60-61
User Guide for Cisco Security Manager 4.4
OL-28826-01
Chapter 60 Router Device Administration
VTY Policy Page
Navigation Path
From the Console Page—Authorization Tab, page60-45 or the VTY Line Dialog Box—Authorization
Tab, page60-56, click the Add button beneath the Command Authorization table.
Related Topics
Console Policy Page, page 60-42
VTY Policy Page, page 60-50
Field Reference
Command Accounting Dialog Box—Line Access
Use the Command Accounting dialog box to define which methods to use when recording information
about the EXEC commands that are executed for a given privilege. Each accounting record includes a
list of the commands executed for that privilege level, as well as the date and time each command was
executed, and the name of the user who executed it.
Navigation Path
From the Console Page—Accounting Tab, page 60-47 or the VTY Line Dialog Box—Accounting Tab,
page 60-57, click the Add button beneath the Command Accounting table.
Related Topics
Console Policy Page, page 60-42
Table60-26 Command Authorization Dialog Box—Line Access
Element Description
Privilege Level The privilege level for which you want to define a command
authorization list. Valid values range from 0 to 15.
Note If you do not define a value, level 1 is assigned by default. This
value does not appear in the device configuration.
AAA Policy Default List Select this option to apply the default authorization list defined in the
device’s AAA policy to the EXEC commands associated with this
privilege level. See Command Accounting Dialog Box, page60-12.
Custom Method List Select this option to define an authorization method list for this
privilege level.
Prioritized Method List Applies only when the Custom Method List option is selected.
Defines a sequential list of methods to be queried when authorizing a
user. Enter the names of one or more AAA server group objects (up to
four), or click Select to select them. Use the up and down arrows in the
object selector to define the order in which the selected server groups
should be used. If the object that you want is not listed, click the Create
button to create it.
The device tries initially to authorize users using the first method in the
list. If that method fails to respond, the device tries the next method,
and so on, until a response is received.
Note If you select None as a method, it must appear as the last
method in the list.