Tacacs authentication, Tacacs+ authentication – Brocade Communications Systems Brocade ICX 6650 6650 User Manual

Page 47

Advertising
background image

Brocade ICX 6650 Security Configuration Guide

27

53-1002601-01

TACACS and TACACS+ security

Telnet connections (inbound):
1 closed
2 closed
3 closed
4 closed
5 closed
Telnet connection (outbound):
6 closed
SSH connections:
1 closed
2 closed
3 closed
4 closed
5 closed
stack9#

TACACS authentication

NOTE

Also, multiple challenges are supported for TACACS+ login authentication.

When TACACS authentication takes place, the following events occur.

1. A user attempts to gain access to the Brocade device by doing one of the following:

Logging into the device using Telnet or SSH

Entering the Privileged EXEC level or CONFIG level of the CLI

2. The user is prompted for a username and password.

3. The user enters a username and password.

4. The Brocade device sends a request containing the username and password to the TACACS

server.

5. The username and password are validated in the TACACS server database.

6. If the password is valid, the user is authenticated.

TACACS+ authentication

When TACACS+ authentication takes place, the following events occur.

1. A user attempts to gain access to the Brocade device by doing one of the following:

Logging into the device using Telnet or SSH

Entering the Privileged EXEC level or CONFIG level of the CLI

2. The user is prompted for a username.

3. The user enters a username.

4. The Brocade device obtains a password prompt from a TACACS+ server.

5. The user is prompted for a password.

6. The user enters a password.

7. The Brocade device sends the password to the TACACS+ server.

Advertising