Configuring The Switch For Local Authentication And Authorization - Cisco Catalyst 3550 series Software Configuration Manual

Multilayer switch
Hide thumbs Also See for Catalyst 3550 series:
Table of Contents

Advertisement

Configuring the Switch for Local Authentication and Authorization

When you add or create entries for the hosts and users, follow these guidelines:
A Kerberos server can be a Catalyst 3550 switch that is configured as a network security server and that
Note
can authenticate users by using the Kerberos protocol.
To set up a Kerberos-authenticated server-client system, follow these steps:
For instructions, refer to the "Kerberos Configuration Task List" section in the "Security Server
Protocols" chapter of the Cisco IOS Security Configuration Guide, Release 12.1, at this URL:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/secur_c/scprt2/
scdkerb.htm#xtocid154007.
Configuring the Switch for Local Authentication and
Authorization
You can configure AAA to operate without a server by setting the switch to implement AAA in local
mode. The switch then handles authentication and authorization. No accounting is available in this
configuration.
Beginning in privileged EXEC mode, follow these steps to configure the switch for local AAA:
Command
Step 1
configure terminal
Step 2
aaa new-model
Step 3
aaa authentication login default local
Step 4
aaa authorization exec local
Step 5
aaa authorization network local
Catalyst 3550 Multilayer Switch Software Configuration Guide
8-36
The Kerberos principal name must be in all lowercase characters.
The Kerberos instance name must be in all lowercase characters.
The Kerberos realm name must be in all uppercase characters.
Configure the KDC by using Kerberos commands.
Configure the switch to use the Kerberos protocol.
Purpose
Enter global configuration mode.
Enable AAA.
Set the login authentication to use the local username database. The
default keyword applies the local user database authentication to all
interfaces.
Configure user AAA authorization to determine if the user is allowed to
run an EXEC shell by checking the local database.
Configure user AAA authorization for all network-related service
requests.
Chapter 8
Configuring Switch-Based Authentication
78-11194-09

Advertisement

Table of Contents
loading

Table of Contents