34
After you enable command authorization, you must perform the following configuration to make the function
take effect:
• Create a HWTACACS scheme, and specify the IP address of the authorization server and other
authorization parameters. For more information about AAA, see Security Configuration Guide.
• Reference the created HWTACACS scheme in the ISP domain. For more information about AAA, see
Security Configuration Guide.
After you enable command accounting, you must perform the following configuration to make the function
take effect:
• Create a HWTACACS scheme, and specify the IP address of the accounting server and other
accounting parameters. For more information about AAA, see Security Configuration Guide.
• Reference the created HWTACACS scheme in the ISP domain. For more information about AAA, see
Security Configuration Guide.
When users adopt the scheme mode to log in to the device, the level of the commands that the users can
access depends on the user privilege level defined in the AAA scheme.
• When the AAA scheme is local, the user privilege level is defined by the authorization-attribute level
level.
• When the AAA scheme is RADIUS or HWTACACS, the user privilege level is configured on the RADIUS
or HWTACACS server.
• For more information about AAA, RADIUS, and HWTACACS, see Security Configuration Guide.
When you log in to the device through the console port after the configuration, you are prompted to enter a
login username and password. A prompt such as <HP> appears after you enter the password and username
and press Enter, as shown in
Figure 9.
Figure 9 Configuration page