19.10.2013 Views

7.6.1.0 - Force10 Networks

7.6.1.0 - Force10 Networks

7.6.1.0 - Force10 Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

FTOS can assign different access classes to different users by username. Until the user attempts to login,<br />

FTOS does not know if they will be assigned a VTY line. This means that an incoming user always sees a<br />

login prompt even if you have excluded them from the VTY line with a deny-all access class. Once the<br />

user identifies themselves, FTOS retrieves the access class from the local database and applies it. (FTOS<br />

also subsequently can close the connection if the user is denied access).<br />

.<br />

<strong>Force10</strong>(conf)#user gooduser password abc privilege 10 access-class permitall<br />

<strong>Force10</strong>(conf)#user baduser password abc privilege 10 access-class denyall<br />

<strong>Force10</strong>(conf)#<br />

<strong>Force10</strong>(conf)#aaa authentication login localmethod local<br />

<strong>Force10</strong>(conf)#<br />

<strong>Force10</strong>(conf)#line vty 0 9<br />

<strong>Force10</strong>(config-line-vty)#login authentication localmethod<br />

<strong>Force10</strong>(config-line-vty)#end<br />

Figure 59 Example Access-Class Configuration Using Local Database<br />

VTY Line Remote Authentication and Authorization<br />

FTOS retrieves the access class from the VTY line.<br />

The <strong>Force10</strong> OS takes the access class from the VTY line and applies it to ALL users. FTOS does not need<br />

to know the identity of the incoming user and can immediately apply the access class. If the authentication<br />

method is radius, TACACS+, or line, and you have configured an access class for the VTY line, FTOS<br />

immediately applies it. If the access-class is deny all or deny for the incoming subnet, FTOS closes the<br />

connection without displaying the login prompt.<br />

<strong>Force10</strong>(conf)#ip access-list standard deny10<br />

<strong>Force10</strong>(conf-ext-nacl)#permit 10.0.0.0/8<br />

<strong>Force10</strong>(conf-ext-nacl)#deny any<br />

<strong>Force10</strong>(conf)#<br />

<strong>Force10</strong>(conf)#aaa authentication login tacacsmethod tacacs+<br />

<strong>Force10</strong>(conf)#tacacs-server host 256.1.1.2 key force10<br />

<strong>Force10</strong>(conf)#<br />

<strong>Force10</strong>(conf)#line vty 0 9<br />

<strong>Force10</strong>(config-line-vty)#login authentication tacacsmethod<br />

<strong>Force10</strong>(config-line-vty)#<br />

<strong>Force10</strong>(config-line-vty)#access-class deny10<br />

<strong>Force10</strong>(config-line-vty)#end<br />

(same applies for radius and line authentication)<br />

Figure 60 Example Access Class Configuration Using TACACS+ Without Prompt<br />

VTY MAC-SA Filter Support<br />

FTOS supports MAC access lists which permit or deny users based on their source MAC address. With<br />

this approach, you can implement a security policy based on the source MAC address.<br />

FTOS Configuration Guide, version <strong>7.6.1.0</strong> 125

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!