CCNP2 lab 5 6c en

background image

1 - 3

CCNP: Implementing Secure Converged Wide-area Networks v5.0 - Lab 5-6c

Copyright

© 2007, Cisco Systems, Inc

Lab 5.6c Configuring AAA Using Local Authentication

Learning Objectives

• Create a local user database on a router

• Configure AAA on a router

Topology Diagram

Scenario

In this lab, you will configure a local username database with AAA. R2’s job will
only be to access R1; most of the configuration will be done on R1.

Step 1: Configure the Interface

Configure the physical interface on R1 and R2 with the IP addresses shown in
the topology diagram. Issue the no shutdown command to activate the
interface.


R1(config)# interface fastethernet0/0
R1(config-if)# ip address 192.168.10.1 255.255.255.0
R1(config-if)# no shutdown

R2(config)# interface fastethernet0/0
R2(config-if)# ip address 192.168.10.2 255.255.255.0
R2(config-if)# no shutdown

Step 2: Configure the Local User Database

On R1, configure a user account in the local user database with the username
and password of “cisco” using the username username password password
command in global configuration mode.


R1(config)# username cisco password cisco

Step 3: Implement AAA Services

On R1, enable authentication, authorization, and accounting (AAA) services
with the global configuration command aaa new-model. Since you are
implementing local authentication, use local authentication as the first method,

background image

and no authentication as the secondary method. Create the default login
authentication list by issuing the aaa authentication login default methods
command with a method list using the local and none keywords.

If you were using an authentication method with a remote server, such as
TACACS+ or RADIUS, you would configure a secondary authentication method
for fallback if the server is unreachable. Normally, the secondary method would
be the local database. In this case, if no usernames are configured in the local
database, the router allows all users login access to the device.


R1(config)# aaa new-model
R1(config)# aaa authentication login default local none

Note: If you do not set up a default login authentication list, you could get
locked out of the router and be forced to use the password recovery procedure
for your specific router.

Next, create a unique authentication list for Telnet access to the router. This
does not have the fallback of no authentication, so if there are no usernames in
the local database, Telnet access is disabled. To create an authentication list
that is not the default list, use the aaa authentication login name method1
[method2] [method3] command. Name the authentication method list
“telnet_lines.” To apply the authentication list to vtys, use the login
authentication
name command in line configuration mode.


R1(config)# aaa authentication login telnet_lines local
R1(config)# line vty 0 4
R1(config-line)# login authentication telnet_lines

Verify that this authentication list is used by opening a Telnet session from R2
to R1.


R2# telnet 192.168.10.1
Trying 192.168.10.1 ... Open


User Access Verification

Username: cisco
Password: cisco

R1> exit

[Connection to 192.168.10.1 closed by foreign host]
R2#

If you are able to log in to the router, your user account was verified against the
local database on the router.

If your session with the console port of the router times out, you may have to
log in using the default authentication list.

2 - 3

CCNP: Implementing Secure Converged Wide-area Networks v5.0 - Lab 5-6c

Copyright

© 2007, Cisco Systems, Inc

background image

If no user accounts are configured in the local database, which users are
permitted to access the device?

Final Configuration

R1# show run
hostname R1
!
aaa new-model
!
aaa authentication login default local none
aaa authentication login telnet_lines local
!
username cisco password 0 cisco
!
interface FastEthernet0/0
ip address 192.168.10.1 255.255.255.0
no shutdown
!
line vty 0 4
login authentication telnet_lines
end

R2# show run
hostname R2
!
interface FastEthernet0/0
ip address 192.168.10.2 255.255.255.0
no shutdown
end

3 - 3

CCNP: Implementing Secure Converged Wide-area Networks v5.0 - Lab 5-6c

Copyright

© 2007, Cisco Systems, Inc


Wyszukiwarka

Podobne podstrony:
CCNP2 lab 3 10 en
CCNP2 lab 5 6b en
CCNP2 lab 5 6a en
CCNP2 lab 4 1 en
CCNP2 lab 3 5 en
CCNP2 lab 5 5 en
CCNP2 lab 5 4 en
CCNP2 lab 3 6 en
CCNP2 lab 3 9 en
CCNP2 lab 5 7 en
CCNP2 lab 3 4 en
CCNP2 lab 4 2 en
CCNP2 lab 5 8 en
CCNP2 lab 3 2 en
CCNP2 lab 5 1 en
CCNP2 lab 6 1 en
CCNP2 lab 6 3 en
CCNP2 lab 6 4 en
CCNP2 lab 5 2 en

więcej podobnych podstron