[Contents]
[Prev]
[Next]
[Index]
[Report an Error]
User Authentication
On a router, you can create local user login accounts
to control who can log in to the router and the access privileges
they have. A password, either an SSH key or a Message Digest 5 (MD5)
password, is associated with each login account. To define access
privileges, you create login classes into which you group users with
similar jobs or job functions. You use these classes to explicitly
define what commands their users are and are not allowed to issue
while logged in to the router.
The management of multiple routers by many different
personnel can create a user account management problem. One solution
is to use a central authentication service to simplify account management,
creating and deleting user accounts only on a single, central server.
A central authentication system also simplifies the use of one-time
password systems such as SecureID, which offer protection against
password sniffing and password replay attacks (attacks in which someone
uses a captured password to pose as a router administrator).
The JUNOS software supports two protocols for central
authentication of users on multiple routers:
- Remote Authentication Dial-In User Service (RADIUS) and
Terminal Access Controller Access Control System Plus (TACACS+).
- RADIUS, a multivendor IETF standard whose features are
more widely accepted than those of TACACS+ or other proprietary systems.
All one-time-password system vendors support RADIUS. For more information
about configuring user access, see Configuring User Access.
The JUNOS software
also supports the following authentication methods:
- Internet Protocol Security (IPSec). IPSec architecture
provides a security suite for the IPv4 and IPv6 network layers. The
suite provides such functionality as authentication of origin, data
integrity, confidentiality, replay protection, and nonrepudiation
of source. In addition to IPSec, the JUNOS software also supports
the Internet Key Exchange (IKE), which defines mechanisms for key
generation and exchange, and manages security associations (SAs).
For more information about IPSec, see the JUNOS Services
Interfaces Configuration Guide.
- MD5 authentication of MSDP peering sessions. This authentication
provides protection against spoofed packets being introduced into
a peering session. For more information about SNMPv3, see the JUNOS Multicast Protocols Configuration Guide.
- SNMPv3 authentication and encryption. SNMPv3 uses the
user-based security model (USM) for message security and the view-based
access control model (VACM) for access control. USM specifies authentication
and encryption. VACM specifies access-control rules. For more information
about SNMPv3, see the JUNOS Network Management Configuration
Guide.
[Contents]
[Prev]
[Next]
[Index]
[Report an Error]