[Contents] [Prev] [Next] [Index] [Report an Error]

Vty Line Authentication and Authorization

The router supports 30 virtual tty (vty) lines for Telnet, Secure Shell Server (SSH) and FTP services. Each Telnet, SSH, or FTP session requires one vty line. You can add security to your router by configuring the software to validate login requests. There are two modes of authentication for a vty line:

You can enable AAA authorization, which allows you to limit the services available to a user. Based on information retrieved from a user’s profile, the user is either granted or denied access to the requested server.

Configuring Simple Authentication

To configure simple authentication:

  1. Specify a vty line or a range of vty lines on which you want to enable the password.
    host1(config)#line vty 8 13
    host1(config-line)#
  2. Specify the password for the vty lines.
    host1(config-line)#password 0 mypassword
  3. Enable login authentication on the lines.
    host1(config-line)#login
  4. Display your vty line configuration.
    host1#show line vty 8
    no access-class in
    data-character-bits 8
    exec-timeout never
    exec-banner enabled
    motd-banner enabled
    login-timeout 30 seconds

line

login

password

Note: To use an encrypted password or a secret, you must follow the procedure in Setting Basic Password Parameters to obtain the encrypted password or secret. You cannot create your own encrypted password or secret; you must use a system-generated password or secret.

show line vty

Configuring AAA Authentication and AAA Authorization

Before you configure AAA authentication and AAA authorization, you need to configure a RADIUS and/or TACACS+ authentication server. Note that several of the steps in the configuration procedure are optional.

To configure AAA new model authentication and authorization for inbound sessions to vty lines on your router:

  1. Specify AAA new model authentication.
    host1(config)#aaa new-model
  2. Create an authentication list that specifies the type(s) of authentication methods allowed.
    host1(config)#aaa authentication login my_auth_list tacacs+ line enable
  3. (Optional) Specify the privilege level by defining a method list for authentication.
    host1(config)aaa authentication enable default tacacs+ radius enable
  4. (Optional) Enable authorization, and create an authorization method list.
    host1(config)aaa authorization commands 15 boston if-authenticated tacacs+
  5. (Optional) Disable authorization for all Global Configuration commands.
    host1(config)#no aaa authorization config-commands
  6. Specify the range of vty lines.
    host1(config)#line vty 6 10
    host1(config-line)#
  7. (Optional) Apply an authorization list to a vty line or a range of vty lines.
    host1(config-line)#authorization commands 15 boston
  8. Specify the password for the vty lines.
    host1(config-line)#password xyz
  9. Apply the authentication list to the vty lines you specified on your router.
    host1(config-line)#login authentication my_auth_list

aaa authentication enable default

aaa authentication login

aaa authorization

Note: For information about TACACS+, see JUNOSe Broadband Access Configuration Guide.

aaa authorization config-commands

aaa new-model

authorization

line

login authentication

password

Note: To use an encrypted password or a secret, you must follow the procedure in Setting Basic Password Parameters to obtain the encrypted password or secret. You cannot create your own encrypted password or secret; you must use a system-generated password or secret.


[Contents] [Prev] [Next] [Index] [Report an Error]