User authentication
Terminal Access Controller Access-Control System Plus ()
TX54 User Guide
757
Error: Unrecognised token on line 1
5. Restart the server:
$ sudo /etc/init.d/tacacs_plus restart
server failover and fallback to local authentication
In addition to the primary server, you can also configure your TX54 device to use backup
servers. Backup servers are used for authentication requests when the primary
server is unavailable.
Falling back to local authentication
With user authentication methods, you can configure your TX54 device to use multiple types of
authentication. For example, you can configure both authentication and local
authentication, so that local authentication can be used as a fallback mechanism if the primary and
backup servers are unavailable. Additionally, users who are configured locally but are not
configured on the server are still able to log into the device. Authentication methods are
attempted in the order they are listed until the first successful authentication result is returned;
therefore if you want to ensure that users are authenticated first through the server, and
only authenticated locally if the server is unavailable or if the user is not defined on the
server, then you should list the authentication method prior to the Local users
authentication method.
See
for more information about authentication methods.
If the servers are unavailable and the TX54 device falls back to local authentication, only
users defined locally on the device are able to log in. users cannot log in until the
servers are brought back online.
Configure your TX54 device to use a server
This section describes how to configure a TX54 device to use a server for authentication and
authorization.
Required configuration items
n
Define the server IP address or domain name.
n
Define the server shared secret.
n
The group attribute configured in the server configuration.
n
The service field configured in the server configuration.
n
Add as an authentication method for your TX54 device.
Additional configuration items
n
Whether other user authentication methods should be used in addition to the server,
or if the server should be considered the authoritative login method.
n
Enable command authorization, so that the device will communicate with the server
to determine if the user is authorized to execute a specific command.
n
Enable command accounting, so that the device will communicate with the server to
log commands that the user executes.
Summary of Contents for TX54
Page 1: ...TX54 User Guide Firmware version 22 2 ...
Page 190: ...Interfaces Bridging TX54 User Guide 190 ...
Page 293: ...Hotspot Hotspot configuration TX54 User Guide 293 ...
Page 332: ...Hotspot Show hotspot status and statistics TX54 User Guide 332 ...
Page 584: ...Services Simple Network Management Protocol SNMP TX54 User Guide 584 4 Click Download ...