Configuring Radius Authorization; Authorization Example - Cisco WS-X6066-SLB-APC - Content Switching Module Software Manual

Catalyst 6000 series software configuration guide
Hide thumbs Also See for WS-X6066-SLB-APC - Content Switching Module:
Table of Contents

Advertisement

Chapter 21
Configuring Switch Access Using AAA

Configuring RADIUS Authorization

These sections describe how to configure RADIUS authorization on the switch:
Enabling RADIUS Authorization
To enable RADIUS authorization and authentication on the switch, perform this task in privileged mode:
Enter the set authentication login radius enable command in privileged mode. This command enables
Step 1
both RADIUS authentication and authorization.
Set the Service-Type (RADIUS attribute 6) for the user to Admistrative (that is, a value of 6) in the
Step 2
RADIUS server to launch the user into enable mode in the RADIUS server. If the service-type is set for
anything other than 6-administrative (for example, 1-login, 7-shell, or 2-framed), you will be at the
switch EXEC prompt, not the enable prompt.
Disabling RADIUS Authorization
Enter the set authentication login radius disable command in privileged mode to disable RADIUS
authorization.

Authorization Example

Figure 21-4
When Workstation A initiates a command on the switch, the switch registers a request with the
TACACS+ daemon. The TACACS+ daemon determines if the user is authorized to use the feature and
sends a response either executing the command or denying access.
Figure 21-4 TACACS+ Example Network Topology
TACACS+
172.20.52.10
Workstation A
78-13315-02
Enabling RADIUS Authorization, page 21-55
Disabling RADIUS Authorization, page 21-55
shows a simple network topology using TACACS+.
server
Switch
Console port
connection
Terminal
Catalyst 6000 Family Software Configuration Guide—Releases 6.3 and 6.4
Authorization Example
21-55

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents