Enhanced Password Security - Phase I
|
|
|
- Elwin Wilcox
- 10 years ago
- Views:
Transcription
1 Enhanced Password Security - Phase I Feature History 120(18)S 121(8a)E 122(14)S This feature was introduced Support for this feature was integrated into Cisco IOS Release 121(8a)E This feature was integrated into Cisco IOS Release 122(14)S This document describes the Enhanced Password Security feature in Cisco IOS Release 121(8a)E It includes the following sections: Feature Overview, page 1 Supported Platforms, page 2 Supported Standards, MIBs, and RFCs, page 3 Configuration Tasks, page 3 Monitoring and Maintaining Enhanced Password Security, page 4 Configuration Examples, page 4 Command Reference, page 6 Glossary, page 9 Feature Overview Using the Enhanced Password Security feature, you can configure MD5 encryption for username passwords Before the introduction of this feature there were two types of passwords associated with usernames Type 0 is a clear text password visible to any user who has access to privileged mode on the router Type 7 is a password with a weak, exclusive-or type encryption Type 7 passwords can be retrieved from the encrypted text by using publicly available tools MD5 encryption is a one-way hash function that makes reversal of an encrypted password impossible, providing strong encryption protection Using MD5 encryption, you cannot retrieve clear text passwords MD5 encrypted passwords cannot be used with protocols that require that the clear text password be retrievable, such as Challenge Handshake Authentication Protocol (CHAP) Use the username (secret) command to configure a user name and an associated MD5 encrypted secret 1
2 Supported Platforms Enhanced Password Security - Phase I Benefits Enhanced Password Security provides a strong method of encryption for user passwords Restrictions Protocols which require the retrieval of clear text passwords, such as CHAP, cannot be used with MD5 encrypted passwords You can specify a username password, or a username secret, but not both Related Features and Technologies To establish a username-based authentication system, use the username command in global configuration mode See Passwords and Privileges Commands for more details Related Documents Cisco IOS Security Configuration Guide, Release 121 Cisco IOS Security Command Reference, Release 121 Improving Security on Cisco Routers Passwords and Privileges Commands Supported Platforms Cisco 7100 series Cisco 7200 routers Cisco 7500 series Cisco 7600 OSR Catalyst 6000 Determining Platform Support Through Cisco Feature Navigator Cisco IOS software is packaged in feature sets that are supported on specific platforms To get updated information regarding platform support for this feature, access Cisco Feature Navigator Cisco Feature Navigator dynamically updates the list of supported platforms as new platform support is added for the feature Cisco Feature Navigator is a web-based tool that enables you to determine which Cisco IOS software images support a specific set of features and which features are supported in a specific Cisco IOS image You can search by feature or release Under the release section, you can compare releases side by side to display both the features unique to each software release and the features in common 2
3 Enhanced Password Security - Phase I Supported Standards, MIBs, and RFCs To access Cisco Feature Navigator, you must have an account on Ciscocom If you have forgotten or lost your account information, send a blank to cco-locksmith@ciscocom An automatic check will verify that your address is registered with Ciscocom If the check is successful, account details with a new random password will be ed to you Qualified users can establish an account on Ciscocom by following the directions found at this URL: Cisco Feature Navigator is updated regularly when major Cisco IOS software releases and technology releases occur For the most current information, go to the Cisco Feature Navigator home page at the following URL: Availability of Cisco IOS Software Images Platform support for particular Cisco IOS software releases is dependent on the availability of the software images for those platforms Software images for some platforms may be deferred, delayed, or changed without prior notice For updated information about platform support and availability of software images for each Cisco IOS software release, refer to the online release notes or, if supported, Cisco Feature Navigator Supported Standards, MIBs, and RFCs Standards No new or modified standards are supported by this feature To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: If Cisco MIB Locator does not support the MIB information that you need, you can also obtain a list of supported MIBs and download MIBs from the Cisco MIBs page at the following URL: To access Cisco MIB Locator, you must have an account on Ciscocom If you have forgotten or lost your account information, send a blank to cco-locksmith@ciscocom An automatic check will verify that your address is registered with Ciscocom If the check is successful, account details with a new random password will be ed to you Qualified users can establish an account on Ciscocom by following the directions found at this URL: RFCs No new or modified RFCs are supported by this feature Configuration Tasks The following section details the configuration task necessary for the Enhanced Password Security feature Configuring Enhanced Security Password, page 4 (required) 3
4 Monitoring and Maintaining Enhanced Password Security Enhanced Password Security - Phase I Configuring Enhanced Security Password Step 1 Command Router(config)# username name secret 0 password or Router(config)# username name secret 5 encrypted-secret Purpose Configures a username and encrypts a clear text password with MD5 encryption Configures a username and enters an MD5 encrypted text string which is stored as themd5 encrypted password for the specified username Verifying MD5 Password Encryption Follow the steps below to verify MD5 encryption on a username password: Step 1 Step 2 Step 3 Configure an encrypted MD5 user password in global configuration mode Exit configuration mode and enter the login local command Verify that a valid user is able to log in through the console Monitoring and Maintaining Enhanced Password Security Use the following command to monitor and maintain Enhanced Password Security Command Router# show running-config Purpose Enter the show running-config command to verify that MD5 password encryption has been enabled If the username name secret 5 line appears in the command output, the Enhanced Password Security feature is enabled Configuration Examples This section provides the following configuration example: Configuring MD5 Encryption on a Clear Text Password Example, page 5 4
5 Enhanced Password Security - Phase I Configuration Examples Configuring MD5 Encryption on a Clear Text Password Example The following example configures username abc with the MD5 encrypted password xyz Output from the show running-config confirms that the MD5 encrypted password has been configured Note that the password itself is not displayed Router# configure terminal Router(config)# username abc secret 0 xyz Router(config)# exit Router# show running-config version 121 no service single-slot-reload-enable service timestamps debug uptime service timestamps log uptime no service password-encryption hostname CE logging rate-limit console 10 except errors no logging console enable secret 0 $1$53Ew$Dp8E4JGpg7rKxQa49BF9/ username abc secret 5 $1$fBYK$rH5/OChyx/ --Note that password xyz is not displayed ip subnet-zero Configuring MD5 Encryption on a MD5 Encrypted Text String Example The following example configures username cde and enters an MD5 encryption text string as the user password Output from the show running-config confirms that the MD5 encrypted password has been configured Note that the password itself is not displayed Router# configure terminal Router(config)# username cde secret 5 $1$feb0$a104Qd9UZ/Ak00KTggPD0 Router(config)# exit Router# show running-config version 121 no service single-slot-reload-enable service timestamps debug uptime service timestamps log uptime no service password-encryption hostname CE logging rate-limit console 10 except errors no logging console enable secret 5 $1$feb0$a104Qd9UZ/Ak00KTggPD0 username cde secret 5 ip subnet-zero 5
6 Command Reference Enhanced Password Security - Phase I Command Reference This section documents the modified command that configures the Enhanced Password Security feature All other commands used with this feature are documented in the Cisco IOS Release 121 command reference publications username (secret) 6
7 Enhanced Password Security - Phase I username (secret) username (secret) To encrypt a user password with MD5 encryption, use the username secret command in global configuration mode username name secret {0 password 5 encrypted-secret} Syntax Description name Specifies the user name 0 password Specifies a clear text password, which will be MD5 encrypted 5 encrypted-secret Specifies an MD5 encrypted text string, which will be stored as the encrypted user password Defaults No default behavior or values Command Modes Global configuration Command History Release Modification 100 This command was introduced 111 The following keywords and arguments were added: username name [callback-dialstring telephone-number] 120(18)S 121(8a)E 122(14)S username name [callback-rotary rotary-group-number] username name [callback-line [tty] line-number [ending-line-number]] username name [nocallback-verify] The following keywords were added: secret 0 secret 5 This command was integrated into Cisco IOS Release 121(8a)E This command was integrated into Cisco IOS Release 122(14)S Usage Guidelines Use the username secret command to configure a user name and MD5 encrypted user passworduse the 0 keyword to enable MD5 encryption on a clear text password Use the 5 keyword to enter an MD5 encryption string and save it as the usermd5 encrypted secret MD5 encryption is a strong encryption method which is not retrievable You cannot use MD5 encryption with protocols such as CHAP that require clear-text passwords Use the username secret command to provide an additional layer of security over the username password The username secret command provides better security by encrypting the password using non-reversible MD5 encryption, and storing the encrypted text The added layer of MD5 encryption is useful in environments where the password crosses the network or is stored on a TFTP server 7
8 username (secret) Enhanced Password Security - Phase I Use MD5 as the encryption type if you paste into this command an encrypted password that you copied from a router configuration file Caution If you specify MD5 encryption and then enter a clear text password, you will not be able to reenter enable mode You cannot recover a lost password that has been encrypted by any method If you use the same password for the enable password and username secret commands, you receive an error message warning that this practice is not recommended, but the password will be accepted By using the same password, however, you undermine the additional security the username secret command provides Examples The following example configures username abc and enables MD5 encryption on the clear text password xyz : username abc secret 0 xyz The following example configures username cde and enters an MD5 encrypted text string that is stored as the user name password: username cde secret 5 $1$feb0$a104Qd9UZ/Ak00KTggPD0 Related Commands Command Description enable password Sets a local password to control access to various privilege levels enable secret Specifies an additional layer of security over the enable password command username Establishes a username-based authentication system 8
9 Enhanced Password Security - Phase I Glossary Glossary CHAP Challenge-Handshake Authentication Protocol MD5 Message Digest 5 Algorithm used for message authentication in SNMP v2 MD5 verifies the integrity of the communication, authenticates the origin, and checks for timeliness 9
10 Glossary Enhanced Password Security - Phase I 10
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S This feature was introduced This document describes the Enhanced Password Security feature in It includes the following sections: Feature Overview,
Per-Packet Load Balancing
Per-Packet Load Balancing Feature History Release 12.0(19)ST 12.0(21)S 12.0(22)S Modification This feature was introduced on the Cisco 10000 series routers. This feature was introduced on the Cisco 12000
Router Security Audit Logs
Router Security Audit Logs The Router Security Audit Logs feature allows users to configure audit trails, which track changes that have been made to a router that is running Cisco IOS software. History
Encrypted Preshared Key
The feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Release Modification 12.3(2)T This feature was introduced. Finding Support Information
Encrypted Preshared Key
Encrypted Preshared Key The Encrypted Preshared Key feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Encrypted Preshared Key Release
Supported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access
Configuring Timeout, Retransmission, and Key Values per RADIUS Server The Configuring Timeout, Retransmission, and Key Values per RADIUS Server feature extends the functionality of the existing radius-server
NetFlow Subinterface Support
NetFlow Subinterface Support Feature History Release Modification 12.2(14)S This feature was introduced. 12.2(15)T This feature was integrated into Cisco IOS Release 12.2 T. This document describes the
GLBP - Gateway Load Balancing Protocol
GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy
Domain Name System Server Round-Robin Functionality for the Cisco AS5800
Domain Name System Server Round-Robin Functionality for the Cisco AS5800 This feature module describes Domain Name System (DNS) server round-robin functionality for the Cisco AS5800 universal access server.
Transferring Files Using HTTP or HTTPS
Transferring Files Using HTTP or HTTPS First Published: May 5, 2005 Last Updated: May 14, 2009 Cisco IOS Release 12.4 provides the ability to transfer files between your Cisco IOS software-based device
Image Verification. Finding Feature Information. Restrictions for Image Verification
The feature allows users to automatically verify the integrity of Cisco IOS images. Thus, users can be sure that the image is protected from accidental corruption, which can occur at any time during transit,
DHCP Server Port-Based Address Allocation
The feature provides port-based address allocation support on the Cisco IOS Dynamic Host Configuration Protocol (DHCP) server for the Ethernet platform. The DHCP server provides address assignment support
L2TP Dial-Out Load Balancing and Redundancy
L2TP Dial-Out Load Balancing and Redundancy The L2TP Dial-Out Load Balancing and Redundancy feature enables an L2TP network server (LNS) to dial out to multiple L2TP access concentrators (LACs) When the
Connecting to the Firewall Services Module and Managing the Configuration
CHAPTER 3 Connecting to the Firewall Services Module and This chapter describes how to access the command-line interface and work with the configuration. This chapter includes the following sections: Connecting
Controlling Access to a Virtual Terminal Line
Controlling Access to a Virtual Terminal Line First Published: August 18, 2006 Last Updated: August 18, 2006 You can control who can access the virtual terminal lines (vtys) to a router by applying an
Configuring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Last Updated: October 5, 2011 This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco
Configuring Access Service Security
CHAPTER 3 Configuring Access Service Security The access service security paradigm presented in this guide uses the authentication, authorization, and accounting (AAA) facility. Authentication requires
Firewall Stateful Inspection of ICMP
The feature addresses the limitation of qualifying Internet Control Management Protocol (ICMP) messages into either a malicious or benign category by allowing the Cisco IOS firewall to use stateful inspection
Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example
Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example Document ID: 45843 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Passwords
Lab 11.5.6.1 Configure Syslog on AP
Lab 11.5.6.1 Configure Syslog on AP Estimated Time: 25 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, students will configure and use syslog logging to monitor
Flow-Based per Port-Channel Load Balancing
The feature allows different flows of traffic over a Gigabit EtherChannel (GEC) interface to be identified based on the packet header and then mapped to the different member links of the port channel.
HTTP 1.1 Web Server and Client
HTTP 1.1 Web Server and Client Finding Feature Information HTTP 1.1 Web Server and Client Last Updated: August 17, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
RADIUS Server Load Balancing
First Published: March 20, 2006 Last Updated: September 22, 2009 The feature distributes authentication, authorization, and accounting (AAA) authentication and accounting transactions across servers in
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data NetFlow is a technology that provides highly granular per-flow statistics on traffic in a Cisco router. The NetFlow MIB feature provides
Configuring a Load-Balancing Scheme
This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco Express Forwarding traffic. Load-balancing allows you to optimize
Management, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
Backing Up and Restoring Data
Backing Up and Restoring Data Cisco Unity Express backup and restore functions use an FTP server to store and retrieve data. The backup function copies the files from the Cisco Unity Express application
Configuring the Cisco Secure PIX Firewall with a Single Intern
Configuring the Cisco Secure PIX Firewall with a Single Intern Table of Contents Configuring the Cisco Secure PIX Firewall with a Single Internal Network...1 Interactive: This document offers customized
Cisco Routers and Switches
Cisco Routers and Switches Phoenix Cisco User Group (PCUG) Tools, tips, and tricks you never knew Hello! Jeremy D. Cioara - CCIE, MCSE, CNE AdTEC Networks - Chief Information Officer Cisco IP Telephony
Configuring Secure Socket Layer HTTP
Finding Feature Information, page 1 Prerequisites for Configuring the Switch for Secure Sockets Layer HTTP, page 1 Restrictions for Configuring the Switch for Secure Sockets Layer HTTP, page 2 Information
USB Disable for Cisco ISRs Feature Module
USB Disable for Cisco ISRs Feature Module First Published: March 28, 2011 Part Number: This guide describes the USB Disable feature in the following major sections: Feature Introduction, page 1 Restrictions,
You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource
The feature enables the configuration of a Virtual Private Network (VPN) routing and forwarding instance (VRF) table so that the domain name system (DNS) can forward queries to name servers using the VRF
NetFlow v9 Export Format
NetFlow v9 Export Format With this release, NetFlow can export data in NetFlow v9 (version 9) export format. This format is flexible and extensible, which provides the versatility needed to support new
Configuring a Cisco 2509-RJ Terminal Router
created by: Rainer Bemsel Version 1.0 Dated: Dec/08/2012 For my Cisco LAB, I ve purchased a used Cisco 2509-RJ with RJ45-RJ45 roll-over cables. This TechTip shows my configuration setup, so you can easily
Configuring System Message Logging
CHAPTER 25 This chapter describes how to configure system message logging on the Catalyst 2960 switch. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco
Lab 5.5 Configuring Logging
Lab 5.5 Configuring Logging Learning Objectives Configure a router to log to a Syslog server Use Kiwi Syslog Daemon as a Syslog server Configure local buffering on a router Topology Diagram Scenario In
Lab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500
Lab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500 Objective onfigure Load balance across multiple paths. Observe the load balancing process. Background/Preparation able a network similar
Configuring Timeout, Retransmission, and Key Values Per RADIUS Server
Configuring Timeout, Retransmission, and Key Values Per RADIUS Server Feature Summary The radius-server host command functions have been extended to include timeout, retransmission, and encryption key
Firewall Authentication Proxy for FTP and Telnet Sessions
Firewall Authentication Proxy for FTP and Telnet Sessions First Published: May 14, 2003 Last Updated: August 10, 2010 Before the introduction of the Firewall Authentication Proxy for FTP and Telnet Sessions
Chapter 1: Planning Maintenance for Complex Networks. TSHOOT v6 Chapter 1 2007 2010, Cisco Systems, Inc. All rights reserved.
: Planning Maintenance for Complex Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks TSHOOT v6 1 Objectives Evaluate commonly-practiced models and methodologies for network maintenance
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
Lab 4.1.4 Creating a Network Map using CDP Instructor Version 2500
Lab 4.1.4 Creating a Network Map using CDP Instructor Version 2500 Objective Use Cisco Discovery Protocol (CDP) commands to get information about neighboring network devices. Background/Preparation CDP
LAN-Cell to Cisco Tunneling
LAN-Cell to Cisco Tunneling Page 1 of 13 LAN-Cell to Cisco Tunneling This Tech Note guides you through setting up a VPN connection between a LAN-Cell and a Cisco router. As the figure below shows, the
Virtual Fragmentation Reassembly
Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments
Configuring SIP Support for SRTP
Configuring SIP Support for SRTP This chapter contains information about the SIP Support for SRTP feature. The Secure Real-Time Transfer protocol (SRTP) is an extension of the Real-Time Protocol (RTP)
Lab 6.1.3 Configure Local AAA on Cisco Router
Lab 6.1.3 Configure Local AAA on Cisco Router Objective Scenario Topology In this lab, the students will complete the following tasks: Securing and testing access to the privileged EXEC, VTY, and console
Configuring Role-Based Access Control
5 CHAPTER This chapter describes how to configure role-based access control (RBAC) on the Cisco Application Control Engine (ACE) module. This chapter contains the following sections: Information About
Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM
Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Objective Scenario Topology In this lab, the students will complete the following tasks: Prepare to configure Virtual Private Network (VPN)
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
Sophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
QoS: Color-Aware Policer
QoS: Color-Aware Policer First Published: August 26, 2003 Last Updated: February 28, 2006 The QoS: Color-Aware Policer enables a color-aware method of traffic policing. This feature allows you to police
Configuring SSH and Telnet
This chapter describes how to configure Secure Shell Protocol (SSH) and Telnet on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About
SNMP Version 3. Finding Feature Information. Information About SNMP Version 3. Security Features in SNMP Version 3
The feature provides secure access to devices by authenticating and encrypting data packets over the network. Simple Network Management Protocol version 3 (SNMPv3) is an interoperable, standards-based
Reverse Proxy Caching
CHAPTER 7 This chapter explains reverse proxy caching and shows configuration examples relevant to the Content Engine. This chapter contains the following sections: Overview, page 7-1 Configuring Reverse
Configuring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Finding Feature Information Configuring a Load-Balancing Scheme Last Updated: August 15, 2011 This module contains information about Cisco Express Forwarding and describes
Configuring VoIP Call Setup Monitoring
The Cisco IOS IP Service Level Agreements (SLAs) VoIP Call Setup (Post-Dial Delay) Monitoring feature provides the ability to measure your network s response time for setting up a Voice over IP (VoIP)
Configuring and Monitoring Citrix Branch Repeater
Configuring and Monitoring Citrix Branch Repeater eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of
Lab 1.2.3 Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips
Lab 1.2.3 Review of Basic Router Configuration with RIP Objective Cable and configure workstations and routers Setup IP addressing scheme using Class B networks Configure Routing Information Protocol (RIP)
Using Link Layer Discovery Protocol in Multivendor Networks
Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates
- The PIX OS Command-Line Interface -
1 PIX OS Versions - The PIX OS Command-Line Interface - The operating system for Cisco PIX/ASA firewalls is known as the PIX OS. Because the PIX product line was acquired and not originally developed by
VRRPv3: Object Tracking Integration
Virtual Router Redundancy Protocol (VRRP) enables a group of devices to form a single virtual device to provide redundancy. The LAN clients then can be configured with the virtual device as the default
ROLE-BASED COMMAND-LINE INTERFACE ACCESS
ROLE-BASED COMMAND-LINE INTERFACE ACCESS DENISE HELFRICH MARCH 2004 1 Agenda Role-Based Command-Line Interface (CLI) Access Overview Configuration Tasks CLI Views Lawful Intercept View How to access and
Configuring a Leased Line
CHAPTER 4 Configuring a Leased Line The configuration in this chapter describes how to configure a Cisco 1700 router for IP and IPX over a synchronous serial line. Before You Begin The configuration in
Basic Configuration of the Cisco 12000 Series Internet Router
CHAPTER 2 Basic Configuration of the Cisco 12000 Series Internet Router This chapter describes how to boot and configure the Cisco 12000 Series Internet Router. It discusses the following subjects: Cisco
Configuring the Content Routing Software
CHAPTER 2 This chapter describes the basic steps for configuring the Content Router software. Performing a Basic Startup Configuration After you physically install the Content Router hardware, configure
Lab 4.2.4 Advanced Telnet Operations
Lab 4.2.4 Advanced Telnet Operations Objective Use the telnet command to remotely access other routers. Verify that the application layer between the source and the destination is working properly. Suspend
Configuring Basic Settings
CHAPTER 10 This chapter describes how to configure basic settings on your ASA that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the
This feature was introduced. This feature was integrated in Cisco IOS Release 12.2(11)T.
BGP Link Bandwidth The Border Gateway Protocol (BGP) Link Bandwidth feature is used to advertise the bandwidth of an autonomous system exit link as an extended community. This feature is configured for
Question How do I access the router s web-based setup page? Answer
http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=3676 Question How do I access the router s web-based setup page? Answer All Linksys routers have a built-in web-based setup
Managing and Monitoring Network Management Features
Managing and Monitoring Network Management Features This feature module describes how to monitor, manage and deploy a variety of network management features, including Cisco Active Network Abstraction
Network Security and AAA
ICT Technical Update Module Network Security and AAA Prof. Dr Harsha Sirisena Electrical and Computer Engineering University of Canterbury AAA Introduction Overview A network administrator may allow remote
StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users
StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011.
Configuring Password Encryption
This chapter describes how to configure password encryption on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About Password Encryption,
Configuring Single Sign-on for WebVPN
CHAPTER 8 This chapter presents example procedures for configuring SSO for WebVPN users. It includes the following sections: Using Single Sign-on with WebVPN, page 8-1 Configuring SSO Authentication Using
Planning Maintenance for Complex Networks
Planning Maintenance for Complex Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks Olga Torstensson TSHOOT v6 1 Maintenance Models and Methodologies A network engineer s job description
Configuring Enhanced Object Tracking
Configuring Enhanced Object Tracking First Published: May 2, 2005 Last Updated: July 1, 2009 Before the introduction of the Enhanced Object Tracking feature, the Hot Standby Router Protocol (HSRP) had
Lab 7.2.9 Load Balancing Across Multiple Paths
Lab 7.2.9 Load Balancing Across Multiple Paths Objective Configure Load balance across multiple paths. Observe the load balancing process. Background/Preparation Cable a network similar to the one in the
Configuring Password Encryption
This chapter describes how to configure password encryption on Cisco NX-OS devices. This chapter includes the following sections: Information About Password Encryption, page 1 Licensing Requirements for
BRI to PRI Connection Using Data Over Voice
BRI to PRI Connection Using Data Over Voice Document ID: 14962 Contents Introduction Prerequisites Requirements Conventions Background Information Configure Network Diagram Configurations Verify Troubleshoot
How To Configure A Bomgar.Com To Authenticate To A Rdius Server For Multi Factor Authentication
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Upgrading Software Using the Online Installer
Upgrading Software Using the Online Installer Last Updated: December 8, 2009 This chapter provides the procedures for upgrading from a previous software version of the Cisco Integrated Storage System module
Security Provider Integration RADIUS Server
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Implementing Secure Shell
Secure Shell (SSH) is an application and a protocol that provides a secure replacement to the Berkeley r-tools. The protocol secures sessions using standard cryptographic mechanisms, and the application
SNMP SECURITY A CLOSER LOOK JEFFERY E. HAMMONDS EAST CAROLINA UNIVERSITY ICTN 6865
SNMP SECURITY A CLOSER LOOK JEFFERY E. HAMMONDS EAST CAROLINA UNIVERSITY ICTN 6865 NOVEMBER 25, 2013 SNMP SECURITY 2 ABSTRACT As a Network Monitoring System Administrator I have gained a substantial amount
How To Configure A Cisco Router With A Cio Router
CHAPTER 1 This chapter provides procedures for configuring the basic parameters of your Cisco router, including global parameter settings, routing protocols, interfaces, and command-line access. It also
Configuring CSS Remote Access Methods
CHAPTER 11 Configuring CSS Remote Access Methods This chapter describes how to configure the Secure Shell Daemon (SSH), Remote Authentication Dial-In User Service (RADIUS), and the Terminal Access Controller
Configuring Basic Settings
CHAPTER 9 This chapter describes how to configure basic settings on your ASASM that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the
Dynamic DNS Support for Cisco IOS Software
Dynamic DNS Support for Cisco IOS Software First Published: 12.3(8)YA Last Updated: February 28, 2006 The Dynamic DNS Support for Cisco IOS Software feature enables Cisco IOS software devices to perform
VERALAB LDAP Configuration Guide
VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to
Using LiveAction with Cisco Secure ACS (TACACS+ Server)
LiveAction Application Note Using LiveAction with Cisco Secure ACS (TACACS+ Server) September 2012 http://www.actionpacked.com Table of Contents 1. Introduction... 1 2. Cisco Router Configuration... 2
Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5
Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5 Objectives Part 1: Configure CCP Access for Routers Enable HTTP/HTTPS server. Create a user account with privilege level 15.
Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access
Table of Contents Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Configure...2
Configuring the MNLB Forwarding Agent
CHAPTER 3 Configuring the MNLB Forwarding Agent This chapter describes how to configure a Cisco router as an MNLB Forwarding Agent to operate in conjunction with a Cisco LocalDirector serving as Services
Lab 2.5.2a Configure SSH
Lab 2.5.2a Configure SSH Objective Scenario Topology In this lab, the students will complete the following tasks: Configuring a router as a Secure Shell (SSH) server Version 1. Install and configure a
Enabling Management Protocols: NTP, SNMP, and Syslog
SECTION 7 Enabling Management Protocols: NTP, SNMP, and Syslog In this Section This section describes how to enable basic management protocols on a Cisco AS5800 and Cisco AS5300 as part of a dial access
Configuring and Monitoring Bluecoat AntiVirus
Configuring and Monitoring Bluecoat AntiVirus eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
Monitoring DoubleTake Availability
Monitoring DoubleTake Availability eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may
Configuring Port Security
CHAPTER 62 This chapter describes how to configure the port security feature. For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Master List, at this URL:
