Chapter 9 Configuring Switch-Based Authentication; Preventing Unauthorized Access To Your Switch; Protecting Access To Privileged Exec Commands - Cisco Catalyst 2975 Software Configuration Manual

Ios release 12.2(55)se
Hide thumbs Also See for Catalyst 2975:
Table of Contents

Advertisement

Configuring Switch-Based Authentication
This chapter describes how to configure switch-based authentication on the Catalyst 2975 switch. Unless
otherwise noted, the term switch refers to a standalone switch and to a switch stack.
This chapter consists of these sections:

Preventing Unauthorized Access to Your Switch

You can prevent unauthorized users from reconfiguring your switch and viewing configuration
information. Typically, you want network administrators to have access to your switch while you restrict
access to users who dial from outside the network through an asynchronous port, connect from outside
the network through a serial port, or connect through a terminal or workstation from within the local
network.
OL-19720-02
Preventing Unauthorized Access to Your Switch, page 9-1
Protecting Access to Privileged EXEC Commands, page 9-2
Controlling Switch Access with TACACS+, page 9-10
Controlling Switch Access with RADIUS, page 9-18
Configuring the Switch for Local Authentication and Authorization, page 9-40
Configuring the Switch for Secure Shell, page 9-41
Configuring the Switch for Secure Socket Layer HTTP, page 9-46
Configuring the Switch for Secure Copy Protocol, page 9-52
C H A P T E R
Catalyst 2975 Switch Software Configuration Guide
9
9-1

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents