CHAPTER
9-1
Catalyst 2960 and 2960-S Switch Software Configuration Guide
OL-8603-09
9
Configuring Switch-Based Authentication
This chapter describes how to configure switch-based authentication on the Catalyst 2960 and 2960-S
switches. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack.
Note Stacking is supported only on Catalyst 2960-S switches running the LAN base image.
This chapter consists of these sections:
• Preventing Unauthorized Access to Your Switch, page 9-1
• Protecting Access to Privileged EXEC Commands, page 9-2
• Controlling Switch Access with TACACS+, page 9-10
• Controlling Switch Access with RADIUS, page 9-18
• Configuring the Switch for Local Authentication and Authorization, page 9-40
• Configuring the Switch for Secure Shell, page 9-41
• Configuring the Switch for Secure Socket Layer HTTP, page 9-46
• Configuring the Switch for Secure Copy Protocol, page 9-52
Preventing Unauthorized Access to Your Switch
You can prevent unauthorized users from reconfiguring your switch and viewing configuration
information. Typically, you want network administrators to have access to your switch while you restrict
access to users who dial from outside the network through an asynchronous port, connect from outside
the network through a serial port, or connect through a terminal or workstation from within the local
network.
To prevent unauthorized access into your switch, you should configure one or more of these security
features:
• At a minimum, you should configure passwords and privileges at each switch port. These passwords
are locally stored on the switch. When users attempt to access the switch through a port or line, they
must enter the password specified for the port or line before they can access the switch. For more
information, see the “Protecting Access to Privileged EXEC Commands” section on page 9-2.