Cisco Systems AS5400XM quick start Configuring Local AAA Security, Gateway# show privilege

Page 38

!

hostname Gateway

!

enable secret 5 $1$60L4$X2JYOwoDc0.kqa1loO/w8/

.

.

.

Step 2 Exit privileged EXEC mode and attempt to log in by using the new enable secret password. The show privilege command shows the current security privilege level.

Gateway# exit

Gateway con0 is now available

Press RETURN to get started.

Gateway> enable

Password:

Gateway# show privilege

Current privilege level is 15

Gateway#

Configuring Local AAA Security

Configure authentication, authorization, and accounting (AAA) to perform login authentication by using the local username database. The login keyword authenticates EXEC shell users. Additionally, configure PPP authentication to use the local database if the session was not already authenticated by the login command.

AAA(called triple A) is the Cisco IOS security model used on all Cisco devices. AAA provides the primary framework through which you set up access control on the Cisco AS5350XM or Cisco AS5400XM universal gateway.

The same authentication method is used on all interfaces. AAA is set up to use the local database configured on the gateway. This local database is created with the username configuration commands.

To configure AAA, follow these steps:

Step 1 Enter global configuration mode. You are in global configuration mode when your prompt changes to Gateway(config)#.

Gateway# configure terminal

Enter configuration commands, one per line. End with CNTL/Z.

Gateway(config)#

Step 2 Create a local login username database in global configuration mode. In this example, the administrator’s username is admin. The remote client’s login username is Harry.

Gateway(config)# username admin password adminpasshere

Gateway(config)# username Harry password Harrypasshere

Step 3 Configure local AAA security in global configuration mode. You must enter the aaa new-modelcommand before the other two authentication commands.

Gateway(config)# aaa new-model

Gateway(config)# aaa authentication login default local

Gateway(config)# aaa authentication ppp default if-needed local

Step 4 Return to privileged EXEC mode:

Gateway(config)# Ctrl-Z

Gateway#

Step 5 Log in with your username and password.

38

Image 38
Contents Cisco AS5350XM and Cisco AS5400XM Universal Gateways Replacement, Repair, or Refund Policy for Hardware Cisco 90-Day Limited Hardware Warranty TermsDuration of Hardware Warranty To Receive a Return Materials Authorization RMA NumberCisco IOS Software Documentation Documents, Equipment, and ToolsUser Documentation Items Not Included Command ReferencesNew Feature Documentation Release NotesSetting Up the Chassis Install ChassisSafety Information Rack-Mounting the ChassisRequired Tools and Equipment Attaching BracketsDesktop Installation Installation in a RackChassis Ground Connection Cisco AS5350XM Universal Gateway Ground Lug AttachmentInstalling a Carrier Card Install ModulesInstalling Carrier Cards Blank Feature Card Cover Installing Feature Cards While the housing is open. StatementDFC Feature Card State DescriptionLED Color or Port or Connection Type Cable System Management and Power ConnectionsConnect Cables Port or Connection Color or Type Cable WAN, LAN, and Voice ConnectionsConnect a Console Terminal Console port RJ-45 Connect to an Ethernet Network Connect to a WAN T1/E1 8 PRI Connector RJ-45 jack E1 cable Cable RJ-45 jack T3 DFC Internet Statement Situation. StatementPin1 Description Connect AC Power Connect DC Power Position. StatementPower switch To DC source Last. StatementCisco AS5400XM Universal Gateway DC Power Supply Connections Power Up the Universal Gateway Checklist for Power UpPower-Up Procedure Perform Initial Configuration Initial Configuration Using the Setup Command FacilityEnter a hostname for the gateway Press Enter for every slot, port, and channel Initial Configuration Using the CLI Manual Configuration Router# configure terminalVerifying the Hostname and Passwords Gateway# show privilege Configuring Local AAA SecurityGateway# configure terminal Configuring Basic Dial Access Gateway# ping Configuring the Asynchronous Group InterfaceGatewayconfig# interface group-async Gateway# show async status Verifying the Group Interface ConfigurationGateway# show interface async 4/0 Configuring a T1 or E1 Feature Card Gateway# show controller t1 1/7 Configuring a Channelized T3 Feature CardVerifying Channelized T1 or E1 Controller Operation Verifying Channelized T3 Controller Operation Gateway# show controller t3 1/0Configuring Isdn PRI Area Keyword Switch Type Gatewayconfig# controller t3 7/016Verifying Interface Configuration Gateway# show controller t1 1/0Gateway# show isdn status Gateway# show isdn serviceGateway# show running-config Configuring the D Channels for Isdn Signaling Gatewayconfig-if#isdn incoming-voice modem Gatewayconfig# interface serial 1/023Gatewayconfig-if#ip address 172.16.254.254 Gateway# show interface serial 1/023 Configuring the Universal Port or Dial-Only Feature CardsVerifying D Channel Configuration Feature Description SPE FirmwareVerifying the SPE Configuration Configuring the Voice Feature Card Gateway# show lineUpgrade DSP Firmware on the Voice Feature Card Verifying the Firmware Upgrade Configure ClockingFeature Card Ports Gateway# show voice dsp versionExternal Clock Clocking Configuration ExamplesGatewayconfig# dial-tdm-clock priority 1 external Free-Running ClockGatewayconfig# dial-tdm-clock priority 3 free Gatewayconfig# dial-tdm-clock priority 2 4/6Gatewayconfig# dial-tdm-clock priority 2 1/019 Verify ClockingCT3 Voice over IP Saving Configuration ChangesGateway# copy running-config startup-config PrerequisitesFor new features associated with a software release Where to Go NextConfiguration Tasks Cisco.com Slot NumberingObtaining Documentation Product Documentation DVDOrdering Documentation Documentation FeedbackCisco Product Security Overview Cisco Technical Support & Documentation Website Reporting Security Problems in Cisco ProductsObtaining Technical Assistance Obtaining Additional Publications and Information Submitting a Service RequestDefinitions of Service Request Severity Page Page USA
Related manuals
Manual 104 pages 52.67 Kb