Send documentation comments to mdsfeedback-doc@cisco.com
41-26
Cisco MDS 9000 Family Fabric Manager Configuration Guide
OL-17256-03, Cisco MDS NX-OS Release 4.x
Chapter 41 Configuring RADIUS and TACACS+
Local AAA Services
Step 4 Click Apply Changes to save the changes.
.
Local AAA Services
The system maintains the username and password locally and stores the password information in
encrypted form. You are authenticated based on the locally stored user information. See the
“Configuring
Roles and Profiles” section on page 39-2.
You can turn off password verification using the none option. If you configure this option, users can log
in without giving a valid password. But the user should at least exist locally on the Cisco MDS 9000
Family switch.
Caution Use this option cautiously. If configured, any user can access the switch at any time.
Refer to the Cisco MDS 9000 Family CLI Configuration Guide to configure this option.
Configuring Cisco Access Control Servers
The Cisco Access Control Server (ACS) uses TACACS+ and RADIUS protocols to provide AAA
services that ensure a secure environment.When using the AAA server, user management is normally
done using Cisco ACS.
Figure 41-10, Figure 41-11, Figure 41-12, and Figure 41-13 display ACS server
user setup configurations for network-admin roles and multiple roles using either RADIUS or
TACACS+ .
Caution Cisco MDS NX-OS does not support all numeric usernames, whether created with RADIUS or
TACACS+, or created locally. Local users with all numeric names cannot be created. If an all numeric
user name exists on an AAA server and is entered during login, the user is not logged in.