Solved

privilege levels-Cat4506-IOS ver 12.(20)

Posted on 2008-06-13
3
567 Views
Last Modified: 2010-05-18
Hi
I want to create 5 users to take care of switcport security like adding and removing mac-addresses ,disabling port security and enabling  and saving the config.I don't want them to give the privilege of erasing the config or reloading the switch.Please provide the procedure to perform this task

Thank You
0
Comment
Question by:alimohammed72
3 Comments
 
LVL 50

Expert Comment

by:Don Johnston
ID: 21783096
0
 

Author Comment

by:alimohammed72
ID: 21784009
need more help
0
 
LVL 8

Accepted Solution

by:
yasirirfan earned 500 total points
ID: 21784193
Here is the example

First Create the privilege list with the commands allowed,

privilege interface level 5 switchport access
privilege interface level 5 spanning-tree portfast
privilege interface level 5 spanning tree port-fast
privilege interface level 5 switchport port-security mac-address
privilege interface level 5 shutdown
privilege interface level 5 no shutdown
privilege interface level 5 switchport access vlan
privilege interface level 5 switchport port-security mac-address sticky
privilege interface level 5 switchport port-security violation restrict
privilege interface level 5 switchport port-security
privilege configure level 5 interface gigaethernet
privilege exec level 5 configure t
privilege exec level 5 interface
privilege exec level 5 interface gigaethernet
privilege exec level 5 switchport access vlan
privilege exec level 5 config t
privilege exec level 5 copy running-config startup-config
privilege exec level 5 errdisable recovery interval 30



Create user name and password with privilge 5

username cisco privilege 5 password c!$c0

Cheers

Yasir
0

Featured Post

Flexible connectivity for any environment

The KE6900 series can extend and deploy computers with high definition displays across multiple stations in a variety of applications that suit any environment. Expand computer use to stations across multiple rooms with dynamic access.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The worst thing when starting a new job is when the previous Network Administrator left behind no documentation. How do you get into the devices? If you've been in this situation or just accidently mistyped your password, this article will hopefully…
This tutorial will go through the steps required to write a script that will back up the configuration settings of a HP-ProCurve switch. You will need to get the following things to follow this tutorial: Telnet Scripting Tool e.g. TST10.exe …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question