Configuring Kerberos - Cisco Catalyst 2960 series Configuration Manual

Consolidated platform configuration guide, ios release 15.2(4)e
Hide thumbs Also See for Catalyst 2960 series:
Table of Contents

Advertisement

Configuring Kerberos

Kerberos is a secret-key network authentication protocol, developed at the Massachusetts Institute of
Technology (MIT), that uses the Data Encryption Standard (DES) cryptographic algorithm for encryption
and authentication. Kerberos was designed to authenticate requests for network resources. Kerberos, like
other secret-key systems, is based on the concept of a trusted third party that performs secure verification of
users and services. In the Kerberos protocol, this trusted third party is called the key distribution center
(KDC).
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and
feature information, see Bug Search Tool and the release notes for your platform and software release. To
find information about the features documented in this module, and to see a list of the releases in which each
feature is supported, see the feature information table at the end of this module.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not
required.
Prerequisites for Controlling Switch Access with Kerberos
The following are the prerequisites for controlling switch access with Kerberos.
Finding Feature Information, page 979
Prerequisites for Controlling Switch Access with Kerberos, page 979
Information About Kerberos, page 980
How to Configure Kerberos, page 985
Configuration Examples for Kerberos, page 992
Additional References, page 1001
Feature Information for Kerberos, page 1002
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(4)E (Catalyst 2960-X Switches)
39
C H A P T E R
979

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents