Contents
x
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide
OL-6392-01
Identifying a AAA Server 12-6
Configuring Authentication for CLI Access 12-8
Configuring Authentication to Access Privileged Mode 12-8
Configuring Authentication for the enable Command 12-9
Authenticating Users Using the login Command 12-9
Configuring Command Authorization 12-10
Command Authorization Overview 12-10
Configuring Local Command Authorization 12-10
Local Command Authorization Prerequisites 12-11
Default Command Privilege Levels 12-11
Assigning Privilege Levels to Commands and Enabling Authorization 12-11
Viewing Command Privilege Levels 12-13
Configuring TACACS+ Command Authorization 12-13
TACACS+ Command Authorization Prerequisites 12-14
Configuring Commands on the TACACS+ Server 12-14
Enabling TACACS+ Command Authorization 12-17
Viewing the Current Logged-In User 12-18
Recovering from a Lockout 12-19
Configuring Authentication for Network Access 12-20
Authentication Overview 12-20
Enabling Network Access Authentication 12-21
Enabling Secure Authentication of Web Clients 12-22
Configuring Authorization for Network Access 12-23
Configuring TACACS+ Authorization 12-24
Configuring RADIUS Authorization 12-25
Configuring the RADIUS Server to Download Per-User Access Control Lists 12-25
Configuring the RADIUS Server to Download Per-User Access Control List Names 12-27
Configuring Accounting for Network Access 12-27
CHAPTER
13 Configuring Application Protocol Inspection 13-1
Inspection Engine Overview 13-1
When to Use Application Protocol Inspection 13-1
Inspection Limitations 13-2
Inspection Support 13-2
Configuring an Inspection Engine 13-4
Detailed Information About Inspection Engines 13-5
CUSeeMe Inspection Engine 13-5
DNS over UDP Inspection Engine 13-6