Solved

Access Control for catalyst switch 4506

Posted on 2009-04-02
8
583 Views
Last Modified: 2012-05-06
Hello

I have cat4506 ver 12.2.   I want to create 2 users who can log on and adminster the switch with privilege levels 15.How can we configure switch to prompt for username and password when these users telnet to it ?

Thanks
0
Comment
Question by:alimohammed72
  • 3
  • 3
  • 2
8 Comments
 
LVL 5

Expert Comment

by:ionut_mir
ID: 24050331
Try this:

Switch(config)#user test secret pass priv 15
Switch(config)#line vty 0 4
Switch(config-line)#login local
0
 

Author Comment

by:alimohammed72
ID: 24050610
there is no option for command priv 15..please see below


(config)#user test secret pass ?
LINE    <cr>
0
 
LVL 5

Accepted Solution

by:
ionut_mir earned 500 total points
ID: 24051439
OK. Try this:

Switch(config)#username test privilege 15 secret 5 your_password
0
Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

 
LVL 16

Expert Comment

by:Aaron Street
ID: 24057701
I would also suggest in addition to the above you think about using SSH to connect.

Telnet sends plain text across the network. so any one could sniff the traffic and see exactly what you are doing on the router / switch

to enable SSH all you have to do is

(config)#crypto key generate rsa general-keys modulus 1024

this will create the 1024 bit encryption keys used for encrypting the data when using SSH and httpS

then

(config)#line vty 0 4
(config)#transport input ssh telnet

will make the connection accept telnet or ssh connections.

you will now have a much more secure connection to the switch, and also the ability to still use telnet if you need to, setting up the user name and setting the login local command stay the same as above.

I set some lines up to run SSH that require you to log in using username and password, and some lines to run telent that require the old simple password method to log in. This means I can't accidently log in via telnet with out knowing.

there are 3 log in methods

#login  (this requires the password you set up on the indivual vty or consol lines to get access)
#login Local (requires you set up user names and passwords using the commands above)
#login Tacacs (requires you have a central server set up that the switchs/routers use to check any connection attempts are valid, very usefull if you have lots of devices on the network. you can set up mutiply users easly and centraly manage them)

0
 

Author Comment

by:alimohammed72
ID: 24082670
can we setup switch as TACACS server rather me buying a new server ?
0
 
LVL 16

Expert Comment

by:Aaron Street
ID: 24084970
not sure you can do this actuly. I belive some of the more powerfull switchs and routers do allow you to set them up as Tacacs server, however I have never done this.

Also a tacacs server is not a processor intensive service. So you could simple set up Tacacs on a server you already have in place. Possible not a DC or Exchange server. but maybe a little used file server, or even an old desktop PC that you can sit in the server room running it.

I have my own network server, it runs the syslog server, I am playing with TACACS on it, my configuration tools, runs my monitering software.. etc.. etc.. It's nothing to special in terms of proformance, however it does allow me to keep all my network services in one place. I started of with a old dell desktop, and as I have grown out of it I have slowly incressed untill I now have a full Dell server.

But I would say start small and once you are starting to push the limits of a desktop PC, talk to your managers about uopgrading. But a rescued desk top that was to be disposed off, will easly allow you to do all the testing, get it up and running and prove if this is the way you want to go.
0
 

Author Comment

by:alimohammed72
ID: 24097632
OK.I found the spare machine.How do I go about installaing and configuring TACACS now ?

Thanks
0
 
LVL 16

Expert Comment

by:Aaron Street
ID: 24098477
LOL how long have you got???

Sorry but you will need to reserch TACACS servers and how to set them up. There are many many different things you can do with it, depending how far you want to go.

As I mentioned above I am playing with TACACS at the moment and working out what is what.

I suggests if you want an answer to how to set up TACACS you ask in another question. If you only have the one switch then I think it may be a bit of an over kill. if you have lots of devices you will want to set it up on a test network first before implementing it on you live devices. You can if you are not carefull easly lock your self out of a switch for good!

0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
spanning tree loop even though stp is enabled 10 56
Cloud Security  - encryption needed? 6 59
Public Printing Options 3 50
VTP Setup 4 11
Most MSPs worth their salt are already offering cybersecurity to their customers. But cybersecurity as a service is wide encompassing and can mean many things.  So where are MSPs falling in this spectrum?
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question