Brocade Multi-Service IronWare Security Configuration Guid Instrukcja Użytkownika Strona 56

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 370
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 55
38 Multi-Service IronWare Security Configuration Guide
53-1003035-02
Configuring TACACS or TACACS+ security
1
The commands above cause TACACS or TACACS+ to be the primary authentication method for
securing Telnet or SSH access to the CLI. If TACACS or TACACS+ authentication fails due to an error
with the server, authentication is performed using local user accounts instead.
To create an authentication-method list that specifies TACACS or TACACS+ as the primary
authentication method for securing access to Privileged EXEC level and CONFIG levels of the CLI.
Brocade(config)# aaa authentication enable default tacacs+ local none
The command above causes TACACS or TACACS+ to be the primary authentication method for
securing access to Privileged EXEC level and CONFIG levels of the CLI. If TACACS or TACACS+
authentication fails due to an error with the server, local authentication is used instead. If local
authentication fails, no authentication is used; the device automatically permits access.
For information on the command syntax, refer “Examples of authentication-method lists”.
NOTE
For examples of how to define authentication-method lists for types of authentication other than
TACACS or TACACS+, refer to “Configuring authentication-method lists”.
Entering privileged EXEC mode after a console,
Telnet or SSH login
By default, a user enters User EXEC mode after a successful login using a non-AAA method through
console, Telnet or SSH. Optionally, you can configure the device so that a user enters Privileged
EXEC mode after a console, Telnet or SSH login. To do this, use the following command.
Brocade(config)# aaa authentication login privilege-mode
Syntax: [no] aaa authentication login privilege-mode
The user’s privilege level is based on the privilege level granted during login.
Limitations when automatically entering privilege EXEC mode for SSH session with public-key
authentication
Features that require user identity will continue to behave as if no user identity was provided.
The authentication, authorization and accounting will not be performed through AAA.
Enabling automatically entering Privilege EXEC mode access for SSH session with public-key
authentication
Example 1:
Brocade (config) # aaa authentication login default local
Brocade (config) # aaa authentication login privilege-mode
NOTE
After successful key-authentication, the SSH session will be placed into the Privileged EXEC mode.
Example 2:
Brocade (config) # aaa authentication enable default local
Brocade (config) # aaa authentication login privilege-mode
Brocade (config) # ip ssh password-authentication no
Brocade (config) # ip ssh interactive-authentication no
Przeglądanie stron 55
1 2 ... 51 52 53 54 55 56 57 58 59 60 61 ... 369 370

Komentarze do niniejszej Instrukcji

Brak uwag