Solved

Access Control for catalyst switch 4506

Posted on 2009-04-02
8
582 Views
Last Modified: 2012-05-06
Hello

I have cat4506 ver 12.2.   I want to create 2 users who can log on and adminster the switch with privilege levels 15.How can we configure switch to prompt for username and password when these users telnet to it ?

Thanks
0
Comment
Question by:alimohammed72
  • 3
  • 3
  • 2
8 Comments
 
LVL 5

Expert Comment

by:ionut_mir
ID: 24050331
Try this:

Switch(config)#user test secret pass priv 15
Switch(config)#line vty 0 4
Switch(config-line)#login local
0
 

Author Comment

by:alimohammed72
ID: 24050610
there is no option for command priv 15..please see below


(config)#user test secret pass ?
LINE    <cr>
0
 
LVL 5

Accepted Solution

by:
ionut_mir earned 500 total points
ID: 24051439
OK. Try this:

Switch(config)#username test privilege 15 secret 5 your_password
0
Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

 
LVL 16

Expert Comment

by:Aaron Street
ID: 24057701
I would also suggest in addition to the above you think about using SSH to connect.

Telnet sends plain text across the network. so any one could sniff the traffic and see exactly what you are doing on the router / switch

to enable SSH all you have to do is

(config)#crypto key generate rsa general-keys modulus 1024

this will create the 1024 bit encryption keys used for encrypting the data when using SSH and httpS

then

(config)#line vty 0 4
(config)#transport input ssh telnet

will make the connection accept telnet or ssh connections.

you will now have a much more secure connection to the switch, and also the ability to still use telnet if you need to, setting up the user name and setting the login local command stay the same as above.

I set some lines up to run SSH that require you to log in using username and password, and some lines to run telent that require the old simple password method to log in. This means I can't accidently log in via telnet with out knowing.

there are 3 log in methods

#login  (this requires the password you set up on the indivual vty or consol lines to get access)
#login Local (requires you set up user names and passwords using the commands above)
#login Tacacs (requires you have a central server set up that the switchs/routers use to check any connection attempts are valid, very usefull if you have lots of devices on the network. you can set up mutiply users easly and centraly manage them)

0
 

Author Comment

by:alimohammed72
ID: 24082670
can we setup switch as TACACS server rather me buying a new server ?
0
 
LVL 16

Expert Comment

by:Aaron Street
ID: 24084970
not sure you can do this actuly. I belive some of the more powerfull switchs and routers do allow you to set them up as Tacacs server, however I have never done this.

Also a tacacs server is not a processor intensive service. So you could simple set up Tacacs on a server you already have in place. Possible not a DC or Exchange server. but maybe a little used file server, or even an old desktop PC that you can sit in the server room running it.

I have my own network server, it runs the syslog server, I am playing with TACACS on it, my configuration tools, runs my monitering software.. etc.. etc.. It's nothing to special in terms of proformance, however it does allow me to keep all my network services in one place. I started of with a old dell desktop, and as I have grown out of it I have slowly incressed untill I now have a full Dell server.

But I would say start small and once you are starting to push the limits of a desktop PC, talk to your managers about uopgrading. But a rescued desk top that was to be disposed off, will easly allow you to do all the testing, get it up and running and prove if this is the way you want to go.
0
 

Author Comment

by:alimohammed72
ID: 24097632
OK.I found the spare machine.How do I go about installaing and configuring TACACS now ?

Thanks
0
 
LVL 16

Expert Comment

by:Aaron Street
ID: 24098477
LOL how long have you got???

Sorry but you will need to reserch TACACS servers and how to set them up. There are many many different things you can do with it, depending how far you want to go.

As I mentioned above I am playing with TACACS at the moment and working out what is what.

I suggests if you want an answer to how to set up TACACS you ask in another question. If you only have the one switch then I think it may be a bit of an over kill. if you have lots of devices you will want to set it up on a test network first before implementing it on you live devices. You can if you are not carefull easly lock your self out of a switch for good!

0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Advertise subnet not directly attached 6 31
Unauthorized Network Devices Appearing on Home Network 20 109
CCNA lab 6 37
Setting up NAT translation for RDP 6 16
Ensuring effective and secure communication in the age of healthcare BYOD.
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question