Cisco Systems 3130 User Manual

Page of 1226
 
7-11
Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide
OL-13270-01
Chapter 7      Configuring Switch-Based Authentication
Controlling Switch Access with TACACS+
Figure 7-1
Typical TACACS+ Network Configuration
TACACS+, administered through the AAA security services, can provide these services:
Authentication—Provides complete control of authentication through login and password dialog, 
challenge and response, and messaging support.
The authentication facility can conduct a dialog with the user (for example, after a username and 
password are provided, to challenge a user with several questions, such as home address, mother’s 
maiden name, service type, and social security number). The TACACS+ authentication service can 
also send messages to user screens. For example, a message could notify users that their passwords 
must be changed because of the company’s password aging policy.
Authorization—Provides fine-grained control over user capabilities for the duration of the user’s 
session, including but not limited to setting autocommands, access control, session duration, or 
protocol support. You can also enforce restrictions on what commands a user can execute with the 
TACACS+ authorization feature.
Accounting—Collects and sends information used for billing, auditing, and reporting to the 
TACACS+ daemon. Network managers can use the accounting facility to track user activity for a 
security audit or to provide information for user billing. Accounting records include user identities, 
start and stop times, executed commands (such as PPP), number of packets, and number of bytes. 
The TACACS+ protocol provides authentication between the switch and the TACACS+ daemon, and it 
ensures confidentiality because all protocol exchanges between the switch and the TACACS+ daemon 
are encrypted. 
You need a system running the TACACS+ daemon software to use TACACS+ on your switch. 
201759
UNIX workstation
(TACACS+
server 2)
UNIX workstation
(TACACS+
server 1)
Configure the blade switches with the
  TACACS+ server addresses.
Set an authentication key
  (also configure the same key on
 the 
TACACS+ 
servers).
Enable AAA.
Create a login authentication method list.
Apply the list to the terminal lines.
Create an authorization and accounting
  method list as required.
Catalyst 6500
series switch
Servers
171.20.10.8
171.20.10.7
Servers