9-18
Cisco IE 3010 Switch Software Configuration Guide
OL-23145-01
Chapter 9 Configuring Switch-Based Authentication
Controlling Switch Access with RADIUS

Establishing a Session with a Router if the AAA Server is Unreachable

The aaa accounting system guarantee-first command guarantees system accounting as the first record,
which is the default condition. In some situations, users might be prevented from starting a session on
the console or terminal connection until after the system reloads, which can take more than 3 minutes.
To establish a console or Telnet session with the router if the AAA server is unreachable when the router
reloads, use the no aaa accounting system guarantee-first command.

Displaying the TACACS+ Configuration

To display TACACS+ server statistics, use the show tacacs privileged EXEC command.
Controlling Switch Access with RADIUS
This section describes how to enable and configure the RADIUS, which provides detailed accounting
information and flexible administrative control over authentication and authorization processes.
RADIUS is facilitated through AAA and can be enabled only through AAA commands.
Note For complete syntax and usage information for the commands used in this section, see the Cisco IOS
Security Command Reference, Release 12.2 from the Cisco.com page u nder Documentation > Cisco
IOS Software > 12.2 Mainline > Command References.
These sections contain this configuration information:
Understanding RADIUS, page 9-18
RADIUS Operation, page 9-20
RADIUS Change of Authorization, page 9-20
Configuring RADIUS, page 9-27
Displaying the RADIUS Configuration, page 9-40

Understanding RADIUS

RADIUS is a distributed client/server system that secures networks against unauthorized access.
RADIUS clients run on supported Cisco routers and switches. Clients send authenti cation requests to a
central RADIUS server, which contains all user authentication and network service access information.