09.12.2012 Views

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Caution should be taken when using authorization, because mistakes<br />

can lead <strong>to</strong> wasted time messing with rommon. Make sure before you<br />

implement authorization services that au<strong>the</strong>ntication is fully<br />

configured and tested.<br />

There are three authorization commands used for restricting access:<br />

two for controlling EXEC command access, and one for controlling<br />

<strong>network</strong> events:<br />

• Starting an EXEC shell— .<br />

• Specific EXEC commands—. This option must be used in conjunction with <strong>the</strong><br />

IOS's command, which is used <strong>to</strong> assign specific<br />

privilege levels for commands.<br />

• Starting a <strong>network</strong> event (SLIP, PPP, and so on)—.<br />

For example, <strong>to</strong> have RADIUS verify whe<strong>the</strong>r <strong>the</strong> user profile has<br />

rights <strong>to</strong> use PPP, use:<br />

<br />

An alternative <strong>to</strong> this would be <strong>to</strong> permit a PPP session if <strong>the</strong> user has<br />

been au<strong>the</strong>nticated:<br />

<br />

If you only want certain TACACS+ users <strong>to</strong> have access <strong>to</strong> privileged<br />

mode, you would need <strong>to</strong> use:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!