Vty Line Remote Authentication And Authorization; Vty Mac-Sa Filter Support - Dell Force10 C150 Configuration Manual

Ftos configuration guide ftos 8.4.2.7 e-series terascale, c-series, s-series (s50/s25)
Hide thumbs Also See for Force10 C150:
Table of Contents

Advertisement

Figure 45-16. Example Access-Class Configuration Using Local Database
FTOS(conf)#user gooduser password abc privilege 10 access-class permitall
FTOS(conf)#user baduser password abc privilege 10 access-class denyall
FTOS(conf)#
FTOS(conf)#aaa authentication login localmethod local
FTOS(conf)#
FTOS(conf)#line vty 0 9
FTOS(config-line-vty)#login authentication localmethod
FTOS(config-line-vty)#end
Note: See also the section

VTY Line Remote Authentication and Authorization

FTOS retrieves the access class from the VTY line.
The Dell Force10 OS takes the access class from the VTY line and applies it to ALL users. FTOS does not
need to know the identity of the incoming user and can immediately apply the access class. If the
authentication method is radius, TACACS+, or line, and you have configured an access class for the VTY
line, FTOS immediately applies it. If the access-class is
closes the connection without displaying the login prompt.
connections from subnet 10.0.0.0 without displaying a login prompt. The example uses TACACS+ as the
authentication mechanism.
Figure 45-17. Example Access Class Configuration Using TACACS+ Without Prompt
FTOS(conf)#ip access-list standard deny10
FTOS(conf-ext-nacl)#permit 10.0.0.0/8
FTOS(conf-ext-nacl)#deny any
FTOS(conf)#
FTOS(conf)#aaa authentication login tacacsmethod tacacs+
FTOS(conf)#tacacs-server host 256.1.1.2 key force10
FTOS(conf)#
FTOS(conf)#line vty 0 9
FTOS(config-line-vty)#login authentication tacacsmethod
FTOS(config-line-vty)#
FTOS(config-line-vty)#access-class deny10
FTOS(config-line-vty)#end
(same applies for radius and line authentication)

VTY MAC-SA Filter Support

FTOS supports MAC access lists which permit or deny users based on their source MAC address. With
this approach, you can implement a security policy based on the source MAC address.
To apply a MAC ACL on a VTY line, use the same
Figure 45-18
shows how to deny incoming connections from subnet 10.0.0.0 without displaying a login
prompt..
Chapter 8, IP Access Control Lists (ACL), Prefix Lists, and
deny all
deny for the incoming subnet
or
Figure
shows how to deny incoming
access-class
command as IP ACLs
Route-maps.
, FTOS
(Figure
45-18).
Security | 949

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents