set tacacs session
Configuration
SecureStack C3 Configuration Guide
27-7
set tacacs session
Use
this
command
to
enable
or
disable
session
accounting,
or
to
configure
session
authorization
parameters.
For
simplicity,
separate
syntax
formats
are
shown
for
configuring
session
accounting
and
session
authorization.
Syntax
set tacacs session accounting
{
enable
|
disable
}
set tacacs session authorization
{
service
name
|
read-only
attribute value
|
read-write
attribute value
|
super-user
attribute value
}
Parameters
Defaults
None.
Mode
Switch
command,
Read
‐
Write.
Usage
When
session
accounting
is
enabled,
the
server
will
log
accounting
information,
such
as
start
and
stop
times,
IP
address
of
the
client,
and
so
forth,
for
each
authorized
client
session.
When
the
client
is
enabled
on
the
switch
(with
the
set
tacacs
enable
command),
the
session
authorization
parameters
configured
with
this
command
are
sent
by
the
client
to
the
server
when
a
session
is
initiated
on
the
switch.
The
parameter
values
must
match
a
service
and
access
level
attribute
‐
value
pairs
configured
on
the
server
for
the
session
to
be
authorized.
If
the
parameter
values
do
not
match,
the
session
will
not
be
allowed.
accounting
Specifies
that
session
accounting
is
being
configured.
enable
|
disable
Enables
or
disables
session
accounting.
authorization
Specifies
that
session
authorization
is
being
configured.
service
name
Specifies
the
name
of
the
service
that
the
client
will
request
from
the
server.
The
name
specified
here
must
match
the
name
of
a
service
configured
on
the
server.
The
default
service
name
is
exec.
read
‐
only
attribute
value
Specifies
that
the
read
‐
only
access
privilege
level
should
be
matched
to
a
privilege
level
configured
on
the
server
by
means
of
an
attribute
‐
value
pair
specified
by
attribute
and
value
.
By
default,
attribute
is
“priv
‐
lvl”
and
value
is
0.
read
‐
write
attribute
value
Specifies
that
the
read
‐
write
access
privilege
level
should
be
matched
to
a
privilege
level
configured
on
the
server
by
means
of
an
attribute
‐
value
pair
specified
by
attribute
and
value
.
By
default,
attribute
is
“priv
‐
lvl”
and
value
is
1.
super
‐
user
attribute
value
Specifies
that
the
super
‐
user
access
privilege
level
should
be
matched
to
a
privilege
level
configured
on
the
server
by
means
of
an
attribute
‐
value
pair
specified
by
attribute
and
value
.
By
default,
attribute
is
“priv
‐
lvl”
and
value
is
15.
Summary of Contents for SECURESTACK C3
Page 2: ......
Page 34: ...xxxii...
Page 40: ...Getting Help xxxviii About This Guide...
Page 126: ...clear license 4 6 Activating Licensed Features...
Page 132: ...set port inlinepower 5 6 Configuring System Power and PoE...
Page 228: ...clear port protected name 7 60 Port Configuration...
Page 270: ...clear snmp interface 8 42 SNMP Configuration...
Page 396: ...clear port txq 12 10 Port Priority Configuration...
Page 414: ...ip igmp robustness 13 18 IGMP Configuration...
Page 542: ...clear arpinspection statistics 17 32 DHCP Snooping and Dynamic ARP Inspection...
Page 546: ...Enabling Router Configuration Modes 18 4 Preparing for Router Mode...
Page 640: ...traceroute ipv6 21 10 IPv6 Management...
Page 698: ...show ipv6 dhcp binding 24 20 DHCPv6 Configuration...
Page 746: ...show ipv6 ospf virtual link 25 48 OSPFv3 Configuration...
Page 834: ...ip access group 26 88 Authentication and Authorization Configuration...
Page 848: ...TACACS Configuration clear tacacs interface 27 14...
Page 866: ...sFlow Configuration show sflow agent 28 18...
Page 872: ...Index 4...