?
Solved

Cisco 2960x network switch password policy

Posted on 2014-10-08
3
Medium Priority
?
949 Views
Last Modified: 2014-10-08
Our company has a pair of Cisco 2960x switch. It has been enabled SSH remote admin and create a few admin user. We will need to conduct a security audit soon. Is there a way to implement password policy (e.g. Password length, complexity, history, min/max password time etc.) ? Do we need to rely on external authentication bodies / servers ?

Thank you so much

Patrick
0
Comment
Question by:patricktam
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 6

Accepted Solution

by:
Matt earned 1500 total points
ID: 40368018
For password length and other policy it is better to use RADIUS or TACACS+ authentication systems, who are linked to for example Active Directory. In Active Directory you can then define password policy, define groups of users who are allowed to Access switch, enable log for logon events etc...

If you have RADIUS or TACACS+ servers, then you can login only through them, you can NOT login to switch with locally defined users if you have RADIUS server alive and running. If RADIUS or TACACS+ is not available, then you Will be able to login with locally defined users on switch.
0
 
LVL 50

Expert Comment

by:Don Johnston
ID: 40368132
Is there a way to implement password policy (e.g. Password length, complexity, history, min/max password time etc.) ? Do we need to rely on external authentication bodies / servers ?
Using local authentication, no.  There is no way to define and enforce a password policy.  You would need to use external authentication.
0
 

Author Closing Comment

by:patricktam
ID: 40369799
Thanks for the information.
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hey fellow admins! This time, I have a little fairy tale for you. As many tales do, it starts boring and then gets pretty gory. I hope you like it. TL;DR: It is about an important security matter, you should read it if you run or administer Windows …
IF you are either unfamiliar with rootkits, or want to know more about them, read on ....
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

718 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question