessions Last Updated: January 18, 2012 Before the introduction of the Firewall Authentication Proxy for FTP and Telnet Sessions feature, users could enable

More information

HTTP 1.1 Web Server and Client

HTTP 1.1 Web Server and Client HTTP 1.1 Web Server and Client Finding Feature Information HTTP 1.1 Web Server and Client Last Updated: June 01, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users

More information

ISE 2.3+ TACACS+ IPv6 Configuration Guide for Cisco IOS Based Network Devices with new Policy UI. Secure Access How-to User Series

ISE 2.3+ TACACS+ IPv6 Configuration Guide for Cisco IOS Based Network Devices with new Policy UI. Secure Access How-to User Series ISE 2.3+ TACACS+ IPv6 Configuration Guide for Cisco IOS Based Network Devices with new Policy UI Secure Access How-to User Series Author: Krishnan Thiruvengadam Technical Marketing, Policy and Access,,

More information

Configuring Secure Shell (SSH)

Configuring Secure Shell (SSH) Finding Feature Information, page 1 Prerequisites for Configuring Secure Shell, page 1 Restrictions for Configuring Secure Shell, page 2 Information about SSH, page 3 How to Configure SSH, page 5 Monitoring

More information

Operation Manual Login and User Interface. Table of Contents

Operation Manual Login and User Interface. Table of Contents Table of Contents Table of Contents Chapter 1 Switch Login... 1-1 1.1 Setting Up Configuration Environment Through the Console Port... 1-1 1.2 Setting Up Configuration Environment Through Telnet... 1-2

More information

Configure a Cisco Router with TACACS+ Authentication

Configure a Cisco Router with TACACS+ Authentication Configure a Cisco Router with TACACS+ Authentication Document ID: 13865 Contents Introduction Prerequisites Requirements Components Used Conventions Authentication Add Authorization Add Accounting Test

More information

Control Device Administration Using TACACS+

Control Device Administration Using TACACS+ Device Administration, page 1 Device Administration Work Center, page 3 Data Migration from Cisco Secure ACS to Cisco ISE, page 3 Device Admin Policy Sets, page 3 TACACS+ Authentication Settings, page

More information

Getting Started Using Cisco License Manager

Getting Started Using Cisco License Manager CHAPTER 5 This chapter provides information about the initial setup of Cisco License Manager and an overview of recommended steps to quickly add users and devices and obtain and deploy licenses. This chapter

More information

Lab Configuring and Verifying Extended ACLs Topology

Lab Configuring and Verifying Extended ACLs Topology Topology 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.10.1

More information

Configuring a Terminal/Comm Server

Configuring a Terminal/Comm Server Configuring a Terminal/Comm Server Document ID: 5466 Introduction Prerequisites Requirements Components Used Conventions Cabling Design Strategy Configure Network Diagram Configurations Command Summary

More information

Using the Management Interfaces

Using the Management Interfaces The following management interfaces are provided for external users and applications: Gigabit Ethernet Management Interface, page 1 SNMP, page 7 Gigabit Ethernet Management Interface Gigabit Ethernet Management

More information

Restrictions for Secure Copy Performance Improvement

Restrictions for Secure Copy Performance Improvement The Protocol (SCP) feature provides a secure and authenticated method for copying router configuration or router image files. SCP relies on Secure Shell (SSH), an application and a protocol that provide

More information

Lab 8.5.2: Troubleshooting Enterprise Networks 2

Lab 8.5.2: Troubleshooting Enterprise Networks 2 Lab 8.5.2: Troubleshooting Enterprise Networks 2 Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/0 192.168.10.1 255.255.255.0 N/A R1 Fa0/1 192.168.11.1 255.255.255.0

More information

TACACS+ Configuration Mode Commands

TACACS+ Configuration Mode Commands Important TACACS Configuration Mode is available in releases 11.0 and later. This chapter describes all commands available in the TACACS+ Configuration Mode. TACACS+ (Terminal Access Controller Access-Control

More information

HTTP 1.1 Web Server and Client

HTTP 1.1 Web Server and Client HTTP 1.1 Web Server and Client Last Updated: October 12, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users and applications by implementing support for HTTP 1.1

More information

Manage Users. About User Profiles. About User Roles

Manage Users. About User Profiles. About User Roles About User Profiles, page 1 About User Roles, page 1 Create Local Users, page 2 Edit Local Users, page 2 Delete Local Users, page 3 Change Your Own User Password, page 3 Display Role-Based Access Control

More information

Lab 7 Configuring Basic Router Settings with IOS CLI

Lab 7 Configuring Basic Router Settings with IOS CLI Lab 7 Configuring Basic Router Settings with IOS CLI Objectives Part 1: Set Up the Topology and Initialize Devices Cable equipment to match the network topology. Initialize and restart the router and switch.

More information

Configuring Lock-and-Key Security (Dynamic Access Lists)

Configuring Lock-and-Key Security (Dynamic Access Lists) Configuring Lock-and-Key Security (Dynamic Access Lists) Feature History Release Modification Cisco IOS For information about feature support in Cisco IOS software, use Cisco Feature Navigator. This chapter

More information

Configuring the Management Interface and Security

Configuring the Management Interface and Security CHAPTER 5 Configuring the Management Interface and Security Revised: February 15, 2011, Introduction This module describes how to configure the physical management interfaces (ports) as well as the various

More information

Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example

Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example Document ID: 45843 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Configure

More information

Configuring TACACS+ About TACACS+

Configuring TACACS+ About TACACS+ This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on Cisco NX-OS devices. This chapter includes the following sections: About TACACS+,

More information

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM This lab has been updated for use on NETLAB+ Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet Interfaces.

More information

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet Interfaces. 2016 Cisco and/or its affiliates. All

More information

Access Service Security

Access Service Security CHAPTER 4 Access Service Security The access service security paradigm presented in this guide uses the authentication, authorization, and accounting (AAA) facility: Authentication requires dial-in users

More information

Logging In and Setting Up

Logging In and Setting Up This chapter includes the following sections: Overview of, page 1 Resetting the Admin Password, page 3 Password Guidelines, page 3 Resetting the Shared Secret, page 4 Overview of You can log in and work

More information

Lab 5.6b Configuring AAA and RADIUS

Lab 5.6b Configuring AAA and RADIUS Lab 5.6b Configuring AAA and RADIUS Learning Objectives Install CiscoSecure ACS Configure CiscoSecure ACS as a RADIUS server Enable AAA on a router using a remote RADIUS server Topology Diagram Scenario

More information

ACS Shell Command Authorization Sets on IOS and ASA/PIX/FWSM Configuration Example

ACS Shell Command Authorization Sets on IOS and ASA/PIX/FWSM Configuration Example ACS Shell Command Authorization Sets on IOS and ASA/PIX/FWSM Configuration Example Document ID: 99361 Contents Introduction Prerequisites Requirements Components Used Conventions Command Authorization

More information

Configuring Security with Passwords, Privileges, and Logins

Configuring Security with Passwords, Privileges, and Logins Configuring Security with Passwords, Privileges, and Logins Cisco IOS based networking devices provide several features that can be used to implement basic security for CLI sessions using only the operating

More information

Passwords and Privileges Commands

Passwords and Privileges Commands Passwords and Privileges Commands This chapter describes the commands used to establish password protection and configure privilege levels. Password protection lets you restrict access to a network or

More information

Logging in through SNMP from an NMS 22 Overview 22 Configuring SNMP agent 22 NMS login example 24

Logging in through SNMP from an NMS 22 Overview 22 Configuring SNMP agent 22 NMS login example 24 Contents Logging in to the CLI 1 Login methods 1 Logging in through the console or AUX port 2 Introduction 2 Configuration procedure 2 Logging in through Telnet 6 Introduction 6 Logging in to the switch

More information

Logging in to the CLI

Logging in to the CLI Contents Logging in to the CLI 1 Login methods 1 Logging in through the console port 2 Introduction 2 Configuration procedure 2 Logging in through the AUX port 5 Configuration prerequisites 5 Configuration

More information

AAA Authorization and Authentication Cache

AAA Authorization and Authentication Cache AAA Authorization and Authentication Cache First Published: March 16, 2006 Last Updated: March 1, 2006 The AAA Authorization and Authentication Cache feature allows you to cache authorization and authentication

More information

Lab Securing Network Devices

Lab Securing Network Devices Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A S1 VLAN 1 192.168.1.11 255.255.255.0 192.168.1.1 PC-A NIC 192.168.1.3

More information

Configuring Secure Shell

Configuring Secure Shell Configuring Secure Shell Last Updated: October 24, 2011 The Secure Shell (SSH) feature is an application and a protocol that provides a secure replacement to the Berkeley r-tools. The protocol secures

More information

Role-Based CLI Access

Role-Based CLI Access Role-Based CLI Access The Role-Based CLI Access feature allows the network administrator to define views, which are a set of operational commands and configuration capabilities that provide selective or

More information

Configuring RADIUS. Information About RADIUS. RADIUS Network Environments. Send document comments to

Configuring RADIUS. Information About RADIUS. RADIUS Network Environments. Send document comments to 3 CHAPTER This chapter describes how to configure Remote Access Dial-In User Service (RADIUS) protocol on NX-OS devices. This chapter includes the following sections: Information About RADIUS, page 3-1

More information

Controlling Switch Access with Passwords and Privilege Levels

Controlling Switch Access with Passwords and Privilege Levels Controlling Switch Access with Passwords and Privilege Levels Finding Feature Information, page 1 Restrictions for Controlling Switch Access with Passwords and Privileges, page 1 Information About Passwords

More information

Lab Configure Basic AP Security through IOS CLI

Lab Configure Basic AP Security through IOS CLI Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following

More information

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces. 2015 Cisco and/or its affiliates. All rights

More information

Control Device Administration Using TACACS+

Control Device Administration Using TACACS+ Device Administration, page 1 Device Administration Work Center, page 3 Data Migration from Cisco Secure ACS to Cisco ISE, page 3 Device Administration Deployment Settings, page 3 Device Admin Policy Sets,

More information

Configuring RADIUS Servers

Configuring RADIUS Servers CHAPTER 7 This chapter describes how to enable and configure the Remote Authentication Dial-In User Service (RADIUS), that provides detailed accounting information and flexible administrative control over

More information

Control Device Administration Using TACACS+

Control Device Administration Using TACACS+ Device Administration, page 1 Device Administration Work Center, page 3 Data Migration from Cisco Secure ACS to Cisco ISE, page 3 Device Administration Deployment Settings, page 3 Device Admin Policy Sets,

More information

CCNA Security 1.0 Student Packet Tracer Manual

CCNA Security 1.0 Student Packet Tracer Manual 1.0 Student Packet Tracer Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

Password Strength and Management for Common Criteria

Password Strength and Management for Common Criteria Password Strength and Management for Common Criteria The Password Strength and Management for Common Criteria feature is used to specify password policies and security mechanisms for storing, retrieving,

More information

How to configure MB5000 Serial Port Bridge mode

How to configure MB5000 Serial Port Bridge mode How to configure MB5000 Serial Port Bridge mode MB5000 has a configurable serial port. With this serial port, MB5000 can be used as DCE device to be connected with Cisco router s console port so that MB5000

More information

King Fahd University of Petroleum & Minerals. Configuration of Routers and Establishing Routed Networks

King Fahd University of Petroleum & Minerals. Configuration of Routers and Establishing Routed Networks King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 7 Objectives: Configuration of Routers and Establishing Routed Networks The objective of this experiment

More information

Configuring Management Access

Configuring Management Access 37 CHAPTER This chapter describes how to access the ASA for system management through Telnet, SSH, and HTTPS (using ASDM), how to authenticate and authorize users, how to create login banners, and how

More information

Configuring RADIUS and TACACS+ Servers

Configuring RADIUS and TACACS+ Servers CHAPTER 13 This chapter describes how to enable and configure the Remote Authentication Dial-In User Service (RADIUS) and Terminal Access Controller Access Control System Plus (TACACS+), that provides

More information

Getting Started with CMS

Getting Started with CMS CHAPTER 3 This chapter contains these sections that describe the Cluster Management Suite (CMS) on the Catalyst 3750 switch: Understanding CMS section on page 3-1 Configuring CMS section on page 3-8 Displaying

More information

Lab Configure Basic AP security through GUI

Lab Configure Basic AP security through GUI Lab 8.3.1.1 Configure Basic AP security through GUI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following objectives:

More information

CISCO SWITCH BEST PRACTICES GUIDE

CISCO SWITCH BEST PRACTICES GUIDE CISCO SWITCH BEST PRACTICES GUIDE Table of Contents (After Clicking Link Hit HOME to Return to TOC) 1) Add Hostname... 2 2) Add Username and Password... 2 3) Create Secret Password... 2 4) Encrypt Password...

More information

Managing NCS User Accounts

Managing NCS User Accounts 7 CHAPTER The Administration enables you to schedule tasks, administer accounts, and configure local and external authentication and authorization. Also, set logging options, configure mail servers, and

More information

NBAR2 HTTP-Based Visibility Dashboard

NBAR2 HTTP-Based Visibility Dashboard The NBAR2 HTTP-based Visibility Dashboard provides a web interface displaying network traffic data and related information. The information is presented in an intuitive, interactive graphical format. Finding

More information

Create User Profiles and Assign Privileges

Create User Profiles and Assign Privileges Create User Profiles and Assign Privileges To provide controlled access to the System Admin configurations on the Cisco NCS 6008 router, user profiles are created with assigned privileges. The privileges

More information

Lock and Key: Dynamic Access Lists

Lock and Key: Dynamic Access Lists Lock and Key: Dynamic Access Lists Document ID: 7604 Contents Introduction Prerequisites Requirements Components Used Conventions Spoofing Considerations Performance When to Use Lock and Key Access Lock

More information

Cisco IOS Login Enhancements-Login Block

Cisco IOS Login Enhancements-Login Block The Cisco IOS Login Enhancements (Login Block) feature allows users to enhance the security of a router by configuring options to automatically block further login attempts when a possible denial-of-service

More information

ISE TACACS+ Configuration Guide for Cisco ASA. Secure Access How-to User Series

ISE TACACS+ Configuration Guide for Cisco ASA. Secure Access How-to User Series ISE TACACS+ Configuration Guide for Cisco ASA Secure Access How-to User Series Author: Technical Marketing, Policy and Access, Security Business Group, Cisco Systems Date: February 2016 Table of Contents

More information

Managing GSS Devices from the GUI

Managing GSS Devices from the GUI CHAPTER 1 This chapter describes how to configure and manage your Global Site Selector Manager (GSSM) and Global Site Selector (GSS) devices from the primary GSSM graphical user interface. It includes

More information

PROTECTING NETWORK INFRASTRUCTURE - ROUTERS, SWITCHES, ETC.

PROTECTING NETWORK INFRASTRUCTURE - ROUTERS, SWITCHES, ETC. PROTECTING NETWORK INFRASTRUCTURE - ROUTERS, SWITCHES, ETC. Configuration Corrupt Config Database RADB Intercept Configuration Transport Transport Attacks Trojan Horses in Code 2-4-2 Network Infrastructure

More information

Configuring the Access Point/Bridge for the First Time

Configuring the Access Point/Bridge for the First Time CHAPTER 2 Configuring the Access Point/Bridge for the First Time This chapter describes how to configure basic settings on your access point/bridge for the first time. You can configure all the settings

More information

Configure ASR9k TACACS with Cisco Secure ACS 5.x Server

Configure ASR9k TACACS with Cisco Secure ACS 5.x Server Configure ASR9k TACACS with Cisco Secure ACS 5.x Server Contents Introduction Prerequisites Requirements Components Used Configuration Predefined Components on IOS XR Predefined User Groups Predefined

More information

User and System Administration

User and System Administration CHAPTER 2 This chapter provides information about performing user and system administration tasks and generating diagnostic information for obtaining technical assistance. The top-level Admin window displays

More information

Configuration of Cisco ACS 5.2 Radius authentication with comware v7 switches 2

Configuration of Cisco ACS 5.2 Radius authentication with comware v7 switches 2 Contents Configuration of Cisco ACS 5.2 Radius authentication with comware v7 switches 2 Network requirements: 2 Networking diagram 2 Configuration steps 2 Cisco ACS 5.2 configuration 4 Verifying the working

More information

Lab Configuring an ISR with SDM Express

Lab Configuring an ISR with SDM Express Lab 5.2.3 Configuring an ISR with SDM Express Objectives Configure basic router global settings router name, users, and login passwords using Cisco SDM Express. Configure LAN and Internet connections on

More information

AAA Configuration. Terms you ll need to understand:

AAA Configuration. Terms you ll need to understand: 10 AAA Configuration............................................... Terms you ll need to understand: AAA Cisco Secure Access Control Server (CSACS) TACACS+ RADIUS Downloadable access control lists Cut-through

More information

Configuring Authentication Proxy

Configuring Authentication Proxy The Cisco IOS Firewall Authentication Proxy feature provides dynamic, per-user authentication and authorization, authenticating users against industry standard TACACS+ and RADIUS authentication protocols.

More information

Controlling Switch Access with Passwords and Privilege Levels

Controlling Switch Access with Passwords and Privilege Levels Controlling Switch Access with Passwords and Privilege Levels Finding Feature Information, page 1 Restrictions for Controlling Switch Access with Passwords and Privileges, page 1 Information About Passwords

More information