Lab -Securing Administrative Access Using AAA and RADIUS
Lab -Securing Administrative Access Using AAA and RADIUS
R1
Router>enable
Router#conf t
Router(config)#hostname R1
R1(config)#interface gigabitEthernet 0/1
R1(config-if)#ip address 192.168.1.1 255.255.255.0
R1(config-if)#no shutdown
R1(config)#interface S0/0/0
R1(config-if)#ip address 10.1.1.1 255.255.255.252
R1(config-if)#no shutdown
%LINK-5-CHANGED: Interface Serial0/0/0, changed state to down
R1(config-if)#exit
R2:
Router>enable
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface S0/0/0
Router(config-if)#exit
Router(config)#hostname R2
R2(config)#interface S0/0/0
R2(config-if)#ip address 10.1.1.2 255.255.255.252
R2(config-if)#no shutdown
R2(config-if)#exit
R2(config)#interface S0/0/1
R2(config-if)#ip address 10.2.2.2 255.255.255.252
R2(config-if)#no shutdown
R3:
Router>enable
Router#conf terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R3
R3(config)#interface G0/1
R3(config-if)#ip address 192.168.3.1 255.255.255.0
R3(config-if)#no shutdown
R3#conf t
Enter configuration commands, one per line. End with CNTL/Z.
R3(config)#interface S0/0/1
R3(config-if)#ip address 10.2.2.1 255.255.255.252
R3(config-if)#no shutdown
d.
Teste:
Configure and encrypt passwords on R1 and R3:
a.
b.
Configure the basic console, auxiliary port, and vty lines:
a.
a.
b.
c.
Configure a login warning banner on routers R1 and R3:
R1:
b.c.
d.
R3:
Configure Local Authentication:
Configure the local user database:
a.
A.
Implement AAA services for console access using the local database:
Create an AAA authentication profile for Telnet using the local database:
a.
b.
Verify that the system clock and debug time stamps are configured correctly:
a.
b.
a.
b.
c.
Configure Centralized Authentication Using AAA and RADIUS
Configure R1 AAA Services and Access the RADIUS Server Using Cisco IOS:
a.
a.