42
command authorization are enabled, only authorized commands that are executed are recorded on
the HWTACACS server.
This section provides only the procedure for configuring command accounting. To make the
command accounting feature take effect, you must configure a command accounting method in ISP
domain view. For more information, see Security Configuration Guide.
Configuration procedure
To configure command accounting:
1. Enter system view.
system-view
N/A
2. Enter user line view or
user line class view.
• Enter user line view:
line { first-number1
[ last-number1 ] | { aux | vty }
first-number2
[ last-number2 ] }
• Enter user line class view:
line class { aux | vty }
A setting in user line view is applied only
to the user line. A setting in user line class
view is applied to all user lines of the
class.
A non-default setting in either view takes
precedence over a default setting in the
other view. A non-default setting in user
line view takes precedence over a
non-default setting in user line class view.
A
setting in user line view takes effect
immediately and affects the online user. A
setting in user line class view does not
affect online users and takes effect only
for new login users.
3. Enable scheme
authentication.
authentication-mode
scheme
By default,
authentication is disabled for
AUX lines, and password authentication
is enabled for VTY lines.
In VTY line view, this command is
associated with the
protocol inbound
command. If you specify a non-default
value for only one of the two commands in
VTY line view, the other command uses
the default setting, regardless of the
setting in VTY line class view.
4.
accounting.
command accounting
By default, command accounting is
disabled, and the accounting server does
not record the commands executed by
users.
If the
command accounting
command is
configured in user line class view,
command accounting is enabled on all
user lines in the class. You cannot
configure the
undo command
accounting
user line in the class.
Configuration example
Network requirements
As shown in Figure 18, users need to log in to the device to manage the device.
Configure the device to send commands executed by users to the HWTACACS server to monitor
and control user operations on the device.