beautypg.com

Tacacs/tacacs+ configuration considerations, Configuring tacacs – Brocade FastIron Ethernet Switch Security Configuration Guide User Manual

Page 47

background image

AAA security for commands pasted into the running-config

If AAA security is enabled on the device, commands pasted into the running-config are subject to the
same AAA operations as if they were entered manually.

When you paste commands into the running-config, and AAA command authorization or accounting, or
both, are configured on the device, AAA operations are performed on the pasted commands. The AAA
operations are performed before the commands are actually added to the running-config. The server
performing the AAA operations should be reachable when you paste the commands into the running-
config file. If the device determines that a pasted command is invalid, AAA operations are halted on the
remaining commands. The remaining commands may not be executed if command authorization is
configured.

TACACS/TACACS+ configuration considerations

• You must deploy at least one TACACS/TACACS+ server in your network.
• Brocade devices support authentication using up to eight TACACS/TACACS+ servers. The device

tries to use the servers in the order you add them to the device configuration.

• You can select only one primary authentication method for each type of access to a device (CLI

through Telnet, CLI Privileged EXEC and CONFIG levels). For example, you can select TACACS+
as the primary authentication method for Telnet CLI access, but you cannot also select RADIUS
authentication as a primary method for the same type of access. However, you can configure backup
authentication methods for each access type.

• You can configure the Brocade device to authenticate using a TACACS or TACACS+ server, not

both.

Configuring TACACS

Follow the procedure given below for TACACS configurations.

1. Identify TACACS servers. Refer to

Identifying the TACACS/TACACS+ servers

on page 48.

2. Set optional parameters. Refer to

Setting optional TACACS and TACACS+ parameters

on page

49.

3. Configure authentication-method lists. Refer to

Configuring authentication-method lists forTACACS

and TACACS+

on page 50.

Configuring TACACS+

Follow the procedure given below for TACACS+ configurations.

1. Identify TACACS+ servers. Refer to

Identifying the TACACS/TACACS+ servers

on page 48.

2. Set optional parameters. Refer to

Setting optional TACACS and TACACS+ parameters

on page

49.

3. Configure authentication-method lists. Refer to

Configuring authentication-method lists forTACACS

and TACACS+

on page 50.

4. Optionally configure TACACS+ authorization. Refer to

Configuring TACACS+ authorization

on page

53.

5. Optionally configure TACACS+ accounting. Refer to

TACACS+ accounting configuration

on page

55.

AAA security for commands pasted into the running-config

FastIron Ethernet Switch Security Configuration Guide

47

53-1003088-03