Chapter 6      Configuring the System
Configuring TACACS+
6-66
Catalyst 2900 Series XL and Catalyst 3500 Series XL Software Configuration Guide
78-6511-05
Beginning in privileged EXEC mode, follow these steps to specify TACACS+ 
authorization for EXEC access and network services:
Starting TACACS+ Accounting
You use the aaa accounting command with the tacacs+ keyword to turn on 
TACACS+ accounting for each Cisco IOS privilege level and for network 
services. 
Beginning in privileged EXEC mode, follow these steps to enable TACACS+ 
accounting:
Note These commands are documented in the “Accounting and Billing Commands” 
chapter of the Cisco IOS Release 12.0 Security Command Reference.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
aaa authorization network 
tacacs+ 
Configure the switch for user TACACS+ authorization for 
all network-related service requests, including SLIP, PPP 
NCPs, and ARA protocols.
Step 3
aaa authorization exec tacacs+ Configure the switch for user TACACS+ authorization to 
determine if the user is allowed EXEC access. 
The exec keyword might return user profile information 
(such as autocommand information). 
Step 4
exit Return to privileged EXEC mode.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
aaa accounting exec start-stop 
tacacs+
Enable TACACS+ accounting to send a start-record 
accounting notice at the beginning of an EXEC process and 
a stop-record at the end.
Step 3
aaa accounting network 
start-stop tacacs+
Enable TACACS+ accounting for all network-related 
service requests, including SLIP, PPP, and PPP NCPs.
Step 4
exit Return to privileged EXEC mode.