Cuda 12000 IP Access Switch CLI-based Administration Guide
Configuring User Authentication 69
Configuring TACACS+ Authentication
Before you configure TACACS+ authentication on the Cuda 12000, make
sure that:
At least one account for Cuda 12000 users has been created on the
TACACS+ server. Users must login to the Cuda 12000 an account created
on the TACACS+ server. Refer to your TACACS+ server documentation
for more information.
You know the IP address of the TACACS+ server.
You know the shared key that the Cuda 12000 will use to encrypt
TACACS+ usernames and passwords for transmission to the TACACS+
server.
If TACACS+ authentication is unavailable due to problems with the TACACS+
server, local authentication is used.
To configure TACACS+ authentication on the Cuda 12000, perform the
following tasks:
Task Command
1. Enter root mode. root
2. Specify the IP address of the
TACACS+ server.
tacacs-server host <ip-address>
3. Specify the encryption key that
the Cuda 12000 will use to
encrypt usernames and
passwords. The key is an
alphanumeric string.
tacacs-server key <string>
4. Verify TACACS+ server settings. show tacacs-server
5. Enable TACACS+ authentication. aaa authentication login default tacacs+