EasyManuals Logo

Cisco Catalyst 3750 Software Configuration Guide

Cisco Catalyst 3750
926 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #123 background imageLoading...
Page #123 background image
CHAPTER
7-1
Catalyst 3750 Metro Switch Software Configuration Guide
78-15870-01
7
Configuring Switch-Based Authentication
This chapter describes how to configure switch-based authentication on the Catalyst 3750 Metro switch.
It consists of these sections:
Preventing Unauthorized Access to Your Switch, page 7-1
Protecting Access to Privileged EXEC Commands, page 7-2
Controlling Switch Access with TACACS+, page 7-10
Controlling Switch Access with RADIUS, page 7-17
Controlling Switch Access with Kerberos, page 7-31
Configuring the Switch for Local Authentication and Authorization, page 7-36
Configuring the Switch for Secure Shell, page 7-37
Preventing Unauthorized Access to Your Switch
You can prevent unauthorized users from reconfiguring your switch and viewing configuration
information. Typically, you want network administrators to have access to your switch while you restrict
access to users who dial from outside the network through an asynchronous port, connect from outside
the network through a serial port, or connect through a terminal or workstation from within the local
network.
To prevent unauthorized access into your switch, you should configure one or more of these security
features:
At a minimum, you should configure passwords and privileges at each switch port. These passwords
are locally stored on the switch. When users attempt to access the switch through a port or line, they
must enter the password specified for the port or line before they can access the switch. For more
information, see the “Protecting Access to Privileged EXEC Commands” section on page 7-2.
For an additional layer of security, you can also configure username and password pairs, which are
locally stored on the switch. These pairs are assigned to lines or ports and authenticate each user
before that user can access the switch. If you have defined privilege levels, you can also assign a
specific privilege level (with associated rights and privileges) to each username and password pair.
For more information, see the “Configuring Username and Password Pairs” section on page 7-6.
If you want to use username and password pairs, but you want to store them centrally on a server
instead of locally, you can store them in a database on a security server. Multiple networking devices
can then use the same database to obtain user authentication (and, if necessary, authorization)
information. For more information, see the “Controlling Switch Access with TACACS+” section on
page 7-10.

Table of Contents

Other manuals for Cisco Catalyst 3750

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 3750 and is the answer not in the manual?

Cisco Catalyst 3750 Specifications

General IconGeneral
Device TypeSwitch
Switching Capacity32 Gbps
Forwarding Rate38.7 Mpps
Stacking Bandwidth32 Gbps
RAM128 MB
Jumbo Frame SupportYes
Switch TypeManaged
ModelCatalyst 3750 Series
Uplink InterfacesSFP
Form FactorRack-mountable
MAC Address Table Size12, 000 entries
Routing ProtocolRIP, OSPF, EIGRP
Remote Management ProtocolSNMP, Telnet, HTTP
FeaturesLayer 3 switching, Layer 2 switching, auto-negotiation, BOOTP support, ARP support, VLAN support, auto-uplink (auto MDI/MDI-X), IGMP snooping, traffic shaping, MAC address filtering, Quality of Service (QoS), Jumbo Frames support, MLD snooping, Dynamic ARP Inspection (DAI), Cisco EnergyWise technology
Power over Ethernet (PoE)PoE
Operating Temperature-5 - 45 °C
Operating Humidity10% to 85% non-condensing

Related product manuals