Specifications
CHAPTER
6-1
Cisco Internet Streamer CDS 2.0-2.3 Software Configuration Guide
OL-13493-04
6
Configuring the System
This chapter provides information on configuring the system parameters of the CDS. This chapter has
the following major topics:
• Configuring AAA, page 6-1
• Changing a Password, page 6-5
• Configuring System Settings, page 6-6
Configuring AAA
Authentication determines who the user is and whether that user should be allowed access to the network
or a particular device. It allows network administrators to bar intruders from their networks. It may use
a simple database of users and passwords. It can also use one-time passwords.
Authorization determines what the user is allowed to do. It allows network managers to limit which
network services are available to different users.
Accounting tracks what users did and when they did it. It can be used for an audit trail or for billing for
connection time or resources used (bytes transferred).
Collectively, authentication, authorization, and accounting are sometimes referred to as AAA. Central
management of AAA means the information is in a single, centralized, secure database, which is much
easier to administer than information distributed across numerous devices.
In the CDS network, login authentication and authorization are used to control user access and
configuration rights to the CDSM, SEs, and SRs. There are two levels of login authentication and
authorization:
• Device
• CDSM
In a CDS network, user accounts can be created for access to the CDSM and, independently, for access
to the SEs and SRs that are registered to the CDSM.
This section covers login authentication and authorization for the CDSM. For information about device
login authentication and authorization, see the “Login Access Control” section on page 4-49 and the
“Authentication” section on page 4-53.
Login authentication is the process by which CDSM verifies whether the person who is attempting to
log in has a valid username and password. The person logging in must have a user account registered
with the device. User account information serves to authorize the user for login and configuration