EasyManuals Logo

Cisco Unified Access CT5760 Guide

Cisco Unified Access CT5760
120 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #32 background imageLoading...
Page #32 background image
Initial Switch Configuration
Assign Initial Management Information
20
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
Configure SNMP for Remote Management
Step 4 Enable Simple Network Management Protocol (SNMP) to allow the network infrastructure devices to
be managed by a remote Network Management System (NMS). Configure SNMPv2c read-only and
read-write community strings, as shown in the following example. Once SNMP community strings are
configured, then SNMP tools can be used to monitor the 3850 which includes statistics.
Configure Local Login and Password for Switch Access
Step 5 Configure a local user ID and password to secure access to the switch.
We recommend that you encrypt passwords to secure access to the device configuration mode and
prevent the display of plain text passwords in configuration files.
Configure Centralized User Authentication Through TACACS+
Note Configuring the TACACS+ protocol is optional and recommended only when using TACACS to manage
all of your network devices.
Step 6 Configure centralized user authentication through the TACACS+ protocol.
As networks increase the number of devices to maintain, there is an operational burden to maintain local
user accounts on every device. A centralized authentication, authorization, and accounting (AAA)
service reduces operational tasks on each device and provides an audit log of user access for security
compliance and root-cause analysis. When AAA is enabled for access control, all management access to
the network infrastructure devices (SSH and HTTPS) is controlled by the AAA service.
TACACS+ is the primary protocol used to authenticate management infrastructure devices to determine
whether access can be allowed to the AAA server. A local AAA user database defined on each network
infrastructure device to provide a fallback authentication source in case the centralized TACACS+ server
is unavailable.
This example shows how to configure the switch for TACACS administrative access.
snmp-server community my-SNMP-RO-name RO
snmp-server community my-SNMP-RW-name RW
username admin privilege 15 secret my-password
enable secret my-secret-password
service password-encryption

Table of Contents

Other manuals for Cisco Unified Access CT5760

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Unified Access CT5760 and is the answer not in the manual?

Cisco Unified Access CT5760 Specifications

General IconGeneral
BrandCisco
ModelUnified Access CT5760
CategorySwitch
LanguageEnglish

Related product manuals