Preventing Unauthorized Access To Your Switch - Cisco WS-C3550-12G Software Configuration Manual

Multilayer switch
Hide thumbs Also See for WS-C3550-12G:
Table of Contents

Advertisement

Administering the Switch
This chapter describes how to perform one-time operations to administer your switch. This chapter
consists of these sections:
Preventing Unauthorized Access to Your Switch, page 6-1
Protecting Access to Privileged EXEC Commands, page 6-2
Controlling Switch Access with TACACS+, page 6-10
Controlling Switch Access with RADIUS, page 6-17
Configuring the Switch for Local Authentication and Authorization, page 6-31
Managing the System Time and Date, page 6-32
Configuring a System Name and Prompt, page 6-46
Creating a Banner, page 6-49
Managing the MAC Address Table, page 6-51
Optimizing System Resources for User-Selected Features, page 6-57

Preventing Unauthorized Access to Your Switch

You can prevent unauthorized users from reconfiguring your switch and viewing configuration
information. Typically, you want network administrators to have access to your switch while you restrict
access to users who dial from outside the network through an asynchronous port, connect from outside
the network through a serial port, or connect through a terminal or workstation from within the local
network.
78-11194-03
C H A P T E R
Catalyst 3550 Multilayer Switch Software Configuration Guide
6
6-1

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 3550

Table of Contents