7-13
Cisco Catalyst Blade Switch 3120 for HP Software Configuration Guide
OL-12247-01
Chapter 7 Configuring Switch-Based Authentication
Controlling Switch Access with
•
Configuring Authorization for Privileged EXEC Access and Network Services,
page 7-16
•
Starting Accounting, page 7-17
Default Configuration
and AAA are disabled by default.
To prevent a lapse in security, you cannot configure through a network management
application. When enabled, can authenticate users accessing the switch through the CLI.
Note
Although configuration is performed through the CLI, the server authenticates
HTTP connections that have been configured with a privilege level of 15.
Identifying the Server Host and Setting the Authentication Key
You can configure the switch to use a single server or AAA server groups to group existing server hosts
for authentication. You can group servers to select a subset of the configured server hosts and use them
for a particular service. The server group is used with a global server-host list and contains the list of IP
addresses of the selected server hosts.
Beginning in privileged EXEC mode, follow these steps to identify the IP host or host maintaining
server and optionally set the encryption key:
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
tacacs-server host hostname [port
integer] [timeout integer] [key string]
Identify the IP host or hosts maintaining a server. Enter this
command multiple times to create a list of preferred hosts. The software
searches for hosts in the order in which you specify them.
•
For hostname, specify the name or IP address of the host.
•
(Optional) For port integer, specify a server port number. The default
is port 49. The range is 1 to 65535.
•
(Optional) For timeout integer, specify a time in seconds the switch
waits for a response from the daemon before it times out and declares
an error. The default is 5 seconds. The range is 1 to 1000 seconds.
•
(Optional) For key string, specify the encryption key for encrypting
and decrypting all traffic between the switch and the
daemon. You must configure the same key on the daemon
for encryption to be successful.
Step 3
aaa new-model
Enable AAA.
Step 4
aaa group server group-name
(Optional) Define the AAA server-group with a group name.
This command puts the switch in a server group subconfiguration mode.
Step 5
server ip-address
(Optional) Associate a particular server with the defined server
group. Repeat this step for each server in the AAA server
group.
Each server in the group must be previously defined in Step 2.