Configuring Authentication
To remotely copy SRVTAB files to the switch from the KDC, perform this task in privileged mode:
Task
Step 1
Retrieve a specified SRVTAB file from the KDC. set kerberos srvtab remote {hostname |
Step 2
Optionally, you can enter the SRVTAB directly
into the switch.
This example shows how to retrieve a SRVTAB file from the KDC, enter a SRVTAB directly into the
switch, and verify the configuration:
Console> (enable) set kerberos srvtab remote 187.20.32.10 /users/jdoe/krb5/ninerskeytab
Console> (enable)
Console> (enable) set kerberos srvtab entry host/niners.cisco.com@CISCO.COM 0 932423923 1
1 8 03;;5>00>50;0=0=0
Kerberos SRVTAB entry set to
Principal:host/niners.cisco.com@CISCO.COM
Principal Type:0
Timestamp:932423923
Key version number:1
Key type:1
Key length:8
Encrypted key tab:03;;5>00>50;0=0=0
Console> (enable) show kerberos
Kerberos Local Realm:CISCO.COM
Kerberos server entries:
Realm:CISCO.COM,
Realm:CISCO.COM,
Kerberos Domain<->Realm entries:
Domain:cisco.com,
Kerberos Clients NOT Mandatory
Kerberos Credentials Forwarding Enabled
Kerberos Pre Authentication Method set to None
Kerberos config key:
Kerberos SRVTAB Entries
Srvtab Entry 1:host/niners.cisco.com@CISCO.COM 0 932423923 1 1 8 03;;5>00>50;0=0=0
Srvtab Entry 2:host/niners.cisco.edu@CISCO.EDU 0 933974942 1 1 8 00?58:127:223=:;9
Console> (enable)
Deleting an SRVTAB Entry
To delete the SRVTAB entry, perform this task in privileged mode:
Task
Delete the SRVTAB entry for a particular
Kerberos principal.
Software Configuration Guide—Catalyst 4000 Family, Catalyst 2948G, Catalyst 2980G, Releases 6.3 and 6.4
27-34
Server:187.0.2.1,
Port:750
Server:187.20.2.1,
Port:750
Realm:CISCO.COM
Chapter 27
Configuring Switch Access Using AAA
Command
ip-address} filename
set kerberos srvtab entry kerberos-principal
principal-type timestamp key-version number
key-type key-length encrypted-keytab
Command
clear kerberos srvtab entry kerberos-principal
principal-type
78-12647-02