Configuring Radius Authorization For User Privileged Access And Network Services - Cisco Catalyst 2960-X Security Configuration Manual

Cisco ios release 15.0(2)ex
Hide thumbs Also See for Catalyst 2960-X:
Table of Contents

Advertisement

Configuring RADIUS Authorization for User Privileged Access and Network Services

Command or Action
Step 8
copy running-config startup-config
Example:
Switch# copy running-config startup-config
Related Topics
Identifying the RADIUS Server Host, on page 83
RADIUS Server Host, on page 69
AAA Server Groups, on page 70
Configuring RADIUS Authorization for User Privileged Access and Network
Services
Authorization is bypassed for authenticated users who log in through the CLI even if authorization has
Note
been configured.
Follow these steps to configure RADIUS authorization for user priviledged access and network services:
SUMMARY STEPS
1. enable
2. configure terminal
3. aaa authorization network radius
4. aaa authorization exec radius
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
Command or Action
Step 1
enable
Example:
Switch> enable
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
90
Purpose
(Optional) Saves your entries in the configuration file.
Purpose
Enables privileged EXEC mode. Enter your password if
prompted.
Configuring RADIUS
OL-29048-01

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents