Cisco WS-C2960S-24PD-L Software Guide - Page 180

Configuring Login Authentication

Page 180 highlights

Configuring TACACS+ Chapter 6 Configuring the System Beginning in privileged EXEC mode, follow these steps to configure the TACACS+ server: Step 1 Command tacacs-server host name [timeout integer] [key string] Step 2 tacacs-server retransmit retries Step 3 tacacs-server timeout seconds Step 4 tacacs-server attempts count Step 5 tacacs-server key key Step 6 exit Step 7 show tacacs Purpose Define a TACACS+ host. Entering the timeout and key parameters with this command overrides the global values that you can enter with the tacacs-server timeout (Step 3) and the tacacs-server key commands (Step 5). Enter the number of times the server searches the list of TACACS+ servers before stopping. The default is two. Set the interval that the server waits for a TACACS+ server host to reply. The default is 5 seconds. Set the number of login attempts that can be made on the line. Define a set of encryption keys for all of TACACS+ and communication between the access server and the TACACS daemon. Repeat the command for each encryption key. Return to privileged EXEC mode. Verify your entries. Configuring Login Authentication Beginning in privileged EXEC mode, follow these steps to configure login authentication by using AAA/TACACS+: Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Command configure terminal aaa new-model aaa authentication login {default | list-name} method1 [method2...] line [aux | console | tty | vty] line-number [ending-line-number] login authentication {default | list-name} exit show running-config Purpose Enter global configuration mode. Enable AAA/TACACS+. Enable authentication at login, and create one or more lists of authentication methods. Enter line configuration mode, and configure the lines to which you want to apply the authentication list. Apply the authentication list to a line or set of lines. Return to privileged EXEC mode. Verify your entries. 6-52 Catalyst 2900 Series XL and Catalyst 3500 Series XL Software Configuration Guide 78-6511-08

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368

6-52
Catalyst 2900 Series XL and Catalyst 3500 Series XL Software Configuration Guide
78-6511-08
Chapter 6
Configuring the System
Configuring TACACS+
Beginning in privileged EXEC mode, follow these steps to configure the TACACS+ server:
Configuring Login Authentication
Beginning in privileged EXEC mode, follow these steps to configure login authentication by using
AAA/TACACS+:
Command
Purpose
Step 1
tacacs-server host
name
[
timeout
integer
] [
key
string
]
Define a TACACS+ host.
Entering the
timeout
and
key
parameters with this command overrides the
global values that you can enter with the
tacacs-server timeout
(Step 3) and
the
tacacs-server key
commands (Step 5).
Step 2
tacacs-server retransmit
retries
Enter the number of times the server searches the list of TACACS+ servers
before stopping.
The default is two.
Step 3
tacacs-server timeout
seconds
Set the interval that the server waits for a TACACS+ server host to reply.
The default is 5 seconds.
Step 4
tacacs-server attempts
count
Set the number of login attempts that can be made on the line.
Step 5
tacacs-server key
key
Define a set of encryption keys for all of TACACS+ and communication
between the access server and the TACACS daemon.
Repeat the command for each encryption key.
Step 6
exit
Return to privileged EXEC mode.
Step 7
show tacacs
Verify your entries.
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
aaa new-model
Enable AAA/TACACS+.
Step 3
aaa authentication login
{
default
|
list-name
}
method1
[
method2...
]
Enable authentication at login, and create one or more lists of authentication
methods.
Step 4
line
[
aux
|
console
|
tty
|
vty
]
line-number
[
ending-line-number
]
Enter line configuration mode, and configure the lines to which you want to
apply the authentication list.
Step 5
login authentication
{
default
|
list-name
}
Apply the authentication list to a line or set of lines.
Step 6
exit
Return to privileged EXEC mode.
Step 7
show running-config
Verify your entries.