02.10.2013 Views

FTOS Configuration Guide for the C-Series - Force10 Networks

FTOS Configuration Guide for the C-Series - Force10 Networks

FTOS Configuration Guide for the C-Series - Force10 Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

If au<strong>the</strong>ntication fails using <strong>the</strong> primary method, <strong>FTOS</strong> employs <strong>the</strong> second method (or third method, if<br />

necessary) automatically. For example, if <strong>the</strong> TACACS+ server is reachable, but <strong>the</strong> server key is invalid,<br />

<strong>FTOS</strong> proceeds to <strong>the</strong> next au<strong>the</strong>ntication method. In Figure 68, <strong>the</strong> TACACS+ is incorrect, but <strong>the</strong> user is<br />

still au<strong>the</strong>nticated by <strong>the</strong> secondary method.<br />

Figure 68 Failed Au<strong>the</strong>ntication<br />

<strong>Force10</strong>(conf)#<br />

<strong>Force10</strong>(conf)#do show run aaa<br />

!<br />

aaa au<strong>the</strong>ntication enable default tacacs+ enable<br />

aaa au<strong>the</strong>ntication enable LOCAL enable tacacs+<br />

aaa au<strong>the</strong>ntication login default tacacs+ local<br />

aaa au<strong>the</strong>ntication login LOCAL local tacacs+<br />

aaa authorization exec default tacacs+ none<br />

aaa authorization commands 1 default tacacs+ none<br />

aaa authorization commands 15 default tacacs+ none<br />

aaa accounting exec default start-stop tacacs+<br />

aaa accounting commands 1 default start-stop tacacs+<br />

aaa accounting commands 15 default start-stop tacacs+<br />

<strong>Force10</strong>(conf)#<br />

<strong>Force10</strong>(conf)#do show run tacacs+<br />

!<br />

tacacs-server key 7 d05206c308f4d35b Server key purposely changed to incorrect value<br />

tacacs-server host 10.10.10.10 timeout 1<br />

<strong>Force10</strong>(conf)#tacacs-server key angeline<br />

<strong>Force10</strong>(conf)#%RPM0-P:CP %SEC-5-LOGIN_SUCCESS: Login successful <strong>for</strong> user admin on<br />

vty0 (10.11.9.209)<br />

%RPM0-P:CP %SEC-3-AUTHENTICATION_ENABLE_SUCCESS: Enable password au<strong>the</strong>ntication<br />

success on vty0 ( 10.11.9.209 )<br />

%RPM0-P:CP %SEC-5-LOGOUT: Exec session is terminated <strong>for</strong> user admin on line vty0<br />

(10.11.9.209)<br />

<strong>Force10</strong>(conf)#username angeline password angeline<br />

<strong>Force10</strong>(conf)#%RPM0-P:CP %SEC-5-LOGIN_SUCCESS: Login successful <strong>for</strong> user angeline on<br />

vty0 (10.11.9.209)<br />

%RPM0-P:CP %SEC-3-AUTHENTICATION_ENABLE_SUCCESS: Enable password au<strong>the</strong>ntication<br />

success on vty0 ( 10.11.9.209 )<br />

User au<strong>the</strong>nticated using secondary method<br />

Monitoring TACACS+<br />

To view in<strong>for</strong>mation on TACACS+ transactions, use <strong>the</strong> following command in <strong>the</strong> EXEC privilege mode:<br />

Command Syntax Command Mode Purpose<br />

debug tacacs+ EXEC privilege View TACACS+ transactions to troubleshoot<br />

problems.<br />

152 Security

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!