aaa authorization exec
Set parameters that restrict (or permit) a user’s access to EXEC-level commands.
C-Series, E-Series, S-Series, Z-Series, S4810
Syntax
aaa authorization exec {name | default} {local || tacacs+ || 
if-authenticated || none}
To disable authorization checking for EXEC level commands, use the no aaa 
authorization exec command.
Parameters
name
Define a name for the list of authorization methods.
default Define the default list of authorization methods.
local Use the authorization parameters on the system to perform 
authorization.
tacacs+ Use the TACACS+ protocol to perform authorization.
none Enter the keyword none to apply no authorization.
Defaults none
Command Modes CONFIGURATION
Command History
Version 8.3.11.1 Introduced on the Z9000.
Version 8.3.7.0 Introduced on the S4810.
Version 7.6.1.0 Introduced on the S-Series.
Version 7.5.1.0 Introduced on the C-Series.
Version 6.1.1.0 Added support for RADIUS.
privilege level (CONFIGURATION mode)
Change the access or privilege level of one or more commands.
C-Series, E-Series, S-Series, Z-Series, S4810
Syntax
privilege mode {level level command | reset command}
To delete access to a level and command, use the no privilege mode level level 
command command.
Parameters
mode
Enter one of the following keywords as the mode for which you are 
controlling access:
• configure for CONFIGURATION mode
• exec for EXEC mode
• interface for INTERFACE modes
1291