12 Contents
Accounting . . . . . . . . . . . . . . . . . . . . . . . 180
Authentication Examples
. . . . . . . . . . . . . . . 181
Local Authentication Example
. . . . . . . . . . 181
TACACS+ Authentication Example
. . . . . . . . 182
RADIUS Authentication Example . . . . . . . . . 184
Authorization Examples . . . . . . . . . . . . . . . . 185
Local Authorization Example—Direct Login
to Privileged EXEC Mode
. . . . . . . . . . . . . 185
TACACS+ Authorization Example—Direct Login
to Privileged EXEC Mode
. . . . . . . . . . . . . 185
TACACS+ Authorization Example—
Administrative Profiles
. . . . . . . . . . . . . . 186
TACACS+ Authorization Example—Custom
Administrative Profile
. . . . . . . . . . . . . . . 187
TACACS+ Authorization Example—
Per-command Authorization
. . . . . . . . . . . 188
RADIUS Authorization Example—Direct Login
to Privileged EXEC Mode
. . . . . . . . . . . . . 189
RADIUS Authorization Example—
Administrative Profiles
. . . . . . . . . . . . . . 189
Using RADIUS Servers to Control Management
Access
. . . . . . . . . . . . . . . . . . . . . . . . . 190
How Does RADIUS Control Management
Access?
. . . . . . . . . . . . . . . . . . . . . . 190
Which RADIUS Attributes Does the Switch
Support?
. . . . . . . . . . . . . . . . . . . . . . 192
How Are RADIUS Attributes Processed on
the Switch?
. . . . . . . . . . . . . . . . . . . . 194
Using TACACS+ Servers to Control Management
Access
. . . . . . . . . . . . . . . . . . . . . . . . . 195
Which TACACS+ Attributes Does the Switch
Support?
. . . . . . . . . . . . . . . . . . . . . . 196