Cisco CISCO1401 Software Guide - Page 54

Preventing Unauthorized Access to Your Bridge, Protecting Access to Privileged EXEC Commands

Page 54 highlights

Preventing Unauthorized Access to Your Bridge Chapter 5 Administering the Bridge Preventing Unauthorized Access to Your Bridge You can prevent unauthorized users from reconfiguring your bridge and viewing configuration information. Typically, you want network administrators to have access to the bridge while you restrict access to users who connect through a terminal or workstation from within the local network. To prevent unauthorized access to your bridge, you should configure one of these security features: • Username and password pairs, which are locally stored on the bridge. These pairs authenticate each user before that user can access the bridge. You can also assign a specific privilege level (read only or read/write) to each username and password pair. For more information, see the "Configuring Username and Password Pairs" section on page 5-5. The default username is Cisco, and the default password is Cisco. Usernames and passwords are case-sensitive. • Username and password pairs stored centrally in a database on a security server. For more information, see the "Controlling Bridge Access with RADIUS" section on page 5-7. Protecting Access to Privileged EXEC Commands A simple way of providing terminal access control in your network is to use passwords and assign privilege levels. Password protection restricts access to a network or network device. Privilege levels define what commands users can issue after they have logged into a network device. Note For complete syntax and usage information for the commands used in this section, refer to the Cisco IOS Security Command Reference for Release 12.2. This section describes how to control access to the configuration file and privileged EXEC commands. It contains this configuration information: • Default Password and Privilege Level Configuration, page 5-2 • Setting or Changing a Static Enable Password, page 5-3 • Protecting Enable and Enable Secret Passwords with Encryption, page 5-4 • Configuring Username and Password Pairs, page 5-5 • Configuring Multiple Privilege Levels, page 5-6 Default Password and Privilege Level Configuration Table 5-1 shows the default password and privilege level configuration. Table 5-1 Default Password and Privilege Levels Feature Username and password Enable password and privilege level Default Setting Default username is Cisco and the default password is Cisco. Default password is Cisco. The default is level 15 (privileged EXEC level). The password is encrypted in the configuration file. Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide 5-2 OL-4059-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286

5-2
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
OL-4059-01
Chapter 5
Administering the Bridge
Preventing Unauthorized Access to Your Bridge
Preventing Unauthorized Access to Your Bridge
You can prevent unauthorized users from reconfiguring your bridge and viewing configuration
information. Typically, you want network administrators to have access to the bridge while you restrict
access to users who connect through a terminal or workstation from within the local network.
To prevent unauthorized access to your bridge, you should configure one of these security features:
Username and password pairs, which are locally stored on the bridge. These pairs authenticate each
user before that user can access the bridge. You can also assign a specific privilege level (read only
or read/write) to each username and password pair. For more information, see the
“Configuring
Username and Password Pairs” section on page 5-5
. The default username is
Cisco
, and the default
password is
Cisco
. Usernames and passwords are case-sensitive.
Username and password pairs stored centrally in a database on a security server. For more
information, see the
“Controlling Bridge Access with RADIUS” section on page 5-7
.
Protecting Access to Privileged EXEC Commands
A simple way of providing terminal access control in your network is to use passwords and assign
privilege levels. Password protection restricts access to a network or network device. Privilege levels
define what commands users can issue after they have logged into a network device.
Note
For complete syntax and usage information for the commands used in this section, refer to the
Cisco IOS
Security Command Reference for Release 12.2
.
This section describes how to control access to the configuration file and privileged EXEC commands.
It contains this configuration information:
Default Password and Privilege Level Configuration, page 5-2
Setting or Changing a Static Enable Password, page 5-3
Protecting Enable and Enable Secret Passwords with Encryption, page 5-4
Configuring Username and Password Pairs, page 5-5
Configuring Multiple Privilege Levels, page 5-6
Default Password and Privilege Level Configuration
Table 5-1
shows the default password and privilege level configuration.
Table 5-1
Default Password and Privilege Levels
Feature
Default Setting
Username and password
Default username is
Cisco
and the default password is
Cisco.
Enable password and privilege level
Default password is
Cisco
. The default is level 15 (privileged EXEC
level). The password is encrypted in the configuration file.