2-19
Controlling Management Access to the ProCurve Secure Router
Using the AAA Subsystem to Control Management Access
■ TACACS+
■ enable
You would enter:
ProCurve(config)# aaa authentication enable default group tacacs+ enable
If you create this named list, the ProCurve Secure Router will first try to
authenticate the user through the TACACS+ server. If the TACACS+ server
does not respond, the ProCurve Secure Router will prompt the user to enter
the enable mode password and will check the password that the user enters
against the enable mode password that you configured.
After you create the default named list for the enable mode, it is automatically
applied. If you are using a RADIUS or TACACS+ server as an authentication
method, you must then configure the ProCurve Secure Router to locate and
communicate with that server. For information about the configuration
required for a RADIUS server, see “Configuring a RADIUS Server for
Authentication” on page 2-31. For information about the configuration
required for a TACACS+ server, see “Define the TACACS+ Server” on page 2-35.
Creating a Named List for User Authentication
To create a named list for the router’s access lines, you must determine the
authentication methods that you want to use and the order in which you want
the authentication methods applied.
You can then use the
aaa authentication
command to specify both the name of the list and its contents. When you create
a named list for the router’s access lines, you can create the default named list,
or you can create a named list with a specific name.
To create a named list for one of the router’s access lines, enter the following
command from the global configuration mode context:
Syntax: aaa authentication login [default | <listname>] [enable | line | local | none |
group [<groupname> | radius | tacacs+]
Specify default to create the default named list, or replace <listname> with
the name that you want to give the named list that you create.
The options that you can select to authenticate users are listed in Table 2-2.
When you configure a named list for authentication, you can include more than
one option in a command.