18-Security Configuration
18-Security Configuration
Table of Contents
Table of Contents
Chapter 1 AAA Configuration ............................................................................................................................................... 1
1.1 AAA Overview........................................................................................................................................................ 1
1.1.1 AAA Security Service................................................................................................................................. 1
1.1.2 Benefits of Using AAA ............................................................................................................................... 2
1.1.3 AAA Principles........................................................................................................................................... 2
1.1.4 Method Lists.............................................................................................................................................. 2
1.2 AAA Configuration Process ................................................................................................................................... 3
1.2.1 Overview of the AAA Configuration Process ............................................................................................. 3
1.3 AAA Authentication Configuration Task List........................................................................................................... 4
1.4 AAA Authentication Configuration Task ................................................................................................................. 4
1.4.1 Configuring Login Authentication Using AAA ............................................................................................ 4
1.4.2 Enabling Password Protection at the Privileged Level .............................................................................. 6
1.4.3 Configuring Message Banners for AAA Authentication ............................................................................. 6
1.4.4 AAA authentication username-prompt....................................................................................................... 7
1.4.5 AAA authentication password-prompt ....................................................................................................... 7
1.4.6 Establishing Username Authentication...................................................................................................... 8
1.4.7 Enabling password.................................................................................................................................... 8
1.5 AAA Authentication Configuration Example........................................................................................................... 9
1.6 AAA Authorization Configuration Task List............................................................................................................. 9
1.7 AAA Authorization Configuration Task ................................................................................................................... 9
1.7.1 Configuring EXEC Authorization using AAA............................................................................................ 10
1.8 AAA Authorization Example................................................................................................................................. 11
1.9 AAA Accounting Configuration Task List.............................................................................................................. 11
1.10 AAA Accounting Configuration Task .................................................................................................................. 11
1.10.1 Configuring Accounting Connection using AAA..................................................................................... 12
1.10.2 Configuring Network Accounting using AAA.......................................................................................... 12
1.10.3 AAA accounting update ......................................................................................................................... 13
1.10.4 AAA accounting suppress null-username.............................................................................................. 13
Chapter 2 Configuing RADIUS ........................................................................................................................................... 14
2.1 Introduction.......................................................................................................................................................... 14
2.1.1 RADIUS Introduction............................................................................................................................... 14
2.1.2 RADIUS Operation.................................................................................................................................. 15
2.2 RADIUS Configuration Task List.......................................................................................................................... 15
2.3 RADIUS Configuration Task List.......................................................................................................................... 16
2.4 RADIUS Configuration Task ................................................................................................................................ 16
2.4.1 Configuring Switch to RADIUS Server Communication .......................................................................... 16
2.4.2 Configuring Switch to Use Vendor-Specific RADIUS Attributes .............................................................. 17
2.4.3 Specifying RADIUS Authentication.......................................................................................................... 17
2.4.4 Specifying RADIUS Authorization ........................................................................................................... 17
2.4.5 Specifying RADIUS Accounting............................................................................................................... 17
2.5 RADIUS Configuration Examples........................................................................................................................ 18
-I-
Table of Contents
- II -
Security Configuration
Access control is the way to control access to the network and services.
Authentication, authorization, and accounting (AAA) network security services provide
the primary framework through which you set up access control on your router or
access server.
-1-
Security Configuration
stop times, executed commands (such as PPP), number of packets, and number of
bytes.
Accounting enables you to track the services users are accessing as well as the
amount of network resources they are consuming. When AAA accounting is activated,
the network access server reports user activity to the RADIUS or TACACS+ security
server (depending on which security method you have implemented) in the form of
accounting records. Each accounting record is comprised of accounting AV pairs and is
stored on the access control server. This data can then be analyzed for network
management, client billing, and/or auditing. All accounting methods must be defined
through AAA. As with authentication and authorization, you configure AAA accounting
by defining a named list of accounting methods, and then applying that list to various
interfaces. For information about configuring accounting using AAA, refer to the chapter
"Configuring Accounting."
z • Scalability
AAA is designed to enable you to dynamically configure the type of authentication and
authorization you want on a per-line (per-user) or per-service (for example, IP, IPX, or
VPDN) basis. You define the type of authentication and authorization you want by
creating method lists, then applying those method lists to specific services or
interfaces.
A method list is a sequential list that defines the authentication methods used to
authenticate a user. Method lists enable you to designate one or more security
protocols to be used for authentication, thus ensuring a backup system for
authentication in case the initial method fails. Cisco IOS software uses the first method
listed to authenticate users; if that method does not respond, Cisco IOS software
selects the next authentication method in the method list. This process continues until
there is successful communication with a listed authentication method or the
authentication method list is exhausted, in which case authentication fails.
The software attempts authentication with the next listed authentication method only
when there is no response from the previous method. If authentication fails at any
point in this cycle—meaning that the security server or local username database
responds by denying the user access—the authentication process stops and no other
authentication methods are attempted. The following figures shows a typical AAA
network configuration that includes four security servers: R1 and R2 are RADIUS
servers, and T1 and T2 are TACACS+ servers.
-2-
Security Configuration
Suppose the system administrator has defined a method list where R1 will be
contacted first for authentication information, then R2, T1, T2, and finally the local
username database on the access server itself. When a remote user attempts to dial in
to the network, the network access server first queries R1 for authentication
information. If R1 authenticates the user, it issues a PASS response to the network
access server and the user is allowed to access the network. If R1 returns a FAIL
response, the user is denied access and the session is terminated. If R1 does not
respond, then the network access server processes that as an ERROR and queries R2
for authentication information. This pattern continues through the remaining designated
methods until the user is either authenticated or rejected, or until the session is
terminated. If all of the authentication methods return errors, the network access server
will process the session as a failure, and the session will be terminated.
A FAIL response is significantly different from an ERROR. A FAIL means that the user
has not met the criteria contained in the applicable authentication database to be
successfully authenticated. Authentication ends with a FAIL response. An ERROR
means that the security server has not responded to an authentication query. Because
of this, no authentication has been attempted. Only when an ERROR is detected will
AAA select the next authentication method defined in the authentication method list.
You must first decide what kind of security solution you want to implement. You need to
assess the security risks in your particular network and decide on the appropriate
means to prevent unauthorized entry and attack.
Configuring AAA is relatively simple after you understand the basic process involved.
To configure security on a Cisco router or access server using AAA, follow this
process:
z Define the method lists for authentication by using an AAA authentication command.
-3-
Security Configuration
z Enabling Password
(1) If you decide to use a separate security server, configure security protocol
parameters, such as RADIUS, TACACS+, or Kerberos.
(2) Define the method lists for authentication by using an AAA authentication
command.
The AAA security services facilitate a variety of login authentication methods. Use the
aaa authentication login command to enable AAA authentication no matter which of the
supported login authentication methods you decide to use. With the aaa authentication
login command, you create one or more lists of authentication methods that are tried at
login. These lists are applied using the login authentication line configuration
command.
To configure login authentication by using AAA, use the following commands beginning
in global configuration mode:
command purpose
-4-
Security Configuration
The list-name is a character string used to name the list you are creating. The method
argument refers to the actual method the authentication algorithm tries. The additional
methods of authentication are used only if the previous method returns an error, not if
it fails. To specify that the authentication should succeed even if all methods return an
error, specify none as the final method in the command line.
For example, to specify that authentication should succeed even if (in this example)
the TACACS+ server returns an error, enter the following command:
aaa authentication login default group radius
Note:
Because the none keyword enables any user logging in to successfully authenticate, it should be used
only as a backup method of authentication.
Keyword description
enable Uses the enable password for authentication.
group radius Uses the list of all RADIUS servers for authentication.
Use the aaa authentication login command with the line method keyword to
specify the line password as the login authentication method. For example, to
specify the line password as the method of user authentication at login when no
other method list has been defined, enter the following command:
aaa authentication login default line
Before you can use a line password as the login authentication method, you
need to define a line password.
(3) Login Authentication Using Local Password
Use the aaa authentication login command with the local method keyword to
specify that the Cisco router or access server will use the local username
-5-
Security Configuration
command purpose
aaa authentication enable default Enables user ID and password checking for
method1 [method2...] users requesting privileged EXEC level.
The method argument refers to the actual list of methods the authentication algorithm
tries, in the sequence entered.
Keyword Description
enable Uses the enable password for authentication.
group radius Uses the list of all RADIUS hosts for authentication.
AAA supports the use of configurable, personalized login and failed-login banners. You
can configure message banners that will be displayed when a user logs in to the
system to be authenticated using AAA and when, for whatever reason, authentication
fails.
-6-
Security Configuration
To configure a banner that will be displayed whenever a user logs in (replacing the
default message for login), use the following commands in global configuration mode::
command purpose
aaa authentication banner delimiter
Creates a personalized login banner.
text-string delimiter
To configure a message that will be displayed whenever a user fails login (replacing
the default message for failed login), use the following commands in global
configuration mode::
command purpose
aaa authentication fail-message delimiter Creates a message to be displayed when a
text-string delimiter user fails login.
Instruction
To create a login banner, you need to configure a delimiting character, which notifies
the system that the following text string is to be displayed as the banner, and then the
text string itself. The delimiting character is repeated at the end of the text string to
signify the end of the banner. The delimiting character can be any single character in
the extended ASCII character set, but once defined as the delimiter, that character
cannot be used in the text string making up the banner.
To change the text displayed when users are prompted to enter a username, use the
aaa authentication username-prompt command in global configuration mode. To return
to the default username prompt text, use the no form of this command. username:
The aaa authentication username-prompt command does not change any dialog that
is supplied by a remote TACACS+ server. Use the following command to configure in
global configuration mode:
command purpose
aaa authentication username-prompt String of text that will be displayed when the
text-string user is prompted to enter an username.
To change the text displayed when users are prompted for a password, use the aaa
authentication password-prompt command in global configuration mode. To return to
the default password prompt text, use the no form of this command.
password:
-7-
Security Configuration
The aaa authentication password-prompt command does not change any dialog that is
supplied by a remote TACACS+ server. Use the following command to configure in
global configuration mode:
command purpose
aaa authentication password-prompt String of text that will be displayed when the
text-string user is prompted to enter a password.
no username name
To set a local password to control access to various privilege levels, use the enable
password command in global configuration mode. To remove the password
requirement, use the no form of this command.
-8-
Security Configuration
The following example shows how to configure the switch to authenticate and
authorize using RADIUS:
aaa authentication login radius-login group radius local
aaa authorization network radius-network radius
line vty
login authentication radius-login
The lines in this sample RADIUS authentication and authorization configuration are
defined as follows::
z The aaa authentication login radius-login radius local command configures the
router to use RADIUS for authentication at the login prompt. If RADIUS returns
an error, the user is authenticated using the local database.
z The aaa authentication ppp radius-ppp radius command configures the software
to use PPP authentication using CHAP or PAP if the user has not already logged
in. If the EXEC facility has authenticated the user, PPP authentication is not
performed.
(1) If you decide to use a separate security server, configure security protocol
parameters, such as RADIUS, TACACS+, or Kerberos.
(2) Define the method lists for authorization by using an AAA authorization
command.
-9-
Security Configuration
Use aaa authorization exec command to run authorization to determine if the user is
allowed to run an EXEC shell. This facility might return user profile information such as
autocommand information.
Use line configuration command login authorization to apply these lists. Use the
following command in global configuration mode:
command purpose
The keyword list-name is the character string used to name the list of authorization
methods.
The keyword method specifies the actual method during authorization process.
Method lists enable you to designate one or more security protocols to be used for
authorization, thus ensuring a backup system in case the initial method fails. The
system uses the first method listed to authorize users for specific network services; if
that method fails to respond, the system selects the next method listed in the method
list. This process continues until there is successful communication with a listed
authorization method, or all methods defined are exhausted. If all specified methods
fail to respond, and you still want the system to enter the EXEC shell, you should
specify none as the last authorization method in command line.
Use default parameter to establish a default list, and the default list will apply to all
interfaces automatically. For example, use the following command to specify radius
as the default authorization method for exec:
aaa authorization exec default group radius
Note:
If no method list is defined, the local authorization service will be unavailable and the authorization is
allowed to pass..
The following table lists the currently supported EXEC authorization mode:
keyword description
group WORD Uses a named server group for authorization.
- 10 -
Security Configuration
The lines in this sample RADIUS authorization configuration are defined as follows::
z The aaa authentication login default local command defines the default method
list of login authentication. This method list applies to all login authentication
servers automatically.
z The aaa authorization exec default local command defines default method list of
exec authorization. The method list automatically applies to all users that need
to enter exec shell.
- 11 -
Security Configuration
(1) If you decide to use a separate security server, configure security protocol
parameters, such as RADIUS, TACACS+, or Kerberos.
(2) Define the method lists for accounting by using an AAA accounting command.
command purpose
aaa accounting connection {default |
list-name} {start-stop | stop-only | none} Establishes global accounting list.
group groupname
The keyword list-name is used to name any character string of the establishing list.
The keyword method specifies the actual method adopted during accounting process.
keyword description
group WORD Enables named server group for accounting.
Sends a "stop" record accounting notice at the end of the requested user
stop-only
process.
To create a method list to provide accounting information for SLIP, PPP, NCPs, and
ARAP sessions, use the aaa accounting network command in global configuration
mode.
command purpose
aaa accounting network {default |
list-name} {start-stop | stop-only | none} Enables global accounting list.
group groupname
The keyword list-name is used to name any character string of the establishing list.
The keyword method specifies the actual method adopted during accounting process.
- 12 -
Security Configuration
keyword description
group WORD Enables named server group for accounting.
Sends a "stop" record accounting notice at the end of the requested user
stop-only
process.
To enable periodic interim accounting records to be sent to the accounting server, use
the aaa accounting update command in global configuration mode. To disable interim
accounting updates, use the no form of this command.
Command purpose
If the newinfo keyword is used, interim accounting records will be sent to the
accounting server every time there is new accounting information to report. An
example of this would be when IP Control Protocol (IPCP) completes IP address
negotiation with the remote peer. The interim accounting record will include the
negotiated IP address used by the remote peer.
When used with the periodic keyword, interim accounting records are sent periodically
as defined by the argument number. The interim accounting record contains all of the
accounting information recorded for that user up to the time the accounting record is
sent.
When using both the newinfo and periodic keywords, interim accounting records are
sent to the accounting server every time there is new accounting information to report,
and accounting records are sent to the accounting server periodically as defined by the
argument number. For example, if you configure the aaa accounting update newinfo
periodic number command, all users currently logged in will continue to generate
periodic interim accounting records while new users will generate accounting records
based on the newinfo algorithm.
To prevent the AAA system from sending accounting records for users whose
username string is NULL, use the aaa accounting suppress null-username command
in global configuration mode. To allow sending records for users with a NULL
username, use the no form of this command.
- 13 -
Security Configuration
This chapter describes the Remote Authentication Dial-In User Service (RADIUS)
security system, defines its operation, and identifies appropriate and inappropriate
network environments for using RADIUS technology. The "RADIUS Configuration Task
List" section describes how to configure RADIUS with the authentication, authorization,
and accounting (AAA) command set.
2.1 Introduction
RADIUS has been implemented in a variety of network environments that require high
levels of security while maintaining network access for remote users.
Use RADIUS in the following network environments that require access security::
z Networks in which a user must only access a single service. Using RADIUS, you
can control user access to a single host, to a single utility such as Telnet, or to a
single protocol such as Point-to-Point Protocol (PPP). For example, when a user
logs in, RADIUS identifies this user as having authorization to run PPP using IP
address 10.2.3.4 and the defined access list is started.
z Networks that require resource accounting. You can use RADIUS accounting
independent of RADIUS authentication or authorization. The RADIUS
accounting functions allow data to be sent at the start and end of services,
indicating the amount of resources (such as time, packets, bytes, and so on)
used during the session. An Internet service provider (ISP) might use a
freeware-based version of RADIUS access control and accounting software to
meet special security and billing needs.
- 14 -
Security Configuration
When a user attempts to log in and authenticate to an access server using RADIUS,
the following steps occur::
(1) The user is prompted for and enters a username and password.
(2) The username and encrypted password are sent over the network to the
RADIUS server.
(3) The user receives one of the following responses from the RADIUS server:
a. ACCEPT—The user is authenticated.
b. REJECT—The user is not authenticated and is prompted to reenter the
username and password, or access is denied.
c. CHALLENGE—A challenge is issued by the RADIUS server. The challenge
collects additional data from the user.
d. CHANGE PASSWORD—A request is issued by the RADIUS server, asking
the user to select a new password.
The ACCEPT or REJECT response is bundled with additional data that is used
for EXEC or network authorization. You must first complete RADIUS
authentication before using RADIUS authorization. The additional data included
with the ACCEPT or REJECT packets consists of the following:
• Services that the user can access, including Telnet, rlogin, or local-area
transport (LAT) connections, and PPP, Serial Line Internet Protocol (SLIP), or
EXEC services.
• Connection parameters, including the host or client IP address, access list, and
user timeouts.
To configure RADIUS on your switch or access server, you must perform the following
tasks::
z Use the aaa authentication global configuration command to define method lists
for RADIUS authentication. For more information about using the aaa
authentication command, refer to the "Configuring Authentication" chapter.
z Use line and interface commands to enable the defined method lists to be used.
For more information, refer to the "Configuring Authentication" chapter.
- 15 -
Security Configuration
z You may use the aaa authorization global command to authorize specific user
functions. For more information about using the aaa authorization command,
refer to the chapter "Configuring Authorization."
z You may use the aaa accounting command to enable accounting for RADIUS
connections. For more information about using the aaa accounting command,
refer to the chapter "Configuring Accounting."
The RADIUS host is normally a multiuser system running RADIUS server software
from Livingston, Merit, Microsoft, or another software provider.
A RADIUS server and a Cisco router use a shared secret text string to encrypt
passwords and exchange responses.
To configure RADIUS to use the AAA security commands, you must specify the host
running the RADIUS server daemon and a secret text (key) string that it shares with
the router.
command purpose
radius-server host ip-address [auth-port Specifies the IP address or host name of the remote
port-number][acct-port portnumber] RADIUS server host and assign authentication and
accounting destination port numbers.
radius-server key string Specifies the shared secret text string used between
the router and a RADIUS server.
To configure global communication settings between the router and a RADIUS server,
use the following radius-server commands in global configuration mode::
command purpose
Specifies how many times the switch transmits each
radius-server retransmit retries RADIUS request to the server before giving up (the
default is 2).
- 16 -
Security Configuration
The Internet Engineering Task Force (IETF) draft standard specifies a method for
communicating vendor-specific information between the network access server and
the RADIUS server by using the vendor-specific attribute (attribute 26).
For more information about vendor-IDs and VSAs, refer to RFC 2138, Remote
Authentication Dial-In User Service (RADIUS). To configure the network access server
to recognize and use VSAs, use the following command in global configuration mode:
command purpose
radius-server vsa send [authentication] Enables the network access server to
recognize and use VSAs as defined by
RADIUS IETF attribute 26.
After you have identified the RADIUS server and defined the RADIUS authentication
key, you must define method lists for RADIUS authentication. Because RADIUS
authentication is facilitated through AAA, you must enter the aaa authentication
command, specifying RADIUS as the authentication method. For more information,
refer to the chapter "Configuring Authentication."
AAA authorization lets you set parameters that restrict a user's access to the network.
Authorization using RADIUS provides one method for remote access control, including
one-time authorization or authorization for each service, per-user account list and
profile, user group support, and support of IP, IPX, ARA, and Telnet. Because RADIUS
authorization is facilitated through AAA, you must issue the aaa authorization
command, specifying RADIUS as the authorization method. For more information,
refer to the chapter "Configuring Authorization."
The AAA accounting feature enables you to track the services users are accessing as
well as the amount of network resources they are consuming. Because RADIUS
accounting is facilitated through AAA, you must issue the aaa accounting command,
specifying RADIUS as the accounting method. For more information, refer to the
chapter "Configuring Accounting."
- 17 -
Security Configuration
The following example shows how to configure the router to authenticate and authorize
using RADIUS:
aaa authentication login use-radius group radius local
The lines in this sample RADIUS authentication and authorization configuration are
defined as follows::
aaa authentication login use-radius radius local configures the router to use RADIUS
for authentication at the login prompt. If RADIUS returns an error, the user is
authenticated using the local database. In this example, use-radius is the name of the
method list, which specifies RADIUS and then local authentication.
The following example shows a general configuration using RADIUS with the AAA
command set::
radius-server host 1.2.3.4
radius-server key myRaDiUSpassWoRd
username root password AlongPassword
aaa authentication login admins radius local
line vty 1 16
login authentication admins
radius-server host command defines the IP address of the RADIUS server host.;
radius-server key command defines the shared secret text string between the network
access server and the RADIUS server host.
aaa authentication login admins group radius local command defines the
authentication method list "dialins," which specifies that RADIUS authentication and
then (if the RADIUS server does not respond) local authentication will be used on
serial lines using PPP.;
login authentication admins command applies the "admins" method list for login
authentication.
- 18 -
Security Configuration
The section describes the concept of Web authentication and configuration and usage
of the Web authentication.
3.1 Overview
The Web authentication of the switch is a connection control mode as PPPoE and
802.1x. When you use the Web authentication, the login and logout operations can be
successfully performed through the interaction of the browser and the builtin portal
server of the switch. During the operations of login and logout, no other client software
need be installed.
1. Device role
The roles that the network devices take during the Web authentication are shown in
Figure 3-1:
z Client: It is a user computer that accesses network through the switch. The user
computer need be configured the network browser, the function of DHCP client
and the function to originate DNS query.
z AAA server: It is to save user right information and to charge users for their
network access.
switch
- 19 -
Security Configuration
2. Authentication flow
(1) The DHCP server sends a DHCP confirmation request to a user through the
switch after the user originates the process of DHCP address distribution. The
switch then identifies and records the user.
(1) The user accesses any Website through the browser (Write down the domain
name, not the IP address, in the host part of the url column in the browser),
which activates the DNS request of the user computer.
(2) The DNS server returns the user a request response. The switch captures the
request response message and changes the resolved address to the address of
the built-in portal server in the switch.
(3) The DHCP confirmation process continues after the browser captures DNS
resolution. The switch returns the corresponding authentication page according
to different authentication methods after the switch receives the request.
(4) The user submits the authentication request; the switch authenticates the user
through the AAA server after the switch receives information submitted by the
user; if the authentication succeeds, the AAA server will be notified to start
charging; the switch gives the user the network access right and returns the user
a page that the authentication is successful; meanwhile, the switch also returns
a keep alive page, which periodically sends the user online notification to the
switch.
(5) The user sends the logout request to the switch through the browser. The switch
then notifies the AAA server to stop charging, and withdraws the network access
right from the user.
(6) In the period between successful user authentication and logout, the switch
periodically detects the user online notification. If the notification is not received
in the preset time, the switch consuders that the user abnormally logs off,
notifies the AAA server to stop charging and withdraws the network access right
from the user.
The above steps may vary a little with configuration strategies and user’s operations.
For example, if user directly accesses the portal server of the switch before the
authentication is approved, DNS-related processes will not be enabled.
- 20 -
Security Configuration
DHCP ACK
DNS REQUERY
DNS RESPONSE
http request
http request(login)
authentication request
authentication result
authentication result
http request(keepalive)
http response(logout)
Username/password authentication mode: In this mode, the switch identifies the user
through the username and password, and notifies the AAA server to start charging
according to username; user needs to enter the username and password through the
browser.
VLAN ID authentication mode: In this mode, the switch identifies the user through the
VLAN ID the user belongs to, and notifies the AAA server to start charging according to
VLAN ID; user only requires to confirm corresponding operations on the Web page
before accessing the network.
- 21 -
Security Configuration
The switch takes the routing interface as a unit to set the authentication attribute. If the
Web authentication function is enabled on a routing interface, network accesses
through the routing interface are all controlled by the Web authentication. The DHCP
server, DNS server or AAA server should connect the switch through the interface
with Web authentication function disabled. Figure 3-3 shows the relative typical
network topology.
internet
l2switch
l3switch
l2switch
Run the following command in global configuration mode to configure the address of
the portal server:
Run… To...
web-auth portal-server A.B.C.D Configure the IP address of the portal server.
- 22 -
Security Configuration
The parameter authtime determines the maximum time of user's authentication. If the
authentication is not approved within the maximum time, the switch terminates the
authentication procedure.
Run... To...
web-auth authtime <60-65535> Configure the authentication duration.
Through the online notification sent by the browser, the switch checks whether the
user is online.
Run the following command in global configuration mode to configure the transmission
period (unit: second):
Run... To...
web-auth keep-alive <60-65535> Configure the transmission period for the online
notification.
When the switch does not receive the user online notification from the browser in the
set duration, the switch considers that user logs out abnormally.
Run the following command in global configuration mode to configure the duration to
detect the abnormal logout:
Run... To...
web-auth holdtime <60-65535> Configure the duration to detect user’s abnormal
logout.
When the authentication mode is set to VLAN ID, the switch takes vlan n as the user
name, n representing the corresponding VLAN serial number. All user names use the
same password.
Run the following command in global configuration mode to configure the password for
the VLAN ID authentication:
Run... To...
web-auth vlan-password <WORD> Configure the password for the VLAN ID
authentication.
- 23 -
Security Configuration
The switch provides two authentication modes: username/password and VLAN ID.
Run... To...
web-auth mode user | vlan-id Configure the authentication mode.
Different authentication method lists can be applied on each interface. By default, the
authentication method list named default is applied on each interface.
Run... To...
web-auth authentication WORD Configure the authentication method list.
Different accounting method lists can be applied on each interface. By default, the
accounting method list named default is applied on each interface.
Run... To...
web-auth accounting WORD Configure the accounting method list.
If global configuration and interface configuration satisfy the requirements, you can
enable the Web authentication on the designated routing switch.
Run the following command in interface configuration mode to enable the Web
authentication:
Run... To...
web-auth enable Enable the Web authentication.
- 24 -
Security Configuration
Run the following command in privileged mode to check the global configuration:
Run... To...
show web-auth Check the global configuration.
Run the following command in interface configuration mode to check the interface
configuration:
Run... To...
show web-auth interface [vlan | Check the interface configuration.
SuperVlan]
Run the following command in privileged mode to check the user state:
Run... To...
show web-auth user Check the user state.
Run the following command in global configuration mode to mandatorily kick out a
user.
Run... To...
web-auth kick-out user-IP Mandatorily kick out a user.
Network topology
- 25 -
Security Configuration
internet
F0/4
l2switch
F0/2
l3switch
F0/1
F0/3
l2switch
Global configuration
interface FastEthernet0/1
switchport pvid 1
!
interface FastEthernet0/2
switchport pvid 2
- 26 -
Security Configuration
!
interface FastEthernet0/3
switchport pvid 3
!
interface FastEthernet0/4
switchport pvid 4
interface VLAN1
no ip directed-broadcast
ip helper-address 192.168.20.1
web-auth accounting acct-weba
web-auth authentication auth-weba
web-auth mode vlan-id
web-auth enable
!
interface VLAN2
ip address 192.168.20.41 255.255.255.0
no ip directed-broadcast
!
interface VLAN3
no ip directed-broadcast
ip helper-address 192.168.20.1
web-auth accounting acct-weba
web-auth authentication auth-weba
web-auth mode user
web-auth enable
!
interface VLAN4
no ip directed-broadcast
!
- 27 -