02.10.2013 Views

FTOS Configuration Guide for the C-Series - Force10 Networks

FTOS Configuration Guide for the C-Series - Force10 Networks

FTOS Configuration Guide for the C-Series - Force10 Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>FTOS</strong> can assign different access classes to different users by username. Until users attempt to log in,<br />

<strong>FTOS</strong> does not know if <strong>the</strong>y will be assigned a VTY line. This means that incoming users always see a<br />

login prompt even if you have excluded <strong>the</strong>m from <strong>the</strong> VTY line with a deny-all access class. Once users<br />

identify <strong>the</strong>mselves, <strong>FTOS</strong> retrieves <strong>the</strong> access class from <strong>the</strong> local database and applies it. (<strong>FTOS</strong> also<br />

subsequently can close <strong>the</strong> connection if a user is denied access).<br />

Figure 70 shows how to allow or deny a Telnet connection to a user. Users will see a login prompt, even if<br />

<strong>the</strong>y cannot login. No access class is configured <strong>for</strong> <strong>the</strong> VTY line. It defaults from <strong>the</strong> local database.<br />

Figure 70 Example Access-Class <strong>Configuration</strong> Using Local Database<br />

<strong>Force10</strong>(conf)#user gooduser password abc privilege 10 access-class permitall<br />

<strong>Force10</strong>(conf)#user baduser password abc privilege 10 access-class denyall<br />

<strong>Force10</strong>(conf)#<br />

<strong>Force10</strong>(conf)#aaa au<strong>the</strong>ntication login localmethod local<br />

<strong>Force10</strong>(conf)#<br />

<strong>Force10</strong>(conf)#line vty 0 9<br />

<strong>Force10</strong>(config-line-vty)#login au<strong>the</strong>ntication localmethod<br />

<strong>Force10</strong>(config-line-vty)#end<br />

Note: See also <strong>the</strong> section Applying an ACL on Loopback Interfaces on page 348.<br />

156 Security

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!