USER’S GUIDE

3.Optional: configure a secondary TACACS Server with selection (2). In the event that the primary server does not respond to system requests, the secondary server will be queried for device authentication information. The address and port number of the Secondary Server must not be the same as the Primary Server.

4.Select (3) Access Request Retry to finish configuration. Specify the number of access request retries that the system will send to the Authentication Server, as well as the time between retries. You may also specify order of the TACACS authentication prompts for access request.

USING MANAGE MODE COMMANDS

tacacs

Displays the current TACACS off-node server configuration data.

tacacs change

Allows you to change the current TACACS off-node server configuration data. After entering the tacacs change command, you will be prompted for the configuration elements you want to change.

TACACS AUTHENTICATION SERVER CONFIGURATION ELEMENTS

IP ADDRESS

The IP address in dotted decimal notation for the TACACS Server.

UDP PORT NUMBER

The UDP port number used by the TACACS Server. The default value of 49 is almost always used.

NUMBER OF ACCESS REQUEST RETRIES

The number of Access Request Retries that the system will send to the TACACS Server. The initial default value is 3. The acceptable range is from 0 to 32,767.

TIME BETWEEN ACCESS REQUEST RETRIES

The time between Access Request Retries sent from the system. The initial default value is 1 second. The acceptable range is from 1 to 10,000.

TACACS PACKET FORMAT

The TACACS format for device authentication. The default format is ID code, PIN.

TACACS AUTHENTICATION SERVER BACKGROUND INFORMATION

The Terminal Access Controller Access Control System (TACACS) is a database supported by the CyberSWITCH. TACACS operates using two components: client code and server code. TACACS server software is installed on a UNIX-based system connected to the CyberSWITCH network. The client protocols allow the system to communicate with the TACACS server, ultimately authenticating devices.

The following is a typical scenario if the TACACS Server is activated: with user level security, a remote user will Telnet into a specified system port for user authentication. The system, in turn, will send an access request to the primary TACACS Server. After the configured time interval the

184 CyberSWITCH

Page 184
Image 184
Cabletron Systems CSX1000, CSX1200 manual Tacacs Authentication Server Configuration Elements