Configuring Tacacs+ Authentication - ADC CUDA 3 Administration Manual

Ip access switch cli-based administration guide
Table of Contents

Advertisement

Configuring TACACS+ Authentication

Task
1. Enter root mode.
2. Specify the IP address of the
3. Specify the encryption key that
4. Verify TACACS+ server settings.
5. Enable TACACS+ authentication. aaa authentication login default tacacs+
Cuda 12000 IP Access Switch CLI-based Administration Guide
Before you configure TACACS+ authentication on the Cuda 12000, make
sure that:
At least one account for Cuda 12000 users has been created on the
TACACS+ server. Users must login to the Cuda 12000 an account created
on the TACACS+ server. Refer to your TACACS+ server documentation
for more information.
You know the IP address of the TACACS+ server.
You know the shared key that the Cuda 12000 will use to encrypt
TACACS+ usernames and passwords for transmission to the TACACS+
server.
If TACACS+ authentication is unavailable due to problems with the TACACS+
server, local authentication is used.
To configure TACACS+ authentication on the Cuda 12000, perform the
following tasks:
TACACS+ server.
the Cuda 12000 will use to
encrypt usernames and
passwords. The key is an
alphanumeric string.
Configuring User Authentication
Command
root
tacacs-server host <ip-address>
tacacs-server key <string>
show tacacs-server
69

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CUDA 3 and is the answer not in the manual?

This manual is also suitable for:

Cuda 12000

Table of Contents

Save PDF