Configuring Authentication, Authorization, and Accounting 181
Authentication Examples
It is important to understand that during authentication, all that happens is
that the user is validated. If any attributes are returned from the server, they
are not processed during authentication. In the examples below, it is assumed
that the default configuration of authorization—that is, no authorization—is
used.
Local Authentication Example
Use the following configuration to require local authentication when logging
in over a telnet connection:
aaa authentication login “loc” local
line telnet
login authentication loc
exit
username guest password password
passwords strength minimum numeric-characters 2
passwords strength minimum character-classes 4
passwords strength-check
username admin password paSS1&word2 privilege 15
passwords lock-out 3
The following describes each line of this code:
•The
aaa authentication login “loc” local
command
creates a login authentication list called “loc” that contains the method
local.
•The
line telnet
command enters the configuration mode for the
telnet line.
•The
login authentication loc
command assigns the loc login
authentication list to be used for users accessing the switch via telnet.
Table 9-4. Accounting Methods
Method Commands Dot1x Exec
radius no yes yes
tacacs yes no yes