cc/td/doc/product/wanbu/mgx8260/cmgm
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Security Management

Security Management

Service providers may be obligated under law to protect sensitive information contained within management systems. Cisco MGM and Cisco WebViewer enforce security with user names and passwords. Both applications manage user accounts individually and in groups. Access groups simplify the process of assigning privileges to individual users, because they define a set of privileges for each type of user. This chapter explains security in the following topics:

Cisco EMF User Accounts

Cisco EMF enforces security with the following types of accounts.


Table 4-1: Cisco EMF Accounts
Access Level Account Type Number of Users Access Type Command Groups

1

Administrator

1

Read/Write

All categories

2

User defined

As many as needed

Read/Write

User can only invoke the categories of service defined by the access spec of its user group

Cisco EMF user accounts can be grouped by an administrator. These user groups can be used to model user roles; for example, administrators typically set up a user group for administrative users and system operators. These features are available from the Access application, launched from the Cisco EMF Launchpad (see Figure 4-1).


Figure 4-1: Cisco EMF Launchpad


To add, change, or delete user accounts or groups, refer to the Cisco Element Management Framework User Guide.

Changing Passwords

All users can change your own password; administrators can change any password.

To make administrative password changes, follow these steps:


Step 1   Open the Access Manager window and select the name of the user whose password is to be changed.

Step 2   From the Edit menu, select Change Password. For instance, to change the Admin Password, select Change Admin Password.

The Change User Password window opens.

Step 3   Enter the existing password in the Old Password box.

Step 4   Enter a new password in the New Password box, and re-enter the new password to verify your choice.

Step 5   Click Apply.

Step 6   If an invalid password is entered or the new password is not verified correctly, an error message is displayed. Click OK to try again.


Cisco MGX 8260 Media Gateway User Accounts

The Cisco MGX 8260 Media Gateway enforces security with user accounts and access levels. Users must log onto the Cisco MGX 8260 Media Gateway before performing any task, and authenticated users can perform only those tasks permitted by their access level. The Cisco MGX 8260 Media Gateway supports up to 20 user accounts, each with access privileges ranging from full control to guest.


Table 4-2: User Accounts and Access Privileges
Access
Level
Account type Privileges

1

SuperUser

Access all features

2

Administrator

Configure and view all features except user profiles and community strings

3

Provisioning

Configure and view system, port, lines, end points, and connections

4

Maintenance

Access selected level 3 commands

5

Operator

View system, port, lines, end points, and connections

6

Guest

View system, common lines and ports

A new system has a default SuperUser account. To prohibit unauthorized access to the equipment, replace the default account with a unique one and create new accounts for other personnel.

Setting Up Accounts

You control access by configuring accounts and monitoring usage. The following information pertains to access control:

You manage user accounts from the Cisco WebViewer user profile screen (see Table 4-2).


Figure 4-2: User Profile Screen


The following table summarizes the Cisco WebViewer support for system parameter configuration.


Table 4-3: System Configuration Map
Configuration Task Navigation Tree Selection Screen Screen Link

User account management

Node>User Profile

User Profile

+ to add
i to modify
- to delete

Change password

Node>User Profile>Change Password

New Password Setting

none

View active logins

Node>User Profile>Login Session

User Session

none

Cisco MGM Community String Configuration

When Cisco MGM communicates with Cisco MGX 8260 Media Gateways, security is enforced with password-like community strings. SNMP communities group workstations and servers (or gateways) that can manage the Cisco MGX 8260 Media Gateway according to their access privileges.

Cisco MGM uses the default public community string to read Cisco MGX 8260 Media Gateway information during automatic discovery and subchassis synchronization processes. For Cisco MGM to configure Cisco MGX 8260 Media Gateways, both must agree on a community string. Community string configuration is a multistep process, starting with each Cisco MGX 8260 Media Gateway and ending with the Cisco MGM that manages them.

Initializing Cisco MGX 8260 Community Strings

You can configure up to 15 community strings for the Cisco MGX 8260 Media Gateway. Community strings define the IP address, string, and privilege.

You configure community strings from the Cisco WebViewer community string screen (see Table 4-3).


Figure 4-3: Community String Screen


The following table summarizes the Cisco WebViewer support for community string configuration.


Table 4-4: MGX 8260 Community String Configuration Map
Configuration Task Navigation Tree Selection Screen Screen Link

Configure community strings

Node>SNMP>Community String

Community string

+ to add
- to delete

Register traps

Node>SNMP>Trap Registration

Trap registration

+ to add
i to change
- to delete

Initializing Cisco MGM Community Strings

When configuring community strings for Cisco MGM, consider the following points:

To configure Cisco MGM community strings, follow these steps:


Step 1   Log onto Cisco MGM.

Step 2   On the Cisco EMF Launchpad, click Viewer. The Cisco EMF MapViewer opens.

Step 3   Expand the object tree and right-click on the desired site or object; then click Open SNMP Community String Configuration Dialog.

The SNMP Community String Config dialog box opens (see Figure 4-4).


Figure 4-4: SNMP Community String Dialog Box



Note   For security reasons, the form does not display the current community string values.

Step 4   Select one or more IP addresses from the list, using the Shift key to select multiple addresses.

Step 5   Type a read-only community string in the Read Only Community String field.

Step 6   Type a read-write community string in the Read Write Community String field.

Step 7   Click Modify Community Strings.


Note   Cisco EMF 3.1 scrambles the community strings, so you can not view them later.

A confirmation screen opens that reports the successful and unsuccessful configuration attempts (see Figure 4-5).


Figure 4-5: Action Report Dialog Box


Step 8   Click Close.



hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Jul 18 00:52:14 PDT 2002
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.