Controlling Switch Access With Radius - Cisco Catalyst 3560-X Software Configuration Manual

Hide thumbs Also See for Catalyst 3560-X:
Table of Contents

Advertisement

Chapter 1
Configuring Switch-Based Authentication
Starting TACACS+ Accounting
The AAA accounting feature tracks the services that users are accessing and the amount of network
resources that they are consuming. When AAA accounting is enabled, the switch reports user activity to
the TACACS+ security server in the form of accounting records. Each accounting record contains
accounting attribute-value (AV) pairs and is stored on the security server. This data can then be analyzed
for network management, client billing, or auditing.
Beginning in privileged EXEC mode, follow these steps to enable TACACS+ accounting for each Cisco
IOS privilege level and for network services:
Command
Step 1
configure terminal
Step 2
aaa accounting network start-stop
tacacs+
Step 3
aaa accounting exec start-stop tacacs+
Step 4
end
Step 5
show running-config
Step 6
copy running-config startup-config
To disable accounting, use the no aaa accounting {network | exec} {start-stop} method1... global
configuration command.
Establishing a Session with a Router if the AAA Server is Unreachable
The aaa accounting system guarantee-first command guarantees system accounting as the first record,
which is the default condition. In some situations, users might be prevented from starting a session on
the console or terminal connection until after the system reloads, which can take more than 3 minutes.
To establish a console or Telnet session with the router if the AAA server is unreachable when the router
reloads, use the no aaa accounting system guarantee-first command.
Displaying the TACACS+ Configuration
To display TACACS+ server statistics, use the show tacacs privileged EXEC command.

Controlling Switch Access with RADIUS

This section describes how to enable and configure the RADIUS, which provides detailed accounting
information and flexible administrative control over authentication and authorization processes.
RADIUS is facilitated through AAA and can be enabled only through AAA commands.
Beginning with Cisco IOS Release 12.2(58)SE, the switch supports RADIUS for IPv6. Information is in
the
IPv6 Configuration Guide, Release
"Configuring the NAS"
Configuration Guide, Release
OL-25303-03
"RADIUS Over IPv6"
section of the "Implementing ADSL for IPv6" chapter in the
section in the "Implementing ADSL for IPv6" chapter in the
Purpose
Enter global configuration mode.
Enable TACACS+ accounting for all network-related service requests.
Enable TACACS+ accounting to send a start-record accounting notice at
the beginning of a privileged EXEC process and a stop-record at the end.
Return to privileged EXEC mode.
Verify your entries.
(Optional) Save your entries in the configuration file.
2. For information about configuring this feature, see the
2.
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
Controlling Switch Access with RADIUS
Cisco IOS XE
Cisco IOS XE IPv6
1-17

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 3750-x

Table of Contents