C H A P T E R 7 Configuring Switch-Based Authentication; Protecting Access To Privileged Exec Commands; Default Password And Privilege Level Configuration - Cisco WS-C3020 Software Configuration Manual

Catalyst blade switch for hp
Table of Contents

Advertisement

Protecting Access to Privileged EXEC Commands

Protecting Access to Privileged EXEC Commands
A simple way of providing terminal access control in your network is to use passwords and assign
privilege levels. Password protection restricts access to a network or network device. Privilege levels
define what commands users can enter after they have logged into a network device.
For complete syntax and usage information for the commands used in this section, see the Cisco IOS
Note
Security Command Reference, Release 12.2 from the Cisco.com page under Documentation > Cisco
IOS Software > 12.2 Mainline > Command References.
These sections contain this configuration information:

Default Password and Privilege Level Configuration

Table 7-1
Table 7-1
Default Password and Privilege Levels
Feature
Enable password and privilege level
Enable secret password and privilege level
Line password
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
7-2
If you want to use username and password pairs, but you want to store them centrally on a server
instead of locally, you can store them in a database on a security server. Multiple networking devices
can then use the same database to obtain user authentication (and, if necessary, authorization)
information. For more information, see the
page
7-10.
Default Password and Privilege Level Configuration, page 7-2
Setting or Changing a Static Enable Password, page 7-3
Protecting Enable and Enable Secret Passwords with Encryption, page 7-3
Disabling Password Recovery, page 7-5
Setting a Telnet Password for a Terminal Line, page 7-6
Configuring Username and Password Pairs, page 7-6
Configuring Multiple Privilege Levels, page 7-7
shows the default password and privilege level configuration.
Default Setting
No password is defined. The default is level 15 (privileged EXEC level).
The password is not encrypted in the configuration file.
No password is defined. The default is level 15 (privileged EXEC level).
The password is encrypted before it is written to the configuration file.
No password is defined.
Chapter 7
Configuring Switch-Based Authentication
"Controlling Switch Access with TACACS+" section on
OL-8915-03

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 3020

Table of Contents