HWTACACS Protocol Configuration Example
621
HWTACACS Protocol
Configuration
Example
For the hybrid configuration example of AAA/RADIUS protocol and 802.1x protocol,
refer to Configuration Example in 802.1x Configuration. It will not be detailed here.
Configuring the
FTP/Telnet User
Authentication at a
Remote TACACS Server
Networking requirements
Configure the switch to use a TACACS server to provide AAA services to login users
(see Figure 177).
Connect the switch to one TACACS server (providing the services of authentication
and authorization) with the IP address 10.110.91.164. On the switch, set the shared
key for AAA packet encryption to “expert”. Configure the switch to send usernames
to the TACACS server with
isp-name
removed.
On the TACACS server, set the shared key for encrypting the packets exchanged with
the switch to “expert”; add the usernames and passwords of users.
Networking diagram
See Figure 177.
Networking topology
Figure 177
Configuring the remote RADIUS authentication for Telnet users
Reset the statistics of HWTACACS server
reset hwtacacs statistics
{
accounting
|
authentication
|
authorization
|
all
}
Enable RADIUS packet debugging
debugging radius packet
Disable RADIUS packet debugging
undo debugging radius packet
Enable debugging of local RADIUS
authentication server
debugging local-server
{
all
|
error
|
event
|
packet
}
Disable debugging of local RADIUS
authentication server
undo debugging local-server
{
all
|
error
|
event
|
packet
}
Enable HWTACACS debugging
debugging hwtacacs
{
all
|
error
|
event
|
message
|
receive-packet
|
send-packet
}
Disable HWTACACS debugging
undo debugging hwtacacs
{
all
|
error
|
event
|
message
|
receive-packet
|
send-packet
}
Table 684
Displaying and debugging AAA and RADIUS/HWTACACS protocol (continued)
Operation
Command
Authentication Servers
( IP address:10.110.91.164 )
Internet
Switch
telnet user
Internet
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...