3.6.1.1 Lab - Securing Administrative Access Using AAA and RADIUS - Instructor
3.6.1.1 Lab - Securing Administrative Access Using AAA and RADIUS - Instructor
Topology
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
Addressing Table
Objectives
Part 1: Configure Basic Device Settings
Configure basic settings such as host name, interface IP addresses, and access passwords.
Configure static routing.
Part 2: Configure Local Authentication
Configure a local database user and local access for the console, vty, and aux lines.
Test the configuration.
Part 3: Configure Local Authentication Using AAA
Configure the local user database using Cisco IOS.
Configure AAA local authentication using Cisco IOS.
Configure AAA local authentication using CCP.
Test the configuration.
Part 4: Configure Centralized Authentication Using AAA and RADIUS
Install a RADIUS server on a computer.
Configure users on the RADIUS server.
Use Cisco IOS to configure AAA services on a router to access the RADIUS server for authentication.
Use CCP to configure AAA services on a router to access the RADIUS server for authentication.
Test the AAA RADIUS configuration.
Background / Scenario
The most basic form of router access security is to create passwords for the console, vty, and aux lines. A
user is prompted for only a password when accessing the router. Configuring a privileged EXEC mode enable
secret password further improves security, but still only a basic password is required for each mode of
access.
In addition to basic passwords, specific usernames or accounts with varying privilege levels can be defined in
the local router database that can apply to the router as a whole. When the console, vty, or aux lines are
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
configured to refer to this local database, the user is prompted for a username and a password when using
any of these lines to access the router.
Additional control over the login process can be achieved using authentication, authorization, and accounting
(AAA). For basic authentication, AAA can be configured to access the local database for user logins, and
fallback procedures can also be defined. However, this approach is not very scalable because it must be
configured on every router. To take full advantage of AAA and achieve maximum scalability, AAA is used in
conjunction with an external TACACS+ or RADIUS server database. When a user attempts to log in, the
router references the external server database to verify that the user is logging in with a valid username and
password.
In this lab, you build a multi-router network and configure the routers and hosts. You will then use CLI
commands and CCP tools to configure routers with basic local authentication by means of AAA. You will
install RADIUS software on an external computer and use AAA to authenticate users with the RADIUS server.
Note: The router commands and output in this lab are from a Cisco 1841 router with Cisco IOS Release
15.1(4)M8 (Advanced IP Services image). Other routers and Cisco IOS versions can be used. See the Router
Interface Summary Table at the end of the lab to determine which interface identifiers to use based on the
equipment in the lab. Depending on the router model and Cisco IOS version, the commands available and
output produced might vary from what is shown in this lab.
Note: Make sure that the routers and switches have been erased and have no startup configurations.
Instructor Note: Instructions for erasing switches and routers are provided in Lab 0.0.0.0.
Required Resources
3 Routers (Cisco 1841 with Cisco IOS Release 15.1(4)M8 advanced IP services image or comparable)
2 switches (Cisco 2960 or comparable)
2 PCs (Windows Vista or Windows 7 with CCP 2.5, latest version of Java, Internet Explorer, and Flash
Player and RADIUS server)
Serial and Ethernet cables, as shown in the topology
Console cables to configure Cisco networking devices
CCP Notes:
Refer to Lab 0.0.0.0 for instructions on how to install and run CCP.
If the PC on which CCP is installed is running Windows Vista or Windows 7, it may be necessary to right-
click on the CCP icon or menu item, and choose Run as administrator.
In order to run CCP, it may be necessary to temporarily disable antivirus programs and O/S firewalls.
Make sure that all pop-up blockers are turned off in the browser.
Instructor Note: This lab is divided into five parts. Each part can be administered individually or in
combination with others as time permits. The main goal is to configure various types of user access
authentication, from basic local access validation to the use of AAA and then AAA with an external RADIUS
server. Both the Cisco IOS and the CCP methods of configuring the router are covered. R1 and R3 are on
separate networks and communicate through R2, which simulates an ISP type situation. Students can work in
teams of two for router authentication configuration, one person configuring R1 and the other R3.
Although switches are shown in the topology, students can omit the switches and use crossover cables
between the PCs and routers R1 and R3.
The basic running configs for all three routers are captured after Part 1 and Part 2 of the lab are completed.
The running config commands that are added to R1 and R3 in Parts 3 and 4 are captured and listed
separately. All configs are found at the end of the lab.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
Use the security passwords command to set a minimum password length of 10 characters.
R1(config)# security passwords min-length 10
b. Configure the enable secret password on both routers.
R1(config)# enable secret cisco12345
c. Configure the basic console, auxiliary port, and vty lines.
d. Configure a console password and enable login for router R1. For additional security, the exec-timeout
command causes the line to log out after 5 minutes of inactivity. The logging synchronous command
prevents console messages from interrupting command entry.
Note: To avoid repetitive logins during this lab, the exec timeout can be set to 0 0, which prevents it from
expiring. However, this is not considered a good security practice.
R1(config)# line console 0
R1(config-line)# password ciscoconpass
R1(config-line)# exec-timeout 5 0
R1(config-line)# login
R1(config-line)# logging synchronous
e. Configure a password for the aux port for router R1.
R1(config)# line aux 0
R1(config-line)# password ciscoauxpass
R1(config-line)# exec-timeout 5 0
R1(config-line)# login
f. Configure the password on the vty lines for router R1.
R1(config)# line vty 0 4
R1(config-line)# password ciscovtypass
R1(config-line)# exec-timeout 5 0
R1(config-line)# login
g. Encrypt the console, aux, and vty passwords.
R1(config)# service password-encryption
h. Issue the show run command. Can you read the console, aux, and vty passwords? Explain.
____________________________________________________________________________________
____________________________________________________________________________________
No. The passwords are now encrypted
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
Step 2: Configure local authentication for the console line and login.
a. Set the console line to use the locally defined login usernames and passwords.
R1(config)# line console 0
R1(config-line)# login local
b. Exit to the initial router screen that displays:
R1 con0 is now available. Press RETURN to get started.
c. Log in using the user01 account and password previously defined.
What is the difference between logging in at the console now and previously?
____________________________________________________________________________________
____________________________________________________________________________________
This time you are prompted to enter a username as well as a password.
d. After logging in, issue the show run command. Were you able to issue the command? Explain.
____________________________________________________________________________________
____________________________________________________________________________________
No. It requires privileged EXEC level.
Enter privileged EXEC mode using the enable command. Were you prompted for a password? Explain.
____________________________________________________________________________________
____________________________________________________________________________________
Yes. The new users created will still be required to enter the enable secret password to enter privileged
EXEC mode.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
b. Exit global configuration mode and display the running configuration. Can you read the user’s password?
____________________________________________________________________________________
____________________________________________________________________________________
No, a secret password is encrypted.
Step 2: Implement AAA services for console access using the local database.
a. Create the default login authentication list by issuing the aaa authentication login default
method1[method2][method3] command with a method list using the local and none keywords.
R3(config)# aaa authentication login default local none
Note: If you do not set up a default login authentication list, you could get locked out of the router and be
forced to use the password recovery procedure for your specific router.
b. Exit to the initial router screen that displays:
R3 con0 is now available
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
e. If no user accounts are configured in the local database, which users are permitted to access the device?
____________________________________________________________________________________
____________________________________________________________________________________
Any users can access the device. It does not matter whether the username exists in the local database or
if the password is correct.
Step 3: Create an AAA authentication profile for Telnet using the local database.
a. Create a unique authentication list for Telnet access to the router. This does not have the fallback of no
authentication, so if there are no usernames in the local database, Telnet access is disabled. To create
an authentication profile that is not the default, specify a list name of TELNET_LINES and apply it to the
vty lines.
R3(config)# aaa authentication login TELNET_LINES local
R3(config)# line vty 0 4
R3(config-line)# login authentication TELNET_LINES
b. Verify that this authentication profile is used by opening a Telnet session from PC-C to R3.
PC-C> telnet 192.168.3.1
Trying 192.168.3.1 ... Open
c. Log in as Admin01 with a password of Admin01pass. Were you able to login? Explain.
____________________________________________________________________________________
____________________________________________________________________________________
Yes. The router accessed the local database.
d. Exit the Telnet session with the exit command, and Telnet to R3 again.
e. Attempt to log in as baduser with any password. Were you able to login? Explain.
____________________________________________________________________________________
____________________________________________________________________________________
No. If the username is not found in the local database, there is no fallback method specified in the
authentication list for the vty lines.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
Step 2: Implement AAA services and HTTP router access prior to starting CCP.
a. From the CLI global config mode, enable a new AAA model.
R3(config)# aaa new-model
b. Enable the HTTP server on R3 for CCP access.
R3(config)# ip http server
Note: For maximum security, enable secure http server by using the ip http secure-server command.
c. Add a user named admin to the local database.
R3(config)# username admin privilege 15 secret cisco12345
d. Configure CCP to use the local database to authenticate web sessions.
R3(config)# ip http authentication local
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
Step 6: Verify the AAA username and profile for console login.
a. Exit to the initial router screen that displays:
R3 con0 is now available
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
Step 1: Verify that the system clock and debug time stamps are configured correctly.
a. From the R3 user or privileged EXEC mode prompt, use the show clock command to determine what the
current time is for the router. If the time and date are incorrect, set the time from privileged EXEC mode
with the command clock set HH:MM:SS DD month YYYY. An example is provided here for R3.
R3# clock set 14:15:00 26 December 2008
b. Verify that detailed time-stamp information is available for your debug output using the show run
command. This command displays all lines in the running config that include the text “timestamps”.
R3# show run | include timestamps
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 15 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
____________________________________________________________________________________
____________________________________________________________________________________
% Authentication failed
g. Turn off all debugging using the undebug all command at the privileged EXEC prompt.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 16 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
Note: If WinRadius is used on a PC that uses the Microsoft Windows Vista operating system or the
Microsoft Windows 7 operating system, ODBC may fail to create successfully because it cannot write to
the registry.
Possible solutions:
a. Compatibility settings:
1) Right click on the WinRadius.exe icon and select Properties.
2) While in the Properties dialog box, select the Compatibility tab. In this tab, select the checkbox for
Run this program in compatibility mode for. Then in the drop down menu below, choose
Windows XP (Service Pack 3) for example, if it is appropriate for your system.
3) Click OK.
b. Run as Administrator settings:
1) Right click on the WinRadius.exe icon and select Properties.
2) While in the Properties dialog box, select the Compatibility tab. In this tab, select the checkbox for
Run this program as administrator in the Privilege Level section.
3) Click OK.
c. Run as Administration for each launch:
1) Right click on the WinRadius.exe icon and select Run as Administrator.
2) When WinRadius launches, click Yes in the User Account Control dialog box.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 17 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
c. When WinRadius starts again, you should see messages similar to the following displayed.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 18 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
____________________________________________________________________________________
____________________________________________________________________________________
The authentication port is 1812, and the accounting port is 1813.
c. Click OK. You should see a message on the log screen that the user was added successfully.
Step 5: Test the new user added using the WinRadius test utility.
a. A WinRadius testing utility is included in the downloaded zip file. Navigate to the folder where you
unzipped the WinRadius.zip file and locate the file named RadiusTest.exe.
b. Start the RadiusTest application, and enter the IP address of this RADIUS server (192.168.1.3),
username RadUser, and password RadUserpass as shown. Do not change the default RADIUS port
number of 1813 and the RADIUS password of WinRadius.
c. Click Send and you should see a Send Access_Request message indicating the server at 192.168.1.3,
port number 1813, received 44 hexadecimal characters.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 19 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
Task 3: Configure R1 AAA Services and Access the RADIUS Server Using Cisco IOS
Note: To configure AAA using CCP, proceed to Task 5.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 20 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
Step 1: Verify connectivity between R1 and the computer running the RADIUS server.
Ping from R1 to PC-A.
R1# ping 192.168.1.3
If the pings were not successful, troubleshoot the PC and router configuration before continuing.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 21 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
Yes. Even though an invalid username and password were supplied, the none parameter on the default
login list allows any username access.
g. Were any messages displayed on the RADIUS server log for either login? ______________________ No
h. Why was a nonexistent username able to access the router and no messages are displayed on the
RADIUS server log screen?
____________________________________________________________________________________
____________________________________________________________________________________
The router is not communicating with the RADIUS server software.
i. When the RADIUS server is unavailable, messages similar to the following are typically displayed after
attempted logins.
*Dec 26 16:46:54.039: %RADIUS-4-RADIUS_DEAD: RADIUS server 192.168.1.3:1645,1646 is
not responding.
*Dec 26 15:46:54.039: %RADIUS-4-RADIUS_ALIVE: RADIUS server 192.168.1.3:1645,1646 is
being marked alive.
Step 4: Check the default port numbers on the WinRadius server on PC-A.
From the WinRadius main menu, choose Settings > System.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 22 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
What are the default WinRadius UDP port numbers? _____________________________ 1812 and 1813
Note: RFC 2865 officially assigned port numbers 1812 and 1813 for RADIUS.
Step 5: Change the RADIUS port numbers on R1 to match the WinRadius server.
Unless specified otherwise, the Cisco IOS RADIUS configuration defaults to UDP port numbers 1645 and
1646. Either the router Cisco IOS port numbers must be changed to match the port number of the RADIUS
server or the RADIUS server port numbers must be changed to match the port numbers of the Cisco IOS
router.
a. Remove the previous configuration using the following command.
R1(config)# no radius-server host 192.168.1.3 auth-port 1645 acct-port 1646
b. Issue the radius-server host command again and this time specify port numbers 1812 and 1813, along
with the IP address and secret key for the RADIUS server.
R1(config)# radius-server host 192.168.1.3 auth-port 1812 acct-port 1813 key
WinRadius
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 23 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
e. Log in again using an invalid username of Userxxx and the password of Userxxxpass. Were you able to
login?
____________________________________________________________________________________
____________________________________________________________________________________
No. R1 accessed the RADIUS server and validation failed.
What message was displayed on the router?
____________________________________________________________________________________
% Authentication failed
The following messages should display on the RADIUS server log.
Reason: Unknown username
User (Userxxx) authenticate failed
Step 7: Create an authentication method list for Telnet and test it.
a. Create a unique authentication method list for Telnet access to the router. This does not have the fallback
of no authentication, so if there is no access to the RADIUS server, Telnet access is disabled. Name the
authentication method list TELNET_LINES.
R1(config)# aaa authentication login TELNET_LINES group radius
b. Apply the list to the vty lines on the router using the login authentication command.
R1(config)# line vty 0 4
R1(config-line)# login authentication TELNET_LINES
c. Telnet from PC-A to R1, and log in with the username RadUser and the password of RadUserpass.
Were you able to gain access to log in? Explain.
____________________________________________________________________________________
____________________________________________________________________________________
Yes. R1 contacted the RDIUS server for user authentication, and a valid username/password
combination was entered on R1.
d. Exit the Telnet session, and telnet from PC-A to R1 again. Log in with the username Userxxx and the
password of Userxxxpass. Were you able to log in? Explain.
____________________________________________________________________________________
____________________________________________________________________________________
No. R1 contacted the RADIUS server for user authentication, and the username/password combination
was not defined in the RADIUS database, so access was denied.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 24 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
Task 5: (Optional) Configure R1 AAA Services and Access the RADIUS Server Using
CCP
You can also use CCP to configure the router to access the external RADIUS server.
Note: If you configured R1 to access the external RADIUS server using Cisco IOS in Task 3, you can skip this
task. If you performed Task 3 and you want to perform this task, restore the router to its basic configuration as
described Task 1 of this part, except log in initially as RadUser with the password RadUserpass. If the
RADIUS server is unavailable at this time, you will still be able to log in to the console.
If you do not perform this task, read through the steps to become familiar with the CCP process.
Step 1: Implement AAA services and HTTP router access prior to starting CCP.
a. From the CLI global config mode, enable a new AAA model.
R1(config)# aaa new-model
b. Enable the HTTP server on R1.
R1(config)# ip http server
c. Add a user named admin to the local database.
R1(config)# username admin privilege 15 secret cisco12345
d. Configure CCP to use the local database to authenticate web sessions.
R1(config)# ip http authentication local
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 25 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
i. In the Deliver Configuration to Router window, click Deliver, and in the Commands Delivery Status
window, click OK.
j. What command was delivered to the router?
____________________________________________________________________________________
____________________________________________________________________________________
radius-server host 192.168.1.3 auth-port 1812 acct-port 1813 key WinRadius. This is the same Cisco
IOS command that would have been entered at the CLI in Task 4, Step 8b.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 26 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
f. In the Deliver Configuration to Router window, click Deliver and in the Commands Delivery Status
window, click OK.
g. What command(s) were delivered to the router?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
aaa authentication login default group radius local. This is similar to the IOS command that would
have been entered at the CLI in the Task 3, Step 2, except that “none” was specified as the backup
option to radius.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 27 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
Reflection
1. Why would an organization want to use a centralized authentication server rather than configuring users and
passwords on each individual router?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary. Updating local databases on network devices is not a scalable solution. A centralized
authentication server greatly reduces the administration time required when there are additions or removals to
the user list. This is especially true in a large network where the number of updates required might be high
enough that a dedicated person could be required.
2. Contrast local authentication and local authentication with AAA.
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary. With local authentication alone, specific usernames or accounts can be defined in the local
router database, with varying privilege levels, that can apply to the router as a whole. When the console, vty,
and AUX lines are configured to refer to this local database, the user is prompted for a username and a
password when using any of these lines to access the router. Additional control over the login process can be
achieved using AAA. For basic authentication, AAA can be configured to access the local database for user
logins, and various fallback procedures can be defined.
3. Based on the Academy online course content, web research, and the use of RADIUS in this lab, compare and
contrast RADIUS with TACACS+.
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary but could include the following:
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 28 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
RADIUS is an IETF standard based on RFC 2865, and a number of freeware versions of it are available.
TACACs+ is Cisco proprietary.
RADIUS uses UDP while TACACS+ uses TCP.
RADIUS encrypts only the password in the access-request packet from the client to the server. The
remainder of the packet is unencrypted. TACACS+ encrypts the entire body of the packet, but leaves a
standard TACACS+ header.
RADIUS combines authentication and authorization. TACACS+ uses the AAA architecture, which
separates AAA. This allows separate authentication solutions that can still use TACACS+ for
authorization and accounting.
Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2
1800 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(Fa0/0) (Fa0/1)
1900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
2801 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/1/1)
(Fa0/0) (Fa0/1)
2811 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(Fa0/0) (Fa0/1)
2900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
R1#sh run
Building configuration...
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 29 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
hostname R1
!
boot-start-marker
boot-end-marker
!
security passwords min-length 10
logging message-counter syslog
enable secret 5 $1$UNul$LMmwJgKj4Ze1OBToirDDJ.
!
no aaa new-model
dot11 syslog
ip source-route
!
ip cef
no ip domain lookup
!
no ipv6 cef
multilink bundle-name authenticated
!
username user01 password 7 06131C245E1E5809040401
archive
log config
hidekeys
!
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1/0
!
interface FastEthernet0/1/1
!
interface FastEthernet0/1/2
!
interface FastEthernet0/1/3
!
interface Serial0/0/0
ip address 10.1.1.1 255.255.255.252
clock rate 64000
!
interface Serial0/0/1
no ip address
shutdown
clock rate 2000000
!
interface Vlan1
no ip address
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 10.1.1.2
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 30 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
no ip http server
no ip http secure-server
!
control-plane
!
banner motd ^CUnauthorized access strictly prohibited and prosecuted to the ful
l extent of the law^C
!
line con 0
exec-timeout 0 0
password 7 00071A150754080901314D5D1A
logging synchronous
login local
line aux 0
exec-timeout 5 0
password 7 110A1016141D0A191C3A2A373B
login local
line vty 0 4
exec-timeout 5 0
password 7 070C285F4D060F110E020A1F17
login local
!
scheduler allocate 20000 1000
end
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 31 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
log config
hidekeys
!
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1/0
!
interface FastEthernet0/1/1
!
interface FastEthernet0/1/2
!
interface FastEthernet0/1/3
!
interface Serial0/0/0
ip address 10.1.1.2 255.255.255.252
!
interface Serial0/0/1
ip address 10.2.2.2 255.255.255.252
clock rate 64000
!
interface Vlan1
no ip address
!
ip forward-protocol nd
ip route 192.168.1.0 255.255.255.0 10.1.1.1
ip route 192.168.3.0 255.255.255.0 10.2.2.1
no ip http server
no ip http secure-server
!
control-plane
!
banner motd ^CUnauthorized access strictly prohibited and prosecuted to
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 32 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
login
!
scheduler allocate 20000 1000
end
R2#
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 33 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
!
interface FastEthernet0/1/2
!
interface FastEthernet0/1/3
!
interface Serial0/0/0
no ip address
shutdown
no fair-queue
clock rate 2000000
!
interface Serial0/0/1
ip address 10.2.2.1 255.255.255.252
!
interface Vlan1
no ip address
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 10.2.2.2
no ip http server
no ip http secure-server
!
control-plane
!
banner motd ^CUnauthorized access strictly prohibited and prosecuted to
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 34 of 35
Lab - Securing Administrative Access Using AAA and RADIUS
R1(config-line)#
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 35 of 35