Cisco Systems 2960 Model Vehicle User Manual


  Open as PDF
of 1004
 
9-10
Catalyst 2960 and 2960-S Switch Software Configuration Guide
OL-8603-09
Chapter 9 Configuring Switch-Based Authentication
Controlling Switch Access with TACACS+
Logging into and Exiting a Privilege Level
Beginning in privileged EXEC mode, follow these steps to log in to a specified privilege level and to exit
to a specified privilege level:
Controlling Switch Access with TACACS+
This section describes how to enable and configure Terminal Access Controller Access Control System
Plus (TACACS+), which provides detailed accounting information and flexible administrative control
over authentication and authorization processes. TACACS+ is facilitated through authentication,
authorization, accounting (AAA) and can be enabled only through AAA commands.
Note For complete syntax and usage information for the commands used in this section, see the Cisco IOS
Security Command Reference, Release 12.2.
These sections contain this configuration information:
Understanding TACACS+, page 9-10
TACACS+ Operation, page 9-12
Configuring TACACS+, page 9-13
Displaying the TACACS+ Configuration, page 9-18
Understanding TACACS+
TACACS+ is a security application that provides centralized validation of users attempting to gain access
to your switch. TACACS+ services are maintained in a database on a TACACS+ daemon typically
running on a UNIX or Windows NT workstation. You should have access to and should configure a
TACACS+ server before the configuring TACACS+ features on your switch.
Note We recommend a redundant connection between a switch stack and the TACACS+ server. This is to help
ensure that the TACACS+ server remains accessible in case one of the connected stack members is
removed from the switch stack.
TACACS+ provides for separate and modular authentication, authorization, and accounting facilities.
TACACS+ allows for a single access control server (the TACACS+ daemon) to provide each
service—authentication, authorization, and accounting—independently. Each service can be tied into its
own database to take advantage of other services available on that server or on the network, depending
on the capabilities of the daemon.
Command Purpose
Step 1
enable level Log in to a specified privilege level.
For level, the range is 0 to 15.
Step 2
disable level Exit to a specified privilege level.
For level, the range is 0 to 15.