Configuring Tacacs+ Login Authentication - Allen-Bradley Stratix 5100 User Manual

Wireless access point/workgroup bridge
Hide thumbs Also See for Stratix 5100:
Table of Contents

Advertisement

aaa group server tacacs+ group-name
5. (Optional) Associate a particular TACACS+ server with the defined
server group. Repeat this step for each TACACS+ server in the AAA
server group.
Each server in the group must be previously defined in Step 2.
server ip-address
6. Return to privileged EXEC mode.
end
7. Verify your entries.
show tacacs
8. (Optional) Save your entries in the configuration file.
copy running-config startup-config
• To remove the specified TACACS+ server name or address, use the
tacacs-server host hostname
• To remove a server group from the configuration list, use the
group server tacacs+ group-name
command.
• To remove the IP address of a TACACS+ server, use the
server group subconfiguration command.
ip-address

Configuring TACACS+ Login Authentication

To configure AAA authentication, you define a named list of authentication
methods and then apply that list to various interfaces. The method list defines the
types of authentication and the sequence performed; it must be applied to a
specific interface before any of the defined authentication methods are
performed. The only exception is the default method list (by coincidence, is
named default). The default method list is automatically applied to all interfaces
except those that have a named method list explicitly defined. A defined method
list overrides the default method list.
A method list describes the sequence and authentication methods to be queried
to authenticate an administrator. You can designate one or more security
protocols to be used for authentication, thus ensuring a back-up system for
authentication in case the initial method fails. The software uses the first method
listed to authenticate users; if that method fails to respond, the software selects
the next authentication method in the method list.
This process continues until there is successful communication with a listed
authentication method or until all defined methods are exhausted. If
authentication fails at any point in this cycle—meaning that the security server or
local username database responds by denying the administrator access—the
authentication process stops, and no other authentication methods are
attempted.
Rockwell Automation Publication 1783-UM006A-EN-P - May 2014
Configuring RADIUS and TACACS+ Servers
global configuration command.
global configuration
no server
Chapter 14
no
no aaa
435

Advertisement

Table of Contents
loading

This manual is also suitable for:

1783-wapak91783-wapek91783-wapck91783-wapzk9

Table of Contents