Configuring Radius Authorization For User Privileged Access And Network Services - Cisco Catalyst 2960 series Configuration Manual

Consolidated platform configuration guide, ios release 15.2(4)e
Hide thumbs Also See for Catalyst 2960 series:
Table of Contents

Advertisement

How to Configure RADIUS

Configuring RADIUS Authorization for User Privileged Access and Network Services

Note
Authorization is bypassed for authenticated users who log in through the CLI even if authorization has
been configured.
Follow these steps to configure RADIUS authorization for user priviledged access and network services:
SUMMARY STEPS
1. enable
2. configure terminal
3. aaa authorization network radius
4. aaa authorization exec radius
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
Command or Action
Step 1
enable
Example:
Switch> enable
Step 2
configure terminal
Example:
Switch# configure terminal
Step 3
aaa authorization network radius
Example:
Switch(config)# aaa authorization network
radius
Step 4
aaa authorization exec radius
Example:
Switch(config)# aaa authorization exec radius
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(4)E (Catalyst 2960-X Switches)
932
Purpose
Enables privileged EXEC mode. Enter your password if
prompted.
Enters the global configuration mode.
Configures the switch for user RADIUS authorization for
all network-related service requests.
Configures the switch for user RADIUS authorization if the
user has privileged EXEC access.
The exec keyword might return user profile information
(such as autocommand information).

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents