EasyManuals Logo

Cisco Catalyst 3850 Guide

Cisco Catalyst 3850
120 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #32 background imageLoading...
Page #32 background image
Initial Switch Configuration
Assign Initial Management Information
20
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
Configure SNMP for Remote Management
Step 4 Enable Simple Network Management Protocol (SNMP) to allow the network infrastructure devices to
be managed by a remote Network Management System (NMS). Configure SNMPv2c read-only and
read-write community strings, as shown in the following example. Once SNMP community strings are
configured, then SNMP tools can be used to monitor the 3850 which includes statistics.
Configure Local Login and Password for Switch Access
Step 5 Configure a local user ID and password to secure access to the switch.
We recommend that you encrypt passwords to secure access to the device configuration mode and
prevent the display of plain text passwords in configuration files.
Configure Centralized User Authentication Through TACACS+
Note Configuring the TACACS+ protocol is optional and recommended only when using TACACS to manage
all of your network devices.
Step 6 Configure centralized user authentication through the TACACS+ protocol.
As networks increase the number of devices to maintain, there is an operational burden to maintain local
user accounts on every device. A centralized authentication, authorization, and accounting (AAA)
service reduces operational tasks on each device and provides an audit log of user access for security
compliance and root-cause analysis. When AAA is enabled for access control, all management access to
the network infrastructure devices (SSH and HTTPS) is controlled by the AAA service.
TACACS+ is the primary protocol used to authenticate management infrastructure devices to determine
whether access can be allowed to the AAA server. A local AAA user database defined on each network
infrastructure device to provide a fallback authentication source in case the centralized TACACS+ server
is unavailable.
This example shows how to configure the switch for TACACS administrative access.
snmp-server community my-SNMP-RO-name RO
snmp-server community my-SNMP-RW-name RW
username admin privilege 15 secret my-password
enable secret my-secret-password
service password-encryption

Table of Contents

Other manuals for Cisco Catalyst 3850

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 3850 and is the answer not in the manual?

Cisco Catalyst 3850 Specifications

General IconGeneral
Stacking Bandwidth480 Gbps
Max Stacking Units9
Form FactorRack-mountable
RAM4 GB
Flash Memory4 GB
Operating SystemCisco IOS XE
ModelCatalyst 3850
Ports24 or 48 Gigabit Ethernet ports
Uplink Interfaces4 x 1GE, 2 x 10GE, or 4 x 10GE
Power SupplyRedundant power supplies
Dimensions44.5 x 44.8 x 4.45 cm
Weight7.6 kg
FeaturesIPv6
Power over Ethernet (PoE)PoE, PoE+, UPOE (varies by model)
Operating Temperature0 to 40°C

Related product manuals