Cisco Nexus 9000 Series Configuration Manual page 106

Nx-os security configuration guide, release 9.x
Hide thumbs Also See for Nexus 9000 Series:
Table of Contents

Advertisement

Allowing Users to Specify a TACACS+ Server at Login
request based on the default AAA authentication method. If you enable this option, the user can log in as
username@vrfname:hostname, where vrfname is the VRF to use and hostname is the name of a configured
TACACS+ server.
Note
If you enable the directed-request option, the Cisco NX-OS device uses only the TACACS+ method for
authentication and not the default local method.
Note
User-specified logins are supported only for Telnet sessions.
Before you begin
Enable TACACS+.
SUMMARY STEPS
1. configure terminal
2. tacacs-server directed-request
3. (Optional) show tacacs+ {pending | pending-diff}
4. (Optional) tacacs+ commit
5. exit
6. (Optional) show tacacs-server directed-request
7. (Optional) copy running-config startup-config
DETAILED STEPS
Command or Action
Step 1
configure terminal
Example:
switch# configure terminal
switch(config)#
Step 2
tacacs-server directed-request
Example:
switch(config)# tacacs-server directed-request
Step 3
(Optional) show tacacs+ {pending | pending-diff}
Example:
switch(config)# show tacacs+ pending
Step 4
(Optional) tacacs+ commit
Example:
switch(config)# tacacs+ commit
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x
80
Purpose
Enters global configuration mode.
Allows users to specify a TACACS+ server to send the
authentication request when logging in. The default is
disabled.
Displays the pending TACACS+ configuration.
Applies the TACACS+ configuration changes in the
temporary database to the running configuration.
Configuring TACACS+

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents