12 Contents
Authentication . . . . . . . . . . . . . . . . . . . . . 181
Authorization
. . . . . . . . . . . . . . . . . . . . . . 182
Exec Authorization Capabilities
. . . . . . . . . . 183
Accounting . . . . . . . . . . . . . . . . . . . . . . . 184
Authentication Examples . . . . . . . . . . . . . . . 185
Local Authentication Example
. . . . . . . . . . 185
TACACS+ Authentication Example . . . . . . . . 186
RADIUS Authentication Example . . . . . . . . . 188
Authorization Examples . . . . . . . . . . . . . . . . 189
Local Authorization Example—Direct Login
to Privileged EXEC Mode
. . . . . . . . . . . . . 189
TACACS+ Authorization Example—Direct
Login to Privileged EXEC Mode
. . . . . . . . . . 189
TACACS+ Authorization Example—
Administrative Profiles
. . . . . . . . . . . . . . 190
TACACS+ Authorization Example—Custom
Administrative Profile
. . . . . . . . . . . . . . . 191
TACACS+ Authorization Example—
Per-command Authorization
. . . . . . . . . . . 192
RADIUS Authorization Example—Direct Login
to Privileged EXEC Mode
. . . . . . . . . . . . . 193
RADIUS Authorization Example—
Administrative Profiles
. . . . . . . . . . . . . . 193
Using RADIUS Servers to Control Management
Access
. . . . . . . . . . . . . . . . . . . . . . . . . 194
How Does RADIUS Control Management
Access?
. . . . . . . . . . . . . . . . . . . . . . 194
Which RADIUS Attributes Does the Switch
Support?
. . . . . . . . . . . . . . . . . . . . . . 196
How Are RADIUS Attributes Processed on the
Switch?
. . . . . . . . . . . . . . . . . . . . . . 198