EasyManuals Logo

Cisco Catalyst 3750-X User Manual

Cisco Catalyst 3750-X
1438 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #250 background imageLoading...
Page #250 background image
10-16
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-21521-01
Chapter 10 Configuring Switch-Based Authentication
Controlling Switch Access with TACACS+
Note To secure the switch for HTTP access by using AAA methods, you must configure the switch with the
ip http authentication aaa global configuration command. Configuring AAA authentication does not
secure the switch for HTTP access by using AAA methods.
For more information about the ip
http authentication command, see the Cisco IOS Security Command
Reference, Release 12.2.
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services
AAA authorization limits the services available to a user. When AAA authorization is enabled, the
switch uses information retrieved from the user’s profile, which is located either in the local user
database or on the security server, to configure the user’s session. The user is granted access to a
requested service only if the information in the user profile allows it.
You can use the aa
a authorization global configuration command with the tacacs+ keyword to set
parameters that restrict a user’s network access to privileged EXEC mode.
The a
aa authorization exec tacacs+ local command sets these authorization parameters:
Use TACACS+ for privileged EXEC access authorization if authentication was performed by using
TAC ACS+.
Use the local database if authentication was not performed by using TACACS+.
Note Authorization is bypassed for authenticated users who log in through the CLI even if authorization has
been configured.
Beginning in privileged EXEC mode, follow these steps to specify TACACS+ authorization for
privileged EXEC access and network services:
To disable authorization, use the no
aaa authorization {network | exec} method1 global configuration
command.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
aaa authorization network tacacs+ Configure the switch for user TACACS+ authorization for all
network-related service requests.
Step 3
aaa authorization exec tacacs+ Configure the switch for user TACACS+ authorization if the user has
privileged EXEC access.
The ex
ec keyword might return user profile information (such as
autocommand information).
Step 4
end Return to privileged EXEC mode.
Step 5
show running-config Verify your entries.
Step 6
copy running-config startup-config (Optional) Save your entries in the configuration file.

Table of Contents

Other manuals for Cisco Catalyst 3750-X

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 3750-X and is the answer not in the manual?

Cisco Catalyst 3750-X Specifications

General IconGeneral
Switching Capacity160 Gbps
Stacking Bandwidth64 Gbps
Max Stacking Units9
Layer SupportLayer 2 and Layer 3
Form FactorRack-mountable
DRAM256 MB
Flash Memory64 MB
ModelCisco Catalyst 3750-X Series
Ports24 or 48 10/100/1000 Ethernet ports
Uplink Interfaces4 SFP or 2 SFP+
FeaturesStackWise Plus, EnergyWise
ImageIP Base or IP Services
Operating Temperature0 to 40°C
Operating Humidity10 to 85% noncondensing

Related product manuals