EasyManuals Logo

Cisco Catalyst 3750-X User Manual

Cisco Catalyst 3750-X
1438 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #274 background imageLoading...
Page #274 background image
10-40
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-21521-01
Chapter 10 Configuring Switch-Based Authentication
Controlling Switch Access with Kerberos
Kerberos verifies that users are who they claim to be and the network services that they use are what the
services claim to be. To do this, a KDC or trusted Kerberos server issues tickets to users. These tickets,
which have a limited lifespan, are stored in user credential caches. The Kerberos server uses the tickets
instead of usernames and passwords to authenticate users and network services.
Note A Kerberos server can be a Catalyst 3750-X or 3560-X switch that is configured as a network security
server and that can authenticate users by using the Kerberos protocol.
The Kerberos credential scheme uses a process called single logon. This process authenticates a user
once and then allows secure authentication (without encrypting another password) wherever that user
credential is accepted.
This software release supports Kerberos 5, which allows organizations that are already using Kerberos 5
to use the sa
me Kerberos authentication database on the KDC that they are already using on their other
network hosts (such as UNIX servers and PCs).
In this software release, Kerberos su
pports these network services:
Telnet
rlogin
rsh (Remote Shell Protocol)
Table 10-5 li
sts the common Kerberos-related terms and definitions:
Ta ble 10-5 Kerberos Terms
Term Definition
Authentication A process by which a user or service identifies itself to another service.
F
or example, a client can authenticate to a switch or a switch can
authenticate to another switch.
Authorization A means by which the switch identifies what privileges the user has in a
netw
ork or on the switch and what actions the user can perform.
Credential A general term that refers to authentication tickets, such as TGTs
1
and
service credentials. Kerberos credentials v
erify the identity of a user or
service. If a network service decides to trust the Kerberos server that
issued a ticket, it can be used in place of re-entering a username and
password. Credentials have a default lifespan of eight hours.
Instance An authorization level label for Kerberos principals. Most Kerberos
principals
are of the form user@REALM (for example,
smith@EXAMPLE.COM). A Kerberos principal with a Kerberos
instance has the form user/instance@REALM (for example,
smith/admin@EXAMPLE.COM). The Kerberos instance can be used to
specify the authorization level for the user if authentication is successful.
The server of each network service might implement and enforce the
authorization mappings of Kerberos instances but is not required to do so.
Note The Kerberos principal and instance names must be in all
lowercase characters.
Note The Kerberos realm name must be in all uppercase characters.
KDC
2
Key distribution center that consists of a Kerberos server and database
program that is running on a network host.

Table of Contents

Other manuals for Cisco Catalyst 3750-X

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 3750-X and is the answer not in the manual?

Cisco Catalyst 3750-X Specifications

General IconGeneral
Switching Capacity160 Gbps
Stacking Bandwidth64 Gbps
Max Stacking Units9
Layer SupportLayer 2 and Layer 3
Form FactorRack-mountable
DRAM256 MB
Flash Memory64 MB
ModelCisco Catalyst 3750-X Series
Ports24 or 48 10/100/1000 Ethernet ports
Uplink Interfaces4 SFP or 2 SFP+
FeaturesStackWise Plus, EnergyWise
ImageIP Base or IP Services
Operating Temperature0 to 40°C
Operating Humidity10 to 85% noncondensing

Related product manuals