Configuring Aaa Authorization On Tacacs+ Servers - Cisco Nexus 9000 Series Configuration Manual

Nx-os security configuration guide, release 9.x
Hide thumbs Also See for Nexus 9000 Series:
Table of Contents

Advertisement

Configuring TACACS+
Command or Action
switch# configure terminal
switch(config)#
Step 2
aaa authentication login ascii-authentication
Example:
switch(config)# aaa authentication login
ascii-authentication
Step 3
(Optional) show tacacs+ {pending | pending-diff}
Example:
switch(config)# show tacacs+ pending
Step 4
(Optional) tacacs+ commit
Example:
switch(config)# tacacs+ commit
Step 5
exit
Example:
switch(config)# exit
switch#
Step 6
(Optional) show tacacs-server
Example:
switch# show tacacs-server
Step 7
(Optional) copy running-config startup-config
Example:
switch# copy running-config startup-config

Configuring AAA Authorization on TACACS+ Servers

You can configure the default AAA authorization method for TACACS+ servers.
Before you begin
Enable TACACS+.
SUMMARY STEPS
1. configure terminal
2. aaa authorization ssh-certificate default {group group-list [none] | local | none}
3. exit
4. (Optional) show aaa authorization [all]
5. (Optional) copy running-config startup-config
Purpose
Enables ASCII authentication. The default is disabled.
Displays the pending TACACS+ configuration.
Applies the TACACS+ configuration changes in the
temporary database to the running configuration.
Exits configuration mode.
Displays the TACACS+ server configuration.
Copies the running configuration to the startup
configuration.
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x
Configuring AAA Authorization on TACACS+ Servers
89

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents