Communicating Between The Access Server And The Security Server - Cisco AS5300-96VOIP-A Software Configuration Manual

Universal access server
Table of Contents

Advertisement

Configuring Authentication
Table 4-2
Step
8
9
You can also specify additional protection for privileged EXEC mode:
For more information about these security tools, refer to the Security Configuration Guide, available
online at
http://www.cisco.com/univercd/cc/td/doc/product/software/ios113ed/113ed_cr/secur_c/

Communicating Between the Access Server and the Security Server

This section describes the Cisco IOS software commands that enable the access server to
communicate with a security server. This process is similar for communicating with TACACS+ and
RADIUS servers.
If you are using local authentication, refer to the section "Enabling AAA Globally on the Access
Server," later in this chapter.
If you are using a remote security server for authentication and authorization, you must configure
the security server before performing the tasks described in this chapter. The section "Security
Examples" at the end of this chapter shows some typical TACACS+ and RADIUS server entries
corresponding to the access server security configurations.
4-6
Cisco AS5300 Universal Access Server Software Configuration Guide
Entering an Encryption Type (Continued)
Command
5300(config)# Ctrl-Z
5300#
%SYS-5-CONFIG_I: Configured from console by
console
5300#
5300# copy running-config startup-config
Privilege levels for Cisco IOS commands
Privileged EXEC passwords for different privilege levels
Privilege levels for specific lines on the access server
Encrypt passwords using the service password-encryption commands
Description
Return to enable mode.
This message is normal and does not
indicate an error.
Save the configuration changes to
NVRAM so that they are not lost during
resets, power cycles, or power outages.

Advertisement

Table of Contents
loading

This manual is also suitable for:

As5300

Table of Contents