Configuring tacacs+ authentication – ADC CUDA 3 User Manual

Page 71

Advertising
background image

Cuda 12000 IP Access Switch CLI-based Administration Guide

Configuring User Authentication

69

Configuring TACACS+ Authentication

Before you configure TACACS+ authentication on the Cuda 12000, make
sure that:

At least one account for Cuda 12000 users has been created on the
TACACS+ server. Users must login to the Cuda 12000 an account created
on the TACACS+ server. Refer to your TACACS+ server documentation
for more information.

You know the IP address of the TACACS+ server.

You know the shared key that the Cuda 12000 will use to encrypt
TACACS+ usernames and passwords for transmission to the TACACS+
server.

If TACACS+ authentication is unavailable due to problems with the TACACS+
server, local authentication is used.

To configure TACACS+ authentication on the Cuda 12000, perform the
following tasks:

Task

Command

1. Enter root mode.

root

2. Specify the IP address of the

TACACS+ server.

tacacs-server host <ip-address>

3. Specify the encryption key that

the Cuda 12000 will use to
encrypt usernames and
passwords. The key is an
alphanumeric string.

tacacs-server key <string>

4. Verify TACACS+ server settings.

show tacacs-server

5. Enable TACACS+ authentication. aaa authentication login default tacacs+

Advertising