Thursday 28 November 2013

Configuring Local User Authentication

Real World Application:

Usually with Cisco devices, more than one user to access and configure the device, hence the need to implement Cisco devices have different individuals in different administrative responsibilities required access level different user credentials.


This lab will discuss and demonstrate local user account profile requirements.

Lab Prerequisites:


  • If you are using GNS3, loaded free CCNA Binder GNS3 topology and R1.
  • Establish a console session with the Router 1.
  • Loopback0 interface configuration the host address of 10.1.1.1
Lab Objectives:




  • Configure the password for the user account with the name Tom Cisco$123 and level 15 privileges assigned to this user.
  • Configure the password for the user account with the name Sally LetMeSee! And level 1 the permissions assigned to the user.
  • Configure VTY lines 4 use the login local command line configuration mode for the local user database authentication for incoming exec session 0.
  • Interface Loopback0 reverse Telnet is used to verify your configuration.
Lab Instruction:

Step 1. The first objects you want, create a user account with a user name and password to Cisco$123 and Tom grant this user privilege level 15.


Router con0 is now available
Press RETURN to get started.
Router>enable
Router#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#username tom privilege 15 secret Cisco$123

Step 2. Create a user account with the username of Sally and password of LetMeSee! and grant this user level 1 privileges.

Router(config)#username sally privilege 1 secret LetMeSee!

With 15-level permissions to create a user account, place the user in privileged mode after successful authentication, so the user will not need to provide an enable password. Assigned 15-level permissions, use caution.

Step 3. Configure VTY lines 4 the local user database to authenticate an incoming exec session 0. This is done by performing a local login line configuration mode.

Router(config)#line vty 0 4
Router(config-line)#login local

The 4th step. Loopback0 interface, reverse Telnet is used to verify your configuration. You will receive a user name and a password, and after successful authentication based on credentials should grant you exec shell session in user mode, if Sally or privileged mode with the user name, if you are using user name Tom, as shown below;

Routerconfig-line)#end
Router#telnet 10.1.1.1
Trying 10.1.1.1 ... Open
User Access Verification
Username: tom
Password: 
Router#

0 comments:

Post a Comment