
i
Contents
Introduction··································································································································································· 1
Prerequisites·································································································································································· 1
Example: Configuring password authentication for console users··········································································· 2
Network requirements ······················································································································································2
Requirements analysis·······················································································································································2
Software version used ······················································································································································2
Configuration procedures ················································································································································2
Verifying the configuration···············································································································································2
Configuration files·····························································································································································3
Example: Configuring local scheme authentication for console users ····································································· 3
Network requirements ······················································································································································3
Requirements analysis·······················································································································································3
Software version used ······················································································································································4
Configuration procedures ················································································································································4
Verifying the configuration···············································································································································4
Configuration files·····························································································································································5
Example: Configuring password authentication for Telnet users·············································································· 5
Network requirements ······················································································································································5
Requirements analysis·······················································································································································5
Software version used ······················································································································································6
Configuration procedures ················································································································································6
Verifying the configuration···············································································································································6
Configuration files·····························································································································································6
Example: Configuring local scheme authentication for Telnet users ········································································ 7
Network requirements ······················································································································································7
Requirements analysis·······················································································································································7
Software version used ······················································································································································8
Configuration procedures ················································································································································8
Verifying the configuration···············································································································································8
Configuration files·····························································································································································9
Related documentation ················································································································································ 9