[Contents] [Prev] [Next] [Index] [Report an Error] [No Frames]


Vty Line Authentication and Authorization

The router supports 30 virtual tty (vty) lines for Telnet, Secure Shell Server (SSH) and FTP services. Each Telnet, SSH, or FTP session requires one vty line. You can add security to your router by configuring the software to validate login requests. There are two modes of authentication for a vty line:

You can enable AAA authorization, which allows you to limit the services available to a user. Based on information retrieved from a user's profile, the user is either granted or denied access to the requested server.

Configuring Simple Authentication

To configure simple authentication:

  1. Specify a vty line or a range of vty lines on which you want to enable the password.
  2. host1(config)#line vty 8 13
    
    host1(config-line)#
    
    
    
  3. Specify the password for the vty lines.
  4. host1(config-line)#password 0 mypassword
    
    
    
  5. Enable login authentication on the lines.
  6. host1(config-line)#login
    
    
    
  7. Display your vty line configuration.
  8. host1#show line vty 8
    
    no access-class in
    
    data-character-bits 8
    
    exec-timeout never
    
    exec-banner enabled
    
    motd-banner enabled
    
    login-timeout 30 seconds 
    
    
    

line

login

password

show line vty

Configuring AAA Authentication and AAA Authorization

Before you configure AAA authentication and AAA authorization, you need to configure a RADIUS and/or TACACS+ authentication server. Note that several of the steps in the configuration procedure are optional.

To configure AAA new model authentication and authorization for inbound sessions to vty lines on your router:

  1. Specify AAA new model authentication.
  2. host1(config)#aaa new-model
    
    
    
  3. Create an authentication list that specifies the type(s) of authentication methods allowed.
  4. host1(config)#aaa authentication login my_auth_list tacacs+ line enable
    
    
    
  5. (Optional) Specify the privilege level by defining a method list for authentication.
  6. host1(config)aaa authentication enable default tacacs+ radius enable
    
    
    
  7. (Optional) Enable authorization, and create an authorization method list.
  8. host1(config)aaa authorization commands 15 boston if-authenticated tacacs+
    
    
    
  9. (Optional) Disable authorization for all Global Configuration commands.
  10. host1(config)#no aaa authorization config-commands
    
    
    
  11. Specify the range of vty lines.
  12. host1(config)#line vty 6 10
    
    host1(config-line)#
    
    
    
  13. (Optional) Apply an authorization list to a vty line or a range of vty lines.
  14. host1(config-line)#authorization commands 15 boston
    
    
    
  15. Specify the password for the vty lines.
  16. host1(config-line)#password xyz
    
    
    
  17. Apply the authentication list to the vty lines you specified on your router.
  18. host1(config-line)#login authentication my_auth_list
    
    
    

aaa authentication enable default

aaa authentication login

aaa authorization

aaa authorization config-commands

aaa new-model

authorization

line

login authentication

password


[Contents] [Prev] [Next] [Index] [Report an Error] [No Frames]