lab 11 3 3

background image

1 - 3

CCNP 2: Remote Access v 3.0 - Lab 11.3.3

Copyright

 2003, Cisco Systems, Inc.

Lab 11.3.3 AAA TACACS+ Server

Objective

In this lab, the student will configure AAA to use a TACACS+ server.

Scenario

The International Travel Agency (ITA) has set up and configured a Cisco Secure TACACS+ server.
ITA needs to place the routers under the control of the TACACS+ server. The host name and IP
address of the router may need to be modified.

Step 1

The host shown in the diagram can be running Cisco Secure software to provide TACACS+
services. Configure SanJose1 using the following commands as an example:


SanJose1(config)#line con 0
SanJose1(config-line)#exec-timeout 0 0
SanJose1(config-line)#password cisco
SanJose1(config-line)#logging synchronous

SanJose1(config-line)#enable password cisco
SanJose1(config-line)#line vty 0 4
SanJose1(config-line)#login
SanJose1(config-line)#password cisco
SanJose1(config-line)#exec-timeout 0 0
SanJose1(config-line)#line aux 0
SanJose1(config-line)#exec-timeout 0 0
SanJose1(config-line)#login
SanJose1(config-line)#password cisco

background image

2 - 3

CCNP 2: Remote Access v 3.0 - Lab 11.3.3

Copyright

 2003, Cisco Systems, Inc.

Confirm that SanJose1 can ping the TACACS+ server.

The instructor will provide the IP address of the TACACS+ server and an encryption key. This key is
required to establish a connection between the router and the server. The instructor will also provide
a username/password combination, which is already entered in the Cisco Secure database.

Step 2

On SanJose1, enter the following configuration lines:

Note: Ask the instructor to obtain the IP address and server key for Taccacs+ or Radius server.


SanJose1(config)#aaa new-model
SanJose1(config)#username admin password aaacisco
SanJose1(config)#aaa authentication login default group tacacs+ local enable
SanJose1(config)#tacacs-server host xxx.xxx.xxx.xxx
SanJose1(config)#tacacs-server key xxxxx

Exit from SanJose1 and then try to log in with the username of nobody and the password nothing.
This should fail if there is a working connection to the TACACS+ server. If the login does not fail,
reload the routers and try again.

After the login using nobody fails, log in as the user assigned by the instructor. This login should
work, indicating that SanJose1 has successfully queried the TACACS+ server, and authenticated
using the username and password.

1. If none of the valid username/password combinations stored on the TACACS+ server were

known, how can access be gained to the router?

__________________________________________________________________________

Simulate a network outage by disconnecting the cable from SanJose1’s Fast Ethernet interface.
Attempt to log in to the router a second time through the console port.

2. Because the attempt to query the TACACS+ server by the router will fail, which authentication

method should be used? Why?

__________________________________________________________________________

When attempting to log in, SanJose1 will try to query the TACACS+ server first. Because the
network connection to the server is unavailable, this query returns an error. The second method of
authentication defined by the aaa authentication command specifies that the local database
should be consulted next. Therefore, authentication as admin using the password aaacisco should
now be available.

Once authenticated, enter the following command on SanJose1:


SanJose1(config)#no username admin password aaacisco

3. If no TCP/IP connection to the TACACS+ server is available, and no local username/password

database exists on the router, which authentication method will be used? Why?

__________________________________________________________________________

Exit the console session on SanJose1 and log back in again. Eventually, there will be a prompt for a
username. Enter the username admin. When prompted for a password, enter the password of
aaacisco. This authentication attempt will return an error, because there is no local
username/password database. Remember, an error is not the same as an authentication failure. A
failure occurs when the authentication method is operational, but the username/password
combination is found to be invalid.

background image

3 - 3

CCNP 2: Remote Access v 3.0 - Lab 11.3.3

Copyright

 2003, Cisco Systems, Inc.

There is a third method of authentication defined by the aaa authentication command. This
specifies that the enable password, or secret, if it exists, should be used in the event the first two
authentication methods return an error.

The router can be accessed by using the enable password, cisco.


Wyszukiwarka

Podobne podstrony:
IE RS lab 11 solutions
lab 11 4 5
Lab 11
lab 11 7 2
lab 11 2 3a
CCNA1 lab 11 2 4 pl
CCNA2 lab 11 2 3b pl
CCNA2 lab 11 2 2b pl
lab 11 1 5 1
Lab 11 - Oznaczenie modułu jednostronnego ściskania skał, skaly11, WYDZIAŁ GÓRNICZY
lab 11 2 3c
Lab 11 - Oznaczenie modułu jednostronnego ściskania skał, jed.ścisk.11, Nr ?wiczenia_
Lab.11, lab2 pierwszastrona, I TD
CCNA2 lab 11 2 3c pl
lab 11 cps szybki splot
lab 11 3 2
IE RS lab 11 diagram

więcej podobnych podstron