Security Examples
Cisco AS5300 Universal Access Server Software Configuration Guide
4-20
•
A PPP authentication list named marketing is created, then applied to group async interface 0,
which includes asynchronous interfaces 1 to 48.
•
An ARA list named kona-coast-office is created and applied to lines 1 to 48.
Note
The authentication method lists used in this example use names other than default. However,
you generally specify default as the list name for most lines and interfaces, and apply different
named lists on an exception basis. These names are used only for illustrative purposes.
hostname 5300
!
tacacs-server host maui
tacacs-server key shepard4
!
aaa authentication login rtp2-office
aaa authentication ppp marketing if-needed
aaa authentication arap kona-coast-office
!
line console0
login authentication rtp2-office
!
interface group-async0
ppp authentication chap marketing
group-range 1 48
!
line 1 48
arap authentication kona-coast-office RADIUS Example for Login and PPP
The following example shows how to create authentication lists:
•
A RADIUS server named server219 is polled for authentication information (so you do not need
to define a local username database). The shared key between the access server and the RADIUS
security server is BaBe218.
•
A login authentication list named fly is created, then applied to all lines that users can log in to,
except the console port. In this example, the console port is physically secure and does not need
password protection. The access server is locked in a closet and secured behind a deadbolt lock.
•
A PPP authentication list named maaaa is created, then applied to group async interface 658,
which includes asynchronous interfaces 1 to 48. CHAP authentication is used because it is more
secure than PAP.
radius-server host server219
radius-server key BaBe218
!
privilege exec level 14 configure
privilege exec level 14 reload
privilege exec level 8 arap
privilege exec level 8 ppp
!
aaa authentication login fly radius
aaa authentication ppp maaaa if-needed radius
aaa authorization network radius
aaa authorization exec radius
!
line 1 54
login authentication fly
!
interface group-async658
ppp authentication chap maaaa
group-range 1 48
Summary of Contents for AS5300 - Universal Access Server
Page 4: ......
Page 10: ...x Book Title ...
Page 34: ...Where to Go Next Cisco AS5300 Universal Access Server Software Configuration Guide 2 6 ...
Page 160: ...Cisco AS5300 Universal Access Server Software Configuration Guide ROM Monitor Commands B 8 ...
Page 184: ...Cisco AS5300 Universal Access Server Software Configuration Guide Where to Go Next C 24 ...
Page 192: ...Cisco AS5300 Universal Access Server Software Configuration Guide New Hardware Features D 8 ...