Brocade Communications Systems 6650 manual Tacacs authentication, TACACS+ authentication

Models: 6650

1 332
Download 332 pages 4.02 Kb
Page 47
Image 47

TACACS and TACACS+ security

Telnet connections (inbound):

1closed

2closed

3closed

4closed

5closed

Telnet connection (outbound):

6closed

SSH connections:

1closed

2closed

3closed

4closed

5closed

stack9#

TACACS authentication

NOTE

Also, multiple challenges are supported for TACACS+ login authentication.

When TACACS authentication takes place, the following events occur.

1.A user attempts to gain access to the Brocade device by doing one of the following:

Logging into the device using Telnet or SSH

Entering the Privileged EXEC level or CONFIG level of the CLI

2.The user is prompted for a username and password.

3.The user enters a username and password.

4.The Brocade device sends a request containing the username and password to the TACACS server.

5.The username and password are validated in the TACACS server database.

6.If the password is valid, the user is authenticated.

TACACS+ authentication

When TACACS+ authentication takes place, the following events occur.

1.A user attempts to gain access to the Brocade device by doing one of the following:

Logging into the device using Telnet or SSH

Entering the Privileged EXEC level or CONFIG level of the CLI

2.The user is prompted for a username.

3.The user enters a username.

4.The Brocade device obtains a password prompt from a TACACS+ server.

5.The user is prompted for a password.

6.The user enters a password.

7.The Brocade device sends the password to the TACACS+ server.

Brocade ICX 6650 Security Configuration Guide

27

53-1002601-01

 

Page 47
Image 47
Brocade Communications Systems 6650 manual Tacacs authentication, TACACS+ authentication