password to the TACACS server for authentication. After passing authentication and being authorized,
the user successfully logs into the switch to perform operations.
Figure 1-5 Network diagram for a typical HWTACACS application
HWTACACS server
HWTACACS client
Host
HWTACACS server
Basic message exchange procedure in HWTACACS
The following text takes telnet user as an example to describe how HWTACACS implements
authentication, authorization, and accounting for a user.
Figure 1-6
illustrates the basic message
exchange procedure:
Figure 1-6 AAA implementation procedure for a telnet user
1-8