Cisco PIX 525 Especificaciones Pagina 128

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 604
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 127
10-10
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Chapter 10 Configuring AAA Servers and the Local Database
Configuring the Local Database
Caution If you add to the local database users who can gain access to the CLI but who should not be allowed to
enter privileged mode, enable command authorization. (See the “Configuring Local Command
Authorization” section on page 30-7.) Without command authorization, users can access privileged
mode (and all commands) at the CLI using their own password if their privilege level is 2 or greater (2 is
the default). Alternatively, you can use RADIUS or TACACS+ authentication so that the user will not
be able to use the login command, or you can set all local users to level 1 so you can control who can
use the system enable password to access privileged mode.
To define a user account in the local database, perform the following steps:
Step 1 Create the user account. To do so, enter the following command:
hostname/contexta(config)# username
username
{nopassword | password
password
} [encrypted]
[privilege
level
]
where the options are as follows:
username—A string from 4 to 64 characters long.
password password—A string from 3 to 16 characters long.
encrypted—Indicates that the password specified is encrypted.
privilege level—The privilege level that you want to assign to the new user account (from 0 to 15).
The default is 2. This privilege level is used with command authorization.
nopassword—Creates a user account with no password.
Step 2 To configure a local user account with VPN attributes, follow these steps:
a. Enter the following command:
hostname/contexta(config)# username
username
attributes
When you enter a username attributes command, you enter username mode. The commands
available in this mode are as follows:
group-lock
password-storage
vpn-access-hours
vpn-filter
vpn-framed-ip-address
vpn-group-policy
vpn-idle-timeout
vpn-session-timeout
vpn-simultaneous-logins
vpn-tunnel-protocol
Use these commands as needed to configure the user profile. For more information about these
commands, see the Cisco Security Appliance Command Reference.
b. When you have finished configuring the user profiles, enter exit to return to config mode.
Vista de pagina 127
1 2 ... 123 124 125 126 127 128 129 130 131 132 133 ... 603 604

Comentarios a estos manuales

Sin comentarios