This section provides information to configure security using the command line interface.
This section provides a brief overview of the tasks that must be performed to configure security and provides the CLI commands. Table 10 describes the capabilities of authentication, authorization, and accounting configurations. For example, authentication can be enabled locally and on RADIUS and TACACS+ servers. Authorization can be executed locally, on a RADIUS server, or on a TACACS+ server. Accounting can be performed on a RADIUS or TACACS+ server.
Authentication | Authorization | Accounting |
Local | Local | None |
RADIUS | Local and RADIUS | RADIUS |
TACACS+ | Local | TACACS+ |
Refer to the following sections to configure authentication:
Refer to the following sections to configure authorization.
Refer to the following sections to configure accounting.
This section provides information to configure security and configuration examples of configuration tasks.
To implement security features, configure the following components:
The following are sample default values for security parameters.
Creating and implementing management access filters is optional. Management access filters control all traffic going in to the CPM, including all routing protocols. They apply to packets from all ports. The filters can be used to restrict management of the 7210 SAS router by other nodes outside either specific (sub)networks or through designated ports. By default, there are no filters associated with security options. The management access filter and entries must be explicitly created on each router. These filters also apply to the management Ethernet port.
The 7210 SAS implementation exits the filter when the first match is found and execute the actions according to the specified action. For this reason, entries must be sequenced correctly from most to least explicit.
An entry may not have any match criteria defined (in which case, everything matches) but must have at least the one keyword to be considered complete. Entries without the action keyword are considered incomplete and will be rendered inactive.
Use the following syntax to configure a management access filter. This example only accepts packets matching the criteria specified in entries 1 and 2. Non-matching packets are denied.
Password management parameters consists of defining aging, the authentication order and authentication methods, password length and complexity, as well as the number of attempts a user can enter a password.
Depending on the your authentication requirements, password parameters are configured locally.
Use the following syntax to configure password support.
The following is a sample password configuration output.
Profiles are used to deny or permit access to a hierarchical branch or specific commands. Profiles are referenced in a user configuration. A maximum of sixteen user profiles can be defined. A user can participate in up to sixteen profiles. Depending on the authorization requirements, passwords are configured locally or on the RADIUS server.
Use the following syntax to configure user profiles.
The following is sample user profile output.
Configure access parameters for individual users. For user, define the login name for the user and, optionally, information that identifies the user. Use the following syntax to configure RADIUS support.
The following is a sample user configuration output.
The following is a sample keychain configuration output.
You can copy a profile or user or overwrite an existing profile or user. The overwrite option must be specified or an error occurs if the destination profile or username already exists.
Use the following syntax to configure copied users.
The following is a sample copied user configuration output.
The cannot-change-password flag is not replicated when a copy user command is performed. A new-password-at-login flag is created instead.
The following is a sample copied profile output.
Use the SSH command to configure the SSH server as SSH1, SSH2 or both. The default is SSH2 (SSH version 2). This command should only be enabled or disabled when the SSH server is disabled. This setting should not be changed while the SSH server is running since the actual change only takes place after SSH is disabled or enabled.
The following is a sample SSH server configuration output as both SSH and SSH2 using a host-key.
RADIUS is disabled by default and must be explicitly enabled. The mandatory commands to enable RADIUS on the local router are radius and server server-index address ip-address secret key.
The system IP address must be configured in order for the RADIUS client to work. See “Configuring a System Interface” in the 7210 SAS-D, Dxp, K 2F1C2T, K 2F6C4T, K 3SFP+ 8C Router Configuration Guide.
The other commands are optional. The server command adds a RADIUS server and configures the RADIUS server’s IP address, index, and key values. The index determines the sequence in which the servers are queried for authentication requests.
On the local router, use the following syntax to configure RADIUS authentication.
The following is a sample RADIUS authentication configuration output.
In order for RADIUS authorization to function, RADIUS authentication must be enabled first. See Configuring RADIUS Authentication.
In addition to the local configuration requirements, VSAS must be configured on the RADIUS server. See Vendor-Specific Attributes (VSAS).
On the local router, use the following syntax to configure RADIUS authorization.
The following is a sample RADIUS authorization configuration output.
On the local router, use the following syntax to configure RADIUS accounting:
The following is a sample RADIUS accounting configuration output.
Use the following CLI commands to configure generic authentication parameters for clients using 802.1x EAPOL. Additional parameters are configured per Ethernet port. Refer to the 7210 SAS-D, Dxp, K 2F1C2T, K 2F6C4T, K 3SFP+ 8C Interface Configuration Guide.
To configure generic parameters for 802.1x authentication, enter the following syntax.
The following is a sample 802.1x configuration output.
To use TACACS+ authentication on the router, configure one or more TACACS+ servers on the network.
Use the following syntax to configure profiles.
The following is a sample TACACS+ authentication configuration output.
In order for TACACS+ authorization to function, TACACS+ authentication must be enabled first. See Enabling TACACS+ Authentication.
On the local router, use the following syntax to configure RADIUS authorization.
The following is a sample TACACS+ authorization configuration output.
On the local router, use the following syntax to configure TACACS+ accounting.
The following is a sample TACACS+ accounting configuration output.
Configure login control parameters for console, Telnet, and FTP sessions.
Use the following syntax to configure login controls.
The following is a sample login control configuration output.