Cisco Systems 3560 Manual De Usuario

Descargar
Página de 1288
 
9-32
Catalyst 3560 Switch Software Configuration Guide
OL-8553-06
Chapter 9      Configuring Switch-Based Authentication
Controlling Switch Access with Kerberos
Displaying the RADIUS Configuration
To display the RADIUS configuration, use the show running-config privileged EXEC command.
Controlling Switch Access with Kerberos
This section describes how to enable and configure the Kerberos security system, which authenticates 
requests for network resources by using a trusted third party. To use this feature, the cryptographic (that 
is, supports encryption) versions of the switch software must be installed on your switch. 
You must obtain authorization to use this feature and to download the cryptographic software files from 
Cisco.com. For more information, see the release notes for this release.
These sections contain this information:
  •
  •
  •
For Kerberos configuration examples, see the “Kerberos Configuration Examples” section in the 
“Security Server Protocols” chapter of the Cisco IOS Security Configuration Guide, Release 12.2, at this 
URL:
For complete syntax and usage information for the commands used in this section, see the “Kerberos 
Commands” section in the “Security Server Protocols” chapter of the Cisco IOS Security Command 
Reference, Release 12.2, 
at this URL:
Note
In the Kerberos configuration examples and in the Cisco IOS Security Command Reference, 
Release 12.2, 
the trusted third party can be a Catalyst 3560 switch that supports Kerberos, that is 
configured as a network security server, and that can authenticate users by using the Kerberos protocol.
Understanding Kerberos
Kerberos is a secret-key network authentication protocol, which was developed at the Massachusetts 
Institute of Technology (MIT). It uses the Data Encryption Standard (DES) cryptographic algorithm for 
encryption and authentication and authenticates requests for network resources. Kerberos uses the 
concept of a trusted third party to perform secure verification of users and services. This trusted third 
party is called the key distribution center (KDC).
Kerberos verifies that users are who they claim to be and the network services that they use are what the 
services claim to be. To do this, a KDC or trusted Kerberos server issues tickets to users. These tickets, 
which have a limited lifespan, are stored in user credential caches. The Kerberos server uses the tickets 
instead of usernames and passwords to authenticate users and network services.