EasyManuals Logo

Cisco Catalyst 4948 User Manual

Cisco Catalyst 4948
359 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #202 background imageLoading...
Page #202 background image
Chapter 11: Controlling Traffic and Switch Access 181
Section 11-5
b. Configure privileged-level authentication:
(global) line [aux | console | tty | vty] line-number [ending-line-number]
(global) login authentication {default | list-name}
Use this command to enable or disable privileged-level local authentication for
the console, telnet, http, or all services on a switch.
2. Configure TACACS authentication.
It is also possible to configure the switch to authenticate users from a database on a
TACACS server. For this to work, a username and password must be configured on
the TACACS server. After the server has been configured, you use the following
commands to provide TACACS authentication.
a. Configure the TACACS server:
(global)tacacs-server host hostname [single-connection] [port integer]
[timeout integer] [key string]
This command specifies the address of the TACACS server. This assumes that the
switch has been configured for an IP address and has a gateway if necessary to
reach the server. You can specify multiple servers if one of the devices is not
functioning.
b. Enable TACACS authentication for user level:
(global) aaa authentication login {default | group | tacacs+ | local}
After you specify the server address, you set the user-level authentication
process to use the tacacs option for the console, telnet, http, or all services. If
that fails, other authentication methods, such as local login, are attempted.
c. Specify the TACACS key:
(global) tacacs-server key key
Because the information between the TACACS device and the switch is encrypt-
ed, you must also supply the TACACS process with the key that is used by the
server. This command specifies the key used.
3. Configure RADIUS authentication.
In addition to local or TACACS, you can configure the switch to authenticate users
from a database on a RADIUS server. For this to work, a username and password
must be configured on the RADIUS server. After the server has been configured,
you use the following commands to provide RADIUS authentication.
a. Configure the RADIUS server:
(global) radius-server host {hostname | ip_address}

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 4948 and is the answer not in the manual?

Cisco Catalyst 4948 Specifications

General IconGeneral
Switching Capacity136 Gbps
Forwarding Rate102 Mpps
Rack Units1U
MAC Address Table Size32, 000 entries
Authentication MethodRADIUS, TACACS+
RAM256 MB
Flash Memory64 MB
Power DeviceInternal power supply
Voltage Required100-240 VAC
Weight16.5 lbs
Operating Humidity10% to 85% non-condensing
Ports48 x 10/100/1000
Power SupplyInternal
Layer SupportLayer 3
Jumbo Frame SupportYes (up to 9216 bytes)
Routing ProtocolRIP, OSPF, EIGRP, BGP
Remote Management ProtocolSNMP, Telnet, SSH
FeaturesVLAN support, QoS
Compliant StandardsIEEE 802.3, IEEE 802.3u, IEEE 802.3ab, IEEE 802.1Q, IEEE 802.1p
Operating Temperature32 °F to 104 °F (0 °C to 40 °C)

Related product manuals