How to Configure Privilege Levels for Users on Cisco Router

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

How to Configure Privilege Levels for Users on Cisco Router


How to Configure Privilege Levels for Users on Cisco Router

Posted: 04 Feb 2010 07:41 PM PST


As my previous post about Disabling Password Recovery on Cisco Router. Today, with this post, I'd love to show you the way to Configure Privilege Levels for Users on Cisco Router.

Commands entered into the IOS can be associated with each privilege level. You
configure the privilege level for a command using the global configuration command privilege
level . The exact syntax of this command is as follows:
privilege mode level level command | reset command

The Image.1 below displays three users, Googla, Visa, and Yaha, connected to a local segment. Googla is the network engineer; he has full control over Cisco Router. Visa and Yaha are system administrators; they need only limited functionality on Cisco Router. Here is an example of the configuration that meets this requirement:

enable secret Googla
enable secret level 3 Visa
enable secret level 2 Yaha
privilege exec level 3 debug
privilege exec level 3 show running−config
privilege exec level 3 telnet
privilege exec level 2 ping
privilege exec level 2 sh int ser0
privilege exec level 2 sh ip route
line con 0
login
Figure
Image.1: Using privilege levels to create administrative levels.

This configuration provides Googla with the default full administrative rights to the router. Visa is given access to all features that are allowed with administrative level 3 and can perform the commands that are listed with a privilege level of 3. Yaha is assigned a privilege level of 2 and is given access to all features and allowed to perform the commands listed with a privilege level of 2.

The key is that each user must use the enable command from the user mode prompt and log in with the password assigned for that level. An example is provided here:

CiscoRouter>
CiscoRouter>enable 3
Password: Visa
CiscoRouter#



Free PDF: Troubleshooting Cisco Networks - Free ebook manual …

Posted: 04 Feb 2010 04:33 PM PST


Download free Cisco System- Hardware pdf ebook: Troubleshooting Cisco Networks at Pdfee.com.

See original here:
Free PDF: Troubleshooting Cisco Networks - Free ebook manual …

Cisco Can't Save The Market | Eric Savitz | Voices | AllThingsD

Posted: 04 Feb 2010 11:17 AM PST


Cisco Systems after the close yesterday posted stunningly good results for its January quarter, and provided April quarter guidance that was way above Street expectations. CEO John Chambers could not have sounded more optimistic about …

Read more: 
Cisco Can't Save The Market | Eric Savitz | Voices | AllThingsD

Cisco Adding a Few Thousand More Hires to “Human Network” | John …

Posted: 04 Feb 2010 09:30 AM PST


Cisco Systems, which on Wednesday reported a dramatic year-over-year jump in sales and profit, is hiring up. The company increased its global work force by about 2100 in its second quarter

Read more: 
Cisco Adding a Few Thousand More Hires to "Human Network" | John …

Cisco Can't Save The Market - Tech Trader Daily - Barrons.com

Posted: 04 Feb 2010 09:13 AM PST


If the stock market is not going to reverse on these results tomorrow, then we do have a problem."-Tal Liani, analyst at Bank of America/Merrill Lynch, speaking on Thursday's Cisco conference call.

See original here:
Cisco Can't Save The Market - Tech Trader Daily - Barrons.com

Cisco results signal start of capex cycle - FP Trading Desk

Posted: 04 Feb 2010 05:56 AM PST


"Headcount growth is certainly a positive indication that Cisco expects a renewed spending cycle to be more than just a short-term inventory replenishment," said National Bank Financial analyst Kris Thompson. …

Originally posted here:
Cisco results signal start of capex cycle - FP Trading Desk

Cisco reports higher profit, topping targets - MarketWatch

Posted: 03 Feb 2010 08:51 PM PST


The networking giant reports a jump in profit that beats Wall Street's estimates, with CEO John Chambers saying the company is "entering the second phase of the economic recovery."

Read the rest here:
Cisco reports higher profit, topping targets - MarketWatch

Cisco Voice App Coming For iPhone - VoIP Watch

Posted: 03 Feb 2010 06:34 PM PST


Me Too, Me Also….sorry Cisco , you're not me different. Cisco should just buy Skype or Truphone and stop being so far behind the curve.

More here:
Cisco Voice App Coming For iPhone - VoIP Watch

90% of UK's home Wi-Fi networks are secure

Posted: 04 Feb 2010 08:00 AM PST


More than 90 percent of the UK's home Wi-fi networks are secure, says Cisco.

Fake Firefox update spreads unwanted app

Posted: 04 Feb 2010 08:00 AM PST


The successor program to the notorious Zango spyware Toolbar is being used to target users of Mozilla's Firefox with fake browser updates, a security company has alleged.

Too many people re-use logins, study finds

Posted: 04 Feb 2010 08:00 AM PST


An analysis of real-world online behaviour has warned of the unsettling phenomenon that led to this week's high-profile Twitter login scare. Far too many people re-use the same logins for more than one site.

E-mail scam steals €3 million in carbon credits

Posted: 04 Feb 2010 08:00 AM PST


A clever phishing scheme launched last week may have stolen more than €3 million (US$4.1 million) worth of carbon emission permits from companies.

Google Working With National Security Agency, Report Says

Posted: 04 Feb 2010 08:00 AM PST


In a partnership that may inspire some to put their tinfoil hats on, Google has reportedly turned to the National Security Agency for help in improving the company's security infrastructure. The new partnership is still being finalized, but will be aimed at preventing future attacks like the one that hit Google in December, according to The Washington Post. This is not the first time the NSA has been tapped to help a U.S. corporation with cyber security, but the purported partnership would certainly be unique since Google's servers house such a vast collection of user data including search histories, e-mail, and personal documents.

Researcher reveals how IE flaw can turn your PC into a public file server

Posted: 04 Feb 2010 08:00 AM PST


In a live demonstration Wednesday at the Black Hat DC conference, a security consultant showed how it's possible to exploit a flaw in the Microsoft Internet Explorer browser to remotely read files on the victim's local drive, prompting a security advisory from Microsoft.

John Chambers: Recovery continues, Cisco to hire in the U.S. - Big …

Posted: 04 Feb 2010 05:00 AM PST


John Chambers is often in a sunny mood, but on Wednesday he had some obvious reasons: Cisco posted financial results that blew past Wall Street's expectations, signaling that despite the rough economy businesses are spending on …

Excerpt from: 
John Chambers: Recovery continues, Cisco to hire in the U.S. - Big …

Blogging Innovation: Cisco Announces $250000 iPrize Competition v2 …

Posted: 03 Feb 2010 11:30 PM PST


Cisco has announced its second Cisco iPrize Competition. At stake is a $250000 Grand Prize that will be awarded after eight selected finalists have the opportunity to present their innovation idea to Cisco's selection commitee using …

Read the original here: 
Blogging Innovation: Cisco Announces $250000 iPrize Competition v2 …

SiliconANGLE — Blog — Massive Retrenchment and Salesmanship Give …

Posted: 03 Feb 2010 09:06 PM PST


After what some in Silicon Valley have been calling a " Cisco Lock Down" - term used to describe the rabid focus to reduce expenses, travel restrictions to visit customers, systematic layoff of employees, and countless of restructuring, …

Originally posted here: 
SiliconANGLE — Blog — Massive Retrenchment and Salesmanship Give …

Cisco Systems sees 'second phase' of economic recovery as sales …

Posted: 03 Feb 2010 03:00 PM PST


Cisco's worldwide sales of routers, switches and other networking equipment rose to $9.82 billion in the quarter ended Jan. 23, up 8% from a year earlier and well ahead of analysts' mean estimate of $9.4 billion, according to Bloomberg …

Original post:
Cisco Systems sees 'second phase' of economic recovery as sales …

Prevent Spoofing Attacks on Cisco ASA using RPF

Posted: 04 Feb 2010 04:16 AM PST


A common attack found on TCP/IP networks is IP spoofing. This is usually used for Denial-of-Service, Identity hiding, or even to bypass firewalls or Access-Lists security rules. The spoofing attack works like that:

  • A malicious attacker sends packets towards a target host.
  • The attacker disguises itself by inserting a fake source IP into the packet. This fake source IP address in the packet either does not exist at all or it might be a legitimate IP address of some other host located on some other network.
  • The reply traffic from the target will never reach the attacker because the attacker's source address is bogus. Therefore the identity of the attacker remains unknown.
  • This can cause resource-exhaustion on the target host because it will create several "incomplete" TCP connections in its memory.

A Cisco ASA Firewall can identify a spoofed packet by using Reverse Path Forwarding (RPF). RPF can be enabled on a per interface basis. As soon as RPF is enabled on a specific interface, the ASA firewall will examine the source IP address (in addition to the destination address) of each packet arriving at this interface. Normally, any Layer 3 network device examines only the destination address of packets in order to know how to route the packet. By examining also the source IP address of the packet, the firewall can verify if the packet is spoofed or not. The firewall will try to find the reverse route (the path back towards the source) in its routing table. If a reverse route is not found on the interface where the packet arrived, it means that the packet is spoofed and will be dropped immediately.

Lets see the diagram below to clarify the concept of Reverse Path Forwarding:

From the diagram above, an attacker tries to spoof the inside network 192.168.1.0 by using a fake source IP in the packet (fake source IP 192.168.1.1). It sends the packet towards its target host which is 192.168.1.10 (destination address in packet).

On the ASA we have configured RPF on the outside interface as following:

Ciscoasa(config)# ip verify reverse-path interface outside

The ASA will examine the source address of the spoofed inbound packet and will see that source IP 192.168.1.1 belongs to its internal network. A packet with such a source IP should never arrive from the outside interface. Therefore the packet will be dropped. The ASA performs the RPF check by using its routing table. The routing table shows that network 192.168.1.0/24 is towards the inside interface of ASA (assume that we have already configured a static route for this internal network).

Related posts:

  1. Packet capture and sniffing using the Cisco ASA Firewall
  2. How Hosts Use Subnet Masks

Informal learning from the horse’s mouth

Posted: 03 Feb 2010 09:34 PM PST


Every morning, my email is littered with very basic questions about informal learning. I've been ranting about informal and computer-supported learning in organizations for twelve years now. I'm the Johnny Appleseed of networked, social learning You can find it in blogs , presentations, I make 95% of my work available on the net at no charge.

Brought to you by: Informal Learning Flow

0 comments:

Post a Comment