EasyManua.ls Logo

Cisco Catalyst 2960-XR - Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services

Cisco Catalyst 2960-XR
404 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
PurposeCommand or Action
authentication default
Returns to privileged EXEC mode.end
Example:
Switch(config-line)# end
Step 6
Related Topics
TACACS+ Login Authentication, on page 42
Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus
(TACACS+), on page 37
Configuring TACACS+ Authorization for Privileged EXEC Access and Network
Services
You can use the aaa authorization global configuration command with the tacacs+ keyword to set parameters
that restrict a users network access to privileged EXEC mode.
The aaa authorization exec tacacs+ local command sets these authorization parameters:
Use TACACS+ for privileged EXEC access authorization if authentication was performed by using
TACACS+.
Use the local database if authentication was not performed by using TACACS+.
Authorization is bypassed for authenticated users who log in through the CLI even if authorization has
been configured.
Note
SUMMARY STEPS
1.
configure terminal
2.
aaa authorization network tacacs+
3.
aaa authorization exec tacacs+
4.
end
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
OL-29434-01 47
Configuring TACACS+
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services

Table of Contents

Other manuals for Cisco Catalyst 2960-XR

Related product manuals