Preparing Cisco devices
Safeguard for Privileged Passwords supports both Cisco Private Internet eXchange (PIX) firewall security appliances and PIX Internetwork Operating System (IOS) routers and switches. Cisco PIX and Cisco IOS use the SSH protocol to connect to the Safeguard for Privileged Passwords Appliance. Safeguard for Privileged Passwords supports both SSH version 1 and version 2.
To prepare a Cicso device for Safeguard for Privileged Passwords
- Create a service account on the asset and assign it a password.
-
Enable and configure the SSH server to allow the service account to log in remotely.
-
Configure the Privilege Level Password (that is, the system enable password). This password is required when adding the asset to Safeguard for Privileged Passwords.
Note: Safeguard for Privileged Passwords manages accounts found in the startup configuration file, not in the running configuration file.
- Add the Cisco device to Safeguard for Privileged Passwords using password authentication.
Preparing Dell iDRAC devices
Safeguard for Privileged Passwords supports the Dell Remote Access Controller that is integrated with Dell PowerEdge servers. Safeguard for Privileged Passwords uses the SSH protocol to connect to iDRAC devices.
To prepare an iDRAC device for Safeguard for Privileged Passwords
-
Use iDRAC to create a service account with administrator privileges and assign it a password.
The service account must have login privileges and must be able to configure users.
- Verify that SSH is enabled in the iDRAC Network settings.
- In Safeguard for Privileged Passwords, create the asset and accounts for the iDRAC device using password authentication.
Preparing VMware ESXi hosts
Safeguard for Privileged Passwords supports VMware ESXi hosts.
Important:Safeguard for Privileged Passwords can only manage local users on a VMware host.
To prepare a VMware ESXi host for Safeguard for Privileged Passwords
-
Use an existing account or create a new account as the service account on the asset and assign it a password.
The default administrator account is suitable.
- Grant the service account the privileges required to set user passwords using the web management API.
- When adding a VMware ESXi host to Safeguard for Privileged Passwords:
- Specify the network address.
- Specify port 443 as the HTTPS port.
Preparing Fortinet FortiOS devices
Safeguard for Privileged Passwords supports Fortinet Internet appliances. Safeguard for Privileged Passwords uses the SSH protocol to connect to Fortinet devices.
To prepare a Fortinet FortiOS device for Safeguard for Privileged Passwords
- Create the service account as a local user on the managed system and assign it a password.
-
Add the service account to the Fortinet Administrators group. This allows the service account to access the device with SSH to manage users.
Important:Safeguard for Privileged Passwords can only manage passwords for users that are members of the Fortinet Administrators group.
- Enable and configure the SSH server to allow the service account to log in remotely.
- Add the Fortinet device to Safeguard for Privileged Passwords using password authentication.