Related Topics
Identifying the RADIUS Server Host, on page 65
RADIUS Server Host, on page 62
AAA Server Groups, on page 63
Configuring RADIUS Authorization for User Privileged Access and Network
Services
Authorization is bypassed for authenticated users who log in through the CLI even if authorization has
been configured.
Note
Beginning in privileged EXEC mode, follow these steps to configure RADIUS authorization for user priviledged
access and network services:
SUMMARY STEPS
1.
configure terminal
2.
aaa authorization network radius
3.
aaa authorization exec radius
4.
end
DETAILED STEPS
Purpose
Command or Action
Enters the global configuration mode.
configure terminal
Example:
Switch#
configure terminal
Step 1
Configures the switch for user RADIUS authorization for all
network-related service requests.
aaa authorization network radius
Example:
Switch(config)#
aaa authorization network
Step 2
radius
Configures the switch for user RADIUS authorization if the
user has privileged EXEC access.
aaa authorization exec radius
Example:
Switch(config)#
aaa authorization exec radius
Step 3
The
exec
keyword might return user profile information (such
as
autocommand
information).
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
OL-29434-01
71
Configuring RADIUS
Configuring RADIUS Authorization for User Privileged Access and Network Services