Solved

Authenticating PPP users while keeping them out of IOS on a Cisco router

Posted on 2008-10-23
3
195 Views
Last Modified: 2013-12-14
We authenticate PPP users on a Cisco router using a local username and password list. To my horror, recently I realized that any PPP user could could open an SSH or telnet session to the router with full administrative privileges using their PPP username and password.

As a temporary fix I have put in some ACL's to prevent access to port 22 and 23 from anywhere except admin IP addresses. However obviously now I am looking to put in a more permanent and secure solution without the hassle of having to install a separate RADIUS authentications server. I would like to keep maintaining a PPP username and password list on the router without compromising security.

The relevant router config sections is attached

!                                                                               
line con 0                                                                      
line aux 0                                                                      
line vty 0 4                                                                    
 privilege level 15                                                             
 transport input telnet ssh                                                     
!                                                                               
 
!                                                                               
aaa new-model                                                                   
!                                                                               
!                                                                               
aaa authentication ppp default local                                               
!                                     
 
!                                                                               
username admin secret 5 $8$NCxxxxxxxxxxxx
username pppuser1 password 0 secret123                             
archive                                                                         
 log config                                                                     
  hidekeys                                                                      
!

Open in new window

0
Comment
Question by:Fo_Shizzle
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 10

Expert Comment

by:kyleb84
ID: 22792510
Local RADIUS server...

The Cisco itself can be the RADIUS server as well...

aaa new-model
aaa authentication login default radius local
aaa authentication login no_radius enable
aaa authentication ppp default if-needed radius
aaa authorization network radius
aaa accounting exec start-stop radius
aaa accounting network start-stop radius
---
radius-server local
 nas [VLAN1IP] key [key]
 group usersgrp
  user user1 nthash password1 group usersgrp
  user user2 nthash password2 group usersgrp
!
radius-server host [VLAN1IP] auth-port 1812 acct-port 1813 key [key]
radius-server retransmit 3
radius-server attribute 32 include-in-access-req format %h
radius-server authorization permit missing Service-Type
radius-server vsa send accounting

-------------

The above authenticates ppp users via RADIUS username/passwords, and console access by the local password database.

0
 
LVL 10

Accepted Solution

by:
kyleb84 earned 500 total points
ID: 22792570
Hmm should change the line:

"aaa authentication login default radius local"
to
"aaa authentication login default local"

and:
line vty 0 4
 login authentication default
0

Featured Post

Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Secure VPN Connection terminated locally by the Client.  Reason 442: Failed to enable Virtual Adapter. If you receive this error on Windows 8 or Windows 8.1 while trying to connect with the Cisco VPN Client then the solution is a simple registry f…
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…
Suggested Courses

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question