cc/td/doc/product/lan/cat5000/rel_5_1
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Controlling Access to the Switch Using Authentication

Controlling Access to the Switch Using Authentication

This chapter describes how to configure local authentication, RADIUS authentication, and TACACS+ authentication to control access to the switch command-line interface (CLI).


Note For complete syntax and usage information for the commands used in this chapter, refer to the Command Reference for your switch.

This chapter consists of these sections:

Understanding the Authentication Methods

These sections describe how the different authentication methods work:

Authentication Overview

You can configure any combination of these authentication methods to control access to the switch:

When multiple authentication methods are enabled, local authentication is always attempted last if enabled. In supervisor engine software release 4.4 and later, you can specify the authentication method to use for console and Telnet connections independently. For example, you might use local authentication for console connections and RADIUS authentication for Telnet connections.

Understanding How Local Authentication Works

Local authentication uses locally configured login and enable passwords to authenticate login attempts. The login and enable passwords are local to each switch and are not mapped to individual usernames.

Local authentication is enabled by default, but can be disabled if TACACS+ authentication is enabled. If local authentication is disabled and you then disable TACACS+ authentication, local authentication is reenabled automatically.

You can enable local authentication and TACACS+ authentication at the same time. Local authentication is only attempted if TACACS+ authentication fail.

Understanding How RADIUS Authentication Works

RADIUS is a client-server authentication and authorization access protocol used by Network Access Servers (NASs) to authenticate users attempting to connect to a network device. The NAS functions as a client, passing user information to one or more RADIUS servers. The NAS permits or denies network access to a user based on the response it receives from one or more RADIUS servers. RADIUS uses UDP for transport between the RADIUS client and server.

You can configure a RADIUS key on the client and server. If you configure a key on the switch, it must be the same as the one configured on the RADIUS servers. The RADIUS clients and servers use the key to encrypt all RADIUS packets transmitted. If you do not configure a RADIUS key, packets are not encrypted. The key itself is never transmitted over the network.


Note For more information about how the RADIUS protocol operates, see RFC 2138, "Remote Authentication Dial In User Service (RADIUS)."

You can configure the following RADIUS parameters on the switch:

RADIUS authentication is disabled by default. You can enable RADIUS authentication and other authentication methods at the same time. You can specify which method to use first using the primary keyword.

If local authentication is disabled and you then disable all other authentication methods, local authentication is reenabled automatically.

Understanding How TACACS+ Authentication Works

TACACS+ controls access to network devices by exchanging Network Access Server (NAS) information between a network device and a centralized database to determine the identity of a user or entity. TACACS+ is an enhanced version of TACACS, a User Datagram Protocol (UDP)-based access-control protocol specified by RFC 1492. TACACS+ uses TCP to ensure reliable delivery and encrypt all traffic between the TACACS+ server and the TACACS+ daemon on a network device.

TACACS+ works with many authentication types, including fixed password, one-time password, and challenge-response authentication. TACACS+ authentication usually occurs in these instances:

When you request privileged or restricted services, TACACS+ encrypts your user password information using the MD5 encryption algorithm and adds a TACACS+ packet header. This header information identifies the packet type being sent (for example, an authentication packet), the packet sequence number, the encryption type used, and the total packet length. The TACACS+ protocol then forwards the packet to the TACACS+ server.

A TACACS+ server can provide authentication, authorization, and accounting functions. These services, while all part of TACACS+, are independent of one another, so that a given TACACS+ configuration can use any or all of the three services. On the Catalyst 5000 series switches, only the authentication feature is supported.

When the TACACS+ server receives the packet, it does the following:

You can configure a TACACS+ key on the client and server. If you configure a key on the switch, it must be the same as the one configured on the TACACS+ servers. The TACACS+ clients and servers use the key to encrypt all TACACS+ packets transmitted. If you do not configure a TACACS+ key, packets are not encrypted.

You can configure the following TACACS+ parameters on the switch:

TACACS+ authentication is disabled by default. You can enable TACACS+ authentication and local authentication at the same time.

If local authentication is disabled and you then disable all other authentication methods, local authentication is reenabled automatically.

Authentication Default Configuration

Table 16-1 shows the default authentication configuration.


Table 16-1: Authentication Default Configuration
Feature Default Value

Local login authentication (console and Telnet)

Enabled

Local enable authentication (console and Telnet)

Enabled

RADIUS login authentication (console and Telnet)

Disabled

RADIUS enable authentication (console and Telnet)

Disabled

RADIUS server IP address

None specified

RADIUS server UDP auth-port

Port 1812

RADIUS key

None specified

RADIUS server timeout

5 seconds

RADIUS server deadtime

0 (servers not marked dead)

RADIUS retransmit attempts

2 times

TACACS+ login authentication (console and Telnet)

Disabled

TACACS+ enable authentication (console and Telnet)

Disabled

TACACS+ key

None specified

TACACS+ login attempts

3

TACACS+ server timeout

5 seconds

TACACS+ directed request

Disabled

Authentication Configuration Guidelines

These guidelines apply when configuring authentication on the switch:

Configuring Local Authentication

These sections describe how to configure local authentication on the switch:

Enabling Local Authentication


Note Local login and enable authentication is enabled for both console and Telnet connections by default. You do not need to perform this task unless you want to modify the default configuration or you have disabled local authentication.

To enable local authentication on the switch, perform this task in privileged mode:
Task Command

Step 1 Enable local login authentication on the switch. Use the console or telnet keywords if you want to enable local authentication only for console port or Telnet connection attempts.

set authentication login local enable [console | telnet | both]

Step 2 Enable local enable authentication on the switch. Use the console or telnet keywords if you want to enable local authentication only for console port or Telnet connection attempts.

set authentication enable local enable [console | telnet | both]

Step 3 Verify the local authentication configuration.

show authentication

This example shows how to enable local login and enable authentication for both console and Telnet connections, and how to verify the configuration:

Console> (enable) set authentication login local enable
local login authentication set to enable for console and telnet session.
Console> (enable) set authentication enable local enable
local enable authentication set to enable for console and telnet session.
Console> (enable) show authentication
 
Login Authentication:  Console Session   Telnet Session
---------------------  ----------------  ----------------
tacacs                 disabled          disabled        
radius                 disabled          disabled        
local                  enabled(primary)  enabled(primary)
 
Enable Authentication: Console Session   Telnet Session
---------------------- ----------------- ----------------
tacacs                 disabled          disabled        
radius                 disabled          disabled        
local                  enabled(primary)  enabled(primary)
Console> (enable)

Setting the Login Password

The login password controls access to the user mode CLI.

To set the login password for local authentication, perform this task in privileged mode:
Task Command

Set the login password for access. Enter your old password (press Return on a switch with no password configured), enter your new password, and reenter your new password.

set password

This example shows how to set the login password on the switch:

Console> (enable) set password
Enter old password:<old_password>
Enter new password:<new_password>
Retype new password:<new_password>
Password changed.
Console> (enable)

Setting the Enable Password

The enable password controls access to the privileged mode CLI.

To set the enable password for local authentication, perform this task in privileged mode:
Task Command

Set the password for privileged mode. Enter your old password (press Return on a switch with no password configured), enter your new password, and reenter your new password.

set enablepass

This example shows how to set the enable password on the switch:

Console> (enable) set enablepass
Enter old password:<old_password>
Enter new password:<new_password>
Retype new password:<new_password>
Password changed.
Console> (enable)

Disabling Local Authentication

Caution
Make sure that RADIUS or TACACS+ authentication is configured and operating correctly before disabling local login or enable authentication. If you disable local authentication and RADIUS or TACACS+ is not configured correctly, or if the RADIUS or TACACS+ server is not online, you might be unable to log in to the switch.

To disable local authentication on the switch, perform this task in privileged mode:
Task Command

Step 1 Disable local login authentication on the switch. Use the console or telnet keywords if you want to disable local authentication only for console port or Telnet connection attempts.

set authentication login local disable [console | telnet | both]

Step 2 Disable local enable authentication on the switch. Use the console or telnet keywords if you want to disable local authentication only for console port or Telnet connection attempts.

set authentication enable local disable [console | telnet | both]

Step 3 Verify the local authentication configuration.

show authentication

This example shows how to disable local login and enable authentication for both console and Telnet connections, and how to verify the configuration (you must have RADIUS or TACACS+ authentication enabled before you disable local authentication):

Console> (enable) set authentication login local disable
local login authentication set to disable for console and telnet session.
Console> (enable) set authentication enable local disable
local enable authentication set to disable for console and telnet session.
Console> (enable) show authentication
 
Login Authentication:  Console Session   Telnet Session
---------------------  ----------------  ----------------
tacacs                 disabled          disabled        
radius                 enabled(primary)  enabled(primary)
local                  disabled          disabled        
 
Enable Authentication: Console Session   Telnet Session
---------------------- ----------------- ----------------
tacacs                 disabled          disabled        
radius                 enabled(primary)  enabled(primary)
local                  disabled          disabled        
Console> (enable) 

Recovering a Lost Password

To recover a lost local authentication password, perform this task. You must complete steps 3-7 within 30 seconds or the recovery will fail. If you lost both the login and enable passwords, repeat the process for each password.

Step 1 Connect to the switch through the supervisor engine console port (you cannot recover the password if you are connected through a Telnet connection).

Step 2 Enter the reset system command to reboot the switch.

Step 3 At the "Enter Password" prompt, press Return (the login password is null for 30 seconds when you are connected to the console port).

Step 4 Enter privileged mode using the enable command.

Step 5 At the "Enter Password" prompt, press Return (the enable password is null for 30 seconds when you are connected to the console port).

Step 6 Enter the set password or set enablepass comand, as appropriate.

Step 7 When prompted for your old password, press Return.

Step 8 Enter and confirm your new password.

Configuring RADIUS Authentication

These sections describe how to configure RADIUS authentication on the switch:

Specifying RADIUS Servers

To specify one or more RADIUS servers, perform this task in privileged mode:
Task Command

Step 1 Specify the IP address of up to three RADIUS servers. Specify the primary server using the primary keyword. Optionally, specify the destination UDP port to use on the server.

set radius server ip_addr [auth-port port_number] [primary]

Step 2 Verify the RADIUS server configuration.

show radius

This example shows how to specify a RADIUS server and verify the configuration:

Console> (enable) set radius server 172.20.52.3
172.20.52.3 with auth-port 1812 added to radius server table as primary server.
Console> (enable) show radius
 
Login Authentication:  Console Session   Telnet Session
---------------------  ----------------  ----------------
tacacs                 disabled          disabled        
radius                 disabled          disabled        
local                  enabled(primary)  enabled(primary)
 
Enable Authentication: Console Session   Telnet Session
---------------------- ----------------- ----------------
tacacs                 disabled          disabled        
radius                 disabled          disabled        
local                  enabled(primary)  enabled(primary)
 
Radius Deadtime:              0 minutes
Radius Key:                   
Radius Retransmit:            2
Radius Timeout:               5 seconds
 
Radius-Server                 Status   Auth-port
----------------------------- -------  ------------
172.20.52.3                   primary  1812
Console> (enable)

Enabling RADIUS Authentication


Note Specify at least one RADIUS server before enabling RADIUS authentication on the switch. For information on specifying a RADIUS server, see the "Specifying RADIUS Servers" section.

You can enable RADIUS authentication for login and enable access to the switch. If desired, you can use the console and telnet keywords to specify that RADIUS authentication be used only on console or Telnet connections. If you are using both RADIUS and TACACS+, you can use the primary keyword to force the switch to try RADIUS authentication first.

To configure RADIUS authentication, perform this task in privileged mode:
Task Command

Step 1 Enable RADIUS authentication for login mode.

set authentication login radius enable [console | telnet | both] [primary]

Step 2 Enable RADIUS authentication for enable mode.

set authentication enable radius enable [console | telnet | both] [primary]

Step 3 Verify the RADIUS configuration.

show authentication

This example shows how to enable RADIUS authentication and verify the configuration:

Console> (enable) set authentication login radius enable
radius login authentication set to enable for console and telnet session.
Console> (enable) set authentication enable radius enable
radius enable authentication set to enable for console and telnet session.
Console> (enable) show authentication
 
Login Authentication:  Console Session   Telnet Session
---------------------  ----------------  ----------------
tacacs                 disabled          disabled        
radius                 enabled(primary)  enabled(primary)
local                  enabled           enabled         
 
Enable Authentication: Console Session   Telnet Session
---------------------- ----------------- ----------------
tacacs                 disabled          disabled        
radius                 enabled(primary)  enabled(primary)
local                  enabled           enabled         
Console> (enable)

Specifying the RADIUS Key


Note If you configure a RADIUS key on the switch, make sure you configure an identical key on the RADIUS server.

The RADIUS key is used to encrypt and authenticate all communication between the RADIUS client and server. You must configure the same key on the switch and the RADIUS server.

The length of the key is limited to 65 characters. It can include any printable ASCII characters except tabs.

To specify the RADIUS key, perform this task in privileged mode:
Task Command

Step 1 Configure the RADIUS key used to encrypt packets sent to the RADIUS server.

set radius key key

Step 2 Verify the RADIUS configuration.

show radius

This example shows how to specify the RADIUS key and verify the configuration (in normal mode, the RADIUS key value is hidden):

Console> (enable) set radius key Secret_RADIUS_key       
Radius key set to Secret_RADIUS_key
Console> (enable) show radius
 
Login Authentication:  Console Session   Telnet Session
---------------------  ----------------  ----------------
tacacs                 disabled          disabled        
radius                 enabled(primary)  enabled(primary)
local                  enabled           enabled         
 
Enable Authentication: Console Session   Telnet Session
---------------------- ----------------- ----------------
tacacs                 disabled          disabled        
radius                 enabled(primary)  enabled(primary)
local                  enabled           enabled         
 
Radius Deadtime:              0 minutes
Radius Key:                   Secret_RADIUS_key
Radius Retransmit:            2
Radius Timeout:               5 seconds
 
Radius-Server                 Status   Auth-port
----------------------------- -------  ------------
172.20.52.3                   primary  1812
Console> (enable) 

Setting the RADIUS Timeout Interval

You can specify the timeout interval between retransmissions to the RADIUS server. The default timeout is 5 seconds.

To specify the RADIUS timout interval, perform this task in privileged mode:
Task Command

Step 1 Configure the RADIUS timeout interval.

set radius timeout seconds

Step 2 Verify the RADIUS configuration.

show radius

This example shows how to specify the RADIUS timeout interval and verify the configuration:

Console> (enable) set radius timeout 10
Radius timeout set to 10 seconds.
Console> (enable) show radius
 
Login Authentication:  Console Session   Telnet Session
---------------------  ----------------  ----------------
tacacs                 disabled          disabled        
radius                 enabled(primary)  enabled(primary)
local                  enabled           enabled         
 
Enable Authentication: Console Session   Telnet Session
---------------------- ----------------- ----------------
tacacs                 disabled          disabled        
radius                 enabled(primary)  enabled(primary)
local                  enabled           enabled         
 
Radius Deadtime:              0 minutes
Radius Key:                   Secret_RADIUS_key
Radius Retransmit:            2
Radius Timeout:               10 seconds
 
Radius-Server                 Status   Auth-port
----------------------------- -------  ------------
172.20.52.3                   primary  1812
Console> (enable) 

Setting the RADIUS Retransmit Count

You can specify the number of times the switch will attempt to contact a RADIUS server before the next configured server is tried. By default, each RADIUS server will be tried two times.

To specify the RADIUS retransmit count, perform this task in privileged mode:
Task Command

Step 1 Configure the RADIUS server retransmit count.

set radius retransmit count

Step 2 Verify the RADIUS configuration.

show radius

This example shows how to specify the RADIUS retransmit count and verify the configuration:

Console> (enable) set radius retransmit 4
Radius retransmit count set to 4.
Console> (enable) show radius
 
Login Authentication:  Console Session   Telnet Session
---------------------  ----------------  ----------------
tacacs                 disabled          disabled        
radius                 enabled(primary)  enabled(primary)
local                  enabled           enabled         
 
Enable Authentication: Console Session   Telnet Session
---------------------- ----------------- ----------------
tacacs                 disabled          disabled        
radius                 enabled(primary)  enabled(primary)
local                  enabled           enabled         
 
Radius Deadtime:              0 minutes
Radius Key:                   Secret_RADIUS_key
Radius Retransmit:            4
Radius Timeout:               10 seconds
 
Radius-Server                 Status   Auth-port
----------------------------- -------  ------------
172.20.52.3                   primary  1812
Console> (enable) 

Setting the RADIUS Deadtime

You can configure the switch so that, when a RADIUS server does not respond to an authentication request, the switch marks that server as dead for the length of time specified by the deadtime. Any authentication requests received during the deadtime interval (such as other users attempting to login to the switch) are not sent to a RADIUS server marked dead. Configuring a deadtime speeds up the authentication process by eliminating timeouts and retransmissions to the dead RADIUS server.

If you configure only one RADIUS server, or if all of the configured servers are marked dead, the deadtime is ignored because there are no alternate servers available.

To set the RADIUS deadtime, perform this task in privileged mode:
Task Command

Step 1 Configure the RADIUS server deadtime interval.

set radius deadtime minutes

Step 2 Verify the RADIUS configuration.

show radius

This example shows how to set the RADIUS deadtime interval and verify the configuration:

Console> (enable) set radius deadtime 5
Radius deadtime set to 5 minute(s).
Console> (enable) show radius
 
Login Authentication:  Console Session   Telnet Session
---------------------  ----------------  ----------------
tacacs                 disabled          disabled        
radius                 enabled(primary)  enabled(primary)
local                  enabled           enabled         
 
Enable Authentication: Console Session   Telnet Session
---------------------- ----------------- ----------------
tacacs                 disabled          disabled        
radius                 enabled(primary)  enabled(primary)
local                  enabled           enabled         
 
Radius Deadtime:              5 minutes
Radius Key:                   Secret_RADIUS_key
Radius Retransmit:            4
Radius Timeout:               10 seconds
 
Radius-Server                 Status   Auth-port
----------------------------- -------  ------------
172.20.52.3                   primary  1812
172.20.52.2                            1812
Console> (enable)

Clearing RADIUS Servers

To clear one or more RADIUS servers, perform this task in privileged mode:
Task Command

Step 1 Specify the IP address of the RADIUS server to clear from the configuration. Use the all keyword to clear all of the servers from the configuration.

clear radius server [ip_addr | all]

Step 2 Verify the RADIUS server configuration.

show radius

This example shows how to clear a single RADIUS server from the configuration:

Console> (enable) clear radius server 172.20.52.3
172.20.52.3 cleared from radius server table.
Console> (enable)
 
 

This example shows how to clear all RADIUS servers from the configuration:

Console> (enable) clear radius server all
All radius servers cleared from radius server table.
Console> (enable)

Clearing the RADIUS Key

To clear the RADIUS key, perform this task in privileged mode:
Task Command

Step 1 Clear the RADIUS key.

clear radius key

Step 2 Verify the RADIUS configuration.

show radius

This example shows how to specify the RADIUS key and verify the configuration:

Console> (enable) clear radius key
Radius key cleared.
Console> (enable) 

Disabling RADIUS Authentication

If you disable RADIUS authentication with both TACACS+ and local authentication disabled, local authentication is reenabled automatically.

To disable RADIUS authentication, perform this task in privileged mode:
Task Command

Step 1 Disable RADIUS authentication for login mode.

set authentication login radius disable [console | telnet | both]

Step 2 Disable RADIUS authentication for enable mode.

set authentication enable radius disable [console | telnet | both]

Step 3 Verify the RADIUS configuration.

show radius
show authentication

This example shows how to disable RADIUS authentication:

Console> (enable) set authentication login radius disable
radius login authentication set to disable for console and telnet session.
Console> (enable) set authentication enable radius disable
radius enable authentication set to disable for console and telnet session.
Console> (enable) show authentication
 
Login Authentication:  Console Session   Telnet Session
---------------------  ----------------  ----------------
tacacs                 disabled          disabled        
radius                 disabled          disabled        
local                  enabled(primary)  enabled(primary)
 
Enable Authentication: Console Session   Telnet Session
---------------------- ----------------- ----------------
tacacs                 disabled          disabled        
radius                 disabled          disabled        
local                  enabled(primary)  enabled(primary)
Console> (enable) 

Configuring TACACS+ Authentication

These sections describe how to configure TACACS+ authentication on the switch:

Specifying TACACS+ Servers

Specify one or more TACACS+ servers before you enable TACACS+ authentication on the switch. The first server you specify is the primary server, unless you explicitly make one server the primary using the primary keyword.

To specify one or more TACACS+ servers, perform this task in privileged mode:
Task Command

Step 1 Specify the IP address of one or more TACACS+ servers.

set tacacs server ip_addr [primary]

Step 2 Verify the TACACS+ configuration.

show tacacs

This example shows how to specify TACACS+ servers and verify the configuration:

Console> (enable) set tacacs server 172.20.52.3
172.20.52.3 added to TACACS server table as primary server.
Console> (enable) set tacacs server 172.20.52.2 primary
172.20.52.2 added to TACACS server table as primary server.
Console> (enable) set tacacs server 172.20.52.10
172.20.52.10 added to TACACS server table as backup server.
Console> (enable) show tacacs
 
Login Authentication:  Console Session   Telnet Session
---------------------  ----------------  ----------------
tacacs                 disabled          disabled        
radius                 disabled          disabled        
local                  enabled(primary)  enabled(primary)
 
Enable Authentication: Console Session   Telnet Session
---------------------- ----------------- ----------------
tacacs                 disabled          disabled        
radius                 disabled          disabled        
local                  enabled(primary)  enabled(primary)
 
Tacacs key: 
Tacacs login attempts: 3
Tacacs timeout: 5 seconds
Tacacs direct request: disabled
 
Tacacs-Server                              Status
----------------------------------------   -------
172.20.52.3                                
172.20.52.2                                primary
172.20.52.10                               
Console> (enable)

Enabling TACACS+ Authentication


Note Specify at least one TACACS+ server before enabling TACACS+ authentication on the switch. For information on specifying a TACACS+ server, see the "Specifying TACACS+ Servers" section.

You can enable TACACS+ authentication for login and enable access to the switch. If desired, you can use the console and telnet keywords to specify that TACACS+ authentication be used only on console or Telnet connections. If you are using both RADIUS and TACACS+, you can use the primary keyword to force the switch to try TACACS+ authentication first.

To enable TACACS+ authentication, perform this task in privileged mode:
Task Command

Step 1 Enable TACACS+ authentication for login mode. Use the console or telnet keywords if you want to enable TACACS+ only for console port or Telnet connection attempts.

set authentication login tacacs enable [console | telnet | both] [primary]

Step 2 Enable TACACS+ authentication for enable mode. Use the console or telnet keywords if you want to enable TACACS+ only for console port or Telnet connection attempts.

set authentication enable tacacs enable [console | telnet | both] [primary]

Step 3 Verify the TACACS+ configuration.

show authentication

This example shows how to enable TACACS+ authentication for console and Telnet connections and how to verify the configuration:

Console> (enable) set authentication login tacacs enable
tacacs login authentication set to enable for console and telnet session.
Console> (enable) set authentication enable tacacs enable
tacacs enable authentication set to enable for console and telnet session.
Console> (enable) show authentication
 
Login Authentication:  Console Session   Telnet Session
---------------------  ----------------  ----------------
tacacs                 enabled(primary)  enabled(primary)
radius                 disabled          disabled        
local                  enabled           enabled         
 
Enable Authentication: Console Session   Telnet Session
---------------------- ----------------- ----------------
tacacs                 enabled(primary)  enabled(primary)
radius                 disabled          disabled        
local                  enabled           enabled         
Console> (enable)

Specifying the TACACS+ Key


Note If you configure a TACACS+ key on the switch, make sure you configure an identical key on the TACACS+ server.

To specify the TACACS+ key, perform this task in privileged mode:
Task Command

Step 1 Configure the key used to encrypt packets.

set tacacs key key

Step 2 Verify the TACACS+ configuration.

show tacacs

This example shows how to specify the TACACS+ key and verify the configuration:

Console> (enable) set tacacs key Secret_TACACS_key
The tacacs key has been set to Secret_TACACS_key.
Console> (enable) show tacacs
 
Login Authentication:  Console Session   Telnet Session
---------------------  ----------------  ----------------
tacacs                 enabled(primary)  enabled(primary)
radius                 disabled          disabled        
local                  enabled           enabled         
 
Enable Authentication: Console Session   Telnet Session
---------------------- ----------------- ----------------
tacacs                 enabled(primary)  enabled(primary)
radius                 disabled          disabled        
local                  enabled           enabled         
 
Tacacs key: Secret_TACACS_key
Tacacs login attempts: 3
Tacacs timeout: 5 seconds
Tacacs direct request: disabled
 
Tacacs-Server                              Status
----------------------------------------   -------
172.20.52.3                                
172.20.52.2                                primary
172.20.52.10                               
Console> (enable)

Setting the TACACS+ Timeout Interval

You can specify the timeout interval between retransmissions to the TACACS+ server. The default timeout is 5 seconds.

To specify the TACACS+ timout interval, perform this task in privileged mode:
Task Command

Step 1 Configure the TACACS+ timeout interval.

set tacacs timeout seconds

Step 2 Verify the TACACS+ configuration.

show tacacs

This example shows how to set the server timeout interval and verify the configuration:

Console> (enable) set tacacs timeout 30 
Tacacs timeout set to 30 seconds.
Console> (enable) show tacacs
 
Login Authentication:  Console Session   Telnet Session
---------------------  ----------------  ----------------
tacacs                 enabled(primary)  enabled(primary)
radius                 disabled          disabled        
local                  enabled           enabled         
 
Enable Authentication: Console Session   Telnet Session
---------------------- ----------------- ----------------
tacacs                 enabled(primary)  enabled(primary)
radius                 disabled          disabled        
local                  enabled           enabled         
 
Tacacs key: Secret_TACACS_key
Tacacs login attempts: 3
Tacacs timeout: 30 seconds
Tacacs direct request: disabled
 
Tacacs-Server                              Status
----------------------------------------   -------
172.20.52.3                                
172.20.52.2                                primary
172.20.52.10                               
Console> (enable) 

Setting the TACACS+ Login Attempts

You can specify the number of failed login attempts allowed.

To specify the number of login attempts allowed, perform this task in privileged mode:
Task Command

Step 1 Configure the number of allowed login attempts.

set tacacs attempts number

Step 2 Verify the TACACS+ configuration.

show tacacs

This example shows how to set the number of login attempts and verify the configuration:

Console> (enable) set tacacs attempts 5
Tacacs number of attempts set to 5.
Console> (enable) show tacacs
 
Login Authentication:  Console Session   Telnet Session
---------------------  ----------------  ----------------
tacacs                 enabled(primary)  enabled(primary)
radius                 disabled          disabled        
local                  enabled           enabled         
 
Enable Authentication: Console Session   Telnet Session
---------------------- ----------------- ----------------
tacacs                 enabled(primary)  enabled(primary)
radius                 disabled          disabled        
local                  enabled           enabled         
 
Tacacs key: Secret_TACACS_key
Tacacs login attempts: 5
Tacacs timeout: 30 seconds
Tacacs direct request: disabled
 
Tacacs-Server                              Status
----------------------------------------   -------
172.20.52.3                                
172.20.52.2                                primary
172.20.52.10                               
Console> (enable) 

Enabling TACACS+ Directed Request

When TACACS+ directed request is enabled, users must specify the hostname of a configured TACACS+ server (in the form username@server_hostname) or the authentication request will fail.

To enable TACACS+ directed request, perform this task in privileged mode:
Task Command

Step 1 Enable TACACS+ directed request on the switch.

set tacacs directedrequest enable

Step 2 Verify the TACACS+ configuration.

show tacacs

This example shows how to enable TACACS+ directed request and verify the configuration:

Console> (enable) set tacacs directedrequest enable
Tacacs direct request has been enabled.
Console> (enable) show tacacs
 
Login Authentication:  Console Session   Telnet Session
---------------------  ----------------  ----------------
tacacs                 enabled(primary)  enabled(primary)
radius                 disabled          disabled        
local                  enabled           enabled         
 
Enable Authentication: Console Session   Telnet Session
---------------------- ----------------- ----------------
tacacs                 enabled(primary)  enabled(primary)
radius                 disabled          disabled        
local                  enabled           enabled         
 
Tacacs key: Secret_TACACS_key
Tacacs login attempts: 5
Tacacs timeout: 30 seconds
Tacacs direct request: enabled
 
Tacacs-Server                              Status
----------------------------------------   -------
172.20.52.3                                
172.20.52.2                                primary
172.20.52.10                               
Console> (enable) 

Disabling TACACS+ Directed Request

To disable TACACS+ directed request, perform this task in privileged mode:
Task Command

Step 1 Disable TACACS+ directed request on the switch.

set tacacs directedrequest disable

Step 2 Verify the TACACS+ configuration.

show tacacs

This example shows how to disable TACACS+ directed request:

Console> (enable) set tacacs directedrequest disable 
Tacacs direct request has been disabled.
Console> (enable) 

Clearing TACACS+ Servers

To clear one or more TACACS+ servers, perform this task in privileged mode:
Task Command

Step 1 Specify the IP address of the TACACS+ server to clear from the configuration. Use the all keyword to clear all of the servers from the configuration.

clear tacacs server [ip_addr | all]

Step 2 Verify the TACACS+ server configuration.

show tacacs

This example shows how to clear a specific TACACS+ server from the configuration:

Console> (enable) clear tacacs server 172.20.52.3
172.20.52.3 cleared from TACACS table
Console> (enable)
 
 

This example shows how to clear all TACACS+ servers from the configuration:

Console> (enable) clear tacacs server all
All TACACS servers cleared
Console> (enable)

Clearing the TACACS+ Key

To clear the TACACS+ key, perform this task in privileged mode:
Task Command

Step 1 Clear the TACACS+ key.

clear tacacs key

Step 2 Verify the TACACS+ configuration.

show tacacs

This example shows how to clear the TACACS+ key:

Console> (enable) clear tacacs key
TACACS server key cleared.
Console> (enable) 

Disabling TACACS+ Authentication

If you disable TACACS+ authentication with both RADIUS and local authentication disabled, local authentication is reenabled automatically.

To disable TACACS+ authentication, perform this task in privileged mode:
Task Command

Step 1 Disable TACACS+ authentication for login mode. Use the console or telnet keywords if you want to disable TACACS+ only for console port or Telnet connection attempts.

set authentication login tacacs disable [console | telnet | both]

Step 2 Disable TACACS+ authentication for enable mode. Use the console or telnet keywords if you want to disable TACACS+ only for console port or Telnet connection attempts.

set authentication enable tacacs disable [console | telnet | both]

Step 3 Verify the TACACS+ configuration.

show authentication

This example shows how to disable TACACS+ authentication for console and Telnet connections and how to verify the configuration:

Console> (enable) set authentication login tacacs disable
tacacs login authentication set to disable for console and telnet session.
Console> (enable) set authentication enable tacacs disable
tacacs enable authentication set to disable for console and telnet session.
Console> (enable) show authentication
 
Login Authentication:  Console Session   Telnet Session
---------------------  ----------------  ----------------
tacacs                 disabled          disabled        
radius                 disabled          disabled        
local                  enabled(primary)  enabled(primary)
 
Enable Authentication: Console Session   Telnet Session
---------------------- ----------------- ----------------
tacacs                 disabled          disabled        
radius                 disabled          disabled        
local                  enabled(primary)  enabled(primary)
Console> (enable) 

Authentication Example

Figure 16-1 shows a simple network topology using TACACS+ authentication.

In this example, TACACS+ authentication is enabled and local authentication is disabled for both login and enable access to the switch for all Telnet connections. When Workstation A attempts to connect to the switch, the user is challenged for a TACACS+ username and password.

However, only local authentication is enabled for both login and enable access on the console port. Any user with access to the directly connected terminal can access the switch using the login and enable passwords.


Figure 16-1: TACACS+ Authentication Example Network Topology


This example shows how to configure the switch so that TACACS+ authentication is enabled for Telnet connections and local authentication is enabled for console connections. In addition, a TACACS+ encryption key is specified.

Console> (enable) show tacacs
 
Login Authentication:  Console Session   Telnet Session
---------------------  ----------------  ----------------
tacacs                 disabled          disabled        
radius                 disabled          disabled        
local                  enabled(primary)  enabled(primary)
 
Enable Authentication: Console Session   Telnet Session
---------------------- ----------------- ----------------
tacacs                 disabled          disabled        
radius                 disabled          disabled        
local                  enabled(primary)  enabled(primary)
 
Tacacs key: 
Tacacs login attempts: 3
Tacacs timeout: 5 seconds
Tacacs direct request: disabled
 
Tacacs-Server                              Status
----------------------------------------   -------
Console> (enable) set tacacs server 172.20.52.10
172.20.52.10 added to TACACS server table as primary server.
Console> (enable) set tacacs key tintin_et_milou 
The tacacs key has been set to tintin_et_milou.
Console> (enable) set authentication login tacacs enable telnet
tacacs login authentication set to enable for telnet session.
Console> (enable) set authentication enable tacacs enable telnet
tacacs enable authentication set to enable for telnet session.
Console> (enable) set authentication login local disable telnet 
local login authentication set to disable for telnet session.
Console> (enable) set authentication enable local disable telnet
local enable authentication set to disable for telnet session.
Console> (enable) show tacacs
 
Login Authentication:  Console Session   Telnet Session
---------------------  ----------------  ----------------
tacacs                 disabled          enabled(primary)
radius                 disabled          disabled        
local                  enabled(primary)  disabled        
 
Enable Authentication: Console Session   Telnet Session
---------------------- ----------------- ----------------
tacacs                 disabled          enabled(primary)
radius                 disabled          disabled        
local                  enabled(primary)  disabled        
 
Tacacs key: tintin_et_milou
Tacacs login attempts: 3
Tacacs timeout: 5 seconds
Tacacs direct request: disabled
 
Tacacs-Server                              Status
----------------------------------------   -------
172.20.52.10                               primary
Console> (enable)
 
 


hometocprevnextglossaryfeedbacksearchhelp
Posted: Mon Jul 19 12:41:49 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.