22.05.2017 Views

nx.os.and.cisco.nexus.switching.2nd.edition.1587143046

Nexus Switching 2nd Edition

Nexus Switching 2nd Edition

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 5-5. Confirming That User console1 Successfully Authenticates via the RADIUS<br />

Protocol<br />

Configuring TACACS+<br />

The TACACS+ protocol provides centralized validation of users attempting to gain access<br />

to a Cisco NX-OS device. TACACS+ services are maintained in a database on a<br />

TACACS+ daemon running on a Cisco ACS Linux appliance. TACACS+ provides for<br />

separate authentication, authorization, <strong>and</strong> accounting facilities. The TACACS+ protocol<br />

uses TCP port 49 for transport communication.<br />

Enabling TACACS+<br />

The TACACS+ feature is disabled by default. TACACS+ must explicitly enable the<br />

TACACS+ feature to access the configuration <strong>and</strong> verification comm<strong>and</strong>s for authentication.<br />

To verify the default TACACS+ feature status, use the following comm<strong>and</strong>:<br />

Egypt# show feature | i tacacs<br />

tacacs 1 disabled<br />

To enable the TACACS+ feature, enter the configuration demonstrated in Example 5-10.<br />

Example 5-10. Enabling TACACS+ Feature/Process

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!