EasyManuals Logo

Cisco Catalyst 3750-X User Manual

Cisco Catalyst 3750-X
1438 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #235 background imageLoading...
Page #235 background image
CHAPTER
10-1
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-21521-01
10
Configuring Switch-Based Authentication
This chapter describes how to configure switch-based authentication on the Catalyst 3750-X or 3560-X
switch. Unless otherwise noted, the term switch refers to a Catalyst 3750-X or 3560-X standalone switch
and to a Ca
talyst 3750-X switch stack.
This chapter consists of these sections:
Preventing Unauthorized Access to Your Switch, page 10-1
Protecting Access to Privileged EXEC Commands, page 10-2
Controlling Switch Access with TACACS+, page 10-10
Controlling Switch Access with RADIUS, page 10-17
Controlling Switch Access with Kerberos, page 10-39
Configuring the Switch for Local Authentication and Authorization, page 10-43
Configuring the Switch for Secure Shell, page 10-44
Configuring the Switch for Secure Socket Layer HTTP, page 10-49
Configuring the Switch for Secure Copy Protocol, page 10-55
Preventing Unauthorized Access to Your Switch
You can prevent unauthorized users from reconfiguring your switch and viewing configuration
information. Typically, you want network administrators to have access to your switch while you restrict
access to users who dial from outside the network through an asynchronous port, connect from outside
the network through a serial port, or connect through a terminal or workstation from within the local
network.
To prevent unauthorized access into your switch, you should configure one or more of these security
feature
s:
At a minimum, you should configure passwords and privileges at each switch port. These passwords
are locally stored on the switch. When users attempt to access the switch through a port or line, they
must enter the password specified for the port or line before they can access the switch. For more
information, see the “Protecting Access to Privileged EXEC Commands” section on page 10-2.
For an additional layer of security, you can also configure username and password pairs, which are
locally stored on the switch. These pairs are assigned to lines or ports and authenticate each user
before that user can access the switch. If you have defined privilege levels, you can also assign a
specific privilege level (with associated rights and privileges) to each username and password pair.
For more information, see the “Configuring Username and Password Pairs” section on page 10-6.

Table of Contents

Other manuals for Cisco Catalyst 3750-X

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 3750-X and is the answer not in the manual?

Cisco Catalyst 3750-X Specifications

General IconGeneral
Switching Capacity160 Gbps
Stacking Bandwidth64 Gbps
Max Stacking Units9
Layer SupportLayer 2 and Layer 3
Form FactorRack-mountable
DRAM256 MB
Flash Memory64 MB
ModelCisco Catalyst 3750-X Series
Ports24 or 48 10/100/1000 Ethernet ports
Uplink Interfaces4 SFP or 2 SFP+
FeaturesStackWise Plus, EnergyWise
ImageIP Base or IP Services
Operating Temperature0 to 40°C
Operating Humidity10 to 85% noncondensing

Related product manuals