02.10.2013 Views

FTOS Configuration Guide for the C-Series - Force10 Networks

FTOS Configuration Guide for the C-Series - Force10 Networks

FTOS Configuration Guide for the C-Series - Force10 Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

To use local au<strong>the</strong>ntication <strong>for</strong> enable secret on console, while using remote au<strong>the</strong>ntication on VTY lines,<br />

per<strong>for</strong>m <strong>the</strong> following steps:<br />

<strong>Force10</strong>(config)# aaa au<strong>the</strong>ntication enable mymethodlist radius tacacs<br />

<strong>Force10</strong>(config)# line vty 0 9<br />

<strong>Force10</strong>(config-line-vty)# enable au<strong>the</strong>ntication mymethodlist<br />

Server-side configuration<br />

TACACS+: When using TACACS+, <strong>Force10</strong> sends an initial-packet with service type SVC_ENABLE,<br />

and <strong>the</strong>n, a second packet with just <strong>the</strong> password. The tacacs-server must have an entry <strong>for</strong> username<br />

$enable$.<br />

RADIUS: When using RADIUS au<strong>the</strong>ntication, <strong>FTOS</strong> sends an au<strong>the</strong>ntication packet with <strong>the</strong> following:<br />

Username: $enab15$<br />

Password: <br />

There<strong>for</strong>e, <strong>the</strong> RADIUS server must have an entry <strong>for</strong> this user name.<br />

AAA Authorization<br />

<strong>FTOS</strong> enables AAA new-model by default.You can set authorization to be ei<strong>the</strong>r local or remote. Different<br />

combinations of au<strong>the</strong>ntication and authorization yield different results. By default, <strong>FTOS</strong> sets both to<br />

local.<br />

Privilege Levels Overview<br />

Limiting access to <strong>the</strong> system is one method of protecting <strong>the</strong> system and your network. However, at times,<br />

you might need to allow o<strong>the</strong>rs access to <strong>the</strong> router and you can limit that access to a subset of commands.<br />

In <strong>FTOS</strong>, you can configure a privilege level <strong>for</strong> users who need limited access to <strong>the</strong> system.<br />

Every command in <strong>FTOS</strong> is assigned a privilege level of 0, 1 or 15. You can configure up to 16 privilege<br />

levels in <strong>FTOS</strong>. <strong>FTOS</strong> is pre-configured with 3 privilege levels and you can configure 13 more. The three<br />

pre-configured levels are:<br />

• Privilege level 1—is <strong>the</strong> default level <strong>for</strong> <strong>the</strong> EXEC mode. At this level, you can interact with <strong>the</strong><br />

router, <strong>for</strong> example, view some show commands and Telnet and ping to test connectivity, but you<br />

cannot configure <strong>the</strong> router. This level is often called <strong>the</strong> “user” level. One of <strong>the</strong> commands available<br />

in Privilege level 1 is <strong>the</strong> enable command, which you can use to enter a specific privilege level.<br />

• Privilege level 0—contains only <strong>the</strong> end, enable and disable commands.<br />

<strong>FTOS</strong> <strong>Configuration</strong> <strong>Guide</strong>, version 7.7.1.0 139

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!