0% found this document useful (0 votes)
93 views

Lab -Securing Administrative Access Using AAA and RADIUS

The document outlines the configuration steps for securing administrative access on routers R1, R2, and R3 using AAA and RADIUS. It includes setting basic device settings, configuring static routing, encrypting passwords, and implementing local authentication. Additionally, it details the setup of AAA services for console and Telnet access, as well as centralized authentication using RADIUS.

Uploaded by

souabihamza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views

Lab -Securing Administrative Access Using AAA and RADIUS

The document outlines the configuration steps for securing administrative access on routers R1, R2, and R3 using AAA and RADIUS. It includes setting basic device settings, configuring static routing, encrypting passwords, and implementing local authentication. Additionally, it details the setup of AAA services for console and Telnet access, as well as centralized authentication using RADIUS.

Uploaded by

souabihamza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Lab -Securing Administrative Access Using AAA and RADIUS

Configure Basic Device Settings :

R1

Router>enable
Router#conf t
Router(config)#hostname R1
R1(config)#interface gigabitEthernet 0/1
R1(config-if)#ip address 192.168.1.1 255.255.255.0
R1(config-if)#no shutdown
R1(config)#interface S0/0/0
R1(config-if)#ip address 10.1.1.1 255.255.255.252
R1(config-if)#no shutdown
%LINK-5-CHANGED: Interface Serial0/0/0, changed state to down
R1(config-if)#exit

R2:

Router>enable
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface S0/0/0
Router(config-if)#exit
Router(config)#hostname R2
R2(config)#interface S0/0/0
R2(config-if)#ip address 10.1.1.2 255.255.255.252
R2(config-if)#no shutdown
R2(config-if)#exit

R2(config)#interface S0/0/1
R2(config-if)#ip address 10.2.2.2 255.255.255.252
R2(config-if)#no shutdown

%LINK-5-CHANGED: Interface Serial0/0/1, changed state to down


R2(config-if)#exit

R3:

Router>enable
Router#conf terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R3
R3(config)#interface G0/1
R3(config-if)#ip address 192.168.3.1 255.255.255.0
R3(config-if)#no shutdown
R3#conf t
Enter configuration commands, one per line. End with CNTL/Z.
R3(config)#interface S0/0/1
R3(config-if)#ip address 10.2.2.1 255.255.255.252
R3(config-if)#no shutdown
d.

Configure static routing on the routers:

Teste:
Configure and encrypt passwords on R1 and R3:
a.

b.
Configure the basic console, auxiliary port, and vty lines:
a.

a.

b.

c.
Configure a login warning banner on routers R1 and R3:
R1:
b.c.

d.

R3:
Configure Local Authentication:
Configure the local user database:
a.

Configure local authentication for the console line and login:


R1:
a.
Test the new account by logging in from a Telnet session:
a. Et b. et c.
f.
cisco12345
R3:
Teste:

Configure Local Authentication Using AAA on R3:

Configure the Local User Database Using Cisco IOS.

Configure the local user database:

A.

R3(config)#username Admin01 privilege 15 algorithm-type scrypt secret Admin01pass


Configure AAA Local Authentication Using Cisco IOS.

Enable AAA services:

Implement AAA services for console access using the local database:
Create an AAA authentication profile for Telnet using the local database:

a.

b.
Verify that the system clock and debug time stamps are configured correctly:

a.

b.

Use debug to verify user access:

a.

b.

c.
Configure Centralized Authentication Using AAA and RADIUS

Configure R1 AAA Services and Access the RADIUS Server Using Cisco IOS:

a.

a.

Test the AAA RADIUS Configuration.

You might also like