Configuring RADIUS Authorization for User Privileged Access and Network Services
Authorization is bypassed for authenticated users who log in through the CLI even if authorization has
been configured.
Note
Follow these steps to configure RADIUS authorization for user priviledged access and network services:
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
aaa authorization network radius
4.
aaa authorization exec radius
5.
end
6.
show running-config
7.
copy running-config startup-config
DETAILED STEPS
Purpose
Command or Action
Enables privileged EXEC mode. Enter your password if
prompted.
enable
Example:
Switch>
enable
Step 1
Enters the global configuration mode.
configure terminal
Example:
Switch#
configure terminal
Step 2
Configures the switch for user RADIUS authorization for
all network-related service requests.
aaa authorization network radius
Example:
Switch(config)#
aaa authorization network
Step 3
radius
Configures the switch for user RADIUS authorization if the
user has privileged EXEC access.
aaa authorization exec radius
Example:
Switch(config)#
aaa authorization exec radius
Step 4
The
exec
keyword might return user profile information
(such as
autocommand
information).
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(4)E (Catalyst 2960-X Switches)
932
How to Configure RADIUS
Summary of Contents for Catalyst 2960 Series
Page 96: ......
Page 196: ......
Page 250: ......
Page 292: ......
Page 488: ......
Page 589: ...P A R T VI Cisco Flexible NetFlow Configuring NetFlow Lite page 509 ...
Page 590: ......
Page 619: ...P A R T VII QoS Configuring QoS page 539 Configuring Auto QoS page 645 ...
Page 620: ......
Page 750: ......
Page 1604: ......
Page 1740: ......
Page 2105: ...P A R T XII Configuring Cisco IOS IP SLAs Configuring Cisco IP SLAs page 2025 ...
Page 2106: ......
Page 2118: ......
Page 2164: ......