beautypg.com

Configuring command authorization – Brocade Multi-Service IronWare Security Configuration Guide (Supporting R05.6.00) User Manual

Page 60

background image

42

Multi-Service IronWare Security Configuration Guide

53-1003035-02

Configuring TACACS or TACACS+ security

1

Example

user=bob {

default service = permit

member admin

# Global password

global = cleartext "cat"

service = exec {

foundry-privlvl = 4

priv-lvl = 15

}

}

In this example, the user would be granted a privilege level of 4 (port-config level). The privlvl =
15

A-V pair is ignored by the Brocade device.

If the TACACS+ server has no A-V pair configured for the Exec service, the default privilege level of 5
(read-only) is grated to the user.

Configuring command authorization

When TACACS+ command authorization is enabled, the Brocade device consults a TACACS+ server
to get authorization for commands entered by the user.

You enable TACACS+ command authorization by specifying a privilege level whose commands
require authorization. For example, to configure the Brocade device to perform authorization for the
commands available at the Super User privilege level (that is, all commands on the device), enter
the following command.

Brocade(config)# aaa authorization commands 0 default tacacs+

Syntax: [no] aaa authorization commands privilege-level default tacacs+ | radius | none

The privilege-level parameter can be one of the following:

0 – Authorization is performed for commands available at the Super User level (all commands)

4 – Authorization is performed for commands available at the Port Configuration level
(port-config and read-only commands)

5 – Authorization is performed for commands available at the Read Only level (read-only
commands)

NOTE

TACACS+ command authorization can be performed only for commands entered from Telnet or SSH
sessions, or from the console. No authorization is performed for commands entered at the Web
Management Interface or Brocade Network Advisor.

TACACS+ command authorization is not performed for the following commands:

At all levels: exit, logout, end, quit and access-list (Any command with “acc” prefix).

At the Privileged EXEC level: enable or enable text, where text is the password configured for
the Super User privilege level.

If configured, command accounting is performed for these commands.

NOTE

To enable AAA support for commands entered at the console you must follow the procedure
described in

“Configuring AAA on the console”

.