<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic LDAP and SSH/Console access in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ldap-and-ssh-console-access/m-p/4048613#M559005</link>
    <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm looking for example to configure LDAP authentication for SSH/Console connection on swithes for the admin group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I read some topics where some say it's not possible and other it's possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have the following set of devices:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cat 3750&lt;/P&gt;&lt;P&gt;Cat 3750X&lt;/P&gt;&lt;P&gt;Cat 9200/9300&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is that possible for such devices? Can you give examples ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 19 Mar 2020 12:02:09 GMT</pubDate>
    <dc:creator>hjacquemin</dc:creator>
    <dc:date>2020-03-19T12:02:09Z</dc:date>
    <item>
      <title>LDAP and SSH/Console access</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-and-ssh-console-access/m-p/4048613#M559005</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm looking for example to configure LDAP authentication for SSH/Console connection on swithes for the admin group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I read some topics where some say it's not possible and other it's possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have the following set of devices:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cat 3750&lt;/P&gt;&lt;P&gt;Cat 3750X&lt;/P&gt;&lt;P&gt;Cat 9200/9300&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is that possible for such devices? Can you give examples ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2020 12:02:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-and-ssh-console-access/m-p/4048613#M559005</guid>
      <dc:creator>hjacquemin</dc:creator>
      <dc:date>2020-03-19T12:02:09Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP and SSH/Console access</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-and-ssh-console-access/m-p/4048623#M559007</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;Take a look at freeRADIUS to handle the AAA requests:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://wiki.freeradius.org/vendor/Cisco" target="_blank"&gt;https://wiki.freeradius.org/vendor/Cisco&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;...then configure LDAP as the identity datastore to verify users against:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://wiki.freeradius.org/modules/Rlm_ldap" target="_blank"&gt;https://wiki.freeradius.org/modules/Rlm_ldap&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2020 12:32:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-and-ssh-console-access/m-p/4048623#M559007</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2020-03-19T12:32:05Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP and SSH/Console access</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-and-ssh-console-access/m-p/4048791#M559014</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Most Cisco switches, especially access/distribution level, never had support for LDAP, especially LDAP being used for login access to the router. Your best bet is to use TACACS+ or RADIUS, there are free versions for these, and you can integrate RADIUS/TACACS+ with LDAP. Using TACACS+ vs RADIUS for admin access, it's a matter of if you want command authorization and command accounting or not, as these two features are only supported via TACACS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A title="&amp;nbsp;FREE RADIUS" href="https://freeradius.org" target="_self"&gt;&amp;nbsp;FREE RADIUS&lt;/A&gt;&amp;nbsp;and &lt;A title="FREE TACACS" href="https://tacacs.net" target="_self"&gt;FREE TACACS&amp;nbsp;&lt;/A&gt;that can integrate with LDAP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2020 16:21:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-and-ssh-console-access/m-p/4048791#M559014</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-19T16:21:12Z</dc:date>
    </item>
  </channel>
</rss>

