Home > Cisco > Router > Cisco Router 860, 880 Series User Manual

Cisco Router 860, 880 Series User Manual

Here you can view all the pages of manual Cisco Router 860, 880 Series User Manual. The Cisco manuals for Router are available online for free. You can easily download all the documents as PDF.

Page 241

17-3
Book Title
OL-xxxxx-xx
Chapter 17      Administering the Wireless Device
  Preventing Unauthorized Access to Your Access Point
Preventing Unauthorized Access to Your Access Point
You can prevent unauthorized users from reconfiguring the wireless device and viewing configuration 
information. Typically, you want network administrators to have access to the wireless device while you 
restrict access to users who connect through a terminal or workstation from within the local network.
To prevent...

Page 242

17-4
Book Title
OL-xxxxx-xx
Chapter 17      Administering the Wireless Device
  Protecting Access to Privileged EXEC Commands
Default Password and Privilege Level Configuration
Ta b l e 17-1 shows the default password and privilege level configuration.
Setting or Changing a Static Enable Password
The enable password controls access to the privileged EXEC mode. 
NoteThe no enable password global configuration command removes the enable password, but you should 
use extreme care when using this command. If...

Page 243

17-5
Book Title
OL-xxxxx-xx
Chapter 17      Administering the Wireless Device
  Protecting Access to Privileged EXEC Commands
This example shows how to change the enable password to l1u2c3k4y5. The password is not encrypted 
and provides access to level 15 (traditional privileged EXEC mode access):
AP(config)# enable password l1u2c3k4y5
Protecting Enable and Enable Secret Passwords with Encryption
To provide an additional layer of security, particularly for passwords that cross the network or that are...

Page 244

17-6
Book Title
OL-xxxxx-xx
Chapter 17      Administering the Wireless Device
  Protecting Access to Privileged EXEC Commands
If both the enable and enable secret passwords are defined, users must enter the enable secret password.
Use the level keyword to define a password for a specific privilege level. After you specify the level and 
set a password, give the password only to users who need to have access at this level. Use the privilege 
level command in global configuration mode to specify commands...

Page 245

17-7
Book Title
OL-xxxxx-xx
Chapter 17      Administering the Wireless Device
  Protecting Access to Privileged EXEC Commands
Configuring Username and Password Pairs
You can configure username and password pairs, which are locally stored on the wireless device. These 
pairs are assigned to lines or interfaces, and they authenticate each user before that user can access the 
wireless device. If you have defined privilege levels, you can also assign a specific privilege level (with 
associated rights and...

Page 246

17-8
Book Title
OL-xxxxx-xx
Chapter 17      Administering the Wireless Device
  Protecting Access to Privileged EXEC Commands
For example, if you want many users to have access to the clear line command, you can assign it 
level
 2 security and distribute the level 2 password fairly widely. But if you want more restricted access 
to the configure command, you can assign it level 3 security and distribute that password to a more 
restricted group of users.
This section includes this configuration...

Page 247

17-9
Book Title
OL-xxxxx-xx
Chapter 17      Administering the Wireless Device
  Controlling Access Point Access with RADIUS
This example shows how to set the configure command to privilege level 14 and define SecretPswd14 
as the password users must enter to use level 14 commands:
AP(config)# privilege exec level 14 configure
AP(config)# enable password level 14 SecretPswd14
Logging Into and Exiting a Privilege Level
To log in to a specified privilege level or to exit to a specified privilege level,...

Page 248

17-10
Book Title
OL-xxxxx-xx
Chapter 17      Administering the Wireless Device
  Controlling Access Point Access with RADIUS
Configuring RADIUS Login Authentication
To configure AAA authentication, you define a named list of authentication methods and then apply that 
list to various interfaces. The method list defines the types of authentication to be performed and the 
sequence in which they are performed; it must be applied to a specific interface before any defined 
authentication methods are...

Page 249

17-11
Book Title
OL-xxxxx-xx
Chapter 17      Administering the Wireless Device
  Controlling Access Point Access with RADIUS
To disable AAA, use the no aaa new-model command in global command mode. To disable AAA 
authentication, use the no aaa authentication login {default | list-name} method1 [method2...] 
command in global command mode. To either disable RADIUS authentication for logins or to return to 
the default value, use the no login authentication {default | list-name} command in line...

Page 250

17-12
Book Title
OL-xxxxx-xx
Chapter 17      Administering the Wireless Device
  Controlling Access Point Access with RADIUS
Step 3radius-server host {hostname | 
ip-address} [auth-port port-number] 
[acct-port port-number] [timeout 
seconds] [retransmit retries] [key 
string]Specifies the IP address or hostname of the remote RADIUS server host.
 (Optional) For auth-port port-number, specify the UDP destination 
port for authentication requests.
 (Optional) For acct-port port-number, specify the UDP...
Start reading Cisco Router 860, 880 Series User Manual

Related Manuals for Cisco Router 860, 880 Series User Manual

All Cisco manuals