i
Contents
Introduction ··································································································································································· 1
Prerequisites ·································································································································································· 1
Example: Configuring password authentication for console users ··········································································· 2
Network requirements ······················································································································································ 2
Requirements analysis ······················································································································································· 2
Software version used ······················································································································································ 2
Configuration procedures ················································································································································ 2
Verifying the configuration ··············································································································································· 2
Configuration files ····························································································································································· 3
Example: Configuring local scheme authentication for console users ····································································· 3
Network requirements ······················································································································································ 3
Requirements analysis ······················································································································································· 3
Software version used ······················································································································································ 4
Configuration procedures ················································································································································ 4
Verifying the configuration ··············································································································································· 4
Configuration files ····························································································································································· 5
Example: Configuring password authentication for Telnet users ·············································································· 5
Network requirements ······················································································································································ 5
Requirements analysis ······················································································································································· 5
Software version used ······················································································································································ 6
Configuration procedures ················································································································································ 6
Verifying the configuration ··············································································································································· 6
Configuration files ····························································································································································· 6
Example: Configuring local scheme authentication for Telnet users ········································································ 7
Network requirements ······················································································································································ 7
Requirements analysis ······················································································································································· 7
Software version used ······················································································································································ 8
Configuration procedures ················································································································································ 8
Verifying the configuration ··············································································································································· 8
Configuration files ····························································································································································· 9
Related documentation ················································································································································ 9