beautypg.com
i
Contents
1 TACACS+ Authentication Manager overview ······································································································· 1
TAM features ····································································································································································· 1
Reliable identity authentication ······························································································································· 1
Simple user management ········································································································································ 1
Strict and refined user privilege control ················································································································· 2
High-performance, expansible deployment solutions ··························································································· 2
TAM functional structure ··················································································································································· 2
TAM user types ························································································································································· 3
Condition-based authorization································································································································ 3
Login authorization and command authorization ································································································· 3
Online user management ········································································································································ 3
Log management ······················································································································································ 3
Login methods and authentication-authorization methods ···························································································· 4
TAM local authentication and authorization ········································································································· 4
LDAP authentication + TAM local authorization ··································································································· 5
2 Configuring device user authentication ·················································································································· 7
Configuring TAM local authentication and authorization ···························································································· 7
Configuring TAM ······················································································································································ 8
Configuring a device ············································································································································ 11
Configuring the PC of the device user ················································································································ 13
Configuring LDAP authentication + TAM local authorization ··················································································· 13
Configuring an LDAP server ································································································································· 13
Configuring TAM ··················································································································································· 13
Configuring a device ············································································································································ 18
Configuring the PC of the device user ················································································································ 19
Comparing the authentication-authorization methods ······························································································· 19
3 TAM functions and common operations ··············································································································· 21
TAM functions ································································································································································· 21
Common operations ······················································································································································ 22
Sorting a list ··························································································································································· 22
Navigating a list ···················································································································································· 22
4 Performing device-related configuration ··············································································································· 23
Viewing the device list ··················································································································································· 23
Querying devices ··························································································································································· 24
Viewing device details ·················································································································································· 24
Adding a device ···························································································································································· 25
Importing devices ··························································································································································· 28
Modifying a device ························································································································································ 30
Batch modifying devices ··············································································································································· 30
Batch deleting devices ··················································································································································· 31
Modifying the device area and type ··························································································································· 32
5 Managing authorization conditions ······················································································································ 33
Managing device areas ················································································································································ 33
Viewing the device area list ································································································································· 33
Viewing device area details ································································································································· 34
Adding a device area ··········································································································································· 34
Adding a sub-area ················································································································································ 35