Technical data

Step 2—Configuring Local AAA Security
Dial Solutions Quick Configuration Guide
2-6
Enter the show running command:
hq-sanjose# show running
Building configuration...
Current configuration:
!
version 12.0
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname hq-sanjose
!
enable secret 5 $1$.voA$9/8.Zoil3jeWJMP6hEE6U0
!
----- snip ----
Tips
If you have trouble:
Make sure Caps Lock is off.
Make sure you entered the correct passwords. Passwords are case sensitive.
Password protection is very important. Cisco highly recommends that you use the
show tech-support command to report system configuration information to Cisco TAC:
hq-sanjose# show tech-support ?
ipmulticast IP multicast related information
page Page through output
password Include passwords
rsvp IP RSVP related information
<cr>
Step 2—Configuring Local AAA Security
The Cisco IOS security model to use on all Cisco devices is authentication, authorization, and
accounting (AAA). AAA provides the primary framework through which you set up access control
on the access server.
Authentication—Who are you?
Authorization—What can you do?
Accounting—What did you do?
In this case study, the same authentication method is used on all interfaces. AAA is set up to use the
local database configured on the router. This local database is created with the username
configuration commands.
Note After you finish setting up basic security, you can enhance the security solution by extending
it to an external TACACS+ or RADIUS server. This case study describes local AAA security only.