170
Configuring Switch-Based Authentication
How to Configure Switch-Based Authentication
Identifying the Server Host and Setting the Authentication Key
Configuring Login Authentication
Before You Begin
To secure the switch for HTTP access by using AAA methods, you must configure the switch with the
ip http
authentication aaa
global configuration command. Configuring AAA authentication does not secure the switch for HTTP
access by using AAA methods.
Command
Purpose
1.
configure terminal
Enters global configuration mode.
2.
tacacs-server host
hostname
[
port
integer
] [
timeout
integer
] [
key
string
]
Identifies the IP host or hosts maintaining a server. Enters this
command multiple times to create a list of preferred hosts. The software
searches for hosts in the order in which you specify them.
hostname
—Specifies the name or IP address of the host.
(Optional)
port
integer
—Specifies a server port number. The default is
port 49. The range is 1 to 65535.
(Optional)
timeout
integer
—Specifies a time in seconds the switch
waits for a response from the daemon before it times out and
declares an error. The default is 5 seconds. The range is 1 to 1000
seconds.
(Optional)
key
string
—Specifies the encryption key for encrypting and
decrypting all traffic between the switch and the daemon.
You must configure the same key on the daemon for
encryption to be successful.
3.
aaa new-model
Enables AAA.
4.
aaa group server
group-name
(Optional) Defines the AAA server-group with a group name.
This command puts the switch in a server group subconfiguration mode.
5.
server
ip-address
(Optional) Associates a particular server with the defined
server group. Repeat this step for each server in the AAA
server group.
Each server in the group must be previously defined in Step 2.
6.
end
Returns to privileged EXEC mode.
7.
show tacacs
Verifies your entries.
Summary of Contents for IE 4000
Page 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Page 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Page 108: ...104 Configuring Switch Clusters Additional References ...
Page 128: ...124 Performing Switch Administration Additional References ...
Page 130: ...126 Configuring PTP ...
Page 140: ...136 Configuring CIP Additional References ...
Page 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Page 192: ...188 Configuring Switch Based Authentication Additional References ...
Page 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Page 298: ...294 Configuring VLANs Additional References ...
Page 336: ...332 Configuring STP Additional References ...
Page 408: ...404 Configuring DHCP Additional References ...
Page 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Page 490: ...486 Configuring SPAN and RSPAN Additional References ...
Page 502: ...498 Configuring Layer 2 NAT ...
Page 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Page 930: ...926 Configuring IP Unicast Routing Related Documents ...
Page 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Page 978: ...974 Dying Gasp ...
Page 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Page 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Page 996: ...992 Ethernet CFM ...
Page 1066: ...1062 Using an SD Card SD Card Alarms ...