December 2000 v
SETTING A TELNET PASSWORD ...........................................................................................................3-9
S
ETTING PASSWORDS FOR MANAGEMENT PRIVILEGE LEVELS ..............................................................3-10
R
ECOVERING FROM A LOST PASSWORD ..............................................................................................3-11
D
ISPLAYING THE SNMP COMMUNITY STRING ......................................................................................3-12
D
ISABLING PASSWORD ENCRYPTION ...................................................................................................3-12
SETTING UP LOCAL USER ACCOUNTS .......................................................................................................3-12
C
ONFIGURING A LOCAL USER ACCOUNT .............................................................................................3-13
E
STABLISHING SNMP COMMUNITY STRINGS .............................................................................................3-14
ENCRYPTION OF SNMP COMMUNITY STRINGS ...................................................................................3-15
A
DDING AN SNMP COMMUNITY STRING .............................................................................................3-15
D
ISPLAYING THE SNMP COMMUNITY STRINGS ....................................................................................3-16
CONFIGURING TACACS/TACACS+ SECURITY .........................................................................................3-18
H
OW TACACS+ DIFFERS FROM TACACS .........................................................................................3-18
TACACS/TACACS+ A
UTHENTICATION, AUTHORIZATION, AND ACCOUNTING .......................................3-18
TACACS/TACACS+ CONFIGURATION CONSIDERATIONS ....................................................................3-22
I
DENTIFYING THE TACACS/TACACS+ SERVERS ...............................................................................3-22
S
ETTING OPTIONAL TACACS/TACACS+ PARAMETERS .....................................................................3-23
C
ONFIGURING AUTHENTICATION-METHOD LISTS FOR TACACS/TACACS+ .........................................3-24
C
ONFIGURING TACACS+ AUTHORIZATION .........................................................................................3-25
C
ONFIGURING TACACS+ ACCOUNTING ..............................................................................................3-27
C
ONFIGURING AN INTERFACE AS THE SOURCE FOR ALL TACACS/TACACS+ PACKETS ......................3-27
D
ISPLAYING TACACS/TACACS+ STATISTICS AND CONFIGURATION INFORMATION ..............................3-28
C
ONFIGURING RADIUS SECURITY ............................................................................................................3-33
RADIUS A
UTHENTICATION, AUTHORIZATION, AND ACCOUNTING ..........................................................3-33
RADIUS C
ONFIGURATION CONSIDERATIONS ......................................................................................3-36
RADIUS C
ONFIGURATION PROCEDURE ..............................................................................................3-36
C
ONFIGURING FOUNDRY-SPECIFIC ATTRIBUTES ON THE RADIUS SERVER ..........................................3-36
I
DENTIFYING THE RADIUS SERVER TO THE FOUNDRY DEVICE ............................................................3-37
S
ETTING RADIUS PARAMETERS ........................................................................................................3-38
C
ONFIGURING AUTHENTICATION-METHOD LISTS FOR RADIUS ............................................................3-38
C
ONFIGURING RADIUS AUTHORIZATION .............................................................................................3-40
C
ONFIGURING RADIUS ACCOUNTING .................................................................................................3-40
C
ONFIGURING AN INTERFACE AS THE SOURCE FOR ALL RADIUS PACKETS .........................................3-41
D
ISPLAYING RADIUS CONFIGURATION INFORMATION ..........................................................................3-42
C
ONFIGURING AUTHENTICATION-METHOD LISTS ........................................................................................3-47
C
ONFIGURATION CONSIDERATIONS FOR AUTHENTICATION-METHOD LISTS ............................................3-48
E
XAMPLES OF AUTHENTICATION-METHOD LISTS ..................................................................................3-48
CHAPTER 4
C
ONFIGURING SECURE SHELL..................................................................... 4-1
SETTING THE HOST NAME AND DOMAIN NAME .............................................................................................4-2
G
ENERATING A HOST RSA KEY PAIR ..........................................................................................................4-2
P
ROVIDING THE PUBLIC KEY TO CLIENTS ..............................................................................................4-2
C
ONFIGURING RSA CHALLENGE-RESPONSE AUTHENTICATION .....................................................................4-3
I
MPORTING AUTHORIZED PUBLIC KEYS INTO THE FOUNDRY DEVICE .......................................................4-3