PurposeCommand or Action
(Optional) Associates a particular TACACS+ server with the
defined server group. Repeat this step for each TACACS+ server
in the AAA server group.
server ip-address
Example:
Switch(config)# server 10.1.2.3
Step 6
Each server in the group must be previously defined in Step 3.
Returns to privileged EXEC mode.end
Example:
Switch(config)# end
Step 7
Verifies your entries.show running-config
Example:
Switch# show running-config
Step 8
(Optional) Saves your entries in the configuration file.copy running-config startup-config
Example:
Switch# copy running-config startup-config
Step 9
Related Topics
TACACS+ Configuration Options, on page 44
Configuring TACACS+ Login Authentication
Follow these steps to configure TACACS+ login authentication:
Before You Begin
To configure AAA authentication, you define a named list of authentication methods and then apply that list
to various ports.
To secure the switch for HTTP access by using AAA methods, you must configure the switch with the ip
http authentication aaa global configuration command. Configuring AAA authentication does not secure
the switch for HTTP access by using AAA methods.
Note
For more information about the ip http authentication command, see the Cisco IOS Security Command
Reference, Release 12.4.
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
OL-29048-01 47
Configuring TACACS+
Configuring TACACS+ Login Authentication