Solved

AAA question

Posted on 2006-10-22
2
379 Views
Last Modified: 2010-04-17
can someone tell me what the following means (I'm looking for a breakdown of each part):

aaa authentication login default group tacacs+       (can someone breakdown this for me? Is tacacs+ a group name?)
aaa authorization network default group tacacs+    (same question as above. Is tacacs+ a group name)
aaa accounting exec default start-stop group tacacs+ (what does everything after "exec" mean?)



thanks
0
Comment
Question by:dissolved
2 Comments
 
LVL 12

Accepted Solution

by:
pjtemplin earned 500 total points
ID: 17786168
aaa authentication login default group tacacs+

This requires users logging into the router, on all lines that do not have a non-default authentication group assigned, to validate their identity, checked against the group of tacacs+ servers listed later in the config.

aaa authorization network default group tacacs+

This requires PPP, SLIP, and ARAP connections to get authorization from the tacacs+ servers listed later in the config.

aaa accounting exec default start-stop group tacacs+

This tracks the activity of user EXEC sessions to the tacacs+ server group.

See http://tinyurl.com/6tnks for further information.
0
 

Author Comment

by:dissolved
ID: 17786229
hey thanks me.
So what does the "group" denote?
I'm assuming "tacacs+" denotes that we will be using TACACS+ as opposed to RADIUS?

Thanks
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The Cisco RV042 router is a popular small network interfacing device that is often used as an internet gateway. Network administrators need to get at the management interface to make settings, change passwords, etc. This access is generally done usi…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question