Open In App

Privileged Modem in Cisco IOS Switch

Last Updated : 13 Oct, 2022
Improve
Improve
Like Article
Like
Save
Share
Report

A group of computers that are connected to each other for the purpose of sharing their resources is called a computer network. The first computer network is ARPANET which stands for Advanced Research Projects Agency Network.

Characteristics of Computer Network:

  • Resource Sharing: It refers to certain participating libraries sharing library resources among themselves based on the principle of cooperation. This applies to sharing documents, manpower, services, space, and equipment.
  • Backup: It Supports, helps, or does anything you have arranged in case of your major plans, equipment, etc.
  • Communication Speed: The rate at which information is sent over a communication channel, adjusted for redundancy.
  • Scalability: Scalability is a measure of a system’s ability to increase or decrease performance and cost in response to changing application and system processing requirements.
  • Reliability: In computer networks, a reliable protocol is a communication protocol that informs the sender of the successful delivery of data to the intended recipient. Reliability is synonymous with security, a term used by the ITU and ATM Forum.
  • Software and Hardware Sharing: A network consists of two or more computers that are connected to share resources (printers, CDs, etc.), exchange files, and enable electronic communication. Networks share hardware, software, and data among authorized users.
  • Security: Network security protects your network and data from breaches, intruders, and other threats. It is a broad and comprehensive term for hardware and software solutions and processes or rules and configurations related to network usage, accessibility, and overall protection against threats.

Privilege Level:

In computing, privilege is defined as the delegation of authority to perform security-related functions on a computer system. Permissions allow users to perform actions with security consequences. Examples of different privileges include creating new users, installing software, and modifying kernel functionality. Cisco switches (and other devices) use privilege levels to provide password security for various levels of switch operation. By default, Cisco IOS software operates in its two modes (privilege levels) of password security. user EXEC (level 1) and privileged EXEC (level 15).

Privileged Mode in Cisco Devices

 

For example:

  • Router> – user exec mode
  • Router# – Privileged exec mode
  • Router (config)# – Global Configuration Mode

Configuration for Privilege Levels:

Cisco switches (and other devices) use privilege levels to provide password security for various levels of switch operation. By default, Cisco IOS software operates in its two modes (privilege levels) of password security. user EXEC (level 1) and privileged EXEC (level 15).

  • User EXEC mode (privilege level 1)
  • Privileged EXEC mode (privilege level 15)

With a privilege level, you can bind a command or multiple commands.

For Example: 

In a firm, there are 2 network engineers, and the organization does not want the same work for both engineers, so with privilege level one engineer namely, ABC is allotted the work to configure AAA, Firewall, and Net Flow. So, whenever the engineer will log in to their profile they can only do the work that is allotted to them. The second engineer is allotted the work of Routing and Interfaces. So, with privilege levels, the work allotted to a particular engineer will be allotted to them only and the other engineer cannot interfere in the other engineer’s work.

Advantages:

  •  Superior performance for querying related data, big or small.
  • It has better problem-solving skills that are both practical and impractical for relational queries.
  • It updates the data in real time and supports queries simultaneously.

Disadvantages:

  • It does not provide the desired flexibility. 
  • Privilege levels cannot specify access control to interfaces, ports, or slots.

Like Article
Suggest improvement
Share your thoughts in the comments

Similar Reads