Solved

Cisco Privilege Access

Posted on 2011-03-25
4
565 Views
Last Modified: 2012-06-22
Cisco Privilege Access

If I understand  Cisco has privilege levels from 0 to 15
Any expert out there to write the capabilities that a user can have in each Level.
For instance in Level 0 user can run the SHOW Running-config command, Level 1 can run the RELOAD command, etc... up to level 15.
Thanks
0
Comment
Question by:jskfan
  • 3
4 Comments
 
LVL 35

Accepted Solution

by:
Ernie Beek earned 500 total points
ID: 35213699
Cisco devices numbered 0 through 15 have 16 privilege levels. By default, any user who can furnish the user-level password or user name/password combination can gain User exec mode access to the device, which is privilege level 1. From there, if the user knows the enable secret password, they can access the Privilege exec mode, or privilege level 15. The three predefined privilege levels on Cisco devices include the following:

1 User exec mode only (prompt is router>), the default level for login

15 Privileged exec mode (prompt is router#), the Enable mode

0 Seldom used, but includes five commands: disable, enable, exit, help, and logout

To determine or confirm the current privilege level, type the show privilege command. It would look like this in Privilege mode:

Rtr1#show privilege
Current privilege level is 15
Rtr1#
Privilege levels 2 through 14 can be defined by the admin to provide limited features to some users by assigning specific commands to the level using the privilege command.

The syntax is

privilege mode {level level command | reset command}


Source: http://www.ciscoarticles.com/CCSP-Cisco-Certified-Security-Professional/Privilege-Levels.html
0
 
LVL 35

Assisted Solution

by:Ernie Beek
Ernie Beek earned 500 total points
ID: 35213706
So there are three predefined privilege levels, the rest you can set up you selg.
0
 

Author Closing Comment

by:jskfan
ID: 35365317
Excellent
0
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 35370219
Thank you :)

And thanks for the points.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

This tutorial will go through the steps required to write a script that will back up the configuration settings of a HP-ProCurve switch. You will need to get the following things to follow this tutorial: Telnet Scripting Tool e.g. TST10.exe …
The Cisco RV042 router is a popular small network interfacing device that is often used as an internet gateway. Network administrators need to get at the management interface to make settings, change passwords, etc. This access is generally done usi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now