Configuring TACACS+ Authentication
Task
1. Enter root mode.
2. Specify the IP address of the
3. Specify the encryption key that
4. Verify TACACS+ server settings.
5. Enable TACACS+ authentication. aaa authentication login default tacacs+
Cuda 12000 IP Access Switch CLI-based Administration Guide
Before you configure TACACS+ authentication on the Cuda 12000, make
sure that:
At least one account for Cuda 12000 users has been created on the
TACACS+ server. Users must login to the Cuda 12000 an account created
on the TACACS+ server. Refer to your TACACS+ server documentation
for more information.
You know the IP address of the TACACS+ server.
You know the shared key that the Cuda 12000 will use to encrypt
TACACS+ usernames and passwords for transmission to the TACACS+
server.
If TACACS+ authentication is unavailable due to problems with the TACACS+
server, local authentication is used.
To configure TACACS+ authentication on the Cuda 12000, perform the
following tasks:
TACACS+ server.
the Cuda 12000 will use to
encrypt usernames and
passwords. The key is an
alphanumeric string.
Configuring User Authentication
Command
root
tacacs-server host <ip-address>
tacacs-server key <string>
show tacacs-server
69
Need help?
Do you have a question about the CUDA 3 and is the answer not in the manual?